CLOSE PROTECTION & SECURITY INSTRUCTOR

TERROR THREAT AWARENESS

Terrorism is the use or threat of action, both in and outside of the UK, designed to influence any international government organisation or to intimidate the public. It must also be for the purpose of advancing a political, religious, racial or ideological cause.

 

Terrorism Threat Levels:

The official source of UK Threat Level is (MI5) and their website is https://www.mi5.gov.uk/threat-levels.

 

As well as knowing what each level means an operative would ideally need to know how it may impact the response level their location may have.

 

  • LOW - means an attack is highly unlikely
  • MODERATE - means an attack is possible, but not likely
  • SUBSTANTIAL - means an attack is likely
  • SEVERE - means an attack is highly likely
  • CRITICAL - means an attack is highly likely in the near future

 

Security operatives need to understand how the current terrorist threat level will affect them at their own place of work, this should be outlined in their assignment instructions.

 

Attack Planning Phases:

  • Preliminary target selection
  • Initial surveillance
  • Final target selection
  • Pre-attack surveillance
  • Planning
  • Rehearsal
  • Execution
  • Escape and exploitation

 

Current Terrorist Attack Methodologies:

 

MTA - Marauding Terror Attack

This type of attack could use firearms, knives, sharp objects or blunt objects while on foot to attack people in the area

 

Types of Explosive Devices commonly used in attacks:

  • IED - Improvised Explosive Device
  • PBIED - Person-Borne Improvised Explosive Device
  • VBIED - Vehicle-Borne Improvised Explosive Device
  • LBIED - Leave Behind Improvised Explosive Device

 

VAAW - Vehicle Attacks:

More often vehicles can be used as a weapon. This can be known as VAAW. Vehicles are used to target crowds and ram into people to cause severe damage

 

Chemical Attacks:

Chemical warfare was widely used in World War One which resulted in many deaths including those of civilians as there was little way to control where the chemicals travelled once they were deployed. After the war most countries agreed not to use chemical or biological weapons in future conflicts. However, terrorists can manufacture weapons using many products available over the shelf and use these against the wider population

 

Biological Attacks:

Bioterrorism is the use of biological agents to cause illness or death in humans, plants or animals. They can be made using viruses, fungi, toxins or bacteria. These could be naturally occurring or man-made or man manipulated. They can be spread through water supplies, through the air, through food or through contaminated surfaces

 

Radiological Attacks:

Commonly known as a "Dirty Bomb", these types of devices are designed to spread radioactive material across a wide area with the intent to do harm. Radioactive materials are used in a lot of different industries including in medicine and research laboratories but can also be acquired by those who intend to do harm

 

Nuclear Attacks:

Since the Atom bombs were dropped on Nagasaki and Hiroshima in 1945, no other country has used a Nuclear weapon in an act of warfare. In order to produce a nuclear weapon, a significant amount of weapons-grade plutonium needs to be acquired. It is plausible that a terrorist cell or individual could purchase a ready-made nuclear weapon from a third party

 

Acid Attacks:

Although not commonly used by terrorists, acid attacks can be used against individuals or groups of people. Sulphuric acid is very strong and can cause major injuries and permanent damage to victims

 

Cyberterrorism:

This refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. For example, hacking into computer systems, introducing viruses to vulnerable networks, website defacing, Denial-of-service attacks, or terroristic threats made via electronic communication

 

Insider threats:

A person who exploits, or has the intention to exploit, their legitimate access to an organisation's assets for unauthorised purposes.

 

This includes insider knowledge of:

  • Access and egress procedures
  • Access to sensitive information
  • Access to computer systems and networks etc
  • Evacuation and assembly points

 

Actions To Take in the Event of a Terrorist Attack:

Vigilant Security personnel who are confident in recognising and reporting suspicious behaviour may not only provide early warning of an attack but may even deter an attack that is still in the early planning stages.

 

If an attack is underway then Security Operatives must act quickly to limit the risks to all concerned, this would include early reporting and also following the government's guidelines of RUN, HIDE, TELL:

 

  • Run: Move yourself and guide others as swiftly and as safely as possible away from the danger
  • Hide: Once secured make sure that all members of the public as well as the team remain out of sight of the attackers
  • Tell: Cal 999 or your control room as soon as possible and give as much information as is possible to the police operator, this should include things like:
  • The number of attackers involved
  • The last known location of the attackers
  • What weapons they appear to be carrying/nature of the attack
  • Known number of casualties
  • Your location and situation

 

Company and Venue Policies Regarding Terrorist Attacks:

As members of front-line security, it is vital that Security Operatives are well versed and understand the policies and plans in place in the event of an attack. People will look to the security team to help and lead them during these events. Knowing these procedures will be vital in both the security operative's as well as other staff members and customers overall safety.

 

Evacuation procedures may be different from fire evacuation procedures. Use your local knowledge of the area to help make dynamic decisions based the information available to keep yourself, your colleagues and customers safe

 

The Pros and Cons of Invacuation vs Evacuation:

  • Invacuation - Moving customers inside a building for safety reasons
  • Evacuation - Removing customers from a building

 

When evacuating personnel out of a building for a fire this can lead them to safety, however it can also lead to people rushing, falling and suffering from injuries as a result.

 

When invacuating personnel into a building that can lead them out of immediate danger, however the risk here is that people are then crowded together and could be an easy target for an attacker

 

Reporting Terrorist incidents to the Police (999):

On contacting the Police, the following information should be passed across:

  • What you have seen
  • What has happened
  • Who you saw
  • What they looked like (Ethnicity, gender, height, build, clothing, etc)
  • Where the situation happened
  • Where you are
  • When did it happen

 

Be aware of the expected emergency services response times

 

For non-emergency activity:

The telephone number to report suspicious activity to is the Anti-terrorism hotline: 0800 789 321

This phone line is available 24/7 and is manned by specialist officers who take all reports seriously. There are also online tools that most police services offer that can be used to report activity as well.

 

Public Sector Counter Terrorist Experts:

  • Centre for the protection of National Infrastructure (CPNI): Are leaders in security, providing resources, guidance and expert advice to help protect and keep businesses secure from external threats.

 

  • The National Counter Terrorism Security Office (NaCTSO): is a police unit that supports the 'protect and prepare' strands of the government's counter terrorism strategy. They work directly with the Home Office.

 

Current Initiatives:

  • ACT: Action Counters Terrorism is a government and police initiative that encourages the public to report anything that they believe to be suspicious to the police. There is a business App available as well as a free online course that all Security Personnel should all complete.

 

  • See Check and Notify (SCaN): is designed to help businesses and organisations maximise their safety using their existing resources, this includes training staff to look for things such as criminal activity, unlawful protest and terrorism

   

Procedures when dealing with Suspicious Items:

 

Remember HOT Principles:

  • Hidden - does the item appear to be hidden
  • Obviously Suspicious - does the item have visible wires or other signs that look like it could be an explosive device
  • Typical - Is the object typical of the workplace or does it look out of place

 

Remember the 4 C's:

  • Confirm - Confirm that the package or bag doesn't belong to anyone nearby
  • Clear - Get people away from the area
  • Communicate - calmly communicate with customers and staff or police
  • Control Safety Distance - Make sure to set a cordon a safe distance away

 

Distancing vs Object size:

  • Suspected device in a Rucksack or bag - No closer than 100 m
  • Suspected device in a small Vehicle - No closer than 200 m
  • Suspected device in a large Vehicle - No closer than 400 m

 

In order to better visualise the distances, remember that 100 meters is roughly equivalent to the length of a football pitch

 

Important: Do not use radios or mobile phones within 15 meters of the suspected device

 

Signs of suspicious behaviour:

Any observed behaviour that could indicate signs of terrorism or terror related crime

 

Hostile reconnaissance is the observing of people, places, vehicles and locations with the intention of gathering information to plan a hostile act.


This could include any of the following:

  • Loitering
  • Individuals taking an interest in the security of the site
  • Making unusual requests for information
  • Testing the security team’s response by breaching restricted areas
  • Tampering with utilities
  • Individuals trying to avoid security staff
  • Individuals carrying out activities inconsistent with the nature of the building or environment
  • Forged documents or ID's
  • Inappropriately dressed for the season
  • Taking photographs or drawing diagrams of the site
  • Parked vehicles or unattended vehicles left for long periods of time
  • Multiple sightings of the same person, vehicle or activity over a period of time

 

Actions that can deter or disrupt hostile reconnaissance:

  • Ensuring visible presence of vigilant security personnel
  • Frequent patrols that are done at irregular intervals
  • Maintaining good search procedures
  • Good access and egress procedures
  • Secure emergency exits when not in use to prevent unauthorised entry

 

How to respond to suspicious behaviour:

  • Use customer service skills to disrupt potential hostile reconnaissance (example: approaching a person taking photographs of the site and asking them if they are ok or need any assistance with anything)
  • Using positive and professional behaviour to act as a deterrent
  • Having visible security including CCTV cameras as well as security operatives on site

 

Report all suspicious activity:

  • Follow your internal procedures
  • Contact the anti-terrorism hotline (0800 789 321)
  • British Transport Police (BTP) 0800 40 50 40 or text 61016
  • Non-Emergency 101
  • Active Counters Terrorism (ACT) report form

 

In a life-threatening emergency always dial 999

Share by: