Terrorism is the use or threat of action, both in and outside of the UK, designed to influence any international government organisation or to intimidate the public. It must also be for the purpose of advancing a political, religious, racial or ideological cause.
Terrorism Threat Levels:
The official source of UK Threat Level is (MI5) and their website is https://www.mi5.gov.uk/threat-levels.
As well as knowing what each level means an operative would ideally need to know how it may impact the response level their location may have.
Security operatives need to understand how the current terrorist threat level will affect them at their own place of work, this should be outlined in their assignment instructions.
Attack Planning Phases:
Current Terrorist Attack Methodologies:
MTA - Marauding Terror Attack
This type of attack could use firearms, knives, sharp objects or blunt objects while on foot to attack people in the area
Types of Explosive Devices commonly used in attacks:
VAAW - Vehicle Attacks:
More often vehicles can be used as a weapon. This can be known as VAAW. Vehicles are used to target crowds and ram into people to cause severe damage
Chemical Attacks:
Chemical warfare was widely used in World War One which resulted in many deaths including those of civilians as there was little way to control where the chemicals travelled once they were deployed. After the war most countries agreed not to use chemical or biological weapons in future conflicts. However, terrorists can manufacture weapons using many products available over the shelf and use these against the wider population
Biological Attacks:
Bioterrorism is the use of biological agents to cause illness or death in humans, plants or animals. They can be made using viruses, fungi, toxins or bacteria. These could be naturally occurring or man-made or man manipulated. They can be spread through water supplies, through the air, through food or through contaminated surfaces
Radiological Attacks:
Commonly known as a "Dirty Bomb", these types of devices are designed to spread radioactive material across a wide area with the intent to do harm. Radioactive materials are used in a lot of different industries including in medicine and research laboratories but can also be acquired by those who intend to do harm
Nuclear Attacks:
Since the Atom bombs were dropped on Nagasaki and Hiroshima in 1945, no other country has used a Nuclear weapon in an act of warfare. In order to produce a nuclear weapon, a significant amount of weapons-grade plutonium needs to be acquired. It is plausible that a terrorist cell or individual could purchase a ready-made nuclear weapon from a third party
Acid Attacks:
Although not commonly used by terrorists, acid attacks can be used against individuals or groups of people. Sulphuric acid is very strong and can cause major injuries and permanent damage to victims
Cyberterrorism:
This refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. For example, hacking into computer systems, introducing viruses to vulnerable networks, website defacing, Denial-of-service attacks, or terroristic threats made via electronic communication
Insider threats:
A person who exploits, or has the intention to exploit, their legitimate access to an organisation's assets for unauthorised purposes.
This includes insider knowledge of:
Actions To Take in the Event of a Terrorist Attack:
Vigilant Security personnel who are confident in recognising and reporting suspicious behaviour may not only provide early warning of an attack but may even deter an attack that is still in the early planning stages.
If an attack is underway then Security Operatives must act quickly to limit the risks to all concerned, this would include early reporting and also following the government's guidelines of RUN, HIDE, TELL:
Company and Venue Policies Regarding Terrorist Attacks:
As members of front-line security, it is vital that Security Operatives are well versed and understand the policies and plans in place in the event of an attack. People will look to the security team to help and lead them during these events. Knowing these procedures will be vital in both the security operative's as well as other staff members and customers overall safety.
Evacuation procedures may be different from fire evacuation procedures. Use your local knowledge of the area to help make dynamic decisions based the information available to keep yourself, your colleagues and customers safe
The Pros and Cons of Invacuation vs Evacuation:
When evacuating personnel out of a building for a fire this can lead them to safety, however it can also lead to people rushing, falling and suffering from injuries as a result.
When invacuating personnel into a building that can lead them out of immediate danger, however the risk here is that people are then crowded together and could be an easy target for an attacker
Reporting Terrorist incidents to the Police (999):
On contacting the Police, the following information should be passed across:
Be aware of the expected emergency services response times
For non-emergency activity:
The telephone number to report suspicious activity to is the Anti-terrorism hotline: 0800 789 321
This phone line is available 24/7 and is manned by specialist officers who take all reports seriously. There are also online tools that most police services offer that can be used to report activity as well.
Public Sector Counter Terrorist Experts:
Current Initiatives:
Procedures when dealing with Suspicious Items:
Remember HOT Principles:
Remember the 4 C's:
Distancing vs Object size:
In order to better visualise the distances, remember that 100 meters is roughly equivalent to the length of a football pitch
Important: Do not use radios or mobile phones within 15 meters of the suspected device
Signs of suspicious behaviour:
Any observed behaviour that could indicate signs of terrorism or terror related crime
Hostile reconnaissance is the observing of people, places, vehicles and locations with the intention of gathering information to plan a hostile act.
This could include any of the following:
Actions that can deter or disrupt hostile reconnaissance:
How to respond to suspicious behaviour:
Report all suspicious activity:
In a life-threatening emergency always dial 999