NaCTSO CT Protective Security Advice For Higher Education
NaCTSO CT Protective Security Advice For Higher Education
NaCTSO CT Protective Security Advice For Higher Education
Security Advice
for Higher and Further Education
produced by
“Copyright in this guide is (except where expressly stated held by third parties) vested in the Association
of Chief Police Officers of England and Wales and Northern Ireland, but ACPO recognises that recipients
may want to reproduce some or all of the guide for the purpose of informing, training or otherwise
assisting their staff, customers, contractors, tenants and others with whom they deal in running their
operations. ACPO therefore grants, to all in receipt of this guide, a royalty-free non-exclusive non-
sublicensable right to reproduce all or any part of it provided that each of the following conditions is
met: (1) the National Counter-Terrorism Security Office (NaCTSO) must be consulted before any
reproduction takes place; (2) reproduction must be for the purpose set out above and for no other
purpose; (3) no part of this guide may appear as or in any advertisement or other promotional material;
(4) no charge may be made to any person receiving any reproduced material; (5) no alteration may be
made in the course of reproduction save for alteration to font, font size or formatting; and (6) the
reproduced material must be accompanied by a statement clearly acknowledging ACPO as the source of
the material.”
foreword
This guidance has been developed to assist the higher and further education sectors in addressing the
security issues relating to terrorist attacks. It is the product of discussions and sharing of best practice
involving the National Counter Terrorism Security Office together with representatives from UK
universities and colleges.
Our Higher and Further institutions should be places where all students and staff are safe and secure
and able to foster a culture of shared values and open debate to cohere the rightly celebrated diversity
of the sector. But there is a realand serious threat of terrorist attacks in the UK and terrorism can come in
many forms, not just a physical attack on life and limb. It can include interference with vital information
or communication systems, causing disruption and economic damage.
The law requires institutions to carry out adequate risk assessments and ensure that suitable measures are
in place to manage identified risks. Institutions should conduct prompt and regular reviews of those
assessments and measures in light of new threats and developments at the institution and the
surrounding area.
Equally important is that business continuity plans address security issues to ensure that institutions can
cope with an incident or attack and return to 'business as usual' as soon as possible.
Having a robust security culture and being better prepared reassures your whole community that you
are taking security issues seriously.
Heads of institutions should bring this guidance to the attention of all relevant staff. These are likely to
include Security, Estates, Facilities, Health & Safety and HR Managers.
Although each institution will have its own particular circumstances, the guidance addresses all of the areas
of concern for educational establishments and includes a number of useful Good Practice checklists.
NaCTSO
National Counter Terrorism Security Office
The National Counter Terrorism Security Office (NaCTSO), on behalf of the Association of Chief
Police Officers, Terrorism and Allied Matters (ACPO TAM), works in partnership with MI5 - The
Security Service to reduce the impact of terrorism in the United Kingdom by:
• Protecting the UK’s most vulnerable and valuable sites and assets.
• Enhancing the UK’s resilience to terrorist attack.
• Delivering protective security advice across the crowded places sectors.
NaCTSO aims to:
• Raise awareness of the terrorist threat and the measures that can be taken to reduce risks and
mitigate the effects of an attack.
• Co-ordinate national service delivery of protective security advice through the Counter Terrorism
Security Advisor (CTSA) network and monitor its effectiveness.
• Build and extend partnerships with communities, police and government stakeholders.
• Contribute to the development of Counter Terrorism policy and advice.
1
2
contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Security Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4. Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
5. Good Housekeeping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6. Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
7. CCTV Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
9. Search Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Useful Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
3
4
one introduction
This guide is intended to give protective security advice to those who are responsible for the
security of higher and further education institutions, irrespective of size and location. It
highlights the part institutions can play in the UK counter terrorism strategy, and how by
mitigating the risk you can allow teaching, learning, research, knowledge transfer, community
engagement and enterprise to continue as normal.
Terrorist attacks in the UK are a real and serious danger. The terrorist incidents in the
Haymarket, London and at Glasgow Airport in June 2007 indicate that terrorists
continue to target crowded places; largely because they are usually locations with
limited protective security measures and therefore afford the potential for mass
fatalities and casualties. Furthermore, these two particular incidents identify that
terrorists are prepared to use vehicles as a method of delivery and will attack sites
well away from London.
Terrorism can come in many forms, not just a physical attack on life and limb. It can include
interference with vital information or communication systems, causing disruption and
economic damage. Some attacks are easier to carry out if the terrorist is assisted by an
'insider' or by someone with specialist knowledge or access. Terrorism also includes threats or
hoaxes designed to frighten and intimidate
It is possible that institutions could be the target of a terrorist incident. This might
include having to deal with a bomb threat or with suspect items left in or around
the establishment.
In the worst case scenario staff and students could be killed or injured, and the premises
destroyed or damaged in a 'no warning', multiple and coordinated terrorist attack.
Of course there is a need to make education institutions as accessible as possible and to
ensure there is a welcoming environment. This guide is accordingly not intended to create a
'fortress mentality'. There is however a balance to be achieved where those accountable for
security are assured that there are robust protective security measures available to mitigate
against the threat of terrorism.
5
• Co-operate and co-ordinate safety arrangements between owners, managers, security
staff, tenants and others involved on site, including the sharing of incident plans and
working together in testing, auditing and improving planning and response
• Ensure adequate training, information and equipment are provided to all staff, and
especially to those involved directly on the safety and security side
• Put proper procedures and competent staff in place to deal with imminent and serious
danger and evacuation.
The need to focus on proper preparation and prevention to guard against criminal prosecution
for safety and security lapses has sharpened with the introduction of legislation which gives the
courts power to send individual directors, managers and others to jail for up to 2 years for a
breach of health and safety duties. Previous legislation provided only for a fine.
See Corporate Manslaughter Act 2008 and Corporate Homicide Act 2007.
Insurance against the full cost of damage to your own commercial buildings from terrorist
acts is becoming harder to find in some sectors at an affordable premium. Adequate cover
for loss of revenue and business interruption during a rebuild or decontamination is expensive
even where available from the limited pool of specialist underwriters. Full protection against
compensation claims for death and injury to staff and customers caused by terrorism is
achievable, albeit at a cost.
With individual awards for death and serious injury commonly exceeding the publicly-
funded criminal injuries compensation scheme upper limit, there is every incentive for
victims to seek to make up any shortfall through direct legal action against owners,
operators, managers and tenants under occupiers liability laws. Having to pay large and
numerous compensation claims out of your own uninsured pocket could have a high
impact on your institution.
If your institution is not already involved, you should consider the Pool Re insurance scheme
www.poolre.co.uk The Pool Re scheme has been set up by the insurance industry in co
operation with the UK government so that insurers can continue to cover losses resulting
from damage caused by acts of terrorism to commercial property in Great Britain.
6
Emergency and business continuity planning
A business continuity strategy is essential in ensuring that institutions can simultaneously
respond to an incident and return to 'business as usual' as soon as possible. You should
also develop an emergency response plan, which can be implemented to cover a wide range
of possible situations.
The British Standards Institution (BSI) BS25999 (Business Continuity
Management Standard has now been superceeded by ISO 22301.
See www.bsigroup.com
Emergencies - Planning for and Managing: A good practice guide for Higher Education
Institutions - This publication is available from The Association of University Chief Security
Officers www.ausco.org.uk
It is essential that all the work you undertake on protective security is undertaken in
partnership with the police, other authorities such as the land owners and trustee's as
appropriate as well as your neighbours, if your premises are to be secure.
It is worth remembering that measures you may consider for countering terrorism will also
help against other threats, such as theft and criminal damage. Any extra measures that are
considered should integrate wherever possible with existing security.
7
8
With regard to protective security, the best way to manage the risks to your institution is to
start by understanding and identifying the threats to it, and its vulnerability to those threats.
This will help you to decide:
• What security improvements you need to make
• What type of plans you need to develop.
For some aspects of institutional security, simple good practice - coupled with vigilance and
well exercised plans - may be all that is needed.
If, however, you identify areas of vulnerability, you should apply appropriate protective
security measures to reduce the risk to as low as reasonably practicable.
The following diagram illustrates a typical risk management cycle:
1. Identify
the threats
4. Review your
security RISK 2. Establish
what you want
measures and MANAGEMENT to protect and
rehearse/
review your CYCLE your
security plans vulnerabilities
3. Identify
measures
to reduce risk
(security
improvements/
security plans)
• Is there anything about the location of your establishment, its visitors, sponsors,
contractors, occupiers, students and staff, or your activities that would particularly
attract a terrorist attack?
9
• Is there an association with high profile individuals or organisations which might be
terrorist targets?
• Do you have procedures in place and available for deployment on occasions when VIPs
attend your institution?
• Could collateral damage occur from an attack on, or other incident to a high risk
neighbour?
• What can your local Police Service tell you about crime and other problems in the area
of the institution?
• Is there any aspect of your courses, research, events or activities that terrorists might
wish to exploit to aid their work, e.g. plans, technical expertise or unauthorised access?
• Do you communicate information about the threat and response levels to your staff?
Step Two: Decide what you need to protect and identify your
vulnerabilities.
Your priorities for protection should fall under the following categories:
• People (staff, students, contractors and visitors)
• Physical assets (buildings, contents, equipment, plans and sensitive materials)
• Information (electronic and paper data)
• Processes (supply chains, critical procedures) - the actual operational process and
You know what is important to your institution. You should already have plans in place for
dealing with fire and crime, procedures for assessing the integrity of those you employ or
contract, protection from IT viruses and hackers, and measures to secure the estate.
Consider what others could find out about your vulnerabilities, such as:
• Information about you that is publicly available, e.g. on the internet or in public
documents.
business.
• Any prestige targets that may be attractive to terrorists, regardless of whether their loss
would result in business collapse.
You should have measures in place to limit access into service areas and vehicle access control
measures into goods and service area.
As with Step One, consider whether there is an aspect of your institution that terrorists might
want to exploit to aid or finance their work. If there is, how stringent are your checks on the
people you recruit or on your contract personnel? Are your staff security conscious?
It is important that your staff can identify and know how to report suspicious activity. (See
hostile reconnaissance on page 51).
10
Step Three: Identify measures to reduce risk
An integrated approach to security is essential. This involves thinking about physical security,
information security and personnel security (i.e. good recruitment and employment practices).
There is little point investing in costly security measures if they can be easily undermined by a
disaffected member of staff or by a lax recruitment process.
Remember, TERRORISM IS A CRIME. Many of the security precautions typically used to
deter criminals are also effective against terrorists. So before you invest in additional security
measures, review what you already have in place. You may already have a good security
regime on which you can build.
If you need additional security measures, then make them most cost-effective by careful
planning wherever possible. If you are using an area or premises normally used for another
purpose, work with the occupiers to produce an integrated security package. Even if
organisations / businesses surrounding your institution are not concerned about terrorist
attacks, they will be concerned about general crime - and your security measures will help
protect against crime as well as terrorism.
Staff may be unaware of existing security measures, or may have developed habits to
circumvent them, e.g. short cuts through fire exits. Simply reinstating good basic security
practices and regularly reviewing them will bring benefits at negligible cost.
11
12
For many higher education (HE) and further education (FE) institutions the responsibility for
the implementation of protective security measures following a threat and risk assessment
will fall on a dedicated member of the security or estates management team. This person
must have sufficient authority to direct the action taken in response to a security threat.
The security plan is part of a wider security strategy also comprising but not mutually
exclusive to business continuity, intelligence/reconnaissance and emergency management.
He or she must be involved in the planning perimeter security, access control, contingency
plans etc, so that the terrorist dimension is taken into account. The Security Manager must
similarly be consulted over any temporary construction so that counter terrorism
specifications, e.g. concerning glazing and physical barriers can be factored in, taking into
account any planning and safety regulations.
The Security or Facilities Manager should already have responsibility for most if not
all of the following key areas:
• The production of the security plan based on the risk assessment
• The formulation and maintenance of a search plan
• The formulation and maintenance of other contingency plans dealing with bomb
• Liaising with the police, other emergency services and local authorities
• Arranging staff training, including his/her own deputies and conducting
briefings/debriefings
13
When creating your security plan, consider the following:
• Details of all the protective security measures to be implemented, covering physical,
information and personnel securit
• Instructions on briefing content to security staff including type of behaviour to look for
and methods of reporting
• Instructions on how to respond to a threat (e.g. telephone bomb threat)
• Instructions on how to respond to the discovery of a suspicious item or event
• A search plan
• Evacuation plans and details on securing the institution in the event of a full evacuation
• Your business continuity plan
• A communications and media strategy which includes handling enquiries from
• Emergencies - Planning for and Managing: A good practice guide for Higher Education
Institutions - The Association of University Chief Security Officers www.aucso.org.uk
also available from www.ucea.ac.uk
Your planning should incorporate the seven key instructions applicable to most
incidents:
1. Do not touch suspicious items
2. Move everyone away to a safe location
3. Prevent others from approaching
4. Communicate safely to staff, students, visitors and the public
5. Use hand-held radios or mobile phones away from the immediate vicinity of a
suspect item, remaining out of line of sight and behind hard cover
6. Notify the police
7. Ensure that whoever found the item or witnessed the incident remains on hand
to brief the police.
Effective security plans are simple, clear and flexible, but must be compatible with any
existing plans, e.g. evacuation plans and fire safety strategies. Everyone must be clear about
what they need to do in a particular incident. Once made, your plans must be followed.
14
four physical security
When considering a new building project, consult your local police force Architectural Liaison
Officer (ALO), who will provide normal physical security advice. Your CTSA, however, will
provide specific counter terrorism advice in conjunction with your ALO if such advice is
required.
Remember, you will need to ensure that all necessary regulations are met, such as Local
Authority permissions, health and safety and fire prevention requirements.
Plan carefully - as this can help keep costs down. Whilst it is important not to delay the
introduction of necessary equipment or procedures, costs may be reduced if the premises or
location you are using already has the necessary security which can be easily integrated
within your own plan.
Security awareness
The vigilance of all staff and contractors is essential to your protective measures. They will
know their own work areas very well and should be encouraged to be alert to unusual
behaviour or items out of place.
They must have the confidence to report any suspicions, knowing that reports - including
false alarms - will be taken seriously and regarded as a contribution to the safe running of
the institution.
15
Training is therefore particularly important. Staff should be briefed to look out for packages,
bags or other items in odd places, carefully placed (rather than dropped) items in rubbish bins
and unusual interest shown by strangers in less accessible places. See hostile reconnaissance
on page 51. Training in emergency response plans should also be included in staff inductions.
Access control
Keep access points to a minimum and make sure the boundary between public and private
areas is secure and clearly signed. Ensure there are appropriately trained and briefed security
personnel to manage access control points or alternatively invest in good quality access
control systems, especially in restricted access areas. See High Profile Events on page 55.
Security passes
If an access control system is in place, insist that staff and students wear their passes at all
times and that the issuing is strictly controlled and regularly reviewed. Passes should include a
photograph of the bearer. Visitors to private or restricted areas should be escorted and should
wear clearly marked temporary passes, which must be returned on leaving. Anyone not
displaying security passes in private or restricted areas should either be challenged or reported
immediately to security or management.
16
As a minimum accessible windows should be secured with good quality key operated
locks. The police may provide further advice on improving the security of glazed doors
and accessible windows.
• Many casualties in urban terrorist attacks are caused by flying glass, especially in modern
buildings and glazing protection is an important casualty reduction measure.
• Extensive research has been carried out on the effects of blast on glass. There are
technologies that minimise shattering and casualties, as well as the costs of re-
occupation.
• Anti-shatter film, which holds fragmented pieces of glass together, offers a relatively
cheap and rapid improvement to existing glazing. If you are installing new windows,
consider laminated glass, but before undertaking any improvements seek specialist advice
through your police CTSA or visit www.cpni.gov.uk
Perimeter
The style and quality of perimeter security will depend on the risks and vulnerabilities
identified in your security assessment. If any searching of persons or vehicles has taken place
then a robust perimeter must be maintained in order to have full confidence in the security
regime applied.
Temporary fencing will require supporting processes such as patrol, CCTV coverage and
alarms to ensure reduction in risk. Equally, any temporary fencing must adhere to health &
safety legislation and fire regulations, remembering safety must always have priority over
security.
Using CCTV can help clarify whether a security alert is real and is often vital in post-incident
investigations, but only if the images are good enough to identify what happened and be
used in court.
External lighting provides an obvious means of deterrence as well as detection, but take into
account the impact of additional lighting on your neighbours. If it is carefully designed and
used, external lighting will help security staff and improve the capabilities of CCTV systems.
Remember that CCTV is only effective if it is properly monitored, maintained and can
provide an active response.
See CCTV guidance on page 23.
17
18
19
Additionally consider the following points:
Staff are trained in bomb threat handling procedures or at least have ready access to
instructions - and know where these are kept. (See bomb threat checklist)
If you have CCTV, review your system to ensure it has sufficient coverage both internally
and externally.
Fire extinguishers should be appropriately marked and authorised for the locations in
which they will be kept. Regular checks should be made to ensure that they have not been
interfered with or replaced.
Security management should identify a secondary secure location for a control room (if
they have one) as part of their normal contingency plans.
All safety and security systems should have an uninterrupted power supply (UPS) available
which is regularly tested if it is identified that power loss would impact on the safety of the
public.
See good practice checklist - housekeeping in Appendix 'B'.
20
six access control
Any lack of vigilance around pedestrian and vehicle entrances to your institution
and queues forming outside your buildings affords anonymity to a potential
terrorist. Security staff should be a visible presence and should be briefed on what
to look for and how to deal with it.
There should be clear demarcation between public and private areas, with appropriate access
control measures into and out of the private areas. This relates to private areas within the
institution, not public entrances.
Risk assessment
Refer to 'managing the risks' on page 9 and decide the level of security you require before
planning your access control system. Take into account any special features you may require.
Appearance
The access control system to your private or restricted areas and service yards is often the first
impression of security made upon persons visiting your premises.
Ease of access
Examine the layout of your system. Ensure that your entry and exit procedures allow
legitimate users to pass without undue effort and delay.
Ideally, adopt a photo ID card access control system which varies in appearance for the
different levels of access across the site. Security staff should be instructed what to examine
when checking passes and this should be quality assured through testing.
Training
Ensure your staff are fully aware of the role and operation of your access control system. Your
installer should provide adequate system training.
System maintenance
Your installer should supply all relevant system documentation, e.g. log books and service
schedules. Are you aware of the actions required on system breakdown? Do you have a
satisfactory system maintenance agreement in place? Is there a contingency plan you can
implement at a moment's notice?
Interaction
Your access control system should support other security measures. Consider system
compatibility between access control, alarms, CCTV and text alert systems
Compliance
Your access control system should be compliant with:
• Equality Act 2010
• The Data Protection Act 1998
• The Human Rights Act 1998
• Regulatory Reform (Fire Safety) Order 2005
• Health and Safety Acts
• The Fire (Scotland) Act 2005
21
Access control is only one important element of your overall security system.
REMEMBER
Whether driving a lorry or carrying explosives, a terrorist needs physical access in
order to reach the intended target.
22
seven cctv guidance
If you contract in CCTV operators they must be licensed by the Security Industry Authority
if the CCTV equipment is deployed into fixed positions or has a pan, tilt and zoom
capability and where operators:
• Cover all the entrances and exits to your premises and other areas that are critical to
• Proactively monitor the activities of members of the public whether they are in public
areas or on private property.
• Use cameras to focus on the activities of particular people either by controlling or
Since 20 March 2006, contract CCTV operators must carry an SIA CCTV (Public Space
Surveillance) license - it is illegal to work without one. Your security contractor should be
aware of this and you should ensure that only licensed staff are supplied.
See www.sia.homeoffice.gov.uk
With more organisations moving towards digital CCTV systems, you should liaise with your
local police to establish that your system software is compatible with theirs to allow retrieval
and use of your images for evidential purposes.
23
• Would the introduction of an Automatic Number Plate Reader (ANPR) system
The Centre for Applied Science and Technology (CAST) formerly known as The Home Office
Scientific Development Branch (HOSDB), has published many useful documents relating to
CCTV, including ‘CCTV Operational Requirements Manual’ (Ref: 28/09), ‘UK Police
Requirements for Digital CCTV Systems’ (Ref: 09/05), and ‘Performance Testing of CCTV
Systems’ (Ref: 14/95).
• Ensure that appropriate lighting complements the system during daytime and darkness
hours.
• Use good quality media and check it regularly by checking that backups are
operating correctly.
• Ensure the images recorded are clear – that people and vehicles are clearly
identifiable.
• Check that the images captured are of the right area.
• Implement standard operating procedures, codes of practice, audit trails and signage.
• Give consideration to the number of camera images a single CCTV operator can
effectively monitor at any one time.
• Do you have sufficient qualified staff to continue to monitor your CCTV system during
an incident, evacuation or search?
See Good Practice Checklist - CCTV in Appendix 'D'
Please remember, a monitored CCTV system is only as effective as the response
capability.
CCTV Maintenance
CCTV maintenance must be planned and organised in advance and not carried out on an
ad hoc basis. If regular maintenance is not carried out, the system may eventually fail to
meet its operational Requirement (OR).
What occurs if a system is not maintained?
• The system gets DIRTY causing poor usability
• CONSUMABLES wear causing poor performance
• Major parts FAIL
• WEATHER damage can cause incorrect coverage
• DELIBERATE damage/environmental changes can go undetected
24
eight small deliveries by courier and
mail handling
Institutions often receive a wide variety of deliveries. This offers an attractive route
into premises for terrorists.
You should consider the need for a screening process at their mail handling site,
whether at a temporary or permanent structure and consider the following:
Delivered Items
Delivered items, which include letters, parcels, packages and anything delivered by post or
courier, has been a commonly used terrorist device. A properly conducted risk assessment
should give you a good idea of the likely threat to your institution and indicate precautions
you need to take. See www.cpni.gov.uk
Delivered items may be explosive or incendiary (the two most likely kinds), or chemical,
biological or radiological. Anyone receiving a suspicious delivery is unlikely to know which
type it is, so procedures should cater for every eventuality.
Delivered items come in a variety of shapes and sizes; a well made one will look innocuous
but there may be telltale signs.
25
If a suspicious item is identified, follow these key steps:
1. Do not touch suspicious items.
2. Move everyone away to a safe distance.
3. Prevent others from approaching.
4. Communicate safely to staff, students and the public.
5. Use hand-held radios or mobile phones away from the immediate vicinity of a
suspect item, remaining out of line of sight and behind hard cover.
6. Notify the police.
7. Ensure that whoever found the item or witnessed the incident remains on
26
• Examine the feasibility of emergency shutdown of air-handling systems and ensure that
any such plans are well rehearsed.
• Where a hazard can be isolated by leaving the immediate area, do so as quickly as
possible, closing doors and windows as you go.
• Move those directly affected by an incident to a safe location as close as possible to the
scene of the incident, so as to minimise spread of contamination.
• Separate those directly affected by an incident from those not involved so as to
minimisethe risk of inadvertent cross-contamination.
• Ask people to remain in situ - though you cannot contain them against their will.
You do not need to make any special arrangements beyond normal first aid provision. The
emergency services will take responsibility for treatment of casualties.
27
• Consider whether staff handling post need protective equipment such as latex gloves
and facemasks (seek advice from a qualified health and safety expert). Keep overalls and
footwear available in case they need to remove contaminated clothing.
• Make certain post opening areas can be promptly evacuated. Rehearse evacuation
procedures and routes, which should include washing facilities in which contaminated
staff could be isolated and treated.
• Staff who are responsible for mail handling should be made aware of the importance of
isolation in reducing contamination.
• Prepare signs for display to staff in the event of a suspected or actual attack.
28
nine search planning
Consider searches as part of your daily good housekeeping routine. They should also be
conducted in response to a specific threat and when there is a heightened response level.
As previously mentioned under Security Planning, it is recognised that for the majority of
institutions responsibility for the implementation of any search planning, following a
vulnerability and risk assessment, will fall upon the Security Manager.
The following advice is generic for most institutions, but recognises that they operate
differently. If considered necessary, advice and guidance on searching should be available
through your local Police Security Co-ordinator (SecCo) if appointed, CTSA or Police
Search Advisor (PolSA).
Search Plans
• Search plans should be prepared in advance and staff should be trained in them.
• The conduct of searches will depend on local circumstances and local knowledge, but
the overall objective is to make sure that the entire area, including grounds, are
searched in a systematic and thorough manner so that no part is left unchecked.
• If you decide to evacuate in response to an incident or threat, you will also need to
search it in order to ensure it is safe for re-occupancy.
• The police will not normally search premises. (See High Profile Events page 55). They are
not familiar with the layout and will not be aware of what should be there and what is
out of place. They cannot, therefore, search as quickly or as thoroughly as a member of
staff or on site security personnel.
• The member(s) of staff nominated to carry out the search do not need to have expertise
in explosives or other types of device. But they must be familiar with the place they are
searching. They are looking for any items that should not be there, that cannot be
accounted for and items that are out of place.
• Ideally, searchers should search in pairs; to ensure searching is systematic and thorough.
29
Your planning should incorporate the seven key instructions applicable to most
incidents:
1. Do not touch suspicious items.
2. Move everyone away to a safe distance.
3. Prevent others from approaching.
4. Communicate safely to staff, visitors and the public.
5. Use hand-held radios or mobile phones away from the immediate vicinity of a
suspect item, remaining out of line of sight and behind hard cover.
6. Notify the police.
7. Ensure that whoever found the item or witnessed the incident remains on
hand to brief the police.
Exercise your search plan regularly. The searchers need to get a feel for the logical progression
through their designated area and the length of time this will take. They also need to be able
to search without unduly alarming any visitors.
Searching visitors and their belongings is an element of protective security that should be
considered. Some institutions routinely search visitors and their belongings, others carry out
random searches.
Discuss your search plan with your CTSA.
See good practice checklist - Searching in Appendix 'E'
30
ten evacuation planning
As with search planning, evacuation should be part of your security plan. You might need to
evacuate your institution because of:
• A threat received directly to the institution management.
• A threat received elsewhere and passed on to you by the police.
• Discovery of a suspicious item (perhaps a postal package, an unclaimed hold-all or
rucksack).
• Discovery of a suspicious item or vehicle outside the establishment.
• An incident to which the police have alerted you.
Whatever the circumstances, you should tell the police as soon as possible what
action you are taking.
The biggest dilemma facing anyone responsible for an evacuation plan is how to judge where
the safest place might be. For example, if an evacuation route takes people past a suspect
device outside your building, or through an area believed to be contaminated, external
evacuation may not be the best course of action.
A very important consideration when planning evacuation routes in response to
near simultaneous terrorist attacks is to ensure people are moved away from other
potential areas of vulnerability, or areas where a larger secondary device could
detonate.
The decision to evacuate will normally be yours, but the police will advise. In exceptional
cases they may insist on evacuation, although they should always do so in consultation with
your Security Manager.
A general rule of thumb is to find out if the device is external or internal to any premises or
buidlings. If it is within a building you may consider evacuation, but if the device is outside
the building it may be safer to stay inside.
Planning and initiating evacuation should be the responsibility of the Security Manager.
Depending on the size of your institution and the location of the building, the plan may
include:
• Full evacuation outside the premises or building.
• Evacuation of part of the premises or building, if the device is small and thought to be
confined to one location (e.g. a small bag found in an area easily contained).
• Full or partial evacuation to an internal safe area, such as a protected space, if available.
• Evacuation of all staff apart from designated searchers.
Evacuation
Evacuation instructions must be clearly communicated to staff and routes and exits must be
well defined. Appoint people to act as marshals and as contacts once the assembly area is
reached. Assembly areas should be a minium of 100, 200 or 400metres away dependant upon
the size of the item. Care should be taken that there are no secondary hazards at the assembly
point.
31
It is important to ensure that staff are aware of the locations of assembly areas for incident
evacuation as well as those for fire evacuation and that the two are not confused by those
responsible for directing members of the public to either.
'Grab Bags' should be available in key locations, which contain essential equipment and
information. All relevant contact information, the staff involved, tenants and other site
information should be contained in an easily accessible format.
For suggested 'Grab Bag' contents please refer to check list on page 70.
Car parks should not be used as assembly areas and furthermore assembly areas
should always be searched before they are utilised.
Staff, students and visitors with disabilities should be individually briefed on their
evacuation procedures, and liaise with the institution to develop their own Personal
Emergency Evacuation Plans (PEEPS).
Letter or parcel bombs
If in a premises evacuate the room and the floor concerned and the adjacent rooms along
with the two floors immediately above and below if applicable. If the structures are of
temporary construction then evacuate at least 100, 200 or 400 metres dependant upon the
size of the item.
32
Protected Spaces
Protected spaces in permanent structures may offer the best protection against
blast, flying glass and other fragments. They may also offer the best protection
when the location of the possible bomb is unknown, when it may be near your
external evacuation route or when there is an external CBR attack.
Since glass and other fragments may kill or maim at a considerable distance from
the centre of a large explosion, moving people into protected spaces is often safer
than evacuating them onto the streets. Protected spaces should be located:
• In areas surrounded by full - height masonry walls e.g. internal corridors, toilet
areas or conference rooms with doors opening inwards.
• Away from windows and external walls.
• Away from the area in between the building's perimeter and the first line of
supporting columns (known as the 'perimeter structural bay').
• Away from stairwells or areas with access to lift shafts where these open at
ground level onto the street, because blast can travel up them. If, however,
the stair and lift cores are entirely enclosed, they could make good protected
spaces.
• Avoiding ground floor or first floor if possible.
• In an area with enough space to contain the occupants.
When choosing a protected space, seek advice from a structural engineer with
knowledge of explosive effects and do not neglect the provision of toilet facilities,
seating, drinking water and communications.
Consider duplicating critical systems or assets in other buildings at a sufficient
distance to be unaffected in an emergency that denies you access to you own. If
this is impossible, try to locate vital systems in part of your building that offers
similar protection to that provided by a protected space.
Communications
Ensure that staff know their security roles and that they or their deputies are always
contactable. All staff, including night or temporary staff, should be familiar with any
telephone recording, redial or display facilities and know how to contact police and security
staff in or out of office hours.
It is essential to have adequate communications within and between protected spaces. You
will at some stage wish to give the 'all clear', or tell staff to remain where they are, to move
to another protected space or evacuate the building. Communications may be by public
address system (in which case you will need standby power), hand-held radio or other stand
alone systems. Do not rely on mobile phones. You also need to communicate with the
emergency services. Whatever systems you choose should be regularly tested and available
within the protected space.
33
Interior rooms with reinforced concrete or masonry walls often make suitable protected
spaces as they tend to remain intact in the event of an explosion outside the building.
If corridors no longer exist then you may also lose your evacuation routes, assembly or
protected spaces, while the new layout will probably affect your bomb threat contingency
procedures.
When making such changes, try to ensure that there is no significant reduction in staff
protection, for instance by improving glazing protection. If your premises are already open
plan and there are no suitable protected spaces, then evacuation may be your only option.
34
eleven personnel security
Some external threats, whether from criminals or terrorists, may rely upon the co-operation
of an 'insider'.
This could be an employee, a student or any contract or agency staff (e.g. cleaner, caterer,
security guard) who has authorised access to your premises. If an employee, he or she may
already be working for you, or may be someone newly joined who has infiltrated your
organisation in order to seek information or exploit the access that the job might provide.
Pre-employment Screening
Personnel security involves a number of screening methods, which are performed as part of
the recruitment process but also on a regular basis for existing staff. The ways in which
screening is preformed varies greatly between organisations; some methods are very simple,
others are more sophisticated. In every case, the aim of the screening is to collect information
about potential or existing staff and then to use that information to identify any individuals
who present security concerns.
Pre-employment screening seeks to verify the credentials of job applicants and to check that
the applicants meet preconditions of employment (e.g. that the individual is legally permitted
to take up an offer of employment). In the course of performing these checks it will be
established whether the applicant has concealed important information or otherwise
misrepresented themselves. To this extent, pre-employment screening may be considered a
test of character.
35
Pre-employment checks
Personnel security starts with the job application, where applicants should be made aware
that supplying false information, or failing to disclose relevant information, could be grounds
for dismissal and could amount to a criminal offence. Applicants should also be made aware
that any offers of employment are subject to the satisfactory completion of pre-employment
checks. If an organisation believes there is a fraudulent application involving illegal activity,
the police should be informed.
Pre-employment checks may be performed directly by an institution, or this process may be
sub-contracted to a third party. In either case the organisation needs to have a clear
understanding of the thresholds for denying someone employment. For instance, under what
circumstances would an application be rejected on the basis of their criminal record, and
why?
Identity
Of all the pre-employment checks, identity verification is the most fundamental. Two
approaches can be used:
• A paper-based approach involving the verification of key identification documents and
the matching of these documents to the individual.
• An electronic approach involving searches on databases (e.g. databases of credit
agreements or the electoral role) to establish the electronic footprint of the individual.
The individual is then asked to answer questions about the footprint which only the
actual owner of the identity could answer correctly.
36
Qualifications
When confirming details about an individual's qualifications it is always important to:
• Consider whether the post requires a qualifications check.
• Always request original certificates and take copies.
• Compare details on certificates etc. with those provided by the applicant.
• Independently confirm the existence of the establishment and contact them to confirm
the details provided by the individual.
Employment checks
For legal reasons it is increasingly difficult to obtain character references, but past employers
should be asked to confirm dates of employment. Where employment checks are carried out
it is important to:
• Check a minimum of three but ideally five years previous employment.
• Independently confirm the employer's existence and contact details (including the line
manager).
• Confirm details (dates, position, salary) with HR.
• Where possible, request an employer's reference from the line manager.
Criminal convictions
A criminal conviction - spent or unspent - is not necessarily a bar to employment (see the
Rehabilitation of Offenders Act). However, there are certain posts where some forms of
criminal history will be unacceptable. To obtain criminal record information, a institution can
request that an applicant either:
1. completes a criminal record self-declaration form, or
2. applies for a Basic Disclosure certificate from Disclosure Scotland.
It is also appreciated education institutions carry out formal checks with the Disclosure and
Barring Service (DBS) on persons seeking employment with them using their normal policies
and procedures for additional information go to www.gov.uk.
Financial checks
For some posts it may be justifiable to carry out financial checks, for example where the
employee's position requires the handling of money. Interpreting the security implications of
financial history is not straightforward and will require each organisation to decide where
their thresholds lie (e.g. in terms of an acceptable level of debt).
There are a number of ways in which financial checks can be carried out. General application forms
can include an element of self-declaration (for example in relation to County Court Judgments
(CCJs), or the services of third party providers can be engaged to perform credit checks.
Contractor recruitment
Organisations employ a wide variety of contract staff, such as IT staff, cleaners, and
management consultants. It is important to ensure that contractors have the same level of
pre-employment screening as those permanent employees with equivalent levels of access to
the company's assets, be they premises, systems, information or staff.
37
Contracts should outline the type of checks required for each post and requirements should
be cascaded to any sub-contractors. Where a contractor or screening agency is performing
the checks they should be audited.
Secure contracting
Contractors present particular personnel security challenges. For instance, the timescales for
employing contractors are often relatively short, and there is greater potential for security
arrangements to be confused or overlooked (e.g. due to further sub-contracting).
In managing the insider risks associated with contractors it is important to:
• Ensure that pre-employment checks are carried out to the same standard as for
permanent employees. Where this is not possible, due to tight deadlines or a lack of
information available for background checking, then the resulting risks must be
managed effectively. Preferably the implementation of any additional security measures
will be guided by a personnel security risk assessment.
• Where pre-employment checks - or any other personnel security measures - are carried
out by the contracting agency rather than the employing organisation, a detailed
account of the checks to be undertaken and the standards achieved must be
incorporated into the contract that is drawn up between the two. Furthermore, the pre
employment checking process conducted by the contractor should be audited regularly.
Confirm that the individual sent by the contracting agency is the person who arrives for work
(e.g. using document verification or an electronic identity checking service).
Once the contractor has started work in the organisation, they will need to be managed
securely. The following steps will help:
• Carry out a risk assessment to establish the threats and level of risk associated with the
contractor acting maliciously in post.
• Ensure that the contract that exists, either between the organisation and the contractor,
or between the organisation and the contracting agency, defines the codes of practice
and standards that apply.
• Provide photo passes to contract and agency staff, and stipulate that they must be worn
at all times. Ideally, the employing organisation should retain contractors' passes
between visits, reissuing them each time only after the contractor's identity has been
verified.
The employing organisation and the contracting agency (or the contractor, if no agency is
involved) should agree a procedure for providing temporary replacements when the
contractor is unavailable. These arrangements should be included in the contract between the
two parties, and the employing organisation will need to decide what additional personnel
security measures to implement - for example, restricted or supervised access - when the
replacement is on site.
• Where a contractor is in post but the necessary pre-employment checks have not been
carried out - or where the results of the checks are not entirely positive but the need for
the contractor's expertise is such that they are employed anyway - then additional
personnel security measures must be considered (e.g. continuous supervision).
38
Overseas checks
It is increasingly necessary to screen potential employees who have lived and worked
overseas. As far as possible, organisations should seek to collect the same information on
overseas candidates as they would for longstanding UK residents (e.g. proof of residence,
employment references, criminal record). It is important to bear in mind that other countries
will have different legal and regulatory requirements covering the collection of information
needed to manage personnel security and therefore this step may be difficult.
A number of options are available to organisations wishing to perform overseas checks:
1. Request documentation from the candidate.
2. Hire professional/ an external screening service.
3. Conduct your own overseas checks.
In some circumstances you may be unable to complete these overseas checks satisfactorily
(e.g. due to a lack of information from another country). In this case, you may decide to deny
employment, or to implement other risk management controls (e.g. additional supervision) to
compensate for the lack of assurance.
See Good Practice checklist - Personnel Security in Appendix 'G'
Students
Some postgraduate overseas students will have had to apply for an Academic Technology
Approval Scheme (ATAS) certificate, designed to stop the spread of knowledge and skills that
could be used in the proliferation of weapons of mass destruction (WMD) and their means of
delivery. This is in common with other governments around the world.
More information is available from the Foreign and Commonwealth Office www.gov.uk
The points based system for overseas staff and students came into operation in
March 2009. More information is available from the Home Office www.gov.uk
For additional advice please refer to 'A Good Practice Guide on Pre-Employment Screening'
from www.cpni.gov.uk
39
40
41
The typical methods of cyber attack are:
Malicious software
The techniques and effects of malicious software (e.g. viruses, worms, trojans) are as variable
as they are widely known. The main ways a virus can spread are through:
1. Running or executing an attachment received in an email.
2. Clicking on a website link received in a website.
3. Inappropriate web browsing which often leads to a website distributing malicious
software.
4. Allowing staff to connect removable memory devices (USB memory sticks, disks, CD's,
DVD's) to corporate machines.
5. Allowing your staff to connect media players and mobile phones to corporate
machines.
Hacking
This is an attempt at unauthorised access, almost always with malicious or criminal intent.
Sophisticated, well-concealed attacks by foreign intelligence services seeking information have
been aimed at government systems but other organisations might also be targets.
What to do
• Acquire your IT systems from reputable manufacturers and suppliers.
• Ensure that your software is regularly updated. Suppliers are continually fixing security
vulnerabilities in their software. These fixes or patches are available from their websites
consider checking for patches and updates daily.
• Ensure that all internet-connected computers are equipped with anti-virus software and
are protected by a firewall.
• Back up your information, preferably keeping a secure copy in another location.
• Assess the reliability of those who maintain, operate and guard your systems (refer to
the section on Personnel Security on page 35)
• Consider encryption packages for material you want to protect, particularly if taken
• Take basic security precautions to prevent software or other sensitive information falling
into the wrong hands. Encourage security awareness among your staff, training them
42
not to leave sensitive material lying around and to operate a clear desk policy (i.e. desks
to be cleared of all work material at the end of each working session).
• Make sure your staff are aware that users can be tricked into revealing information
which can be used to gain access to a system, such as user names and passwords.
• Consider investing in secure cabinets, fit locking doors and ensure the proper
destruction of sensitive material
• Where possible, lock down or disable disk drives, USB ports and wireless connections.
• Ensure computer access is protected by securely controlled, individual passwords or by
biometrics and passwords.
• Implement an acceptable use policy for staff concerning web browsing, email, use of
chat rooms, social sites, trading, games and music download websites.
Shredding
Industry standards for document shredding do not currently exist in the UK: but have been
established in Germany for some time (DIN). Much of the EU has adopted the German
standard.
Shredding machines specified to DIN 32757 - 1 level 4 will provide a shred size 15mm x
1.9mm
Suitable for medium to high security requirements.
Incineration
Incineration is probably the most effective way of destroying sensitive waste, including disks
and other forms of magnetic and optical media, provided a suitable incinerator is used (check
with your local authority). Open fires are not reliable as material is not always destroyed and
legible papers can be distributed by the updraft.
43
Pulping
This reduces waste to a fibrous state and is effective for paper and card waste only. However,
some pulping machines merely rip the paper into large pieces and turn it into a papier maché
product from which it is still possible to retrieve information. This is more of a risk than it
used to be because inks used by modern laser printers and photocopiers do not run when
wet.
There are alternative methods for erasing digital media, such as overwriting and
degaussing. For further information visit www.cpni.gov.uk
expensive equipment if the people employed to use it are themselves security risks.
• Make the destruction of sensitive waste the responsibility of your security department
rather than facilities management.
44
thirteen vehicle borne improvised
explosive devices (VBIEDs)
Vehicle Borne Improvised Explosive Devices (VBIEDs) are one of the most effective weapons in
the terrorist's arsenal. They are capable of delivering a large quantity of explosives to a target
and can cause a great deal of damage.
Once assembled, the bomb can be delivered at a time of the terrorist's choosing and with
reasonable precision, depending on defences. It can be detonated from a safe distance
using a timer or remote control, or can be detonated on the spot by a suicide bomber.
Building a VBIED requires a significant investment of time, resources and expertise. Because
of this, terrorists will seek to obtain the maximum impact for their investment.
Terrorists generally select targets where they can cause most damage, inflict mass
casualties or attract widespread publicity.
Effects of VBIEDs
VBIEDs can be highly destructive. It is not just the effects of a direct bomb blast that can be
lethal: flying debris such as glass can present a hazard many metres away from the seat of
the explosion. Some institutions might have hazardous materials or harmful substances,
which could increase the danger associated with such an attack.
• Train and rehearse your staff in identifying suspect vehicles, and in receiving
and acting upon bomb threats. Key information and telephone numbers should
be prominently displayed and readily available.
45
• It should be emphasised that the installation of physical barriers needs to be balanced
against the requirements of safety and should not be embarked upon without full
consideration of planning regulation and fire safety risk assessment.
46
fourteen chemical, biological and
radiological (CBR) attacks
Since the early 1990s, concern that terrorists might use CBR materials as weapons has
steadily increased. The hazards are:
Chemical
Poisoning or injury caused by chemical substances, including ex-military
chemical warfare agents or legitimate but harmful household or industrial
chemicals.
Biological
Illnesses caused by the deliberate release of dangerous bacteria, viruses or
fungi, or biological toxins such as the plant toxin ricin.
Radiological
Illnesses caused by exposure to harmful radioactive materials contaminating
the environment.
A radiological dispersal device (RDD), often referred to as a 'dirty bomb', is typically a device
where radioactive materials are combined with conventional explosives. Upon detonation, no
nuclear explosion is produced but, depending on the type of the radioactive source, the
surrounding areas become contaminated.
As well as causing a number of casualties from the initial blast, there may well be a longer
term threat to health. A number of terrorist groups have expressed interest in, or attempted
to use, a 'dirty bomb' as a method of attack.
Much of the CBR-related activity seen to date has either been criminal, or has involved
hoaxes and false alarms. There have so far only been a few examples of terrorists using CBR
materials. The most notable were the 1995 sarin gas attack on the Tokyo subway, which
killed twelve people, and the 2001 anthrax letters in the United States, which killed five
people.
CBR weapons have been little used so far, largely due to the difficulty in obtaining the
materials and the complexity of using them effectively. Where terrorists have tried to carry
out CBR attacks, they have generally used relatively simple materials. However, Al Qaida and
related groups have expressed a serious interest in using CBR materials. The impact of any
terrorist CBR attack would depend heavily on the success of the chosen dissemination
method and the weather conditions at the time of the attack.
The likelihood of a CBR attack remains low. As with other terrorist attacks, you may not
receive prior warning of a CBR incident. Moreover, the exact nature of an incident may not
be immediately obvious. First indicators may be the sudden appearance of powders, liquids or
strange smells, with or without an immediate effect on people.
Good general physical and personnel security measures will contribute towards resilience
against CBR incidents. Remember to apply appropriate personnel security standards to
contractors, especially those with frequent access to your site.
47
What you can do
• Review the physical security of any air-handling systems, such as access to intakes and
outlets.
• Improve air filters or upgrade your air-handling systems, as necessary.
• Restrict access to water tanks and other key utilities.
• Review the security of your food and drink supply chains.
• The Home Office advises organisations against the use of CBR detection
technologies as part of their contingency planning measures at present. This is
because the technology is not yet proven in civil settings and, in the event of a
CBR incident, the emergency services would come on scene with appropriate
detectors and advise accordingly. A basic awareness of CBR threat and hazards,
combined with general protective security measures (e.g. screening visitors, CCTV
monitoring and active response of perimeters and entrance areas, being alert to
suspicious deliveries) should offer a good level of resilience. In the first instance, seek
advice from your local police force CTSA.
• If there is a designated protected space available this may also be suitable as a CBR
shelter, but seek specialist advice from your local police force CTSA before you make
plans to use it in this way.
• Consider how to communicate necessary safety advice to staff and how to offer
reassurance. This needs to include instructions to those who want to leave or return to
the site.
Institutions should be aware that all hazardous materials and harmful substances, including
seemingly innocuous low-level isotopes, could provide the opportunity for a terrorist
attack. Suitable security must be maintained around all such substances.
48
fifteen suicide attacks
The use of suicide bombers is a very effective method of delivering an explosive device to a
specific location. Suicide bombers may use a lorry, plane or other kind of vehicle as a bomb or
may carry or conceal explosives on their persons. Both kinds of attack are generally perpetrated
without warning. The most likely targets are mass casualty crowded places, symbolic locations
and key installations.
When considering protective measures against suicide bombers, think in terms of:
• Using physical barriers to prevent a hostile vehicle from driving into your institution through
main entrances, goods/service entrances, pedestrian entrances or open land.
• Denying access to any vehicle that arrives at your goods/service entrances without prior
notice and holding vehicles at access control points into your establishment until you can
satisfy yourself that they are genuine.
• Wherever possible, establishing your vehicle access control point at a distance from the
protected site, setting up regular patrols and briefing staff to look out for anyone behaving
suspiciously. Many bomb attacks are preceded by reconnaissance or trial runs. Ensure that
such incidents are reported to the police.
• Ensure that no one visits your protected area without your being sure of his or her identity
or without proper authority. Seek further advice through your local police force's Counter
Terrorism Security Advisor (CTSA).
• Effective CCTV systems especially with an active response, may deter a terrorist attack or
even identify planning activity. Good quality images can provide crucial evidence in court.
There is no definitive physical profile for a suicide bomber, so remain vigilant and report anyone
suspicious to the police.
See Hostile Reconnaissance - page 51.
49
sixteen firearm and weapon attacks
Education institutions around the world have suffered a number of lone and group attacks.
However, terrorist use of firearms and weapons is still infrequent, but it is important to consider
this method of attack and be prepared to cope with such an incident. Below is some general
guidance to aid your planning in this area.
Stay Safe
• Find the best available ballistic protection.
• Remember, out of sight does not necessarily mean out of danger, especially if you are not
ballistically protected.
See
• It is a firearms / weapons incident.
• Exact location of the incident.
• Number of gunmen.
• Type of firearm - are they using a long-barrelled weapon or handgun
• Direction of travel - are they moving in any particular direction
Consider the use of CCTV and other remote methods of confirmation reducing vulnerabilities to
staff.
Tell
• Who - Immediately contact the police by calling 999 or via your control room, giving them
the information shown under Confirm
• How - use all the channels of communication available to you to inform visitors and staff of
the danger.
• Plan - for a firearms / weapons incident.
1. How you would communicate with staff and visitors
2. What key messages would you give to them in order to keep them safe.
3. Think about incorporating this into your emergency planning and briefings
• Test - your plan before you run your event
Act
• As far as you can, limit access and secure your immediate environment.
• Encourage people to avoid public areas or access points. If your have rooms at your location,
lock the doors if possible and remain quiet.
See Physical Security on page 15.
If you require further information please liaise with your Counter Terrorism Security
Advisor (CTSA) .
50
seventeen hostile reconnaissance
Reconnaissance operatives may visit potential targets a number of times prior to the attack. Where
pro-active security measures are in place, particular attention is paid to any variations in security
patterns and the flow of people in and out.
Operation Lightning is a national intelligence gathering operation to record, research,
investigate and analyse:
• Suspicious sightings.
• Suspicious activity.
at or near:
• Crowded places.
or prominent or vulnerable:
• Buildings.
• Structures.
• Transport infrastructure.
The ability to recognise those engaged in hostile reconnaissance could disrupt an
attack and produce important intelligence leads. What to look for.
The following sightings or activity may be particularly
relevant to your institution.
• Significant interest being taken in the outside of your
establishment including parking areas, delivery gates,
doors and entrances.
• Groups or individuals taking significant interest in the
location of CCTV cameras and controlled areas.
• People taking pictures, filming, making notes or
sketching of the security measures. Tourists should not
necessarily be taken as such and should be treated
sensitively, but with caution.
• Overt/covert photography, video cameras, possession
of photographs, maps, blueprints etc, of critical
infrastructures, electricity transformers, gas pipelines,
telephone cables, etc.
51
• Possession of maps, global positioning systems (GPS), photographic equipment (cameras,
zoom lenses, camcorders). GPS will assist in the positioning and correct guidance of
weapons such as mortars and Rocket Propelled Grenades (RPGs). This should be considered
a possibility up to one kilometre from any target.
• Vehicles parked outside buildings or other facilities, with one or more people remaining in
the vehicle, for longer than would be considered usual.
• Parking, standing or loitering in the same area on numerous occasions with no apparent
reasonable explanation.
• Prolonged static surveillance using operatives disguised as demonstrators, street sweepers,
etc or stopping and pretending to have car trouble to test response time for emergency
services, car recovery companies, (AA, RAC etc) or local staff.
• Simple observation such as staring or quickly looking away.
• Activity inconsistent with the nature of the building.
• Unusual questions - number and routine of staff/VIP's visiting the institution.
• Individuals that look out of place for any reason.
• Individuals that appear to be loitering in public areas.
• Individuals asking questions regarding the identity or characteristics of individual visitors,
groups of visitors, or the jobs or nationalities of visitors, that may visit the institution.
• Persons asking questions regarding security and evacuation measures.
• Persons asking questions regarding institution staff or student hangouts.
• Persons asking questions regarding VIP visits.
• Delivery vehicle in front of the establishment.
• Vehicles, packages, luggage left unattended.
• Vehicles appearing over weight.
• Persons appearing to count pedestrians/vehicles.
• Strangers walking around perimeter of the institution.
• People 'nursing' drinks and being over attentive to surroundings. Persons loitering around
area for a prolonged amount of time.
• Persons attempting to access plant equipment or chemical areas.
• Delivery vehicles or other trucks attempting to access the main driveway to the institution.
• Delivery vehicles arriving at the institution at the wrong time or outside of normal hours.
• Vehicles emitting suspicious odours e.g. fuel or gas.
• Vehicle looking out of place.
• Erratic driving.
• Questions regarding the institution structure.
• Noted pattern or series of false alarms indicating possible testing of security systems and
observation of response behaviour and procedures, (bomb threats, leaving hoax devices or
packages).
52
• The same vehicle and different individuals or the same individuals in a different vehicle
returning to a location(s).
• The same or similar individuals returning to carry out the same activity to establish the
optimum time to conduct the operation.
• Unusual activity by contractor's vehicles.
• Recent damage to perimeter security, breaches in fence lines or walls or the concealment in
hides of mortar base plates or assault equipment, i.e. ropes, ladders, food etc. Regular
perimeter patrols should be instigated months in advance of a high profile event to ensure
this is not happening.
• Attempts to disguise identity - motorcycle helmets, hoodies, etc. or multiple sets of
clothing to change appearance.
• Constant use of different paths, and/or access routes across a site. 'Learning the route' or
foot surveillance involving a number of people who seem individual but are working
together.
• Multiple identification documents - suspicious, counterfeit, altered documents etc.
• Non co-operation with police or security personnel.
• Those engaged in reconnaissance will often attempt to enter premises to assess the internal
layout and in doing so will alter their appearance and provide cover stories.
• In the past reconnaissance operatives have drawn attention to themselves by asking
peculiar and in depth questions of employees or others more familiar with the environment.
• Sightings of suspicious activity should be passed immediately to security management for
CCTV monitoring, active response were possible and the event recorded for evidential
purposes.
53
54
54
eighteen high profile events
There may be events held at your institution, which for various reasons, are deemed to be
more high profile and therefore more vulnerable to attack. This may involve pre-event
publicity of the attendance of a VIP or celebrity, resulting in additional crowd density on the
event day and the need for an appropriate security response and increased vigilance.
In certain cases the local police may appoint a police Gold Commander (Strategic
Commander in Scotland) with responsibility for the event; who may in turn, appoint a Police
Security Co-ordinator (SecCo) and/or a Police Search Adviser (PolSA).
55
Physical and technical security measures may include:
• Physical protection measures such as extra doors, locks, lighting and target hardening.
• Technical measures including enhanced or extended CCTV and alarms if required.
• Vehicle security at the event site.
• Personal safety advice to VIP's on reducing their own vulnerability when travelling to and
from a venue, avoiding predictable routines, etc.
• Care and retention of sensitive information and communications, this is particularly
pertinent when advertising the event, is the event public or private, official or unofficial
and the extent of pre-publicity or public knowledge of an event may cause the level of
threat or resultant planning to change considerably.
• Early identification of all organisations involved in the event, their roles and
• The circumstances under which an event will be discontinued and the method and
ownership for such decisions, and means by which by which this will be communicated.
• The circumstances under which a venue will be evacuated and VIP's removed.
• Clarification of the role, powers and capability of any private security staff or stewards
either permanent or temporarily contracted for the specific event. This includes any
specialist skills required for searching, e.g. operating search equipment, search arches or
luggage scanning.
• Prepare lists for restricted circulation only to partners (see care and retention of sensitive
material above), incorporating invited and confirmed guests, chronology of events,
copies of invitations, car passes and any other relevant materials, such as plans, maps
and contact lists, etc.
• Specimen copies of any accreditation passes and badges allowing access to the various
security zones, etc.
• Create security zones within the secure perimeter to segregate VIP's from invited guests,
the general public and the media, etc. Consider providing a 'Green Room' or place of
safety where a VIP could shelter in the event of an incident.
• Identity safe routes to and from the venue, as well as safe evacuation / escape routes.
• Arrangement of parking for VIP vehicles and consideration of parking restrictions
• Ensure the personnel security and secure contracting principles referred to in chapter
eleven are strictly adhered to for secure areas and island sites.
• Where a particular venue is likely to be used as a more permanent venue or on a long
term basis, Crime Prevention Through Environmental Design (CPTED) principles should
be considered along side any appropriate Counter Terrorism security advice, with the
aim of designing out identified structural vulnerabilities.
• Liaison with security providers and other partners should be ongoing rather than a 'one
off' process.
See Good Practice Checklist - High Profile Events in Appendix 'J'
56
nineteen threat levels
Information about the national threat level is available on the MI5 - Security Service
Home Office and UK Intelligence Community Websites.
Terrorism threat levels are designed to give a broad indication of the likelihood of a terrorist
attack. They are based on the assessment of a range of factors including current intelligence,
recent events and what is known about terrorist intentions and capabilities. This information
may well be incomplete and decisions about the appropriate security response should be
made with this in mind.
In particular, those who own, operate, manage or work at major events are
reminded that SUBSTANTIAL and SEVERE both indicate a high level of threat and
that an attack might well come without warning.
Response Levels
Response levels provide a broad indication of the protective security measures that should be
applied at any particular time. They are informed by the threat level but also take into
account specific assessments of vulnerability and risk.
Response levels tend to relate to sites, whereas threat levels usually relate to broad areas of activity.
There are a variety of site specific security measures that can be applied within response
levels, although the same measures will not be found at every location.
The security measures deployed at different response levels should not be made public,
to avoid informing terrorists about what we know and what we are doing about it.
There are three levels of response which broadly equate to threat levels as shown below:
CRITICAL EXCEPTIONAL
SEVERE
HEIGHTENED
SUBSTANTIAL
MODERATE
NORMAL
LOW
57
Response Level Definitions
58
twenty communication and training
You should consider a communication strategy for raising awareness among staff and others
who need to know about your security plan and its operation. This will include the
emergency services, local authorities and possibly neighbouring premises/areas.
A communication strategy incorporating both the physical and electronic activities and
supporting the delivery of safe passage, messaging and signage. The placing, interpretation
and integration of signage is essential for enabling invacuation and evacuation within or
outside a building or buildings. Associated with this is the electronic activation of messaging
services through telephone, radio, electronic signage and other media assistance with the
delivery of a clear and deliverable output which will in turn support other communication
elements being utilised. Safe passage away from areas under threat is the key rationale
behind any such strategy and should have contingency delivery built into the planning stages
to enable alternative activities to take place if the planning capability is compromised.
The consideration of a signage strategy incorporating placement, size and directional activity
is a key aspect of an overall communication strategy. The delivery of effective and efficient
movement possibilities from one area to another reduces tensions during an evacuation,
invacuation or other threat situation.
There should also be arrangements for dealing with people who may be affected by your
security operation but who are not employees of your organisation (e.g. students,
contractors, visitors).
It should be remembered that immediately following a terrorist attack, mobile telephone
communication may be unavailable due to excessive demand, so consideration should be
given to alternative communication.
Security Managers should regularly meet with staff to discuss security issues and encourage
staff to raise their concerns about security.
Consideration should be given to the use of any website and/or publications that could
communicate crime prevention and counter terrorism initiatives.
All Security Managers should involve their local Counter Terrorism Security Adviser and/or
Police Security Co-ordinator when considering improvements to an established site or
premises for the purposes of holding a significant event.
You could consider establishing networks of good practice among AUCSO, AOC and
HEBCoN colleagues.
Further training or presentations such as Project Griffin or Operation Fairway (DVD) may be
available for suitable staff via your local Counter Terrorism Security Advisor.
See Good Practice Checklist - Communication in Appendix 'I'
59
60
The following checklists are intended as a guide for those who manage security at education
institutions to assist them in identifying the hazards and risks associated with counter
terrorism planning.
They are not however exhaustive and some of the guidance might not be relevant
to all institutions.
The checklists should be considered taking the following factors into account:
• Have you consulted your, Counter Terrorism Security Advisor, Police Security
• Who else should be included during consultation - e.g. Highway Manager, Open Space
Manager and Land Owner?
• Which measures can be implemented with ease?
• Which measures will take greater planning and investment?
appendix a
Emergency and Business Continuity Planning
Yes No Unsure
Do you have a Business Continuity and emergency response plan?
Do you regularly review and update your plans?
Have you concerned firearm and weapon attacks in your plans?
Are your staff trained in activating and operating your plan?
Have you prepared an emergency 'Grab Bag’?
Do you have access to an alternative workspace to use in an
emergency?
Are your critical documents adequately protected?
Do you have copies of your critical records at a separate location?
Do you have contingency plans in place to cater for the loss/
failure of key equipment?
Do you have sufficient insurance to pay for disruption to
business, cost of repairs, hiring temporary employees, leasing
temporary accommodation and equipment?
61
appendix b
62
appendix c
63
appendix d
CCTV
Yes No Unsure
Do you constantly monitor your CCTV images or playback
overnight recordings for evidence of suspicious activity?
Do you have an active response to your CCTV monitoring
programme?
Do you have your CCTV cameras regularly maintained?
Do the CCTV cameras cover the entrances and exits to your
institution?
Have you considered the introduction of ANPR to
complementyour security operation?
Do you have CCTV cameras covering critical areas in your
institution, such as IT equipment, back up generators, cash
offices and restricted areas?
Do you store the CCTV images in accordance with the evidential
needs of the police?
Could you positively identify an individual from the recorded
images on your CCTV system?
Are the date and time stamps of the system accurate?
Does the lighting system complement the CCTV system during
daytime and darkness hours?
Do you regularly check the quality of your recordings?
Are your 'contracted in' CCTV operators licensed by the Security
Industry Authority (SIA)?
Have you implemented operating procedures, codes of practice
and audit trails?
Is each CCTV camera doing what it was installed to do?
64
appendix e
Searching
Yes No Unsure
65
appendix f
Evacuation / ‘Invacuation’
Yes No Unsure
Is evacuation part of your security plan?
Is 'invacuation' into a protected space part of your security plan?
Have you sought advice from a structural engineer to identify
protected spaces within your building?
Do you have nominated evacuation / 'invacuation' marshals?
Does your evacuation plan include 'incident' assembly areas
distinct from fire assembly areas?
Have you determined evacuation routes?
Have you agreed your evacuation / 'invacuation' plans with the
police, emergency services and your neighbours?
Do you have reliable, tested communications facilities in the
event of an incident?
Have any disabled staff been individually briefed?
Do you have a review process for updating plans as required?
66
appendix g
67
appendix h
Information Security
Yes No Unsure
Do you lock away all business documents at the close of the
business day?
Do you have a clear-desk policy out of business hours?
Do you close down all computers at the close of the business
day?
Are all your computers password protected?
Do you have computer firewall and antivirus software on your
computer systems?
Do you regularly update this protection?
Have you considered an encryption package for sensitive
information you wish to protect?
Do you destroy sensitive data properly when no longer required?
Do you back up business critical information regularly?
Do you have a securely contained back up at a different location
from where you operate your business? (Fall back procedure)
Have you invested in secure cabinets for your IT equipment?
appendix i
Communication Yes No
Are security issues discussed/decided at senior management level
and form a part of your organisation's culture?
Do you have a security policy or other documentation showing
how security procedures should operate within your institution?
Is this documentation regularly reviewed and if necessary
updated?
Do you regularly meet with staff and discuss security issues?
Do you encourage staff to raise their concerns about security?
Do you know your local Counter Terrorism Security Advisor
(CTSA) and do you involve them in security developments?
Do you speak with your neighbours about issues of security and
crime that might affect you all?
Do you remind your staff to be vigilant when travelling to and
from work, and to report anything suspicious to the relevant
authorities or police?
Do you make use of your website, to communicate crime and
counter terrorism initiatives, including an advance warning
regarding searching?
68
appendix j
69
grab bag checklist
Items you could consider including in a grab bag sometimes known as a battle or incident box.
Equipment:
• Emergency and Floor plans (laminated)
• List of Contacts (laminated) staff etc
• Incident Log (consider dictaphone), notebook, pens, markers, etc
• First aid kit (designed for major emergencies) consider large bandages, burn shields or
cling film, large sterile strips, cold packs, baby wipes as well as standard equipment
• Torch and spare batteries or wind up
• Glow sticks
• Radio (wind up)
• High visibility jackets
• Loud hailer and spare batteries
• Hazard and cordon tape.
• Plastic macs / foil blankets / bin liners
• Dust / toxic fume masks
• Water (plastic container) and chocolate/glucose tablets
• Computer back up tapes / disks / USB memory sticks or flash drives (see extra
70
Make sure this pack or packs are stored safely and securely site on site or at an accessible
emergency location nearby. Ensure items in the pack are checked regularly, are kept up to
date, and are working. Remember that cash / credit cards may be needed for emergency
expenditure.
This list is not exhaustive, and there may be other documents or equipment that should be
included for your business or organisation.
71
bomb threat checklist
This checklist is designed to help your staff to deal with a telephoned bomb threat
effectively and to record the necessary information.
Visit www.cpni.gov.uk
___________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________
Why? __________________________________________________________________________________________________________
Inform the premises manager of name and telephone number of the person informed:
___________________________________________________________________________________________________________________
The following part should be completed once the caller has hung up and the
premises manager has been informed.
Time and date of call: _______________________________________________________________________________________
Number at which call was received (i.e. your extension number): ___________________________________
72
ABOUT THE CALLER
Sex of caller: __________________________________________________________________________________________________
Nationality: ____________________________________________________________________________________________________
Age: ____________________________________________________________________________________________________________
� Excited?
� Stutter? OTHER REMARKS
� Disguised? _______________________________________________________
� Slow?
_______________________________________________________
� Lisp?
_______________________________________________________
_______________________________________________________
� Deep?
� Hoarse? Date ________________________________________________
� Laughter?
� Familiar? If so, whose voice did it sound Print name
like? _________________________________________________ _______________________________________________________
73
useful publications
Pre-Employment Screening
CPNI’s Pre-Employment Screening is the latest in a series of advice products on the subject of
personnel security. It provides detailed guidance on pre-employment screening measures
including:
• identity checking
• confirmation of the right to work in the UK
• verification of a candidate’s historical personal data (including criminal record checks)
The booklet is available in PDF format and can be downloaded from www.cpni.gov.uk
Emergencies - Planning for and Managing: A good practice guide for Higher
Education Institutions - The Association of University Chief Security Officers (AUCSO)
This Guide provides information on good practice in emergency management with specific
reference to Higher Education Institutions (HEIs) in the UK.The aim of the Guide is to assist
HEIs in developing their ability to respond to emergencies. In particular the document seeks
to assist those involved in emergency management activities in developing and reviewing
their emergency plans, provide further information and access to resources (including
research, local networks and additional guidance in this field) and consolidate understanding
among Higher Education (HE) managers. See www.ucea.ac.uk
74
useful contacts
Police Scotland
www.scotland.police.uk
London Prepared
www.london.gov.uk
75
notes
76
Acknowledgments
With thanks to the following for their knowledge, expertise and time
Universities UK
GuildHE
Thanks to all universities and further education colleges/institutions that assisted in this publication
Home Office
© ACPO 2009(Partial review 2014) The Association is a private company limited by guarantee. Registered No. 3344583
Registered office. 25 Victoria Street, London SW1H 0EX.