This action might not be possible to undo. Are you sure you want to continue?
for Bars, Pubs and Nightclubs
National Counter Terrorism Security Office
The National Counter Terrorism Security Office (NaCTSO), on behalf of ACPO (TAM), works in partnership with the Security Service to reduce the impact of terrorism in the United Kingdom by: • protecting the UK’s most vulnerable and valuable sites and assets • enhancing the UK’s resilience to terrorist attack • delivering protective security advice across the crowded places sectors. NaCTSO aims to: • raise awareness of the terrorist threat and the measures that can be taken to reduce risks and mitigate the effects of an attack • co-ordinate national service delivery of protective security advice through the CTSA network and monitor its effectiveness • build and extend partnerships with communities, police and government stakeholders
• contribute to the development of CT policy and advice.
National Counter Terrorism Security Office
“Copyright in this guide is (except where expressly stated held by third parties) vested in the Association of Chief Police Officers of England and Wales and Northern Ireland, but ACPO recognises that recipients may want to reproduce some or all of the guide for the purpose of informing, training or otherwise assisting their staff, customers, contractors, tenants and others with whom they deal in running their operations. ACPO therefore grants, to all in receipt of this guide, a royalty-free non-exclusive non-sublicensable right to reproduce all or any part of it provided that each of the following conditions is met: (1) the National Counter-Terrorism Security Office (NaCTSO) must be consulted before any reproduction takes place; (2) reproduction must be for the purpose set out above and for no other purpose; (3) no part of this guide may appear as or in any advertisement or other promotional material; (4) no charge may be made to any person receiving any reproduced material; (5) no alteration may be made in the course of reproduction save for alteration to font, font size or formatting; and (6) the reproduced material must be accompanied by a statement clearly acknowledging ACPO as the source of the material.”
1. 2. 3. 4. 5. 6. 7. 8. 9. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Managing the Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Security Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Good Housekeeping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 CCTV Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Search Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Door Supervisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
10. Evacuation Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 11. Vehicle Borne Improvised Explosive Devices (VBIEDs) . . . . . . . . . . . . . . . . . . . . . . . . . 31 12. Suicide Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 13. Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 14. Hostile Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 15. High Profile Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 16. Threat Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 APPENDIX ‘A’ Housekeeping Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . 45 APPENDIX ‘B’ Access Control Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . 46 APPENDIX ‘C’ CCTV Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 APPENDIX ‘D’ Searching Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 APPENDIX ‘E’ Communication Good Practice Checklist . . . . . . . . . . . . . . . . . . . . . . . 49 Checklist Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Bomb Threat Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Useful Publications and Contacts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
g. pubs and nightclubs in the UK have been infrequent recently. This might include having to deal with a bomb threat or with suspect items left in or around your premises or sent through the post. Some attacks are easier to carry out if the terrorist is assisted by an ‘insider’ or by someone with specialist knowledge or access. including bars. It is recognised that there is a need to maintain a friendly and welcoming atmosphere within bar. Terrorist attacks in the UK are a real and serious danger. Particularly relevant to protective security in bars. may feature in the attack plans of terrorist organisations in the future. not just a physical attack on life and limb. There is however a balance to be achieved where those responsible for security are informed that there are robust protective security measures available to mitigate against the threat of terrorism. causing disruption and economic damage. In the worst case scenario your staff and customers could be killed or injured. pub and nightclub environments and this guide is not intended to create a ‘fortress mentality’. and your premises destroyed or damaged in a ‘no warning’. manage or work in bars. It aids those who are seeking to reduce the risk of a terrorist attack and limit the damage an attack might cause. It is possible that your premises could be involved in a terrorist incident. Liability and Insurance. pubs and nightclubs.one introduction This guide provides protective security advice to those who own. pubs and nightclubs are the specific requirements of the Health and Safety at Work Act 1974 and Regulations made under it to do all of the following: • carry out adequate risk assessments and put suitable measures in place to manage identified risks. e. particularly if it emerges that core standards and statutory duties have not been met. There are legal and commercial reasons why your premises should plan to deter such acts. They are: Criminal prosecution and heavy penalties under health and safety laws for companies and individuals who own or run licensed premises are a real possibility in the wake of a terrorist incident. there is a long history of such attacks and there have been recent attacks on bars and nightclubs in other countries around the world. multiple and co-ordinated terrorist attack. pubs and nightclubs in the UK. even where they are not of your making and are outside your direct control: then be alert to the need to conduct prompt and regular reviews of those assessments and measures in light of new threats and developments 5 . Law. Crowded places. Terrorism also includes threats or hoaxes designed to frighten and intimidate. Although terrorist attacks on bars. as they are usually locations with limited protective security measures and therefore affords the potential for mass fatalities and casualties. or at least to minimise their impact. It can include interference with vital information or communication systems. Terrorism can come in many forms. It highlights the vital part you can play in the UK counter terrorism strategy. protection from flying glass and vehicle access controls into underground car parks. operate. pubs or nightclubs. These have in the past been targeted at bars.
This is particularly important for smaller operations that may not have the resources to withstand even a few days of financial loss. tenants and others involved on site. security staff. Take into account your neighbours’ plans and those of the emergency services. layout and operation and that some of the advice included in this document may have already been introduced at some locations. managers and tenants under occupiers liability laws. Do you know who your neighbours are and the nature of their business? Could an incident at their premises affect your operation? There is limited value in safeguarding your own business premises in isolation. Business continuity planning is essential in ensuring that your premises can cope with an incident or attack and return to ‘business as usual’ as soon as possible. Having to pay large and numerous compensation claims out of your own uninsured pocket could set your business back several years. auditing and improving planning and response. This document identifies and complements such good practice measures.• co-operate and co-ordinate safety arrangements between owners. The commercial tensions which naturally arise between landlords and tenants. and especially to those involved directly on the safety and security side • put proper procedures and competent staff in place to deal with imminent and serious danger and evacuation. An attack on a crucial contractor or supplier can also impact on business continuity. Adequate cover for loss of revenue and business interruption during a rebuild or decontamination is expensive even where available from the limited pool of specialist underwriters. operators. location. 6 . responsible and professional priority to best protecting people against attack. This guide recognises that bars. Being security minded and better prepared reassures your customers and staff that you are taking security issues seriously. information and equipment are provided to all staff. managers. Reputation and goodwill are valuable. and between neighbouring organisations who may well be in direct competition with each other. albeit at a cost. Full protection against compensation claims for death and injury to staff and customers caused by terrorism is achievable. there is every incentive for victims to seek to make up any shortfall through direct legal action against owners. but prone to serious and permanent damage if it turns out that you gave a less than robust. A number of organisations have adopted good practice to enhance the protective security measures in and around their premises. pubs and nightclubs differ in many ways including size. With individual awards for death and serious injury commonly exceeding the publicly – funded criminal injuries compensation scheme upper limit. including the sharing of incident plans and working together in testing. Insurance against damage to your own commercial buildings from terrorist acts is generally available but typically at an additional premium. must be left aside entirely when planning protective security • ensure adequate training.
For specific advice relating to your operation. if your premises are to be secure. contact the nationwide network of specialist police advisers known as Counter Terrorism Security Advisers (CTSAs) through your local police force. Any extra measures that are considered should integrate wherever possible with existing security. It is essential that all the work you undertake on protective security is undertaken in partnership with the police. They are co-ordinated by the National Counter Terrorism Security Office (NaCTSO). other authorities as appropriate and your neighbours. 7 . such as theft and burglary. It is worth remembering that measures you may consider for countering terrorism will also work against other threats.
With regard to protective security. Identify measures to reduce risk (security improvements/ security plans) 9 . Review your security measures and rehearse/ review your security plans RISK MANAGEMENT CYCLE 2. you assess that you are vulnerable to attack. The following diagram illustrates a typical risk management cycle: 1. pub or nightclub owner or manager’s responsibility when preparing contingency plans in response to any incident in or near their premises which might prejudice public safety or disrupt normal operations. Establish what you want to protect and your vulnerabilities 3.two managing the risks Managing the risk of terrorism is only one part of a bar. Identify the threats 4. the best way to manage the hazards and risks to your premises is to start by understanding and identifying the threats and vulnerabilities. you should apply appropriate protective security measures to reduce the risk to as low as reasonably practicable. simple good practice – coupled with vigilance and well exercised contingency arrangements – may be all that is needed. pubs and nightclubs. Management already has a responsibility under Health and Safety Regulations and the Fire (Scotland) Act 2005. For some bars. If. however. This will help you to decide: • what security improvements you need to make • what type of security and contingency plans you need to develop.
g.what they might do and how they might do it . and measures to secure parts of the premises. Understanding the terrorist's intentions and capabilities .cpni. You know what is important to you and your business. critical procedures) – the actual operational process and essential services required to support it. 10 . technical expertise or unauthorised access? • do you communicate information about the threat and response levels to your staff? Step Two: Decide what you need to protect and identify your vulnerabilities.Step One: Identify the threats. or your activities that would particularly attract a terrorist attack? • is there an association with high profile individuals or organisations which might be terrorist targets? • do you have procedures in place and available for deployment on occasions when VIPs attend your premises? • could collateral damage occur from an attack or other incident to a high risk neighbour? • what can your local Police Service tell you about crime and other problems in your area? • is there any aspect of your business or activities that terrorists might wish to exploit to aid their work.gov. protection from IT viruses and hackers. its customers. equipment.is crucial to assessing threat.uk and refer to the Useful Publications and Contacts section at the back of this booklet) • is there anything about the location of your premises. visitors. You should already have plans in place for dealing with fire and crime. e. or about recent terrorist activities? (Visit www. on the internet or in public documents • Anything that identifies installations or services vital to the continuation of your business • Any prestige targets that may be attractive to terrorists. contents. regardless of whether their loss would result in business collapse • you should have measures in place to limit access into service or back of house corridors and vehicle access control measures into goods and service yards. contractors) • physical assets (buildings.g. occupiers and staff. plans and sensitive materials) • information (electronic and paper data) • processes (supply chains. Review your plans on a regular basis and if you think you are at greater risk of attack – perhaps because of the nature of your business or location of your premises then consider what others could find out about your vulnerabilities. e. Your priorities for protection should fall under the following categories: • people (staff. Ask yourself the following questions: • what can be learnt from the government and media about the current security climate. plans. procedures for assessing the integrity of those you employ. customers. such as: • Information about you that is publicly available.
Make sure that your staff understand and accept the need for security measures and that security is seen as part of everyone's responsibility.g. TERRORISM IS A CRIME. Remember. So before you invest in additional security measures. In multi-occupancy buildings.As with Step One. This involves thinking about physical security. they will be concerned about general crime – and your security measures will help protect against crime as well as terrorism. Even if your neighbours are not concerned about terrorist attacks. 11 . (See hostile reconnaissance on page 37). which can be downloaded from www. information security and personnel security (i. changes to personnel. You should regularly review and exercise your plans to ensure that they remain accurate. You should be aware of the need to modify them to take into account any changes in your bar. pub or nightclub (e. There is little point investing in costly security measures if they can be easily undermined by a disaffected member of staff or by a lax recruitment process. Introduce new equipment or procedures in conjunction with building work. If you need additional security measures. short cuts through fire exits. not merely something for security experts or professionals. or may have developed habits to circumvent them. If there are. Make it easy for people to raise concerns or report observations. try to agree communal security arrangements. review what you already have in place. how stringent are your checks on the people you recruit or on your contract personnel? Are your staff security conscious? It is important that your staff can identify and know how to report suspicious activity. be conducted in conjunction with all partners.gov. e. For more detailed information on risk assessment (including a check list to help identify the areas where your business may be vulnerable) refer to the NaCTSO publication Secure in the Knowledge. consider whether there is an aspect of your business or activities that terrorists might want to exploit to aid or finance their work.uk IT SHOULD BE REMEMBERED THAT THE GREATEST VULNERABILITY TO ANY ORGANISATION IS COMPLACENCY. workable and up to date. then make them most cost-effective by careful planning wherever possible. emergency services and local authorities. Simply reinstating good basic security practices and regularly reviewing them will bring benefits at negligible cost. Rehearsals and exercises should wherever possible.e. new building work. information and communication systems and revised health and safety issues). You may already have a good security regime on which you can build. Many of the security precautions typically used to deter criminals are also effective against terrorists. Step Four: Review your security measures and rehearse and review security and contingency plans.cpni. Staff may be unaware of existing security measures. Step Three: Identify measures to reduce risk An integrated approach to security is essential. good recruitment and employment practices).g.
your CTSA will be able to comment on its effectiveness as a deterrent. concerning access control. so that the terrorist dimension is taken into account. both generally and specifically • give advice on physical security equipment and its particular application to the methods used by terrorists. Your CTSA can: • help you assess the threat. glazing and physical barriers can be factored in. as protection and as an aid to post-incident investigation • facilitate contact with emergency services and local authority planners to develop appropriate response and contingency plans • identify appropriate trade bodies for the supply and installation of security equipment • offer advice on search plans. contingency plans etc. the Security Manager should establish contact with the local police Counter Terrorism Security Adviser (CTSA). suspect packages and evacuation • liaising with the police. pub or nightclub owner/manager. pubs and nightclubs should already have responsibility for most if not all of the following key areas: • the production of the security plan based on the risk assessment • the formulation and maintenance of a search plan • the formulation and maintenance of other contingency plans dealing with bomb threats. taking into account any Health & Safety and planning regulations as well as the Fire (Scotland) Act 2005. The responsible person must similarly be consulted over any new building or renovation work. Most UK Police Forces have at least two CTSAs. so that counter terrorism specifications. other emergency services and local authorities • arranging staff training. He or she must be involved in the planning of the bar. access control. The person responsible for security in most bars. 13 . including his/her own deputies and conducting briefings/ debriefings • conducting regular reviews of the plans. e.g. an area manager or business development manager with a security remit within a larger organisation. For independent and impartial counter terrorism advice and guidance that is site specific. pub or nightclub’s exterior security. The person responsible for security must have sufficient authority to direct the action taken in response to a security threat.three security planning The responsibility for the implementation of protective security measures following a vulnerability and risk assessment may fall on an individual bar.
Before you invest in additional security measures. 14 . consider the following: • details of all the protective security measures to be implemented. review what is already in place. remaining out of line of sight and behind hard cover 6. telephone bomb threat) • instructions on how to respond to the discovery of a suspicious item or event • a search plan • evacuation plans and details on securing your premises in the event of a full evacuation • your business continuity plan • a communications and media strategy which includes handling enquiries from concerned family and friends.g.Creating your Security Plan The Responsible Person should aim to produce a plan that has been fully exercised. Ensure that whoever found the item or witnessed the incident remains on hand to brief the police. Prevent others from approaching 4. Effective security plans are simple.g. and which is regularly audited to ensure that it is still current and workable. visitors and the public 5. clear and flexible. Move everyone away to a safe distance 3. including known weaknesses such as blind spots in your CCTV system. but must be compatible with existing plans. Security Managers should also be familiar with the advice contained in the ‘Fire Safety Risk Assessment – Small and Medium Places of Assembly and ‘Fire Safety Risk Assessment . Do not touch suspicious items 2. Notify the police 7. When creating your security plan. e. Use hand-held radios or mobile phones away from the immediate vicinity of a suspect item.Large Places of Assembly’ guidance documents. Communicate safely to staff. information and personnel security • instructions on how to respond to a threat (e. Everyone must be clear about what they need to do in a particular incident. evacuation plans and fire safety strategies. your plans must be followed. covering physical. Your planning should incorporate the seven key instructions applicable to most incidents: 1. Once made.
identified person within your organisation having responsibility for security. but they range from basic good housekeeping (keeping communal areas clean and tidy) through mitigation against flying glass. As well as advising you on physical security. Action you should consider Contact your Counter Terrorism Security Adviser (CTSA) through your local police force at the start of the process. bags or other items in odd places. Plan carefully – as this can help keep costs down. Security measures must not compromise customer safety. unnecessary and expensive. Security awareness The vigilance of your staff (including cleaning. intruder alarms. maintenance and contract staff) is essential to your protective measures. 15 . Put in place security measures to remove or reduce your vulnerabilities to as low as reasonably practicable bearing in mind the need to consider safety as a priority at all times. See Access Control Guidance on page 21. they can direct you to professional bodies that regulate and oversee reputable suppliers. carefully placed (rather than dropped) items in rubbish bins and unusual interest shown by strangers in less accessible places. you will need to ensure that all necessary regulations are met. building consents. should be based on a thorough assessment – not least because you might otherwise invest in equipment which is ineffective. health and safety and fire prevention requirements. computer security and lighting. Whilst it is important not to delay the introduction of necessary equipment or procedures. CCTV. Specialist solutions. They must have the confidence to report any suspicions. They will know their own work areas or offices very well and should be encouraged to be alert to unusual behaviour or items out of place.four physical security Physical security is important in protecting against a range of threats and addressing vulnerability. Training is therefore particularly important. Your risk assessment will determine which measures you should adopt. knowing that reports – including false alarms – will be taken seriously and regarded as a contribution to the safe running of the premises. Remember. costs may be reduced if new changes coincide with new building or refurbishment work. to specialist solutions such as mail scanning equipment. such as local planning permission. Invest in good quality access control systems operated by magnetic swipe or contact proximity cards supported by PIN verification. See hostile reconnaissance on page 37. Access Routes Keep access points to a minimum and make sure the boundary between public and private areas of your building is secure and clearly signed. Staff should be briefed to look out for packages. Successful security measures require: • the support of senior management • staff awareness of the measures and their responsibility in making them work • a senior. in particular.
every hour on the hour). See Search Planning on page 25. the basic principle is to keep all vehicles at a safe distance. If you are installing new windows. but before undertaking any improvements seek specialist advice through your police CTSA or visit www. as well as the costs of re-occupation. Many casualties in urban terrorist attacks are caused by flying glass. If possible. As a minimum. keep non-essential vehicles at least 30 metres from your building.gov. Anyone not displaying security passes in private areas should either be challenged or reported immediately to security or management.uk for further details. Doors that are not often used should be internally secured ensuring compliance with relevant fire safety regulations and their security monitored with an alarm system. which must be returned on leaving. which holds fragmented pieces of glass together. well-lit and fitted with good quality locks. Routine searching of premises represents another level of screening covering both internal and external areas. Those requiring essential access should be identified in advance and checked before being allowed through. See also Vehicle Borne Improvised Explosive Devices on page 31. Keep searches regular. traffic-calming measures and robust. Ideally. Traffic and parking controls If you believe you might be at risk from a vehicle bomb. especially in modern buildings and glazing protection is an important casualty reduction measure. careful landscaping. consider laminated glass. you should ensure that you have proper access control. Screening and Patrolling The screening of hand baggage is a significant deterrent that may be a suitable protective security consideration for your bar. pub or nightclub. insist that staff wear their passes at all times and that their issuing is strictly controlled and regularly reviewed. External doors should be strong. For site specific advice and guidance you should contact your local police CTSA. Consider introducing a pass system if you do not have one already. though not too predictable (i. Visitors to private areas should be escorted and should wear clearly marked temporary passes. offers a relatively cheap and rapid improvement to existing glazing. Extensive research has been carried out on the effects of blast on glass. This is particularly important to those premises that have an external search / screening operation in order to prevent unauthorised entry and bypassing any search regime. There are technologies that minimise shattering and casualties. accessible windows should be secured with good quality key operated locks. Doors and windows Good quality doors and windows are essential to ensure building security. The police may provide further advice on improving the security of glazed doors and accessible windows.Security passes If a staff pass system is in place.e. 16 . well-lit barriers or bollards.cpni. Anti-shatter film.
Integrated security systems Intruder alarms. your system must be compliant with the Association of Chief Police Officers’ Scotland (ACPOS) security systems policy (www.police.scottish. Intrusion detection technology can play an important role in an integrated security system. External lighting provides an obvious means of deterrence as well as detection. For further information. 17 . Using CCTV can help clarify whether a security alert is real and is often vital in post-incident investigations. it is as much a deterrent as a means of protection. See CCTV guidance on page 23. All these systems must be integrated so that they work together in an effective and co-ordinated manner. but take into account the impact of additional lighting on neighbours. CCTV and lighting are commonly used to deter crime. but only if the images are good enough to identify what happened and be used in court. If it is carefully designed and used. detect offenders and delay their actions. contact the Alarms Administration Office at your local police headquarters. Remember that CCTV is only effective if it is properly monitored and maintained. If police response to any alarm is required.uk). external lighting will help security staff and improve the capabilities of CCTV systems.
will assist in surveillance and prevent concealment of any packages. • the use of clear bags for waste disposal is a further alternative as it provides an easier opportunity for staff to conduct an initial examination for suspicious items • review the use and security of compactors. stairs. their blast mitigation capabilities and location. do not place litter bins next to or near glazing. rooms and store cupboards • ensure that everything has a place and that things are returned to that place • place tamper proof plastic seals on maintenance hatches • keep external areas as clean and tidy as possible • all premises should have in place an agreed procedure for the management of contractors. (but if you do this ensure that there is additional and prompt cleaning) • alternatively review the management of your litter bins and consider the size of their openings. The vehicle registration mark (VRM) of each vehicle and its occupants should be known to security or management in advance • pruning all vegetation and trees. reception areas. lavatories. including under chairs and sofas. • lock unoccupied offices. entrances. as well as service corridors and yards • keep furniture to an operational minimum – ensuring that there is little opportunity to hide devices.five good housekeeping Good housekeeping improves the ambience of your premises and reduces the opportunity for placing suspicious items or bags and helps to deal with false alarms and hoaxes.e. 19 . You can reduce the number of places where devices may be left by considering the following points: • avoid the use of litter bins in and around your premises if possible. i. their vehicles and waste collection services. wheelie bins and metal bins to store rubbish within service areas and goods entrances • keep public and communal areas – exits. halls. washrooms – clean and tidy. especially near entrances.
See good practice checklist . Management should ensure that Fire Extinguishers are identified as belonging to the premises and check that they have not been interfered with or replaced.housekeeping in Appendix ‘A’. (See bomb threat checklist) A review of your CCTV system to ensure that it has sufficient coverage both internally and externally. All premises security systems should have an uninterrupted power supply (UPS) available and regularly tested. 20 .Additionally consider the following points: Ensure that all staff are trained in bomb threat handling procedures or at least have ready access to instructions – and know where these are kept.
e. carry out a further risk assessment and address any vulnerabilities accordingly. Access control is only one important element of your overall security system. Are you aware of the actions required on system breakdown? Do you have a satisfactory system maintenance agreement in place? Interaction Your access control system should support other security measures. not public entrances. This relates to ‘back of house’ areas. Compliance Your access control system should be compliant with: • The Disability Discrimination Act 1995 • The Data Protection Act 1998 • The Human Rights Act 1998 • Fire (Scotland) Act 2005 • Health and Safety Acts Objectives Are your security objectives being met? If necessary. a terrorist needs physical access in order to reach the intended target. Appearance The access control system to your private areas and back of house corridors is often the first impression of security made upon visitors to your premises if you do not operate an overt screening regime outside. Ensure that your entry and exit procedures allow legitimate users to pass without undue effort and delay. Ease of access Examine the layout of your system. Take into account any special features you may require. with appropriate access control measures into and out of the private side. Consider system compatibility. log books and service schedules.six access control There should be clear demarcation between public and private areas. Training Ensure your staff are fully aware of the role and operation of your access control system. Risk assessment Refer to ‘managing the risks’ on page 9 and decide the level of security you require before planning your access control system. See Good Practice Checklist – Access Control and Visitors in Appendix ‘B’ 21 . REMEMBER Whether driving a lorry or carrying explosives.g. Your installer should provide adequate system training. System maintenance Your installer should supply all relevant system documentation.
you should liaise with your local police to establish that your system software is compatible with theirs to allow retrieval and use of your images for evidential purposes. Consider also the following points: • ensure the date and time stamps of the system are accurate • regularly check the quality of recordings • digital CCTV images should be stored in accordance with the evidential needs of the police. With more organisations moving towards digital CCTV systems.seven cctv guidance CCTV can help clarify whether a security alert is real and is often vital in any post incident investigation. You should constantly monitor the images captured by your CCTV system or regularly check recordings for suspicious activity ensuring at all times full compliance with the Data Protection Act 1998 which should be specified in your CCTV Data Protection Policy. including ‘CCTV Operational Requirements Manual’ (Ref: 55/06). ‘UK Police Requirements for Digital CCTV Systems’ (Ref: 09/05). and ‘Performance Testing of CCTV Systems’ (Ref: 14/95). detect intruders through doors or corridors and produce images of evidential quality? • are the CCTV cameras in use for the protective security of your premises integrated with those used to monitor customer movement? • would the introduction of an Automatic Number Plate Reader (ANPR) system complement your security operation? The Home Office Scientific Development Branch (HOSDB) formerly known as the Police Scientific Development Branch (PSDB) has published many useful documents relating to CCTV. Ask yourself the following questions: • is your CCTV system currently achieving what you require it to do? Do you need it to confirm alarms. CCTV cameras should cover all the entrances and exits to your premises and other areas that are critical to the safe management and security of your operation. Refer to HOSBD publication 09/05 • ensure that appropriate lighting complements the system during daytime and darkness hours • for analogue systems change tapes daily – use no more than 12 times • keep your tapes for at least 31 days • use good quality video tape and check it regularly by playing it back on a different machine • ensure the images recorded are clear – that people and vehicles are clearly identifiable 23 .
evacuation or search? See Good Practice Checklist – CCTV in Appendix ‘C’ CCTV Maintenance CCTV maintenance must be planned and organised in advance and not carried out on an ad hoc basis. codes of practice and audit trails • give consideration to the number of camera images a single CCTV operator can effectively monitor at any one time • do you have sufficient qualified staff to continue to monitor your CCTV system during an incident. What occurs if a system is not maintained? • The system gets DIRTY causing poor usability • CONSUMABLES wear causing poor performance • Major parts FAIL • WEATHER damage can cause incorrect coverage • DELIBERATE damage/environmental changes can go undetected 24 . If regular maintenance is not carried out.• check that the images captured are of the right area • implement standard operating procedures. the system may eventually fail to meet its Operational Requirement (OR).
you will also need to search it in order to ensure it is safe for re-occupancy • the police will not normally search bars. But they must be familiar with the place they are searching.eight search planning Searches of bars. searchers should search in pairs. therefore. Search Plans • search plans should be prepared in advance and staff should be trained in them • the conduct of searches will depend on local circumstances and local knowledge. The following advice is generic for most premises. to ensure searching is systematic and thorough. but the overall objective is to make sure that the entire premises and grounds are searched in a systematic and thorough manner so that no part is left unchecked • if you decide to evacuate your premises in response to an incident or threat. pubs and nightclubs should be conducted as part of your daily good housekeeping routine. If considered necessary advice and guidance on searching should be available from your local CTSA or Police Search Adviser (POLSA). search as quickly or as thoroughly as a member of staff or security personnel • the member(s) of staff nominated to carry out the search do not need to have expertise in explosives or other types of device. will fall upon management and staff. pubs or nightclubs. They cannot. that cannot be accounted for and items that are out of place • ideally. but recognises that they are built and operate differently. They are not familiar with the layout and will not be aware of what should be there and what is out of place. They are looking for any items that should not be there. 25 . following a vulnerability and risk assessment. It is recognised that for the majority of premises responsibility for the implementation of any search planning. They should also be conducted in response to a specific threat and when there is a heightened response level. (See High Profile Events on page 41).
They also need to be able to search without unduly alarming any visitors or customers. then a search of the assembly areas. Remember to include the stairs. Ensure the searchers know what to do if they discover a suspicious item. remaining out of line of sight and behind hard cover 6. You could: • send a message to the search teams over a public address system (the messages should be coded to avoid unnecessary disruption and alarm) • use personal radios or pagers. corridors. Exercise your search plan regularly. Use hand-held radios or mobile phones away from the immediate vicinity of a suspect item. Communicate safely to staff. Prevent others from approaching 4.signed when completed . the routes to them and the surrounding area should also be made prior to evacuation. Each sector must be of manageable size. Notify the police 7. Discuss your search plan with your local police Counter Terrorism Security Adviser (CTSA) or Police Search Adviser POLSA. visitors and the public 5. The sectorised search plan should have a written checklist .Action You Should Take Consider dividing your premises into sectors. as well as car parks. service yards and other areas outside the building.for the information of the premises manager. Ensure that whoever found the item or witnessed the incident remains on hand to brief the police. toilets and lifts in the search plan. fire escapes. The searchers need to get a feel for the logical progression through their designated area and the length of time this will take. but the general “golden rules” are: 1. Do not touch suspicious items 2. Move everyone away to a safe distance 3. Action will depend on the nature of the device and the location. See good practice checklist – Searching in Appendix ‘D’ 26 . If evacuation is considered or implemented. Consider the most effective method of initiating a search when you are open for business.
Door supervisors should have an understanding of hostile reconnaissance. Door supervisors should record all incidents in the Security Incident Logbook and a personal notebook. recorded and supervised. however such measures must not compromise the safety of customers and staff.nine door supervisors Door supervisors are a key element in deterring and disrupting the threat from terrorism and other crime. contact the AntiTerrorist Hotline – 0800 789 321. Persons loitering nearby who have no apparent affiliation with the venue should be spoken and their movements questioned. A command and communication structure should be established to ensure that all incidents are reported. The need to be alert to what is happening beyond the immediate front entrance of their premises and any approach routes is essential. A personal notebook should only be used for work related incidents in case it is required to be produced as evidence in court. All door supervisors should be familiar with existing local crime prevention measures and should further consider terrorism as they carry out their responsibilities. who should make a risk assessment as to how the information should be managed and the required police response. Reporting suspicious activity that does not require an immediate response. Although the main role of door supervisors is to make sure that customers have an enjoyable experience in a safe environment. they are also essential and additional ‘eyes and ears’ for Police. Any incident that requires an immediate police response – dial 999. Increased vigilance and robust security measures will deter and disrupt terrorist activity. 27 . be alert to instances where hostile reconnaissance may be taking place and be aware of how to report suspicious activity. All staff should report suspicious sightings to the Head Door Supervisor.
In all cases the Designated Premises Supervisor. full descriptions of any suspects (including clothing and anything being carried). vehicle description and registration marks. Door Supervisors should be alert to the fact that vehicles are used to carry explosive devices. It is also an offence to employ a Door Supervisor who does not have a licence. monitored and communication established between the customers forming it and Door Supervisors. See Hostile Reconnaissance on page 37. Attention should be paid to vehicles parking outside venues and vigilance should be extended to the entire building perimeter. Door Supervisors working in England and Wales must have a licence to practice issued by the Security Industry Authority. The queue should be orderly. Remember! If unattended or suspicious objects are brought to the attention of Door Supervisors by staff or members of the public. any witnesses and if the incident was recorded by CCTV. the seven key instructions previously mentioned on pages 14 and 26 of this guidance should be instigated. Security staff deployed externally should adopt a ‘see and be seen’ approach and where possible. It is an offence to work as a Door Supervisor if you do not have a licence. police any queuing outside their premises. Personal Licence Holder. 28 . including contractors and Local Authority vehicles. Any lack of vigilance around the queue affords anonymity to a potential terrorist. NOTE Under the Private Security Industry Act. or Manager must be informed and an entry in the venue’s incident book recorded. Vehicles such as the traditional black cab and mini cabs have been used previously as explosive devices. Do not become complacent around vehicles that appear to be the norm.Notes may include. This legislation will come into effect in Scotland from November 2007.
if available • evacuation of all staff apart from designated searchers. this distance would put them beyond police cordons – although it would be advisable to have an alternative about 1km away. for instance. If it is within the building you may consider evacuation. an unclaimed hold-all or rucksack) • discovery of a suspicious item or vehicle outside the building • an incident to which the police have alerted you. such as a protected space. Appoint people to act as marshals and as contacts once the assembly area is reached. you should tell the police as soon as possible what action you are taking. Assembly areas should be at least 500 metres away from the incident. the plan may include: • full evacuation outside the building • evacuation of part of the building. In exceptional cases they may insist on evacuation. if the device is small and thought to be confined to one location • full or partial evacuation to an internal safe area. 29 . Evacuation Evacuation instructions must be clearly communicated to staff and routes and exits must be well defined. but if the device is outside the building it may be safer to stay inside. In the case of most vehicle bombs. For example.ten evacuation planning As with search planning. if an evacuation route takes people right past a suspect device outside your building. The decision to evacuate will normally be yours. although they should always do so in consultation with the premises manager. but the police will advise. external evacuation may not be the best course of action. or areas where a larger secondary device could detonate. Whatever the circumstances. A general rule of thumb is to find out if the device is external or internal to your premises. You might need to evacuate your premises because of: • a threat received directly by your premises • a threat received elsewhere and passed on to you by the police • discovery of a suspicious item in your building (perhaps a postal package. or through an area believed to be contaminated. evacuation should be part of your security plan. The biggest dilemma facing anyone responsible for an evacuation plan is how to judge where the safest place might be. Depending on the size of your business and the location of the building. A very important consideration when planning evacuation routes in response to near simultaneous terrorist attacks is to ensure people are moved away from other potential areas of vulnerability. Planning and initiating evacuation should be the responsibility of the security manager.
g. Biological and Radiological Incidents Responses to CBR incidents will vary more than those involving conventional or incendiary devices. flying glass and other fragments. to let the police know what action you are taking during any incident. 30 . assessments or treatment • if an incident occurs outside the building. Car parks should not be used as assembly areas and furthermore assembly areas should always be searched before they are utilised. close all doors and windows and switch off any systems that draw air into the building. the local authority and neighbours. Since glass and other fragments may kill or maim at a considerable distance from the centre of a large explosion. ventilation and air conditioning (HVAC) systems and how these may contribute to the spread of CBR materials within the building. an IED might also involve the release of CBR material • in the event of a suspected CBR incident within the building. whether exposed or not. Ensure that staff with particular responsibilities are trained and that all staff are drilled. Managers should ensure that they have a working knowledge of the heating. They may also offer the best protection when the location of the possible bomb is unknown.It is important to ensure that staff are aware of the locations of assembly areas for incident evacuation as well as those for fire evacuation and that the two are not confused by those responsible for directing members of the public to either. Agree your evacuation plan in advance with the police and emergency services. but the following general points should be noted: • the exact nature of an incident may not be immediately apparent. when it may be near your external evacuation route or when there is an external CBR attack. Remember. Protected Spaces Protected spaces may offer the best protection against blast. to leave evacuation areas before the emergency services have given medical advice. Do not allow anyone. When choosing a protected space. moving staff and customers into protected spaces is often safer than evacuating them onto the streets. drinking water and communications. seek advice from a structural engineer with knowledge of explosive effects and do not neglect the provision of toilet facilities. ventilation and other systems or items that circulate air (e. Disabled staff should be individually briefed on their evacuation procedures. • Chemical. seating. For example. In the case of suspected: • Letter or parcel bombs Evacuate the room and the floor concerned and the adjacent rooms along with the two floors immediately above and below. switch off all air conditioning. too. fans and personal computers).
paying particular attention to windows. Effects of VBIED’s VBIED’s can be highly destructive. Terrorists generally select targets where they can cause most damage. flying debris such as glass can present a hazard many metres away from the seat of the explosion. terrorists will seek to obtain the maximum impact for their investment. What you can do If you think your premises could be at risk from any form of VBIED you should: • ensure you have effective vehicle access controls. Seek the advice of your local Police Counter Terrorism Security Adviser (CTSA) on what these should be and on further measures such as electronic surveillance including Automatic Number Plate Recognition (ANPR) and protection from flying glass • assembly areas must take account of the proximity to the potential threat. It can be detonated from a safe distance using a timer or remote control. Because of this. the bomb can be delivered at a time of the terrorist’s choosing and with reasonable precision. depending on defences. Building a VBIED requires a significant investment of time. it may be safer in windowless corridors or basements than outside • consider using robust physical barriers to keep all but authorised vehicles at a safe distance. or can be detonated on the spot by a suicide bomber. particularly at goods entrances and service yards. depending on where the suspected VBIED is parked and the design of your building. It is not just the effects of a direct bomb blast that can be lethal. Have the structures reviewed by a qualified security/structural engineer when seeking advice on protected spaces • establish and rehearse bomb threat and evacuation drills. Once assembled. inflict mass casualties or attract widespread publicity. Do not allow unchecked vehicles to park in underground car parks or service areas directly below public areas where there will be large numbers of people and where there is a risk of structural collapse • insist that details of contract vehicles and the identity of the driver and any passengers approaching your goods/service areas are authorised in advance • do what you can to make your premises blast resistant. resources and expertise. Bear in mind that. They are capable of delivering a large quantity of explosives to a target and can cause a great deal of damage. You should bear in mind that a vehicle bomb delivered into your building – for instance via underground car parks or through the front of your premises – could have a far greater destructive effect on the structure than an externally detonated device 31 .eleven vehicle borne improvised explosive devices (VBIEDs) Vehicle Borne Improvised Explosive Devices (VBIEDs) are one of the most effective weapons in the terrorist’s arsenal.
and in receiving and acting upon bomb threats. See Good Practice Checklist – Access Control in Appendix ‘B’ 32 . Key information and telephone numbers should be prominently displayed and readily available • it should be emphasised that the installation of physical barriers needs to be balanced against the requirements of safety and should not be embarked upon without full consideration of planning regulation and fire safety risk assessment.• train and rehearse your staff in identifying suspect vehicles.
setting up regular patrols and briefing staff to look out for anyone behaving suspiciously. so remain vigilant and report anyone suspicious to the police. Many bomb attacks are preceded by reconnaissance or trial runs. key installations. think in terms of: • using physical barriers to prevent a hostile vehicle from driving into your premises through pedestrian entrances. plane or other kind of vehicle as a bomb or may carry or conceal explosives on their persons. Good quality images can provide crucial evidence in court • there is no definitive physical profile for a suicide bomber. goods/service yards or underground areas • denying access to any vehicle that arrives at your goods/service entrances without prior notice and holding vehicles at access control points until you can satisfy yourself that they are genuine • wherever possible.page 37 33 . When considering protective measures against suicide bombers. Ensure that such incidents are reported to the police • ensure that no one visits your protected area without your being sure of his or her identity or without proper authority. Seek further advice through your local police force’s CTSA • effective CCTV systems may deter a terrorist attack or even identify planning activity. establishing your vehicle access control point at a distance from the protected site. Both kinds of attack are generally perpetrated without warning. Suicide bombers may use a lorry. See Hostile Reconnaissance . VIPs or masscasualty crowded places. The most likely targets are symbolic locations.twelve suicide attacks The use of suicide bombers is a very effective method of delivering an explosive device to a specific location.
All Security Managers should involve their local Police Counter Terrorism Security Adviser when considering improvements to their premises and/or its environs. customers. See Good Practice Checklist – Communication in Appendix ‘E’ 35 . Security issues should be discussed and determined at Board level and form a part of the organisation’s culture. This will include the emergency services. pubs and nightclubs should consider having a supply of posters and material (even via web links) to support crime prevention and counter terrorism messages and initiatives. It should be remembered that immediately following a terrorist attack. contractors. All bars.g. Consideration should be given to the use of the organisation’s website and/or publications to communicate crime prevention and counter terrorism initiatives. Premises Managers should regularly meet with staff to discuss security issues and encourage staff to raise their concerns about security.thirteen communication You should consider a communication strategy for raising awareness among staff and others who need to know about your security plan and its operation. clients. There should also be arrangements for dealing with people who may be affected by your security operation but who are not employees of your organisation (e. mobile telephone communication may be unavailable due to excessive demand. visitors). local authorities and possibly neighbouring premises.
research. Hostile reconnaissance is used to provide information to operational planners on potential targets during the preparatory and operational phases of terrorist operations. investigate and analyse: • suspicious sightings • suspicious activity at or near: • crowded places or prominent or vulnerable: • buildings • structures • transport infrastructure. Reconnaissance operatives may visit potential targets a number of times prior to the attack. of critical infrastructures. What to look for. electricity transformers. telephone cables etc 37 . The ability to recognise those engaged in hostile reconnaissance could disrupt an attack and produce important intelligence leads. particular attention is paid to any variations in security patterns and the flow of people in and out. but with caution • overt/covert photography. entrances and queues. doors. maps. delivery gates. Tourists should not necessarily be taken as such and should be treated sensitively. Where pro-active security measures are in place.fourteen hostile reconnaissance Operation Lightning is a national intelligence gathering operation to record. video cameras. • groups or individuals taking significant interest in the location of CCTV cameras and controlled areas • people taking pictures – filming – making notes – sketching of the security measures in and around your premises. Primary Role of Reconnaissance • obtain a profile of the target location • determine the best method of attack • determine the optimum time to conduct the attack. possession of photographs. • significant interest being taken in the outside of your premises including parking areas. gas pipelines. blueprints etc.
GPS will assist in the positioning and correct guidance of weapons such as mortars and Rocket Propelled Grenades (RPGs). street sweepers. (cameras. breaches in fence lines or walls or the concealment in hides of mortar base plates or assault equipment. car recovery companies. zoom lenses. with one or more people remaining in the vehicle. ladders. This should be considered a possibility up to one kilometre from any target • vehicles parked outside buildings of other facilities. Regular perimeter patrols should be instigated months in advance of a high profile event to ensure this is not happening • attempts to disguise identity – motorcycle helmets. global positioning systems. (GPS). or multiple sets of clothing to change appearance • constant use of different paths. hoodies etc. i. ‘Learning the route’ or foot surveillance involving a number of people who seem individual but are working together • multiple identification documents – suspicious. 38 . altered documents etc • non co-operation with police or security personnel • those engaged in reconnaissance will often attempt to enter premises to assess the internal layout and in doing so will alter their appearance and provide cover stories • in the past reconnaissance operatives have drawn attention to themselves by asking peculiar and in depth questions of employees or others more familiar with the environment • sightings of suspicious activity should be passed immediately to the premises management for CCTV monitoring and the event recorded for evidential purposes. for longer than would be considered usual • parking. leaving hoax devices or packages) • the same vehicle and different individuals or the same individuals in a different vehicle returning to a location(s) • the same or similar individuals returning to carry out the same activity to establish the optimum time to conduct the operation • unusual activity by contractor’s vehicles • recent damage to perimeter security. RAC etc) or local staff • simple observation such as staring or quickly looking away • activity inconsistent with the nature of the building • noted pattern or series of false alarms indicating possible testing of security systems and observation of response behaviour and procedures. photographic equipment.e. food etc. standing or loitering in the same area on numerous occasions with no apparent reasonable explanation • prolonged static surveillance using operatives disguised as demonstrators.• possession of maps. (AA. (bomb threats. and/or access routes across a site. counterfeit. camcorders). etc or stopping and pretending to have car trouble to test response time for emergency services. ropes.
Reconnaissance trips may be undertaken as a rehearsal to involve personnel and equipment that will be used in the actual attack e. contact the ANTI-TERRORIST HOTLINE – 0800 789 321 ANY INCIDENT THAT REQUIRES AN IMMEDIATE RESPONSE – DIAL 999. Reporting suspicious activity to police that does not require an immediate response. before the London attacks on 7th July 2005. the bombers staged a trial run nine days before the actual attack.g.Reconnaissance operatives may also seek additional information on: • width surveys of surrounding streets – exploring the range of tactical options available to deliver the device • levels of internal and external security – are vehicle/person/bag searches undertaken? THE ROLE OF THE RECONNAISSANCE TEAM HAS BECOME INCREASINGLY IMPORTANT TO TERRORIST OPERATIONS. 39 .
A report. identifying all the key individuals. The POLSA will carry out an assessment of the venue and nature of the event. who may in turn. This may involve pre-event publicity of the attendance of a VIP or celebrity. which will include liaison with premises management. resulting in additional crowd density on the event day and the need for an appropriate security response and increased vigilance. 41 . The SECCO works towards the strategy set by the police Strategic Commander and acts as an adviser and co-ordinator of security issues. A number of options and resources are available to the SECCO. In certain cases the local police may appoint a police Strategic Commander with responsibility for the event.fifteen high profile events There may be events. Police Security Co-ordinator The Security Co-ordinator (SECCO) has a unique role in the planning and orchestration of security measures at high profile events. including the POLSA’s assessment. are deemed to be more high profile than normal day to day operations. agencies and departments involved in the event as well as seeking advice from the relevant CTSA. taking into consideration an up to date threat assessment and other security issues. recommendations and subsequent search plan will be submitted through the SECCO to the Strategic Commander. which for various reasons. appoint a Police Security Co-ordinator (SECCO) and/or a Police Search Adviser (POLSA). Police search adviser The SECCO can deem it necessary to appoint a Police Search Adviser (POLSA) to a high profile event. The SECCO will provide the Strategic Commander with a series of observations and recommendations to ensure that the security response is realistic and proportionate.
sixteen threat levels As of 1st August 2006. There are three levels of response which broadly equate to threat levels as shown below: CRITICAL SEVERE SUBSTANTIAL MODERATE LOW EXCEPTIONAL HEIGHTENED NORMAL 43 . They are informed by the threat level but also take into account specific assessments of vulnerability and risk. pubs and nightclubs are reminded that SUBSTANTIAL and SEVERE both indicate a high level of threat and that an attack might well come without warning. operate. whereas threat levels usually relate to broad areas of activity. Response levels tend to relate to sites. The security measures deployed at different response levels should not be made public. Terrorism threat levels are designed to give a broad indication of the likelihood of a terrorist attack. to avoid informing terrorists about what we know and what we are doing about it. New Threat Level Definitions CRITICAL SEVERE SUBSTANTIAL MODERATE LOW AN ATTACK IS EXPECTED IMMINENTLY AN ATTACK IS HIGHLY LIKELY AN ATTACK IS A STRONG POSSIBILITY AN ATTACK IS POSSIBLE BUT NOT LIKELY AN ATTACK IS UNLIKELY Response Levels Response levels provide a broad indication of the protective security measures that should be applied at any particular time. manage or work in bars. recent events and what is known about terrorist intentions and capabilities. In particular. There are a variety of site specific security measures that can be applied within response levels. although the same measures will not be found at every location. They are based on the assessment of a range of factors including current intelligence. those who own. Home Office and UK Intelligence Community Websites. This information may well be incomplete and decisions about the appropriate security response should be made with this in mind. information about the national threat level is available on the Security Service.
NORMAL HEIGHTENED EXCEPTIONAL What can I do now? • carry out a risk and vulnerability assessment that is specific to your bar. All protective security measures should be identified in advance of any change in threat and response levels and should be clearly notified to those staff who are responsible for ensuring compliance. appropriate to your business and location.Response Level Definitions RESPONSE LEVEL DESCRIPTION Routine baseline protective security measures. 44 . Maximum protective security measures to meet specific threats and to minimise vulnerability and risk. Additional and sustainable protective security measures reflecting the broad nature of the threat combined with specific business and geographical vulnerabilities and judgements on acceptable risk. Your CTSA can assist you with this. • identify a range of practical protective security measures appropriate for each of the response levels. • make use of the good practice checklists on the following pages to assist you in your decision making process. pub or nightclub. The counter measures to be implemented at each response level are a matter for individual premises or organisations and will differ according to a range of circumstances.
The checklists should be considered taking the following factors into account: • have you consulted your police CTSA.good practice checklists The following checklists are intended as a guide for those who own. local authority and local fire and rescue service? • who else should be included during consultation? • which measures can be implemented with ease? • which measures will take greater planning and investment? appendix a Housekeeping Good Practice Yes Have you reviewed the use and location of all waste receptacles in and around your premises. They are not however exhaustive and some of the guidance might not be relevant to all bars. pubs and nightclubs. reception areas and toilets clean and tidy? Do you keep furniture to a minimum to provide little opportunity to hide devices. exits. compactors and industrial waste bins when not required for immediate use? Do you encourage your staff to remain vigilant at all times for suspicious activity or behaviour? Are your reception staff and deputies trained and competent in managing telephoned bomb threats? Have you considered marking your first aid fire fighting equipment as your property and checked it has not been replaced? Do you ensure that your emergency exits cannot be utilised to by-pass any security or screening regime you have in place? No Unsure 45 . manage or work in bars. taking into consideration their proximity to glazing and building support structures? Do you keep external areas. entrances. pubs and nightclubs to assist them in identifying the hazards and risks associated with counter terrorism planning. stairs. including under chairs and sofas? Are unused offices. operate. rooms and function suites locked? Do you use seals/locks to secure maintenance hatches.
until they are authorised by your security? Do you have in place physical barriers to keep all but authorised vehicles at a safe distance and to mitigate against a hostile vehicle attack? Is there clear demarcation identifying the public and private areas of your premises? Do your staff. cleaners and other employees wear ID badges at all times when in the premises? Are visitors’ badges designed to look different from staff badges? Are all visitors’ badges collected from visitors when they leave the premises? Does a member of staff accompany visitors at all times while in the private areas or your premises? Do you adopt a ‘challenge culture’ to anybody not wearing a pass in your private areas? Do you insist that details of contract vehicles and the identity of the driver and any passengers requiring permission to park and work in your premises are authorised in advance? Do you require driver and vehicle details of waste collection services in advance? No Unsure 46 . including contractors. Pubs and Nightclubs Yes Do you prevent all vehicles from entering goods or service areas directly below.appendix b Access Control and Visitors to Bars. above or next to pedestrian areas where there will be large numbers of people.
cash offices and back of house corridors? Do you store the CCTV images in accordance with the evidential needs of the police? Could you positively identify an individual from the recorded images on your CCTV system? Are the date and time stamps of the system accurate? Does the lighting system complement the CCTV system during daytime and darkness hours? Do you regularly check the quality of your recordings? Have you implemented operating procedures. codes of practice and audit trails? Is each CCTV camera doing what it was installed to do? No Unsure 47 . back up generators.appendix c CCTV Yes Do you constantly monitor your CCTV images or playback recordings for evidence of suspicious activity? Do you have your CCTV cameras regularly maintained? Do the CCTV cameras cover all entrances and exits to your premises? Have you considered the introduction of ANPR to complement your security operation? Do you have CCTV cameras covering critical areas in your business.
lifts.appendix d Searching Yes Do you exercise your search plan regularly? Do you carry out a sectorised. systematic and thorough search of your premises as a part of routine housekeeping and in response to a specific incident? Does your search plan have a written checklist – signed by the person searching as complete for the information of the premises Manager? Does your search plan include toilets. back of house corridors. visitors and customers of your searching policies as well as crime prevention and counter terrorism messages? Are your searching staff trained and properly briefed on their powers and what they are searching for? Do you have sufficient staff to search effectively? Do you search your evacuation routes and assembly areas before they are utilised? No Unsure 48 . car parks and service areas? Have you considered a vehicle search regime at goods/service entrances that is flexible and can be tailored to a change in threat or response level? Do you conduct overt searches of customers as a visual deterrent or can you implement such a measure if there is an increase in threat/response level? Do you make use of your company website/publications to inform contractors.
appendix e Communication Yes Are security issues discussed/decided at Board level and form a part of your organisation’s culture? Do you have a security policy or other documentation showing how security procedures should operate within your business? Is this documentation regularly reviewed and if necessary updated? Do you regularly meet with staff and discuss security issues? Do you encourage staff to raise their concerns about security? Do you know your local Counter Terrorism Security Adviser (CTSA) and do you involve him/her in any security developments? Do you speak with neighbouring businesses on issues of security and crime that might affect you all? Do you remind your staff to be vigilant when travelling to and from work. 49 . If you answered ‘no’ to any question then you should seek to address that particular issue as soon as possible. including an advance warning regarding searching? No Unsure What do the results show? Having completed the various ‘Good Practice’ checklists you need to give further attention to the questions that you have answered ‘no’ or ‘don’t know’ to. Where you have answered ‘yes’ to a question. and to report anything suspicious to the relevant authorities or police? Do you make use of your company website. find out more about that particular issue to reassure yourself that this vulnerability is being addressed or needs to be addressed. If you answered ‘don’t know’ to a question. to communicate crime and counter terrorism initiatives. remember to regularly review your security needs to make sure that your security measures are fit for that purpose.
Visit www.gov. record number shown: ___________________________________________________________________________________________________________________ Inform the premises manager of name and telephone number of the person informed: ___________________________________________________________________________________________________________________ Contact the police on 999. your extension number): ___________________________________ 50 .did you place the bomb? .Record the exact wording of the threat: ___________________________________________________________________________________________________________________ ___________________________________________________________________________________________________________________ Ask the following questions: . Time and date of call: Length of call: _______________________________________________________________________________________ ________________________________________________________________________________________________ Number at which call was received (i.what is your name? . Time informed: ____________________________________________________________ The following part should be completed once the caller has hung up and the premises manager has been informed.bomb threat checklist This checklist is designed to help your staff to deal with a telephoned bomb threat effectively and to record the necessary information.why? _________________________________________________________________________________ __________________________________________________________________________________________________________ ________________________________________________________________________________________ ______________________________________________________________________________________ ________________________________________________________________________ .what is your telephone number? (Record time call completed:) Where automatic number reveal equipment is available.what kind of bomb is it? .when is it going to explode? .cpni.Tell the caller which town/district you are answering from .where is the bomb right now? .what does it look like? ___________________________________________________________________________ _____________________________________________________________________________ ____________________________________________________________________________________ __________________________________________________________________________________ ___________________________________________________________________________ .e.Switch on tape recorder/voicemail (if connected) .uk to download a PDF and print it out. Actions to be taken on receipt of a bomb threat: .what will cause it to explode? .what is your address? .
ABOUT THE CALLER Sex of caller: Nationality: Age: __________________________________________________________________________________________________ ____________________________________________________________________________________________________ ____________________________________________________________________________________________________________ THREAT LANGUAGE (tick) Well spoken? Irrational? Taped message? Offensive? Incoherent? Message read by threat-maker? BACKGROUND SOUNDS (tick) Street noises? House noises? Animal noises? Crockery? Motor? Clear? Voice? CALLER'S VOICE (tick) Calm? Crying? Clearing throat? Angry? Nasal? Slurred? Excited? Stutter? Disguised? Slow? Lisp? Accent? If so. what type?____________________ Rapid? Deep? Hoarse? Laughter? Familiar? If so. whose voice did it sound like? _________________________________________________ Static? PA system? Booth? Music? Factory machinery? Office machinery? Other? (specify) ________________________________ OTHER REMARKS _______________________________________________________ _______________________________________________________ _______________________________________________________ _______________________________________________________ Signature _______________________________________________________ Date ________________________________________________ Print name _______________________________________________________ 51 .
0870 603 8783 www.gov.gov.gov.homeoffice. It outlines the various activities that constitute a personnel security regime.thebci. By following the guidance in both booklets.useful publications and contacts Publications Protecting Against Terrorism (2nd Edition) This 38 page booklet gives general protective security advice from Mi5’s Centre for the Protection of National Infrastructure (CPNI).cpni. It provides guidance and information to help improve basic security.londonprepared. or to limit the damage terrorism might cause.gov. for Communities & Local Government t.gov.gov. It advises on business continuity in the event and aftermath of an emergency and contains useful ideas on key business continuity management processes and a checklist.uk Anti Terrorist Branch Hotline: 0800 789321 Dept.uk 52 .cpni. Ideally it should be read in conjunction with Expecting the Unexpected which is mentioned above.uk London Prepared www.hosdb.cpni. It is aimed at businesses and other organisations seeking to reduce the risk of a terrorist attack. 01727 816400 www. 020 7931 7142 www.homeoffice.gov.uk Contacts NaCTSO (National Counter Terrorism Security Office) t. police and business continuity experts.gov.cfoa. Personnel Security: Managing the Risk This booklet has been developed by the CPNI.scottish.org. 020 7944 4400 www.uk The Business Continuity Institute t.org Preparing for Emergencies www.cpni.uk HOSDB (Home Office Scientific Development Branch) t.the-sia. As such it provides an introductory reference for security managers and human resource managers who are developing or reviewing their approach to personnel security.gov. companies are in the best position to prevent.uk SIA (Security Industry Authority) t. Secure in the Knowledge This guide is aimed mainly at small and medium-sized businesses. 020 7227 3600 www.gsi. 020 7035 4848 www.uk to request a copy.scotland.police. Both booklets are available to download at www.gov.uk Scottish Executive t: 08457 741 741 www. The booklet is available in PDF format and can be downloaded from www.uk ACPOS (Association of Chief Police Officers Scotland) t.uk or email firstname.lastname@example.org Chief Fire Officers Association t: 01827 302300 www. The booklet is available in PDF format and can be downloaded from www.org.nactso.gov.uk Home Office t.gov. 0141 532 2052 www.uk Security Service www. manage and recover from a range of threats to their business.uk Expecting the Unexpected This guide is the result of a partnership between the business community.
Acknowledgments With thanks to the following for their knowledge. 25 Victoria Street. . 3344583 Registered office. expertise and time Centre for the Protection of National Infrastructure Fisher Scoggins LLP Institute of Licensing National Pubwatch Bar Entertainment and Dance Association (BEDA) Federation of Licensed Victuallers Association British Beer and Pub Association British Hospitality Association Mitchells and Butlers Metropolitan Police Service (Clubs and Vice Unit) Home Office © ACPO 2007. London SW1H 0EX. Registered No. The Association is a private company limited by guarantee.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue reading from where you left off, or restart the preview.