Letter Bombs, Suspect Packages & Post Room Threats

Seven explosive devices have been posted in the last three weeks to offices related to motoring. The buildings are in London, Berkshire and Swansea. Until recently those recipients of the letter bombs may have never considered them to be any form of target.

We don’t naturally think of such attacks in these type of organisations and it may be that no risk assessment or appropriate protective security measures were in force, bombreport simply because an attitude might be “it wouldn’t happen to us” … but it did.

A risk assessment would help decide on the type of threats one might face and their likelihood of happening. The first thing one should do is identify the organisations vulnerabilities and the potential impact of exploitation.

Study the short list below and ask key members as well as your security team for opinions.

· What are we learning from the media regarding recent terrorist activities?

· Is there anything about the organisation, personnel, whybitcoinprice actual building and other occupiers that could possibly attract an attack?

· If neighbours are a possible high-risk, could you suffer collateral damage occurring from an attack directed at a neighbour?

· Does your organisation have anything that terrorists are likely to want; this includes access to other premises that might be targets?

Whilst you are looking at this list and answering the questions, it is worth focusing on the fact the letter bombs sent to offices in January and February of 2007 were organisations dealing with motorists. Would you have guessed that a disgruntled driver might decide to send letter bombs for vengeance? These things can spread, not purely to the actual organisation that endorses your driving license but to the company that manufacturer the speed cameras. Then the installers, and then the operators … where will it end.

Look deeply into your organisation, your staff, your building and your neighbours. Then identify your vulnerabilities and decide what needs protecting. There is a logical order of priorities starting with people, no matter what position; customers, staff, contractors and visitors.. They are all people. You then need to look at physical assets, sensitive materials (these might be plans, ID documents, passwords and codes), ufa168live other contents such as equipment. Then, deal with information, both hard copies and electronic. Finally look at your processes and services that are essential to the running of your organisation.

If you feel that you are at risk, it is important to contact the Counter Terrorist Security Advisor within your local police station.

It is highly likely that you have plans in place to deal with fire, flood or burglary. You probably have IT back up, firewalls and anti-virus protection. Have you got a thoroughly efficient procedure for vetting staff?

How often do you review these plans? It should be on a regular basis and if you haven’t built in a higher security arrangement, do it now.

We have all heard the saying “putting your feet in someone else’s shoes”. Now is the time to practice this, especially if you feel that you are at risk of attack. The reasons might be because of the very nature of your service, business or the location of your premises. Assess you vulnerability by then considering what others could find out about you.

Conduct a ‘vanity search’ type your name in Google … and all other search engines, don’t just look at the first page – take time and go through the first ten pages (at least). Call your local library and ask what information they might have on your organisation; you need to become a private eye!

What services come into your building that is vital to your business? If they were stopped, terminated, or suspended -what affect will it have? Identify them and develop measures to ensure the continuation of the business.

All your staff need to be security conscious but what is the point in discussing top security measures if you have the enemy within? Security consciousness is of paramount importance but don’t give away sensitive security information .

Is this the time to start a vetting process on all employees? 1 year ago, artistpose 2 years ago, 3 years ago and so on, they were fine but suppose their lifestyles and relationships have changed? New in-laws may now become a threat!

Take a look at your present security. Building security, Contents security, Personal security – adopt an integrated approach to security; from access control to recruitment practice.

Security is not cheap, good security is priceless, bad security is worthless. You might need to introduce additional security measures, you can make them much more cost-effective by careful planning.

If you are in multi-occupied building or business park – even a high street, do you have an association or joint body that looks after the facilities, if not – why not? It is important to agree communal security arrangements and share the cost. It can be frustrating when your neighbours don’t share your concern about terrorist attacks, so convert it to crime concern in general then they will be concerned.

When was the last time you had a drill?

Irrespective of political climates we should conduct regular reviews of our security plans and conduct rehearsals of building evacuation. Is there a need to modify security then to take account of any changes in your business, services and supplies.

Have you had new building work? Did you build in security at the time? Has there been changes to personnel, have key individuals left such as First Aiders. Look at new health and safety rules and regulations, could these have an impact on your security plans. All buildings have assembly points, chronicleshub is yours in close vicinity to a neighbour that could be a threat? To review new evacuation procedures contact your local fore station.

Often changes make people nervous so ensure all personnel fully understand and accept the need for new security measures and that security is as a common responsibility shared by all. It should be simple for members of staff to report incidents, concerns and observations, consider tasking certain individuals or nominating security staff for this role. All reports should be taken seriously no matter how they sound when first reported.


Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *