ɫ鱦

Six Priorities for your Security Program

Sign up to receive our blog posts in your inbox.

 

 

 

 

Over the past few years, significant terrorist activity occurred throughout the world. New tactics and patterns affected the global threat spectrum. “Soft” public gathering areas, such as transportation hubs, were frequently targeted. Online propaganda by terrorist groups inspired lone-wolf actors. Terrorist cells perpetrated simultaneous, coordinated attacks designed to disperse first responders. Homemade and low explosives served as the weapon of choice for hostile actors. It is critical that your security program address these new and evolving threats. The following six action steps should be at the top of your list in the year to come.

 

  • Know the threat. Stay abreast of changes in the evolving global threat spectrum. Determine how events and patterns of terrorist activity could impact your organization. Know the trends in local, state, and national criminal and terrorist activity. If you have international locations, remain cognizant of any regional instability. How could these events impact your personnel, clientele, property, and brand? Review these types of questions with your security team and key company stakeholders on a regular basis. Document any changes in the security plan.
  • Conduct social media monitoring. Radicalization is occurring online in increasing numbers. Groups like ISIS have become particularly adept at online propaganda. It is important to know what is said in public online forums about your organization, personnel, clients, and properties. Is any of the online commentary hostile? If so, who are the authors? Are they making credible threats? Social media monitoring can be an effective early indicator of an attack. By identifying suspicious online activity, you may be able to mitigate or prevent an attack before it occurs.
  • Harden your perimeter. The recent focus of terrorist and lone wolf attackers has been on “soft” targets. You can harden your location with security officers, access checkpoints, metal detectors, or explosive detection canines. In some scenarios, covert systems or operatives may be preferred. Where possible, prevent access by hostile actors entirely. If your site is “soft” by nature (such as a mall, a transportation hub, or a park), it may not be possible to restrict access. In these scenarios, security officers and explosive detection canines can serve as a deterrent.
  • Identify pre-operational surveillance. Terrorists and hostile actors conduct “pre-operational surveillance” during the planning stage of an attack. Their aim is to identify information which they can exploit in an attack. This might include access points, egress points, building vulnerabilities, and security protocols. It is important to train your security team to identify and report signs of this activity. When possible, extend training to all employees. Signs of pre-operational surveillance might include suspicious photography or videography, that is not "touristy" in nature. The use of binoculars, writing or drawing of maps, or testing of security measures could also be indicators. Identifying this type of activity early could deter or thwart a plot in its early stages.
  • Employ an explosive detection method. Homemade (TATP, HMTD) and low explosives (like fireworks) are becoming weapons of choice for terrorists as components are easy to acquire without raising suspicion. Peroxide based homemade explosives were utilized in the New York City Chelsea bombing (October 2016) while firecrackers were used in the attempted Times Square bombing (May, 2010). The most effective and efficient method of explosive detection is a properly trained Explosive Detection Canine (EDC). If you employ an EDC team, it is crucial to ensure the canine has gone through a robust training program that includes imprintation on these explosive odors. To maintain proficiency, the EDC must also go through regular sustainment training.
  • Develop an emergency response plan. The previous five recommendations have focused on prevention of attacks. However, it is important to have a plan in place in case the worst occurs. An emergency response plan should include evacuation protocols, designated roles and responsibilities, and an internal communication plan. It should provide clear instructions for coordination with law enforcement, and a business continuity plan. If your organization resides in a multi-tenant building, it is important to develop this plan in conjunction with the property manager or landlord. Ensure you document the plan and update it at least once per year. Disseminate the plan to all employees and provide appropriate training.

 

A complete security program is complex. It involves many layers of planning and coordination. These recommendations are intended to be a set of priorities. Every organization must develop its own comprehensive, tailored security program.