First, you need to understand the methods of detonation, the likely behavioural indicators and actions that security officers might take to negate the problem.
A typical detonation device is the ‘suicide vest’ with built-in toggle pressure pad. There’ll be one switch to arm the device circuit, another to detonate it. PE4 explosive is a favoured incendiary device material. Even from 100 metres away items like ball bearings can have a devastating effect if they’re packed in and around the explosive.
Tactics are in development
At the present time there’s no information available in the UK regarding the use of person-borne explosives. In the case of would-be shoe bomber Richard Reid, for example, we know that he didn’t make the device himself.
That said, here’s a good case in point of a British passport holder who’s prepared to die for ‘the cause’.
The tactics deployed by suicide bombers are still being developed, although Al-Qaeda appear to favour vehicle-borne devices. Similarly, there’s no profile available of typical age, sex or ethnicity. The suicide bomber will strive to blend in so that they can prosecute their mission.
However, there are certain behavioural characteristics that security operatives can be aware of and train themselves to spot. Abnormal behaviour like praying in the street or a person muttering religious phrases under their breath are classic signs.
Other signs could be the carrying of religious texts, and the wearing of abnormally baggy clothing (to conceal the aforementioned ‘suicide vest’). A rucksack with a string or lead hanging outside of it could also be a sign that there’s explosives contained within.
The suicide bomber will strive to blend in so that they can prosecute their mission. However, there are certain behavioural characteristics security operatives can be aware of and train themselves to spot. Abnormal behaviour like praying in the street or
The Joint Security Industry Council (JSIC) has produced an excellent ready reckoner on these and other vital signs security officers might use as an aide memoire.
JSIC pinpoints the following:
- an individual wearing excessively baggy clothing inconsistent with the climate of the day, but consistent with the country;
- absolutely no attempt being made to conceal the face or identity;
- someone who’s in deep conversation, staring ahead of themselves and seemingly oblivious to their immediate surroundings;
- a person who’s sweating profusely, maybe exhibiting highly agitated body language, looking anxious and/or loitering;
- someone who’s recently clean shaven or has a newly shaven head;
- a pungent smell of herbs, oils or spices;
- someone walking very straight, fast and directly to an apparent destination;
- an individual who’s praying or mumbling;
- someone who is holding something in a clenched fist and obviously looking uptight;
- a wire or toggle protruding from an overtly carried bag.
Terrorist reconnaissance
JSIC’s checklist also reviews suspicious activity relating to terrorist reconnaissance at potential target locations. The list provides examples of activity that might be regarded as ‘suspicious’ or otherwise ‘unusual’. One or two items on their own might not be ‘suspicious’, but a combination of more may well be.
It’s at this juncture security officers and their supervisors should make a report to the Metropolitan Police Service Anti-Terrorist Branch (telephone: 0800 789 321).
In essence, security staff need to be on the look-out for the following:
- significant interest being taken in the outside of a building, including parking areas near to a building and the delivery gates, doors and entrances;
- groups of two or more individuals taking a significant interest in the location of cameras and controlled areas:
- people taking pictures and/or making notes of the security measures in place at a building (but not tourists taking pictures of each other with buildings in the background);
- any apparent attempt to disguise identity by the wearing of (for example) a motorcycle helmet or loose hood;
- the same or similar individuals returning at some point to carry out the same activity;
- vehicles parked outside buildings or other facilities with one or more people staying inside them (and without leaving the vehicle(s) concerned) for longer than around 30 minutes;
- the same vehicle and different individuals – or the same individuals and a different vehicle – returning to the location on another occasion;
- activity inconsistent with the location;
- unusual activity surrounding unknown contractors’ vehicles.
What officers need to do
What should the security officer do if and when confronted by this threat? First and foremost, it’s vital they take no action that would alert a suspect to the fact that they’re under suspicion and, therefore, surveillance. It’s vital the security officer takes no independent action, as this may compromise any subsequent operations conducted by the police.
Source
SMT
No comments yet