AIDE MEMOIRE: RESPONSES TO TERRORISM THREAT-LEVEL CHANGES This Aide Memoire is offered for information to assist individual business entities to consider activities consequent to changes in the threat of terrorism on the spectrum from SUBSTANTIALSEVERE-CRITICAL. could perhaps necessitate activation of business continuity plans. However, any change in the threat level to CRITICAL is likely to be in place for only a short time. The note is generic and individual organisations will no doubt wish to develop specific, tailored products addressing organisational needs. There will inevitably be organisation-specific aspects which will not be addressed in this generic document. This level of threat is fortunately the rarest and preparation for actions at CRITICAL level are thus normally the least developed. It is important that organisational leadership is aware of the potential reality of this threat level and the consequences for business operations and staff security. It may be helpful to stress that a period of CRITICAL threat – which could be event driven – may have considerable impact upon business continuity. This Items marked with an asterisk may be especially pertinent to a period of CRITICAL threat, in addition to those in place for SEVERE or SUBSTANTIAL. 1. INFORMATION Why has the threat changed?* What is the official response?* What is the official advice?* 2. SPECIFIC RISKS Dirty Bomb CBR Enhanced IEDs Marauding attacks Lone-wolf attacks Prolonged manhunt Wide geographic hue and cry Cyber attack Kidnap/hostage Hoaxes/bomb threats Personal risk factors 5. TRANSPORT ASPECTS Impact on public transport* Aviation consequences* Home/abroad travel policies* Executive meetings* All meetings* Essential staff* Working from home* Female staff members* 6. STAFF COMMUNICATION Threat* Response* Corporate actions/policies* Regular updates* Specific advice and reassurance* Preparation for inbound calls from worried staff/family* 3. ADDITIONAL INFORMATION CPNI / NACTSO CSSC / OSAC Professional bodies Peer-to-peer contacts B2B engagement Sector sources Media reporting 7. STAFF TRACKING Accounting mechanisms* Information up-to-date* Communication systems 4. RINGS OF SECURITY Site Immediate vicinity Locality (e.g. City of London) Region National International 8. SOCIAL MEDIA IMPACT Accuracy of information Family concerns Rumour proliferation Prepared mitigation Terrorist media monitoring 9. LOCAL VULNERABILITIES Types of local premises* Government/Public services Diplomatic Armed Services Transport hubs Iconic buildings Religious venues Crowded places e.g. shopping centres 10. BUILDING Multi-occupancy Restricted use and occupancy Underground car park 11. VISITORS Reception process* Pass management* Escorts* Pre-access check* 12. INSIDER AGENTS Contractors Outsourced functions Business tenants Temporary staff 13. EVACUATION / INVACUATION Review plans* RV choice Warden system De-conflict RVs 14. FIRE Alarm efficiency* Wardens and First Aiders* Clear exit routes* Disabled assistance* 15. TECHNICAL Augmented CCTV* Enhanced perimeter protection* Enhanced detectors Extra communications Fall-back communications systems 16. COMMERCIAL PROPERTY (PHYSICAL) Access control regimes* Enhanced stand-off distance* Road closure* Delivery arrangements Mail screening Personal luggage Parking control Good neighbour plans 17. COMMERCIAL PROPERTY (SECURITY STAFFING) Access control staffing* Man Guarding levels* Reinforce in-house security teams* Consultancy assistance* 18. COMMERCIAL LINKS Customers Clients Supply chains Neighbours 19. CONTINGENCY PLANNING Review key components* Telephone/e-mail pro-forma (threats) Legal issues Press and media 20. CRISIS MANAGEMENT Consider activation of CMC/IMT Table-top exercise Joint exercising Test CMC location and equipment Check contract/call lists up to date Check duty personnel briefed 21. BUSINESS CONTINUITY (GENERAL) Alternate sites* Critical factors (e.g. IT/Telecoms)* Supply chain resilience Outsourced suppliers Check business continuity plans 22. BUSINESS CONTINUITY (FALL-BACK) Review alternates Check readiness Consider partial use Re-brief key actors 23. HOTEL USE Threat assessment* Ownership Symbolism Vulnerable aircrew users May 2015