University of Strathclyde - UK University of the Year



4857750-91440000Security Guidance for Staff & StudentsThe University Of Strathclyde aims to provide an environment for study and research where the personal safety of staff, students and visitors is assured so far as is reasonably practicable. However the University operates within a global environment that exposes it to hazards outwith its direct control. This guidance is provided to raise your awareness of these security threats and to provide suitable information to minimise the associated risks during your study or employment at the University. 1. General Security AwarenessThe vigilance and co-operation of all staff, students is essential to maintaining a safe and secure environment. You know your own work and study areas very well and are best placed to notice unusual behaviour or items that appear out of place. If you notice anything suspicious please report this to Security Services (Ext 2222, or 0141 548 22222). All such reports will be taken seriously and regarded as a contribution to the safe running of the University. Contacting Security Services on the above number will always initiate an emergency response by the University.2. I.D. BadgesStaff and students should wear their I.D. Badges at all times whilst on Campus and be prepared to present these if challenged by a Security Warden or other authorised representative of the University. (All such persons will clearly identify themselves to you when making such a request).All staff should challenge or report to Security Services immediately, anyone in private or restricted areas who is not displaying an I.D badge.3. Good HousekeepingGood housekeeping improves the ambience of the University and reduces the opportunity for placing suspicious items or bags and helps to deal with false alarms and hoaxes effectively.Keep public and communal areas – exits, entrances, service corridors etc., clean and tidy.Lock unoccupied offices, rooms and store cupboardsEnsure that everything has a place for storage and that things are returned to that place after use.Fire extinguishers are appropriately marked and authorised for the locations in which they are kept. Periodically check fire extinguishers have not been tampered with or replaced4. Bomb ThreatsShould you receive a bomb threat to the University by email, fax, letter phone or other means, contact Security Services as soon as possible. If the threat is given by telephone call, listen carefully and engage the caller in conversation. Ask questions to try and get as much information as possible, and record the exact wording of the threat. Questions to ask and points to note are:Where is the bomb right nowWhen is it going to explode?What does it look like?What kind of bomb is it?What will cause it to explode?Did you place the bomb?Why?What is your name?What is your address?What is your telephone number?Nationality?Age?Sex?What was the caller’s voice like: well spoken, irrational, taped message, offensive, incoherent, message read by threat –maker?Quality of callers voice; e.g. calm, angry, excited, slurred?Are there any background noises; e.g. PA system, animal noises, factory machinery, office machinery?Record the time the call ended.Extension Number at which the call was received.A form is provided in section 14 of this guidance for you to record the details of the phone call, and you should keep a copy readily available.5. Guidance For Suspected Explosive Devices5.1 Improvised Explosive Devices (IED)Come in a variety of shapes and sizes. Though they may be large, they do not need to be bulky and can be delivered as packages/parcels. IED in packages the size of paperback books have been among the more “successful” and in the case of courier delivered items, devices weighing in excess of 4kgs have been used.They are usually disguised to look like everyday objects, so it is important to recognise any suspicious objects that could be an IED. Be suspicious of objects that are out of place or unaccounted for, andTreat any suspect package with extreme caution and alert Security Control5.2 High Explosive Devices (HED)Typically consist of the following components:Explosive: Commercial explosive is a dense putty-like material that may be in blocks, lumps or sticks and often has a distinct almond or marzipan smell. Homemade explosive (HME) will usually be in the form of powder or granules and can be commercially available substances like fuel oil, sugar or garden fertilizers.Detonator: Usually a small copper or silver tube with coloured wires attached, capable of sending an electric current to detonate the explosive. In HME, the detonator can be any number of improvised devices.Timer: Either a mechanical clockwork timer or electronic timer mounted on a printed circuit board. The timer acts as a switch to close the firing circuit at a predetermined time.Power Source: Usually a battery powering both the timer and detonator.Wiring: Wires of various colours linking the various components.Container: Used to transport and disguise the components. The container can take any form.5.3 Incendiary DevicesAre designed to burn fiercely, emitting intense heat and flame. They are often small enough to fit into an audio-cassette case or video tape case. They are often very light weight.5.4 Postal BombsCan take almost any shape or size and be contained in parcels, envelopes or padded ‘Jiffy’ bags. Designed to explode or ignite when opened, tell-tale signs can alert you to its dangers. It is not necessary to open the envelope or package in any particular way to initiate an IED. It may be triggered by any attempt, however slight, to open the outer cover. Pointers to look for in determining whether a package or letter is suspect include:Minimum Thickness: The description of ‘letter bomb’ is in fact a misnomer. The normal size of letters is generally between 2mm and 4mm in thickness.In practice, any item of mail less than 8mm in thickness cannot contain a High Explosive (HE) IED. However such an article could possibly contain an acid, incendiary or low explosive (i.e. gunpowder) device.An item of mail (letter or parcel) which is 8mm in thickness or greater is therefore capable of containing an HE IED. However, the minimum thickness of an HE IED sent through the post is generally greater than 8mm: not only is it necessary for the item to contain explosive material (in powdered, solid or plasticised form) but also a detonator and, normally, stiff cardboard packaging to protect and hide the contents.Weight: An average letter weighs about 28g (1oz) whilst an effective postal IED weighs at least 112g (4oz); it therefore needs more than the usual value of postage stamps for its size; and it is unusually thick for a letter, being at least 6mm (1/4 in).General: Whilst items of mail received by any means other than through official Post Office/courier channels should be regarded with the greatest suspicion, all items of mail of 6mm in thickness or greater, no matter how delivered, should be suspect if :Received from unspecified or unknown sources, or if delivery is unexpectedMarked with an unusual, incorrect or misspelled title or addressAddressed to someone who may be at a higher risk than others; a high-profile member of the academic or research staff or the senior management team for instance.There is no return address or the address cannot be verifiedThe item is poorly or inaccurately addressed e.g. incorrect title, spelt wrongly, title but no name, or addressed to an individual no longer at the University.The address has been printed unevenly or in an unusual way.The writing is an unfamiliar or unusual style.There are unusual post marks or postage paid marks.A Jiffy bag or similar padded envelope has been used.The item is marked as “Personal” or “Confidential”.The item is oddly shaped or lopsided.The envelope flap is stuck down completely (a harmless letter usually has an ungummed gap of 3-5mm at the corners)There is a smell, particularly of almonds or marzipan.In addition, mail received through Post Office channels should be regarded as suspicious if:Stamps are attached in unusual positions or to an excessive monetary value for weightPostmarks reveal an area known for its local terrorist sympathisersIf, on opening an envelope, there is an additional inner envelope and it is:Tightly taped or tied with string; treat as suspect, orPersonally addressed, the letter should be scrutinised again for signs of any of the pointers listed above.5.5 Functioning Of IEDAn explosive device contained in a letter or parcel received through official Post Office channels normally functions in one of the following ways:On opening the letter or parcelOn withdrawal of string or tape, at any stageOn removal of contentsOn piercing of the wrappingOn opening of the contents – often a book issued for this purposeOn operating the enclosed item (often an electrical gift)A further method of functioning, which particularly applies to items that have been placed at premises or delivered by hand, is the operation of a time delay mechanism (i.e. without the letter or parcel being opened or disturbed).5.6 Vehicle BombTerrorist groups often use parked vehicles in urban areas to contain bombs. Any vehicle is capable of carrying a large amount of commercial or homemade explosive without any tell-tale signs. The damage caused is usually far greater than a hand–placed device.5.7 IED PrecautionsSimple daily precautions can protect against an Improvised Explosive Device. These include:Remaining vigilantEnsuring good access controlKeeping public areas clutter freeKeeping all interview rooms and offices leading off public areas locked when not in useKeeping waste awaiting collection in bags. Reducing collection times to a minimumKeeping all plant rooms, access to air shafts and cupboards containing meters and maintenance equipment locked when not in useChecking the identity of all visitors and contractors, including the Police.Ensuring visitors and contractors are escorted when in non-public areas.Always challenging strangersChecking unexpected envelopes and packages with the addresseeTo provide further confirmation:If the item is delivered by courier – check their credentials, and then ring his/her company to check the origin of the package.If it’s a commercial package, the company concerned should be contacted to check if the package is genuine.Contact the addressee to see if the package is expected.IF THE ITEM IS STILL SUSPICIOUS DO NOT PANICThe package has made it this far through the mail. There is no reason that it should activate if it is not opened further.Gently place the item on a horizontal hard surface and leave the room. The room may be locked but make sure the key is available for Security ServicesEvacuate the room and direct personnel to proceed to a place remote from the package location, which is away from windows and out of line of site. Nominate a member of staff to check all other staff in the vicinity are present. Prevent others approaching the package locationContact Security Control on Ext 2222. Inform them of the suspect package and provide as many details about the item as you can (size, weight, appearance, position etc.)Inform your Head of DepartmentEnsure that whoever found the item or witnessed the incident remains on hand to brief the Security Staff/Police.6. Guidance For Suspect Chemical, Biological or Radiological (CBR) Materials In The Post.Terrorists may seek to send chemical, biological or radiological materials in the post. It is difficult to provide a full list of possible CBR indicators because of the diverse nature of the materials. However some of the more common and obvious are:Unexpected granular, crystalline or finely powdered material (of any colour and usually with the consistency of coffee, sugar or baking powder), loose or in a container.Unexpected sticky substances, sprays or vapours.Unexpected pieces of metal or plastic, such as discs, rods, small sheets or spheres.Strange smells, e.g. garlic, fish, fruit, mothballs, pepper. If you detect a smell, do not go on sniffing it. However some CBR materials are odourless and tasteless.Stains or dampness on the packaging.Sudden onset of illness or irritation of skin, eyes or noseCBR devices containing finely ground powder or liquid may be hazardous without being opened.If you think you have received or have been exposed to CBR materials:Minimise contact with the suspected materialsSeal the materials in a double bag if possible and place on a desk or on the floor. DO NOT COVER IT WITH ANYTHINGKEEP YOUR HANDS AWAY FROM YOUR MOUTH & NOSEWash your hands if possible in hot soapy waterClose windowsMove everyone away to a safe distance, but remain close by to minimise spread of contaminantsClose the door to the room containing the materials and secure if possible (n.b. the person with the key should remain on hand to allow access later)Prevent others from rm Security Services of the incident (Ext 2222, or 0141 548 2222 from a mobile)Isolate and quarantine the person who opened the package and any other persons who were in the room separately. Do this as close as possible to the room containing the suspected CBR materials to minimise the spread of contaminants.The emergency services will give medical advice, assessments or treatment so do not leave the area until you have been checked.7. Guidance for “Active Shooter” Incidents Attacks involving firearms and weapons are still infrequent, but it is important to be prepared to cope with such an incident should it ever arise. “Active Shooter” situations are unpredictable and evolve quickly. Typically the intervention of armed Police Officers is required to bring such incidents to a close. The following advice based on guidance from the Association of Chief Police Officers in Scotland is provided to direct your actions should you become involved in such an incident.7.1 Profile of an Active ShooterAn “Active Shooter” may be defined as “an armed person who has used deadly physical force on other persons and continues to do so while having unrestricted access to additional victims”.They may be a terrorist with a political aim, may be part of a group or may be an individual working alone to achieve their own personal aims. The typical Active Shooter will attempt to kill as many people as possible in as short a time as possible, which is often why they target crowded places where they can achieve the greatest impact.Most Active Shooter incidents end in the suicide of the shooter and some may intend “suicide by cop” as an outcome. It is unlikely that they will want to take prisoners or hostages.7.2 Dealing with an Active ShooterStay SafeSTAY CALM, DON’T PANIC, KEEP QUIET!If you are on “home territory” i.e. an area that you are familiar with, take advantage of what you know about your surroundings, the routes in and out and consider what opportunities you may have to stay safe.Attempt to identify an escape route and a back-up escape route should one be required.Security Services may lock down buildings to prevent access by a shooter.If you are Under Immediate GUN FIRE - Take cover initially, but leave the area as soon as possible if safe to do so. (Move away from the gun fire/assailant using a safe route, preferably out of the line of site of any shooters)Put something between you and the shooter, BUT REMEMBER - out of sight does not necessarily mean out of danger, especially if you are not in “cover from gun fire”. See examples below.Cover from Gun FireCover From ViewSubstantial brickwork or concreteInternal partition wallsEngine blocks of motor vehiclesCar doors or body workBase of large live treesWooden fencesEarth banks /hills/moundsCurtainsIf there is Nearby GUN FIRE – Leave the area immediately, if it’s possible and is safe to do so.Leave your belongings behind, they will slow your escapeAssist anyone less-able than you if they require helpDo not congregate at evacuation points.Warn and prevent others approaching the danger area.Do not move wounded people unless it is safe to do soFollow the instructions of any Police OfficersOnce you have reached a safe location, you will likely be held in that area by Police officers until the situation is under control, and all witnesses have been identified and questioned. Do not leave until you have been instructed to do so. If you were directly involved with the shooter please report to Security Services who will arrange for you to give a statement to the Police.If you can’t escape Keep out of corridors and public spacesConsider locking yourself and others in a room or cupboard. Stay away from the door and keep quiet. Active shooters are looking for obvious and easy targets, they are likely to move on if confronted with a locked door or obstacles. If possible choose a room where escape or further movement is possible. Silence any sources of noise, such as radios, mobile phones, that may give away your presence, and switch off lights and computer displays if possible.Close blinds, keep out of sight and remain quiet until told otherwise by appropriate authorities or if you need to move for safety reasons such as a building fire. If the door cannot be locked, barricade it with heavy items such as cupboards, filing cabinets, bookcases, desks etc.Contact Security/PoliceIn either of the above situations contact the University Security Services by dialling 2222 from an internal phone (0141 548 2222 from a mobile), immediately it is safe to do so. The more information you can pass on the better, but never risk your own safety or that of others to gain it. Useful information would include:What exactly did you see/hear – e.g. gunshots, explosions, etc.Exact location of incident/assailantNumber of assailants and description Type of firearm – long barrelled or hand gun, single shots or “rat-a-tat” of automatic weapons.What else were they carrying, e.g. ruck sacks, holdallsAre they communicating with others?Did you recognise the assailant?Your location, number of casualties / people with youUnsecuring the areaThe assailant may not stop until their objectives have been met or until stopped by Police officers.Always consider the risk of exposure posed by opening the door for any reason.Attempts to rescue people outside a secure area should only be made if it can be done without further endangering the people inside the secured area.Be aware that the assailant may bang on the door, yell for help, or otherwise attempt to entice you to open the door of a secured area.If there is any doubt about a threat to the safety of the individuals inside the room, the area needs to remain secure.Armed PoliceThe purpose of the Police response is to contain and stop the shooter(s) as soon as possible, to prevent further shootings and to protect and save lives. Please remember:Police officers usually arrive in teams (or at least in pairs in the UK) – tactics may differ in other countries.Police officers will be wearing dark coloured uniforms including bulky bulletproof vests, dark coloured Kevlar helmets and other tactical equipment.Initially they may not be able to distinguish you from the shootersOfficers may be armed and may point guns at youThey may have to treat the public firmly. Follow their instructions directly.Keep your hands in the air and in view at all times. Spread your fingers in order that the officers can see you have no weaponsAvoid making quick or sudden movements towards the officers and don’t hold onto them for safety.Avoid pointing, screaming or shoutingDo not stop to ask the officers for help or directions when evacuating, just proceed in the direction from which the officers are entering the premises, unless they direct you to do otherwise.The first police officers to arrive on scene will not stop to help injured persons. Expect teams composed of additional officers and emergency medical personnel to follow the initial officers. These rescue teams will treat and remove any injured persons. They may also call upon able-bodied individuals to assist in removing the wounded from the premises.The Last OptionsIf the shooter enters your room and you cannot escape, there are no set procedures. The decision to flee or seek shelter inside the room can only be made by you and is dependent upon the circumstances.Try to remain calm; it will aid your decision making.Try and call the Police on 999, If you can’t speak leave the line open so the operator can hear what is happening and possibly trace the call.If there is absolutely no opportunity of escape or concealment, attempt to shield yourself with any available object; desk, computer etc. If the shooter is not actively firing on victims it might be possible to negotiate with the shooter; Stay calmMaintain eye contact Stall for time keep talking – but follow instructions from the assailantDo not risk harm to yourself or othersDon’t try to grab a weaponWatch for a safe chance to escape If the shooter has fired on victims you are faced with a life or death situation; only you can consider your next course of action.After all other options have been exhausted, then as a last resort, you and others may need to use aggression or take any opportunity that you can to overpower the shooter. Time and speed of mind are critical. Do whatever you can to incapacitate the shooter, by distracting, shouting, throwing items , improvising weapons, hitting, whatever it takes, commit to you actions and act as aggressively as possible because it may be the thing that saves your life. Realise this will involve significant risk and cannot be accomplished half-heartedly. If there are a few of you to attempt this, experts recommend that you spread out rather than stand in a group for the best chance of success.If the shooter leaves the area, proceed immediately to a safer place and do not touch anything that was in the vicinity of the shooter. Reporting InOnce the incident is over staff should contact their Head of Department to confirm that they are okay and obtain any further instructions. Students should contact their departments (by phone or email) to confirm that they are okay as soon as possible. Staff and students should monitor the University webpages and Social Media sites to receive further updates on the status of the University.8. Building EvacuationIt is possible that the University may have to evacuate buildings for reasons other than fire incidents. Such evacuations may involve full or partial evacuation of one or more buildings and be communicated by a variety of mean, for example, direct verbal instruction, phone call, email or text message. It is unlikely that the fire alarm would be used in such circumstances, however this cannot be ruled out.In such evacuations, do not panic and remain calm. Leave the building immediately; obey the instructions of University staff co-ordinating the evacuation. You will be evacuated to a suitable location away from the perceived threat. 9. InvacuationFor some incidents e.g. an external bomb threat, evacuation of the building may not be the best option, since glass or other fragments from an explosion can kill or maim at a considerable distance from the device. In such incidents “Invacuation“ to internal areas of the building will be required. Such incidents will be communicated by a variety of means . On receipt of an instruction to “Invacuate” do not panic, remain calm and move out of rooms with windows and take refuge within the internal corridors of the building, internal rooms, lecture theatres or any other area without windows. (n.b. Stairwells which open out onto the street should not be used as places of refuge) Once you are in a place of refuge remain there until you are told to do otherwise by Security Services or other authorised member of the University Staff or by electronic communication from the University.10. City Centre /Campus Evacuation GuidanceIn exceptional circumstances and in the event of a city centre evacuation, the Police may insist on evacuation of the City Centre campus, however they need the co-operation of the University to achieve this.A City Centre evacuation is most likely to be required due to a significant and unexpected event within the City centre, such as Utilities failure or act of terrorism. The Glasgow City Centre Evacuation plan (GCCEP) defines a major incident as an emergency which requires the implementation of special arrangements by one or more Emergency Services, The NHS or The Local Authority, requiring a response which cannot be undertaken using normal routine resources. The exact nature of the incident could be wide and varied. Possible incidents include, but are not limited to:FireBomb threatsUtilities failureSevere weather incidentsFloodingA significant unexpected event within the City Centre.The City Centre is divided into 22 zones providing a flexible framework which can limit the impact of an evacuation. (See below). These zones will be used by all the agencies which respond to a major emergency to ensure consistency of approach when dealing with the incident and subsequent evacuation.The purpose of the GCCEP is to move people from an area where they might be at risk to a place where that risk is reduced. To this end, Glasgow City Council has identified “Rest Centres” outside the city centre boundary, where the displaced population will be moved to during an evacuation. Details of these centres are not being made public and organisations will only be informed of their location as and when the need to evacuate arises.Should the need to evacuate all or part of the campus arise this will be communicated to staff and students via their departments or by electronic methods. This communication will include details of the action to take, location of rest centres and any special instructions required.Should you be in the city centre and become involved in an incident requiring evacuation of a zone not related to the University campus, simply follow the instructions given by the Emergency Services or Glasgow City Council personnel at the scene of the incident.11. Incident CommunicationsThe University uses a variety of means to communicate officially with staff and students during any incident affecting the University. Regular information updates will be sent out via, social media, the University webpage, email, and if these method are not available, local TV and radio stations will be used to communicate briefings to the University community.12. Media EnquiresSecurity related incidents and indeed some other types of incidents such as accidents, may generate enquires from the media. Staff and students should refrain from answering media enquiries or providing any information at all to media organisations. Instead staff and students should politely refer all such enquiries to the Media and Corporate Communications Office, who will respond on behalf of the University.13. Hostile ReconnaissanceHostile reconnaissance is used by terrorists to provide planning information for potential targets. The ability to recognise persons engaged in hostile reconnaissance could disrupt an attack and produce important intelligence leads. Many of the activities described below are linked to normal behaviour at Educational Institutions. It is behaviour outside of what would be described as normal that should be reported to Security Services, for example:Significant interest being taken in the outside of buildings , including parking areas, delivery gates, doors and entrances.Groups or individuals taking significant interest in the location of CCTV cameras and controlled areas.People taking pictures, filming, making notes or sketching of the security measures . Tourists should not necessarily be taken as such and should be treated sensitively, but with caution.Overt/covert photography, video cameras, possession of photographs, maps, blueprints etc., of critical infrastructures, electricity transformers, gas pipelines, telephone cables etc.Possession of maps, global positioning systems (GPS), photographic equipment (cameras, zoom lenses, camcorders).Vehicles parked outside buildings or other facilities, with one or more people remaining in the vehicle, for longer than would be considered usual.Parking, standing or loitering in the same area on numerous occasions with no apparent reasonable explanation.Prolonged static surveillance using operatives disguised as demonstrators, street sweepers, etc., or stopping and pretending to have car trouble to test response time for emergency services, car recovery companies, or local staff.Simple observation such as staring or quickly looking away.Activity inconsistent with the nature of the building.Unusual questions concerning the number and routine of staff/VIP’s visiting the institutionIndividuals that look out of place for any reason.Individuals that appear to be loitering in public areas.Individuals asking questions regarding the identity or characteristics of individual visitors, groups of visitors, or the jobs or nationalities of visitors that may visit the institution.Persons asking questions regarding security and evacuation measures.Persons asking questions regarding institution staff and student hangouts.Persons asking questions regarding VIP visits.Delivery vehicle in front of the establishment.Vehicles, packages, luggage left unattended.Vehicles appearing overweight. (sitting down on their suspension)Persons appearing to count pedestrians/vehicles.People “nursing” drinks and being over attentive to surroundings. Persons loitering around area for a prolonged amount of time.Persons attempting to access plant equipment or chemical areas.Vehicles emitting suspicious odours e.g. fuel or gas.Vehicles looking out of place.Erratic driving.Questions regarding the institution structure.Noted pattern or series of false alarms indicating possible testing of security systems and observation of response behaviour and procedures.The same vehicle and different individuals or the same individuals in a different vehicle returning to a location(s).The same or similar individuals returning to carry out the same activity to establish the optimum time to conduct the operation.Unusual activity by contractor’s vehicles.Recent damage to perimeter security breaches in fence lines or walls or the concealment in hides of mortar base plates or assault equipment i.e. ropes, ladders, food etc.Attempts to disguise identity – motorcycle helmets, hoodies etc., or multiple sets of clothing to change appearance.Constant use of different paths, and /or access routes across a site. “Learning the route” or foot surveillance involving a number of people who seem individual but are working together.Multiple identification documents – suspicious, counterfeit, altered documents etc.Non co-operation with police or security personnel.Those engaged in reconnaissance will often attempt to enter premises to assess the internal layout and in doing so will alter their appearance and provide cover stories.In the past reconnaissance operatives have drawn attention to themselves by asking peculiar and in depth questions of employees or others more familiar with the environment.14. Telephoned Bomb Threat Record FormRecord The Exact Wording Of The ThreatAsk These QuestionsWhere Is The Bomb / DeviceWhen Is it Going To ExplodeWhat Does It Look LikeWhat Kind Of Bomb / Device Is It?Did You Place The Bomb/Device?Why?Who Are You?Do You Have A Telephone Number?Note Time Of CallDate:Contact Security – Record Time They Are InformedOnce The Caller Has Hung Up Complete The Following DetailsDial 1471 To See If You Can Trace The NumberWas A Code Word Used? If Yes Please RecordAbout The Caller:MaleFemaleNationality?Age?Threat Language:Well SpokenIrrationalFoulIncoherentAccent? DescribeCallers Voice:CalmExcitedCryingClearing ThroatAngryNasalSlurredStutterDisguisedSlowLispRapidDeepLaughingHoarseFamiliar? – Who Did It Sound Like?Background Noises:Street NoiseHouse NoiseAnimal NoisesCrockeryMotorQuietOther VoicesStaticPA SystemEnclosed BoothBarMusicClearAircraftTrainsMachineryWas There Someone Telling The Caller What To Say? If So Describe:Any Other Details:Signed:Date: ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download