CT SECURITY STRATEGY
Our counter-terrorism strategy is comprised of a series of interconnected procedures, protocols, and countermeasures designed to mitigate the potential impact and disruption caused by potential terrorist attacks. This manual explains how we formulate an intelligent and effective strategy for preventing and responding to terrorist attacks. We regard our counterterrorism strategy as an integral part of our comprehensive security plan, which could assist in identifying potential targets or vulnerabilities, allocating resources and coordinating responses, and taking the necessary precautions to mitigate damage in the event of an attack.
Our counterterrorism strategy prioritises prevention, preparation, risk mitigation, and responses based on the identified potential threats, vulnerabilities, and risks. Our plans are always site-specific to meet the needs and circumstances of the event’s organisers.
Our effective counterterrorism planning includes securing high-risk targets, increasing security personnel and resources, instituting robust emergency response systems, and establishing awareness and training programmes.
TMS Protect ensures that our counter-terrorism plans are reviewed and updated on a regular basis to account for any changes in threat levels, risk factors, and available technologies to combat these threats.
As part of our counter-terrorism planning, we assist individuals and organisations in proactively addressing potential terrorist threats, maintaining business continuity, and protecting lives, property, and assets. We adopt the following measures to ensure the highest levels of security and combat terrorism:
We employ highly trained and well-equipped security personnel to monitor and prevent potential terrorist attacks at public places. Where possible we install or monitor advanced security systems such as CCTV cameras, metal detectors, and other equipment at strategic locations to detect and deter potential threats.
TMS Protect experienced management teams conduct regular risk assessments to identify any potential security threats and vulnerabilities, and developing actionable plans to mitigate those risks. We conduct routine patrols of the perimeter and vital areas ensuring the integrity of physical systems, such as locks, fences, and other security-related systems.
As you can find in our search policies and procedures, we implement security protocols such as regular searches, identity verification checks, and baggage screening to prevent weapons and explosives from entering the site.
It is standard procedure for us to establish emergency response measures, such as identifying escape routes, conducting emergency exercises, and providing first-aid treatment in the event of an attack, in order to minimise the damage. In addition, many of our supervisors and management are medically qualified to the level of first responder (Frec-3).
We are always eager to develop intelligence-sharing partnerships with other law enforcement agencies and organisations in order to monitor potential terrorist activity and help intercept, prevent, and deter it. By increasing staff awareness of terrorism risks and providing training on how to recognise and report suspicious behaviour or packages, we ensure that security personnel are always vigilant and aware of their surroundings, particularly in congested areas.
Security personnel are instructed to promptly report any suspicious activity to the event controller, who will then notify the authorities and bolster security personnel as necessary.
In accordance with our training programme and the confidentiality agreements, all security personnel are prohibited from sharing official information about their private lives or attendance at high-risk events on social media. Additionally, all employees are required to be patient and cooperative during security checks and to obey police and enforcement officials’ instructions.
Briefings at the event will detail the potential threat level and risk, identify the emergency exits and protocols, and provide other vital information, including muster points.
Despite the fact that our onsite computer systems are only used to generate logs and reports, we insist on developing robust cybersecurity measures to defend against cyberattacks that could be used to disrupt critical infrastructure or commit other malicious acts.
These are but a few of the many measures that TMS Protect utilise to prevent or respond to terrorist attacks. It is important for us to remain proactive and continue to develop and implement new measures as threats evolve over time.
Summary
TMS Protect employs well-trained and experienced security professionals to identify potential areas of concern, assist in determining the optimal placement and utilisation of resources, and offer guidance on managing crowds and queuing systems.
During the build-up and break-down phases of any event, we only provide employees who are well-trained in counterterrorism tactics to ensure that any potential threats are quickly identified and dealt with accordingly.
Prior to doors opening, we employ highly trained detection canines for both drugs and bombs/weapons and conduct a thorough sweep of the entire site, including trade stands, waste bins, restrooms, and all other areas.
Our CCTV and other critical security personnel are strategically positioned throughout the site to ensure maximum coverage and surveillance of any suspicious activity.
All security personnel receive comprehensive counterterrorism training and are given additional guidance in their events and festivals handbook. In addition, all employees must have completed ACT training and provide us with a certificate of completion as proof of participation.
On show days, all employees receive a thorough briefing and are reminded of HOT protocols and what to do in such situations. We will appoint either one of our supervisors or a member of the management team as liaison to the local authorities to ensure collaboration on any matters of concern, including terrorism-related issues.
In the event if a terror threat
TMS Protect security personnel adhere to the company’s established procedures and guidelines, as well as national security protocols.
In the event of a terror threat in the UK, the following measures are taken by security personnel:
1. Keep informed: Monitor official sources, such as the National Counter Terrorism Security Office (NaCTSO) of the UK Government, the Security Service (MI5), and local law enforcement agencies, for the latest information on potential threats. Keep abreast of any advisories, warnings, or threat levels issued by these authorities.
2. Stay alert: Security are reminded to be vigilant and observant to identify any potential threats and ensuring the safety of yourself and others. Adopting the HOT method—Hidden, Obviously Suspicious, Typical — can help you recognise and respond to suspicious behaviour or packages. First, heighten your awareness by actively scanning your surroundings, paying attention to people’s behaviour and any unusual activities. Observe individuals who display signs of nervousness, excessive sweating, or who appear out of place. Second, observe any unusual or suspicious behaviour, such as someone leaving a package unattended or attempting to conceal an item. Report any suspicious activity to the control room or appropriate authorities immediately. Lastly, take action by keeping a safe distance from suspicious packages and refraining from touching or moving them. By staying alert and using the HOT method, you play a vital role in maintaining the safety and security of your environment.
3. Activate the emergency response plan: In the event of a confirmed terror threat security should immediately activate the pre-established emergency response plan for the organisation. The plan will specify the actions, communication channels, and responsibilities of security personnel in the event of a terrorist attack.
4. Report suspicious activities: Contact event control immediately if you observe any suspicious behaviour, individuals, or packages. You may be asked to contact the control room using mobile phone and to keep the airways clear to allow for strategic planning and positioning.
if communications with event control are compromised, then contact 999 or the anti-terrorism hotline at 0800 783 321 providing as much information as feasible without sacrificing safety.
5. Communicate internally: Inform your security team, management, and relevant TMS Protect supervisors of the potential threat. Ensure that all relevant parties receive and share accurate and expeditious information.
In the event of a confirmed terrorist threat, the police will likely assume the lead in managing the situation. All security operatives and safety stewards are instructed to fully cooperate with law enforcement officers and adhere to their instructions to ensure a coordinated response.
6. Implement access control measures: Strengthen security protocols within the facility, as directed by the emergency response plan. This may entail limiting access points, increasing security inspections, and, if necessary, reinforcing physical barriers.
7. Follow the established evacuation procedures: If an evacuation is deemed necessary or directed by the police. Ensure that employees, visitors, and others are safely guided to designated assembly points away from the potential threat. Provide precise instructions, reassurance, and assistance to people who may be distressed or anxious during an incident. Assist them in following safety procedures and navigating to designated secure areas.
8. Establish and maintain communication with authorities: Share pertinent information and updates about the situation with local law enforcement agencies. Follow their instructions and guidance throughout the incident.
9. Documentation and report: Keep meticulous recordings of observations, actions taken, and any other pertinent incident-related information. Following the reporting procedures specified in the emergency response plan, communicate the event’s specifics to the appropriate authorities. After the threat has been neutralised, undertake a comprehensive review of the response and actions taken. Evaluate the efficacy of the security measures, pinpoint areas for refinement, and revise the emergency response plan accordingly.
All TMS Protect security personnel receive specialised training in counter-terrorism measures and participate in regular manoeuvres and exercises that simulate a variety of threat scenarios. This training should be tailored to the specific procedures and regulations established for UK-based security personnel.