It seems schools still need to be alert when it comes to the risk of terrorism. Following a recent security threat, Bury College has set an example that schools across the UK need to be aware of the threat of terrorism. As reported by the Manchester Evening News, the incident at the Great Manchester college saw the facility being put in lockdown as a precaution before an evacuation took place. Hundreds of staff and students were caught up in the event.

Bury College released a statement following the threat: “Staff at Bury College reacted swiftly today in response to a potential threat. Working closely with exceptional support from the police, the college quickly instigated its well-rehearsed lockdown procedures. A safe evacuation of the college was taken as a precautionary measure.”

2020 Vision has constructed this guide that details what members of staff at schools must consider in the result of encountering a similar security threat:

Recognising a terrorism threat

The National Counter Terrorism Security Office has several procedures set in place for recognising a terrorist threat, as detailed by this GOV.UK publication. The following points are especially important for schools.

Identifying the level of threat

Threats are measured on the likelihood that a terrorist attack might take place in the UK. They should be constantly monitored by those concerned about security at schools. Find the country’s most up-to-date threat level on the MI5 website.

How to approach suspicious items

Suspicious items might raise concern, especially in a school building. This is the protocol that you should follow as a member of staff:

1. Use the following HOT protocol to confirm if the item exhibits suspicious characteristics

  • Is the item HIDDEN?
  • Is the item OBVIOUSLY suspicious? (Be aware of any batteries, circuit boards, liquids, putty-like substances or wires that are visible.)
  • Is the item TYPICAL of what you would expect to find at the location where it’s been found?

2. If the HOT protocol has made you more suspicious, the next step is to clear the immediate area. Take these actions to do so:

  • Do not touch the suspicious item.
  • Move people at least 100m away from the suspicious item, starting from the centre and moving out, so that they are at a safe distance.
  • Ensure both you and others are kept out of the line of sight of the suspicious item.
  • Avoid positioning yourself or others near glass — this includes skylights and windows.
  • Set up a cordon around the area.

3. Call 999 to alert emergency services of the suspicious item, as well as inform any relevant member of staff at your establishment. However, avoid using radios within 15 metres of the suspicious item.

4. Monitor access to the area that has been cordoned off around the suspicious items, continuing to do so until it has been deemed safe.

5. Ask eyewitnesses to stay at the scene so that they can communicate to the police about what they have seen.

There are ways to improve school security to reduce the likelihood of a threat developing
There are many ways you can quickly identify if a delivered item should raise suspicions

How to approach suspicious deliveries or mail

Daily mail and deliveries are as standard for any educational institution. However, how do you establish if a piece of mail should raise suspicion or not? Here is a list of pointers so that you can quickly identify if a delivered item should raise suspicions:

  • Has the item been delivered unexpectedly? (Such an item been delivered by hand is also a cause for concern)
  • Has the item been delivered in a padded envelope, a Jiffy Bag or another form of bulky package?
  • Is there an additional inner envelope or other contents that is difficult to remove?
  • Has the labelling or sealing been applied so excessively that it encourages opening at a particular end or in a specific way?
  • Is the item oddly shaped or lopsided?
  • Is the envelope flap stuck down completely? (There are slight gaps at the edges of normally gummed envelope flaps)
  • Has the item been marked with phrases such as “To be opened only by…”, “Personal” or “Confidential”?
  • Has the item been addressed to an organisation or a title as opposed to a specific individual?
  • Is the origin of the item unexpected or unusual? (Look at the postmark and the return address where this matter is concerned)
  • Is there no postmark?
  • Is there no return address on the item?
  • Is the return address unable to be verified?
  • Has the address been printed poorly, inaccurately, unevenly or in an unusual manner?
  • Is the writing unfamiliar?
  • Is the style of writing unusual?
  • Are there more stamps on the item than is required for its size and/or weight?
  • Are there any greasy or oily stains which emanate from the item?
  • Are there any odours which emanate from the item?

Following the checklist, if your concerns are heightened or not put to bed, there is an emergency response plan that you can follow. It is outlined here:

1. Do not engage in unnecessary handling and X-raying of the suspicious delivered item — The item should be put down on a cleared flat surface and kept separate from other items so that it can be identified easily. No attempts should be made to move the item, even for the purpose of X-raying it.

2. Clear the area — The immediate area where the suspicious item is should be cleared immediately, which includes all adjacent rooms including spaces both above and below the room where the suspicious item can be found. Once cleared, ensure no one is able to approach the area until it is safe to do so and make sure that no mobile phones or two-way radios are used within 15 metres of the suspicious item.

3. Inform the police — During this initial conversation, let the police know if the suspicious item has been opened. Any informants and witnesses to the suspicious item should remain in contact so that they can brief the police once they begin carrying out their investigations.

. Separate entrances are fine to have around a school, but only open these when pupils are arriving or leaving the building
Clearly define a school’s boundaries, such as by placing fencing around the grounds or displaying clear signs that indicate when an individual is about to trespass

External and internal evacuations: The differences

It is important under any potential threat that you direct individuals to a safe location, whether it is a school-related threat or a public place. There is a difference between external and internal evacuations, and you must establish the difference so that you can make sure you safely move pupils and staff to a safer location as quickly as possible.

When the building is deemed safe to leave, an external evacuation will be used. Those familiar with a school’s evacuation points and assembly points should be appointed as marshals to assist with this procedure, with at least two assembly points set up in opposing directions and at a minimum of 500 metres away from the scene of the suspicious activity.

If there are risks externally, it might be deemed safer to remain in the venue. This is an internal evacuation — sometimes referred to as either inwards evacuations or invacuations. For example, it may put people in greater danger if an evacuation procedure inadvertently takes individuals past the suspicious item. People are kept away from any external windows and walls and aim to move all parties to an internal safe area that is found within the same building.

Heightening security

No one wants to have to implicate an evacuation or encounter a terrorism threat – so there are ways to improve your security at your school to reduce the likelihood of a threat developing:

  • Set up visitors’ access control systems around all entrances to a school, so that every individual is checked and identified before they are allowed into the establishment.
  • Clearly define a school’s boundaries, such as by placing fencing around the grounds or displaying clear signs that indicate when an individual is about to trespass.
  • Have one main entrance to the school, which should be visible from the reception area and the only way for individuals to access the establishment during hours of study. Separate entrances are fine to have around a school, but only open these when pupils are arriving or leaving the building.
  • Secure all doors and windows around a school. For this, fit alarms to exit doors so that people can be warned of unauthorised use, as well as applying locks to windows and having strict control over who can gain access to the keys for opening them.

Set up CCTV systems so that surveillance can still be granted in sections of a school which are not often monitored by staff, and the entire establishment can be monitored at times when it is sitting empty.

Download PDF version

Author profile

In case you missed it

Smart home access control growth and the future of door security
Smart home access control growth and the future of door security

There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating the smart home consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities.  Smart technology is increasingly becoming the new norm in terms of home security  Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure homes through smart technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course.  In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" security on the move  The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock.  Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Holiday rentals and smart home tech ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.

Bosch startup SAST addresses need for evolved solutions in security industry
Bosch startup SAST addresses need for evolved solutions in security industry

Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardised Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardised Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.

What is the value of remotely monitoring a system's health and operation?
What is the value of remotely monitoring a system's health and operation?

When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?