Skip to content
alt=""
Blog publish date is 24/05/2022 Physical Security

Unattended or Suspicious Items - Steps to Take Video

NPSA have produced a film which introduces steps security staff within organisation should take once an unattended bag has been identified on their establishments.

This film is part of a series of terrorist incident films for businesses.

It focusses on the steps security personnel should take once an unattended bag has been identified.

Good situational awareness is paramount for a security officer. You must always be on the lookout for anything that is out of the ordinary. Being vigilant can save lives, and your presence could be enough to deter any potential hostiles and prevent any loss of life.

All right?

I've just done my shift in the coffee shop, and somebody's left a bag just on the bench opposite.

Right, okay.

Thanks.

Thank you. Charlie seven to control. There's an unattended bag down opposite Bruno's Cafe, under one of the benches. It's a rucksack, black and blue. Can you see it?

Charlie seven. I can see it. Did you see who left it? Over.

Control, I didn't. I'm going to check it out now.

Charlie seven, okay. I'll try to find out who left it. We have an unattended bag, screen five,  black and blue rucksack. Tony's going to go check it out. I'm going to see if I can find who left it.

Okay. Raj can you cover her screens please?

When dealing with an unattended item, it is important to confirm if it is suspicious or not. Has it been left by accident or has it been placed with malicious intent. You can use the HOT protocol to aid with this confirmation.

H, Hidden. Has the item been deliberately concealed from view, is its placement different to what you would expect of a forgotten or misplaced item? If so, it may have been hidden on purpose.

Control. I can't identify an owner at this point. Have you've been able to see who left it yet?

Charlie seven, still looking. Anything suspicious about it?

O, Obviously suspicious. Is the bags appearance different to what would be expected? Is it oversized or over stuffed? Does it look too heavy or has it been altered in any way? Are there any visible wires, circuitry boards, batteries, tape, or putty like substances? All of these factors must be considered before upgrading an item from unattended to suspicious. You must be cautious. Any item that appears benign at a distance, may be found to be dangerous when handled or opened. You must ask yourself, do you think this item poses an immediate threat to life? If yes, you must act.

Control, it's big, it's definitely overstuffed, no visible wires though and I can't see any gas coming out of it either.

Charlie seven, it's definitely not someone's shopping bag?

Control, no way. Looks like a backpacker's bag. Doesn't look right for in here.

T, Typical. Is the item typical of what you might find in this location?

Excuse me, you haven't seen who was with that bag have you?

Is it likely that someone would've forgotten to take the item with them? Lost property is often found in locations where people congregate, or wait before moving to a new location.

Charlie seven, okay we've got who left it now. It was left by a white female, short blonde hair, twenties or thirties, navy hoodie, black baseball cap.

Control, there's no one like that here.

Looks like she definitely pushed it under. She was looking around, waiting until no one's looking, and then she left it. It wasn't forgotten. Look.

Okay, I'm declaring this as suspicious. Um start clearing the area and I'll call the police.

Okay. Charlie four, Charlie seven. You need to clear the area. We're treating this as intentional and suspicious. Remember you need to be at least 15 metres away from the bag before using your radio.

Copy that control, over. Can you please leave via the nearest exit.

The four C's. 

Once a package is confirmed as being suspicious, it is important to clear the immediate area. All messages to the general public should be clear, loud, authoritative, and with necessary pauses.

Can you please leave by the nearest exit, come on, keep going straight through the door please thank you.

Security staff must not touch the item, and evacuations must start as a priority. People must be moved away from any potential danger, as soon as possible. 

You must call 999 and clearly explain why the item is being viewed as suspicious.

This is the control in the Hamilton Shopping Centre. We have a suspicious bag confirmed as left as unattended. Yep. We have established who left it, but they are no longer in the area. We are evacuating and currently setting up cordon.

A cordon must be erected to demarcate the area. Cordons can be the presence of security officers at all access points or, depending on your site, a temporary cordon may need to be erected. Barrier tape should be held in easily accessible areas. A cordon is a malleable tool. It should be reinforced as the incident progresses, and should change in response to any new information gained, beginning 100 meters away from the item. Security staff should try to keep themselves out of sight of the suspicious item. If possible, shielding behind something substantial. Windows and skylights, must be avoided. Once cleared, it is integral to control access to the cordoned area. Members of the public should not be able to approach the area until it is deemed safe.

It is of utmost importance for the safety of your site and its people, to remember these simple protocols. HOT, hidden, obviously suspicious, typical. The four C's, confirm, clear, communicate, control.

Acting fast will save lives.

For further guidance search "Incident Response and Command and Control" on the NPSA website. Or search "Publicly Accessible Locations Guidance" on the ProtectUK website.

Unattended or Suspicious Items - Steps to Take Video

Related pages

Effective incident management is critical to mitigating the impact of incidents at your organisation, site or premises and ensuring a swift and effective recover

Further guidance regarding planning and delivering effective premises searches

Businesses and organisation can maximise safety and security using existing resources. SCaN empowers staff to correctly identify suspicious activity and  what to do when they encounter it

 

Did you find this page useful? Yes No