
ISBN: 978-1-925593-94-5 (Print) ISBN: 978-1-925593-95-2 (Online) © Commonwealth of Australia 2017 With the exception of the Coat of Arms and where otherwise stated, all material presented in this publication is provided under a Creative Commons Attribution 4.0 International licence (www.creativecommons.org/licenses). For the avoidance of doubt, this means this licence only applies to material as set out in this document. The details of the relevant licence conditions are available on the Creative Commons website as is the full legal code for the CC BY 4.0 licence (www.creativecommons.org/licenses). Use of the Coat of Arms The terms under which the Coat of Arms can be used are detailed on the Department of the Prime Minister and Cabinet website (www.dpmc.gov.au/government/commonwealth-coat-arms). Page 2 of 25 Contents Introduction .......................................................................................................................................... 5 Purpose ............................................................................................................................................... 5 Glossary of terms ................................................................................................................................. 5 Threat context ...................................................................................................................................... 6 The Australian experience ............................................................................................................... 6 Characteristics of IED incidents ........................................................................................................... 7 General features .............................................................................................................................. 7 Vehicle Borne Improvised Explosive Devices .................................................................................. 7 Choice of explosives ........................................................................................................................ 7 Immediate health effects .................................................................................................................. 8 Primary objectives ............................................................................................................................... 8 Assessing the threat......................................................................................................................... 8 Protecting life.................................................................................................................................... 8 Prevention, Preparedness, Response, Recovery (PPRR) ............................................................... 9 Prevention............................................................................................................................................ 9 Limiting damage to structures and people ....................................................................................... 9 Stand-off distances ........................................................................................................................ 10 Preparedness .................................................................................................................................... 10 Identifying and assessing suspicious objects or activity ................................................................ 11 Inspection procedures .................................................................................................................... 11 Assessing unattended or suspicious items .................................................................................... 13 Assessing unattended vehicles ...................................................................................................... 14 Post-assessment guidance ............................................................................................................ 14 Response........................................................................................................................................... 15 Evacuation considerations ............................................................................................................. 15 Transition considerations ................................................................................................................ 16 Emergency services response ....................................................................................................... 17 Response priorities......................................................................................................................... 17 Recovery............................................................................................................................................ 17 Public information ........................................................................................................................... 18 Crime scene and investigation ....................................................................................................... 18 Business continuity ........................................................................................................................ 18 Useful links ........................................................................................................................................ 18 Contacts............................................................................................................................................. 18 Version control ................................................................................................................................... 19 Appendix A: Current security context ................................................................................................ 20 Appendix B: Bomb Threat Checklist .................................................................................................. 21 REMEMBER .................................................................................................................................. 21 IMPORTANT QUESTIONS TO ASK .............................................................................................. 21 ANALYSIS OF THE CALLERS VOICE .......................................................................................... 21 BACKGROUND NOISE ................................................................................................................. 21 Page 3 of 25 YOUR DETAILS ............................................................................................................................. 21 Appendix C: Bomb Threat evacuation – recommended distances ................................................... 22 Bomb Threat Evacuation Guide ..................................................................................................... 22 Appendix D: Improvised Explosive Device (IED) attack— response priorities for management ....... 23 Saving and protecting life ............................................................................................................... 23 Facilitating the evacuation of those at risk ..................................................................................... 23 Containing the incident or threat .................................................................................................... 23 Supporting emergency response and investigation activities ........................................................ 23 Appendix E: Improvised Explosive Device (IED) attack— advice for individuals ............................... 24 If you are in a building .................................................................................................................... 24 Once you are out of the building ................................................................................................... 24 If you are nearby, but not at the immediate site of an attack ......................................................... 24 If you are on a train or bus ............................................................................................................. 24 Caring for the injured ...................................................................................................................... 24 Page 4 of 25 Introduction Crowded places can pose a broad range of security challenges for their owners and operators. Terrorists and other criminals have, and will continue to, see crowded places as attractive targets for attacks both in Australia and overseas. Terrorist attacks using improvised explosive devices (IEDs) often target crowded places such as public transport hubs, sporting arenas, entertainment precincts, and shopping malls. Government and private sector cooperation helps to ensure incident planning and arrangements are integrated and effective, while aiming to reduce the likelihood and impact of IED attacks. The Crowded Places Advisory Group (CPAG) has developed these Guidelines on behalf of the Australia New Zealand Counter-Terrorism Committee (ANZCTC), with input from the Business Advisory Group (BAG). They should be read in conjunction with Australia’s Strategy for Protecting Crowded Places from Terrorism; Active Armed Offender Guidelines for Crowded Places, Chemical Weapon Guidelines and Hostile Vehicle Mitigation Guidelines. Purpose Those who own or operate crowded places are responsible
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages25 Page
-
File Size-