Ch Supt Alex Robertson City of London Police
“The Square Mile” • 3% of the GDP for the UK • Over $500bn foreign exchange turnover per day • 56% of the global equity market • Over 400,000 people work in the City • 24/7 culture • Busy transport system with expanding retail and leisure market • Significant number of ceremonial and public order events • Over 550 foreign banks • International crowded places HISTORY
St Mary Axe 1992 HISTORY Bishopsgate 1993
HISTORY • Police Objectives • Deter further vehicle bomb attacks • Identify each motor vehicle entering the traffic zone • Identify driver and front seat passenger(s) • Local Authority Objectives • Reduce traffic • Reduce pollution • Improve environment
Current system HISTORY
TECHNOLOGYCameras Directional Lighting Camera 1 Camera 2
CONTROL ROOM TECHNOLOGYDatabase Recorder Entry points Number Plate Reader Number plate reading database server Match or user enquiry? Control Room Police National computer Force Intelligence Bureau Local hotlist
OPERATIONAL USE Operation Danzey Cab serial rapist of over 85 women. ANPR information placed the taxi at various locations in the capital.We were given dates and times by our victims and if ANPR information put the vehicle in the vicinity this added weight to our case that he was in the area at the time of the offence. Operation Orchard This relates to the fatal stabbing at Shadans nightclub in December 2006. ANPR data was used to identify two of the vehicles used by three of the suspects.
HISTORY • Cost to the community • St Mary Axe £1.28 billion • Bishopsgate £960 million • TOTAL £2.24 billion • Cost of Technology • Entry Points • Automatic Number Plate Recognition (ANPR) • Exit Points • TOTAL £2.48 million • EQUIVALENT TO 0.2% of cost to community
UK Counter Terrorism Strategy PREVENT terrorism by tackling its underlying causes To reduce theTHREAT PURSUE terrorists and those who sponsor them To reduce the RISK PROTECT the public and UK interests To reduceVULNERABILITY PREPARE for the consequences
BUSINESS CONTINUITY • 80% of businesses affected by a major incident close within 18 months. • 90% of businesses that lose data from a disaster are forced to shut within two years. • 59% of UK organisations were disrupted by 9/11, one in eight was seriously affected.
CORE BUSINESS • C.T.S.A. network • Operation Rainbow • Terrorism Act 2000 • CCTV / ANPR • Partnerships • Emergency Planning Dept. • Business Continuity • Architectural Liaison
C.T.S.A.s • The majority of the work of the CTSAs is coordinated and directed by the National Counter Terrorism Security Office (NaCTSO), • The core role of the CTSA is to • identify and assess local critical sites that might be vulnerable to terrorist or extremist attack; • devise and develop security plans to minimise impact on that site and the surrounding community. • Additionally, the CTSA will promote awareness of the terrorist threat.
PROJECT GRIFFIN • Pioneered by City of London Police • True partnership • Three strands • UK roll-out • International involvement • Over 9,000 security professionals • Griffin II – e-learning refresher package • www.projectgriffin.org.uk
OPERATION BUFFALO • Deployment of covert officers • Trust and Confidence • Significant learning • Tests stakeholder and police response • Two levels and developing • Safeguards • National interest
PROJECT ARGUS • Multi-media simulation of a terrorist attack • Learn, share and exchange experiences • Running during 2007 and 2008 across UK • Ambulance, Fire Services and Local Authority • Advice to prevent,handle and recover from an attack • Over 1,000 people attended City events
TRUSTED PARTNERS The Security and Emergency Services working alone will never defeat terrorism – we need ‘Trusted Partners’
COMMUNICATION • City of London Corporation • Sister Banks Group • Crime Prevention Association • Warning and Informing • Training and Exercising
Top Ten Security Guidelines to Businesses • assess the risks to your business • consider security first when planning building works • establish a security culture in your business • keep premises clear and tidy • control access points and use staff and visitor passes • install physical measures e.g. locks, alarms, CCTV, lighting etc • establish good mail handling procedures • recruit carefully, checking identities and following up references • take proper IT security precautions • test your business continuity plans regularly
SUMMARY • The threat is real and long lasting • Any attack has an impact beyond its boundaries • Partnership approach • Social responsibility • It takes a network to defeat a network
Any Questions? • Ch Supt Alex Robertson