Recognising and Identifying Suspicious Items - Advice for Schools (2024)

The National Counter Terrorism Security Office (NaCTSO) have released guidance for ‘Recognising the Terrorist Threat’, which includes guidance in dealing with suspicious items that may be found in locations such as schools.

If you come across a suspicious item, follow the HOT protocol:

1) Hidden

  • Has it been concealed or hidden from view?
  • Bombs are unlikely to be left in locations where any unattended item will be noticed quickly.

2) Obviously Suspicious

  • Does it have wires, circuit boards, batteries, tape or putty-like substances?
  • Do you think the item poses an immediate threat to life?

3) Typical

  • Is the item typical of what you would expect to find in this location?
  • Most lost property is found in locations where people congregate?

After using the HOT protocol above, should you believe the item is still suspicious and warrants further investigation:

1) Clear the immediate area

  • Do not touch the suspicious item.
  • Take charge and move people away to a safe distance. It is recommended to move at least 500 metres away from the item.
  • Keep yourself and other people out of line of sight of the item. It is a broad rule, but generally if you cannot see the item then you are better protected from it.
  • Think about what you can hide behind. Pick something substantial and keep away from glass such as windows and skylights.
  • Cordon off the area.

2) Communicate - Call 999

  • Inform your control room and/or Site Manager.
  • Do not use radios or mobile phones within 15 metres of the suspicious item.

3) Control access to the cordoned area

  • Members of the public should not be able to approach the area until it is deemed safe.
  • Try and keep eyewitnesses on hand so they can tell police what they saw.

For quick reference, a HOT protocol poster has been made available and can be found here. This poster can be printed and made readily available to refer to in the event that a suspicious item has been found.

Recognising and Identifying Suspicious Items - Advice for Schools (2024)

FAQs

What are the 4 C's when dealing with a suspicious item? ›

If you believe that an item is suspicious, the “4Cs” protocol should be applied - CONFIRM, CLEAR, COMMUNICATE and CONTROL.

What is the protocol for identifying suspicious items? ›

Members of the public should not be able to approach the area until it is deemed safe. It is of utmost importance for the safety of your site and its people, to remember these simple protocols. HOT, hidden, obviously suspicious, typical. The four C's, confirm, clear, communicate, control.

Why is it important to identify and report suspicious items? ›

By reporting a suspicious package or unattended bag, you could prevent harm to yourself and others. 3. Law enforcement: Reporting suspicious activity is essential to helping law enforcement do their job. They rely on the public to report potential threats and suspicious activity to prevent crime and terrorism.

How do you recognize suspicious activity? ›

Dressing inappropriately for the weather or occasion (having a coat on when the temperature is warm, etc.) Leaving packages, bags or other items behind. Exhibiting unusual mental or physical symptoms. Unusual noises like screaming, yelling, gunshots or glass breaking.

How do you handle suspicious items? ›

Suspicious Package

Do not put the package in water or a confined space such as a desk drawer or cabinet. If possible, open windows in the immediate area to assist in venting potential explosive gases. Isolate the suspicious package/article and clear the immediate area until law enforcement arrives.

What is the 4 C's protocol? ›

The routine provides learners with a structure for a text-based discussion built around making connections, asking questions, identifying key ideas, and considering application.

What is a formal process for identifying suspicious activity? ›

Reporting Procedures for Suspicious Transactions
  • Filing Suspicious Activity Reports (SARs): A key compliance requirement is the filing of SARs or equivalent reports. ...
  • Timeliness and Confidentiality: SARs should be filed within the timeframe stipulated by the relevant regulations.
Jan 23, 2024

How to identify a suspicious object? ›

A suspicious object is defined as any package, parcel, container, or other object that is suspected of being an explosive device because it is out of place or unusual for that location and cannot be accounted for, or because a threat has been received.

What is the process for reporting suspicious or damaged items? ›

If you receive suspicious item call 999 and ask for the police. Clear the area immediately. Do not attempt to open the letter or package.

Why it is important to report suspicious activities that occur on school grounds? ›

Identifying, reporting, and addressing concerning student behaviors and other suspicious activities can help stop violence before it occurs.

Which method is used to identify potentially suspicious activity? ›

A surveillance monitoring system, sometimes referred to as an automated account monitoring system, can cover multiple types of transactions and use various rules to identify potentially suspicious activity. In addition, many can adapt over time based on historical activity, trends, or internal peer comparison.

What are examples of suspicious activity? ›

Collection or discovery of unusual amounts or types of weapons, including explosives, chemicals, and other destructive materials, or evidence, detonations or other residue, wounds, or chemical burns, that would arouse suspicion of terrorism or other criminality in a reasonable person.

What methods and controls are used to detect suspicious activities? ›

Sources for identifying suspicious activity can be regular controls, name screening, look back exercises, and transaction monitoring. Institutions are required to monitor the huge amount of transactions each day.

How to identify and report suspicious activity? ›

Tips for making a good quality Suspicious Activity Report (SAR)
  1. Submit at SAR online. Wherever possible use SAR Online. ...
  2. Be clear and concise. The report should be clear, concise, logical, including all relevant and supporting documentation. ...
  3. Providing the right information.
  4. Use glossary codes. ...
  5. Other reporting considerations.

What is an indicator of suspicious activity? ›

Impersonation of authorized personnel (e.g., police/security officers, janitor, or other personnel). Misrepresentation. Presenting false information or misusing insignia, documents, and/or identification to misrepresent one's affiliation as a means of concealing possible illegal activity. Theft/Loss/Diversion.

What is the 4 C's in security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What are the 4 C's used to manage incidents? ›

Many factors affect emergency operations. Managing the four C's is a key ingredient and a definite requirement for success. These are command, control, communications and coordination.

What are the 4 C's explained? ›

You've probably heard about the 4Cs of a diamond, and you may even know that it stands for diamond cut, color, clarity and carat weight.

What are the four C's for handling a situation? ›

The 4Cs Clarity, Confidence, Control, and Compassion.

Top Articles
Latest Posts
Article information

Author: Mr. See Jast

Last Updated:

Views: 5986

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Mr. See Jast

Birthday: 1999-07-30

Address: 8409 Megan Mountain, New Mathew, MT 44997-8193

Phone: +5023589614038

Job: Chief Executive

Hobby: Leather crafting, Flag Football, Candle making, Flying, Poi, Gunsmithing, Swimming

Introduction: My name is Mr. See Jast, I am a open, jolly, gorgeous, courageous, inexpensive, friendly, homely person who loves writing and wants to share my knowledge and understanding with you.