Audio and Video Feeds
The exercise was structured to include audio, video and paper feeds in order to build the scenario, followed by a number of written questions for consideration by the syndicate. This started with a number of geographically disparate incidents, all suspicious in nature, but not obviously linked. These included the theft of petrol tankers from depots and truck stops, and vehicle passengers videoing motorway bridges and toll booths. It was designed to highlight the fact that this type of intelligence is rarely shared in an efficient way between police forces in the same region, let alone nationally.
Also, it is unlikely that this information will hardly ever reach agencies outside of the police service. Following a period of syndicate discussion, a director-led feedback session was held. This involved selected tables (regions) briefing their solutions to the floor. At the conclusion of each session, written feedback on that stage was collected from each table and entered into a final “lessons learned” presentation.
The second theme running through the exercise was a series of presentations that followed each feedback session. This was structured to educate and revise the delegates on existing CT procedures, operations and protocols. These presentations were made by specialists from the various agencies present and also by SO15 (Counter Terrorist Command).
The day went very well as the scenario built to a number of simultaneous attacks on the SRN infrastructure, testing the groups on their internal and partnership procedures. The final presentation was developed during the day. It summarized the main lessons learned by all participants, and focused on some areas for development and improvement. This was confirmed by a full de-brief a month later and a report of the findings was distributed to all participants and all UK police forces. The main findings of this report are summarized here in order to allow U.S. police forces to heed the same lessons. They will be as relevant to American commanders as they are to British commanders.
Police forces can be quite “precious” about the dissemination of intelligence to outside agencies, for example the HA, particularly in relation to terrorist incidents. This can lead to the loss of intelligence and target coordination that could be achieved by having more “eyes” out there knowing what to look for.
The serious issue of security classification can be a real hindrance in a fast-moving, mobile terrorist scenario. Various Web-based applications are available via secure Internet connections that utilize message boards and operational logs capable of being accessed and updated from various locations. Commanders must balance the security of intelligence against the need for access to it to all relevant agencies during a terrorist incident.
It was highlighted that there was a need to brief the wider audience in the various CT operations that are coordinated by SO15 (CTC). Specifically, the relevant operations dealing with hostile reconnaissance around vulnerable targets and infrastructure (motorway bridges, toll booths, tunnels, interchanges, etc.) and dealing with the thefts of hazardous loads or liveried vehicles. It is vital to ensure that terrorist intelligence is reported and logged during routine work and operations (When CT is not at the forefront of everyone’s minds).
There is a need to brief other highway users on the nature of suspicious incidents in order that more activity can be reported and collated, thus building a more complete intelligence picture. A good example of this working well is Highway Watch® in the U.S.
There is a lack of knowledge of police operational protocols among the HA staff when dealing with incidents of this nature. The HA has a pivotal role in the front-line response for the SRN. Therefore, there is an identified training need in dealing with its response to VBIEDs.
The use of automatic number plate recognition (ANPR) is invaluable in the tracking of vehicles when on the move, particularly on the SRN where there are many ANPR fixed sites. Police forces are unsure how effectively they could interrogate the back-up computer systems that store the data in relation to captured images, dates, times and locations. There is an obvious need for fast time interrogation on these systems in response to a terrorist incident.
The exercise enabled good networking opportunities for the agencies that do not normally interact. One delegate mentioned the most successful part of the exercise was, “Setting everyone together around the table thinking CT.”
The exercise demonstrated the value of partnership working time and again, opening lines of communication between partner agencies that do not necessarily share existing protocols. This exercise was seen by many as a first step. It was recommended that combined exercises should take place annually to practice partnership working.
It is proposed to hold a similar exercise in a year’s time to test the improved structures and processes that have been put in place. This time, however, it will involve a real-time incident being relayed across the screen by the plethora of CCTV and traffic control cameras that inhabit the SRN. It will be an ardent test of coordination and control of an armed VBIED intervention across several Force borders.
All in all, the exercise was a worthwhile first step into new territory for many of the players, who prior to the day may not have realized the significance of the contribution they may have to make to CT operations. It put faces to names for many people and broke down some perceived barriers. Best of all, it reinforced the fact that despite our differences, despite the hats we all wear, we are on the same side with the same mission—to save lives.
Jim Dowle has worked as a police officer for more than 16 years, with a tactical firearms team, as a close protection officer and as a sniper for more than 10 years. He is now a sergeant at the Force Headquarters Training Department. His counter-terrorism training course has recently won the UK National Training Award. He can be reached at email@example.com.