BOMA Suggested Security Measures

Low- or No-Cost Actions:

  • Maintain situational awareness of world events and ongoing threats.
  • Ensure all levels of personnel are notified via briefings, e-mail, voice mail and signage of any changes in threat conditions and protective measures.
  • Encourage personnel to be alert and immediately report any situation that may constitute a threat or suspicious activity.
  • Post emergency telephone numbers for police, fire, and rescue.  Encourage personnel to memorize important numbers.
  • Know the location of the closest police stations, hospitals, schools, etc.
  • Encourage personnel to avoid routines, vary times and routes, pre-plan, and keep a low profile, especially during periods of high threat.
  • Encourage personnel to take notice and report suspicious packages,  devices, unattended briefcases, or other unusual materials immediately; inform them not to handle or attempt to remove any such object.
  • Take any threatening or malicious telephone call, facsimile, or bomb threat seriously.  If such a call is received, obtain and record as much information as possible to assist in identification of the caller. Record the time of the call, the exact words, any distinguishing features of the caller, and any background noise. Develop bomb threat information forms to assist if not already in place.
  • Encourage personnel to keep their family members and supervisors  apprised of their whereabouts.
  • Encourage personnel to know emergency exits and stairwells.
  • Increase the number of visible security personnel wherever possible.
  • Rearrange exterior vehicle barriers, traffic cones, and road blocks to alter traffic patterns near facilities and cover by alert security forces.
  • Institute/increase vehicle, foot and roving security patrols varying in size, timing and routes.
  • Implement random security guard shift changes.
  • Arrange for law enforcement vehicles to be parked randomly near entrances and exits.
  • Review current contingency plans and if not already in place, develop and implement procedures for receiving and acting on threat information, alert notification procedures, terrorist incident response procedures, evacuation procedures, bomb threat procedures, hostage and barricade procedures, chemical, biological, radiological and nuclear (CBRN) procedures, consequence and crisis management procedures, accountability procedures, and media procedures.
  • When the aforementioned plans and procedures have been implemented, conduct internal training exercises and invite local emergency responders (fire, rescue, medical and bomb squads) to participate in joint exercises.
  • Coordinate and establish partnerships with local authorities to develop intelligence and information sharing relationships.
  • Place personnel on standby for contingency planning.
  • Limit the number of access points and strictly enforce access control procedures.
  • Implement stringent identification procedures to include conducting 100% “hands on” checks of security badges for all personnel, if badges are required.
  • Remind personnel to properly display badges, if applicable, and enforce visibility.
  • Require two forms of photo identification for all visitors.
  • Escort all visitors entering and departing.
  • X-ray all packages, if possible, prior to entry, and inspect all handbags, and briefcases.
  • Validate vendor lists of all routine emergency deliveries and repair  services.
  • Approach all illegally parked vehicles in and around facilities, question drivers and direct them to move immediately, if owner can not be identified, have vehicle towed by law enforcement.

Actions That May Bear Some Cost:

  • Consider installing telephone caller I.D., record phone calls, if necessary.
  • Increase perimeter lighting.
  • Deploy visible security cameras and motion sensors.
  • Remove vegetation in and around perimeters, maintain regularly.
  • Institute a robust vehicle inspection program to include checking under the undercarriage of vehicles, under the hood, and in the trunk.  Provide vehicle inspection training to security personnel.
  • Deploy explosive detection devices and explosive detection canine teams.
  • Conduct vulnerability studies focusing on physical security, structural engineering, infrastructure engineering, power, water, and air infiltration, if feasible.
  • Initiate a system to enhance mail and package screening procedures (both announced and unannounced).
  • Install special locking devices on manhole covers in and around facilities.
  • Implement a counter-surveillance detection program.