RiskUKOctober2017
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Mail Room Security Management: Systems and Procedures<br />
essentially there are two types, specifically<br />
conveyors and cabinets.<br />
A conveyor machine is similar to those seen<br />
at any airport used to scan hand luggage. It’s<br />
an effective scanner for when the flow of mail is<br />
constant and there are many large packages<br />
entering the business.<br />
Many of today’s conveyors have useful<br />
additional optional software options that<br />
should be considered, such as Advanced<br />
Detection Software (ADS) and Threat Image<br />
Projection (TIP). The former is advanced<br />
algorithm software that works by identifying<br />
the atomic number in explosive substances and<br />
contraband. Explosives are highlighted to the<br />
operator within a red box and contraband<br />
within a yellow box, making it easier for the x-<br />
ray machine user to identify potentially<br />
dangerous or banned substances.<br />
TIP technology is useful for quality control,<br />
risk analysis and the assessment of individual<br />
screener performance. It can show screeners<br />
artificial, but realistic x-ray images of threats<br />
during a routine baggage x-ray screening<br />
operation in order to aid and also test their<br />
security threat identification skills.<br />
Cabinet scanners<br />
Cabinet scanners are now also proving popular<br />
with many end user organisations because they<br />
create a lower carbon footprint and cost 50%<br />
less than a conveyor machine. As if to<br />
emphasise their popularity, every British<br />
Embassy across the world currently uses a<br />
cabinet scanner for security purposes.<br />
These scanners are operated by opening the<br />
chamber door and placing inside the items to<br />
be scanned. A single push-button operation<br />
then generates an image. Once the image has<br />
been generated, the advanced feature<br />
operating software makes the identification of<br />
suspect items easier.<br />
These advanced features can include<br />
Enhanced Powder Detection for the ease of<br />
identifying powders such as anthrax or ricin, as<br />
well as an e-mail facility to send the picture of a<br />
suspect package to a third party for<br />
assessment. Other useful advanced features<br />
can include zoom control, density alerts and<br />
three-point colour, all of which have been<br />
designed to help the user easily identify what’s<br />
inside the package they’re scanning.<br />
“The threat assessment should examine risk at entry to the<br />
building and how visitors are screened and bags searched<br />
at this juncture. How post is delivered and the physical<br />
location of the mail room are further considerations”<br />
Once any new scanning equipment is in<br />
place, it should be regularly reviewed as part of<br />
an ongoing threat assessment process to<br />
ensure that it’s maintained and upgraded to<br />
counter any new threats as required. Scanning<br />
operators should also be tested and training<br />
invested in to ensure that they’re up-to-date<br />
with all the latest security Best Practice. Often,<br />
the leading scanning machine providers will<br />
include introductory training for operators as<br />
part of the package when equipment is bought.<br />
Business continuity<br />
Once the assessment and action plan has been<br />
put into place, organisations should then look<br />
to consider the safety, information and<br />
business continuity implications.<br />
For example, it’s important that organisations<br />
achieve and maintain full Ionising Radiations<br />
Regulations 1999 (IRR99) compliance for staff<br />
using x-ray scanning security equipment. This<br />
document is aimed at the protection of the<br />
public and the health of those staff who work<br />
with ionising radiations and points directly at<br />
those employers with duties under IRR99.<br />
Organisations using x-ray security scanning<br />
machinery fall under these regulations.<br />
The organisation should also put in place<br />
mechanisms to ensure that all security staff are<br />
kept up-to-date with all current terror threats<br />
by following the countrywide alert status set by<br />
MI5. They should be aware of the location and<br />
contact details for the regional Counter-<br />
Terrorism Security Advisor should that person’s<br />
assistance be required. An overview of groups<br />
that may wish to target the organisation can be<br />
identified. In addition, it’s important to consider<br />
the lone activist, the disgruntled employee or<br />
customers with a grudge.<br />
A reporting schedule will need to be put into<br />
place, recording any mail attacks and tracking<br />
current trends and methods used by individuals<br />
or groups which can also be used as a staff<br />
training tool.<br />
Finally, the host organisation should make an<br />
assessment and ensure that it could still<br />
operate effectively if the mail room area had to<br />
be evacuated because of a security threat. This<br />
can be achieved by identifying and/or<br />
establishing a co-location either on another site<br />
or in a different part of the building.<br />
Implementing and continually checking on<br />
security measures for an organisation’s mail<br />
room can be a challenging task. As a result,<br />
many choose to work with professional security<br />
organisations to carry out some or all the tasks<br />
identified. There’s no simple answer as to which<br />
course your organisation should take, but help<br />
is at hand should assistance be required.<br />
54<br />
www.risk-uk.com