Don’t be fooled; last year’s ‘Occupy’ was a peaceful protest movement. Under-planning for the coming protests based on the Occupy Movement would be naïve, but overcompensating and overspending would be similarly foolish. In short, KNOW THE THREAT. Your primary actions:
- Be proactive;
- Involve at least your security, legal, communications, human resources and training departments;
- Understand why your company may be targeted;
- Know the types of attack and how they can compromise operations and reputation; and
- Implement a program that is resource conscious and balances resource restraint against well-funded response.
Proficient protestors learn faster than security personnel and law enforcement; they actively learn from every action, often publishing the results. Experienced protesters travel globally to lend their skills and experiences to whatever demonstration supports the cause de jour. Protesters with criminal intentions desiring to avoid attention and preemption use information security to maintain secrecy while more legitimate protesters leverage social media effectively.
That is why corporate leaders must be aware of the tactics, information, capabilities and equipment protesters use. Protesters strive to disrupt corporate operations through a wide-variety of tactics such as building occupations, sleeping dragons, lock-ons, sit-ins, non-compliant/non-violent traffic disruptions, flash mobs, noise and/or odorous assaults on/in buildings, “hacktivism,” and smear campaigns against board members and employees.
Successful management of protest incidents is a capability that requires all entities within your corporation to work together and understand the challenges being thrust upon them. A successful management program must be proactive, and involve the security, legal, communications, human resources, training and operations branches at a minimum. Protestors attack both brand and physical infrastructure. Company personnel must understand their rights and responsibilities to prevent the protestors being effective and creating subsequent lawsuits.
Corporate security leaders must be prepared to confront and deal with these threats before they occur and have robust response plans prepared. Once an attack has begun, it’s possible the authorities will be busy monitoring the protesters in the public areas, and they may not be able to provide a rapid response. Companies must know why they could be targeted by physical or cyber protests; the causes for protests against the company; and as a secondary target because of its dealings with others.
It’s important to be able to predict and distinguish between a normal protest event and one that is intended to cause property damage, employee intimidation, and business interruptions along with negative publicity and lawsuits for improper corporate response to the protesters.
This distinction is critical. Simply forecasting a scheduled demonstration is routine; a matter of internet search terms. The critical capability is the ability to understand protester tactics and predicting that a particular protest event will cause business disruptions and revenue losses and another that won’t. Having this answer saves corporations needless expenses and allows target hardening when the situation demands it for business continuity and resiliency.
Know your vulnerability. Be prepared. Be situation aware and understand the threat types.