Date:
… your organisation. … Links to view and download the action cards can be found below: Action Card  Download  Acid Attack Action Card Bomb Threats Action Card Marauding Attacker Action Card …
To ensure our response and coordination across policing and with our partners is the best it can be in the event of a terror attack, we are continually learning and refining our skills.
This guidance is designed to help people respond safely to incidents involving hazardous substances, including ‘acid attacks’.
This section describes the core underlying principles of NPSA's protective security methodology. This methodology defines a holistic approach to the protection of your most important or sensitive assets - as protective security measures can only be truly effective if the physical, personnel and cyber elements are considered complementary to…
Understanding terrorist targeting is an essential part of our efforts to protect the public and prepare against the threats we face.

To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
You may have seen reports in the media this week about a man from Surrey, who was reported to Counter Terrorism Policing after IT repair men noticed suspicious content on his laptop. It’s a timely reminder of the important part business can play in stopping terrorist activity early.
Good housekeeping is an important part of your security regime, helping to reduce the opportunity for placing suspicious items or bags and helping to deal with false alarms and hoaxes.
… sianel. Gellid defnyddio’r rhain hefyd ar straeon ac mewn carwselau. Square Video Wide Video Portrait Video     Square …
This checklist has been created to assist businesses during periods of increased visitor footfall within the retail and night time economy premises, such as the lead up to the New Year and national holidays. During this period we can see a significant increase in the number of people visiting retail and night time economy premises. This checklist…
… and exits of specific buildings? … cheque and credit card fraud are ways of generating cash.  Have you noticed … you reach out, the quicker we can protect the person you care about from being groomed and exploited by extremists. … form. Terrorists use the internet to provoke individuals to carry out attacks. One post or video has the power to …