This document outlines a set of options which can be used by the private sector and security industry to enhance the wider national security posture at times of raised threat or in response to a terrorist incident.
Keywords:
National Stakeholder Menu
, Tactical Options
, Protective Security
, Protective measures
, Threat
, MOTO
This section describes the core underlying principles of NPSA's protective security methodology. This methodology defines a holistic approach to the protection of your most important or sensitive assets - as protective security measures can only be truly effective if the physical, personnel and cyber elements are considered complementary to…
A suite of documents intending to guide managers in the selection, procurement and management of appropriate body armour for their civilian security staff.
Implementing the SCA should lead to fewer security-related changes being required at a later stage. It also reduces the chance of repeating mistakes that may have compromised security in the past.
A gunshot detection system is typically comprised of one or more sensors (optical and/or acoustic) that accurately and reliably detects live ammunition (gunshots) being discharged.
Update from the NaCTSO Competent Persons Scheme. What is next?
Keywords:
NaCTSO Competent Person Scheme
, NaCTSO CPS
, Competent Person Scheme
, Government
, Martyn's Law
, Qualification
, Course
, Business
, Security
, Preparedness
A man has been charged following the arrest at St James’s Hospital in Leeds last Friday.
Understanding terrorist targeting is an essential part of our efforts to protect the public and prepare against the threats we face.
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
Active access delay systems seek to disorient and delay attackers.
The advice contained in this section is intended to assist Returning Officers to develop a security plan to avoid major disruption to the election process. The recommendations will not be applicable in all cases and should be regarded as a menu of options that could be implemented, taking into account the nature of the threat together with the…