Date:
… an adversary to provide protection from specific types of threat, such as blast or ballistic to provide protection …
Implementing the SCA should lead to fewer security-related changes being required at a later stage. It also reduces the chance of repeating mistakes that may have compromised security in the past.
Please note that premises used for counting ballot papers may well be used for other purposes until shortly before counting commences. It is imperative therefore, that a thorough search be made as near as possible to the arrival of the first ballot box. Particular attention must be paid to the storage and delivery areas for ballot boxes, exits and…
… or acidic substance. For further advice download the Threat Recognition Guide … Screening mail and courier …
… Video Surveillance Systems) detect intruders and/or high threat scenarios control access to secure areas, when used …
If you are alerted to a firearms or weapons attack, stay calm, RUN or HIDE, only when it is safe TELL the police
If you receive suspicious item call 999 and ask for the police. Clear the area immediately. Do not attempt to open the letter or package. Avoid unnecessary handling. Keep it separate so it is easily identifiable.
Good housekeeping is an important part of your security regime, helping to reduce the opportunity for placing suspicious items or bags and helping to deal with false alarms and hoaxes.
Security-Minded Communications (SMC) is designed to disrupt hostiles during the reconnaissance stage of their attack planning.
Most social media companies provide advice about online security. This includes guidance on how to secure your account and how to report incidents of online abuse, harassment and intimidation.