Date:
… If you are alerted to a firearms or weapons attack, stay calm, RUN or HIDE, only when it is safe TELL … RUN, then HIDE. Find cover from gunfire. If you can see the attacker, they may be able to see you. Cover from view does … did you last see the suspects? Descriptions – Describe the attacker, numbers, features, clothing, weapons etc. Further …
… provide a broad indication of the likelihood of a terrorist attack. These national threat levels, along with other … to the threat Overall strategy In respond to a terrorist attack and increase in threat level, the overall business … – Why did the threat level increase? What was the attack methodology used? To consider the operational requirement, …
… better understand, and mitigate against, current terrorist methodology. The following e-Learning Modules are available: … of a Bomb Threat How to Respond to a Firearms or Weapons attack Summary and Supporting Materials For further …
… of temporary vehicle security barriers; they understand the methodology behind Vehicle as a Weapon (VAW) Attacks and the use of Vehicle Borne Improvised Explosive … to mitigate and protect against a Vehicle as a Weapon (VAW) Attack or Vehicle Borne Improvised Explosive Device (VBIED). …
… CBR Response Chemical, Biological and Radiological attacks have the potential to cause significant harm or damage and disruption to infrastructure. CBR attacks can be difficult to conduct, often requiring expertise and resources. Attacks can involve the use of corrosive or flammable …
… remains a realistic possibility, amongst other forms of attack covered later in this section. Vehicles are widely … driving a vehicle into a queue or crowd is a low complexity attack that is easy to initiate. … As a result, the … for fear of rendering the vehicle unusable and bringing the attack to a premature end.  Safety arrangements employed at …
… to give a broad indication of the likelihood of a terrorist attack and are based on a range of factors including current … This intervention casts doubt about the success of their attack planning. Staff briefings will allow your security … capable of being operationally effective against different attack types and can be secured and protected check critical …
… Active access delay systems seek to disorient and delay attackers. … As part of a layered system of physical … Active access delay systems seek to disorient and delay attackers. The increased delay to attackers will help: protect the site(s) asset(s); give …
… threats range from vandalism to sophisticated or aggressive attack by terrorists or determined criminals. Vehicles (such …
… advice is available at www.suzylamplugh.org   The Threat An attack in the UK could occur anywhere and potentially with …