This guidance is designed to help people respond safely to incidents involving hazardous substances, including ‘acid attacks’.
Counter Terrorism Policing Teams have been testing new protective security and preparedness ways of working with over 30 Local Authorities and public bodies in the North East.
Keywords:
Counter Terrorism Support
, National Counter Terrorism Security Office
, Coventry University
, Institute for Peace and Security
, Protective Security
, Preparedness
, Secure societies
, Resilient societies
, Pilot program
, NaCTSO update
, North East Pilot
, NE Pilot
, Zones North East Pilot
Understanding terrorist targeting is an essential part of our efforts to protect the public and prepare against the threats we face.
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
To further explore this area, NaCTSO commissioned Coventry University to investigate whether a prominent risk assessment framework, known by the acronym ‘EVIL DONE’, can be used to identify attractive…
… attack. It is sensible to: • Be aware of the latest news relating to your destination; • Know the current threat …
Keywords:
Summer Campaign
, Digital assets
, Counter Terrorism
, Toolkit
, Public events
, Event safety
Evidence-based policing (EBP) means the best available evidence is used to inform and challenge policing policies, practices and decisions. As the terrorist threat evolves, this important approach ensures that the work NaCTSO undertakes is effective, collaborative and responsive to the problems we face.
The ProtectUK Analysts give an insight into Terrorist use of Fire in Attacks.
Keywords:
Fire as a weapon
, Attack
, Attack Methodology
, FAW
, Arson
, Terrorist Attack
, Fire
, Weapon
, Terrorist threat
, MTA
, Marauding Attack
The ProtectUK Analysts give an insight into terrorist use of Vehicle as a Weapon (VAW) attacks.
Keywords:
Vehicle as a Weapon
, Hostile Vehicle Mitigation
, Attack
, Attack Methodology
, Threat analysis
, Ideologies
, Threat
, VAW
, Awareness
, Analysis