…chains. Once accessed by the cyber thief, this information is harvested and if necessary refined through open source research and intelligence-led information gathering, using either traditional contact by telephone or…
Search Results
-
-
…new bollard design would be tested prior to construction. The Catalogue of Impact Tested Vehicle Security Barriers contains not just traditional bollards but a good number of innovative designs tested…
-
…internet service provider; the creation of public, civil and industry points of contacts dedicated to reducing terrorist use of the internet; the adoption of agreed standards for cooperation between competent…
-
…lists. Once one starts to research open source (free) data the only consideration is not to be overwhelmed with the results, which will contain many false positives, but to grade…
-
…police officers to collect the right amount of evidence and ensure that the relevant details about the case are contained within a single digital file which is made available to…
-
…can be said to be a trade secret. It is trade secret information which must be protected from the insider threat. In this digital age, information contained on technology platforms…
-
…the fraudsters will request payment for work that has not been completed or even access online banking accounts. Fraudsters contact victims via telephone, claiming they are aware of errors on…
-
Protection against and IED (Improvised Explosive Device) The effects of blast from a bomb containing high explosive can be devastating both in terms of damage to structures and injuries to…
-
…counterbalance the distribution of weight from side to side and maintain the head pointing in the direction of travel. When an individual’s foot makes contact with the ground, force travels…
-
…The technology leverages the fact that light is very directional and does not penetrate through walls. Therefore, the wireless network is contained within a defined area of illumination. The system…











