…doors locked and windows closed, especially in areas containing traffic lights, stop signs or speed bumps. If approached while stationary, drive away quickly. If followed or harassed, head for the…
Search Results
-
-
…Secure any cable on site. Consider using secure alarmed containers or ground anchors. If this is not possible, make sure all cable is covered so you do not advertise its…
-
…browse the internet, check email or socialise to doing online banking, shopping and controlling home appliances (and even vehicles) when paired with other devices. Our smartphones contain sensitive information from…
-
…The hand sort should check for one or more of these signs: Shape of package: IEDs or incendiary devices can contain irregular shapes such as power supplies, detonators and trigger…
-
-
…testing and, where possible, contact the police as soon as possible. If you don’t feel comfortable doing this, you can always contact us at info@stampoutspiking.org Working together for safer spaces…
-
Hostile Vehicle Mitigation (HVM) Jargon Buster Vehicles used for malicious intent pose a significant security threat, chiefly because of the amount of explosives they can contain and the damage the…
-
…vehicles) when paired with other devices. Our smartphones contain sensitive information from personal photos to business contacts and password logins. And due to people’s reliance on and wide usage of…
-
…full aircraft container of suitcases. For all but the last test we used an indoor range at Faldingworth so that we could be certain that we had registered all the…
-
…of information they contained. Observations of unusual reconnaissance activity perhaps, which at the time may have seemed fairly innocuous to the officer, but which could now yield the vital clues…










