Marauding terrorist attack (MTA)
We understand the dynamic and evolving nature of terrorism and are able to develop design measures and operational procedures to assist clients in dealing with the emerging Marauding Terrorist with Firearms Attack (MTFA) threats.
Following the coordinated terrorist attacks in Paris in 2015, which featured groups of trained terrorists armed with automatic weapons, there has been heightened increase in the MTFA attack method. This attack style requires little planning, particularly when compared to that required to construct and detonate an improvised explosive device, so it remains a very real risk to society.
We are able to work with clients to develop strategies for reducing the risk of an MTFA attack and ensure that a building’s occupants are protected, or can be moved quickly away from the threat. We seek to develop ‘risk proportionate’ mitigation measures that do not overtly impinge on the everyday operation of the building and/or organisation. Ultimately the aim is to disrupt and delay an attacker long enough for the security services to respond to an incident.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services