Documente Academic
Documente Profesional
Documente Cultură
Contents
Introduction..................................................................................3
Terrorist methodology...........................................................5
End notes.................................................................................... 53
Introduction
Introduction 3
Introduction
1.01 The UK faces a significant threat from Liaison Officers (ALOs). It will also be of
international terrorism.The current assessed threat interest to those who have responsibility for
level to the UK can be found on the MI5 website1 ongoing management and maintenance of public
where more information can also be found on spaces and streetscapes and to conservation
what threat levels mean, who decides the level of officers in the context of development in
threat and how the threat level system is used. Conservation Areas.
Whilst there have been attacks against well
protected targets around the world, experience 1.04 The guide gives practical advice on how best
shows that crowded places remain an attractive to incorporate counter-terrorism protective
target for terrorists who have demonstrated that security measures into proposed new
they are likely to target places which are easily development schemes whilst ensuring that they
accessible, regularly available and which offer the are of high design quality.The advice that is set out
prospect for an impact beyond the loss of life is generic and cannot address the plethora of
alone (for example, serious disruption or a varying circumstances and degrees of risk which
particular economic/political impact). apply to different facilities. Consideration should
first be given to the relevance of such measures
and whether or not they can be appropriately
Purpose of the guide achieved through the planning system in any
1.02 The purpose of this guide is to give advice particular case. If so, the measures should be
about counter-terrorism protective security design appropriate, proportionate and balanced with
to anyone involved in the planning, design and other relevant material considerations.
development of the built environment from the
preparation of local planning policy to the 1.05 The aim of the guide is to equip the reader
commissioning, planning, design and management with a better understanding of the links between
of new development schemes through to detailed the counter-terrorism dimension of crime
building design. Whilst it draws largely on good prevention and the built environment, so that
practice examples from England and refers to reducing the vulnerability of crowded places to
legislation that applies to England, this guide will be terrorist attack can be tackled in an imaginative
of interest to the Devolved Administrations. and considered way.The guide is not a manual
to be applied by rote or a substitute for using
1.03 This guide will also be of interest to skilled designers.
designers/architects, town planners, engineers,
highway engineers and police Counter-Terrorism
Security Advisers (CTSAs) and Architectural
4 Introduction
Terrorist methodology
Causes of fatalities, injuries and damage • improved access control to crowded places,
from blasts will help secure a building in the event of a
2.08 The main causes of fatalities, injuries and firearms attack;
damage as a result of an IED are: • incorporation of a firearms attack scenario
into emergency planning and briefings;
• direct weapon effects including primary
fragments, lung blast damage, thermal burns • Project Argus and Project Griffin (see
and ear drum rupture; Annex F), as well as protective security
advice published by NaCTSO, help raise
• secondary fragments such as glass, spall
awareness of the business community
(flakes of material that are broken off a
to the terrorist threat and the value of
larger solid body) and other objects thrown
recognising those involved in hostile
by the blast;
reconnaissance. This helps to disrupt
• collapse causing crush injuries; and potential attacks and to produce important
• post-event falling debris (including glazing, intelligence leads.
façade, internal walls etc) damaged 2.11 Project Argus also provides guidance to the
equipment and damaged infrastructure business community to help plan their response to
which can hinder the speedy evacuation of a terrorist attack using firearms5.This includes:
buildings.
• how you would communicate with police,
Chemical, biological, radiological staff, visitors, neighbouring premises.
(including using, for example, public
materials and firearms attack
address systems);
2.09 The issues arising from chemical, biological
and radiological (CBR) materials are various and • the key messages you would give them in
complex. However, in essence, the potential order to keep them safe;
problem will be less onerous the more the threat • how you would secure key parts of the
can be excluded from a facility. Key mitigation building to hinder free movement of the
involves good access control into critical facilities terrorists (including use of enhanced doors
and the protection of air intakes within buildings and locks to withstand entry from armed
and its distribution thereafter. intruders and provide cover for those
2.10 Whilst attacks using firearms will be caught up in an attack);
countered by armed police or the military, • incorporating a firearms attack scenario
protective security measures such as the following into your emergency planning and
may help mitigate the impact of an attack, and briefings; and
where appropriate should be considered at the
design stage of a development or in the • testing the plan annually.
management of crowded places: More detailed advice about actions people
caught up in a firearms attack can take can be
• installing communications, such as public
found on the NaCTSO website (www.nactso.
address systems, that will help get
gov.uk) or www.direct.gov.uk. Businesses can also
appropriate advice to people caught up in a
obtain further information from their local police
firearms attack;
Counter-Terrorism Security Advisers.
• installing doors and locks in, for example,
hotels, which will be more able to resist
entry of armed intruders and, with a
robust ground floor façade, help provide
some cover for people caught up in a
firearms attack;
The challenge of
blending counter-
terrorism protective
security measures
with urban design
principles
The challenge of blending counter-terrorism protective security measures with urban design principles 9
3.01 When considering appropriate protection features. The design aim is a respect for
against terrorist attack, a challenge for designers locally distinctive places which involves
and planners is the application of urban design resources to identify these characteristics,
principles (see paragraph 3.05) whilst at the same as well as sensitive responses. The
time incorporating counter-terrorism protective result may be a combination of some
security measures. Meeting this challenge will standardised components, some invisibly
involve taking account of the following: integrated components based on
conventional traffic management and
• care to avoid an oversensitivity to risk. This
streetscape designs (such as structurally
can result in bland and standardised places
enhanced bus shelters, lamp columns,
– it is important to retain or insert positive
benches or cycle racks) and often some
features that attract people to spaces;
elements of purpose-designed solutions, for
• to retain and attract people to places, example incorporating public art or locally
which are also safe and secured against important features;
some types of terrorist threat, will always
involve a combination of approaches,
tailored to local conditions and special
10 The challenge of blending counter-terrorism protective security measures with urban design principles
• the presence of physical measures in the streetscape to prevent hostile vehicle access or
proximity to a site need not preclude pedestrian access, or diminish the look and feel of an open
and permeable area; and
• integrating protective security measures into a public realm that is designed to be inclusive and
remains accessible to all.
3.02 Each site is different and there is no “one size fits all” solution. Different sites present unique
challenges and considerations that will result in bespoke solutions, including those that meet the needs of
the disabled.
3.03 Typical measures that help to deter, detect and delay a terrorist attack are set out in the table below.
Table 1: Typical counter-terrorism protective security measures
Counter-terrorism Examples of measures
design principles
Better blast resistance • external barriers or a strengthened perimeter to prevent a penetrative (ramming) or close
proximity (parked or encroachment) attack;
• use of building materials which reduce the risk of fragmentation including blast resistant glazing
and structural design which reduces the risk of building collapse; and
• install doors and locks which are better able to withstand entry from armed intruders and
provide robust ground floor facade material, which together will help to provide cover for
people caught up in a firearms attack.
Better building • entrance arrangements which resist hostile entry;
management facilities
• the separation of general heating, ventilation and air conditioning systems for entrance areas,
delivery areas and mailrooms from those occupying the main occupied spaces;
• air intakes that are in a secure area and above first floor level;
• hazardous material stores that are at a safe distance from the building; and
• communications systems (eg public address systems) installed to pass on advice to those
caught up in a firearms attack.
Better traffic • structural measures that prevent access to, or close proximity of, unscreened vehicles to the
management and building or space; and
hostile vehicle
• measures that reduce the speed of vehicles approaching the site or its defences, like bends or
mitigation measures
chicanes.
Better oversight • clear lines of sight around a building;
• absence of recesses on the façade or elevations of a building;
• uncluttered street furniture;
• well maintained and managed litter-free building surrounds that reduce the opportunity for
suspicious hidden items and suspect activity to go unnoticed;
• CCTV and security guarding to provide formal oversight;
• orientating the building so that it overlooks public space and neighbouring buildings to
support informal oversight by those who use and visit the location; and
• well-managed access points and reception facilities that offer less opportunity for intruders to
go undetected and may deter them from taking further action.
The challenge of blending counter-terrorism protective security measures with urban design principles 11
They are grouped into four key counter- 3.04 In seeking to deliver these benefits it is
terrorism design principles: better blast resistance; important:
better building management facilities; better
• that appropriate counter-terrorism
traffic management and hostile vehicle mitigation
protective security measures should be
measures; and better oversight.
proportionate to the risk of terrorist attack
“Designing-in” counter-terrorism protective
to which the building/place is exposed; and
security measures from the outset will benefit
those involved throughout the development • that costs for new protective security
process, from concept design through to planning measures should fall where responsibility
approval, as well as those who will use and visit for those measures lies.
the places and buildings. These benefits will
best be achieved through collaborative working Urban design principles
and broad engagement with all parts of the 3.05 Good urban design creates places which
community. The benefits include: maintain sustainable and attractive environments
which people want to use.The principles of
• it is more cost effective to “design-in”
well-designed places and spaces can be recognised
protective security measures from the
as those with:
outset of a scheme;
• there are aesthetic and functional benefits • character - a place with its own identity;
to designing-in counter-terrorism measures • continuity and enclosure - a place where
at the concept stage rather than later on. access for the public is clearly identified;
The building or place should be attractive,
• quality of the public realm - a place with
accessible (see ‘Urban design principles’ in
attractive and successful areas accessible to
paragraph 3.05 below) and work for those
the public;
that will use and visit it. Counter-terrorism
protective security measures should not • ease of movement - a place that is easy
impose upon the overall style and intention to get through but where routes do not
of a place; compromise security;
• considering counter-terrorism protective • legibility - a place that has clear image and
security measures at the design stage helps is easy to understand;
ensure measures work together and do • adaptability - a place that can change
not displace vulnerabilities elsewhere in a easily; and
new build;
• diversity - a place with variety and choice.
• strengthening a building or place by
designing-in counter-terrorism protective Urban design principles are described more fully
security measures offers wider business in the DETR and CABE document ‘By Design:
continuity benefits in the event of a Urban Design in the Planning System: Towards
terrorist incident; and better practice’6.
Historic environments
4.07 The advice in this section concerns
incorporating counter-terrorism protective
security measures into existing historic
environments where there are special
considerations.This means the advice is concerned
with retrospective fitting of measures rather than
designing measures into new developments from
the outset, although common principles apply.
4.08 Counter-terrorism protective security
measures have two key impacts on the historic
environment: visual and physical. For temporary
works, minimising physical impact is more
important and reversibility is a key principle.
However, for more permanent measures, both
4.11 When seeking advice from English Heritage,
visual and physical impact are important.
contact the relevant regional office. However, if
4.09 In conservation areas, World Heritage Sites, more specialist advice is required on security issues
sites within the setting of listed buildings or in the historic environment, this can be provided
scheduled monuments and registered parks and by English Heritage Government Historic Estates
gardens, it is necessary to consider impact on Unit (GHEU).9
character and on historic fabric, including ground
4.12 It is often difficult to assess the blast
surfaces and underground archaeology. In areas
resistance of a historic building and even more
where historic burials are anticipated, special
difficult to improve it by reinforcement.This is
precautions may be necessary and appropriate
often dealt with by putting the secure boundaries
consent obtained. Works within the curtilage of a
as far away as possible from the building shell, a
listed building or involving the building itself may
more preferable option to attaching security
require listed building consent in addition to
measures to historic building fabrics.
normal planning consents.
4.13 Technology, such as CCTV cameras, needs
4.10 Close liaison with the local planning
sensitive positioning to minimise visual and physical
authority’s conservation team will be essential. In
impact. ‘Technology’ generally has a limited life and
some instances, the local planning authority may
works to accommodate it need to be completely
also want to involve English Heritage, particularly
reversible. Applications for planning permission
when dealing with scheduled monuments, higher
and/or listed building consent will need to be
grade (II and I) listed buildings, major alterations to
accompanied by more detailed plans than usual.
Grade II listed buildings and large developments in
For example, by specifying methods of fixing
conservation areas.
where works would affect the historic fabric.
Public and private space: design, management and maintenance 15
visitors) are taken into account. Broader personnel are clearly identifiable as working
engagement and collaborative working for the appropriate highway authority.
will result in better design solutions and Where this function is being carried out
can have significant management and by non-highway authority personnel, an
maintenance of public space benefits, appropriate contract and service level
minimising conflict with those who use agreement needs to be agreed with the
the space; highway authority;
• continuity and training in the workforce is
helpful, as is the need to ensure that staff
have development opportunities; and
• there is scope to benefit from working
with private and public partners, experts
and interested parties. Examples include:
local community groups to manage spaces
long-term or possibly (with private sector
partners) to provide income generation
opportunities; or informal arrangements
for others to use space (for example,
encouraging police to use spaces to
exercise their horses or to use local
facilities such as cafes) to add to
informal surveillance.
• cover costs – adequate and reliable sources
of funding for maintenance are essential. Private demise
Long-term management and maintenance
4.16 The level of security and access afforded to
(perhaps with replacement/refurbishment
the public when entering onto private land will
projects spanning several financial years) usually be at the discretion of the owner. However,
require consideration of long-term funding. there will be circumstances where a local planning
The costs can be allowed for in appropriate authority (LPA) may wish to secure a particular
Section 106 (Town and Country Planning level of access or security provision that is
Act 1990) and Section 278 (Highways appropriate for the proposed use of the land by an
Act 1980) agreements to ensure that applicant. Such measures can be made the subject
the whole-life and management costs of conditions on a planning permission, or be the
are covered by those benefiting from the subject of appropriate obligations in a related
implemented measures; Section 106 Agreement.
• high quality and well maintained space is
a key strategic requirement and objective
of nearby interested parties (e.g. property
owners, prominent tenants, land owners);
• site staff roles. There is a strong case
for putting trained staff into spaces -
park rangers for larger spaces, on-site
maintenance for smaller spaces. They can
provide a range of services within the
space e.g. interaction with the community
using the space and carrying out of specific
tasks such as locking up or checking for
damage/maintenance tasks. Where this
presence is on-street, it is best if trained
Public and private space: design, management and maintenance 17
4.17 In the case of crowded places, it may be 4.20 Robust personnel security helps an
appropriate to ensure, through appropriate organisation employ reliable people, minimises the
conditions on a planning permission, that the chances of staff becoming insiders, detects
proposed layouts allow for secure entrance areas suspicious behaviour by employees and resolves
where security screening and control can be best security concerns when they emerge.
carried out with minimal risk to the least number
of people. It will also be appropriate in other 4.21 The Centre for the Protection of National
circumstances to ensure that unencumbered Infrastructure (CPNI) provides advice and
pedestrian public access is maintained and that the guidance on personnel security which can be
security measures proposed are proportionate to obtained from the CPNI website10. In particular
the use (i.e. the right of access by the public to CPNI guidance offering practical personnel
areas of public realm accessible from the highway). security advice for HR and security managers
This is particularly relevant where security is available11.
measures restrict vehicular access and there are 4.22 Where there is a need to manage access to
managed security measures requiring trained the public highway or security related
personnel. Appropriate obligations in a Section infrastructure on the public highway, this will need
106 Agreement can be used to ensure that the to be carried out under the control of the
level of restriction is commensurate with need and Highway Authority. As well as carrying out this
that the public are not unduly restricted in function, it may also be appropriate for the
accessing important amenities such as shopping. authority to contract with others to provide this
highways management service. For example where
Personnel security an ‘Access Only’Traffic Order restricting vehicular
4.18 Where access control measures are access to a shopping area is managed by security
incorporated into a building, or installed to control personnel employed by local businesses.This is
access to a wider area of streetscape, the most appropriately done through the use of a
personnel controlling those measures must be Section 278 Agreement setting out the level of
trained and trusted. training, service and monitoring required by the
service provider and the financial arrangements, in
4.19 Personnel security is an important aspect of order to ensure that those that benefit from the
protecting crowded places. It comprises a system service pay the full costs.
of policies and procedures which seek to minimise
the risk of staff or contractors exploiting their Closed circuit television (CCTV)/
legitimate access for unauthorised purposes.Those
who seek to exploit their legitimate access are
oversight
termed ‘insiders’: insider activity comprises many 4.23 CCTV can help clarify whether a security
forms from minor theft through to terrorism. alert is real and identify suspect activity, for
example potential terrrorist planning
18 Public and private space: design, management and maintenance
(reconnaissance) activity. It can also be vital in security purposes.’These rights mean that, within
post-incident investigations, but only if the images certain limits, CCTV cameras can be installed
are good enough to identify what happened over without having to obtain planning permission.This
the timeframe and can be used evidentially in is subject to a number of restrictions and
court. It must also command the confidence of the conditions, which include:
public, so it is important to consider very carefully
the purpose and scale of any scheme and consult • the building on which the camera is
over its operation. installed is not a listed building or scheduled
monument;
4.24 CCTV is most effective when provided with
• the size, location and spacing of the
the following:
cameras;
• good lighting; • no more than four cameras can be on any
• management support; one side of the building;
• continuous monitoring; • no more that 16 cameras in total can be
installed on the building;
• comprehensive and full site CCTV
coverage; • the camera is located so that it minimises
its effect on the external appearance of the
• adequate response; and
buildings as much as possible; and
• good maintenance/housekeeping.
• the camera is removed as soon as
4.25 CCTV cannot replace security staff, although reasonably practicable after it is no
it may permit a reduction in their number or their longer needed.
redeployment to other security activities.
4.27 Part 38 Class B of the GPDO contains
permitted development rights for CCTV and
associated lighting for the Crown on Crown land
for national security purposes. The only
restrictions are on the size of the camera and the
level of lighting. The conditions on minimising the
effects on the external appearance of the building
and removal when no longer required are the
same as those set out above for Part 33.
4.28 Outside of these limits planning permission
must be applied for in the normal way.
4.29 Use of such CCTV is also likely to be subject
to the terms of the Data Protection Act 1998. The
Information Commissioner’s CCTV Code of
Practice (2008)12 contains a wide range of useful
guidance and good practice in relation to planning,
clarity of purpose, installation and operation of
CCTV cameras and systems.
4.26 The Town and Country Planning (General
Permitted Development) Order 1995 (as 4.30 CCTV is not an alternative to getting the
amended) (“the GPDO”) includes ‘permitted design right in the first place, for example, avoiding
development rights’ concerning the installation of recesses in building elevations/facades that can
CCTV equipment (see Part 33 of Schedule 2 to offer hiding places for devices or individuals and
the Order).The wording of Part 33 refers to may require monitoring/oversight. If poles for
permitted development rights in the context of mounting CCTV cameras are being considered,
‘installation, alteration or replacement on a building careful thought will be needed to minimise the
of a closed circuit television camera to be used for impact on the streetscape.
Public and private space: design, management and maintenance 19
When considering the incorporation of counter- (IEDs) either by forceful (i.e. suicide car
terrorism measures in the design of a new bomb) or overt means (i.e. pedestrian
facility, the specialist advice of a police Counter- suicide bomb). See also Annex B, (Design
Terrorism Security Adviser (CTSA) and, if of hostile vehicle mitigation measures) for
appropriate, the Centre for the Protection of further information;
National Infrastructure (CPNI) via the CTSA • measures to limit secondary fragmentation;
should be sought. Expert advice on appropriate
mitigation measures based on assessments • avoidance of hiding places around buildings
of the risk (built up from assessments of and within façade arrangements that might
threat, vulnerability and impact) will provide be used to conceal a hostile person and/or
enhancements that are appropriate in terms of an IED;
the risk, cost, aesthetics and usability. • the value of CCTV coverage as a potential
The measures described below are not deterrent; and
mandatory and the desirability of their inclusion • any pedestrian and vehicle gates to be
in a development depends on a range of factors. compatible with the robustness of the
Where the measures are appropriate, this will remainder of the perimeter.
help to mitigate the vulnerability of buildings to
terrorist attack and limit the extent to which the Building structure
building might exacerbate the effects of such an Measures that should be considered include:
attack. They are particularly relevant to buildings
with significant occupancy and size and may be • as a minimum the measures for robustness
less realistically practicable for buildings that are against disproportionate collapse for Class
modest in scale and/or have only modest levels 2B buildings described in current Building
of occupancy. Regulation A3;
• the use of either framed reinforced
External areas concrete or framed structural steel;
Measures that should be considered include: • if framed reinforced concrete, use in-situ
• physical measures such as external connections. Ensure beams, columns and
barriers and/or a strengthened perimeter floor are all tied continuously together
to prevent access to the facility for the using robust vertical and horizontal
placement of Improvised Explosive Devices reinforcement details. In addition to normal
22 Annex A: Typical counter-terrorism design attributes - design of structures
gravity and environmental loads allow remote from threat areas and away from
for load reversal (e.g. slabs being forced a perimeter, preferably at levels above
upwards by explosion pressure (see ground floor or in a basement. They should
robustness clauses in current code also provide good fire resistance. Overall
of practice BS EN 199214 and consider space should be provided on a basis of
the use of these clauses irrespective of at least 0.66m² per person, related to
building height); the building occupation level. Provision in
• if framed structural steel, ensure that protected spaces should include a means
connection details will take reverse of communicating with the facility’s control
loadings. Floor slabs to be tied to beams room and the outside world, lighting and
with in-situ topping BS EN 199315 water and, ideally, seating, toilet facilities
robustness clauses to be considered and a back-up means of communications.
irrespective of building height); Specialist advice should be sought;
system from the provision for the entrance the building where receipt of a suspicious item
areas/foyers; will not disrupt the remainder of the building.
• locating air intakes for the HVAC system As the extent of risk increases, measures to
in a secure location and ideally at level 2 be considered include installation of an x-ray
or above; scanning machine and local containment
through to off-site receipt and processing
• ability for the HVAC system to be capable facilities for all deliveries.
of rapid shut-off and the location of make-
up air intakes in a secure area; General considerations
• locating essential/critical services away from The following should also be taken into account:
vulnerable façades of the facility; and • the likely response from emergency
• locating the security control centre within services – How quickly can they be called
a protected area of the facility. and how long will they take to arrive at
the facility?
Parking of vehicles beneath buildings • whether hazardous stores can be located at
The parking of vehicles and the delivery of goods a safe distance from the facility.
beneath buildings may in some circumstances
offer particular design advantages (such as
preserving street frontages and using land
more efficiently) which may outweigh other
considerations. However such underground or
sub-basement parking and delivery areas can
present significant challenges from the point of
view of counter-terrorism protective security as
they increase vulnerabilities to terrorist attack
by vehicle-borne improvised explosive devices
(VBIEDs) – and hence pose a risk which needs
to be assessed.
Where such facilities are planned and they
involve access by unscreened vehicles, then it is
important that those proposing the development
consider the extent of the risk posed and
any appropriate options for mitigating it by
reducing the development’s vulnerabilities.
Where appropriate in the light of police CTSA
advice about the assessment of risk, this includes
considering introducing design mitigation
measures such as a strengthened structural
building design (taking account of advice
from police CTSAs - see bullet points under
‘Building struture’ above) and improved traffic
management, including screening of vehicles (see
‘Traffic Management’ in Annex B).
Deliveries to facilities
Protection of facilities from deliveries (including
post) to them could be on a rolling scale. For
low risk installations, the delivery and post
receipt areas could be in an isolatable part of
Annex B: Typical counter-terrorism design attributes - design of hostile vehicle mitigation measures 25
Site assessment for vehicle-borne possible. Instead, start from a point where the
threats aim is to manage traffic in such a way that natural
Each site will require a specific assessment before blast stand-off is created and less traffic has to
counter-measures can be recommended. Those negotiate vehicle access control points. If pass
doing the assessment will need purely to assess check personnel are in-situ at an access control
whether the adjoining land is traversable and if point then design the area so that they are not
so by what vehicles, ignoring congestion, signage, put under undue pressure or distracted by traffic
road markings and “rules of the road”. management requirements.
time to deploy; unless stored locally, they barrier system to resist the hostile vehicle
would normally need to be transported impact, thereby potentially reducing costs and
to site; they may be deployed too late if infrastructural/engineering impacts as well as
in response to other attacks; temporary potentially allowing for more visually acceptable
barrier systems are usually less effective barrier solutions to be deployed.
against penetrative impact than permanent Traffic calming can be achieved by way of
alternatives; they are often not suitable horizontal deflections (typically bends or
on natural or soft ground surfaces; their chicanes). Horizontal deflections can preclude
modular and wall-like nature does not poorer turning circle vehicles – although parts
always lend their effective use to undulating of the chicane can be designed as retractable or
or unmade ground; their mass may removable for occasional access by such vehicles.
preclude their use at certain sites; few
temporary barrier designs incorporate
integral vehicle gate systems; and effective
temporary barriers tend not to lend
themselves to use at sites which have less
defined pedestrian lines and which need
to be pedestrian permeable such as at
transport interchanges or shopping centres.
• If vehicular and/or pedestrian traffic into,
or along, a road needs to be temporarily
or permanently restricted for counter-
terrorism purposes, the Chief Officer
of Police can recommend to the Traffic
Authority that they introduce an Anti-
Terrorism Traffic Regulation Order
(ATTRO). This is made with reference to
Sections 22(c) and (d) of the Road Traffic
Regulation Act 1984 (as amended by the
Civil Contingencies Act 2004). Further
information on their applicability and
selective use is available from CPNI or Vehicle security barriers
CTSAs. Discussion is recommended with Vehicle security barriers provide the hard
disability user groups regarding alternative stop for penetrative vehicle attack. They are
setting down or parking arrangements structural in nature and can be either Active
which may need to be considered if hostile (powered or manual) or Passive. Active measures
vehicle mitigation measures to a site restrict include hinged and sliding gates, boom barriers,
vehicular access to certain areas. retractable blockers and retractable bollards.
Although bollards are often the preferred form
Traffic calming measures of passive measure as they typically maintain
Slowing traffic in advance of vehicle security maximum pedestrian permeability, other forms of
barriers has a number of benefits. It gives passive barrier can also be considered. Structural
drivers the ability to better comprehend what elements can be imaginatively incorporated
is expected of them at a barrier system. It into benches, planters, landscape architecture,
provides the guard force with more time to earthworks, walls, balustrades, cycle stands, lamp
assess approaching vehicles and their occupants columns, shelters and information boards (these
and affords more scope to react appropriately. are often referred to as “street furniture”).
In addition the vehicle approach speed will be CPNI can advise on the form and foundation
reduced accordingly. This reduced speed can then requirements for such elements.
be used to design an appropriately ‘matched’
Annex B: Typical counter-terrorism design attributes - design of hostile vehicle mitigation measures 29
Trees of sufficient girth and rooting can be maintenance and servicing during their lifetime
used as a vehicle security barrier but care must and there is therefore a need to implement a
be taken to monitor the ongoing health and robust service level agreement to reduce or
structural integrity of the tree. The tree will also eliminate barrier downtime. Despite best efforts,
need to be maintained so that limbs do not there is always the possibility that an accident or
provide an easy climbing aid close to a perimeter collision occurs between the operable barrier
and so that evergreen or seasonal foliage and a legitimate or hostile vehicle. It is therefore
does not obscure sight lines for guard force very important to a have a contingency plan that
surveillance. It is rare to be able to rely solely allows that location to be either brought up to
on trees as a vehicle security barrier due to the full operational capability very quickly or secured
inability to grow sufficient strength trees close and an alternative location used.
enough to each other to deny vehicle access
between them. Specifications and advice
The blast stand-off measures should be spaced The Centre for the Protection of National
so that the maximum clear distance between Infrastructure (CPNI) has published impact
fixed structures is 1200mm. Seek advice for testing and installation guidance documents,
the appropriate gaps and overlaps between in the form of British Standards Institution
items that displace on impact. When the stand- Publicly Available Specifications (PAS)17. The two
off measure tapers in elevation, the 1200mm documents are:
clear dimension is to be measured at a height • PAS 68 entitled ‘Specification for Vehicle
of 600mm above the finished ground level. The Security Barriers’ which covers the
1200mm dimension has been optimised to manufacture and testing of vehicle security
limit the opportunity for the vehicle to extrude barriers. It is strongly recommended that
through the barrier line, whilst providing sufficient all vehicle security barriers be specified
access for pushchairs and wheelchairs. The typical to comply with PAS 68 at an appropriate
minimum height of all structural elements is performance level; and
900mm but lower heights are possible depending
• PAS 69 entitled ‘Guidance for the Selection,
on the form of the barrier, nature of the
Installation and Use of Vehicle Security
approaches and threat vehicle types. Cosmetic
Barriers’ provides guidance on the selection
features in excess of this height may help with
and installation of vehicle security barriers.
aesthetic aspirations, aid visually impaired road
users or help to make the measures more CPNI also provide awareness and training on the
conspicuous in areas of higher pedestrian flow. subject of designing-out vehicle-borne terrorism
to architects, engineers, planners and personnel
Vehicle security barriers typically require well
with security, site ownership or operational
designed structural foundations in order for the
responsibilities. CPNI also provide site-specific
items to perform appropriately in the event of
advice and maintain a list of appropriate, tested
a hostile impact. The foundations may need to
counter-measures derived from their extensive
accommodate underground utilities or provide
research and development programme.
for their diversion. Future maintenance access to
the utility chambers will need to be considered
at the design stage.
Effective protective security regimes draw systems and physical measures retrospectively.
upon the ‘Deter, Detect, Delay’ principles. The It is important therefore to select the most
appearance of a site to any potential attacker, appropriate measures applicable to that site
whatever the motive, can play a significant role in and its security requirements to minimise the
how they assess the vulnerability of that site. financial impact and business disruption caused
A clear area, well maintained, with managed by installation and implementation.
access points and reception facilities set in tidy Consideration of security features is most
grounds, presents an image of professionalism effective for new build sites at the design/
and offers less opportunity for an intruder to concept stage, so effective consultation with the
go unnoticed. This may well be enough to deter relevant interested parties, planners, designers,
them from further action. police and security experts is of paramount
Once an attacker has decided to continue importance. This will identify the level of security
with an intrusion then robust, proportionate, required and the most appropriate measures
well maintained and well managed protective and systems available to meet that requirement.
security systems, including structured policies The procurement and installation can then
and procedures, that are adhered to, make it be incorporated into the design and build
more difficult for critical assets to be accessed. budget, whilst the site and building design can
As a consequence, an attacker has to evade or accommodate the security measures and still
circumvent these measures to effect an entry. An achieve a welcoming, attractive, comfortable and
integrated security regime will detect an intruder safer environment.
at an early stage and, most importantly, before This guide features four good counter-terrorism
any critical assets have been reached. design principles;
The attacker must then breach the physical • better blast resistance;
security measures before gaining access to any • better building management facilities;
assets. The right measures will provide a
sufficient delay to allow time for the security • better traffic management and hostile
response to reach the point of attack and vehicle mitigation measures; and
apprehend the intruder. • better oversight.
Existing sites looking to improve their overall The following examples show how recent
security arrangements will have to install new projects have included such principles.
32 Annex C: Case studies
protective regimes, although not impossible, The site also includes a substantial underground
is extremely difficult, especially if it is to be delivery and service area. There is a need to
achieved undetected. control access into this area and manage delivery
A shopping centre and precinct development has arrivals and prevent hostile vehicles penetrating
incorporated a number of features into its final vulnerable or critical facilities before they can be
design. Although this project was conceived and identified and denied access. Effective measures
design commenced during the 1990s, events in had to be deployed which would achieve this
the Haymarket at London and Glasgow Airport without unduly impacting upon the day-to-day
in 2007 reinforced the need to consider counter- site operation.
terrorism protective security measures at an Existing sites where rejection routes have not
early stage in the design process. This allowed been considered at the design stage often face
the local CTSAs, working with representatives difficulties, as their service entrances do not
from the Centre for the Protection of National allow room for rejected vehicles (such as large
Infrastructure (CPNI) to engage with the design articulated goods vehicles) to turn around or
team, senior management and the developers manoeuvre away. Consultation with the local
to consider vehicular access to the site and city council has resulted in agreement for the
identify protective security measures that were centre management to utilise a holding area on
achievable, appropriate and acceptable to all. the approach roads, some distance from the
entrance, where expected vehicles wait whilst
their appointment and identity details are verified
before they can be security screened and then
called forward to the service area. Spontaneous
arrivals also have to wait here, so that security
personnel can obtain the necessary information
and then confirm with the intended recipient
that the delivery and/or delivery agent are
bona-fide. Where that is not confirmed then the
vehicle is rejected and can easily be returned to
the roads network or, if necessary, intercepted by
the appropriate enforcement agency.
Better oversight
One major shopping centre in the UK has a
large number of CCTV cameras within the site
and these are monitored and controlled from
a dedicated security control room. The system
also incorporates an Automatic Number Plate
Reader (ANPR) that has a number of software
filter measures to reduce excess data capture
and keep the system more manageable. For
example, during day-to-day operation it uses
36 Annex C: Case studies
employs a member of staff who has responsibility team arranged for the local CTSA to advise on
for management and accountability issues. counter-terrorism protective security measures.
A major station main building has a large A series of briefings was delivered to the stadium
expanse of glazing across most of the roof Safety Manager and to the Board of Directors
area. This lets in high levels of natural light to raise awareness about terrorism and its
and provides an excellent basis for natural relevance to a crowded place venue.
surveillance. The comprehensive CCTV system The police team not only looked at design from
has been integrated with internal lighting to a ‘Crime Prevention Through Environmental
provide a similar environment in low natural Design’ (CPTED) and counter-terrorism point
light conditions. This is further enhanced by the of view, but also from a policing operations
use of glazed panels in place of solid barriers perspective (e.g.; ‘How was the venue going
to manage and separate pedestrian traffic and to be policed during an event?’). Account was
define security zones. As a consequence, this also taken of the requirements of, for example,
large, open public space and adjacent restricted the Fire and Rescue Service to facilitate their
zone has a comfortable, welcoming atmosphere response and ensure site compliance with Fire
whilst enhancing clear views of the area and Safety Regulations.
limiting the opportunities for all types of crime. Since completion, the sports stadium has been
CCTV monitoring by the in-house security acknowledged as a leader in its imaginative
guard force is augmented by operational links design of hostile vehicle mitigation measures
to British Transport Police affording a rapid and and has become a favoured venue for high
appropriate response to incidents. profile conferences. This unanticipated business
opportunity has been borne out of the
Early engagement in planning
effectiveness of the integrated security approach.
and design
A major project to develop a station
A major sports stadium is an example of a
commenced in 2000. Major interested parties
private sector building with overt protective
were involved in the planning and design from
security measures designed to mitigate against a
the outset. These included, from a security point
hostile vehicle attack.
of view, British Transport Police (BTP) Counter-
It was a major project involving partnership Terrorism Security Advisers, Architectural
working between the site owners, architects, Liaison Officers, Crime Reduction Officers,
Government security advisers, police CTSAs, experts from the Centre for the Protection of
local authorities and others. National Infrastructure (CPNI) and, because the
The need for a partnership approach was original building was a Grade 1 listed building,
identified at an early stage in the project. A police representatives from English Heritage and railway
‘Major Projects’ team became involved and this heritage organisations.
Annex C: Case studies 37
The design aspirations and security requirements Access control into goods yards and
were agreed and incorporated into the design, underground service areas
planning and build programme, resulting in the Shopping centres cannot operate without a
current structure today. Many of these links reliable supply chain. One busy regional shopping
have been maintained to cater for the day-to- centre has nine separate vehicle access points
day running of the site. Policing and response to the service yards which must be able to
plans involve co-operation between BTP and accommodate the delivery requirements of
the local police force, the council and the all the businesses, including the centre itself,
site management. On-site security guards are during operating hours. It must manage these
complemented by regular patrols from the requirements whilst ensuring access is controlled.
police. A formal forum has been established and Responsibility for the policy and management of
meets on a structured basis, with security issues vehicular access control into and out of these
included as a standing agenda item. A dedicated nine entrances has been given to an individual
site security manager has been appointed. member of staff. Each vehicle is logged at the
Control Room upon arrival and details relating
to the retail unit expecting the delivery, plus a
driver contact number, recorded.
After 20 minutes the delivery driver and store
are checked to certify that delivery is still taking
place. This is an example of good practice in their
access control and goods vehicle management.
If there is an increase in the threat and/or
response level the management will deploy
guards to the goods vehicle entrances to
carry out more frequent vehicle searches. If
necessary all vehicle access can be denied on
a temporary basis.
Another shopping centre has employed a system
whereby all deliveries and contractor visits need
to be notified to the control room in advance.
This is achieved through the issue of user names
and passwords to contractors and unit retailers
Due to geographical and operational links with a only when the appropriate documentation has
nearby large busy railway station, currently being been submitted, checked and authorised. Any
refurbished and developed, the same approach vehicle arriving without appointment is refused
to security and design has been adopted. entry to the site.
Through this early engagement of interested
parties, the standards reached in an international Such a policy may present difficulties at
station are being mirrored in a neighbouring entrance gates where large goods vehicles
station project, with security matters included as are denied access and have to be turned
a contractual priority. CCTV systems including around. Discussions with those responsible
that monitored by the local authority, will be for the design and operation of the site, such
linked to provide coverage across both sites as local authorities, highways authorities,
and hostile vehicle mitigation measures will be planners, architects and police help to identify
extended to provide perimeter and critical how this can be achieved without causing
area protection. unnecessary disruption or danger to traffic
and pedestrian movement.
38 Annex C: Case studies
Sites should have a sectorised, systematic and clientele numbers relatively constant and not
thorough search plan in place and if a suspicious placing excessive burdens on individuals. All
item is found follow the general “Golden Rules” security personnel are equipped with ‘headcams’,
guidance18. a digital camera mounted on headgear, giving an
Site security staff, including door supervisors, are ‘eye view’ of the scenes they are confronted with.
key personnel in this process. Proper training and The image and audio feeds are recorded to a
support empowers them to recognise suspicious personal hard drive which is downloaded to a
activity or objects and encourages them to centrally controlled database at the end of each
report and deal with it effectively. shift. This system provides essential protection to
the security personnel from spurious allegations
through a fully auditable record of events. It
also establishes an invaluable database for the
investigation of instances of suspicious activity
such as hostile reconnaissance and is an obvious
deterrent to potential intruders/attackers who
would be wary of their appearance and activity
being recorded, even in background scenes.
This venue operates during daytime hours
as a bar and restaurant and there are several
different access points. Prior to the nightclub
opening times, these additional access points
Within the night-time economy sector, one city are closed down and secured, leaving just the
centre based nightclub venue has employed a main club entrance available. Security measures
series of policies and procedures to reduce its are concentrated here, with security personnel
vulnerability. This site has a maximum capacity patrolling in high visibility jackets. Within the foyer
of approximately 3000 people and, at peak are various signs displaying information about
times on Friday and Saturday nights, this capacity partnership working with the local authority,
is often achieved. The club management has police and nearby venues, searching regimes and
engaged with the local authority and business tolerance levels. Disruptive individuals are ejected
sector to address several issues. in full view of those waiting to enter. All clientele
are required to pass through an archway metal
City centre roads around the venue are detector before entry and any suspicious items
subject to the use of temporary road barriers, identified are removed. No bags are permitted
restricting and deterring general access to inside the club.
vehicular traffic on peak evenings but allowing
pedestrian access and known taxis. The purchase This is a good example of rule setting
of the temporary road barriers and the costs immediately outside a single entry point. It very
of using a private contracted security guard effectively advertises that there is a well-managed
force are met by a consortium of interested and stringent security regime in place and is a
parties from within the city centre, principally potential deterrent to a large amount of criminal
other night-time economy venues, all of whom activity, including hostile reconnaissance and
benefit from the measures. The restriction of attempts to deliver improvised explosive devices.
free vehicular access into the most crowded Club management has introduced a policy of
areas at peak times significantly reduces the planned searches. These are implemented across
vulnerability to clientele from vehicle-borne the entire site by sector teams just prior to
improvised explosive devices and can allow early nightclub opening times and soon after nightclub
identification of suspicious vehicles. closing times. Each defined area is searched for
Queues outside the venue are closely monitored suspicious items, insecurities or other security
and as they increase in size so more security related anomalies, which are resolved before the
personnel are deployed, keeping the ratio to club is opened for business. This activity deals
40 Annex C: Case studies
Counter-terrorism design advice is available from (including fertilisers) pathogens and toxins,
the National Counter-Terrorism Security Office radiological sources and other toxic chemicals.
(NaCTSO) police Counter-Terrorism Security
Advisers (CTSAs) who are located within Counter-Terrorism Security Advisers
local police forces and from the Centre for the (CTSAs)
Protection of National Infrastructure (CPNI). On behalf of the Association of Chief Police
Officers, (ACPO), NaCTSO trains, tasks and
The National Counter Terrorism coordinates a nationwide network of specialist
Security Office (NaCTSO) police advisers known as Counter-Terrorism
The National Counter-Terrorism Security Security Advisers (CTSAs). The primary role
Office (NaCTSO)19 is a police unit co-located of these advisers is to provide help, advice and
with CPNI. It is funded by and reports to the guidance on all aspects of counter-terrorism
Association of Chief Police Officers (ACPO). protective security across a variety of sectors.
NaCTSO contributes to the UK Government’s There is at least one CTSA in every police force
counter-terrorism strategy (CONTEST) by in the UK, and their numbers are managed to
supporting the Protect and Prepare strands reflect the relative workload and responsibilities
of that strategy. NaCTSO counter-terrorism within each police force. Most CTSAs work
protective security work is divided into within or alongside their force Special Branches.
three areas: A CTSA can be contacted in the first instance
• protection of crowded places; via the local police website or switchboard. In
case of difficulty, CTSA contact details can be
• protection of hazardous sites and found on www.nactso.gov.uk or through contact
hazardous substances; and with NaCTSO via email: nactso@btconnect.com
• assisting the CPNI to protect the Critical CTSAs are recruited locally by the force and
National Infrastructure. will be experienced police officers or police
NaCTSO staff can offer specialist advice staff, invariably with an intelligence and/or crime
regarding counter-terrorism protective security prevention background. The initial three week
and business continuity. residential training delivered by NaCTSO covers
physical and personnel security, site surveying and
It also provides guidance in relation to the
counter-terrorism with contributions from guest
security of explosives and pre-cursor chemicals
speakers from business and professional bodies.
42 Annex D: Sources of counter-terrorism protective security advice
Over the first two years additional mandatory Centre for the Protection of National
courses including on hostile vehicle mitigation, Infrastructure
specialised physical security and operational CPNI20 is the Government authority which
requirement training are completed leading to provides protective security advice to
the successful submission of a Licentiateship in businesses and organisations across the national
Counter-Terrorism Security Management. To infrastructure. CPNI advice aims to reduce
ensure the high standard of training is maintained, the vulnerability of the national infrastructure
refresher training is delivered on the various to terrorism and other threats, keeping the
disciplines relevant to counter-terrorism. In UK’s essential services (delivered by the
addition quality assurance inspections are carried communications, emergency services, energy,
out by NaCTSO on an annual basis of all police finance, food, government, health, transport and
forces throughout the UK. This includes the water sectors) safer.
inspection of CTSA surveys to ensure that the
advice follows a nationally consistent standard. CPNI runs a research and development
programme devising effective counter-measures
The core role of the CTSA is to identify and to evolving threats. Additionally CPNI provide
assess local critical sites within their force area awareness briefings and training courses on the
that might be vulnerable to terrorist or extremist subject of designing-out vehicle-borne terrorism
attack; then devise and develop appropriate to architects, engineers, planners and personnel
protective security plans to minimise impact on with security, site ownership or operational
that site and the surrounding community. responsibilities.
Additionally, the CTSA will help raise awareness CPNI provides integrated security advice
of the terrorist threat and appropriate actions (combining information, personnel and physical)
that might be taken to mitigate it by developing to organisations which make up the national
positive relationships with key interested parties. infrastructure. This advice helps to reduce
CTSAs will also work with other departments the vulnerability of the national infrastructure
within the police as well as partner agencies (primarily the critical national infrastructure) to
to encourage a coordinated approach and terrorism and other threats to national security.
build useful networks. They work closely with CPNI is an interdepartmental organisation,
representatives of trade organisations and with resources from industry, academia and
professional bodies to ensure counter-terrorism a number of government departments and
protective security advice is incorporated in agencies (including the Security Service, CESG
general crime prevention regimes. and departments responsible for national
CTSAs have regular access to current terrorism infrastructure sectors). CPNI draws on expertise,
threat assessments and related intelligence as knowledge and information from the range
well as other classified material. This requires that of organisations that contribute to its work.
they are all appropriately vetted – above the It sponsors research and work in partnership
usual checks for police officers and staff. with academia, government partners, research
institutions and the private sector to develop
applications that can reduce vulnerability to
terrorist and other attacks and lessen the impact
if an attack does take place.
Specialist counter-terrorism design advice can
also be obtained from members of the Register
of Security Engineers and Specialists. This Register
is maintained by the Institution of Civil Engineers
and is sponsored by CPNI, see below.
Annex D: Sources of counter-terrorism protective security advice 43
Police Architectural Liaison Units (ALUs) provide Within the wider field of CPTED, ALOs/
crime risk management and Crime Prevention CPDAs also:
Through Environmental Design (CPTED) advice • offer risk-commensurate crime reduction
within their police force area in order to reduce advice and actively promote ‘Secured by
opportunities for crime and disorder. Designing- Design’, ‘Safer Parking’ and other relevant
out crime (including terrorism) at the earliest security award schemes;
stages in the planning process can be extremely
effective in developing safer and more secure • promote effective community safety
environments in which people can live and work. practice and encourage the development
of safer environments that reduce risk and
Local planning authorities routinely consult ALUs mitigate the impact of crime;
for security and crime prevention comments
and recommendations in respect of most • establish effective local and national
major planning applications. In the context of partnerships in order to develop the
this guidance, the Architectural Liaison Officer built environment in ways that reduce
(ALO)/Crime Prevention Design Adviser opportunities for crime and disorder;
(CPDA) in the capacity of crime prevention • establish strong and effective lines of
consultee within the planning process, is often communication with the local planning
the first of the police or security authorities authority and develop links into the
to have knowledge of many planning and planning process to ensure that where
development proposals. The ALO/CPDA security advice is sought on new or existing
is therefore well placed to filter planning planning projects, police advice is able to be
applications and identify those where there is a offered as early as possible; and
counter-terrorism protective security dimension
• influence and encourage planners, designers
that warrants more detailed scrutiny. The ALO/
and developers to incorporate crime
CPDA can then ensure that the applicant is
reduction, including counter-terrorism
provided with the most appropriate counter-
protective security measures into their
terrorism protective security advice through
development projects.
their police force CTSA. The involvement of the
ALO/CPDA therefore ensures that there is the
opportunity for dialogue between the applicant/
developer, the local planning authority and the
counter-terrorism security specialists.
46 Annex E: Role of architectural liaison officers/ crime prevention design advisers
Operation Lightning
A police coordinated hostile reconnaissance
operation to identify those who might be
involved in terrorist activity and/or domestic
extremism.
This helps to gather intelligence by recording,
investigating and analysing suspicious sightings or
activity near to or at prominent or vulnerable
structures or buildings.
Annex G: Useful publications 49
Accessibility – The ability of people to move the communications, emergency services, energy,
round an area and to reach places and facilities, finance, food, government, health, transport and
including elderly and disabled people, those with water sectors) safer. See Annex D.
young children and those encumbered with CPTED – Crime Prevention Through
luggage or shopping. Environmental Design. The main thrust of this
ALO – Architectural Liaison Officer. A specialist approach is that ‘the physical environment
crime prevention officer, employed by police can be manipulated to produce behavioural
forces, who deals with crime risk and designing- effects that will reduce the incidence and fear
out crime advice for the built environment. See of crime, thereby improving the quality of life.
Annex E. These behavioural effects can be accomplished
CONTEST - the Government’s overarching by reducing the propensity of the physical
counter-terrorism strategy. It was most recently environment to support criminal behaviour’.
published in July 2011, with the aim of reducing Crowded place - The working definition of
the risk to the UK from international terrorism. “crowded places” is widely drawn: crowded
Context – The setting of a site or area, including places are regarded as locations or environments
factors such as traffic, activities and land use as to which members of the public have access
well as landscape and built form. that, on the basis of intelligence, credible threat
or terrorist methodology, may be considered
Counter-Terrorism Security Adviser (CTSA) potentially liable to terrorist attack by virtue of
- Located within each police force to provide their crowd density. Examples include:
specialist advice about counter-terrorism
protective security. See Annex D. • bars, pubs and nightclubs;
End notes
1) https://www.mi5.gov.uk/output/threat-levels.html
2) www.dft.gov.uk
3) www.direct.gov.uk/nationalsecuritystrategy
4) http://download.cabinetoffice.gov.uk/nss/nss-factsheet2.pdf
5) For more information please see http://www.nactso.gov.uk
6) This document can be found on the Design Council website http://www.designcouncil.org.uk
7) http://www.dft.gov.uk/publications/manual-for-streets
8) http://www.dft.gov.uk/publications/inclusive-mobility
9) More information can be found at http://www.helm.org.uk/gheu
10) http://www.cpni.gov.uk/
11) http://www.cpni.gov.uk/advice/personnel-security1/ongoing-measures/
12) http://www.ico.gov.uk/for_organisations/data_protection/topic_guides/cctv.aspx
13) Further advice on CCTV is available from the CPNI website www.cpni.gov.uk; from the Centre
for Applied Science and Technology website http://www.homeoffice.gov.uk/science-research/
hosdb/; and in NaCTSO guidance booklets available on the NaCTSO website www.nactso.gov.uk
14) BS EN 1992 has replaced BSI8110 although it is currently still in practical use.
15) BS EN 1993 has replaced BSI5950 although it is currently still in practical use.
16) More information about glazing can be found on the CPNI website http://www.cpni.gov.uk/advice/
Physical-security/ebp/
17) http://www.cpni.gov.uk/
18) http://www.cpni.gov.uk/
19) http://www.nactso.gov.uk
20) http://www.cpni.gov.uk/
21) Further advice on RSES are also available from the Institute for Civil Engineers (see website:
www.ice.org.uk) and ICE details can also be found on www.cpni.gov.uk and www.nactso.gov.uk
22) http://www.nactso.gov.uk
Published by the Home Office
© Crown Copyright 2012
ISBN: 978-1-84987-393-2