ISMI Library Download for Guests
3RD PARTY RESOURCES (BY SOURCE)
Click to navigate down the page:
- Australian Institute of Criminology Publications
- International Petroleum Industry Environmental Conservation Association
- Overseas Security Advisory Council
- Ponemon Institute
- UK Centre for the Protection of National Infrastructure Publications
- UK National Counter Terrorism Security Office Publications
- US Federal Emergency Management Agency Counter Terrorism Publications
- UK Home Office Scientific Development Branch
- US Office of the National Counterintelligence Executive
3RD PARTY RESOURCES (BY TOPIC)
Click to navigate down the page:
- Armed Robbery
- Active Shooter
- Business Crime Prevention Publications from Police Services
- Counter Terrorism Publications (Miscellaneous)
- Business Travel Security
- Fraud
- Information Security (non-IT)
- Information Security (non-IT)
- Risk Management
- Security Design
- Workplace Violence
Australian Institute of Criminology Publications
- Armed Robbery - Who Commits It and Why?
- Armed Robbery - Staff Training
- Cash in Transit Robbery
- Designing out Crime and CPTED
- Gas Station Armed Robbery
- Preventing Client Aggression toward Staff
UK Centre for the Protection of National Infrastructure Publications
- Protecting against Terrorism Edn III
- The Secure Procurement of Contracting Services
- Blast Effects on Buildings
- Door Security and Associated Hardware
- Guard Force Motivation
- Guide to Producing Operation Requirements for Security Systems
- Holistic Management of Employee Risk
- Hostile Vehicle Mitigation
- Investigating Employees of Concern
- Ongoing Personnel Security
- Online Reconnaissance
- Online Social Networking
- Personnel Security in Offshore Locations
- Personnel Security Risk Assessment
- Pre-Employment Screening
- Risk Management: Doing Business Overseas
- Secure Destruction of Sensitive Items
- Personnel Security When Offshoring Operations
International Petroleum Industry Environmental Conservation Association
- Operating in Areas of Conflict
- Indigenous Peoples and the Oil and Gas Industry (contact ISMI)
- Social Investment Guide
UK National Counter Terrorism Security Office Publications
- Counter Terrorism Protective Security Advice for Crowded Places
- Counter Terrorism Protective Security Advice at Major Events
- Counter Terrorism Protective Security Advice for Bars, Clubs and Nightclubs
- Counter Terrorism Protective Security Advice for Cinemas and Theatres
- Counter Terrorism Protective Security Advice for Places of Worship
- Developing Dynamic Lockdown Procedures (MTFA)
- NaCTSO Know Your Business
- Counter Terrorism Protective Security Advice fof Higher Education
Overseas Security Advisory Council (OSAC)
US Federal Emergency Management Agency Publications
FEMA produces an excellent range of well-illustrated publications on how to protect against IEDS, in particular vehicle-borne IEDs. The reference books are too large to store here and you can download them direct from /resources/useful-links-to-external-resources.aspx#T
If you have difficulty downloading, email certification@ismi.org.uk
UK Home Office Scientific Development Branch
- CCTV Operational Requirement - email certification@ismi.org.uk
US Offiice of the National Counterintelligence Executive
Common Sense Guide to Mitigating Insider Threats
3RD PARTY RESOURCES (BY TOPIC)
Access Control
- BSIA Guide to Access Control Specification
- Ekahau RTLS_benefits_whitepaper_June_2013
- RTLS why you need it - Zebra Technologies
- RFID Laptop Tracking - Case Study
- Facial Recognition
- BSIA Code of Practice for Searching
- Canadian Violence, Robbery and Theft Guide
- Portland Police Robbery Prevention Guideline
- OHS Preventing Violence and Robbery
Business Crime Prevention Publications from Police Services
- CPJ Journalist Security Guide
- Personal Safety Handbook for Journalists
- Chubb Managing Travel Risks
- Operational Security Management in Violent Environments
- OSAC Security Guidelines for Families Overseas
- AIG Pre-Travel Planning
- Travelling with Mobile Devices
- HOSDB CCTV Operational Requirement
- BSIA Privacy Masking CCTV
- UK Home Office - Surveillance Camera Code of Practice
- IPVM Video Surveillance
- TYCO - A Guide to IP CCTV
- Cisco IP CCTV Design Guide
- Axis Video Analytics
- Bosch Video Analytics
- Accenture Video Analytics
- Cisco Video Analytics
- Honeywell Video Analytics
- Bosch DORI Scene Widths for SD up to 4K with Lens examples
Counter Terrorism
- FEMA 459: Incremental Protection for Existing Commercial Buildings from Terrorism Attack, Chapter 1
- CPNI Pre-Employment Screening
- 7 Signs of Terrorism
- POST Report CyberSecurity and CNI
- BSIA Hostile Reconnaissance
- NaCTSO Know Your Business
- RIBA Guidance on Counterterrorism
- FEMA Developing and Maintaining Emergency Operations Plans
- CPNI Hostile Vehicle Mitigation
- CPNI Protecting against Terrorism (3rd Edn)
- UK CONTEST National Counter Terrorism Strategy
- US National Counter Terrorism Strategy
- Canada National Counter Terrorism Strategy
- Australia National Counter Terrorism Strategy
- Somalia National Counter Terrorism Strategy
- Kosovo Strategy for Counter Terrorism
- Australia - Protecting CNI from Terrorism
- Australia - Protecting Places of Mass Gatherings from Terrorism
- NaCTSO Dynamic Lockdown Procedures (MTFA)
- NaCTSO Protective Security Advice for Higher Education
- NaCTSO Protective Security Advice for Healthcare Facilities
- Institute for Economics and Peace 2015 Global Terrrorism Index
- ISMI MTFA Briefing Note
Crime Management
- AJCSD - Criminal Behaviour - Free Will v. Determinism
- Crime Analysis for Problem Solvers (Good hints on SCP strategies)
- AIC - Understanding Situational Crime Prevention
- Trace Bribery Report 2011
- 25 Techniques of Situational Crime Prevention
- Whistleblowing 1
- Whistleblowing 2
- Laptop Theft - Calgary Case Study
- MI5 Managing the Insider Threat
- ASIS Crisp Burglary Report
- 2002 Commercial Crime Survey UK
- Employee Theft
- KPMG Bribery and Corruption 2011
- Transparency International - Countering Bribery
- Oxy Code of Ethical Practice
- CPNI Personnel Security Offshore
- Employee Retection and Socialization
- Keith Rice - Biological Factors in Crime
- POP Center - CPTED
- Queensland Govt - CPTED Application
- Professional Facilitators of Crime
- Opportunity Makes the Thief - Felson and Clarke
- CRG - Impersonation Fraud
- ACFE Fraudster Infographic
- BRC Insider Threat Best Practices 2015
- Do Your Genes Make You a Criminal
- NCPC Singapore - Applying CPTED
Fraud
Information Security
- HMG CESG 10 Steps to Cyber Security
- HMG CESG 10 Steps to Cyber Security (alt source)
- HMG 10 Steps 2015 (Infographic)
- HMG 10 Steps 2015 (Critical Areas)
- BIS Cyber Risk Management - A Board Level Resposibility
- CBI Cyber Security Intelligrence First
- HMG Small Business Cyber Security Guidance
- ONCIX Foreign Economic Espionage 2011 Report
- Guide to Protecting US Business Information Abroad
- DTI Keeping It Confidential
- DTI Understanding the Risks
- DTI Guide to Business Information Security
- Cloud Computing Notirious Nine Threats 2013
- ISACA Information Security Governance for Boards
- Traveling with Mobile Devices;Trends and Best Practices
- Choosing a Good Chart
- ENISA Good Practice for First Responders
- ACPO Guidlines on Computer Evidence
- Intel - Prioritising Info Security Risks with TARA
Investigations
- NYA Global; Kidnapping Report Jan-Jun 2013
- K&R Danger Zones – Chartis
- Police Service of Northern Ireland – Tiger Kidnap
Managing the Security Function (General)
- CPNI Motivation with the Security Industry (Pages 1-20 Extract)
- CPNI Motivation with the Security Industry (full document)
- ASIS Chief Security Officer Guideline 2008
- Getting Buy-In from the C-Suite
- Personnel Security Offshore Reasearch by KPMG
- DEMOS - Business of Resilience
- AESRM Convergence
- CSO Online - State of the CSO
- NACTSO - Secure in the Knowledge
- Online Sources for Job Description and Person Spec Templates
- CPNI Pre-employment Screening Good Practice Guide
- CPNI Personnel Security in Offshore Locations
- Managing the Risk (Insiders)
- Guard Training Requirements
- National Occupational Standards for Security Management
- Security Officer Training
- SIA Security Guard Training
- Blooms Taxonomy (when writing training objectives)
Physical Security of Perimeters
- IESNA Security Lighting Guide
- SBD Lighting against Crime
- Fiber Sensys Perimeter Lighting Guide
- Subtle Perimeter Security in Urban Design
- Construction Site Theft Prevention
Physical Security of Premises
- CPNI Guide to Locks and Door Security
- CRISP Security of Tall Buildings
- Guide to BS Standards for Locks
- Merseyside Police - Business Security Guide
- Premises Security and Burglary Risk Management Guide
Risk Management
- API Security Vulnerability Assessment
- Five Steps to Risk Reduction
- Security Risk Management Seminar Loughborough
- Negligent Failure to Plan
- Hearts and Minds RAM
- Securitas 2015 Top 15 Security Threats
- Lloyds Pandemic Insurance Impacts
- World Economic Forum Global Risks 2015
- UK National Risk Register 2015
- Warwickshire Risk Management Template
- WBDG Threat/Vulnerability and Risk Assessments
- Harnser Group Security Risk Management for Energy Infrastructure
- Microsoft Security Risk Management Guide
- The Orange Book - Management of Risk
- Risk Assessment Methodologies for CNI
- FDA - An Overview of CARVER+Shock
- Understanding Risk - Informing Decisions in a Democratic Society
Robbery
- Durham Police Petrol Station Robbery Toolkit
- Canadian Violence Robbery and Theft Guide
- OHS Guideline Preventing Violence, Robbery and Theft
- Portland Police Robbery Prevention Guide
Security Design (General)
- US Army Field Security Manual
- US Govt Security Guidance for US Businesses Overseas
- CPNI Operational Requirement Framework
- Which Chart to Use?
- Australia Good Security Good Business
- Institute for Economics and Peace - 2015 Global Peace Index
Workplace Violence