Scroll to top
Terrorism Awareness for Corporate Travellers | CloseProtectionHire

Security Intelligence

Terrorism Awareness for Corporate Travellers | CloseProtectionHire

A senior security consultant's guide to terrorism awareness for business travellers: Run-Hide-Tell, vehicle-as-weapon attacks, suspicious packages, and what to do in the first 60 minutes after an incident.

4 May 2026

Written by James Whitfield, Senior Security Consultant

Most corporate travellers complete a security briefing that covers pickpocket risk and the local emergency number. Most terrorism awareness training stops at Run-Hide-Tell. Neither of these is adequate preparation for the threat environment that business travel now involves in a significant number of destinations.

This is not a counsel of paralysis. The statistical risk of being caught in a terrorist attack remains low, even in cities with elevated threat profiles. The practical value of terrorism awareness training is not to prevent what is statistically unlikely – it is to ensure that if the unlikely happens, the traveller responds effectively rather than freezing. Seconds matter in an active attack scenario, and a briefed traveller who knows what to do has a materially better outcome than an unbriefed one who is waiting for confirmation before acting.

The ACT Awareness standard

ACT Awareness – Action Counters Terrorism – is the National Counter Terrorism Security Office’s (NaCTSO) training framework for the public and for anyone with responsibilities in venues, workplaces, or public-facing roles. The free online course takes approximately 45 minutes and is available at the NaCTSO ACT Awareness eLearning Hub.

The course covers three areas: recognise, prepare, and respond. Recognise covers the indicators of hostile reconnaissance and attack planning – how attackers surveil venues and targets before an attack. Prepare covers the pre-event security measures that venue managers and employers can take. Respond covers Run-Hide-Tell and how to communicate with emergency services during an incident.

For corporate travellers, ACT Awareness completion is now required by many large employers as part of pre-travel preparation for high-risk destinations. It is the minimum competency standard for anyone deploying to a P1 city or attending large corporate events in the UK or internationally.

The ACT Hotline for reporting suspicious activity in the UK is 0800 789 321. The equivalent in other jurisdictions is typically the national police non-emergency line or a dedicated counter-terrorism reporting line.

Run-Hide-Tell in practice

Run-Hide-Tell is the UK government framework for responding to a terrorist attack in a public place. The logic is straightforward and deliberately simple.

Run. If there is a safe route away from the attack, take it. Do not wait for others unless it is safe to do so. Do not stop for belongings. Keep your hands visible when approaching police. Move to a safe distance and do not re-enter the area.

Hide. If running is not possible, find substantial cover and hide. Substantial cover means concrete, brick, or steel – not a glass partition, a plasterboard wall, or a car door. Get low. Turn your phone to silent (vibrate is not silent enough in a quiet space). Lock and barricade the door if you are in a room. In an open space, hiding behind a concrete pillar or vehicle engine block (not the door) provides meaningful ballistic protection from most firearms at range.

Tell. When it is safe to do so, call 999 (or local equivalent). Provide your exact location, the nature of the attack, and any description of the attacker. If voice calling risks your position, the UK police accept emergency 999 texts via the EmergencySMS service (pre-register at gov.uk/emergencysms before travel).

The most common failure in applying Run-Hide-Tell under stress is waiting for confirmation – a second shot, a second observation – before acting. Research into survivor behaviour from the Manchester Arena attack (2017) and London Bridge (2017) consistently shows that individuals who acted on the first credible indicator had better outcomes than those who paused to assess. The trigger for running is a single credible indicator of an active attack, not certainty.

Vehicle-as-weapon attacks

Between 2016 and 2021, 14 vehicle-as-weapon attacks occurred in European cities, killing over 150 people. The pattern is consistent: a vehicle (typically a truck or van) driven at speed into a pedestrian area with high footfall and limited barriers.

Nice (July 2016, Bastille Day crowd on the Promenade des Anglais, 86 killed), Berlin Breitscheidplatz (December 2016, Christmas market, 13 killed), London Bridge (June 2017, evening pedestrian traffic, 8 killed), Stockholm Drottninggatan (April 2017, pedestrianised shopping street, 5 killed), Barcelona Las Ramblas (August 2017, tourist pedestrian zone, 15 killed).

The consistent elements of vulnerable locations:

  • Wide pedestrian streets or promenades with no vehicle access barriers
  • High footfall at predictable times (markets, events, evening leisure)
  • Long unobstructed run available for an approaching vehicle
  • No hostile vehicle mitigation (HVM) infrastructure in place

Pre-trip route awareness can reduce exposure. Before arrival in a city, identify which areas have the vehicle-as-weapon vulnerability profile and where HVM barriers (bollards, planters, installed barriers) are in place. Most European city centres have significantly improved HVM infrastructure since 2017, but gaps remain.

If you are caught in a vehicle-as-weapon attack, move immediately at a right angle to the vehicle’s direction of travel. Running in the same direction as the vehicle is running with it. Moving perpendicular takes you out of its path. Seek an entrance to a building or an underground passage.

Suspicious packages and substances

The standard protocol for a suspicious package has not changed in 30 years of application and remains correct:

Do not touch, move, or cover it. Evacuate the immediate area. Do not use a mobile phone or radio within 15 metres of the suspected device. Call emergency services from a safe distance and describe the item, its exact location, and why it concerns you.

The radio frequency protocol is not bureaucratic caution – some improvised explosive devices use radio frequency as a detonation trigger. A mobile phone call or a two-way radio transmission in close proximity to a correctly constructed IED can detonate it. Post-blast, do not re-enter the area for at least 30 minutes without emergency services confirmation – secondary devices targeting first responders and survivors are a documented tactic.

For suspicious substances (powder, liquid, or aerosol with no obvious source), the response is: leave the area immediately, move upwind, do not eat or drink, wash exposed skin with cold water and soap (cold water, not hot), remove outer clothing. Call emergency services. The UK’s Hazardous Area Response Team (HART) manages decontamination for chemical, biological, and radiological exposures.

Hotel terrorism response

Hotel attacks have a different dynamic from open-space attacks. In an open space, running is usually the first option. In a hotel, the attacker may be between you and the exit.

Mumbai’s Taj Mahal Palace attack (November 2008) lasted 60 hours and killed 166 people at multiple sites. The DusitD2 Nairobi attack (January 2019) lasted approximately 20 hours, killed 21 people, and involved attackers moving through the hotel complex systematically. Both involved attackers moving through corridors and clearing rooms.

The correct response in a hotel when an attack is in the building:

Move to a room and barricade the door. Use a door wedge (carry one), chairs jammed under the door handle, or furniture moved against the door. Turn off lights. Get low and away from the door. Call emergency services by text where possible – voice may indicate your position.

Do not open the door for anyone, including individuals identifying themselves as security or hotel staff, unless emergency services have confirmed by phone that officers are at your floor. Attackers in hotel scenarios have impersonated hotel staff. Wait for confirmation. The Manchester Arena attack (2017) generated 75 separate calls from survivors who had sheltered safely. Police confirmation of floor-by-floor clearance is the standard release signal.

For those travelling to P1 cities with elevated terrorism threat profiles and requiring a fully integrated protective intelligence and travel security programme, see our executive protection services. For the advance work methodology that identifies venue terrorism risk before the principal arrives, see our advance work guide. For the specific counter-terrorism considerations for places of worship – including NaCTSO guidance, Martyn’s Law obligations for large congregations, hostile vehicle mitigation, and the Christchurch and Pittsburgh attack lessons – see our security for religious sites and places of worship guide. For the CBRN threat spectrum – chemical, biological, radiological, and nuclear – including the Salisbury Novichok attack, Tokyo subway sarin attack, AMERITHRAX anthrax letters, IAEA radiological incident data, corporate mailroom protocol, and decontamination procedures – see our CBRN and bioterrorism awareness guide.

Sources

NaCTSO: ACT Awareness Programme, National Counter Terrorism Security Office, 2024. Home Office: Statistics on the Operation of Police Powers under the Terrorism Act 2000, 2024. Terrorism (Protection of Premises) Act 2024, UK Parliament, Royal Assent 3 April 2024. NPSA: Protecting Crowded Places – Guidance for Venues and Events, National Protective Security Authority, 2024. DHS: Active Shooter – How to Respond, US Department of Homeland Security, 2023. CISA: Bomb Threat Guidance, Cybersecurity and Infrastructure Security Agency, 2024. NaCTSO: Suspicious Packages Guidance, 2024. ISO 31030:2021, Travel Risk Management: Guidance for Organisations, International Organization for Standardization.

For the security framework specific to diplomatic missions and embassy staff – Vienna Convention obligations, SECCA 1999 standoff standards, post-Benghazi safe haven requirements, ambassador close protection, and locally engaged staff vetting – see our security for diplomatic missions and embassies guide. For the specific security risks of executive travel by rail and metro – station vulnerability patterns, BTP annual report data, 7/7 London and Madrid Atocha attack lessons, and the protective protocol for last-mile rail transit – see our rail and metro security guide for corporate travellers.

Summary

Key takeaways

1
1
ACT Awareness takes 45 minutes and is free -- there is no reason for travelling staff not to complete it

The NaCTSO ACT Awareness e-learning programme is the standard pre-travel terrorism awareness tool for UK employers. It covers recognition of hostile reconnaissance, how to respond to an active attack, and how to report suspicious activity. Any corporate traveller heading to a P1 city or attending large events should complete it before departure. The ACT Hotline (0800 789 321) is the reporting channel for suspicious activity in the UK.

2
2
Vehicle-as-weapon attacks can be mitigated by pre-trip route awareness

The pattern of vehicle-as-weapon attacks is consistent: fast-moving vehicle, pedestrian area, high footfall, absent or insufficient barriers. Pre-trip awareness of which areas in a destination city have this exposure -- embankments, pedestrianised shopping streets, Christmas markets, parade routes -- allows for route planning that reduces time in these spaces. The risk cannot be eliminated but it can be meaningfully reduced by choosing routes and venues that have hostile vehicle mitigation (HVM) barriers in place.

3
3
The first response to an active attack is movement, not assessment

Under stress, people freeze and wait for more information before acting. Every documented active attack study shows that speed of response is the primary determinant of survival. Run-Hide-Tell is deliberately simple because it needs to work under extreme stress. The trigger for action is a single credible indicator -- a gunshot, a vehicle driving into people, a person brandishing a weapon -- not a confirmed certainty. Act on the first credible indicator, not the second.

4
4
Secondary devices are a documented tactic -- do not use radio equipment near a suspected IED

Secondary devices (a second explosive device designed to target emergency responders and those fleeing the primary device) are documented in multiple historical attacks. The March 2016 Brussels bombings killed 35 at two locations, with a third device that did not detonate. The radio frequency protocol -- no radio transmission within 15 metres of a suspected device -- exists because some improvised devices use radio frequency as a detonation trigger. This applies to mobile phones as well as two-way radios.

5
5
Hotel terrorism response differs from open-space response

A hotel attack -- as in Mumbai 2008 and DusitD2 Nairobi 2019 -- involves attackers moving through a building and clearing rooms. The Run-Hide-Tell framework still applies but hide becomes more important earlier. In a hotel, go to a room and barricade the door (wedge chairs under the handle, move heavy furniture). Turn off lights. Stay low and away from the door. Do not open the door for anyone who has not been verified -- attackers in hotel scenarios have impersonated emergency personnel. Contact emergency services by text if voice calls risk your position.

FAQ

Frequently Asked Questions

Run-Hide-Tell is the UK government’s guidance for responding to a terrorist attack in a public place, developed by the National Counter Terrorism Security Office (NaCTSO) and adopted following the attacks at Westminster Bridge (March 2017), London Bridge (June 2017), and the Manchester Arena (May 2017). Run: if there is a safe escape route, leave the area and encourage others to follow. Do not stop to collect belongings. Keep your hands visible. Hide: if you cannot run safely, hide behind substantial cover (concrete pillars, engine blocks, walls – not car doors or plasterboard). Turn your phone to silent. Lock and barricade doors if possible. Tell: when it is safe to do so, call 999 and provide your location, what you have observed, and any description of the attacker. The sequence is not always followed in order – if running is not possible, hiding immediately is correct. The framework applies to active threat situations involving firearms or bladed weapons in public spaces and buildings.

Vehicle-as-weapon attacks – a vehicle driven at speed into a pedestrian crowd – have occurred in Nice (July 2016, 86 killed), Berlin Breitscheidplatz (December 2016, 13 killed), London Bridge (June 2017, 8 killed), Stockholm (April 2017, 5 killed), and Barcelona (August 2017, 15 killed). They share a common pattern: a fast-moving vehicle targeting a pedestrian area with high footfall. The correct response is to move immediately at a right angle to the vehicle’s direction of travel – not to run in the same direction – and to seek substantial cover (buildings, concrete barriers, underground entrances). Avoid open pedestrian zones, Christmas markets, procession routes, and embankments where a vehicle would have an unobstructed run at a large crowd. Pre-trip awareness of the city’s crowded places – where pedestrian density is highest and vehicle barriers are absent – allows for route planning that reduces exposure.

For suspicious packages: do not touch, move, or open the item. Clear the immediate area. Do not use a radio or mobile phone within 15 metres of the suspected device (radio frequency transmission can trigger some improvised devices). Call emergency services (999 in the UK, local equivalent elsewhere) from a safe distance. Provide a description of the item, its exact location, and why it concerns you. For suspicious substances: if you believe you may have been exposed to a chemical or biological substance, move away from the area immediately and move upwind where possible. Do not eat, drink, or smoke. Wash exposed skin with soap and cold water (not hot – hot water opens pores). Remove outer clothing and seal it in a bag if available. Call emergency services and follow decontamination instructions. The UK HAZMAT response team (HART – Hazardous Area Response Team) will lead decontamination in the UK.

ACT Awareness is a free online e-learning course produced by the National Counter Terrorism Security Office (NaCTSO) designed for anyone who works in a public-facing role, manages a venue, or travels regularly to higher-risk environments. It covers how to recognise the signs of terrorist activity, how to respond to an attack, and how to protect yourself and others. The course takes approximately 45 minutes to complete. Completion is free at the ACT Awareness eLearning Hub. Many large employers now require ACT Awareness completion as part of their corporate travel pre-deployment training, particularly for staff travelling to P1 cities. NaCTSO reports that over 1.5 million people have completed the course since its launch. The ACT Hotline for reporting suspicious activity is 0800 789 321 (in the UK).

Under ISO 31030:2021 (Travel Risk Management), employers have a duty of care to assess and mitigate risks for staff travelling on business, which includes terrorism risk in high-threat destinations. The Terrorism (Protection of Premises) Act 2024 (Martyn’s Law) imposes statutory obligations on venue operators in England and Wales, requiring them to have terrorism preparedness measures in place. While the Act applies to venue operators rather than travelling employers, it creates an expectation that venues used for corporate events (conferences, away days, client functions) have minimum preparedness standards. Employers who send staff to high-risk destinations should ensure pre-travel briefings include a terrorism threat component, and that staff are aware of local emergency service numbers, safe havens, and the Run-Hide-Tell response. Failure to brief adequately can constitute a breach of the employer’s common law duty of care and potentially UK Health and Safety at Work Act 1974 obligations.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.