Counter Terrorism Assessment

What is manipulate? An Introduction

Manipulate is our industry-leading offering: a social engineering penetration testing service, which will demonstrate what can be accessed by potential attackers, and follow-up by helping you reduce the threat that social engineering could impose. To manipulate is the skill of deception, the smiling assassin, the silent attack. It is borne out of the clever manipulation of the human tendency to trust.

The Assessment

This is an assessment conducted by a Counter Terrorist Security Coordinator, reacting to the imminent need for many organisations to test their resilience against the threats of terrorism.

The assessment will review the threat to certain attack types as requested by the client (e.g. placed

Improvised Explosive Device). All assessments are followed-up by a report which details any vulnerabilities found from the attack types requested. Counter Terrorism Assessments review individual sites, specifically their vulnerabilities, to provide proportionate mitigation measures, with associated rationale. The final report will also detail residual risk and potential contingency measures for elevated threat.


As part of our outreach for manipulate, we have released this short video as an introduction to today's threats of social engineering:

By engaging with critical staff on sites, typically facilities and security, this assessment analyses your security against the threat of a planned attack.

Security Testing and Compliance Solutions

We provide a comprehensive range of penetration testing, certification, information security consultancy and managed services for SMEs, public sector organisations and larger corporates looking to protect their business and enhance overall security of their IT systems.

Our specialists will help you identify and manage risks around your various data assets to give you, your employees and your customers much greater peace of mind.

Contact us today to learn more about how we can help you, or have a look at what we do to learn more about our services.

Hover over each section to find out more

Request a Quote

Complete the fields below and a member of the team will be in touch to discuss your security requirements.

Events Calendar

26 27 28 29 30 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6