Visitors to the west London palace, once home to Princess Diana3 , must now have their bags checked every time they enter the cafe and gift shop in measures introduced after the UK threat level was briefly raised to critical.
However, the recent changes concern the public areas of the building where an estimated 400,000 visitors flock every year.
The new measures come after the UK threat level temporarily increased (Image: Getty) Tourists must now have their bags checked every time they go into the cafe or gift shop (Image: Daily Mirror)
The palace is currently home to the exhibition Diana: Her Fashion Story which is attracting high volumes of visitors as people remember the princess on the 20th anniversary of her death. It also hosts an exhibition on Queen Victoria and offers the chance to view Royal Collection artwork in The King s Gallery. A sign outside the cafe and shop now reads: Please wait here for mandatory bag searches and security checks.
Please note that bags will be searched upon every re-entry of the palace cafe.
A source said the measures were introduced in May after the threat level was briefly raised to critical following the Manchester bombing5 and remain in place despite the threat level since being lowered.
Princess Diana once called Kensington Palace her home (Image: PA) Kensington Palace is currently showing the exhibition Diana: Her Fashion Story (Image: Getty)
It currently remains at the second highest level of severe meaning at attack is highly likely . It is not known if security surrounding the royals has also been stepped up as this information is never made public by royal officials or the MET Police. Bag searches are also in place at other sites managed by Historic Royal Palaces including the Tower of London.
A Historic Royal Palaces spokesperson said: The safety and security of our visitors is our highest priority.
We have a range of security measures in place across our sites, which are subject to constant review based on the information available to us.
We continue to review our existing security arrangements and, where appropriate, put in place additional measures.
DUBAI (Reuters) – Three Saudi men on a list of 23 people wanted by the authorities over security offences have turned themselves in, the interior ministry said on Monday.
The report, carried by state news agency SPA, came as Saudi security forces pushed ahead with an operation in the eastern part of the kingdom to try to flush out armed men, including those on the list announced in January 2012 . The area is home to many of the country’s minority Shi’ite Muslims.
The interior ministry identified the three as Mohammed Isa al-Lubbad, Ramzi Mohammed Jamal and Ali Hassan al-Zayed, and said their “initiative (to surrender voluntarily) will be taken into consideration”.
Many of those on the list have been either killed or captured in recent years . The Saudi Gazette newspaper said that only three of those on the original list remained at large, while eight have surrendered .
The rest were killed during clashes with the security forces, it said.
Saudi security forces have been trying for more than two months to defeat gunmen behind attacks on police in Awamiya, a Shi’ite town of around 30,000 in the eastern region that has been the centre of protests against the Sunni government.
Fighting has intensified over the past two weeks, when elite forces entered the town . In May the authorities began a campaign to tear down the old quarter to prevent gunmen using the narrow streets to evade capture.
Residents estimate that up to 20,000 people have fled to towns and villages nearby . Up to 12 people have been killed in the past week: three policemen and nine civilians, residents say.
The area, in oil-producing Qatif province, has seen unrest and occasional armed attacks on security forces since 2011 “Arab Spring”-style protests .
Residents complain of unfair treatment by the government, something Riyadh denies.
Reporting by Sami Aboudi; Editing by Andrew Bolton
I ve got a confession to make . I ve never written a line of code in my life . Consequently I haven t the faintest idea how hacking works . So on that basis I m surely the last person who could come up with a cyber security presentation. Not necessarily, because the typical cyber security presentation goes something like this:
There are more threats than ever . There are those who have been hacked, and those who don t know they ve been hacked . And your people are the weakest link .
Cue some stories about password idiocy . Move on to conclude that security is very difficult, but we all have to try harder. This may sound cynical, but that isn t the intention . All the above is true, and needs saying . But its repetition sometimes feels as if it marks a more uncomfortable truth: as we look around at such conferences, the real threat sits between us.
The media supply chain is as weak as its least secure company; but we are struggling to find a way to help each other become more secure – Mark Harrison
In many ways this difficulty is hardly surprising . No one wants to admit to vulnerability in their processes or products. Making operations or products more secure may not make them easier to work with . And, for all that it is now digital and connected, the media industry remains a peculiar mix of the highly technical and the highly personal: if media production was reduced to a set of automated, encrypted processes, creativity would be killed stone dead. At a DPP event at IBC2016, BBC Chief Technology and Product Officer, Matthew Postgate observed: The good guys need to work together – because you can be sure the bad guys are.
The banks have already learnt this lesson .
It s very important that suppliers and customers are clear and honest in sharing information . The best thing the BBC did was admit to ourselves and our supplier base where we really were on security . We all need to be explicit. Matthew Postgate s comments resonated with the lead already taken by the North American Broadcasters Association (NABA). They had drawn up a set of basic cyber security requirements for all suppliers working with broadcasters .
The list was published at IBC 2016 in partnership with the DPP. And a couple of months later, NABA brought the industry together in New York for a ground breaking international cyber security symposium . That symposium surfaced the reality: that the media industry is now a prime target for increasingly sophisticated cyber attacks, but we lack a coordinated means of response . We need to find a way of getting the good guys together. So earlier this year the DPP gathered subject matter experts in security from across its membership.
There was unanimous agreement that the industry needed to create some common best practice . At the request of its members, the DPP took the NABA/DPP Broadcaster Cyber Security Requirements for Suppliers, and turned it into a more formal checklist against which any supplier in the broadcast and distribution chain can comply themselves. The intention is to introduce this checklist into the UK in the first instance . It is hoped that with time the DPP can use its international reach to spread this approach beyond the UK, and that a community of like minded broadcasters, distributors and suppliers can help cascade best practice in a way that is manageable and affordable.
What s innovative about the Broadcaster Cyber Security Requirements document is that it isn t a simple pass/fail . It is designed to enable suppliers to document their current activity around security even if that means acknowledging areas where they have issues. Those issues might even be created by their broadcaster customers ! The intention is to acknowledge that vulnerabilities shift on a day by day basic, but demonstrate a commitment to security one that shows it is front of mind, pro-active and ambitious for excellence .
Ultimately no one can ask for more. The DPP Broadcaster Cyber Security1 checklist builds on a similar one created for the production and post production community, which also enables them and their suppliers to self-assess against a number of key security criteria while respecting the reality that the needs and challenges of every production vary. At IBC2017 the first companies will be announcing their adoption of the DPP checklist approach.
And in a special session in the IBC conference I will be exploring this collaborative approach to security further, with colleagues from across the whole supply chain .
And that s the paradox of security: our expert colleagues who understand hacking can fight off the bad guys; but they ll only be effective if we give them the means to work together.