Security Africa Magazine issue 1

Page 1

SECURITY AFRICA Security - Fire - Safety

African Renaissance?

PG. 4

Pg. 19

Pg. 29

THE SECURITY INDUSTRY AND THE AFRICAN RENAISSANCE

BIOMETRICS FOR AFRICA: HEALTHCARE AND ELECTORAL REFORM

SOUTH AFRICA PAVILION AT INTERSEC 2014: PREVIEW


THE

SINGLE-SOURCE

SOLUTION

FOR

ALL

YOUR

TRANSMISSION

PRODUCTS

Only One Company Can Put All The Pieces Together

Fiber Optic

Copper

Video

Data

Audio

Wireless

Ethernet

No Matter What You Need to Transmit, ComNet has Your Solution with the Industry’s Most Complete Line of Transmission Equipment

Fiber Optic, Wireless or COAX/UTP › Fiber Optic Audio, Video & Data › Fiber Optic Ethernet Managed Ethernet Switches and Media Converters with or without PoE+

› CopperLine® Extenders Ethernet over UTP/COAX Distance Extenders › NetWave® Wireless Ethernet Point-to-Point and Point-to-Multipoint

Intersec | Stand S1-631C | 19 – 21 January 2014 IFSEC Int’l | Stand F825 | 17 - 19 June 2014

www.comnet.net

› Free Design Center Application Support

sales-europe@comnet.net

› Pre & Post Sale Technical Support

+44 (0)113 307 6400


Contents Inside News

Editorial

07

04

Bold Communications: Wireless Network Solution Bold Communications and Kenya Risk come together to deliver a fully equipped alarm monitoring centre.

17

African Renaissance? What are the prospects for the Security industry in Africa? Security Africa Magazine surveys recent developments in the resurgent economies of the continent.

AMG: Surveillance Security Upgrade Amg And Ibam Systems completes Sharjah Sahara Mall Security upgrade.

21

23

Lumidigm: Biometrics in Vaccine Delivery Systems Lumidigm announces that its multispectral imaging fingerprint sensors, as part of a solution supplied in partnership with Fulcrum Biometrics are helping to stop vaccine waste for the millions of Africans not yet vaccinated.

09

29

11

Event Preview: Intersec 2014 set for record edition: Growth driven by burgeoning safety, fire protection and security industries upgrade

32

Cem Systems: Access Control Emerald™ from CEM Systems is the evolution of the traditional access control reader.

16

Surveillance: After Westgate As investigators and forensic scientists sift through the rubble of the Westgate mall in Nairobi, Kenya, in search of answers to the numerous questions that surround the 21 September 2013 attack, even more questions are starting to emerge.

Infrastructure: Ethiopia Tuesday, 5 November, 2013 saw the start of the construction of a 20 km road flanking the old city of Harar to Jijiga.

Biometrics: Airport Security Biometric technology is the new standard in industrial security and access control and is being used the world over in all areas of air travel, says IDtek MD Julian Thorrold.

Infrastructure: Zimbabwe Less than three months after Robert Mugabe was sworn into office as President, the Zimbabwe Government and the China Export and Import Bank signed a US$319 million loan agreement for the expansion of Kariba South hydro power project.

26

13

38

Morse Watchman: Key Control Fernando Pires of Morse Watchmans discusses the future of key control and security in a digital future.

41

Janus Fire Systems: Gas Turbine Fire Protection Janus Fire Systems looking at gas turbine fire protection in depth.

36

Hainsworth: Personal Protective Equipment Featuring Hainsworth® TITAN (PPE) bringing a new level of fire safety to the firefighter.

Conflict Minerals Armed groups earn hundreds of millions of dollars every year by trading conflict minerals. Gold, tin, tantalum, tungsten (the “3 T’s”), are in great demand. What are the facts?

Oil & Gas: Nigerian Investment News. Probe of Oil Dealers’ $6.8 Billion Scandal; a country rich in oil supply but heavily reliant on imports? Security Africa investigates.


INTRODUCTION

Introduction

W

elcome to the inaugural edition of the Security Africa print magazine, partner to our successful online edition. The editorial team at Security Africa is delighted to bring you this new platform, addressing exciting developments for the Security Industry in the African continent.

clear economic advantages of being part of the change, with Japan recently pledging $32 billion in development support, including $6.5 billion in support for infrastructure. These are exciting times indeed. The sheer scale of investment in times of transition points to a clear growth market for the Security Industry. A rapidly changing economy means a requirement for security around logistics, warehousing and transportation; upgrading of airports and seaport security; security for new commercial enterprises and an expanding hi-tech security demand.

As a recent report by the African Development Bank (AfDB) shows, one third of African countries are showing growth rates in their GDP of more than 6%. This is a spectacular figure when one considers that the European Union has only just moved out of recession, with a growth rate 0.3% for the second quarter of 2013.

3

The AfDB points to other important statistics: the development of an emerging African middle-class and a decline since 2005 in the number of people living below the poverty line from 51% to 39%.

We look forward to keeping our readers updated with these and other developments. One thing is certain: the Security sector will be called upon to provide crucial skills, technology and expertise to this changing continent.

Of course, this does not mean that the region is experiencing no challenges. The African continent is vast, and poor infrastructure continues to hinder progress, although this is starting to change. The most important driver of the new prospects for Africa has been the five-fold increase in foreign investment since 2000. World economies are recognising the

Judith Adele Editor

Advertising Sales Ben Charnley ben@securityafricamagazine.com

Design & Analytics Alex Scott design@securityafricamagazine.com

Editorial & Pr Judith Adele editor@securityafricamagazine.com

Accounts Sue Barker accounts@securityafricamagazine.com

SecurityAfrica December 2013


Judith Adele

FEATURE

Security industry a key player in Africa’s economic Renaissance

W

hat are the prospects for the Security industry in Africa? Security Africa Magazine surveys recent developments in the resurgent economies of the continent to find that the security and fire industries will have a crucial role to play in growing prosperity. The International Monetary Fund has projected that during the next five years, 10 of the 20 fastest growing economies will be in Sub-Saharan Africa, and two will be in North Africa. The top five countries globally with the greatest potential for growth are Rwanda, Liberia, Cambodia, Zambia and the Gambia according to Courtier’s annual research based on the Global Competitiveness Index produced by the World Economic Forum. Of course, the continent as a whole is not without significant problems. There are countries which still score very low on basic requirements and efficiency. The potential is there, but it’s not just the rate of growth but the quality that is important for Africa’s long-term potential to be realised. The World Bank’s provisional figures showed that higher commodity prices, increasing investment and a general pick-up in the world economy should boost Africa’s growth to more than 5% over the next three years. By comparison, Global GDP was only set to grow by an average of 2.4% this year (2013), and Europe has only moved out of recession in the last quarter.

SecurityAfrica December 2013

4


FEATURE

The weaknesses in the continent have been spelled out by the IMF and the World Bank: many countries still suffer from unrest. Security issues are particularly important in the oil rich countries of West Africa. In South Africa, labour unrest has been a cause for disruption in the mining industry and the threat of piracy to commerce and to the expanding tourism industry has to be contained if the region is to meet its potential. There is a growing demand for projects that create efficient solutions to Access control, civil ID, surveillance and recognition and verification systems. A key issue for investors is government stability and strong democratic systems. Biometric technology has already been used around the world to counter electoral fraud and this will increasingly be the case for Africa, following on from the successful example of Ghana’s 2012 election.

As leading World Bank economist Punam ChuhanPole states, ‘if properly harnessed to unleash their full potential, these trends hold the promise of more growth, much less poverty, and accelerating shared prosperity for African countries in the foreseeable future’. With China and India scrambling for business in Kenya and Tanzania, Japan fighting to win contracts for infrastructure projects in South Africa and Ghana wrestling with its new oil wealth, there is no doubt that sub-Saharan Africa is attracting international attention from investors. As the focus shifts from a traditional dependency on minerals to infrastructure developments and new consumer industries, the key to competitiveness will be security. Escalating political tensions and civil unrest in North African countries and the Middle East demonstrate the importance of the role of the security industry in providing stable investment environments. Investment across Africa will only be fully attractive when sub-Saharan countries are seen to be coping with issues of security, fire and surveillance through the implementation of well-designed products and systems.

5

SecurityAfrica December 2013

With a projection that 50% of households – 128 million people – will have income to spare on commodities, the potential for the development of consumerbased industries is clear.


FEATURE

McKinsey Global Institute projects that at least four groups of industries – consumer facing, agriculture, resources and infrastructure – together could generate as much as 2.6 trillion dollars in revenue annually by 2020 for the African continent, an increase of 1trillion dollars from 2010. McKinsey stresses that early entry into the continent brings major advantages and opportunities, for example, the ability to create markets, establish brands, shape industry structures, influence customer preferences and establish long-term relationships. With a projection that 50% of households – 128 million people – will have income to spare on commodities, the potential for the development of consumer-based industries is clear. The increased demand for recognition and verification systems and mobile biometrics will be exponential. But as consumerism develops, so does the requirement to monitor crime in countries where there are still large income inequalities. Angola’s police force is in the process of installing surveillance cameras in its cities to help with public security. The national

police spokesperson has also outlined plans to install cameras at various points along the country’s highways. Projects to tackle the problem of developing the communications infrastructure in Angola will also increase demand for surveillance systems to counter new threats. The surveillance exercise has been started in the capital city of Luanda because of its high population and crime rate. Of Angola’s growing population of over 20 million, one third lives in the capital. While the city continues to bloom with luxury developments a need to demonstrate security will be of paramount importance. The African Renaissance has not only begun economically, but the continent is also about to take a great leap forward technologically, in its race to create solutions to the problems of corruption and crime that have held back the region’s financial and industrial expansion. The Security and Fire industries will play a crucial role in the success of this new chapter in Africa’s development – with profitable new markets emerging along the way. SA

SecurityAfrica December 2013

6


security news

Bold Gemini monitoring for KenyaRisk

K

enya Risk Consultants Limited is a leading security solutions specialist providing maritime security, close protection and investigation services throughout East Africa and beyond. Based on the coast in Mombasa, their expertise is utilised not just for passenger and cargo vessels in a high risk area of the Indian Ocean, but also for blue chip companies, hotels, industrial manufacturers, and the oil and gas sector, across a broad range of security and logistical services. To deliver and commission a fully equipped alarm monitoring centre, Kenya Risk turned to another security industry expert, Bold Communications. Bold is an independent software development and projects company based in the UK and providing security monitoring solutions in Europe, the Middle East and Africa. Bold solutions may be found in many different types of control rooms - for example, retailers, universities, banks, hospitals, police and military, in addition to commercial alarm and video receiving centres. The scope of monitoring solutions which Bold deliver range from single campus security projects, for example, hospitals, through to many thousands of remote and dispersed sites.

Specialist monitoring expertise For the Kenyan project, Bold’s specialist experience working in many different regions was particularly useful when it came to dealing with the challenges raised by the local communications network infrastructure. The well-established PSTN and IP signalling methods commonly used in Europe were not a viable option for the Kenyan market. Bold and Kenya Risk worked together to develop a reliable wireless network solution which has now been deployed for a growing base of commercial, industrial and domestic 7

SecurityAfrica December 2013

users. On alarm activation, signalling through to the alarm receiving centre enables the control room operators to immediately contact keyholders and to mobilize security services where required for an effective response. All incidents are logged, together with false alarms if any, and subscribers can receive emailed reports detailing all activity relating to their site.

Bold Gemini multi-protocol platform Any industry standard alarm panel can be received and handled in Bold Gemini as well as a wide range of CCTV systems, lone worker and access control solutions. Interoperability between the different installed security technologies generates a far more effective response at the management level. This provides for services such alarm verification, identifying “nearest to� resources and validating automated access transactions. Where custom software development is needed, for example, a proprietary security product is required as a component of an overall project, Bold provides a design and development service. As integration specialists, Bold has significant experience of delivering complex security monitoring solutions, combining event signalling from diverse systems with situational data to generate an effective workflow response. At the control room workstation, event and alarm handling is made clear and simple by the use of a common interface which guides the operator through a series of response tasks.

The monitoring challenge The greatest challenge in setting up a new control room is to find a platform which works effectively across all relevant product groups, including existing legacy


products as well as new technology as it comes into the market. This is achieved in Gemini by maintaining a comprehensive interface library deployed across a wide and diversified user base. Third party product interface design is based on continuous functionality enhancement and doesn’t just stop at making a connection between disparate technologies. User feedback informs design and development strategy, creating a real partnership rather than a simple customer and supplier relationship. Also important is the need to identify appropriate methods of signalling and communications is also essential, as well as constantly improving operational efficiency, reducing total ownership costs and, not least, making it all easy to use for the system operator. As the operator is usually the most expensive resource within the control room, intelligent event filtering and automation plays an important role in achieving a return on investment.

Securing the data Access to the data in the Gemini system and default user settings are controlled by means of creating custom user profiles. These profiles are used to define exactly what an operator may or may not view and change. With a comprehensive event log and audit trail, all user, signalling and data activity is recorded. Automated system reporting supports full activity supervision enabling a fast response to situations where there may be communications or equipment faults.

Managing risk Gemini incorporates consideration of the risks posed by security and safety alerts at every point within its design. The result is a solution which not only allows those risks to be confronted and managed, but to do so in a way which fits the individual needs of the user. Kenya Risk’s CEO, Niklas B Rogers, commented, “Bold provided a very comprehensive monitoring solution which closely matched our requirements and handled the whole project with great speed and efficiency. The Gemini system does exactly what we need at the moment but importantly it also offers the capability to expand our range of security monitoring services in the future. Our operators are very positive about using the software which is well thought out and easy to use.” SA

About Bold Communications Bold Communications is a UK company providing open platform security monitoring solutions. Bold Gemini is widely used in alarm and video receiving centres in the UK, Europe and the Middle East. The company also specialises in alarm communications products, with a range of PSTN, ISDN, GSM and IP alarm receivers. Bold provides a unique 24/7 technical support service to alarm receiving clients, which include commercial and corporate central stations, universities and colleges, local authorities and NHS institutions. For additional information, please visit www.boldcommunications.co.uk

About KenyaRisk KenyaRisk offer reliable and effective security solutions, security consultancy services and maritime security solutions in East Africa and beyond. With a firm foundation and experience in Africa, KenyaRisk delivers tailored solutions based on client requirements and regional expertise. Services include security and logistics consultancy and solutions on land and sea, as well as a variety of related services and anti terrorism training. KenyaRisk has the capabilities to act effectively and decisively when it matters most. For additional information, please visit www.kenyarisk.com

Useful links Bold Communications Contact Brian Kelly, MD T: +44 (0) 1925 713224 E: info@boldcommunications.co.uk


Eleni Kalu

INFRASTRUCTURE

Ethiopia: new ring road for Harar UNESCO World Heritage site

T

uesday, 5 November, 2013 saw the start of the construction of a 20 km road flanking the old city of Harar to Jijiga. "The contractor has finished all of the preparations and has started the construction of the road," Samson Wondimu, communication director at the Ethiopian Road Authority, said. "Based on the contract, we expect the completion of the road within two years." Ethiopian road infrastructure has been experiencing fast growth over the last decades due to huge public investment in the sector. The ERA maintains that expansion in the sector is essential to fuel the fast paced continuous economic growth the nation has achieved for a little less than a decade. The need for the new 13m-wide road arose from problems seen in transportation within the city, as well as with passing traffic. The existing Harar road is curvy and steep, located 526km from the capital, and experiences traffic jams due to its narrowness and status as the main thoroughfare of the city. The new road will encircle the ancient city – one of the main tourist destinations in the country and a UNESCO World Heritage site since 2006 – and will, in essence, function as a ring road. The project is part of the ERA's fourth Road Sector Development Programme (RSDP), which aims to boost road coverage across the country. In the performance report the Authority released on 1 November, 2013, road coverage in Ethiopia was said to have reached 85,966 km at the end of the last fiscal year. This shows an increase from the 26,550 km that existed in 1997. Three decades ago the length of roads in Ethiopia was 18,000 km. Asphalt roads in particular rose from 3,708 km to 11,301 km. So far, the ERA has spent 142.1 billion Br in total over the past 16 years of the programme.

9

SecurityAfrica December 2013

The project was awarded to Gemshu Beyene Construction Plc – a grade one contractor – for 360 million Br. Enyi Construction had placed a bid against Gemshu for this construction. The consultant for the Ethiopian Roads Authority (ERA) is Core Consulting Engineers Plc. In line with one of the goals of the ERA during this phase – to raise the participation of local contractors and consultants in federal road projects – both companies involved in this project are local. Contractors normally have three months from the official start of the project to mobilise resources, such as trucks, before starting construction. Gemshu has finalised all of those preparations already, however, and started the work, according to Gemshu Beyene, the general manager of the contracting company. The company has previously worked on the 280 km Dire Dawa to Dawale road, Afar gravel road maintenance and the 76.6 km Bima to Matsberi asphalt road in Tigray regional state. Although road projects in the country have often been delayed, the contractor is confident it can complete its task in the agreed time. "We are currently building an 86km asphalt road from Bima to Feyel Wuha in Tigray regional state, and a 47km road from Mehal Meda to Alem Ketam in Amhara regional state," Gemshu said. His firm will deliver its latest project on schedule, Gemshu insisted, as it has finished its previous projects on or ahead of time. SA


Looking for a high performance Command and Control System with a low lifetime cost? •Designed to fit alongside a variety of third party systems meaning you don’t have to replace all your software. •Contains all the functionality you would expect from a command and control system. •Monitors incidents and resources efficiently. •Enables dynamic and attribute based mobilising.

Guardian Command Next generation mobilising

To find out more or arrange a demonstration:

(0) 1455 826 400 email: fire@3tcsoftware.com visit: www.3tcsoftware.com


Jacob Godden

INFRASTRUCTURE

Zimbabwe ‘Looks East’ for Kariba Dam expansion

Z

imbabwe ‘Looks East’ for Kariba Dam Expansion Less than three months after Robert Mugabe was sworn into office as President, the Zimbabwe Government and the China Export and Import Bank signed a US$319 million loan agreement for the expansion of Kariba South hydro power project. “Under this arrangement, the bank will provide funding amounting to US$319.5 million – representing 90 percent of the total project cost – while Government, through the Zimbabwe Power Company, will finance the 10 per cent balance amounting to US$35.4 million,” Minister Chinamasa said. The loan will attract annual interest of 2 per cent and has a repayment period of 20 years. The project is expected to add 300 megawatts to the national grid, a development set to ease power outages. Zimbabwe produces about 1,200 MW of electricity but peak demand is 2,200 MW.

The two countries strengthened ties after the European Union (EU) and US imposed sanctions on President Robert Mugabe and his inner-circle following Zimbabwe’s 2002 elections. In March, the EU suspended sanctions against 81 officials and eight firms in Zimbabwe. The decision followed peaceful referendum on a new constitution which expands civil liberties in Zimbabwe organised by a coalition government. Speaking through an interpreter, Mr Zhu said the signing of the loan agreement signified a major breakthrough in addressing power shortages in the country. The loan would be used for such services as engineering, procurement of equipment and actual construction to be done by the winning bidder, a Chinese firm called Sino-Hydro.The firm has an option of sub-constructing building of the two units that would add 300 megawatts to the national grid. SA

“This should go a long way in reducing power outages. ... For us the energy deficit has hamstrung the growth of our economy,” Mr Chinamasa said. With Zanu-PF’s indigenisation law – a policy to acquire 51 per cent ownership of 1,100 foreign-controlled companies operating in the country – two of the largest platinum producers, Anglo American Platinum and Impala Platinum Holdings, have already had to sell majority shares in their local operations. The deal with China is a continuation of the “Look East” policy Zimbabwe adopted after falling out with Western powers. China was a strong supporter of Zimbabwe’s independence struggle against white minority rule. Finance Minister Patrick Chinamasa signed on behalf of the Government, while China Exim Bank vice president Mr Zhu Hongjie represented the bank.

11

SecurityAfrica December 2013


Organised by:

Conference & Exhibition

AfricA Security & counter-terroriSm Summit 2014

Extensive Networking Opportunities with Military, Police and Government Ministries!

27th & 28th February, Lancaster London Hotel

New Developments and Technologies in African Security and Counter-Terror AFriCAn SpEAkErS:

WHY ATTEND:

cHiLiKA SimfuKWe, Head of INTERPOL Regional Bureau, SARPCCO

DISCOVER the latest developments and security challenges facing African nations.

Senior rePreSentAtiVe,

LEARN from the key decision makers driving Africa’s Security development.

Financial Intelligence Centre, GHANA

ABioLA ABimBoLA-SuLAimAn, Security Manager, WEST AFRICAN GAS PIPELINE COMPANY LIMITED

ENGAGE with your key audience at the exhibition and exclusive networking evening. FEAturing OvEr 35 tOp LEvEL SpEAkErS inCLuding:

nyenK SuBAH, Airport

Security Manager, ROBERTS INTERNATIONAL AIRPORT LIBERIA

DePuty miniSter,

MINISTRY OF DEFENCE, GHANA

reAr ADmirAL Geoffery BieKro, CHIEF OF NAvAL STAFF, GHANA

iSSAc mAGAGuLA,

WHO ATTENDS?

NATIONAL COMMISSIONER, ROYAL SWAZILAND POLICE

H.e. eDWArD turAy,

• Ministers of Defence • Ministers of Interior

rePreSentAtiVe, THE NATIONAL COUNTER TERRORISM SECURITY OFFICE (NACTSO), UK

ricArDo BAron BAretZKy,

President, THE EUROPEAN CENTRE FOR INFORMATION POLICY AND SECURITY (ECIPS)

tony SmitH, CBE, Former Director, UK BORDER FORCE SerGei BoeKe, Research Fellow, THE INTERNATIONAL CENTRE FOR COUNTER-TERRORISM

ALeX VineS, OBE, Research

Director, Area Studies and International Law; and Head of Africa Programme, CHATHAM HOUSE

SAmueL LinAreS,

HIGH COMMISSIONER, SIERRA LEONE HIGH COMMISSION

Director, INDUSTRIAL CYBERSECURITY CENTRE,

ABDuLmenAm tunSi,

mAHmouD yASSin, Lead

TECHNICAL ATTACHé, LIBYAN MINISTRY OF INTERIOR AFFAIRS

Lt. GenerAL (rtD) nJuKi mWAniKi, FORMER

• Police Officials

intErnAtiOnAL SpEAkErS:

ARMY COMMANDER, KENYAN ARMY

• Security Officials • Armed Forces • Law enforcement Specialists • International Specialists

Systems & Security Eng, Data Center Group, Information Technology Department, NATIONAL BANK OF ABU DHABI

AnDreW eVrVinG, Former Head of Counter-Terrorism GCHQ

Let us know which companies you would like to meet and we will do our best to bring them to the event to introduce them to you

feLiX nKunDABAGenZi, Strategic Analyst, Coordination Unit for Threat Analysis, OCAM

(Business Match Making Service is for event sponsors/exhibitors only)

pLuS mAny mOrE tO bE AnnOunCEd:

KEY TOPICS COvERED: • Preparing for the Increasing Terror Threat • Military Communications Technology Overview • Cyber Security - The Future threat to Governments and Military Institutions • African Crime and Security – The Key Issues • Strategies and Technologies for Riot Control

• Securing Cities - On the Ground Scenarios • The Role of the Police in a Democracy and the Use of Technology in Policing • Border Security: The Case for International Co-operation • Airport Security Technologies for 2014 and beyond

REGISTER NOW TO AVOID DISAPPOINTMENT CONTACT charlotte@oliverkinross.com


FEATURE

East Africa: conflict minerals – the race for certification of `clean’ minerals.

One of the problems with these measures is that some companies take a hands-off approach and instruct suppliers to avoid buying from the Congo area altogether. This may help cut off armed groups but it leaves the mining communities in the Congo behind. Certification processes are a viable solution but a recent report by Enough Project, has stressed the urgency of the race for clean minerals. Enough Project Senior Policy Analyst Sasha Lezhnev said: “Minerals can be a boon for peace in Congo and the region, not a conflict curse. But if Rwanda, Congo, and regional states do not take urgent steps to complete the mineral certification process in the next few months, multinational companies may stop purchasing many minerals from the region that cannot credibly be certified as conflict-free. ‘

A

rmed groups earn hundreds of millions of dollars every year by trading conflict minerals. Gold, tin, tantalum, tungsten (the “3 T’s”), are mined in eastern Congo and are used in all consumer electronics products. Government troops and militias fight to control the mines, whilst civilians , men women and children, suffer the consequences of armed conflict. As international awareness of the brutality to workers has grown international companies have wanted assurance that their products are using minerals which are conflict/free. Locals in mining communities are forced to take part in the illicit mining economy. Money earned from the sale of conflict minerals is used for personal profit and to further violent causes and terrorist groups. Minerals are smuggled out of Congo through neighboring countries, then shipped to smelters around the world for refinement. Once minerals are processed in this way, it’s difficult to trace their origin. Conflict minerals easily make their way to the U.S. and all over the world in consumer products.

Tremendous strides have been made in recent years to cut the conflict minerals trade in eastern Congo. In the past four years, governments, nonprofits, and private sector actors in Africa, the U.S., and Europe have built regulatory frameworks and stimulated the global market for responsibly sourced minerals. Additionally, a certification process, under the International Conference on the Great Lakes Region, or ICGLR, was established to ensure that minerals sold and exported from the Great Lakes region do not fund conflicts. Progress on reforming supply chains and demilitarizing mines has addressed many negative elements of the conflict minerals trade, as armed groups are much less present in mines.

Large consumer electronics Companies like Apple, Intel and Hewlett-Packard are now carefully monitoring where their minerals come from. In addition a section of the Dodd-Frank Wall Street Reform and Consumer Protection Act requires companies from the Democratic Republic of the Congo to inform the Security and Exchange Commission how they ensure conflict minerals are not being used. 13

SecurityAfrica December 2013

The ICGLR certification process requires four components: mine inspection and traceability, a regional mineral tracking database, audits, and


FEATURE

independent monitoring. The key components of accountability—auditing and independent monitoring— lack operational mechanisms to ensure that minerals are fully certified. Existing “bag and tag” systems, used by tin and tantalum industries sourcing in Rwanda and in some locations in Congo, have been a brave first step but do not provide full conflict-free assurance because of the lack of the independent oversight mechanisms of the ICGLR certification process

If minerals from the Great Lakes region cannot be certified as conflict-free, then efforts to trace and audit become moot. Progress in certifying minerals from the Great Lakes region as conflict-free is at a crossroads. States are starting to issue certificates for easy-to-certify mines using ad hoc measures, but interim steps will not work for all mines. Rwanda issued its first conflict-free certificate on November 6, and Congo plans to begin issuing certificates for mines and exporters soon. Critical gaps in the minerals certification process in eastern Congo, Rwanda, and the surrounding region threaten to undo the development of a clean minerals trade in Central Africa, argues a new Enough Project report released this month. Minerals certification, a key component in building a transparent regional minerals trade, faces setbacks that could hinder global market access for minerals extractors, traders, and exporters in

the Great Lakes region, unless regional governments implement the process. The report, “Coming Clean: A Proposal for Getting Conflict Minerals Certification Back on Track” is based on recent field research in the region. Enough Project Field Consultant Aaron Hall, said: “Certification is the most critical component of the entire conflict-free minerals system. If minerals from the Great Lakes region cannot be certified as conflict-free, then efforts to trace and audit become moot. Without functioning regional audits or an Independent Mineral Chain Auditor, minerals cannot be credibly certified according to regional and international standards.” The report calls on the U.S., E.U., and World Bank to focus energies on helping to complete the ICGLR certification process. These measures include setting a deadline for Rwanda, Congo, and the ICGLR to meet the four components of the certification process and formalizing interim measures to certify minerals to meet international standards. If the Great Lakes states fail to meet these standards, they may be deemed noncompliant with international due diligence standards. The report also recommends that the World Bank and/ or electronics companies should help digitize the traceability system in Congo, so that data is transparent, and that the U.S. and E.U. should urge Rwanda to publish minerals production data as soon as possible. Finally, the U.S. and E.U. should offer incentives to source fully certified minerals from the region, such as offering a high-level award for companies that help build a clean trade and purchasing clean minerals. SA Judith Adele

SecurityAfrica December 2013

14


Axis Communications’ Academy

Building your strengths in network video

Your customers and your success depend on you having the most up-to-date, comprehensive knowledge in the industry. Axis Communications’ Academy makes it easy to stay one step ahead — putting network video knowledge right at your fingertips. The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for classroom-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff. When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door. Get the Axis picture. Stay one step ahead. Visit www.axis.com/academy

Axis Communications’ Academy - the global learning center for network video


After Westgate. How to make the best use of surveillance systems Judith Adele

Judith Adele

security news

A

s investigators and forensic scientists sift through the rubble of the Westgate mall in Nairobi, Kenya, in search of answers to the numerous questions that surround the 21 September 2013 attack, even more questions are starting to emerge. The most important of these is how the four gunmen managed to evade Kenya’s intelligence services, had unlimited access to such an important facility and managed to take on the security agencies for four days. 67 people died and hundreds more were injured in the Westgate Mall when 4 armed members of AlShabab raided the popular shopping mall in (Nairobi) in September. Philip Smerkovitz, managing director of TeleEye surveillance system emphasised that it is doubtful that security cameras would prevent a well- planned attack such as the one at Westgate but that a remote TeleEye surveillance system would have provided, `Critical intelligence on the description and actions of the terrorists‌.via live streaming to law enforcements and military units.’ One key question is whether it is best to keep cameras out of the eyes of criminals to lessen problems with vandalism and theft. Latest technologies can offer high resistance housing and toughened poly carbonate covers which lessen the possibility of interference. But discrete surveillance systems have the disadvantage of negating the deterrent effect. Key to efficient systems is identifying the specific site requirements and deploying the most appropriate

technology for different areas of the site. It is crucial to ensure that monitors are out of reach of vandals but that their presence is evident. Although decoys can confuse criminals they run the risk of leaving areas unmonitored and as security cameras become more affordable deployment will increase. Shopping centers use bullet and domed shaped security cameras to keep a watchful eye on the mall. Bullet cameras are easy to see and are used most often in parking lots. Domed shaped security cameras are found within the walkways, stores and the food courts. Domed shaped cameras are not easy to detect unless you look for them. These cameras also make it impossible to tell which way the camera is pointing. Domed shaped cameras feature dark colored glass that prevents the camera being seen. Cameras with wide angles are used to monitor large areas. The housing on bullet cameras located outdoors is made to withstand severe weather or tampering. Pan, tilt and zoom cameras make it easy for security to change the cameras angle to get a better view of a particular area. Security experts classify shopping malls as soft targets because you have a large group of people entering and exiting the building through multiple locations. This kind of environment makes it easy for a gunman to enter and exit the building quickly. This also makes the people who are shopping vulnerable and at risk. Since most shopping malls use security guards to constantly monitor their CCTV security cameras, it is important that employees understand how to recognize criminal behavior while monitoring the live video. After Westgate, the necessity for shopping mall security departments to train and prepare for any kind of emergency, whether shooting, bomb threat or hostage situation is paramount. Surveillance is only one part of the process. The response of outside agencies such as the police and armed forces is of paramount importance but the latest surveillance technology custom designed for their specific location, well trained staff to survey cameras and follow procedures and excellent communication with other agencies should greatly improve the response to any future attack. SA

SecurityAfrica December 2013

16


security news

AMG and Ibam Systems Completes Sharjah Sahara Mall Security Upgrade AMG Systems’ fiber optic transmission system and receivers form core of new network

A

MG Systems, the British manufacturer of sophisticated Megapixel cameras and CCTV transmission technology, and Systems Integrator IBAM Systems have completed a vastly enhanced security system within Sharjah’s 250-store Sahara Mall in the UAE. The new system greatly improves the link speed between receiver and transmitter, making it almost instantaneous after power up. In a high profile shopping facility like Sharjah Sahara Mall, the enhancement of security and surveillance systems plays a key role in maintaining vibrant and expansive operations. AMG’s equipment is built to a highquality specification; the whole subrack and housing of the products gives the solution a high class visual appearance. Liz George, Project Manager at IBAM Systems, found the new system very simple to install compared to locally available fibre transmitters. She said, “The high level of support we received from the AMG team was unexpected and very welcome. I would personally recommend their support and solutions to other Systems Integrators and for any of our future projects requiring fibre solutions.” AMG Systems’ collaboration with IBAM Systems has allowed IBAM to significantly expand and upgrade the security and Public Address infrastructure in the

17

SecurityAfrica December 2013

Sahara Mall. In total, there are now 160 cameras throughout the entire complex, 27 of which feature PTZ. For Public Address, the system is divided into multiple zones to provide targeted announcements to different areas. Mustafa Shibu, Sales Manager at IBAM Systems, has been impressed by the capacity of the new infrastructure. He explained, “Areas covered by the new camera systems include parking lots, walkways, and entrances and enable us to ensure the safety of the clients and staff of the 250 stores now housed within the complex.” Originally set up as a provider of telecom equipment throughout the MEA Region, IBAM has since expanded its operations to cover safety, security, building automation/management systems. The company has executed numerous commercial, healthcare, hospitality, military and residential projects in the UAE. Leona Hayes, Business Development Manager Middle East, at AMG Group, says, “Our collaboration with IBAM Systems on this large-scale prestigious expansion project went very smoothly. The successful integration of our fibre-based products solidifies the position of IBAM Systems within the region while also increasing exposure of the AMG brand in the important Middle East market.”


security news

About IBAM Systems

About AMG

IBAM Systems started operation in 1992 supplying telecom equipment in Dubai, before becoming incorporated into a Limited Liability Company as part of an expansion strategy in 2002. Subsequently, IBAM expanded its product portfolio to include voice/data networking products and security systems. Today, the company’s operations include the complete range of safety, security and building automation/ management systems. Ibam provides end to end solutions for the Low Voltage (LV) and Extra Low Voltage (ELV) systems. This includes support for design, sales & marketing, installation & commissioning, project management, service and support and training to clients, government departments, oil field companies, hotels, consultants, and various other clients and contractors.

AMG is a leading global provider of video and communication transmission solutions designed for CCTV surveillance operations in transport, public, government and military sector. AMG also manufactures a range of IP Cameras and NVR Products under the AMG-Panogenics brand. AMG Transmission Solutions offers a full range of transmission technologies including multimode and singlemode video, data and audio fibre optic transmission systems; single & multi-channel unshielded twisted pair (UTP) links for video, data & audio; multi-port Ethernet switches for the transmission of IP based solutions over fibre, and both analogue and digital wireless products for the transmission of video & data. As a result AMG transmission solutions have been successfully implemented in many high profile projects throughout the world. Projects include supplying the transmission system for the UK’s NRTS project and the security and surveillance of the Museum of Islamic Art in Doha, Qatar. AMG Transmission Solutions and AMGPanogenics are brand names of AMG Systems Ltd.

The company’s team of experienced engineers and technicians offers a comprehensive range of services including design support, supply, testing, commissioning, and training. IBAM has executed a number of commercial and residential projects in the UAE.. In addition to the UAE market, IBAM has been supplying equipment to other Middle East and Africa (MEA) countries.

More information can be found on: www.amgsystems.com

Contact

Vibeke Ulmann / Catalyst Communications Tel: +44 (0) 845 226 3036 Mob: +44 (0) 7717 866 194 Email: vibeke.ulmann@catalystpr.com

SecurityAfrica December 2013

18


BIOMETRICS

Biometrics for Africa – healthcare and electoral reform

B

iometric authentication forms a key sector in the security industry, with a crucial role to play in ensuring that commercial installations of all kinds – company premises, airports and ports – remain secure. These functions are an important part of the African security market, but biometrics has other applications that are central to specific problems of development faced across the continent. Africa is the second largest continent in the world, with huge natural resources. Despite unprecedented growth in the last decade, underdevelopment still hinders many countries, with poor healthcare widely recognised as an enduring problem. Catholic Health Services (CHS) of Namibia have implemented a biometric software solution developed by M2SYS Technology called Bio-SnapON™ to address problems associated with improving healthcare in regions where identifying and tracking patients can be a challenge. The award-winning firm, M2SYS, has developed a wide range of biometric software solutions and biometric readers for identity management. In CHS’s enrollment process, patients scanned their finger on a fingerprint reader to give a print that would be used for future identification. Patients were asked for additional information, such as a digital picture, driver’s license, and contact details. Once enrolled, this information could be retrieved with a single fingerprint scan. Cases exist where the incorrect substitution of a single letter in a patient’s name has led to confusion and even mistreatment. In tightening up procedures around patient identification, advances in biometric authentication are making a clear contribution to the battle against disease in Africa, creating efficiencies and saving lives. However, healthcare is only one area in which improvements must be made to boost Africa’s prospects for economic renaissance. Biometrics has been applied in another vital area of the continent’s development –

19

SecurityAfrica December 2013

electoral reform and democratic participation. Economic stability in Africa requires political stability, but in much of the region trust in democracy is still being established. It is still common for defeated parties in Africa to contest the results of elections, with claims of electoral fraud and vote-rigging sometimes leading to violence. Biometric authentication technology has been recognised as crucial to creating an open and transparent electoral system, reducing political upheaval and fostering trust in the deomcratic process. Already the Electoral Commission have introduced biometric technology to assist elections in Sierra Leone, DRC, Nigeria, Zambia, Malawi, Rwanda, Senegal, Somaliland and Ghana. And despite criticisms, it looks as if other countries will follow. Biometric smart ID cards, worth 40 million US dollars, are being issued by the government of Mauritius to everyone over the age of 18. The 2012 election in Ghana has been widely heralded as a success, with biometric authentication playing a crucial role. A Biometric Voter Registration (BVR) system was successfully installed as well as Biometric Verification of Voters (BVV) in the 26,000 polling stations across the country, making it possible to identify 13 million voters over two days of polling. Adam Vrankulj, editor of Biometricupdate.com, states that this is a record identification figure, with India holding the previous record for verifying around 3.5 million people. The biometric electoral systems are estimated to have cost approximately 263 million Ghana Cedis ($146 million). Haruna Iddrisu, Ghana’s Minister of Communication, has approved the experiment with BVR and BVV, stating that he is confident the technology will be a central part of the country’s electoral system for the future. SA



BIOMETRICS

Biometric technology improves airport security

The installation of the biometric technology at the Johannesburg airport is designed to enhance safety and secure the access of 600 employees. The system also follows aviation security mandates set by the International Civil Aviation Organisation (ICAO). “The ICAO imposes the same standards on airports in developing countries in Africa where there isn’t always the financial means to ensure compliance,” says Thorrold.

B

iometric technology is the new standard in industrial security and access control and is being used the world over in all areas of air travel, says IDtek MD Julian Thorrold.

Earlier this year, electronic risk management technology solution provider, IDtek, completed the installation of a fingerprint biometric technology system at OR Tambo International Airport. “The biometric technology will enforce security and increase physical access control reliability, while minimising personnel access to restricted working areas of the airport,” Thorrold comments. IDtek was awarded a contract by Airports Company South Africa to install the biometric finger- print technology in the Air Traffic Navigation Control Department at OR Tambo.

The escalation of international terrorism has led to the global tightening of airport security, particularly by controlling and monitoring the movement of airport staff, travellers and visitors, a report by Hightech Security Solutions reveals. This has led to international bodies establishing protocols and efficient security standards procedures at international airports. Thorrold states, “The main players who have been instrumental in rapidly advancing biometrics standards over the past two years include the US and Canadian governments, with the September 11, 2001 terrorist attacks playing a significant role.” The biometric technology systems installed by IDtek at OR Tambo were first introduced at Roissy Charles de Gaulle Airport and at Orly Airport, in Paris, in 2003. Sagem Morpho, which manufactured the systems, was later commissioned by the French government to install a voluntary biometric passenger identification system that is designed to ensure that the same passenger who checks in luggage is the same person who boards the aircraft. Sagem Morpho’s biometric technology security systems have been applied in both governmental and business institutions. In the local security sector, Sagem has provided biometrical identification systems to the South African Police Service and the Department of Social Development, while IDtek has installed the technology at Nationwide’s head office in Rivonia. SA

“Fingerprint technology has been around for many years, making it the most advanced technology available. It outshines other biometric technologies, including iris scanning, voice recog- nition, twodimensional or three- dimensional face recognition, hand size, vein scan and signature identification. Fingerprint technology is also the only biometric technology that provides a low enough cost point,” states Thorrold. A biometrical fingerprint device can handle up to 48 000 fingerprints. The device verifies the identity of an employee in a system secured beside the access point or door. 21

SecurityAfrica December 2013


www.airlive.com


BIOMETRICS

Biometrics in Healthcare

L

umidigm today announced that its multispectral imaging fingerprint sensors, as part of a solution supplied in partnership with Fulcrum Biometrics (San Antonio, Texas), are helping to stop vaccine waste for the millions of Africans who have not yet been vaccinated. Until now, the vaccine delivery system has been hampered by ineffective tracking and reporting and, consequently, millions of young children are not being vaccinated and an estimated 2.5m born this year will die before the age of five. The delivery model in many parts of Africa depends on a multitude of healthcare workers who serve very large and remote areas. When there are no vaccination records to consult, many patients are reimmunised unnecessarily, others are simply missed and a finite supply of vaccine is wasted. Unfortunately, without a proper and reliable means of identification, vaccine wastage rates are higher than 50 per cent in some of the most challenging geographies. VaxTrac is solving this problem with a biometric vaccination registry that is operated and managed in the field with low-cost mobile devices. Adult and child patients are identified in the registry with fingerprint sensors from Lumidigm. Returning patients can pull up their vaccination records with the touch of a finger allowing the healthcare worker to deliver appropriate care.

23

SecurityAfrica December 2013

“With our VaxTrac system leveraging Lumidigm fingerprint sensors, we have been able to improve immunisation tracking which allows us to reduce waste so that we can vaccinate more people and save lives,” asserts Mark Thomas, executive director of VaxTrac, a non-profit organisation supported by The Bill and Melinda Gates Foundation, among others. “We started evaluating Lumidigm sensors in 2012. Since the skin of children, especially young children, can be very malleable, we knew from experience that conventional biometric technologies that need a finger pressed against the device do not work. The ability that Lumidigm offers to pull fingerprint images from deeper layers produces images less susceptible to distortion and allows us to track vaccinations accurately.” Multispectral imaging is a sophisticated technology specifically developed to overcome the fingerprint capture problems that conventional imaging systems have in less-than-ideal conditions. This more effective technology is based on the use of multiple spectrums of light and advanced optical techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin. That subsurface capability is important because the fingerprint ridges seen on the surface of the finger have their foundation beneath the surface of the skin, in the capillary beds and other sub-dermal structures.


BIOMETRICS

“Being able to quickly read every patient’s fingerprints, no matter how problematic, in all types of conditions, from extremely dry to wet, is vital to this program,” emphasises Bill Spence, Lumidigm vice president of sales-North America, Europe and Australia. “Biometric authentication has reduced the waste of vaccine dramatically, helping so many more people get vaccinated.” The biometric vaccine registry also enables real-time reporting for streamlined supply-chain management, further reducing waste. The first in-country deployment of the Lumidigm fingerprint sensors was in March, 2013. The units are now in Kenya, Uganda and Benin with the largest deployment in 40 clinics throughout Zambia. Community healthcare workers are trained to use the biometric vaccine delivery system. The simple, userfriendly system was especially developed for workers with limited literacy. With the biometric VaxTrac system, expensive, specialised training is not necessary for vaccine delivery in remote areas. “My favourite part is to see the shock on healthcare workers’ faces after their first scan of another person’s fingerprint,” Thomas adds. “The patient is identified instantly and all their vaccination information is available on the computer screen in an intuitive graphic interface. Workers know immediately what vaccines to administer and which doses are not needed and may be reserved for other citizens.” SA

About VaxTrac VaxTrac’s mission is to provide developing countries with the technologies and services they need to maximise the effectiveness of their vaccination programmes. VaxTrac envisions a world where every child, regardless of background, has equal access to life-saving vaccines.

About Lumidigm Lumidigm Inc., a global leader in authentication solutions is dedicated to enabling convenient, secure, and reliable identification of people, products and credentials. Developed with “real world” performance as a priority, Lumidigm’s multispectral imaging technology, innovative software and biometric fingerprint sensors allow customers to know “who” or “what” to a high degree of certainty. Lumidigm and its strategic partners have met challenging authentication requirements in markets such as banking, healthcare, entertainment, and government services. The Lumidigm Advantage is also suitable for industrial, commercial, and transportation applications. Lumidigm is headquartered in Albuquerque, New Mexico.

SA

SecurityAfrica December 2013

24



FEATURE

Entering the digital Fernando Pires of Morse Watchmans discusses the future of key control and security in a digital future.

A

t one time, keys were kept in boxes or drawers with little to no control over who had access to any given key. Even as security systems entered the digital, and then the networked world, key control continued to exist separately from other system components and business operations. But as key control is one of the main components of effective access control and overall risk mitigation, it is essential for it to be part of an integrated system. Fortunately, technology developments and new products have made it possible to integrate key control as part of a facility’s networked security system. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late – or too early – to implement a key control and management plan as part of an overall physical security strategy. Key control is especially important for end-user markets such as casinos and gaming, correctional facilities, healthcare institutions, hospitality businesses, multi-family buildings and educational facilities. It is also a critical function for anyone overseeing security at conference centers, government agencies, control rooms, automotive businesses and corporate buildings. These users always need

SecurityAfrica December 2013

26


FEATURE

(Personal Identification Number) code that the user enters on a keypad, with additional access options such as biometric readers available to add another level of security. Managers can monitor data from any desktop connected to the network. Advanced software can run activity reports, sort activities based on various criteria, view and print reports, etc. System managers can generate practical management reports, which trace key movements by time, date and user code, with audit trail reports to indicate the time and date of each key accessed by a user for a given time parameter.

to know who has possession of a key and when it was taken. They are markets that have in common a need for complete control over their keys, with a system that seamlessly manages and monitors keys and that interoperates with access control and other security systems. However, key control can and should also be applied to all businesses, at any size, because of the measurable benefits of enhanced security, convenience, increased staff productivity and accountability. Today, the most advanced key management solutions have open protocols to enable connectivity to access control and other systems provided by a range of integration partners. A system can be connected to edge devices via RS-0232 or networked via Ethernet. Critical information about key control can now be communicated across multiple systems, enabling additional security actions to be taken. For example, a user who has taken a specific key can be denied egress from the facility until the key is returned – and selected management can be alerted via email if a key has not been returned on time.

Physical changes in a facility may also increase the need for a key control system. For instance, a closet that may have once been used only for storing office supplies may now be used for holding more valuable items and should be locked. In some cases, convenience for the security staff can even be substantially increased. For example, changes implemented over the LAN are effective immediately which can help prevent incidents such as denying access to keys to recently terminated employees. The network connectivity of the system also allows management to remotely release any key, adding to the convenience and inherent safety provided by a key control and management solution.

A key control system with programmable software can enable system managers to establish permission levels for each user, as identified by an assignable PIN

27

SecurityAfrica December 2013

Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom


FEATURE

All these advanced capabilities can revolutionize the function of key control, transforming it from its historical role as a separate function into its rightful place as a critical component of a cuttingedge security system.

returned to any open locker for convenience, and systems can be set up as a personal storage space for one or multiple users. The systems are also engineered to alert security management in case of an incident. An open door, the use of force to gain access, a power failure or even the misuse of the keypad will trigger an alarm and record the event in the log file.

modules and lockers that can accommodate plastic card keys or other valuable items. Lockers, available in various configurations, can be used for storing credit cards, small firearms, cell phones, two-way radios, laptop computers, tablets, cash trays and so on, and can be managed as efficiently as keys in key control systems.

Both key control and asset management systems can be customized with features that help the organization maintain the highest levels of security within their specific industry. To that end, additional security features are available to help maintain the integrity of the system. For example, where protection of the key and asset cabinet itself is mission-critical, installation of a remote access device provides an additional layer of protection by enabling the locker system to be placed in a secure room. A second individual’s PIN input and verification is then required in order for an authorized employee to access the contents of a locker. Many of these features are vital contributors to the maintenance of compliance standards for state or federal regulations as well.

Locker modules can easily be incorporated into existing key control systems or configured as stand-alone asset management systems. Their operation is identical to a key management system in that only pre-authorized users can access items in the lockers. Items can be

All these advanced capabilities can revolutionize the function of key control, transforming it from its historical role as a separate function into its rightful place as a critical component of a cutting-edge security system. SA

SecurityAfrica December 2013

28


PREVIEW: INTERSEC

Intersec 2014 set for record edition: growth driven by burgeoning safety, fire protection and security industries upgrade

S

afety, fire protection and security remain high on the priority lists of governments and corporate companies worldwide given the current uncertain scenario in many parts of the world. The Middle East region, replete with its crucial reserves of oil and natural gas, and boasting some of the fastest growing economies within its ranks, is being viewed as a vitally important part of the world by the global safety, security and fire protection industries. This emphasis on greater security is felt in many ways including growing expenditure on security infrastructure, equipment and personnel by regional authorities as well as an increasing awareness in society about the importance of maintaining a safe and secure environment. Given all this, it’s not really surprising that Epoc Messe Frankfurt, organiser of Intersec, the region’s safety, security, fire protection and policing trade and networking exhibition, is expecting the 2014 edition to be the biggest yet. With over 80% of exhibition space already sold out, Intersec 2014 looks set to break all previous records in terms of both participation and attendance. Already all of the world’s ten largest security companies have confirmed attendance, including Honeywell Security, Bosch Security Systems, ASSA ABLOY, FLIR Systems,

29

SecurityAfrica December 2013

AXIS Communications, Samsung Techwin and Tyco International* along with 150 exhibitors making their regional debut. According to Ahmed Pauwels, CEO of Epoc Messe Frankfurt, the continued success of Intersec is being driven by the rapid development of the safety and security industry regionally. “Across the Middle East authorities are improving security infrastructure, enhancing policing and crime fighting capability and concentrating on maintaining a peaceful environment. Furthermore, with the renewed vigour in the construction sector and an increase in projects at finishing stage, demand within the private sector also continues to rise. This all makes the region a highpriority market for international manufacturers and suppliers.” “Intersec continues to work closely with local authorities and regional players to better reflect the needs of the region onto the international stage,” Pauwels added. Intersec 2013 featured products and services from 990 exhibitors spread out over 39,000 sqm across ten halls of the Dubai International Convention and Exhibition Centre. The event attracted 21,549 trade visitors, buyers and industry professionals from as many as 116 countries, making it the most international trade event of its kind in the world.


PREVIEW: INTERSEC

As with previous years, Intersec 2014 will comprise of four main focus areas: Commercial Security & Information Security; Safety & Health; Fire & Rescue and Homeland Security & Policing. The Commercial & Information Security section includes control & surveillance equipment, access control, monitoring & recording systems, and information security. This is the largest product section of the exhibition and features key names such as Assa Abloy, Axis, Bosch, CP Plus, Harco and Honeywell Security. The Fire & Rescue section, the fastest growing segment, covers products and services within fire prevention & protection, firefighting equipment, emergency alarm & warning systems and rescue equipment. Within the Fire & Rescue section prominent companies including Bristol/Corodex, Draeger, DuPont, Naffco, Sffeco, Siemens and Underwriter Laboratories will be participating. Safety & Health includes Personal Protection Equipment (PPE), environmental protection at work, safety at work equipment and health at work. This section regularly features key industry names including Ansell, Karam Safety and Safetix. Homeland Security & Policing focuses on armour protection, perimeter security, forensic science and laboratory equipment, physical security, detection and disposal equipment, optics, electronics, as well as specialised training and consulting for government entities. This area is of particular interest to governmental agencies and includes Dubai Police, UAE Civil Defence as well as private companies such as Al Fajer, Gatekeeper Security, Macneille, Madoors Systems, Nedaa and Streit Group. On the sidelines of Intersec 2014 will be a full complement of fringe events and features including the popular Intersec conference programme and the outdoor demo area. Intersec is part of Messe Frankfurt’s global network of security trade fairs, which also include Secutech India, Secutech in Taiwan, Secutech Thailand, Intersec Buenos Aires, Secutech Vietnam and Seguriexpo Buenos Aires. *a&s 2012 Security Industry Report

Show profile Intersec has played a major role in the last 15 years in reflecting the security industry worldwide. The exhibition and conference combines a strong international profile, with a huge regional impact. Intersec 2013 featured 21,549 trade visitors and showcased the latest technologies and apparatus in Commercial Security & Information Security, Aviation, Homeland Security & Policing, Fire & Rescue and Safety & Health. The next edition of Intersec will take place from 19 – 21 January 2014, at the Dubai International Convention and Exhibition Centre.

Company profile Messe Frankfurt is one of the world’s leading trade show organisers, with 536.9 million euros in sales and 1,833 active employees worldwide. The Messe Frankfurt Group has a global network of 28 subsidiaries and approx. 50 international Sales Partners, giving it a presence for its customers in more than 150 countries. Events “made by Messe Frankfurt” take place at more than 30 locations around the globe. In 2012, Messe Frankfurt organised 109 trade fairs, of which more than half took place outside Germany. The portfolio of events for Epoc Messe Frankfurt in Dubai includes Automechanika Dubai, Beautyworld Middle East, Hardware+Tools Middle East, Intersec, Light Middle East, Materials Handling Middle East, Paperworld Middle East and Playworld Middle East. SA

SecurityAfrica December 2013

30


ST FUL CT

S TA T N

T W E ST IN G

Dubai, UAE

O M R O IMP

January 19 – 21, 2014

M REL O E

M ST NT IMPA O A V

T

S FA O R G

www.intersecexpo.com

As a vital part of Intersec, Commercial Security & Information Security is the show’s largest section, with 550+ of more than 1000 total exhibitors! Pre-register your visit online before 15th January 2014 and have the chance to WIN a GoPro Hero3 camera. www.intersecexpo.com/ad3 Scan & discover the products

Online registration also gives you access to the new Business Matchmaking Program, where you can find the exhibitors that matter to your business to contact them and schedule meetings before the show.


TECHNOLOGY

Security intelligence at the edge

E

merald™ from CEM Systems is the evolution of the traditional access control reader. With its sophisticated design and innovative LCD touch screen, emerald offers advanced access control reader functionality, integrated Voice over IP (VoIP) Intercom and a range of remote server based applications. With all this functionality built into one powerful device, emerald is more than a reader‌ it is an Intelligent Access Terminal, available for any site that requires the highest level of security and increased business efficiency.

What makes emerald unique? As the next generation of CEM Systems Ethernet edge devices, emerald is revolutionising the security industry. Its unique features include:

> Custom LCD touch screen A bright, 4.3� LCD touch sensitive screen with hardened glass, that displays predefined messages and icons to cardholders depending on their privileges. With hardened glass and an anti-glare coating, it is durable enough to be used both indoors and outdoors and is IP 65 rated.

> IP reader & controller With advanced IP reader and controller functionality in one device, emerald communicates directly to the AC2000 host server using Ethernet connectivity, removing the need for an additional controller in the system design. The terminal has a large internal database enabling it to operate in offline mode should communications be temporarily lost with the host server.

SecurityAfrica December 2013

32


TECHNOLOGY

> Integrated VoIP intercom Utilising an in-built weather resistant microphone and speaker, emerald provides fully integrated audio intercom functionality at the door, enabling two-way communication between users and security personnel.

> Remote Applications Remote Applications are web based applications and services hosted on the AC2000 central database server and accessed directly at the door. They display critical system information and also allow maintenance engineers to diagnose and test locally.

> Access with emerald Remote Applications Remote Applications access data that resides on the CEM AC2000 database, acting as a security intelligence point available to users assigned to a specific remote applications group. It is important to note that only those with the correct access can use the Remote Applications. To heighten security the user should swipe their card and enter a unique PIN before gaining access. Remote Applications display real time security information and statistics such as card status, scheduled visitors, top system alarms and most recent alarms on the terminal. Additional applications include ‘First and Last Swipes’, that can be used for time and attendance purposes, ‘Card Details’, for individuals to determine such things as card expiry date, and ‘Change PIN’, that allows users to proactively change their own PIN without contacting the system operator. The user must first enter their old PIN before they can change to a new PIN.

policies of the Federal Government. “CEM AC2000 SE was chosen because it is a powerful and fully integrated security management system, offering powerful access control, alarm processing, photo badging, power management and integration to third party systems” said Edward Van Trotsenburg Export Manager, Pentagon . “CEM are also able to provide fully integrated biometric solutions with the S610f fingerprint reader. This means that CBN can efficiently increase security levels at required areas.” AC2000 SE provides an advanced level of integration using industry standard interfaces to link to third party systems. CBN required the AC2000 system to integrate with Bosch video interface in order to control both video and access via one solution. CEM intelligent hardware is also used throughout CBN. This includes S610e readers giving the site full off-line validation and decision making at point of entry even when host communication is not available. S3030 portable readers were also deployed for mobile security and random security checks within the building. SA

Central Bank of Nigeria secured by CEM Systems Central Bank of Nigeria (CBN) uses the CEM AC2000 SE (Standard Edition) access control and security management system to secure its premises across Nigeria. The systems have been supplied by CEM Approved Reseller Pentagon Distribution. The Central Bank of Nigeria (CBN) is charged by the Federal Republic of Nigeria with the overall control and administration of the monetary and financial sector 33

SecurityAfrica December 2013

Contact details Tel: +44 (0) 28 9045 6767 Email: cem.sales@tycoint.com Visit www.cemsys.com


FIRE news

Fire and Safety A warm welcome to our Launch Print edition of Security Africa Magazine, which will include a regular Fire & Safety section in the final third of the magazine. We welcome editorials from fire experts and leading industry figures for future additions covering such topics as: > Fire safety > Oil & Gas news > Passive and active fire protection > Detection & alarms > Firefighting methods, vehicles & equipment > Fire engineering > Personal protection equipment > Fire suppression technology > Industry experts’ case studies In this edition we will be covering fire safety equipment, courtesy of Hainsworth Ltd, reporting on the latest developments in the Nigerian oil & gas scandal and highlighting gas turbine fire protection with an editorial from Janus Fire.

SecurityAfrica December 2013

34



FIRE news

Janus Fire Systems: Gas Turbine Fire Protection

C

ombustion Turbines used for power generation typically contain five separate areas requiring fire protection: Accessory Compartment, Electrical Control and Switchgear Areas, Fuel Pump or metering Cubicle, Turbine Compartment, and Generator. Protection of the Accessory Compartment, Electrical Control and Switchgear Areas, and the Fuel Pump/ metering skids each present unique characteristics of protection. For the turbine compartment, the most common fire risk is a failure of the fuel system or leakage of the lubrication oil. The turbine casing reaches very high temperatures larger machines with heavier casings cool slowly when shut down. The autoignition temperature for fuel oil is approximately 494°F and approximately 700°F for lubricating oil, while the external temperatures of the casing or combustion chamber reach 850°F–900°F, well above auto-ignition temperatures of fuel or lubricating oils. Should the fuel or lubricating oil come in contact with hot surfaces it can ignite. Often unattended or not accessible to traditional fire fighting methods, fixed special hazard systems are the most logical method to effect total extinguishment.

Cool down time A significant consideration in gas turbine protection is the time duration for exposed hot surfaces to cool below the ignition temperature of the fuel. The actual temperatures attained and the cool down time depend upon operating conditions. Greater loads or output, result in higher gas temperatures driving the load. Therefore, maximum surface temperatures are developed when operating at maximum load with high ambient air temperatures.

Emergency shutdown for fire extinguishing requires an immediate fuel cut off after the load is removed so that the turbine slows quickly reducing airflow through the machine. Under emergency shutdown conditions, there is no time for internal cooling, thus the exposed surfaces will not cool as quickly. Testing has determined that the cooling effect provided by carbon dioxide during suppression is minimal; maintenance of CO-2 concentration reduces the chance of re-ignition.

Carbon dioxide Carbon dioxide has been an accepted method of combustion turbine fire protection of gas turbines for over 50 years. For over 30 years, members of staff at Janus Fire Systems have worked with major manufacturers of Combustion Turbines. Turbine manufacturers have chosen carbon dioxide as their first line of defense due to its reasonable cost, excellent performance and global availability.

Environmental and safety concerns Carbon dioxide has a net zero effect on global warming because the amount of carbon dioxide discharged is equal to the amount removed from the atmosphere during the manufacturing process. Low and High Pressure CO2 systems can be upgraded to NFPA 12 2011 guidelines improving the safety of operators and maintenance staff. As units are upgraded fire protection systems should not be ignored. Improvements in system designs can help insure reliability, safety as well as insuring unit availability for quick start-ups. With over 90 years of collective experience in protecting gas turbines, the staff at Janus Fire Systems can provide solutions for Combustion Turbine Fire Protection. SA

SecurityAfrica December 2013

36


Engineered Fire Protection Solutions

Improved Flow Characteristics

500 psi NOVEC 1230 Call for Information

an le C

ishing Systems • xtingu 3M™ E e ir F No t ve en g c A

12 30

F

ire

• luid nF tio ec ot Pr 2 •

ressure and H i g h Low P Pres su r e CO

A l ar

m

&

• on cti te De

ing Detection • W ampl a t e Air S rM ist

1102 Rupcich Drive, Crown Point, IN 46307 • +1 219-663-1600

www.janusfiresystems.com

•F o am


AFRICA NEWS

T

he House of Representatives has ordered an immediate investigation into a multibillion dollar scheme used by the Nigerian National Petroleum Corporation NNPC, in connivance with Swiss oil dealers, to take nearly $7 billion from Nigeria in alleged fraudulent payments. Although Nigeria is the leading crude oil producer of the continent, life expectancy and school attendance for the 173 million citizens of this West African state is nevertheless below the average for South Saharan countries. The lack of its own refining capacity forces crude oil-rich Nigeria to import gasoline, kerosene and heating oil. This paradoxical import business is heavily subsidised. The resolution followed a motion by Abiodun AbuduBalogun, who drew attention to a Berne Declaration report, a Swiss non-governmental advocacy organisation, released on 4 November, 2013, detailing how the NNPC and the Swiss oil trading companies allegedly duped the country of over $6.8 billion. The report details the various methods employed by Nigerian and foreign fuel importers, such as creating offshore subsidiaries referred to as “letterbox companies”, ship-to-ship transfer to create untraceable paperwork, payment of subsidy money to phantom and non-existing importers, and partnering with politically

Mike Rock

Nigeria: probe of oil dealers’ $6.8 billion scandal

exposed fraudsters to defraud the country from 2009 and 2011. The Berne Declaration has described the Nigerian oil scam as the greatest fraud Africa has ever known, and the report specifically listed Vitol and Trafigura Commodity Trading Firms (NNPC partners) in the shady deals, saying Nigeria loses billions of dollars as large volumes of oil are exported far below the market prices. Through NNPC partnership with Vitol (the largest oil trader in Switzerland) and Trafigura (the third largest), described as “operational and financial black boxes”, billions of naira that should have accrued to the government are wired to Bermuda where the joint venture is established. “(We are) worried by the sharp practices and deals in NNPC crude oil allocations to local refineries, which are not utilized, but sold fraudulently at knock-down prices to Geneva-based companies through letter box companies by SWAP arrangements,” Abiodun AbuduBalogun said. The profit generated by these entities escapes State coffers, first, because no taxation in Bermuda is paid, since the tax on profits is zero. Vitol and Trafigura alone took respectively 13.44 per cent and 13.49 per cent of Nigerian crude oil exports in 2011 for a cumulative

SecurityAfrica December 2013

38


AFRICA NEWS

value of 6.7 billion dollars. The Berne Declaration notes that more than half of Nigerian crude oil exports pass through Switzerland and that Nigeria is the only major producing company that sells 100 per cent of its crude oil to private traders, rather than marketing it itself and benefiting from the resulting added value.

sense and verifiable evidence on the ground in Nigeria”. “For instance, how can close observers of the Nigerian oil and gas industry say that the process leading to the award of Term Contract for lifting of Nigeria’s crude is shrouded in mystery?” Tumini Green, the Acting Group General Manager (public affairs) of NNPC said at a news conference on Sunday, according to the News Agency of Nigeria. “It is common knowledge that the call for tender for this contract is periodically published by almost all the newspapers in Nigeria via paid advert placements by the NNPC,” he added.

The Nigerian House of Representatives said that it was “alarmed” by the report and would expect an investigation to be concluded within four weeks. The House committees on petroleum (upstream), petroleum (downstream) and justice are to carry out the probe and report to the House within the stated four-week period. The House of Representatives has carried out repeated investigations into the activities of the NNPC in the past, with most of the outcomes either left unimplemented by the president, or enmeshed in allegation of inducement of some lawmakers. The most outstanding of the House inquiries was the investigation into how the NNPC and other organs of the ministry of petroleum allowed a multibillion fuel subsidy scam to fester for years, draining Nigeria of more than 2 trillion naira. In the House report in 2012, the Minister of Petroleum, Diezani Alison-Madueke, was indicted alongside top officials of the NNPC. The House recommended their removal and prosecution. The officials have remained untouched at their posts, even after a follow-up investigation ordered by President Goodluck Jonathan failed to exonerate them of complicity in the extensive fraud. The NNPC issued a denial on Sunday of the new report’s findings, calling it “bogus, and containing inaccurate and poorly researched data, which defied common 39

SecurityAfrica December 2013

The Berne Declaration Report has recommended three steps towards eliminating similar practice: Publication of payments by commodity traders to governments in order to make it harder for government officials to embezzle funds derived from commodities. Swiss traders must be required by law to carry out greater due diligence on their business partners and on the precise origins of the commodities in which they trade.

A public register of beneficial owners in order that the identities of those behind the Nigerian post box companies in Geneva are visible to help clarify any suspicions of corruption. The British government announced at the end of October this year that it plans to create a public register of ultimate beneficial owners, the first country ever to take such a step. At the same time, the government also made known its intention to implement the EU transparency regulations in the commodity sector next year. SA


INST I N C T TO

PROTECT Saving lives is what we do best. Protecting property is our passion. With an instinct to protect, you can depend on Apollo to deliver the right re detection solutions, whatever the application. Working with our trusted global partners, we provide cutting-edge technology to meet the demands of even the most challenging environments.

A mother polar bear will either look for a den or construct one for her cubs, providing insulation and protecting them from predators in the rst critical months of their lives.

FIRE DETECTION SOLUTIONS TO PROTECT LIVES AND PROPERTY. +44 (0)23 9249 2412 marketing@apollo-re.com To view all of our product ranges visit: www.apollo-re.co.uk/instinct


FIRE news

Innovation helps Hainsworth stay ahead

I

t is 13 years since Hainsworth launched Hainsworth® TITAN which helped to take firefighters’ personal protective equipment (PPE) to a new level. TITAN, which formed part of the company’s patented TI-technologyTM, saw the emergence of garments with increased breathability for greater heat stress management, allowing firefighters to become more aware of the environment in which they were operating. While the launch of TITAN in 2000 was an important milestone in the development of PPE, for Hainsworth it was simply the latest innovation in an association with firefighters stretching back more than 100 years. By the turn of the 21st century, Hainsworth was already established as a global leader in textile development, manufacture and application helping to protect fire service personnel around the world from the potentially devastating effects of heat and flame. Since 2000, the challenges facing firefighters have intensified and global news stories such as the 9/11 Twin Towers attacks in the United States, the July 2005 bombings in London and other similar incidents have raised awareness of the demands placed on our emergency services. Throughout this period, Hainsworth has continued to listen to those on the frontline and innovate to ensure that the PPE they wear prepares them for all potential scenarios. These innovations have included the introduction of Hainsworth® REPEL in 2002, the latest in finishing technology offering durable protection against hazardous chemicals without the need to re-impregnate after every wash. It is designed to provide the first line of defence against chemicals which may be encountered by firefighters or riot police.

41

SecurityAfrica December 2013


FIRE news

Two years later, in 2004, Hainsworth® ATLAS was launched into the market, offering the ultimate in heat and flame protection. Designed to be breathable, comfortable and minimise the effects of heat stress, it is robust enough to withstand the rigours of modern firefighting. Further innovation came in 2007 with the introduction of Hainsworth® METIS – a 175gsm lightweight solution to be used in conjunction with quilted thermal barriers. Last year saw the company launch ECO-DRY. ECO-DRY offers a range of base layer solutions incorporating the benefits of wool to provide firefighters with optimum protection and the highest levels of comfort. Wool is a highly complex fibre offering a myriad of benefits, all from a renewable and sustainable source. It is naturally hygroscopic, meaning it can hold 33% of its weight in moisture before feeling damp and naturally regulates the absorption/evaporation of this moisture keeping a steady microclimate next to the skin. The result is that the wearer feels cool, dry and comfortable. Hainsworth innovation has sat alongside the many changes and updates to PPE standards affecting fire services in different parts of the world during the past 25 years.

the PPE market in the EU was opened and harmonised and gave rise to the creation of European Standards. This led to the introduction of European Standard EN 469 “Protective Clothing for Firefighters”, which enshrined in law the need for garments to undergo a number of tests to ensure they provided adequate protection against both radiant and convective heat. In addition, they must also meet the requirements for resistance against water penetration and tearing. Standards have continued to be updated in Europe, Australia, North America, Africa and elsewhere and any innovation needs to reflect such changes. Every product developed by Hainsworth is subject to the most stringent levels of testing in our own accredited laboratory and the design of fabrics is influenced hugely by the environment in which a firefighter operates and how the garments will be worn.

Hainsworth’s core messages: design that saves; protection that shows; and quality that lasts. During recent months, Hainsworth has spent time looking closely at how the company, its technologies and products and the PPE industry itself have evolved over the past 40 years.

This tragedy brought about a wholesale review of the PPE worn by firefighters in the UK who, until this time, were still arriving at emergencies wearing heavy woollen tunics.

As a result, Hainsworth® TECHNOLOGY has been created, under which sit three principal strands – TITAN, ECO-DRY and ADVANTAGE. In simple terms, TITAN is concerned with outershell systems, ECO-DRY is about the linings that sit next to the skin driving comfort and sweat management, while ADVANTAGE covers our many finishing technologies and product enhancements. Customers and partners will hear more about Hainsworth® TECHNOLOGY over the coming months. Continuing to underpin everything are Hainsworth’s core messages, namely that its protective fabrics deliver design that saves; protection that shows; and quality that lasts. SA

With the publication of the EU Directive on PPE in 1989,

For more information please visit: www.protectsyou.co.uk

Many of these were triggered by the King’s Cross station tragedy in London in 1987 which claimed the lives of 31 people.

SecurityAfrica December 2013

42


EVENTS

Key Security & Fire Events 2014 Intersec 2014 Dubai 19-21 January 2014

Firex 2014 London 17-19 June 2014

Renowned as the region’s largest and most comprehensive trade and networking exhibition for the Security and Safety industries, Intersec 2014 offers you a unique spectrum of products from the fields of Commercial Security, Information Security, Fire & Rescue, Safety & Health, Homeland Security and Policing.

FIREX International is the leading event for every professional involved in fire protection, prevention and detection, offering a comprehensive selection of the latest thought-leadership alongside the best networking in the industry. With 14,000+ visitors, comparing and contrasting a range of innovative fire safety solutions from 140+ major manufacturers, alongside hearing the most on-topic discussions in the 120+ hours of free educational seminars, FIREX International is the place to attend to discover and determine the future of the industry.

Intersec 2014 is under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. For the 2014 edition more than 1,000 exhibitors from more than 54 countries are expected. Intersec is far more than a successful meeting platform. This is where new projects and partnerships are initiated, where visionary objectives are conceived and implemented.

www.firex.co.uk

The high number of international trade visitors explains why Intersec is of unique value to all the target groups in the Security & Safety industry. Interest in new technical solutions is growing to a greater extent than previously experienced, releasing tremendous sales and turnover potential. Exploit the opportunities available to you to make contact with all the players in the global marketplace. www.intersecexpo.com

43

SecurityAfrica December 2013


EVENTS

Securex West Africa Nigeria 18–19 March 2014

IFSEC South Africa 2014 Johannesburg 13-15 May 2014

Montgomery West Africa is pleased to announce Securex West Africa 2014! It is the only show in the region that brings together the entire security supply chain by incorporating Cyber Security, Commercial & Homeland Security, Fire & Safety Security all under one roof. Securex West Africa 2014 provides a unique platform for all in the security supply chain to engage, educate and showcase the latest trends and solutions. The shifting security landscape and newly emerging threats requires West African countries to formulate national security strategies and frameworks that share common approaches and address security concerns. Packed to the brim with products, services, networking opportunities and educational content – you simply cannot afford to miss Securex West Africa 2014. The 2013 show attracted over 1700 visitors from the government, trade and end-user market, all eager to seek innovative products and meet new suppliers.

With over 40 years’ experience in this market, expertise is tantamount in the IFSEC offering, not just in the UK, but globally. With global events taking place year round as well as a dedicated online community portal and leading awards programme, we can help you access the audience you’re looking to target. With the latest in security innovation, alongside the dedicated OSH Focus, for safety & health solutions and the FIREX Pavilion, for all fire prevention requirements, IFSEC South Africa will offer the full package of end-to-end protection and management solutions over 3 days. As a country diagnosed as a ‘High Growth Market’ by UK Trade & Investment (UKTI), South Africa offers a wealth of opportunity for suppliers to the security industry looking to reach the purchasers in this region’s highly lucrative markets. With one of the highest output growth rates globally, the investment in the country’s infrastructure, alongside its rapid growth, make this the perfect time to enter this market.

www.securexwestafrica.com

http://www.ifsecsa.com

SecurityAfrica December 2013

44




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.