Counter Terror Business Issue 11

Page 1

www.counterterrorbusiness.com | ISSUE 11

BUSINESS CONTINUITY | PERIMETER SECURITY | DEFENCE FOCUS | & MORE

R CYBE ITY R ments SEtCgU overn do

Wha dustry can ct and in er to prote togeth inst cyber aga eats thr

TRANSPORT SECURITY

PROTECTING TERMINALS

Mitigating the risks that technology brings to transport terminal buildings



05 COUNTER TERROR NEWS

33 BUSINESS CONTINUITY

Bio Terrorism needs greater global effort; National Crime Agency ‘could prove expensive’.

UK plc cannot afford complacency which ignores the threat that terrorist activity could take place in any UK provincial city or town, writes Colin Ive MBCI

09 CYBER SECURITY The Flame virus was developed as early as 2006 and is linked to at least three other malware programs, new analysis finds, plus Chris Hardy of McAfee discusses what governments and industry can do together for cyber-security

17 POLICE & LAW ENFORCEMENT ITIL - What can the UK government’s best-practice framework for IT service management offer public services striving for increased efficiency and response times?

23 PERIMETER SECURITY David Frampton, chairman of the Physical Security Equipment Section of the British Security Industry Association (BSIA) looks at the front line of site security.

27 COUNTER TERROR EXPO A look at what’s in store for the 2013 counter terrorism showcase event

29 PROTECTING INFRASTRUCTURE Peter Bennett from the National Counter Terrorism Security Office (NaCTSO) elaborates on ‘Know Your Customer’ - a voluntary scheme designed to raise awareness about the potential for misuse of chemicals and products used or supplied in the course of legitimate business.

37 TRANSPORT SECURITY Whilst the integration of IT and building management systems in transport terminal buildings can offer significant business benefits, it also creates a number of potential risks, explains Chris Phillips, managing director of the International Protect and Prepare Security Office and Hugh Boyes, project manager at The Institution of Engineering and Technology

43 TRANSPORT SECURITY EXPO Delegate numbers for this year’s Transport Security Expo, taking place at Olympia on 14-15 November, have hit a record high, reflecting renewed concern over transport security issues

47 TRANSPORT SECURITY - CARGO In the European Union alone, the cost to businesses is estimated at 8.2 billion Euro a year and growing. Jason Breakwell, director of the Transport Asset Protection Association (TAPA) explains how the association goes about helping to protect its members assets through the Incident Information Service.

53 EMERGENCY SERVICES SHOW The Emergency Services Show, which takes place on Wednesday 21st and Thursday 22nd November at Stoneleigh Park,

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Coventry, is the ideal place for emergency planners, business continuity and resilience professionals to discuss strategy and see the latest product innovations

63 AVIATION European Commission back pedals in Liquid, Aerosol & Gel screening in the face of stiff opposition, writes Chris Yates

65 BORDERPOL Taking place on 16th & 17th October at the Central Hall, Westminster, the first BORDERPOL Annual Conference will discuss and propose new ways to implement 21st century technologies that can improve border security

69 BORDER CONTROL NEWS University of Arizona’s Elvis virtual agent provides border protection

79 DEFENCE NEWS Hi-tech Ambush submarine sails into port; EDA awards three year satellite deal

81 DEFENCE FOCUS If it overcomes considerable political hurdles, the EADS & BAE Systems merger will create the largest aerospace and defence company in the world.

87 FARNBOROUGH AIR SHOW With global terrorism at its most prevalent and with increasing media focus on passenger safety from airport to aeroplane, organisers of the Farnborough International Airshow (FIA) launched the new Aviation Security Zone at FIA 2012.

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Lawford PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Lucy Carter, Charlotte Casey GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media

© 2012 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

03


55X

ALL NEW FULL HD PAIR MEGAPIXEL ZOOM LENS The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been combined with a HD Full HD resolution 55X zoom lens for even greater quality SD and definition to offer the best possible security.

 PAIR-Technology  Up to 140X ZOOM with build-in 2.5X Extender  Full HD Resolution 1080p  2 Megapixels  High Speed Motors  1/2", C-Mount  Iris Override  Presets  Compact and Robust  Optimised for use in Port Facilities, Border Control, Coastal Oil Fields, Highway Monitoring etc.

PENTAX RICOH IMAGING DEUTSCHLAND GmbH Security Systems Division

PENTAX RICOH IMAGING UK LTD. Security Systems Division

PENTAX RICOH IMAGING FRANCE S.A.S. Security Systems Division

Julius-Vosseler-Str. 104 22527 Hamburg Germany Sales: +49 (0)40 56192109 Email: ssd@pentax.de

Heron Drive, Langley Slough SL3 8PN United Kingdom Sales: +44 (0) 7973 154430 Email: ssd@pentax.co.uk

112 Quai de Bezons, B.P. 204 95106 Argenteuil Cedex France Sales: +33 (0) 680 614348 Email: ssd@pentax.fr

www.pentax-security.com


BIO-TERRORISM

NEWS IN BRIEF

UN says greater efforts needed to prevent biological terrorism

Piers Millet from the UN’s Biological Weapons Convention delivered the warning at the BioDesign Forum on synthetic biology held in Cambridge on September 26. Millet said there was no global organisation to ensure biotech was not used for “nefarious” purposes, but international bodies did exist to watch out for nuclear and chemical weapons. “If you look at the history of the last century we see a very clear trend - every time we make a major step forward in our understanding of biology, we find a weapons application for it,” he said. Millet listed several major cases of biological attacks in the past few decades, such as the doomsday Aum Shinrikyo cult spraying anthrax spores from the roof of an eightstorey building in Tokyo, Japan, in 1993. The city was subjected to another attack from the same religious group two years later, when sarin gas was released on the Tokyo subway system, causing 12 deaths. Biological weapons were used as early as the 18th Century, when Britain infected tribes of Native Americans with smallpox. More recently, said Millet, there had been instances of biological weapons in World War II and during the Gulf War in 1991 in Iraq. “The traditional approach of the international community to dealing with weapons is this - they recognise a threat, develop a treaty, and then they turn that treaty into some operational form, normally by trying to control technology associated with it,” he said. “It has very strong models in nuclear and chemical spheres - but not in regards to synthetic biology.” Millet explained that in the case of nuclear warfare, the International Atomic Energy Agency verified whether a nation possessed plutonium, and whether its uranium was enriched to the point that it could be used for military purposes. Regarding potential chemical weapons production, there is the Organisation for the Prohibition of Chemical Weapons. Its officials visited the facilities around the world where such weapons could be made and “can easily make sure that the stuff going into a particular process roughly matches the stuff coming out in the end”, said Millet.

Nigerian large scale attacks ‘matter of time’ says offical

However, there was no international organisation to do this in the biological arena, he added. “There is quite a big push to enforce this at the international level, to set up some technology-based control regime in the biological arena. I personally believe this is doable.” Piers Millett is deputy head of the Implementation Support Unit for the Biological Weapons Convention (BWC) housed in the UN Office for Disarmament affairs in Geneva, Switzerland. His duties there include acting as deputy secretary to meetings of the BWC, liaising with international, regional and expert bodies as well as developments in science and technology relevant to the treaty regime. He has served as a member of the Secretariat for all meetings of the BWC since 2001. Prof Tom Knight, a research scientist at the Massachussets Institute of Technology who is referred to by many in the scientific community as “the father of synthetic biology,” said that there was “a race going on between people who try to do bad things, and the ability to use the technology to counter those threats. “With the advancement of synthetic biology, it becomes possible to do dangerous things - but it also becomes possible to respond to those more rapidly, more effectively, with advanced technology.” Another speaker at the event, Prof Derek Smith from the department of zoology at the University of Cambridge, said that it was important to consider the benefits of biotechnology as well as its threats. He and his colleagues work on trying to predict the evolution of seasonal influenza to make better flu vaccines - and recently, he has been involved in a project with scientists in Japan aiming to create influenza viruses in a lab. “There is a balance to be made between the security concerns of humans being able to make these viruses with public health benefits and the security reduction of knowing what those viruses would look like, because this would allow us to know how to better mitigate to reduce the probability of those viruses actually evolving in nature.” FOR MORE INFORMATION VISIT tinyurl.com/ct7q4vo

The Nigerian government has lost control of security and lacks a coherent strategy to counter the threat of terrorism, according to its own advisers. Senior political and military figures told the Guardian newspaper of their growing pessimism over the state’s ability to contain Boko Haram, the Islamist sect behind a deadly wave of bombings and kidnappings in northern Nigeria, and are bracing themselves for an escalation in attacks. “We have a serious problem in Nigeria and there is no sense that the government has a real grip,” a senior official close to the government said on condition of anonymity. “It is just a matter of time before we see more large-scale attacks.”

Counter Terror News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Home Office updates CTLP guidance Counter-terrorism local profiles (CTLPs) identify the threat and vulnerability from terrorism and extremism relating to terrorism in local areas. A CTLP helps the police and understand and prioritise threat and vulnerability with suggested recommendations to address any risk. The 2012 CTLP guidance is written for local partners and counterterrorism leads setting out the key principles to encourage a consistent approach to CTLPs nationally. tinyurl.com/cxzal7y

Anti-terror officer charged with misconduct A senior anti-terrorist police officer has became the first person to be charged in connection with misconduct by public officials in their dealings with newspapers. DCI April Casburn, 53, former head of the national terrorist financial investigation unit, was charged with misconduct in a public office after a file of evidence was passed to the Crown Prosecution Service by officers from Operation Elveden, the investigation into allegations of corrupt payments by newspapers and misconduct by public officials including police officers, prison officers and members of the armed forces.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

05



COUNTER-TERRORISM

NEWS IN BRIEF

‘Stop and detain’ counter-terrorism powers could be scaled back Moves to scale back the most widely drawn counterterrorism powers left in the police stop and search armoury have been initiated by the home secretary Theresa May. An official consultation was launched on September 27 on the future of random “stop and detain” powers, which have been used by police special branch officers to question 70,000 travellers a year going through Britain’s airports and ports. The move follows criticism from the government’s own official terror laws watchdog and within Muslim communities that people from an Asian background are 42 times more likely than white people to be targeted for these random counter-terrorism interrogations. The national security powers allow the police and immigration officers to detain any airline, ferry or train traveller for up to nine hours to determine if they are involved in terrorism. Those who are stopped have no access to publicly funded legal advice and failure to answer questions is a criminal offence. They can also be strip-searched and have intimate DNA samples taken from their body. David Anderson, the official reviewer of terrorism legislation, has highlighted the negative impact of these powers on some Muslim communities, with many of those stopped feeling they were targeted as Muslims in order to build up a profile of Muslim communities. He has described their effect as “bubbling under the surface … eroding trust”. The Home Office consultation document

shows that the numbers stopped under the powers have dipped in the last few years from 87,218 in 200910 to 69,109 in 2011-2012. The latest figures also show that 60 per cent of those stopped are from a minority ethnic background, with 29 per cent Asian or British Asian. This proportion rises to 45 per cent of those who were detained. A further 47 per cent of those detained were from a black, Chinese or other non-white background. The consultation says the options being considered include reducing the legal nine-hour detention limit, introducing a ‘reasonable suspicion’ test, increasing the rights to legal advice, limiting the use of strip-searches and repealing the power to take intimate DNA samples. The Home Office says use of these powers led to about 20 prosecutions a year for terrorist-related offences between 2005 and 2009 and that a number of key individuals had been convicted as a result of a port stop. The Home Secretary said the use of these schedule 7 counter-terrorism powers formed an essential part of Britain’s border security arrangements helping to protect the public from those travelling across borders to plan, finance, train for and commit terrorism. “This consultation seeks the views of the public to help ensure we get this right,” said May. FOR MORE INFORMATION VISIT tinyurl.com/cwpzdyw

COUNTER TERRORISM

National Crime Agency ‘could prove to be expensive’ says Hogan-Howe The cost of moving the Met’s national responsibility for counter-terrorism into the hands of the National Crime Agency (NCA) may be difficult to justify, the force’s Commissioner has said. Cmr Bernard Hogan-Howe told the Home Affairs Select Committee that the potential transfer of the ‘crucial’ portfolio to the soon to be formed NCA could be expensive. The Home Office is currently conducting a review into whether the proposal would work. The committee heard that the Met had been given assurances from the Home Secretary that it would be allowed to make its voice heard over the matter. Cmr Hogan-Howe said: “If there is to be a change, there will be a cost. At a time of austerity I am not sure where that money will come from. “The NCA as of yet is not up and running – it will be in the next two years. I am sure everyone will need to think how that (the NCA)

Humberside collaboration

will work with its original responsibilities – as well as considering the new possibility.” The NCA is set to be fully operational from October 2013 and will swallow up SOCA, the Child Exploitation and Online Protection Centre (CEOP) and some functions from the NPIA. However Cmr Hogan-Howe said there were clear benefits of having a police force delivering counter terrorism and people needed to ask themselves whether there was a problem with the current system. Hinting at intelligence sharing and flexibility, he said: “It is pretty hard in the capital of the UK to divide counter terrorism and security from policing. “One of the strengths in this country is the golden thread from community policing that links through to counter terrorism.” FOR MORE INFORMATION VISIT tinyurl.com/ct7q4vo

Senior Humberside Police officers, the UK Border Agency and the Counter Terrorism Unit and port businesses have united to curb smuggling and terror networks, launching Operation Yali at Immingham docks. Drivers will be asked to inform police of any suspicions they have of illegal consignments. The partnership includes Crimestoppers, P&O Ferries, Associated British Ports, UK Border Force and the Counter Terrorism Unit.

Counter Terror News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CleanIT discussion document leaked online A leaked document from the CleanIT project, which was set up to create voluntary guidelines to stamp out terrorism online, reveals suggestions for wide-ranging surveillance. The recommendations’ advise that ISPs should be held liable for not making reasonable efforts to use technological surveillance to identify terrorist use of the internet. They also urge companies to filter employees’ internet connections and suggest that it must be legal for police to patrol on social media. Other issues that are up for discussion include making it illegal to knowingly provide hyperlinks to terrorist content on websites; allowing only real common names when registering with an internet company, and; media companies only allowing real pictures of users. CleanIT’s website includes a public version of the recommendations of the group, which are quite different from the document posted by EDRi. However, But Klaasen, CleanIT project leader said that the private document was just food for discussion, despite the fact that it is entitled ‘Detailed Recommendations Document’. “The term ‘recommendations’ on the food for discussion document is misleading, we shouldn’t have used that term. These are just ideas that we are collecting. The public document contains the points that we have reached a consensus on. When the project ends at the beginning of 2013, all plans and documents will be published,” said Klaasen. CleanIT’s next meeting is in October, and the next conference will be held in Vienna on November 5/6. TO READ MORE VISIT

www.cleanitproject.eu

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

07


Collaborative learning . . . plus full control There’s no doubt that, when used as part of a structured classroom environment, computers can significantly enhance the students’ learning experience. However, they can also prove to be a huge distraction: social networking, instant messaging, web browsing etc.

So how can you grab your students’ attention, keep them focussed – and maintain full control? Faronics’ Insight is the ultimate classroom technology management solution that allows you to educate, assist, monitor and communicate with the whole IT suite from one central computer, ipad or iphone. “It only takes me seconds to see what everyone is doing”

It’s not just one way communication either, you can share your screen with anyone or share any student’s screen with the rest of the class. You can create tests ‘on the fly’ and monitor results on the teacher console. And the chat function for questions means that everyone is encouraged to participate. Eliminate distractions with just one click by limiting access to specified programmes – or by blanking and locking all your students’ screens. Insight gives you all the tools you need to keep your students more focussed, engaged and productive. Take control with Insight from Faronics. Available for

Faronics (Europe) Venture House 2 Arlington Square Downshire Way Bracknell, RG12 1WA

eurosales@faronics.com t: +44 (0) 1344 741057

www.faronics.com


FLAME VIRUS

CYBER ESPIONAGE: FLAME VIRUS MAY DATE BACK TO 2006

The Flame virus believed to be part of a cyber warfare effort against Iran was developed as early as 2006 and is linked to at least three other malware programs, new analysis finds

Main research findings The development of Flame’s Command and Control platform started as early as December 2006.

Cyber Security: Flame Virus

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The C&C servers were disguised to look like a common Content Management System, to hide the true nature of the project from hosting providers or random investigations. The servers were able to receive data from infected machines using four different protocols; only one of them servicing computers attacked with Flame. The existence of three additional protocols not used by Flame provides proof that at least three other Flame-related malicious programs were created; their nature is currently unknown. One of these Flame-related unknown malicious objects is currently operating in the wild. There were signs that the C&C platform was still under development; one communication scheme named “Red Protocol” is mentioned but not yet implemented.

The Kaspersky Lab has announced the results of new research related to the discovery of the sophisticated nation-state sponsored Flame cyber-espionage campaign. During the research, conducted by Kaspersky Lab in partnership with International Telecommunication Union’s cybersecurity executing arm - IMPACT, CERT-Bund/BSI and Symantec, a number of Command and Control (C&C) servers used by Flame’s creators were analysed in detail. The analysis revealed new, groundbreaking facts about Flame. Particularly, traces of three yet undiscovered malicious programs were found, and it was discovered that the development of the Flame platform dates back to 2006. The Flame cyber-espionage campaign was originally discovered in May 2012 by Kaspersky Lab during an investigation initiated by the International Communication Union. Following this discovery, ITU-IMPACT acted swiftly to issue an alert to its 144 member nations accompanied with the appropriate remediation and cleaning procedures. The complexity of the code and confirmed links to developers of Stuxnet all point to the fact that Flame is yet another example of a sophisticated nation-state sponsored cyber operation. Originally it was estimated that Flame started operations in 2010, but the first analysis of its Command and Control infrastructure (covered by at least 80 known domains names) shifted this date two years earlier.

The findings in this particular investigation are based on the analysis of the content retrieved from several C&C servers used by Flame. This information was recovered despite the fact that Flame’s control infrastructure went offline immediately after Kaspersky Lab disclosed the existence of malware. All servers were running the 64-bit version of the Debian operating system, virtualized using OpenVZ containers. Most of the servers’ code was written in the PHP programming language. Flame’s creators used certain measures to make the C&C server look like an ordinary Content Management System, in order to avoid attention from the hosting provider. STILL IN DEVELOPMENT? Sophisticated encryption methods were utilised so that no one, but the attackers, could obtain the data uploaded from infected machines. The analysis of the scripts used to handle data transmissions to the victims revealed four communication protocols, and only one of them was compatible with Flame. It means that at least three other types of malware used these Command and Control servers. There is enough evidence to prove that at least one Flame-related malware is operating in the wild. These unknown malicious programs are yet to be discovered. Another important result of the analysis is that the development of the Flame C&C platform started as early as December 2006.

There is no sign that the Flame C&Cs were used to control other known malware such as Stuxnet or Gauss There are signs that the platform is still in the process of development, since a new, yet not implemented protocol called the “Red Protocol” was found on the servers. The latest modification of the servers’ code was made on May 18, 2012 by one of the programmers. COVERING TRACKS “It was problematic for us to estimate the amount of data stolen by Flame, even after the analysis of its Command and Control servers. Flame’s creators are good at covering their tracks. But one mistake of the attackers helped us to discover more data that one server was intended to keep. Based on this we can see that more than five gigabytes of data was uploaded to this particular server a week, from more than 5,000 infected machines. This is certainly an example of cyber espionage conducted on a massive scale,” commented Alexander Gostev, chief security expert, Kaspersky Lab. L MORE ABOUT FLAME Detailed analysis of the contents of Flame’s command and control servers is published at Securelist.com. To learn more about Flame visit tinyurl.com/ctb349y

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

09



CYBER SECURITY

POLICING CYBER-SPACE: WHERE TO GO FROM HERE? The internet is a truly global resource which is part of what makes it so accessible and useful. The web joins us all together as one global community, making the world smaller and allowing nations to connect in new and constructive ways. However these unique characteristics also present challenges, most obviously around security. Traditional, national notions of legal governance are ill-equipped to deal with the challenges posed by the internet’s amorphous and international nature. In short, tackling cyber-security is a global challenge which requires close collaboration between organisations and governments. This might sound like a fairly simple measure, but the reality is far from straightforward. For a start, there are discrepancies between the levels of cyber-security that countries are perceived to have in place. According to a recent report commissioned by McAfee, from Brussels-based think tank Security & Defence Agenda, the UK is seen as lagging behind countries including Israel, Sweden and Finland in its preparation despite dedicating a $650m pot to cyber-security from its fouryear budget. These differences can make it hard for government officials to trust one another as there are concerns around exposing public infrastructure and informational assets to potential threats. However, with just under half of respondents recognising cyber-security to be as important as border security, it is crucial to build up international relationships between governments. INITIAL STEPS While politicians work on addressing their differences and building common goals, there are some initial steps that can be taken to start developing a joint response to cyber-crime. If these can be met, the international community should be able to achieve the delicate balance of working as one, while maintaining their own public services on which citizens depend every day. The use of cross-border services has significantly increased as a result of new technologies like cloud computing, and consequently the online world has become increasingly integrated. From a public services perspective, and specifically considering the UK’s ‘digital by default’ strategy, that means it is now more important than ever for the government to have faith in these E

Written by Chris Hardy, McAfee

As a constantly evolving force without well-defined legal boundaries and controls, cyberspace could be considered as the final frontier with regard to internet security. Chris Hardy, regional director, UK public sector, McAfee, discusses what governments and industry can do next following a recent report on the state of international cyber-security

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The cyber-criminal community is supremely agile, has substantial funding streams and no barriers to information sharing. The contrast with national governments could barely be more stark, and yet these are the terms of combat Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

11


Does your endpoint security have a wait problem? Traditional endpoint security solutions—with fat clients and huge update downloads—leave your users waiting to use their machines and the network. Why wait to move to nextgeneration endpoint security technology.

Webroot® SecureAnywhere™

Fast

eliminates waiting for long scans

Less than 6 seconds to install Extremely fast scans —average of 4X faster

and signature updates. Trial Webroot today, and see how it puts more time and computing power back in your users’ hands—and hours back in your day.

Painless No conflicts with other security products Eliminates the need for a dedicated server

Secure 100% Effective against zero day threats 99.8% Effective against malware

To download a free 30 day-trial today, visit www.webroot.com/CTbusinesstrial To speak to our Sales team, call + 44 (0) 8701417070 © 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, and the globe design are trademarks of Webroot Inc. in the United States and/or other courntries.


CYBER SECURITY E systems. Wherever they are located, systems must be safe as well as functional as it is likely that the information they hold is sensitive and confidential. Moreover, it’s not just civil servants who need to have faith in information security. The success of upcoming government initiatives such as Universal Credit rely heavily on public trust in online services, and the belief that any data entered online is properly protected. The information flow within governments, between governments and between governments and private sector partners mean that there are a number of touch points where data is at risk. With no single international body holding a cyber-security mandate; national and regional organisations need to improve their cooperation and information sharing. This is difficult due to the lack of trust between one government and another but is key to guaranteeing internet security. INCENTIVISE SECURITY With no chain stronger than its weakest link and information often following freely across borders, countries with an absence of cyberfocused legislation can provide a haven for criminals. At a macro level, the best way to help with this is to improve the economic situation as internet crime is closely linked to unemployment rates. At a micro level however, financial incentives can go a long way to improving practices within individual government offices. In the UK specifically, the pressure on project leaders to meet deadlines on time and in budget is a real focus and providing budget for doing things right, can be the way to ensuring no corners are cut. Another incentive is the threat of penalties when an organisation falls short of expected standards. Debate is ongoing as to whether sanctions are appropriate for parties on the receiving end of successful cyber attacks. And who should bear the brunt of such penalties? A vulnerability in a particular piece of code would seem to be the software producer’s responsibility, were it not for the fact that producers absolve themselves of liability with contractual small print. The chain of responsibility is complex, and as a result it is unrealistic to pinpoint just one party as having ultimate liability. GIVE POWER TO GLOBAL LAW ENFORCEMENT With network and content now separated by international borders, the laws governing copyright and territorial security are no longer straightforward. Google, for instance, hosts one third of its cloud services in Canada. With this in mind, international collaboration on law enforcement is crucial with cyber-space now seen by many as the fifth dimension of warfare. Rulings need to be accepted across all countries in order to find a compromise between security and freedom, and the UK in particular has dedicated significant resource to this within its four-year budget.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Regulation alone is not a complete solution. Laws take a long time to draft, agree and implement, and fixed legislation can quickly become ineffective against cyber-threats which are in a constant state of flux. The Cyber Defence Report acknowledges that cyber-crime is growing, and sets out three reasons for this trend: it’s profitable, low-risk and anonymous. There are no national boundaries in cyber-space, which presents difficulties around enforcing traditional legal powers. The cyber-criminal community on the other hand is supremely agile, has substantial funding streams and no barriers to information sharing. The contrast with national governments could barely be more stark, and yet these are the terms of combat. There are a number of treaties and agreements already in place to guard against cyber-crime, the most promising of which is the Interpol framework, used to deal with cybercrime in countries which do not have a current legal ruling. DEVELOP INTERNATIONAL STANDARDS Establishing best practices is a first step in ensuring that cyber-security is practical, low-cost and can be quickly implemented. It involves a holistic approach that accounts for legal, regulatory and technical considerations as well as providing an ethical code of conduct. An Integrated Supply Network to complement this should also ensure that similar procurement practices are followed around the world. Some standards are already in development however none have global support at this point. Those from ENISA, for example, only account for the 27 European member states. But regulation alone is not a complete solution. Laws take a long time to draft, agree and implement, and fixed legislation can quickly become ineffective against cyberthreats which are in a constant state of flux. Most commentators agree that involving the private sector at an early stage in discussions around new legislation will help to counteract this problem. Guidance from businesses can help to prevent legislation being drafted with a short shelf-life, by informing legislators who may otherwise be too distant from industry to fully understand its challenges and concerns around cyber-security. Secrecy concerns hamper the growth of trust between countries and can limit the success of conferences like the London Conference on Cyber-space. Fostering trust is the only way to develop agreements and standards internationally, otherwise the “good guys” are playing chess without half the pieces. One of the main reasons why cyber-criminals can prosper is their ability to share information quickly and without any

regulation. This makes choreographing wellorchestrated attacks much more achievable. One way to address distrust between governments is through the use of independent bodies like the Malaysia-based NGO, Impact. These types of organisations can give governments the confidence to share sensitive information, therefore alleviating concerns that any insight could be used to attack public services. Certain industries have recognised that they are at heightened risk from cyber-attacks, and this realisation has acted as a catalyst for cooperation. The Night Dragon attacks launched in late 2009 targeted proprietary operations and project-financing information on oil and gas field bids and operations. This information is highly sensitive, with multibillion dollar deals at stake in what is an extremely competitive industry. The oil and gas industries reacted by creating a global communication chain which became an industry group mirroring that set up by the US financial services industry – the Financial Services Information Sharing and Analysis Centre (FS-ISAC). These are both positive examples of competitors in an industry realising the need to share information in order to combat a bigger threat. The internet was initially built on the basis of trust, but now with billions of pounds at stake and new global threats to infrastructure, that notion seems entirely outdated. Conversely the response to global cyber-crime now depends on such trust between national governments, and also private sector firms – which inevitably means working side-by-side with competitors. EDUCATION Cyber-security also depends on the behaviour of government workers and public alike as hackers exploit social vulnerabilities. As a result, education is crucial as technology users need to understand how to behave responsibly. If nothing else, recent advancements in technology have permanently changed younger people’s conception of privacy; something that many policy makers are yet to fully comprehend. Education should begin in schools, within school curricula, and be continued by companies teaching their employees. We are after all, in a new digital era and with government services increasingly moving online, it is more critical than ever that the right processes are put in place to ensure public sector security long term. L

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

13


Cyber Security Challenge

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CYBER SECURITY CHALLENGE

BALANCING THE DEFENCE - A NEW IT CHALLENGE

New Cyber Security Challenge UK competition will test the ability of UK amateur cyber defenders to protect a simulated government IT system from all forms of online crime The UK public will be able to test their ability to secure government networks from cyberattacks as part of the first ever Cyber Security Challenge UK competition designed and run by the Government’s Intelligence Agency, GCHQ. Balancing the Defence will require competitors to manage the risks posed by attacks from hostile states, organised criminal cyber gangs or even individual hackers to a simulated government IT system. It is open to any individuals aged 16 or over, who are not actively working in cyber security. The Cyber Security Challenge UK began in 2010 as three competitions run by a small group of supporters from industry, government and academia to address a skills gap in the cyber security profession. Now in its third year the Challenge has grown its range of competitions in an attempt to better represent the diverse skills demanded within the profession. Its sponsorship has grown to over 50 organisations from across the cyber security landscape and it now acts as source of advice, support and guidance for anyone interested in a career in cyber security. LOOKING FOR VULNERABILITIES Balancing the Defence asks players to analyse a mocked-up network representing that typically found across government departments. They will be asked to look for vulnerabilities that an attacker could exploit, prioritise the threats and, whilst working to a tight budget, suggest a range of defensive controls, both technical and policy based, to reduce the risk to the network. The competition will take place from Monday 1st – Monday 8th October 2012 during which time the candidates will be fully briefed on the scenario, and will be asked to submit a report with their proposed security solution. Karl, the GCHQ architect of the competition said: “There is no such thing as a completely secure system - businesses will always need to balance where to spend a limited budget, to manage risks and provide opportunities. This is complicated by the need to ensure systems remain usable and continue to deliver business benefits. Security shouldn’t be seen as a negative by the workforce. This is why risk analysis is such as important and much sought after skill in cyber security.”

14

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

“Cyber Security Challenge UK has proved itself a very accomplished mechanism for finding new talent. We hope this competition will uncover those who have the vital mix of technical ability and business awareness to make tough decisions in the best interest of an organisation. At GCHQ we are committed to finding and developing the new cyber security skills in the UK and these are the skills sets employers including ourselves are most interested in.” Stephanie Daman, ceo, Cyber Security Challenge UK said: “Balancing the Defence is part of our new Risk Analysis and Policy Stream which puts our candidates in the shoes of the professionals and makes them answer some difficult questions – Where do the biggest threats come from? Are there some risks I have to accept? What impact will my changes have on the organisation? These are questions which cyber security professionals grapple with every day and

answering them requires an aptitude that isn’t easy to identify from traditional CVs and job interviews. We need a new approach if we are to find people with these skills in the numbers that the industry desperately needs. No organisation is better placed than GCHQ to help us deliver this.” The winners from this virtual competition will be invited to the next stage of the Cyber Security Challenge UK. This is a face-to face competition, developed by Orange with Prodrive, the British motorsport and automotive engineering group, and held at the Banbury racing track on Saturday 24th November 2012. At the face to face, 30 candidates taken from the GCHQ competition and a second virtual competition (Dtex System’s Insider threat game) will come up against a real life motorsport set-up, complete with Aston Martin Racing car, pit crew, technical team and a complex ICT infrastructure which connects them all. Their task will be to deliver a practical security solution that protects the team’s IP and confidential information from its rivals. Winners selected at this event will then be invited to attend the Challenge’s Masterclass and Awards weekend on 9th – 10th March 2013 where they will have the chance to compete for a range of career enhancing prizes. Last year’s prize pot amounted to over a £100,000 worth of bursaries, university courses, internships, training qualifications and certifications. L FURTHER INFORMATION Visit www.cybersecuritychallenge.org.uk for further details

Now in its third year the Challenge has grown its range of competitions to better represent the diverse skills demanded within the profession. Its sponsorship has grown to over 50 organisations from across the cyber security landscape.


7 7 7 7 7

Intrusion detection and protection Zero day attack, APT and malware protection Network traffic monitoring and analysis Stress testing security defences Advanced network taps and aggregators

(01296) 397 711 www.phoenixdatacom.com/security


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Software for organisations that demand secure enterprise mobility with excellent device performance In addition to being Code of Connection compliant, Digital Defence’s FIPS 197-accredited data and device protection solution, Secure Mobile, enables organisations to deploy a mobile working infrastructure whilst at the same time ensuring compliance to the Data Protection Act. The company’s software is used by organisations that demand totally secured enterprise mobility whilst maintaining excellent device performance. Secure Mobile’s unique architecture is completely transparent in use and does not impact on device performance. The solution effectively becomes an extension of the Operating System and thus encrypts and de-crypts data at bit level seamlessly and in real time (increased device performance is seen as one of the major contributors to an increase in the adoption rate of mobile solutions within the Enterprise). How does Secure Mobile stand out from other products on the market? Firstly, it is the only global Enterprise Mobility

Validated security solution running WEH. The company has developed an application and wireless connection Black & White list which is controlled centrally. The software is completely invisible in operation – users don’t even know it is there. It performs well (less than two per cent when encrypting or decrypting) and encrypts and decrypts data at bit level without any interruption or lack of speed on the device.

Authentication Lightweight Directory Access Protocol (LDAP) integration allows device authentication to be verified via an LDAP server, with user credentials stored remotely. What’s more, the software was the first to market with encrypted fingerprint user authentication. It also has a single sign-on: once a user has been authenticated, all files are ready to be decrypted. A centralised management console is available which enables mass deployment of security policies to devices. The company has a solid reputation for support and customer-driven development and is a specialist in file and folder encryption. FOR MORE INFORMATION T: +44 (0)1604 521108 (EMEA) T: +1 425 210 5576 (Americas) E-mail: info@digital-defence.com www.digital-defence.com Download a free 30 day trial from the website today.

The simplest data encryption you’ll ever use

Secure your data Free your users

T: +44 (0)1604 521108 (EMEA) T: +1 425 210 5576 (Americas) www.digital-defence.com 16

COUNTER TERROR BUSINESS MAGAZINE | Issue 11


POLICE & LAW ENFORCEMENT

Police & Law Enforcement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

fig a: The ITIL Service Lifecycle © Crown Copyright 2011 (reproduced with permission)

ITIL® – ADAPTIVE GUIDANCE FOR IT SERVICES

What can the UK government’s best-practice framework for IT service management offer public services striving for increased efficiency and response times? July 2012 saw the Home Secretary’s Strategic Policing Requirement put the emphasis firmly on service capability, consistency and collaboration. She highlighted the need for an aggregated response to national threats, where police forces can collaborate effectively. For the police and all other public services, IT services underpin all operations and are critical to future development plans. Public services are having to deliver against demanding national targets in an environment that increasingly calls for evidence of improved efficiency. Add to that the need of services such as the police to combine effectively to produce a coordinated national response, and it’s clear that we’re entering a period of transition towards new ways of working. IT services will need to be increasingly consistent and reliable to support collaborative operations and information sharing. WHAT IS ITIL? The ITIL framework, from the UK government, offers effective and efficient management for IT services. It has been widely used as a bestpractice standard for IT service management (ITSM) for more than 20 years, and is regularly updated to ensure it stays in step with the challenges of the latest technology. The

principle of ITIL is not a ‘one size fits all’ standard, it provides comprehensive guidance that is adaptable to help organisations meet their own IT needs, and respond fast to the needs of their customers. ITIL works equally well whether IT services are provided from inside an organisation, or by an external provider. In either case the emphasis is on the business goals of the client organisation. The core guidance supports the five stages of the ITIL service lifecycle, with a publication dedicated to each: ITIL Service Strategy, ITIL Service Design, ITIL Service Transition, ITIL Service Operation and ITIL Continual Service Improvement (see fig a.) It’s significant that the ITIL Service Strategy core publication is the hub of the framework, moving through to service design, the transition phase, and then service operation. In line with the periodic reviews that keep public services responsive to changing needs, continual service improvement surrounds and supports all stages of the service lifecycle. ITIL provides a framework to help control the complex interrelationships affecting each stage of the lifecycle, and provides a set of checks and balances that ensure business processes remain robust in the face of change, allowing services to adapt and respond effectively.

PRACTICAL GUIDANCE Each of the five core ITIL publications includes practical examples and guidance showing how ITIL best practice can be adopted and adapted in all workplaces including public services – for instance, ITIL Service Design includes examples for ‘Typical contents of a Capacity Plan’ and ‘Examples of Service Acceptance Criteria’, which are also cross-referenced to other relevant areas. Areas such as information security management are covered in detail, with data centre management guidance being included in ITIL Service Operation together with a comprehensive framework for physical access control and security auditing. Often the concept of ‘standards’ is understood to point towards unwieldy bureaucracy where a process can get in the way of efficient practices. ITIL’s focus is on an organisation’s business strategy and its main objectives, making sure that every step in every process is fully supportive of key goals and helps to create the fastest routes to the results needed – and a fast response for public services. COST SAVINGS Public services are under increasing pressure to deliver more with less. Although some organisations may be concerned that adopting best practice could be time-consuming and costly, increased efficiency can lead to cost savings. ITIL highlights the importance of focusing on value to the business, and increasing efficiency. Measures such as customer satisfaction, business benefits for the investment made, and response rates, may be more valid and more useful. In its strategic plan for 2009 to 2013, the Internal Revenue Service (IRS) in the US stated a target of improving efficiency through giving ‘people the technology they need’. They said they wanted ‘to deliver a quality and timely service to our customers while cutting costs’ and chose ITIL as the best approach for achieving this. The IRS recognized that they needed to change their perspective, so that each IT department became not a ‘cost centre’ but a ‘service E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

17



POLICE & LAW ENFORCEMENT Capabilities

Resources

Management

Financial capital

Organisation

Infrastructure

Processes

Applications

Knowledge

Information

People (experience, skills and relationships)

People (number of employees)

fig b: Examples of Capabilities and Resources (from ITIL Service Strategy) © Crown Copyright 2011 (reproduced with permission)

E delivery centre’. This switched the focus onto the value to the business, allowing the service to streamline processes and make them more efficient and repeatable – cutting costs while protecting quality and response. Value goes well beyond technical benefits. To make an assessment of value, you need to take full consideration of the context for current challenges. For instance, the Strategic Policing Requirement highlights the need for collaboration across force and institutional boundaries, and to apply an integrated approach across borders. The design processes in the ITIL framework outline best practices for identifying, defining and aligning IT solutions alongside specific business requirements. ITIL points towards what needs to be done to realize a strategy and to produce the outcomes needed. The guidance offers processes, and clear steps to achieving the best possible value – the right results, with the quality needed. CAPABILITIES AND RESOURCES ITIL makes an interesting distinction between capabilities and resources (see fig b). Resources are critical if anything at all is to be achieved, but take away capability and you are left with very little. Capabilities represent an organisation’s ability to coordinate, control and use resources. You can buy an IT application, but the organisation will derive little value from it without capability. The Strategic Policing Requirement reflects this distinction, noting that forces will need to connect both their resources and their capabilities to be able to collaborate effectively and respond to national emergencies. Developing the right capability sets across all your teams is a critical first step for delivering any strategy. ITIL acknowledges that every role within IT service management requires specific skills, attributes and

competences so that all team members can work effectively and efficiently. All five core ITIL publications include generic and processspecific role descriptions and information on competence and the responsibility model. The skills and training of each individual team need to be considered in such a way that collaboration becomes straightforward on larger projects, and where a consolidated response is needed across boundaries. ITIL qualifications are modular, so that capability can be built in a tailored way, focusing on the specific goals of the service, but always to the standard. HM Revenue & Customs (HMRC) used the ITIL framework, and ITIL professional accreditation qualifications, for a 2011 enterprise-wide IT update that upgraded all their services to comply with new legislation, and reduced costs at the same time. They achieved their technical goals and upskilled their workforce in parallel, aligning their teams to the latest standards and qualifications in IT service management. COLLABORATION AND COMMUNICATION Consistency is a critical basis for interoperability and collaboration, and can ensure that reliable quality standards are reached right across the board. What starts off as a local issue for a public service such as the police can quickly and dynamically escalate to create national or cross border requirements. Where best-practice processes are consistently followed, local issues can seamlessly be extended across boundaries with little disruption. ITIL is about improving business processes and instilling the discipline and rigour that allows them to be relied upon in a crisis. ITIL doesn’t have a separate process for communication, but recognizes that good communication is a core principle for every

How ITIL supports success

Police & Law Enforcement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

In summary, ITIL can: Deliver value for customers through services Integrate the strategy for services with the business strategy and customer needs Measure, monitor and optimize IT services and service provider performance Manage the IT investment and budget Manage risk Manage knowledge Manage capabilities and resources to deliver services effectively and efficiently Enable adoption of a standard approach to service management across the enterprise Change the organisational culture to support the achievement of sustained success Improve the interaction and relationship with customers Coordinate the delivery of goods and services across the value network Optimise and reduce costs. situation. The guidance covers the impact of changes on people, as well as processes and technology, and provides a framework designed to improve performance across a range of situations. ITIL Service Transition includes a chapter on ‘managing people through service transitions’, explaining the role of communication during times of change, highlighting the need to explain the reasons for a change, as well as the technical impact; getting people behind the changes proposed and securing their full commitment. Where details can’t be shared, for security reasons, then ITIL recommends this should be openly stated, creating a culture where teams move forward together (see fig c). ITIL Service Operation explores communication from different perspectives, including when related to an emergency or incident, between shifts, and global communication. CONTINUAL SERVICE IMPROVEMENT ITIL has been successful not only because of its comprehensive and robust content, but because each process is surrounded by ways to ensure that practices move forward E

fig c: Guidance for Communications Strategy (from ITIL Service Transition). © Crown Copyright 2011 (reproduced with permission)

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

19


Police & Law Enforcement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

POLICE & LAW ENFORCEMENT E in a continuous drive for improvement and added efficiency. Whilst it provides all the information needed to comply with the ISO/IEC 20000 standard, it’s an essentially practical approach representing the experience and practices of the world’s best service providers. It suggests only that organisations adapt the framework to do what works best for them. ITIL is owned by the UK government, and isn’t based on any particular technology platform or industry type, so it’s equally relevant across the board and whatever the starting point. For the police targeting the Home Secretary’s strategic requirements, and for other emergency services looking to cut costs, raise efficiency levels and ensure a fast response to public requirements, the ITIL publications could be essential reading. L FURTHER INFORMATION You can find out more about ITIL and the ITIL publications portfolio at www.best-management-practice.com USING ITIL GUIDANCE Are you using the ITIL guidance already? Please let us know your story, so we can share your valuable experience with others and support raising standards in IT service management. Please email bestmanagementpractice@tso.co.uk

Best Management Practice products Best Management Practice is the overarching brand that umbrellas multiple Cabinet Office best practice products. The internationally renowned portfolio is adopted as best practice through high quality training, publications, software tools and consultancy for portfolio, programme, project, risk, value and service management disciplines. The portfolio includes globally renowned sub brands including ITIL®, PRINCE2®, MSP®, M_o_R®, P3O®, MoP®, MoV® and P3M3®. These products have been created on behalf of Her Majesty’s Government (HMG) in the United Kingdom which owns the embodied intellectual property. The portfolio is universally adopted as best practice through commercial arrangements for services through contracts awarded to The Stationery Office (TSO) as Official Publisher and APM Group Ltd (APMG) as Official Accreditor. Both organisations ensure our brands are supported by high quality training, publications, software tools and consultancy.

Online communities Best Management Practice hosts a variety of online communities to keep you up to date with the latest information and news from the portfolio. Online communities include: Official Corporate Account twitter.com/BMPPortfolio Official Publisher Account twitter.com/BMPPublisher Linkedin.com Search: Publication Information by TSO Facebook.com Search: ITIL–Service Management plus.google.com Search: Best Management Practice YouTube.com www.youtube.com/TheStationeryOffice ITIL® , PRINCE2®, MSP®, M_o_R®, P3O®, MoP®, MoV® and P3M3® are registered trademarks of the Cabinet Office.

Launching at Transec and Emergency Services shows 2012 Innovative Compact Multimedia Streaming systems

DC1

An invaluable tool for First responders, the Military and Mining companies. The DC1 uses the most secure AES standard and is very quick and easy to set up. - COFDM Wireless IP Transceiver Bridge - Multi-path & non-line of sight transmission - Lightweight, compact & portable yet rugged with IP67 rating - Range 1km+LOS using dipole antennas - Battery powered for mobile application

Encoder

Vantage

Vantage provides crucial real-time information gathering, video recording and mobile communications for First Responders, Military, Remote/Lone workers, Site Engineers, Inter office video conferencing, Live broadcast, Adding transmission functionality to analogue cameras. - 3G/4G multimedia streaming system - Live unified 2-way conferencing & Audio/Visual monitoring - Internal articulated HD camera / Aux camera input - Dynamic bandwidth data transfer - GPS location tracking

Easy to install providing superior performance. High resolution, increased frequency response and superior reliability providing high definition live stream encoding. Able to encode and decode all types of analogue and digital video. - Multiple stream decoding (software) - H.264 output - Audio (Duplex) and Video encoding - Fully compatible with most Media servers available today - LINUX based software - Low latency - Software viewing & recording - Analogue & digital input interface (Composite, BT.656, USB, Ethernet)

Tel: +44 (0)1507 600748

20

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

info@indicomm.co.uk

www.indicomm.co.uk


INTERVIEW TECHNOLOGY

A revolution is occurring in the world of digital interview technology which will not only improve the quality of police interviews but drive a more collaborative approach to evidence sharing It was back in 2003 when voice technology specialists Business Systems initially started working with police forces to address quality management in the area of call handling. Working with Surrey Police’s contact centre to assess needs, measure skills and deliver training, Business Systems produced best practice guidelines which have since been adopted by the Home Office as part of the National Call Handling standards for all UK police forces. Fast forward nearly ten years and Business Systems is still identifying and implementing improvements to the communications technology employed in modern policing practices. Their most recent project follows the National Policing Improvement Agencies (NPIA) best practice framework agreement on digital interviews, identifying a need to provide broader capability across the investigative process, replacing cassette tapes with digital technology. THE LATEST INTERVIEW TECHNOLOGY In response to this need, Business Systems and partners Damovo developed CODES, the Complete Online Digital Evidence System designed to facilitate the investigative interviewing of suspects, victims and witnesses. The technology includes voice and/or video recording equipment, including microphones and cameras; an interview management console with either a touch screen or keyboard, and server based data storage for quick and easy retrieval of interviews. CODES technology is championing the change for modernisation and enabling forces to either replace their tapes with discrete digital media or go further with a fully networked capability, thereby permitting the efficient sharing of interviews and associated data with other criminal justice system partners. APPLICATION OF THE TECHNOLOGY Gwent Police is the latest force to adopt the CODES technology and it is already seeing performance benefits which extend beyond the fact that the quality of recordings is enhanced and it is quicker to search and play back. DS Martin Vaughan, an ACPO approved interview advisor with the force explained that the technology enables supervisors

to quality control interviews and critically review their content which in turn can only improve performance. “The fact that the interviews are easy to store, play back and you can search them in a matter of seconds means that supervisors are better able to quality control interviews,” he said. “This is vital to ensure interviews are robust enough to withstand potential challenges by the defence and to help put a compelling case to the court.” It has also had a positive effect on the quality of interview and the performance of officers as they now don’t have to stop their interviews after 45 minutes to change a tape. EVIDENCE IN ONE SECURE LOCATION As well as helping professionalise the whole interview process, CODES enhances the evidence management process as it allows officers to attach key forensic information such as CCTV footage and other images to the interview file. This ensures a more

vulnerable who might otherwise feel intimidated by being physically present in court. Many trials are discontinued or fail due to unreliability of witnesses. The fact that the technology is less intrusive can also ensure witnesses feel more comfortable being interviewed. The mobile solution goes a step further, enabling investigators to conduct their interviews in locations away from the police station – again leading to increased victim and witness comfort and ultimately enhanced public confidence in the criminal justice system.

Written by Richard Mill, managing director, Business Systems

THE FUTURE OF POLICE FORCE COMMUNICATIONS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NEXT STEPS Richard Mill, managing director, Business Systems concludes: “Whilst updating technology to improve practices is a good first step, we firmly believe investigative interviewing can also benefit from applying quality management processes in the future. Having made the investment in video and audio technology, forces will be effectively

CODES technology is championing the change for modernisation and enabling forces to either replace their tapes with discrete digital media or go further with a fully networked capability, thereby permitting the efficient sharing of interviews and associated data with other criminal justice system partners. joined up approach and means that vital evidence can be stored in one location and is easily shared with authorised personnel. CODES complies with current and future Management of Police Information (MoPI) directives, along with the two new (PACE Codes of Practice, E and F). It can also play a vital role in ensuring witnesses are able to present their evidence to a court without appearing in court in line with Special Measures.

equipped to use those tools to measure interviewer performance and identify areas for improvement. With the right metrics, objectives and scoring mechanisms in place, benefits could be wide reaching; improved conviction rates, more highly trained interviewers and ultimately national standardisation on best practice interview techniques.” L FOR MORE INFORMATION www.businesssystemsuk.co.uk/codes

VULNERABLE WITNESS PROTECTION The visual recording of witness interviews is an important service offered to the

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

21


Suitable for protecting: Cable Ducts Pipelines Fences

The MILES is an innovative fiber optic detection system that has a number of different configurations to detect attacks in many different applications.

It can be used as a fence mounted detection system, a pipeline protection system and for detection of interference or removal of cables in ducts or troughs.

There is even a buried system, which has particular applications rail and tunnel safety and security applications.

It has: 

Very high detection capabilities

Attack point identification to within a few metres

Variable range capabilities from 1km up to 25km

No power required in the field

No requirement for new fibers, using existing spare fibers if available Contact us now at

WWW.GPSPerimeter.co.uk

GPS Perimeter Systems

Sales@GPSPerimeter.co.uk

for more detailed information

+44 ( 0 ) 1604 648344


PERIMETER SECURITY

PERIMETER SECURITY: THE FIRST LINE OF DEFENCE

From government and military facilities to schools, theme parks and construction sites, perimeter security is crucial in guarding against external threats. The best place to prevent crime, attack or security breach is at the furthest possible point from that which you wish to protect, be it sensitive material to a mass of people, and to that end perimeter safety measures are perhaps the most crucial in securing any building or area. The sooner a threat can be detected, then the more time and space you have available to respond to it, a crucial factor in preventing intruders and terrorists from succeeding. As well as this, an increased response time means a greater possibility of a safe resolution to security breaches, giving the operating body the time to gather adequate force and countermeasures to deal with the danger. In the event of violent attacks, extra seconds could save lives, and any delay or forewarning of such an attack is critical in preventing it. DETERRING THE WOULD BE THREAT Perimeter security measures, particularly physical obstructions such as security fencing, gates and wire obstacles, are also important in deterring any would-be threat. The overt presence of such measures may stop an act of criminality or terrorism at the outset, presenting an image of impregnability that

might dissuade those seeking unauthorized access. Deterrence is perhaps the most desired effect from any physical security measure, as stopping a crime before it has begun is safest for all involved. There are numerous ways of presenting an overt and visible statement of security, which, even if they fail to act as a deterrent, will still have an important role to play in preventing the success of an attack. Physical barriers such as security fencing and gates of course present an immediate obstacle to any attempt to breach the perimeter, and require time and effort to overcome, often rendering those attempting to get through them highly visible and vulnerable to detection and arrest. CCTV, in itself a visible measure and highly effective deterrent, will also provide an early warning of anyone attempting to jeopardize the integrity of a site’s security system. Many sites, particularly those most at risk from attack, such as government facilities and airports, now employ infrared thermal imaging

Written by Dave Frampton, BSIA

Businesses, public areas and government buildings are not only faced with the danger of conventional crime such as theft, but also that of violent terrorist attack. David Frampton, chairman of the Physical Security Equipment Section of the British Security Industry Association (BSIA) looks at the front line of site security.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

cameras in place of traditional CCTV, as this provides a more comprehensive detection system and earlier warning of potential threats. Even after an attack has occurred, CCTV is a valuable source of information for further police investigations, as the events of 7/7 and the London riots have shown. Another benefit of CCTV usage is that it can be easily combined with Automatic Number Plate Recognition (ANPR) software, which gives detailed information about every vehicle passing in and out of a site. Another of the most visible forms of perimeter security is, of course, that of guard personnel and patrols. From armed security teams to a lone individual, visible security personnel are one of the most effective forms of crime deterrence, and provide a ready response to any attack or threat. COVERT PROTECTION The unfortunate downside to overt perimeter security measures is, however, that they are E

Frequently used systems are hidden heat and motion sensors and connected alarms. Such unattended ground systems (UGS) devices are easy to conceal, and provide early warning. Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

23


n et

re St

sales@atgaccess.com

no

08456 75 75 74

n Ca

www.atgaccess.com

ATG ACCESS

as

cr

In July 2012 the government unveiled a £9.4bn spending package for upgrading the UK railway infrastructure across England and Wales. This has been described as the biggest investment in rail infrastructure for the last 150 years.

n Pa St

Major Security Upgrade across all main railway stations in the UK

The Department of Transport who are responsible for the overall investment is predicting this project to deliver capacity for 140,000 extra daily commuters across the country. One of the objectives for the project is to relieve the London underground services by providing fast over ground services into the capital city.

ATG Access who is the UK’s largest supplier of perimeter security equipment successfully bid for contracts across twenty five national railway stations with approved contractors. The security company has installed a vast range of high security equipment under the railway initiative, “vehicle access to train stations.” This government funded scheme came from an earlier “franchised, strong security project.” Paula Haustead Senior commercial scheme sponsor spoke last week about the recent security upgrade, “when looking to secure our sites we approached ATG Access as they were able and willing to provide bespoke product design and products to specifically suit our needs from an early stage. The results have been very successful and ATG Access is a great example of a private sector company willing to invest in research and design for the benefit of public security.”

After shocking terrorist attacks such as the London tube bombings in 2005; it is reassuring to know that contractors are not taking any risks when it comes to the level of security barriers deployed within UK mainline rail stations. Private sector companies such as ATG Access will continue to work with the public sector, contractors and architects to develop high quality and innovative equipment to protect the general public whilst commuting on new and existing lines.

CoBaCo House | North Florida Road | Haydock Industrial Estate | Haydock | Merseyside | WA11 9TP www.atgaccess.com sales@atgaccess.com 08456 75 75 74

r te es y ch ill an ad M icc P

With security equipment installation now complete across twenty five major railway sites including many City of London sites and Glasgow’s Queen Street station: this next phase of government spending means further expenditure on public security.

l t oo ee rp tr ve e S Li im L

This recent announcement has sparked a lot of public attention but unbeknown to most; major security upgrades have been executed across all major railway stations for the last two years.


PERIMETER SECURITY E by their very nature easily detected, and thus can be avoided or compromised by individuals with time, skill and preparation. Thus, an alternative measure is to use systems that are less obvious to the observer, and thus less likely to be bypassed by a criminal element. Of these, some of the most frequently used and effective are hidden heat and motion sensors and connected alarm systems. Such unattended ground systems (UGS) devices are easy to conceal, and provide an early warning system, which leaves those looking to breach the security perimeter unaware that they have been detected. Again, this gives the operational personnel an increased response opportunity and makes the chance of a safe resolution higher. TRIP SENSORS Trip-sensors are another popular form of covert perimeter security measure, and like heat and motion sensors, when activated they allow operators to pinpoint the location of the security breach, allowing for a focused and direct response. Hidden surveillance cameras, especially IP cameras, again have the advantage of being easy to conceal and are more flexible and mobile than traditional CCTV. Able to operate anywhere within the system network, they can be moved relatively easily and can be

n CCTV cavely ti flexibility and mobility. be effectrip and The key to keeping o a secure perimeter, linked tn sensors and thus ensuring o i t o e m r o m the safety of a e d i to prov nformation site or building as i whole, is to ensure detailedarding an a diversity of devices reg and assets, enabling a attack range of detection and ongoing

placed surreptitiously to increase the opportunities for criminal observation. Such mobile assets, and this applies to security guarding as well, can of course be moved to areas of specific vulnerability and can, with minimum notice, provide support for other systems as needed. One of the downsides to using just covert measures, however, is that they lack the deterrence capabilities of the more overt systems and barriers. Although more likely to alert authorities to ongoing or imminent attacks, when used alone such devices often encourage the perpetration of such acts. Of course, as effective as both methods of perimeter security are, when combined they create a much more comprehensive network of safety measures, as well as getting the best of both worlds: deterrence and detection. ‘Combined arms’, as it were, is the most efficient way to comprehensively secure a perimeter, and works best when the systems are integrated. CCTV can be effectively linked to trip and motion sensors to provide more detailed information regarding an ongoing attack or threat, whilst IP video surveillance works well with large fenced perimeters, due to its

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

prevention methods to be employed, each supporting and complementing teach other, be they technological, physical or personnel systems. The increased threat of terrorist attacks following the events of 9/11 and 7/7, and the civil disturbance of the August riots in 2011 means that no measure of safeguarding an area or building can be too extreme, as the nature of security has been changed by those willing to go to any extreme to ensure the completion of their goal, be it sabotage or violence. As the nature of criminal and terrorist threat changes, so too must be the methods employed against them, and perimeter security is the first and best place to start. L FURTHER INFORMATION For more information about the security measures mentioned in this article, and to locate a supplier near you, visit the BSIA’s website, www.bsia.co.uk

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

25


International Security for a Modern World

CTX 2013 gives you access to over 8,500 security professionals and crisis management buyers and specifiers. Launch new products, demonstrate current capabilities and showcase real time solutions on the exhibition floor and within dedicated feature Zones:

• IEDD Demonstration Theatre • Maritime Security/Maritime Counter Terrorism Zone – new for 2013 • Integrated Security Zone – new for 2013 • Oil & Gas On/Off Shore Security Zone – new for 2013 • Cyber Security Conference & Solutions Zone – new for 2013 • Armoured & Support Vehicle Zone

For more information on exhibiting or demonstrating opportunities within these zones please contact us at: www.counterterrorexpo.com/CTB1 or +44 (0) 20 7384 7778

www.counterterrorexpo.com Co-Located with

Lead Media Partner


COUNTER TERROR EXPO 2013

SMART HOLISTIC SECURITY AT COUNTER TERROR EXPO

Counter Terror Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Transnational terrorism remains the most dominant national security threat. The need for good security to safeguard our nations, critical infrastructure, companies and individuals against terrorist threats is not reducing, but is instead emerging, adapting and evolving. The recent attack on the US Embassy and murder of the US Ambassador to Libya could mark the beginning of a new terror front in North Africa. If Libya becomes more of a threat to the West and Egypt falls into the hands of extremists, events could be catastrophic. Who knows where Syria will be in 12 months’ time or how the rapid expansion of India, Brazil, China and Russia will affect world order. Who knows what will happen in Africa post the Arab Spring. While much closer to home the Irish Dissidents are continuing to carry out attacks. The threat has therefore long since evolved, and will continue to evolve beyond Al Qaeda. What is certain is that the need to secure our nations, critical infrastructure, companies and individuals is always going to be near the top of the agenda. Counter Terror Expo 2013 is therefore more valid than ever. Any security professional will know that the very best way to ensure these questions are evaluated and considered prior to an attack is to pursue a holistic approach. CTX brings together diverse disciplines in a way that allows our nations, critical infrastructure, companies and individuals to develop an appropriate and proportionate security plan. Therefore we at CTX have made great efforts to ensure that products on display will show the best and most innovative technologies on the market, to a global audience spanning 68 countries representing the core interests of those most affected. TOO CLOSE TO HOME? The realisation that terrorist attacks committed on behalf of Al Shabaab in Somalia were in many cases carried out by UK passport holding terrorists has forced border protection agencies to reassess best practice for protecting our borders against terrorists and weapon infiltration. Leading companies such as Rapiscan and Ceia who are tasked to deliver effective and robust checkpoints and detectors will be on display at CTX. Moreover, there has been a reported rise in numbers of UK citizens linked to terrorist organisations overseas, whether it is via illicit fundraising or providing equipment and resources. The moving of goods and information across borders has reconfirmed the need for multi-national cooperation and is an on-going priority for all nations and governments to ensure lawful and safe trade and travel routes, and a necessary focus at CTX 2013.

REDUCING VULNERABILITIES On a micro level CTX 2013 also brings to the foreground the widest range of security and counter terrorist products aimed at reducing the threat to individuals in vulnerable areas. Examples of safe rooms, panic rooms as well as live demonstrations of armoured vehicles vital for personal protection will be on display within the Armoured and Support Vehicle Zone. From a macro level we look at how transport security must also take a holistic view. Many of the threats remain the same and therefore many of the solutions and best practices can be applied to our maritime routes, ports, airports and public transport systems, just as they can to other areas of our critical national infrastructure. From perimeter security to access control, to emergency preparedness, to screening scanning and detection. Transport security is a vital part of our holistic approach to counter terrorism at CTX 2013. PRIVATE PROPERTY – DO NOT ENTER It is easy to think that a business is not a vulnerable area due to its lack of proximity to a high threat area and that security is a secondary issue. Unfortunately that is rarely the case. Often large sites are unaware of their attractiveness to criminals, whether it is because of the value of the nature of the goods stored there or the potential disruption caused to supply chains by damage or threat. It is far too late to build good perimeter security when a group of protesters turn up and are incensed by your links to the energy industry, for instance. Therefore CTX also brings together, in one holistic forum, the latest perimeter security, access control and facility security techniques and technologies

designed to react to the growing need to protect assets and sites. World renowned companies such as Frontier Pits and Cova Security Gates will showcase the very best in hostile vehicle mitigation. Whilst, Avon Barriers, Betafence and Barkers Engineering will showcase tried and tested products that are successfully operating in highly sensitive and demanding environments. SECURITY FOR A MODERN WORLD Every sector has a responsibility to understand the threats they face, whether they be from terrorists or criminals. The threat today, and in the future, is continually evolving, and needs a holistic approach, looking at every aspect of security to protect our nations, critical infrastructure, companies and individuals. CTX 2013 is responding to this evolution across the entire expo and conference. Over and above the huge range of solutions, technologies, products and service that are represented by our 400 strong exhibitor base, the 2013 event will also offer a new Cyber Security Solutions Zone and expanded Conference; a new Maritime Security & AntiPiracy Zone; a new Oil & Gas Security Zone; and a new Integrated Security Solutions Zone and Workshop; all running alongside our hugely successful conference covering global counter terrorism, critical national infrastructure, protecting crowded places and the cost of terrorism to business. L FURTHER INFORMATION For more information and on how to attend or get involved, please visit the show web site at www. counterterrorexpo.com/holisticsecurity

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

27



PROTECTING INFRASTRUCTURE

HOME MADE EXPLOSIVES: KNOW YOUR CUSTOMER

the protection of, for example, radiological sources, pathogens and toxins (as defined within Schedule 5 to Part 7 of the Antiterrorism, Crime and Security Act 2001), and chemicals. It is the need to protect these hazardous materials which originally prompted the development of NaCTSO and the CTSA role, shortly after the distribution of Anthrax letters in the USA in 2001.

The UK National Counter Terrorism Security Office (NaCTSO) is a police unit co-located and working in partnership with the Centre for the Protection of National Infrastructure (CPNI). NaCTSO supports the UK Government Contest strategy in three main areas, the protection of crowded places, the protection of hazardous sites and substances and assisting the CPNI in the protection of Critical National Infrastructure (CNI). NaCTSO trains, tasks and co-ordinates a national network of police Counter Terrorism Security Advisers (CTSAs), located across the UK in every police force. The CTSA role is highly specialised and initial training takes two years, leading to a nationally recognised award in Counter Terrorism Management. The training must equip the CTSAs to

HOME MADE EXPLOSIVES Current methodology employed by terrorists, lone actors and other groups, for varying reasons, has for many years utilised explosives as one of the weapons of choice. In the UK, as in many other countries, commercially produced and military explosives are very strictly controlled. Attempts to purchase or acquire them are heavily scrutinised and attract attention, E

perform their work in the three main areas to a very high standard. It has been developed in close co-operation with a number of partner agencies, including the Office for Security and Counter Terrorism (OSCT, part of the Home Office), CPNI, the Environment Agency, the Health Protection Agency and the Health and Safety Executive. It consists of generic training in CT Security Surveying, supported by activity specific training in

Peter Bennett, National Counter Terrorism Security Office (NaCTSO)

With numerous recipes and instructions openly available, the threat from home made explosives should be taken seriously. NaCTSO has developed the ‘Know Your Customer’ - a voluntary scheme designed to raise awareness about the potential for misuse of chemicals and products used or supplied in the course of legitimate business. Peter Bennett from the National Counter Terrorism Security Office (NaCTSO) elaborates

Protecting Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Much of the work undertaken by NaCTSO and the CTSAs over the last few years, and especially since the July 2005 attacks in London, has looked to reduce the availability of precursor chemicals

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

29


Ready to meet

the world’s most flexible infrared cameras? Thermal imager combined with IP camera electronics

Meerkat-Fix

Raven-640

Imagine the invisible The high resolution Raven-640 is the smallest thermal infrared camera in the world fitted with a 640 x 512 detector. The analog video-out interface makes it an easy plug-and-play system. Thanks to excellent image quality and small configuration the Raven-640 is designed for instant, accurate and cost effective integration into most complex security and night vision applications. The outdoor camera version Meerkat-Fix consists of fixed mounted cameras with a fixed field of view, and even for more situational awareness, with zoom lenses. The Meerkat-Fix features H.264 video compression and optional ONVIF. www.xenics.com - www.stemmer-imaging.co.uk


PROTECTING INFRASTRUCTURE E especially when it appears that some effort has been made to evade the controls. Similarly, thefts of these materials are treated very seriously and thoroughly investigated. This lack of availability has undoubtedly contributed to the widespread use of home-made explosives (HME), incorporated into improvised explosive devices (IEDs). Commonly available chemical components, referred to as precursor chemicals, such as acids, oxidisers and solvents, can be easily obtained in sufficient quantities to produce all sorts of HME, with numerous recipes and instructions openly available in the public domain, especially on the internet. As discussed in a previous article appearing in this publication, attack methodology is focused on our crowded places as targets, with a view to causing mass casualties and severe disruption. The use of IEDs with an HME component is a regular choice of weapon in planning these attacks. AMMONIUM NITRATE The UK, historically, has seen much use of Ammonium Nitrate (AN) in campaigns conducted by Irish Republican Terrorists. AN, to most people, is an important and widely used agricultural fertiliser, several million tonnes of it being used annually.

The chemical industry in the UK is a significant player in the global market place and contributes a great deal to the UK economy. It is a highly regulated area, with much emphasis upon health and safety. As a control measure, the option to introduce additional regulation to reduce the availability of, or perhaps even ban, some or all of the precursors of concern was simply not viable. As well as being hugely disproportionate, the impact upon the industry would be very significant and quite rightly challenged. Additionally, the effect upon consumers could be to see common household products, perhaps including hair treatments, cosmetics and even some foodstuffs, disappearing from the shelves. Without doubt such controls would be near impossible to enforce. KNOW YOUR CUSTOMER Through close co-operation with some of the major UK trade associations, notably the Chemical Industries Association (CIA) and the Chemical Business Association (CBA), NaCTSO developed the ‘Know Your Customer’ (KYC) campaign. This is a voluntary scheme designed to raise awareness within industry about the potential for misuse of chemicals and products used or supplied in the course

Although driven by the need to reduce the availability of precursors used in the production of HME, these campaigns do not focus upon a defined list of materials. They must cater for a broad range of factors which could present in a variety of combinations Initially though, AN was developed as an explosive in its’ own right, and it is still used commercially in the mining and quarrying industries. Terrorists have used AN extensively around the world and have looked to enhance its’ performance by adding additional precursor chemical components which might increase propensity to detonate or improve explosive effect. Much of the work undertaken by NaCTSO and the CTSAs over the last few years, and especially since the July 2005 attacks in London, has looked to reduce the availability of these precursor chemicals. At first this work was aimed at industry, as we sought to understand how these chemicals were used legitimately, in what quantities and combinations and how diverse that activity might be. It was quickly and abundantly clear that those precursor chemicals we see in IEDs around the world are also used, sometimes in very large quantities and in many combinations, in thousands of applications, processes and products on a perfectly legitimate and lawful basis.

of legitimate business. KYC seeks to encourage industry to adopt it as common sense, good practice activity which complements their approach to product stewardship and being a responsible player in the market place. It encourages personnel to use their knowledge and expertise of the working environment and customer profile to identify activity, such as unusual enquiries or suspicious transactions, and to report that directly or through their line management to the Anti-terrorist Hotline. The collaboration and co-operation of the CIA and CBA contributed substantially to the introduction of the KYC programme. These associations published articles in their trade journals, distributed to all members, both endorsing and promoting the KYC product as good practice. Since then, they

have collectively produced a joint industry code of conduct which all members must comply with and which includes KYC principles as good practice in all areas of product supply, including internet sales. Since its introduction through industry, KYC has been extended to a wider retail based application, but the principles and messages are unchanged. NaCTSO has also developed a multi-media product known as ‘REVISE’. Although based upon the widely used Project ARGUS initiative, REVISE is a bespoke package designed to increase awareness within the academic sector, borne out of a recommendation made in a review of the protective security of hazardous substances under the UK’s Counter-TerrorismStrategy (CONTEST). REVISE looks to reduce the availability of precursor chemicals in academic laboratories, where a vast range of hazardous materials can be found, and does this by encouraging improvements in challenge culture, stock control and access control.

Protecting Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IDENTIFYING UNUSUAL ACTIVITY Although driven by the need to reduce the availability of precursors used in the production of HME, these campaigns do not focus upon a defined list of materials. They must cater for a broad range of factors which could present in a variety of combinations. Knowledge of the product and its’ legitimate uses, delivery address, payment method and perhaps a request for ancillary equipment, all can indicate that unusual activity might be taking place. In isolation they would rarely suffice to provide a justifiable basis for suspicion, but in combination the aggregate effect may be much more significant. This is why these campaigns rely on the co-operation of business, from trade associations to national chains, small medium enterprises to the independent local trader. All are stakeholders in this and all have a valuable contribution to make. NaCTSO, CTSAs, the OSCT and all those with an interest and responsibility for counter terrorism must continue to involve and engage with business at every level. This ensures that awareness is maintained, products, campaigns and initiatives remain accessible and fit for purpose, and collectively we continue to make the UK a hostile environment for those who aspire to attack us. L

Much rk wo of the taken under SO has T by NaCto reduce lookedailability of the av precursor these micals che

FURTHER INFORMATION Most NaCTSO products are available free of charge and can be downloaded from the NaCTSO website at www.nactso.gov.uk

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

31


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

BUSINESS CONTINUITY

WHAT HAPPENS WHEN THE BOMBER SUCCEEDS? What distinguishes a good business continuity plan from a poor plan? And critically, what works in reality and what fails? Chris Needham-Bennett shares his thoughts and experience Whilst I imagine that many readers are experts in security, risk management, mitigation and preventative measures of all descriptions, this article offers some insights that might be useful to any security manager involved in business continuity planning. I am always mindful of Stanley Baldwin’s address to Parliament on 10 November 1932 when he famously remarked that in the context of the impending aerial warfare, “the bomber will always get through.” The problem is that for any risk or security management endeavour to remain cost effective on average, then paradoxically, from time to time, it has to fail. For example an Airbus A 340 is less prone to crash if it never takes off but it looses its utility as an aircraft. A company could equally have so much protection that entry to a building is almost impractical that the organisation would suffer; clearly a balance between security and practicality has to be struck. If therefore we presume that the bomber/terrorist, of whatever description, could get through, the business continuity plan is the next level of protection for the continued operations of the business. WHAT MAKES A GOOD PLAN? The question for debate is therefore, not whether or not a business continuity plan is required, rather the question is what distinguishes a good plan from a poor plan and critically what works in reality and what fails. The utility of a plan is often in inverse proportion to its thickness. Whilst some organisations and departments, such as IT, need detailed plans, the majority of users revert to their detailed knowledge and experience. Therefore it often seems more appropriate to have a generic plan that is in an aide memoire format to assist the thought processes of almost any responder in most reasonably expected circumstances. This is a realistic proposition in most cases of invocation as one can imagine that the difference in response between not getting into the office because of a train strike or because of snowfall is minimal. PLANNING ASSUMPTIONS Naturally a terrorist attack differs substantially from the ‘normal’ denial of access scenarios in so far as casualties and significant damage are far more likely. Few organisations we have worked with had hitherto made logical planning assumptions as to what they could

32

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

Chris Needham-Bennett

cope with. Planning assumptions, whilst prone to error, have to be made as a start point and as a catalyst for debate. One of the most prominent departments needing planning assumptions in a terrorist incident is HR who are likely to be overwhelmed very quickly indeed. We recommend that a realistic rough guide is that most HR departments could not cope with more than 10-20 per cent of their staff becoming casualties without needing additional support and assistance. Management structures are also critical to the operational efficacy of any plan. All too frequently we find the bureaucracy of the organisation is mirrored in the plan. Ideally the chain of command should be not more than three layers deep so as to promote rapid decision making. The span or breadth of command will generate too much information if there are more than five or six departments reporting into any single person. Therefore it is critical that the normal bureaucracy of an organisation (that is positive in that it in normality it lends order to process driven activities) is replaced with a slightly more autocratic style of management.

plan?” Our response is almost invariably its training and exercising. The logic behind this apparently sweeping assertion is that a poorly trained team will be unable to operationalise a good plan, whereas a good team can often make good use of a ‘sub optimal’ plan. Thus, given tight budgets and limited resources, which is often the case these days, time spent in rehearsal is more beneficial than over concentration on planning details that might or might not be relevant in the event. Finally the style of rehearsal is important. Too frequently people use advanced simulations or sophisticated mock operations rooms when in reality the most difficult phase would be operations ‘in extremis’ – in the car park, the alternate site, and so on – when most of these facilities would be unavailable. In summary therefore keep exercises progressive, realistic and faithful to the facilities likely to be available at the time. We hope that this article has struck a chord with the readership. If Needhams 1834 can be of help and assistance to your organisation in addressing any business continuity issues do please call us. L

THE CRUCIAL ELEMENT We are often asked, “what is the most important aspect of a business continuity

FOR MORE INFORMATION www.needhams1834.com +44 (0)207 353 9498


BUSINESS CONTINUITY

ADJUSTING THE RISK RADAR

Business Continuity

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UK PLC cannot afford complacency which ignores the threat that terrorist activity could take place in any UK provincial city or town. Fortunately there are a number of ongoing activities taking place, being driven both by UK government and large organisations, which are directly encouraging all types of business to improve their resilience, writes Colin Ive MBCI.

One of the most negative legacies which resulted from the high profile terrorist attacks such as 9/11, Delhi, the London bombings etc has been that by their nature of being capital city focused events the vast majority of organisations, and especially the small and medium enterprises, have see such attacks as a media event which, though terrible in their actions and consequences are so remote as to not be an inclusive factor on their risk radar and so subsequently almost ignored. Such a view is fully understandable but breeds complacency and a narrowness of thought and understanding which simply promotes the view of “When bad things happen they won’t hurt me!”

Act 2004 there is a requirement for certain organisations e.g. infrastructure organisations, local authorities, emergency services etc to have Business Continuity plans in place and so strengthen both their resilience to threats and by doing so the resilience of the UK. Indeed this act requires local authorities to not just have such plans but to also promote the discipline of Business Continuity to business in their area. Business resilience refers to the ability of enterprises to adapt to a continuously changing business environment. Resilient organisations are able to maintain continuous operations and protect their market share in the face of disruptions such as natural or manmade disasters. There have in recent times been, and as I write continue to be, a number of significant natural events which have had a direct impact upon

In mostons, ati organis imary the pr f disaster eo objectiv ry planning recove en limited has be ecting IT to prot ructure infrast

NOT IF BUT WHEN UK plc cannot afford such complacency which ignores the threat that terrorist activity could take place in any UK provincial city or town. A threat that those with a clearer understanding of the long term believe this as not an if this could occur, but when. As part of the Civil Contingencies

many businesses and of all shapes and sizes. Events such as volcanic ash, the 2011 Japanese earthquake and tsunami, plus last year’s floods in Thailand, all of which directly impacted upon the supply chain for many UK organisations. Such events have seemingly been more localised this year with the multiple incidents of significant flooding in many parts of the UK affecting locations which have not experienced such an event for many, many years. IMPROVING RESILIENCE These activities and events have and continue to develop a growing interest in mitigating risk and improving organisational resilience to cope with incidents which may affect the organisation but enable the business to continue. As the business strategies for dealing with threats have developed so in turn we have seen clear activities which have, with continual and ongoing improvement, set out to protect business and enable it to respond to a crisis. These activities can, I suggest, be put forward as four clear generations of development. 1st Generation - Contingency Planning. The original and commonly used in WWII; 2nd Generation - Disaster Recovery. E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

33


Protect Stock, Assets and Cash from theft and robbery*

SelectaDNA gives you day and night time protection against robberies, break-ins and theft. Activated by money clips, panic alarms, pressure pads and a variety of other devices the SelectaDNA Spray can be integrated into your existing security system or installed as a standalone system. DNA identification is feared by criminals worldwide as being identified by a unique SelectaDNA code irrefutably places a suspect at the crime scene. The SelectaDNA Spray can be used in conjunction with SelectaDNA Gels and marking compound to make the whole business a no go area for criminals. *In Police trials SelectaDNA has reduced theft and burglaries by up to 83%.

For more information visit

www.selectadna.co.uk SelectaDNA is a registered trademark of:

Selectamarkplc

Advanced Asset Protection * The SelectaDNA Property marking product is a Secured by Design approved product.

or contact

+44 (0)1689 860757 Selectamark Security Systems plc, 1 Locks Court, 429 Crofton Road, Locksbottom, Kent, BR6 8NL. UK. DA0122/1


BUSINESS CONTINUITY E Developed as Information Technology became established in business; 3rd Generation - Business Continuity. A more holistic approach to encompass business operations and processes, and 4th Generation - Business Resiliency. Extends the boundaries of protection across the organisation. This fourth and latest generation has taken on a significant challenge as it encompasses much of today’s model of business. It is however, one which can be used to reinforce the value of taking clear positive action in the protection and crisis management skills of any organisation. The disciplines of risk management, business continuity planning and disaster recovery planning have played critical roles in helping businesses achieve parts, but not all, of the objective of business resilience. Historically in most organisations the primary objective of disaster recovery planning has been limited to protecting IT infrastructure and services from unexpected events and disasters. Business continuity planning extended the boundaries of disaster recovery planning to the protection of business operations and processes. The objective of a business resilience program is larger than risk management, business continuity planning and disaster recovery planning. A business resilience program extends the boundaries of protection by including within it the ability to managing an incident, build intelligence by exercising plans plus, and hugely important, having the capability and skills to communicate in a crisis. Such communication must be both internally to employee’s etc but also externally to relevant stakeholders, the most important of whom may be customers or, for some, industries regulators. BCM HISTORY Looking back at the history of Business Continuity Management (BCM) there are clear milestones mapping its development. I recall clearly the release by the British Standards Institute (BSi) of Publicly Available Specification 56 (PAS 56) Guide to Business Continuity Management in 2003 and just how welcome this was for those of us seeking best practice examples to refer to when setting up company or corporate wide Business Continuity Management System (BCMS). True this first pass at establishing the idea of a standard had its faults but fundamentally it was a recognised publicly available document which for the first time set out the structure and expectations of a BCMS in a clear and relatively simple way. Following a great deal of work by the hands of expert practioners, working as dedicated volunteers under the support structure of the BSi technical committee BCM/1, PAS56 was developed and enhanced to become BS25999-1 Business Continuity Management Part1: Code of Practice. Followed in November 2007 by BS25999-2 Business Continuity Management

A body of business continuity evidence

Business Continuity

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

To satisfy myself that a supplier has a good quality, effective and current plan in place, note a simple questionnaire is not sufficient to get the answers needed, I would request to see the following which together should provide me with a satisfactory body of evidence. 1. A copy of the supplier’s BC policy. Ideally signed by a member of the board. 2. A copy of the page in the plan or plans that clearly demonstrates version control and sign-off (approval) of the plan. (A plan dated 12 months or more previous to its examination has little current value.) 3.

A copy of an exercise schedule, past and future. Don’t waste time asking to see lots of promises and documents if they haven’t been tested to see whether they actually work in an emergency situation. As with your own plans, testing through exercises and workshops is the most effective way of assessing a Business Continuity programme.

4. Evidence – possibly a document with confidential issues blanked out – of how the supplier captures and corrects issues found during exercises or workshops. Expect such actions to be dated and, unless recently recorded, closed. 5. Qualification of the BC plan creator, for example, member of the Business Continuity Institute, Disaster Recovery Institute or appropriate training in business continuity. 6. Name of the board member responsible for Business Continuity. (This demonstrates commitment to a Business Continuity programme at board level) Part 2: Specification. It is to BS25999-2 that many businesses both in the UK and abroad have become certified. So popular has this standard become that it is the 2nd highest seller of BSi products, second only to ISO9001. These documents, used in association with the Business Continuity Institutes ‘Good Practice Guide for BCM’, another document created and importantly regularly updated by dedicated volunteer expert practioners, have proved to be the backbone of BCM not just in the UK but across many countries. NEW STANDARD Other countries have not sat idly by as Business Continuity Management has developed and several have created their own country standards including the United States, Australia, Singapore and Canada. Such developments prompted the need for a single international standard and so today we have ISO22301 Societal Security – Business Continuity Management systems – Requirements. Which will in time, it is predicated around 18 months from the official release of ISO22301, replace the then to be withdrawn BS25999-2. This new standard in many ways encompasses everything which is needed within a Business Resilience program and market research by a number of certification bodies have indicated that a fast growing number of organisations are seeking to have their current, or as is often the case, new BCMS certified to it. A key reason for this surge of interest is that more and more organisations are insisting that their suppliers should be as resilient as

themselves. Spinning out of the requirements of the Civil Contingences Act mentioned earlier has been the view taken by many of those organisations affected by the act that if they are expected to have a BCMS by law then those who supply to them, or who wish to supply to them, should have this by right and are required to supply evidence of this. The effect of such a requirement has been to drive the principles and good practices of business resilience across many supply chains and this is now becoming understood by more and more organisations as a must have business discipline rather than an luxury for the day when something may or may not happen. No matter how resilient an organisation may become internally, without the corresponding resilience of its critical suppliers it will remain at serious risk of loss of business and possible closure due almost entirely to the failures of others. L ABOUT THE AUTHOR Colin Ive’s experience in Disaster and Business Continuity Management was gained in over 40 years of business, including 26 years as a fire officer commanding a busy fire station in England. Following this, he became the chief risk & continuity manager with global responsibility at Nokia. A member of the Business Continuity Institute and qualified lead auditor for ISO9001 & BS25999 he is an ‘in demand’ presenter at many European and USA business continuity and business resilience conferences.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

35


Helping you to Protect your Physical | Personnel | Information

Assets

We offer Consultancy services - Building your security business by helping you to identify new markets and develop your marketing strategy. Security management training courses, including ; • Security culture course • Searching skills course • Specialist security surveying and consultancy course • Security awareness package for high net worth individuals to keep themselves and their family safe. Business continuity, crisis management and emergency planning software solutions

For more information please visit www.ippso.co.uk

Contact us on 0208 941 4842 e-mail cphillips@ippso.co.uk


TRANSPORT SECURITY

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Chris Phillips & Hughes Boyes

THE TERMINAL: MITIGATING TECHNOLOGY RISKS

Whilst the integration of IT and building management systems in transport terminal buildings can offer significant business benefits, it also creates a number of potential risks, explains Chris Phillips, managing director of the International Protect and Prepare Security Office and Hugh Boyes, project manager at The Institution of Engineering and Technology Well the whole country, and probably the rest of the world has just breathed a huge sigh of relief. The fantastically successful London Olympics has just passed off without any major scares or terrorist attacks. Most commentators including myself felt that the Olympics were too good an opportunity for any ‘would be’ terrorist to miss. Well maybe we have a lot of people to thank. The soldiers who have been busy decapitating AQ in their bases have paid heavy sacrifices to reduce the threat, and the fantastic work of the security services and police in dealing with the local threats, making sure that those who may wish to attack us realise now that they are being watched. This seems to have taken over as the new means of deterring would be attackers. Whatever the tactics we should be thankful for their efforts,

we really don’t appreciate them enough. But has the threat of terrorism really disappeared into memory? That’s pretty unlikely. The terrorist threat seems to have shifted its location to Africa. There are more UK passport holders in Somalia learning and honing their terrorist tactics. So we need to remain vigilant and keep reviewing our vulnerabilities. The high paced changes in the way we do business and travel around the globe bring new issues. REDUCING VULNERABILITIES Mostly, we deal with them, often we identify the issues and are able to put measures in place to reduce our vulnerabilities. Often however the gaps become apparent after an incident. The transport hubs and the very means of travel itself is always going

to be a favourite target for any terrorist or activist. Shutting down an airport or causing delays can cause incredible disruption and distress. So it may be a good time to examine the issues of intelligent buildings and the vulnerabilities they bring. The increasing demand for transport at both international and national levels places pressure on transport terminals, for example airports and railway stations, to efficiently and safely handle the passenger numbers. Economic and environmental factors require the owners and operators of these terminals to reduce the cost of ownership and operation of these terminals. The transport industry’s solution has been to seek innovative IT-enabled solutions to facilitate energy savings and increase the capacity of the terminal buildings. In a world E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

37


R

SER . M -U

E

AT

D

. INTE G R

A

FAC TU U R N

OR . EN

n Four High Level Conferences: n 30 Free to attend Technology Workshops – Aviation Security & Air Cargo – Maritime & Counter Piracy n Networking Functions & VIP Hosted Lunch – Public Transport Security – Supply Chain Security in Association with TAPA n Free to attend Evening Reception n Focused Exhibition

Aviation Supporters

Cargo

Maritime

Supply Chain

For more information please email info@transec.com

www.transec.com/advert12 14-15 November 2012 | Olympia, London


TRANSPORT SECURITY E where any IT system is potentially at risk, regardless of whether it is standalone or part of an integrated system, use of these innovative solutions is not without risk. INTELLIGENT BUILDINGS Given the increased level of systems integration and the complexity of the systems, these transport terminals should be regarded as intelligent buildings, where the combination of technologies and inter-connected systems are essential for the smooth operation of the transport operation. We need to recognise that these intelligent buildings are complex systems and put in place appropriate practices to ensure the safety and security of the buildings’ users. This article examines the issues related to the increasing automation and integration of systems in transport terminals, identifying a number of steps that may be taken to ensure that benefits offered are not offset by the risks potentially inherent in their design and operation. In the past the physical and networking layers would typically comprise a number of different cabling systems, in a variety of configurations delivering connectivity using a mixture of open and proprietary protocols. The pressure to reduce costs has led to technology convergence with the systems now using industry-standard communications and networking protocols which can be distributed over a common physical infrastructure. New and refurbished buildings will typically use a common cabling structure to support a variety of operational, business and facilities management systems. Whilst this makes it easier to manage and reconfigure the flow of data it also creates the risk of inadvertent creation of unauthorised paths between systems. The need for operational efficiencies has also created a demand for increased integration of the applications, the objective being to streamline the capture of data and reduce the opportunities for errors. The provision of a systems integration layer provides the means to share data between the systems and can include access to common data stores or direct messaging interfaces between systems to allow for user access and the exchange of data. An example of this integration is the interaction between systems handling transportation data (e.g., train or aircraft movements) and the passenger information systems displaying arrivals and departure information, where the provision of automated updates can be used to information passengers of changes of delays and boarding locations. This can allow the terminal operators to efficiently manage delays and scheduling changes and improve

the handling of passengers within a terminal. Whilst this integration of systems can offer significant business benefits by providing passengers with accurate up-to-date information on departures from the terminal, it also creates a number of potential risks. The increasing dependence on correct, interruption and error free operation of a range of integrated systems can lead to simple problems having a disproportionate impact on terminal operations. For example the problems with baggage handling systems at Denver Airport and Heathrow Terminal 5 demonstrate how critical the systems are for smooth terminal operation. A SECURE ENVIRONMENT Terminal buildings increasingly fulfil multiple roles, supporting the basic transport function, local and national security functions (e.g. immigration control and customs), and housing extensive retail and catering outlets. The building systems have an increasingly important role in the efficient operation of terminals, to provide a comfortable, safe and secure environment for passengers and staff. The control of building systems is achieved using building management systems (BMS) which typically uses an open protocol running over an IP-based network for all data acquisition and control functions. Terminal security will rely on CCTV systems which are increasingly IP-based irrespective of the physical or data transport layer and on electronic access control systems which control access to restricted and staff only areas. The introduction of a converged infrastructure and integration of building, business and operational systems within transport terminals potentially creates a range of new risks associated with aspects of the personnel, technology and operations. The human elements of a terminal’s operations are potentially the greatest risk. Whether deliberately or accidentally, individuals may seek to bypass security controls or incorrectly operate systems. The integration of systems can significantly magnify the impact of errors or omissions. Systems integration brings together IT and facilities management teams who may have different priorities, cultures and reporting chains. All of these can inhibit an effective response to incidents or faults. From a technology perspective, integration may introduce new failure modes, where the terminal’s building systems can interfere with business and operational systems and vice versa. For example, it is normal for office computers to run the latest anti-

The or df demant at both or transp ational and intern nal levels natio pressure placesransport on t inals term

IT in Transport Terminals - four layers

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The IT systems within a transport terminal can typically be divided into four layers: A physical layer comprising the cable and fibre infrastructure used within and between the systems; A networking layer which operates over a combination of the physical layer and wireless to deliver local area and wide area networking (LANs and WANs) and voice communications; An application layer which comprises a range of applications delivering operational functionality, these will include passenger processing and ticketing systems, luggage and freight handling systems, business and financial systems, safety and security systems, and the facilities management systems (e.g. building and energy management); A systems integration layer which enables sharing of data between the various applications. virus software and be regularly patched. This may not be true for the BMS, access control system or computers used for safety critical systems, thus leading to potential vulnerabilities from malware introduced over the network or from infected media. The use of IP-based technologies creates opportunities for operational savings through the centralising and outsourcing control and monitoring stations. But this can lead to a loss of local knowledge and control. The problem is exacerbated if the support personnel are only deployed in response to incidents as they may not be familiar with the layout and operation of individual buildings. From a security perspective the key issues are protecting the security and privacy of a terminal building’s owners and users, maintaining the integrity of the building and operations within it, and ensuring the continuing availability of the terminal for its owners and users. The security and privacy of the terminal’s occupants and owners may be compromised when the convergence of the technical infrastructures and integration of systems creates unplanned or unauthorised pathways, allowing unauthorised access to systems or data loss. For example, unauthorised access to ticket booking and seat reservation systems may reveal personal data such as E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

39


Complete Communication Solutions

Improved Security using Digital and Analogue Two-Way Radio Communication Systems. Perfect for the Transport, Maritime and Aviation Industries.

Antennas, Duplexers, Filters and Combining Systems.

Come and talk to us about your communication problems. Your system requirements may be large or small, but we think you will be pleasantly surprised at how easy it is to find the solution.

ICOM UK LTD Telephone: +44 (0)1227 741741 e-mail: info@icomuk.co.uk www.icomuk.co.uk

PROCOM UK SYSTEMS LTD Telephone: +44 (0) 1227 743099. e-mail: sales@procomuk.co.uk www.procomuk.co.uk

- Blacksole House, Altira Park, Herne Bay, Kent CT6 6GZ. UK -


TRANSPORT SECURITY E the presence of a visiting VIP or celebrity. The integrity of the building may be compromised if third parties gain access to or control of critical building systems. If a third party were able to disable or take control of building systems it may no longer be safe to continue to occupy the building. This could be due to physical damage (e.g., fire or flooding) or due to threats to the health and lives of occupants. Disabling security and access control could put lives at risk if it allowed access to sensitive areas and may necessitate personnel being redeployed to implement manual checks in place of the automated systems. For energy efficient terminal buildings, integrity might be compromised if the operation of the energy management functions was degraded or disrupted by the actions of a third party, whether by direct manual interference or the deployment of malware. The availability of the terminal may be seriously affected when building systems are disrupted, thus preventing the building from delivering the required functionality. The nature of the availability risk will depend on the type of building and the criticality of the affected building service. As an example, where a BMS became inoperable and allowed the temperature to stray outside acceptable limits, the areas of the building could become inhospitable for the occupants, damage equipment through excessive temperatures, or result in damage to stored materials. This would be critical in an airport terminal for spaces such as the airside lounges and waiting area, where the passengers have already been screen by customs and airport security.

The operational risks need to be assessed and understood from both business and technical perspectives. Knowledge of the terminal’s facilities management team should be commensurate with the sophistication of the systems integration and the impact that system failure will have on the occupants

MISSION CRITICAL Terminal buildings are mission critical environments and as such the risks associated with people, systems and operations need to be appropriately managed and mitigated. The people risks will arise from three constituencies: The owners who need to consider what degree of systems integration is required during the specification, design, construction and the commissioning of the terminal; The operators, including transport, security, catering and retail, and the facilities management operations, the actions of any of the parties can to some degree compromise the integrity of the overall integrated system; Third parties who support the terminal’s operations and its IT systems, particularly if they have privileged remote access to any of the terminal’s systems. The system and technology risks have already been discussed. The mitigation of these risks needs to include an assessment of which features of the terminal and its use are critical and therefore in need of the greatest protection. The mitigation of system risks must also take account of the appropriate use of technology, for example Wi-Fi is susceptible to interference and jamming and should be avoided in safety critical and security systems.

OPERATIONAL RISK The operational risks need to be assessed and understood from both business and technical perspectives. Training and knowledge of the terminal’s facilities management team should be commensurate with the sophistication of the systems integration and the impact that system failure will have on the occupants. There should be cross-training of some IT and facilities support staff to facilitate collaboration during incidents and fault diagnosis. The operations team need to collect feedback from operational users to understand whether the terminal is supporting or hindering them. This is important as regular users will often seek to bypass controls if they feel they hinder rather than support the user. The risks and their mitigation should be addressed in a holistic fashion for all implementations, but are essential for multioccupancy and multiple-use buildings where the needs and priorities of the users will vary. To safely and economically handle the increasing demand for transport at both international and national levels, transport terminal operators will need to maximise the capacity of their terminals to support larger aircraft and faster trains. In response to these pressures, the terminals are and will

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

continue to become increasingly intelligent with more integration of the IT systems. This introduces new or novel risks in the terminal environment, some arising from the integration of traditional separate systems, others as a result of the increasing risk of cyber-attacks on any IT-based solution. This is a relatively new and evolving area, so there is a need for terminal owners and operators to ensure that currently novel risks are fully understood and addressed throughout the terminal’s lifecycle. There are a few things that we can be confident about: Our desire to travel is not likely to reduce in the foreseeable future; We are going to want to travel, faster, cheaper and with less disruption; The use of technology will move at a frightening pace; Unfortunately there will still be people and groups out there who want to cause us harm. We must ensure that all vital technology is secure. Buildings that are so vital to our evolving society must consider future threats to ensure they are secure and protected. L FURTHER INFORMATION International Protect and Prepare Security Office (IPPSO) www.ippso.co.uk

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

41


Dor-O-Matic Bomb Rated Automatic Doors Dor-O-Matic Bomb rated automatic package installed at Heathrow T5 (© BAA Limited see www.baa.com/photolibrary) and below, on test using a 100kg TNT explosive device

• Successfully tested to withstand a 100kg TNT explosion at both 25 metres and 45 metres – similar to a typical car bomb • Tested in accordance with US General Services Administration, International Standards Organisation and Bomb Blast Standards – met and exceeded GSA (C) and ISO EXV 45 and ISO EXV 25 standards • Protects building occupants from high velocity shards of glass and ensures security integrity

• After the blast test the doors were attacked with a 5lb sledge hammer to simulate forced entry • Doors retain the appearance and functionality of standard automatic door systems • Particularly designed for high risk areas such as Government offices, transport hubs, public buildings, military establishments and financial institutions

For further information tel: +44 (0) 1922 707400

To view dramatic footage of the test explosion visit

www.bombblastdoors.co.uk


TRANSPORT SECURITY EXPO

TRANSPORT SECURITY EXPO CELEBRATES ITS TENTH YEAR Delegate numbers for this year’s Transport Security Expo, taking place at Olympia on 14-15 November, have hit a record high, reflecting renewed concern over transport security issues. This year’s Transport Security Expo marks its 10th anniversary with exhibitor and delegate numbers hitting record highs. The boost reflects renewed concern over aviation, maritime, mass transit and supply chain security. Visitors to the two-day annual event will therefore experience a much expanded exhibition, conference and workshop programme, very clearly focused on the most pressing issues at hand. Being held once again against a backdrop of ongoing tension on the world stage, an industry wide threat level that remains high, and fundamental policy changes under review, Transport Security Expo will reconvene at the Olympia Exhibition & Conference Centre with an unprecedented level of support from governmental entities, the vendor community and key trade associations from 14-15 November 2012. News that significantly more industry leading suppliers of products and services will exhibit at Transport Security Expo reaffirms that the sector remains buoyant despite the harsh economic climate. A three-fold increase in conference delegate numbers underscores the fact that Transport Security Expo remains a world-class event firmly established in the calendar of industry professionals. A SETTING TO FORMULATE STRATEGY Transport Security Expo is not only renowned for its high level conferences addressing principal concerns in the aviation, maritime, mass transit and supply chain security arenas. Each year it hosts a series of closed door meetings – this time dedicated to ATOC (Policing & Security Forum), ITS (Security Special Interest Group), BIMCO (Ship Owners/CSOs) and AON (Crisis Management Workshop) – which bring senior level government and industry people together in a secure setting to formulate strategy going forward. Open door technology workshop events at Transport Security Expo focus upon mitigation techniques across the threat spectrum, delivering real world and mission critical insight. Transport Security Expo actively supports exhibitors and buyers alike, with a dedicated programme aimed at bringing key people together, to exploit potential industry-wide business opportunities across the possible threat spectrum, during its annual industry

professionals gathering. While reflecting upon the seemingly intractable security challenges that continue to bedevil the collective transport industries, Transport Security Expo’s extensive conference programme aims to bring clarity to the threats currently faced and those that may be over the near horizon. Transport Security Expo delegates have frequently debated best practice techniques to mitigate or head off the potential impact from the terrorist or criminal fraternity over the past decade. Significant security issues remain across the transport domain space and they could combine to create the perfect storm conditions to

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

floor space. Delegates, exhibitors and visitors will also benefit from on-site, purpose-built catering and other enhanced facilities. Conference chairmen include Andrew McClumpha, director, LeighFisher; Mathew Finn, managing director, Augmentiq, Chris Trelawny, deputy director Maritime Security and Facilitation, International Martime Organisation (IMO), Giles Noakes, chief maritime security officer, BIMCO, Neil Skelton, head of professional services, ITS UK and Chris Lynch, transport security lead, Deloitte. Over the past decade we have discovered to our cost that terrorist organisations are resourceful and nimble adversaries, with the capability to strike when least expected and from often times unexpected directions. In these times of austerity the transport sector must do its bit to do more with less and plug these gaps in the overall security architecture.

“Through extensive research and widespread industry outreach we have focused each of the conferences toward identifying threats and real world methods of mitigation.” have serious and long lasting impact. Within the context of the aviation, maritime, mass transit and supply chain sectors, six specialised Transport Security Expo workshops will focus on passenger screening, freight and cargo security, terminal and facilities protection, perimeter security & hostile vehicle mitigation, shipping protection and rail security. ADMIRAL LORD WEST OF SPITHEAD Transport Security Expo is delighted to announce that Admiral Lord West of Spithead will host a luncheon for dignitaries and senior ranking officials in the global transportation arena. Lord West produced the United Kingdom’s first National Security Strategy and Cyber Security strategy as well as formulating a series of other groundbreaking strategies. These included the counter-terrorist (Contest 2); Chemical Biological Radiological and Nuclear (CBRN) and Cyber Security policies of Her Majesty’s Government. Lord West left government in 2010 and currently acts as a strategic advisor across the defence and security sector. Transport Security Expo features an expanded exhibition; conference and workshop programme with two-thirds more

Commenting on the forthcoming event, managing director David Woodbridge said: “Through extensive research and widespread industry outreach we have focused each of the conferences toward identifying threats and real world methods of mitigation. These expanded conferences also introduce the relatively new concept of The Great Live Debates, allowing delegates from across the globe to fully engage in the important discussions at hand.” “We continue to work in a tough economic environment but budgetary constraint should not distract us from the ultimate goal of making the transport infrastructure more secure than it is today. These conferences help to identify the key security issues faced in each of the transport fields and could potentially help attending delegates to make informed decisions as to where tight budgets should be focused. We look forward to welcoming those with primary responsibility for security within the transport world back to London Olympia” concludes Woodbridge. L FOR MORE INFORMATION Transport Security Expo is a preregistration only event, registration will not be permitted on-site. Complete the registration form on www.transec.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

43


Highly Innovative and New Type of UVIS to UK EXCLUSIVE TO LAPA SECURITY SOLUTIONS LTD

Under Vehicle Inspection System (UVIS) MOBILE OR PERMINANT INSPECTION UNITS AVAILABLE Capable to scan a vehicle whilst stationary, viewing above strut bars and other vehicle components from multiple angles and magnification. Live 3D colour feed with full recording. System automatically scans chassis using pre programmed sequencesor manual. For further info please go to www.lapasecurity.co.uk.


Lapa Security Solutions Ltd is a multi-disciplined company of the highest quality, providing professional security personnel and canine response for all types of counter - terrorist work. With full management back up to all our work, we understand the need to be cost effective without compromising standards. We have our own Kennels and training facility and conduct canine training courses and live scenarios all in accordance with relevant and appropriate standards. Because of the nature of work and the diversity of the dog we can offer and supply a fully compliant search dog in the field that you require. We have the following detection dog teams available for deployment: 3 Explosive detection dog teams 3 Explosive vehicle Search Teams 3 Drug detection dog teams 3 Body detection dog teams, for the detection of illegal immigrants or stowaways. 3 Tobacco/counterfeit detection dog teams 3 Cash detection dog teams 3 Bed Bug dog teams 3 Other detection dog teams available with given notice 3 General Purpose Qualified Security Dog Patrol Teams

LAPA SECURITY SOLUTIONS LTD Main office: Unit 3 Wested Farm Eynsford Road, Swanley Kent BR8 8EJ Central London Office:85 Tottenham Court Road W1T 4TQ

Office: 01322 615271 Fax: 01322 615954


www.security.bfioptilas.co.uk

Experience the high performance of thermal IP cameras Meet the new range of ONVIF™ compliant thermal imagers NEW WatchMaster® IP Elite from DRS Technologies Delivering a level of performance previously unseen for day and night surveillance with thermal IP imaging cameras. ONVIF™ compliant cameras allow full integration into IP CCTV systems for 24 hour security, evidential data capture, and improved response in monitoring borders, critical infrastructure and homeland security.

Call our experts in imaging solutions on 01908 326308 for a demonstration

Get in touch: Tel : +44 (0)1908 326326

Email : info.uk@bfioptilas.com

design. consult. integrate.


TRANSPORT SECURITY

Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. In the European Union alone, the cost to businesses is estimated at 8.2 billion Euro a year and growing. Jason Breakwell, director of the Transport Asset Protection Association (TAPA) explains how the association goes about helping to protect its members assets through the Incident Information Service. The cargo crime threat no longer comes just from opportunist criminals. Today, organised crime rings are operating globally and using increasingly violent attacks on vehicles, premises and personnel to achieve their aims. The Transported Asset Protection Association (TAPA) represents businesses fighting back against cargo crime that want to use real-time intelligence and the latest preventative measures to protect goods in the supply chain. TAPA is a unique forum that unites global manufacturers, logistics providers, freight carriers, law enforcement agencies, and other stakeholders with the common aim of reducing losses from international supply chains. Today, in Europe, the Middle East and

Africa (EMEA), the Americas and Asia, TAPA’s membership is at its highest ever level – and growing month-on-month. The Association’s 700+ members include many of the world’s leading consumer product brands as well as their logistics and transport providers with combined annual sales of over US$900 billion, law enforcement agencies (LEAs), insurers and other trade associations. The Association’s

mission is to help protect members’ assets by: Exchanging information on a global and regional basis; Co-operating on preventative security; Increasing support from the logistics and freight industry and from law enforcement agencies and governments, and; Promoting and enhancing TAPA’s globally recognised and applied Security Requirements. It is TAPA’s firm belief that a secure E

Written by Jason Breakwell, director, TAPA

IIS OFFERS INCREASED SUPPORT IN THE FIGHT AGAINST CARGO CRIME

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

There is anecdotal evidence that organised criminals and gangs are actively engaged in cargo crime and it is possible that funds from their activities filter back to terrorist groups.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

47


Creator of electronic access solutions

Included Modules

Great Features

INTEGRATED ACCESS CONTROL Edition 5.1

GUARD TOUR MANAGEMENT

LIFT CONTROL

Introducing Centaur Integrated Access Control, CDVI group’s flagship access control platform.

PARKING MANAGEMENT

78

56 3

1

Versatile and secure, Centaur offers flexible installation using a multitude of connection methods from hard wired to IP, Centaur provides access control from 1-64 sites local or remote.

VISITOR MANAGEMENT

Powerful Integration

DVR & NVR

TIME & ATTENDANCE

GRAPHICAL INTERFACE

With market leading functionality and many add-on modules included as standard, why not make Centaur your access control platform of choice?

ALARM INTEGRATION

2 4

CARD COUNTER

Featuring powerful integration with CCTV, Fire, Intruder and Biometrics, Centaur is constantly evolving to fulfill your access control requirements.

IP CAMERAS

* Refer to Limited Lifetime Warranty condtions.

ALARM MANAGEMENT

ENERGY MANAGEMENT

BIOMETRIC INTEGRATION

CDVI Reader Technologies

STAINLESS STEEL MIFARE®/DESFIRE® READER

RF RECEIVER

Perfect to install in the following enviroments.

BIOMETRIC READER Commercial

STAINLESS STEEL PROXIMITY READER

POLYCARBONATE PROXIMITY READER

Industrial

Public Buildings

Multi-tenant Occupancy

LONG RANGE READER

CDVI UK Scan the QR code to download the Centaur Brochure

www.cdvigroup.com

Unit B1, Knaves Beech Business Centre, Davies Way, Loudwater, High Wycombe, HP10 9QR Tel: 01628 531300 www.cdvi.co.uk


TRANSPORT SECURITY

E supply chain equals a safe supply chain, minimising the risk for infiltration of the chain by those who are looking to profit from stealing goods also reduces the opportunity for a terrorist act. Although TAPA is not aware of any direct links from cargo crime to terrorism, there is anecdotal evidence that organised criminals and gangs are actively engaged in cargo crime and it is possible that funds from their activities filter back to terrorist groups. When it comes to preventing crime, fast and accurate intelligence is critical. TAPA’s Incident Information Service (IIS) constantly captures and shares data, enabling members to use the latest cargo crime intelligence to avoid incident ‘hotspots’, protect valuable goods in transit and, if required, to report and trace stolen property. IIS intelligence is provided to the service by individual TAPA members and law enforcement agencies (LEA) and is made available to members using fast incident information email alerts as soon as new incidents are reported, quarterly bulletins (available in four languages), an online database and via TAPA EMEA’s monthly newsletter. IIS acts as a centralised resource of knowledge related to criminality against freight in transit within the EMEA region and to facilitate the dissemination of that information to member companies and to LEAs. Additional benefits of IIS include: rapid dissemination of incident reports support the investigation process and recovery of stolen items; statistical analysis of ‘high risk’ routes and geographical areas to allow corrective and pre-emptive actions; Increased awareness of cargo theft problems at local, national and international levels; access to a database of incidents against members’ freight shipments can be stored in a common format, analysed and made available to all members and to relevant law enforcement agencies; use of a managed directory of

contacts within LEAs, manufacturers and logistics security personnel, and; links to sources of manufacturers’ product descriptions to support investigative activities Recently TAPA EMEA IIS quarterly report has provided an analysis of cargo theft data recorded in the IIS from April 1 to June 30, 2012. A total of 49 incidents were recorded in the EMEA IIS system in the second quarter of 2012 (down from 58 during the same period in 2011). The EMEA region had nine countries that recorded incidents, which were classified as the following: 35 general incidents, 13 major incidents and one attempt. The average loss for incidents with reported values during this quarter was €131,204. The average loss value for Q2-2012 is substantially lower than the one recorded during the same

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

with 12 incidents, was the product category most targeted during the second quarter (as it was during the same period in 2011) closely followed by the Food & Beverage category which counted for 11 incidents. Consumer electronics was the third-most targeted category with 7 incidents, followed by the Non-electronic category with 5 incidents. The type of incidents most frequently reported during Q2-2012 was Theft of Vehicle with 17 incidents, Theft from Vehicle with 14 incidents and Burglary with six incidents. Theft of Vehicle alone accounted for almost a third of all recorded incidents, at 34. In addition to this information, TAPA’s members and Law Enforcement partners are able to drill down looking for trends or country focus on hot spot crime occurrence which could also lead to other illegal activities.

TAPA’s security requirements have been established by security professionals within the high value, high risk product sector to address the nature by which goods are handled, warehoused and transported as they move throughout the world. period in 2011 when the average loss value was €193,385. Note: Trucks thefts without associated cargo loss and attempts are not included in the Q2 analysis to facilitate an accurate view of cargo crime incidents. Q2 INCIDENT INFORMATION SYSTEM UPDATE The countries with the most recorded incidents in Q2 were Germany, Italy, France, United Kingdom and Austria. Together these five countries accounted for 86 per cent of all the incidents recorded in this quarter. Metal,

RISK MANAGEMENT STANDARDS TAPA Security Requirements are recognised globally as the industry standard for cargo facility and transport security, notably: FSR (Freight Security Requirements); TSR (Trucking Security Requirements), and; TACSS (TAPA Air Cargo Security Standards). These standards have been created and are regularly updated by security and logistics specialists to help TAPA members reduce losses and provide a platform for more uniform conformance with best of breed security. TAPA certified carrier hubs and depots guarantee minimum E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

49


B U I LT O N I N N OVAT I O N

INSITU CONCRETE PERIMETER DEFENCE SYSTEM PAS 68:2010 accredited security system 7.5t vehicle (N2/N3) up to 90째 impact at 64kph and 80kph

PREDOMINANTLY SURFACE MOUNTED

RAPID PROFESSIONAL INSTALLATION

50 YEAR DESIGN LIFE WITH MINIMAL MAINTENANCE

THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK

ACTS AS FOUNDATION FOR FENCES, LIGHTING AND CCTV

MINIMAL FOOTPRINT HIGH PROFILE CLIENT PORTFOLIO

Web: www.extrudakerb.co.uk | Email: security@extrudakerb.co.uk

Tel: +44 (0) 1709 862076


TRANSPORT SECURITY E security standards for manufacturers and are suitable for inclusion in contractual agreements. TAPA’s Security Requirements have been established by security professionals within the high value, high risk product sector to address the nature by which goods are handled, warehoused and transported as they move throughout the world. They specify the minimum acceptable security standards for assets travelling throughout the supply chain and the methods to be used in maintaining those standards. In addition, they outline the processes and specifications for companies to attain TAPA certification for their facilities and transit operations. TAPA Security Requirements provide a valuable quality and security benchmark for manufacturers that want to choose logistics providers that meet or exceed TAPA’s certification requirements. The successful implementation of these standards is dependent upon suppliers, TAPA certified auditors and customers working together to accurately interpret, adopt and audit security standards against these requirements. All TAPA standards are independently audited.

to set international agenda on land transport security and participated in forums hosted by the Organisation for Security & Co-operation in Europe. Last year TAPA EMEA was invited to share its concerns and views with both the EU and the UNECE on issues which would assist in making the supply chain more secure from criminals, and thus those with terrorist agendas. The Key Areas for EU discussion included, initiative on Drivers’ ID, Grants for secured parking, designated Prosecutor for Cargo Crime, initiative on data sharing between EU members and TAPA IIS, and Safe and Secure lanes for cargo. CHALLENGES FACING MEMBERS One of the many challenges that face TAPA members, especially those involved in the transport sector, relates to driver IDs. Due to the ease with which the EU workforce can move within the Member States, it is difficult to know if a driver has been involved in supply chain crimes elsewhere before being placed in charge of a high value or sensitive consignment of goods or materials. Another recognised challenge facing the supply chain is how to protect a stationary vehicle. Over the last few years, TAPA members have seen an increase in the number

nt’ ‘Vigila nthly mo is the crime cargo vailable A e, a updat bers of TAP , d m a for me. To downlo / EMEA tinyurl.com visit 4hqffc c

PUBLIC PRIVATE PARTNERSHIP Regulatory affairs represent a key area of TAPA EMEA’s agenda as it works to protect its members’ interests and bring about positive changes in security legislation, practices and attitudes in the supply chain and insurance communities as well as with law enforcement and other government agencies. This involves day-to-day liaison and exchanges of information with law enforcement authorities to raise awareness, increase co-operation and facilitate more pro-active and effective anti-crime activities. In support of the combined objectives of the Association and partners, TAPA EMEA members also form Working Groups to develop, progress and implement its objectives. TAPA EMEA also spends considerable time and resources advising and lobbying European and other government authorities to ensure members’ interests are represented at these levels. For example, seeking conformity between European security regulations and TAPA security requirements. TAPA has achieved great success in bringing cargo crime to the political agenda in crime ‘hot spots’ in Europe. For example, in the Netherlands, in response to a campaign driven by TAPA, the Dutch government has appointed a special Prosecutor dedicated to the fight against cargo crime. TAPA has also had input into the United Nations’ work

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

appointment followed a motion in Parliament, which was adopted by a wide majority in both governmental and opposition parties after much procrastination between the Parliamentary Committee of Justice and the Secretary. The main concern for the Committee had to do with questions over the volume of incidents and if there would be a sufficient number of incidents reported formally to the Police to warrant the post. TAPA would welcome other countries following this initiative A pilot secure lane project on the corridor from Venlo (Dutch-German border) to the port of Rotterdam has shown a massive reduction in transport crime: from 74 reported incidents along this corridor in 2009 to 4 incidents in 2010. This was

Last year TAPA EMEA was invited to share its concerns and views with both the EU and the UNECE on issues which would assist in making the supply chain more secure from criminals, and thus those with terrorist agendas. of attacks on vehicles when they are parked, as they fall easy prey to a would-be thief. After the publication of the Secure European Truck Park Operational Services (SETPOS) best practice handbook and the LABEL project, TAPA introduced its Truck Parking Assessment Program, which includes the uses of its Parking Standards Recommendations to assess the security provision found at parking locations throughout the EU. TAPA would like to see EU support and funding to create more secured parking facilities. In November 2009, the Secretary of Justice for the Netherlands announced that as of 1 May 2010, they would be appointing a National Prosecutor for the coordination of the activities against cargo crime. This

achieved through the implementation of cameras, connected to a Police database, with the capability to recognise both license plates and vehicle movements on and between parking areas, truck stops and restaurants along the corridor. The cameras send a signal to a regional control room for any suspect license plates or vehicle movements where private parties observe and assess the information in real time. TAPA believes that the introduction of more secured lanes throughout EMEA will help ensure both a secure and safe supply chain. L FURTHER INFORMATION www.tapaemea.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

51



EMERGENCY SERVICES SHOW

INTEROPERABILITY AND COLLABORATION HELP ENSURE PUBLIC SAFETY

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Discuss best practice and network with like-minded professionals at The Emergency Services Show, which takes place on Wednesday 21st and Thursday 22nd November at Stoneleigh Park, Coventry

The role of the emergency services has come under particular scrutiny over the past year as the UK hosts a number of important events including the Diamond Jubilee and the 2012 Olympic and Paralympic Games. These high profile events have thrust the emergency services in to the public eye and have opened up discussions around the importance of interoperability between the blue light services. OLYMPIC SUCCESS The most recent success for the emergency services was the London 2012 Olympics; one of the biggest security challenges the UK has faced for a number of years. With security levels at their highest, pressure was on the emergency and resilience industry to guarantee that correct plans and procedures were in place to ensure that the various events being held across the country ran as smoothly as possible. The Olympic Torch Relay and the Games themselves saw thousands of people flocking to London and their local towns and cities and with no serious incidents, proved to be outstanding

The Emergency Response Zone features exhibitors from fire and rescue, police, ambulance, government and organisations from around the UK demonstrating the capabilities of partnering agencies and the voluntary sector examples of blue light collaboration and efficient emergency planning. Joint training exercises before the games allowed the different services to improve their knowledge and understanding of each other’s systems, building new relationships and partnerships that prove so invaluable when taking part in large-scale events. Other events such as the terrorist alert at the M6 Toll and the widespread flooding throughout the UK saw all emergency services come together to offer a collective support network. Although the M6 Toll alert was eventually proven to be a false alarm, it was reassuring to see all emergency services including police, fire

and ambulance responding quickly and effectively to a potential terror threat. Networking and collaboration with suppliers, colleagues and partner agencies is and will continue to be an essential part of ensuring an emergency is dealt with as efficiently and effectively as possible. EXPLORING NEW IDEAS The Emergency Services Show 2012 is the ideal place for emergency planners, business continuity and resilience professionals to explore new ideas and initiatives in delivering efficient and effective emergency planning, as well as networking with like-minded professionals E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

53



EMERGENCY SERVICES SHOW E to discuss collaboration, ideas and initiatives focused on improving public safety. There will be a range of suppliers exhibiting at the show including CFOA National Resilience, Government Decontamination Service, Emergency Planning College, Babcock, Fire Service College, Emergency Planning Society, Civil Contingencies Secretariat and British Red Cross that will be on hand to demonstrate their latest innovations and developments and to talk about cost saving initiatives. New exhibitors for 2012 include Falck Emergency Services UK, Arco, Training 4 Resilience, Serco Combined Resilience and Explosive Learning Solutions. EMERGENCY RESPONSE ZONE The Emergency Response Zone features exhibitors from fire and rescue, police, ambulance, government and voluntary organisations from around the UK, demonstrating the capabilities of partnering agencies and the voluntary sector – an ideal opportunity to discuss interoperability. As well as the exhibition, there are also a number of educational opportunities available to visitors including the National Interoperability Summit and the CBRN

Decontamination Workshop run by the Emergency Planning Society (EPS) and the Government Decontamination Service. The CFOA National Resilience team will also be on hand to demonstrate its range of flood equipment and to discuss their role in the latest flooding, that in some areas of the UK devastated whole communities. NATIONAL INTEROPERABILITY SUMMIT The National Interoperability Summit at The Emergency Services Show will be providing a platform for discussions around this critically important topic that is being supported by the Home Office, Cabinet Office, Department of Communities and Local Government and the Department of Health. Debates will cover an overview of the Joint Emergency Services Interoperability Programme (JESIP), an Olympics de-brief, perspectives from ACPO, CFOA and AACE, the Government’s aims and priorities and external challenges from the worlds of law, academia and the military. CBRN DECONTAMINATION WORKSHOP The EPS CBRN Professional Working Group, in association with the Government Decontamination Service, will be holding a CBRN Decontamination Workshop at

The Emergency Services Show 2012. The workshop has been developed following concerns amongst local authority staff about the challenges posed by decontamination after a CBRN incident and uncertainty in how to deal with such events. The workshop aims to educate local authority staff, in particular, in the issues around CBRN decontamination and to improve their ability to manage decontamination incidents. The workshop, sponsored by the Health Protection Agency, will include speakers from the Cabinet Office, Home Office and Government Decontamination Service. The cost of attending is £35 for the public sector and EPS members and £45 for others.

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

LINKEDIN The Emergency Services Show will be hosting a number of discussions on LinkedIn running up to and during the event. To join in with relevant industry news join The Emergency Services Show LinkedIn Group. L REGISTER NOW Date: 21/22 November Location: Stoneleigh Park, Coventry www.emergencyuk.com

Products available at Emergency Services Show 2012 n Safety Certified Lights

AccuLux has developed a new generation of hand held torches and helmet lights. AccuLux safety certified lights are rigorously tested to the strictest classification standards and are the benchmark safety tools for professionals, used in electricity utilities, municipalities, filling stations, the oil and gas industry, and also by firefighters, safety inspectors, confined space workers and many more. These have all been tested for use in explosion-hazardous areas 1, 2, 21 and 22, ATEX directive II C, T4. www.acculux.de

n Incident Commander

The Chirange Incident Commander tablet application is a powerful new visual communications tool for fire and police commanders that integrates secure enterprise information sharing with real-time GPS tracking of personnel and assets, and being an entirely mobile solution is very quick to deploy at any size of incident or operation. Designed to complement radio communications, Chirange provides officers with instant access to visual data and operational information wherever they are located. The application can mould itself to how you work, with extensive customisation options that permits organisations to easily deploy a fine tuned solution that meets their particular requirements. The Chirange application combined with the new Casio

V-T 500 rugged tablet creates a powerful tool for incident management, with an essential daylight readable display, full shift battery and even a digitizer pen for form input and on screen annotation. www.chirange.com

n Hotspotter heat scanning device Vimpex, the specialist supplier of PPE, technical rescue products and telescopic masts, has launched the HotSpotter heat scanning device. Developed by Product Innovation Ltd, the HotSpotter is a simple hand tool for fire fighters and others involved in fire prevention and post fire investigation. It detects and locates small areas which are hotter than the surroundings - both in a building and outside. It senses the infrared radiation being emitted by a local hotspot. By scanning a wide area it allows the user to quickly detect and locate a region for further investigation. The HotSpotter is robust, waterproof and is easy and intuitive

to use, costing a fraction of the price of a thermal imaging camera. The unit has both audio and multi-coloured LED outputs. In simplistic terms the audio output is similar to a Geiger counter - the hotter the area compared to the surroundings, the higher the frequency. Similarly, the LED’s form a simple multi-coloured bar graph indicating the temperature changes from ambient. www.vimpex.co.uk

n Eclipse LD Thermal Imaging Camera

The new thermal imaging camera from Bullard, the Eclipse LD is a lightweight thermal imager weighing 910 grams. It features a 3.5-inch display, resolution up to 320 x 240. An in-built video recorder that can record up to five hours of footage with downloading via a USB cable requires no external software. Attached to the fire fighter tunic Eclipse LD sits comfortably in the user’s hand and can be easily operated even when they’re wearing gloves. Eclipse LD records temperatures of up to 632 degrees Celsius and displays this E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

55


Focus RX - the new name for OTL

BA Adaptor developed by Ophthalmic Technologies Limited

When it comes to specialist knowledge of prescription safety eyewear few, if any, optical glazing laboratories can stand shoulder to shoulder with Focus RX. Recently rebranded to reflect its unswerving focus on ophthalmic expertise, Focus RX has spent more than two decades carving a solid reputation as industry specialists for prescription safety eyewear. You may know them better as Ophthalmic Technologies Ltd (OTL). As OTL they became particularly well-known for working in partnership with their customers, and going the extra mile. They understand that a little extra time spent understanding their customers’ needs, translates to satisfaction on both side and can reap the rewards of added value. For example the BA Optical Adaptor used by the fire service and in other environments where a full-face visor is needed, was developed to enable them to be worn in comfort by anyone needing prescription eyewear. Focus RX is unusual in that safety prescription has been its main focus. This area requires specialist knowledge and understanding of safety standards over and above the traditional requirements of optical glazing, lens choices, tints and coatings. Manufacturing by an experienced specialist optical team is to to British and European Standards ISO EN 9001-2008. Safety eyewear is kitemarked BS EN 166. The philosophy of building relationships with clients to ensure mutual satisfaction is reflected in the company’s ethos at their head office in

Worthing, West Sussex. Each department has its own area of responsibility and plays a contributory role in the production of quality eyewear. Managing Director Derek Winton explains : “Collectively we have more than three hundred years’ experience in ophthalmics, so there isn’t much that can surprise us. I think when a job comes in that has a particularly unusual or demanding prescription, it’s a challenge to us to make sure the finished product looks the best it possibly can. People won’t wear safety eyewear unless it’s comfortable and they can see what they are doing properly so it’s really important to get it right. “Obviously if you’re working in a situation where you need safety eyewear there has to be an element of danger. No more so than in the military or emergency services. We often work with these to find solutions for those needing to wear full face visors and prescription eyewear. We are all as pleased as the customer when it proves so successful. “I think our staff retention here is excellent and it makes life a lot easier. When staff leave they often take a lot of history with them - it’s the little things that don’t get written down that can make a difference. That’s something we all like to focus on too. The little things that, together, make such a big difference to our customers.”

For further information on Focus RX eyewear and a copy of the safety eyewear brochure, please call 01903 212316 or visit our website www.focus-rx.com


EMERGENCY SERVICES SHOW n T800 LED torch

E figure both numerically and as a moving bar. Different heat levels are shown as yellow (temperatures >250ºC), orange (400-500ºC) and red (>500ºC). Plus there’s Bullard’s patented Electronic Thermal Throttle (ETT) for identifying hidden sources of heat. These are shown in various shades of blue, but the colours are not so intense that the structure of the room (walls, furniture) can still be easily recognised on the display. The result is a 3D-style image with blue highlighted heat sources that are easier to locate. www.bullard.com

The Smithlight T800 provides a maximum of 800 lumens. This super bright 10watt tactical LED flash light with a USA CREE XM-L T6 LED has high, dim and strobe functions and can run for 2.5hours on high output and 48 hours on low. It runs from a li-ion 7.4v 4400mah battery. Constructed from aircraft grade aluminium and weighs 436grams without it battery and measures 26.5cm x 6cm. smithlightint.com

n Trapper

n Easy Street Draw traffic modelling tool

Easy Street Draw from Explosive Learning Solutions is an effective diagramming tool that can be used by police forces and other safety agencies for traffic modelling, including crash scene diagramming, evacuation route and special event planning. The program uses drag and drop technology for a large library of ‘intelligent’ objects that make the job of diagramming an accident scene, quick, easy and accurate. Easy Street Draw increases the speed and accuracy with which field operators graphically document scene details and can improve field and command staff reporting. explosivelearningsolutions.com

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

n LifeCare 2 - four-in-one

The new ARGUS PRO LifeCare 2 is a defibrillator, pacemaker, patient monitor and 12-channel ECG in a compact design. It heralds a new age in rescue services, meaning that paramedics no longer need to carry unnecessary ballast. Thanks to the skilful use of leading-edge technology and the robust lightweight construction that is also used in aircraft construction, Schiller has designed a defi/monitor withbuilt-in ECG unit that satisfies even highest expectations. www.schiller.ch

Trapper is an equipment checking tool developed in conjunction with the UK defence industry for improving the speed and accuracy of vehicle equipment checks. Trapper leads you through the checking process, eliminates transcription errors, manages equipment assets and generates all your paper work for you creating a full audit trail. Trapper can carry out a variety of checks which need to be documented, from life saving equipment on an ambulance to armour and weaponry on a tank. The Deployed Solution takes your office to the frontline. Designed to the toughest of specifications, requiring minimal user maintenance, with the ability to be powered off almost any infield charging source, the deployed solution allows you to harness the power of modern computing in the harshest of conditions. www.tmsss.com E

Communication systems that can think for themselves There are many VHF/UHF/microwave communication systems in use around the world, many of which are highly directional point-to-point systems. But for security purposes there is commonly also a need for the interception of these and placing active personnel in close proximity to these for close-in interception has risks. But the French firm of Antennares, who are part of the UK based SMC group of companies, has designed an innovative system to overcome these limitations. To receive signals from a distance requires a high gain interception antenna system, and as interception is often required over a period of time, a remote system has enormous benefits. The Antennares Steerable Broadband Dish Antenna System is housed in a rapid deployment ‘flight case’ arrangement, and tactical deployment of the entire system can be carried out by a three-person team in just 15 minutes. Following this the personnel can rapidly leave, safe in the knowledge the system has been successfully deployed and is ready to intercept communications from any line-of-sight range from the installed location. The system covers 2-40GHz and can be remotely controlled from anywhere in the world. It has a built-in electronic compass

for steering and a built-in GPS for location information, so it is a simple but very effective ‘deploy and run’ system, literally thinking for itself and can automatically steer itself to the required interception target.

In addition a high torque of 140Nm allows further antennas to be added if required, such as VHF/UHF log periodic yagis. The antenna system is mounted on a heavy duty tripod with a telescopic centre section and extendable legs, all of which can be collapsed for storage and rapid transportation. For local control a joystick and keypad as well as a PC link are fitted on the rack-mountable controller, which is also fully remoteable via Ethernet. SMC can also design custom solutions to customer specific requirements, which the company has been successfully doing for over 50 years. Systems for installation in fixed locations are also available, including radome enclosed units. SMC also manufactures a wide range of fixed and tactical HF antenna systems together with the Hilomast range of pneumatic masts, extendable up to 30m (100ft), high accuracy positioners, and provide radio communications solutions to commercial and government security organisations throughout the world. SMC has design and manufacturing facilities in the UK, France, and the USA. FOR MORE INFORMATION www.smc-comms.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

57


Meet the team from SP at the Emergency Services Show on stand 66

Sign up to our newsletter to get all the latest news and special offers and from SP www.spservices.co.uk/signup

Unit D4, Hortonpark Estate, Hortonwood 7, Telford, Shropshire, TF1 7GX

Tel: 01952 288 999

www.spservices.co.uk http://www.spservices.co.uk/facebook

http://www.spservices.co.uk/twitter


EMERGENCY SERVICES SHOW n Casio Tablets

The V-T500-GE, V-T500-E, V-N500-GE and V-N500-E tablets can withstand a drop of up to one metre, as well as being dust-proof and splash resistant to comply with IP54 standards. The unit is powered by a high-capacity interchangeable batteryTHE with aNEW life of upSP to 122012 hours, making it ideal for prolonged use in busy CATALOGUE IS an environments. Other features include OMAP4460 1.5GHz dual core CPU, front- and NOW AVAILABLE rear-facing 5 mega-pixel cameras, a highquality 10.1-inch screen offering excellent readability and capacitive touch panel, and a digitiser pen for added input options. The new tablets also provide robust security options and are equipped with an NFC Reader/Writer that can authenticate user login using a non-contact smart card, and also a Secure Access Module (SAM) slot for applications requiring a higher level of security control. www.casio.co.uk

n Hot Pack Flameless

In 2012 Canland further developed and patented a new flameless heater by removing the calcium oxide ingredient and introducing sodium carbonate, together with other

non-hazardous chemical ingredients. The outer bag, containing the chemicals, was also strengthened to prevent puncturing and moisture absorption during handling and transportation. The actual chemical mixture is contained in a strong, porous non woven fabric which is vacuum sealed inside the outer plastic bag. These changes in formulation and packaging, ensure that Canland’s Hot Pack Flameless Heater is efficient, clean and virtually odourless when activated. This means that the user gets a hot, tasty meal in minutes, without compromising performance and safety of of the heater, or enjoyment of the meal. www.hotpackmeals.co.uk

n Nite Redi

The Nite Redi is a storage box with a clip board and a removable light (the Lightbidge). The unit is made from Polyproylene because it’s very durable, and it provides a smooth and sturdy writing surface. The storage compartment itself is lockable and can hold approximately 200 sheets of A4 paper along with pens and pencils. Alternatively, it can take

notepads, prescription pads, medical records, surveys, tape measure, multi-tool, vinyl gloves etc. The Nite Redi has only just been launched in the UK, but is already widely used and proven in America. www.niton999.co.uk

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

n Lightfoot System

A new fuel-saving technology for LCVs that claims to delivers a return on investment within the first month. The Lightfoot incab system advises the driver on how to accelerate and when to change gear, with audio and visual aids. It also monitors performance and sends a simple email report to the fleet manager on a weekly or monthly basis. This clearly identifies the best and worst-performing drivers in the fleet. The technology is proven to save up to 18 per cent on fuel consumption, making it highly attractive to fleet operators. www.ashwoodslightfoot.co.uk Alpha S Mask Specifically designed to fit the smaller and slimmer face shape, the Alpha S respirator from Alpha Solway, is the first disposable mask with a unique inner face seal that fits snugly to the chin, delivering an excellent fit and meeting the needs of a multi industry problem. Developed in response to Alpha Solway’s involvement with Fit2Fit and the common E

CALL FOR YOUR FREE COPY

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

59


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

High Performance Antennas for Countermeasures, where Security is Critical Directional Planar Spiral Antennas High Power, 0.15 to 15GHz

Phase Matched Cavity-Backed Spiral Antennas

Ultra Wideband Omni Antennas, 0.1 to 18GHz

Multiple Bands in Stacked Omni Array

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture The most important thing we build is trust

High Power Planar Spiral

Ultra Wideband Omni-Directional

• Directional, ultra wideband, high power • Bandwidths up to 30:1 • Ultra slim

• • • • •

Cavity Backed Spiral • High fidelity monotone patterns • Direction finding systems • Phase and amplitude matching available

60

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

Biconical omni-directional antennas Fully efficient Vertically polarised Bandwidths from 3:1 to 30:1 Multi-stacked omnis for versatile configurations

Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, United Kingdom T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket


EMERGENCY SERVICES SHOW E problems experienced when conducting Face Fit Testing, the Alpha S mask specifically helps achieve excellent results on the smaller face shape. Organisations can now be confident that the Alpha S mask will offer an excellent fit and a higher pass rate when Fit Testing. alphasolway.com KoolSorb KoolSAF, the product brand of SAF aimed specifically at the coolant apparel market, is the basis for functional and durable fabrics that offer significant advancements in reducing wearer heat-stress and fatigue – whilst providing increased comfort and performance capabilities. KoolSorb is one example of this, and initial prototype tabards have already been trialled by Lincolnshire Fire & Rescue. KoolSorb can be converted into a wide range of garments which are worn next to the skin under heavy clothing. The fabric stimulates the dissipation of heat and moisture through the rapid absorption and containment of body sweat. www.techabsorbents.com

Garmin MontanaTM Garmin, leader in satellite navigation, has announced the Montana™ handheld GPS device – the most advanced Garmin touchscreen navigator, featuring a rugged design with multiple uses: on foot, on the water and in the car. With battery options, a large dual-orientation screen and support for a wide range of Garmin cartography, Montana is the company’s most versatile GPS for the serious adventurer. It has a barometric altimeter for elevation profiling and exceptional routing functions using preloaded high-definition worldwide mapping. The built-in 3-axis compass gives the Montana a heading even when standing still or held at an angle. Montana’s glove-

friendly responsive touchscreen is a generous four inches (10.2cm) and the photos taken by its 5-megapixel autofocus camera on the 650 and 650t models are displayed in sunlightreadable brilliant colour. garmin.com

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Canguro Scenestar LED Lighting Warwickshire Fire & Rescue service has taken delivery of two new Canguro SceneStar LED Lighting units from Vimpex. The scene lighting equipment incorporates a trolley-mounted 14,000 Lumen LED lighting head, 4.5 m telescopic pneumatic mast and Vimpex’s specially developed LED Power Unit. Easily wheeled into position, quickly deployed, erected and powered up by one person, the Canguro SceneStar system provides battery powered scene lighting, eliminating noise and emissions. One Vimpex LED Power Unit will give approximately 3.5 hours of light. The unit not only provides power to the lighting but also allows for the connection of an auxiliary power supply such as a generator, thereby allowing for extended use. L vimpex.co.uk

NE W

Specialists in Mobile Computing & Communication Systems Systems Total solution emergency data systems Customer driven developments Full system interfaces including 3rd party systems Hardware Fully ruggedised Flexible, robust platform Specifically designed for use in a mobile environment Software Dispatch text and status messaging Satellite Navigation (audio and visual) Electronic Patient records Intranet and internet connections In-vehicle cameras RFID asset tracking imited web:www.te Terrafix L rrafix. co.uk e: e nqu irie s@ ter rafi x.c o.u k

NEW

t: ( 01 78

T.U.T Terrafix Universal Tracker

Low cost multi- bearer tracking system Provide worldwide coverage Full management report forms Web based control software

15 70 57 2)

TERRAFIX

FIND US AT STAND 97

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

61


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

AIRPORT SECURITY

A NEW APPROACH TO SECURITY SCREENING How centralised remote screening improves airport checkpoint screening? Managing security screening operations has become a demanding task worldwide. The growing number of threats combined with an overwhelming amount of visual information has added more complexity to screening operations, impacting throughput and operational costs. Other operational and management challenges remain since no real-time information from the checkpoint is available: operations management and system management among others, remain isolated, non-optimised processes. How can we improve screening to generate faster throughputs and operational gains and create a better passenger experience? Bigger boxes? Probably not enough. NEW APPROACH The new approach to security screening consists of taking advantage of networks and new related technologies to streamline the screening process with centralised data and resources, generating operational efficiencies from better resource allocation and workload balance and smoother throughput. Following this new approach, data from X-ray equipment is now fed into the network through a centralised repository to allow for remote screening. Security screeners no longer need to work next to the X-ray equipment. Instead, they are centrally located and receive images from any of the lanes using queue management. This new approach based on the latest web services also enables managers to get live information on operations from the distance, using remote monitoring. THE SOLUTION The eVelocity suite brings innovative value-added capabilities to existing X-ray equipment to improve efficiency of screening operations while reducing the overall costs of security operations. eVelocity enables networked screening operations from a unique centralised location to perform remote screening with real-time centralised images using a clear-mark bag or tray decision model. Any bag or tray marked for inspection is automatically displayed at the checkpoint for alarm resolution. The solution provides capabilities to screening process automation through the use of Optosecurity’s automated threat detection algorithms including EU Certified Type C LEDS OptoScreener® and XMS® Software Suite. eVelocity also enables airports to remotely monitor screening operations, with status

62

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

updates on all lanes and scanned images through tablets or other portable equipment. Detailed operations data is available in realtime, anywhere. eVelocity also allows for unique system management with system health monitoring and predictive analytics. PASSENGER EXPERIENCE The eVelocity suite enables for better passenger screening and experience. The solution supports operations, monitoring and management, resources and system management, as well as reporting, generating significant productivity gains and operational efficiencies. L FOR MORE INFORMATION Optosecurity Inc. PO Box 1194, Waterbeach, Cambridge, CB25 9UX, UK Mobile: +44 (0) 7817.207634 Fax: +44 (0) 1223.864090 info@optosecurity.com www.optosecurity.com

‘Based on centralised data repository and resources, eVelocity provides opportunities for airports to enhance throughput, improve security and lower operational costs.


AVIATION SECURITY

European Commission back pedals in Liquid, Aerosol & Gel screening in the face of stiff opposition, writes Chris Yates

The much hoped for lifting of liquid restrictions at European Union (EU) airports was dealt another blow in mid July, when the European Commission (EC) quietly announced further delay in implementing legislation requiring airports to install suitable liquid screening equipment by second quarter 2013. The announcement came as a bolt out of the blue to hardware manufacturers who had been assured up to the wire that no further delay to its implementation would be acceptable and has prompted many to mothball further development of liquid screening technology pending a clearer picture of a route to market for their product becoming available. OPERATIONAL RISK The EC said it had “adopted its assessment on the screening of liquids, aerosols and gels (LAGs) at EU airports”, in which it had concluded that a lifting of restrictions as currently envisaged in EU law “could present a considerable operational risk mainly due to the scale of the change.” Whilst it recommended that passengers should be able to carry on board all screened duty free LAGs by latest eighteen months time, it merely restated that the EC continued to work in close cooperation with European and International partners, to bring about a phased introduction of solutions to achieve the final objective of screening all LAGs at the earliest possible date. Liquid, aerosol and gel restrictions were imposed on passengers following the discovery of the transatlantic airliner bomb plot in 2006. EU legislators passed regulation down in 2008, requiring that all airports have reliable detection equipment installed to enable a lifting of the restrictions by 2013. This latest announcement was broadly welcomed by an aviation industry largely set against deployment of current generation LAGs screening solutions on operational impact and cost grounds. “The Airport Operators Association (AOA) lobbied for the liquids ban not to be lifted next year and so we applaud the decision taken by the European Commission to take a more

realistic and progressive approach. We do want to see progress being made and the ban eventually lifted, but only when the technology has matured, and a seamless, rather than a more confused, security process can be assured. At all times the security of passengers needs to take priority over arbitrary deadlines set by politicians. “We are glad that the concerns of the AOA and our European trade association, Airports Council International (ACI) Europe, have been listened to. We look forward to continue working constructively with the European Commission and other stakeholders,

only passengers, threatening to unilaterally introduce tougher screening restrictions for European originating air traffic, if the plan was to go ahead. US authorities insist on a much more restrictive aviation security regime for inbound flights and this may be the ultimate reason behind a further delay in deploying equipment enabling the lifting of LAGs restrictions for all passengers. Whether commercial or political pressure is behind this latest about turn by the European Commission (EC), the delay in deploying current generation European Civil Aviation Conference (ECAC) approved

Written by Chris Yates, principal, Yates Consulting

EUROPEAN AVIATION SECURITY ENHANCEMENT ON HOLD AGAIN

Aviation Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Current thinking in some circles is that this may be a ruse to disguise US government interference on the issue of LAGs screening in Europe ensuring any changes on Liquids, Aerosols & Gels make things better for passengers, better for security and can be practically implemented by airports,” said chief executive Darren Caplan. Days earlier the European Commission’s Directorate General for Mobility and Transport and the United States’ Transportation Security Administration (TSA), together with the main European and American aviation stakeholders, apparently signed a joint statement, confirming their intention to cooperate towards the screening of liquids aerosols and gels (LAGs) at EU/ US airports. Based on a roadmap, the sides said they intend to find a comprehensive risk-based security solution which will facilitate the lifting of the restrictions to LAGs as soon as practical, while maintaining security and facilitating passengers and trade in international civil aviation. CONTROVERSIAL The statement may yet prove controversial since numerous of the vendors in this particular sphere of detection – who form a part of the stakeholder group – say they weren’t informed of any meeting leading to the signing of the joint statement and only became aware once it had been made public. Current thinking in some circles is that this may be a ruse to disguise further US government interference on the issue of LAGs screening in Europe. There is prior history in so much as the US effectively stymied an earlier easing of liquid restrictions for transit

solutions to the LAGs conundrum, restricts further research and development in this field and leaves passengers dangerously exposed to those who wish to inflict harm. Whilst effectively turning its back on security issues, there’s no let up in the pressure it is bringing to bear to boost air traffic management efficiency under the Single European Sky initiative. It is currently sending letters to transport ministers across the region, pressing them to cut costs and boost traffic flows, which could help save the airline industry upward of $4.5 billion. WIDE OPEN TO ATTACK The focus on an airline driven agenda of airspace capacity enhancement, delay reduction and cost cutting is reminiscent of the situation in the USA prior to September 11. In that instance a skewed Federal Aviation Administration (FAA) agenda driven by an all-powerful airline lobby group, effectively neutered meaningful aviation security enhancement to such an extent that the aviation system was left wide open to attack. It’s worth reminding that the failure to address security deficiencies prior to that event had far reaching national and global consequences from which the airline industry barely recovered. L ABOUT THE AUTHOR Chris Yates is principal of Yates Consulting

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

63


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Rescue equipment rescue@holmatro.com | http://tactical.holmatro.com


BORDERPOL

BORDER MANAGEMENT NOW A GLOBAL CHALLENGE

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Taking place on 16th & 17th October at the Central Hall, Westminster, the first BORDERPOL Annual Conference will bring together top border management policy makers, professionals, and academics to discuss and propose new ways to implement 21st century technologies that can improve border security and rejuvenate public support for waning global migration management systems. Controlling and managing international borders in the 21st Century continues to challenge the border control and immigration agencies around the world. It is generally agreed that in a globalised world that borders are as open as possible, yet threats continue to remain in ever evolving circumstances and situations. BORDERPOL is the World’s Border Organisation promoting co-operation, consultation and communication among like minded national border administrations and associated services and agencies. Its first annual conference & exhibition brings together the world’s senior policy makers, practitioners and players to London, on 16-17 October 2012, to discuss and debate the current and future issues facing the border protection, management, security and migration management sector. BORDERPOL’s primary mission is to promote international borders that enhance human mobility whilst ensuring traveller safety and security and facilitate smart and secure border systems by working with the border security establishments of likeminded nations to ensure that international borders protect as well as connect people and places. THOUGHT PROVOKING DISCUSSION With the new UK Immigration Minister, Mark Harper MP, and the new Interim Head of UK Border Force, Tony Smith, confirmed as keynote speakers, the conference is anticipated to deliver thought provoking discussion and debate on the future of international border management and protection. UK Border Force has announced its official participation and support for the event - an active step towards enhancing inter-agency co-operation with international forces for improving the strength of border protection and security, from refugee and migration movement to illegal activities, such as people and narcotics trafficking. Since 1 March 2012, the Border Force has been a separate operational command, with its own ethos of law enforcement, led by its own Director General, and accountable directly to ministers as part of the Home Office. Migration has become an international challenge to ensure legal and safe movement of over 200 million migrants. The safe passage of refugees is also essential, as are the

safeguards necessary to ensure legitimate refugees are safe and protected. Is it possible to build a common policy for easier and secure management of mass migration? Jason Kenney, Canadian Minister of Citizenship, Immigration and Multiculturalism, will deliver a keynote speech at the opening of the conference. Tony Smith, interim head of UK Border Force, will also contribute to the keynote, along with Shri Dilip Trivedi, IPS special director general, Indian Border Police Force. Rey Koslowski, director of the Center for Policy Research Program on Border Control and Homeland Security will deliver a presentiation entitled Challenges of Implementing Changing Immigration Policies – focusing on efforts to leverage technologies that address broader issues of migration management and policy changes. SCHENGEN AGREEMENT PROGRESS The revolutionary Schengen Agreement set-up pan-European travel with no internal border controls. 17 years later, how well is Schengen working in allowing the free movement of the citizens of the 26 European countries? Is Schengen still able to counter illegal immigration and organized crime,

such as narcotics and people trafficking? What is the future for Schengen in light of the recent economic challenges in Europe? Can the example of Schengen be applied to other regions in the World? Edgar Whitley, reader in Information Systems in the Information Systems and Innovation Group of the Department of Management from the London School of Economics and Political Science will chair and moderate this highly anticipated panel discussion entitled Schengen area – how effectively is it working?. Whitley will moderate a panel of senior industry experts, from practitioners implementing the policies of the Schengen treaty to those advising or developing the policies. These include Major Grzegorz Niemiec, deputy director of the Commanding Centre, Polish Border Guards, Poland; Prof. Frank Gregory, emeritus professor of European security, Mountbatten Centre for International Studies and former advisor to Home Select Committee, UK; Ms. Penny Satches-Brohs, senior border issues advisor, Conflict Prevention Center from the Organisation for Security and Co-operation in Europe (OSCE), Austria, and; Hugo Brady, senior research fellow, Centre for European Reform, Belgium. E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

65


If security is your business, can you risk ignoring Nedap?

Security Redefined Long-trusted providers can certainly be relied on when it comes to your security system. Having established standards makes life highly convenient. But your job becomes even more reliable and safe when you decide for technological market leader in security management. Nedap’s aim is the better system – this makes us the pacemaker in a dynamic market. Learn more about how easily AEOS already secures more than 37 million door movements per day at www.nedap-securitymanagement.com


BORDERPOL E TECHNOLOGY With ever more sophisticated methods being employed to avoid border security, both physical and in cyberspace, technology will play an increasingly important role in detection and analysis. What does the future hold? What new technologies are in the pipeline and what would the industry like to see and how can border security be employed in a borderless world? These questions will be examined in a session entitled Future technological solutions for promoting safe and secure borders on the frontline and in cyberspace, chaired by Commodore R.S. Vasan (Ret’d), director BORDERPOL Asia secretariat & head, Strategy and Security, Centre for Asia Studies. This will include a presentation by Malcolm Warr OBE, technical director, Security Association for the Maritime Industry (SAMI) which asks: Future Technology is what you See what you Get? – the challenges of fusing data from different security systems into one common operating picture to detect border threats. Following on from this theme, Data Privacy and Border Control – Reconciling Competing Objectives will be presented by David Smith, deputy commissioner and director, Data Protection, Information Commissioner’s Office. PUBLIC PURSE The public purse of funding border management and protection is increasingly under pressure. Taking place on the Wednesday, Howard Clarke, Intelligence Consultant & BORDERPOL Member, Canada will chair a session entitled A strategic approach towards reducing public expenditure in border management and how intelligencebased and outsourced projects help assess threats and system vulnerabilities to deliver results. This session explores how border agencies can continue to deliver high levels of threat assessment and detection whilst managing costs effectively. Later, Commodore R.S. Vasan (Ret’d), director BORDERPOL Asia secretariat & head, Strategy and Security, Centre for Asia Studies, India, will chair a session entitled Challenges of Border Management and Illegal Immigration in Asia and Downstream Effects in the West. This will examine the issues of border control in Asia and establish how the issue of illegal immigration from this part of the world poses a great challenge in the west. The analysis looks at the legal, humanitarian, technical, social and political dimensions of such illegal acts. The session aim to discuss all aspects of border control and make recommendations for both short term and long term measures. INFORMATION SHARING Stopping the travel of known criminals or potential threats to national security, especially to major events, is the responsibility of every border protection agency. How can information be shared more effectively to ensure accurate monitoring of these threats and what are the obstacles in achieving greater cooperation

With the new UK Immigration Minister, Mark Harper MP, and the new interim head of UK Border Force, Tony Smith, confirmed as keynote speakers, the conference is set to deliver thought provoking discussion and debate on the future of international border management and protection

between international and national agencies. On Wednesday afternoon, Thomas Tass, BORDERPOL executive director, Canada, will chair a session entitiled Information Sharing and Border Agency Cooperation. Within this, Tony Smith, interim head of UK Border Force and Gold Commander, London 2012 Olympic Programme, UK Border Force, will present Developing the tools and processes in inter-agency cooperation for successfully managing border protection issues during large scale events. Best practices in cooperation between Finnish Police, Border Guards and Customs will be presented by Colonel Antti Hartikainen, director general of National Board of Customs, Finland. John Donlon, ACPO national co-ordinator, Protect & Prepare UK, will exmaine the challenges for policing and the need for greater cooperation with national and international border forces. Agency cooperation challenges between EU and non-EU countries during Euro 2012 will be discussed by Major Grzegorz Niemiec, deputy director of the Commanding Centre, Polish Border Guards, Poland. ARAB UPRISING Since the Arab Spring uprising, a sense of insecurity has swept the region and threats of civil war has created a surge of refugees and migrants looking towards Europe as a safer haven. Combined with the increase in drug and people trafficking, what are the

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

major challenges facing Europe’s frontiers and how are border forces managing to maintain the successful protection of illegal immigration into Europe? Col. Zoltan Szabo (Ret’d), director BORDERPOL EU Secretariat, will chair the session entitled Europe’s Frontiers – problems, challenges, solutions. This will include information on the challenges of illegal migrations from the Balkan Routes from police general Nenad Banovic, head of Border Police Directorate, Serbia. Combatting illegal migration and trafficking on Europe’s Southern frontier will be covered by Luis Gouveia, borders central director of the Immigration and Borders Service, Ministry of Interior, Portugal. EXHIBITION The accompanying exhibition provides a showcase of the leading technologies and solutions to meet the future challenges facing the border protection, management and security professional, with some high quality exhibiting companies, including ARINC, Geovox Security, OD Security, Thermo Fisher, Top Dog Security, Wagtail. L FURTHER INFORMATION BORDERPOL takes place at Central Hall Westminster on October 16th & 17th. To register, visit the event website at www.borderpol-event.org

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

67


1st Annual BORDERPOL Conference and Exhibition

for the border management and security industry

16th-17th October 2012 Central Hall Westminster, London, UK www.borderpol-event.org

Tactics and Tools for Effective Border Management The event not to be missed. Register Today at www.borderpol-event.org

Keynote Speakers

Exhibition Hours Tuesday 16th October 9.30am - 7.00pm

(including Networking Reception)

Wednesday 17th October 9.30am - 5.30pm

exhibition only is free of charge to attend for trade

Additional keynotes: • Tony Smith Head of UK border Force, UK • Shri Dilip Trivedi IPS Special director General, Indian border Police Force, India

Other speakers include:

• Col.dr. Gizella Vas Head of border Policing, National Police of Hungary • Police Chief Quaestor Ioan Buda Mark Harper MP, Jason Kenney PC, MP, General Inspector, border Police of romania For a list of exhibitors and to Minister of State for Minister of Citizenship, • Police General Nenad Banovic register online to attend visit Immigration, Immigration and Head of border Police directorate, Serbia UK Multiculturalism, www.borderpol-event.org • Manuel Jarmela Palos Canada National director, SeF (Immigration & borders Service), Portugal • Major Grzegorz Niemiec deputy director of the Commanding Centre, Polish border Guards, Poland • John Donlon TUeSday 16th OCTOber aCPO National Co-ordinator Protect & Prepare, UK 9.00am - 10:30am Opening Keynote Session • Colonel Antti Hartikainen 11:00am - 12:30pm Conference Plenary Session: Global Challenge on Policies of director General, National board of Customs, Finland refugee & Migration Movement • Graham McIntyre 2:00pm - 3:30pm Panel discussion - Shengen area - how effectively is it working? Chairman, National Security & resilience 4:00pm - 5:30pm Future technological solutions for promoting safe and secure Consortium, UK borders on the frontline and in cyberspace • Prof. Frank Gregory 5:30pm - 7:00pm Networking reception in the exhibition Hall emeritus Professor of european Security, Mountbatten Centre for International Studies and former advisor WedNeSday 17th OCTOber to Home Select Committee, UK 9:00am - 10:30am a strategic approach towards reducing public expenditure in border • Ms. Penny Satches-Brohs management and how intelligence-based and outsourced projects Senior Border Issues Advisor, Conflict Prevention help assess threats and system vulnerabilities to deliver results Center from the Organization for Security and 11:00am - 12:30pm Challenges of border Management and Illegal Immigration in Co-operation in europe (OSCe), austria asia and downstream effects in the West • Hugo Brady 2:00pm - 3:30pm Information Sharing and border agency Cooperation Senior research Fellow, Centre for european 4:00pm - 5:30pm europe’s Frontiers - problems, challenges, solutions reform, belgium • Malcolm Warr OBE For full conference programme visit www.borderpol-event.org Technical director, Security association for the Maritime Industry (SaMI), UK • Commodore R.S. Vasan (Ret’d) Hosted by: director bOrderPOL asia Secretariat & Head, Strategy and Security, Centre for asia Studies, India

Agenda Highlights

Supported by:

For full list of speakers and more information about the conference visit www.borderpol-event.org


BORDER CONTROL NEWS

UK Border Agency staff rehired after numbers were cut ‘too quickly’ admits Dame Helen Ghosh More than 100 borders staff were rehired after leaving the UK Border Agency or Border Force, officials have said. Too many borders staff were cut too quickly and more had to be recruited to meet demand, Dame Helen Ghosh, the most senior civil servant in the Home Office, admitted. Fuelling concerns staff were pocketing redundancy payments and then returning to claim a salary, Dame Helen told MPs that the average payout for staff leaving the UK Border Agency (UKBA) is £34,000, rising to £54,000 for those leaving the Border Force. Permanent secretary Dame Helen said many of those who returned after six months were brought back to help cope with the extra demand caused by this summer’s Olympics or with pressure points at overseas posts. Her comments came after Whitehall’s spending watchdog warned in July that the troubled UKBA cut too many staff too quickly and was having to hire extra people and increase overtime to meet demands. “Did we lose people too quickly? In retrospect, of course if you look at the issues about increasing passenger numbers, concerns about customer service, perhaps we would not have moved quite so fast as we did,” Dame

Helen said. But she added that by the end of the financial year the organisation would have effectively broken even on those taking voluntary departure. She also denied there were “widespread warning bells” before the cuts were made. “On the Border Force side, the new policy focus on 100 per cent checks postJanuary, the increasing focus on the service we were giving to customers - in retrospect, had we known both of those things, we might not have let quite so many people go,” Dame Helen said. “But of course they might not have been people in the right place.” Giving evidence to the Commons Public Accounts Committee (PAC), Dame Helen said 84 people who had been previously employed in some way by the UKBA or Border Force had been rehired. A further 20 people were re-employed through agencies, she added. Margaret Hodge, the committee’s chairwoman, said the fact the Olympics were taking place in London over the summer was “no big surprise” and the MPs would be commenting on the situation in a forthcoming report. FOR MORE INFORMATION VISIT tinyurl.com/8nmtgx3

UK airlines see benefits of US checks

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UK airlines believe there is a commercial appetite for the introduction of US security checks at airports such as Heathrow which would allow travellers to fly to the states as if they were domestic passengers. British Airways, Monarch and Virgin Atlantic were among carriers at a meeting in London earlier this year with government and US Embassy officials, who expressed support for the idea of establishing United States Customs and Border Protection, such as those in place at Shannon and Dublin airports. An unnamed member of the Department of Transport who was present at the meeting noted: “The airlines confirmed there was a commercial appetite for this in the UK, even if airlines had to contribute towards the cost.” It further noted that there was “no regulatory bar” to UK carriers “benefitting” from the use of preclearance facilities in Dublin and Shannon, should they wish to do so. tinyurl.com/9sw9eoh

Marine Propulsion Packages, Marine Accessories Distributors of Doosan, D-I, JMP, Hyundai SeasAll, Craftsman Marine and WhisperPower and with an agreement with Azcue A division of the B&N Group - ALWAYS MOVING FORWARD Tel: 01626 830910 Fax: 01626 830911 info@watermota.co.uk www.watermota.co.uk WaterMota Ltd, Cavalier Road, Heathfield Industrial Estate, Newton Abbot, Devon, TQ12 6TQ

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

69


In

Ta i k te nau this in g ro g pe ur yea pla ra al r ce bi Na th lit ti e y on Su a m l m it

STONELEIGH PARK | COVENTRY | 21- 22 NOV 2012 Entry to the exhibition is FREE for all visitors. Register online at www.emergencyuk.com/ctbc

Free registration online now! Just scan this code to register on your phone.....

Follow us on twitter @emergencyukshow Keep up with the conversation #ESS2012

See the latest products at The Emergency Services Show 2012. Visitors to the show can try, see, and touch the latest in communications, IT, PPE, search & rescue equipment, medical supplies, HazMat, vehicles & accessories, RTC equipment, first response products, and training. Find out what other emergency responders are using and meet the manufacturers who can save you money. This is simply the best UK show for all of the emergency services, and a must-visit for all operational staff. Register for FREE entry at www.emergencyuk.com/ctbc

Exhibition 3 indoor halls and outdoor exhibition areas giving visitors the chance to meet over 400 specialist product and service suppliers.

organised by CFOA in association with AACE and ACPO, will be held alongside The Emergency Services Show 2012. Details at www.emergencyuk.com/conference

Emergency Response Zone This area of the show features exhibition stands from Police, Fire & Rescue, Ambulance, Professional, Government and Voluntary organisations from around the UK. This zone demonstrates to visitors the capabilities of partnering agencies and the voluntary sector.

Live demonstrations A unique opportunity to see the latest equipment in action. The Road Haulage Association will stage a heavy rescue demonstration relevant to Fire & Rescue, Ambulance, Police, Highways Agency and Rescue recovery companies. More exciting demonstrations are being confirmed!

Conference Bringing senior professionals together to discuss the latest industry news, developments and strategic advances - details are currently being confirmed for this year's conferences, but we are pleased to announce the first National Interoperability Summit,

Show Features See the The World’s Largest Torch from Ledco lighting up the outdoor area, learn with the College of Paramedics & Jones & Bartlett who will be offering CPD demonstrations and take part in Physio Control's Medical Conference.

New exhibitors for this year include... ABC MacIntosh | Andreas Stihl | ARCO | Ashwood Auto Matters | Babcock Emergency Services Training | Electrosonic | English Braids | E-Semble Tiger Tools | Falck | Fischer Panda | Lewis Medical | Mammut | Mecmesin | Panasonic | React by Autoclenz | Step Access | TBI-LUG Europa | Tencat | Texport

SAVE THE DATE

Wed 21 – Thu 22 Nov 2012

www.emergenc yuk.com/ctbc ESS is organised by

ESS is supported by


BORDER CONTROL NEWS

University of Arizona’s Elvis virtual agent provides border protection A lie-detecting virtual border official nicknamed ‘Elvis’ is the latest high-tech approach to securing borders in the United States. Developed by University of Arizona researchers in collaboration with US Customs and Border Protection (CBP), the computer is known as the Automated Virtual Agent for Truth Assessments in Real-Time - or AVATAR kiosk. It uses sensors to screen passengers for unusual physiological responses to questioning which can indicate a subject is lying. “What we’re looking for is changes in human physiology,” said Doug Derrick, a member of the University of Arizona team behind the project. “We’ve had great success in reliably detecting these anomalies things that people can’t really detect.” The kiosk is being trialled at Dennis DeConcini Port in Nogales, Arizona, a checkpoint on the US-Mexico border, as a way of processing passengers looking to sign up to CBP’s ‘Trusted Traveler’ program, which allows travelers pre-approved as ‘low-risk’ to be fast-tracked through security processes. Applicants for the program must undergo an interview and biometric fingerprinting to be eligible - both of which can be performed by the AVATAR kiosk. Derrick said the kiosk could process travelers in five minutes. Travelers simply stand in front of the unit and

respond to yes/no questions asked in Spanish or English. Their answers are monitored, with any unusual physiological responses passed on to a human field agent who then subjects them to “a more careful interview process,” said CBP spokesman Bill Brooks. Unusual responses were not a sure sign of a lie, said Derrick. “There might be valid reasons for it beyond deception.” The computer uses three sensors to assess physiological responses: a microphone, which monitors vocal quality, pitch and frequency; an infrared camera, which looks at pupil dilation and where the eyes focus; and a highdefinition camera recording facial expressions. Some of the involuntary cues that betray whether a speaker is lying could be controlled, but not all of them at once. Lab testing had indicated the machine was much more successful than humans at detecting these cues, according to Derrick. “People have a hard time detecting small changes in the frequency of the human voice, that a computer is much better at,” he said. “People are accurate about 54 per cent of the time at detecting deception. We have got our machine as high as 90 per cent in the lab.” Brooks said the project was still in the early phase of field testing, and participating in the AVATAR interview process was

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

entirely voluntary at this stage. But if successful, the initiative could be rolled out in other parts of CBP’s operations. Initially, the kiosk did not have the avatar feature, but it was added after its developers found that without it, people would tend to speak to the machine in a robotic, unnatural manner. It even got a name among the team developing the project. “We call him Elvis, or Pat,” said Derrick. “But when he’s in the field he’s just the AVATAR agent.” FOR MORE INFORMATION VISIT ots.cmi.arizona.edu

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

71



THERMAL IMAGING

EMBRACING THE LATEST THERMAL TECHNOLOGY

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Argus introduces its latest range of thermal imaging cameras for law enforcement agencies There’s no doubt that our law enforcement officers rely ever more heavily on new technology. Highly advanced equipment helps police to locate criminals, communicate clearly and quickly, and keep the peace. The latest technologies are important investments, providing evidence and allowing the police to be more efficient in carrying out their duties. One particular piece of technology in increased use is the thermal imaging camera. If you’ve seen the news lately you will have heard about the recent London protests, where thermal imaging cameras were used on police helicopters to monitor the event. It’s a demonstration of the wide uses of thermal imaging – but it goes beyond simply locating people. Leading the market in highly advanced thermal imaging cameras, Argus cameras surpass their competitors in technology, providing a range of settings and viewing options, with increased accuracy for use in many policing applications. ARGUS TT TYPE In early 2012 Argus thermal imaging will launch a range of cameras designed with the guidance of a number of specialist police and security departments. The range will include a thermal torch for first responders called the Argus TT Type, a monocular camera called the Argus P Type for covert surveillance, and a specialist search camera called the Argus F Type. The TT may resemble a normal torch but benefits the user in countless ways a torch never can, providing patrol officers with the ultimate advantage over criminals. Not only does it detect the heat signatures of people and objects in daylight hours, it also provides an abundance of additional advantages in the dark of night. Officers can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. They can scan car parks, where they can see suspects hiding between cars, and can identify vehicles that were recently driven. When used in total darkness, officers can go virtually undetected, as they search for prowlers, and other criminal behaviour. Officers will be able to use this new technology for a range of patrol applications including: fugitive/suspect search, officer safety, search and rescue, detecting evidence, routine patrols, training and assessing, routine raids, occupancy evaluation and collision investigation.

ARGUS P TYPE The Argus P type is a handheld, robust, simple-to operate, lightweight monocular thermal imaging camera which can power up fast. It is capable of withstanding harsh environments and provides the most superior features available on the market. Designed using sophisticated digital technology, the P Type offers users advanced thermal image quality, providing video recording and image capture to support the gathering of evidence. The P type has interchangeable lenses so will be a fantastic tool for covert surveillance operations, officer safety, fugitive/suspect search, collecting evidence, border surveillance and marine patrol. ARGUS F TYPE The Argus F Type offers a simple-to-operate configuration; it is a robust, self-contained camera with fully automatic operation. The camera is lightweight at less than 3lb and specifically created to help police and security personnel to detect heat signatures in specialist search operations. The F type uses a high-resolution 320 x 240 pixel Amorphous Silicon (ASi) microbolometer detector. It has been designed using advanced digital imaging technology providing it with the sharpest picture available and superior performance. The F Type comes with the most advanced features available in any thermal imaging camera on the market and is a superb tool for applications such as: • Drug interdiction operations • Detection of hidden compartments • Finding embedded electronic equipment The benefits to law enforcement agencies are clear: suspects can be caught quicker using less manpower and most importantly thermal imaging keeps the good guys safe and one step ahead of the criminal. The cameras are not as expensive as you might think, Argus cameras have been designed to keep purchasing cost down, creating affordable effective tools for the fight against crime. Clearly these cameras have a wide range of applications. Why not witness them yourself? The Argus sales team will be demonstrating its new range of cameras at the Emergency Services Show in the UK, as well as Intersec in Dubai. This new range of cameras will be available to purchase in the new year why not book a demonstration now? L FOR MORE INFORMATION www.argus-tics.com

Drug interdiction

Suspect search in woodland

Argus TT Type – officer patrol

Argus P Type – covert surveillance

Argus F Type – specialist search

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

73


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IP VIDEO SURVEILLANCE

A SMOOTH USER EXPERIENCE IndigoVision’s integrated end-to-end IP Video solution has been used for a 3700 plus camera surveillance system in the new Terminal 3 at Delhi International Airport. The project is believed to be the largest single installation of an IP Video system anywhere in Asia The new terminal was built as part of the massive infrastructure development for Delhi ahead of the highly successful 2010 Commonwealth Games. Delhi is India’s second largest airport and with the recent expansion can handle 34 million passengers per year. Airport’s create one of the most demanding security environments, with multiple operators from different agencies and departments requiring access to live and recorded video 24/7, from different locations in and around the terminal building. This requires the surveillance system to be flexible, reliable, easy to use, and low maintenance in order to avoid any delays or problems in the operation of the airport. IndigoVision’s distributed server-less IP Video architecture provides the airport with such a solution, being scalable, resilient and through a virtual matrix easy to operate, even for a project of this scale. Commenting on the success of the project, an operations manager at DIAL’s state of the art AOCC control room said, “The Control Room and all 3700 plus cameras run extremely well and without any problems. The video quality is excellent and the software

74

COUNTER TERROR BUSINESS MAGAZINE | Issue 11

is easy to use by our operators. Due to the high number of cameras and amount of activity in the airport, it was important to have a system that provides a smooth user experience and no downtime – IndigoVision has exceeded all of our expectations.” CONTROL CENTER WORKSTATIONS IndigoVision’s ‘Control Center’ Security Management Software is at the heart of the system and is used by operators throughout the airport. IndigoVision’s distributed architecture allows ‘Control Center’ workstations to be used at any point on the network. The software provides advanced Identification Authentication Management (IAM) features, which ensure only the operators with the correct permissions are allowed to access the video. This allows the various cameras to be partitioned into groups for various departments and agencies. For added security, 120 cameras for the Immigration department have been allocated to a separate site database, with recording on their own dedicated Network Video Recorders (NVRs).

A total of 80 ‘Control Center’ workstations have been installed in three separate control rooms; the Airport Operation Control Centre (AOCC), situated in the terminal; the Airport Security Building (ASB), located off-site 250m away; and in the Air Traffic Control (ATC) centre, where aircraft ground movements are monitored. The AOCC, which is the main monitoring centre for the airport, boasts the biggest video wall in Asia. The 10 X 5 metre wall holds twenty-eight 70” screens that display the information inputs from all the airport departments through live camera feeds. Each screen can display up to 25 multiple camera images, providing the AOCC with the capacity to display 700 images at one time. Monitoring so many cameras in such a complex building is a major task for any security team. DIAL has extensively deployed IndigoVision’s real time analytics, which run at the network-edge in IndigoVision IP cameras and encoders, to help operators improve efficiency and incident response. Analytics are configured to create alarms when certain conditions in a camera scene are met, automatically alerting operators to potential problems. Examples of the analytics deployed include Virtual Tripwire for alerting entry into secure areas and Abandoned Object, used to identify luggage stuck on a conveyor belt in the baggage handling system. Operator efficiency is further enhanced by the use of IndigoVision’s integration modules to interface to the CEM access control system (over 3000 card readers) and the series of travelators and escalators from ThyssenKripp (using an OPC interface). Again the operators are automatically alerted if for example, a forced entry alarm is triggered by a door or an emergency stop button is pushed on an escalator. VIDEO QUALITY Another area that is vitally important for the airport is the quality and reliability of recorded video; operators and law enforcement agencies need to rely on highquality evidential video to aid investigations and cannot afford to lose video through missing frames or unreliable equipment. IndigoVision is unique in the ability to deliver very high-quality full-framerate video with a guarantee to never drop a frame under any circumstances. This coupled with its fault-tolerant recording solution provides DIAL with the archive security they require. The airport uses a total of 57 IndigoVision 10TB Windows NVRs for recording video continuously for 30 days from all of the cameras. Ten of the NVRs are used as backups, automatically recording video from any of the primary NVRs that go off line. L FURTHER INFORMATION Tel: +44 131 475 7200 enquiries@indigovision.com www.indigovision.com


IP VIDEO SURVEILLANCE

SECURING THE GHERKIN

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IndigoVision’s integrated IP Video surveillance system has been deployed as part of a major security upgrade at one of London’s most iconic skyscrapers 30 St Mary Axe, widely known as ‘The Gherkin’ is situated on the former site of The Baltic Exchange and at 180m tall, is the third tallest building in the City of London. ‘The Gherkin’ is a multi-tenanted commercial office block occupied by a number of the world’s best known insurance and legal businesses. The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems. Using this advanced capability, Universal Security Systems Ltd, IndigoVision’s Authorised Partner, implemented a fully integrated surveillance, access control and intercom solution. The new surveillance system replaced old analogue CCTV matrix and DVR equipment with a fully digital network solution using an IP-based distributed virtual matrix. This allows any component in the system to be located at any point on the IP network, delivering a scalable and flexible solution that was a key factor in IndigoVision being chosen for the project. All of the original analogue fixed and PTZ cameras were reused and the migration was achieved without any disruption to building operations, an important consideration for a building of this type with diverse activity occurring 24/7. HIGH QUALITY AUDIO AND VIDEO IndigoVision’s ability to stream high-quality, fully synchronised audio across the network alongside the video, allowed Universal Security Systems to develop an innovative video intercom system, recording audio from existing intercom equipment with the appropriate video from nearby cameras. The security of the video archive, through the use of a resilient and redundant recording solution, was another important factor for the building owners choosing IndigoVision. Video is recorded on 6 standalone IndigoVision Network Video Recorders (NVRs), with a seventh used as a failover backup. Should any NVR fail or be taken off-line for maintenance, the backup automatically starts recording in its place. The standalone NVRs have a Linuxbased software engine and a fault tolerant design with dual redundant network and power supply connections. Two ‘Control Center’ workstations are used in the Security Office to monitor live video and analyse recorded footage from all of the cameras. ‘Control Center’ provides advanced analysis tools such as motion thumbnails for fast incident review. Guard tours, sequences and Privacy Zones are all supported, with

The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems. video being displayed on PC viewing panes or traditional monitors. Operators can view an interactive map of the entire site to quickly locate cameras and alarms. L

FURTHER INFORMATION Tel: +44 131 475 7200 press@indigovision.com www.indigovision.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

75


1st Annual BORDERPOL Conference and Exhibition

for the border management and security industry

16th-17th October 2012 Central Hall Westminster, London, UK www.borderpol-event.org

Tactics and Tools for Effective Border Management The event not to be missed. Register Today at www.borderpol-event.org

Keynote Speakers

Exhibition Hours Tuesday 16th October 9.30am - 7.00pm

(including Networking Reception)

Wednesday 17th October 9.30am - 5.30pm

exhibition only is free of charge to attend for trade

Additional keynotes: • Tony Smith Head of UK border Force, UK • Shri Dilip Trivedi IPS Special director General, Indian border Police Force, India

Other speakers include:

• Col.dr. Gizella Vas Head of border Policing, National Police of Hungary • Police Chief Quaestor Ioan Buda Mark Harper MP, Jason Kenney PC, MP, General Inspector, border Police of romania For a list of exhibitors and to Minister of State for Minister of Citizenship, • Police General Nenad Banovic register online to attend visit Immigration, Immigration and Head of border Police directorate, Serbia UK Multiculturalism, www.borderpol-event.org • Manuel Jarmela Palos Canada National director, SeF (Immigration & borders Service), Portugal • Major Grzegorz Niemiec deputy director of the Commanding Centre, Polish border Guards, Poland • John Donlon TUeSday 16th OCTOber aCPO National Co-ordinator Protect & Prepare, UK 9.00am - 10:30am Opening Keynote Session • Colonel Antti Hartikainen 11:00am - 12:30pm Conference Plenary Session: Global Challenge on Policies of director General, National board of Customs, Finland refugee & Migration Movement • Graham McIntyre 2:00pm - 3:30pm Panel discussion - Shengen area - how effectively is it working? Chairman, National Security & resilience 4:00pm - 5:30pm Future technological solutions for promoting safe and secure Consortium, UK borders on the frontline and in cyberspace • Prof. Frank Gregory 5:30pm - 7:00pm Networking reception in the exhibition Hall emeritus Professor of european Security, Mountbatten Centre for International Studies and former advisor WedNeSday 17th OCTOber to Home Select Committee, UK 9:00am - 10:30am a strategic approach towards reducing public expenditure in border • Ms. Penny Satches-Brohs management and how intelligence-based and outsourced projects Senior Border Issues Advisor, Conflict Prevention help assess threats and system vulnerabilities to deliver results Center from the Organization for Security and 11:00am - 12:30pm Challenges of border Management and Illegal Immigration in Co-operation in europe (OSCe), austria asia and downstream effects in the West • Hugo Brady 2:00pm - 3:30pm Information Sharing and border agency Cooperation Senior research Fellow, Centre for european 4:00pm - 5:30pm europe’s Frontiers - problems, challenges, solutions reform, belgium • Malcolm Warr OBE For full conference programme visit www.borderpol-event.org Technical director, Security association for the Maritime Industry (SaMI), UK • Commodore R.S. Vasan (Ret’d) Hosted by: director bOrderPOL asia Secretariat & Head, Strategy and Security, Centre for asia Studies, India

Agenda Highlights

Supported by:

For full list of speakers and more information about the conference visit www.borderpol-event.org


SECURE PRINTING

HOW SAFE IS YOUR PRINT ENVIRONMENT?

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

How can an organisation protect its data once it reaches the printer? OKI discusses the latest printing solutions which are helping organisations to protect their intellectual property All businesses have intellectual property (IP), regardless of their size or sector. However, given the sensitivity of data, it is particularly important that businesses across the counter terror sector take an even more vigilant approach to securing their IP. Every day employees print, fax, copy, scan and send sensitive information and there are often a whole host of security firewalls and barriers which the data has to pass through before it reaches print. The challenge is that often when the data reaches print, many businesses are not using the most appropriate print devices for the job. SECURITY MATTERS OKI is one such global business-to-business brand dedicated to creating, cost effective, professional in-house printing solutions, which has recognised the need to ensure printing is as secure as possible. OKI has already developed and launched a wide range of incredibly fast and high performance machines that can help businesses make data more secure, protect bottom line and increase productivity. Between the year 2000 and the present day, OKI has embarked upon an impressive period of innovation, launching a diverse array of improved products. The entire OKI range now has a built-in encryption printing and secure printing capability. This immediately addresses the concerns of any company where security is an issue. For example, Secure Print enables the user to store documents to print on the printer’s Hard Disk Drive (HDD). Only when a four digit, user-defined password is entered on the printer’s front panel, can the document be printed and the document is not retained after it is accessed. OKI Network IP Security (IP Address Filtering) Support also enables access to a printer (for changing configurations and for printing) to be limited to specific PCs or range of PCs. This limits the number of people who can print to a specific device. In addition, all products

support the disablement of unused protocols and network ports, which prevents unauthorised access to printer and print servers and in turn, reduces the likelihood of external hacking attacks. MANAGED PRINT SERVICES The expert OKI team also offers managed print services (MPS), an approach, which consists of a portfolio of programmes that together help to reduce print-related costs and enhance security. Typically, OKI first discusses the individual department or organisation’s output requirements and then recommends a solution to cater for its specific print needs. It then works directly with the organisation or in collaboration with a professional partner, to carry out an assessment of the current print environment. OKI analyses the volumes currently being printed, in A4 or A3, black & white or colour and agrees a plan to suit the customer’s needs. One of the key elements of OKI’s own MPS offering is its emphasis on print security. Once firms are aware of what they are printing and what cost savings have been achieved, they can investigate the opportunity for automated document management workflows to ensure their essential files are stored exactly where they are supposed to be. Plus, OKI can advise and manage the use of user authentication solutions to ensure sensitive hard copies remain protected. Improving print security is just as much about deploying the right printer as it is about changing working habits – all issues which OKI can highlight after an initial MPS audit. For example, simple tasks such as ensuring that printed documents are disposed of in the

Improving print security is just as much about deploying the right printer as it is about changing working habits – all issues which OKI can highlight after an initial MPS audit.

most appropriate manner or making sure that a print device is not located in an area where it is possible for members of the public to see confidential information can all improve security. Working with an expert print vendor such as OKI, businesses can be confident that print services will be managed in the most efficient and secure manner. With the choice of the most innovative print solutions and the support of an expert team, there is no need for businesses to be concerned about IP security – it is just vital that the appropriate steps and solutions are put in place to minimise risk. L FOR MORE INFORAMTION www.oki.co.uk

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

77



COMMUNICATIONS

EDA awards Astrium three year deal NEWS IN BRIEF New MOD role for military satellite capacity for Thompson Astrium has been awarded a three year contract by the European Defence Agency (EDA) to provide commercial satellite communications capacity for European military needs. This contract will be managed by the EDA’s newly established procurement cell, the ESCPC (European Satellite Communications Procurement Cell). Astrium Services will provide the EDA with satellite communications in commercial bands (C, Ku and Ka) and associated value added services including lease of terminals, anchoring and backhauling, worldwide. The ESCPC will allow the European Union member states to pool their needs, purchase, and even switch satellite communication capacity between themselves, in a coordinated manner, ultimately ensuring the best and most cost effective access to satcom services. To date, five contributing member states (France, Italy, Poland, Romania and the United Kingdom) have decided to join the ESCPC to benefit from cost savings for their commercial satcoms needs. Astrium Services will offer its one-stop-shop 24/7 expertise to manage and

execute a complete service catalogue for the delivery of the upcoming orders placed by EDA on behalf of the contributing member states. Eric Béranger, ceo of Astrium Services, said: “As a commercial company and a pioneer in providing milsatcoms to governments and defence ministries, we are very proud to be the first to provide commercial satellite communications to the European Defence Agency through such an innovative scheme. Being European, Astrium Services is fully engaged in making a significant contribution to European defence.” Demand for satellite capacity is growing significantly, particularly with the widespread use of data rate hungry applications such as drones (RPAS, Remotely Piloted Aircraft Systems) on the battlefields, which require significant satcoms capacity for control and transmission of data from sensors. Astrium Services offers a complete choice of frequency bands covering L, C, Ku, Ka, X and UHF, providing satellite-based military communication services to some of the most demanding armed forces in the world.

DEFENCE AT SEA

Ambush submarine sails into home port in Clyde to begin trials Ambush, the second of the Royal Navy’s potent new Astute Class attack submarines, began sea trials in September as it sailed into Her Majesty’s Naval Base in Clyde, Scotland. The 7,400 tonne submarine sailed from the shipyard in Barrowin-Furness in Cumbria where she was built. The seven Astute Class boats planned for the Royal Navy are the most advanced and powerful attack submarines Britain has ever sent to sea. They feature the latest nuclear technology. The Astute Class is quieter than any predecessors and has the ability to operate covertly and remain undetected in almost all circumstances despite being fifty percent bigger than the Royal Navy’s current Trafalgar Class submarines. Astute Class are the first Royal Navy submarines not to have a traditional periscope, instead using electro-optics to capture a 360-degree image of the surface for subsequent analysis by the commanding officer.

The boat’s Commanding Officer, Commander Peter Green, said: “It was very satisfying bringing Ambush into her home port for the first time after initial sea trials. The ship’s company and I are now looking forward to putting her through her paces over the coming months, bringing her one step closer to being deployed on operations.” Ambush was built by BAE Systems Maritime Submarines at Barrow-in-Furness, with hundreds of suppliers around the country contributing component parts, including Rolls-Royce, Derby (nuclear plant); Thales UK, Bristol (visual system and Sonar 2076); and Babcock, Strachan & Henshaw, Bristol (weapon handling and discharge system). FOR MORE INFORMATION VISIT tinyurl.com/8wmbtuy

Defence News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Jon Thompson took up his new post as the Permanent Under Secretary of the Ministry of Defence in September. Previously the MOD’s director general of finance, he has been responsible for a range of cross-departmental business. Defence secretary Philip Hammond said: “Jon Thompson is highly respected in the MOD. I have worked with him closely and very much welcome his appointment. We have a lot of work to do to build on the balancing of the MOD’s budget, and we will work closely together to do so.”

Tri-service support for Trident alternatives claimed Senior military figures across all of the services are in favour of exploring alternatives to a like-for-like renewal of Trident, former Liberal Democrat defence minister Sir Nick Harvey has reportedly said. According to the Guardian, Harvey told a debate at the Liberal Democrat conference that the idea of moving “down the nuclear ladder” had tri-service support. Options to the current continuous at sea deterrent offered by nuclear submarines included reduced patrols and even missiles that could be launched from surface ships or from air or land. Sir Nick was also reported to have said that a “broad coalition of support” was needed. tinyurl.com/8tegrzl

First UK Hawk completes 5,000 flying hours The first Royal Air Force Hawk TMk2 has completed 5,000 flying hours. The aircraft was flown as part of a formation by wing commander Kevin Marsh, the Officer Commanding IV Squadron. The BAE Systems Advanced Jet Trainer Hawk TMk2 has been in service with the RAF since July 2009. Almost 1000 Hawk aircraft have been sold or are on order, training fast jet pilots in more than 20 other nations. BAE Systems jointly with sub-contractor Babcock’s maintains the Hawk TMk1 and TMk2 aircraft fleets based at RAF Valley, Anglesey. The Hawk has tandem seats, with full controls available in the front and rear cockpit.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

79


Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com info.uk@infranor.com


EADS/BAE MERGER

EADS & BAE MERGER: A DEFENCE MARRIAGE MADE IN HEAVEN?

Defence Focus

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Although many political and ownership hurdles remain, the great merger between two giants of defence technology is on the cards. It would create the largest aerospace and defence company in the world by revenues, with 223,000 staff spread across more than 50 countries. On September 12, EADS and BAE Systems announced that they are exploring the creation of an aerospace and defense combination which would be the largest in the world. October 10 sees the deadline by which the two organisations must submit a formal merger proposal or seek an extension. Afterwards, many political and financial hurdles will still remain due to the complex makeup of the ownership of both companies. BAE is the only foreign owned company to be one of the big six suppliers to the US Department of Defense. It has been able to expand its US subsidiary (BAE Systems Inc) into a $14bn-a-year business employing 40,000 people, by building up a trusted relationship with US politicians. It has received work on very sensitive projects including the $1.5 trillion F-35 joint strike fighter programme, which plan to build a jet capable of avoiding surface-to-air missiles. Some 45 per cent of its income came from America last year. BAE Systems is the UK’s largest manufacturing employer and the UK’s biggest employer of professional engineers, with 18,000 engineers from its 38,000 UK employees. The company is responsible for 80 per cent of all manufacturing related jobs in Barrow-in Furness, 40 per cent in Portsmouth and 70 per cent in the Ribble Valley. Each employee contributes over £78,000 to the UK economy based on productivity levels, compared to a national average of £42,200. BAE Systems’ share price suffered heavily during the 2008 financial crisis, and has remained largely flat over the past few years. EADS SHOWS STEADY GROWTH The European Aeronautic Defence and Space Company (EADS) was created in 2000 when DaimlerChrysler Aerospace in Germany merged with Aérospatiale Matra in France and CASA in Spain.The company currently employs 133,000 staff around the world, including a 15,000-strong UK workforce. Board members include Jean-Claude Trichet, the former head of the European Central Bank, and Lakshmi Mittal, the Indian steel magnate. EADS’ share price has grown steadily over the past five years. The group includes Airbus as the leading manufacturer of commercial

Mantis UAS on the runway at Warton © 2012 BAE Systems

aircraft, with Airbus Military covering tanker, transport and mission aircraft; Eurocopter as the world’s largest helicopter supplier; Astrium, the European leader in space programmes from Ariane to Galileo; and Cassidian as a provider of comprehensive and integral systems solutions for aerial, land, naval and civilian security applications. Through Cassidian, EADS is a major partner in the Eurofighter consortium as well as a key stakeholder in the missile systems provider MBDA. GREATER CONSOLIDATION Nick Clegg, the deputy prime minister, has come out publicly in support of the deal stating: “I personally have always been in favour, over time, of greater consolidation in the European defence industry.” Business secretary Vince Cable, who was savagely critical of BAE over bribery allegations whilst in opposition in 2010, said: “It is a very, very important decision and has major implications for the country, both in terms of employment and national security. We will have to look at the costs and benefits very, very carefully.” Keith Hayward, head of research at the Royal Aeronautical Society said of the proposed

merger: “It would create the largest defenceaerospace group in the world, link all of the Typhoon partners, provide BAES with a civil interest just as defence spending world-wide and especially in Europe and the US flattens or even declines, and afford EADS a better and more positive profile in the US. Strategically it would be a marriage made in heaven.” JOINT STATEMENT On September 30, the chief executives of both organisations (Ian King, BAE Systems and Tom Enders, EADS) issued a joint statement to UK newspapers, which read: “Since news emerged that BAE Systems and EADS are considering a combination which would create a world class defence, aerospace and security group, much has been said on the subject. It has been analysed and interrogated from every conceivable angle by politicians, pundits and competitors alike. “Inevitably, as our discussions with several governments continue, we are not yet in a position to tell the full story and explain the significant benefits of the combination to our shareholders, employees, and other stakeholders who rightfully have an interest in the outcome E

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

81


MPV

A protected environment for every mission.

Iveco DV’s range of Multirole Vehicles, Tactical and Logistic Trucks and Armoured Fighting Vehicles covers the full spectrum of on- and off-road military requirements and represents a well thought through, comprehensive and effective response to the needs of the military customer. Iveco recognises that this needs change in response to the evolving operational environment, developing doctrine and changing threat. As a part of the company’s commitment to our custo-

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

mers’ needs, we aim to identify or anticipate at an early stage how requirements are likely to develop. As a result, the whole product range is subjected to a continuous development process. Evolving needs are fed back to Engineering, who in turn develop a steady stream of enhancements in terms of payload, mobility and protection. Where necessary, complete new vehicle families are developed.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


EADS/BAE MERGER

“We would be able better to ride the cycles of civil aviation demand and defence spending. And we would be a business with the scale and stability to invest more in R&D, and a force for greater competition and growth” Joint EADS/BAE statement E of our discussions. But it is important to correct some myths and misconceptions. “The first thing to say is that this is a combination borne out of opportunity, not necessity. BAE Systems and EADS are both strong businesses with clearly defined strategies that have enabled them to make progress in the last five years, and which would take them forward as independent companies. “But there comes a time when it is right to seize the moment and to create something that is even stronger and better. We believe that time is now. With the necessary political will and support, management determination, and proper governance, BAE Systems and EADS can produce a whole that is greater than the sum of its parts. “Together, we would become a business with a global footprint, and a wider customer base. We would be able better to ride the cycles of civil aviation demand and defence spending. And we would be a business with the scale and stability to invest more in R&D, and a force for greater competition and growth. All of this would deliver tangible benefits to our customers in each of the defence, aerospace and security worlds. COMPLIMENTARY MARKETS “The rationale that drives this transaction is growth, not contraction. BAE Systems and EADS operate in complementary markets. Clearly, there will be scope for efficiency savings when two companies of our size come together, but great benefit will derive from our ability to exploit new business opportunities. That has to be good for jobs and economic prosperity in the long term. It would also mean that we can ensure our key markets stay at the cutting edge of technological development. “We are working hard with our respective governments on this combination. As we said in our initial announcement, we are very focused on agreeing arrangements which protect the strategic and national security interests of the governments with which we work, particularly in France, Germany, the United Kingdom and the United States, given the importance of those markets to the combined group. We propose to replace the shareholder arrangements which currently give Daimler, Lagardère and the French state joint control over EADS. That would mean creating a business with governance structures which would enable it to operate in a normal commercial manner and which confers the same rights on all shareholders, large and small.

Defence Focus

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Tom Enders, EADS

“We believe that a combination on these terms would provide the best strategic opportunity for our organisations, with world class management, technology, investment capability and customer access, to the benefit of all our stakeholders.” POLITICAL INTERFERENCE The merger is currently the subject of a Defence Select Committee Enquiry, which will examine the likely impact on UK defence including the protection of sovereign capabilities and the nature of the defence industrial base. BAE Systems and EADS operate highly capable and sensitive defence businesses in many countries including the UK, the USA, France, Germany, Spain, Sweden, South Africa, India, Saudi Arabia and Australia. The merger of two such large defence contractors would have a significant and strategic impact on their relationships with UK, US and European Governments. It could also radically alter the defence industrial base in these countries. Earlier in the month, former defence secretary Liam Fox has highlighted ‘undue political interference’ as the greatest risk to any merger between BAE Systems and EADS. Fox warned that intervention from governments in France and Germany was likely to be the biggest factor in scuppering the deal. Support for it would be required from three separate European governments and the US Department of Defence, which presents a number of significant hurdles. France directly owns 15 per cent of EADS, the maker of Airbus jets, and wants to retain its right to influence group strategy, currently conducted through a complex pact with 7.5 per cent shareholder Lagardere. Germany is not a direct shareholder but sees the transaction as a chance to tighten its grip on a stake currently held by Daimler AG and a group of banks. Dr Fox insisted there was no need for interference from foreign governments. “Without clear mechanisms to preclude foreign interference, the British Government should not support the proposals,” he said. Fox went on to state his ‘instinctive preference’ for any such partner for BAE to originate from the US, building on BAE’s decision to ringfence its US defence arm to maintain secrecy regarding defence contracts. No French or German executives will serve on the US board, with just one British director being elected to that position in BAE chief executive Ian King. France and Germany have agreed a common strategy for the planned merger,

Ian King, BAE Systems

a German magazine Der Spiegel reported, citing high level civil servants. The plan foresees France and Germany each holding a nine percent stake in the merged entity. A BOLD MOVE Dr Robin Niblett, director of international affairs thinktank Chatham House, called it “The biggest redrawing of global defences since the cold war.” Dr Niblett wrote: “The idea to create one of the world’s largest defence and aerospace companies is indeed a bold move. It would offer its participating countries the opportunity to repeat the success of Airbus in other sectors, such as air defence missiles and unmanned aerial vehicles, while reducing their exposure to the ups and downs of the defence and civilian aerospace markets. But if the UK wants to be a core partner in this initiative, then it may find it needs to commit to a more continental European approach to its success and buy itself a stake in the new company.” L FURTHER INFORMATION Defence Committee www.parliament.uk/defcom Chatham House www.chathamhouse.org EADS www.eads.com BAE Systems www.baesystems.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

83


MILITARY BUILDINGS


MODULAR BUILDINGS

RUBB PRAISED FOR VITAL MILITARY STRUCTURES

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Rubb Buildings has been commended by the UK MoD for providing vital military warehouses to Operation HERRICK in Afghanistan Rubb EFASS buildings were supplied to the Operational Accommodation Technical Output Section (OATOS) of the Expeditionary Campaign Infrastructure (ECI) project team who successfully delivered the equipment infrastructure for the Interim Force Primary Depot in Helmand Province. The OATOS received a Certificate of Commendation from Maj. Gen CL Wilks CBE (director, Land Equipment) for their achievements. The Interim Force Primary Depot aims to provide the deployed force in Helmand with an environmentally controlled facility for the receipt and storage of resources and material. The depot features six of Rubb’s largest expeditionary warehouse systems to date, measuring 25m span x 100m long. A VITAL STRUCTURE Head of General Support Group A R Ashton congratulated Rubb UK on the successful delivery of the Interim Primary Force Depot on Op Herrick in Afghanistan. He said: “This capability is vital to sustain current and future operations in the Helmand Province. The benefits of reduced stock holdings as well as faster receipt and onward transmission will significantly increase the deployable logistics capability available to support the full

spectrum of operations.” “I have been informed that the team went above and beyond the call of duty to get this equipment delivered ahead of schedule. Even to the extent of repacking the equipment in a different configuration so that it could be flown to Afghanistan rather than by ship. Please pass on my congratulations to all of your team who were involved in the project.” L Image caption: John Neilan from the Output Accommodation Technical Output Section at Defence Equipment and Support presented a copy of the commendation to Rubb General manager Ian Hindmoor earlier this year. FOR MORE INFORMATION Tel: 0191 482 2211 E-mail c.wilson@rubb.co.uk www.rubbmilitary.com

The Interim Force Primary Depot aims to provide the deployed force in Helmand with an environmentally controlled facility for the receipt and storage of resources and material.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

85


PROTECTION ACROSS • • LAND, AIR AND SEA

ename: SURVITECneg_PMS.eps Colourway:

100% Pantone PMS 158c

100% Opaque White

• Environmental protection garments • Armoured LPU’s • Liferafts & Boats • Special purpose shelters


FARNBOROUGH AIRSHOW

AVIATION SECURITY ZONE MAKES ITS DEBUT AT FARNBOROUGH AIRSHOW

Farnborough Airshow

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Without aviation security, we can’t fly. It’s that simple. With global terrorism at its most prevalent and with increasing media focus on passenger safety from airport to aeroplane, organisers of the Farnborough International Airshow (FIA) launched the new Aviation Security Zone at FIA 2012. The Aviation Security Zone’s role was to reflect the crucial significance of Airport and Aviation Security in the 21st Century. The aim was also to offer a range of opportunities to aviation security companies of all sizes for targeted exhibiting and networking. The Aviation Security Zone was a dedicated area of 1000 square metres, in one of the main exhibition halls of the show, which was specifically themed to attract trade visitors from an aviation security background. The Aviation Security Zone welcomed multinational companies along with SMEs and local companies, one of which was RJA Security, TAG Farnborough Airport’s security contractor who offer a range of Aviation Security Training services and also provide security services to a number of regional airports throughout the UK. WALK-THROUGH EXPERIENCE Cutting-edge technologies were demonstrated by a total of 21 exhibitors in this new feature area, not least by FLIR Systems the headline sponsor of the Aviation Security Zone and Aviation Security Conference. FLIR Systems created their own walk-through airport security experience, showcasing a range of exciting, revolutionary screening and detection technologies. FLIR also placed radars and cameras throughout the Farnborough Airshow site to demonstrate their latest perimeter detection and surveillance technology, which was then transmitted back to the specially built FLIR Command and Control Centre which also formed part of their exhibition stand design. Other technology showcased in the Aviation Security Zone included access control; software; cargo screening and bluetooth tracking technology in the form of the ‘DNA Tracker’ which was developed by Commercial Link Ltd. As part of FIA 2012’s ADS themed conference programme, the Aviation Security Conference was hosted within the Aviation Security Zone on Wednesday 11th July, welcoming over 100 delegates. Chaired by Sir Edward Crew, the Aviation Security Conference featured the Rt. Hon. Justine Greening MP, (now former) Secretary of State for Transport, Dr Tobias

Technology showcased in the Aviation Security Zone included access control; software; cargo screening and bluetooth tracking technology in the form of the ‘DNA Tracker’ Feakin, senior research fellow and director of national security and resilience - RUSI and Shaun Hipgrave, vice president of the ADS Security Sector. The conference focused on the challenges faced in aviation security and how best to meet them, and included discussions on maintaining excellent passenger experience whilst not compromising on security. SCREENING TECHNOLOGY The conference also covered screening technologies, with focus on the Code of Practice obliging airports to screen passengers sensitively with regard to passenger rights. Other topics addressed were the full introduction of liquids, aerosols and gels (LAGs) screening by April 2013 and reform of Aviation Security regulations. Amanda Stainer, exhibitions and events director for Farnborough International Ltd. said “We were all very excited to see the launch of the Aviation Security Zone within

the Farnborough International Airshow 2012; Aviation Security technology will always be developing and security is something that will always be one of the most important parts of airports and aviation. We are delighted to have acknowledged the importance of this sector at FIA 2012, and by continuing to work with our colleagues in the ADS Security Team and with industry we look forward to increasing our focus on Aviation Security for FIA 2014 and beyond.” Following this successful introduction, Farnborough International Ltd. will be looking at ways of developing, expanding and improving the Aviation Security sector presence at future shows as Aviation Security becomes ever more critical. The next Farnborough International Airshow will take place 14-20th July 2014. L FURTHER INFORMATION www.farnborough.com

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

87



ADVERTISEMENT FEATURE

IS THE THE LAG SAGA OVER?

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

For those involved in aviation security the saga of Liquids Aerosols and Gas has been at the forefront of discussion for many years but recent announcements that the restriction will be lifted in phases starting 1st January 2014 appears to finally herald an end to the delays. However, for airports this is the start of their challenges: Which equipment should we select? What do we need to be able to analyse? What will we do with items we cannot analyse - if there are any? What impact will the equipment have on operations? How do we integrate it to the rest of our security equipment? Which false alarms will we get in practice? Do you get more if you pay more? To assist in answering these questions, it is worth recapping the situation and type of equipment that can be used. LAG Screening equipment falls into 4 categories: Type A – required to access to the actual material i.e. any sealed container has to be opened enough to allow access to the substance being analysed; Type B – has to be able to analyse a single sealed container; Type C – has to analyse a number of containers in a single cycle and identify which (if any) are a possible threat. Type Cs do NOT have to be conveyor based, simply be able to analyse multiple containers; Type D/D+ - has to be able to locate automatically and analyse containers within a bag without requiring the bag to be opened.A D+ test requires the detection of complex electronics (for example a laptop) within the bag at the same time. LAG SCREENING PARAMETERS As part of the trials undertaken by European Civil Aviation Conference (ECAC) to assess any equipment proposed for LAG screening, three parameters are assessed in a laboratory, the probability of: Detecting materials that have been defined as high threat LAGS; Detecting materials that have been defined as second tier threat: equipment must achieve a minimum of x% detection to get a Standard 1 result and a minimum of y% (>x%) to get a Standard 2 result; The laboratory False Alarm Rate against a defined set of ‘safe’ items has to be less than m% for a Standard 1 and n% (<m%) for a Standard 2. Standard 2 equipment is therefore performing to a higher level than Standard 1. Note the exact percentages are classified, hence the use of letters for the percentages. From the above, it appears that the answer is that airports should fit Standard 2 Type D/D+ equipment for an Initial Screen and then a number of Standard 2 Type B for Possible Threat Resolution. There are, however, a couple of points to consider. Firstly, the higher-standard equipment is more expensive and current-standard conveyor based scanners cannot, be upgraded to Type D/D+. At present there are no Standard

2 Type D+ equipments available. Secondly, the Type B will always be required to analyse items that are identified as ‘possible threats’. The KeTech KeScan 1516 ECAC tested Type

properties, and following a technical assessment against other systems available on the market. The KeScan 1516 can easily be positioned next to existing baggage

The KeScan 1516 can easily be positioned next to existing baggage scanners or at transit gates allowing an integrated and targeted testing facility at all points of security within the airport. B Standard 2 system is the highest Type B approved system on the market. It has industry leading false alarm rates, based on dual energy Computed Tomography technology and works for all types of containers. The KeScan range of products has a proven track record and was the equipment of choice by a major European country in 2011. Selected for its industry approvals, high performance and multi-layer detection

scanners or at transit gates allowing an integrated and targeted testing facility at all points of security within the airport. The unique on-screen image of each container and its contents allows simple and effective operation by the airport security staff. L FURTHER INFORMATION 0115 900 5600 ketech.com

How do airports answer the original questions? Which equipment should we select?

The initial restriction lifting, relates to Transit Passengers, therefore Type B is the system of choice. KeScan is already proven, tested and has been chosen for use in a major European country. What do we need to be able to analyse? ALL types of containers. What will we do with items that we cannot analyse? If the right equipment is used, there should be none of these. What impact will the equipment have on operations and how do we integrate it with the rest of our security equipment? One of the major advantages of Type B equipments is that incorporating these into the security cordon does not require major modifications to the conveyor systems. They can be installed in a few minutes and moved as required.

What false alarms will we get in practice?

KeScan trials have returned figures as low as 2 percent across all types of containers: lower than that obtained from various other types of detection equipment.

Issue 11 | COUNTER TERROR BUSINESS MAGAZINE

89


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DETECTION DOGS

Jazz the ‘DNA Dog’ can sniff out stolen metal The first detection dog in the world to be trained to sniff out forensic markings on stolen metal is set to help police officers crack down on metal theft in the UK. A two-year old black Labrador called Jazz has been trained by former police officer and Home Office police dog instructor Mick Swindells to locate SelectaDNA forensic markings on a range of metals including copper, lead and aluminium. Metal theft is costing the UK economy approximately £770m a year and there are about 1,000 incidents reported each week. SelectaDNA is being used in many policebacked crime reduction initiatives across the UK and by companies such as Network Rail to protect copper cable from metal theft. Mick Swindells started his company Search Dogs UK after retiring as a police officer for Lancashire Constabulary. He has trained dogs for a variety of purposes including drugs detection, tracking and trailing, and disaster recovery. Complimenting existing police search procedures, Jazz is able to sniff for stolen metal in places like scrap yards, where metal is often piled high and any containing forensic markings is not immediately visible to the human eye. Jazz was originally a gundog at a farm near Blackpool in north-west England

and it took Mick just two months to train her fully for her new role. Mick said: “Jazz is a world-first. She has been trained to sniff out SelectaDNA, which is a unique covert security marker being used by more than three quarters of UK Police forces to track down burglars, robbers and metal thieves and bring them to justice.” He continued: “As humans we can only search in 2D ie. in the line of sight, but dogs can search in 3D by using their noses. They can be incredibly accurate, and can pinpoint their target to within a couple of centimetres. “Jazz is able to touch the marked metal with her nose identifying the target scent of SelectaDNA, allowing officers to move in at this point and make further investigations.” James Brown from Selectamark, the Kentbased security company that produces SelectaDNA, said: “Jazz could revolutionise

the way we search for stolen metals and criminals themselves. Previously, officers had to search manually for marked metal which could prove time consuming and at times not successful as often the process was like finding a needle in a haystack. The combination of using a trained dog like Jazz to sniff out stolen metal marked with SelectaDNA is surely the ultimate search tool for police and any other investigators determined to catch metal thieves and other types of offenders.” FURTHER INFORMATION www.selectadna.co.uk

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Alcal Technology

46

Holmatro

64

Pentax

Argus Thermal Imaging

72

ICOM

40

Phoenix Datacom

Back Cover/78

Indicomm

20

PK Hydraulics

6

ATG Access

24

Indigo Vision

74

Rubb Buildings

84

Business Systems

21

Infranoor

80

Security Labels

CDVI

48

Ingersol Dor-O-Matic

42

Selectamark

34

Cobhan Antenna Systems

60

International Protect & Prepare

36

South Midlands Communications

57

Counter Terror Expo

26

Iveco

82

SP Services

58

Deben Group

52

Ketech

88

Stemmer Imaging

30

Digital Defence

16

LAPA Security

44

Survivtech Group

86

Draeger

54

Ledco

60

Terrafix

61

Extrudakerb

50

Nedap

66

The McConie Agency

70

Needhams

32

The Photon Shop

59

Arinc

Faronics

15

Inside Back Cover

Fire Eye

10

Niche Events

38

Trizo Electronics

71

Frontier Pitts

25

OKI

77

WaterMota

69

G6 Global Communications

18

Opthalmic/Focus RX

56

Web Root

12

GPS Perimeter

22

Optosecurity

62

World Border

68/76

Pace Systems

28

Heald

90

8

4

Inside Front Cover

COUNTER TERROR BUSINESS MAGAZINE | Issue 11


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.