www.counterterrorbusiness.com | ISSUE 3
PORT & AIRPORT SECURITY Meeting the technological challenge
COUNTER TERRORISM Security Minister outlines strategy to combat terrorism Please visit www. counterterror business.com for more information
sponsored by
POLICE & LAW | SECURITY ESSEN | CARGO SCREENING + MORE
'0$
2QH %UDQG 7ZR 2SWLRQV
727$/ 6(&85,7< 6HFXULW\
\RX FDQ VHH
'8$/ /$<(5 Â&#x2021;7DPSHU HYLGHQW Â&#x2021;7RWDOO\ WUDQVIHUUHG YRLG PHVVDJH Â&#x2021;5HVLVWV FKHPLFDO DQG WHPSHUDWXUH DWWDFN Â&#x2021;%RWK ODEHO DQG VXUIDFH VKRZ YRLG Â&#x2021;8OWUD VHFXUH Â&#x2021;8QLTXH VXEVXUIDFH QXPEHUV DV VWDQGDUG Â&#x2021;$YDLODEOH IURP VWRFN Â&#x2021;&XVWRPLVDWLRQ DYDLODEOH
12 5(6,'8( Â&#x2021;7DPSHU HYLGHQW Â&#x2021;+LJK VHFXULW\ Â&#x2021;1R UHVLGXH Â&#x2021;8QLTXH VXEVXUIDFH QXPEHUV DV VWDQGDUG Â&#x2021;9HUVDWLOH DQG FXVWRPLVDEOH Â&#x2021;6LPSOH SURGXFW UDQJH Â&#x2021;$YDLODEOH IURP VWRFN
70
&DOO QRZ IRU D VDPSOH RQ 9LVLW RXU ZHEVLWH ZZZ ODEHOORFN FRP
COMMENT
www.counterterrorbusiness.com
ALL CHANGE
www.counterterrorbusiness.com | ISSUE 3
BOTH THE UK POLICE FORCE and the Ministry of Defence are
PORT & AIRPORT SECURITY Meeting the technological challenge
facing changes. Home Secretary Theresa May called the police shake-up the “most radical reform of policing for 50 years”, and Secretary of State for Defence Dr Liam Fox is launching a full review of how the Ministry of Defence is run.
COUNTER TERRORISM Security Minister outlines strategy to combat terrorism Please visit www. counterterror business.com for more information
The strategy for reforming the Ministry of Defence will include setting up a Defence Reform Unit that will lead in the reorganisation of the MOD into three strategic pillars. For the police the reforms include a new national crime-fighting agency, to replace the Serious Organised Crime Agency, and elected police and crime commissioners instead of Police Authorities in England and Wales. When such large initiatives are implemented it is hugely important that it is done right, with the right procedures in place. Otherwise the government will be left with a hefty bill and a mission unaccomplished.
sponsored by
POLICE & LAW | SECURITY ESSEN | CARGO SCREENING + MORE
These reforms seem to be responding to the challenges of security in an ever-changing world, something that this issue of Counter Terror Business looks into. Baroness Neville-Jones, Minister of State for Security, discusses what steps she and the government are taking to reduce the UK’s vulnerability to terrorist attacks on page 21, and the British Security Industry Association investigates how technology can help securing ports and airports on page 25.
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 EDITOR Sofie Lidefjard ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION ASSISTANT Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone BUSINESS DEVELOPMENT Anthea Astley PROJECT MANAGER Rachael McGahern SALES ADMINISTRATION Jackie Carnochan ADMINISTRATION Charlotte Casey, Victoria Leftwich PUBLISHER Sally Brockman GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
Enjoy the issue.
Sofie Lidefjard, Editor editorial@psigroupltd.co.uk
MEMBER OF THE PERIODICAL PUBLISHERS ASSOCIATION
© 2010 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
MAGAZINE SUBSCRIPTION I would like to receive a copy of Counter Terror Business magazine for 1 year (4 issues) £35 I would like to receive Counter Terror Business magazine digitally Name
Position
Company Address Postcode Phone
Fax
E-mail Signature
Date
PLEASE SIGN AND FAX BACK TO 020 8532 0066 THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
03
#/-"!4).' 0)2!#9 7%%+ -ASTERCLASSES TH /CTOBER s 3ITE 6ISIT 14th October 2010 #ONFERENCE TH n TH /CTOBER s 4HE 3TRAND 0ALACE (OTEL ,ONDON
Book early and save up to £300
â&#x20AC;&#x153;
An extremely valuable conference â&#x20AC;¦information sharing and highlighting common problems with credible solutions David Fletcher, Quality, Safety and Security Manager, CMA Ships UK Ltd
â&#x20AC;&#x153;
marseqâ&#x20AC;&#x2122;s 5th Official Piracy Update
&EATURING REAL LIFE SCENARIOS FROM PIRATE ATTACKS INCLUDING 4AIPAN !TTACKED 0IRATES !RRESTED
â&#x153;&#x201D; 2EVISED 0IRACY )NTELLIGENCE "ASED /N ,ATEST !CTIVITY
3T *AMES 0ARK !TTACKED 2ELEASED
â&#x153;&#x201D; 5P TO THE MINUTE (IJACK -ANAGEMENT 3TRATEGIES
!SIAN 'LORY !TTACKED 2ELEASED
â&#x153;&#x201D; .EW #OST %FFECTIVE 0REVENTATIVE -EASURES
,ATEST !DVICE &ROM )NDUSTRY %XPERTS )NCLUDING
"OULARIBANK !TTACKED %SCAPED
Hear From International Maritime Experts Including: s +APILA -ALAWWETHANTHRI Fleet Superintendant, LNG and DPA, + ,INE s 3TUART 7ALKER Operator Coordinator, %XXONMOBIL s 4OBY 3TEPHENS Partner, (OLMAN &ENWICK 7ILLAN s !NDREW ,ATTER CSO !NDREW 7EIR 3HIPPING
Chris Holtby, Chairman, Working Group 1, Contact Group on Piracy off the Coast of Somalia
Gavin Simmonds, Head of International Policy, The Chamber of Shipping
Nigel Carden, Deputy Chairman, Thomas Miller P&I Ltd, Chairman, IGP&I
Roland F Hoeger, Managing Director, Komrowski
Paul Shields, Operations Director, Zodiac Maritime
Chairman: David Cotterell, Director, OCIMF
s 3IMON #HURCH Industry Liaison Officer, %5.!6&/2 s #HRIS #HAMBERS US Navy, Director, #OMBINED -ARITIME &ORCES
)N $EPTH )NDUSTRY !DVICE 4O %NSURE 9OUR 3ECURITY 0ROCEDURES !RE 7ATER 4IGHT )NCLUDING â&#x2013; Transfer of the latest anti-piracy skills and LESSONS LEARNT FROM PREVIOUS HIJACKINGS â&#x2013; Critical updates from Government and Military on the GROWTH OF THE PIRACY THREAT and debate long term solutions to PROTECT COMMERCIAL SHIPPING â&#x2013; The 6%29 LATEST "EST -ANAGEMENT 0RACTISE and other industry guidelines revealed
s 3TIG *ARLE (ANSEN
.ORWEGIAN )NSTITUTE FOR 5RBAN AND 2EGIONAL 2ESEARCH s 7ALTER 0 6ERSTREPEN Partner, %LEGIS s *ONATHAN $AVIES Instructor, -AERSK 4RAINING #ENTRE s 3TEVE 0AGET
Director Above Water Battlespace, $EPT OF .ATIONAL $EFENCE #ANADA
â&#x2013; Essential procedures to ensure your HIJACK MANAGEMENT STRATEGIES are updated
s 2OB !NDREW Executive Director, 3ALAMA &IKIRA 'ROUP
Interactive Masterclasses: 11th October 2010
s "ERNARD 6ANHEULE
Senior (Legal) Officer, 2OYAL "ELGIAN 3HIPOWNERS !SSOCIATION
! !DDRESSING 4HE ,ATEST 0RINCIPLES /F 0IRACY 0REVENTION AND #RISIS -ANAGEMENT &ACILITATED BY 4OBY 3TEPHENS Partner, (OLMAN &ENWICK 7ILLAN "
! 0RACTICAL 'UIDE TO %FFECTIVE !NTI 0IRACY $RILLS AND 4RAINING FOR 9OUR #REW &ACILITATED BY *ONATHAN $AVIES Instructor, -AERSK 4RAINING #ENTRE
s 'ILES .OAKES Chief Maritime Security Officer, ")-#/
Site Visit: 14th October 2010 -ARITIME 3ECURITY #ENTRE (ORN OF !FRICA %5.!6&/2
For more info: www.marseq.com Email: info@marseq.com Tel: +44 (0)20 3141 8700 Please quote priority booking code: CTP1
â&#x20AC;&#x153;
s 4HOMAS .INTEMANN Head of Legal & Insurance Department, )NTERSEE 'ROUP
Combating Piracy conferences provide a genuine forum for serious deliberationsâ&#x20AC;¦.much more than just networking. Capt. AK Bahl, Vice President Shipping - Mumbai Branch, British Marine Plc, U.K.
â&#x20AC;&#x153;
#
s $OUG 3TEVENSON
Director of the Centre for Seafarerâ&#x20AC;&#x2122;s Rights, 3EAMEN S #HURCH )NSTITUTE
s 0HILIP 0ASCOE General Counsel, /#)-& s 3TEPHEN !SKINS Partner, )NCE #O
Official Partner:
CONTENTS
www.counterterrorbusiness.com
07
COUNTER TERROR BUSINESS NEWS
The latest security technology news
09
COUNTER TERRORISM The National Counter Terrorism Security Office explains its Vulnerability Self Assessment Tool
CTB Magazine summarises the Counter Terrorism chapter of HMG’s Security Policy Framework A sneak preview of next year’s Counter Terror Expo Baroness Neville-Jones, Minister of State for Security, discusses the next 12 months for counter terrorism
25
PORT & AIRPORT SECURITY
The British Security Industry Association, investigates the challenges of securing ports and airports in an ever-changing world
29
BIOMETRICS
The latest biometric technology solutions can be found at Biometrics Conference & Exhibition 2010
35
SECURITY ESSEN
The world forum for security and fire prevention looks to further expand its global position
41
TRANSPORT SECURITY Transport Security Expo 2010 brings together key stakeholders and industry leaders from the aviation, maritime and supply chain sectors
49
and Olympic partners have completed a major national exercise to test Olympic security preparedness
EMERGENCY SERVICES
The Emergency Services Show provides access to the latest technology, ideas and initiatives to improving public safety
We take a look at the ‘Policing in the 21st century’ paper, which has been described as the most radical reform of policing for 50 years
57
77
SPOTLIGHT FOCUS ON COMMUNICATIONS We take a look at the latest communication solutions
63
CARGO SCREENING
August will see another deadline missed to deliver effective security for bellyhold freight on passenger flights
67
PIRACY
Chris Yates discusses the battle to protect commercial shipping in an area of the world blighted by acts of piracy
71
POLICE & LAW
Over 200 senior representatives from the police and other emergency services, government departments
ACCESS CONTROL/CCTV What measures can you put in place to ensure unauthorised individuals cannot enter restricted areas?
81
NATIONAL RESILIENCE
A|D|S takes a look at the UK security industry’s contribution to national resilience
83
OLYMPIC SECURITY
The British Security Industry Association investigates what security challenges lie ahead for London in 2012
86
SPOTLIGHT FOCUS ON IP TECHNOLOGY
We highlight what’s new on the IP technology market
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
05
0L[HG 6LJQDO 'DWD $FTXLVLWLRQ $// 6\QFKURQLVHG )UDPHV V 9LGHR
[ &2817(5 [ &$1 [ ',1 [ ',2
[ 06 V DQDORJ LQSXW
1
[ N6 V DQDORJ LQSXW
, $7
2
9LEUDWLRQ
'LVWDQFH
5HVLVWDQFH
)UHTXHQF\
7RUTXH
530
6RXQG
)RUFH
3UHVVXUH
$FFHOHUDWLRQ
&XUUHQW
[ 6 V 7KHUPRFRXSOHV 57'
9ROWDJH
+ ,* +
2/ ,6
'LVWULEXWHG 'DWD $TXLVLWLRQ /$1 FK FK
FK FK
FK
FK
7KHUPRFRXSOH 9ROWDJH &XUUHQW 5HVLVWDQFH 57' %ULGJH ,(3(
FK
FK
³&URVV &RPPXQLFDWLRQ³ ZLWK QR V\VWHP ODWHQF\
ZZZ GHZHWURQ FRP
$ H
'HZHWURQ 8. VDOHV#GHZHWURQ FR XN
COUNTER TERROR BUSINESS NEWS
www.counterterrorbusiness.com
DEFENCE SECRETARY ANNOUNCES PLANS FOR MOD REFORMS SECRETARY OF STATE for Defence Dr Liam Fox has outlined the strategy for reforming the Ministry of Defence. The plans include the setting up of the Defence Reform Unit that will lead in the reorganisation of the MOD into three pillars; Policy and Strategy, the Armed Forces, and Procurement and Estates. Dr Fox has launched a full review of how the MOD is run and how the Armed Forces can be reformed to “produce more efficient provision of defence capability, and generation and sustainment of operations”. He said that it was a “disgrace” that there had not been a Defence Review for 12 years, despite the country’s Armed Forces being committed to several conflicts
around the world, and with major changes in the global security picture. The new three pillar structure is designed to stop over-specification and then re-specification of programmes that can lead to cost overruns and programme delays. Dr Fox said the Strategic Defence and Security Review (SDSR) will not be a random selection of cuts but an objective process by which the shape of the Armed Forces required will be reached by the end of the decade. Lord Levene will chair the Defence Reform Unit, with support from outside the MOD by Baroness Sheila Noakes, George Iacobescu, Dr David Allen, Björn Conway and Raymond McKeeve.
NEW THREAT DETECTION SYSTEM READY FOR TEST A NEW SYSTEM being developed to give helicopter crews a ‘heads up’ when they’re being attacked, will ship to Afghanistan in October to see how it stands up under combat conditions. The Helicopter Alert and Threat Termination system, being developed by the Defense Advanced Research Projects Agency, warns aircrews of incoming small-arms or machine-gun fire with enough time to take
evasive action and launch a counterattack, said Karen Wood, the programme manager. It works by using advanced sensors able to detect the supersonic shock wave or “crack” produced by a bullet in flight and pinpointing its source, she explained. The programme, known as HALTT, taps into technology that Wood’s DARPA team already developed for ground vehicles.
DoD photo, courtesy of DARPA
NEW NATO DIVISION FOR EMERGING SECURITY CHALLENGES A NEW DIVISION within the NATO International Staff has been created in order to deal with a growing range of non-traditional risks and challenges. The new Emerging Security Challenges Division (ESCD) started its work beginning of August and will be focusing notably on terrorism, the proliferation of Weapons of Mass Destruction, cyber defence, and energy security. The new division will also provide NATO with a Strategic Analysis Capability to monitor and anticipate international developments that could affect Allied security. The Emerging Security Challenges Division brings together various strands of expertise already existent in different parts of NATO Headquarters, to give it greater focus.
NEWS INBRIEF UK and Kuwait sign security deal The UK has signed an agreement with Kuwait that will see the two countries working closely together on international security. The agreement – will see cooperation in a range of areas, including human trafficking, drug smuggling and cyber crime. Home Office Security Minister Pauline Neville-Jones said: “The Memorandum of Understanding (MoU) will ensure close cooperation between the two countries in vitally important areas such as counter terrorism and international organised crime. Britain is eager to share skills and technological expertise with her friends in the Gulf and I look forward to a close partnership in a common endeavour with the government of Kuwait.” British experts will now work with Kuwait to advise the country on improving and developing its security systems. As well as building stronger relations between the two nations, the MoU will open up new opportunities for UK firms in Kuwait.
UK ‘violates rights’ of terror suspects Amnesty International has accused the UK Government of developing a “shadow justice system” to impose severe restrictions on the rights of individuals suspected of terrorismrelated activity. In a new briefing, Five years on: time to end the control orders regime, the organisation repeats its call on the UK Government to repeal the Prevention of Terrorism Act 2005 (PTA) and abandon the use of control orders that violate the individual’s rights to liberty, freedom of movement, expression, association and privacy. Control orders have been used as an alternative to prosecution or deportation of terror suspects who have not been charged with any criminal offence.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
07
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
DETER AND DETECT – PUBLIC PLACES AND CCTV Salford City council leads the way with digital mapping technology from Cadcorp ID YOU NOTICE if there were any CCTV cameras nearby? It’s a question that is commonly asked by the police of victims of crime. Contrary to popular belief, most CCTV cameras aren’t owned by the police. They are much more likely to be owned by the local council, educational establishments, transport providers, and local businesses. So with few exceptions, police forces in the UK have a very patchy view of what is a widely used surveillance technology. The mismatch between what has been a considerable investment in technology and our ability to use it effectively was voiced in a BBC interview last year by detective chief inspector Mick Neville of the Metropolitan Police’s Visual Images Identification & Detection Office: “We’ve got enough cameras, let’s stop now, we don’t want any more cameras. Let’s invest that money that’s available and use it for the training of people, and the processes to make sure whatever we’ve captured is effectively used.”1
D
THE WAY FORWARD Salford City Council has shown the way forward. Two years ago Salford’s Crime and Disorder Reduction Partnership took the innovative step of capturing not only the location but also the field of view of all councilowned CCTV cameras. Using digital mapping technology from Cadcorp, a digital mapping and GIS system company based in Stevenage, they mapped this information as digital footprints superimposed against Ordnance Survey base mapping. Access to the information was via a web browser, and Greater Manchester Police, Manchester Fire Service, and British Transport Police all agreed to test drive the solution. Their response was universally positive, as they quickly recognised the potential of the system for streamlining crime detection and evidence gathering. Salford’s GIS manager Paul Coward was given the go ahead to develop the system further. With the help of funding from the Home Office ‘Vigilance’ programme, Paul enhanced the application to provide secure log-in for registered users, and he developed a methodology to include CCTV cameras other than those owned by the council. He provided the facility to register
08
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
details on various aspects of each camera, including location, field of view, owner, camera type, and height. Today this awardwinning system now manages information on over 650 cameras, and provides controlled extranet access to over 200 approved users from 18 different organisations. THE BENEFITS Paul explained some of the benefits as follows: “All the agencies involved in crime prevention and reduction in Salford now have a very clear picture of which locations are covered by CCTV. They can see at a glance where CCTV camera coverage is sparse, non-existent, or even redundant, and this can help inform decisions about targeting and redeploying cameras – sometimes in real time. Whenever there is an incident, police can examine its location in relation to CCTV coverage, and they know exactly which cameras to consult to obtain evidentiary video footage. In a recent murder case the police were able to collate all potentially relevant footage, from public and private cameras, in just a few hours of the crime being committed.” In the last twenty years we have seen a remarkable transformation of the central areas of our towns and cities. They are no longer frightening places – thanks to a combination of measures which include designing security into building plans, adopting new policing methods, and deploying surveillance technologies. Unfortunately these gains are under threat as crowded and public places have become attractive targets for terrorists. It is down to our politicians to balance the concern over the uncoordinated and unregulated growth of CCTV, with the clear need to provide surveillance. However, if we do accept that CCTV has a role to play in deterrence and detection, it is encouraging to know that by using GIS technology we can indeed do more – much more – with less.
1. http://news.bbc.co.uk/1/hi/uk/8158942.stm
FOR MORE INFORMATION Tel: +44 (0)1438 747 996 E-mail: richard.spooner@cadcorp.com Web: www.cadcorp.com
COUNTER TERRORISM
www.counterterrorbusiness.com
Written by Chris Phillips, head of the National Counter Terrorism Security Office
IDENTIFYING YOUR WEAKNESSES How can we encourage businesses to protect themselves from an attack that most see as unlikely and some see as non-existent? OW CAN WE GET business in the UK to reduce its vulnerability to an attack from terrorists, whether they be a group linked to Al Qaeda (AQ) or a lone wolf who may even work in the community? This question is at the core of our work here at the National Counter Terrorism Security Office (NaCTSO). Those of us who have access to the threat picture are quite clear on this â&#x20AC;&#x201C; the threat of terrorism in the UK is very worrying indeed and shows no sign of going away in the near future. Crowded places are still the preferred target of terrorists. The National Counter Terrorism Security Office (NaCTSO) has produced a number of products and tools to help business make positive changes. We help businesses understand the threat and then guide them through the vulnerability process. Counter Terrorism Security Advisers across the UK have delivered thousands of briefings and bespoke surveys to business. However, we cannot get to all so we have to prioritise our work. It is common sense that those businesses at the most risk receive the most attention from the Police and Security Service. This could leave a big gap. Realising
H
the importance of the small to medium enterprises (SMEs) to the UK, we have now produced a product especially designed for these businesses, to give them access to the same best practice as the larger companies, all for no cost. I mentioned this product in the last issue, however, I will now give some more detail on the Vulnerability Self Assessment Tool (VSAT). VULNERABILITY SELF ASSESSMENT TOOL The basic tenant to this tool is that it will allow a business to look at itself and its business process, identify its vulnerabilities and then receive free advice that will allow it to reduce those weaknesses. Sounds simple, and for the end user it is. Importantly, the VSAT has been developed in partnership with leading businesses and associations such as the Federation of Small Business across the UK. We wanted it to be completely user friendly. It had to be helpful and detailed enough for those with a security background but also easy enough for someone considering these issues for the first time to complete and, vitally, to understand. Furthermore, it needed to give a means of reducing vulnerabilities that will not involve massive expense. Therefore much
that can be achieved is common sense such as a clear desk policy or keeping people out of staff only areas. It also deals with more structural issues such as having a glass audit. There are many glazing firms that offer this free of charge. Aware of the tight financial constraints on business we have been fortunate enough to have been given a free of charge business continuity plan product by a company used to providing BCP to blue chip companies, Non-Verba Ltd, to support those businesses that would baulk at the normal cost. GETTING HOLD OF THE TOOL Counter Terrorism Security Advisers (CTSAs) will be registering users and you may receive an e-mail inviting you to complete the assessment. Alternatively, users can register by contacting their local CTSA. Guidance on how to register can be found on the main NaCTSO website, www.nactso.gov.uk. In the case of businesses with large numbers of sites, user accounts can be created centrally by NaCTSO. The VSAT will offer a number of options
ABOUT NaCTSO The National Counter Terrorism Security Office (NaCTSO) is a police unit co-located with the Centre for the Protection of the National Infrastructure (CPNI). We are funded by and report to the Association of Chief Police Officers (ACPO). NaCTSO contributes to the UK Governmentâ&#x20AC;&#x2122;s counter terrorism strategy (CONTEST) by supporting the Protect and Prepare strands of that strategy. Our staff can offer specialist advice regarding the security of explosives and pre-cursor chemicals (including fertilisers), pathogens and toxins, radiological sources and other toxic chemicals. We also provide guidance in relation to business continuity, designing out vehicle borne terrorism, the protection of crowded places and reducing opportunities for terrorism through environmental design. To achieve national delivery on behalf of the Association of Chief Police Officers NaCTSO trains, tasks and coordinates a nationwide network of centrally funded, specialist police advisers known as Counter Terrorism Security Advisers (CTSAs). The primary role of these advisers is to provide help, advice and guidance on all aspects of counter terrorism protective security across a variety of sectors.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
09
COUNTER TERRORISM
for the user. On accessing the site they will be asked to input what type of business they are and their capacity. They will then be guided through the process. There are 33 questions which should be quick to complete (depending on the knowledge of the user). The process can be
www.counterterrorbusiness.com
operator or manager to the appropriate measures to reduce their vulnerability. At the end of the report the VSAT will give a detailed report on the current status of the business and the user will be able to print out a commercially sensitive report of recommendations. This will
The National Counter Terrorism Security Office (NaCTSO) has produced a number of products and tools to help business make positive changes. We help businesses understand the threat and then guide them through the vulnerability process paused to allow the user to investigate for information and processes of which they are not aware. This in itself is good news as at the very least by looking for the current situation the user is likely to identify what needs to be done to improve. It will provide owners, operators or management with an understanding of what they need to put in place to reduce their vulnerability to terrorist attack. Furthermore, the self assessment process will signpost the owner,
only be visible and available to the user and this is vital. The user can be assured that no one else will see their answers or what vulnerabilities they may have. THE RESULTS The overall assessment result will be displayed without showing numerical values but will assist the user to prioritise where they may need to make improvements. Following the initial launch users will
be able to view a business sector base line to see how their assessments sit in comparison with other assessments within the UK. Improvements may include the use of a comprehensive Business Continuity Management (BCM) template or a CTSA delivered Project ARGUS or GRIFFIN training event. Each question will provide a means for the user to seek further guidance by way of sign posting. The options will encourage owners/operators to review their working and recruiting practices, risk management or site evacuation and invacuation procedures. Users will also be able to access the latest advice via the main NaCTSO website blog. This work is ground breaking. No other country in the world is offering this free service to business. If you are a business who deals in crowds or are in a place where crowds are, please make use of this tool. It will allow you to help yourself and your community to be safer, more resilient and make the work of terrorists more difficult.
FOR MORE INFORMATION E-mail: nactso@btconnect.com Web: www.nactso.gov.uk
PROTECT YOUR BUDGET AND CARBON FOOTPRINT WITH SPEND2SAVE VOLUTION (E.S.S.) has many years experience of working in MOD, public and private sectors. The company has built an unrivalled reputation in helping organisations get the best possible return on investment when purchasing security systems. Due to the current UK fiscal situation, finance directors and specifiers now have to take into account not just the reducing of long term ownership costs but also lowering energy bills and CO2 emissions. It is worth talking to Evolution to discover the exciting new Spend2Save developments available. Simply choosing the right type of access control lock can provide lower energy consumption. By selecting solenoid or electric-strike locks instead of powerhungry electromagnetic locks you can make significant energy savings over the life of the installation. The resultant savings reduce power supply and battery back-up requirements, ultimately increasing overall system reliability. The use of PoE (power over Ethernet) is new to access control, but there are savings that can be made in the centralisation of power sources and the reduction of main spurs and their associated cabling and containment. Savings can even
E
10
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
be made in access control cards. Looking at consolidating card usage with other systems, such as cashless vending, by using a common smart card can reduce your overall costs and simplify administration, generating even more savings. External CCTV cameras requiring semicovert IR lighting have traditionally used power-hungry bulb IR lamps, and suffer with short bulb life. Alternatively, using IR LED lights, the power requirement can drop by as much as 90 per cent, saving money, CO2 emissions and replacement costs as the working life of LED IR lights can be over five years. In addition, replacing a siteâ&#x20AC;&#x2122;s perimeter flood-lighting, street lighting or other luminaries with white-light LED units can save up to 75 per cent compared with sodium light bulb power requirements, whilst providing better light for CCTV camera.
Replacing a DVR (digital video recorder) with a Hybrid or NVR variant, can result in savings when changing camera locations or adding new cameras by utilising the existing IT infrastructure data network/ Ethernet cabling and ducting. Labour costs for manned guarding can form a major part of any organisationâ&#x20AC;&#x2122;s security budget. Electronic Security Systems that combine Access Control, CCTV and Intruder Detection Systems can provide significant savings on this overhead while providing improvements in safety, integrity, life-time cost savings, lower CO2 emissions and overall peace of mind. The examples above illustrate only a few of the innovative developments currently available. Evolution has the track record in electronic security and can show you how an integrated approach to security could provide a quick return on investment.
FOR MORE INFORMATION Tel: 01494 539880 Fax: 01494 539881 E-mail: ral@evolutionsecurity.com Web: www.evolutionsecurity.com
QRQYHUED ,Q 3DUWQHUVKLS :LWK 1D&762 1DWLRQDO &RXQWHU 7HUURULVP 6HFXULW\ 2I¿FH
+HOSLQJ 9XOQHUDEOH &URZGHG 3ODFHV +HOS 7KHPVHOYHV %\ 3ODQQLQJ (IIHFWLYHO\ 1D&762 %&0 &ORXG ,V $Q ,QLWLDWLYH 3RZHUHG %\ 1RQ9HUED :RUNLQJ ,Q 3DUWQHUVKLS :LWK 1D&762 7R 3URYLGH 7KH %DVLF %XVLQHVV 5HVLOLHQFH 3ODQQLQJ 7RROV )UHH ,Q $SSUHFLDWLRQ 2I &DUU\LQJ 2XW $ 96$7 9XOQHUDELOLW\ 6HOI $VVHVVPHQW 7RRO
Ɣ )UHH RQFH DVVHVVPHQW SURFHVV LV FRPSOHWH Ɣ 8. LV WKH RQO\ FRXQWU\ LQ WKH :RUOG RIIHULQJ WKLV VXSSRUW VR SOHDVH WDNH WKLV VHULRXVO\ Ɣ 9LGHR JXLGHV HPEHGGHG WR KHOS \RX DORQJ WKH ZD\ Ɣ (YHU\ PHPEHU RI VWDII ZLOO KDYH KLV KHU RZQ SHUVRQDOLVHG ZDOOHW JXLGH GHWDLOLQJ NH\ SODQ GHWDLOV Ɣ 3URJUDPPH FRRUGLQDWRUV ZLOO KDYH DFFHVV WR EXVLQHVV LQWHOOLJHQFH WR KHOS WKHP SUHSDUH IRU GLVDVWHU
1D&762 %&0 &ORXG 6FUHHQV <RX GR D 96$7 DQG \RX ¿QG JDSV :KDW QH[W" :RXOG \RX NQRZ ZKDW WR GR" 'RQ¶W ZRUU\ DV WKH DQVZHU LV KHUH« 6RPHWLPHV LQ OLIH \RX QHHG WR VWHS XS WR WKH SODWH DQG GR WKH ULJKW WKLQJ 3HUVRQDOO\ , KDYH WKUHH FKLOGUHQ DQG OLYLQJ LQ DQ DJH ZKHUH ZH KDYH WR IHDU IRU WKH VDIHW\ RI RXU IDPLOLHV DQG RWKHUV , IHHO ZH KDYH D GXW\ WR KHOS LI ZH FDQ LQ DQ\ ZD\ SRVVLEOH :H DOO KDYH EXVLQHVVHV WR UXQ ZLWK WKH ERWWRP OLQH WR FRQVLGHU EXW , IHHO WKHUH LV D QHHG WR WDNH D VRFLDO VWDQFH WR KHOS DQG PDNH D GLIIHUHQFH E\ SXOOLQJ WRJHWKHU DV VXSSOLHUV WR VHH KRZ ZH FDQ KHOS RXU YXOQHUDEOH ³&URZGHG 3ODFHV´ JHW RQ WRS RI HPHUJHQF\ SODQQLQJ HVSHFLDOO\ LQ WKLV WLPH RI ³PRUH IRU OHVV´ ,I ZH GR QRW FRQVLGHU WKLV DQG LW UHVXOWV LQ RXU EOXH OLJKW RU ORFDO DXWKRULW\ SODQQLQJ EHFRPLQJ DW EHVW LQHI¿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¿FH 1D&672 DFKLHYH LWV REMHFWLYHV WR KHOS ³&URZGHG 3ODFHV´ LGHQWLI\ JDSV WKURXJK WKH 1D&762 96$7 WRRO DQG WKHQ SODQ LI QHHGHG WKURXJK WKH ³)UHH´ 1D&762 %&0 &ORXG V\VWHP RQFH DVVHVVHG E\ 96$7
7KH EDVLF DELOLW\ WR SODQ IRU WKH ³:KDW ,I¶V´ FRPHV IUHH LQ 1D&762 %&0 &ORXG DQG \RX FRXOG XVH WKDW DORQH LI \RX ZLVKHG 7KLV ZLOO JLYH DQ\ FRPSDQ\ XQOLPLWHG OLFHQFHV WR EXLOG LQLWLDO UHVSRQVH SODQV XOWLPDWHO\ GHOLYHULQJ SUR¿OHG ZDOOHW JXLGHV WR WKH SODQQHUV DQG EXVLQHVV LPSDFW DQDO\VLV LQWHOOLJHQFH WR WKRVH FRRUGLQDWLQJ WKH HIIRUW 7KH ³:KDW ,I´ PRGXOH LV YHU\ HDV\ WR XVH RQFH FRQ¿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
1RQ9HUED /WG %HUNHOH\ 6TXDUH +RXVH QG )ORRU %HUNHOH\ 6TXDUH 0D\IDLU /RQGRQ : - %' 8QLWHG .LQJGRP ( PDLO FXVWRPHUFDUH#QRQYHUED FRP 7HOHSKRQH )D[
3HWHU -R\FH 0DQDJLQJ 'LUHFWRU 1RQ9HUED /WG
'3928)6 8)6636 )<43 I9 – 20 April 20II Olympia London www.counterterrorexpo.com
Counter Terror Expo delivers both focus and clarity to the complex and multifaceted task of protecting people and assets from those with the intent to do harm. This critically acclaimed event provides a vital forum for debate and plays a key role at the epicentre of the development of future counter-terrorism strategy. Unique, dedicated exhibition with over 400 exhibitors showcasing counter terrorism and specialist security technologies & security High level conference with five streams featuring over 200 leading international speakers Over 120 free-to-attend technology and practical workshops Live product capability demonstrations Networking functions For more information please contact: Nicola Greenaway t: + 44 (0) 208 542 9090 e: nicola.greenaway@clarionevents.com w: www.counterterrorexpo.com
www.counterterrorbusiness.com
THE EVIDENCE IS IN THE DETAIL One of Britain’s leading manufacturers of high-end video storage solutions – Visimetrics Ltd – has become the preferred choice when it comes to ‘observation critical applications’ such as police forces and prisons ISIMETRICS is headquartered in Ayrshire in Scotland and their mission is to bring the enormous advantages of digital imaging technology to CCTV and video surveillance users through the continued development of high-performance capture, storage and management systems. It is fundamental to the company’s design philosophy that systems should be simple to operate and install. The company’s technology is further designed to optimise automation to improve the overall performance of the system and provide the highest quality images for rapid retrieval and evidential purposes. Visimetrics achieves this through inherent skills and experience within the combined disciplines of hardware and software engineering as demonstrated in the flagship FASTAR DVR, which sets the standard for performance and efficiency in the high-end DVR market.
V
of providing the required capacity or if a requirement of RAID is made within the specification, it becomes a means of providing the capacity using a stated level of RAID – no more. It is hence, imperative that you look at the capabilities of various forms of extended storage and why some are more relevant to the write intensive usage of video surveillance than others. As the flexibility of extended storage increases and the use of video management software operating on extended storage systems increases then the distinct flavours of extended storage and how they impact the long term storage, retrieval and export of high data volumes of video surveillance will become essential to SI’s and Users alike.” NEXT STEP – FORENSIC VIDEO ANALYTICS Video management software – and soon also forensic video analytics software – which can help search for certain distinct
As the demand for storing evidence over longer periods of time continues to increase – 90 days is typical for observation critical applications such as police stations for example – the efficiency of how to easily retrieve the relevant images will increasingly become a focal point We decided to take a closer look at why Visimetrics’ technology is the preferred choice when it comes to ‘observation critical applications’ such a police forces and prisons. COMPLEX Craig Howie, commercial director of Visimetrics says: “Many end users find the progression to a networked CCTV system complex and challenging, especially from an IT point of view. Many of the problems associated with providing extended storage systems in video surveillance applications unfortunately stem from certain assumptions or lack of technical knowledge of the solutions available and the underlying benefits of each solution. “CCTV systems are – typically – specified by resolution, frame rate and storage period, without mention of image quality, bitrates or throughput. When tenders and specifications provide such a simple set of requirements then extended storage systems becomes no more than a means
features in stored images such as a logo on a shirt worn by a perpetrator, a specific colour of jacket or other characteristics, will require that the stored image quality must be high to allow for spotting and tracing such details. Craig Howie explains: “As the demand for storing evidence over longer periods of time continues to increase – 90 days is typical for observation critical applications such as police stations for example – the efficiency of how to easily retrieve the relevant images will increasingly become a focal point. Today, most of the forensic search for images relevant to a particular scenario/ case is done by humans physically looking through hundreds or thousands of hours of recorded images in the hope they find something relevant. Shortly, most of this job can be undertaken by software tools which will allow for better and more efficient use of manpower. The reason most often cited for choosing our technology – especially for applications such as police stations – is the high level of detail we provide in the stored
images. For these types of applications there is little point of storing images if they can not be used for evidence either in court or to solve a dispute. Our technology caters for showing, for example, the value of a pound note handed over at the custody desk. Our technology already stores the images in such a high resolution with a level of detail which makes them suitable for forensic video analytics software, for example.” RARE BREED Visimetrics FASTAR is one of a very rare breed of digital video and audio recording systems that utilises individual hardware compression per channel to create full-frame, D1 resolution video evidence with fully lip-synchronised audio. Providing hardware compression ensures that every detail of every scene and every frame is captured and stored just for that eventuality. It’s the surety that you hold the detail necessary to close down any form of allegation promptly thereby saving time, resource and costs swiftly. Supplementing the video capability on FASTAR is the fully integrated stereo audio recording which intrinsically links the audio and video – a defining feature of the performance at the highest level of surveillance recording. This is why over 30 per cent of UK police forces and 70 per cent of HMP Prisons today use Visimetrics DVR solutions.
FOR MORE INFORMATION Web: www.visimetrics.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
13
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
MILITARY PLASTIC ICs GUARANTEE PERFORMANCE IN HARSH ENVIRONMENTS
Steve Knoth and Steve Munns, Linear Technology Corporation, highlight the ongoing need for high reliability ICs that operate over -55ºC to +125ºC in mission critical applications INEAR Technology Corporation has supplied high-performance linear integrated circuits to the defence industry for nearly 30 years and continues to dedicate resources to support the specialised needs of the market. This on-going commitment is underpinned by exceptional long term support of legacy products and industry specific developments such as military plastic discussed in this article.
L
INTRODUCTION Since the Perry directive of 1994, designers of high reliability military systems have been free to select components based on performance rather than being restricted by components qualified to national standards. Today, the use of commercial (0/70ºC) or industrial (-40/85ºC) grade components has become the norm and they are commonly referred to as COTS (commercial off the shelf) ICs. However, many airborne applications still have stringent specifications where operating temperatures at or below -40ºC are encountered and in particular, flight or mission critical systems requiring absolute guarantees of performance. Sensor and control systems in the airframe or engines can be exposed to extremes of temperature and therefore thermal management becomes critical. To address these requirements, Linear Technology Corporation (LTC) offers a range of devices especially designed for high reliability operation in harsh environments known as Military Plastic or MP-grade product. CHALLENGES OF WIDE OPERATING TEMPERATURES Temperature extremes may cause parametric, and, in some cases, catastrophic problems for ICs. Hot temperature issues, including electro migration, parametric drift, parasitic leakage, hot spots and high power dissipation traditionally have been identified and dealt with through improved design and layout techniques by designers. At cold temperatures in extreme environmental conditions and at high altitude, problems faced include parametric drift, board leakage/condensation, low temperature oscillations, instability, overshoot and poor filter performance. IC designs at cold temperature must carefully compensate for these factors. In a cold start scenario, it is not sufficient for components to “function” and then to simply wait for the system to warm
14
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
up. Full operation at below -40ºC can be required for at least 30 minutes, held down by the cooling systems employed. PROTECTING POWER DEVICES Power devices present IC designers with the challenges discussed above but in addition the need to ensure protection for the device itself and to the circuit, either against misuse or fault conditions where propagation of the fault must be avoided. LTC linear regulators incorporate several protection features that make them ideal for use in high reliability systems. In addition to the normal protection features associated with monolithic regulators, such as current limiting and thermal limiting/shutdown, these ICs also protect against reverse input voltages, reverse output voltages and reverse output-to-input voltages. One recently introduced device, the LT3070, employs current limit protection and thermal overload protection with the addition of fold back to keep the power transistor in its SOA (safe operating area). The safe area protection decreases current limit as input-to-output voltage increases and keeps the power transistor inside a safe operating region for all values of input-to-output voltage up to the absolute maximum voltage rating. Under conditions of maximum load current and maximum VIN-VOUT, the device’s power dissipation peaks at around 3W. If the ambient temperature is high enough, the die junction temperature will exceed the 125°C maximum operating temperature. If this occurs, the LT3070 relies on two additional thermal safety features. At about 145°C, the PWRGD output pulls low, providing an early warning of an impending thermal shutdown condition. At 165°C typically, the LT3070’s thermal shutdown engages and the output is shut down until the IC temperature falls below the thermal hysteresis limit. The SOA protection decreases current limit as the
IN-to-OUT voltage increases and keeps the power dissipation at safe levels for all values of input-to-output voltage. The LT3070 provides some output current at all values of input-to-output voltage up to the absolute maximum voltage rating. The LT3070 is available in MP grade and has numerous other features, making it ideal for high reliability, harsh environment applications. MILITARY PLASTIC DELIVERS PERFORMANCE & RELIABILITY LTC has an industry leading position for quality with a ‘best in class’ reliability level of 0.1 FITS (failures in time per billion device hours) across all product grades and families. Additionally, the MP-grade product provides guaranteed datasheet performance through 100 per cent testing of product at -55ºC and +125ºC. All MP products also receive enhanced screening, reliability monitoring and tighter in-process controls. Consideration to MP grade is given from the die upwards at the design phase and in common with all LTC products, MP grade is offered with a lifetime warranty and products are available in LeadFree or with Tin-Lead terminal finishes. CONCLUSION This article has highlighted the on-going need for high reliability ICs that operate over -55ºC to +125ºC in mission critical applications. It discussed the challenges of IC design over temperature extremes and gave an example of how new devices such as LT3070 are addressing these issues. LTC’s MP-grade products were highlighted as a solution to meet the rigorous quality and reliability needs of harsh environment applications whilst offering guaranteed datasheet performance at extreme temperatures.
FOR MORE INFORMATION Full details of the MP-grade product range can be found at www.linear.com
COUNTER TERRORISM
www.counterterrorbusiness.com
PREPARING FOR THE WORST HMG Security Policy Framework, published by the Cabinet Office in May 2010, outlines the mandatory security requirements and management arrangements to which all government departments and agencies must adhere. CTB Magazine summarises its Counter Terrorism chapter ER MAJESTY’S government is perceived by many terrorist groups as an attractive and ‘legitimate’ target. It is therefore of critical importance that Departments meet the obligations outlined in the recently published Security Policy Framework. Individual departments and agencies are responsible for managing their assets – information, personnel and physical. This includes reducing risk from terrorist attack to as low a level as is reasonably practicable. Here it is important to recognise that the visible level of security is a factor in terrorist targeting. Departments have legal obligations to protect employees and visitors, and they must have in place physical security measures, proportionate to the threat and the assets to be protected. Contingency arrangements (which CTB will examine in the next issue) to facilitate the quick resumption of vital services are also essential.
H
RISK MANAGEMENT Departments must employ a risk management approach to counterterrorism protective security, although it is recognised that for certain areas (such as the protection of nuclear weapons and nuclear materials) CT security policy will be intentionally more prescriptive. It should be noted that CT measures are likely to complement other security measures and therefore should be considered in conjunction with general protective security risk management. However, there are some very specific baseline CT measures that all departments must take. RISK CATEGORIES AND THREAT LEVELS Government establishments fall into three risk categories according to the likelihood of being a target of a terrorist attack. These risk categories are HIGH, MODERATE, and LOW. Threat Levels are designed to give a broad indication of the likelihood of a terrorist attack. The Threat Levels are LOW, MODERATE, SUBSTANTIAL, SEVERE and CRITICAL. The five levels reflect an assessment of probability of attack based on an analysis of terrorists’ intentions, targeting priorities, capabilities and any evidence of current planning and timescales. If an establishment is identified as being at immediate threat, the police and security authorities will inform the department and may take control of the scene. This can be either pre or post-incident depending on circumstances and may require
careful handling to avoid compromising intelligence. In order to ensure departments have current information on the terrorist threat, the Centre for the Protection of the National Infrastructure (CPNI) and Cabinet Office Government Security Secretariat (COGSS) produce regular threat updates, some of which can only be seen on a ‘need to know’ basis. GOVERNMENT ESTATE RESPONSE LEVEL SYSTEM The Cabinet Office operates a system of response giving departments a broad indication of the level of protective security readiness required at any one time. The Response Level is informed by the level of threat as well as specific assessments of vulnerability and risk to HMG but Response Levels tend to relate to sites, whereas Threat Levels usually relate to broad areas of activity. The three Response Levels are: NORMAL, HEIGHTENED and EXCEPTIONAL. Precise measures adopted for each individual site and at each Response Level are the responsibility of Departmental Security Officers (DSOs) in consultation with CPNI and specialist counter-terrorist Security Advisers, and must form part of CT planning. Measures are likely to include restricting access, increasing patrols and the frequency of bag searching. A more
detailed description of incremental security measures is set out in the supplementary material within the framework. Department security officers must ensure that the department and its agencies have baseline counter-terrorist physical security measures and counter-terrorist incremental security measures in place at each Response Level. Further, at each Response Level, DSOs must ensure that the identified counter-terrorist incremental security measures are applied. COUNTER-TERRORIST PROTECTIVE SECURITY POLICY AND PLANS Departments are best placed to assess the risks they face, and must develop their own security policies in line with the Framework. This must include an overarching counter-terrorist protective security policy providing management direction for the department’s CT effort. Departments must produce counterterrorist contingency plans setting out the appropriate procedures to be followed in the event of an incident or imminent terrorist threat. CT contingency plans should be developed in accordance with national security authorities’ advice and in consultation with local emergency services and should form part of departmental business continuity plans.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
15
SMi present their inaugural event:
Counter IED and Force Protection Identifying and Analysing Solutions to the IED Threat 6th & 7th October 2010, Copthorne Tara Hotel, London Our top speaker line-up includes: • Colonel Michael Smith, Director, Training, Doctrine and Combat Developments, US Army Armour Centre Command Group • Colonel Santiago San Antonio Demetrio, SP Army, Defense Staff, C-IED COE* • Lieutenant Colonel Geof McCarthy, Section Head, CIED Projects, Land Requirements, Canadian Forces • Lieutenant Colonel (Ret’d) Mike O’Bea, Capability Manager, Virtual Training Combined Arms Centre, TRADOC, US Army • Major Dick Bouwhuis, Staff Officer Technology, Netherlands CIED Joint Task Force • Major (Ret'd) Chris Hunter QGM, Counter IED Analyst, Kratos Enterprises Ltd (Former Senior IED Intelligence Analyst, British Armed Forces) • Major Paul Beaves, SO2 Land Platform Survivability Division, DSTL • Major Thiebaut Xavier, Doctrine and Development Directorate French Engineer School, French Army • Captain Robert Berish, Commander, EOD Flight, Eglin Air Force Base, US Air Force • Jim Blackburn, Assistant Capability Director, European Defence Agency *Subject to final confirmation
The big themes: • Attack the network – Lessons from operations • Training the force – Doctrinal considerations • Defeat the device – Design elements • Prepare the force – Training for IED preparedness • Conquer the device – EW and countermeasures
Photos on cover courtesy of U.S. Army
With specific highlights covering: • A special address on the Canadian experience in Afghanistan • EOD and CIED operations in Iraq and Afghanistan • The effects of IEDs on future armoured vehicle design • Building collaborative efforts to counter IEDs • Employing unmanned systems against IEDs • Making IED threat detection an integral part of training
PLUS A PRE-CONFERENCE WORKSHOP C-IED and EOD: Enhancing Support to the Warfighter through Advanced EOD and C-IED Techniques Tuesday 5th October 2010, 12.30 – 5.00 In association with: Kratos Enterprises
REGISTER ONLINE AT
www.smi-online.co.uk/counter-ied10.asp Alternatively contact Nicolas Pianet on Tel: +44 (0) 20 7827 6728 or email: npianet@smi-online.co.uk
www.counterterrorbusiness.com
MANDATORY REQUIREMENT 65 Department security officers must ensure that the department and its agencies have baseline counter-terrorist physical security measures and counter-terrorist incremental security measures in place at each Response Level. Further, at each Response Level, DSOs must ensure that the identified counter-terrorist incremental security measures are applied. Departments must be ready to impose or remove those measures with immediate effect when there is a change in Response Level and ensure that all staff are made clearly aware of the current Response Level and what counter-terrorist physical security measures must be adopted.
MANDATORY REQUIREMENT 66 Departments and agencies must, as part of their overall protective security policy, have a counter-terrorist protective security policy in place. This must seek to deter and minimise impact of an attack or hostile interest, and must include: A) Application of central advice and guidance B) Departmental roles and responsibilities (including third parties, contractors etc) C) Management controls and assurance that appropriate measures and plans are in place D) Communication arrangements including briefing of staff E) Arrangements for testing counter-terrorist plans F) Liaison with emergency services and any multi-agency contingency plans
MANDATORY REQUIREMENT 67 All government establishments that are assessed to be a HIGH or MEDIUM risk from terrorist attack must have a counter-terrorist contingency plan in place. This must seek to deter or minimise impact of an attack or hostile interest and must include: A) Details of all protective security measures (including physical, personnel, information) to be implemented following an increase, or decrease, in the Response Level B) Instructions on how to respond to a specific threat, event or item (e.g. telephone bomb threat, a suspicious package or delivery, Vehicle Borne Improvised Explosive Device (VBIED), hostile reconnaissance or hostile individuals) C) A search plan D) Evacuations plans, including details on securing premises in the event of full evacuation. E) Business continuity plans F) A communications and media strategy, including handling enquiries from concerned family and friends G) Liaison with emergency services and any multi-agency contingency plans Government establishments that are assessed to be at LOW threat must ensure that these requirements are incorporated into business continuity plans
MANDATORY REQUIREMENT 68 As part of business continuity and emergency response plans, departments and agencies must test their counter-terrorist contingency plans regularly to ensure that plans are effective and that any potential problems are identifies and remedied. Minimum requirements are:
COUNTER TERRORISM
PROTECTIVE SECURITY MEASURES The framework provides detailed policy and guidance on all aspects of protective security and DSOs must refer to these when developing CT policies and plans, but in broad terms they need to ensure: Physical security – that establishments (both new construction and existing), including non-government establishments which sustain HMG business, such as data centres, are suitably robust and offer an appropriate degree of protection against attack and hostile interest. Considerations may include protected spaces, glazing, stand-off, barriers, CCTV, public areas, internal communications, signage, Perimeter Intrusion Detection systems (PIDs), access points and control, building services (e.g. ventilation inlets) and parking areas. Personnel security – there is adequate protection for all staff, as well as personal protection arrangements required for high-threat personnel such as ministers and VIPs. National Security Vetting is a core element of ensuring trusted individuals are employed in sensitive posts. The Counter-Terrorist Check (CTC) plays an important part in CT vetting measures but other aspects of personnel security must be considered equally important, such as the Baseline Personnel Security Standard (BPSS) and ongoing personnel security management. Information security – that all ICT systems, as part of the formal ICT accreditation process, consider and mitigate potential physical and electronic terrorist attack. TESTING CT ARRANGEMENTS Testing and exercises are essential elements in providing assurance – they ensure that staff are well versed in procedure, that equipment and communications are functioning and adequate and that arrangements with external bodies (e.g. emergency services, contractors, suppliers) are effective. They also provide an opportunity to identify and address problem areas. The testing of CT plans is also essential.
A) HIGH risk – at least annually B) MODERATE risk – at least once every two years C) LOW risk – at the least every 3-5 years or part of broader business continuity and emergency evacuation tests
MANDATORY REQUIREMENT 69 Departments and agencies must: A) Submit a brief report to the head of department summarising the additional protective measures implemented following any increase in the Government Response Level B) Provide an explicit statement of assurance on counter-terrorist protective security as part of the annual security report made by the DSO to their head of department C) Report the results of any tests of counter-terrorist protective security plans in the annual security report to the head of department
FOR MORE INFORMATION Full Framework Document The full framework document is available from www.cabinetoffice.gov.uk CONTEST strategy CONTEST is the government’s strategy for reducing the risk from International terrorism. It is available at www.security.homeoffice.gov.uk/ counter-terrorismstrategy/ about-the-strategy1/# Centre for the Protection of the National Infrastructure (CPNI) www.cpni.gov.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
17
Counter Terrorism Prepare, Prevent, Pursue, Protect 10th & 11th November 2010, Hilton London Kensington
CONFERENCE HIGHLIGHTS: HEAR well timed accounts from distinguished international speakers who will update you on the global counter terrorism challenge ASSESS how the UK’s counter terrorism programme has changed since the new coalition government was formed DISCUSS transnational counter terrorism policies, programmes and operations LEARN how terrorists are financing terrorism and hear case studies from the London 7/7 and Madrid 3/11 bombings ANALYSE the security procedures from the 2010 Vancouver Winter Olympics and hear how the London 2012 Olympics will be secured BENEFIT from the opportunity to network with the people you want to meet from the counter terrorism community
PRE CONFERENCE INTERACTIVE WORKSHOP
Exercise Rolling Defence 9th November 2010 12pm – 5pm In association with
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES: Assistant Chief Constable John Wright, Head of Prevent, Office of the National Co-ordinator Special Branch, Home Office, UK
Richard Bryan, Director of Commissioning, Olympic and Paralympics Security Directorate, Home Office, UK
Lieutenant Colonel Reid Sawyer, Director, Combating Terrorism Centre, USA
Detective Peter McGovern, AntiTerrorism Cyber Training Instructor, Department of State, USA
Senior Representative, Vancouver 2010 Olympic and Paralympics Games Secretariat, Canada
Office of Security and Counter
Senior Representative, Ministry of Defence, UK
Detective Chief Inspector Raffaele D’Orsi, S015 Counter Terrorism Command Ports, Metropolitan Police, UK
Fernando Reinares, Professor of Political Science at Universidad Rey Juan Carlos and Senior Analyst on International Terrorism, Real Instituto Elcano, Madrid
Asim Hafeez, Head of Intervention, Terrorism, Home Office, UK
Register online at
www.counterterrorism-conf.com Alternatively contact Teri Arri on +44 (0) 207 827 6162 or email tarri@smi-online.co.uk
BOOK BY 2ND JULY AND SAVE £300 BOOK BY 10TH SEPTEMBER AND SAVE £100
COUNTER TERROR EXPO
www.counterterrorbusiness.com
COUNTER TERROR EXPO – BIGGER, BRIGHTER, BETTER Counter Terror Expo is a highly specialised event for those who are tasked with the complex role of delivering a robust defence against the threat posed from international terrorism OUNTER TERROR EXPO is shifting to the prestigious Grand Hall at London Olympia next year. The move has been prompted by unprecedented demand from exhibitors and delegates alike and marks Counter Terror Expo out as being the premier global event for professionals at the sharp end in delivering a robust defence against the threat presented by international terrorism.
C
DEMAND “The counter-terrorism world is dynamic and the range of threats faced is diverse. Therefore it is incumbent upon us to deliver an event that reflects the operational demands placed on professionals in this vitally important national security arena,” comments Peter Jones, managing director, Counter Terror Expo. “Substantial demand for more space and feedback from exhibitors, speakers and delegates who regularly attend has directed our thinking and driven the changes we have made in order to deliver an even bigger and clearly focused event in 2011.” Counter Terror Expo’s carefully researched conference programme brings over 70 world renowned issue specific experts together to deliver insight, analysis and perspective to the threats faced, across four conference streams developed to accurately reflect the most critical issues and deliver clear focus for debate. The showcase exhibition brings the world’s leading industrialists together to display and demonstrate the counter-measure tools available to professionals in the field, as well as to discuss future requirement with governmental strategists and develop refinement with those delivering countermeasures in the operational environment. Counter Terror Expo’s carefully crafted programme of educational workshops brings the world leading industry experts together with end users to deliver an in-depth understanding of the strategic use of technology in clearly defined operational scenarios. “We continually evolve the event to reflect the ever changing dynamics of the counter-terrorism world. This evolution will
be even more evident in 2011, with delivery of live and interactive demonstrations, particularly of EOD/ IEDD hardware, in a specially constructed open plan theatre at the heart of the exhibition floor. This is just one of the many visible changes including our new look branding,” Peter adds. WEBSITE CHANGES Coinciding with news of significant expansion in the Counter Terror Expo programme, we are also pleased to announce that our online presence is undergoing a makeover. “Visitors to our website will soon experience a new look and feel which brings core information firmly to the forefront and ensures that key resources are never far away. The website is not only our face to the world but also a portal to vital support tools designed to make exhibiting and registering for the event a breeze,” concludes Peter Jones. Counter Terror Expo’s new look website is scheduled to go live at the beginning of September and delivers in-depth information for participants, up to the minute news about the event itself, emerging issues and incidents, as well as key feature material and announcements from the very many exhibitors attending this world class event. The new look and feel, including, logo, colour schemes and layout concepts carry over to related supporting materials and publications. Counter Terror Expo will be held in the Grand Hall of the Olympia Exhibition & Conference Centre, 19-20 April 2011.
FOR MORE INFORMATION For more information about Counter Terror Expo, contact Nicola GreenawayFuller on 0208 542 9090 or e-mail ngreenaway@niche-events.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
19
COUNTER TERRORISM
www.counterterrorbusiness.com
PURSUE, PROTECT, PREPARE, PREVENT Baroness Neville-Jones, Minister of State for Security, discusses the next 12 months for counter-terrorism in the UK HIS YEAR saw the fifth anniversary of the 7/7 London bombings. The fact that we have not suffered a similar scale attack in the UK since the horrific events of July 2005 is testament to the hard work and dedication of the police and the security and intelligence agencies. The threat posed to the UK by international terrorism nevertheless remains. The Joint Terrorist Analysis Centre (JTAC), which operates independently of Ministers and the Home Office, currently judges the UK threat level to be ‘severe’, meaning a terrorist attack is highly likely. My job as Security Minister is to do my best to ensure a safe, secure and free country. While it is near impossible to eliminate the threat from terrorism completely, we can – and we must – take steps to reduce our vulnerability to it. We will cooperate with our international partners, working with them to increase our and their capacity to combat terrorism.
T
PROTECTING THE BRITISH WAY OF LIFE Protecting the public and safeguarding our liberties are not mutually exclusive aims. More security should not mean less freedom; we are after all protecting the way of life of the British people and not just our physical assets. We need to act against those who threaten our safety and security in ways which also safeguard the traditional liberties of the law abiding majority. The coalition will continue to work within the broad framework of the existing counterterrorism strategy (CONTEST: Pursue, Protect, Prepare and Prevent), but we are reviewing certain aspects of implementation. Our counter-terrorism regime must be proportionate, focused and transparent. That is why we are currently undertaking an urgent review of counter-terrorism powers and the legislative framework within which they operate. Among other aspects the review includes control orders, pre-charge detention, the operation of stop-and-search powers (Section 44), proscription and the use of powers by local authorities under the Regulation of Investigatory Powers Act (RIPA). We also need to make progress in the UK’s ability to deport foreign nationals who pose a threat to our national security. Fundamentally, we must ensure that in protecting public security, the powers used to deal with terrorism are consistent with the rule of law and are administered in ways which command confidence in all communities in the country.
The review detailed above largely concerns measures in the Pursue sphere. In relation to Prepare, which aims to prepare for, and mitigate the consequences of, a terrorist attack, there will not only be a continuing focus on prompt, efficient consequence management of threats and hazards to such things as the country’s critical national infrastructure but also an increasing emphasis on building in long term resilience to reduce vulnerability. CYBER SECURITY An area where the UK, in common with other advanced societies, needs to increase its resilience is in the cyber domain. This is not just a matter of government communications and our military capabilities, essential as these are. High levels of cyber security are literally vital to the nation’s economic future – our ability to protect valuable intellectual property and defend the millions of electronic transactions conducted on a daily basis against theft and misappropriation. Across government we will work to help create, in close cooperation with the private sector, conditions in which the UK is seen as an attractive place for domestic and foreign investors to place high value assets. Protect remains a key element: the safety and policing of our crowded places and our sensitive installations as well as the development of first-class border security. We need to be able to intercept anything hostile or criminal approaching our shores, whether goods or people, for which the ability to acquire reliable intelligence and use it in a timely way is essential. Layered security at our airports and end to end security on the journey is another significant component of policy which cannot be obtained without international cooperation. Many parts of this agenda are central to a safe and secure Olympic Games, now only two years away. PREVENTING TERRORISM Last but not least, we are looking hard at the Prevent programme – how to dissuade individuals from listening to the siren call of radicalisation – to ensure it is effective and properly focused. The Prevent review is separate from the counter-terrorism powers review and will report back in early 2011. We have already said that we will deconflict those parts of the strategy that are about frontline intervention against radicalisation, led by the Home Office,
Pauline Neville-Jones
and those which foster the integration of communities led by the Department of Communities and Local Government. In looking at all of these areas, I am confident that by early next year, the government’s strategy for countering terrorism will have been refreshed and strengthened. I am also keen that we take the opportunity to spread UK security expertise more globally and want to engage actively with industry in achieving this. A recent visit to the Farnborough Airshow gave me the opportunity to see first hand some of the impressive work UK based security companies are doing to bring innovative technology solutions to market. This said, it is sad to report that whereas the UK defence industry captures 18 per cent of the worldwide market, the comparable figure for security is only four per cent. Together government and industry can do much better than this and I look forward to working closely with industry through UKTI to achieve major increases in performance. I am glad to say that this month I signed a Memorandum of Understanding with the government of Kuwait on security issues which should provide the UK based security industry with significant opportunities. Clearly, security and defence are not mutually exclusive, which is why the Strategic and Defence and Security Review will be one of the vehicles for ensuring a balanced allocation of resources for our defence and security at a time when spending is under closer scrutiny than ever. The Home Office is a full player in this review which, together with the concurrent National Security Strategy Review, will lay down our priorities for this Parliament and beyond.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
21
-:66<7=<5?*37890=<8;?-:99<>9?,.7=>17 &&&/3:37/27/581 */2. 0856785867(2/+432156$817!8,62-+.48+43/3 31&8 '9>>;?=>5$;868'. 428)51+'5.4+6785817!8)74%2-82'8,6247.432185&531048*5//3043.851-8*/50487(71408 29<;'?36:7=?729(<(:3<6<=.?=>7=<;'?58;425=>4?:=?=$>?*3>94>>;? >7= >;=>9? %:9.6:;4)? ,* ?:?&:66?58;7=925=>4?8 ?-*-, 3685 7 7$8&>4? ?36:7=?:==>;2:=<8;
>7=<;'?0>9 891>4? >5>13>9?"!! ??+?? , *91.?*3>94>>;? >7=? >;=>9)?%:9.6:;4 >18;7=9:=>4?:=? 2:;=<58?%:9<;>?-:7>?+? <9'<;<:? ,*?"!!
:9>?527=81?4>7<';>4?:;4?<;7=:66>4? 89?>:5$?2;< 2>?:006<5:=<8;? 89?27>?<; 0>9<1>=>9?098=>5=<8;)?>13:77.?098=>5=<8;)?:<9089=?7>529<=.)?1: 89?>(>;=?7>529<=.) 0<0>6<;>?098=>5=<8;)?1<6<=:9.?<;7=:66:=<8;7)?36:7=?:;4?3:66<7=<5?098=>5=<8; $:(>?3>>;?4>7<';>4? 89?>:7>?8 ?18(>1>;=?:;4? 2<5 ?4>068.1>;=/?? $>.?:9> 58;7=925=>4?=8?3>?087<=<8;>4?7<1<6:9?=8?32<64<;'?3685 7/?? $>.?:9>?089=:36>)?9>27:36>) :;4?098=>5=<(>/
;;8(:=<(>? 8;5>0=7? ;=>9;:=<8;:6 ,-%%? ? >;=>9???+??? ! ? :29>6?,=/??+???%<7$:&: :)? ;4<:;:? ? ,*?? # ? + + !##??=866? 9>> # ? + # +-*-,? """ 06>:7>?4<9>5=?<; 2<9<>7?=8 ???48;/ <11>91:; 3:37/27/581
-:66<7=<5?*37890=<8;?-:99<>9?,.7=>17 +43/3 7867.$./7-80.65,8436708428.675478*/50485*026,43218*56637608'268+07831 ,763)7476851-8.%7. 8,2314807.+634$ 87)*500$8'2643'3.54321 8,3,7/3178,6247.4321 851)5 2687(714807.+634$ .65,8436708567821782'84%78!26/- 08/56&704871(3621)7145/8,62*/7)0 +1-67-082'8)3//321082'84367085678,62-+.7-875.%8$756831.675031&84%7 4245/81+)*7682'8436708!26/-!3-7 88 2048.+6671485,,/3.5432108'2680.65, 43670831(2/(78*+6131&8268*+6$31&843670 88 %70782,432108.518%5(785 /56&7871(3621)7145/83),5.4
&&&/3:37/27/581
48 "/*08 # &0 8,768*/2. 84%78 .2 /2 %508*7718-7(7/2,7-850858-+65*/785167+05*/785/4761543(784280451-56-8051-*5&0
:5$?-*-, 3685 ?27>7?" ! 759:0?=<9>7?
-:66<7=<5?098=>5=<8; 987<8;?58;=986 %: 89?>(>;=?7>529<=. 6884?58;=986 98&4?58;=986
%<6<=:9.?27>7 <(<6?>;'<;>>9<;' :9 7?:;4?9>59>:=<8; 1>9'>;5.?9>708;7>
;;8(:=<(>? 8;5>0=7? ;=>9;:=<8;:6 ,-%%? ? >;=>9???+??? ! ? :29>6?,=/??+???%<7$:&: :)? ;4<:;:? ? ,*?? # ? + + !##??=866? 9>> # ? + # +-*-,? """ 06>:7>?4<9>5=?<; 2<9<>7?=8 ???48;/ <11>91:; 3:37/27/581
PORT & AIRPORT SECURITY
www.counterterrorbusiness.com
SECURING OUR BORDERS: A TECHNOLOGICAL CHALLENGE Alex Carmichael, technical director at the British Security Industry Association, investigates the challenges of securing ports and airports in an ever-changing world DVANCES IN transport and tourism mean the world seems ever smaller, with our borders falling under increasing pressure to maintain high levels of security measures against the ongoing threat of terrorism, as well as everyday challenges such as arson and vandalism. With extensive premises and a large, transient population, ensuring that a high level of security is in place is imperative for any port or airport. Since 9/11, the UK’s official terrorist threat level has been classified as severe, and as such, continued vigilance against attack is an essential part of the daily security routine. In addition, adequate defences against chemical, biological, radiological, nuclear and explosive (often referred to as CBRNE) type attacks are also necessary.
A
ROUND THE CLOCK SECURITY CCTV is particularly effective in enhancing the security of airports and ports, by acting as a deterrent to criminals and trespassers, while monitoring the activity of authorised personnel such as staff and passengers. A specific element of CCTV, known as Video Content Analysis (VCA) is also increasingly being used. VCA is the name given to the automatic analysis of CCTV images, which is used to create meaningful information about the content. For example, it can be used to automatically detect intruders, identify unattended baggage or count the number of people entering or leaving an area. According to research conducted by the BSIA earlier this year, the use of VCA in airports is increasing significantly. The findings showed that over 60 per cent of CCTV suppliers surveyed provide VCA to customers in the aviation sector. In addition, these customers were identified as the third most frequent users of VCA, which demonstrates the benefits of this technology. A LARGE-SCALE CHALLENGE From an operational perspective, both ports and airports can offer plenty of hiding places for intruders who breach the perimeter defences or find their way onto the site by any other means. As a result, a combination of different security measures is often used to protect the site as a whole, as well as various component buildings and compounds within. Many ports and airports counter these multiple security risks by adopting what
is known as an “onion ring” approach, where several layers of security are used starting from the site’s perimeter all the way back to individual building security or main asset security in order to deter would-be intruders. The outer perimeter layer represents a key starting point in terms of physical protection combined with electronic and/or security patrols. Patrols with dogs can also be used. Attempts to breach fencing, for instance, can be electronically monitored using fence-mounted vibration detectors that trigger an alert in the security control room, with automatically directed camera observation of the area often used to track intruders’ movements and direct security patrols towards them quickly. Thermal imaging is also an effective method used to spot intruders in darkness and adverse weather conditions, and can also be used at ports to detect stowaways and other unauthorised personnel. At the Port of Calais, this technology is being used to detect people swimming in the water who may be intent on attacking a moored vessel. The large expanses of unmanned perimeter at ports and airports often pose a major security challenge, and in such cases fence detection systems, UGS (unattended ground sensors), radar or passive infrared detectors (PIRs), etc are often deployed along such a perimeter, reducing the number of active recording cameras required to monitor the area. ACCESS CONTROL Effective security technology that’s easy to use is a feature of smart access control systems, which represent the next layer of protection beyond the perimeter. Depending on the location and sensitivity of the building or area involved, access control measures can range from paper-based logging systems for temporary contractors’ permits through to access control cards using radio frequency identification (RFID) chips for more convenient proximity reading of card details and activation of gates, turnstiles and vehicle barriers. Biometric-based systems such as fingerprint
readers and iris scanners are alternatives for higher risk locations. These use the unique human characteristics of a person to provide irrefutable proof of identity. Besides their important security function, access control systems can be used as a health and safety tool in the event of evacuation by quickly producing an accurate register of anyone still within a building or area. Security patrols by foot or by vehicle are fundamental for responding to intruder detection and also gives a highly visible security presence. The feeling of security for passengers is also enhanced by the presence of security officers manning access points and by security patrols carrying out random patrols both in the buildings and in the perimeter area. Security officers play a vital part in port and airport security and are often responsible for managing technological aspects of a site’s security solutions, such as CCTV or access control. PASSENGER PROTECTION The most visible of security measures, particularly at airports, are the security checks conducted on all passengers and their hand baggage. All such luggage, including bags, coats, laptops, mobile phones and cameras, undergo X-ray examination before passengers are allowed to enter the departure lounge. In addition, passengers travel through metal detectors or, following recent technological developments, full-body scanners. For both airports and ports, combining CCTV with Access Control and physical security measures such as fencing, bollards, doors and locks, backed up with security patrols can provide an overall security solution that is robust, effective and intimidating to would-be criminals.
The British Security Industry Association is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services and adhere to strict quality standards.
FOR MORE INFORMATION Tel: 0845 389 3889 E-mail: info@bsia.co.uk Web: www.bsia.co.uk
With extensive premises and a large, transient population, ensuring that a high level of security is in place is imperative for any port or airport
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
25
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
IN TODAY’S WORLD SECURITY MATTERS! Turnkey solutions at work with the assistance of entrance control systems provider Broughton Controls Ltd ROUGHTON CONTROLS LTD designs, manufactures, installs and services a vast range of vehicle road blockers, automatic vehicle security barriers, pedestrian security turnstiles and automatic gate systems throughout the UK and the Middle East.
B
HIGH SECURITY DATA CENTRE – MIDLANDS Broughton Controls High Security Division recently completed a project requiring the fast track design and installation of a high security perimeter fence upgrade together with a flexible and secure entrance control system. The location was an existing modern warehouse unit, with a particularly challenging layout and slopes across the entrance area. Broughton Controls undertook the fencing and civil works associated with the project, including the provision of drainage for the bollards, in addition to the supply and installation of the security access equipment. The requirement to allow occasional access to large plant, and site constraints limiting vehicle turning arcs meant that an 18m clear opening would sometimes be needed, whilst day to day operation has to accommodate pedestrians, cars, and small commercial vehicles. SITE REQUIREMENTS The site requirement can be considered in two parts: 1. Pedestrian security was addressed by utilising two bespoke “bi-parting” cantilever (trackless) sliding gates, profiled to maintain a constant and secure under gate gap across the sloping entrance area. One gate is manually operated for use when large plant access is required, whilst the other is automated with three opening options: Pedestrian access – 1.2m opening, Normal vehicle access – 4m opening, Plant access – 9m opening. New High Security perimeter fencing was provided and installed, which included a mechanically locked “contingency” gate for emergency access. 2. Vehicle Access/HVM, the need for flexible operation lead to the selection of a combination of crash tested, automated hydraulic bollards and shallow foundation static bollards, all installed in accordance with CPNI guidelines. The automated bollards are controlled by a custom designed HPU and PLC, which integrate gate and bollard operation, lowering bollards in
sequence with the required gate opening to maximise site security at all times. In accordance with company policy the automated gate is fitted with full pedestrian safety systems with vehicle detection ground loops also providing safety on the bollards. To simplify site operation the gates and bollards are controlled from a console located within the site security office. Once again, at Broughton Controls Ltd we proved our ability to deliver complex integrated site access solutions, on time and on budget. NORTH WEST AIRPORT – VEHICLE SCREENING AREA Broughton Controls was asked to assist with a project to upgrade the Land Side/Air Side screening area of a major North West Airport. The area comprised of five IN and two OUT vehicle lanes, plus the Cyclamen facility. The client had identified the requirement to
expected vehicle throughput, operator and driver safety, provision for access by unusually large vehicles, emergency site lock down facility, operation during power failure, lane signage and traffic lights, Installation program. All these works were to be undertaken on the existing operational site. As an example of our level of involvement and expertise, during the design process a requirement for an Emergency UP facility, to override all safety features and raise all road blockers, was identified, however, the electrical current required was greater than the available supply to the site. To provide this facility, without the installation of an upgraded power supply, costing tens of thousands of pounds, Broughton Controls design engineers linked all road blocker control PLCs and incorporated a short, several millisecond, delay between each blocker operation. This practically indiscernibly delay manages the initial inrush current and provides seamless and reliable operation whilst utilising the existing site power supply. THE SYSTEM PARTS The system comprises of Broughton Controls model 420 High-Sec heavy duty, hydraulic vehicle barriers with full height folding lattice skirts, model 700 full height Turnstiles, and model 360 heavy duty Pedestrian Gates, together with, shallow foundation, model 950 crash tested, (PAS
Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage
improve both pedestrian and vehicle security access, including the installation of PAS 68 Hostile Vehicle Mitigation measures. Working with the client, consultants and main contractor during the design stage, all aspects of the project were examined including: Level of pedestrian security required, level of HVM equipment required, size and frequency of vehicles to be screened,
68) Road Blockers and Bollards, all installed in accordance with CPNI guidelines. Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage. An online, PC based, proximity access control system, together with a bespoke control console within each search lane allows security officers full control of their individual lane, together with management audit reporting.
FOR MORE INFORMATION Broughton Controls Ltd, 33 Stakehill Industrial Estate, Middleton, Manchester M24 2RW Tel: 0161 6551020 Fax: 0161 6551021 Web: www.broughton-controls.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
27
Biometric Fingerprint Readers for Access Control, Identification & Time & Attendance *OREDO 6HFXULW\ LV D OHDGLQJ 8. VXSSOLHU LQVWDOOHU RI %LRPHWULF )LQJHUSULQW UHDGHUV E\ LQGXVWU\ OHDGHUV / ,GHQWLW\ 3HRSOHNH\ ZLWK RYHU \HDUV H[SHULHQFH LQVWDOOLQJ %LRPHWULF V\VWHPV
)LQJHU RQO\ WHFKQRORJ\ QR 3,1 RU FDUG UHTXLUHG
)DVW WHPSODWH VHDUFKLQJ WHPSODWH VHDUFK LQ XQGHU D VHFRQG
,QGRRU RXWGRRU UHDGHUV 3RZHUIXO DGPLQLVWUDWLRQ VRIWZDUH 0XOWL GRRU PXOWL VLWH V\VWHPV
Global Security (UK) Ltd 3HJDVXV &RXUW +HUVFKHO 6WUHHW 6ORXJK %HUNVKLUH 6/ 3$ 7HO (PDLO VDOHV#JOREDOVHFXULW\ FR XN
www.globalsecurity.co.uk
50 000 000 matches per second on x86 system * More than 200 Mio enrollments in last 36 months * benchmark performed on one server node with two Intel X5660 processors
BIOMETRICS
www.counterterrorbusiness.com
EUROPE’S PREMIER EVENT FOR BIOMETRIC SOLUTIONS Border control and military applications feature prominently in top-level conference programme, 19-21 October N AN INNOVATIVE and forward-thinking programme, more than 45 top international speakers at Biometrics 2010 – www.biometrics2010.com – will reveal how biometric technology such as fingerprint, facial and iris recognition is being used to identify individuals – from large-scale government projects such as national ID identity schemes and border control to law enforcement and military applications. The programme features numerous case studies from around the world and reviews results from the latest trials and tests. The 3-day conference takes place 19-21 October in Westminster, London and is supported by a large exhibition.
I
CITIZEN IDENTIFICATION AND BORDER CONTROL WITH BIOMETRICS The conference kicks off with an opening keynote from Kirit Amin of the US Department of State who will guide delegates though the current use of biometrics in US travel documentation. Kirit Amin serves as the chief information officer for the Bureau of Consular Affairs and director for the Office of Consular Systems and Technology (CST) at the US Department of State. CST develops, installs, provides training, and supports CA’s information technology (IT) systems dispersed across 270+ worldwide locations. Mr Amin is responsible for all IT programmes, which support the agency’s mission of protecting the lives and interests of American citizen’s overseas and strengthening US border security. The remainder of the first day looks at three large-scale citizen identification projects in Mexico, India and Angola, which are pushing the biometric design envelope. In a review of these projects,
speakers will reveal why certain biometric modalities were selected; how multimodal biometrics can be vital for success; how biometrics can be used despite challenging environments and how biometrics can help make a fairer society. Looking specifically at the use of biometrics for border control, seven high-level presentations review the use of biometrics in ePassports and eVisas. Delegates will then hear the results of specific government implementations and projects, and look at some of the opportunities and challenges that governments face when working together to share information. Biometric-based automated border control is a useful tool to help ease inevitable bottlenecks that build up when enhanced documents are used to bolster security. There are many lessons to learn, however. A dedicated session on the second conference day considers real-life lessons from a plethora of schemes ranging from Berlin Brandenburg Airport to London Heathrow and the Caribbean. The stream also considers some new concepts on how airport resource allocation can be improved. New for 2010 is a special session on the use of biometrics within military operations. An organised panel discussion including participants from relevant government organisations across the world will investigate how biometrics are used in military operations and the impact they have had. BIOMETRICS IN ACTION The use of biometrics in the law enforcement sector has a long history – from the use of biometrics in prisons, to its use in traditional AFIS implementations. More recently, biometric surveillance techniques have improved, and new modalities, such as iris, are being considered. In a series of presentations to end the conference, delegates are treated to an exciting foray into how biometrics can help solve crime from case studies from
as far afield as Argentina and Australia. Alongside the various case studies highlighted above are a number of presentations from experts in the field reviewing state-of-the-art technological initiatives being investigated and applied around the world, the latest tests and results and look at the next phase of biometric standardisation. FREE VISITOR ENTRY TO BIOMETRICS EXHIBITION The conference is supported by Europe’s largest exhibition for biometrics technology, featuring international biometrics suppliers, systems integrators and related ID and authentication solutions suppliers. The following companies are among those exhibiting at Biometrics 2010: 3M United Kingdom plc, Accenture, Aoptix Technologies, Aware Inc., Cogent Systems, Cognitec Systems, Cross Match Technologies GmbH, DAON, Data Strip, Dermalog, Desko GmbH, Fujitsu, Hitachi Europe, Human Recognition Systems Ltd, id3 Semiconductor, IEEE Certified Biometrics Professional (CBP) Program, Innovatrics, IriTech Inc., L-1 Identity Solutions, LG Electronics USA Inc., Lumidigm, MOBIO, Morpho, Regula, secunet Security Networks AG, SLS Security, Smart Sensors Ltd, Speed Identity AB, Tangent Vision Science Inc., TBS Holding AG, TST Biometrics GmbH, Vision Box, Wacom Europe, WCC Services – Smart Search & Match. Entry to the exhibition is free and visitors should pre-register at www.biometrics2010.com for tickets and details of opening times.
FOR MORE INFORMATION For details of the full conference programme and to register as a conference delegate or exhibition visitor visit www.biometrics2010.com. Biometrics 2010 will be held at the Queen Elizabeth Conference Centre in Westminster, London, UK, 19-21 October.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
29
Conference: 19-21 October 2010 Free exhibition: 20-21 October 2010 Queen Elizabeth II Conference Centre Westminster, London, UK
13th World Conference and Exhibition on the Practical Application of Biometrics
REGISTER NOW FOR REDUCED RATES 3M Security Systems 4G Identity Solutions Accenture Acuity Market Intelligence ARCAM (International) Argentine Chief Ministries’ Office Augmentiq Australian Federal Police Aware Biometrics Institute Bion Biometrics Border Control Programs BSI Bundesdruckerei Citizenship and Immigration Canada Consult Hyperion Dutch Ministry of Justice European Biometrics Forum Fraunhofer Institute French Ministry of Justice Frontex GlobalPlatform Government of India Idiap Research Institute International Biometric Group Lumidigm, Metropolitan Police Mobbeel Morpho NIST NEC Corporation The Post Office Sinfic Spanish Confederation of Savings Banks Symbiotic Consulting Services Touch2ID Unisys Corporation UK Border Agency US Department of Commerce US Department of State Visidon Voice Commerce
Join more than 45 international speakers from the following organisations
Conference 19–21 October 2010
FREE Exhibition 20–21 October 2010
Register now to gain the latest information and solutions on the use of biometrics in large-scale government projects such as national ID identity schemes and border control to law enforcement and military applications.
Pre-register now for free fast-track entry to Europe’s premier event for biometric technology.
Sessions include: ! ! ! ! ! ! !
Biometric citizen identification issues Biometrics at the border: ePassports and eVisas Biometrics within military operations Biometric enrolment Automated border control Emerging biometric applications Enhancing law enforcement biometrics in action
Meet with biometric technology suppliers, system integrators and related ID and authentication solution suppliers.
Sign up now for your free ticket at www.biometrics2010.com
Keynote presentations include: Biometrics for US travel documents Kirit Amin, US Department of State Uniquely identifying 1.2 billion residents: The first lap Srikanth Nadhamuni, Government of India
Europe’s premier event for the biometrics industry
www.biometrics2010.com
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
REDUCING RISKS WITH INNOVATRICS Ghana employs state-of-the-art biometrics solution to help prevent terrorist traffic across borders RACKING the movement of people in and out of a country can be a daunting task, especially when relying upon old, manual systems to inspect and process immigration documentation. The Ghana government recognised that it needed to be more vigilant with immigration control in an effort to stem potential terrorist activity as well as comply with ICAO standards. The International Civil Aviation Organization (ICAO) is a special organisation of the United Nations whose mission is to ensure the safety, security, and continuity of civil aviation worldwide. Composed of 32 member countries and headquartered in Montreal, Canada, the organisation was founded in 1944. The ICAO implements standards around its missions and objectives with which member states must comply in order to retain their status. The growth of civil aviation and availability of small, personal aircraft has introduced new opportunities for terrorists to travel across borders with little or no governmental knowledge. The ICAO recognises this and has created SARPs (Standards and Recommended Practices) to address the security concerns of terrorists employing the worldwide civil aviation system to either carry out terrorist acts or to shuttle terrorist organisation members covertly around the globe. To address this, the ICAO created a SARP that requires member countries to implement biometric-based immigration control systems. This effectively reduces the security risk of terrorists employing the civil aviation system by requiring all immigration, whether those coming in via personal aircraft or those leaving by it, to be governed by secure, biometric processing. The Ghana government selected Buck Press Limited, a software developer and systems integrator, to design and implement a biometric identification system that both complied with ICAO SARP objectives as well as improved an antiquated and manual system of immigration document processing. Looking for an industry-leading biometric analysis software solution, Buck Press Limited selected Innovatrics whose ExpressID AFIS, ANSI & ISO PC SDK has consistently lead competitors in performance and speed. Leveraging a turnkey software development kit and Innovatrics’ expertise, Buck Press Limited designed, built, and implemented a biometric document system to control
T
immigration and emigration across Ghana’s borders thereby ensuring that Ghana complied with ICAO SARP requirements. In conjunction with Innovatrics software, the system also employed the Futronic biometric scanners. Buck Press Limited paid special consideration to ensuring their system was compatible with the Biometric Centre deployed by the ICAO to handle member-country biometric analysis systems. Buck Press Limited’s Innovatrics-based solution for the Ghana government to meet ICAO requirements solved three critical problems. First, it removed the errors associated with the manual processing of immigration documents. Second, it provided a much more streamlined and customerfriendly experience at border control stations; by utilising a system employing biometric immigration documents, the Ghana government is capable of processing more people through its borders in an efficient and effective manner. Third, the system ensured that Ghana complied
with the ICAO-requirements, thereby ensuring that its citizens could continue to travel to other member countries requiring biometrically enabled Passports. By employing a centralised biometric access database and system, the ICAO has ensured a standardised approach that all member countries can employ to meet SARP requirements. The turnkey Innovatrics solution implemented by Buck Press Limited enabled the Ghana government to quickly meet immediate system requirements yet retain flexibility to meet future needs.
FOR MORE INFORMATION Tel: +421 2 20714056 Web: www.innovatrics.com
The Ghana government recognised that it needed to be more vigilant with immigration control in an effort to stem potential terrorist activity as well as comply with ICAO standards
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
31
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
ACCUFACE – THE FUTURE FACE OF BIOMETRICS FROM SYSTEMWARE A
CCUFACE from Systemware Europe is the future of Biometric Facial Recognition. With its innovative and creative approach to facial recognition this is an accolade well deserved. The world’s first truly embedded IR system, this imaginative development allows the AccuFACE to perform not only in normal internal light conditions but equally well in darkness. AccuFACE is a totally hands-free solution eliminating cross infection and making it suitable for hygiene focused locations. AccuFACE has a number of advantages over traditional facial recognition systems that require an external computer to perform recognition, computation and data storage. AccuFACE has the aptitude and embedded capacity to hold its own interactive events log and processing capability. AccuFACE’s unique design lends itself to a wide range of applications, from traditional biometric face recognition rolls to door entry and egress systems within secure locations. One major application is within the time and attendance arena. AccuFACE has the ability to authenticate users in less than one second and provides high recognition accuracy capable of giving
a full pictorial representation including a time and date log of entry and egress, all of which can be tailored through its flexible and iterative management system. This fully programmable system allows the user to reconfigure a number of key aspects, such as IP addresses, passwords, upload and download algorithmic data, and to permit or deny individuals on a day and date basis. Within the events log the end user will be able to interrogate AccuFACE via its unique IP address. This provides the ability to call upon various events within the log, for example, a time-dated pictorial image of any unauthorised access attempts will be recorded. AccuFACE holds all the events, for both confirmed and denied attempts, in the form algorithmic data. AccuFACE stores data within its internal processor and memory, and is capable of working in conjunction with keypad,
card swipes and CCTV technologies via its Wiegand (RS-285, RS-485) interface. It is a truly flexible and resourceful facial recognition system that can perform as a standalone unit just as well as working in a fully networked IP-centric environment. The ease of installation, simplicity of use and accessibility of the logged data make AccuFACE the perfect solution for most environments and applications. SystemWare Europe is delighted to be involved with such an innovative cutting edge solution that answers the question of biometric face recognition. AccuFACE the future face of biometrics!
FOR MORE INFORMATION Tel: +44 (0)1462 732800 Fax: +44 (0)1462 835777 E-mail: enquiries@sysware-europe.com Web: www.sysware-europe.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
33
SECOND GENERATION FORENSIC MARKING HAS JUST ARRIVED is the worldâ&#x20AC;&#x2122;s most advanced forensic acquisitive crime reduction tool
UKâ&#x20AC;&#x2122;s most cost effective forensic crime reduction tool with no annual fees
Most feared by criminals Identifies property instantly
Property Marking Kits for thefts and burglaries, Intruder Spray for robberies and break-ins and Grease for Metal Theft
Links criminals with crime scenes immediately
Used by over 25 UK Police Forces
Find out more by visiting www.selectaDNA.co.uk or call
01689 860757 for more information.
SECURITY ESSEN
www.counterterrorbusiness.com
THE LEADING EVENT FOR SECURITY AND FIRE PREVENTION Security Essen, taking place 5-8 October, is expecting more exhibitors and more visitors T IS THE HOME of the security sector: Security Essen, the world’s premier fair and the meeting point of experts from all over the world. Around 1,100 exhibitors from over 40 nations will present their products and services to the international trade public at Messe Essen 5-8 October. It will be possible to see a large number of product premieres from the security segment and from fire fighting. All the market leaders will be exhibitors in Essen and will show innovative security technologies as well as
I
the most modern security concepts. With its comprehensive range on offer, Security 2010 will once again become the impetus provider for the entire sector. The organisers are expecting over 40,000 visitors from all parts of the world in order to obtain information about new solutions and pioneering developments. The USA is the partner country of Security 2010. The US pavilion in Hall 5 where US firms will present themselves will be the centrepiece of the appearance. Furthermore, US companies will introduce their products
It will be possible to see a large number of product premieres from the security segment and from fire fighting. All the market leaders will be exhibitors in Essen and will show innovative security technologies as well as the most modern security concepts
and solutions in other fair halls. No matter whether security in the public, commercial-industrial or private sphere – the demand continues to be undiminished on a high level. Security will offer people responsible for security from authorities, ministries and companies an informative overview of the latest solutions. Manufacturers of control and surveillance facilities will show how company premises and buildings can be checked with their video installations and movement detectors. If the worst comes to the worst, hold-up, intruder and theft alarm facilities permit a quick reaction. At Security, it will be possible to see measuring devices and forensic equipment that help to clear up incidents rapidly. Another important field is the individual admission management segment. An extensive available range of identification systems, door opening systems and mechanical security devices such as locks and barriers will be introduced to the trade visitors. The trend towards system solutions can be observed in the security segment. Many companies have built up wide ranges here and offer their customers hardware and software from one source. For example, it will also be possible to see completely equipped control rooms at Security. MORE SPACE FOR FIRE PROTECTION The responsibilities for security and fire protection are growing together in many companies. Security is taking account of this. At the last trade fair
© Messe Essen
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
35
SECURITY ESSEN
www.counterterrorbusiness.com
BSIA EXPORTERS ATTEND SECURITY ESSEN
REDUCE BURGLARIES WITH SELECTADNA
S THE TRADE ASSOCIATION representing the UK’s private security industry, the British Security Industry Association and its dedicated Export Council play a vital role in forging productive trade links between UK security companies and overseas buyers. This year’s Security Essen will be no exception, with the BSIA and many of its members on hand to provide advice and guidance on the latest products and services that the UK has to offer. The BSIA’s stand will be located in the British Pavilion, Hall 3. Currently ranked sixth globally in terms of sales volume of security products, services and solutions and with export sales growing steadily year-on-year, the UK is set to become a leading force in the global market. It is seen by many as a high-value and well-experienced supplier of the security solutions that are essential in maintaining the
ELECTAMARK will be showcasing its highly successful range of SelectaDNA property marking products at Security Essen, Stand 3-502 N, Hall 3. SelectaDNA is a new forensic property marking system that is being used extensively in the UK and Europe in numerous police crime reduction initiatives. By using SelectaDNA, burglaries and residential theft have been reduced by 85 per cent in some areas. Behind the scenes, SelectaDNA is also being used in police undercover surveillance and sting operations, resulting in successful convictions and bringing criminals to justice. Andrew Knights, managing director, said: “We have built up a comprehensive range of forensic DNA products that are market leaders in their respective fields. We are keen to demonstrate these products to a wide audience at Security Essen and in particular to any international visitor who may be interested
S
A
integrity of society, businesses and critical infrastructures around the world. The BSIA’s Export Council serves as a forum for companies focused on extending their business into new markets, acting as an invaluable port of call for anybody interested in developing a relationship with a UK company, either as a customer or distributor. To find out more about the BSIA and its Export Council, visit www.bsia.co.uk/exporting
FOR MORE INFORMATION Tel: 0845 389 3889 Fax: 0845 389 0756 E-mail: info@bsia.co.uk Web: www.bsia. co.uk/exporting
in joining our fast-growing SelectaDNA distributor network.” Selectamark’s German distributor SDNA Forensische Markierungstechnolgie GmbH has already implemented residential property marking schemes using SelectaDNA in Bremen and Bremerhaven. SelectaDNA was recently awarded a Gutachten, the first forensic marking product to achieve this technical confirmation of safety. The company’s Dutch distributor, Rhine Group BV, recently won a major contract to protect the main rail infrastructure in the Netherlands from metal theft, using SelectaDNA.
FOR MORE INFORMATION Tel: +44 (0)1689 860757 Fax: +44 (0)1689 860693 E-mail: sales@selectamark.co.uk Web: www.selectadna.co.uk
ůĞĂĚŝŶŐ ŵĂŶƵĨĂĐƚƵƌĞƌ ŽĨ ƚƵƌŶĞĚ ƉĂƌƚƐ ĂŶĚ ƌĞůĂƚĞĚ ŝƚĞŵƐ ŽƵƌ ƉƌŽĚƵĐƟŽŶ ĐĂƉĂďŝůŝƟĞƐ ŝŶĐůƵĚĞ Ăůů ƐŽƌƚƐ ŽĨ ŵĂĐŚŝŶĞĚ ĐŽŵƉŽŶĞŶƚƐ ŵĂŶƵĨĂĐƚƵƌĞĚ ƚŽ ĐƵƐƚŽŵĞƌƐ ĚƌĂǁŝŶŐƐ ĂŶĚ ĂŶ ĞdžƚĞŶƐŝǀĞ ƌĂŶŐĞ ŽĨ ĨĂƐƚĞŶĞƌƐ ŝŶĐůƵĚŝŶŐ ŶƵƚƐ͕ ďŽůƚƐ͕ ƐŽĐŬĞƚƐ͕ ƐĐƌĞǁƐ͕ ƉĂƌĂůůĞů ĂŶĚ ƚĂƉĞƌ ƉŝŶƐ ĂŶĚ Ă ŚŽƐƚ ŽĨ ŽƚŚĞƌ ŝƚĞŵƐ ƵŶĚĞƌ ƚŚĞ ŐĞŶĞƌŝĐ ŚĞĂĚŝŶŐ ŽĨ ĨĂƐƚĞŶĞƌƐ͘
ͻ dƵƌŶĞĚ ƉĂƌƚƐ ƚŽ ĚƌĂǁŝŶŐ ͻ DĂĐŚŝŶĞĚ ĐŽŵƉŽŶĞŶƚƐ ͻ ŝƌĐƌĂŌ ĨĂƐƚĞŶĞƌƐ ͻ ^ƉĞĐŝĂů ŶƵƚƐ ĂŶĚ ďŽůƚƐ ͻ ^ŽĐŬĞƚ ƐĐƌĞǁƐ ͻ dĂƉĞƌ ƉŝŶƐ ͻ WĂƌĂůůĞů ƉŝŶƐ ĞƐŝĚĞƐ ƚŚĞ ƉŽƉƵůĂƌ ŵĂƚĞƌŝĂůƐ ƐƵĐŚ ĂƐ ŵŝůĚ ĂŶĚ ŚŝŐŚ ƚĞŶƐŝůĞ ƐƚĞĞů ǁĞ ĐĂŶ ŽīĞƌ ďƌĂƐƐ ĂůƵŵŝŶŝƵŵ ĂŶĚ Ă ǀĂƐƚ ƌĂŶŐĞ ŽĨ ƐƚĂŝŶůĞƐƐ ƐƚĞĞů͘ ZĞĐĞŶƚůLJ ǁĞ ŚĂǀĞ ĞdžƉĂŶĚĞĚ ŽƵƌ ƌĂŶŐĞ ŽĨ ŵĂƚĞƌŝĂůƐ ƚŽ ŝŶĐůƵĚĞ ƚŚĞ ĞdžŽƟĐ ĂůůŽLJƐ ŝŶĐůƵĚŝŶŐ ƐƵƉĞƌ ĚƵƉůĞdž ŚĂƐƚĞůŽLJ ĂŶĚ ďƌŽŶnjĞƐ ƚŽ ŶĂŵĞ Ă ĨĞǁ͘
ĂŶ ǁĞ ƐŚŽǁ LJŽƵ ŚŽǁ ŐŽŽĚ ǁĞ ĂƌĞ͍ Ăůů ƵƐ ŶŽǁ ŽŶ ϬϭϯϰϮ ϯϭϲ ϭϰϮ
36
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
SECURITY ESSEN
www.counterterrorbusiness.com
in 2008, companies and institutions dealing with all aspects of fire protection presented themselves in a compact form in one hall for the first time. The new concept met with great approval. Therefore, the exhibition section will be enlarged this year. On the occasion of Security 2010, suppliers of preventive fire protection, early fire detection and fire fighting will, with Hall 1, have more than twice as much area at their disposal. Under the heading ‘Fire Prevention’, the fire protection experts will congregate there. The concept of the fire protection hall will be implemented together with the partner of Security, Bundesverband Technischer Brandschutz (bvfa – Federal Association for Technical Fire Protection). INNOVATION SYMPOSIUM Leading European experts from the political, industrial, economic and scientific fields will comprehensively devote themselves to the challenges of civil security during the Essen Security Innovation Symposium. The speakers will include Stefaan De Clerck, Belgian Minister of Justice; Dr. Luigi Rebuffi, CEO of the European Organisation for Security (EOS) industrial platform; and Prof. Wolf-Rüdiger Dombrowsky from Steinbeis-Hochschule Berlin. The Essen Security Innovation Symposium will make an important contribution to a better understanding of the steps necessary for the implementation of research results and their innovations. This will be highlighted by the fact that the Security Research Department of the Research Execution Agency (REA) of the European Commission will participate in the event. “The event will centre on the search for European and international solutions to all-encompassing problems that exist in a concrete form and are placing new responsibility not only on the state but also on industry and the economy,” explains Prof. Dr. Alexander Siedschlag, director of CEUSS, Center for European Security Studies at the Sigmund Freud Private University of Vienna and organiser of the conference. “Assuming responsibility begins with that knowledge at the international level which this symposium would like to accumulate and pass on.” The event will offer a diverse platform for experts to bring up the relevant security aspects within the framework of international presentations. Siedschlag continues: “Security as public property will have to approach the question in what way the public and private sectors will best pursue their interdependent objectives in the future in order to be able to jointly protect the society and the infrastructure.” 23 speakers from politics, the economy and science from 12 different countries are scheduled to participate. On 5th October, Stefaan De Clerck, Belgian Minister of Justice, will deliver a speech about the programme of the Belgian presidency of the EU Council in the field of Home Affairs. Minister De Clerck is a graduate jurist and,
as a mayor, has gathered experience in the municipal implementation of security concepts. His opening contribution will therefore stand for the concept of the symposium, i.e. combining practical questions with comprehensible, scientific findings close to the applications. Following this is Dr. Luigi Rebuffi, CEO of the European Organisation for Security (EOS) industrial platform, who will discuss the consequences of the Lisbon Treaty for the European security industry. Dr. Rebuffi has a doctorate in thermonuclear research and, after his scientific career, has worked in the management of European conglomerates in the security sector. As the CEO of EOS, he also advises the cabinets of several EU Commissioners. The final speech on 6 October will come from the wellknown disaster researcher Prof. Wolf-Rüdiger Dombrowsky from Steinbeis-Hochschule Berlin. Prof. Dombrowsky is a member of the Radiation Protection Commission at the
and Asset Services) which will present their services. Security service providers, universities and the media will introduce themselves, and will focus attention on the training and advanced training of the specialists while doing so. IT SECURITY Nowadays, companies must also be more and more safeguarded virtually, so IT security is one of the central questions of the people responsible for corporate security. Solutions for information protection and data security facilities will be shown at Security. The IT theme park in Hall 4 at Security will give practical answers to questions from people responsible for IT security, where as already in 2008, exhibitors will present their innovative solutions there. IT security will also be a central field of the forums in Halls 4 and 1 where experts will, in lectures and demonstrations, provide information on the subjects of security
Nowadays, companies must also be safeguarded virtually more and more, so IT security is one of the central questions of the people responsible for corporate security. Solutions for information protection and data security facilities will be shown at Security. The IT theme park in Hall 4 at Security will give practical answers to questions from people responsible for IT security Federal Ministry of the Environment, Nature Conservation and Reactor Safety as well as the Vice-Chairman of the Protection Commission at the Federal Ministry of the Interior. SPECIAL SHOW FOR SERVICE SECTOR People play a great role in the security sector. Security 2010 provides information about training, and introduces security and guarding possibilities by service providers. Moreover, manufacturers present the complete equipment for employees in the security field. The range on offer extends from working and protective clothes via personal equipment right up to close combat protection. It will also be possible to see special vehicles at Security. For the first time, the fair will dedicate an independent special show to the service segment. Under the banner ‘Protection, Security and Service’, the area of over 300 square metres in Hall 4 will be the central meeting place for security service providers. The participants will include Bundesverband Deutscher Wachund Sicherheitsunternehmen (Federal Association of German Guarding and Security Companies) and Bundesvereinigung Deutscher Geld- und Wertdienste (Federal Association of German Money
organisation, video, alarm installations as well as IT security. Upon request, visitors will receive the handouts and video recordings of the lectures. Until the next Security, it will be possible to retrieve this data from a separate homepage. INNOVATION AWARD Traditionally, Security is the showcase for new products and services in the security and fire protection sectors. In the over 30-year history of the international trade fair, outstanding innovations and new products and services have premiered in front of the trade public. Messe Essen honours this innovation potential with the Innovation Award. It was conferred for the first time in 2008 and already met with an outstanding response on the occasion of this premiere. Over 70 companies had applied to be candidates and an eight-strong manufacturerindependent jury of experts examined their entries for innovation content, user benefits, economic viability and reliability. The prize will be presented within the framework of a gala evening on October 4.
FOR MORE INFORMATION Web: www.security-essen.de
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
37
OUR INTELLIGENT SENSORS JUST GOT EVEN SMARTER!
Fence Detection System
Buried Cable Detection System
Digital Microwave Link
PROVEN PERIMETER PROTECTION. NEW SINGLE-PLATFORM SIMPLICITY. 6RXWKZHVW 0LFURZDYH LV UROOLQJ RXW H[FLWLQJ FKDQJHV WR RXU ,175(3,'Â&#x152; IDPLO\ RI SHULPHWHU GHWHFWLRQ V\VWHPV ZLWK SHUIRUPDQFH HQKDQFHPHQWV WR ILHOG SURYHQ VHQVRU WHFKQRORJLHV DQG WKH VLPSOLFLW\ RI QHZ VLQJOH SODWIRUP QHWZRUNLQJ 8QLYHUVDO VHW XS VRIWZDUH VFDODEOH V\VWHP FRQWUROOHUV WR VXLW DQ\ VLWH SDUDPHWHUV DQG LQWHJUDWHG , 2 PRGXOHV DOLJQ ZLWK D FRPPRQ RSHQ DUFKLWHFWXUH FRPPXQLFDWLRQV SURWRFRO IRU HDV\ GHSOR\PHQW RI DQ\ FRPELQDWLRQ RI ,175(3,'Â&#x152; VHQVRUV DQG DX[LOLDU\ GHYLFHV RQ RQH QHWZRUN SODWIRUP OHWWLQJ \RX SURWHFW HDFK SRUWLRQ RI \RXU SHULPHWHU ZLWK WKH RSWLPDO VHQVRU IRU WKDW ORFDWLRQ )LQDOO\ KLJK SHUIRUPDQFH SHULPHWHU SURWHFWLRQ PHHWV WUXH V\VWHPV FRQYHUJHQFH 7R OHDUQ PRUH YLVLW ZZZ VRXWKZHVWPLFURZDYH FRP LQWUHSLG See us in
Southwest Microwave Ltd.
Hall 5, Stand 217-L
SMARTER PERIMETER DETECTION SYSTEMS Suite 3, Deer Park Business Centre, Woollas Hill, Eckington, Pershore, Worcestershire, WR10 3DN UK Telephone: +44 (0) 1386 75 15 11 Fax: +44 (0) 1386 75 07 05 Email: infossd@southwestmicrowave.com www.southwestmicrowave.com
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
SMARTER PERIMETER SOLUTIONS Southwest Microwave announces new-generation INTREPID™ sensors OUTHWEST MICROWAVE has announced the European launch of its latest generation INTREPID™ intelligent perimeter detection sensors to coincide with the upcoming Security Essen trade fair, scheduled from 5-8 October 2010 in Essen, Germany. New-generation INTREPID™ sensors will offer systems integrators and endusers an integrated, multi-technology solution to address diverse outdoor perimeter security needs. The system, which provides fence, buried cable and digital microwave protection alternatives, couples performance enhancements to Southwest Microwave’s field-proven INTREPID™ intelligent detection technologies with the simplicity of single-platform networking.
S
PRECISION AND RELIABLITY “What has differentiated Southwest Microwave over the last 40 years is not simply the precision and reliability of our systems, but that our solutions are engineered around the needs of our users,” explained Martin Lomberg, Southwest Microwave’s European general manager. Designed to reduce the cost and complexity associated with systems integration when site characteristics or security level require deployment of multiple detection technologies, newgeneration INTREPID™ is the latest reflection of Southwest Microwave’s customer-focused philosophy. “Integration of all elements of a perimeter security programme has been no simple task for the installer or the end-user,” says Lomberg. “With cut/climb, covert and microwave detection options, the INTREPID™ system is versatile enough to address quite a broad range of protection challenges.
And by deploying all of these solutions on a single network platform, users can easily and cost-effectively protect each portion of the perimeter with an optimal sensor for that location.” The INTREPID™ MicroPoint™ II fence detection sensor and MicroTrack™ II buried cable sensor offer unique detection capabilities to protect even the highest security sites – including precise location of intrusion attempts to three metres and uniform detection across the coverage area, regardless of fence condition or site terrain. Software-based zone assignment with tie-in to CCTV presets allows precise, immediate alarm assessment from the convenience of the control room. Like their predecessors, MicroPoint™ II and MicroTrack™ II solve environmental nuisance alarm problems common to other sensors by successfully discriminating between legitimate attacks and harmless disturbances. The all-weather, K-band INTREPID™ MicroWave 330 digital microwave link, with a 244-metre detection range, six field-selectable modulation channels and microwave path monitoring for signal changes, protects open areas, gates, entryways, rooftops and walls. CONVENIENCE For unparalleled configuration and operating convenience, new-generation INTREPID™ sensors employ a common communications protocol, universal set-up software and system controllers with multi-language capabilities, integrated I/O modules and a broad (10.5-60 VDC) input voltage range. INTREPID™ sensors are seamlessly networked via RS422 serial data interface. Network architecture guarantees alarm delivery time and
can be structured in a variety of configurations to best address network size and alarm delivery requirements. A third-party SDK is available to integrate new-generation INTREPID™ sensors into custom control applications. Four additional system control options offer scalable security management solutions for virtually any site parameters. Set up of the system is simplified with a universal installation/ service tool which features sensor autodiscovery, guided navigation, and forward propagation for single step, multi-sensor zone configuration. An integrated global language function supports operation in the language of the operator’s choice. “Our goal is to offer our customers seamless, flexible solutions for their complete perimeter detection and security management needs without the challenges traditionally associated with integrating multiple technologies,” Lomberg said. “Our new-generation INTREPID™ fulfills a distinct need in the PIDS arena.” Southwest Microwave has been a trusted global supplier of perimeter detection technologies since 1971.
FOR MORE INFORMATION For more information about newgeneration INTREPID™ technologies, visit Southwest Microwave at Security Essen 2010, Hall 5, Stand 217-L or online at www.southwestmicrowave.com/intrepid
With new generation INTREPID™ fence, buried cable and digital microwave sensors, high performance perimeter protection meets true systems convergence.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
39
TRANSPORT SECURITY
www.counterterrorbusiness.com
IMPROVE YOUR IED DETECTION KEEPING SECURITY AT THE TOP
SECURING PEOPLE AND GOODS THANKS TO VISUAL IDENTIFICATION
ACTICAL5 is a unique company active in the security world. We offer not only products but also a wide range of services around the world of explosives. Our range of services responds accurately to the requirements in the security sector and the demand for extremely specialised consultancy, procedures and training. Tactical5 is mostly active in aviation, ports, mass transit but also for large enterprises. We are based in Belgium but we work globally. We offer a wide range of explosive simulants, mostly used for training of security agents, law enforcements, militaries. We carry plastics explosive simulant but also
W becoming
T
powder and liquids. Most of our simulants can be supplied contaminated. We offer the largest variety of detonators, igniters and all EOD accessories. As services, you have the choice between: Consultancy, procedures, audit and Red Team for airport security but also ports, mass transit and large enterprise, training of explosives, IED but also for x-ray, CT scan (EDS, ETS), and x-ray simulators for training and drilling. Our products are used by fines institutions like TSA, DHS, DGAC. Our website will give you a lot of information but if you don’t find what you are looking for, please contact us.
FOR MORE INFORMATION Tel: +32 488616617 Fax: +32 2 7062320 E-mail: info@tactical5.com Web: www.tactical5.com
dĂĐƟĐĂůϱ ŝƐ Ă ƵŶŝƋƵĞ ĐŽŵƉĂŶLJ ĂĐƟǀĞ ŝŶ ƚŚĞ ƐĞĐƵƌŝƚLJ ǁŽƌůĚ͘ tĞ ŽīĞƌ ŶŽƚ ŽŶůLJ ƉƌŽĚƵĐƚƐ ďƵƚ ĂůƐŽ Ă ǁŝĚĞ ƌĂŶŐĞ ŽĨ ƐĞƌǀŝĐĞƐ ĂƌŽƵŶĚ ƚŚĞ ǁŽƌůĚ ŽĨ ĞdžƉůŽƐŝǀĞƐ͘ KƵƌ ƌĂŶŐĞ ŽĨ ƐĞƌǀŝĐĞƐ ƌĞƐƉŽŶĚƐ ĂĐĐƵƌĂƚĞůLJ ƚŽ ƚŚĞ ƌĞƋƵŝƌĞŵĞŶƚƐ ŝŶ ƚŚĞ ƐĞĐƵƌŝƚLJ ƐĞĐƚŽƌ ĂŶĚ ƚŚĞ ĚĞŵĂŶĚ ĨŽƌ ĞdžƚƌĞŵĞůLJ ƐƉĞĐŝĂůŝƐĞĚ ĐŽŶƐƵůƚĂŶĐLJ͕ ƉƌŽĐĞĚƵƌĞƐ ĂŶĚ ƚƌĂŝŶŝŶŐ͘ dĂĐƟĐĂůϱ ŝƐ ŵŽƐƚůLJ ĂĐƟǀĞ ŝŶ ĂǀŝĂƟŽŶ͕ ƉŽƌƚƐ͕ ŵĂƐƐ ƚƌĂŶƐŝƚ ďƵƚ ĂůƐŽ ĨŽƌ ůĂƌŐĞ ĞŶƚĞƌƉƌŝƐĞƐ͘ tĞ ĂƌĞ ďĂƐĞĚ ŝŶ ĞůŐŝƵŵ ʹ ƵƌŽƉĞ ďƵƚ ǁĞ ǁŽƌŬ ŐůŽďĂůůLJ͘ Ɛ ƉƌŽĚƵĐƚƐ ǁĞ ŽīĞƌ Ă ǁŝĚĞ ƌĂŶŐĞ ŽĨ ĞdžƉůŽƐŝǀĞ ƐŝŵƵůĂŶƚƐ͕ ŵŽƐƚůLJ ƵƐĞĚ ĨŽƌ ƚƌĂŝŶŝŶŐ ŽĨ ƐĞĐƵƌŝƚLJ ĂŐĞŶƚƐ͕ ůĂǁ ĞŶĨŽƌĐĞŵĞŶƚƐ͕ ŵŝůŝƚĂƌŝĞƐ͘ tĞ ĐĂƌƌLJ ƉůĂƐƟĐƐ ĞdžƉůŽƐŝǀĞ ƐŝŵƵůĂŶƚ ďƵƚ ĂůƐŽ ƉŽǁĚĞƌ ĂŶĚ ůŝƋƵŝĚƐ͘ DŽƐƚ ŽĨ ŽƵƌ ƐŝŵƵůĂŶƚƐ ĐĂŶ ďĞ ƐƵƉƉůŝĞĚ ĐŽŶƚĂŵŝŶĂƚĞĚ͘ tĞ ƉƌŽƉŽƐĞ ƚŚĞ ůĂƌŐĞƐƚ ǀĂƌŝĞƚLJ ŽĨ ĚĞƚŽŶĂƚŽƌƐ͕ ŝŐŶŝƚĞƌƐ ĂŶĚ Ăůů K ĂĐĐĞƐƐŽƌŝĞƐ͘ Ɛ ƐĞƌǀŝĐĞƐ͕ LJŽƵ ŚĂǀĞ ƚŚĞ ĐŚŽŝĐĞ ďĞƚǁĞĞŶ͗ ŽŶƐƵůƚĂŶĐLJ͕ ƉƌŽĐĞĚƵƌĞƐ͕ ĂƵĚŝƚ ĂŶĚ ZĞĚ dĞĂŵ ĨŽƌ ĂŝƌƉŽƌƚ ƐĞĐƵƌŝƚLJ ďƵƚ ĂůƐŽ ƉŽƌƚƐ͕ ŵĂƐƐ ƚƌĂŶƐŝƚ ĂŶĚ ůĂƌŐĞ ĞŶƚĞƌƉƌŝƐĞ dƌĂŝŶŝŶŐ ŽĨ ĞdžƉůŽƐŝǀĞƐ͕ / ďƵƚ ĂůƐŽ ĨŽƌ yZĂLJ͕ d ƐĐĂŶ ; ^͕ d^Ϳ͘ yƌĂLJ ƐŝŵƵůĂƚŽƌƐ ĨŽƌ ƚƌĂŝŶŝŶŐ ĂŶĚ ĚƌŝůůŝŶŐ͘
d d/ >ϱ͘ KD͕ ^ŝŵŽŶ ƌĞƚŚŽůnj͕ sŽƐŚŽůĞŶǁĞŐ ϱͬĐ͕ ϭϲϬϬ ^ŝŶƚ WŝĞƚĞƌƐ >ĞĞƵǁ͕ ĞůŐŝƵŵ
d >͗ нϯϮ͘Ϯ͘ϴϴϴϳϳϰϳ & y͗ нϯϮ͘Ϯ͘ϳϬϲϮϯϮϬ DK ͗ нϯϮ͘ϰϴϴϲϭϲϲϭϳ ŝŶĨŽΛƚĂĐƟĐĂůϱ͘ĐŽŵ
40
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
ITH EVERYTHING
increasingly automated, bagage identification is working on robber or terrorist stress, always afraid to be recognised. The Bagage Identification baggage self adhesive tag protects you everywhere making relevant information readily available. Much more than a single pocket the self adhesive tag is a small incredible product by its components. As such it offers psychological support and behavioral deterrent. We are sure this is the answer to the European commission regualtion (EU) No 185/2010 of 4 March 2010 common basic standards on aviation security: • 5.2 PROTECTION OF HOLD BAGGAGE • 5.3.1 Identification of hold baggage • 11.2.2(j) knowledge of how human behaviour and
responses can affect security performance. It is also the solution to TSA Security Technologies looking for ideas in physical, procedural, and technical aids to further enhance manual search performance. This protection system is the result of an interactive partnership with specialists in the field of plastic, silicone, welding, and tool developers. This innovative product was first thought impossible to produce. Its multiple applications are surprising. As a result of this technical challenge, Bagage Identification offers a multi-securing tag. The flash moment is awesome.
FOR MORE INFORMATION Contact Bernard Thoorens Mob: +32 476 334988 Fax: +32 2 7718493 www.bagage-identification.com
TRANSPORT SECURITY
www.counterterrorbusiness.com
TRANSPORT SECURITY EXPO
Transport Security Expo focuses on the big challenges in delivering effective system-wide security ANY CHALLENGING QUESTIONS face transportation security professionals gearing up to attend the forthcoming Transport Security Expo at London Olympia in September. With the news agenda having been dominated by multiple headline grabbing incidents during the course of the year, the industry appears still to be on the back foot in delivering real world solutions to protect the aviation, maritime and supply chain sectors from those with the intent to do harm in pursuit of political goals, religious belief or plain old greed.
M
SPOTLIGHT ON AVIATION SECURITY The year began with the fallout from Umar Farouk Abdulmutallab’s failed bombing of NWA 253 on Christmas Day. Mr. Abdulmutallab succeeded in doing what the public is constantly told is impossible to do; he carried the components of a high-explosive
bomb through security at three airports and aboard three aircrafts. His intent was to blow up NWA 253 on its approach into Detroit Metropolitan Airport, but the self assembled device didn’t detonate. A series of quick fixes to the intelligence gathering methodology, watch-listing regime, airport technological capability and operational procedures very quickly followed. Nevertheless, the system was found wanting again in May when Faisal Shahzad almost escaped justice after attempting to explode a car bomb in Time Square. Mr. Shazad was able to book a last minute one-way flight by cellphone, pay in cash on arrival at the airport, clear immigration and security and board the Dubai bound EK 202 with nobody as much as batting an eyelid despite the fact he was under surveillance and watch-listed. It was by dint of good fortune rather than design that his flight was
With the European Union (EU) having recently published new regulation intended to significantly bolster civil aviation security in the years to come, conference delegates will also benefit from a detailed briefing on the changes afoot and what they mean for airport and airline operations
recalled from the runway threshold for him to be taken into custody. Incidents such as these serve to emphasise an overwhelming feeling in some circles that the aviation security regime is in need of much more than the band-aid tinkering often applied when incidents that shouldn’t happen any longer actually do happen. The issues demonstrated by these two incidents will inevitably direct debate at Transport Security Expo and almost certainly focus down on the procedural, technological and human factor failures that conspired to let them occur. Carefully thought out rules and regulations as well as the best hardware money can buy, can very easily be rendered next to useless by the mistakes that people make. These are the issues that have bedevilled the delivery of effective security for an awful long time and have re-emerged just at a time when the sector is looking at how best to make long-lasting changes to the measures currently in place and deliver enhanced protection in the years to come. Transport Security Expo’s aviation security conference, brings together a team of eminent and highly skilled speakers who will share their thinking on how best to protect people and assets from those who wish to do harm both now and in the future. The key themes of conference are: • Ensuring passenger security • Delivering effective facilities security • Enhancing the overall civil aviation security architecture • New solutions to emerging threats • Overcoming the human factor/ technology disconnect With the European Union (EU) having recently published new regulation intended
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
41
R
AT
D
. INTE G R
an ww Pre d s w. -r av tra eg e ÂŁ ns ist 20 ec. er a en com t tra /a nc ds ef ee
SER . M U -
E
A
FAC TU U R N
OR . EN
Securing the Worldâ&#x20AC;&#x2122;s Passenger and Supply Chain Networks Q Focused exhibition Q 2 x Day Aviation & Air Cargo Security Conference Q 2 x Day Maritime Security Conference hosted in conjunction with
the International Maritime Organisation (IMO) and NATO Shipping Q 30+ free-to-attend workshop programmes Q Networking functions
Aviation
Maritime
Supply Chain
For more information please call Sarah Young on +44 (0) 208 542 9090 or email syoung@niche-events.com Industry Supporters
Register now at www.transec.com/ads 14-15 September 2010 | Olympia, London
TRANSPORT SECURITY
www.counterterrorbusiness.com
to significantly bolster civil aviation security in the years to come, conference delegates will also benefit from a detailed briefing on the changes afoot and what they mean for airport and airline operations. One significant change is in regard to the carriage of Liquid, Aerosol and Gel (LAG) goods by passengers. EU regulation requires that all airports deploy solutions capable of determining whether such products are harmful or benign by latest April 2013. The hardware backbone that has been the mainstay of aviation security for very many years was found to have reached its limits of capability when the transatlantic bomb plot emerged on the world stage just over four years ago. The aviation security world has thus begun to mirror the computer industry world in a very real sense, in so much as bare bones hardware demands high end software to realise its true potential. PRIMARY EXHIBITORS Optosecurity Inc., the highly specialised Canadian vendor with a very specific focus in enabling conventional hardware to perform complex threat analysis, is one of the primary exhibitors at Transport Security Expo. The company’s principal solution, XMS™, delivers a real time Liquid, Aerosol, Gel (LAG) and concealed weapon threat detection capability, in both a standalone and integrated configuration. Regarded by some as the enabling solution to meeting threats faced well into the future, XMS is a real world product with significant scalability. PICASO™, a development effort to bring the Optosecurity XMS core technologies to L3 Communication’s ProVision™ ATD (Automatic Threat Detection) systems, provides a complete non-imaging personnel screening solution to protect passenger privacy. Portal Image Contextual Analysis Software (PICASO™) is being designed to enhance the next generation automatic detection performance and improve target recognition. Kromek, another vendor with a significant role to play in Liquid, Aerosol and Gel (LAG) detection, also exhibits at Transport Security Expo. EU regulation requires that threats identified in the primary screen of passenger hand baggage be verified at a secondary level. The Bottle Scanner™ product offered by Kromek provides that mandated capability and could also be a cost effective primary standalone solution for smaller airports with much lower passenger throughput. These two companies represent the new breed of vendor delivering highly advanced solutions to meet current and future threats head-on. All of the major security system providers including Rapiscan, Smiths Detection, L3 Communications, Honeywell, Varian Medical Systems and many others have a strong exhibitor presence at this year’s event.
PIRACY DOGS MARITIME SECTOR The maritime sector has been grappling all year with a big upswing in the number of pirate attacks within the key shipping lanes around the Horn of Africa and the wider Indian Ocean region. The upswing prompted the Operation Commander EU Naval Force (Navfor), Rear Admiral Peter Hudson, to state publicly that pirate activity in March alone was double that of the three months from September to November last year. With significant tonnage being seized and held to ransom by the pirates operating in these waters and naval forces spread thinly, the maritime industry is facing a very real dilemma in how best to deliver protection in this commercially critical region. Self help is seen as the most viable option available and to that end The North Atlantic Treaty Organisation (NATO) Shipping Centre (NSC) will hold a unique tactical floor exercise at this year’s Transport Security Expo. The exercise will follow a vessels’ voyage from departure in Rotterdam to the attack point in the Gulf of Aden, through its capture and on to its eventual release. This highly specialised full-day exercise offers much in the way of both mission critical and real world advice designed to aid in the safe passage of shipping through such pirate infested waters. Delegates attending this tactical floor exercise will discover: • What can be done to deter piracy • The level of support that can be expected from military forces in the area • How to prepare prior to departure • The legal implications of armed/unarmed security • What to expect if boarded and what actions should be taken • The process of negotiation The EU has acknowledged that the pirate threat in the Horn of Africa region is “an expanding phenomenon”, both in terms of level of activity and range. This tactical floor exercise is therefore a mission critical event for those in the merchant marine operating in a threat area not only around the Horn of Africa but well into the Indian Ocean. This exercise is complimented by the regular International Maritime Organisation (IMO) conference focusing on the wider maritime security issues including law enforcement and port security. SUPPLY CHAIN DISCORD With the requirement to screen 100 per cent of international air cargo bound for the United States now a fact of life and Europe thus thrown into catch-up mode, considerable discussion at Transport Security Expo will focus on this vexed issue and how best to meet US requirements without creating major bottlenecks at airports. Recently published EU regulation incorporates the tough new US requirements but Ekhard Seebohm, head of aviation security at the European Commission (EC) admits that compliance places some huge challenges on the aviation industry and its supply chain.
Seebohm is on record stating that the US may just have to an accept an alternative (such as sniffer dogs) to x-raying every item of belly-hold freight, given that the piece level 100 per cent screening requirement favoured by the Transportation Security Administration (TSA), could potentially bring air-freight movement between Europe and the US to a grinding halt if a hardware only solution were to be rigidly enforced. Principal speakers from the International Air Transport Association (IATA), Association of European Airlines (AEA), Swissport, CEVA Logistics, Cargolux and DHL amongst others, will be on hand to share knowledge and invite in-depth discussion on achieving a 100 per cent cargo screening regime within a one-stop security environment. WORKSHOPS DELIVER SPECIFIC FOCUS Transport Security Expo will also deliver a range of free to attend workshops for delegates covering the following very specific themes: • Security Cargo • Perimeter Protection & Intrusion Detection • Passenger Security & Facilitation • Terminal Security. These half day workshops are intended to immerse delegates in issues prevalent within each area and give insight into technological solutions and their capabilities. Transport Security Expo workshops add significant knowledge and value. With exhibitor and delegate numbers already substantially up on previous years, Transport Security Expo 2010 looks set to break records as it takes centre stage at London Olympia, 14-15 September 2010.
FOR MORE INFORMATION For more information please visit www.transec.com or contact Nicola Greenaway, operations director on + 44 (0)20 8542 9090 or e-mail: ngreenaway@niche-events.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
43
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
EXPLOSIVE DETECTION DOGS: PART OF THE TEAM Whilst there are numerous explosive detection machines and scanners on the market, dogs remain the most reliable and consistent method of detecting explosives XPLOSIVE Detection Dogs (EDDs) can prove to be an invaluable asset to security managers and close protection officers prior to, during and after royal visits, VIP visits, trade shows, major sporting events, other security taskings or other incidents including bomb threats. With the constant terrorist threat the level of EDD coverage will depend on the threat and situation at the time. The security manager will have assessed the threat and the level of risk in accordance with the threat. EDDs are part of a team. They are a ‘tool’ to assist the security manager or team leader in affording the best security solutions for the situation at hand. The role is similar to the Police Search Advisor (POLSA). The dog team will work in conjunction with physical search teams, electronic devices, scanners and other methods of detection. Whilst there are numerous explosive detection machines and scanners on the market, dogs remain the most reliable and consistent method of detecting explosives and explosive devices. Dogs can also clear an area much more quickly than a machine of physical search team. For example a queue of six cars at a vehicle check point might take
E
44
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
a team of four searchers 40 minutes to complete (that is a thorough search of the vehicle in five main areas involved with a vehicle search). It would take an EDD team approximately ten minutes to carry out the same searches with a much more reliable success rate/conclusion. These are only estimated times to search cars. HGVs and coaches or similar would take physical search teams even longer. CASE STUDY Paris International Airshow and Farnborough International Airshow: Paris and international airshows alternate every other year. They are the two biggest airshows in the world. Commercial deals adding up to billions of dollars are sealed at these venues. The shows are attended by the very top government ministers, dignitaries and military personnel from around the world. The shows can also be attended Royals, other VIPs, and celebrities in chalets where they host such clients. Both shows have been the scenes of anti-war and anti-arms protestors in recent years. The shows are viewed by many as ‘arms shows’. REQUIREMENTS Security at chalets and static displays of three of the largest aircraft manufacturers in the world is needed. The dog handler works
under the CP team leader. Explosive Detection Dogs (EDD) initially search the chalet, static displays and surrounding areas. Once satisfied the area has been searched the dog handlers hand over to the close protection teams. Dog team remains on standby on site to respond to any concerns from the CP team. This may involve a possible breach of security, ie. a fire door found open or an unattended bag or ‘package. If any item has already been declared ‘ suspicious then the EDD handler would not check it with his dog – this would be a situation for an EOD team. A search is only as good as the security afterwards. As dog handlers we rely on CPOs or other physical security teams to ensure the search area is not compromised. It is imperative that the dog handler works closely with the team leader prior to the event. Depending on the venue and situation, the dog handler should have already carried out a recee to determine the search time required, number of dogs required, and if there are any restricted areas for the dogs, ie. kitchens,
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
eating areas. The handler will also have to take into account surrounding areas, routes to and from the venue, expected deliveries during the event, and so on. External areas and routes are usually more difficult to secure and can be manpower intensive. The dog handler should plan his searches as to leave these vulnerable areas as late as possible, depending on the size of the areas and involved. Any emergency evacuation point designated by the team leader should also be searched and secured. As the CP team leader usually assumes overall responsibility it is he/she who would usually liaise directly with the client and any in-house security. The dog handler should brief the team leader on his requirements, stating clearly what he requires to ensure maximum effectiveness from his dog. The welfare of the dog is paramount. Although usually rare, there are situations where it is impractical to work a dog. For example the presence of broken glass or hazardous substances – diesel, aviation fuel etc. The overall decision whether to work a dog rests with the handler. DETERRENT Terrorists traditionally prefer ‘soft targets’. If a client employs a security team that includes the provision of EDD teams, this will add as a visual deterrent to any would be terrorist or disruptive group. If the terrorist considers their ‘target’ to be too difficult to breach there is a likelihood they could possibly look elsewhere to ‘achieve their aim’
In summary a properly trained EDD team can afford a security manager and team leader the confidence and peace of mind to allow him or her to concentrate on the main objective – the security and safety of the clients and/or its assets. A client can rest assured that the security team are covering as many possibilities as is practical and as effectively as possible. The result should be that an EDD team can assist in ensuring an event or visit can pass off smoothly and without incident. Explosive Detection Dogs are highly effective. WHY WAGTAIL UK The company was established in 2003 and is now regarded as one of the leading companies in the UK and throughout the world. Wagtail specialises in providing EDD teams in hostile and high risk environments. The company employs mainly ex military personnel, utilising experience gained in Northern Ireland, the Balkans, Iraq and Afghanistan. It can offer full project management in the deployment and training of operational EDD teams. Wagtail also provide dogs for other disciplines such as drugs detection, cadaver (human remains), security/ protection and live body detection. It provides dogs for the civil police, Ministry of Defence and UK Border Agency. More details are available on request.
FOR MORE INFORMATION Web: www.wagtailuk.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
45
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
HOW MUCH DOES PEACE OF MIND COST? No one likes to imagine the effects of an explosion at their workplace but the chilling reality is that your site could be a target. Ward Security’s specialist bomb search dog team can provide real peace of mind, such a priceless commodity in today’s nervous society UE TO THE NATURE of the work undertaken by Ward Security’s Dog Section search teams, which is both highly skilled and dangerous, it is imperative that handlers and dogs develop a strong bond, both at work and at home. This is why many of the dogs have been with their handlers from puppy hood giving time for a bond to develop, and to allow the trainer and handler to assess the potential of the dog from an early age. Training only commences once the dog demonstrates a level of maturity that will enable them to undertake the various training activities. The handlers, who are already highlytrained general purpose dog handlers, work through an intensive in-house training course. This is run by Peter Williams, associate director, who oversees the Dog Section and Response Department. Peter is a Home Office-accredited dog instructor in General Purpose, Narcotics, Weapons Recovery and Explosive Search. Ward’s search teams train on a range of real explosives rather than the synthetic products that are available on the market. This is important as, the more realistic the training can be, the better. The company holds a Home Office license allowing it to hold its own stock of training materials. A detailed list of materials used for training is available subject to client status verification. Handlers receive regular continuation training in line with ACPO guidelines; this is evidenced in the handlers training records, which are available for client inspection if required. This training is imperative
D
46
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
to ensure the search team is kept at the highest operational standard at all times. During operational searches, the company is under the control of its own search coordinator who will also oversee the in-house physical search teams if deployed. The coordinator works closely with the client, both before and during the task, to ensure the search requirements are fully understood and then carried out. Search units are available to be deployed throughout the UK and overseas for both short and long term contracts as required. EXPERTISE Ward Security is able to provide bespoke and general canine security solutions for both private and public sector organisations across London, the Midlands and the South of England. The specific and specialist expertise of the professionally managed canine services includes: • General purpose patrol dogs • Specialist search teams • Parks and open spaces security • Explosive detection dogs • Narcotics search dogs The dog section is a particularly sought after, valuable and much utilised service with regard to the heightened security levels prevalent today. General purpose dogs are employed for handler protection, patrolling schools, college campuses, parks, open areas and public spaces as well as providing an efficient solution to security concerns on commercial and industrial estates. The company has spent a number of years working to actively assist in reducing the anti-social elements with great and
demonstrable success. Company dog teams have proved particularly effective in promoting community spirit, so only those handlers displaying high-level communication and people skills are selected. Flexibility and versatility are key to dog team operations. All dogs are “homed” with their handlers on a strict one-dog, one-handler basis to ensure close bonding. Continuation training is provided and monitored, and is essential for the further development of the team. Ward Security’s principle role is to ensure its clients are free to concentrate on their core activities, safe in the knowledge their working environments are secure and protected. Ward’s expertise lies in the ability to providing security solutions for any situation. The Dog Section manager and supervisors have a combined wealth of experience and expertise. The direct benefit of this is realised in the added-value passed onto customers in terms of increased operational effectiveness and tangible pro-activity. The handlers and dog teams’ combined abilities and effectiveness are cornerstones of Ward Security’s Dog Sections continued success. All the operational personnel are provided with appropriate equipment for their task. Dog welfare is assured and individually audited, therefore all dogs are presentable and more importantly in excellent condition. Clients can be assured that the dog units will present a professional, identifiable and immaculate image at all times. All operational staff has direct access to a 24hr contact centre via land line, mobile telephone and/or radio communications. The exact communicative methodology is established to ensure the best fit with a business and the continued safety of deployed personnel. Overall Ward Security’s Dog Section provides a very effective, flexible and accountable service to any business.
FOR MORE INFORMATION Tel: 0845 467 6180 info@ward-security.co.uk www.ward-security.co.uk
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
WHERE KEY WORDS LEAD, SALES WILL FOLLOW Free posting of press releases, free website appraisal and free advertising for customers of our core services – a package that you will not find anywhere else in the online publishing arena AROUSEL INTERNET PUBLISHING LIMITED has three arms to its business. Firstly it offers online publishing of websites and e-newsletters. Established in 2006, Carousel Internet Publishing owns four business-to-business online publications. With free access, free publication of news and free newsletter distribution, we offer professionals industry insight, new developments and inspiring ideas. Each day, news is added to our growing archive, creating a rich and valuable information resource. ProSecurityZone covers all aspects of the security industry including physical security, IT and surveillance. DefenseFile is for those involved in specifying and purchasing defencerelated goods and services on land, and in the aerospace and marine sectors, covering manufacturing and services, personnel and backup equipment. ProHealthServiceZone is a global online news and product information resource aimed at healthcare professionals. New Materials International, established in 1984 and operating online since 1996, is the world’s leading newsletter for technical and business professionals working in industries who are using developing and advanced materials and other leading edge manufacturing technologies. Advertising opportunities in our publications are designed to be flexible and can be customised to suit the needs of any advertiser. They include a range of cost-effective packages and special rates. E-mail: newbusiness@ carouselinternetpublishing.com
C
CAROUSEL CORE SERVICES For all of us, the most important marketing vehicle is our own website. Maintaining a company website successfully and getting results from search engines demands a range of skills, all of which are unlikely to be available in-house. Even if so, other demands on time often see content generation – the most important aspect of running any successful website – slip down the marketing priority list. Carousel will undertake a brief website appraisal entirely free of charge. The appraisal will come with recommendations for improvements, focusing on content generation. Using the in-house skills of our editors in technical writing, and IT staff in search engine optimisation and website design, Carousel can manage any aspect of content generation. In
addition to product pages, we will prepare and distribute press releases. Our Carousel PR Plus Package is unique. Whatever you spend with us on core services (such as copywriting, content generation, SEO, Adwords Campaign Management), we also donate advertising to an equivalent value on our sites, at no extra charge. All you have to do is sign the cheque and speak to our advertising staff (tel: +44 (0)20 8333 6690) and select what is best for your needs. SEARCH PHRASE POSITION REPORTS We will work with you to establish the key words that your potential customers are using to find information on your website and those of your competitors. Using regular and easy-to-understand tables and charts, our Search Phrase Position Reports shows where searches for those keywords place you and your competitors in the search engine rankings. This vital management tool helps focus future content generation where it is most needed. Carousel will operate and manage PPC (pay-per-click) Google Adwords Campaigns, to ensure that your message appears alongside other relevant content on the web and generates sales leads. Unusually, we do not charge set-up fees and recurring monthly management fees, which eat away at limited budgets. Instead, we guarantee to deliver a fixed number of sales leads for an agreed price, and it is up to us to deliver your results and our profit margin.
Typically, we will charge £750 for 500 sales leads, and most marketing managers would agree that any advertisement placed in any media would be regarded as excellent value if it delivered that many leads at £1.50 per lead. The technologies behind our own commercial sites are scalable and available to third party publishers wishing to operate their own online publishing and e-commerce ventures (such as websites, e-mail newsletters and e-commerce ventures) under a franchise system. Businesses utilising services from the Carousel are operated on a quasi-franchise system. In some cases, the Carousel will take a shareholding in the satellite business, representing some or all of its investment in the business. In other cases, Carousel merely charges a fee for the franchise. All businesses within the Carousel benefit from common standards of software development and other services.
FOR MORE INFORMATION Contact the Carousel Team on +44 (0)20 8333 6690 or e-mail newbusiness@carouselinternetpublishing.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
47
6 IZaZXdbh GZh^a^ZcXZ 7gZV`i]gdj\] GemaTechâ&#x20AC;&#x2122;s New Portable Recovery Unit â&#x20AC;&#x153;The PRUâ&#x20AC;? can be deployed within four hours of us being alerted to your organisationâ&#x20AC;&#x2122;s loss of incoming calls - no matter where your business is located in the UK. And the best part for subscribers? If you donâ&#x20AC;&#x2122;t use it - you donâ&#x20AC;&#x2122;t pay anything else! Think of it like insurance. In return for a yearly subscription we will deploy â&#x20AC;&#x153;PRUsâ&#x20AC;? in strategic locations around the UK and guarantee to have a â&#x20AC;&#x153;PRUâ&#x20AC;? installed and activated in your serving carrierâ&#x20AC;&#x2122;s exchange within four hours of your request to invoke, following the loss of your incoming calls. Youâ&#x20AC;&#x2122;re in control too, because all your DDI call plans can be managed by GemaTech with the invitation to update your call re-routing plans on a monthly basis, and thatâ&#x20AC;&#x2122;s to ALL individual DDIs re-routing to any number of alternative numbers and devices. Nobody knows when Pandora will open her box next and what devastation will be unleashed. But can you afford not to look into ours?
I]^c` ^ch^YZ i]Z Wdm! VcY iV`Z i]Z Ă&#x2019;ghi hiZe idlVgYh IZaZXdbh GZh^a^ZcXZ idYVn# <ZbVIZX] hiV[[ VgZ gZVYn VcY lV^i^c\ id VchlZg ndjg fjZhi^dch#
I]Z cZmi i^bZ EVcYdgV deZch i]Z Wdm! ndjĂ&#x2030;aa l^h] ndjĂ&#x2030;Y hjWhXg^WZY id djgh# <ZbVIZX]Ă&#x2030;h EdgiVWaZ GZXdkZgn Jc^i#
I]Z Ă&#x2C6;EGJĂ&#x2030;
%-%% ('- -(*) lll#\ZbViZX]#Xdb$68ED <ZbVIZX] l^aa WZ Zm]^W^i^c\ Vi
:EH 8dc[ZgZcXZ
&+i] &,i] ?jcZ '%%. GemaTech (UK) Ltd, Telford House, Hamilton Close, Houndmills, Basingstoke, Hampshire RG21 6YT. Tel: 0845 345 3333 Fax: 0845 345 8711 E-mail: eps@gematech.com
I]Z IZaZXdbh 8dci^cj^in HeZX^Va^hih
EMERGENCY SERVICES
www.counterterrorbusiness.com
BRINGING TOGETHER THE EMERGENCY SERVICES The Emergency Services Show is a unique event promoting multi-agency collaboration by bringing together everyone in the UK that’s involved in an emergency S THE 2012 Olympics draws nearer, it will be vital for responders to discuss co-operation, ideas and initiatives focused on improving public safety and learn from each other in preparation for this major event. The first day of this year’s two day supporting conference will have a special focus on the challenges posed by the forthcoming 2010 Olympics. Featured speakers will include Peter Thorpe, head of Olympic Planning for London Ambulance, and Chair of the UK FRS Olympic Planning Group Jim Monk, London Fire Brigade, who will be presenting a national perspective of the challenges posed by the 2012 Olympics.
A
BUILDING RELATIONSHIPS As part of a special overview looking at building relationships through training and interaction, there will be a number of presentations. Derek Luff, development manager at the Fire Service College, is responsible for multi- agency training and exercises to enhance interoperability within the
emergency services and response agencies. With Dr Helen Higham, consultant anaesthetist at the John Radcliffe Hospital, Oxford, they will be looking at casualty management and explaining the Casualty Management Centre (CMC). This is a new collaborative partnership between the Fire Service College and the University of Oxford’s OxSim Medical Simulation Centre to demonstrate to all agencies the use of the latest medical simulation technology ‘on scene’, within a realistic and challenging incident environment. Chief fire officer, Roy Wilsher, Hertfordshire Fire & Rescue Service will be speaking about Exercise Orion, a EU Civil Protection (EUCP) Mechanism exercise due to take place in September 2010. It will involve a live USAR exercise in Hampshire, complimented by another live exercise in Merseyside; staged over 56 hours. Four Strategic Co-ordinating Groups/Gold Commands sat in Hampshire, Hertfordshire, Merseyside and Lincolnshire and teams from nine countries plus an EUCP team will take part. UK multi-agency involvement will test command structures up to and including
the Cabinet office and the EUCP mechanism will be tested within the UK structures for the first time. The exercise is funded by the largest grant so far of almost one million Euros following a bid by Hertfordshire Fire and Rescue, supported by Hampshire, Lincolnshire and the Fire Service College. Dr Ben Weston, MoD, in partnership with the CCS and NPIA, will be looking at Project Radiance in his presentation ‘Steps towards a resilient, integrated approach to first responder communications and interoperability’. RESILIENCE AND CRITIAL INFRASTRUCTURE Day two of the conference will focus on resilience and the national critical infrastructure. Dr Dave Sloggett is a recognised commentator and authority on the international security landscape from the Centre for Defence Studies, Kings College, London. He will give a key note speech on ‘Perspectives on the International Security Landscape: The Enduring Threat from International Terrorism’. He will be joined by other high profile speakers including Mike Granatt, consultant to community resilience, Tony Owen, head of incident management, Environment Agency alongside Mark Leigh
Image shows Yorkshire Emergency Services Eco Fleet day. Image courtesy of Yorkshire Ambulance Service
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
49
EMERGENCY SERVICES
www.counterterrorbusiness.com
QUALITY LIGHTING AND SECURITY EQUIPMENT FROM SEA & SEA LTD
SECURITY SYSTEMS ENGINEERING AND INTEGRATION SOLUTIONS
STABLISHED in 1979 Sea & Sea Ltd is one of the oldest and largest distributors of diving equipment in Europe. Carrying high quality brand names, the company prides itself on supplying its customers not only with a first class service, but also some of the finest equipment available. Since its inception over 30 years ago, the company has grown in size and diversity. It now includes a wide range of waterproof, ATEX approved security torches and security equipment, used widely by the Military, Emergency Services, Tactical Aid Groups and Utilities. The 4AA torches (Xenon and eLED with CPO) can be attached to Fire, Police or Military helmets and hard hats, allowing hands free operation. We supply a comprehensive range of Under Vehicle Search equipment suitable for use in almost any location. Included within the range are portable mirrors with LED
LEARVIEW Communications is a security systems engineering and integration company which has been delivering high reliability security solutions to police, military, government, local authority, education, blue chip and commercial clients since 1996. Stand-alone and integrated system solutions provided include access control, CCTV, analytics, gates and barriers, fencing, perimeter intruder detection, intruder alarm, fire detection, building management systems, intercom, TV distribution/ IPTV and public address. The company has built a reputation as a world leader in the design and manufacture of a specialist range of products for police applications including CCTV replay, custody, video interview, electronic security systems, surveillance vehicles
C
E
illumination, extendable mirrors (up to 12 feet) for over vehicle search, and full length LED mats for drive over security searches. Along with these essential tools come roadside Emergency Signalling Devices (ESDs) that emit a high intensity red LED for directing traffic/ people in hours of darkness. We also have flexible fibre optic lights (up to 3 metres long) for use in hard to access places such as aircraft compartments or vehicle engine bays.
FOR MORE INFORMATION Tel: 01803 663012 E-mail: davidmorley@sea-sea.com Web: www.sea-sea.com
and wireless IP. ClearView’s leading-edge technologies work effectively together to provide improved operator efficiency, greater system intelligence and better evidence at lower cost. Clients include all UK police forces, Ministry of Defence, Home Office, UK Border Agency, construction companies, sports stadia, transport hubs, schools, colleges and universities throughout the UK and overseas.
FOR MORE INFORMATION Contact: Andy Lockett – sales support manager Tel: 01245 214104 Fax: 01245 214101 E-mail: andy.lockett@clearviewcommunications.com Web: www.clearviewcommunications.com
GateREG ANPR System ClearView Communications’ GateREG ANPR (Automatic Number Plate Recognition) system is available in variants from single lane to 4-lane, with up to four overview cameras. A new range of low-cost GateREG ANPR cameras, developed by ClearView for maximum ease of installation; incorporating IR-lamp, fast-shutter and remote zoom lens control are also available. Camera options include in-built overview and speed detection. The system can read UK and European number plates. It provides a host of services including email or SMS notification of visitor arrival, recording of all vehicle site activity, message sign display, Wiegand output for access control integration, live and historical car park data usage and security prompts for black-listed vehicles. The reporting capabilities are second to none with facility to easily customise and present data in a variety of formats GateREG is ideal for barrier or speedgate control for commercial premises, waste sites, visitor centres and holiday parks. Andy Lockett, ClearView Communications, Robjohns Road, Widford Industrial Estate, Chelmsford, Essex CM1 3AG, UK Tel: +44(0)1245 214 104 Fax: +44(0)1245 214101 Email: sales@clearview-communications.com www.clearview-communications.com
50
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
EMERGENCY SERVICES
www.counterterrorbusiness.com
from the Emergency Planning College. The Cabinet Office will host a series of focused workshops on ‘Improving the Resilience of the Critical Infrastructure.’ David Murphy, assistant director of the Natural Hazards Team, Cabinet Office, will discuss the consultation on the draft National Resilience Plan for Critical Infrastructure and lead the sessions, with each covering a specific topic on resilience, lasting approximately one hour. SEE THE WHOLE PICTURE The Emergency Services Show is a unique annual event promoting multi-agency collaboration by bringing together everyone in the UK involved in an emergency (not just the emergency services) – from the strategic planners and first responders to the manufacturers and suppliers of equipment used by these leading professionals. The Emergency Services Show 2010 exhibition will provide access to the latest technology, ideas and initiatives focused on improving public safety and protecting the environment and the Critical National Infrastructure. The show will be especially relevant in light of the current economic climate, with opportunities to speak to contemporaries and exhibitors to help with framework agreements, income generation/
Pont, Godiva, Remploy and WL Gore. The event’s main sponsor is Community Resilience UK. The company can provide responders with secure empty office and warehouse space for use as: rest centres, survivor reception centres, friends and family reception centres, humanitarian assistance centres, body storage units and temporary mortuaries. These premises are provided pay-as-you-use and rent free for 30 days with no standby or setup fees. For further information visit www.communityresilience.cc. WHERE IT ALL BEGAN The Emergency Services Show was started in 2006 in direct response to the publication of The Civil Contingencies Act 2004. The Civil Contingencies Act 2004 calls for a single framework for civil protection in the UK capable of meeting the challenges of the 21st Century. Integral to the Act is the duty of all Category 1 and 2 Responders to share information and co-operate with other Category 1 and 2 Responders. The event was created by Emergency Services (MMC) Ltd who has extensive experience working with those involved in the emergency sector and publishes Emergency Services Times, Fire Times and the annual Emergency Services Times Who’s Who Directory.
The Emergency Services Show 2010 exhibition will provide access to the latest technology, ideas and initiatives focused on improving public safety and protecting the environment and the Critical National Infrastructure. The show will be especially relevant in light of the current economic climate outsourcing and equipment requirements. Exhibitors this year include air quality monitoring expert Enviro Technology who will be showcasing its high tech portable gas detector the GDA 2, which can be used by counter terrorism teams to detect chemicals in an incident and is currently being used in Europe. This small device uses combined sensor technology to detect and monitor over 300 common and hazardous gases, including chemical warfare agents, such as: Sarin, Lewisit, L and Cyclon B, AC. Environmental instrumentation company Quantitech will feature two exciting new technologies for the detection of trace amounts of chemical warfare agents, explosives, drugs and toxic industrial chemicals. Other exhibitors include Envitia, a world leader in geospatial intelligence technologies, Public Safety Cycling showing its specially adapted bicycle fleet for the security and military sectors alongside others including Bluecher, Du
The two-day event is open to Category 1 and 2 Responders and is key for those with a role in operations, procurement, training, recruitment and emergency planning. The types of products on show from exhibitors include: Communications & IT, First Response Equipment, PPE, Station Equipment, Training & Education, Vehicles & Vehicle Equipment, Business Continuity, Outsourcing. A two day conference runs alongside the exhibition and attracts high profile speakers, discussing relevant and topical issues and examples of best practice. CONTINUING THE SUCCESS FROM 2009 Over 4,000 visitors attended The Emergency Services Show 2009. These visitors were from across all sectors and business types including: • Police • Fire and rescue Services • Ambulance services
THE EMERGENCY SERVICES SHOW 2010 – AT A GLANCE • Main Exhibition: free to attend, the exhibition comprises over 350 specialist product and vehicle suppliers. • Blue Light Zone and Emergency Response Zone: made up of police, fire & rescue, ambulance, professional, government and voluntary organisations from around the UK discussing lessons learnt and new initiatives. • Conference: The two day supporting conference brings senior professionals together to discuss the latest industry news, developments and strategic advances. Conference delegates all have the opportunity to visit the exhibition.
• Maritime and Coastguard Agency • MoD • NGOs and the voluntary sector • Local Government Authorities • Local/regional resilience teams • Utility operators • Transport including airports and port authorities • Government agencies • Health authorities and Primary Care Trusts • Commercial businesses • Embassies Following the success of last year’s event, the Emergency Services Show 2010 will provide more opportunities to network and improve your relationships with other organisations to learn how you can work together more effectively to tackle the changing nature of today’s security challenges. It will also fulfill all your equipment and service needs. Sponsored by Community Resilience, this year’s event will take place on Wednesday 24 and Thursday 25 November at Stoneleigh Park, Coventry. Registration for the free to attend exhibition and two day conference is now open. An Early Bird discount of 25 per cent is available to everyone who books a conference place on or before the 1 October 2010 with an additional ten per cent discount available for members of Emergency Planning Society, IFE/FPA, The College of Paramedics and members of a Local Resilience Forum.
FOR MORE INFORMATION Register now at www.ess2010.com or visit to learn more about this not to be missed event.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
51
EMERGENCY SERVICES
www.counterterrorbusiness.com
SUPERIOR CLOTHING AND EQUIPMENT FROM EDGAR BROTHERS A
T THIS YEAR’S Emergency Services Show, Edgar Brothers will launch a technically specialised range of clothing and equipment for Fire, Rescue & EMS exclusively from BlackHawk!® The company has a wealth of experience in servicing both military and operational personnel with performance tactical clothing. This new range covers clothing, bags, dynamic entry tools, footwear, flashlights, gloves, knives, medical packs and all accessories. One of Edgar Brothers biggest product lines is the clothing and accessories brand Blackhawk!®. Founded in 1993 by former Navy Seal Mike Noell, BlackHawk’s meticulous obsession with quality has made it the gear of choice not only for special operational units worldwide but also for emergency services in the UK. BlackHawk!® has a motto – If you are wearing clothing not up to the job, then give it to your grandad. The Performance Cotton Tactical Pant is made with a durable, wrinkle and fade resistant 8.5 ounce cotton canvas. They feature double layering in the seat and knee for increased wear and protection. The crotch gusset allows increased movement with extra wide reinforced belt loops to accommodate the
Blackhawk!® CQB Rigger Belt (and other belts up to 1.75’’ wide). They also feature hidden expandable waistband slides for increased mobility and comfort, and a silicone grip strip in the waistband keeps shirt tucked in during extreme manoeuvres. Angle cut hand pockets have flat edges for proper placement and orientation of knives, pens, etc. Each leg has an easy access, top opening mag pouch and large top opening cargo pockets on each leg with elastic webbing inside. Zippered access on cargo pocket and rear hip pocket keeps a wallet
NCEC – THE UK’S NATIONAL CHEMICAL EMERGENCY CENTRE HE UK’S National Chemical Emergency Centre (NCEC – part of AEA Group) plays a key role in national arrangements for responding to chemical incidents. We help protect people, property and the environment by providing 24-hour advice to emergency services as a central part of the Chemical Industries Association’s Chemsafe scheme, partsponsored by UK government. NCEC’s highly qualified and trained team links chemical knowledge with practical experience. Our emergency responders all hold degrees in chemistry and undergo additional training in emergency response techniques and crisis communication. Our team also has access to one of the biggest libraries of chemical information in the world, including NCEC’s own Chemdata database with information (e.g. hazards and potential malicious uses) on more than 38,000 substances. NCEC provides 24/7 multi-
T
52
lingual worldwide emergency response for organisations including FTSE 100 and Dow 30 companies. We also train, support and advise public and private emergency service providers around the world on best practices and legislative compliance. NCEC also organises an annual Hazmat event and hosts an online forum for those involved in incident response and chemical emergency response. This free forum provides an invaluable peer information exchange opportunity for emergency responders. Visit the NCEC website for more information.
FOR MORE INFORMATION Tel: +44 (0) 870 190 6621 Fax: +44 (0) 870 190 6614 E-mail: ncec@aeat.com Web: www.the-ncec.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
secure and out of the way, and separate from the large rear pocket. All hems are reinforced on the leg and cuffs for increased durability. See the demo on youtube.com www.youtube.com/watch?v=06WI91sorWU EMS and rescue professionals demand only the finest equipment available. Being a leader in the manual tactical entry tool market, Dynamic Entry responds to these demands by taking what it has learned and applying this knowledge to the fire and rescue market. The result is a series of cutting edge tools that feature electrically non-conductive, high visibility steel Hallagan Tool™ heads. Designed to grip entry surfaces securely, these Hallagan Tool heads feature counterangled friction ridges to reduce slippage. Lighter, faster and stronger, designed to withstand the most extreme situations. For further information please visit us at the 2010 Emergency Services Show at Stoneleigh Park, Coventry, stand number 45, 24-25 November.
FOR MORE INFORMATION Contact: Richard Farrimond Tel: 01625 664 664 Fax: 01625 615 276 E-mail: rick@edgarbrothers.com
BSI – RAISING STANDARDS WORLDWIDE™ SI’S testing and certification service offers exceptional laboratory testing capabilities for fire protectionprevention-detection as well as PPE. BSI, a UKAS accredited test and certification body, provides product testing and certification as well as management systems certification to UK, European and international standards, CE marking as a Notified Body for 15 New Approach EU Directives. BSI owns and operates the Kitemark – UK’s most-trusted quality mark. 88 per cent of UK adults believe that a Kitemark shows a reputable company and 93 per cent of them believe Kitemark products are safer. The Kitemark is especially valuable to the Emergency Services sectors as it can help you address the corporate responsibilities that businesses are increasingly demanded to meet. Kitemark also helps
B
businesses stand out from the competition, show they have applied due diligence, managed risk and shown best practice. By using, supplying or producing Kitemark products or services you can be sure that they have been independently assessed and fully capable of providing the highest quality service. To find out about Kitemark schemes, products, services and companies visit www.kitemark.com. Kitemark® – helps protect you, your organisation and your community.
FOR MORE INFORMATION Tel: 08450 765600 E-mail: kitemark@bsigroup.com
EMERGENCY SERVICES
www.counterterrorbusiness.com
THE CHANGING FACE OF TERRORISM Take care not to stereotype terrorism – it has many forms, warns Dr Dave Sloggett, speaker at this year’s Emergency Services Show IME, IT IS SAID, is a great healer. That is a point that many involved in the terrorist attacks of 7 July 2005 may have a view upon. For those physically and mentally scarred by the day the wounds will never heal. For those on the periphery, for whom the events were not up close and personal, the passage of time dims the memory, only punctuated by the media’s efforts to recall the horrors when anniversarys bring back memories. Many in the emergency services will hold a collective breath on 11 September 2011 as the tenth anniversary of the terrorist attacks on New York and Washington will be remembered. It is not just the people involved that will recall that day. Those that planned it may well wish to find their own way of jogging the collective memory of those who witnessed and were directly affected by those barbaric acts of violence.
T
ICONIC EVENTS The images of September 11 are iconic. They will never the leave the collective psyche of those that witnessed the unfolding events. It is one of those events, like the assassination of President Kennedy, were people recall in great clarity what they were doing at the precise moment the planes hit the towers. For those of us in London on 7 July we can never quite forget what it was like when the city appeared to be paralysed by uncertainty; fear did indeed stalk the streets of London on that day, only to return on 21 July in a somewhat muted form. The two week interval served to remind all of us not to drop our guard. The amazing efforts of the emergency services on 7 July and those in charge of the London Underground system enabled a semblance of normality to be returned to the streets of London in a matter of hours. That was important. The nation’s capital had moved, so could the wider population of the United Kingdom. ECOURAGING RADICAL BEHAVIOUR Since the attacks in London a number of potential acts of terrorism have been disrupted by the Security Services. Whilst the television drama ‘Spooks’ is a fictional account of life fighting terrorism, its writers do appear to look out onto the world stage and make connections with events around the world that give encouragement to those thinking of conducting acts of
terrorism in the west. The daily coverage served up of terrorist attacks in Iraq, Afghanistan and Pakistan account for a significant percentage of the 700-900 attacks a month around the world that are reported. The drum beat of attacks in Iraq, whilst diminished, has morphed in its tactics. The Internet provides a diet of material for those in the United Kingdom who may be attracted into acts of terrorism. They are by no means drawn from a single community. The Extreme Right Wing, the re-emergence of those who believe in violence to advance the cause of Irish Republicanism and people who follow
a bystander to becoming actively involved. Once on the board they roll the dice and move along. On occasions they land on the base of a ladder and their fervour and commitment to the cause moves significantly. They have reached a local tipping point. In groups one person can move ahead on the board, encouraging others to follow them, proving the reasons why they should remain in play. Ladders can also appear dynamically. It was Prime Minister Macmillan who when asked what he most feared replied “Events, dear boy, events.” The ubiquity of the media in the 21st century enables events to be seen through the magnifying glass of perception; increasing their impact upon people who have decided to make the journey into terrorism. The images of Mumbai were designed to have a range of effects; to terrorise the many and to motivate the few. In this environment, where events create the motivations for people to become involved, the task is to create snakes taking people off the journey of radicalisation.
With this enduring power of the Internet and the media to transmit such images quickly across the world the problem of terrorism is not going away anytime soon. The Emergency Services Show, 24 and 25 November at Stoneleigh Park is a good time to reflect upon recent events across the world. It will enable us to discuss the changing nature of terrorism and to ensure our responses are resilient and to ensure we retain our vigilance in the face of an ever changing and protean set of adversaries extreme interpretations of Islam all pose a threat. It would be wise for anyone involved in the security sector not to stereotype the threat. It can come from a variety of political viewpoints. But those involved follow a similar pathway towards their own forms of being radicalised. PLAYING THE GAME The journey of people into terrorism can be likened to players who have chosen to play the board game snakes and ladders. Their reasons for picking up the counter and deciding to play are many and varied. Social Movement Theory offers many insights and, despite being developed in the 1960s when the Civil Rights Movement was active in the United States, is still relevant today. Mobilisation today, however, comes from a broader range of technologies and increasingly connected social networks. Grievances can be played upon to a point where people decide to move from being
With this enduring power of the Internet and the media to transmit such images quickly across the world the problem of terrorism is not going away anytime soon. The Emergency Services Show, 24 and 25 November at Stoneleigh Park is a good time to reflect upon recent events across the world. It will enable us to discuss the changing nature of terrorism and to ensure our responses are resilient and to ensure we retain our vigilance in the face of an ever changing and protean set of adversaries. Dr Dave Sloggett is a recognised commentator and authority on the international security landscape from the Centre for Defence Studies, Kings College, London. He will be speaking about this subject in his key note speech ‘Perspectives on the International Security Landscape: The Enduring Threat from International Terrorism’ at this year’s conference at The Emergency Services Show 2010.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
53
we are your txt people txttools allows you to send and receive txt messages to multiple people in an instant using your computer. simple :) 2 way communication that is quick, to the person, to the point, secure and cost effective. clever ;)
txttools速 emergency incident planning SMS is a powerful disaster contingency tool, which enables your organisation to: + Communicate directly with all members of your organisation quickly and efficiently, from individuals & small groups to tens of thousands + You will be able to send safety alerts of areas to avoid, prevent unnecessary journeys and wasted time + Contact ALL customers and staff instantly from your computer + Send a message securely from your mobile via your txttools account to ALL customers or staff instantly, from wherever you are + Provide a route for staff and students to contact you and your team + Works even when network coverage is poor
e: info@txttools.co.uk w: www.txttools.co.uk t: +44 (0)113 234 2111
+ In an unfolding situation send regular up-dates to advise all vested parties + Pre-write message templates to allow quick, but well thought out messages to be sent by any member of staff
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
EMERGENCY COMMUNICATION A strategic SMS text message plan can be an invaluable way to communicate with your community in the event of an emergency HE MOST SUCCESSFUL organisations, large or small, prepare themselves for all potential eventualities. SMS text messaging is an ideal emergency incident planning communication tool. As everyone has their phone with them at all times, text messaging provides the perfect rapid response mechanism in the event of a disaster or incident. A text message can be sent from a computer to every member of your community in a matter of minutes, whether your community is tens of people or hundreds of thousands. Importantly the message can also be triggered from pre-authorised mobile phones.
T
INSTANT COMMUNICATION SMS is a powerful disaster contingency tool that enables your organisation to communicate directly with all members of your team or community quickly and efficiently, from individuals and small groups to tens of thousands. You will also be able to send safety
KEY FACTS At least 20 per cent of all organisations will suffer fire, flood or storm, power failures, terrorism or hardware or software disaster. Of those without a business continuity plan, 43 per cent will never re-open, 80 per cent fail within 13 months, and 53 per cent of claimants never recoup the losses incurred by a disaster. Source: Aveco Major systems downtime costs (15 per cent of organisations) over £50,000 per hour. Source: Information Age
alerts of areas to avoid, prevent unnecessary journeys and wasted time, contacting all customers and staff instantly. The message can be sent securely from your mobile via your txttools account to all customers or staff instantly, from wherever you are. txttools very importantly provides an inbound information route for staff to contact you and your team, which works even when network coverage is poor. In an unfolding situation you can send regular updates to advise all vested parties and choose to receive information back in from people at the situation. To be prepared you can also pre-write message templates to allow quick, but well thought out messages to be sent by any member of staff. SMS text messaging is socially and digitally inclusive, over 98 per cent of UK adults have a mobile phone. Many organisations are adopting simple-to-use interfaces from companies such as txttools. co.uk This service allows the user to send and receive SMS text messages from their computer and track the delivery, much like e-mail, but with audited delivery. Having the ability to create discreet groups of customers, clients, patients or staff can have major benefits when you want everyone to be notified with a single message. The tool is completely flexible, so you can send a message to a group or to an individual person. Messages can be sent instantly or scheduled at a later time and date. The schedule can be set months or even years in advance and sent out when that message is relevant. Messages can even be edited right up until the scheduled time to allow for changes in arrangements. Customers can be
added to lists requesting information and replies may be automated or custom sent. Many organisations are now incorporating txttools into their disaster planning, it is proven to be the fastest, most reliable method for communicating with large groups of people. WHY ARE THEY CHOOSING TXTTOOLS®? txttools has an uninterrupted message delivery in the public sector for the last nine years. txttools is used by councils, police forces, schools, hospitals, clinics, connexions and over 45 per cent of the UK colleges and universities. A robust sophisticated messaging platform that is easy to use underpins the company’s business. The txttools team have and continue to respond to development needs of the community. The application includes an array of features including two-way messaging and provides secure online access 24 hours a day seven days a week from any PC (using the same security as online banking). You can send messages to groups or individuals, instantly or schedule for later delivery. You can also track delivery of every message. It is possible to convert a text message to voice mail if the number is a landline. There are inbox rules, RSS feeds and auto responders. The txttools team have an outstanding reputation in both their faceto-face customer training and unlimited support which is included in the package.
FOR MORE INFORMATION Tel: +44 (0)113 234 2111 E-mail: info@txttools.co.uk Web: www.txttools.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
55
@
EN P HU QJ
N KQ KN U G J KK ?A K > BU H= N =HE ?A L PK>A Q ? M J PK BANA OP , J A K ? KN B >A
N "= EO?K !
3GDÃ&#x2DC;$LDQFDMBXÃ&#x2DC;2DQUHBDRÃ&#x2DC;2GNVÃ&#x2DC;
"NMEDQDMBDÃ&#x2DC;
Ã&#x2DC;RDQHDRÃ&#x2DC;NEÃ&#x2DC;GHFGÃ&#x2DC;U@KTDÃ&#x2DC;OQDRDMS@SHNMRÃ&#x2DC;VHSGÃ&#x2DC;@Ã&#x2DC;JDDMÃ&#x2DC;ENBTRÃ&#x2DC;NMÃ&#x2DC;O@RSÃ&#x2DC;DWODQHDMBDRÃ&#x2DC; @MCÃ&#x2DC;ETSTQDÃ&#x2DC;CDUDKNOLDMSRÃ&#x2DC;EQNLÃ&#x2DC;RNLDÃ&#x2DC;NEÃ&#x2DC;SGDÃ&#x2DC;SNOÃ&#x2DC;SGNTFGSÃ&#x2DC;KD@CDQRÃ&#x2DC;@MCÃ&#x2DC; NODQ@SHNM@KÃ&#x2DC;DWODQSRÃ&#x2DC;HMÃ&#x2DC;DLDQFDMBXÃ&#x2DC;OK@MMHMFÃ&#x2DC;QDRONMRDÃ&#x2DC;@MCÃ&#x2DC;QDBNUDQX 6GNÃ&#x2DC;RGNTKCÃ&#x2DC; @SSDMC (PHUJHQF\ 3ODQQHUV IRU 3ROLFH )LUH 5HVFXH $PEXODQFH 0DULWLPH DQG &RDVWJXDUG 02' 1*2V DQG WKH 9ROXQWDU\ 6HFWRU /*$V /RFDO 5HJLRQDO 5HVLOLHQFH 7HDPV 8WLOLW\ 2SHUDWRUV 7UDQVSRUW DQG 3RUW $XWKRULWLHV *RYHUQPHQW $JHQFLHV +HDOWK $XWKRULWLHV 3ULPDU\ &DUH 7UXVWV &RPPHUFLDO %XVLQHVVHV DQG (PEDVVLHV 7KH FRQIHUHQFH SURJUDPPH ZLOO LQFOXGH LQWHUDFWLYH SDQHO GLVFXVVLRQV 6XEPLW TXHVWLRQV RQOLQH
#@XÃ&#x2DC;.MD Ã&#x2DC;6DCMDRC@XÃ&#x2DC; SGÃ&#x2DC;-NUDLADQ 0QFOJOH ,FZOPUF 1SFTFOUBUJPO $ISJTUJOB 4DPUU )FBE PG $JWJM $POUJOHFODJFT 4FDSFUBSJBU 0WFSWJFX GSPN UIF 1PMJDF 'JSF "NCVMBODF PO .VMUJ "HFODZ $PMMBCPSBUJPO JO $IBMMFOHJOH 5JNFT s
3UHVHQWDWLRQV IURP :HVW 0LGODQGV )LUH 5HVFXH :HVW 0LGODQGV $PEXODQFH 6HUYLFH 3ROLFH 6HUYLFH
#VJMEJOH 3FMBUJPOTIJQT 5ISPVHI 5SBJOJOH BOE *OUFSBDUJPO s 3URMHFW 2ULRQ 7HVWLQJ WKH 8. 5HVSRQVH WR /DUJH 6FDOH 'LVDVWHUV 5R\ :LOVKHU &KLHI )LUH 2IÃ&#x203A;FHU +HUWIRUGVKLUH )LUH 5HVFXH s 3URMHFW 5DGLDQFH 6WHSV 7RZDUGV D 5HVLOLHQW ,QWHJUDWHG $SSURDFK WR )LUVW 5HVSRQGHU &RPPXQLFDWLRQV DQG ,QWHURSHUDELOLW\ 'U %HQ :HVWRQ 02' LQ SDUWQHUVKLS ZWLK WKH &&6 DQG 13,$ s &DVXDOW\ 0DQDJHPHQW 7KH 1H[W &KDSWHU 'HUHN /XII 'HYHORSPHQW 0DQDJHU )LUH 6HUYLFH &ROOHJH 'U +HOHQ +LJKDP &RQVXOWDQW $QDHVWKHWLVW -RKQ 5DGFOLIIH +RVSLWDO
5IF /BUJPOBM $IBMMFOHF PG UIF 0MZNQJDT 1BSBMZNQJDT s 2UJDQLVDWLRQV LQFOXGH 2O\PSLF 6HFXULW\ 'LUHFWRUDWH /RQGRQ $PEXODQFH 6HUYLFH /RQGRQ )LUH %ULJDGH %ULWLVK 7UDQVSRUW 3ROLFH %ULWLVK 5HG &URVV
#@XÃ&#x2DC;3VN Ã&#x2DC;3GTQRC@XÃ&#x2DC; SGÃ&#x2DC;-NUDLADQ 0QFOJOH ,FZOPUF 1SFTFOUBUJPO 1FSTQFDUJWFT PO UIF *OUFSOBUJPOBM 4FDVSJUZ -BOETDBQF 5IF &OEVSJOH 5ISFBU GSPN *OUFSOBUJPOBM 5FSSPSJTN %S %BWF 4MPHHFUU $FOUSF GPS %FGFODF 4UVEJFT ,JOHT $PMMFHF -POEPO $SFBUJOH B 3FTJMJFOU *OGSBTUSVDUVSF s ,PSURYLQJ WKH 5HVLOLHQFH RI &ULWLFDO ,QIUDVWUXFWXUH 'DYLG 0XUSK\ $VVLVWDQW 'LUHFWRU 1DWXUDO +D]DUGV 7HDP &DELQHW 2IÃ&#x203A;FH s ,QWHJUDWHG $JHQF\ $SSURDFK &DVH 6WXGLHV &RQFHSWV 'HYHORSPHQWV 0DUN /HLJK &RXUVH 'LUHFWRU (PHUJHQF\ 3ODQQLQJ &ROOHJH s &LYLO &RQWLQJHQFLHV RQ D %XGJHW 0LNH *UDQDWW &RQVXOWDQW WR &RPPXQLW\ 5HVLOLHQFH
/BUVSBM .BONBEF %JTBTUFS .BOBHFNFOU s 7HDP 3HUIRUPDQFH LQ ([FHSWLRQDO (QYLURQPHQWV 3KLO 6PLWK &50, 'LUHFWRU RI &ULWLFDO 7HDP 3HUIRUPDQFH 3URJUDPPH &73 s 3URWHFWLQJ WKH 3XEOLF IURP $QRWKHU %XQFHÃ&#x203A;HOG 7RQ\ 2ZHQ +HDG RI ,QFLGHQW 0DQDJHPHQW (QYLURQPHQW $JHQF\ 'LUHFWRU RI +HDOWK 3URWHFWLRQ $JHQF\ 5IF PSHBOJTFST SFTFSWF UIF SJHIU UP BNFOE UIF QSPHSBNNF XJUIPVU OPUJDF
3NÃ&#x2DC;QDFHRSDQÃ&#x2DC;@MCÃ&#x2DC;ENQÃ&#x2DC;ETQSGDQÃ&#x2DC;HMENQL@SHNM TOC@SDRÃ&#x2DC;UHRHSÃ&#x2DC;Ã&#x2DC; VVV DRR BNL BNMEDQDMBD GSLKÃ&#x2DC;NQÃ&#x2DC;B@KKÃ&#x2DC; Ã&#x2DC;
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
SECURE COMMUNICATION
Protecting mobile data via the BlackBerry® SmartCard Reader N THE PREVIOUS edition of Counter Terror Business we discussed a range of solutions to make the use of BlackBerry smartphones more secure and protect it in adverse conditions. In this issue we focus on the BlackBerry SmartCard Reader, which has become an indispensable solution to assure the highest level of mobile data security. Weather in the field or at headquarters, law enforcement personnel need freedom of movement and are demanding the technologies to increase their flexibility. With this in mind, the BlackBerry Enterprise Solution has been designed to offer maximum data security via its two transport encryption options, Advanced Encryption Standard (AES) or Triple Data Encryption Standard (Triple DES), for all data transmitted between BlackBerry® Enterprise Server and BlackBerry smartphones. This will make the data transfer between devices secure. But what if an unlocked BlackBerry smartphone gets into the wrong hands?
I
ORGANISED CRIME TARGETS MOBILE DATA Criminal activity has shifted from getting access to mobile devices to obtaining data stored on it. Making use of people in special circumstances such as crowded places or by using the art of deflection, an experienced criminal can quickly get hold of a mobile device without the owner noticing it and thus access to the desired information. In most cases, it is precisely this mobile device which would allow the owner to report the loss of an asset and – in the case of a BlackBerry smartphone – arrange for a remote data wipe via the BlackBerry Enterprise Server. Laptop and desktop computers in offices and at home are equally targets of data theft, often without the owner noticing it for many months after it happened. The BlackBerry Smart Card Reader builds on the security, flexibility and mobility of the trusted BlackBerry Enterprise Solution. The BlackBerry Smart Card Reader is designed to allow mobile personnel to meet operational requirements for using multi-factor authentication with Bluetooth®-enabled Microsoft® Windows® computers, BlackBerry smartphones, PKI applications and for highly secure web browsing – without negatively impacting the user experience. The BlackBerry Smart Card Reader is designed to solve a fundamental security concern for organisations, helping eliminate unauthorised access to unlocked computers and BlackBerry smartphones. Instead of
inserting the smart card into a stationary reader or bulky peripheral attachment which can easily be left behind, users insert a smart card into this lightweight reader and wear it on a lanyard, causing smartphones and computers to lock when the user is not in proximity. The BlackBerry Smart Card Reader can replace serial or USB based card readers, even if your organisation has not deployed a BlackBerry solution. This enables you to benefit from un-tethered access to your smart card credentials from your desktop or laptop computer. S/MIME SUPPORT The BlackBerry Smart Card Reader works with certificates on smart cards to leverage your organisation’s S/MIME infrastructure and is designed to enable your employees to digitally sign and encrypt messages on either their BlackBerry smartphones or computers to provide sender-to-recipient security. When used with the BlackBerry® Enterprise Solution, the BlackBerry Smart Card Reader supports advanced security features to help meet IT and public sector requirements, including: • AES-256 encryption • FIPS 140-2 validated encryption module • S/MIME support • Wireless IT policy enforcement on smartphones The BlackBerry Smart Card Reader is designed to minimise the impact of operational requirements on users, making it easier for them to comply with your security policies. THE BLACKBERRY SMART CARD READER CAN HELP YOUR ORGANISATION: • Increase security compliance – increasing the convenience and comfort of using smart cards with BlackBerry smartphones and computers helps to ensure that users comply with organisational security directives. Using IT policy controls, BlackBerry smartphones and computers can be configured to lock if the BlackBerry Smart Card Reader goes out of range, rendering the smartphone or computer unusable and information inaccessible until proximity is restored and user
authentication requirements have been met. • Meet strict government security requirements – FIPS 140-2 validated encryption technology. Built on the proven BlackBerry® Java® Virtual Machine (BlackBerry JVM), the BlackBerry Smart Card Reader uses an AES256 encryption overlay for Bluetooth. It allows organisations using smart cards to add additional security features to the BlackBerry Enterprise Solution security architecture. • Provide an enhanced user experience compared with competing solutions – the slim, lightweight BlackBerry Smart Card Reader features long battery life and Bluetooth technology that allows users to comfortably wear the reader on a lanyard. No more heavy peripherals or bulky smartphone attachments are required for authenticating to BlackBerry smartphones or computers with smart cards. • Manage key lifetimes wirelessly – system administrators gain additional control over the wireless environment with the ability to wirelessly manage security key lifetimes on the BlackBerry Smart Card Reader through the BlackBerry® Enterprise Server.
FOR MORE INFORMATION Address: Unit 25, Elysium Gate 126-128 New Kings Road London SW6 4LZ, UK Tel: +44(0)207-384-8700 Fax: +44 (0)845 200-8528 E-mail (sales): sales@z-three.com E-mail (finance): finance@z-three.com Web: www.z-three.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
57
www.counterterrorbusiness.com
SPOTLIGHT ON COMMUNICATIONS
G6 GLOBAL – LEADING THE WAY IN SUCCESSFUL COMMUNICATIONS IN AN UNCERTAIN WORLD G 6 IS A LEADING SPECIALIST in the provision of communications solutions to frontline organisations working in the fight against global terrorism. Our clients work in some of the most hostile and challenging environments in the world, and we are frequently there right alongside them. Our capabilities are extensive, from the supply of simple analogue and digital two-way radio communications systems, right up to the specification, design and implementation of multiplatform, fully integrated voice, data and video networks across multiple and diverse geographic locations. Our range of deployable and covert solutions are specifically designed and built in-house, for specialist operations such as surveillance tasks and response to rapid onset emergencies. The solutions allow teams to deploy on operations at very short notice, secure in the knowledge that their communications will work, first time, every time. Each of our solutions is scalable and can be tailored to your specific
requirements. Our extensive knowledge and understanding of the newly emerging digital radio products positions us as your logical first point of contact if you are looking to really get the most form a private mobile radio network. Working extensively with surveillance and covert operators, we have a unique knowledge of the challenges of this type of operation and our understanding often enables us to make suggestions that our clients may not have considered for themselves. In this way we can enhance both the operational effectiveness and maximise value for money. Our offices, situated in a discreet location in the Gloucestershire countryside, include full electronic and mechanical workshops. Here we provide both technical and operator training in a variety of disciplines.
Our vehicle workshop enables us to fit vehicles with a range of covert systems for both voice and video surveillance. We also design and build command & control (C2) vehicles incorporating broadband satellite terminals giving unrivalled communications connectivity regardless of your geographic location. Like everything else in our portfolio, flexibility is the key and these can be built into any type of vehicle and can be fitted with your own communications suite specific to your organisation; nothing is set in stone. Analogue or digital; voice, data or video; clear or encrypted; covert or conventional; static or mobile; simple or complex: whatever your requirements, trust us to work with you to ensure that you get the right solution, regardless of the situation. Our fully security cleared team is waiting to speak to you so please, call or e-mail with no obligation.
FOR MORE INFORMATION Tel: 01454 610050 Fax: 0870 7622167 E-mail: andrew@g6-global.com Web: www.g6-global.com
ACTIVE ALERT® VIDEO ANALYTICS RECEIVES I-LIDS® CLASSIFICATION FROM UK HOME OFFICE H ONEYWELL’S NEW Active Alert® v4.7 video analytics solution, has been evaluated by the UK Home Office Scientific Development Branch (HOSDB) and has been confirmed as an Imagery Library for Intelligent Detection Systems (i-LIDS®) approved system both as a primary detection system for operational alert use and as an approved event based recording system for sterile zone monitoring applications. Active Alert v4.7 is therefore now approved for government use in applications for perimeter detection and protection across critical infrastructure facilities. i-LIDS is the UK government’s benchmark standard for video analytics technology and is awarded to security products evaluated against stringent criteria specified by HOSDB in the development of video based detection systems for government use. Of particular note is the achievement of ‘primary detection system’ classification, meaning Active Alert v4.7 has been certified for use as a standalone security system in sterile zones without the requirement of a secondary system to act as back-up, illustrating the quality and reliability of the
product. The term ‘sterile zone’ refers to an area adjacent to the perimeter boundary of a site where the presence of an object could signify intent to attack the boundary. “To receive i-LIDS classification is an exceptional achievement for any security product,” said Jeremy Kimber, EMEA channel marketing leader, Honeywell Systems Group. “The annual evaluation process conducted by HOSDB tests security products against a high standard and this classification is testament to the quality and capability of Active Alert v4.7.” Active Alert v4.7 is the latest version of Honeywell’s popular Active Alert video analytics solution which can automatically detect, analyse, track and classify the behaviour of people, objects and vehicles as they move through a scene, alerting operators to anything suspicious and
allowing them to respond faster. In addition to i-LIDS accreditation, Active Alert v4.7 includes a number of new features such as language support for French, Spanish, Italian, Dutch and German, and compatibility with Honeywell’s EQUIP® IP Camera range. It also features Alarm Management Server (AMS), a new solution which allows security operators to monitor multiple real-time alarms simultaneously from a central location by connecting field servers together through a single dedicated server. This is ideal for large organisations spread out over vast or multiple sites, government and corporate control rooms or central monitoring stations. “AMS has been developed in conjunction with a major central station, containing numerous channels of analytics to work across multiple critical infrastructure sites,” says Carolyn Ramsay, global product director for Honeywell video analytics. “We know this meets the needs of this marketplace.”
FOR MORE INFORMATION Tel: 0844 800 6892 E-mail: systemsenquiries@honeywell.com Web: www.honeywell.com/ security/uk/systems
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
59
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
Written by Stephen Prendergast, Excelerate Technology Ltd
WIRELESS COMMUNICATION
Satellite and video technologies improve operational effectiveness NE OF THE MOST EXCITING new developments in the field of technological support for police and counter terror forces, as well as for central and local government departments and agencies, is the increasing use of integrated satellite broadband, wireless cameras and other related technologies across
O
This is of growing interest as forces try to develop strategies for maintaining high levels of effectiveness in spite of cuts in staffing and budgets. David Savage, founder and CEO of Excelerate Technology thinks that, given the critical priorities emergency services have to prepare for, investments will continue to be made in high tech command,
Whether the incidents being managed or monitored are emergencies, major terrorist attacks or anti-social behaviour, integrated satellite and wireless communications deliver huge benefits incident grounds to improve incident management and public safety. Whether the incidents being managed or monitored are emergencies, major terrorist attacks or anti-social behaviour, integrated satellite and wireless communications deliver huge benefits. Emergency services and government departments are also discovering that, in an era of major budget cuts, these solutions are also much cheaper than expected, allowing highly efficient use of personnel at a time when staff numbers are likely to be cut. Along with the new generation of incident command vehicles now being deployed in increasing numbers by police, fire and ambulance services throughout the United Kingdom, satellite broadband and wireless technologies, when used in an integrated way enable monitoring, sharing and managing of incidents more efficiently and effectively, via realtime data, video and voice applications.
communications and surveillance systems, despite impending budget cuts: “As there is no alternative to achieving what our customers want to do without these technologies, and given the gravity of the incidents that need to be managed better – from floods to major
incidents to terrorist attacks – then we are confident that, although there are bound to be some effects from budget cuts, the essential services and technology needed to give operational commanders all the support they need to make faster, better informed, more effective decisions will only become even more widely established. “Nearly all the communications solutions in our portfolio are capable of being used as single, standalone products, even though we develop most offerings as part of an integrated requirement. “For example, most of our emergency services customers specify video systems that use both standard and thermal cameras, where live video is transmitted in real time for viewing anywhere in the world. Then, having seen the potential of these cameras for improved surveillance and video communications, our customers inevitably think of further ways to deploy such equipment in standalone applications. The picture is similar across the whole range of our product portfolio as our customers let their imaginations loose. “One of the key benefits customers are finding is that, over time, broadband communications save organisations money. The company’s ability to offer flexible tailoring of bandwidth costs, based on bespoke requirements, also helps users match communications needs and budgets. We realise that there are budgetary constraints for customers and we have solutions, often involving the supply of dual function vehicles that deliver real added value.” Crime and disorder, firearms incidents, anti-social behaviour, park watch and pub watch operations can all be enhanced by using some or all of these technologies. In the case of firearms incidents such
Police and counter terror forces, such as Gwent Police, are increasingly using satellite broadband, high bandwidth wireless transmission video cameras, and other related technologies to support improved, joined up decision making and incident recording during major incidents.
60
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
ADVERTISMENT FEATURE
www.counterterrorbusiness.com
technologies can be used not only to monitor activity at an incident but also to record actions for later enquiries. The threats to both the public and the police in the recent shootings highlight the importance of the need to share information efficiently as part of an effective multi-agency operation. Creating and sharing a Common Operational Picture is widely acknowledged as being critical for improving the response to both single and multi-agency emergencies. The new Digital Incident Ground technologies pioneered and developed by Excelerate Technology Ltd, the UK’s leading provider of data, video, voice and internet via satellite and wireless solutions to the emergency services, enable police, counter terror forces and other organisations involved with public safety to achieve a live Common Operational Picture, in practical, cost effective and highly practical ways. Technologies now available include: SATELLITE BROADBAND Satellite broadband delivers critical, robust, highly mobile and quick to set up high bandwidth communications capacity within five minutes of arrival at an incident, enabling data, video, voice and internet applications to be accessed remotely – anytime, anywhere. Additionally, mobile BGAN receivers can even be used for receiving data during transit. Mission-critical applications, such as command information systems, can be made operational rapidly, sharing essential incident information throughout an incident ground, between all operational personnel and multiple agencies, and back to headquarters or any other authorised location. SHERPA CAMERAS The Sherpa Surveillance System (or ‘climbing camera’) enables wireless cameras and other devices, such as communications aerials for TETRA or GSM, WiFi access points and 3G routers, to be positioned high up on different types and sizes of lampposts and poles for establishing improved live viewing of a wide range of different types of incidents. A camera network can be set up in a very short period of time, for discreet surveillance or in temporary locations. Public concerns about widespread CCTV deployments can also be allayed by only deploying cameras when necessary (for example at major public events such as the Notting Hill Carnival and public demonstrations). TRIPOD CAMERAS Rapid deployment wireless cameras deliver greatly improved video imagery (using COFDM wireless transmission), which enables high quality footage, even from within buildings and tunnels where there is no line-of-sight, to be streamed to incident commanders. Excelerate supplies body-worn camera solutions that utilise a variety of transmission standards including COFDM, Wireless, GSM, and 3G to suit the purpose
SHERPA ‘CLIMBING CAMERA’ SURVEILLANCE SYSTEM REVOLUTIONISES POLICE AND COUNTER-TERROR COMMAND AND RECORDING The Sherpa ‘Climbing Camera’ Surveillance System from Excelerate Technology Ltd is a new addition to the range of information support technologies that will help revolutionise the way police and anti-terror forces manage and record a wide range of different types of incidents, as well as helping local and central government departments deliver essential public safety in an era of high terrorist threat levels but tighter security spending. The system enables wireless cameras and other communications devices to be positioned quickly high up on different types and sizes of lampposts and poles to create rapidly deployable camera networks. Cameras on these platforms can then be used for establishing improved live viewing and recording of a wide range of different types of incidents from inside command vehicles, control centres or on portable viewers. Using COFDM, MESH and satellite broadband technologies, cameras and communications devices can be used to improve situational awareness (building and sharing a Common Operational Picture) as well as recording incidents for later analysis, review and enquiries. Some of the major benefits for police forces and local authorities are the cost saving and flexibility advantages of being able to deploy a CCTV system on a temporary basis to areas requiring video monitoring – for anti-social behaviour and graffiti attacks, for example. The Sherpa system is much cheaper to deploy than permanently hardwired CCTV systems, requiring much lower investment and delivering greater operational efficiency. The Sherpa system is currently also being used by the UK Arson Task Force Teams, police forces for large scale incidents, HM Prison Service (for problem areas in prisons lacking permanent CCTV cameras) and local authorities, where it is being used to satisfy requirements under the Crime & Disorder and Police Reform Acts. The Sherpa system is made up of three key elements: 1, the Delivery Unit, which is a self-powered system (controlled by 2, a hand held unit) that climbs to the required height and securely and automatically clamps 3, the Operating Platform Unit, to a lamppost or pole. The Operating Platform Unit can carry robust wireless PTZ (Pan, Tilt, Zoom) cameras linked to command vehicles, or other command equipment such as communications aerials for TETRA or GSM, WiFi access points and 3G routers. One
and levels of resilience required. These deliver on-the-spot coverage and awareness to all relevant parties involved in an incident. INDEPENDENT PRIVATE GSM NETWORKS Excelerate can provide private GSM networks, to overcome commercial network overload issues during crises. Excelerate’s Communications Management Solution (ECMS) provides a fully integrated and
of the system’s strengths is this flexibility to carry a growing array of devices. Once the Operating Platform Unit has been clamped to the pole (the entire process of attaching to the pole and positioning takes about five minutes), the Delivery Unit can then be quickly brought back down the pole and used to position additional platforms on different poles, thereby enabling commanders to establish a camera or other communications infrastructure network in a very short period of time. Integrated with COFDM transmission technology, remote viewing of video from Sherpa camera platforms can be done via mobile command units, laptops, peli-cases and control rooms. The delivery unit is capable of climbing a wide range of pole types, including poles of varying thickness. Given all these features, the result is the world’s first rapidly deployable, high-level wireless camera network and communications system. By delivering real time video footage from cameras placed at height for improved coverage and access (with coverage achieved in a very short period of time) emergency service commanders are able to see substantial improvements in the quality and timeliness of the information on which they base their decisions, especially in areas where no existing video or CCTV coverage is available. The system has a wide variety of military, para-military, counter terror and joint civil/ military emergency management applications. Already in use throughout the UK, North America, Canada, Australia and South Africa, the Sherpa system is proving to be the next generation of rapidly deployable surveillance solutions for a wide variety of emergency service, central and local government applications.
functional satellite and GSM PBX to deliver seamless connectivity between different types of communication devices. ECMS can patch and record every voice device being pushed through it, and users of VOIP handsets, GSM phones, VHF, UHF, and Airwave handsets can all be connected to each other.
FOR MORE INFORMATION Web: www.excelerate.info
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
61
POWER SUPPLIES AND CHARGERS AC/DC · DC/DC · DC/AC · NiMH · LI-ION · LEAD-ACID
0% 10
MPLIA
0% 10
T
RoHS C
O
N
C
O
N
T
RoHS
MPLIA
Call us for a competitive quote 01722 504853
www.mascot.com · sales@mascot.no
CARGO SCREENING
www.counterterrorbusiness.com
COOPERATION FOR GREATER SECURITY Industry looks to achieve 100 per cent cargo screening but deadlines are being missed, says aviation security expert Chris Yates looks at the consequenses this will have UGUST WILL SEE another deadline missed to deliver effective security for belly-hold freight on passenger flights. The news was broken by Gale Rossides, Acting Administrator of the Transportation Security Administration (TSA), in testimony before the Appropriations Committee’s subcommittee on Homeland Security in the US House of Representatives in early March. Rossides told the subcommittee that while 100 per cent screening of belly-hold cargo on domestic flights would be achieved by the deadline, it would take up to another two years before the same could be said for inbound international belly-hold cargo. The delay has been caused by problems in getting foreign government cooperation. Some 20 core countries are responsible for around 85 per cent of air freight shipments to the US. Delegates at the 2nd Lufthansa Cargo Security Conference held in Frankfurt heard that this failure in getting agreements was largely of TSA’s own making though. Warren Miller, the TSA’s International
A
Air Cargo Branch Chief, admitted that the organisation had initially been “myopic” in its approach to achieving 100 per cent screening, given a primary focus on purely domestic rather than domestic and international air freight security. He went on to say that TSA is “not even at pilot stage” in rolling out a long term, layered approach based around risk targeting. Aside from stating that rhetoric is
A cynic might argue that the initially myopic focus he spoke about, was driven by a belief held in Washington D.C. that the rest of the world would simply roll over and accept that their way is the best way and the only game in town. The cynics would, undoubtedly, be correct in that assertion. Europe has, in part, already bent to US will. The European Commission regulation 300/2008 incorporates many of the tougher US requirements and replaces previously published regulation enforced after the September 11 terrorist attacks. Eckard Seebohm, head of Aviation Security, European Commission (EC), is on record diplomatically stating that a working group comprising shippers, forwarders, airlines and airports, had examined all the issues pertaining to air-freight security and concluded that mistakes had been made when the previous
Rossides told the subcommittee that while 100 per cent screening of belly-hold cargo on domestic flights would be achieved by the deadline, it would take up to another two years before the same could be said for inbound international belly-hold cargo poles apart from reality, he proffered only that US experience indicated that focus on the supply chain was the best way forward for imports, adding the usual mantra about harmonising and strengthening global standards.
regulation (2320/2002) passed into law. Consequently, 300/2008 includes three specific and much more robust elements (independent validation of known consignors; a mandatory EU cargo database embracing known and unknown or unaccredited consignors and a distinction between direct and transit cargo) that
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
63
CARGO SCREENING
www.counterterrorbusiness.com
STOP INTRUDERS WITH SOLUTIONS FROM GPS PERIMETER SYSTEMS T
HE CONCEPT of a Perimeter Security System is simple; deploy a series of detectors around assets or people to be protected, far enough away from them to provide adequate time to make an appropriate response. There are three main elements to achieving this: • Detection – some suspicious activity is taking place that must be detected. • Verification – if possible verify, audibly or visually, that it is a genuine threat. • React – take some action that can prevent or reduce the effect. Detection is the first priority as verification and reaction cannot take place without the initial detection but the choice, design and operation of a detection system must take into account the other two factors. Ensure the selected detection system can cope with the site conditions taking account of changes in direction and levels around the perimeter. Some systems need flat, level ground, some do not. The system operation must be suitable for the site and not affect the normal working practices of the site. If the end user wants to park trucks up to the fence line beams and barriers will not suffice. Use existing or natural security barriers such as hedges, fences and water to
64
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
reinforce the perimeter security. Remember that equipment mounted directly on the final perimeter fence or wall can be subject to vandalism or unwanted alarms if free access to the unsecure side is possible. Keep the detection system as close as possible to the site boundary. This gives the maximum possible time for the appropriate reaction. Make sure that CCTV camera coverage matches the perimeter zone configuration, which will ensure effective verification. Do not put the detection in areas where the cameras are not able see, such as in wooded areas or behind buildings. Do not make the detection zones too small or short. Intruders will not stand still once on the site and so cameras looking at very short sections of the perimeter for verification may miss them. Use pre- and
post alarm video recording if possible. GPS Perimeter Systems Ltd is an acknowledged expert in the correct application of different detection technologies, with a complete range of alternative solutions and more than 30 years experience in design and development of cost effective solutions, world wide. New technologies such as fibre optic and advanced radar systems are now included in the extensive product range, which means that all the above design criteria can be met.
FOR MORE INFORMATION GPS Perimeter Systems Ltd Tel: +44 (0)1604 648344 Fax: +44 (0)1604 646097 E-mail: info@gpsperimeter.co.uk Web: www.gpsperimeter.co.uk
CARGO SCREENING
www.counterterrorbusiness.com
match US policy. Introducing new regulation is one thing but turning regulation into practice is quite another though. TOUGH CHALLENGES AHEAD Seebohm admits that there are huge challenges ahead for the aviation industry and the supply chain, not least of which is the requirement for independent validation of known consignors. He is also on record stating that the US may just have to accept an alternative (such as sniffer dogs) to x-raying every item of belly-hold freight, given that the piece level 100 per cent screening requirement favoured by the TSA could potentially bring air-freight movement between Europe and the US to a grinding halt if a hardware only solution were to be rigidly enforced. A disconnect also remains in respect to timing. TSA’s Rossides states that it will take another two years before 100 per cent international air freight screening will be achieved. Seebohm favours a three-year transition period since some countries remain woefully behind the curve in their preparations. With EC regulation 300/2008 having just become law and much debate consequently still raging between regulators and within the industry over how best to achieve compliance, the key issues will be outlined and discussed in detail at the forthcoming Transport Security Expo & Conference, being held 14-15 September at London Olympia. This annual event will bring focus to many of the fundamental issues the regulation raises, help in identifying who within the extended supply chain has responsibility for what and attempt to
answer the vexed at what cost question. Principal speakers from the International Air Transport Association (IATA), Association of European Airlines (AEA), Swissport, CEVA Logistics, Cargolux and DHL amongst others, will share knowledge and invite in-depth discussion on achieving a 100 per cent cargo screening regime within a one-stop security environment. Considerable disquiet remains about the industry’s ability to secure the supply chain fully given that very many questions remain perplexedly unanswered at the regulatory level. Not least of these questions is the unknown cost of accreditation and validation. How many consignors within the supply chain become accredited will depend on both the bottom line figure and how onerous the process of validation is. Ekhard Seebohm has said that the one-stop security approach for cargo should not be over complicated since it provides a framework for all known consignors and regulated agents to be recognised throughout all European Union member states. He admits that the validation requirement will probably result in a sharp drop in the number of known consignors though. Whilst it’s patently obvious that many low volume consignors will simply not bother with accreditation since cost would likely outstrip value, there are clear rumblings along similar lines from larger volume consignors as well. A representative of Siemens told the Lufthansa Cargo conference held earlier in the year that while it takes supply chain security very seriously indeed, “certified consignor status will increase costs drastically”.
A MORE VIABLE PROCESS The back story in much of this discussion is that a strongly held belief remains that centralised screening at or close to airports may be a more viable process. Seebohm makes the point that this approach would serve only to create major bottlenecks at airports, thus severely hampering just in time trade. He stressed that, for the time being, the priority had to be getting the EU-originating US bound screening methodology right, with focus shifting to other related matters over time. Referring to in-transit air freight, he says that he’s still looking for a measured and reasonable approach that will obviate US All Cargo International Security Programme requirement for exhaustive searches of aircraft loading goods from non certified airports outside of the EU. These issues and very many more will undoubtedly be aired at the Transport Security Expo & Conference in September and it remains critically important that those with a vested in the air freight arena attend to let their views be heard. We may only be talking about a known consignor programme that’s been given a course of steroids and a US style makeover, but the requirements could have a profound effect on your business and bottom line. About the author Chris Yates is the principal of Yates Consulting, a specialist consultancy with a focus on aviation safety and security matters. He will chair the second day of the Transport Security Expo aviation security conference on 15th September 2010.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
65
PIRACY
www.counterterrorbusiness.com
FIREARMS ON MERCHANT SHIPS: A PRAGMATIC RESPONSE TO PIRACY? I N VIEW OF THE FACT THAT piracy continues apace, the debate about the carriage and use of firearms onboard merchant ships continues at both a policy, legal and operational level. The involvement of private security companies adds a further important element to the debate. It is a complex subject involving a myriad of issues. For the purposes of this paper, the focus will be at the policy level and will look briefly at whether there is a compelling moral case for allowing privately owned ships and their crews to be in a position to exercise self defence on the high seas, whether that be by their own hands or through the support of private security companies. The author is acutely aware of the legitimate concerns that one can have about the risk of allowing private individuals to bear arms and exercise lethal force in self defence. These arguments hold weight in the context of ordinary citizens on dry land where there is a functioning and responsive police service within reach. But the high seas is far removed from this scenario and despite a large interntional naval presence, ships continue to be hijacked. With this in mind, one can argue with considerable
conviction that there is a compelling moral case to allow private individuals to protect themselves and exercise the well established and ancient legal right of self defence. There have been numerous studies on this topic but none that really investigate it within the context of the private security industry and the changing approach of certain flag and port states, with more allowing a controlled regime of firearms to and from their territory in order to allow ship owners to protect their ships. The UKâ&#x20AC;&#x2122;s Transport Select Committee
examined this topic in 2006 and in conclusion was highly critical of the UK governmentâ&#x20AC;&#x2122;s confused policy on combatting piracy. As with many governments there is general reluctance to clarify the position. For example, in the UK the Firearms Act 1968 allows the carriage of a firearm or shotgun as part of the ships equipment yet the government policy is to discourage their carriage. The UK Maritime Coastguard Agency, the government department responsible for approving the ship security plans of UK flagged vessels as required by the Inernational Port Facility Security Code (ISPS), states clearly that it will not approve ship security plans that incorporate the carriage of firearms as part of the plan. There is a degree of inconsitency with these positions and this is far from uncommon. In the final analysis, it is unrealistic to expect any major international consensus on this topic and it remains for private industry to make the decision based on the moral and legal right of self defence: perhaps this is as clear as one can expect.
FOR MORE INFORMATION E-mail: admin@mast-online.co.uk Web: www.mast-commercial.com
Maritime Protection
B6HI ^h V aZVY^c\ bVg^i^bZ hZXjg^in XdbeVcn l^i] V higdc\ \adWVa egZhZcXZ VcY d[Ă&#x2019; XZh ^c i]Z J@! BVaiV! 9_^Wdji^! DbVc VcY Hdji] 6[g^XV#
B6HI ^h V bZbWZg d[ i]Z 7g^i^h] 6hhdX^Vi^dc d[ Eg^kViZ HZXjg^in 8dbeVc^Zh VcY i]ZgZ[dgZ \dkZgcZY Wn i]Z^g X]VgiZg dc i]Z jhZ d[ [dgXZ#
LZ XVc YZa^kZg V Xdhi Z[[ZXi^kZ hZXjg^in hZgk^XZ ^c i]Z <ja[ d[ 6YZc VcY >cY^Vc DXZVc VcY egdk^YZ dcWdVgY egdiZXi^dc iZVbh l]d l^aa hV^a l^i] ndjg h]^e i]gdj\] i]Z VgZVh d[ XdcXZgc#
B6HI ]Vh kVg^djh Y^k^h^dch ^cXajY^c\ Vc Zmeadh^kZh dgYcVcXZ VcY hjgkZn XVeVW^a^in! V heZX^Va^hi hZXjg^in hnhiZb YZh^\c VcY ^chiVaaVi^dc YZeVgibZci VcY V bZ\V nVX]i YZeVgibZci#
I]Z 8dbeVcn ^h Vahd VXi^kZ ^c hjeedgi d[ aVg\Z bVg^i^bZ hZXjg^in egd_ZXih ^cXajY^c\ ZmeadgVi^dc! YgZY\^c\ VcY XdchigjXi^dc egd_ZXih ^c Y^[Ă&#x2019; Xjai VcY YVc\Zgdjh Zck^gdcbZcih#
;dg [jgi]Zg ^c[dgbVi^dc eaZVhZ XdciVXi B6HIĂ&#x2030;h J@ d[Ă&#x2019; XZ dg BVaiV d[Ă&#x2019; XZ#
B6HI BVaiV! &* B^acZg <gdkZ ?69:! 7adX` * <]Vg^Y"9jY HigZZi! Ha^ZbV! BVaiV HAB&*,% IZa/ (*+ '& ('( ,,) ZbV^a/ VYb^c5bVhi"dca^cZ#Xd#j` lll#bVhi"XdbbZgX^Va#Xdb
0$67BFRXQWHUEXVPDJBDGB [ LQGG
66
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
PIRACY
www.counterterrorbusiness.com
TREACHEROUS WATERS CALL FOR ENHANCED SELF HELP Chris Yates discusses the near constant battle to protect commercial shipping in an area of the world blighted by almost continual acts of piracy HEN THE SUPERTANKER Moscow University was seized by Somali pirates off the coast of Yemen in May of this year, the attack could well have ended up with the vessel, its 80,000 tonne cargo of crude oil and the crew being held for ransom for an indeterminate length of time. In the event, the pirates were thwarted by the twin facts that this was a vessel well prepared for the eventuality of an attack and in relatively close proximity to the Russian warship Marshal Shaposhnikov. As the pirate attack threatened to overwhelm the 23 crew members aboard Moscow University they quickly disabled the vessel and locked themselves in a safe room to await rescue. A helicopter was rapidly despatched from the Marshal Shaposhnikov to conduct aerial reconnaissance. What followed was a dramatic rescue operation in which ten pirates were arrested after a frenetic gun battle on the high seas. The release of Moscow University and its crew represented an all too brief high in the near constant battle to protect commercial shipping in an area of the world blighted by almost continual acts of piracy. Russian, the European Union and American naval forces have been deployed to the region in the hope of preventing or deterring attacks. Nevertheless, the pirates are reported to be currently holding more than 20 foreign ships and almost 400 crew.
W
ACTS OF PIRACY SURGE The EU has acknowledged that the pirate threat in the Horn of Africa region is “an expanding phenomenon”, both in terms of level of activity and range. Rear Admiral Peter Hudson, Operation Commander EU Naval Force (Navfor), enumerated the continuing threat of piracy in the region, when he recently stated that a huge surge in Somali pirate attacks meant that activity in March was
much less controllable vast swathes of the Indian Ocean, where EU Navfor’s reach is limited by time and distance. EU Navfor seems to prefer to view the shift in pirate activity as evidence of its success in protecting commercial shipping. Just five short years ago the attack range was 287km (165 nautical miles) from the Somalia coast line. Recently, a ship was hijacked 2,037km (1,100 nautical miles) from the Somali coast – and only 926km
The release of Moscow University and its crew represented an all too brief high in the near constant battle to protect commercial shipping in an area of the world blighted by almost continual acts of piracy double that of the three months from September to November last year. Hudson says that the priority for international navies is now to increase cooperation and concentrate forces to counter this new swarming tactic on the part of the pirates. EU Navfor previously focused its activity within the so called Internationally Recommended Transit Corridor (IRTC). This has helped reduce attacks against commercial shipping using the IRTC to a trickle (only three have been reported in the past 12 months), but it has also served to drive the problem into the
(500 miles) from the coast of India. A cynic might argue that such claims on the part of EU Navfor amount to nothing more than a political smoke and mirrors game, given that the reach of pirate activity has expanded exponentially and shown no sign of abating whatsoever. With only 20 or so warships covering an area of pirate activity ten times larger than that of Germany and which sees some 30,000 commercial vessels pass through it each year, it is not difficult to understand why the pirates often act with impunity. Dual purpose deployment of EU
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
67
PIRACY
www.counterterrorbusiness.com
AN END TO END SERVICE FROM ASSEMBLED ELECTRONICS SOLUTIONS A
SSEMBLED ELECTRONICS Solutions (AES) is a Mildandsbased business that offers you an end to end service. Whether you require contract manufacturing capacity or a design and manufacturing partner, AES is ready to assist. With a broad sector base we offer a range of electronics-based services from one off prototype production and testing through to volume manufacture. The integration of enclosure design, wiring, programming and testing means that the end product is not only functionally sound but aesthetically tuned to meet your requirements. AES provides a range of services to new and established clients in the following sectors: Security, defence, automotive and motor sport, aerospace, medical and OEM. In addition to physical manufacture, AES offers both project and supply chain management. Following final assembly, inspection and functional testing, finished products may be delivered using one of the following delivery options: Single delivery, scheduled delivery, call off, kan ban, direct to end user. Rapid prototyping and the development of innovative solutions are core activities.
Recent examples of AES innovation include remote monitoring and control systems, data logging, tracking and detection. Specific applications include smart battery chargers for blue chip retailers; contactless switching for public sector healthcare applications and the conversion of existing security devices to layouts suitable for automated, surface mount assembly. With over 40 years experience, we can assist in technological upgrades to exisiting products both to increase functionality and to reduce unit costs through “design for manufacture”. Whether you require a basic manufacturing and assembly service or an end to end solution we can
assist you in bringing your products to market efficiently and competitively. If you have identified a specific requirement but do not, as yet, have a solution we would be pleased to hear from you.
FOR MORE INFORMATION Assembled Electronics Solutions LLP Masons Road, stratford upon Avon, Warks CV37 9NF Tel: +44 (0)1789 204879 Fax: +44 (0)1789 299727 E-mail: info@assemtron.com Web: www.assembled-electronics.com
The Complete Electronics Service... • Rapid Prototyping • Design & Development • Product Styling • Programming • Innovative Solutions
AES
Assembled Electronics Solutions LLP
Tel: 01789 204879 • www.assembled-electronics.com 68
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
PIRACY
www.counterterrorbusiness.com
Navfor forces in particular (some warships are tasked with protecting World Food Programme (WFP) aid convoys inbound to Somalia) serves to compound the resource issue and potentially limit the scope and reach of protection for commercial shipping. SELF HELP Given the immense range that Somali pirates continue to operate within (Red Sea area bordered by Ethiopia, Saudi Arabia and Yemen, Gulf of Aden bordered by Ethiopia and Yemen, and the much wider Indian Ocean area bordered by Yemen and Oman to the North, Seychelles and India to the East and a chunk of the Kenya coastline stretching well beyond territorial limits to the South) it’s pretty evident that vessels operating in this area cannot expect immediate military assistance. Self preservation is paramount and the onus is largely on commercial operators to deliver measures to adequately protect the vessel, its cargo and crew therefore. The North Atlantic Treaty Organisation (NATO) Shipping Centre (NSC) is offering commercial world delegates attending the forthcoming Transportation Security Expo & Conference 2010, an opportunity to take part in a unique tactical floor exercise that will follow a vessels’ voyage from departure in Rotterdam to a attack point in the Gulf of Aden, through its capture and on to its eventual release. This highly specialised full-day exercise is intended to inform and educate fleet owners of what can be expected in the event that a vessel is seized and also offers real world advice on how to harden vessels against an attack. Moscow University crew were extremely lucky in being aboard a well prepared vessel, having a well practised drill in place and being physically close to military assets able to respond in timely fashion. The crews currently held by Somali pirates have not been nearly so fortunate. The International Maritime Organisation (IMO) conference being held at the same event will complement the tactical floor exercise with a clear focus on an examination of both current and future international policy and regulations in respect to maritime security and how this impinges on the shipping industry. SWARM TACTICS EU Navfor’s Adm Hudson recently told the BBC: “What we’ve seen in the southern part of the Indian Ocean, the Somali basin, is almost swarm tactics by some of the pirates who try to flood the area with action groups.” He insisted that the international naval forces are able to make a difference and navies believe they are reducing the number of successful attacks though. “By correctly positioning our aircraft, putting our ships in the right area, we’ve managed to break up, dismantle, disrupt
Self preservation is paramount and the onus is largely on commercial operators to deliver measures to adequately protect the vessel, its cargo and crew therefore over 20 of those groups,” he said. While the number of suspected pirates in jail and facing prosecution in Kenya and the Seychelles has risen significantly, attacks on commercial shipping have continued to be relentless and therefore question the validity of such claims of success. Moscow University cargo of crude oil, valued conservatively at US$50m (£33m) and destined for China, delivered a powerful enough incentive for pirates emanating from one of the poorest countries in the world to go and get. RICH PICKINGS Somali salaries, assuming work is available, amount to US$500 (£340) annually. Those prepared to risk life and limb in a pirate attack can expect a payout of around US$29,000 (£20,000) from a ransom when it is paid. It is reported that the owners of the supertanker Sirius Star paid some US$3m (£2.025m) to have the vessel, its cargo of 277,000 tonnes of crude oil and its 25 man crew released in 2008/9. In 2009, the owners of the Danish owned and operated CEC Future paid out an estimated US$1m (£610,000) to US$2m (£1.22m) but refuse to admit the precise figure. As recently as June of this year the pirates released the British flagged vehicle carrier Asian Glory and its predominantly East European crew (held since January). The 45,000-tonne ship was hijacked
1,000km (620m) off the Somali coast. It is not yet known, though suspected, whether a ransom demand was paid. Ample evidence now exists to show that those who finance the pirate attacks have very rich pickings but such attacks also fuel local economies as well. Local commodity suppliers often provide essentials, including food, on credit to keep those held hostage alive. Financiers and suppliers often exact their pound of flesh when a ransom demand is paid. LESSONS LEARNED With military resources spread across the region and payment of ransoms only serving to exacerbate the piracy issue, the onus rests firmly on the shoulders of the commercial sector to better protect vessels, cargo and crew members from the eventuality of an attack. NATO’s tactical floor exercise, when combined with the IMO’s policy and regulation conference programme, delivered under the auspices of the forthcoming Transportation Security Expo, deliver a unique opportunity to gain best practice knowledge and expertise for the merchant marine operating in treacherous waters.
Transportation Security Expo & Conference is an annual event being held in the National Hall, London Olympia Exhibition & Conference Centre, 14-15 September 2010.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
69
6KDUHG 'DWD 6WURQJHU &\EHU 6HFXULW\ :DQW WR NQRZ PRUH" 'RZQORDG RXU &\EHU ZKLWH SDSHU 6KDULQJ DQG /D\HULQJ RI 'DWD LQ &\EHU ,QYHVWLJDWLRQV WR 3UHYHQW D &\EHU DW ZZZ L JURXS FRP &70 &\EHU:3
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´ZDUULRUVµ WKHPVHOYHV 7KLV UHTXLUHV JDLQLQJ ´LQIRUPDWLRQ VXSHULRULW\µ RYHU KDFNHUV E\ GHSOR\LQJ WKH EHVW WRROV DQG WHFKQLTXHV WR VKDUH DQG OD\HU GDWD IURP PXOWLSOH VRXUFHV
&RQQHFWLQJ WKH ULJKW GRWV « IDVW :KHQ DQ RUJDQLVDWLRQ LV DWWDFNHG LW PXVW DFW TXLFNO\ )LUVW WKH WDUJHWHG RUJDQLVDWLRQ DQG UHOHYDQW DXWKRULWLHV PXVW ORFDWH ZKHUH LQ WKHLU QHWZRUN WKH\ DUH EHLQJ DWWDFNHG ZKR LV DWWDFNLQJ ² DQG ZK\ 7KHQ WKH\ PXVW SULRULWLVH PHWKRGV RI UHVSRQVH DQG SOXJ DQ\ YXOQHUDELOLW\ WR SUHYHQW IXUWKHU DWWDFNV
,QWHOOLJHQFH DQDO\VWV FDQQRW GR WKLV ZLWKRXW WKH WRROV WR H[DPLQH D IXVLRQ RI FRPSOH[ GDWD SDWWHUQV LQ UHDO WLPH ´7R JHW D FRPSUHKHQVLYH YLHZ LW LV FULWLFDO WKDW DQDO\VWV KDYH D V\VWHP WKDW FDQ KDQGOH GLVSDUDWH GDWD IURP D UDQJH RI VRXUFHV VXFK DV ILUHZDOO ORJV LQWUXVLRQ GHWHFWLRQ V\VWHP ORJV DQG URXWHU ORJ ILOHV µ VDLG %RE *ULIILQ &(2 RI L D SURYLGHU RI LQWHOOLJHQFH VROXWLRQV IRU WRS JRYHUQPHQW DJHQFLHV ODZ HQIRUFHPHQW DQG JOREDO FRPSDQLHV IRU PRUH WKDQ \HDUV ´0RVW LPSRUWDQW WKHVH V\VWHPV PXVW EH DEOH WR FRQQHFW WKH ULJKW GRWV IDVW :LWK PRGHUQ F\EHU LQYHVWLJDWLYH VROXWLRQV PDVVLYH YROXPHV RI GDWD WKDW RQFH WRRN KRXUV WR SURFHVV FDQ QRZ EH DQDO\VHG LQ PLQXWHV µ 2QH RI WKHVH WRROV LV WKH L &\EHU VROXWLRQ ZKLFK KDV D FRPSUHKHQVLYH DELOLW\ WR FROOHFW DQDO\VH DQG JHRORFDWH GDWD IURP PXOWLSOH VRXUFHV 7KH L &\EHU VROXWLRQ WDNHV D FRPSDQ\·V H[LVWLQJ F\EHU DQDO\WLFV WR QHZ KHLJKWV E\ SRROLQJ LQWHOOLJHQFH IURP QXPHURXV GDWD VRXUFHV DQG WKHQ OD\HULQJ LW ZLWK RWKHU LQWHOOLJHQFH VRXUFHV IRU FRPSUHKHQVLYH DQDO\VLV WKDW FRQQHFWV WKH F\EHU ZRUOG WR WKH UHDO ZRUOG 7KH HQG UHVXOW LV SRZHUIXO LQIRUPDWLRQ WKDW FDQ UHGHILQH WKH EDWWOH OLQHV LQ D F\EHU DWWDFN 7R OHDUQ PRUH DERXW WKH SRZHU RI VKDULQJ LQIRUPDWLRQ LQ F\EHU LQYHVWLJDWLRQV GRZQORDG RXU ZKLWH SDSHU DW ZZZ L JURXS FRP &70 &\EHU:3
&ULWLFDO ,QIUDVWUXFWXUH LQ WKH $JH RI &\EHU :DU 0F$IHH
L LV WKH OHDGLQJ SURYLGHU RI LQWHOOLJHQFH DQG LQYHVWLJDWLRQ VROXWLRQV IRU GHIHQFH QDWLRQDO VHFXULW\ ODZ HQIRUFHPHQW DQG FRPPHUFLDO VHFXULW\ 2YHU RUJDQLVDWLRQV LQ FRXQWULHV UHO\ RQ WKH L ,QWHOOLJHQFH /HG 2SHUDWLRQV 3ODWIRUP WR SURDFWLYHO\ GHWHU SUHYHQW SUHGLFW DQG GLVUXSW WKH ZRUOG·V PRVW VRSKLVWLFDWHG FULPLQDO DQG WHUURULVW WKUHDWV L VWDUWHG WKH LQWHOOLJHQFH UHYROXWLRQ LQ DQG FRQWLQXHV WR OHDG WKH LQGXVWU\ LQ LQQRYDWLRQ ZLWK SURGXFWV OLNH $QDO\VW·V 1RWHERRN DQG &23/,1. )RU PRUH LQIRUPDWLRQ ORJ RQWR ZZZ L JURXS FRP
3$ 57 2 ) 7 + ( , 1 7 ( / / , * ( 1 & ( / ( ' 2 3 ( 5 $7 , 2 1 6 3 / $7 ) 2 5 0
POLICE & LAW
www.counterterrorbusiness.com
POLICE ALREADY IN TRAINING FOR LONDON 2012 Over 200 senior representatives from the police and other emergency services, government departments and Olympic partners recently completed a major national exercise to test event security preparedness ITH THE LONDON 2012 Olympic and Paralympic Games now less than two years away, the planning to ensure a safe and secure Games is progressing well. The recent exercise ‘Citius Torch’ (after the Olympic motto – Citius, Altius, Fortius – faster, higher, stronger) was a vital step forward in testing that planning and is the first of a series of national Olympic security exercises. Opened by Seb Coe, Chairman of the London 2010 Organising Committee (LOCOG), the two-day table-top exercise, held in central London, presented a series of developing scenarios – from the combined effects of a heat wave and traffic problems through to a terrorist attack.
W
TESTING COORDINATION Exercise ‘Citius Torch’ sought to test the new national coordination and communication systems required for 2012. This included understanding the command chain, examining the required links between the new National Olympic Coordination Centre (NOCC) for safety and security, government, LOCOG and other key elements such as transport and intelligence. While the scenarios were fictional, the scale of the challenge come 2012 is clear; the Games will require the biggest peacetime policing operation ever. The exercise benefited from contributions of visiting members of the Royal Canadian Mounted Police, including Assistant Commissioner Bud Mercer, who led the successful security operation for the Vancouver 2010 Winter Games earlier this year.
The Olympic Torch Relay will travel the entire country requiring a security operation throughout its journey ahead of the opening ceremony and main events, for which over 10 million tickets will be available for venues across the UK. 11 individual police forces will host an Olympic venue or village and every police force will be required to contribute resources through mutual aid arrangements. PROVEN TRACK RECORD Despite the challenge, the police and other emergency services have a proven track record in delivering major events, but the scale and impact of the Games requires a national approach to planning and coordination. Exercise ‘Citius Torch’ was the first stage in making sure that all involved are working together to deliver a safe and secure London 2012 Games. Speaking after the event, assistant commissioner Chris Allison, Olympics lead for the Metropolitan Police and the Association of Chief Police Officers and who will become the National Olympic Security Coordinator come Games-time, said: “First and foremost, the London 2012 Games will be a fantastic sporting event enjoyed by athletes and spectators alike, but it does pose a challenge to the Police Service and our partners; one which we are committed to getting right first time. “Two years out, Exercise Citius Torch was our first major opportunity to test the roles and responsibilities of the various partners and to test how we will work together. It has proved that our planning is going in
the right direction but, as in all exercises, also helped highlight areas for refinement. Our focus is to keep people safe and secure, to be ready for any scenario and to ensure that the Olympics and Paralympics in 2012 are a great sporting celebration.” LARGE SCALE SECURITY OPERATION The 2012 Games will be the largest ever peacetime security and policing operation in the UK. It was against the scale and complexity of this event that in April 2008, ACPO established the Olympic Business Area (OBA), headed by Assistant Commissioner Chris Allison, who is also head of MPS Central Operations, to lead the development of capacity, capability and coordination, and to facilitate operational delivery of the policing operation in support of the Olympic Security Programme. In September 2009, ACPO Cabinet and MPS Management Board approved the formation of a joint ACPO/MPS Olympic & Paralympic Policing Coordination team – the OPC; an alliance of the roles of ACPO Olympic Business Area and the elements of national planning within the MPS. The event celebrations begin with the torch relay in May, with the games themselves opening on 27 July 2012 and going right through to 9 September. Together the Olympic and Paralympic Games will see around 14,700 athletes from 205 countries competing at venues in London and around the UK. Approximately eight million tickets will be sold for the Olympic Games, with another two million for the Paralympic Games.
© London 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
71
)RU GHGLFDWHG DQG OR\DO VWUDWHJLF DQG RSHUDWLRQDO VHFXULW\ DGYLFH DQG VXSSRUW 8. 3XEOLF 6HFWRU RIIHUV FROODERUDWLYH VHFXULW\ DQDO\VLV UHYLHZ DQG VROXWLRQV
Due to a high level of terrorist activity, today we are faced with a wide range of covert threats to our national security. These can take many forms one of which involves physical attack on sensitive areas and services, which if successful would have a truly devastating effect.
â&#x20AC;˘ Command, control and coordination planning â&#x20AC;˘ Security review and audit â&#x20AC;˘ Security change and implementation programmes â&#x20AC;˘ Security training and staff development â&#x20AC;˘ Organisational resilience and business continuity â&#x20AC;˘ Defence procurement consulting PLFKDHO IXOOHU#XNSXEOLFVHFWRU FR XN ZZZ XNSXEOLFVHFWRU FR XN
~ B_TRXP[Xbc PccPRZ STcTRcX^] bhbcT\b U^a cWT _a^cTRcX^] ^U 2aXcXRP[ =PcX^]P[ 8]UaPbcadRcdaT 2=8 ~ BTRdaXch P]S \^]Xc^ah ^U aTbTae^Xa WPcRWTb P]S P[[ _^cPQ[T fPcTa PRRTbb _^X]cb ~ ;PhTaTS PccPRZ STcTRcX^] bhbcT\b ~ 3XbRaX\X]PcTb QTcfTT] aTP[ PccPRZb P]S UP[bT P[Pa\b \PgX\XbX]V aT[XPQX[Xch ~ 3TcTRcb P fXST aP]VT ^U PccPRZ \TcW^Sb
TDSi UK D]Xc 2^]RT_c ?PaZ 8]]^ePcX^] 2[^bT ?^^[T 3^abTc 17 ! #@C D]XcTS :X]VS^\ f: +44 (0)1202 724975
Fra Angelico Ltd is a well established UK supplier of specialist products with an international reputation for supplying high quality goods and services to the UK MoD, other global defence organisations, non-governmental agencies and relief organisations. Fra Angelico specialises in the following key areas; food, field accommodation & equipment and CBRN products. Our new CBRN section offers CBRN decontamination equipment, security products and clothing for the counter- terror, homeland security and civil response & resilience sectors. As the sole UK distributor for Cristanini S.p.A, Fra Angelico supplies small, medium and large capacity CBRN Decontamination systems. These products include mobile field stations and man-portable systems for continuous and simultaneous decontamination of personnel, materials, personal equipment, sensitive equipment, vehicles, and ground. Our Security products include Mobile ballistic protective barriers and shields.
Tel: + 44 (0)1923 297890 Fax: + 44 (0)1923 800485 sales@fra-angelico.co.uk www.fra-angelico.co.uk
t: +44 (0)1202 723535 e: sales@tdsi.co.uk
B$&&(66ZDWFK $G LQGG
Fra Angelico Ltd â&#x20AC;&#x201C; Specialist in Defence & Security and Humanitarian Aid
Fra Angelico Ltd, 7F Dukes Yard, Shakespeare Ind Est, Acme Rd, Watford, WD24 5AL
POLICE & LAW
www.counterterrorbusiness.com
RADICAL POLICE REFORM PROPOSALS OUTLINED The Home Office has launched a consultation paper that outlines new ways to change the face of policing for the better, over the next five years HE PAPER, ‘Policing in the 21st century: reconnecting police and the people’, contains proposals for ways to make police in England and Wales more available and responsive, more accountable, more effective, and deliver better value for money. A new national crime-fighting agency, to replace the Serious Organised Crime Agency (Soca), and the scrapping of Police Authorities in England and Wales are among the proposals. The paper was described by Home Secretary Theresa May as the “most radical reform of policing for 50 years”. She said: “We’ll be replacing the bureaucratic accountability that has been for too long police forces looking up to Whitehall, and targets and bureaucracy, with democratic accountability: the election
T
the Child Exploitation and online Protection Centre. The new agency will aim to better connect these capabilities to organisations such as the police service, HM Revenue and Customs, and the UK Border Agency. The National Crime Agency will be responsible for improving what is known about the threat from organised crime, provide effective national tasking and coordination of police assets, ensure more law enforcement activity takes place against more organised criminals, at reduced cost, and strengthen the UK’s border policing arrangements. ELECTED COMMISSIONERS The reforms will introduce directly elected Police and Crime Commissioners, representing their communities and understanding their crime and anti-social
And we’re also going to strengthen the way we deal with serious organised crime and protect our borders, creating a National Crime Agency, which will have within it different commands – border police force and also serious organised crime, and other issues as well of a police and crime commissioner for each police force. So the people have a say in the individual who can then represent their needs, in terms of ensuring that policing is responding to their needs locally. “And we’re also going to strengthen the way we deal with serious organised crime and protect our borders, creating a National Crime Agency, which will have within it different commands – border police force and also serious organised crime, and other issues as well. So strengthening, dealing with policing and crime issues, crime fighting at a national level, and restoring the link between police and people for local policing.” NATIONAL CRIME AGENCY The government will create a powerful new body of operational crime-fighters in the shape of a National Crime Agency. This will build on the intelligence, analytical and enforcement capabilities of the existing Serious Organised Crime Agency (SOCA) and
behaviour priorities. They will hold chief constables to account for achieving them, and will be able to fire her or him if they do not. Chief constables will be responsible for the day-to-day operations of their police force but will be accountable to the public and not Whitehall. Regular beat meetings will allow people to challenge the police’ performance and accessible street level crime data will shine a light on local crime trends and concerns. Central targets will be abolished, and the police will be encouraged to use their professional judgment in performing their job. Association of Chief Police Officers president Sir Hugh Orde said: “The British Policing Model is built upon the twin foundations of operational independence and local accountability. These are challenging times not just for policing but for all public services to improve and do more with less. The police service has a ‘can do’ ethos and we are ready for
that challenge. But reform must add real value to the critical service we deliver which keeps our communities safe. “The consultation document rightly recognises the increasing complexity of modern policing, from the local to the national, from visible patrolling to serious crime and terrorism. There are a number of new elements proposed which will now require careful consideration, in particular the role of the National Crime Agency, and how greater collaboration across the service can be achieved to drive the necessary savings. Today also presents an opportunity to firmly establish ACPO as a professional leadership body, with a governance and accountability structure as we have consistently requested. “The government’s strong statement of commitment to operational independence is of critical importance. Chief officers absolutely understand the need to be accountable to local communities – policing’s relationship with the public we serve is the source of its legitimacy and consequently its effectiveness. We now need to examine in detail the government’s proposals for maintaining operational independence against the practical reality of directly-elected Police and Crime Commissioners.” AN ACCOUNTABLE FORCE Prime Minister David Cameron said: “It is vital that police officers are free to tackle the crime and antisocial behaviour that matters most to people, not tied down by bureaucracy and formfilling. The fundamental reforms we have announced continue our work to deliver a police service that is visible and accountable to the very people it serves in communities up and down the country. “By replacing invisible police authorities with directly elected Police and Crime Commissioners, we can forge a direct link between the police and the public, ensuring that the public have a voice in setting police priorities and have the power to hold the police to account for keeping our streets safe and secure.” The publication of Policing in the 21st Century marks the start of a public consultation as the government is seeking the views of both the public and professionals across the criminal justice system on specific aspects of the reform programme.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
73
,V ,QWHUIDFH )RUFH 0HDVXUHPHQWV RQ <RXU 5DGDU" +HUH DW ,QWHUIDFH )RUFH ZH VXSSO\ VRPH RI WKH EHVW NQRZQ FRPSDQLHV LQ WKH 8. OLNH %$( 6\VWHPV :HVWODQG +HOLFRSWHUV DQG $LUEXV ,QGXVWULHV ZLWK VRPH RI WKH ZRUOG·V OHDGLQJ IRUFH DQG WRUTXH PHDVXUHPHQW VROXWLRQV ,QWHUIDFH ,QF ORDG FHOOV DQG WRUTXH WUDQVGXFHUV DUH FRQVLGHUHG WKH EHQFK PDUN WKH ZRUOG RYHU ZKHQ DFFXUDWH UHOLDEOH DQG UHSHDWDEOH IRUFH WRUTXH IDWLJXH RU VWUHVV PHDVXUHPHQW LV D SUH UHTXVLWH
+RZHYHU ZH·UH QRW MXVW DERXW ORDG FHOOV $V GLVWULEXWRU IRU '\QLVFR 9LDWUDQ·V LQGXVWU\ OHDGLQJ SUHVVXUH VHQVRUV ;6(1625·V LQQRYDWLYH SUHVVXUH PDSSLQJ V\VWHPV DQG $07,·V FODVV OHDGLQJ '2) WUDQVGXFHUV ZH DVOR RIIHU VRPH WKH EHVW SUHVVXUH PHDVXUHPHQW SUHVVXUH PDSSLQJ DQG PXOWL D[LV PHDVXUHPHQW VROXWLRQV DYDLODEOH ,QWHUIDFH )RUFH 0HDVXUHPHQWV VSHFLDOLVWV LQ )RUFH 7RUTXH 3UHVVXUH PHDVXUHPHQW
6R LI ZH·UH QRW RQ \RXU UDGDU GRQ·W \RX WKLQN ZH VKRXOG EH" ZZZ LQWHUIDFH XN FRP
,QWHUIDFH )RUFH 0HDVXUHPHQWV /WG 8QLW :HOOLQJWRQ %XVLQHVV 3DUN 'XNHV 5LGH &URZWKRUQH %HUNVKLUH 8 . 5* /6 LQIR#LQWHUIDFH XN FRP
ACCESS CONTROL/CCTV
www.counterterrorbusiness.com
TURN YOUR CCTV EQUIPMENT INTO LOW COST SPEED TRAP CAMERAS A
DVANCEMENTS in smart image capture and analysis seem to be a step ahead of government cuts on public spends. News of speed camera partnerships being disbanded across the country recently hit the headlines. Seemingly a move various councils have undertaken to cut their public budget spends in the wake of the new government policy. With this movement, councils are going to be on the lookout to achieve maximum bang for their buck – potentially an answer can lie in the form of Video Content Analysis or best known as Video Analytics in the CCTV world. Advancements in the field of Video Analytics mean that normal CCTV security cameras that dot the streets of various councils can be turned into low cost traffic management cameras, e.g. detecting violations or entry into a one way road in the wrong direction. Low cost, as we are comparing them to specialised traffic management systems installed on the UK roads. By using a smart IP camera against an analogue camera or simply by plugging an IP video encoder on the back of existing legacy CCTV cameras this transition can be achieved. This kind of innovative approach gives the
councils a dual edge of using their numerous CCTV cameras for surveillance as well as traffic management cameras. As with conventional speed cameras, there is no requirement of film or local media as in the neo age these images can be transmitted remotely. This Video Analytics technology can be extended to speed detection, behaviour monitoring (loitering), left object detection, parking violations, one way breaches, red light violations, etc., thus raking much higher ROI from legacy infrastructure already in place. Taking this a step further, control rooms can be changed into black wall monitoring setups. Where video is populated on the video wall or monitor when there is an incident on the streets, you will increase situational awareness within the control room environment and reduce the number of people to watch these monitors 24/7. CBC (Europe) Ltd, with its flagship range of IP Video technology – GANZ IP, is breaking the frontiers of innovation with these market leading innovations. With a complete end to end IP Video product portfolio starting from specialist cameras,
transmission equipment, compression to complex sophisticated Video Analytics and control room video and alarm management software, GANZ IP is geared to deliver within the challenges of the neo economy. “Our cutting edge products have been used by law enforcement forces throughout the world to count vehicles on roads, people in correctional facilities and other such critical areas,” says Santosh Muniswamappa, business development manager of CBC Europe Ltd.
FOR MORE INFORMATION 7-8 Garrick Industrial Centre London NW9 6AQ Tel: +44 (0)20 87323300 Fax: +44 (0)20 82023387 Web: www.cbceurope.com www.ganzvsoip.com
FRONTIER PITTS PAS 68 TERRA MOUNT BLOCKER RONTIER PITTS Terra Mount Blocker has been selected as winner of Best Physical Security Product of the Year (2010). The SMT Technology Terra Mount Blocker is the only surface mounted blocker to be successfully impact tested to the BSi PAS 68 standard, stopping 7500kg travelling at 50mph in the aperture and remain bolted in its original position during and after crash test impact. The Terra Mount Blocker is part of the Anti Terra range which is the complete range of counter terror equipment. The Anti Terra range has been successfully impact tested in accordance with BSi PAS 68. The Frontier Pitts crash-rated Terra Mount Blocker is available in lengths up to 5,000mm, with a lifted height of 11,00mm. The Terra Mount is mounted on the road, therefore no
F
76
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
foundations are required. “The IFSEC award is a great affirmation of Frontier Pitts Terra Mount Blocker and the Anti Terra PAS 68 Impact Tested complete product range,” said Sally Osmond, Frontier Pitts marketing executive. “This award refreshes Frontier Pitt’s position as the leading Physical Security industry innovator and, after years of being nominated as a finalist in the IFSEC awards, we have now received the recognition for years of R&D.”
FOR MORE INFORMATION Tel: 01293 422800 E-mail: sales@frontierpitts.com
ACCESS CONTROL/CCTV
www.counterterrorbusiness.com
THE VITAL ROLE OF ACCESS CONTROL Mike Sussman, Chairman of the BSIAâ&#x20AC;&#x2122;s Access Control Section discusses how to ensure unauthorised individuals cannot enter restricted areas CCESS CONTROL provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and around a building or site. It has a wide range of applications from controlling a single entrance door to a large integrated security network. Access control systems consist of three components. Firstly, there is the physical barrier, which restricts access into a building. This is achieved through methods such as doors being secured by a magnetic or strike lock and turnstiles or speedgates, which are designed to limit access to one person for one card presented. Secondly, there is the identification device, which identifies users of an access control system before granting access. There are a variety of different devices including a proximity card and reader which uses Radio Frequency Identification (RFID), at both a short or long read range. Other methods include a smart card and reader, a swipe card and reader, PIN pads or biometric equipment such as fingerprint and iris scanning. This equipment can be used throughout a site, which will only grant access to staff, thereby reducing the risk of intruders. The door controller and software is another important tool in an access control system. This is used to decide who can gain access through which access point at what time of day and can vary depending on the size of the system and how many readers or sites are being controlled. There are several options when it comes to installing this technology including: a standalone door controller linked to a single door with no software; a number of door controllers all linked together to a single PC to control one site; a number of sites all interlinked together over a wide network area. All three systems are effective and depend on the siteâ&#x20AC;&#x2122;s requirements.
A
CCTV is a popular choice when combining access control with other technologies and greatly assists the site because if any unauthorised personnel attempt to access a specific area they should not enter, this action will be recorded in the event that the footage is needed in future. Furthermore, it acts as a deterrent because the individual knows that they may be watched in their attempt to enter the concealed area. This integration of access control could also be combined with intruder alarm technology. If unauthorised personnel attempt to access a secure area, an alarm could be triggered drawing attention to that individual in the hope that it will deter them from continuing to break through the barrier. It will also enable security staff to take note of the incident and send someone out to remove the individual. FURTHER USES OF ACCESS CONTROL There are specific features of an access control system, which can further benefit buildings used by the defence sector. These are known as Automatic Number Plate Recognition (ANPR) and fire roll-call software. ANPR is particularly useful on the larger sites where a high volume of
staff driving in and out of the premises. ANPR will monitor the entrance of vehicles on-site using CCTV-style cameras and computer software, which identify number plates. Some systems will also store photographs of the driver and vehicle for subsequent analysis. This sophisticated software will draw attention to on-site security staff and will enable them to identify any returning cars that are considered suspicious. Furthermore, it allows critical information to be passed to the police to assist in the pursuit, identification and capture of offenders. Fire roll-call software is of paramount importance in buildings. In the event of a fire it will automatically generate a report containing vital information as to the whereabouts of individuals inside a building. This software operates via the access control smart card of fob that an employee uses to gain access/exit a building. In the event of an emergency the fire roll-call software alerts occupants while simultaneously activating the report at a safe pre-determined remote point. BETTER PROTECTION Access control can greatly secure premises and ensure that staff, visitors and equipment are safe while on-site and any unauthorised personnel cannot access areas that they should not be entering. The ease of merging access control with other security measures is appealing and can provide even tougher protection for sites. Combining access control with the likes of CCTV or intruder alarms will only increase the likelihood that any impostor will be caught.
Electronic access control systems are increasingly being used to enhance safety and security in buildings to enable access only to the people with the necessary authority
PROTECTING EQUIPMENT The defence sector has in its possession high value equipment. Furthermore, an abundance of confidential documents may be stored. Consequently, electronic access control systems are increasingly being used to enhance safety and security in buildings to enable access only to the people with the necessary authority. Access control technology can be integrated with other security measures to provide even tougher protection for premises.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
77
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
Written by Dr. James Ionson
ERIMETERS represent natural and/or manmade boundaries that enclose physical assets, ranging from nuclear power plants to entrances of commercial office buildings. Perimeter security is composed of the detection, assessment and prevention of an intruder from entering restricted areas defined by these boundaries. Regardless of the asset, perimeter security systems always have some form of physical barrier to prevent or delay intrusion, technologies to detect and warn of attempted intrusions, and technologies to assess and track intrusions. The challenge faced by architects of perimeter security systems is to optimise the costs associated with: • The need for security versus the need for access; and • Minimising the probability of a false threat while maximising the probability of detecting a positive threat. This chart illustrates a spectrum of security assets that require perimeter security systems and how each has a different level of “need for security/access” and “false/positive” threat tolerances.
P
For example, at one extreme, nuclear power plants have a much higher need for security than a need for access, and the tolerance for false threats is small. At the other extreme, commercial offices, because they are open for business to the general public, have a much higher need for access than a need for security, and the tolerance for false threats is higher. Oncam Global utilises an architectural process designed to minimise the costs of effective perimeter security systems by: • Creating a database of goals that an intruder could have related to penetrating the perimeter; • Associating these goals with a set of threats that the intruder would initiate; and • Integrating a suite of technologies optimised for surveillance, acquisition, tracking, interrogation and verification (SATIV) of threats so that appropriate measured responses can be initiated. USING A SINGLE TECHNOLOGY MEANS HIGHER FALSE/POSITIVE THREAT RATIO Cost-effective perimeter security systems incorporate multiple SATIV technologies because without the proper mix it is difficult to minimise the false/positive threat ratio. An intuitive analogy is a human being whose only sense is hearing. In a potentially hostile environment this individual would uselessly respond to sounds that would not be interpreted as threatening had his or her other senses been able to weigh in on an assessment. This individual would experience many false threats throughout a long “learning” period, during which certain sounds would be filtered out as non-threatening. As humans, we use all of our senses to minimise the false/positive threat ratio. Perimeter security systems need to do the same.
Consider fiber-optic sensors for long perimeters. This is a very exciting technology that can be tuned to detect the slightest motion near the fiber. It is so sensitive that it can detect vibrations generated by wind, rain and small animals, as well as humans. These systems “learn” the frequency spectrum of vibrations associated with false threats, such as wind, and positive threats, such as a human climbing over a fence. This is analogous to our multi-senseimpaired individual who learns to filter out sounds associated with false threats. But if this human had the additional sense of sight, the learning process would speed up exponentially because it would be easy to see that what sounds like a barking dog poised to attack is actually a dog being held back on a leash by its owner. Similarly, a fiber-optic system integrated with a 360-degree surveillance system would be far more effective at identifying real threats. For example, years ago there was a perimeter security breach at a U.S. nuclear power plant that triggered a “trip wire” alarm. Only trip wire technology was used to secure the outer perimeter so there was no immediate visual confirmation of the threat. When the alarm sounded, the plant was shut down, sniper teams were called to the area, and the local population was evacuated. It turns out that a wild turkey had triggered the alarm resulting in panic and millions of dollars of expenditure. Today, perimeter security systems at nuclear power plants are much more sophisticated and employ multiple technologies, such as imaging systems. Oncam Global is dedicated to architecting cost-effective perimeter security systems designed to integrate threat profiles with multiple technologies, simulating a human’s five senses and unique ability to minimise the false/positive threat ratio.
James Ionson, Ph.D., CEO, Oncam Global Group Dr. Ionson was a member of the U.S. Department of Defense Senior Executive Service credited with the creation of the Innovative Science and Technology Directorate for President Reagan’s Strategic Defense Initiative (“Star Wars”), now called the Missile Defense Agency. He has held top-secret and other national security clearances with the Defense Intelligence Agency and has advised the Pentagon and NASA on critical technology issues.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
79
LARGE SCREEN SYSTEMS FOR SECURE SURVEILLANCE Your competent partner for large screen systems. Complete solutions made in Germany. ) DLP® Rear Projection Cubes: From 50” to 100“, with resolutions from XGA to SXGA+, full HD and WUXGA. ) NEW: Cubes with LED illumination technology. ) Modular LC Displays: Especially designed for modular video walls. ) NEW: Ultra-narrow bezel versions: gap screen-to-screen 7.3 mm, special ventilation concept, simple installation. ) Professional LCD Monitors: Designed for professional use in sophisticated applications. Resolutions from full HD to 4K, screen sizes from 40” to 82”. ) Graphics Controllers: netpix controller series for perfect control and operation of your large screen systems. Display of any data signals. Hardware decoding for IP video streams with special input boards. ) Wall Management Software: Perfect wall control with the eyecon software. Flexible solution, simple and efficient alarm management. Live preview and preset functionality.
eyevis GmbH Hundsschleestrasse 23, 72766 Reutlingen/Germany Tel.: +49 (0) 7121 43303-0, Fax: +49 (0) 7121 43303-22 www.eyevis.de, info@eyevis.de
eyevis UK Ltd. PO Box 482, Burnley, Lancashire BB11 9BX Tel.: +44 (0) 1282 606525, Fax: +44 (0) 1282 697703 www.eyevis.co.uk, enquiry@eyevis.co.uk
NATIONAL RESILIENCE
www.counterterrorbusiness.com
A PARTNERSHIP APPROACH Hugo Rosemont, security policy adviser to A|D|S, takes a look at the UK security industry’s contribution to national resilience HE QUESTION over how the security industry should contribute to national resilience has resurfaced. The Cabinet Office is developing an “enhancement programme” to the 2004 Civil Contingencies Act and attention is now turning to how the private sector should contribute to the process. Wider questions over industry’s contribution to the country’s economic resilience are being asked. What is the security industry’s contribution to national resilience? A|D|S is interested in this question because it is the organisation advancing the AeroSpace, Defence and Security industries in the UK. It represents over 850 companies across the supply chain and approximately 400 of these are small, medium and large sized companies operating in the security and resilience sectors. A|D|S’s member companies have since 2007 been engaging the UK Government on strategic issues of security and counter-terrorism through the UK Security and Resilience Industry Suppliers Community (RISC). Next to the development of engagement mechanisms with government on resilience issues, the economic conditions have been focusing minds in the security industry. A|D|S monitors closely the impact that the economic conditions are having on its members and the UK’s national resilience effort. In this context, A|D|S has been arguing for the development of a closer partnership between government and industry to deliver national resilience and to help fulfill the economic contribution of the sector. But if industry has a role to play in national resilience what is meant by the term?
T
DEFINING RESILIENCE Resilience is a difficult concept to define. However, Sir David Omand has previously captured its meaning as the “ability to detect, prevent and if necessary to handle disruptive challenges”. The view that resilience is “the capacity to absorb shocks and to bounce back into functioning shape” is widely accepted. Resilience is therefore viewed within UK Government as the preparation for, the response to and the recovery from a wide range of emergencies. The government’s strategic security documents show that it considers many threats and hazards impact upon society’s ability to absorb disruption. These extend beyond international terrorism and have been articulated in previous iterations of the National Risk Register. There is a further dimension. In
the context of the current financial climate and fierce global competition the concept of economic resilience is increasingly important. This is to consider resilience not so much as the approach to natural disasters or malicious attacks, but in economic terms with the state of the public finances as an emergency itself. Questions over how to provide resilience against this type of emergency demand a different set of answers. Resilience can therefore be viewed as the ability of society to sustain itself. Seen in this way, there is a need to consider security and resilience in a very broad manner, and to balance risk mitigation measures with the continuation of our way of life. THE SECURITY INDUSTRY’S ROLE Against this backdrop, what is the security industry’s role in delivering national resilience? We can think of the security industry’s contribution in three main ways: • A producer of industrial capabilities which support the UK’s resilience agenda • A provider of corporate security and business continuity across the country • A significant potential contributor to the country’s economic recovery. Firstly, the security industry’s capabilities can help to mitigate the impact of major emergencies. Examples of capabilities designed to support the government and the UK’s first responders in dealing with various stages of emergencies include (but are not limited to): blast modelling; multi-agency civil command team training; the integration of operational control systems; horizon scanning and scenario planning; satellite observation for reconnaissance underpinning security actions; airborne capabilities and interoperable communications. Secondly, the security industry is in its day-to-day business an essential provider of corporate security and business continuity across the country. The National Counter Terrorism Security Office (NaTCSO) recognises the role of the private sector in providing for national resilience and provides important guidance on how companies can deal with emergencies. Similarly, the Centre for the Protection of National Infrastructure (CPNI) operates a broad range of information exchanges that bring government and industry together to discuss relevant issues, including in the sectors that A|D|S represents. Thirdly, the ability of the security industry to generate new business in overseas markets is important to the UK’s economic recovery. The Chancellor has stated his intention to reframe the economy to one that is “not overly reliant on the
success of one industry, financial services – important as they are – but where all industries grow.” With the government’s ongoing commitment to work with the security industry, it is a sector that can contribute to the rebalancing of the economy. The industry is a British success story and it has been seeking to work with all the relevant parts of the government to develop a comprehensive approach to security exports. The market is estimated to be worth around US$140-180bn annually and is growing. It offers the UK a huge opportunity to export its innovative capabilities globally and contribute to the country’s economic resilience. A NEW FOCUS ON SECURITY EXPORTS The coalition government is providing some very encouraging signs that it will seek to increase the country’s focus on security exports overseas. The industry welcomes the Minister of State for Security Rt Hon Baroness Neville-Jones’ recognition in her speech to the 2010 Farnborough International Airshow that the security industry in the UK has a huge amount to offer the world by way of innovative solutions to security problems. It also wants to work with government to realise her wish to see “a major uplift in the performance of UK security exports” (currently estimated to be worth around four per cent globally) with the government playing the sort of role it has played in the past in relation to defence exports. The security industry plays many roles in national resilience. It is a world leading supplier of national security and resilience capabilities, an important participant in corporate security and business continuity efforts and a significant potential contributor to the country’s economic recovery. The importance of security exports to delivering national security and resilience objectives and in helping the UK’s broader economic recovery should not be underestimated. The security industry has been seeking a closer partnership with the government on security and resilience issues and the coalition’s early willingness to engage with the sector is encouraging. A closer partnership between government and industry will help to deliver the nation’s resilience – in all its forms. A|D|S is the trade organisation advancing UK AeroSpace, Defence, and Security industries with Farnborough International Limited as a wholly-owned subsidiary. A|D|S also encompasses the British Aviation Group (BAG). It is formed from the merger of the Association of Police and Public Security Suppliers (APPSS), the Defence Manufacturers Association (DMA) and the Society of British Aerospace Companies (SBAC).
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
81
www.counterterrorbusiness.com
LABEL LOCK – ONE BRAND, TWO OPTIONS, TOTAL SECURITY HIGHLY SECURE, VERY effective yet simple and cheap solution.” Can this be true? Absolutely, says the manufacturer of Label Lock™. A host of features hidden in these security labels mean they cannot be replicated, but are easily monitored. This saves hours of productive time for logistics and security managers, airports, airlines, buildings and perimeter managers – and provides peace of mind for anyone who comes across them. Because the surface of each security seal changes dramatically once removed to display the word OPENED, these labels have uses for a wide range of items from CD- and DVD-cases and laptops to aircraft, doors and documents. Whereas a padlock can be picked, or more than one person may have legitimate access, these labels will tell you instantly if someone has gained entry. They can’t be replaced because each one has a unique sub-surface printed number. What’s more, there is no need to drill holes or install expensive monitoring equipment. Just Label Lock™ and leave. The website at www.labellock.com tells you the rest, and includes a helpful
“A
video of the labels in action. Distribution worldwide is handled through a network of carefully chosen distributor partners. So what are the security features? Most so-called security labels are made from a bulk supplied that usually just consists of a wallpaper void text. Such materials are widely distributed, and so easily obtained by fraudulent printers. Label Lock™ labels have a clear border, and no wallpaper void text, making it impossible to construct from bulk rolls of
UK PUBLIC SECTOR SECURITY CONSULTING K PUBLIC SECTOR offers specialist, independent security and resilience risk consultancy. We provide advice and services that enable our clients to understand and manage strategic, operational and technical risks to support the provision of strategic and operational risk and security related solutions. Our directors and specialist advisors draw upon unique experiences across counterterrorism, defence, intelligence and law enforcement sectors and apply bestpractice methodologies. UKPS’ services include: • Security review and audit for facilities, people, business operations and technologies • Security change and implementation programmes • Security command, control and coordination contingency planning • Programme and project management • Defence consulting • Security training and staff development
U
82
FOR MORE INFORMATION Tel: 07506674940 E-mail: michael.fuller@ ukpublicsector.co.uk Web: www.ukpublicsector.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
FOR MORE INFORMATION Tel: 01543 431099 Fax: 01543 431077 E-mail: sales@labellock.com Web: www.labellock.com
ELECTRONIC PRODUCT DESIGN SERVICES FROM VPN SOLUTIONS PN SOLUTIONS Ltd is a small, dynamic, electronic product design consultancy. We can fulfill all your requirements for any project from one-off, bespoke/ dedicated test equipment to mass market products. Our services include: • Bespoke electronic engineering design services in discrete analogue, high speed digital and RF systems. • Microprocessor and DSP based systems as well as re-programmable logic, such as FPGA. • Embedded software, real time systems and PC based software tools. • Printed wiring board design and development. • On-site ‘hire an
V
• Organisational resilience and business continuity • Technical tracking of high-value assets Current consultancy contracts include: strategic security advice to the Home Office Olympic Security Directorate to develop Olympic Command, Control and Communications strategy; support to the Metropolitan Police to design and implement a National Olympic Security Coordination Centre and assist with multiagency operational security planning; and lead advisory consultancy to the Civil Nuclear Constabulary to review security capabilities across UK sites.
material. Even the unique serial numbers are encoded and are sub-surface printed to ensure they can be traced but can’t be altered. So every label is unique, but available off the shelf in convenient rolls, packed into numbered dispenser boxes. This removes the need for customisation, making life easier, quicker and cheaper. Use ‘no residue’ to protect aircraft, doors, hatches and panels and windows, exits and furniture. Use ‘dual layer’ for documents, seals, plastic bags and disposables. Label Lock is a brand name, and is manufactured solely and securely by Security Labels International, experts in bespoke tamper evident labelling. For more information on a wide range of security label solutions, please see www.securitylabels.com. Covert and bespoke versions of Label Lock are also available, please contact us for more information.
engineer’ service. Even if you are still in the early stages of development, our highly trained engineers will help you develop your requirements and specifications drawing on over 18 years of experience. Our engineers are trained in Altium Designer, Protel and Pro/Engineer, as well as many simulation and modelling software packages. Call us now and find out what we can do to assist you for all your electronic design needs.
FOR MORE INFORMATION Tel: +44 (0)115 9899472 Fax: +44 (0)871 6615746 E-mail: sales@ vpnsolutions.uk.com Web: www.vpnsolutions.uk.com
OLYMPIC SECURITY
www.counterterrorbusiness.com
SECURITY LESSONS FROM AROUND THE WORLD With the Vancouver Winter Olympics now a fading memory and the long-awaited World Cup over, the British Security Industry Association’s project director for 2012, David Evans, investigates what security challenges may lie ahead for London in 2012 VEN BEFORE the FIFA World Cup began on 11 June, concerns over event security were already being voiced in the media. High crime rates in the host country, coupled with the omnipresent threat of international terrorist attacks, prompted South African security forces to release a statement of reassurance weeks before the event, during which top police commissioner Bheki Cele revealed almost £61 million worth of new security equipment including water cannons, helicopters and heavyduty emergency rescue vehicles. Despite this, security concerns remained as much in the public eye as the tournament itself. As early as five days into the competition, police were drafted in as security forces went on strike over a pay dispute, while England fan Pavlos Joseph made headlines when his invasion of the England team’s dressing room went unchallenged. However, despite the poor publicity, the planning and operation of security for the World Cup went extremely well and this was reflected in the praise for the organisation and wonderful atmosphere given by fans returning back to the UK.
E
OLYMPIC CHALLENGES The security preparations for 2010’s Winter Olympics, staged in Vancouver earlier this year, also drew close attention, not least from those in London who were all too aware that this would be the last Olympic event to take place before the summer Games reach London in two years’ time. Like the World Cup, Vancouver, too, was not without its challenges: a disturbance took place during a demonstration through central Vancouver early on in the event, where windows were smashed and arrests made. In total, it was estimated that around 15,000 security personnel were on hand throughout the event, a 3:1 ratio of security guards to athletes, with an estimated total security cost of over £600 million. With security under such close attention, it’s impossible for those of us working in the private security industry not to consider the implications for 2012, when the eyes of the world will turn to London as the Olympic and Paralympic Games take centre stage. As the leading trade association representing the UK’s private security industry, the British Security Industry Association (BSIA) has been at the forefront of security planning for London 2012. Working alongside government departments such as the Olympic Security Directorate (OSD) and Olympic Delivery
Authority (ODA), as well as the London Organising Committee for the Olympic Games (LOCOG), the BSIA has helped to identify both the opportunities and challenges that both public and private sectors will face in securing the Games. FINDING THE RESOURCES Resourcing in particular will prove challenging, as experienced by South African forces during the World Cup, where over 44,000 officers from the national South African Police Service (SAPS) were dedicated solely to the World Cup. An extra 10,000 personnel from metropolitan forces were also drafted in to boost the total force to around 54,000. Vancouver forces, too, were stretched to the limit during the Winter Olympics, with security personnel including the Vancouver Police force, United States security forces and a number of the Canadian military, all working alongside the private security industry to ensure continuous safety to athletes and visitors alike. The situation for London 2012 is likely to be similar, with Police supported heavily by the private security industry, and even the largest of private security contractors will be working with smaller companies to provide effective security. Such a partnership approach between police and industry is essential, and the BSIA is engaging early with the Association of Chief Police Officers (ACPO) to ensure that the effectiveness of this working relationship is maintained in the run-up to 2012.
TRAINING INITIATIVES Initiatives such as Bridging the Gap will also help meet security resource requirements. Bridging the Gap – a joint initiative between LOCOG, the BSIA and further education colleges – aims to train as many as 8,000 young people to Security Industry Authority standards specifically to work in security roles at the Olympics, and we at the BSIA hope that this will help to further promote the security industry as a viable long-term career choice for young people leaving further education. Indeed, companies from across the BSIA’s 17 sections of membership have expertise in securing sporting events, both large and small. Crowd management, leisure industry security, CCTV, close protection and security guarding all have their roles to play in ensuring events run smoothly and safely, and the BSIA’s work will continue over the coming years to help its members capitalise on the opportunity presented by the 2012 Olympic Games. The British Security Industry Association is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services and adhere to strict quality standards.
FOR MORE INFORMATION For more information on the BSIA and its members, visit www.bsia.co.uk For more information on the Bridging the Gap initiative, visit www.bridging-the-gap.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
83
Discover
the unexpected . . .
SRD series H.264 Digital Video Recorders from Samsung ;OL :9+ ZLYPLZ MYVT :HTZ\UN JVU[HPUZ L]LY`[OPUN [OH[ `V\ TPNO[ L_WLJ[ MYVT H KPNP[HS ]PKLV YLJVYKLY ZV ^L [OV\NO[ ^LÂťK [LSS `V\ HIV\[ ZVTL VM [OL [OPUNZ `V\ TH` UV[ IL L_WLJ[PUN -LH[\YLZ SPRL! Â&#x2039; ;OL \ZL VM :HTZ\UNÂťZ V^U OPNO SL]LS / JVTWYLZZPVU TL[OVK [V ZH]L KPZR ZWHJL ^OPSZ[ PUJYLHZPUN PTHNL X\HSP[` Â&#x2039; /+40 V\[W\[ WYV]PKPUN \W ZJHSLK PTHNLZ [V 7 Â&#x2039; -\SS` YLTV]HISL IHJR WHULS ZV OHYK KYP]LZ JHU IL Z^HWWLK HUK \WNYHKLK ^P[OV\[ OH]PUN [V \UWS\N HSS [OL JHISLZ Â&#x2039; )\PS[ PU =PY[\HS 7YVNYLZZP]L :JHU =7: ^OPJO LSPTPUH[LZ [OL WYVISLT VM IS\YYLK LKNLZ VU TV]PUN VIQLJ[Z [V WYV]PKL WPJ[\YL WLYMLJ[ Z[PSS MYHTLZ ( I\PS[ PU ^LI ZLY]LY HSSV^Z SP]L HUK WSH`IHJR ]PL^PUN VW[PVUZ ^P[O [OL HIPSP[` [V IHJR \W PUJPKLU[Z ]PH H ^LI IYV^ZLY ^OPSZ[ M\SS JVTWH[PIPSP[` ^P[O :HTZ\UNÂťZ SPJLUJL MYLL :=4 : *LU[YHSPZLK 4HUHNLTLU[ :VM[^HYL *4: WYV]PKLZ HK]HUJLK UL[^VYRPUN M\UJ[PVUHSP[` HZ WHY[ VM H JVTWSL[L PU[LNYH[LK Z`Z[LT >OH[ÂťZ TVYL HSS ZP_[LLU \UP[Z ^P[OPU [OL YHUNL ZOHYL [OL ZHTL PU[\P[P]L .YHWOPJHS <ZLY 0U[LYMHJL .<0 TLU\ Z[Y\J[\YL THRPUN ZL[ \W HUK \ZL \UL_WLJ[LKS` ZPTWSL
SRD Range
SRD-1670(D) SRD-1650(D) SRD-1630(D) SRD-1610(D) SRD-870(D) SRD-850(D) SRD-830(D) SRD-470(D)
/ / / / / / / /
; +44 (0)1932 455 308 , STEsecurity@samsung.com W www.samsungsecurity.com Samsung Techwin Europe Ltd Samsung House. 1000 Hillswood Drive. Chertsey. Surrey. KT16 0PS. UK
5V @LZ 5V @LZ 5V @LZ 5V @LZ 5V @LZ 5V @LZ 5V @LZ 5V @LZ
Recording rate
Internal HDD bays (â&#x20AC;&#x153;Dâ&#x20AC;? suffix)
DVD drive (â&#x20AC;&#x153;Dâ&#x20AC;? suffix)
Channels
Compression
Part number
Total security solutions beyond your imagination.
*0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ *0- $ PWZ
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
PERIMETER SURVEILLANCE SOLUTIONS FROM SAMSUNG Samsung’s latest thermal imaging cameras and SPU series of speed domes offer the perfect solution for protecting perimeters of all sizes zoom optical camera modules, including versions with automatic-tracking and Wide Dynamic Range. Standard features include up to 500 degrees per second pan/ tilt speed, highlight compensation (HLC), digital image stabilisation (DIS), privacy masking, integrated IR cut-filter and a multitude of tour and preset options.
ECENT ADVANCES in CCTV technology has ensured that there are cameras available which can deliver high quality images to detect any unwelcome activity whatever the prevailing lighting conditions – be it dazzling sunlight or virtual total darkness. The advanced features built into the latest generation of cameras, such as wide dynamic range, highlight compensation and SSNRIII (Samsung Super Noise Reduction technology), has equipped cameras to deal with even the most demanding lighting conditions. There are, however, situations when even the most feature rich CCTV cameras will be unable to capture what might be vital images of an emerging incident, e.g. foggy conditions.
R
THERMAL IMAGING CAMERAS Unlike traditional CCTV cameras that rely on light to see images, thermal cameras pick up heat signatures of subjects and objects, so are unaffected by extreme conditions such as complete darkness, harsh weather, bright lights, fog and smoke. This makes them suitable for use in a wide range of high security applications as they are extremely effective at achieving their detection ranges both during the day and at night without the requirement of white or IR lighting. There was a time when thermal imaging cameras had to be used sparingly as they were too expensive to use in large numbers and yet they can be an
extremely valuable surveillance tool. Fortunately, advances in technology have resulted in competitively priced thermal imaging cameras becoming available. Samsung has recently added two new thermal imaging cameras to its security products portfolio. The SCB-9050, which has a detection range of 360 metres and the SCB-9051 which has a detection range of 1,260 metres, deliver enhanced detection capability to a host of security, industrial and safety applications such as perimeter protection, as well as checking for hot-spots and monitoring levels of liquids in containers. Both cameras give operators the choice of displaying ‘white hot’, ‘black hot’ or ‘colour scale’ along with the ability to display an on-screen temperature range gauge, which automatically scales from the coolest part of the image to the hottest. Weighing a mere 2kg including their integrated housing that is tested to IP66, the SCB-9050 and SCB-9051 are light enough to be installed in a wide range of locations and with OSD (On-Screen Menu) they can be easily configured for contrast, brightness and sharpness. See a demonstration of the thermal camera in action by searching ‘Samsung Thermal Camera Sees Through Smoke’ on YouTube.
AN INSTALLERS FRIEND “The SPU range can truly be regarded as an installer’s friend,” said Peter Ainsworth, European Product Manager for Samsung’s professional security division. “From listening to customer feedback we have integrated the camera module into the housing so it can be used straight from the box and included is a unique easy to wire back-box with a flip-down panel to provide access to the video connection, power and alarm blocks. Combine this with a multitude of bracket options including wall, pendant and parapet mount, as well as coaxial control compatibility, and what you have is an impressive range of speed domes which can save both installation time and cabling infrastructure costs whilst offering a best-fit solution for the job at hand.” All models in the SPU range come preinstalled inside a tough IP66 weatherproof housing, which simply twist-locks into the supplied easy to wire back-box, making installation extremely simple. SUPPORT Available from all Samsung distributors, the SCB-9050 and SCB-9051 Thermal Imaging cameras and the SPU range are offered with full support services from Samsung Techwin Europe Ltd, including free system design, free technical support and a full three-year warranty.
FOR MORE INFORMATION If you would like to receive full information on Samsung’s perimeter surveillance solutions please e-mail STEsecurity@samsung.com, telephone +44 (0)1932 45 5308 or visit www.samsungsecurity.com
SAMSUNG SPEED DOMES Designed to offer powerful functionality as well as ease of installation, the SPU range provides customers with a choice of highly featured 27x, 33x, and 37x
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
87
ADVERTISEMENT FEATURE
www.counterterrorbusiness.com
VIDEO SECURITY SHRUGS OFF ITS BIG BROTHER IMAGE Forget the ‘Big Brother’ image – facilities managers, plant operators and public servants across the world are coming to realise that video surveillance is an effective deterrent and an essential safety technology NDUSTRIES and applications as diverse as power utilities, water plant, rail, traffic control, shipping, commercial buildings and facilities, and industrial plant are all turning to video surveillance technologies as a means of assuring the safety of employees and customers in dangerous areas, as well as securing assets against intentional or accidental damage. In addition, in our increasingly litigious society, effective surveillance and recording can provide a means of defence against frivolous claims.
I
DIVERSE NEEDS Meeting these diverse needs places stringent requirements on surveillance technology, and this has evolved rapidly in recent years, delivering a new paradigm for live monitoring and live analysis. Computer based systems of today are able to use software models to make a judgement on what is normal behaviour and what is anti-social behaviour, or to provide early warnings as potential hazards become evident. They can even monitor patterns of travel/movement and derive improved systems/schedules for handling peak traffic. Indeed, software analytics are one of the fastest growing applications for increasingly capable CCTV-based surveillance systems. Where this all starts is with a move away from the traditional analogue technologies that have historically characterised surveillance installations, and towards digital camera and network topologies. The traditional picture of video surveillance is built around analogue cameras, feeding their video over coax cables to a multiplexer, which in turn feeds a combination of monitor screens and video recorders. But as David Moss, European sales and marketing manager at GarrettCom Europe points out, there are severe limitations of this technology: “There are weaknesses at all levels of the system. There is no flexibility within the installation to meet evolving requirements and with the exception of the very best analogue cameras, the picture quality is generally not good enough to meet today’s requirements for, say, face or number plate recognition. To monitor the video in real-time, you have to be within reach of the coax feed, which in practical terms means that you need to be on-site sat in front of a screen. The limitations of the video recording technology mean that any analysis of the data has to be historical analysis – there is no possibility for real-time software analysis.”
Once a video surveillance system is part of an IP-network, the requirement for on-site monitoring is eliminated, a video feed can be monitored in real-time over the internet, potentially from anywhere in the world. LOW COST, LOW RISK The attraction of IP-networks as the standard for video surveillance is a function of its massive, established installed base, and the fact that the technology is standardised, low cost and low risk. It is reliable, well understood and well supported. But video traffic is high speed and high bandwidth, and it makes stringent requirements of the IP infrastructure devices that must handle it. The IP switches, for example, that provide connectivity to the cameras and route the data onto the Ethernet network must combine simple connectivity with the ability to handle demanding video traffic. GarrettCom Europe has responded to the evolving needs of video surveillance for IP-based technologies with new ranges of Ethernet switches which form the critical infrastructure for a modern, high-bandwidth camera network. The latest Ethernet switches provide connectivity for clusters of surveillance cameras and indeed associated security devices – VoIP telephones, Ethernetenabled sensors, access control devices, etc – and combine this with fibre-optic connectivity to the control network for high-bandwidth transmission of video data. Managed switches from GarrettCom also offer the benefits of IGMP (Internet Group Management Protocol) software as standard. This is key, with modern high
definition cameras transmitting data at rates as high as 5Mbps. This multicast traffic has to be effectively managed, to prevent unnecessary traffic flooding the various communications interfaces and bogging down the entire network. The IGMP protocol provides a means to manage this traffic. RELIABILITY Compact, reliable, rugged, hardened for use in demanding plant environments and outdoor use, and with MTBFs in excess of 20 years, GarrettCom Europe’s Ethernet switches for video security and surveillance applications meet all the requirements of the modern surveillance installations. “They offer flexible combinations of copper and fibre Ethernet ports, with appropriate port counts for typical clusters of IP-enabled security products, allowing networks to be developed highly cost-effectively,” says Moss. “And for ease of installation of surveillance systems, many GarrettCom Europe Ethernet switches now provide Power over Ethernet (PoE) as standard, supplying power to connected devices over the standard data cables, and so eliminating the need for costly cabling back to a central power source.” GarrettCom will be exhibiting in Hall 9, Stand 152 at Security Essen, Germany between the 5 and 8 October 2010, please feel free to visit our stand and discuss any requirements.
FOR MORE INFORMATION For more information on GarrettCom Europe’s solutions for the security and surveillance, defence and counter terror industries, please visit: www.garrettcom.co.uk/solutions
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
89
ADVERTISERS INDEX
www.counterterrorbusiness.com
Tough Job? We’ve got the tools! 3 Rugged Equipment Cases 3 Embedded Computers 3 Communications Analysers 3 Hand-held LCD microscopes 3 Device Programmers 3 Portable USB Multifunction Instruments
We are certain to have something to meet your exacting requirements. Now take a look at our interesting range of electronic development tools and equipment. www.TheDebugStore.com Tel: 01490 430526 Email: sales@TheDebugStore.com
Embedded Development Tools
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service Acorn Precision Machining
36
Evolution (E.S.S)
AEA Group
52
Excelerate Technology
AMC
62
Eyevis
80
Assembled Electronics Solutions
68
Fra Angelico
72
Security Lables
Baggage Identification
40
Frontier Pitts
76
Selectamark
Biometrics 2010
30
G6 – Global Communications
58
SMi
Blazepoint
32
Garrett Comm Europe
88
Southwest Microwave
38
BSI Product Services
52
Gematech
48
SystemWare Europe
33
BSIA
36
Global Security
28
Tactical 5
40
Goliath Footware
50
TDSI
72
GPS Perimeter
64
The Debug Store
90
BT Security Cadcorp
8
OBC, 60
Samsung
86
SDSL
57
Sea & Sea
50 IFC, 82 34 16, 18
Carousel Internet
47
i2 Group
70
Transport Security Expo
42
CBC Europe
76
Innovative Concepts International
22
Txt Tools
54
Clearview Communications
50
Innovatrics
Combating Piracy Week
4
UK Public Sector
72
Interface Force Measurements
28, 31 74
Visimetrics
13
Counter Terror Expo
12
Linear Technology
14
VPN Solutions
82
Counter Terrorism Conference
26
Maritime Asset Security Training
66
Wagtail
44
Ward Security
46
Dewetron
90
IBC
10
Mascot AS
62
Do Systems
24
M-Tek Assembly
84
Egdar Brothers
52
NonVerba
11
Emergency Services Show
56
Oncam
78
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
6
) (75GD;FK (A>GF;A@E
@ F:7E7 FAG9: F;?7E I7 D75A9@;E7 F:7 @776 FA 5GF 5AEFE 4GF =@AI F:3F BDAF75F;@9 5A??G@;F;7E 3@6 D76G5;@9 F:7 873D A8 5D;?7 :3E @7H7D 477@ ?AD7 ;?BADF3@F
+498E 6B@@HA<G<8F 4A7 FJ<9G8E =HFG<68
BE @BE8 <A9BE@4G<BA 8@4<?
4FE75GD;FKEA>GF;A@EZ4F 5A? BE I<F<G III 4FE75GD;FKEA>GF;A@E 5A?
-F<A: G;8 I8EL ?4G8FG G86;AB?B:L J8 64A ;8?C LBH 6BAFB?<74G8 LBHE FLFG8@F 4A7 4??BJ LBHE C4EGA8EF 84F<8E 94FG8E 4668FF GB ,. <@4:8F 78?<I8E<A: 5BG; 6BFG F4I<A:F 4A7 DH<6>8E =HFG<68 +B 9BE 4 F498E E<G4<A ?8G HF 5E<A: <G 4?? GB:8G;8E