www.counterterrorbusiness.com | ISSUE 5
NATO Adapting to meet the evolving terrorism threat
BUSINESS CONTINUITY | CYBER CRIME | AVIATION | PERIMETER SECURITY
COMMENT
www.counterterrorbusiness.com
www.counterterrorbusiness.com | ISSUE 5
NATO Adapting to meet the evolving terrorism threat
BUSINESS CONTINUITY | CYBER CRIME | AVIATION | PERIMETER SECURITY
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 EDITOR Sofie Lidefjard ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION ASSISTANT Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone SALES EXECUTIVES Rachael McGahern, Andrea Griffiths, Chris Jones SALES ADMINISTRATION Jackie Carnochan ADMINISTRATION Victoria Leftwich PUBLISHER Sally Brockman GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
EFFECTIVE DEFENCE New research by the Chartered Management Institute suggests that nearly a third of UK organisations (32 per cent) have come under a cyber attack of some sort in the past 12 months. Yet despite 82 per cent of those surveyed saying that their bosses view business continuity management as important or very important, just 58 per cent say they have plans in place to cater for unexpected disruptions. The UK Government is committed to tackling cyber crime, investing an extra £500m to bolster cyber security, and it should be part of every organisation’s business strategy, says CyberCrime Security Forum on page 11. From a business continuity point of view, we have an article by the Business Continuity Institute looking at terrorism as a threat, both directly in its potential to interrupt operational activities and indirectly through the changes in business resilience methods needed to prevent it or at least mitigate its impact. Read more on page 101. Counter Terror Expo brings together the world’s foremost experts from government, armed forces, security services, law enforcement, and academia annually in order to share real-life experience, debate strategies, brainstorm issues, shape policy, and define effective counter terrorism measures. We have a preview of the event, along with the conference programme and floorplan, starting from page 41. Enjoy the issue.
Sofie Lidefjard, Editor editorial@psigroupltd.co.uk
MEMBER OF THE PERIODICAL PUBLISHERS ASSOCIATION
© 2011 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
MAGAZINE SUBSCRIPTION I would like to receive a copy of Counter Terror Business magazine for 1 year (4 issues) £35 I would like to receive Counter Terror Business magazine digitally Name
Position
Company Address Postcode Phone
Fax
E-mail Signature
Date
PLEASE SIGN AND FAX BACK TO 020 8532 0066 THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
03
CAMBION® - THE STORY SO FAR
The Cambridge Thermionic Corporation was founded in the 1930’s in Cambridge, Massachusetts USA. The name Cambion® being derived from the first four and last three letters of that name. The company quickly established a reputation in the USA as a quality supplier of small electro-mechanical and electronic components for the military and professional electronics markets. In 1961 a parallel manufacturing facility was established in Castleton, Derbyshire, England to service an ever-expanding global market. During the 1980’s ownership changes gave rise to various name iterations such as Midland Ross, IPI Limited & Hollingsworth. In 1991 the Singaporean multi national Wearnes Corporation acquired the organisation to support its objectives for a greater Global presence. Today Wearnes Cambion Limited is a fully autonomous operation within its 40,000 square feet of manufacturing and office space.
CAMBION® - WORLD-CLASS MANUFACTURING
As the history shows Wearnes Cambion has a long and established pedigree for high performance electro-mechanical and inductive components. Wearnes Cambion is well placed in their vision to be the preferred partner in the Electronics industry offering a high level of innovation, services and support. Wearnes Cambion has a high growing customer portfolio in world class industries serving professional, automotive, military, aerospace and industrial markets. Continual investment, especially in the latest machinery and automation, has resulted in substantial manufacturing and assembly capabilities to cover a broad and comprehensive range of disciplines and technologies. Wearnes Cambion’s machining competency has the capacity to manufacture over 10 million precision components each week. Moulding capabilities of transfer moulding, injection and complex insert moulded assemblies combined with high speed stamping equipment offers solutions for most applications. Wearnes Cambion brings together extensive experience and knowledge to offer a full design and prototype service. Our Engineers are able to provide a solution to a customer’s individual requirements where standard components may not be suitable. Wearnes Cambion works closely with its associated worldwide group facilities in supporting the Electronics market with an array of services and products, ranging from precision electronic components and assemblies, PCBA, Die Casting, to full turnkey box build devices. All facilities have ISO9001 as a minimum; with most accredited ISO14001, OHSAS18001 and TS16969. In addition Cambion has been awarded several service and system distinctions from its blue chip customer base.
CAMBION® - PRODUCT PORTFOLIO
Wearnes Cambion has an extensive product catalogue containing industry recognised generic products: • • • •
Wearnes Cambion Ltd Mill Lane, Castleton, Derbyshire, S33 8WR Tel: 01433 621 555 Fax: 01433 621290 E-mail: sales@cambion.com Web: www.cambion.com Cage Code: K3105
Miniature Single Pole Sockets PCB Connector Pin Interconnects Solder Terminals Inductive Products and coils and many more.
Wearnes Cambion also manufactures hybrids of these standard products to suit customer specific applications. Wearnes Cambion can also offer RF Connectors, utilising its turning competency and specialising in the manufacture of custom variants of industry standards, such as N types, 7/16, SMA. SMB, MCX and many more incorporating blind mates and quick termination, all with minimal outlay. Furthermore Wearnes Cambion has project managed and developed inductive and connective solutions specific to customer programs, working closely with the customer from the early stage of concept designs.
FOR FURTHER DETAILS VISIT WWW.CAMBION.COM, EMAIL SALES@CAMBION.COM OR CALL 01433621555.
CONTENTS
www.counterterrorbusiness.com
07
91
The latest security technology news
We look at the various barriers you can put in place to prevent an intruder from entering the perimeter of a site or building
COUNTER TERROR BUSINESS NEWS
11
CYBER CRIME
Daniel Mitchell from the CyberCrime Security Forum offers practical guidance on how industry can be prepared and protected
19
INFORMATION SECURITY Infosecurity Europe is where information security professionals address the challenges of today whilst preparing for those of tomorrow
29
COUNTER TERRORISM
Chris Phillips, head of the National Counter Terrorism Security Office, looks at the terrorist threat and how businesses have to keep pace with an evolving threat NATO’s Counter Terrorism section explains the numerous measures the organisation has taken to enhance its structures and capabilities to better respond to terrorism Counter Terror Expo brings together the world’s foremost experts to debate strategies, shape policy and define effective counter terrorism measures
PERIMETER SECURITY
101
BUSINESS CONTINUITY The Business Continuity Institute writes about planning for potential terrorist attacks and business continuity following an incident
107 CBRN-E
With attacks involving chemical, biological, radiation, nuclear and explosive materials on the rise, the CBRN-E Asia Pacific event came at the right time
109
AVIATION
Chris Yates scrutinises flaws in the security of the aviation system The British Security Industry Association reminds us of the steps that should be taken to ensure airports are effectively protected
125
EMERGENCY COMMUNICATIONS
Baroness Neville-Jones, Minister of State for Security and Counter-Terrorism, explains the UK Government’s strategies on counter terrorism powers and measures
BAPCO is the annual event for all professionals in major incident public safety communications and information management
Hugo Rosemont, security policy adviser to A|D|S, discusses recent counter terrorism initiatives by the UK Government and EU
129
88
SPOTLIGHT FOCUS ON IP SECURITY
POLICE & LAW
The private security industry can do much to help police forces when it comes to protecting national and regional infrastructure in times of natural disaster or terrorist threat
135
EVENT SECURITY
The British Security Industry Association explores challenges to event security and how to overcome them
143
DEFENCE & EQUIPMENT
An insight into DSEi 2011, the leading event for defence and security equipment
147
SECURITY
IFSEC is the world’s leading global annual security event
155
FIRE SAFETY
International Firex provides an opportunity to see and compare a wide range of fire safety products and solutions
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
05
www.counterterrorbusiness.com
COUNTER TERROR BUSINESS NEWS
ONLINE CRIME TRACKING SCHEME LAUNCHED IN THE WEST COUNTRY AVON AND SOMERSET Constabulary has set up a new interactive service, TrackMyCrime, which allows people to follow progress from the police about the offences they have reported. The idea is that the system can give citizens access to information extracted from its back end systems. This will slash the time the public spends waiting for police officers to call them back about their enquiries, as they will automatically
be updated by e-mail or text. Victims of crime are also able to electronically communicate with the officers investigating their reported incidents, as well as view information, e.g. about their stolen or damaged property. Rob Beckley, deputy chief constable at the force, added that in his view, the site “combines policing with modern technology and gives victims more choice about how they want to receive information from us”.
NEW MARITIME INCIDENT RESPONSE SYSTEM FLAGSHIP, THE PAN-EUROPEAN maritime transport project part funded by the EU, has developed an integrated, ship to shore system, for the control and monitoring of passenger safety functions on board ship utilising both fixed and mobile assets. Called FLAGSHIP-ISEMS (Integrated Safety and Emergency Management System), the system enhances onboard ability to handle emergencies while also making full use of real-time communication between the ship and onshore facilities. Both parties
have a full overview of the actual situation and can exchange requests, advice and instructions in real time. This enables effective assistance from on shore teams in an emergency situation as well as making drills and training much more effective. The FLAGSHIP-ISEMS software evaluates how available information can be best utilised in a cooperative decision support regime between the ship and its shore based organisation on one side and other interested parties, such as port and coastal authorities.
NEWS INBRIEF Fire service prepares for potential terror attacks Emergency services have taken part in simulated terror attacks at Tyne and Wear Fire Service headquarters. Rescue teams from across the UK took part in the simulations, which included a device hidden in a workshop, two car bombs and a suicide bomber on a Metro train. Services say that over the past few years the threat of major terrorist attacks has become increasingly likely. Emergency services worked 10 hour shifts on Friday and Saturday dealing with the five scenarios. Forces from Tyne and Wear, West Yorkshire, Hereford, Worcester, Lincolnshire, Merseyside and Hampshire were involved.
Boat helps fight terrorism in New York A new high tech speed boat is the latest tool in the fight against terror for the New York Police Department. The 72 feet long boat will help handle security in the city’s harbour. Police commissioner Ray Kelly said it is designed to help speed as many as 30 heavily armed NYPD officers to any crisis. The boat will be used to help secure ferries and landmarks like Liberty Island and Ellis Island. It is equipped with secure compartments so officers can respond to a chemical or biological attack.
PUBLIC SECTOR DISASTER RECOVERY STRATEGIES UNDER-FUNDED OVER HALF OF THE UK’S PUBLIC SECTOR organisations do not make disaster recovery a “sufficient priority,” according to a survey from Acronis/Ponemon Institute. Over half (56 per cent) of the 380 public sector respondents believed the main reason for this was because of a lack of both budget and ICT resources. Nearly
half of respondents (45 per cent) said their organisation spent less than five per cent of the ICT budget on disaster recovery, half of the UK national average. In addition, the results revealed 69 per cent of organisations responding to the survey claimed they didn’t know if virtual servers were backed up as often as physical servers.
Partnership to develop cyber security The University of Wales has signed an agreement with the Geospatial Data Centre (GDC) of the Massachusetts Institute of Technology (MIT) Engineering System Division to work together to develop solutions for cyber security research and education. Professor Marc Clement, vice chancellor of the University of Wales, said: “We hope to advance relations between MIT and the University of Wales as we now plan to develop a joint training programme for taking forward educational developments in the field of cyber-physical security.”
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
07
DELIVERING YOUR COMPLETE ELECTRONICS MANUFACTURING SERVICES n PCB Manufacture (UK facility/Overseas) n Flex, Flex Rigid & Aluminium Clad Technologies n Single Sided through to 40 Layer Multilayer n Fast prototype service n Electronic Conceptual Design n PCB Layout Design n PCB Assembly, SMT, PTH & BGA n Full Box Build & Test Solutions n Over 30 years of Electronic Manufacturing Experience
IPC-A-610D class 3
Tel: 01782 562255 Fax 01782 565 684 Email: info@hallmarkelectronics.com Web: www.hallmarkelectronics.com Loomer Road, Chesterton, Newcastle-under-Lyme, Staffordshire, ST5 7LA
COUNTER TERROR BUSINESS NEWS
www.counterterrorbusiness.com
INTERPOL CONGRESS ENHANCES COOPERATION IN MARCH, Interpol’s first I-24/7 police communications system Counter-Terrorism Capacity-Building Programme focused on enhancing the organisation’s tools and services for counter terrorism investigators and Interpol National Central Bureaus (NCBs). The six-day meeting, held in Malaysia in March, aimed to enhance the relationships between counter-terrorism experts and NCBs on a regional basis by providing training and promoting international counter terrorism best practice. It identifed key counter terrorism issues and concerns across the Asian region and introduced tools to facilitate the sharing of analytical products.
The congress fostered closer cooperation between member countries in Asia and encouraged the sharing of transnational tactical information. Also on the agenda was education in the use of Interpol’s I-24/7 secure police communications network, its global databases, tools and other services available to NCBs and counter terrorism investigators. This was designed to increase the quality, quantity and usage of Interpol’s databases and services to increase intelligence, enhance international police cooperation and combat international terrorism through the Fusion Task Force network.
CCTV AND ANPR CODE OF PRACTICE UNDER SCRUTINY A 12-WEEK CONSULTATION on a new code of practice governing the use of CCTV and Automatic Number Plate Recognition (ANPR) systems got underway in the UK at the beginning of March. The consultation is the first step towards establishing a formal code of practice as promised in the government’s Protection of Freedoms Bill. Members of the public and operators of CCTV and ANPR systems can now have their say on a range of proposals to make the use of the technology more proportionate and effective. The proposals include establishing a
checklist of actions to be carried out by CCTV operators before installing new cameras to check whether they are absolutely necessary; developing industry standards for equipment to ensure it is reliable, effective and gathers images that are of sufficient quality and in a usable format; improving public knowledge about systems in communities through consultation by police and local authorities and better public information; and considering whether further guidance is needed on how long data collected by CCTV and ANPR should be retained.
NEWS INBRIEF More effective terrorist alert system for US The US Department of Homeland Security (DHS) has said a new system will replace its eight-year-old colour-coded alert scheme. The National Terrorism Advisory System (NTAS) will more effectively communicate information about terrorist threats by providing timely, detailed information to the public, government agencies, first responders, airports and other transportation hubs, and the private sector. DHS will coordinate with other federal entities to issue formal, detailed alerts when the federal government receives information about a specific or credible terrorist threat. These alerts will include a clear statement that there is an imminent or elevated threat. The alerts also summarise the potential threat, provide information about actions being taken to ensure public safety, and recommend steps that individuals and communities, businesses and governments can take. The NTAS alerts will be based on the nature of the threat: in some cases, alerts will be sent directly to law enforcement or affected areas of the private sector, while in others, alerts will be issued more broadly to the American people through both official and media channels – including a designated DHS webpage (www.dhs.gov/alerts), as well as social media channels including Facebook and via Twitter @NTASAlerts
Holograms help manage airport queues
NATO PROJECT TO BOOST COOPERATION CANADA, FRANCE, GERMANY, Italy, the Netherlands, Norway, Spain, the UK and the USA have launched a five-year project that will “significantly boost” NATO’s ability to tackle new challenges, such as piracy, by rapidly sharing imagery and other information from intelligence, surveillance and reconnaissance assets. Under the agreement, technology that is currently being successfully used in Afghanistan
will be further developed and applied more widely. Nations will be able to easily and quickly share imagery from high-priced assets, such as unmanned aerial vehicles, surveillance aircraft and other such assets, whenever necessary. The project will also look to sharing and leveraging military assets – such as UAV imagery – in support of civilian authorities in crisis management and other roles, such as border monitoring.
Manchester Airport has become the first airport in the world to introduce holograms as part of its passenger security preparation. The trial aims to reduce security queues at the UK’s largest regional airport – life-size cutouts of people greet passengers before they enter the security search area, explain the liquid restrictions and remind them of the need to have their boarding cards ready. The technology has been developed in conjunction with Musion, and uses a composite material and high-definition video projection. Musion founder James Rock says the technology can be employed in many ways, but is “perfectly suited for an airport environment where the support of recorded messages can help with passenger information”.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
09
CYBER CRIME
www.counterterrorbusiness.com
DATA ENCRYPTION IN A MOBILE WORLD
to highest, they are: protect, restricted, confidential, secret and top secret. It stands to reason that it is the level of sensitivity that is being stored on the device that will determine what standards they would need to have or what kite marks are in place to ensure the level of protection. Device: Considering where sensitive data resides will help determine the type of product you need and the standard it should have. If you’re looking to protect mobile devices a central management policy would be advisable. Cost: A number of factors will influence just how much you spend on protecting the data. There is the argument that you can’t put a price on security but it has to make commercial sense. There’s no point having a top of the range encryption solution if the data its protecting is the lunch time sandwich order. By the same token a minimal encryption solution would not be deemed adequate by the Information Commissioner’s Office should the device contain personal health records transported by a GP. The solution should be appropriate for the data it is protecting.
Encrypting mobile devices can be a minefield and with over a third of the worldwide workforce set to become mobile workers by 2013, it will continue to challenge IT departments
HILE COMPLIANCE is seen as the top driver, the key areas where attention should be placed when it comes to encrypting data are all related to mobility. This is a fair indicator of how challenging the nature of the increasingly mobile workforce can be when it comes to complying with regulations. The top three ideal-world targets for encrypting everything are, in order: • Data stored on Notebooks used by mobile workers • Data stored on Smartphones and other portable/handheld devices • Data stored on Desktops/Notebooks used in home locations It’s no coincidence that all three are distributed/mobile working related. MOVING TOWARDS A MOBILE ENVIRONMENT The executive who found himself personally responsible for a data breach when his laptop was stolen from his house may have been taken by surprise, as there is a lingering mindset that security is a central infrastructure thing. As we know this is not the way IT works and the rules on data security are completely different when we move into a mobile environment. There are all sorts of employer/employee
W
10
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
issues that arise in this situation, but supplying staff with a self-encrypting laptop drive can solve the problem. So just what should organisations examine when drawing up a shortlist of solutions? Below are five key factors to consider when evaluating security solutions. Accreditation: FIPS, CESG and CAPS have a place, but should not be considered the be all and end all to product selection. While a useful tool in assessing the security of encryption products, it is not a guarantee that a product is secure, the onus is on the end user to understand what they’re using. What they do provide is a benchmark for comparing and contrasting products against another solution that meets these criteria but, without the certification, can still be included in the evaluation if you want to make sure you are looking at all the options. Cryptography: the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the US Government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256. It will depend on the sensitivity of the data whether you need 256 or if 128 would be adequate. Data: The United Kingdom currently uses five levels of classification – from lowest
ENIGMA SED FROM ORIGIN The Enigma SED (selfencrypted drive) from Origin Storage is the first solution to provide companies of all sizes with a quick and cost effective way to secure laptops using the highest levels of hardware AES 256-bit encryption. The kits, which will launch at Infosecurity Europe this month and start at just £228 for a 250GB version, include a USB/SATA data transfer cable and Acronis drive cloning software. But the real key to the Enigma kits is the Winmagic encryption/ decryption software that works with the SATA drive at the BIOS interface level and allows the data to be written or read in encrypted format on-the-fly. QUICK AND SIMPLE SOLUTION “Rather than supply the bare drive, the Enigma SEDs (self-encrypting drives) Origin supplies comes with all the cables and software needed to allow laptop users to move their data from the old drive to a new one, and install it very quick and simple. “We said at the time of the launch that we thought the kits were a unique solution in the industry and that continues to be the case. The kits are an ideal solution to the problem of unencrypted data on business laptops,” said Andrew Cordial.
FOR MORE INFORMATION Tel: +44 (0)1256 813988 E-mail: andyc@originstorage.com Web: www.enigmased.com
www.counterterrorbusiness.com
CYBER CRIME
IGNORANCE ISN’T BLISS Secure your digital future against cyber terrorism, says Daniel Mitchell, CyberCrime Security Forum 2011
Investing in the right expertise and implementing robust IT security procedures will not only secure your business, but enable you to operate efficiently
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
11
SELF-INFLATING, WATER FILLED STRUCTURES FOR PERSONNEL AND EQUIPMENT PROTECTION Waterwell Waterwell - a groundbreaking concept developed by Cintec International - comprises a range of self-inflating, water-filled structures which are capable of providing a high level of protection to people and property against a range of terrorist devices including those containing chemical, biological and radiological agents. Manufactured from poly-vinyl-chloride (PVC) coated fabric, Waterwell structures are internally reinforced using a specialist stitching technique to enable them to maintain their shape and stability. Before use, the structures are partially inflated with air in order to assist with handling and positioning, they are then filled with water which displaces the air through a pressure relief valve. The time taken to fill each unit varies depending on its size and pressure of the water supply but typically takes 10 minutes or less. The water can then be emptied out and the unit stored for future use.
Cargo Isolator
Product Range Waterwell products of varying shapes and sizes have been designed to contain and isolate devices ranging in size from a shoe to a car bomb. These include the Mini Hex Bin, Maxi Hex Bin, Blast Bin and Ram Bag. The structural stability of the Waterwell design has also enabled Cintec International to produce a unit large enough to enclose a vehicle of up to 7 tonnes, as well as a range of blast panels that can be linked together and rapidly deployed to lessen the impact of explosions for checkpoint security and vehicle search purposes. The Future It may be the case that, in the future, homeland security professionals may deploy protective Waterwell systems in much the same way as security cameras, fire extinguishers and sprinkler systems, with isolation bins being placed on stand-by in buildings, passenger aircraft, trains and ships.
Type 1 passed a PAS 68:2007 1,500kg test
“A-frame� Isolator
Type 2 passed a PAS 68:2007 3,500kg test
Suspitious Object Isolator Cintec International Cintec House, 11 Gold Tops, Newport, NP20 4PH Tel: +44(0)1633 246614 Fax: +44 (0)1633 246110 E-mail: hqcintec@cintec.co.uk Web: www.cintec.net
CYBER CRIME
www.counterterrorbusiness.com
HILST THE ISSUE OF CYBER crime may be high up government, industry and the media’s agenda, research has revealed that an alarming 60 per cent of the UK’s public and private sector are not prepared to deal with this increasing threat. Cyber crime is a major danger to national and international security and the government has ranked it one of the four top risks to national security. Yet there is growing confusion and lack of understanding about how industry can protect themselves, their business and their employees in this highly dangerous and invisible warfare.
W
DEPENDENCE ON CYBER SPACE A third of the world’s population now uses the internet and it is key to global commerce, communications and entertainment. But as the world’s dependence on cyber space increases, so have the opportunities for criminals to take advantage of lapses in cyber security. Although the exact financial cost of cyber crime is difficult to estimate, what is known is that the problem is getting progressively worse. • Criminal groups have already registered over 9,500 Olympic Games-related web addresses. • There was a 14 per cent increase in online banking losses between 2008 and 2009, • 51 per cent of malicious software threats that have ever been identified were so in 2009. Evidence suggests that hundreds of malicious e-mails are being aimed at government computer networks each month and there are concerns that terrorist groups can now hack into critical infrastructure such as air traffic control networks. INCREASED CYBER SECURITY Attacks on computer networks are among the biggest emerging threats to UK safety and economic prosperity, causing the government to invest an extra £500m to bolster cyber security through its National Cyber Security programme. The aim of the four-year programme is to close the gap between the needs of a modern digital age and the rapidly growing risks associated with cyber space, including the internet, wider telecommunications networks and computer systems. The National Cyber Security Programme will work to one national programme of activity, with supporting strategies in other government departments. Through the programme, the government plans to address several issues: Overhaul the UK’s approach to tackling cyber crime. This will include the creation of a single point of contact that will enable the public and businesses to report cyber crime, as well as a new
ABOUT THE AUTHOR Daniel is a founder and director of Lifeline IT, a network support company, which is presenting this year’s CyberCrime Security Forum 2011 – the first of its kind in the UK. He has a specialist interest in advising public and private sector clients on global cyber security issues, IT and data security and management of corporate networks. He is an advisor to the London Metropolitan University, where he is working in partnership with the organisation on a new security defence product. Daniel also specialises in advising small businesses and he has been a guest speaker on cyber security and data protection at global finance conferences. He is a media commentator on issues ranging from IT security and business development, through to technology in education and financial outsourcing. Lifeline IT develops and manages IT infrastructure for companies across sectors including retail, finance and property. programme of skill development to increase knowledge and understanding. Address deficiencies in the UK’s ability to detect and defend itself against cyber attacks – whether from terrorists, states or other hostile individuals. This will include improving the nation’s ability to deliver cyber products and services and enhancing investment on national intelligence capabilities. Create a new organisation – the UK Defence Cyber Operations Group – to mainstream cyber security throughout the Ministry of Defence and ensure coherent integration of cyber activities across defence operations. Tackle shortcomings in the critical cyber infrastructure, upon which the UK depends. This will focus on ensuring online public services are secure and that extra support is given to UK industries and those critical networks operated by private companies (such as the energy sector). Sponsor long-term cyber security research,
Daniel Mitchell
and private sector, will this commitment to cyber security still stand? Deputy Prime Minister Nick Clegg is resolute in confirming the government’s on-going financial support in the battle against cyber warfare. Responding recently to a question on cyber security investment, the deputy PM said: “We’re taking this very seriously indeed. It’s something we, as a government, have identified very early on and we will take extra action and put in new resources. It’s the new frontier in terms of safeguarding the commercial safety and security of this country.” IMPROVED ADVICE Although the government is fully committed to tackling cyber crime and has allocated substantial resources to this problem, within both the public and private sector there is a lack of credible advice on how to safeguard against identity theft, hacking and cyber warfare. The government itself has said that
Cyber crime is a major danger to national and international security and the government has ranked it one of the four top risks to national security working closely with research councils, the private sector and other organisations. Introduce a new programme of cyber security education and skills to encourage a more preventative approach to cyber security. One of the main focuses of this will be awareness raising amongst the public, to encourage safe and secure on-line behaviour. Continue to build cyber security alliances on a global level, including strong relationships with the US and other like-minded nations. However, with planned government spending cuts set to hit both the public
a crucial element of its National Cyber Security programme will be the role of the private sector working in partnership with government to deliver an effective and economically viable response to cyber crime. But what exactly is being done to help business and commerce protect themselves against the threat of a cyber attack? ADDRESSING THE ISSUE One initiative helping to address this is the CyberCrime Security Forum 2011 (www.cybercrimeuk.com), which will offer practical advice from the world’s leading
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
13
CYBER CRIME
www.counterterrorbusiness.com
Attacks on computer networks are among the biggest emerging threats to UK safety and economic prosperity, causing the government to invest an extra £500m to bolster cyber security digital security experts on how businesses can protect themselves from cyber attacks. This international forum is a two-day London event, taking place 12-13 May, that will offer practical advice for government, civil service and private industry, covering issues ranging from forensics, Social Networking Security (SNS), password protection and infrastructure security. Originally launched in the US, the CyberCrime Security Forum has already helped governments and international companies, including Microsoft and the US military, safeguard against the threat of cyber hackers. Cybercrime Security founder and leading IT security expert Andy Malone said: “Cyber crime is a very real and frightening threat – it affects everyone from high-level government right through to individuals. The fact that you can’t see cyber criminals, coupled with the
rapid pace of technology makes it even harder for companies to keep ahead. “The London forum will enable British organisations to have access to world experts, who will give in-depth insight into how the cyber underworld operates. It will offer practical and realistic guidance on how to be prepared and protected.” IMPLEMENTING SECURITY PROCEDURES Tackling cyber crime should be part of every organisation’s business strategy. Investing in the right expertise and implementing robust IT security procedures will not only secure your business, but enable you to operate efficiently. Whilst it is always recommended to seek the right external IT support, there are many simple steps that can be taken by employers and their employees. Being prepared and aware is key to
reducing the risk of cyber crime. Make sure you always keep your infrastructure defence systems, such as firewalls, up to date – it’s easy to overlook these things but neglecting IT security could be a costly mistake in the long-term. Whilst changes in working practices, including the growth of home and remote working, and the reliance of global trading on technology have created opportunities, they have also increased threats. Keep up to speed on what’s happening in the IT world and know what’s going on in your organisation and with your employees. Regularly brief staff on the importance of steps for protecting PCs, and identify key systems as part of a strategy of awareness. Whilst your staff are your best asset, they can also unintentionally create risks. The growth of mobile communications means your employees could be carrying confidential company data, such as e-mails, contact details, in their pocket with a BlackBerry or other similar device. If one of these gets into the wrong hands, it could be hugely detrimental to your business.
FOR MORE INFORMATION Web: www.cybercrimeuk.com
CYBER SECURITY SITUATIONAL AWARENESS (CYBERSSA) RADITIONAL Situational Awareness has been defined as: “The perception of elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future”. PragmaticDefence prefers to simplify and define CyberSSA as “Knowing what is going on around you”. CyberSSA is not such a new field in the way information about past, current and future threats to an organisation are displayed. Its origins are well founded in the battlefield strategies of national governments and it is now beginning to percolate into large global organisations. But what is CyberSSA and why should we care about its presence (or lack of it) or its effectiveness? Today’s organisations are being asked to do more with less; there are a myriad of external compliance schemes as well as the organisations’ own internal governance necessary to meet executive board responsibilities. Some of the top agenda items faced by busy executives are: • Demonstrating security value to the business • Demonstrating a security strategy
T
14
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
that supports business objectives • Reporting on security governance and compliance So how could CyberSSA assist with these challenges? The overarching tenet of CyberSSA is knowing what is going on around you. When applied to organisations, this translates to being able to determine the security health of your environment, down to the end point. CyberSSA needs to be easily understood across the whole organisation. It must also provide for disparate business units to understand what the security department of the organisation is aiming to do with its data. Finally it must ensure that security is ingrained into the business objectives, instead of it being seen as a cost item on a P&L. Pharos from PragmaticDefence provides the industry’s first vendor agnostic
CyberSSA and security reporting platform. Pharos provides organisations with the only CyberSSA platform for all their IT and security reporting needs. It enables data collection from any information source, analysis of customer defined thresholds (SLA and KPI/KRI) and visualisation through a single interface to anyone in the organisation who needs to see it. Pharos’ flexible architecture allows you to monitor your infrastructure quickly and easily, from anywhere in the world using either a cloud-based or secure web-application interface. This provides faster decision making and benchmarking for your organisation.
FOR MORE INFORMATION Tel: 0845 1309039 E-mail: info@pragmaticdefence.com
CYBER CRIME
www.counterterrorbusiness.com
CYBER SECURITY REQUIRES A SECOND LINE OF DEFENCE T
Security Operations Centers to protect sensitive networks in near real time. THE NEED FOR A SECOND LINE OF CYBER DEFENCE Using the Qosmos ixEngine Software Development Kit (SDK), developers can quickly and affordably build a custom barrier, based on their specific knowledge about their network environment and what constitutes normal network behavior. Applications can be built to identify threats that evade COTS products, such as the detection of ICMP, DNS and Tor tunnelling, abnormal e-mail, and malware transfer through IM files. This second line of defence gives
The metadata provided by Qosmos enable rapid correlation and analysis of information. They not only complement data logs, but are more valuable than full packet payloads to identify traffic patterns put context around network usage and events, improving the insight and agility of cyber security teams to be effective. The metadata provided by Qosmos enables rapid correlation and analysis of information. It not only complements data logs, but is more valuable than full packet payloads to identify traffic patterns. Metadata requires less storage than full packet capture which means historical data can be retained for longer periods of time, improving investigative capabilities. The use of metadata enables much faster forensic searches, with the ability to search two terabytes of data in less than two minutes. The metadata can also be used to quickly index traffic flows and packet contents. In total, Qosmos Network Intelligence technology examines IP packets in real time by identifying the communications protocols used and extracting traffic information at the flow, session and application levels for rapid analysis of data relationships and communication patterns. This network and application visibility improves situational awareness and cyber defence. Where COTS products can take weeks to detect and mitigate new threats, Qosmos enables government agencies and their major contractors, critical infrastructure industries, and centralised
security specialists complete control over these applications and rules based on their knowledge and experience in their environment. Any anomaly in network behavior can be detected and mitigated in minutes. The custom barrier based on Qosmos Network Intelligence also improves the confidentiality of cyber defence. SOURCING NETWORK INTELLIGENCE TECHNOLOGY FROM A SPECIALIST Integrating this proven technology saves time, expense and project risks compared to developing network and application visibility from scratch to feed a cyber defence solution. Moreover, Qosmos’ applications-agnostic approach to Network Intelligence is repeatable for multiple cyber security and lawful intercept solutions. The Qosmos ixEngine comes with access to the technology as well as development support and professional services to the levels chosen by customers. Qosmos is an experienced and trusted partner in working with cyber security teams and confidential processes supporting highly sensitive networks. Not even Qosmos knows the details of security solutions in which its technology is used. Support includes a dedicated, passwordprotected customer portal and regular
ce
HE KEY ADVANCEMENT with Qosmos technology is the use of communication metadata that describes information extracted or computed from network data flows for more accurate protocol decoding and deep, real-time visibility into applications traffic. This technology goes beyond Deep Packet Inspection (DPI) and treats the network as a real-time, dynamic database, from which information is extracted and fed to cyber security solutions. In much the same way Business Intelligence provides context around enterprise data to improve decision making and business agility, the Qosmos-engineered traffic metadata provides the intelligence to
ce
Network intelligence technology from Qosmos enables cyber security specialists to fortify defence against zero-day attacks and weaponised malware. Qosmos provides the capability to build a second line of defence to rapidly detect and mitigate advanced threats
updates to the industry’s most extensive protocol and metadata libraries. ixEngine recognises hundreds of protocols and applications including the most complex tunnelling protocols, and extracts thousands of metadata from network traffic at all layers – network to applications Layer 7. All versions of protocols and applications are decoded. Qosmos also provides on-demand development of protocol and application signatures for custom and regional protocols, and offers a software development kit for customers wanting to create their own protocol plug-ins. Resources available through the support portal include release updates, developer and reference manuals, documented APIs and tutorials, complete lists of signatures for protocols and applications and their attributes, and a customer case management interface. For anyone needing detailed, realtime network and application visibility inside cyber security solutions, there is now a new strategic option: source network intelligence and DPI technology in the form of an SDK from Qosmos.
FOR MORE INFORMATION E-mail: info@qosmos.com Web: www.qosmos.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
15
“A good mixture of speakers and lively discussions.” Estonian Ministry of Defence, 2010 Cyber Defence Attendee
Analysing Global Cyber Threats 16th & 17th May 2011, Istanbul Marriott Hotel, Turkey
Our expert speakers include: Brigadier General Robert Rego, Chief, Space and Cyberspace Operational Integration, Headquarters USAF Space Command Colonel Gérald Vernez, Deputy Director, National Cyber Defence, Swiss Armed Forces Colonel Charles Williamson, Deputy Staff Judge Advocate, Headquarters US Air Force in Europe Major Manik Jolly, Commander, Cyber Security Cell, Indian Army Mehmet Eris, Senior Researcher, National Research Institute of Electronics and Cryptology (TUBITAK), Turkey Suleyman Anil, Head of Cyber Defence, Emerging Security Challenges Division, NATO HQ* Roger Halbheer, Worldwide Chief Security Advisor, Microsoft Zahri Hj Yunos, Chief Operating Officer, CyberSecurity, Malaysia Roger Kuhn, Science Advisor to Fleet Cyber Command (FLTCYBERCOM)/Commander, 10th Fleet (C10F), Office of Naval Research, US Navy Dr. Udo Helmbrecht, Executive Director, European Network and Information Security Agency (ENISA) Heli Tiirmaa-Klaar, Senior Advisor, Policy Planning Department, Ministry of Defence, Estonia Yael Shahar, Director, Database Project Institute for Counter-Terrorism, IDC Herzliya, Israel Dr. Markus Dürig, Head of Division, IT Security, Federal Ministry of the Interior, Germany Peter Zinn, Senior High Tech Crime Advisor, National Police Services Agency (KLPD), Netherlands Senior Representative, Defence Security Branch, Ministry of Defence, Italy
Sponsored by
PLUS A POST CONFERENCE INTERACTIVE WORKSHOP Preparing for the next generation of ICS targeted attacks …What Did We Learn from Stuxnet? Wednesday 18th May 2011, Istanbul Marriott Hotel In Association With: The Cyber Security Forum Initiative
www.cyber-defence.com Register online or alternatively contact Teri Arri on +44 (0)20 7827 60162 or email tarri@smi-online.co.uk
BOOK BY THE 28TH FEBRUARY AND SAVE £300
CYBER CRIME
www.counterterrorbusiness.com
ANALYSING GLOBAL THREATS Cyber Defence 2011 features an exceptional line-up of keynote addresses, thought-provoking presentations, a unique interactive workshop held by the Cyber Security Forum Initiative and the chance to network with key representatives from the cyber defence community MI IS PLEASED TO ANNOUNCE that Geoff Harris, management counsel, Information Security Systems Association (ISSA), UK will be chairing this year’s Cyber Defence conference. Geoff will be joined by a number of leading keynote addresses including Mehmet Eris, a senior researcher, from the National Research Institute of Electronics and Cryptology (TUBITAK), Turkey, who will be discussing Turkey’s National Cyber Defence Initiative and the latest updates, developments and threats to infrastructure. Mehmet will examin Turkey’s malware problem and ecosystem, the history between computer virus authors and antivirus researchers, and the upcoming threats and research at TUBITAK. The conference will also present brigadier general Robert Rego, chief at Space and Cyberspace Operational Integration, Headquarters USAF Space Command, examining ‘Mission Assurance: Thoughts on Cyber Defence’. Zahri Hj Yunos, chief operating officer from CyberSecurity Malaysia, will discuss the cyber defence response in Malaysia, and look at terrorism vs cyber terrorism. THE LATEST TOPICS Expert speakers will gather at Cyber Defence 2011, 16-17 May in Istanbul, Turkey, to discuss a number or pressing issues that are at the top of cyber defence team agendas. Themes include national defence, cyber terrorism, cyber defence response, business continuity and solutions and initiatives for the international community. Visit www.cyber-defence.com to view the full speaker line-up and presentations from: Microsoft, Headquarters US Air Force in Europe, Swiss Armed Forces, Indian Army, NATO, European Network and Information Security Agency (ENISA), Office of Naval Research, US Navy, Ministry of Defence, Estonia, US Air Force, Defense Information Systems Agency (DISA), US, and Federal Ministry of the Interior, Germany.
S
INTERACTIVE WORKSHOP There will be a one day workshop held by the Cyber Security Forum Initiative on ‘Preparing for the next generation of ICS targeted attacks…What Did We Learn from Stuxnet?’ Paul D’Souza, the founder of CSFI and Joel Langill, CSFI SCADA engineer and founder of SCADAhacker.com, will examine the issues surrounding a successful cyber attack and the repercussions if one was launched against the industrial
control systems used to protect critical infrastructure. See how potential attackers can launch similar attacks on other control systems and understand how to apply technical and administrative controls to protect control systems from future attacks. Cyber Defence 2011 will bring together an extensive list of cyber security professionals from across Europe, the US and Asia and offers the chance to hear from a diverse speaker faculty
representing an array of military, civil and commercial organisations – don’t miss the opportunity to meet them and discuss the latest developments in cyber defence.
FOR MORE INFORMATION Register today by visiting www.cyber-defence.com or contact James Hitchen on +44 (0)20 78276054 or e-mail: jhitchen@smi-online.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
17
continuity shop Business Continuity and Information Security Training from Continuity Shop
Our extensive portfolio of courses includes endorsements from:
The British Computer Society The Business Continuity Institute The Emergency Planning Society The Institute of Fire Safety Managers
enquiries@continuityshop.com +44 (0) 161 743 3555
www.continuityshop.com
INFORMATION SECURITY
www.counterterrorbusiness.com
INFOSECURITY EUROPE AND THE CYBER TERROR THREAT Over 12,500 information security professionals and 300 international solution providers will come together over three days for Europe’s number one information security event 011 IS SET to be another challenging year – money is still tight so workforces are under increasing pressure to deliver more with less. Yet, for cyber criminals and terrorists, it would appear business is booming as they cost the UK economy an estimated £27bn per year, according to a recent report by the Office of Cyber Security & Information Assurance and Detica. The astonishing array of new security attack vectors – ranging from the WikiLeaks-inspired denial of service attacks, to the latest generation of compound attacks using spam, phishing and malware to target senior government officials and executives – means that visitors to Europe’s number one information security event will be scouring the isles seeking new and innovative solutions combined with in-depth knowledge to combat these threats – and they won’t leave disappointed. This year’s Infosecurity Europe show will take place at London’s Earls Court Exhibition Centre 19-21 April.
2
CHANGING THE WAY WE WORK The way people work is changing. There’s more collaboration amongst organisations and the general workforce is tech savvy with the consumerisation of IT. Virtualisation and mobile working is increasingly the norm with phones that have the processing power of a desktop PC. Cloud based applications and internet accessibility mean business is no longer confined to within four walls. However, this is not all good news as the criminal and terrorist communities are also taking advantage of these new technologies. Combine these with the reality that cyber terrorists are increasingly organised and we’ve got a recipe for disaster. Over the last 12 months we’ve seen reports of state sponsored attacks, hactivists, attacks on cyber critical national infrastructure such as Stuxnet, and the increasing threat from trusted insiders. For those IT professionals charged with securing their organisations there’s a battle ahead. They better get themselves down to Earls Court quick smartish. A WEALTH OF INFORMATION Along with hundreds of exhibitors showcasing innovative products and services in the ever-changing IT security arena, there will be a wealth of educational, as well as informative sessions, all
Over the last 12 months we’ve seen reports of state sponsored attacks, hactivists, attacks on cyber critical national infrastructure such as Stuxnet, and the increasing threat from trusted insiders of which are – as in previous years – entirely free of charge*. If you’ve got an information security problem, you’ll find the solution at InfoSecurity Europe. In this year’s Keynote Theatre you’ll hear first hand end users’ experiences of the security issues and pressures they face in an increasingly mobile and global working environment. Leading experts will be on hand to give their analysis, strategic advice and predictions to ensure that you have the information you need to protect the operations of your company. From cyber terrorism to the rise of the consumerisation of IT, the immediate threats that exist at the cutting-edge to the business community as a whole will be expounded upon. DEBATING HOT TOPICS Day one kicks off with a session titled ‘The Effectiveness of Information Security – When Do You Stop Spending.’ Chaired by the 451 Group it includes presenters from Centrica PLC, Clifford Chance LLP and the SOK Corporation. This thought provoking seminar examines how the
typical information security policy of an average business today is often complex, and can therefore become inflexible and expensive. It asks the questions – how much of what we do do we truly need or is it simply ‘cover your back security’? And, if so, is that actually okay if it’s managing the perceived potential risks? Or is it simply a case of seeing beyond all the noise that’s out there to what’s truly important. Can you ever put the genie back in the bottle? David Smith, deputy commissioner and director of Data Protection from the Information Commissioner’s Office, will give the keynote address on Wednesday. He will summarise the developments over the last 12 months, providing an update on the increased powers of the information commissioner to assess organisations compliance with data protection laws and new powers to impose fines of up to £500,000 for significant breaches. Furthermore, the commissioner’s new tools and guidance to help organisations ensure compliance in the first place will also be featured, as will the changing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
19
Developing skills to think securely
In the ever-changing field of information security, merely keeping up is not an option. Anticipating future challenges and combating them adeptly requires intense education from the globally respected organisation: (ISC)2® (ISC)2 certifications, such as the CISSP ® and SSCP ®, have become synonymous with excellence in information security around the globe. They’re also among the first information security credentials to meet the stringent requirements of ANSI under ISO/IEC Standard 17024, a global benchmark for assessing personnel certification programs. Invest in developing the skills required to successfully establish policies, set governance and compliance, and secure confidential information. Contact (ISC)2. www.isc2.org/ctb Faisal Malik Head of Business & Corporate Development (ISC)2 EMEA fmalik@isc2.org 0203 283 4383
Discounts available for on-site official (ISC)2 Review Seminars. Inquire for details.
INFORMATION SECURITY
www.counterterrorbusiness.com
data protection landscape and, in particular, the outlook for compulsory breach notification in the UK. Future compliance is covered in a seminar titled ‘What Compliance Juggernauts are Coming Down the Road for Security?’ The panel – including representatives from the Steering Committee on Information Technology Crime, Interpol; GRBA, Capita Group; Field Fisher Waterhouse; and Nottingham County Council – will carefully assess where to prioritise and also what’s coming down the road in terms of legislation and compliance that you need to be aware of. SECURITY AND FINANCE The financial aspect of security is a regular theme on this year’s agenda as another seminar, titled ‘The Economics of Security – Can You Cut Your Budget and Bolster Security?’ also takes on the subject. Panellists NSPCC, Electronic Arts and the Oval Group will pose the opening conundrum: If you had to lose 30 per cent of your security budget in the next 24 hours, what would you lose and why? Mobile phones feature too with one session turning the debate on its head posing the question ‘Can You Turn Mobile Devices To Your Advantage Or Are They The Next Big Security Hole?!’. Lead by Nigel Stanley of Bloor, the panel includes representatives from NFU Mutual, LAMCO LLC – Lehman Brothers Holdings, and NHS Dumfries and Galloway. With arguments for, and against, this is likely to be a lively debate. Back on the attack vector trail the Keynote Theatre will see a team of specialists cover ‘Advanced Persistent Threats – Hype Or Reality’ – a newlydiscovered, but potentially serious problem for IT security professionals. Panellists lined up for this session include specialists from the Serious Organised Crime Agency, the online better exchange Betfair and communications giant Virgin Media. There is also a topical debate on social media led by Michael Page International, the Cobra Group, Investec and the Ministry of Defence. Moreover, the consumerisation of IT is brought under the spotlight by the Institute of Information Security Professionals, LeasePlan, Sue Ryder, GlaxoSmithKline and SABMiller. CYBER CRIME AND THE CLOUD The keynote on ‘Securing the Cloud’ includes Bob Tarzey, analyst with Quocirca and blogger for the Infosecurity Network, and representatives from Barclaycard, Bank of America and DAF Trucks. Every organisation’s largest commodity, its workforce, also gets examined in a seminar titled ‘Don’t Forget the User – How to Make Them Your Biggest Ally’. A business is only ever as successful as the people it employs. When it comes to effective
information security your workforce is your number one asset and with the right training and risk awareness they can be the eyes and ears for the business beyond the IT security infrastructure that is in place. However, without the proper risk awareness they can also pose a significant threat – be it knowingly or unknowingly – especially today as we start to see the increased use of employee-owned IT in the workplace as well as the explosion of social media. This discussion will highlight key factors to incorporate into any employee awareness training, especially how best to make people care by making them relate to the corporate risks in the same way they would towards personal risk. There is also a seminar that looks at the insider threat, titled ‘Can an Insider Really Take Your Business Down?’ No agenda would be complete without the Hall of Fame – celebrating the people that the industry has voted as being the leading contributors to the advancement of information security. The Keynote Theatre concludes this year with a witty seminar titled ‘It Wasn’t Me, It Was Bennett Arron.’ Bennett is an award-winning writer and stand-up comedian and, in his talk, he gives a disturbingly true and funny account of what it’s like to have your identity stolen.
Oracle, you’ll discover how the Institute of Directors (IoD), under strategic directive, embarked on streamlining its security architecture from managing several solutions, to running a single appliance with a single point of management, provisioning and reporting, and protection for inbound and outbound web traffic. A panel featuring Boris Goncharov of G4S Security Services, one of the first European organisations to achieve ISO 27001 certification, and Steph Charbonneau, chief technology officer with Titus, will discuss success strategies for ISO 27001 Meanwhile, an expert in the field of internet security, Eugene Kaspersky, CEO at Kaspersky Lab, will describe how modern cloud security solutions can not only protect users and businesses, but also undermine and ruin the cyber crime economy, thus lowering the level of cyber crime. Ventura, a subsidiary of Next Group, is trusted to manage more than 80 million customers contacts each year, for 28 private and public sector organisations, including O2, Sky and the Department for Work & Pensions (DWP). Mark Wityszyn, IT security manager at Ventura, will explain how log management and SIEM solutions from LogRhythm play an integral role in ensuring its IT systems are PCI compliant on an ongoing basis.
BUSINESS STRATEGY THEATRE The Keynote Theatre will be supplemented by parallel sessions in the Business Strategy and Technical Theatres. Amongst the 31 seminars over the three days in the Business Theatre, sponsored by
ADDRESSING THE SKILLS GAP Are we approaching a skills gap? With the growing attention given by governments to information security, including its top ranking on the UK national security agenda and the growing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
21
INFORMATION SECURITY
stature of ENISA, (ISC)2 asks if we should be doing more to address the natural barriers to entry to the profession. In addition, BT’s chief security technology officer examines security, privacy and the generation gap and asks what security and privacy will look like in this new world. Are you still using live customer data in test and development? At the forefront of data security for non production, Yorkshire Building Society presents its case study on the successful implementation of a data masking solution within the organisation. How do we ensure users’ personal internet habits don’t leave them or the business vulnerable? The key question is, do we already have solutions that can be better purposed to help solve this problem, is this simply a case of policy and education, or is something further required? During the session McAfee will aim to define best practices for managing the social engineer attack. TECHNICAL THEATRE Over in the Technical Theatre, sponsored by SecurEnvoy, you’ll hear how Virgin Media, with an automated firewall operations management solution from Tufin, revolutionised the way IT staff work, giving back 30 per cent of the day to focus on more strategic tasks, and enhancing
22
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.counterterrorbusiness.com
CPU and memory performance by 15 per cent to improve operational continuity. Marks & Spencer will also reveal how it’s achieving PCI compliance at the point of sale by protecting cardholder data. Meanwhile, SecurEnvoy’s presentation discusses and demonstrates how the latest banking trojan, OddJob, seizes browser session ID tokens and how they are then utilised on another system to access sensitive user account information. A live demonstration will show how a session ID token is compromised and how it is replayed upon a different system. Next generation two factor authentication will then be invoked and will demonstrate how the compromised session ID token cannot be replayed. There will also be a session on how Aintree University Hospital Trust transformed remote access to enable users to access the trust’s information systems from outside the campus and is used for a variety of purposes, such as enabling staff to work from home, to support on-call working and to provide third party support for IT systems. The event will also give you the opportunity to hear from cyber vigilantes from Imperva, who are hurting the business of hackers and gaining insight into hacker activity including uncovering full-fledged
XSS attack campaigns in the making, a server-generated DDoS attack, the discovery of a data collection containing millions of users passwords, or the finding of cloudbased technologies used by hackers. ISACA will take you on the journey of a social media attack. In this session you’ll receive guidance on how to minimise these risks. In his presentation, Niklas Van Ingelandt will show the evolution of SEB’s internet banking application from the start in the 1990s until today, including the cooperation with BankID and the roll-out of the new DIGIPASS 920. Test your security in an age of austerity with FirstBase. If you understand the sources of your most significant threats, where you are likely to be vulnerable and what the impact could be, you will be better placed to design a testing plan that gives real results. This seminar will demonstrate how to achieve this analysis in a simple, pragmatic fashion and how to link it to your real-world systems, people and premises. *Pre-register before 15 April (5:00pm GMT) to avoid the £20 entrance fee.
FOR MORE INFORMATION Web: www.infosecurity.co.uk
INFORMATION SECURITY
www.counterterrorbusiness.com
BLIND FAITH? LET US SHED LIGHT ON YOUR IT SECURITY INFRASTRUCTURE I
N TODAY’S HETEROGENEOUS networks, organisations are faced with multiple security technologies, each with their own management console, each providing alerts according to their own set of criteria and each with no single view of the entire IT security infrastructure. Cyber Security Situational Awareness (CyberSSA) assimilates data from diverse information feeds and provides users with a full map of their current infrastructure, the threats to their infrastructure and how their defences are mitigating these threats; thereby aiding the complex decision making process. Pharos from PragmaticDefence provides organisations with a true CyberSSA platform. A simple three-step process of Collection, Analysis and Visualisation facilitates the collation of data from a number of disparate information sources, analyses that data in accordance with the user’s specific criteria, and visualises the results in a way that makes sense to all. Pharos is Cyber Security Situational Awareness. Designed to monitor IT and security solutions across a multitude of industries, the unique and extensible architecture allows you to monitor your
infrastructure quickly and easily, from anywhere in the world, providing faster reporting and benchmarking of the overall security status of your organisation. The Pharos Data Fusion Engine integrates seamlessly with your existing software and hardware. Its open architecture and simplicity in approach allow for a significant reduction in the cost of monitoring and visualising your overall security status with drill down capability for further investigation and decision support. By collecting and analysing the various data feeds from your deployed security technology and integrating them with real time security intelligence data from both open and proprietary sources the Pharos platform provides you with the capability to pro-actively manage your information
security as threats are identified. In addition to providing an overall situational awareness solution, Pharos also allows customers and third party suppliers alike to analyse and visualise their performance with the creation of customised SLA/KPI/KRI. If you are a service provider you can provide a performance portal to your customers. When it comes to reporting, Pharos delivers whatever is needed. From the CEO’s overall status report to the requirements of the CRO, the CTO and the Incident Response Team, the flexibility and configurability of Pharos’s visualisation engine is designed to satisfy all.
FOR MORE INFORMATION Tel: 0845 1309039 E-mail: info@pragmaticdefence.com
ORIGIN STORAGE’S THIRD EXHIBITION AT INFOSECURITY 2011 O
RIGIN STORAGE LIMITED is a company born from the brand name Origin Storage Solutions, which covers the supply of hard drive solutions to major computer manufacturers. As the business expanded a handpicked team was chosen to bring experience in component knowledge, compatibility, product sourcing and assembly. Origin Storage is now the complete package when it comes to the supply of all storage related products. As a supplier of computer storage upgrades, Origin is well positioned to cope with a downturn. With tightened budgets, rather than buy new, the corporate and SME market upgraded their existing equipment and therefore placed Origin in an opportunistic position to market its vast product portfolio. Data security is a heavily focused area at Origin Storage, consisting of an extensive range of solutions for large corporations and SME’s to protect sensitive data, and has been anticipated to accelerate further in 2011. With hopes of increasing market share within this segment, Origin Storage will be adding new editions to the product range with the launch of Data Locker 3, which will be the latest
PIN Protected USB 3.0 Portable Hard Drive for notebooks and desktop computers. In conjunction with the Data Locker 3, Origin Storage will also officially launch the Enigma SED (Self Encrypting Drive). This product range was designed specifically for notebook laptops and is ideal for the mobile workforce enabling them to increase security in a cost-effective way, to the highest level using a combination of hardware and software built-in. Not only does this internal hard disk drive provide unparalleled security, it also operates on-the-fly preventing any loss of speed or performance from the laptop. Additionally, Origin Storage had manufactured the drive
to fit straight into the laptop for an easy fit. Origin Storage will be attending the Infosecurity exhibition for the 3rd time in April 2011 (19-21) at Earls Court, London to present our latest product range in data security and data storage. Infosecurity Europe is where information security professionals address the challenges of today whilst preparing for those of tomorrow and is the No.1 industry event in Europe. Please come along to stand F83 where you will find everything you need to protect your portable electronic data.
FOR MORE INFORMATION E-mail: stanisg@originstorage.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
23
The landscape of counter terrorism your mission critical is changing. Issensitive data secure? Introducing Celestix BSA Unified data-centric security l information rights management l secure managed file transfer l persisetnt data file encryption l auditing and compliance reporting
Secure confidential data anywhere www.celestix.com +44 (0) 118 959 6198
datasecurity@celestix.com
INFORMATION SECURITY
www.counterterrorbusiness.com
IS YOUR MISSION CRITICAL SENSITIVE DATA SECURE? With the terrorism landscape evolving to include digital assets, it’s essential that information is secured no matter where it is, how it’s sent, or who it’s being shared with N TODAY’S WORLD, mission critical data needs to be shared quickly and securely. The increasing requirement to send information between users all across the globe means that sensitive data is constantly at risk.
I
THE CHALLENGE A critical part of today’s business operations is the efficient sharing and distribution of information between employees and nonemployees such as contractors, vendors or partners. Organisations depend upon users being able to collaborate easily, share information quickly and make considered business decisions based upon their analysis. The challenge is how to easily secure sensitive information whilst whilst making it available to legitimate users when and where they need it. The sharing of information often means that businesses introduce a high level of risk simply by using every day messaging systems. For example, attaching a confidential document to an e-mail is an easy and efficient way of transferring information, but how secure is it? If the document is highly confidential and contains valuable information, what protection methods are used whilst the file is in transit, and after it’s received? The result of insufficient data protection methods can lead to damaging data leakage. What’s the real impact of data leakage? In a recent survey conducted by Forrester titled ‘The value of Corporate Secrets’, the associated cost of a data leak derived from a rogue employee stealing sensitive company documents was estimated to be at least £250,000. The cost of a data leak from an outside business partner losing or abusing sensitive information was estimated to be in excess of £75,000 per incident. Breaches of data security don’t just have direct financial impact. They can also lead to bad press, lower customer confidence, brand and reputation damage and potential fines imposed by regulatory authorities. THINK DATA-CENTRIC SECURITY Securing your network, devices and applications is one step in the overall security chain – but what about securing the data itself? Encrypting an entire laptop (including the operating system and other apps) is time consuming, slows system resources significantly and doesn’t help to protect data when it’s being shared. It only addresses the loss of the device itself and does not help in securing data that needs to be shared in order to be used effectively. Transmitting data securely from point A to
point B is just one step in its journey – but what happens when it reaches point B, the recipient? How do you ensure that the data, now it has safely reached its destination, is only accessed by the recipient you want to use it and not by anyone else? To use the information it has to be opened in a decrypted state, leaving the possibility for mistake or malicious disclosure. By applying data-centric security, companies can ensure that the information itself has a persistently applied level of security around the document itself, thereby keeping it safe wherever it needs to go. It is not dependent on domain or the network; it can be transported in any way and ensures that its minimum state is secure. This also means that additional layers of security can be introduced, enhancing the data owner’s ability to control what can happen to the information, who can access it, when they can access it and where. With these parameters in place, companies can define everything needed to ensure information security both internally and externally to the business whilst still remaining flexible and with enough granularities to cope with the many different levels of access different parties need.
challenges businesses face. Celestix BSA is an integrated appliance solution that delivers: • Information Rights Management – ensuring the right people get the right level of access to the appropriate files. • Secure Managed File Transfer – industry leading 2048bit encryption applied to both the transfer and to the file itself. • Persistent Data File Encryption – protection applied to any file type, any transport method and whilst in storage. • Auditing & Compliance Reporting – supports regulatory compliance by providing reporting and audit trail functions of the file activities. For the first time your sensitive information can be made available for distribution and collaboration on your terms, without the risk of interception, unintentional loss or theft. Celestix BSA – keep control of your sensitive data no matter where it goes or who it’s being shared with.
FOR MORE INFORMATION For help in assessing how your business can maximise availability and security of sensitive data whilst minimising risk please contact Celestix Networks at datasecurity@ celestix.com or visit www.celestix.com
INTRODUCING CELESTIX BSA As a global leader in securing business information, Celestix Networks is bringing to market the BSA appliance to specifically address the critical data protection
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
25
INFORMATION SECURITY
www.counterterrorbusiness.com
SECURING YOUR MOBILE NETWORKS High Grade crypto manufacturer, L-3 TRL Technology explains why Mini-CATAPAN is fast becoming the IP network encryption solution of choice for many UK law enforcement and counter terror agencies S THE THREATS to information carried over secure networks are becoming increasingly sophisticated and dynamic, the requirement for innovative and versatile information assurance solutions is becoming a key priority for counter terror organisations throughout the UK.
A
CHALLENGE The increasing demands of mobile and remote working environments pose an additional set of challenges that can often be difficult to overcome. Finding a reliable but cost effective solution that can operate effectively across a range of applications is paramount. SOLUTION Mini-CATAPAN is a pocket-sized IP encryption device, which is currently in service within a number of
nationally sponsored UK counter terrorism units to secure their wideranging network architectures. Developed by Gloucestershire-based L-3 TRL Technology, who specialises in providing High Grade cryptographic solutions, Mini-CATAPAN was designed in response to the increasing demand for a cost effective, reliable solution that could protect sensitive voice and data communications in a variety of environments. DEPLOYMENT Since its certification in early 2009, over 1,600 Mini-CATAPAN units have been deployed across a range of government, law enforcement and counter terrorism agencies in the UK. Its pocket-sized, lightweight design is able satisfy the rapid deployment requirements of mobile
operations whilst also offering effective performance in a strategic role. In addition to its physical size, the increasing popularity of Mini-CATAPAN stems from its re-programmable platform, which enables user-specified algorithms to be implemented, allowing the device to be used in multiple scenarios and deployed much more widely. SURVEILLANCE & INTELLIGENCE Remote deployment becomes a reality for many Mini-CATAPAN users, who benefit from the ability to communicate live with their protected networks in a secure manner. The device is also ideal for surveillance and intelligence gathering applications, where requirements for flexibility, rapid deployment and optimum security are key considerations. Once configured, Mini-CATAPAN can
POCKET-SIZED PROTECTION FOR HIGH GRADE NETWORKS
Mini-CATAPAN: the UK’s leading High Grade encryption solution Developed by L-3 TRL Technology, Mini-CATAPAN offers a compact solution that protects sensitive networks at the highest level. Rugged, reliable and small enough for tactical operations, Mini-CATAPAN can protect SECRET and TOP SECRET voice and data communications and is fast becoming the IP encryption solution of choice for many defence and security systems worldwide. For more information on this industry-leading solution, call L-3 TRL Technology on 01684 278700 or email marketing.trl@L-3com.com TRL Technology
26
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
L-3com.com/TRL
INFORMATION SECURITY
www.counterterrorbusiness.com
The increasing demands of mobile and remote working environments pose an additional set of challenges that can often be difficult to overcome. Finding a reliable but cost effective solution that can operate effectively across a range of applications is paramount operate effectively without any user intervention for up to 12 months. VERSATILE As one of the most cost-effective and versatile encryption solutions available, Mini-CATAPAN enables users to benefit from economies of scale. The device can provide protection from RESTRICTED right through to TOP SECRET level, so the same equipment can be used across a broad spectrum of applications, eliminating the dependency on expensive specific-to-type components. OPTIMUM USABILITY The management of Mini-CATAPAN is via an intuitive GUI, which contains a variety of features designed for optimum usability. Training required to use the device is
minimal but L-3 TRL offers a range of additional training and support services, enabling users to gain the most from their systems. A 24-hour replacement service is also offered, to reduce downtime and spares holdings for agencies with limited resources. INCREASING POPULARITY As the increasing popularly of MiniCATAPAN continues to surpass expectations, L-3 TRL has more developments planned for its CATAPAN range of encryption products. The launch of a high bandwidth solution is planned for later in the year, which is set to provide the same high levels of protection at the fastest speed available, for secure data centres and similar applications. The extension to the CATAPAN family will also continue with the launch of CATAPAN
SCC-M, a portable solution for mobile users which will be launched at the Infosecurity Europe exhibition in April this year. With a strong pedigree in working with sensitive networks, L-3 TRL can offer consultancy and bespoke services to agencies requiring a fully managed information assurance solution.
FOR MORE INFORMATION For more information on the CATAPAN range of solutions or other counter terrorism capabilities provided by L-3 TRL, visit www.L-3Com.com/TRL Mini-CATAPAN can also be viewed first-hand at the following events: Counter Terror Expo, 19-20 April, Olympia, London, L-3 TRL stand: F100 and Infosecurity Europe, 19-21 April at Earls Court, London, L-3 TRL stand: D41.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
27
Tempest shelter Personnel security Deployable screening Seizure vaults For further information contact: HITEK Electronic Materials Ltd 15 Wentworth Road, South Park Industrial Estate, Scunthorpe, North Lincolnshire, DN17 2AX Tel. +44 (0)1724 851678 Fax. +44 (0)1724 280586 Email. sales@hitek-ltd.co.uk www.hitek-ltd.co.uk
COUNTER TERRORISM
www.counterterrorbusiness.com
WORKING TOGETHER TO PROTECT PEOPLE Chris Philips, head of the National Counter Terrorism Security Office, discusses the terror threat and its business implications HERE IS ONE THING of which you can be certain – terrorist tactics of today will evolve and change over time. This has been proven by countless organisations and groups over the years who have tried to find a way through the defences of their target. Those that wish to harm us will change tactics to achieve their aims. We have to be very careful not to merely be defending sites against the last attack, although of course that needs to be done as well. Working to protect the public and stop terrorists getting through requires all those involved in security to constantly look at the threat picture, understand the motives and the end result that terrorists are looking to achieve. This should then lead to a thorough review of operations in order to understand
T
site vulnerabilities and an assessment of available options to plug any gaps. AIRPORT SECURITY A very good case in point is the recent bomb attack at Moscow’s Domodedovo airport. The suicide bomber, who detonated this device in the arrivals hall, deliberately chose the airport’s weakest spot. This is an area where they would not have to go through any search regimes to get to their target. Apart from a few notable exceptions, airports throughout the world use a similar process. This is driven by regulations but again, these regulations have to keep pace with an evolving threat. If you were to ask any security expert where they would put the first point of challenge and the first search regime, they
ABOUT NACTSO The National Counter Terrorism Security Office (NaCTSO) is a police unit co-located with the Centre for the Protection of the National Infrastructure (CPNI). It is funded by and reports to the Association of Chief Police Officers (ACPO). NaCTSO contributes to the UK Government’s counter terrorism strategy (CONTEST) by supporting the Protect and Prepare strands of that strategy. NaCTSO staff can offer specialist advice regarding the security of explosives and pre-cursor chemicals (including fertilisers), pathogens and toxins, radiological sources and other toxic chemicals. They also
provide guidance in relation to business continuity, designing out vehicle borne terrorism, the protection of crowded places and reducing opportunities for terrorism through environmental design. To achieve national delivery on behalf of the Association of Chief Police Officers NaCTSO trains, tasks and coordinates a nationwide network of centrally funded, specialist police advisers known as Counter Terrorism Security Advisers (CTSAs). The primary role of these advisers is to provide help, advice and guidance on all aspects of counter terrorism protective security across a variety of sectors.
would always recommend that it is outside the venue or at least at the entrance. Of course this is not always possible. You wouldn’t find many experts recommending that the search area be positioned slap bang in the middle of the asset. But with airports that is what we have inherited. ATTRACTIVE TARGETS There are good reasons for this as the aim of the security has always been to protect the aeroplane. Unfortunately terrorists have already decided that airport terminals are attractive targets. The attempt to commit mass murder in Glasgow in 2007 was an attack on the airline industry; but furthermore it was specifically an attack at the landside airport terminal and the innocent people inside. You’ll have noticed that this failed attack has changed the shape of the defences around the UK’s airports. Many millions have been spent defending terminals from vehicle bombs. This is great stuff, but where do we go next? Perhaps search regimes may have to be moved away from the terminal, and additional passenger scanning and risk assessments may need to be considered in the future. Any such changes will inevitably have an impact on the business community. DIFFICULT ISSUES These are issues that cannot easily be solved. Moving the queue outside the terminal will not necessarily solve the problem just displace it. What it would achieve is to allow the airport the best possible opportunity to recover quickly and carry on functioning after an attack. Clearly these matters need to be thought through. There is rarely a one size fits all solution to all of these issues, but we must be prepared to close gates before the horse has decided it wants to pop out and run around the yard and not be driven by incidents and tragedies that have already happened. Taking this forward looking approach, there is some great work happening in the area of behavioural science. The Centre for the Protection of the National Infrastructure (CPNI) is producing excellent products and guidance, including those which develop a good security culture and professionalise man guarding, including a DVD training session. Being able to identify suspicious behaviour and deploying highly skilled security staff is a great way to secure your assets. In conclusion, the terrorist threat is going to change and evolve. Security measures we have in place now need constant revision. The sensible business will be looking forward at new and innovative ways of reducing risk. There are all sorts of help and advice available to business within the UK.
FOR MORE INFORMATION Web: www.nactso.gov.uk www.cpni.gov.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
29
COUNTER TERRORISM
www.counterterrorbusiness.com
PROTECTING HIGHER RISK BUILDINGS FROM TERRORISM Tata Steel has been a pioneer in developing systems to meet the needs of organisations requiring higher levels of protection against hostile vehicle attack HE INTERNATIONAL terrorist threat level for the UK, as issued by HM Government’s Joint Terrorism Analysis Centre (JTAC), is still set at ‘Severe’ meaning that a terrorist attack is highly likely. This level is only one below ‘Critical’, the highest threat level, so it is very apparent that, as a country, we are still in danger. A particular form of attack, involving the use of a car or truck bomb, is one of the most deadliest of threats – as the detonation of a Vehicle Borne Improvised Explosive Device (VBIED), could potentially cause loss of life and major damage to properties. High profile government and commercial buildings, crowded places such as transport hubs, shopping centres, exhibition and conference venues and sports arenas, are all possible targets in this respect. A huge amount of work has been done by the government in recent years aimed at setting up organisations that are completely focused on protecting people and assets from attacks of this nature. For example the Centre for the Protection of Critical National Infrastructure (CPNI www.cpni.gov.uk) and the National Counter Terrorism Security Office (NaCTSO www.nactso.gov.uk) provide an excellent level of support to local and national organisations, advising them on the best ways to protect their sites, especially those in the high and medium-high risk categories, from terrorist attack, and how to recover in the event of one taking place. Protecting these higher risk structures and sites can be achieved in several ways – strengthening the building itself to protect from blast, and securing perimeters with a Hostile Vehicle Mitigation (HVM) scheme. Tata Steel has been a pioneer in developing systems to meet the needs of organisations requiring higher levels of protection against this form of terrorist attack.
T
PROTECTIVE CONSTRUCTION For applications where robust protection against blast is required, Tata Steel’s patented Bi-Steel steel/concrete composite material is ideal. Bi-Steel comprises two steel plates that are connected by an array of transverse friction welded bars to form panels. When filled with concrete the resultant Bi-Steel panel offers unrivalled strength and performance. The material is able to absorb energy from an explosion as the steel plates contain any damaged
30
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
concrete, preventing the generation of hazardous secondary projectiles. Tata Steel also offers high performance ballistic solutions using its premium quality steels. Structures that may need this form of enhanced integrity include government, military and police infrastructure, transport infrastructure, petrochemical and nuclear facilities, and secure financial and data storage sites. Protection may involve the complete structure, critical parts of it or simply some form of blast walls. Recent projects of this nature that we have completed include the construction of a complete Bi-Steel building on a high security military base, protection of high value cash storage facilities, and the installation of Bi-Steel perimeter walls to protect two overseas embassies. We can design, engineer, manufacture and supply, and if required, project
manage the installation of the protective construction elements, or the construction of the complete building. PERIMETER SECURITY AND PAS 68 Tata Steel offers a wide range of PAS 68 products designed to protect from hostile vehicle attack – PAS 68 is the accepted UK standard for rating vehicle safety barriers of this type. These comprise permanent anti-attack bollards and walls, including a recently announced ultra-shallow bollard system with a structural depth of only 75 mm (3”), believed to be the shallowest PAS 68 rated bollard system available anywhere in the world. This type of bollard is ideal for inner city locations where excavating traditional depth foundations would involve substantial disruption due to the complexities of under-surface services such as gas, electricity and telecommunications.
COUNTER TERRORISM
www.counterterrorbusiness.com
Shallow foundations of this type are also much faster to install compared with traditional bollards, thus reducing programme time and minimising cost. REDEPLOYABLE SOLUTIONS We also supply redeployable, surface mounted walls, barriers and gates. These are ideal for use where the layout of site entrances may be subject to change, where security arrangements might be altered at some future point or where it is deemed difficult to install a fixed, permanent scheme. This type of system is in use protecting the Houses of Parliament, major UK airports and several other high profile sites in the UK, and was used to protect delegates at the 2009 London G20 Summit. The units can be easily transported to site, reconfigured if the need arises, and are PAS 68 tested. In the past the role of aesthetics might not have been as fully considered as it should have been in some of the perimeter protection schemes implemented. This has all changed, and in designing any new project, care is now taken to ensure that the scheme is sensitive to its immediate environment, whilst at the same time being fit for purpose. Particularly in the case of inner city schemes, the solution chosen should uncomplicated and easyTata to install. 34714beTata Advert:34714 Advert Tata Steel has worked on several high
Tata Steel has worked on several high profile projects where the aesthetics of the schemes have been paramount. The systems have been carefully designed to blend sympathetically with the local environment and can be painted or clad in brick or stone, in keeping with the surrounding streetscape profile projects where the aesthetics of the schemes have been paramount. The systems have been carefully designed to blend sympathetically with the local environment and can be painted or clad in brick or stone, in keeping with the surrounding streetscape. An excellent example of this is the new streetscape scheme just completed to protect key government buildings in Whitehall, which incorporates discreet protection against terrorist car or truck bomb attack. This was achieved through the installation of high performance, shallow foundation Bi-Steel bollards in the traditional Westminster’ style, and Portland stone clad Bi-Steel solid and balustrade walls. Both were elegantly designed to blend 17/3/11 10:24 Pagein1with the traditional local architecture of this historic
area of the capital, yet are highly robust to protect against hostile vehicle attack. The terrorist threat will be with us for some time to come and protecting people and assets from attack is now part of our everyday planning. Suppliers of physical security systems, like Tata Steel, have been working with the relevant government agencies for some years now developing solutions that meet all known eventualities to ensure we are as best protected as we can be from this new form of threat.
FOR MORE INFORMATION Tata Steel Projects Tel: +44 (0)1344 751670 E-mail: bi-steel@tatasteel.com Web: www.tatasteelsecurity.com
Physical Perimeter Security and Protective Construction Solutions Protective Construction
Perimeter Security and PAS 68
Professionally managed physical security solutions
• Complete blast protective structures.
• PAS 68 permanent walls and bollards - hostile vehicle mitigation measures deliver unrivalled protection designed to blend in with the local streetscape.
• Complete turnkey project solutions.
• Blast protection for critical parts of a building. • Blast containment structures. • Blast walls.
Tata Steel Projects
• PAS 68 redeployable barriers, gates and pedestrian portals - surface mounted so easily installed, removed or reconfigured.
T +44 (0) 1344 751670
E bi-steel@tatasteel.com
• Security review - identification and mitigation of threats including Deadly And Determined Attack (DADA). • Advanced engineering and solution design, including product sourcing integration and installation.
W www.tatasteelsecurity.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
31
COUNTER TERRORISM
www.counterterrorbusiness.com
COMPLETE YOUR SECURITY NETWORK FLIR thermal imaging cameras secure the perimeter of chemical and pharmaceutical production facility Industriepark Höchst ITH ITS STATE OF THE ART technical infrastructure, perfect access to international transit routes, and proximity to key suppliers and financial markets, it is no wonder that many of the world’s leading chemical and pharmaceutical companies have set up facilities in Industriepark Höchst, near Frankfurt. The industrial park facilitates more than 90 companies within an area of over four square kilometers. Within the premises of Industriepark Höchst there are over 800 rental properties, 120 production plants and over 80 laboratory and office buildings that accommodate the, in total, 22,000 employees that work there. The compound stretches over 460 hectares of which 50 are still available for relocating or expanding companies. There are three means of transportation in and out of the park: by car, by train and by boat.
W
SECURITY: A MAJOR PRIORITY Given the importance and in some cases sensitivity of the chemical and pharmaceutical production facilities and related process industries located at Industriepark Höchst, security is a major priority. Securing such a large area with so many access paths isn’t an easy task. As the service company of the industrial park it is Infraserv Höchst that has the responsibility to make sure the park is safe and secure. Infraserv supplies the companies that inhabit the industrial park with energy, disposes of waste, and provides access to business space and infrastructure. Its service portfolio ranges from environmental, security and safety services all the way to health products, communications and IT. To be able to effectively secure the entire perimeter of this large industrial complex, even during the night, Infraserv uses thermal imaging cameras from FLIR. “We have installed security cameras of several different types to cover the entire perimeter of the industrial park, including several thermal imaging cameras,” explains Thomas Krüger, head of the control centre at Infraserv. “The thermal imaging cameras we use are the FLIR SR-313, with a 35mm lens and the FLIR SR-324 with a 19mm lens. We chose these cameras because they were an effective and affordable solution for the challenges that we had to face with securing this dynamic industrial park.”
32
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
PERFECT NIGHT VISION Thermal imaging cameras provide perfect night vision in even the darkest of nights. Intruders show up very clearly in a crisp thermal image due to the contrast in temperature between a person and his surroundings. But that’s not all; thermal imaging cameras can also see through obscurants like smoke, dust, foliage and fog better than a CCTV camera. Krüger is very happy with his FLIR thermal imaging cameras: “Sometimes I wish that I had this technology at my disposal when we started installing our security network. I probably would have installed many more thermal imaging cameras than we have now, because in most situations they’re much better than CCTV cameras.” Krüger purchased the FLIR thermal imaging cameras from FLIR products distributer
VIDEOR. As one of the leading European distributors of professional video technology VIDEOR has a market experience of over 30 years. The wide product range of the near Frankfurt based company covers components and integrated systems in the security, networking, imaging and broadcast sectors, based on strict quality standards. BIRD’S EYE VIEW Due to his positive experience with thermal imaging, Krüger is now contemplating to install a new thermal imaging camera in a high location. The best solution for such a location is probably the FLIR PTZ-35x140 MS thermal imaging camera. With its two thermal imaging cameras and one low light camera it provides perfect vision, even in total darkness. The two thermal imaging cameras provide a continuous optical zoom, with a wide angle thermal imager for situational awareness and a narrow fieldof-view imager that has been designed for mid-range target recognition. If Krüger would choose to opt for the FLIR PTZ-35x140 MS, it would be able to utilise its long range performance to its full potential from its high vantage point and with its full 360° viewing capability it would be able to observe the entire park. “That would be quite useful,” explains Krüger. “Not only could we use that to spot intruders, we could also put it to good use in case of fire or spillage, monitoring and directing the firefighting or salvage operation.” NO LIGHTS NEEDED The thermal imaging cameras that are already operational have proved their use. “We’ve put them in locations where it’s
COUNTER TERRORISM
www.counterterrorbusiness.com
difficult for CCTV cameras to be effective,” explains Krüger. “In certain areas it is difficult due to the infrastructure to put up proper lighting, for instance. With a thermal imaging camera you don’t need lights.” Thermal imaging cameras are incredibly useful to see at night, but according to Krüger that’s not their only advantage: “Both the FLIR SR-313 and the FLIR SR-324 have an excellent range performance.” Depending on the conditions these two thermal imaging cameras can detect trespassers at a range of up to respectively 450 and 780 meters. BETTER RANGE WITH THERMAL IMAGING CAMERAS Thermal imaging cameras in general have a better range performance than CCTV cameras, explains Krüger. “With a CCTV camera you have to depend on visual contrast to be able to see a person that’s trespassing, but that can be quite difficult, especially when lighting conditions aren’t perfect, such as on a cloudy day for instance. The contrast on a thermal image is much bigger, due to the difference in temperature and thermal radiation between a person and his surroundings. Because of this you can detect a person with a thermal imaging camera at a larger distance than with a CCTV camera. And because you can see farther with one camera, you need fewer cameras to cover the same area.” GOOD RETURN ON INVESTMENT According to Krüger this makes thermal imaging cameras very cost-effective, not only because you need fewer cameras:
“Installing a complete security solution involves a lot more than just the camera itself. There’s an entire infrastructure you have to take into account. For every camera you install you need a power supply line, a mast for the camera to be mounted on and with a CCTV camera you also have to install several streetlights to make it effective at night. A thermal imaging camera needs only one mast and no lighting. “The total cost of ownership for a thermal imaging camera is extremely low so even
software then compares the perceived movement to previously defined parameters and if the movement is not within those parameters, an alarm goes off. “But not every unauthorised movement is a trespasser. The cause of such unwanted alarms can be a spider crawling across the camera’s lens, braches of a tree moving in the wind or even graffiti on a moving train.” Thermal imaging cameras trigger fewer unwanted alarms, according to Krüger:
The contrast on a thermal image is much bigger, due to the difference in temperature and thermal radiation between a person and his surroundings. Because of this you can detect a person with a thermal imaging camera at a larger distance than with a CCTV camera though the price of one thermal imaging camera is higher, in the end it is cheaper to install a thermal imaging camera than to install several CCTV cameras. In my opinion thermal imaging cameras really offer a very good return on investment.” MONITORING INACCESSIBLE AREAS The better range of a thermal imaging camera isn’t just important for cost effectiveness explains Krüger: “Due to the longer range you can use thermal cameras to monitor inaccessible areas that are difficult to cover with CCTV cameras. Here at Infraserv Höchst we have the problem that some parts of the perimeter we monitor are under constant danger of flooding, because we’re located on the banks of the river Main. That situation makes it very challenging to secure those areas. Ground sensors or fences are not an option due to the floods and CCTV cameras combined with lighting also proved to be an ineffective solution, for the floods would damage the power supply of both the cameras and the lights. But with thermal imaging cameras we can put a camera outside the flood-threatened area, looking in, and thus secure that entire area without risking flood-related damage.” FEWER UNWANTED ALARMS WITH THERMAL IMAGING CAMERAS In Krüger’s experience, there is also a significant difference between thermal imaging cameras and CCTV cameras in the amount of unwanted alarms. “We have about one unwanted alarm a week with our CCTV cameras. With our thermal imaging cameras we have about one a year, if we have any at all. “Our video-analysis software, Aimetis Symphony, uses complicated algorithms to detect and analyse movement. The
“The difference between thermal imaging cameras and CCTV cameras is the contrast. CCTV cameras rely on visual contrast where thermal imaging cameras rely on thermal contrast and that difference is very important, because the thermal contrast is much bigger than the visual contrast. The branch of a tree moving in the winds does not show up as distinctly in the thermal image as a person does. That means that it is easier for the video-analysis software to separate actual intruders from other types of movement on footage from a thermal imaging camera. This reduces the amount of unwanted alarms and that in turn saves us a lot of time and money.” IDENTIFYING TRESPASSERS According to Krüger thermal imaging cameras are superior to CCTV cameras on all fronts: “In fact, the only reason I still use CCTV cameras is that they can be more effectively used to identify trespassers. That’s important information, because we can better assess the situation if we know what type of intruder we’re dealing with and if we decide to prosecute the trespasser we give the footage to the police. If we could use the thermal imaging cameras to do that than normal CCTV cameras would be obsolete.”
FOR MORE INFORMATION Web: www.FLIR.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
33
CAPTURE INTELLIGENCE
Developed in conjunction with the UK army & advanced in partnership with the Australian military
FROM MOBILE PHONES, GPS DEVICES, SIM & MEDIA CARDS
THEIR COMMUNICATIONS THEIR CONTACTS THEIR ROUTE The most advanced mobile device forensics for the most demanding situations Radio Tactics is a specialist innovator of high-tech digital intelligence and evidence gathering equipment used globally by military, law enforcement, governments, and intelligence agencies. With offices in the UK, USA and Australia, Radio Tactics provides dedicated technical assistance and offers comprehensive support and advice to every client.
www.radio-tactics.com info@radio-tactics.com +44(023) 8051 1131
Intelligently Developed Evidentially Sound
COUNTER TERRORISM
www.counterterrorbusiness.com
MOBILE FORENSICS FOR THE MOST DEMANDING SITUATIONS Radio Tactics exploitation devices provide organisations with equipment to interrogate mobile phones, GPS and portable digital devices, providing real-time capture of intelligence and evidence ADIO TACTICS is a specialist innovator of high-tech digital intelligence and evidence gathering equipment used globally by military, law enforcement, governments, and intelligence agencies. The company’s exploitation devices provide security focused organisations with equipment to interrogate mobile phones, GPS and portable digital devices, providing realtime capture of intelligence and evidence. Radio Tactic’s property ownership devices Apollo and Hermes offer UK law enforcement agencies the complete solution to prevent, detect and reduce property crime. With offices in the UK, USA and Australia, Radio Tactics provides dedicated technical assistance and offers comprehensive support and advice to every client. Radio Tactics is committed to working in partnership with its customers to develop cutting edge solutions that are perfectly suited to the user and the ever changing environment in which they operate. Radio Tactics customers include all arms of the British criminal justice system, as well as military and commercial organisations in the UK and internationally. Radio Tactics is a supplier to many Home Office Police Forces, as well as the Serious and Organised Crime Agency, the British Transport Police, and the Ministry of Defence. Radio Tactics also works with the financial services industry and corporate fraud investigation departments. From its bases in the UK, Australia and the USA, Radio Tactics distributes its products to Europe, Asia and the Americas. As a trusted supplier, trainer and service provider, Radio Tactics has been granted membership of the Police and Public Security Suppliers Association (now a part of A|D|S). Radio Tactics has also achieved Secured by Design accreditation for all of its products.
R
LAW ENFORCEMENT In response to the changing nature of policing and the increasing prevalence of cyber crime, Radio Tactics has created a range of forensic solutions to ensure that police forces are equipped with the right tools to combat the threat. Aceso was developed to enable law enforcement officers to retrieve information from handsets, SIM cards and memory cards in one comprehensive solution whilst maintaining full control
over every aspect of the mobile phone forensic process. This product enables police to examine a large number of handsets quickly and stringent testing carried out by Radio Tactics means that the data gathered is reliable enough to be used in court. MILITARY Intelligence has always played a major part in military operations. With the recent increase in terrorist activity, technology developed by Radio Tactics plays an essential part in the day-to-day fight against the terrorist threat. Radio Tactics has worked closely with the military and security services to produce a product that can be relied upon in extreme conditions and under pressure. Athena has been developed so that no trace of extraction is left on a device,
making it perfect for covert and surveillance operations. This portable unit is not only small and light, it is also robust and reliable, an ideal tool to recover data and intelligence from handsets, SIM cards and media cards. All acquired information is encrypted to AES-128 (Advanced Encryption Standard) and accessed through a smartcard and PIN allowing only authorised users to access the information. Through a suspect’s mobile phone, security personnel can access contacts, text messages, photos and e-mails. This can prove vital, as information can contain anything from text messages about contraband and enemy locations to pictures of the enemy’s weapons and activities.
FOR MORE INFORMATION Web: www.radio-tactics.com
ACESO/ATHENA CASE STUDY The Forensic Media Recovery Unit within NWCTU purchased ACESO and ATHENA mobile phone forensics products to support the unit’s revolutionary data acquisition, intelligence gathering and forensic capabilities. The Forensic Media Recovery Unit made the decision to purchase and roll out both products to accelerate the region’s counter terrorism operations and produce secure, reliable and evidentiallysound exhibits of mobile phone data for investigation, CPS examination and, where appropriate, prosecution. ACESO meets the unit’s demands for extracting and analysing accurate results from mobile phone handsets, SIM cards and media cards, quickly and securely, whilst the portability, unobtrusive design and military robustness of ATHENA ensures covert operations are never compromised. As Darren Kerr of the Forensic Media Recovery unit confirms, ACESO and ATHENA are proving to be valuable additions to the Unit’s suite of forensics tools: “We made the decision to purchase ACESO and ATHENA as we knew these products would complement our suite of intelligence gathering and data acquisition tools and would help us speed up our investigations. The Forensic Media Recovery Unit is responsible for acquiring data from mobile phones and CCTV footage as well as editing all forms of digital media.
“Radio Tactics worked with us to design and deliver robust mobile forensic technologies that met our demand for fast, effective and completely secure data acquisition. Changes were made to the interfacing of the wizard-driven software, which resulted in a bespoke system that made it easier for us to store extracted data and produce a reduced number of exhibits for the court procedures that can follow our operations. “ACESO and ATHENA are both easy to use and provide quick access to results that can be viewed easily and analysed on the user-friendly touch screen. Naturally, having the training, expertise and support of a UK organisation with in-depth knowledge and appreciation of our intelligence gathering activities has made the implementation process straightforward and highly successful.”
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
35
MECHANICAL DESIGN | PRODUCT DESIGN | DIGITAL PROTOTYPING | FEA SERVICES | VISUALISATION | ANIMATION | RAPID PROTOTYPING | 3D PRINTING WITH OBJET
We have the latest 3D modeling, FEA (Finite Element Analysis), and visualization software, and our new Objet 3D printer, we can guide you through each stage of the product development process. Our Services Include: n n n n n n n n n n n n
Rapid Prototyping Design Briefing Product Research Concept Design Evaluation Models Design Development Tool Design Mold Flow Analysis Detail Design 3D & 2D Photo-Realistic Images Visualization Animation
Tel: +44 (0)1296 641211 E-mail: info@in-cad.co.uk
www.in-cad.co.uk
COUNTER TERRORISM
www.counterterrorbusiness.com
ADAPTING TO MEET THE EVOLVING TERRORIST THREAT How has NATO enhanced its structures and capabilities to better respond to the ever-evolving challenges posed by terrorism? NATO’s Counter Terrorism section explains
HE NATO ALLIANCE recognises that terrorism not only poses a direct threat to the security of its citizens, but also poses a common threat to international stability and prosperity. Thus, NATO has taken numerous measures to enhance its structures and capabilities to better respond to the challenges posed by terrorism.
T
EMERGING CHALLENGES Recently the Emerging Security Challenges Division (ESCD) was established as part of the International Staff to provide a cross-cutting approach to address a growing range of non-traditional risks and challenges. The Emerging Security Challenges Division is at the forefront of NATO’s efforts in many areas. This includes not only Counter Terrorism (CT), but also the non-proliferation of weapons of mass destruction, cyber defence, and energy security, to mention a few. As part of this re-organisation, the Defence against Terrorism Programme of Work (DAT POW) was moved to this new division. The DAT POW is one of the most proven programmes in the Alliance’s portfolio to address the scourge of terrorism. It is also one of the most relevant
counter-terrorism programmes for public and private collaboration and partnership. Launched in the aftermath of the 2004 Madrid attacks, the DAT POW focuses on the most critical capability needs as identified by NATO’s military authorities to counter asymmetric threats. Current areas of work include Large Aircraft Survivability, Harbour Protection, Non-Lethal Capabilities, Helicopter Protection, Protection of Critical Infrastructure, Explosive Ordnance Disposal and Consequence Management, Defence Against Mortar Attacks, Countering Improvised Explosive Devices, and Intelligence, Reconnaissance and Surveillance (IRS) against terrorist targets, and CBRN defence1. A PIONEERING INITIATIVE With its multi-national and multiorganisational approach, the DAT POW has proven to be successful in promoting technological solutions and enhancing technical interoperability for both national and Alliance capabilities to better defend against terrorism. The DAT POW is a pioneer initiative, seeking to minimise bureaucratic overheads with individual NATO nations taking the lead of projects, and supporting
nations (to include partners) and agencies taking on sub-projects, hosting activities and lending their expertise. This approach leverages the capacities of national governments, industry, and the science and research communities, and accelerates counter-measure development, delivery and fielding. These efforts are coordinated and managed by the ESCD through its Counter Terrorism section. RESULTS The programme has delivered. The Precision Air Drop (PAD) initiative2 tested and demonstrated technologies designed to enhance the drop accuracy of payloads and concurrently extend the stand-off protection of air delivery platforms and crews. The Defence Against Mortar Attack (DAMA) initiative (initially led by Netherlands and now Norway) developed a counter-mortar detect and warn solution. Both technologies can be found in use in Afghanistan today. Despite the success of the programme in producing practical counter-measures, it is but a starting point for NATO’s efforts in countering terrorism. The fight against terrorism and mitigating asymmetric threats demand more than just technological solutions. With the positioning of the DAT POW in the new division it is clear that the programme’s scope will expand to provide a more comprehensive approach in finding counter-measure solutions. Future projects will require the melding of assets from both NATO and such other important stakeholders as civilian law enforcement, border control agencies, and emergency response organisations. The scope of the DAT POW and NATO counter-terrorism efforts will expand rapidly and touch both traditional and nontraditional organisations alike. While the future may not be clear, the DAT POW and the ESCD will continue to strive to be on the cutting edge in leading NATO’s fight against terrorism.
References 1. Current Lead Nations include Bulgaria, Canada, France, Norway, Portugal, Slovakia, Spain, United Kingdom, and the U.S.A. Previously led by the U.S.A, the Precision Air-Drop Technology initiative was removed from the DAT PoW upon sucessfully meeting project objectives. 2.
The views expressed are the NATO Counter Terrorism section’s and do not necessarily represent those of NATO.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
37
COUNTER TERRORISM
www.counterterrorbusiness.com
UNIQUE TECHNOLOGY PROENGIN biological and chemical detection for the field (and real life) ROENGIN has developed biological and chemical warfare agents field detectors using flame spectrophotometry. The well-known and widely used AP2C has proven the capacity of that technology to be the most reliable on the field with the lowest false alarm rate and the simplest ease of use.
P
HANDHELD CHEMICAL DETECTOR AP4C New developments such as the AP4C have extended the capacity of that technology to include chemical warfare agents and toxic industrial material in a simultaneous mode. There is no limitation in number of gas detected by the AP4C. All nerve agents, all blister agents and all blood agents can be detected by AP4C within the requirements of response time and sensitivity of NATO recommendations. The AP4C has extended the range of chemicals that can be detected by Proengin chemical detectors. All dangerous compounds containing Sulfur, Phosphorous, Arsenic and/or HNO chemical bond can be detected in a simultaneous way. Of course, as for the AP2C, the AP4C has the capacity to work in very severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of gas and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemicals manufactured by terrorists that would not fit into traditional libraries of other detectors. Moreover AP4C will detect without upgrade new agents that will be developed in the future, as well as still not precisely known agents like Novichok agents (or non traditional agents). The response time is among the shortest on the market, but what makes the AP4C unique is the recovery time after a positive detection. The AP4C is therefore the chemical detector that has the highest level of availability of the field. AP4C has been derived on other detectors, dedicated to the following uses: • use on reconnaissance vehicles and battle tanks • use aboard naval ships • use for critical buildings and areas protection AP4C-V FOR USE ON RECONNAISSANCE VEHICLES AND BATTLE TANKS Based on the same detection technology and the same internal design, air entrance
has been designed to face high wind: AP4C-V is able to take in representative sample of the outside air, even with a direct cumulated wind and speed of 100 km/h. Data are shown on easy to understand control box or directly on the control computer of the vehicle. Sensitivity, short time to answer, low false alarm rate and short recovery time are the same as for AP4C, making AP4C-V the perfect detector for all kinds of reconnaissance missions and battle field exploration. AP4C-F FOR USE ABOARD NAVAL SHIPS At sea, ANEP-57 recommendations stipulate the availability of both fixed and mobile means of chemical detection. As AP4C is the perfect mobile chemical detector for contamination control, the use of AP4C-F provides the naval ships with reliable and efficient chemical detection. This ruggedised detector shows the same detection performances as the AP4C, with two supplementary features. It produces its consumable gas by electrolysis, thus lightening daily maintenance, and more than an alarm, is able to trigger the ventilation of the vessels, thus protecting the citadel from the chemical danger. The AP4C-F is able to be operated on open deck, with the same performances. AP4C-F FOR CRITICAL BUILDINGS AND AREAS PROTECTION National palaces, courts and parliaments are more and more equipped with fixed chemical detectors. AP4C-F, being able to be operated on naval citadels, is of course able to provide the same detection and protection on terra firma, for this kind of critical buildings. BIOLOGICAL AND CHEMICAL DETECTION The MAB is a new generation of biological field detector. MAB has the unique capacity of detecting and categorising biological particles with a proven extremely low false alarm rate and the unique capacity to discriminate dangerous or suspicious biological particles such as Anthrax spores from natural background. The very liable MAB has been designed to be mounted on track vehicles. It is insensitive to diesel exhausts. As all Proengin products, and thanks to the flame spectrophotometry technology, MAB is able to run in very severe outside conditions, shows the lowest false alarm rates (negative and positive) and requires reduced maintenance. It shows such a high level of availability. Government premises, courts and parliaments are also increasingly equipped with fixed chemical and biological detectors. AP4C-FB combines both chemical
detection as for the AP4C-F, and biological alarm as for the MAB. This detector may be associated with a radiological probe, featuring the all in one full CBRN detector. Images courtesy of JP. Lagiewski
FOR MORE INFORMATION Web: www.proengin.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
39
COUNTER TERRORISM
www.counterterrorbusiness.com
NEW LAUNCHES AT COUNTER TERROR EXPO Counter Terror Expo is the critically acclaimed, highly specialised event for those who are tasked with the demanding and complex role of delivering a robust defence against the threat posed from international terroris N AN AGE in which the threat from terrorism is dynamic and continually evolving, the effective sharing of knowledge is critical in providing a response. Counter Terror Expo, taking place 19-20 April, brings together the world’s foremost experts from government, armed forces, security services, law enforcement, and academia annually in order to share real-life experience, debate strategies, brainstorm issues, shape policy, and define effective counter terrorism measures. This is the only event to deliver a heavily researched, extremely relevant, and uniquely high level centerpiece conference, alongside extensive learning through the issue specific workshop programme. Counter Terror Expo is also supported by a world-beating showcase exhibition exposing the very latest technology and techniques available to professionals in this vitally important arena. Let’s take a look at what some of the exhibitors have to offer.
I
MARSHALLS Marshalls range of counter terrorism products – incorporating the unique RhinoGuard technology – has been successfully crash-tested in accordance with the PAS 68 specification for vehicle security barriers. Providing assured protection that meets your security, aesthetic and budgetary requirements, and better landscapes that we can all feel safer in.
G4S G4S Technology is pleased to launch the new Javelin Contactless Smart Card Access Control Reader at Counter Terror Expo 2011. The Javelin S884 reader can operate as a standard reader with versions of Symmetry Security Management software 6 and above, or as a fully functional, intelligent alarm keypad when used with Symmetry Homeland V7, the Symmetry Intrusion Management module and Symmetry M2150 multiNODE controllers. HARPER CHALICE Harper Chalice will be launching its new, low voltage version of the PulseSecure Protector for special high security applications. Visit their stand to find out more and to see a full range of perimeter security options for high security applications.
I-BODI TECHNOLOGY LTD i-bodi will be demonstrating its latest testing apparatus, the Respirator Testing Headform. It has been designed as a testbed for simulating the realistic movements and breathing routines of combat field operatives. At the stand the company will have a promotional video of some examples of test apparatus made to customers’ specifications. MAS ZENGRANGE LTD Launching at this year’s event will be the JANUS remote initiation system for shocktube initiation during Explosive Methods of Entry operations. This system can be fired both remotely or manually by a physical link. Visit the MAS Zengrange stand to learn more about this and other products on offer.
Counter Terror Expo is also supported by a worldbeating showcase exhibition exposing the very latest technology and techniques available to professionals in this vitally important arena
DE BEERS DEBTECH Launching at Counter Terror Expo 2011 will be the Docklock Secure Canister. This system is designed to facilitate the secure transfer and transportation of material of high value between processing stations in the process. De Beers DebTech will also be showing Scannex, a low dose X-ray body scanner that can produce a high-resolution digital image of the whole body in only ten seconds. FUTURE FIBRE TECHNOLOGIES Future Fibre Technologies (FFT), the global leader in fibre optic intrusion detection systems, will showcase its world leading perimeter intrusion detection systems (PIDS) Secure Fence™ and Secure Zone. Visit their stand to learn how these systems use proven, highly advanced fibre optic sensing technology to protect the perimeters of critical sites including airports, sea ports, country borders, government and military installations, and petrochemical facilities from unauthorised intrusions.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
41
(CP)TOP COVER
COVER WHEN YOU NEED IT MOST Insurance for the Private Security Industry Built on over 60 years experience insuring the military market • • • • • •
Worldwide cover Hostile Environments Bespoke Levels of Cover Personal Injury cover Personal Liability Medical Expenses / Repatriation cover
• Kidnap & Ransom cover • Loss of earnings cover in the event of temporary disablement • Professional Indemnity • Personal Possessions • Term Life
www.cptopcover.co.uk
COUNTER TERRORISM
www.counterterrorbusiness.com
OMNIGLOBE (EMEA) LTD OmniGlobe will be launching a CCTV Over Satellite solution that demonstrates the potential for VSAT networks to be used for counter terror applications. OmniGlobe will also be showing a carbon fibre flyaway antenna 1.2m Ku band to visitors to Counter Terror Expo. SELECTAGLAZE Delegates visiting Selectaglaze’s stand will be able to discuss the company’s range of security units, which have been fully tested and certified to provide protection against blast, physical and ballistic attack and 30 minute fire integrity rating. A comprehensive range of Selectaglaze’s free literature will also be available. STEATITE LTD Steatite introduces Via Sat, Advanced Tactical Manet for communications in the war against terror. CheetahNetTW-220 radios enable mobile and dismounted warfighters to reliably communicate in the worst RF environments using voice, video, data, and PLI communications, all at the same time. SYSTEMWARE EUROPE LTD SystemWare Europe Ltd will be launching its MyLook Biometric Facial Recognition System at this year’s Counter Terror Expo. They will also be showing their technical surveillance countermeasures equipment and remotely operated infra red camera system, as well as their biometric access control systems. Please visit their stand to learn more about them and their products. AEB (INTERNATIONAL) LTD Launching at this year’s show will be ASSIST4 Export Controls US EAR Module
and the ASSIST4 Complience. AEB will be handing out free posters that provide a comprehensive overview of US and EU export controls laws and a practical guide to managing every-day challenges. ALFA IMAGING S.A. Visit Alfa Imaging at Counter Terror Expo where they will be launching their ALFA2100 passive, real time, stand-off millimetre-wave imager for security screening. ARGON ELECTRONICS (UK) LTD At this year’s event Argon will be launching the latest Argon chemical and radiological detector simulation training systems including the PlumeSIM. Also at the show Argon will be sharing other chemical and radiological detector simulation training systems. BANNERBRIDGE PLC On show will be the new Fargo and Datacard ranges of ID card printers. These include the Fargo DTC1000 entry level printer and the DTC4500 printer laminatior used for printing and laminating ID cards with holographic overlaminates for additional card security. The Datacard CD range of direct to card printers will also be demonstrated on the Bannerbridge stand. Visitors to Counter Terror Expo can benefit from an additional 10 per cent discount for orders placed at the show. BUSINESSFORENSICS During the show BusinessForensics will present the complete BusinessForensics solution suite for homeland security and public safety. There will also be live demonstrations on how to monitor huge amounts of data in real time
and detect anomalies, taking into account the context of the transactions stored in the Forensic database. C2 MOBILE TOWERS LTD C2 Mobile Towers will be launching its new mobile elevating multi-use Visual Control Platform, which brings a new capability to today’s police, border and security forces. The C2 mobile elevating tower provides a multi-purpose cabin that can be as simple as an observation platform or a sophisticated command and control unit. CAMPBELL/HARRIS SECURITY EQUIPMENT CO. (CSECO) Visit the Campbell/Harris Security Equipment Company’s stand at this year’s show, where they will be launching the Buster K910B Contraband Detector and the CT-30 Contraband Team Inspection Kit. CELLCRYPT LTD Cellcrypt provides governmentgrade encryption of voice calls over standard mobile phones such as Nokia and BlackBerry® smartphones, ensuring important conversations remain confidential. CONSOLITE TECHNOLOGY LTD Consolite will be launching CERA, its exciting new technology for extracting fingerprints from spent cartridge cases. They will also be exhibiting its range of night vision goggle (NVG) compatible lighting products. Consolite is also presenting on this technology at the Night Vision Workshop during the show.
FOR MORE INFORMATION Web: www.counterterrorexpo.com
ECA GROUP – RESILIENCE THROUGH SECURITY HE ECA GROUP specialises in the protection of government and commercial businesscritical information and critical national infrastructure. We are specialists in HMG Accreditation for IA and Commercial Business Assurance. Our track record: Delivered secure UK Government Gateway infrastructure; built and managed UKOnline; helped design the national fire and rescue control centres; Network Rail Technical Design Authority; reviewed UK CNI data centres; provided national ID card programme security/ integrity team; architecture and security advisors to the Trusted Borders Programme with a significant portfolio of information assurance, business assurance and business continuity/disaster recovery assignments in national institutions and the commercial
T
technology delivering resilient, costeffective and sustainable business benefit utilising secure cloud, virtualisation and open source intelligence. Leaders in business assurance, business continuity and disaster recovery, we drive legal, regulatory and best practice requirements to ensure business optimisation and resilience. We remain in the forefront of new technology and policy development; offering products and methodologies which provide solutions that deliver cost effective, sustainable business benefit. Our ethos: resilience through security. arena, including authoring the latest government and banking industry guidelines for the protection of data centres. We don’t stand still: Our Innovation Lab sifts and evaluates emerging
FOR MORE INFORMATION Tel: 0118 9767544 E-mail: cmr@ecalimited.co.uk Web: www.ecalimited.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
43
RUGGED TECHNOLOGY FOR EXTREME ENVIRONMENTS • RUGGED PDAs • RUGGED LAPTOPS • RUGGED TABLET PCs • RUGGED TOUCH TABLES • RUGGED SMARTPHONES • RUGGED PERIPHERALS • RUGGED PRINTING SOLUTIONS
As mobile computing evolves, so do we...
L106 19 - 20 April 2011 Olympia
Live demonstrations of the very latest Rugged Mobile Technology including;
London
• ALGIZ 7 Tablet PC • ALGIZ XRW Netbook • NAUTIZ X3 Smartphone
• WATER & DUST PROOF • DROP / SHOCK / VIBRATION • EXTREME TEMPERATURES • SALT FOG • • WIDE INTEROPERABILITY • BUILT IN GPS • SUNLIGHT READABLE • TEMPEST OPTIONS • • EXTENDED BATTERY LIFE • CUSTOMISATION SERVICE • BESPOKE CONNECTORS • • DESIGN ENGINEERING • ELECTRONICS MANUFACTURING • ENVIRONMENTAL TESTING •
TELEPHONE
01865 892 050 EMAIL: sales@blazepoint.co.uk
WEB: www.blazepoint.co.uk
Blazepoint Limited, 2 Tower Estate, Chalgrove, Oxford OX44 7XZ
COUNTER TERRORISM
www.counterterrorbusiness.com
RUGGED TECHNOLOGY Mountaineering association selects Blazepoint to support high-altitude mountaineering exercise N OCTOBER 2010, an 11 strong expedition, from the Army Mountaineering Association, travelled to India with the aim of conducting exploratory mountaineering in the Himachal Pradesh region and summiting several unclimbed peaks. Commenting on the area Major Matt Hing, expedition leader, said: “The Himachal Pradesh area of northern India offers vast mountaineering opportunities. There are tens if not hundreds of unclimbed peaks and unexplored glaciers that all make excellent mountaineering expeditions.” The team was equipped and prepared to climb alpine style throughout. This minimised the expedition’s impact on these untouched mountains and fitted with the ethics of the team. Employing alpine techniques of moving light and fast on unclimbed peaks in the Himalaya required a level of competence, confidence and a state-of-mind that allowed for that additional level of commitment. The expedition had a robust communications plan in order to keep in touch with home and also in case of emergencies. In addition, support was provided by the India-based RIMO expeditions. The wish to use an India-based company was a critical factor in the planning to ensure that any fees paid go to India. BGAN Satellite Antennas in conjunction with Blazepoint’s ndura RUGGED laptops facilitated e-mail, telephony, the Blog and Wx updates. The antennas provided with free air time by Thales UK, produced an outstanding performance and future expeditions must continue to comms recce potential campsites to ascertain whether the BGAN can ‘hit’ the satellites in a geostationary orbit over the equator. Maj. Matt Hing, exhibition leader,
I
commented: “Provided by Blazepoint, the ruggedised laptops sustained plenty of knocks and unavoidable ill-treatment during transit and on the mountain. The laptops handled the trauma with ease. They continued to perform to an optimal level in temperatures as low as -20°C for over five weeks, providing a quality service for internet access, word processing and information exchange. Exercise TIGER KARAKORAM chose these laptops based on robustness, endurance and the ability to perform in an arduous environment, they did not disappoint.” EVOLVING MOBILE TECHNOLOGY The latest release of the ndura RUGGED Convertible Laptop is loaded with the Intel® Core™ i7 processor to deliver intelligent performance for demanding tasks, such as working with digital video and graphics intense applications. Including memory bandwidth that accelerates workloads, laptops with Intel Core i7 mobile processors provide hardware-based technologies for rich, HD content creation, video encoding and editing, multitasking and more. Other enhancements to this model include an IP65 fanless design and 1,000 nit sunlight readable multi touch convertible screen. Blazepoint is also working on the ndura RUGGED Interactive Touch Table, aimed at mission planning, incident debriefing and crisis management applications. This new deployable device comprises of a rugged 42” multi touch screen, housed in an IP65 rugged case. Incorporating the latest rugged LCD technology, this mobile mapping solution has an available resolution of up to 1920 x 1080 and is designed as a table mounted display with a toughened IP65 front screen. Suitable for use in outdoor sheltered
applications, the solution is also available with alternative mounting systems. A recent alliance with the Handheld Group, supplier of rugged off the shelf handheld mobile computers, permits Blazepoint to deliver a wider range of state of the art rugged smartphone’s, PDAs, tablet PCs and laptops. Christoffer Lander, business development director of Handheld Europe, commented: “We are very excited about the possibilities in our partnership with Blazepoint. Their experience in custom rugged solutions combined with our products is truly a perfect match. We are the fastest growing company in the rugged computer industry and this partnership will help us leverage our business even further.” “By combining Handheld’s ruggedised devices with our existing ndura RUGGED portfolio of products and our extensive experience in supplying to military, government and commercial markets, this partnership opens up a wide range of possibilities for both Blazepoint and Handheld in the UK and Ireland,” commented Rob Keywood, sales & marketing director for Blazepoint. Designed to the highest industry standards, the ndura range of mobile computers offer exceptional protection from dust and water ingress, extreme temperatures, excessive vibrations and even accidental drops. These features, combined with extensive battery life, lightweight design, flexible vehicle docking systems and the durability to stay operational in the harshest environments, make the ndura range of mobile computers ideally suited for continued field use.
FOR MORE INFORMATION The very latest rugged mobile computers will be showcased at the forthcoming Counter Terror Expo 2011. For further information visit www.blazepoint.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
45
A M AT T E R O F N AT I O N A L S E C U R I T Y
The new RAPTOR RXi empowers TSCM operators with extended capabilities To learn more, visit Winkelmann.co.uk A M AT T E R O F N AT I O N A L S E C U R I T Y
NEW TOOLS FOR NEW THREATS
RAPTOR RXi Countermeasure Receiver Packed with these “must have” features: o Full span spectrum analyzer display o Waterfall display o Ultra wideband receiver o High resolution touch screen o Remote operation by means of Ethernet o Sweeps 26GHz in less than 4 seconds
COUNTER TERROR EXPO
www.counterterrorbusiness.com
GLOBAL COUNTER TERRORISM DAY 1 – TUESDAY 19 APRIL 2011 08.00 – 08.40 COFFEE AND REGISTRATION
08.40 – 08.45 SPONSOR WELCOME
08.45 – 09.00 CHAIRPERSON’S WELCOME AND OPENING REMARKS Margaret Gilmore, Writer and Broadcaster, and Senior Research Fellow, RUSI, and former BBC Home Affairs Correspondent
PREVENTING AND COMBATING GLOBAL TERRORISM – 10 YEARS ON FROM 9/11
09.00 – 09.25
TACKLING TERRORISM – ACHIEVING NATIONAL SECURITY
11.00 – 11.25
UK NATIONAL SECURITY – THE THREAT PICTURE Charles Farr, Director General, Office for Security and Counter Terrorism
11.25 – 11.50
GLOBAL INFLUENCES ON THE NATIONAL TERRORISM PICTURE Admiral the Right Honourable Lord West of Spithead GCB DSC
11.50 – 12.15
POLICING THE TERRORIST THREAT Assistant Commissioner John Yates, Head - Specialist Operations, Metropolitan Police Service
COUNTER TERRORISM STRATEGIES FOR AN UNSTABLE AND UNCERTAIN WORLD Mr Patrick Mercer OBE MP for Newark and a Member of the All-Party Parliamentary Group on Transatlantic and International Security and the Tackling Terrorism All Parliamentary Group
12.15 – 12.40
09.25 – 09.50
12.40 – 14.00
EU COUNTER TERRORISM – MAIN ACHIEVEMENTS AND FUTURE CHALLENGES Commissioner Cecilia Malmström, European Commissioner for Home Affairs
09.50 – 10.15
PREVENTING AND COMBATING TERRORISM – A GLOBAL COUNTER TERRORISM STRATEGY Mr Muhammad Rafiuddin Shah, Counter Terrorism Implementation Task Force (CTITF) and Director, CTITF Office, United Nations, Acting Officer
10.15 – 10.40
COUNTERING TERRORISM IN AN ERA OF GLOBAL INTEGRATION Mr Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO
10.40 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
THE FUTURE FOR UK COUNTER TERRORISM LEGISLATION – A PROSECUTOR’S PERSPECTIVE Susan Hemming, Head of Counter Terrorism Division, Crown Prosecution Service (CPS)
LUNCH AND EXHIBITION VISIT
IMPACT OF THE ENDURING TERRORIST THREAT
14.00 – 14.30
THE THREAT FROM ALIGNMENTS WITH AL QAEDA Dr Lindsay Clutterbuck, Research Leader, RAND Europe
14.30 – 15.00
15.30 – 16.00
TEA AND COFFEE AND EXHIBITION VISIT
CHALLENGING AND DEFENDING AGAINST HOME GROWN TERROR
16.00 – 16.25
COUNTERING VIOLENT EXTREMISM – THE CALIFORNIA EMERGENCY MANAGEMENT AGENCY APPROACH Chief Jerry Adams, Public Safety Liaison, California Emergency Management Agency
16.25 – 16.50
THE RENAISSANCE IN DISSIDENT REPUBLICAN TERRORISM IN NORTHERN IRELAND Professor Richard English, Professor of Politics, University of St Andrews, and Author of Terrorism: How to Respond (2009)
16.50 – 17.15
HOW, WHERE, AND WHY TERRORISM OCCURS – THE ROOT CAUSES OF TERRORISM IN THE UK Jamie Bartlett, Head of the Violence and Extremism Programme, DEMOS
17.15 – 17.40
UNDERSTANDING RADICALISATION AND POLITICAL VIOLENCE Dr John Bew, Co-Director, International Centre for the Study of Radicalisation and Political Violence (ICSR)
17.40
CLOSE AND EVENING DRINKS RECEPTION Register for the conference at www.counterterrorexpo.com/register11
USING TECHNOLOGY TO ADDRESS CONSTANTLY EVOLVING THREATS Neil Stansfield, Head of the Science and Technology Unit, Office for Security & Counter Terrorism and Mike Shaw, Director, Thales UK
15.00 – 15.30
DELIVERING SECURITY AND RISK CONTROL Dr. Dave Clemente, International Security Programme, Royal Institute of International Affairs
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
47
COUNTER TERROR EXPO
www.counterterrorbusiness.com
CRITICAL NATIONAL INFRASTRUCTURE – PROTECTION, SECURITY, AND RESILIENCE DAY 1 – TUESDAY 19 APRIL 2011 08.00 – 08.45 COFFEE AND REGISTRATION
08.45 – 09.00 CHAIRPERSON’S WELCOME AND OPENING REMARKS Steve Cummings, Deloitte, and Former Director, CPNI
CRITICAL INFRASTRUCTURE PROTECTION
09.00 – 09.20 CRITICAL INFRASTRUCTURE PROTECTION – AN INTEGRAL PART OF NATIONAL SECURITY Centre for the Protection of National Infrastructure (CPNI)
09.20 – 09.40
CORPORATE RESILIENCE AND THE ROLE OF THE PRIVATE SECTOR IN SECURING CRITICAL INFRASTRUCTURE Stuart Sterling, Assistant Director – Corporate Resilience, Civil Contingencies Secretariat, Cabinet Office
09.40 – 10.00
DEALING WITH FAILURES OF CRITICAL INFRASTRUCTURES AND SERVICES Cate Pye, Director, Defence and Security Practice, Ernst and Young LLP
10.00 – 10.30 ROUND TABLE
10.30 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
11.00 – 11.20
UNDERSTANDING THE CYBER DIMENSION Wilbur Pires, Head of Security Practice, UK and Ireland, Alcatel-Lucent
11.20 – 11.40
RESILIENCE IN CONVERGED NETWORKS David Spinks, Operational Risk Management Specialist & Chairman, CSIRS
11.40 – 12.00 VULNERABILITIES OF CRITICAL INFORMATION AND CONTROL INFRASTRUCTURES David Lacey, UK Director of Research, ISSA UK
12.00 – 12.30 ROUND TABLE
12.30 – 14.00 LUNCH AND EXHIBITION VISIT
SECURING CRITICAL INFRASTUCTURE
14.00 – 14.20
15.30 – 16.00
TEA AND COFFEE AND EXHIBITION VISIT
16.00 – 16.20
ADAPTING TO THE IMPACTS OF CLIMATE CHANGE Lord John Krebs, Chair of the Adaptation Sub-Committee, Committee on Climate Change (CCC)
16.20 – 16.40 WEATHERING THE STORM – DEALING WITH ADVERSE WINTER WEATHER IN THE UK Councillor Peter Box, Leader of Wakefield Council
16.40 – 17.00
NATURAL HAZARDS – RISK AND DISASTER REDUCTION Dr Stephen Edwards, Deputy Director, UCL Institute for Risk and Disaster Reduction and Development Manager, Aon Benfield UCL Hazard Research Centre
SECURING CRITICAL INFRASTRUCTURE FROM DISRUPTIVE TECHNOLOGIES Dr Paul Kearney, Security Futures Practice, BT Innovate and Design
17.00 – 17.30
14.20 – 14.40
CLOSE AND EVENING DRINKS RECEPTION
ENSURING THE SECURITY AND RESILIENCE OF CRITICAL ASSETS AND NETWORKS Professor Jim Norton, Independent Director and Policy Adviser
ROUND TABLE
17.30
Register for the conference at www.counterterrorexpo.com/register11
14.40 – 15.00
SUPPLY CHAIN AND INFRASTRUCTURE SECURITY Dr Helen Peck, Senior Lecturer, Commercial and Supply Chain Risk, Department of Management and Security, Cranfield University
15.00 – 15.30 ROUND TABLE
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
49
The Complete Product Development Partner Shore Design, pride ourselves on customer satisfaction and quality design development. Our customers all benefit from our direct no nonsense approach to product development, verification / validation and extensive knowledge of global manufacturing process capabilities. Over many years this has meant multiple repeat projects with our customers delivering a very rapid ‘return on investment’ that in many cases promotes our clients ahead of the competition; these clients include small start up businesses all the way up to well known multi-nationals. All our developments are carried out under ISO 9001.
Who are Shore Design A creative, professional design consultancy with a proven track record in product development. • A blend of innovation, industrial design and mechanical engineering skills. • An experienced team of 22 designers, engineers and manufacturing consultants. • Experience in designing, testing and delivering numerous successful product solutions over many years. What do Shore Design Offer A complete product design partnership with flexible, tailored and cost effective solutions. • Experience in all aspects of new product design development, with core expertise in: • Military Specific Requirements & Ruggedised Design to IP68 • Avionics Product Design • Industrial & Commercial Applications • Medical Device Design • “Design to Cost” & “Intelligent Design” – A quality design solution does not mean additional cost. • An opportunity to increase market share whilst lowering your unit costs. A two fold increase in your profit margin. In-house 3D Rapid Prototyping Our service can produce high quality models in ABSplus plastic directly from our CAD data in a matter of hours, whilst ensuring customer confidentiality is maintained. Typical Applications Include: • Proof of Concept
• Ergonomic Models
Quality Assured Shore design are an ISO 9001 & ISO 13485 accredited company.
• Appearance Models
• Functional Testing
Contact details: Shore Design Consultancy Tel: + 44 131 554 2626 Email: info@shore-design.co.uk
COUNTER TERROR EXPO
www.counterterrorbusiness.com
EMERGENCY SERVICES
DAY 1 – TUESDAY 19 APRIL 2011 EMERGENCY RESPONSE – CAPABILITY AND INTEROPERABILITY
11.00 – 11.30
STRATEGIC (GOLD) COMMAND INTEROPERABILITY AT A MAJOR TERRORIST INCIDENT Andy Beale, Deputy Chief Fire Officer, Nottinghamshire Fire and Rescue
11.30 – 12.00 08.00 – 08.45
FIRST RESPONDER COMMUNICATIONS AND INTEROPERABILITY – 2011 AND 2012 Rob Walley, Chairman, Multi-Agency Airwave User Group (MAAUG)
COFFEE AND REGISTRATION
08.45 – 09.00
CHAIRPERSON’S WELCOME AND OPENING REMARKS David Buckenham, Director – Paladin Crisis Management Ltd, Senior Consultant – Resilience Centre, Cranfield University, and Registrar/Membership Secretary, Institute of Civil Protection and Emergency Management
THE IMPACT OF TERRORISM ON THE EMERGENCY SERVICES
09.00 – 09.30
THE IMPACT OF TERRORISM ON POLICING AND SECURITY Keith Weston QPM MA, Senior Research Fellow in Counter Terrorism, Security Studies Institute, Department of Management and Security, Cranfield University
09.30 – 10.00
EMERGENCY RESPONSE IN LARGE-SCALE DISASTERS Deputy Assistant Commissioner Bernie Higgins, Head of Special Operations Group, London Fire Brigade
10.00 – 10.30
UNDERSTANDING AND RESPONDING TO THE THREAT OF TERRORISM Dr Dave Sloggett, Centre for Defence Studies, Department of War Studies, King’s College London
10.30 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
12.00 – 12.30
HOSPITAL CBRN RESPONSE IN A MEGAPOLIS ENVIRONMENT Colonel Galatas Ioannis MD, MC, Head, Department of Asymmetric Threats, Intelligence Analysis Branch, Joint Military Intelligence Division, Hellenic National Defence General Staff, Greece
12.30 – 14.00
RESPONDING TO MASS CASUALTY EVENTS
16.00 – 16.30
AMBULANCE HAZARDOUS AREA RESPONSE TEAM (HART) – A FUNDAMENTAL PART IN THE NATIONAL RESILIENCE INFRASTRUCTURE Russ Mansford, Strategic Ambulance Advisor, Emergency Preparedness Division, Department of Health
16.30 – 17.00
RESPONDING TO CHEMICAL AND BIOLOGICAL DELIBERATE RELEASE Dr Richard Amlôt, ORCHIDS Technical Leader, Centre for Emergency Preparedness and Response, Health Protection Agency
17.00 – 17.30
PLANNING FOR MASS CASUALTY TRIAGE Jim Sideras RN, MSN, MIFireE, CFO, CMO, Division Chief, Sioux Falls Fire Rescue
17.30
CLOSE AND EVENING DRINKS RECEPTION
LUNCH AND EXHIBITION VISIT
Register for the conference at www.counterterrorexpo.com/register11
RESPONDING TO THE THREAT – MULTI-AGENCY RESPONSE
14.00 – 14.30
MULTI-AGENCY COUNTER TERROR OPERATIONS Tony Shryane, CBRNE Manager, Emergency Preparedness Team, North West Ambulance Service NHS Trust
14.30 – 15.00
JOINT OPERATIONS AT BOMB MAKING FACTORIES Chris Case, Group Manager, Merseyside Fire and Rescue, and Vice President of the Institute of Explosives Engineers
15.00 – 15.30
TACTICAL EMERGENCY MEDICAL RESPONSE Professor Andy Newton, South East Coast Ambulance Service NHS Trust, Professor of Paramedic Practice, University of Surrey
15.30 – 16.00
TEA AND COFFEE AND EXHIBITION VISIT
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
51
COUNTER TERROR EXPO
www.counterterrorbusiness.com
DESIGNING-OUT TERRORISM DAY 1 – TUESDAY 19 APRIL 2011 08.00 – 08.45
SECURITY AND PROTECTION FOR BUILDING ASSETS OCCUPANTS
COFFEE AND REGISTRATION
08.45 – 09.00
16.00 – 16.30
CHAIRPERSON’S WELCOME AND OPENING REMARKS Terry Brown, Vice President, The Association of Consultant Architects (ACA) and Consultant, GMW Architects
USING DESIGN TO RESPOND TO THE TERRORIST THREAT
09.00 – 09.30
KEYNOTE: COMBATING THE TERRORIST THREAT VIA PROTECTIVE SECURITY MEASURES Ruth Reed, President, RIBA
09.30 – 10.00
DESIGNING-IN PROTECTIVE SECURITY MEASURES TO NEW BUILDINGS AND PLACES Government Security Advisor, Centre for the Protection of National Infrastructure (CPNI)
10.00 – 10.30
SECURE CITIES James Le Mesurier, Urban Planning Practice, Good Harbor Consulting
10.30 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
URBAN RESILIENCE AND NATIONAL SECURITY – THE ROLE FOR DESIGN
11.00 – 11.30
COUNTERING VIOLENT EXTREMISM IN URBAN ENVIRONMENTS THROUGH DESIGN Chris Tomlinson, Principal Security Consultant, ARUP
11.30 – 12.00
DESIGNING-OUT RADICALISATION; DESIGNING-IN COMMUNITY COHESION Dr Ralf Brand, Senior Lecturer in Architectural Studies, The University of Manchester
SECURITY STANDARDS AND THE BUILT ENVIRONMENT Richard Flint, Physical Security Certification Scheme Manager, Loss Prevention Certification Board (LPCB), BRE Global Limited
12.00 – 12.30
DESIGNING-IN URBAN RESILIENCE Adrian Griffiths, Director, Chapman Taylor
16.30 – 17.00
LUNCH AND EXHIBITION VISIT
INTERNAL AND EXTERNAL BUILDING PROTECTION FOR THE HOTEL AND CASINO INDUSTRY Detective Kenneth Mead, Las Vegas Metropolitan Police Department (LVMPD)
13.55 – 14.00
17.00 – 17.30
12.30 – 13.55 CHAIRPERSON’S AFTERNOON WELCOME Jolyon Drury, Director, Surge Logistics Consultants
ENSURING RESILIENCE IN THE FACE OF MULTIHAZARD THREATS
14.00 – 14.30
BUILDING PROTECTION – GETTING THE PRINCIPLES RIGHT Patrick Mann, Section Manager – Blast Engineering, ABS Consulting Ltd
17.30
CLOSE AND EVENING DRINKS RECEPTION Register for the conference at www.counterterrorexpo.com/register11
DESIGN-IN COUNTER TERRORISM – A QUESTION OF PROPORTIONALITY Rachel Briggs, Senior Research Fellow, National Security and Resilience Department, RUSI and Director, Analysts for Security
14.30 – 15.00
PROTECTING PUBLIC PLACES AND SPACES Steve Harre-Young, Doctoral Researcher, Loughborough University
15.00 – 15.30
THE SPECIFICATION OF COUNTER TERRORISM MEASURES IN THE DESIGN, PROCUREMENT, AND OPERATION OF CORPORATE REAL ESTATE Mark Whyte, Director, Security and Explosion Effects, Carillion (TPS)
15.30 – 16.00
TEA AND COFFEE AND EXHIBITION VISIT
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
53
MAINTAINING YOUR SECURITY... Alpha 3 Manufacturing consolidates three manufacturing businesses under one organisation: CCS Electronics, CTL Manufacturing and DEM Manufacturing. These three facilities provide a UK-wide coverage and an impressive capability in value-added manufacturing. This ranges from cable harness assembly and wiring harnesses, to custom enclosures, as well as all types of contract electronics manufacturing and production of specialist EMC EMI filters and aluminium enclosures. In partnership with some of the world’s market leaders in the Security and Communications industry, Alpha 3 manufacture a wide range of cable harness and electronic control assemblies for the following applications: n n n n n n n
Base station electronics Global System for Mobile Communications (GSM) Military antenna RF and satellite communications Satellite navigation, GPS and tracking equipment Traffic management equipment Video surveillance and security equipment
In addition to the above, Alpha 3 Manufacturing is the solution partner of choice for many British companies supplying high-end electronics, telecom and power distribution products, into the following markets: n n n n
Aerospace Military Renewable Energy Transportation
Alpha 3 Manufacturing’s range of enclosures, branded Deltron, are manufactured from either ABS or aluminium. All enclosures can be customised and finished to your exact requirements including machining, surface treatment, nylon and powder coating, and component assembly. The Deltron Enclosure range has been certified to IP65, IP66, IP67 and IP68, therefore providing exceptional protection against dust and water ingress. For added electrical performance, the use of our EMI gasket provides excellent RFI/EMI protection.
...WITH A RELIABLE CONNECTION Tel: +44 (0) 1724 273200 Web: www.alpha3manufacturing.com
COUNTER TERROR EXPO
www.counterterrorbusiness.com
GLOBAL COUNTER TERRORISM DAY 2 – WEDNESDAY 20 APRIL 2011 THE FIGHT TO PREVENT RADICALISATION
08.00 – 08.45 COFFEE AND REGISTRATION
14.00 – 14.30
08.45 – 09.00
PROJECT SAMOSSA – FOILING A VIOLENT TERRORISM ATTACK Chief Superintendent Serge Therriault, Royal Canadian Mounted Police
CHAIRPERSON’S WELCOME AND OPENING REMARKS Dr Dave Sloggett, Centre for Defence Studies, Department of War Studies, King’s College London
14.30 – 15.00 HOW BIG IS THE THREAT OF HOME GROWN TERROR? Dr Brooke Rogers, Lecturer in Risk and Terror, Department of War Studies, King’s College London
TERRORIST THREAT
09.00 – 09.25 SAFEGUARDING CITIZENS AND COUNTERING TERRORISM Lord Carlile of Berriew Q.C.
09.25 – 09.50
INTERAGENCY COORDINATION FOR COUNTER IED ATTACK THE NETWORK Brigadier General Michael H. Shields, United States Army, Deputy Director, Operations & Requirements, Joint IED Defeat Organization
09.50 – 10.15
COULD 7/7 HAVE BEEN PREVENTED? Margaret Gilmore, Writer and Broadcaster, and Senior Research Fellow – RUSI, and former BBC Home Affairs Correspondent
10.15 – 10.40
CYBER TERRORISM IN UNGUARDED CORRIDORS Dr Paul Killworth, Head of Cyber Strategy, Government Communication Headquarters (GCHQ)
10.40 – 11.00
CHALLENGING TERRORISM IN THE INFORMATION AGE
11.00 – 11.20
CELL PHONE HACKING – THE TERRORIST’S LATEST PLAYGROUND Nigel Stanley, Practice Leader – Security, Bloor Research
11.20 – 12.00
SECURING CYBERSPACE IN AN ERA OF GLOBAL CONNECTIVITY Edward P Gibson, CISSP, Director, PricewaterhouseCoopers Global, former FBI Agent – US Embassy London and former Chief Cyber Security Advisor, Microsoft (UK) Ltd
TERRORISM AND LARGE SCALE EVENTS
12.00 – 12.20
THE SECURITY LEGACY OF THE 2012 OLYMPIC AND PARALYMPIC GAMES Ian Quinton, Olympic Security Directorate, Head of Security, Architecture, and Design
TEA AND COFFEE AND EXHIBITION VISIT
ADDRESSING EXISTING AND EMERGING THREATS
15.00 – 15.30
TACKLING TRANS-BORDER CRIME Jean Dominique Nollet, Head of Unit - Operations Department, Europol (The European Police Office)
15.30 – 16.00 THE FUTURE OF CBRNE RELATED TERRORISM Chief Inspector Patricia Foy, UK Police National CBRN Centre
16.00 – 16.30
AL-QAEDA AND THE POWER OF PROPHECY Justin Crump, Chief Executive Officer, Sibylline
16.30 CLOSE
Register for the conference at www.counterterrorexpo.com/register11
12.20 – 12.40
TERRORISM THREATS AT THE OLYMPICS – FORECASTS FOR LONDON 2012 AND SOCHI 2014 Simon Sole, Chief Executive Officer, Exclusive Analysis
12.40 – 14.00 LUNCH AND EXHIBITION VISIT
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
55
COUNTER TERROR EXPO
www.counterterrorbusiness.com
CRITICAL NATIONAL INFRASTRUCTURE – PROTECTION, SECURITY, AND RESILIENCE
DAY 2 – WEDNESDAY 20 APRIL 2011 10.30 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
ENERGY SECURITY
11.00 – 11.20 IMPACT OF CLIMATE CHANGE ON ENERGY SECURITY Alan Simpson, Energy Advisor, Friends of the Earth
08.00 – 08.45 COFFEE AND REGISTRATION
08.45 – 09.00 CHAIRPERSON’S WELCOME AND OPENING REMARKS Steve Cummings, Deloitte, and Former Director, CPNI
RISK AND DISASTER RESPONSE AND MANAGEMENT
09.00 – 09.20
TESTING THE UK RESPONSE TO LARGE SCALE DISASTERS Chief Fire Officer Roy Wilsher OBE, Hertfordshire Fire and Rescue Service
09.20 – 09.40
DEALING WITH EXTREME WEATHER EVENTS Darius Campbell, Deputy Director of the cross-Government Adapting to Climate Change Programme
09.40 – 10.00
DEALING WITH AND MANAGING RISKS AND HAZARDS John Adams, Emeritus Professor, University College London
10.00 – 10.30 ROUND TABLE
11.20 – 11.40
ENERGY SUPPLY CONTINUITY AND SECURITY Tim Cullen, Energy Resilience, Department of Energy and Climate Change
11.40 – 12.00
SECURING ENERGY SUPPLY FROM VULNERABILITIES Dr Pierre Noël, Research Associate and Director of Energy Policy Forum, Judge Business School, University of Cambridge
12.00 – 12.30
14.40 – 15.00
LEARNING FROM ‘HIGH RELIABILITY ORGANISATIONS’ Malcolm Baker, Independent Risk Adviser
15.00 – 15.20
REDUCING THE INTERNAL THREATS TO YOUR ORGANISATION Philip Hannah, Consultant, Aldersgate Partners
15.20 – 16.00 ROUND TABLE
ROUND TABLE
12.30 – 14.00
16.00 CLOSE
LUNCH AND EXHIBITION VISIT
Register for the conference at www.counterterrorexpo.com/register11
PROTECTING ORGANISATIONS
14.00 – 14.20 BUILDING A SECURE CULTURE IN ORGANISATIONS Centre for the Protection of National Infrastructure (CPNI)
14.20 – 14.40
BUILDING PEOPLE AND ORGANISATIONAL RESILIENCE PRIOR TO A CRISIS Dr Nicole Lipkin, Psy.D M.B.A., Organisational Consultant and Leadership Strategist, Equilibria Leadership Consulting
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
57
COUNTER TERRORISM
www.counterterrorbusiness.com
EXHIBITION SOLUTIONS DELIVERED BEYOND YOUR EXPECTATIONS Z
AREBA SECURITY is a leading global provider of customised perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • utilities • correctional or prison facilities • government or military installations • industrial/commercial property • airports, marinas, auto dealerships • critical infrastructure • ports and refineries • transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates. This means security guards and/ or local authorities can respond to a verified alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is the ideal solution. It is an electric fence system that combines a barrier with
intrusion sensing and shock deterrent to prevent security breaches. The Induced Pulse® system is ideal for correctional or high security installations and has a variety of head end control options available. System features: • Proven effective in hundreds of miles of perimeter applications worldwide • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customise to any zone length or wire array • Standalone installation or mount on existing fence, roof or wall tops • PC Windows based user interface
• Graphical mapping overlay • Customer friendly GUI • Interfacing with most common data bus systems • Integration with CCTV systems • Integration with access control systems • Listed in the UK Secure By Design (SBD) product list Zareba Security has designed and engineered perimeter fence systems for satisfied customers around the globe. We have sales and technical staff based in the UK. We also have our own UK based in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their site. Zareba Security only sells to approved installers. We offer in house training courses to Lantra standards.
FOR MORE INFORMATION Zareba Security, 8 Lands End Way Oakham, Rutland LE15 6RF, UK Tel: +44 (0)1572 722558 Fax: +44 (0)1572 757614 Web: www.ZarebaSecurity.com
Helping you mask for less! • Green Polyester Tapes & Discs • Silicone Caps & Plugs • Kapton Tape & Discs • Protective Clothing • 2000 Paper Masking • 1500 Paper Masking • Sandblasting • Lead Foil • More Items Available
Welcome to The Masking Shop, manufacturer, stockist and distributor of the largest masking range online. We guarantee easy to order quality products at sensible prices; fast delivery services, no carriage charges on orders over £50.When viewing our web-site you will find all the right products to solve your masking problems.You can purchase just one roll of tape and small quantities of discs with no MOQ’s across our product range.
T: 01268 762066 E: sales@themaskingshop.co.uk W: www.themaskingshop.co.uk 58
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
COUNTER TERROR EXPO
www.counterterrorbusiness.com
CYBER SECURITY AND ELECTRONIC TERRORISM
DAY 2 – WEDNESDAY 20 APRIL 2011 08.00 – 08.40 COFFEE AND REGISTRATION
08.40 – 08.45 SPONSORS WELCOME Raytheon UK
08.45 – 09.00 CHAIRPERSON’S WELCOME AND OPENING REMARKS Andrew Rogoyski, Defence Strategy & Solutions and Chair of Intellect’s Cyber Security Group, Intellect
TERRORISM IN THE DIGITAL AGE
09.00 – 09.30
DELIVERING THE CYBER SECURITY STRATEGY Capt Ian McGhie RN, Office of Cyber Security, Cabinet Office
09.30 – 10.00
TERRORISM AND NEW MEDIA Dr Ben O’Loughlin, Co-Director, New Political Communication Unit, Royal Holloway, University of London
10.00 – 10.30
MONITORING CYBER SPACE FOR DANGEROUS, CRIMINAL, OR FRAUDULENT ACTIVITY Richard Nethercott, Global Managing Director, Logica
10.30 – 11.00
12.30 – 14.00 LUNCH AND EXHIBITION VISIT
14.00 – 14.50
SECURING CYBERSPACE IN AN ERA OF GLOBAL CONNECTIVITY Edward P Gibson, CISSP, Director PricewaterhouseCoopers Global, former FBI Agent – US Embassy London and former Chief Cyber Security Advisor, Microsoft (UK) Ltd
16.05 – 16.30 IMPLEMENTING NATIONAL LAWFUL INTERCEPTION PLATFORMS FOR INTELLIGENCE AND COUNTER TERRORISM Oisín Fouere, Special Projects Advisor, Analysys Mason Limited
16.30 CLOSE
14.50 – 15.15
SECURING COMMUNICATIONS Nader Henein, Security Advisory, BlackBerry Security Group, Research in Motion
TEA AND COFFEE AND EXHIBITION VISIT
THREAT AWARENESS
11.00 – 11.40
THE CONTEMPORARY TERRORIST AND THE INTERNET Dr Maura Conway, School of Law and Government, Dublin City University
11.40 – 12.30
MOBILE AND SMARTPHONE VULNERABILITIES John Bayliss, Director, Communications Risk Management (CRM)
15.15 – 15.40
ASYMMETRIC WARFARE IN THE INFORMATION AGE Dr Fred Mpala, University of East London
EXPLOITING TECHNOLOGY TO DEFEAT TERRORSIM
15.40 – 16.05
EXPLOITING NEW TECHNOLOGY AND INNOVATION FOR DETECTING TERRORIST ACTIVITIES Dr Eric Atwell, Senior Lecturer, School of Computing, Leeds University
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
59
COUNTER TERRORISM Vale Sec Ad 287x95mm C:Layout
1
16/2/11
18:06
Intuitive Integrated Security Systems
Mission:
Detect & Protect Vale Security Solutions are specialists in the provision of Fully Integrated Perimeter Intruder Detection, CCTV Surveillance & Intelligent Access Control Systems With over 30 years experience, Vale Security Solutions Ltd will take you from project conception to completion with our full consultancy, design, construction, commissioning and maintenance service, uniquely tailored to your individual security requirements
Vale Security Solutions Ltd
Tel: +44 (0) 1386 443588 info@valesecuritysolutions.co.uk • www.valesecuritysolutions.co.uk
60
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.counterterrorbusiness.com
Page 1
VALE SECURITY SOLUTIONS – OVER 30 YEARS OF EXPERIENCE IN PERIMETER SECURITY
V
ALE SECURITY SOLUTIONS Limited has over 30 years’ experience in the installation of perimeter security and specialises in the provision of fully integrated perimeter security systems. These types of system utilise all the major elements regularly used in perimeter security; physical and electrified fencing, PIDS (perimeter intruder detection systems), CCTV surveillance, detection and analytics, and access controls systems and devices – all fully integrated together. We understand that for a system to deliver the most effective security possible, all the security elements need to work together harmoniously and each element plays a fundamental part in the success of the complete system. At Vale, we approach perimeter security from the same view point as the end user – as an overall system. We offer consultation, design, construction, commissioning and maintenance services. All of which are uniquely tailored to meet the individual security requirements of the client and their site. Furthermore, because we are not tied to any manufacturer, we can supply products from the whole of market, thus ensuring that the systems we
recommend utilise the products that offer the best fit for purpose solution possible. This approach, coupled with our experience and expertise, sees Vale continuously involved in projects within the utilities, petro-chemical, nuclear, counter terror, and high and maximum security sectors, whilst still retaining a strong presence within industry, leisure, retail, education, and the public and private sectors. We are proud to have an installation portfolio that boasts such names as LNG (Liquefied Natural Gas), National Grid, E.ON UK, United Utilities and the MOD, as well as local government, Metropolitan Police, the Environment Agency and Tesco Retail. So you can rest assured that we not only possess the advanced technical abilities required, but just as importantly, the in-depth understanding of regulations and protocol, to ensure that we deliver on time and within budget, the best value, defect free product and service.
FOR MORE INFORMATION Visit us at Counter Terror Expo 2011, 19 and 20 April, London Olympia, Stand H30. Tel: +44 (0)1386 443588 E-mail: info@vale securitysolutions.co.uk Web: www.vale securitysolutions.co.uk
COUNTER TERROR EXPO
www.counterterrorbusiness.com
PROTECTING CROWDED PLACES
DAY 2 – WEDNESDAY 20 APRIL 2011 08.00 – 08.45 COFFEE AND REGISTRATION
08.45 – 09.00
CHAIRPERSON’S WELCOME AND OPENING REMARKS Professor Chris Kemp, Executive Dean, Buckinghamshire New University
COUNTER TERRORISM IN CROWDED PLACES
09.00 – 09.45
UK COUNTER TERRORISM STRATEGY FOR CROWDED PLACES DCI Chris Phillips GCGI, FSyI, Head National Counter Terrorism Security Office (NaCTSO)
09.45 – 10.30
CURRENT AND FUTURE THREATS TO CROWDED PLACES Mr. Hugh, McLeod, COO, Stirling Assynt and Americans Fellow, RUSI
10.30 – 11.00
TEA AND COFFEE AND EXHIBITION VISIT
PROTECTING CROWDED SPACES AND PUBLIC BUILDINGS
11.00 – 11.30
VULNERABILITY SELF ASSESSMENT Lee Doddridge, National Counter Terrorism Security Office (NaCTSO)
11.30 – 12.00
PROTECTING RETAIL, ENTERTAINMENT AND SPORTING VENUES
14.00 – 14.25
SECURING AIRPORTS – A FOCUS ON TERMINAL PROTECTION Centre for the Protection of National Infrastructure (CPNI)
14.25 – 14.50
16.05 – 16.30
SHOPPING CENTRES AS A TERRORIST TARGET Derek Barker, Managing Director, Haskoll Architects and Designers
14.50 – 15.15
IDENTIFICATION AND DISRUPTION OF TERRORIST HOSTILE RECONNAISSANCE Centre for the Protection of National Infrastructure (CPNI)
12.00 – 12.30
15.15 – 15.40
12.30 – 14.00
15.40 – 16.05
RETAIL PROTECTIVE SECURITY John Frost, Head of Business Continuity, Marks and Spencer
DESIGNING-IN AND MAINTAINING RESILIENCE AND PROTECTION FOR STADIA AND ARENAS Richard Lyall, Security Consultant and former Facility Services Director, AEG (Europe) – The O2
PROTECTING HOSPITALS – THE ULTIMATE CROWDED PLACE Christopher John, Policy Lead: Counter Terrorism and Security Preparedness, NHS Counter Fraud and Security Management Service
PROTECTING TRANSPORT SYSTEMS
PROTECTING CROWDED PLACES IN THE RAIL SYSTEM Inspector Chris Bunyan, Senior Counter Terrorism Security Adviser (CTSA), British Transport Police
16.30 CLOSE
Register for the conference at www.counterterrorexpo.com/register11
THE ROLE OF POLICE COUNTER TERRORISM SECURITY COORDINATORS AT LARGE EVENTS Chief Inspector Paul Seery, Counter Terrorism Security Coordinator, SO20 Protective Security Command, Metropolitan Police Service
LUNCH AND EXHIBITION VISIT
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
61
HIGH SECURITY GALVANISED STEEL PRODUCTS PREVENTING UNAUTHORISED ACCESS
Technogroup has the widest range of accredited LPCB tested and certified high security galvanized steel access products. This gives our customers the confidence that the goods and services we provide are assured by third party accreditation. Whether for new or refurbishing projects, the adaptability of our galvanized steel products means the most complex design criteria can be met. We believe our UltraSecure range of physical security access products offer custom built operational and security solutions to prevent unauthorised persons gaining access on Critical National Infrastructure sites, securing key assets against all levels of malicious vandalism, theft, extortion, contamination or terrorism. Our security products include doors, access covers, enclosures, walk-in modular buildings, mesh cages, partitions and panels, louvres, bar sets and custom built ancillary metalwork, many having been tested and approved for Government use and by the Loss Prevention Certification Board to LPS 1175: Security Rating Levels 2, 3, 4 & 5. Technogroup is an approved ISO 14001 Environmental and ISO 9001 Quality accredited company, members of A|D|S and licensee of Secured by Design. Consultancy ➡ Site Survey/ Risk Assessment ➡ Design ➡ Manufacture and Finish ➡ Supply ➡ Installation ➡ Maintenance
For full information on Technocover’s accredited LPCB Level 2, 3, 4 & 5 products, visit www.RedBookLive.com
To request our latest “Red Working Manual” containing over 160 pages of technical details on our range of secure access products, please e-mail: marketingsupport@technogroup.co.uk
For Details on Technocover’s evaluated products for Government use please ask, or contact HOSDB on 01403 213800
Accredited High Quality Steel Security Access Products for Asset Protection Complete Security Solutions From A Single Source
TECHNOGROUP • HENFAES LANE • WELSHPOOL • POWYS • SY21 7BE T: 01938 555511 • F: 01938 555527 • www.technogroup.co.uk • admin@technogroup.co.uk
COUNTER TERRORISM
www.counterterrorbusiness.com
ACCREDITED PHYSICAL SECURITY SOLUTIONS Water, power, transport, telecommunication and other parts of the Critical National Infrastructure set the bar when it comes to securing assets, writes Michael Miles, general manager of Technogroup HEIR SECURITY REMIT covers the spectrum of risks: from theft, vandalism and misadventure to the severest security threats – terrorism and espionage. With government dictates on security acting as a major driver, Critical National Infrastructure industries have embraced the use of physical protection equipment certificated to rigorous third party approval systems. These include Loss Prevention Certification Board (LPCB) certification, an internationally respected approval system gaining increasing status for high security applications in all areas, from infrastructure and the public sector, to retail and commerce. LPCB approves façade elements, such as access covers, doors, shutters and grilles, to a robust dedicated standard, LPS 1175 (specification for testing and classifying the burglary resistance of building components, strongpoints, security enclosures and freestanding barriers). A widely recognised strength of LPCB is that products are subject to on-going appraisal; approval is not just based on a one-off test of a sample design.
T
COMPLIANCE Through regular audits, LPCB certification ensures that the product continues to comply with the regime’s prevailing standards and revisions. This assures the specifier and end-user that the product on the market embodies the exact design and quality as the product which was originally tested and approved. This cannot be said of products certificated through type testing – the test results are not guarantees that future products will provide equivalent performance. Another strength of the LPCB test regime is that it accounts for intellectual strategies that could be used to break through a product’s defence, as well as physical attack. Government testing regimes, which are based on type tests, have been the traditional source of approval for high security equipment for infrastructure projects. Now, the benefits of LPCB’s on-going audit are being recognised, and it is gradually being endorsed within many sectors as an acceptable alternative. ACCREDITED These aspects of LPCB provide the basis of a very sound and dependable security approval system. Not only is it trusted for the most demanding applications such as infrastructure, it also gives the experienced manufacturer scope to realise cost savings without compromising performance. Sentinel and UltraSecure products
from Technogroup, the security and structural support specialist, provide good exampleS of this. In July 2010 Technocover launched the first security door to achieve testing and certification to LPS1175 (issue 7) security rating 5, with a single rather than three-point locking device, providing a cost saving to end-users. The development is down to the integrity of the LPCB testing regime and Technogroup’s particular design blueprint that has produced one of the most extensive ranges of LPCB approved security products. These include LPCB access covers, doors, cabinets, louvre vents, mesh cages, partitions and panels, cylinder clamps, enclosures and buildings serving different sectors of the security market through the group’s specialist brands: Technocover (utilities), Technorail (rail), and the Technogroup security portfolios for buildings and transport. This demonstrates the importance of specifying doors and locks that have gained third party approval of security performance in combination, and not just as independent systems. HIGH SECURITY DOOR OPTIONS In this case, Technogroup’s LPCB 5 door and the particular design of single point lock used have created a unit that has stood up to LPCB level 5 testing during the certification programme. It introduces the idea that three-point locking is not necessarily a prerequisite for LPCB approval. In all, specifiers can choose from a possible 90 options forming part of the certification programme for the new Sentinel Ultrasecure LPCB level 5 doors. This is based on three door types – entry only, exit only, entry and exit – each are available with 30 different ironmongery options (key and lever handle, solenoid, punch-pad, thumb-turn and lever, full width panic bar, etc). The single lever lock is also available on LPCB approved level 3 and 4 doors from Technogroup, bringing further cost savings for the security industry from performance-assured products. Technogroup is exhibiting at Counter Terror Expo 2011, Olympia London, 19-20 April, on Stand M24 in the National Hall.
FOR MORE INFORMATION Technogroup, provides accredited access solutions in physical protection and structural support for infrastructure, buildings and landscaping through its sector brands. Visit www.technogroup.co.uk or www.technocover.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
63
100
COUNTER TERRORISM
www.counterterrorbusiness.com
SECURE CRITICAL INFRASTRUCTURE Birmingham Water Works Board (BWWB) in Alabama selects Gallagher’s networked perimeter security system N TODAY’S WORLD, critical infrastructure needs to be protected by anti-terrorism technology, federal and state regulations and security solutions that deal with varying health and safety issues. Accordingly, many high security sites and industries are upgrading their existing security system; Birmingham Water Works Board (BWWB) in Alabama, was one of the first water utilities in the USA to make the move to an advanced plant security solution. BWWB uses the latest technology at its distributed treatment facilities delivering an average of 100-million gallons of fresh water a day to its customers in five counties. The company consistently meets and exceeds state and federal standards for safety and quality and takes pride in protecting the quality and safety of this essential resource. Complying with orders from the U.S. Environmental Protection Agency (EPA), BWWB performed a vulnerability assessment of each of its facilities. This involved determining where critical assets were vulnerable to physical destruction of infrastructure (e.g. pumps, dams, filter plants) or contamination at any stage in the water treatment process. This assessment exposed weaknesses in perimeter security at each of the board’s facilities. To address these weaknesses, BWWB needed a comprehensive physical perimeter security solution capable of deterring and detecting intruders 24/7, while meeting stringent legal health and safety criteria, integrating with other security systems – such as access control and CCTV – and providing centralised management and fence zone monitoring of multiple remote sites. The solution came from the security team at Gallagher. INTEGRATED SOLUTION After investigating a number of options, Gallagher’s networked perimeter security system was selected to provide a comprehensive, integrated solution. Gallagher systems have been proven over more than 20 years and installed on a wide variety of sites from general commercial to critical infrastructure throughout the world. Comprised of the Gallagher Trophy FT physical perimeter security system and access integration software platform the same system is used to protect our national utility grid. Gallagher’s PowerFence™ systems are non-lethal electric fence systems that
I
detect intrusion attempts and deter wouldbe intruders. Attack is deterred through sending a regulated electric pulse around the perimeter fence approximately once every second. These pulses give a short, but safe shock, making it impossible to climb the fence. The fence also detects attacks, differentiating between serious breaches of the fence and disturbances caused by wildlife, birds or weather conditions. Detection is made possible by Gallagher’s Trophy FT software, which controls perimeter access and monitors fence activity. Using encrypted communication, Trophy FT allows BWWB to control and monitor unlimited sections of perimeter fence at six separate facilities from a central command centre. By adding the Gallagher access management platform, BWWB is able to integrate legacy security systems, while leaving the door open for future expansion and upgrades. For BWWB, the ability to integrate the Gallagher system with its legacy security and access control system was a deciding factor. This integration makes it possible for both perimeter and access control alarms to be monitored from a remote command center. By providing a comprehensive audit trail and report templates, Cardax FT gives security personnel at BWWB easy access to information for status updates and security checks. Terry Oden, CPP, security director at BWWB, with over 40 years’ field experience in security and risk assessment, recalls: “Through prior experience with physical protection, I knew that Gallagher PowerFence technology had been approved by government agencies for use in highly classified locations. It has an excellent reputation.” Oden was able to conform to local ordinances related to electric fencing by using the Gallagher Code of Practice. The Gallagher Code of Practice and Minimum Installation Standards meet and exceed the requirements of all national and international standards regarding safety and the application of electric fence systems. QUALITY, FLEXIBLITY AND RELIABLITY The operations team at BWWB has found Gallagher’s integrated perimeter security system to be easy to operate. Oden adds: “The operating system is highly compatible with our other security systems. The quality, flexibility and reliability of the Gallagher technology meets all of our expectations.” Gallagher Security general manager,
Curtis Edgecombe adds: “Given the security concerns about the nation’s vital infrastructure, we anticipate more water and electrical utilities will follow the lead of the Birmingham Water Works Board and invest in top-of-the-line security systems. From a technological capability and experience standpoint, we believe Gallagher is well positioned to take advantage of these opportunities.” ABOUT THE GALLAGHER GROUP Gallagher Security, a world leader in security systems, manages the security needs of businesses, municipalities, governments, and a variety of institutions in the United States, Europe, Asia, and throughout the Southern Hemisphere. Gallagher Security leverages the cuttingedge research and development and manufacturing capabilities of its parent company, the Gallagher Group Ltd., to bring to market its award-winning systems, the Cardax™ access control and intruder alarms platform and PowerFence™ electric non-lethal perimeter security systems.
FOR MORE INFORMATION Web: www.gallaghersms.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
65
Safety in Numbers….. LPS 1175 SR4.
The only numbers you need to know when it comes to security. From data centres to secure cash rooms, safe guarding sensitive information and high value goods, there is simply no room for manoeuvre when it comes to security. Securiclad provides the solution. We live in a world now dominated by the threat of terrorist activity- where the UK threat level very rarely moves from ‘severe’. Couple this with high value theft and we need to start ‘thinking outside the box’ to prevent such attack. With data centres holding crucial information and critical national infrastructure needing to be more robust than ever, demand for security products have escalated- driving up security standards. Isoclad have the solution. SECURICLAD. Securiclad is a high security modular composite wall panel system. Quick and easy to install compared with conventional brickwork methods- Securiclad offers the complete package. Whether it’s a new build or upgrade of an existing building, Securiclad acts as both a prime barrier and can be an option as an internal secondary barrier. Achieving LPS 1175 SR4 and Government Approval, alongside a Four Hour Fire Rating and ballistic protection, Securiclad meets certified standards of protection. Using the basis our standard composite ‘sandwich’ panel, Isoclad developed Securiclad by encompassing anti-cutting material into the panel.
Essentially, this would provide a high security solution whilst maintaining the characteristics of Isoclad’s standard 100mm panel. Having a high security system which appears the same as a standard setup is highly beneficial; it provides flexibility for design. This gives the option of using standard panels for the main build and using Securiclad to secure an area of high value, without compromising the appearance. Isoclad became the first company to gain LPCB approval for Securiclad and Red Book listing to LPS 1175: Issue 6 for composite panel security walling and enclosure systems. Isoclad say ‘Infrastructure security in today’s era is paramount. We developed Securiclad as a quick-fix solution for a vast range of applications, ranging from safeguarding high-value goods and sensitive information to securing water treatment plants, mobile relay stations and data centres. Securiclad is a high security panel system that sustains attack and has the flexibility for construction as an external building or within an existing building.’ Securiclad is cost-effective. A retro fit, made to measure, quick fix solution with excellent security standards and fire ratings. Think Securiclad today for tomorrow’s protection.
www.securiclad.co.uk
The ECA Group Resilience Through Security
For more information please call
0118 976 7544
or email cmr@ecalimited.co.uk
TO SURVEILLANCE DARK ROOM DEMONSTRATION SHOWCASE
A130 Delegate & Speaker Catering 42
A110
10
Erskine Ltd
4 4
2.43
Roller Shutter
3
G119 Stafford
2
7.5 48
Airworld Security
18
3 GWP PROTECTIVE 4
2
Terrafix Ltd 14
Ltd
4 4
F110
6
G110
4 4 Littlewood Fencing
12
3
60
7
2
H110 H108
2
H1116
ROK 6
2
3.5
Betafence Ltd
I110 I108 I106
Ultrafine Technology
I109
2
10
ATM (temp)
9
9
I105
5 3.5
Protechnic 3 Up to First Aid
FACP
Balcony Line
Ltd 12 10
Extendor
10.5
4
R
J108
H100
7
H99
7
Thermoteknix
3.5 3
2 2
2
5
J110
FACP
2
Fiscan Blazepoint 3 3
ProTel Solutions
3
4
4
3
4
12
COUNTERBOMBER
H97
9
I99 5 I97 DAP
3.5
10.5
L-1 Identity
H93
HGH
10
1.5
3
2
4
2
Cable
2.5
3
Group
Marlow Ropes
2 2
H82 4 Tracerco Monitor Services
HR
H83 Sesys
2
4
I86Balcony Line 12
Radio Telecom Services Ltd
Trelleborg
16
BRITPA
3 Saelzer B 9
3
G80 4
3
S
6
Southw Microwav
G79
Ramo 6 4
2 2
4
H80 ESRI
16
2
3 3
I80
3
I78
Dycem Secu Chauf 6 Colle
2 2 I79 Bannerbrid 2 5
3
FACP
J80
R
Insafe 3 9
6
F89 F
4
8
3
9
I89
2
El
F80 4
2
12
I90 Detection
Technologies
J102 J100 J98 Scotty 6.25
6
Meesons A I
4
E83 Sch
7
108
24
3 3
I93 GEM 3.5
10
DAY 1 Human Factors and Training Perimeter Protection and Intrusion Detection
H88
2
Chronos Technology
12
Workshop Theatre 2
8
15
Haix-Schuhe Produktions und Vertriebs GmbH
5
Maybrey
5
4 36
Portsmouth Aviation
3.5
Techonologies 7
J103
7 7
Selectaglaze
I98 I96
KABA
9
J104
8
Focus 2000
3
I100
2.5
H92
4
Dynasystems
Enigma Encoding Co.
8
Technolo 6
DAY 2 Personal Protection Equipment CBRNE Detection and Protection
3.5
D79 ICX
20
F86
10
38.5
H96 2 Fibreco CellAntenna
28
3 3
Gallagher
38.5
7
CF Cases
3
Innovative Concepts International (ICI)
42
12
4
G105
G100
G108
HS Security / Barkers Engineering G109 Winkelmann / Bristorm 16
Praetorian 3 3
5.5
5.5
F90
G90
Binn Fencing
E84 E
3
4
Dept. of Homeland Security
77
4 6
G4S
4
L-3 Communications
7
12 Ovation 3 HyGie-Tech SA Systems Ltd
G115
4
F105
25
4
20 12
E89
16
6
3
8
11
F100
GLOBAL MARINE SYSTEMS
3
8
GPS Standard
7
56
10.5
3
F106
SECFOR
4
Advanced Research and Technology 16
Pensher Skytech Ltd
5
5
12
D80 4
56
E90
Britannia 2000 Ltd
E99
42
4
F109
Cellmark 10.5
7
Ltd
Shanghai Estimage
4.5
Cova Security Gates Ltd
E109
E100 E96
C80
16
8
D90 7
2.5
Inspection and Measurement Services Ltd
14 E110 E106 James Fisher
10
C86
16
8
3
4
2
JB Corrie Scanna 4 4 Fischer Connectors & Co Ltd MSC Ltd
11
6
72
4
C90
C92
18
4
2.5
Visitor Seating
CRUSSH
Balcony Line
4
2
2.5
4
8
2.5
D106
Seating
5
Workshop Theatre 1
4
14.5
2
12
4 6
C100 C98
6
2 4
3
6
4
3 Genie CCTV 9
3.5
3.5
5
12.5
Peter Jones ILG
4
Visitor 12 Seating
4
2
E115
G116
Bridge Doors Ltd 12
12
3.5
E112
12
16
C104
10
B95
12
GL Noble BCB Int`l 3 Denton Ltd
3 3
3 3
Management Journal
6
12
B99 B97 Argon
Rhino 3 3 Electronics DoorsBalcony Line (UK) 9 9
6
the Orchard
4
B96 2 2 2 B100 Broughton Controls AST Systems
FACP HR R
ATM (temp)
3
5
1 10 External BuildingsDAY Border and Facilities Protection CCTV and Monitoring Barrier 7 DAY 2 Systems Explosive Ordnance Disposal (EOD) and SIM Security & Select Improvised Explosive Ordnance Disposal (IEDD) Ltd Cables 4 4 Electro Optics, Thermal Imaging and Night Vision Electronic System 24 110 10 28
F115 Birmingham
Fotech
2 2
10 C106
D109
F116
G120 4
Close Protection World
5
6
2
A80
13.5
2
Security
B107 B105
D110 Dytecna
3
10
D115
3 Olympus 3 Barbed Tape 2
Rogers 12 Fencing
6
6
IPSA United Shield 4 Wagtail 4 8 C107 Defence UK Ltd
2 4
Range
15
9
2.5
Roller Shutter
C110
C109 Hamilton
4
F119
Roller Shutter
2
O'Gara Tait Radio 4 Group Comms 5 (STS) 16 16
4
5 5
2
D112
ABSL Power Solutions
CPM
Balcony Line
Roller Shutter
4
F120
16
Roller Shutter
C112
Rimage Europe 4
159.5
3
SafetyFlex 4
48
10
8
Limited
B109
2
4
3
20
Paramount Bruker 4 Steel Daltonics Fencing 16
4
PSSA 3
3
B110 B106 B102 Secox Ronin Concepts Top of the
2 3
10
B115
5 Stones Intelligence
4
3.5
29
2.46
F122
G121
B112
CBC 4 Europe
DeBeers
29
2
A100
A105
3
9
3
3
2.5
Delegate & Speaker Catering
Delegate & Speaker Catering
Roller Shutter Roller Shutter Roller Shutter
5.5
2.5
Balcony Line
Roller Shutter
3
4 116
Roller Shutter
Beat 3 Systems
FACP
10.5
4
EXI
FACP
4 HR R
FIRE EXIT
2.5
FIRE EXIT
3 PEN FIRE EXIT
Up To Ladies and Medical Centre
FIRE EXIT FIRE EXIT
Natio
KEY = Pillar Rates
Space Only Shell Scheme Elite Package All plus VAT
£409 per m² £469 per m² £529 per m²
www.counterterrorbusiness
TO MEET THE BUYER PROGRAMME INVITE - ONLY CONFERENCE THEATRE - GALLERY SUITES - CNI DAY 1 PROTECTING CROWDED PLACES DAY 2 Conference Theatre
N
Pillar Hall Global Counter Terrorism Day 1 & 2
Taste Italia
FIRE EXIT FACP
G70
west ve Ltd
4
G66
Heintzmann Sicherheitssysteme
COE 4 Ltd
16
24
3 18
2
G69 G65
Medical Warehouse Ltd 9
3
10
I76
5
I74
I75
10
5 2.5
0
NTAX 9
G57
6.25
Freeman Ltd
2
4
4
J79 J78 Logically Secure
I73 Foster &
Solutia
10
J74 4
2
12
5 Intersec 3
2.5
15
6.5
2
I53
1
PIPS Technology
4
18
2
2
I58
5
4
AB Precision (Poole) Ltd
4 4
18
ACRO Criminal Records Office 5
Engineering Ltd
35
10
5
2
5
I40
3
2
Recognition Systems
I39
2
DM+ Security / Dowding and Mills' 26
DP Cappucino Express
HR
I35
2
K40
1.5
8 DMS Technologies 6 K39
Objectivity
FACP
3
1
Thermofisher
3
M55
M59
Intelligent
M42
N54
2
2 4
N56
5
N58
M30
2
10.5
6.5
N40
2.5
2
9
3
3
2
3
Micro Systemation
3
4
1.5
3
3.5
ASPEN ELECTRONICS
ISM
3.5
3
Sciences
3
9
Q47 7.5 Q44 Shield Patton Window
4.5
Vemotion
3
O34
5
7
Film
3.5
6
O35
Sure Lock Doors
Unipar
MACNEILLE
3
2
5
Newcon Optik
Security Watch India
P40 P38
3
7
Environmental Defence Systems
2
3 4.5
3 Quantitech Ltd
3
2
15
Aid Training & Operations Ltd
4
P34
P35 3
British Bodyguards Association
6.25
9
2
2
5.11
Talisman Security Products
2
3
6 Thermal
P15
Imaging
24
2
4
3
1.5
5.5
0.5
O08
Hi-Tek Ltd 7.5
P11
Sea & Sea Ltd
P10
9
Military Technology
P08
12
Custom Interconnect
9
Synectic
4 Security
3
Networks
2.5 3
3
12
35
2
Security Verification Area Sponsored by Rapiscan Systems
9
3
O10
Tetracore 10.5
2.5
P14 P12 Top Dog Security
N06
10.5
1
3
Argus
9
O12
N08 360
10.5
ASIS INTERNATIONAL
O11
2.5
N10
Send Word Now
Securetec
7.5 3.75
Defence Media
3.5
9
10.5
2.5
SNE
O15 Global
9
Vision Technology
1.5
O14
P20
3
Entrak 3
1
O19 7
10.5
4
Optosecurity
M08
Battlespace
18
4.5
O20
2
M10
12
20.25
3
CABLES
Aerovironment
M06
Holmatro 4
3.5
L19AXON7
4 Fujinon
3.75
Swiss
3.5
FP
3.5
World
Security Pavilion Institute
3 3 Heinen
3
3 CBRNe
N20 10.5 N217.5 N22
N24
Bar Cafe
12.25
2
3
1
2.5
3
Institute of Explosive Engineers
MultIPix Imaging
M12 3
9
N23
L20
2.5
1.5
3
2 47.5
I20 7.5
12.5
London Room Designing out Terrorism Day 1 CNI Day 2
PROENGIN
10
2.5
ELS Explosive Learning Solutions
10.5
3
Stairs to Gallery
3.5
52
3.5
G02
Cristanini
Disabled Access
Axon 5
RSDecon
A-E Solutions
6
FACP
6
Suprameca
17.5 2
6.25
UBI FRANCE
M14
18
FIRE EXIT
Exhibitor Lounge
17.5
3
9 P39 Toye, Kenning & Spencer
6.25
HR
CP 4 Cases
FACP
2
L25 L23
4
N47 10.5
27
9
3.5
7 Q46 XReach Ltd
Q49
2.5
3
2.09
1.5
2.5
7.5
9
6
15
5 2.5
Zareba Systems Services
6
3 3
2.5
3
3
10.5
P4910.5 P47
3
Q54 Optical
Morrigan 3 Partners
9
12
Q50 5.25 Businessforensics
3
O40
M20
9 6
N49 5
BSIA 2
CNIguard
1
3.5
3 Oculus
Gate S.A. 9
3
2
5.5
7
2
2.5
Cyalome
8
2
N43
6
N37 N36 N35
O38 O37
3.5
Centre
3
Crisis Response Journal
8
3 N38 The Flash
3
N39 N32 Speech Tech
Franklins Intl. 2
P50 P44
P54
Desert Tactical
LYYN
G2 Defence
2.5
10.5
10.5 7
Nallatech
3
ORTEC
6
3.5
2
5
4.5
N44
3
4.5
O49 O45
2
3.5
O54
9 6
4.5
4
2
L29
3
G01
2
5
3.5
2.5
H2O R
2.5
L28 L24 L22
2 Eden 3
36
N34
2
3.5
3 Primetake AEB Intl 3
Asquith 3
12.5
Centre
3
L30
3
2.5
5
6
6
Fibre Technologies
Wireless LAN MAN Ltd
6
National Window Films
3 NBC Sys Hymatom
2
Becatech 15
N41 N42 3
4
3
2.5
2.12
K32 K30
Wolfestone
6
Sunray Engineering
17.5
21
3
6
9 K33ADS6 K29 ECA Group / CCD
2.5
7
2
12
J20
Peli Products 7 UK Ltd
3
8
Berkeley Varitronics Systems
6
Savox Titan Defence Communications 12.5
2
O50 O44
15
O52
CELLEBRITE
3
5
K34
H20
I21 3
ADT
15
2
Visitor Seating
3
J22
4
20
4
COMNET EUROPE
9
F02
G12 G10 6
Procter Bros.
3
R
TPCS UK
5
M22
4
71.5
UAVSI 5
14 8
Blue Bear Systems Research
3.5
6
3
Night Searcher
Xanalys 10 Eagle 4 H25 10 NIC Automation Instruments 22
3
Technogroup 6
M28 M29
12.5
5
F01
3
55
14
4
5
2
12
UBI FRANCE
5
L34
M24
12
3 Euro Energy
DAY 2 Internal Building and Facilities Protection Surveillance Systems
12
4
2
DAY 1 Information and Communications Screening and Scanning Equipment
TSNK 4 LAB
2
1512.5
Resources
Workshop Theatre 3 11
2
N55
Software Capability Zone
3
Astrata 3
3
N50
IABTI 2
3
12.25
10.5
KNM Media/ ADJ
4.5
Cellcrypt
I-bodi
2.5
4
7
Radiocoms Systems Ltd
M49 M43
9
12 6
Q56
3.5
M44
5 Armour
9
Avon Protection
onal Hall
3
M50
15
INFICON 3
N52
3
G6-Global
1.5
72
Radio Data 3 Networks
2.5
3
Sorhea L33 Milipol
L39
3
2.5
2.5
M54 3
2
P37
4
3.5
3
9 6
L41
Radio Tactics
10
TW Kempton (Corporate Clothing) Ltd.
3.5 3.5
L46
4
Visitor Seating
Visitor Seating
78.75
157.5
2.31 4.6 Lift led rm Disab platfo x 900 1420
s.com
L50
5
L40
2
Ignition 3 Sales
Guartel Timespace Technologies 12 12
1.5
18 4
3
Baggage I.D.
Buckinghamshire New University
3.5
4.5
CRUSSH
Light box
K36
9
24
5
J24
10
J&S Franklin
19.25
H26 H24
Garrett Metal Detectors
1 H27 DCS 3 3
5
5
Ascot Doors K38 4.5 K37
4
L42
I27
4.5
4
G22
Kosedag 3
3
3
Idaho J25 3 Technology Optical Cable 3 Corp. 15 Inc 13.5
4
2.12
G25
5.5
Security Labels International
18
J29
SMOKECLOAK
FA
Ladder
Armoured Protection
Thales
13.5
2
Pty Ltd
14
Balcony Line
Adani
I29 4
J30
16
Security Cleared Jobs
12.25
8
I30
4.5
iOPTEC
7
H30 Vale Security Solutions 32
PSF Future Fibre 4 Wales 12 Technologies
4
FIRE EXIT
2
2
4
3
J39 7
3 3
Sykes Global Services Ltd.
J40
3
3
J42
2.5
FP
9
8 C2 8 Mobile Towers SystemWare
4
R
17.5
Up To Gallery & Toilets
I32
4
FACP
4 4
3
10
G20
G26
G28
Police, Security & MOD Oracle
7
8
2
16
F10
2
4
3.5
2
63
3
15
Balcony LineNDI
4.5
31.5
LOCHRIN BAIN McARTHUR GROUP
16
2
I42
Todd Research Ltd I41 Tindall
5
4
H36
H40
H46 Heald Limited
7
I50
Visitor Seating
2
TeleRadio Engineering
Pre-Registration Entrance
3
5.5
66.5
Marshalls
G39
Gunnebo UK Ltd
9
G30
2
20.25
4.5
Finmeccanica / SELEX 31.5
9
4.5
H50
Geoquip 4 Ltd
1
3
I60
4.5
H56
20
G40
9.5
F20 7
Proytecsa
20.25
3
22.5
F25
BRIJOT
Product Isoclad NASP 7.5 7.5 Partners
63
3.5 3
Remploy Frontline
Balcony Line
QinetiQ
7
10.5
H60 4
4
20.25
F39 7.5 F37 F35 3 9
Pilomat
F29
Olympia Room Emergency Services Day 1 Cyber Security & Electronic Terrorism Day 2
16.5
272
9
F30
Chemring EOD
Zaun
3
3
Nuvia
4.5 5
4
8
G55
13.5
Products
12
8
16
F36
F40
2
9
G50
G58
Consolite Technology
MIRA
3 Townscape
3DX-RAY Darfen 3 Limited 15 Durafencing
dge Security Blinds
3
4
G60
4.5
20.25
63
56
2
4
8
9
7
2.5
urity ffeur ege 9
4
Ground 3 Hawk
3
3
3
G62
Analysed Images
8
H76 H70 SDS ATG Access Group Ltd Ltd 12 6 28
8
2
Northrop Grumman
7
4.5
20
8
Balcony Line
2
4
F50
2
HR R H2O
HC Security Solutions
2.5
56
3
ora
Allen Fencing Limited
7
7
9
3
3
3.5
Burton Safes 9
F60
Smiths Detection
2
12
11.25
Surveillance
40
D02
D01
3.5
F87
24
Excess Baggage Airports Ltd
F70
AVE
8
E32 24.75
Bosch Security Systems 16.5
2
Environics
E30 Cobham
10
3
14
General Dynamics
16
Openhouse Products
8
3
12
4.5 17
4
3
2.5
Amesys
18
ICTS
4
Up
56
7
7
E39
E34
Peli-Hardigg
BDEC
15
C01
C15 C10
Wireless Explora Security 9 CCTV Ltd
5
37.5
7.5 5.5
C16
(LPCB)
2
3.5
3
5 Global
4 Trifibre
3.5
3
9
3
6
E38
12
Omniglobe
3.5
7
12
16
E40
3 PROTECH
Rapiscan Systems
9
24
D20
2
Qioptiq Ltd
3M
3
4.5 4
2
D33
D32
9
3.5
16
hneider E75 Harper Chalice lectric 21 21
2
Terma
D37 D35
22.5 9 Intelligent Plantscape Devices9
D39
2
21
8
E60
E70 E80 Marco 4 RCS Trailers
Irobot Corp
20
5
3
3
12
3
D34
9
Panasonic
Allen Vanguard
25
12
4.5
3.5
18
6 4
E82
ITT Defence
4
World-Check
18
4
Safe 7 Tactics 2
D67
24
D69
Inspection Optics & IT Concepts
4
D38
D40
EDSL 4
4.5
3.5
3
24
Chess Dynamics
4.5
4.5
2.5
X ogies
3
D46
D50
D60
Ltd
198
2
9
CSECO
BRE
8
3
Balcony Line
4 Britten-Norman
D68
4
12
15
4.5
D70
15
COUNTER TERROR BUSINESS
IHS Jane's
2
3
4.5
C18
1
2.5
2
5
5
16
16
6
6
C20
4 APT Controls
2.5
16
3
12
C46
26.5
B01
5.4
Seating
5 5
35
2
4.5
Rutherford Group
12
C50
11
3.5
C73
Wilsons
C56
11
4
Visitor Seating
5
Balcony Line
3.5
3
Alford Technologies Ltd
4 Towergate
Bluecher Tata Steel Projects 4 Group
4
Balcony Line
Grand Hall
3.5
2
1.5
Intellect
ns g Ltd
3
C60
Surelock 4 McGill
6
2
14
B44
2.5
4
Media
4 4
EOD & IEDD Demonstration Showcase
MILSIM 4 22
2.5
C76
s
6
B49
12
7
3
4.5
Keela
4
Tactical 3 Electronics
18
2
2.5
3
3
4 4
6 C75 6 C74 C70 Aerospace
B55
12
3.5
B40
2.5
2
Ltd Balcony Line
5.5
Optex Europe
SSAIB
3.5
4
B59
3 HazmatLINK
3
6
B47
16
R
4.5
(Britain)
2
Cross-Guard
ATM (temp)
3
2.5
Frontier Pitts
8
B60
4
2.5
B6710.5 B63 MSA
2
FIRE EXIT
18
4.5
6.5
12
LIDDLE DOORS
2.5
Steatite
16
4
2.5
B69
2.5
2
R
2.5
MAS
3
A20
GETAC
4
12
3
4.5
5
2
3
2.5
2.5
B66
6
7.5 Stack Ltd
7.5
2.5
3.5
9
Audionation-UK 10 Zengrange
A46
3
MATT Black Systems
4.5
3.5
4.5
B70
14
2.5
3.5
2.5
14
A30
Thomas 4 Jacks Ltd
Wavestore
3.5
A40
A56 A50
Ase Utra & 4 Jackson Rifles 18
MGT FLIR Europe Systems
4
6
A60
Access Required To Lift Machinery
1.5
A68
A70
5.5
Baby Change
3.5
Baby Change
IT
FA
ORGANISERS OFFICES
FP
FA
On-site Registrations & Security Verification Entrance
Baby Change
ORGANISERS OFFICES
Pizza Express
Pizza To Go
Issue Number : 84 Issue Date : 30 Mar 2011 Scale : N.T.S. Drawn By : Jason Canning
www.counterterrorbusiness.com
COUNTER TERROR EXPO 01dB-Metravib L29 360 Vision Technology N08 3DX-RAY Limited I76 3M Cogent, Inc. D35 5 Stones Intelligence B115 A E Solutions (BI) Ltd N20 AB Precision (Poole) Ltd H40 ABSL Power Solutions D112 ACRO (ACPO Criminal Records Office) I42 Adani Systems I30 ADT Advanced Defense Technologies Inc. G10 Advanced Research & Technology Ltd G116 AEB International O44 AeroVironment, Inc. M12 Aid Training & Operations P37 AIDIS K33 Airbourne Surveillance D70 AIRWORLD SECURITY C98 Alfa Imaging S.A. N36 Alford Technologies B44 Allen Fencing Limited F60 Allen Vanguard Group D40 Amesys – Bull Group E34 Analysed Images G62 APT Security Systems C20 Arab Defence Journal N54 Argon Electronics (UK) Ltd B99 Argus Thermal Imaging P20 Armoured Protection I29 Ascot Doors Ltd K36 Ase Utra & Jackson Rifles A60 ASIS International UK Chapter (208) O12 Aspen Electronics P49 Asquith College O52 AST Systems Ltd B96 Astrata Group M43 ATG Access Ltd H70 ATI / OptiCal Sciences Ltd Q54 Audionation-UK Ltd B70 Aviation Security International Journal C74 Avon Protection Systems N52 Axess International Ltd M30 L22 Axon Cable L19, Baggage Identification K38 Bannerbridge plc I79 Battlespace Publications M08 BCB International Ltd B95 BDEC Limited C16 Beat Systems A110 Becatech M22 Berkeley Varitronics Systems, Inc K34 Betafence Ltd H108 Binns Fencing Ltd D80 Birmingham Barbed Tape Ltd F115 Blazepoint Ltd I106 Blue Bear Systems Research Ltd M29 Blue Helix Ltd G12 Bluecher Group C60 Border Barrier Systems D106 Bosch Security Systems CO1 Brijot Imaging Systems F29 Britannia 2000 Ltd E96 British Bodyguard Association O19 Britpave F80 Britten Norman (B-N Group Limited) D70 Broughton Controls Ltd B100 Bruker Daltonics Ltd A80
BSIA Ltd N43 Buckinghamshire New University K37 Burton Safes Ltd F87 BusinessForensics Q50 C2 Mobile Towers Ltd I39 Campbell/Harris Security Equipment Company (CSECO) C18 CBC (Europe) Ltd B112 CBRNe World M10 CCD Design & Ergonomics Ltd K29 CellAntenna H96 Cellcrypt Ltd M42 Cellmark E100 CF Cases Ltd H111 Chemring EOD Ltd F36 Chess Dynamics Ltd D68 Chronos Technology Limited E84 Clarity Forensic Services D37 Close Protection World B107 CNIguard N35 Cobham Surveillance E30 COE Ltd G66 Communications Centre International Ltd A50 ComNet Europe Ltd G12 Consolite Technology Ltd G58 Counter Terror Business C46 Counter Terror Gazette C74 Cova Security Gates Ltd E106 CP Cases G01 CPM Group Ltd. B109 Crisis Response Journal N32 Cristanini S.P.A G02 Cross Guard/Bradbury B60 Custom Interconnect Ltd (CIL) P15 Cyalume Technologies SAS L24 DAP Technologies (an affiliate of RMT Inc.) I97 Darfen Durafencing I74 DCS Ltd H27 De Beers DebTech E112 Defence Management Journal C107 DefenCell – J & S Franklin Ltd G22 Desert Tactical Q56 Detection Technologies Ltd I90 DHS Science and Technology F90 dm+ Security/ Dowding and Mills J74 DMS Technologies K40 Dycem Limited I80 Dynasystems Ltd I100 Dytecna Limited D110 Eagle Automation H20 ECA L20 EDEN L29 EDSL Ltd D46 Enigma Encoding Co Limited I99 ENTRAK GmbH & Co. KG P35 Environics Oy E32 Environmental Defence Systems (EDS) Ltd M20 ESRI H80 EURO ENERGY RESOURCES LIMITED M30 Excess Baggage Group Ltd I53 Explora Security Ltd C10 Explosive Learning Solutions N21 Extendor I105 Fibreco H100 Fiscan I108 Fischer Connectors Ltd C80 FLIR Commercial Systems BV A68
FLIR Systems, Inc. Focus 2000 Infrared Limited Foster & Freeman Ltd Fotech Solutions Ltd Franklins International Frontier Pitts FTL Secure Solutions – Fibre Technologies Limited Fujinon (Europe) GmbH Future Fibre Technologies Limited G2 Defence G4S G-6 Global Gallagher Security Management Systems Garrett Metal Detectors Gate S.A. Gem Cable Solutions Ltd General Dynamics Itronix General Dynamics UK Genie CCTV Ltd Geoquip Limited Getac UK Limited GL Noble Denton Global Defence Review Global Marine Systems Ltd GPS Standard S.p.A Ground Hawk Guartel Technologies Ltd Gunnebo UK Ltd GWP PROTECTIVE HAIX®-Schuhe Produktionsund Vertriebs GmbH Hamilton Erskine Ltd Harper Chalice Group Ltd HazmatLink Ltd. HC Security Solutions Heald Limited Heinen Heintzmann Sicherheitssysteme Hesco Bastion Ltd HGH Infrared Systems HITEK Electronic Materials Ltd Holmatro UK HS Security/Bristorm/Barkers Engineering HyGie-Tech SA Hymatom SA i-bodi ICTS (UK) Ltd Idaho Technology Inc IHS Janes IIasco/Keela INFICON Innovative Concepts International Insafe International Inspection Optics LTD Institute of Explosives Engineers Intellect Intelligent Armour International Association of Bomb Technicians & Investigators International Professional Security Association Intersec iOptec Limited iRobot Corporation ISM Ltd Isoclad Ltd
D79 H97 I73 G120 O38 B67 N42 M06 J30 O49 E89 L39 G100 H26 N36 I93 D20 D20 C100 H56 A30 B97 O15 F106 E90 G65 L50 F20 C92 I96 C109 E75 B59 D01 H46 N47 G70 M28 H92 O08 N24 G108 F109 L28 M49 E39 J29 C50 C75 M59 G105 J98 D50 N22 C76 M50 N55 C106 I60 G26 E82 P47 F37
2011 EXHIBITOR LIST ITT Defence D67 James Fisher Inspection and Measurement Services Ltd E110 JB Corrie & Co Ltd C90 Kaba Ltd I98 KNM Media World Security Index N54 Kosedag G25 L-1 Identity Solutions J104 L-3 Security & Detection Systems F100 L-3 TRL Technology F100 LIDDLE DOORS LIMITED B69 Littlewood Fencing G110 Lochrin Bain- McArthur Group H36 Logically Secure J79 LPCB (BRE Global ltd.) B01 LYYN Ltd O45 MacNeillie O37 Marlow Ropes Ltd J100 Marshalls G30 Mas Zengrange Ltd (A Division of Hall & Watts Defence Group) B66 Matt Black Systems A56 Maybrey Reliance J103 Medical Warehouse Ltd G69 Meesons AI Ltd H88 MGT Europe A70 Micro Systemation AB P54 MIL-SIM-FX International B40 Milipol L33 Military Technology P10 MIRA Ltd G60 Mobile Content Management Solutions O54 Morrigan Partners P44 MSA (Britain) Ltd B63 MultiPix Imaging Ltd I20 Nallatech N44 National Association of Security Professionals F35 National Window Films K30 NBC-Sys L30 NDI Recognition Systems I40 Newcon Optik P40 NIC Instruments Ltd H25 NightSearcher Limited F01 Northrop Grumman Europe Ltd F50 Nuvia Limited G55 Objectivity, Inc. K39 Oculus P50 ODSecurity I50 Ogle Models & Prototypes Ltd F39 Olympus Industrial F119 Omniglobe (EMEA) Ltd D32 Openhouse Products J20 Optex (Europe) Ltd B47 Optical Cable Corporation J25 Optosecurity Inc P34 ORTEC N37 Ovation Systems Ltd F105 Panasonic Computer Products Europe D38 Paramount Steel Fencing A100 Patton-Inalp Networks AG Q47 Peli Products (UK) Ltd J22 Peli-Hardigg UK E38 Pensher Skytech Ltd E99 Pentax Imaging Systems GmbH J80 Perimeter Security Maintenance & Technology Ltd F60 Peter Jones ILG Ltd E115
Pilomat srl F30 PIPS Technology Ltd H50 Plantscape Ltd D39 Police Oracle, Security Oracle & MoD Oracle G28 Portsmouth Aviation F86 Praetorian International G115 Primetake Ltd O50 Procter Fencing Systems I21 Product Partners F39 PROENGIN L20 PROTECH E40 Protechnic Ltd J110 ProTel Solutions I109 Proytecsa F25 PSF Wales Ltd J40 PSSA A105 QinetiQ OptaSense G50 Qioptiq D33 Quantitech Ltd O20 Radio Data Networks M54 Radio Tactics L41 Radio Telecom Services Ltd I86 Radiocoms Systems Ltd M44 Ramora UK Ltd G79 Rapiscan Systems E60 RCS S.p.A E80 RECONROBOTICS B44 Remploy Frontline H60 Revader J42 Rhino Doors B105 Rimage Europe GmbH C112 Rogers Fencing Systems G121 ROK Mobile Protection H110 Ronin Concepts Security Elite Ltd B110 RSDecon M14 Rutherford Group C73 Saelzer GmbH F89 Safe Tactics BV D60 SafetyFlex Barriers F122 Savox Communications N40 Scanna MSC Ltd C86 Schneider Electric E83 Scotty Group J102 SDS Group Ltd H76 Sea & Sea Ltd P11 Secfor F110 Secox Corporate Security B102 SecureOne International BV I90 Securetec Detection Systems AG N06 Securiton AG F110 Security Blinds Ltd I75 Security Institute N49 Security Labels International I27 Security Watch India P38 Securityclearedjobs.com G20 Select Cables Ltd D115 Selectaglaze Ltd H93 Selex Communications G40 Send Word Now N10 Sesys H83 SET CORPORATION/CounterBomber J108 Shanghai Eastimage Equipment Co.,Ltd D90 Shield Window Film Limited Q44 SIM Security & Electronic Systems GmbH D109 Smiths Detection F70
Smoke Cloak – (MSS Professional Ltd) J39 SNE Special Projects Ltd O14 Solutia Performance Films J78 Sorhea L34 Southwest Microwave G80 Speech Technology Center N39 SSAIB P12 Stack Ltd A46 Stafford Bridge Doors Ltd G119 Steatite Ltd A20 Sunray Engineering Ltd F02 Suprameca L23 Sure Lock Doors O35 Surelock McGill Ltd C70 Sykes-McQueen Targets I32 Synectic Systems Group P08 SystemWare Europe Ltd I35 Tactical Electronics B55 Tait Radio Communications F116 Talisman Security Products O11 Tata Steel Projects C56 Technogroup M24 TeleRadio Engineering Pte Ltd G39 Terma A/S D34 Terrafix Ltd E109 Tetracore, Inc O10 Thales F10 The ECA Group Ltd K29 The Flash Centre N38 The Ignition Alliance L42 The O’Gara Group F120 Thermo Fisher Scientific M55 Thermoteknix Systems Ltd H99 Thomas Jacks Ltd A40 Timespace Technology Ltd L46 Tindall Engineering Ltd I41 Titan Defence Services Limited N34 Todd Research Limited I50 Top Dog Security P14 Top of the Range B106 Towergate Wilsons B49 Townscape Products Ltd G57 Toye, Kenning & Spencer P39 Tracerco Monitor Services H82 Trelleborg Engineered Systems I89 Trifibre Ltd D02 TSNK Laboratory N56 TW Kempton (Corporate Clothing) Ltd. L40 UBI France L25 Ultrafine Technology I110 Unipar Services O34 United Shield International Limited C110 Unmanned Air Vehicle Security & Intelligence (UAVSI) N58 UTC Fire & Security A50 Vale Security Solutions Ltd H30 Vemotion Interactive Ltd Q49 Wagtail UK Ltd C104 Wavestore Ltd J42 Winkelmann UK Ltd G109 Wireless CCTV Ltd C15 Wireless LAN MAN Ltd N41 Wolfestone Translation Ltd K32 Xanalys H24 XReach Ltd Q46 Zareba Security Systems O40 Zaun Ltd F40
COUNTER TERRORISM
www.counterterrorbusiness.com
MOBILE PHONE ENCRYPTION A revolutionary software solution from Morrigan Partners is transforming the mobile security and encryption industry
MAGINE LEAKED INFORMATION! Imagine the financial cost of a data breach! If you are responsible for the cyber communications security of a state agency, a security force or a global corporation, you are likely concerned about the voice and data security of mobile phones and the risk of interception. Morrigan Partners have launched a groundbreaking encryption solution which encrypts all mobile communications ensuring they remain completely secure. The Morrigan Secure Application (MSA) addresses the growing risks and has closed a significant security gap for smartphone users.
The MSA technology can help government executive and national security agencies as well as enterprise for many reasons: 1. Allows employees to use their smartphones securely to keep open communications. 2. Addresses the security risks surrounding standard smartphones. 3. Traditional voice and text are currently perceived as being insecure by users. 4. Network providers have not addressed the risks to prevent breaches. 5. The MSA allows one phone to be separated into both a business and personal tool. Robert Bruton, CTO of Morrigan Partners answered the following questions:
FEATURES OF THE MSA SYSTEM • Secure and encrypted voice. • Secure and encrypted voicemail. • Secure and encrypted SMS. • Secure and encrypted data transfer. • Secure and encrypted conference calling. • Mass deployable globally across all networks within minutes. • Remotely and securely downloaded, installed and managed. • Works on a user’s existing smartphone. • Operates seamlessly over data enabled networks including 2G, 3G, 4G, Wi-Fi and satellite. • Remote lockdown ability if phone is lost or stolen. • No geographical restrictions. • Inter-operability across multiple groups/agencies. Each user can be given different levels of access. • Cost benefits from the rapid evolution of software. Every day, sensitive data leaves employees’ mobile phones with voice and mobile data being the weakest link in secure communications. The need for mobile phone encryption is driven by the growth in smartphone use and is needed to prevent an alarming increase in data breaches.
Q. How does phone hacking currently work? It works in a number of ways. A Trojan can be put on phones to intercept all calls, text and data. For as low as $1,500 it is possible to mimic a GSM tower so a call can be intercepted. In addition. It is possible to capture the A5/1 data and decrypt it using the current published rainbow tables which are easily available on the internet.
I
Q. What is a Trojan? A Trojan is an inexpensive piece of software that can be purchased on the internet and put on a targets phone without their knowledge. It can be disguised to run hidden in the background or embedded within an application. It acts by intercepting all calls, text and data which it gathers and then transmits to another mobile device or computer. This software can also be used as a listening tool, whereby the phone can act as a bugging device that a hacker can dial into from anywhere in the world and listen to everything that is going on within the range of the handset. Trojans are a rapidly growing area of risk for mobile phones and the cost of data breaches are growing at an alarming pace.
Q. Should I be worried about my calls being tapped and why is my current phone encryption insufficient? Yes you should. Due to new intrusion methods like Trojans and 25 year old encryption methods being used by the mobile phone networks, it has now become financially viable for anyone to hack your phone. The past few months has seen the mobile phone industry thrown into turmoil as the computer hacking community has carried out successful attacks against mobile phone call & data security. Q. What Encryption does the MSA use? The MSA uses encryption algorithms that are recommended for military and government communications making remote communications completely secure. Four encryption keys are used for each call and all keys are randomly generated. The keys are not stored anywhere and are discarded at the end of each call. 128-256 bit AES and 2048 bit RSA algorithms are used. Q. What are the benefits of the MSA for operational use? Practical uses for the MSA include rapid and remote reviewing of data relating to secure operations. It can act as an encrypted closed loop mobile data system in an emergency incident area. The secure conference calling allows for open group secure calling for users or user groups. It is also a solution for inter agency secure communications. The low bandwidth capability of the MSA allows it to work on all networks globally and in all situations. Q. Why will software replace hardware encryption? The National Security Agency (NSA) and many others are moving away from hardware towards software solutions as they are more flexible and can be tailored to their needs. It is extremely easy to set up and manage and has multiple access management controls. Software is not as specific as hardware and is more flexible to adapt to technological changes as they evolve.
FOR MORE INFORMATION Contact Morrigan for a confidential security consultation and overview. Tel: +353 1 6641552 E-mail: info@morriganpartners.com Web: www.morriganpartners.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
69
COUNTER TERRORISM
www.counterterrorbusiness.com
COMPUTERISED FLUID DYNAMICS HyGie-Tech’s global protective system Walkris gives an accurate assessment of airborne contaminations and a subsequent risk evaluation EING INFORMED in real-time about the potential presence of a toxic agent in areas where rescue teams are about to go into is still a challenge. When conventional electromagnetic communication devices are inefficient, HyGie-Tech comes with a unique solution called Walkris that allows individuals to identify their location, to find their way out and to be informed about the level of toxic agents in their surrounding environment. Walkris by HyGie-Tech combines the performance of its risk oriented Computational Fluid Dynamics system, HG_Flow, with a personal User Interface that gives an accurate, real-time position of each equipped individual and gives them a risk level responding to the chemical or biological agent leak.
B
RISK ORIENTED COMPUTATIONAL FLUID DYNAMICS (ROCFD) HG_Flow is a computer-based solution, optimised for the assessment of airborne contamination and subsequent risk evaluation. Algorithms used by HG_Flow reduce computation time without impairing the required level of accuracy. To achieve this, HG_Flow had to improve its numerical model with a new approach in the discretisation of Navier-Stokes equations together with assumptive postulates selected for their validity in the operational domain. HG_Flow is thus optimised for the calculation of flow motion and quantitative determination of volumetric levels of contamination, provided boundaries are in a steady state, even if body forces are variable, and contaminant are either gaseous or Newtonian aerosols. HG_Flow can run with different level of accuracy but HG_Flow can in most cases provide a first result in its diagnostic modus in less than 15 minutes. The data and other outputs computed by HG_Flow have extensively been proven over various real cases. HG_Flow is mainly designed to quantify and assess risk of contamination by a suspected agent under given aeraulic (indoor) or meteorological (outdoor) conditions. To meet this objective, HG_Flow has oriented its output (scheme and numerical data) to provide the user with an easy analysis of the computed configuration.
70
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
To achieve this, special care has been brought to the rendering of the environment in which the air modeling takes place. The desired point of view is easily displayed in coordinates (x,y,z). Virtual 3D reality is then enhanced by the superimposition of computed contaminated areas in the background of the environment as seen by the individual. ROCFD WITH VIRTUAL 3D REALITY This virtual 3D reality is made possible because HG_Flow communicates, via an interface developed by HyGie-Tech, with a 3D laser scanner that provides with precise
representation, at millimeter or centimeter scale, of existing facilities with installed equipment and population. That way, the environment in which CFD modeling runs is virtually an exact reproduction of the 3D reality. Then HG_Flow generates meshes that can be directly integrated in CFD. This system has already been conveniently used by HyGie-Tech on very large clouds of points (over 1 billion points) without alteration of computational performances. HG_Flow computes flow and contaminant spread solutions from the set of data loaded out of the data banks (digitalised infrastructure and product), once the boundary condition has been applied. Computed solutions are not only locally displayed by computers running HG_Flow for direct analysis but are also made available for downloading on Personal User Interfaces by Walkris system. Thus, on its Personal User Interface (programmable colour touch screen with enhanced performances), the user can download the concerned infrastructure as point clouds, wireframes or as
COUNTER TERRORISM
www.counterterrorbusiness.com
solids with variable opacity. Note that the downloading depends on correct identification of the user and data are sent encrypted to the Personal User Interface. Figure one shows a digitalised infrastructure as displayed in Cloud Points on the Personal User Interface. Computed concentrations of toxic agents in the air are displayed in various ways. When ‘Cloud’ is selected, the Personal User Interface displays a 3D volume in which the inner part is assessed to have a concentration of toxic agents over
the set limit. Hence, under given initial conditions, the volume and the shape of the cloud depend on the set limit. Note that once the solution has been computed for a given contamination, the display of the cloud according to set limit is achieved in real time. Figure two shows a cloud of toxic agent in a concentration above the set limit on the User Interface. Concentration is integrated in the direction of the individual (here from standpoint to 10m ahead). In figure three, computed parameters are
Walkris by HyGie-Tech combines the performance of its risk oriented Computational Fluid Dynamics system, HG_Flow, with a personal User Interface that gives an accurate, real-time position of each equipped individual and gives them the risk level responding to the chemical or biological agent leak
displayed on the same screen as in figure two but with information on airflow. The positioning of the individual can be placed on the same display to inform them whether they proceed towards a contaminated area and the level of toxic agent in that area. The precise positioning of the individual is a result of the permanent computation of all body movements to a customised integrator and is then transmitted to the Personal User Interface for its positioning in the digitalised environment. The global protective system Walkris, developed by HyGie-Tech, addresses the need for relevant information in contaminated environments.
FOR MORE INFORMATION HyGie-Tech Address: Avenue de Gratta-Paille 1 CH 1018 - Lausanne Switzerland E-mail: info@hygie-tech.ch Web: www.hygie-tech.ch
Figure 1
Figure 2
Figure 3
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
71
COUNTER TERROR EXPO I9 – 20 April 20II Olympia London www.counterterrorexpo.com
Counter Terror Expo delivers both focus and clarity to the complex and multifaceted task of protecting people and assets from those with the intent to do harm. This critically acclaimed event provides a vital forum for debate and plays a key role at the epicentre of the development of future counter-terrorism strategy. Unique, dedicated exhibition showcasing counter terrorism and specialist security technologies High level conference with six streams featuring over 200 leading international speakers Over 120 free-to-attend technology and practical workshops Live product capability demonstrations Meet the buyer programme Networking functions For more information please contact: Nicola Greenaway t: + 44 (0) 208 542 9090 e: nicola.greenaway@clarionevents.com w: www.counterterrorexpo.com
Register today at www.counterterrorexpo.com/register2011
COUNTER TERRORISM
www.counterterrorbusiness.com
PROTOTYPE FOR NEW BORDER MANAGEMENT SYSTEM Leading master systems integrator ARINC develops new integrated platform leveraging Objectivity database scalability, distribution and performance N TODAY’S SECURITY conscious world effective national border management is increasingly difficult. Border agencies must overcome the common challenges associated with the movement of people and their belongings while maintaining secure borders as well as the safety and security of national interests. As part of identity verification, wide ranging disparate types of intelligence data are needed. Additionally, in order to mitigate any risk of delay in the immigration process as a consequence of the investigation process, the intelligence data needs to be instantly available. The types of data that form this intelligence can range from simple watch lists and
I
systems involved in passenger processing. When a traveller of interest is identified, the investigation process kicks in and additional materials may be captured from all available intelligence sources. This may involve data sourced from public web and subscription sites, including social networking sites such as Bebo, Facebook, Flickr and Twitter as well as broadcast news sites such as BBC, CNN and Al-Jazeera. In a single installation an IBICS system can scale to manage information on anything from a few million passengers per year to more than 200 million travellers per year totalling several terabytes and possibly up to petabytes of data. Interfaces that collect passenger and biometric data from a self-service check-in kiosk will transmit
Objectivity/DB fits neatly into ARINC’s philosophy of maximising customer return on investment by adopting a forward looking approach which maps seamlessly with future requirements web documents to social networking sites, and audio and video media news clips. In practice, this involves intra-service, interagency and international stakeholder cooperation to provide robust control of both immigration and emigration. ARINC, the leading master systems integrator of air travel solutions, communications and engineering, is combining in its core Identity Management and Biometric technology, its expertise in networks and Advanced Passenger Information System, and its vast aviation industry experience into a new integrated solutions platform called Integrated Border Information and Control Systems (IBICS). IBICS will be developed as a platform delivering a holistic approach to security and border management. This will be a complete modular, scalable, turnkey offering that will enable governments and other stakeholders to employ a comprehensive, standards-based approach to border management. INTEGRATED SOLUTION With IBICS, advanced passenger information, document authentication, biometric and biographic data collection and authentication systems are integrated with check-in, baggage, boarding and other
that data to an airline’s departure control system for delivery to the government agency system. Maintaining the delicate balance between identifying inadmissible travellers (e.g. those on watch-lists) and keeping passenger traffic and cargo flowing smoothly is a huge challenge. The choice of database type/model for a border control and management system has direct and proportional impact on key metrics that will, in turn, directly impact the return on investment that a border control agency achieves. Selecting the correct database type/model is critical to enabling: • better managed integration and reduced operational support costs • improved security and maintenance of data integrity • optimisation of performance and reduction of infrastructure costs. Relational and object databases were both evaluated for IBICS. Objectivity/DB, an object database was selected for its scalability, distribution and performance. Additionally, since Objectivity/DB requires no object or relational mapping code, ARINC found that a third of the application overhead could be eliminated and far better performance achieved together with significant hardware savings. Eliminating this mapping layer also removes the need
for database administrators that relational databases require, saving on average a third to a half of staff time and cost. DATABASE ARCHITECTURE MODEL ARINC’s architecture for delivering an intelligence led approach to border management enables border control agencies, and other related agencies, to amass extensive intelligence on travellers thus enabling rapid, knowledge-based decision making. The modular architecture allows traveller data from a broad spectrum of sources to be ingested, including airlines, airports, cruise lines, ground transportation and sea ports. Data is received by an external ARINC electronic border message switch which then cleans and transforms it into an agreed format before sending it to an Ingest Application or Ingest Web Service. A data fusion engine is used to enable searching and fusion of internal organisations’ data, and by using a web service, searching beyond the organisation is possible. Data is then consolidated from across the Internet with internal data and traveller data in a rapid find and retrieve environment. Objectivity/DB plays a significant role in managing the huge volume of data, intelligence analytics, as well as direct relationship traversal that are orders of magnitude faster for speedy decision support. When further investigation and intelligence analysis is required, then relationships between travellers may extend beyond five degrees of separation. Persisting these relationships and the subsequent queries, be it navigational or traversal, when done in an Objectivity/DB is faster, dynamic and more efficient. “Objectivity/DB fits neatly into ARINC’s philosophy of maximising customer return on investment by adopting a forward looking approach which maps seamlessly with future requirements,” said Ray Batt, director Government & Security, ARINC EMEA. “Objectivity’s key factors in protecting investment from obsolescence and delivering a realisable return include its flexibility and extensibility, ability to scale over a highly distributed environment and interoperability across platforms, all in a heterogeneous environment.”
FOR MORE INFORMATION Press contact: Objectivity Public Relations E-mail: public-relations@objectivity.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
73
COUNTER TERRORISM
www.counterterrorbusiness.com
FIRST LINE OF DEFENCE – LOCHRIN® COMBI PERIMETER PROTECTION L OCHRIN® BAIN is well known within the security industry as a manufacturer and supplier of the government approved high security palisade fencing system – the Lochrin® Combi. Testament to this is that the Combi Fencing System & Gates are currently being utilised as the first line of defence in many UK key economic asset sites. Tested to recognised standards – The Lochrin® Combi Fencing & Gates systems are government approved to meet the new classification set out by the Home Office Scientific Development Branch (HOSDB). Further testing for a new product design is due to take place in October 2011. At Lochrin®Bain (Estd. 1859) we appreciate long term value and treat each project on its own merits, mindful of its priorities and specific requirements, bearing in mind the importance of balancing quality and subsequent downstream maintenance costs. And it is important to us that you, our clients, have the confidence in the products you buy today is the same as the product tested. We ensure the continuity of not only our component
suppliers but also their raw material suppliers further down the supply chain. We can apply our specialist design as a bespoke service to suit your specific business needs. Our aim is to minimise the risk to your assets and network, securing both new-build and existing infrastructure projects. In August 2010, Lochrin®Bain was bought out by H. W. Martin Holdings Ltd who has successfully delivered specialist public and private works contracts for over 30 years. The Group’s key areas of
activity include commercial fencing and vegetation management, permanent and temporary road safety barrier, traffic management systems, plant/ vehicle provision and maintenance, and waste recycling and management. This amalgamation together with the now available UK wide installation service will prove to a more attractive package to our clients providing turnkey solutions for the future. More recently, we were pleased to announce that the McArthur Group is now a distributor of the Lochrin®Bain patented security palisade systems including the Classic and Combi. Latest News – Lochrin® Bain is in the development stages of putting together a comprehensive Consultation Service to include all aspects of site vulnerability assessment, procurement and product testing and evaluation. This service will be carried out by a fully authorised government auditor. Lochrin® Bain staff will be available on Stand H36 and would be delighted to discuss any questions or requirements you may have.
FOR MORE INFORMATION Web: www.lochrin-bain.co.uk
ZAUN’S PERIMETER SOLUTIONS – THE FIRST LINE OF DEFENCE Z AUN’S INDUSTRY leading security perimeter solutions have been tested and approved to leading government standards. This enables us to provide a complete range of solutions to meet the security requirement for any high security perimeter application. Our first class range of perimeter fencing solutions is designed and manufactured in our state of the art production facility in the heart of the West Midlands. Solutions can be tailored to any application and can be provided as part of a complete turnkey solution. Zaun’s range of products includes 358 systems to our new ArmaWeave® range. This patent pending design sets the benchmark in perimeter protection. The range, which has received the Secured by Design (SBD) Award, is the first of its kind on the market that has been specifically introduced to set new standards in high security perimeter solutions. The innovative design of ArmaWeave® has been developed to meet the growing niche for high security fencing. The unique properties of this mesh system offer substantial advantages in delay times from attacks such as cutting with hand, powered and non-contact tools,
74
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
when compared with traditional welded mesh systems. The tight mesh pattern of this fence offers no climbing aids thus again limiting the potential for attack. Tested by various government departments, the ArmaWeave® range meets the current criteria for forcible attack. Another option from Zaun is Multi-fence. A patent pending design, Multi-fence is a mobile high security fence. This durable solution offers high security protection for situations that require temporary to longterm protection. The solution is also ideal for applications such as utility plants, as no foundations are required. Our system uses anti-climb fencing, giving protection up to 5m in height. With fence posts mounted onto concrete blocks which, due to an ingenious bolting method, can follow a curve or go from a flat surface to an incline with ease. Manufactured to meet the stringent quality
standards of BS EN 1317 Part 2 (vehicle restraint systems), the blocks are approved for use by the Highways Agency. This solution gives considerable space saving over separate roadblocks and temporary fencing solution and is available for rental or sales. Our range of vehicle and pedestrian security gates meet the demands of each site. Zaun’s gate technologies combine our industry leading fencing solutions to ensure they meet the same, leading government standards. These solutions can combine electronic locks, panic latches and electronic fence toppings as well as integrated camera systems and access control. This range extends to impact rated barriers and blockers, which have been tested to the highest government approved standards. Zaun can offer an integrated installation package to best meet your direct needs. Our fully accredited, specialist managed installers, ensure the installation meets the same high quality benchmark of our supplied products. This can be further enhanced with our leading product and installation guarantee.
FOR MORE INFORMATION For more information on Zaun and its extensive range of fencing solutions visit www.zaun.co.uk or call 01902 796699.
COUNTER TERRORISM
www.counterterrorbusiness.com
BROUGHTON CONTROLS: SPECIALISED SOLUTIONS FOR A SECURE WORLD I N THE CURRENT CLIMATE, the threat from international terrorism remains at a significantly high level and with ever more sophisticated and daring methods of attack, effectively securing site access and perimeter boundaries has never been more important. With over 35 years of experience in the design, manufacture and installation of effective, high security, entrance control solutions, Broughton Controls is the natural choice when it comes to providing a formidable and effective response to the threats we face today. Our dedicated teams, unrivalled knowledge of the high security sector has led to a unique, client driven service. “We are market leaders in perimeter security and have always offered complete flexibility when presenting solutions to our clients,” explains High Security Division BDM Jeff Howells. “Where we differ from our competitors, is our ability to offer the client the right solution to ensure that their expectations are met – rather than only offering a standard range of products.” This unique approach to problem solving has resulted in Broughton Controls securing the most comprehensive range
of quality, high security, and where appropriate crash-tested, products in the market today. This customer focused approach ensures that bespoke solutions are delivered, on time and on budget, for prestige clients around the world. This year Broughton Controls will be showcasing their extensive range of products and solutions on Stand B100 at the Counter Terror Exhibition 2011 in Olympia, London. This is a globally renowned event which is attended by an exclusive list of counter terrorism professionals such as government officials, armed forces, security services and law enforcement agencies. Broughton’s key focus for exhibiting at the event is to provide highly relevant,
in-depth knowledge, experience and advice on the perimeter and entrance control issues thrown up by the evolving threats in today’s ever changing world, and to formally enter into discussions on the way in which Broughton’s can provide tested, proven and reliable solutions to virtually every sector there is to counter the growing risks of terrorism and organised crime. If you have a particular project that requires a specialised solution, or alternatively if you require comprehensive high security impact rated PAS 68 products then Broughton’s vastly experienced members of the High Security Division will be in attendance. Should you wish to make an appointment please feel free to contact Sales Administration for allocated meeting times.
FOR MORE INFORMATION Broughton Controls Ltd Address: 33 Stakehill Industrial Estate, Middleton, Manchester M24 2RW Tel: 0161 6551020 Fax: 0161 6551021 Web: www.broughton-controls.co.uk E-mail: info@broughton-controls.co.uk Quote Ref: CTB002
KABA – PROVIDING HIGH SECURITY PRODUCTS AND SOLUTIONS O PERATING INTERNATIONALLY, Kaba is one of the world’s largest and most innovative manufacturers of security products and solutions. The Kaba product range includes Kitemark approved key systems, safe and container locks, hotel locks, security doors and turnstiles and online or stand alone access control systems. For over 30 years Kaba in the UK and Ireland has been combining individual products into a single integrated security solution for businesses across a range of market sectors. Kaba Ltd has established a reputation of providing comprehensive access control solutions for buildings, facilities and sites, as well as solutions for staff and enterprise data collection. Our in-depth knowledge of critical infrastructures makes us the perfect security partner for MOD and government sectors. Our technological expertise and a continuously developing range of bespoke products including biometric and RFID access control has enabled us to successfully install solutions that maximise security and access in some of the most demanding security locations. • Innovative solutions • Bespoke security solutions • Investment protection
• Quality assured • LEAN manufacturing • In house customer service team • Permutation facilities • Online ordering • Online knowledge base Products and solutions: • Kitemark approved mechanical locks • Stand alone electronic locks • Push button locks • Safe and container locks
• Access control and management systems • Security door, turnstiles and barriers • Hotel locking solutions
FOR MORE INFORMATION Kaba Ltd, Lower Moor Way, Tiverton, Devon EX16 6SS Tel: 0870 000 5625 Fax: 0870 000 5397 E-mail: info@kaba.co.uk Web: www.kaba.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
75
COUNTER TERRORISM
www.counterterrorbusiness.com
THE NEW APPROACH TO COUNTERING TERRORISM Thales discusses how collaborative working can increase recilience and protect protecting people, economy, infrastructure and territory throughout the world ERRORISM is not a new threat to the UK or the world. It has been around for centuries in many forms, but in the modern world these threats have increased in both frequency and intensity. Over the last few decades the ability of terrorists to carry out devastating attacks has increased ten fold as technologies have advanced and as the terrorists themselves have become smarter and more savvy to countering terrorism operations. It is a constant battle for governments throughout the world to stay ahead of the curve and develop counter measures that enhance thier ability to prevent attacks before they occur or to have the best possible contingency plans should an attack happen. The requirement for these improved prevention capabilities has been paramount to the leading global governments since both the 9/11 and 7/7 attacks, which sent shock waves around the world. These devastating attacks, not only took the lives of thousands of innocent people, but highlighted the fact that two of the most secure countries in the world were not impenetrable from significant terrorist attacks. Given the UK’s experience of terrorism from terrorist groups in Northern Ireland, you would have thought the UK would have learnt its lessons. GOVERNMENT INVESTMENT Both of these attacks have led to significant increases in government investment to counter terrorism, but both countries still remain on high alert from potential attacks from international terrorist organisations such as al-Qaeda. The increased threat of these attacks has posed government with a real problem, especially during the global financial crisis. Many questions have been asked about how threats can be reduced or negated whilst reducing the costs in order to help the UK regain financial stability. The government spending review has set out the plans for reducing the financial deficit, whilst the Strategic Defence and Security Review and the National Security Strategy have set out how the government intends to do more with less. These documents set out two clear objectives: to ensure a secure and resilient UK by protecting our people, economy, infrastructure and territory along with shaping a stable world by actively seeking to reduce threats
T
76
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
from international organisations. Both of these documents clearly outline the requirement to increase the investment into national security across the spectrum. Much research has been undertaken to review where the main sources of threats to our national security will come from over the coming years, with investment in these areas set to increase over previous budgets. The new strategies focus around removing bureaucracy and streamlining bilateral organisations in order to identify risks and threats earlier instead of having to deal with the consequences. KEY AREAS Two of the key areas that have been identified as critical to increase national and international security are cyber security and counter terrorism measures. Counter terrorism measures are diverse and cover everything from UK border security to covert intelligence gathering deep within the origins of the threat source. Key priorities in countering terrorism include working closely with international organisations to provide enhanced intelligence and communications, helping to identify when threats are building so that counter measures can be implemented to prevent the attack. Other key elements include increased border security systems that operate across multiple organisations within the UK and throughout the world. This collaborative working is a critical requirement if terrorist threats are to be reduced and strengthening of these international relationships will help to squeeze the terrorist groups in smaller pockets, thus reducing the opportunities for attacks. CYBER THREATS Cyber threats, on the other hand, can be significantly more challenging to overcome. The digital age has spread to the four corners of the earth, and now forms the basis of much of 21st century society. However, as the dependency on cyber technologies has grown so has the threat that accompanies it. The source of the threat is also far wider in cyber security. Unlike physical terrorism, which often requires coordination across groups or countries, cyber threats can be promulgated from the opposite side of the world from anyone with a computer. Although this may sound unrealistic, this is very much the case. Cyber
threats come from far wider than opposing governments. They also pose a much greater threat to normal people than perhaps we perceive them to. With so much personal information now stored in electronic format this means that not only national security data is open to attack, but also information on every single person who holds a bank account or uses the internet. It is the diversity of this threat that makes cyber security such a difficult challenge to overcome. So what does all this mean and how are these new strategies going to be realised? One of the key elements to come out of the SDSR and NSS is the need to increase the collaboration across industry to deliver the best solution at the best
COUNTER TERRORISM
www.counterterrorbusiness.com
price, without compromising on security. A major stepping-stone to achieve this will be much closer working relationships between governments, industry and academia. Developing this relationship will enable industry to get a much clearer idea of what the issues are. By doing this industry can establish if a solution already exists in a different sector, helping to reduce the costs of creating a new solution when one may already exist that requires only minimal tailoring in order to meet the requirement. This could lead to huge cost savings both for
the customer and the supplier, helping to provide better economies of scale and making industry more cost effective. MAKING THE WORLD A MORE SECURE PLACE The UK has long been known as one of the world’s leading innovators and if we are to succeed in making the world a more secure place, it is the collaboration across industry that will be key. Having laid out the strategy the government will be looking for not only large primes to work better together to deliver solutions,
Unlike physical terrorism which often requires coordination across groups or countries, cyber threats can be promulgated from the opposite side of the world from anyone with a computer
but also to look at bringing through new and emerging technologies from SMEs. This cross working approach will help to ensure that technologies are not overlooked purely because they are provided by smaller businesses, with the larger primes being able to absorb some of the risk associated with new technologies. Developing this approach will also have a knock on effect in terms of helping to repair the global economy. Increased business growth will not only provide more income to the global financial market, but it will also help to create jobs and provide economic stability to countries like the UK. An example of how this process has already begun is with the INSTINCT Technology Demonstrator 2 programme, which aims to showcase new and existing technologies to enhance aviation security, which is a highly targeted area for terrorists. The programme has brought SME technologies to the fore, which will pave the way for future aviation security. Many of the SMEs involved in this programme may not have previously had the funds or the ability to show their technologies to key stake holders in the aviation sector, but this programme, which is headed up by OSCT, could lead to substantial changes in how airports operate and significantly improved security. BATTLE Although the SDSR and NSS set out the objectives that will help to reduce the threats we all face on a daily basis, the future requirements for counter terrorism and cyber security are constantly and rapidly evolving. For every counter measure that is created to prevent and negate physical and cyber attacks on the world we live in, the terrorists are already looking at ways to circumvent the very things which are put in place to prevent them. It is a battle that will be raging on for future generations to come, and for each threat that is eradicated another one will appear. Of course technology is only one part of a complicated jigsaw that needs to be put into place. However, by accepting the challenge and working closer together across government, industry, academia and international boundaries we at least improve our chances of success. We know what needs to be done, and where the focus needs to be, now it’s down to us all to work towards a common goal of stamping out terrorism wherever and whenever it rears its ugly head.
FOR MORE INFORMATION Web: www.thalesgroup.com/uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
77
Covert Buried Sensor
Simple to Install
No Special Ground Preperation required
Ground Heals Within Days
SYSCO COVERT GROUND SENSOR The Sonaflex covert buried sensor is ideally suited for locations that require a discrete covert sensor that is both cost effective and simple to install without the necessity for major groundwork’s. As the sensor is passive, it is not compromised by existing utility cables or water pipes within the sensor proximity. Field proven in many demanding high security installations, the Sonaflex buried senor is the ideal choice where performance and reliability is a key requirement.
SYSCO INTERNATIONAL psmsysco@aol.com
COUNTER TERRORISM
www.counterterrorbusiness.com
SYSCO SONAFLEX BURIED AND JOINT DOMAIN SENSOR The Sonaflex buried system is a truly universal detection system that can be installed into a variety of different ground conditions and topologies HE SONAFLEX sensor can be deployed as a high security direction sensing covert ground sensor or as a medium security approach sensor. In scenarios whereby the ground conditions do not allow for trenching, the sensor can be installed directly onto the surface as shown in the picture to the right. EARLY WARNING In the rapid deployable mode the sensor can be installed directly underneath the surface of the turf and grass without the necessity of major groundworks or ground disturbance. This application is ideally suited where a covert sensor is required to give an early warning of intruders whilst minimising both the installation cost and site disruption. Once installed the ground healing process is rapid leaving no trace of the sensor placement, which is particularly suited to VIP residences or other installations where it is desirable for the sensor installation to remain both discreet and covert. The sensor is terrain following and is unaffected by tree roots, water pipes and other utility services or the close proximity of roads. In most instances, the sensor is adaptable to the changing weather patterns such as heavy rain, low temperatures, snow and vegetation growth. In extreme cases the sensor will work even when the ground is waterlogged. The sensor performance is not affected by long grass. Where there is an existing bed of gravel or stone chippings, the sensor cable can be directly installed underneath. The Sonaflex sensor cable is supplied with a ruggedised outer steel jacket. For larger installations where it is desirable to have distributed processing, the Sonaflex processors are connected via a RS485 data cable. The power requirements for the processers is supplied from a central point and distributed through the data cable. This allows distributed processing without the need to install local power supplies. The Sonaflex processor is supplied with four inputs. Each can be individually selected to operate a zone with a particular frequency range. This allows selected inputs to be configured and used as a fence mounted sensor in addition to a buried sensor or in a combination of both. By using both options the Sonaflex system may be used as a joint domain sensor to detect both approach to the fence, climbing and cutting the fence fabric. Direction sensing can be configured as a pre alarm prior to any tampering of the fence.
T
The Sonaflex processors are supplied with five switchable relays in addition to eight differential inputs allowing for both the monitoring of third party inputs such as gate contacts, lights and the switching of third party devices. This allows the Sonaflex system to be used as a data acquisition system including gate control and monitoring gate status. When required, the Sonaflex processors can be centrally rack mounted. COST EFFECTIVE SOLUTION The Sonaflex system can be supplied with its own dedicated graphic user interface to monitor the status of the protected area including third party sensors and
equipment such as video systems, gate position monitoring and other devices alternately; the system can be fully integrated into an existing control system. The Sonaflex buried/ground sensor is a cost effective and versatile solution for covert detection or joint domain detection which has been field proven in a variety of installations throughout Europe.
FOR MORE INFORMATION On-site surveys and equipment demonstrations/trials can be arranged throughout Europe. Tel: 07740 514501 E-mail: psmsysco@aol.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
79
COUNTER TERRORISM
www.counterterrorbusiness.com
INTELLIGENCE-LED BORDER MANAGEMENT Andrew Preistley, business development director at Arinc, looks at how intelligent-led border management is fundamental to fighting terrorism ITHOUT TOOLS man is nothing, with tools he is all,” proclaimed Scottish historian Thomas Carlyle over 200 years ago. What he should have added was that tools alone – whatever the situation – are never enough. Their effectiveness depends on the way in which they are used. So while those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease. The truth is that even the most cutting edge border control technology needs two additional factors if it is to be really effective. The first is back-up by personnel trained to spot the nuances of human behaviour that escape electronic detection. The second is a system of international standardisation and collaboration that enables passenger information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers, and then acts on that information appropriately. So what’s the hold-up?
“W
COMMON-LANGUAGE DATA SERVICE The main stumbling block is said to be the technical problems created by the range of different data sources and formats used by various agencies. This can be easily overcome with the use of ARINC’s Electronic Borders – an end to end immigration service that combines many data sources, potentially including Advance Passenger Information System (iAPIS) and Passenger Name Records (PNR) along with other data sources, such as government watch lists. Translating messages from disparate agencies and systems, it provides a unique screening solution that enables Border Control Agencies (BCAs) to make accurate and swift decisions on every traveller whilst maintaining passenger privacy. Using ARINC’s private, highly secure AviNet global communications network, Advance Passenger Information (API) can easily be sent to the country of origin and/or destination, allowing seamless, efficient and reliable communications between airlines
80
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
While those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease and BCAs. Designed to handle critical, sensitive information and with 99.999 per cent availability, AviNet is a proven industry standard around the world. More and more governments require airlines to provide API so they may collate electronic lists of passengers and crew in advance of travel. With any carrier that fails to supply this information being hit where it hurts – in the pocket – by a heavy per-passenger fine, Electronic Borders offers the ideal standards based solution. Configured to be as cost-effective as possible, it requires no new system development, and in many cases, even the modification of existing systems, thanks to ARINC’s recognition of the industry’s need to minimise operating costs and avoid putting additional strain on budgets that are already stretched to the limit. The combined use of iAPIS and PNR enables security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk
passengers. BCAs, law enforcement organisations and intelligence services get a valuable head-start on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects. ADDRESSING DATA SECURITY CONCERNS Understandably, data protection remains a real concern for many, particularly where API messages are transmitted by e-mail and over the internet. This is not an issue with a fully-managed IP network like ARINC’s AviNet, which provides a level of reliability and end-to-end security that is lacking in a public internet connection. Carriers using AviNet can be confident of fully complying with their legal obligations whilst simultaneously protecting the privacy of their passengers. The subsequent use and storage of data by the recipients, however, is not always so assured. Within the European Union there are strict regulations in addition to
COUNTER TERRORISM
www.counterterrorbusiness.com
international guidelines on how the data may be used by law enforcement agencies. However, you don’t have to be a cynic to suspect that some countries may take a more relaxed view of the guidelines. While the vast majority of travellers pose no security risk it is essential that law enforcement and intelligence agencies are able to make best use of the information they have at their disposal. EU data protection laws mean that there are strict rules on retention of passenger information if the individual is not of interest. It is therefore important to be able to identify those who are of interest quickly and easily. Would-be terrorists often enter a country a long time before undertaking any illegal activity so the ability to track their previous movements or access their travel itinerary can be crucial. Similarly, the ability to access an audit trail of movements is vital in risk-assessing passengers and
maintain biometric and biographical information as well as supporting all phases of the identity management lifecycle. ARINC supports token-based identity verification, which uses smart cards, 2D barcodes, or other devices containing the biometric data gathered during enrolment. This data is compared with a passenger’s biometric data collected at the verification location – usually a kiosk with a nearby attendant. It also supports token-less identification, which uses only biometric input that is compared with data on file. IMPLICATIONS OF SELF-SERVICE TRAVEL Over 80 per cent of passengers now make use of mobile devices, the internet and self-service kiosks for a more convenient check-in away from traditional, dedicated airport workstations. Although this is a welcome time- and money-saver that alleviates queuing and space constraints
The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk establishing whether further examination by an immigration officer is warranted. Airlines have rather different concerns regarding data collation. Those using legacy systems find government demands to extract data can entail budget-breaking costs. Worse still, with the absence of standards harmonisation, compliance with the varying data requirements of different governments involves has additional time and cost implications. The use of ARINC’s Electronic Borders alleviates these costly problems. EFFICIENCY-BOOSTING BIOMETRICS API and PNR alone do not go far enough in today’s security-conscious climate to guarantee accurate passenger identification. Complementing biographical data screening and other forms of risk management, biometric technology helps prevent a range of criminal activities made possible with forged documents and stolen identities. It can also be used to confirm employee identification and permit access to sensitive airport facilities. With a long and successful track record in systems integration, ARINC recognises the need for software flexibility to accommodate the varying border regime requirements as well as ensuring that biometric systems integrate with existing airline and airport processes. The company’s fully-integrated Identity Management System (IdMS) offers a solution that is designed to be applicable in many critical settings and that can collect, verify, and
within airports, it does mean that passengers taking only hand luggage could have no interaction with the airline until they reach the gate. From a security point of view this is potentially problematic. It is vital to be able to track the arrival and progress of each passenger in the airport and this has led to an increase in demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. This PRS complements ARINC’s IdMS, which uses biographical and biometric information to help create fast lanes for pre-registered passengers as well as checking employees and crew members. In addition, links to watch lists assist government agencies responsible for border control, hazardous material management and for securing other high-risk facilities. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary. The system also supports the secure transition to more common-use self-service (CUSS) applications and off-site check-in options. SHARED INFORMATION BOOSTS SECURITY Information sharing is a crucial element in the fight against terrorism and ARINC’s MultiUser System Environment (MUSE) family of passenger and flight information systems,
currently supporting over 300 airlines at more than 100 airports worldwide, allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional checkin desks, airlines can access the information they need whenever they need it. As all transactions – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced. UNIVERSALLY EMPLOYED TECHNOLOGY The 21st century has witnessed a transformation in aviation security, with no let-up in the battle to stay one step ahead of terrorists and other law-breakers. Every incident – from the atrocity of 9/11 to last year’s discovery of bombs hidden inside printer toner cartridges – leads to calls for more rigorous passenger screening. This is followed by howls of protest from travellers who are increasingly exasperated by the hoops they have to jump through in order to get from A to B, as well as handwringing across an aviation sector that sees its costs soar and resources stretched to adopt the additional measures. The reality is, though, that we already have the ability to identify and detain suspect travellers. Part of the problem is the fact that the plethora of constantly-evolving technology leading the fight against terrorism is not universally employed. Of greater concern is that the effective use of the information gathered continues to be hampered by a lack of international harmonisation of standards, failures in intelligence-sharing and, last but not least, human error. The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk. What hasn’t been agreed is precisely how this is to be achieved. That, though, is just the beginning. Those charged with border control must make proper use of all the available information at their disposal – not only that gathered by airlines and airports but also personal information available in the public domain on personal websites, blogs and on social networking sites. Intelligence-led border management means analysing and correctly interpreting this information if it is to be effective in the ongoing crusade against terrorism. For a single weak link in the security chain is all it takes to let the terrorist succeed.
FOR MORE INFORMATION Web: www.arinc.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
81
Save time, money, and effort Easy, versatile modular assembly solution.
technology
The MiniTec Profile Building System ■ ■ ■
■
MOTION
a unique resource for specialist motion components, assemblies and systems.
Easy to use No power tools required Standard and customised solutions Cutting service ce
D E AN COM THE T I S I V ORY FACT
C us today and arrange a visit to meet Call th the Team and experience the technologies. W We look forward to seeing you.
FREE samples FREE design advice ce FREE design toolss Contact us now and see how easyy MiniTec is to use and adapt. Limitless range of applications including: Machine Guards, Workstations, Conveyors and Customised Enclosures.
●
Linear Slides
●
Electric Actuators
●
Rotary Tables
●
Linear Bearings
●
Elevator Tables
●
Drives and Motors
●
Single and Multi-Axis
●
Standard and Custom
●
Manual and Motorised “Goods received, amazed at quick turn around, thank you” RUTHERFORD LABORATORY
Design Manufacture Supply Call us today to discuss how we can help you. Alternatively, come in and see us.
UK based designer and manufacturer of positioning systems offering you experience, knowledge and full engineering capabilities.
THE ENGINEER’S CHOICE
LG Motion Limited Tel: +44 (0)1256 365600 Fax: +44 (0)1256 365645 info@lg-motion.co.uk www.lg-motion.co.uk
T: 01256 365605 E: info@minitec.co.uk www.minitec.co.uk 15957 MiniTec 275x92mm ad .indd 1
6/9/10 15:45:50
Engineering excellence - by design
COUNTER TERRORISM
www.counterterrorbusiness.com
KEEPING THE UK SAFE Baroness Neville-Jones, Minister of State for Security and Counter-Terrorism, explains the UK Government’s strategies on counter-terrorism powers and measures N MAY LAST YEAR, a young woman, allegedly radicalised on the internet, attempted to murder Stephen Timms MP at his constituency surgery in East London. In October, Al Qaeda in the Arabian Peninsular attempted to blow up two aircraft bound for the United States, one of which was intercepted in the UK. In December, a Swedish man who had spent some time living in this country partially detonated two bombs in Stockholm city centre. Thankfully none of these resulted in any fatalities but it shows that the threat from terrorism is real and ongoing. Since we came into power almost a year ago, Britain has faced a complex range of threats at home and abroad. We recognised very early on the need to have structures in place that allow us to react quickly and effectively, but also strategically.
I
NATIONAL SECURITY COUNCIL In our first few weeks in office we established at the heart of government a National Security Council (NSC), of which I am a member. The Council, which is chaired by the Prime Minister, oversees all aspects of UK national security and, under the authority of the Cabinet as a whole, takes decisions in relation to opportunities and threat we face, integrating at the highest level the work of the foreign, defence, home, energy and international development departments. The NSC oversaw the publication in the autumn of our National Security Strategy and the Strategic Defence and Security Review – the first time in a long time that government has made decisions on defence and security from an integrated and strategic point of view. This marked a step-change in the UK’s ability to protect its security and advance its interests in the world. COUNTER TERRORISM PLEDGES The start of 2011 saw us deliver some of our key coalition pledges on counter-
terrorism powers and measures. Once implemented, the review of counterterrorism and security powers will do much to roll back encroachment on civil liberties. We will repeal the control order system and replace it with one which is significantly less intrusive and more focused. We will stop the overly-intrusive use of surveillance under the Regulation of Investigatory Powers Act (RIPA), as well as repealing the use of the indiscriminate stop and search powers, replacing it with a circumscribed version that can only be used where there is a real threat of terrorist attack. We are soon to publish the outcome of the Prevent Review. And we are currently revising our counter-terrorism strategy – CONTEST – which will reflect the work we have done so far and set out our vision for counter-terrorism for the next four years. As well as giving a clear picture of the threats we face, it will set out planning assumptions about how the terrorist threat might develop over the next four years. WORKING TOGETHER But government cannot, and should not, provide the whole solution. Maintaining national security is a collective effort in which we all – government, industry and academic communities – need to play our part. The expertise and innovative technology provided by industry make a vital contribution to keeping the UK safe and secure; allowing us to stay one step ahead of those who would seek to do us harm. This government is starting to engage at a much earlier stage in the process of security development – at the concept rather than the specification stage. One example of our ongoing improved engagement with the private sector and academia is our Innovative Science and Technology in Counter-Terrorism (INSTINCT) programme. INSTINCT formulates security problems and facilitates small and medium enterprises to provide potential solutions.
Since we came into power almost a year ago, Britain has faced a complex range of threats at home and abroad. We recognised very early on the need to have structures in place that allow us to react quickly and effectively, but also strategically
ABOUT THE AUTHOR Pauline Neville-Jones is the minister of state responsible for security and counter-terrorism. During a 30-year career as a diplomat (1963-1996), Pauline Neville-Jones served in British missions in various locations around the world, including the former Rhodesia, Singapore, Washington and Bonn. She also spent five years on secondment to the European Commission. From 1991 to 1994, she was deputy secretary to the Cabinet and head of the defence and overseas secretariat in the Cabinet Office. Between 1993 and 1994, she was chair of the Joint Intelligence Committee. From 1994 until 1996, she was political director in the Foreign & Commonwealth Office. Pauline is an honorary fellow of Lady Margaret Hall, University of Oxford, and a Doctor of London University, City University and the Open University. In January 2006, she was appointed by David Cameron to head the Conservative party’s National and International Security Policy Group. In July 2007, Pauline was appointed shadow security minister and national security adviser to David Cameron. We have seen through our INSTINCT technology demonstrators some really innovative answers. And maintaining the UK position at the forefront of global innovation is also crucial to our economic recovery. When it comes to ways in which we can work with industry, we are currently consulting under our Equipment, Support and Technology for UK Defence and Security Green Paper in order to be able to set out and plan for our future security and defence needs. As I said at the beginning of this article, with a new government comes a new approach. But the objective remains the same – to stop terrorist attacks. We are determined to apply all of the tools at our disposal to achieve the first duty of any government – protecting the British public. At the same time one thing is clear in everything we do: we will not allow the threat from a tiny minority to override the rights and freedoms which the vast majority are entitled to enjoy.
FOR MORE INFORMATION www.homeoffice.gov.uk/counter-terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
83
POWER SUPPLIES AND CHARGERS AC/DC · DC/DC · DC/AC · NiMH · LI-ION · LEAD-ACID Call us for a competitive quote 01722 504853
0% 10
C
O
N
T
RoHS MPLIA
True to the power of quality www.mascot.com · sales@mascot.no
COUNTER TERRORISM
www.counterterrorbusiness.com
A QUIET REVOLUTION? Hugo Rosemont, security policy advisor to A|D|S, explores developments in UK and EU counter-terrorism polices HE COALITION GOVERNMENT has overhauled the UK’s approach to national security with several new initiatives and strategies. The Prime Minister has established a new National Security Council for the UK and created the additional position of national security adviser. In October 2010, the coalition published a new National Security Strategy (NSS) and a Strategic Defence and Security Review (SDSR). The 2010 spending review declined to ring fence national security expenditure and the government is implementing a radical programme of police reform. Furthermore, the coalition has placed a major new focus on the UK’s strategy for cyber security and information assurance, with a commitment of £650m to new public sector investment in this area. A revised UK counter-terrorism strategy, Contest, is expected to be announced before the summer which promises to make further changes to existing arrangements.
T
LINKS WITH INTERNATIONAL SECURITY Alongside these developments, the government has placed a major new priority on the international elements of security and counter-terrorism. It correctly believes that in a highly interconnected world the distinctions between domestic and international security are breaking down. It has decided that the UK’s approach must
be configured to take account of the global nature of security. The Foreign Secretary has observed that domestic government departments have an increasingly international aspect to their work. Reflecting this, the Home Office and other government departments have been seeking to develop new levels of bilateral security cooperation with the UK’s international allies. This was demonstrated in August 2010 with the news that the UK and Kuwait signed a Memorandum of Understanding (MoU)
activities of multinational organisations in the field. In particular, the European Union (EU) is advancing its approach to security in completely new ways. The Lisbon Treaty means that the EU is expected to play a much greater role in counter-terrorism and security. EU INVOLVEMENT The EU’s involvement in counterterrorism policy is not completely new, but it is evolving considerably. Its role in the business elements of security is
The coalition has placed a major new focus on the UK’s strategy for cyber security and information assurance, with a commitment of £650m to new public sector investment in this area on security matters. The SDSR committed the UK to work more closely with its major international partners on security issues and then, in November 2010, the UK and France agreed to cooperate more closely on counter-terrorism and cyber security issues within the context of their new treaties on defence and security. The renewed focus on stronger bilateral security cooperation has been welcomed in industry. But it will also be important for the UK to remain fully involved in the
also a relatively recent phenomenon. For example, the EU’s latest Framework Programme of Research includes a security component. There are useful opportunities for government departments and the UK-based security industry to seek funding from the EU’s 1.4 billion budget (20072013) available for collaborative research and development investment in the fields of security and counter-terrorism. The EU’s new Defence and Security Procurement directive is scheduled to
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
85
Value Added Motion Control Solutions. Infranor Group offers innovative solutions from detailed design through to manufacture.
We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defense, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.
www.infranor.com
Info.uk@infranor.com 5/11/10
15:46
Page 1
Electronic product design from concept to completion Our Mission at Prosync Ltd is to provide a consultancy for the design of remote switches and timers. Whether your application is industrial, commercial or governmental Prosync Ltd has a solution, giving you enhanced control capabilities, improved efficiency and ensuring regulatory compliance. It enables improved asset and staff security and protection, and provides you the opportunity to reduce operating expenses. At Prosync Ltd we like to add value to your project.. not cost. We use Intelligent engineering to support new designs. We are always available to assist on any aspect of system/board integration or application suitability for new design, or replacement of obsolete board. Contact us today for a friendly, no-obligation initial discussion.
Prosync
Contact: Email: info@prosync.co.uk Phone: 07771643205
www.Prosync.co.uk
Prosync_halfpageAd:Layout 1
COUNTER TERRORISM
www.counterterrorbusiness.com
be transposed into law in August 2011. Whilst some see the implementation of this directive as more of a threat than an opportunity, concerns are generally combined with recognition that, where possible, open competition within European security markets could open up new business for the UK security industry. At the operational level, many leading figures believe that the EU’s Border
organisation also has its own counterterrorism coordinator who is becoming an increasingly important figure in the implementation of this strategy and other counter-terrorism policies across Europe. FUTURE DEVELOPMENTS Looking to the future, key figures in Brussels are considering the value of an EU industrial policy for security, much as
The government has placed a major new priority on the international elements of security and counter-terrorism. It correctly believes that in a highly interconnected world the distinctions between domestic and international security are breaking down Agency, Frontex and the European Police Office (Europol) are valuable European contributions to international security. The EU is advancing a CBRN Action Plan, which seeks to enhance multinational cooperation in chemical, biological, radiological and nuclear protection. The EU has also published the priorities of its new Internal Security Strategy. The
it already has in place for other sectors. It is understood that the commission has begun early work on a draft for a European Industrial Security Policy. Many UK companies would be supportive of a more robust framework for industrial policy relating to security; especially one which included stronger EU standards and even legislation in the field of counter-terrorism.
These initiatives are just a few of the many examples which show how the EU is becoming an increasingly influential player in the international counterterrorism arena. They also illustrate how the commission is becoming more involved in the business aspects of security. Reflecting the importance of these issues, the International Working Group of UK Security and Resilience Industry Suppliers’ Community (RISC) has been established as a UK security industrial forum that meets in London regularly to consider the implications of EU and wider international security policies. The development of any proposed European Industrial Security Policy would be a significant evolution in the EU’s involvement in security. To date, this new idea has attracted surprisingly little attention in UK security policy circles. If it develops as anticipated, government and industry should work together to understand the potential implications of this new initiative and ensure that the UK’s voice is at the forefront of any future discussions.
FOR MORE INFORMATION Web: www.adsgroup.org.uk
INTRODUCING A SMARTER WAY TO CALIBRATE TEMPERATURE Beamex introduces a smarter, more efficient and accurate solution for calibrating temperature. It is a complete solution for temperature calibration with various different products and services, such as a series of high-quality dry blocks for field and laboratory use, smart reference probes and temperature calibration laboratory services. The Beamex® dry blocks communicate with selected Beamex® MC-calibrators enabling fully automated temperature calibration and documentation! Beamex® FB Field Temperature Block and Beamex® MB Metrology Temperature Block Beamex® FB Field Temperature Block, is a lightweight, high-accuracy temperature dry block for industrial field use (3 models available). The Beamex® MB Metrology Temperature Block is a portable temperature dry block that provides bath-level accuracy for industrial applications (4 models available) n FB Series temperature ranges from -25°C to + 660°C n MB Series temperature ranges: from -45 °C to +700 °C n Accredited calibration certificate included as standard
Tel +44 (0)1455 821920 Fax: +44 (0)1455 821923 Web: www.beamex.com THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
87
SPOTLIGHT FOCUS: IP SECURITY
www.counterterrorbusiness.com
TOTAL SECURITY MANAGEMENT In this article, James Smith, European marketing manager for Samsung Techwin Europe Ltd, provides an overview on how total security management can help achieve the maximum from a surveillance system by utilising powerful software tools such as intelligent video analytics P AND NETWORK SECURITY products are now the single largest contributors to the growth of the physical security market as new installations take full advantage of the benefits that operating over the network brings. An IP network based security system can offer a level of integration that just wouldn’t have been achievable a few years ago. Integration within the security environment has for many years been a much used, and some would say abused, word. There was a time when it meant nothing more than a number of different systems that when there was an incident, would trigger flashing lights or a sounder on a control room console or more recently a PC screen. The progress made over the last year or so is remarkable but not totally surprising bearing in mind the substantial investment in R&D that leading security brands such as Samsung have made to ensure that end-users can gain maximum advantage from the latest technology incorporated into intruder, fire, access control and perimeter protection, as well as overt and covert surveillance systems. TOTAL SECURITY MANAGEMENT Total Security Management (TSM) is a new approach to security system integration from Samsung that is designed to achieve maximum benefits from surveillance solutions for a host of applications, including infrastructure, city-wide protection and national defence with the objective of contributing to create a safer and more secure world. It is scalable and can be deployed in any environment from, for example, retail where the priority is the protection of stock through to the far more demanding and sophisticated requirements of those involved in counter terror. The TSM system is capable of managing multiple video sources via a single platform as well as a wide range of other systems and is therefore able to help role-based local control centres function more efficiently and effectively. The risk factors and events detected by the system’s intelligent video analysis engine are displayed in three dimensions using 3D Geographic Information System (GIS) technology so that operators can instantly get an enhanced perception of the situation and take appropriate action. Predefined scenarios can also be entered into the system allowing operators to follow work-flow instructions in the case of an incident in order to improve
I
88
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
communications and response times. The following are just a few examples of the attributes of a TSM system that go beyond what you might normally expect from conventional security equipment. CITYWIDE PROTECTION City centres and surrounding areas can be kept safe through the capture and analysis of video across areas such as main roads, residential zones, parks, public and transportation facilities. With the ability to automatically detect multiple simultaneous incidents, Intelligent Video Analysis (IVA) technology can alert operators and emergency services to incidents such as large crowds forming or erratic behaviour, as well as the detection of illegally parked and stopped vehicles
ILLEGAL OR SUSPICIOUS PARKING Networked speed dome cameras with full 360° rotation, preset positions and automatic tracking features with an effective surveillance range of up to 100m and fixed box-type cameras with an effective surveillance range of up to 120m, can capture and analyse number plate information. It is possible therefore to proactively search for stolen and/or unregistered vehicles from information stored on a database fed by government and traffic agencies. The speed of travelling vehicles can be established using highly accurate laser detection technology and the number plate details of those vehicles breaking set speed limits can be captured using ANPR technology. This provides a highly effective deterrent to
Total Security Management (TSM) is a new approach to security system integration from Samsung that is designed to achieve maximum benefits from surveillance solutions for a host of applications, including infrastructure, city-wide protection and national defence with the objective of contributing to create a safer and more secure world using ANPR. 24-hour high definition (HD) network cameras and thermal imaging technology can be coupled for enhanced detection and recognition capability in any weather or lighting condition. INTELLIGENT TRAFFIC SYSTEMS Intelligent Traffic System (ITS) solutions bring intelligence to video through technologies such as Intelligent Video Analytics (IVA) and Automatic Number Plate Recognition (ANPR) to ensure a host of potential traffic related issues can be avoided and incidents dealt with effectively and efficiently over an entire city. IVA is able to interrogate a scene in real-time and alert security operators and/or perform specific actions based on a set of pre-determined parameters. For example, IVA can be used to detect traffic accidents and automatically turn on warning signs along the highway to warn other drivers of the danger ahead, whilst ANPR can be used for a host of applications including identifying speeding vehicles across a city, bus/taxi-lane violations and vehicle gate/barrier opening.
improve traffic safety and enables authorities to issue fines or warnings to speeding motorists in a fully automated system. TUNNEL ACCIDENT DETECTION SYSTEM IVA technology can be used to detect erratic driving, smoke and fire to alert security and safety teams to the threat, or occurrence, of an accident. This allows traffic to be stopped or diverted away from the scene automatically using information and warning signs, and ensures an immediate response from emergency services with clear information from surveillance cameras to the nature of the incident to add to intelligence before arriving at the scene. IVA provides an effective fire detection system with specific algorithms to detect smoke and flames and constantly analyses and recognises abnormal behaviour for a large number of things within the scene including traffic speed, traffic jams, direction of travel, pedestrian pathways and falling objects etc. THE PROTECTION OF UTILITIES Oil pipelines run over very large distances and can be thousands of miles from a
SPOTLIGHT FOCUS: IP SECURITY
www.counterterrorbusiness.com
With a modular and flexible system design, TSM Professional allows the operator to manage various system packages from a single, fully integrated platform including video wall systems, Automatic Number Plate Recognition (ANPR) and Vehicle Detection Systems (VDS) base of operations. As such they are vulnerable to damage, leaks and acts of vandalism or terrorism, which can have disastrous consequences to the safety of people and the environment. By deploying intelligence robots and Unmanned Aerial Vehicles (UAVs) with thermal imaging and long-distance IR surveillance cameras to build a remote surveillance system, issues can be detected quickly and security or engineering teams rapidly deployed. Utility sites such as thermoelectric, water and nuclear power plants can also benefit from the use of robot security systems and thermal imaging cameras to protect both the perimeter and internal areas of a site. High definition network cameras and dust proof/explosion proof cameras can be deployed to ensure full coverage, even in extremely hazardous and volatile areas. IVA technology coupled with a comprehensive surveillance system can also be used to detect incidents such as leaks or the outbreak of fire to alert staff early. PERIMETER SECURITY SYSTEMS Advanced unmanned security systems deployed along what could be a very long boundary can utilise ultra-long distance day and night IR surveillance cameras combined with robot security and ground radar for complete coverage. Effective night surveillance is possible using automatic thermal imaging target tracking and optical cameras with a surveillance range of 2km and can integrated with ground sentry radar for accurate positioning. In addition, artificial intelligence robots with IT and enhanced imaging technology can detect an intruder in sync with multiple sensors, intelligent cameras and radar, and then physically suppress intruders, with non-lethal weapons such as an acoustic device. The robot can be operational 24 hours a day, all year round, and can operate in extreme weather conditions and complete darkness. MILITARY SOLUTIONS Military solutions are designed to protect key military facilities through the deployment of scientific, intelligent, automated, and unmanned state-ofthe-art surveillance devices to enable 24-hour control and operation from a remote central control centre. Scientific intelligent surveillance devices
are not held back by human limitations in areas such as sensing and perception, and are therefore able to provide the most effective security system available today. By using defogging, thermal imaging and IR camera technology these can detect intruders at night or in adverse weather conditions including snow and heavy fog. SCALABLE SOLUTIONS As previously mentioned, an IP Network based Total Security Management solution is scalable allowing users to specify a system which meets their current requirements whilst having the flexibility to expand as requirements change. A ‘Standard’ system can, for example, manage, display, and store video from up to 72 channels on a single integrated server. This not only makes for a very efficient and cost effective security system because of its simple design, but it also helps integrate conventional analogue CCTV cameras with network devices onto a single video server. A ‘Professional’ level TSM system is a suitable platform for medium sized security systems and supports up to 144 channels and 16 users across multiple media servers. With a modular and flexible system design, TSM Professional allows the operator to manage various system packages from a single, fully integrated platform including video wall systems, Automatic Number Plate Recognition (ANPR) and Vehicle Detection Systems (VDS). ‘Enterprise’ level TSM offers unlimited expansion opportunities that is optimised for metropolitan sized applications and also supports the operation and integration of separate data centres to ensure the security of data.
FOR MORE INFORMATION For more information on how a Total Security Management solution can take the integration of physical security to a much higher level, please or e-mail STEsecurity@samsung.com or telephone +44 (0)1932 455308
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
89
PERIMETER SECURITY
www.counterterrorbusiness.com
STOP INTRUDERS WITH SOLUTIONS FROM GPS PERIMETER SYSTEMS HE CONCEPT of a Perimeter Security System is simple; deploy a series of detectors around assets or people to be protected, far enough away from them to provide adequate time to make an appropriate response. There are three main elements to achieving this: • Detection – some suspicious activity is taking place that must be detected. • Verification – if possible verify, audibly or visually, that it is a genuine threat. • React – take some action that can prevent or reduce the effect. Detection is the first priority as verification and reaction cannot take place without the initial detection but the choice, design and operation of a detection system must take into account the other two factors. Ensure the selected detection system can cope with the site conditions taking account of changes in direction and levels around the perimeter. Some systems need flat, level ground, some do not. The system operation must be suitable for the site and not affect the normal working practices of the site. If the end user wants to park trucks up to the fence line beams and barriers will not suffice. Use existing or natural security barriers such as hedges, fences and water to
T
90
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
reinforce the perimeter security. Remember that equipment mounted directly on the final perimeter fence or wall can be subject to vandalism or unwanted alarms if free access to the unsecure side is possible. Keep the detection system as close as possible to the site boundary. This gives the maximum possible time for the appropriate reaction. Make sure that CCTV camera coverage matches the perimeter zone configuration, which will ensure effective verification. Do not put the detection in areas where the cameras are not able see, such as in wooded areas or behind buildings. Do not make the detection zones too small or short. Intruders will not stand still once on the site and so cameras looking at very short sections of the perimeter for verification may miss them. Use pre- and
post alarm video recording if possible. GPS Perimeter Systems Ltd is an acknowledged expert in the correct application of different detection technologies, with a complete range of alternative solutions and more than 30 years experience in design and development of cost effective solutions, world wide. New technologies such as fibre optic and advanced radar systems are now included in the extensive product range, which means that all the above design criteria can be met.
FOR MORE INFORMATION GPS Perimeter Systems Ltd Tel: +44 (0)1604 648344 Fax: +44 (0)1604 646097 E-mail: info@gpsperimeter.co.uk Web: www.gpsperimeter.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
DETER, DETECT, DELAY AND DENY UNAUTHORISED ACCESS Perimeter security uses a mixture of people, procedures and devices to protect the assets and people within a perimeter by blocking access to intruders ERIMETER SECURITY is the first line of defence in hostile attacks. If perimeter security has been successful, then it will have physically stopped the intruder from entering the boundary in the first place. Perimeter security has come a long way since the days of fortified castles and moat and drawbridges. It now encompasses sophisticated technology such as biometrics and underground sensors designed to deter, detect, delay and deny unauthorised access. Regardless of the size of the area to be protected – whether it’s a large airport or an office block – protecting a building or site involves putting up a series of barriers designed to completely deter, or at the very least, slow down the perpetrator. Barriers may include fences, the physical
P
presence of security staff, alarms, CCTV and electronic access systems. While each individual barrier may not completely deter the perpetrator by their own individual merit, by the time they’ve got to their fourth or fifth barrier, they may rethink their attack. At the very least, the time it takes to overcome each obstacle slows
down entry, giving time for security officers to react appropriately. In other words, the more barriers put up, the better. In some cases, however, even the threat of security measures can be enough. A SmartWater logo on a window for example, is often sufficient at diverting intruders. A SmartWater system sprays intruders with
Perimeter security has come a long way since the days of fortified castles and moat and drawbridges. It now encompasses sophisticated technology such as biometrics and underground sensors designed to deter, detect, delay and deny unauthorised access
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
91
Fencing systems that push back the boundaries.
Zaun is a supplier of government tested and approved, integrated high security fencing systems. Contact us for a technical design and specification service or a FREE brochure.
Tel: 01902 796699 security@zaun.co.uk www.zaun.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
a water-based solution, which contains a unique ‘forensic code’ which will remain detectable on skin, hair and clothing for weeks. This creates an irrefutable link between the criminal and the crime scene. A well-lit area, visible CCTV and security personnel may also work as deterents. A SECURE BOUNDARY There are numerous types of fences available depending on the level of security required. Steel palisade, weld mesh and vertical bar fencing is suitable where a medium level of security is required. For a higher level of security, there are numerous options to choose from, including electric fences, fences with wall spikes, razor mesh fencing and fences with anti-climb and anti-cut through barriers. The threat of pain and high visibility of an electric or spiked fence make it a highly effective deterrent to intruders. Intelligent fence solutions have sensing devices that detect wire movement, sending an alarm to central security control monitors.
Infrared beam sensor detection is also a highly effective form of perimeter security. Invisible beams are transmitted across the protected area and any interruptions in the beam will raise an alarm signifying an attempted entry. Buried sensors offer another invisible form of perimeter security as they are completely concealed to potential intruders. The buried sensors generate an electromagnetic field and if an intruder disturbs the field, an alarm is set off. It is worth noting, however, that perimeter security must be flexible enough so it does not disrupt day-today operations. And it must not get in the way of an emergency evacuation. VEHICLE ACCESS Preventing unauthorised vehicle access is another important aspect of perimeter security. Heavy-duty bollards and barriers are good solutions. There are many types available to fit different sites, including fixed, automatic, removable, and fold down bollards.
PERIMETER SECURITY CHECKLIST • Is the area well-lit? • Are the fences fit-for-purpose? • Are alarms installed? • Is CCTV installed and screens monitored • Are security staff visible? • Do security staff patrol the area and conduct random checks? • Are deliveries screened and accepted in a secure manner? • How is vehicle access restricted? • How do visitors/staff access the building? • How are visitors/staff identified? • Are security personnel adequately trained? • Could these measures adversely affect an emergency evacuation?
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
93
. . . . . . . . . . .
Pulsed Electric Perimeter Fence Deterrent & Detection System Tamper resistant PC based GUI with mapping Simple to maintain & repair Integration with CCTV etc... Compliant with BSEN60335-2-76 Compliant with BSEN1722-17 Manufactured in the UK Design & after sales support Installation training
Tel: +44 (0)1572 725911 www.zarebasecurity.com ®
Induced Pulse
Z
areba Security is a leading global provider of customised perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • Utility companies • Correctional & prison facilities • Government or military installations • Industrial/commercial property • Airports, Ports, auto dealers • Critical infrastructure • Transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates. This means the security guard and/or local alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is the ideal solution. It is an electric fence system that combines a barrier with intrusion sensing and a shock
a proven perimeter deterrent and detection system deterrent to prevent security breaches. Adaptive fence sensing technology (patent pending) makes for a very stable system. It can ignore voltage on the fence line but still give rapid response to fence attacks. The system features: • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customise to any zone length or wire array • Standalone installation or mounted on existing fence, roof or wall tops • PC Windows based user interface • Graphical mapping overlay • Customer friendly GUI • Interfacing with most common data bus systems • Integration with CCTV systems • Integration with Access Control & Building Management systems • Listed in the 2009 UK CPNI approved product list for use in areas of strategic importance • Listed in the UK Secure By Design (SBD) product list
Zareba Security have designed and engineered perimeter fence systems globe. We have sales and technical staff based in the UK. We also have our own UK in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their site. Zareba Security only sell to approved installers. We offer in house training courses to Lantra standards. Zareba Security 8 Lands End Way Oakham Rutland LE15 6RF Visit us on stand F40
PERIMETER SECURITY
www.counterterrorbusiness.com
parcel, such as a concealed bomb. To prevent this from happening, the delivery and post receipt areas could be in an isolatable part of the building where a suspicious item will not disrupt the remainder of the building. Measures could also include the installation of an x-ray scanning machine and an off-site receipt and processing facility for all deliveries. Nearby parked vehicles that are unscreened can also pose a significant problem in terms of blast distances against Vehicle Born Improvised Explosive Devices (VBIEDs).
Security staff should be aware however that a hostile vehicle could tailgate a legitimate vehicle through a retractable barrier system. After installation of vehicle security barriers at a site, it is important to regularly review any changes to the surroundings. The demolition of a neighbouring building or changes in the landscape could open
up an access route that previously did not exist. At the same time, you should monitor neighbouring site activity and security measures in case they inadvertently affect your own premises. You must also bear in mind that deliveries have the potential to be dangerous, either by allowing access to the site under false pretences or by delivering a damaging
SURVEILLANCE CCTV surveillance that allows security teams to proactively monitor perimeters is also highly effective at enabling early intervention or containing a hostile attack. Increasingly Video Content Analysis (VCA) systems are being used for a more in-depth analysis of recorded images. They automatically analyse CCTV images to generate useful information about the image content and issue alerts to security personnel should an incident occur. VCA systems can free-up security personnel to fulfil other security duties, rather than be glued to the CCTV monitor. In addition, this technology highlights incidents as soon as they occur, allowing
Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture Electronic Warfare, Unmanned Systems, Radar, Surveillance The most important thing we build is trust
• • • • • •
Large Standard Product Range Customised Antenna Development Sector and Multi Sector Omni, Multi-Stacked Omni High Gain Directional COFDM Applications
• • • • • •
European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas
CounterTerror20100908.indd 1
UAV, UMS, UGV Direction Finding, Tracking Covert/Overt PMR, Tetra, Cellular DAS Ultra Wideband IED Countermeasures
Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: antennasystems.ma@cobham.com www.cobham.com/antennasystems/newmarket
Antenna photos not to scale
25/11/2010 15:33 THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
95
COUNTER TERROR EXPO
www.counterterrorbusiness.com
Personnel, if not tasked with security, can sometimes view security measures as a nuisance and inconvenience, and are almost always less vigilant when it comes to workplace security than they would be in their own homes for remedial action to be taken before incidents escalate to a more serious level. The tripwire function of a VCA system is particularly useful when protecting a perimeter. VCA can be used to set up virtual tripwires along existing fences or areas where physical security is impossible or impractical. The technology is used to identify intruders through the use of alarms, which detect when a trespasser is on site. ACCESS CONTROL Organised crime and terrorism has become increasingly savvy to modern security measures. So what do you do if your perimeter security measures have been unsuccessful? The next layer is access control – stopping the intruder from physically entering the building. Access control incorporates a range of features including the use of biometrics,
keys, password and personal identification (PINs), swipe cards and entry phones. Biometrics is increasingly being used to ensure authorised access. It is defined as the measurement and recording of physical characteristics of an individual – such as fingerprint patterns, hand and eye structures – for the use of personal identification. Unlike microchips in cards and the need for a personal identification number, biometrics cannot be stolen or copied and is therefore a highly effective access control measure. STAFF DILIGENCE The high visibility of security staff plays a key role in deterring criminals as do patrols carrying out random checks around the perimeter. But despite the best of intentions and money pumped into security,
GUNNEBO SECURITY SOLUTIONS – FOR A SAFER WORLD HE GUNNEBO SECURITY Group employs 5,900 people in 29 countries across Europe, Asia, Africa, Australia and North America, and has a turnover in excess of e680m. We have years of experience in developing a range of security solutions for airports. We offer products that protect against criminal or terrorist attacks, blast, people and vehicle attack rated products, as well as interlocking security portals and doors aimed at maximising efficiency with man guarding usage. We are delighted to introduce the Tracked M50 Sliding Gate, designed to stop all threats. Features include: • M50 certification (7.5 tons truck travelling at 80km/h) • Opening width up to 7.0m • Shallow foundations • High speed opening
T
96
and closing times The unique design affords true bi directional impact protection for critical infrastructure applications, i.e. defence sites, embassies, correctional facilities, refineries and airports. Gunnebo manufactures, installs and services products using own fully trained accredited staff, meaning multi product installations are possible.
FOR MORE INFORMATION Gunnebo UK PO Box 61, Woden Road, Wolverhampton WV10 0BY Tel: 01902 455111 Web: www.gunnebo.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
human error is still a major factor and complacency can be the downfall of any well-intended security measure. Personnel, if not tasked with security, can sometimes view security measures as a nuisance and inconvenience, and are almost always less vigilant when it comes to workplace security than they would be in their own homes. Therefore all staff and security personnel should be thoroughly trained to uphold the appropriate security principles in a diligent and consistent manner. WORKING TOGETHER With today’s ever-evolving terrorist threat, it is important to always stay one step ahead. Putting up a series of barriers which combine people, technology, physical obstacles and procedures, makes it harder for hostile attacks to be successfully carried out. Securing a perimeter can be complicated thanks to the many layers of security involved. It could therefore be helpful to enlist the help of a security consultant. Security consultancies act as a guide to the many products and services on the market and provide unbiased recommendations based on an assessment of the individual requirements of their clients.
WE KNOW HOW TO MAKE THE WORLD SAFER. Gunnebo has years of experience delivering security solutions and has unrivalled expertise in secure storage, site protection, entrance control and cash handling. Our solutions protect people, buildings and property, providing security for you, your employees and your customers. Address: PO Box 61 Woden Road Wolverhampton WV10 0BY Tel: 01902 455111 Web: www.gunnebo.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
PROCTER – THE SPECIALISTS IN HIGH-SECURITY FENCING AND GATES W
ITH OVER 100 YEARS’ experience in fencing and gates, Procter Fencing Systems possesses unrivalled expertise in the design, manufacture and installation of high-security perimeter fencing and gates, together with associated access controls, electric pulse systems and sophisticated monitoring systems. Unless the customer provides a detailed specification, every project undertaken by Procter Fencing Systems starts with a technical consultation and site survey. This helps to establish what type of fencing and associated security measures are appropriate to counter the threat and, where appropriate, take into account issues such as aesthetics. Depending on the outcome of the consultation and survey, it is likely that high-risk premises will require high-security mesh panel fencing or high-security W-section palisade fencing. Where gates are required, whether hinged or sliding, powered or manually operated, the specification can be the same as the fencing or different. Additional physical security can be provided by means of toppings on the fencing and razor wire at ground level; if there is a risk of burrowing fencing material can be buried in a formed concrete cill.
For high-security applications, electric pulse systems are popular, both on new installations and for upgrading existing fences. Procter Fencing Systems is an authorised installer of the Harper Chalice PulseSecure and PulseSecure PROTECTOR systems, with each PulseSecure system configured to suit the application. Harper Chalice products are Home Office trialled and approved to the highest SEAP ratings. In addition, Procter Fencing Systems can install a variety of electronic surveillance measures – such as the Harper Chalice FenceSecure fencemounted perimeter intrusion detection system – as well as acoustic and radar cables, infrared detection, virtual fences and CCTV. Of course, if some areas on a site do not warrant such high levels of security, Procter Fencing Systems can supply and install alternative types of
fencing and gates that are more costeffective for these applications. Always using its own teams of trained installers, Procter Fencing Systems has installed high-security perimeter fencing and gates at airports, ports, prisons, utilities and government premises. Customers appreciate the high quality of the products and installation, the comprehensive technical support and the outstanding level of customer service provided by Procter Fencing Systems. The company is also a Secured by Design Licence Holder.
FOR MORE INFORMATION Contact Procter Fencing Systems to discuss any requirements for high-security perimeter protection. Tel: 02920 855756 E-mail: CTB@procterfencing.co.uk Web: www.fencing-systems.co.uk
Procter Fencing Systems - the specialist supplier of high-security fencing and gates With over 100 years’ experience in fencing and gates, Procter Fencing Systems has unrivalled expertise in the design, manufacture and installation of high-security perimeter fencing and gates, together with associated access controls, electric pulse systems and sophisticated monitoring systems. Visit us on stand I21 at Counter Terror Expo www.fencing-systems.co.uk | tel: +44 (0) 29 2085 5756 | email: enquiries@procterfencing.co.uk Procter_Counter_Terror.indd 1
08/03/2011 13:56 THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
97
PERIMETER SECURITY
www.counterterrorbusiness.com
IN TODAY’S WORLD SECURITY MATTERS!
expected vehicle throughput, operator and driver safety, provision for access by unusually large vehicles, emergency site lock down facility, operation during power failure, lane signage and traffic lights, installation program. All these works were to be undertaken on the existing operational site. As an example of our level of involvement and expertise, during the design process a requirement for an Emergency UP facility, to override all safety features and raise all road blockers, was identified, however, the electrical current required was greater than the available supply to the site. To provide this facility, without the installation of an upgraded power supply costing tens of thousands of pounds, Broughton Controls design engineers linked all road blocker control PLCs and incorporated a short, several millisecond, delay between each blocker operation. This practically indiscernibly delay manages the initial inrush current and provides seamless and reliable operation whilst utilising the existing site power supply.
Turnkey solutions at work with the assistance of entrance control systems provider Broughton Controls Ltd ROUGHTON CONTROLS LTD designs, manufactures, installs and services a vast range of vehicle road blockers, automatic vehicle security barriers, pedestrian security turnstiles and automatic gate systems throughout the UK and the Middle East.
B
HIGH SECURITY DATA CENTRE – MIDLANDS Broughton Controls High Security Division recently completed a project requiring the fast track design and installation of a high security perimeter fence upgrade together with a flexible and secure entrance control system. The location was an existing modern warehouse unit, with a particularly challenging layout and slopes across the entrance area. Broughton Controls undertook the fencing and civil works associated with the project, including the provision of drainage for the bollards, in addition to the supply and installation of the security access equipment. The requirement to allow occasional access to large plant, and site constraints limiting vehicle turning arcs meant that an 18m clear opening would sometimes be needed, whilst day to day operation has to accommodate pedestrians, cars, and small commercial vehicles. SITE REQUIREMENTS The site requirement can be considered in two parts: 1. Pedestrian security was addressed by utilising two bespoke “bi-parting” cantilever (trackless) sliding gates, profiled to maintain a constant and secure under gate gap across the sloping entrance area. One gate is manually operated for use when large plant access is required, whilst the other is automated with three opening options: Pedestrian access – 1.2m opening, Normal vehicle access – 4m opening, Plant access – 9m opening. New High Security perimeter fencing was provided and installed, which included a mechanically locked “contingency” gate for emergency access. 2. Vehicle Access/HVM, the need for flexible operation lead to the selection of a combination of crash tested, automated hydraulic bollards and shallow foundation static bollards, all installed in accordance with CPNI guidelines. The automated bollards are controlled by a custom designed HPU and PLC, which integrate gate and bollard operation, lowering bollards in
98
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
sequence with the required gate opening to maximise site security at all times. In accordance with company policy the automated gate is fitted with full pedestrian safety systems with vehicle detection ground loops also providing safety on the bollards. To simplify site operation the gates and bollards are controlled from a console located within the site security office. Once again, at Broughton Controls Ltd we proved our ability to deliver complex integrated site access solutions, on time and on budget. NORTH WEST AIRPORT – VEHICLE SCREENING AREA Broughton Controls was asked to assist with a project to upgrade the Land Side/Air Side screening area of a major North West Airport. The area comprised of five IN and two OUT vehicle lanes, plus the Cyclamen facility. The client had identified the requirement to
THE SYSTEM PARTS The system comprises of Broughton Controls model 420 High-Sec heavy duty, hydraulic vehicle barriers with full height folding lattice skirts, model 700 full height Turnstiles, and model 360 heavy duty Pedestrian Gates, together with, shallow foundation, model 950 crash tested, (PAS
Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage
improve both pedestrian and vehicle security access, including the installation of PAS 68 Hostile Vehicle Mitigation measures. Working with the client, consultants and main contractor during the design stage, all aspects of the project were examined including: Level of pedestrian security required, level of HVM equipment required, size and frequency of vehicles to be screened,
68) Road Blockers and Bollards, all installed in accordance with CPNI guidelines. Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage. An online, PC based, proximity access control system, together with a bespoke control console within each search lane allows security officers full control of there individual lane, together with management audit reporting.
FOR MORE INFORMATION Broughton Controls Ltd, 33 Stakehill Industrial Estate, Middleton, Manchester M24 2RW Tel: 0161 6551020 Fax: 0161 6551021 Web: www.broughton-controls.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
EARLY DETECTION SYSTEMS FOR HIGH SECURITY SITES External intruder detectors can provide significant cost savings in terms of loss recovery and damage limitation
LTHOUGH THE TRAGIC EVENTS of September 11, 2001 forcibly brought the terrorist threat to the attention of the world, it was by no means the first such event and people who have been involved in the business of security for many years will be well aware of the efforts that have gone on over the years to provide effective protection against these types of activity. Before September 11, much of the emphasis was on protection against “conventional” crimes, such as burglary, robbery and vandalism, but now there has been a significant shift towards the effects of terrorism. The objectives are to: • Detect – some suspicious activity is taking place that can be detected. • Verify – if possible verify, audibly or visually, that it is a genuine threat. • React – take some action that can prevent or reduce the effect. What the terrorist threat has highlighted is the need to increase the time available for any reaction. The longer we have to react the more likely we are to be able to prevent damage and, more importantly, save lives. We want to detect as early as possible to create those precious extra moments. Perimeter Intrusion Detection Systems (PIDS) are designed to provide this early warning. The concept is simple; deploy a series of detectors around the asset or people to be protected, far enough away from them to provide adequate time for verification and to make an appropriate response. Of course an early warning will
A
also serve to reduce conventional criminal activity such as theft and robbery. An extremely large number of variables have to be factored in when considering perimeter detectors. The layout and topography of the site, the end user requirements (visible or invisible security etc), the existence of physical barriers such as walls and fences, and the climate of the area are all variables that will impact upon the suitability of a detection system. It is obvious that no one system or technology can provide the correct, most effective solution for all these different applications and so it is important to consider all the alternatives before committing to a particular solution. GPS Perimeter Systems has more than 30 years of worldwide experience in the provision of different technology solutions for perimeter security. The different technologies include: INVISIBLE BURIED DETECTION SYSTEMS The various techniques used for these include differential pressure based systems, radio frequency systems, or fibre optic cable systems. The main feature is that they are invisible once installed and therefore difficult for an intruder to locate. They can follow the shape and contours of irregular boundaries and are not constrained to line of sight applications. This makes them ideal for irregular shaped sites and means that they do not require a specific physical barrier such as a wall or fence. It is also essential that they work under many different surfaces such as grass, gravel, asphalt and paving.
GPS Perimeter Systems has a double technology system, DPP, intended for the highest security sites, that uses a combination of radio and differential pressure to provide a system with detection resolution down to 5m. FENCE SECURITY Using microphonic, fibre optic cable, and taut wire detection systems, these types of systems are attached to an existing fence (although the taut wire can form its own physical barrier), and are designed to detect any hostile activity on the fence such as cutting or climbing. They follow the shape and contours of fence lines and make them ideal for irregular shaped sites with existing fence structures. It is therefore essential that they work on many different types of structure such as chain link, welded mesh and palisade fencing, and are able to withstand environmental effects such as wind and rain. Of particular interest is the new generation of sensitive fibre optic systems, such as GPS Perimeter’s Miles System, that can protect very long fences such as national borders, and surface or subterranean pipelines. This is possible using fibres already in place, substantially reducing installation costs. FREE STANDING SYSTEMS Free standing systems such as microwave barriers, Doppler detectors, and IR beams provide cost effective security over long straight perimeters. They are used in line of sight applications, where the two ends of any particular section must be visible to each other. They do not require a specific physical barrier such as a wall or fence but are often used in conjunction with a physical structure to provide additional protection and detection. They also provide a form of visual security, sometimes particularly useful as a deterrent, and again it is essential that they work in many different weather conditions. It is clear that when considering perimeter security there are many different variables to be aware of and that a suitable technology must be used in the correct situation. GPS Perimeter Systems is a company capable of finding the solution to virtually any perimeter security problem and when installed in the correct way, a secure perimeter will greatly enhance the security of any site.
FOR MORE INFORMATION Tel: +44 (0)1604 648344 Fax: +44 (0)1604 646097 E-mail: sales@gpsperimeter.co.uk Web: www.gpsperimeter.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
99
BUSINESS CONTINUITY
www.counterterrorbusiness.com
THE QUEST FOR READINESS IN A COMPLEX WORLD Whilst organisations believe that asking ‘How do we prepare?’ is enough to help them provide security against major incidents, 4C Strategies believes that the real question is ‘How do we know we’ve got it right?’ YEAR HAS PASSED since the Deepwater Horizon explosion in the Gulf of Mexico, and whilst executives have used BP’s high-profile crisis to probe their risk managers, business continuity managers and crisis management teams to ask ‘How can we predict our oil spill moment?’ and, if we can’t, ‘How can we prepare for it?’, a third question has been noticeably absent, ‘Once we think we’re ready to respond, how do we know that we really are?’
A
EARLY WARNING With so much at stake, your organisation’s readiness now needs to be predicated on its ability to respond to a range of highprofile unforeseen events, whether caused by an act of terrorism against physical assets, a malicious cyber-attack that threatens to bring down networks affecting critical services, an industrial accident affecting a range of suppliers operating in partnership, or a technical product failure with significant consequences across an entire customer base. In an unpredictable world, there is an ironic predictability to the fact that certain events will manifest. Whilst scale, complexity and impact may be difficult to gauge, advice – whether from government agencies, industry reports or in-house analysis – provides an evidence-based approach to assessing your risk environment. In fact, the challenge for many organisations doesn’t lie in the fact that they are oblivious to the risks they face; rather, in their management of the warning signs e.g. technical failures on the ground, suspicious behaviour in staff activities, changes in network traffic, etc. When signals are missed, ignored or misinterpreted, an incident is well on its way to escalating in space and time. INTEGRATION So, what differentiates the industry leaders? Ultimately, they recognise the need for an integrated approach to building a flexible capability based on: Risk Management – to generate awareness by undertaking the relevant assessments and deciding appropriate mitigation; Business Continuity – to deliver the options which will enable them to continue to operate mid-incident and to recover as soon as possible postincident; Incident & Crisis Management – to familiarise their people in the roles and responsibilities they require to demonstrate
100
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
responsible leadership, make timely decisions, manage the flow of information (both push and pull) and communicate effectively with staff and the outside world. Whilst many organisations do recognise the importance of these three components, a failure of imagination tends to result in the lack of an integrated approach. Operating in stovepipes, their policies and processes are often of isolated value, resulting in duplication of effort, resource and – significantly, given the current economic recession – investment. As such, it is ultimately difficult for their board and – in turn, the Audit Committee – to get a sense of the organisation’s readiness, as opposed to the preparedness of individual business areas or corporate sites provided by specific security measures, technologies, etc. An alternative is to view all of the components as contributing towards a robust risk management capability and to coordinate it accordingly. THE IMPORTANCE OF AN OBJECTIVES-LED TRAINING SOLUTION Whilst the old adage ‘plans are nothing, planning is everything’ still holds true, you need to invest time, effort and resource on the implementation of an exercising solution to ensure that plans, policies and frameworks are tested, improved and embedded. To provide the highest value return, training and exercising activities should be tightly linked to specific objectives, e.g. testing a crisis communications plan, practising data analysis and information sharing, etc. otherwise they smack of box-ticking. On the basis that exercising should be adapted to the needs of an audience, whilst your board may derive greater value from participation in a discreet high-level workshop, your IT department would benefit from participation in a dynamic, simulation exercise in partnership with those external parties to whom you outsource infrastructure management. AUDITING YOUR READINESS The mature organisation understands that it needs to audit what is being done to answer the question: ‘Is our readiness good enough?’ It regularly asks where it is at in terms of preparedness, to form a view – and recommendation – on how to maintain and improve capabilities? Once you have started to visualise your journey
towards readiness, and it is articulated across the organisation, it provides a unity of purpose, under which training and exercising activities can be coordinated, sequenced, prioritised and measured. If inputs, outputs and activities are centrally logged and visibly shared, an organisation owns a system capable of providing a realtime view on its readiness status, indicating which parts of the organisation are on ‘green’ or ‘red’ in terms of capabilities to respond to a major incident. This serves as a powerful decision support tool, allowing management to view emerging patterns, identify risks and make informed decisions about which gaps or weaknesses in plans, capabilities, etc. are acceptable, directing effort to those which are not. Given the increasing complexity of the world in which we live, the art of ensuring readiness lies in making as much as of this activity part of business as usual. Why? Because then you know it works. Given the high profile nature of major incidents in the 24/7, ‘always on’ world, it is only through leveraging the daily resources you use to fight fires, using processes that have become part of your organisational fabric and relying on expertise found in your business operations, that you will truly achieve the readiness you seek – and the readiness that the world now expects.
FOR MORE INFORMATION Tel: +44 (0)20 7969 2990 E-mail: info@4cstrategies.com Web: www.4cstrategies.com
BUSINESS CONTINUITY
www.counterterrorbusiness.com
PLANNING AHEAD Lyndon Bird, director of the Business Continuity Institute, looks at terrorism as a threat to business continuity and its potential to interupt activity, and how to approach prevention REATING OPERATIONAL resilience, protecting business reputation and adding value rather than just responding to emergencies are just a few strategies in order to prevent terrorism posing a threat to business continuity, both directly in its potential to interrupt operational activities and indirectly through the changes in business resilience methods needed to prevent it occurring or at least mitigate its impact. Despite its roots in Disaster Recovery, Business Continuity Management (BCM) in 2011 is about very much more than the earlier confusion between Emergency Response and Business Continuity, as disciplines are largely resolved; both play key parts in dealing with any major incident. Failure to address either the response or the continuity elements effectively has potential to escalate even a small incident into a full blown crisis situation very rapidly. In particular, amongst the many threats that businesses and other organisations face, terrorism is the one that has
C
immediate resonance with the public. FACING GLOBAL RISKS HEAD ON No one will forget the images of 9/11 and the political and social upheaval it caused, outcomes which are still unresolved a decade later. The 7/7 London bombings, the destruction at Atochi station in Madrid, the orchestrated attacks on international hotels, transport hubs and cafes in
risks that are causing concern to CEOs across the world. Interestingly, terrorism only came into the top 20 at number 17. Admittedly some of the other concerns could result from successful terrorist attacks, such as “security of supply chains” (13), “government protectionism” (11) and “energy costs” (6), but these are also outcomes that could result from many other geo-political factors. In recent Business Continuity Institute (BCI) supported research, evidence also seems to indicate that like their CEOs, most BCM professionals have little or no experience of terrorist attacks or consequential loss. They also see an imminent business interruption due to terrorism as much less likely to occur as
Whilst very effective at dealing with Business As Usual (BAU) risks, many companies are less successful at dealing with catastrophic risks such as terrorism Mumbai have left impressions on the British, Spanish and Indian communities that will never be completely erased. Whilst no-one can argue about the human and social impact of terrorism, there is much less consensus about its real significance as a business risk. International consultants PWC have undertaken research into the main global
from many other threats and hazards. Such issues like extreme weather, transportation disruption, loss of key staff through epidemics, IT failure, cyber crime and long supply lines all cause them more concern. Further evidence comes from the 2010 Chartered Management Institute (CMI) survey into diverse business risks, where terrorism came bottom of a list of 21
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
101
Mataco: proper planning and prevention
www.mataco.co.uk Mataco is a business continuity software system that provides full support for the Business Continuity Management (BCM) process. Using Mataco you can identify your operational activities and related resilience strategies. Mataco offers many benefits including: • Business Impact Analysis • Resource Dependencies • Threat Assessment • Plan Exercising • Plan Reviews Mataco is developed by Savant, in partnership with experienced Business Continuity consultants, to offer full support for all aspects of the BCM process. It provides a flexible database repository in which to record, maintain, exercise and review all the plans required for an effective, robust, and complete implementation of BCM. Mataco holds all the evidence required to demonstrate compliance with standards such as BS25999.
Savant Limited Dalton Hall Business Centre Dalton Lane Burton-in-Kendal Cumbria LA6 1BL www.savant.co.uk mataco@savant.co.uk +44 (0) 1524 784400
BUSINESS CONTINUITY
www.counterterrorbusiness.com
actually experienced incidents during the previous year. This was the same in each of the previous ten years in which the CMI asked this question. Not surprisingly, when asked about impacts of these different threats, terrorism did score higher but still was not amongst the top 10 most significant potential business losses. Taken together, this could lead to an assumption that from a risk management point of view, terrorism is unlikely and the impact should it happen is moderate. Therefore, one might argue that it should not be treated as a priority risk when determining security and resilience policy. This conclusion does not, however, sit well with any common-sense sanity check – the perception of terrorism (like violent crime) might well be greater than the realisation but it is often perception, not facts, that drives markets and causes perfectly viable businesses to fail. REDUCING LOSSES The research work of Knight and Petty at Oxford has become a cornerstone of BCM and crisis management thinking since it demonstrated the close link between success in managing crises and shareholder value. The experiences of BP and perhaps to a lesser degree Rolls-Royce in 2010, were ample demonstration of this. So how much worse would the situation have been had there been a terrorist dimension? Many airlines have had crashes with major loss of life over the past 20 years
but how many can you remember? Unless it is an area of particular interest for you, or you sadly had some personal involvement, probably hardly any. Have any global air carriers gone out of business as a result of a pilot error, air traffic control mistake or mechanical failure? I suspect very few if any. However, who will ever forget the Pan American Airlines evening flight to New York that was blown up over Lockerbie so many
catastrophic threat posed by terrorism. From a business continuity viewpoint, this is easier to rationalise than from a conventional risk management standpoint. RISK ASSESSMENT Many organisations have well established risk management programmes, maintain detailed risk registers and successfully embed this process into departmental objectives. Whilst very effective at dealing
The idea that the threat is unlikely to be realised is still often used to justify lack of planning – but actually million to one chances happen all the time years ago? Although the probability of such an incident occurring is very low and the direct results (i.e. loss of lives) identical to other loss scenarios, PanAm, at the time the world’s largest airline, very quickly ceased to exist. There is no doubt that the terrorist threat and perceived inadequate management in dealing with it is an image that few companies could handle without enormous impact on their business credibility. It would therefore be unwise to concentrate management effort on dealing with fire, floods, IT failure, pandemics, volcanic ash and labour unrest, and ignoring the unlikely but ever present
with Business As Usual (BAU) risks, many companies are less successful at dealing with catastrophic risks such as terrorism. Most risk models are theoretically quantitative to some degree and as such need to reconcile and give values to things that are not always compatible. How do you compare a high impact, low probability threat with a low impact, high probability hazard? In most risk methodologies they will be given similar importance, thus over emphasising the importance of minor incidents that are best handled by day to day improved management practices. The BCM practitioner is not very concerned about probability, he or she
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
103
BUSINESS CONTINUITY
Equipment Sales and Bureau Service
n Steinbichler Comet 5 Technology 1.4 to 11.0 Mega Pixel (fringe projection) All new Steinbichler Comet 5 with modular design with more measurement fields of view and increased resolution. n Steinbichler Latest Software New Inspect Plus 5.0 Inspection Software New Comet Plus version 9.0 Software New T-Scan Plus version 9.0 Software n Steinbichler T-Scan 3 Laser Scanning Technology New capabilities within laser scanning Now able to scan gloss black and chrome !!! n Artec Scanner Technologies As UK agents Central Scanning continues to broaden its range with MH, MHT & L scanners n Aicon agents Central scanning now offer DPA Pro and Move Inspect with their extensive range of scanning solutions
Tel:01527 558282 Email:sales@central-scanning.co.uk Web:www.central-scanning.co.uk
104
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.counterterrorbusiness.com
always turn their attention to worst case consequences and the time-scales available for recovery. Business continuity is geared towards resilience and protecting assets and value. In fact, the definition now almost universally accepted for the subject states that it provides a framework for building resilience and the capability for effective response. Its purpose is to protect the interests of stakeholders, reputation, brand and value creating activities. I am often asked how well companies learnt the lessons from 9/11, 7/7 and other attacks. Certainly security is more obvious and invasive at airports and entry to public buildings. In countries with relative low labour costs like India and China, the number of security guards is enormous and causes delays and frustration to everyday life. If we ask, “Are large global corporations in the financial world better prepared to deal with a wide-scale disaster?”, I think the answer is almost certainly yes. If we ask, “Are governments in some parts of the world and their associated regulatory and standards bodies taking a much closer interest in BCM?”, the answer is definitely yes. Unfortunately if we ask, “Are the myriad of other wealth generating sectors of the world’s economy doing much about business continuity?”, I fear the answer is no. HAZARD MANAGEMENT Finally, and most tellingly, is a question that could be addressed quite widely even in countries like the US and UK. “Have CEOs done much to improve the overall management capability to manage random catastrophic events?”. Again with a few exceptions I fear the answer is no. The idea that the threat is unlikely to be realised is still often used to justify lack of planning – but actually million to one chances happen all the time. Despite risk management theory, this is still self-evidently the case. The lessons learned from terrorist attacks are wide-ranging and important, and can help manage a number of similar threats. One attribute of terrorism is its unpredictability; any business continuity programme must recognise that and be able to react rapidly to mitigate the impact regardless of where or how it is delivered. Inappropriate handling of the media during a serious incident might ruin a company quicker than any physical incident. Concentrating too much on the actual scenario tends to feel like the old adage about generals always fighting the last war, not the current one. By definition, if we knew exactly what was going to happen when and where, we could almost certainly prevent it or at least minimise its impact. After 9/11 there were many speculative theories around. Would key staff refuse to work in high-rise buildings? With everything now electronic, do we really need temples of capitalism like Canary Wharf in London? The questions seemed reasonable, but were never going to impact business life significantly. No major financial institution closed a prestigious head office to move to an anonymous address in the provinces. BCM concepts within the financial world rapidly reverted to pre incident normality. LEARNING THE LESSONS Some lessons have been learned, technical deficiencies have been corrected, more tests undertaken, and a lot of articles written and conference presentations given. The subject is still on the board agenda but only just and often it slides back to its roots in IT or as a subset of risk management. Yet, if exactly the same type of incident occurred today some companies would be a bit smarter in recovery of systems, hopefully save a few additional lives with better evacuation procedures but nothing fundamental has really changed. BCM philosophy is still largely not embedded in corporate culture, the board technically owns BCM, but is not intellectually or emotionally engaged and it is seen as a set of technical solutions not as a holistic way of managing a business.
FOR MORE INFORMATION Web: www.thebci.org
BUSINESS CONTINUITY
www.counterterrorbusiness.com
CYBER TERRORISM: MODERN MYTH OR FUTURE OF TERROR? Leading IT security specialist Pentura highlights how countering cyber terrorism is about understanding the terrorist psyche, and managing electronic and personnel security ABOUT PENTURA Pentura is a leading IT security specialist providing expert consultancy services combined with best of breed technologies to deliver effective security, risk and compliance solutions. Our consultants are recognised as leaders in their fields and hold accreditations with major industry and government schemes, including ISO27001 Lead Auditor, CHECK, CREST and CLAS.
HE HISTORY OF 9/11 is being written to this day, though most historians will agree that the event, witnessed by many millions of people around the world, brought about a radical shift in world politics. As Osama Bin Laden and Al Qaeda declared war on the West, governments from around the world were caught between public opinion and the need to respond on the one hand, and a threat that was disparate across international borders, asymmetric and relatively unknown on the other. Policy makers now speak about these as the hallmarks of Al Qaeda. But they, along with historians underplay the importance of cyber space in carrying out and garnering intelligence to perpetrate attacks and using it to project a radical message to television screens around the world. TERRORISM AND THE INTERNET The use of the internet in conventional or cyber terrorism has become an increasingly important question for national security experts. Government strategies such as CONTEST in the UK were created to help manage conventional terrorist attacks through four separate work streams but until the UK Cyber Security Strategy came out in 2009, there was nothing to align our defences against the threat of cyber terrorism. Shortly after September 2001 governments were aware of hackers that proclaimed their allegiance to Osama Bin Laden. These groups, based all over the world, from Russia through to Malaysia, were considered
T
to be anarchists rather than religious extremists but their electronic attack skills and experience were far ahead of those of simple ‘script kiddies’. The West was facing its first outbreak of cyber terrorism with these groups carrying out successful cyber attacks against state and non-state actors; albeit against relatively soft targets. ELECTRONIC JIHAD It was also known that there were parts of the Al Qaeda (AQ) network, and affiliated extremist groups, whose leaders embraced ‘electronic jihad’. These extremist leaders publically stated support for cyber attacks on power stations, financial institutions and other critical national infrastructure. These were seen as legitimate and viable targets as the West was viewed as completely dependent on the Internet and computers to function. The intention of these attacks was to cause as much damage as possible through disruption, fear and the instigation of doubt. Many AQ leaders in the Shura Council frowned on this unconventional approach to waging war. Terrorist attacks using explosives or physically violent means made better news and instilled longerlasting fear at the heart of the enemy. Nevertheless, parts of the AQ network were already embracing the concepts of hacking to spy on their own. These technically savvy cells would use widely available hacking tools to infiltrate computers used by other extremists in order to root out moles or agents of MI6, DGSE, CIA and other western intelligence services. Some of these groups in the Middle East
and South East Asia would go on to share their knowledge of exploiting vulnerabilities with their brothers operating inside cells in host western countries. It would ultimately be these groups, operating within the jurisdictions of the local western security services, that would be monitored and profiled. Even though the capability of these groups is often lacking, their willingness to attack critical national infrastructure targets and share techniques and experiences with other extremists is worrying. There are even some conspiracy theorists ‘on the ether’ who would go so far as to point to elements of ‘rogue’ Middle Eastern and South East Asian intelligence services training these radicals in cyber-attacks. The response to 9/11 has plainly demonstrated how cyber space has become an integral part of our national security. Whilst cyber space is essential for prosperity and economic wellbeing, it is also a platform for attack, and a rich source of information and social media to those that wish to cause harm. Where countering conventional terrorism is about managing security risks in physical and personnel security, countering cyber terrorism is about understanding the terrorist psyche and managing electronic and personnel security. Written by Giri Sivanesan, senior manager at Pentura and head of Policy, Risk and Compliance
FOR MORE INFORMATION Tel: 0118 9768960 E-mail: info@pentura.com Web: www.pentura.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
105
Kärcher Futuretech GmbH A company that assists in peace-keeping and disaster control Kärcher Futuretech GmbH in Winnenden near Stuttgart was spun off in 2005 and became an independent subsidiary of Alfred Kärcher GmbH & Co. KG. As a worldwide well-known specialist for protection and supply systems, it is currently active in the business areas of CBRN Protection Systems, CBRN Protective Clothing, Water Supply Systems, Field Camp Systems, Mobile Catering Systems and Services. The systems are intended for supporting and safeguarding the life of personnel and people involved in disaster situations, accidents, development aid measures, operations of the police and military forces, in order to ensure their fitness for rescue actions, their stamina and their survival. With its highly mobile customised state-of-the-art solutions, Kärcher Futuretech rates itself among the highest performers in the world in the area of peace-keeping and relief after disasters. Innovative state-of-theart systems and a complete product range make Kärcher Futuretech the world market leader in “Professional systems for peacekeepers”. The company has an annual turnover of approx. 75 million Euro and more than 100 employees working in the central offices in Winnenden and Schwaikheim in the areas of development, sales, marketing, administration and maintenance. The Board of Directors consists of Helmut Stelzmüller and Dr.-Ing. Hagen Gehringer. Production and repair of technical appliances and protection systems are carried out mainly in the Kärcher factory in Obersontheim. In addition to producing for customers in the Federal Republic of Germany, the company exports primarily to Switzerland, Sweden, Russia, Luxemburg, Great Britain, USA, United Arab Emirates (UAE), Senegal and Singapore. The company regularly exhibits at international trade fairs such as Eurosatory (Paris), DSEi (London), IDEX (Abu Dhabi), AUSA (Washington D.C.), DEFEXPO (India), African Aerospace & Defence (South Africa) and in other worldwide forums. Homeland Security - A Growing Market to Meet the Needs of Forces Active in this Area Civil defence and disaster control have been involved in new tasks and challenges which are often summarised under the general term of „Homeland Security“ and include, among others, protective measures against contamination, and activities aiming at the decontamination of affected persons, objects, areas or water. A substantial level of hygiene and cleanliness is absolutely necessary to ensure the fitness of task forces for action and to keep technical equipment operational in order to defend against criminal or terrorist attacks.
Strong Performance in NBC Protection – “Safety First“ In the battle against the threat of an attack with NBC weapons, the German Armed Forces relies on 73 highly mobile, container-based, compact decontamination systems from Kärcher Futuretech. The decontamination equipment of the site for the radioactive decontamination, detoxification and disinfection of the troops, TEP 90, which were delivered to the NBC defence units together with carrier vehicles from Iveco-Magirus AG from 2007 to 2010, represents a new milestone in the history of Kärcher Futuretech GmbH. Parallel to the delivery of the serial TEP 90 models, the newly developed “family of decontamination agents” was accepted by the Federal German Armed Forces. The highly effective RDS 2000, BDS 2000 and GDS 2000 agents for quick radioactive, biological and chemical decontamination stand out due to their good compatibility with materials and biological degradability. Already since the end of 2007, the German Armed Forces has been equipped with EDS-G, an enzyme system for the decontamination of G warfare agents.
Ready for Action: Flexible and Modern Components for the Mobile Field Camp
Water Purification and Filling: From Source to Consumption
In the area of camp systems, the Federal German Armed Forces rely on the modular air-transportable field camp (Feldlager Luftverladbar Modular, abbreviation: FLM). Kärcher Futuretech contributes to this field camp for 150 persons – which consists of a total of twelve components – by supplying personal hygiene, water purification and distribution systems and, in the second stage, catering and laundering components. A total of 85 Universal Transport Pellets are loaded on 85 equal tandem trailers and can even be transported to the mission site by means of CH 53 transport helicopters. One of the advantages of the modular system is that the individual units can be broken down to meet the requirements of only 50 persons. On a long-term basis, the German Armed Forces are planning the procurement of 40 field camps of the “FLM 150” type. The air-transportable camps are to be used especially in initial operations and missions of German forces on behalf of the NATO or EU.
Following on from the WTC 1600 GT-BW and WTC 6000 BW water purification systems, the Water Bottling Plant 700 is another Kärcher system which has found its way as the logical further development within the supply chain of mobile drinking water supply. In the WBP 700, PET bottles with a capacity of 1 litre are produced from small lightweight preforms in the field. These bottles are then filled with freshly purified drinking water, capped and labelled under hygienic conditions. This drastically reduces the logistical effort for the field camp and helps to save the often enormous expenditures on personnel, fuel, trucks and convoy accompanying vehicles. Using preforms, the transport volume can be reduced by more than 90 % and the weight by even more than 95 %. Up to 15,000 bottles can be filled every day. Another innovative system is the Water Packaging System WPS 1600. Well-portioned in bags, totally clean drinking water decisively contributes to the health of the people.
Kärcher Futuretech GmbH • Max-Eyth-Straße 35 • 71364 Winnenden, Germany • Tel. +49 - 71 95 - 14 0 • Fax +49 - 71 95 - 14 27 80 • www.kaercher-futuretech.com
CBRN-E
www.counterterrorbusiness.com
THE LEADING FORUM FOR CBRN-E PROFESSIONALS With attacks involving chemical, biological, radiation, nuclear and explosive materials on the rise, the first CBRN-E Asia Pacific event came at the right time to address this important issue NE OF THE MAJOR challenges facing the world in the 21st century is the release of CBRN-E (chemical, biological, radiation, nuclear and explosive) materials. Not only the 30 or so that fall into the CBRN weapon category, but also the several thousands of toxic industrial materials that abound in all of our nations. Release can come in many forms: deliberate, accidental, collateral damage, natural disaster or neglect. There are examples aplenty, but some of the more well known are: Bhopal (1984), Chernobyl (1986), Halabja (1988), Tokyo Underground attacks (1995), the use of Improvised Chemical Devices in Iraq in 2006 and 2007, the deliberate release of toxic chemicals in Afghanistan in 2009 and 2010, and the release of toxic sludge in Hungary in 2010. Regardless of the type of release, in the majority of cases, they all made world headlines, governments and whole nations were affected, businesses were also affected and ordinary people suffered.
O
SMALL CHEMICAL, BIG IMPACT The CBRN-E option continues to be attractive to groups engaged in asymmetric warfare. Terrorists try and exploit the impact of these agents against our homelands. CBRN-E attacks are weapons of mass effect as only a small amount of toxic chemical or biological material is needed to cause significant disruption such as the 1995 Sarin attacks in Tokyo or the 2001 anthrax attacks in the United States. Our homelands are vulnerable to pandemics like the foot-and-mouth disease or swine and bird-flu. The malicious use of plant or animal pathogens could cause devastation to the agriculture industry, making agriterrorism a real concern. If chemical and biological threats were not enough to keep us awake at night there is always the spectre of an explosive device containing radioactive material – the so-called Dirty Bomb. A TIMELY EVENT With the rise of CBRN-E cases, the first CBRN-E Asia Pacific 2011 came at no better time to address this important issue. Following on from the success of the European series, CBRN-E Asia Pacific 2011 brought together the largest gathering of high level government, military and industry CBRN-E experts within the Asia Pacific region to examine the current
state and the future of CBRN-E. Organised by SMi Group, this inaugural niche conference was held 11-12 April 2011 in Singapore and kicked off the launch of a series of dedicated defence and security conferences within the Asia Pacific region from SMi. Delegates had the chance to view the latest products and solutions for the CBRN-E community and assess how nations are raising awareness, coordinating a first response, training tactical units and which technologies they are using. LEADING KEYNOTE ADDRESSES Brian Clesham, principal CBRN consultant from SVGC, UK, chaired the conference. He was joined by a number of key CBRN-E professionals to discuss themes including: Al Qaeda’s first and second anthrax programmes; regional prevent and prepare programmes; the Tokyo Sarin attacks; CBRN-E medical countermeasures; counter IED; business continuity and protecting critical national infrastructure. The conference benefited from a lineup of keynote addresses from esteemed speakers. These included Dr Rajagalopalan Vijayaraghavan, director of the Defence Research and Development Establishment in India, who discussed detector developments and medical countermeasures. The Japanese Government’s Dr Tetsu Okumura, senior officer on the counter measure against NBC (Nuclear, Biological, and Chemical) threats, discussed lessons learned from the Tokyo subway Sarin attacks. Other speakers included presentations
from the International Centre for Political Violence and Terrorism Research in Singapore; the Royal Thai Army; US Northcom; and the Australian Department of Defence. INTERACTIVE PANEL DISCUSSIONS The conference also included the chance to take part in an interactive panel discussion hosted by expert CBRN professionals on coordinating an international response to the global threat of weapons of mass destruction. Additionally, multiple stream sessions allowed delegates to pick and choose which sessions were best for them to make sure they stay at the forefront of this important sector. On 13 April there were two full day workshops on protecting critical infrastructure against CBRN-E terrorism and countering the terrorist threat of an IED with a chemical payload, where attendees had the chance to discuss and engage with peers during these focused working groups. CBRN-E Asia Pacific 2011 served as a platform to meet and network with a diverse mixture of international experts from the CBRN-E community and enabled delegates to keep up-to-date with the latest challenges, threats and solutions. The conference brought together decision makers, influencers and those involved with current operations from the Asia Pacific region and the rest of the world.
FOR MORE INFORMATION Web: www.cbrneasiapac.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
107
What if threats are not labelled ? aTiX highlights threats that visual inspection can’t reveal • Simultaneous detection of multiple threats • Real-time online operation • Liquids: Designed to meet upcoming EU and US Bottled Liquid Scanners (BLS) requirements • Explosives: EU Standard 2 or better • EU and US approved TIP system • Multi view: EU approved "laptop in bag" field test ongoing
Liquid threats are automatically marked
HI-SCAN 6040aTiX
For information please call +44 (0) 1923 294 400 Email: EMEA.info@smithsdetection.com
www.smithsdetection.com
AVIATION
www.counterterrorbusiness.com
EXAMINING THE PROTECTION With recent real and potential terrorist threats towards the aviation sector Chris Yates, principal, Yates Consulting, explores disconnected dots, clean skins and dirty filthy money he aviation world has suffered its fair share of near and actual calamity during the past 14 months. Umar Farouk Abdulmutallab exposed disconnected dots with his attempted bombing of a Northwest Airlines flight in late December of 2009. Faisal Shahzad illuminated the fallacy that the dots had been reconnected, when he almost skipped the United States aboard an Emirates flight after the attempted Time Square bombing in early May 2010. Air freight came under scrutiny when already in-flight improvised explosive devices were discovered at airports in the United Arab Emirates and United Kingdom in mid October 2010. A suicide bomber walked into a Russian airport and simply blew himself up to devastating effect in late January 2011.
T
AIRPORT INSECURITY Such events do not engender public confidence in oft repeated governmental and industry assurances that everything
that can be done to ensure the safety of those of us who regularly travel by air is actually being done. Each of these aforementioned events has exposed the soft underbelly of the global aviation security regime and emphasised, rather too succinctly for comfort, that the industry remains a potent and high value target. Thus, intelligence gathering and dissemination, immigration controls, outsourcing of checkpoint and cargo screening, access control and effective policing of aviation facilities, have all come under the glare of public scrutiny, with a somewhat less than adequate picture having emerged. The most devastating attack to have occurred so far, is the suicide bombing at Domodedovo International Airport on the outskirts of Moscow. It is the city’s busiest international airport, the primary gateway for many of the world’s major airlines and has long been viewed as one of the more secure
airports within the Russian Federation. Domodedovo bolstered the security afforded to airlines and the travelling public, following a double mid-flight suicide bombing six years ago. This passenger focused security architecture remains a robust and well respected feature of airport operations. A certain grim inevitability surrounded what happened at the airport. The bomber struck at a peak travel time calculated to claim the maximum number of lives and within a publicly accessible and busy area of international arrivals. This was just the type of attack that many of us who brainstorm potential threats to the industry have warned consistently about over the years. It could be foreseen that those with intent to do harm would sooner or later figure that airports themselves as well as the aircraft using them are just as high profile a target. ADDRESSING FLAWS This suicide attack could just as easily have occurred at any other major international airport anywhere else in the world and should now prompt a much closer examination of how we go about protecting such highly accessible public spaces unobtrusively but effectively. Failure to address this fundamental flaw in the security of the aviation system will inevitably lead to such an event occurring again. One only need image a similar but
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
109
AVIATION
www.counterterrorbusiness.com
Harnessed appropriately, these two technology solutions could deliver an extended airport security perimeter and afford much better protection to all those who use our busiest transport hubs on a daily basis for drop off, pick up or other legitimate business. Such radical step changes rather obviously demand imagination on the part of those who plan and deploy appropriate security measures, the necessary wherewithal to fund them and the political will to enhance the security afforded to both the travelling and non travelling public.
It’s worth reminding that the psychological impact of a major terrorist strike on the travelling public can be profound. Following the attacks on New York and Washington D.C. very nearly a decade ago, travellers avoided flying by whatever means possible simultaneous attack being carried out at the peak travel in London Heathrow’s multiple terminals, to generate an all too graphic picture in the mind. Such large airports are the strategic linchpins of the global air transport network. A shut-down at one can have a staggeringly big operational and economic impact right across the network. PUBLIC DISTRUST It’s worth reminding that the psychological impact of a major terrorist strike on the travelling public can be profound. Following the attacks on New York and Washington D.C. very nearly a decade ago, travellers avoided flying by whatever means possible. This led to a fall in scheduled air traffic of 15 per cent; a worldwide contraction of the airline industry, the loss of almost 100,000 jobs, grounding of some 2,000 aircraft and the worst ever losses for the global aviation sector. Such potentially stark consequences should be incentive enough to address the fundamental question as to how best to enhance the security of airport terminals. It’s simply not possible to lock down these major transport hubs
and make them no go zones, so what options do we have available? TECHNOLOGICAL ADVANCES Much greater application of behavioural analysis and profiling techniques but supported by advanced non contact screening technology may be one way to go. Intelligent computer technology that recognises suspicious behaviour in live internet-enabled CCTV feeds from public transport systems is already a reality, thanks to UK Home Office supported and ground breaking work carried out by the Centre for Secure Information Technologies (CSIT) at Queens University in Belfast. Meanwhile, experts at Loughborough University have developed an Explosive Residue Detection (ERD) system said to deliver an evolutionary step change in our ability to detect explosives on people and items of luggage. This laser based device operates remotely, can be installed in entry point locations at airports and can accurately identify the location of trace amounts of explosive on travellers or visitors passing through.
KNOWING THE UNKNOWN Much emphasis has been placed on intelligence gathering being the killer application in aviation security over recent years. Nowadays we hoover up vast amounts of information on those who travel by air, wash it through massive data collection centres, compare it against watch lists and hope this will aid us in stopping the next terrorist strike in its tracks. Such intelligence gathering serves a useful purpose when the information is analysed properly and disseminated in a timely enough fashion to be actioned upon. Recent history has given us two prime examples as to why this intelligence gathering activity cannot yet be seen as the killer application in the aviation security toolbox though. Umar Farouk Abdulmutallab’s almost successful bombing of a Northwest Airlines flight is one, whilst Faisal Shahzad’s near escape from justice following an attempt to set off a car bomb in the heart of New York is the other. Intelligence services famously failed to connect the dots in the first instance and had neglected to ensure end users were real-time enabled in the second. It’s also worth remembering that such intelligence gathering is only ever useful when something is already known about someone. In respect to the Northwest Airlines incident a reasonable amount of information was known about Abdulmutallab but it wasn’t put together to build a picture of possible intent. What about the so-called clean skins out there, on whom there’s little or no intelligence in the databases at all though? A truly clean skin will inevitably pass under the intelligence radar and could easily strike at the very heart of the aviation system. HARDENING BARRIERS The most appropriate response to the aviation security conundrum remains sensible technique supported by suitable technology. Given that the range of threats facing the industry has expanded significantly in the past decade, many of us in the security sector have argued long and hard for a reassessment of how we go about such like
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
111
Meet us at Infose curity Europ e Stand B20 19-21 April
AVIATION
www.counterterrorbusiness.com
as checkpoint screening as well as other security procedures. The International Civil Aviation Organisation (ICAO) finally added its weight to this argument late last year. Nevertheless, airports and airlines remain vehemently opposed to tinkering with what we already have, despite the fiscal imperative lessons learned in the past. A case in point is the question of Liquid, Gel & Aerosol (LAG) screening. The European Union (EU) passed regulation 12 months ago, requiring airports across the region to have the capability to effectively screen such in transit items now and expand the capability to all checkpoints in two years’ time. Through the European Civil Aviation Conference (ECAC) devised Common Evaluation Process for Security Equipment (CEP) programme, multiple solutions have been tested, type rated and approved for deployment at airports. The object of this activity is to lift the quantity restrictions travellers can carry in hand baggage within the passenger cabin. Airports haven’t been rushing to meet the EU regulation though, and whilst some are now compliant many are not. Airports Council International (ACI) - Europe – the representative body for airports within the region – has been at pxi:Layout 1 09/02/2011 10:02 loggerheads with both the EU and ECAC
over this issue. Their beef is that the first three solution types so far approved under the CEP programme, require that potential threat items are screened either individually or collectively, but outside of the cabin baggage they may be being carried in. They want the holy grail solution of being able to screen everything without the need for passengers to separate out specific things which simply isn’t possible yet given the technological challenges that still need to be overcome. This is an economic imperative for airports since such a capability would cut screening costs, speed the screening process and reduce screening times. IMPORTANCE OF X-RAY The majority of the biggest airports have deployed high end dual view X-ray equipment in recent years, some of which have now been certified by ECAC as type C capable (Smiths 6040aTiX and Rapiscan 620DV units for example). Compliance with imminent EU regulation is therefore guaranteed. Many airports, however, still deploy single view legacy X-ray and will be non complaint with the EU regulation. For these airports a cost effective upgrade path exists which, in many instances, can substantially Page 1 extend the life of such legacy hardware
or, alternatively, enable compliance with regulation by other standalone means. Canada’s Optosecurity Inc. is one such company to have won ECAC certification for deployment of its OptoScreener® product on a number of host single-view checkpoint X-ray screening platforms. This Liquid Explosive Detection System (LEDS) has been EU Type C Certified on Smiths Detection HI-SCAN6040i and 6046si and other comparable manufacturer platforms. The company says that the OptoScreener® enables single view X-ray platforms to automatically detect multiple liquid threats in real time and allows airports equipped with such hardware to comply with EU regulation. The product is reputed to have the lowest false alarm rates of any type in its class. Meanwhile, UK based Kromek Limited has been given a Type B classification for its Itemiser BLS-1004 product. This device offers smaller airports a compliant and standalone solution to screening potential threat items individually but in real time. The gradual relaxation of liquid restrictions surrounding passenger cabin baggage within the EU supposedly commences from end April 2011. Only time will tell whether the airport sector will bend to the will of the regulatory body or otherwise.
is a market leader in World Leading Systems for Aeroflex systems for capture and analysis of signals for surveillance, RF Capture and Surveillance RF intelligence and jamming purposes. Aeroflex’s systems are used by military and civilian agencies world-wide for the following RF applications: •
Tactical communications
•
GSM, UMTS and LTE
•
TETRA and P25
•
COMINT and ELINT
•
Radar
•
Government communications
www.aeroflex.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
113
www.counterterrorbusiness.com
EXPLOSIVE SNIFFER DOGS IN DEMAND We are familiar with bomb detection dogs being used in Afghanistan and Iraq, however now, more than ever before, these specialist dogs are being used in the UK and one company is at the forefront of this war against terror OME WOULD ARGUE that the terror threat has never been greater; however, few would argue that explosive sniffer dogs are now an essential part of the first line of defence against determined terrorists. Established in 1996, RFA Security has been supplying full time, in house, explosive detection dog teams since 2005. These teams are working everywhere from the Palace of Westminster filtration facilities, City finance houses and blue chip companies, through to sporting venues and freight services. MAN’S BEST FRIEND Tony Foster is one of the partners who founded RFA Security and he explains why a dog really is man’s best friend: “For all the advances in science it remains that man’s best friend is also man’s best defence against those who seek to use explosive devices to make their point. Our highly trained explosive detection dogs have no agenda, cannot be corrupted and live to please their handler by searching for traces of explosives. “Our dogs are trained to the exacting
S
114
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
standards of the RAF Police, complimented by NASDU – the National Association of Security Dog Users and the BSI, under BS: 8571-2: 2010 and we are licensed by the Metropolitan Police for the use/storage of explosives as we use live explosives to train our dogs. “The standards are important as demand increases for specialist sniffer dogs such as those here at RFA Security. Less reputable operators claim to be Home Office Licensed, which sounds impressive. Unfortunately for them, the Home Office does not licence or assess commercial civilian explosive search teams for their operational competency, nor does ACPO. So any company declaring or intimating that they are licensed by the Home Office or ACPO are, to be blunt, attempting to deceive the client. This is no time to cut corners or make false claims. “When you contact RFA we respond quickly and will despatch an experienced and well trained member of our team to carry out a survey to confirm the level of support you require from our sniffer dog teams, or indeed more traditional guard dog patrols which we can also supply. “Once we know what is needed we can refine our training for both sniffer dog and
www.counterterrorbusiness.com
handler for your business and will provide the necessary teams as quickly as possible to ensure the protection you need is in place.” THE BENEFITS New clients often increase the level of support offered by RFA Security after realising the benefits that having highly trained sniffer dogs and their handlers on the premises. Explosives search manager, Nic Atterton explained: “Recently we were awarded a contract with a major finance house in the City. Initially we were tasked to provide an explosive sniffer dog team two days a week and already we have been asked to expand the service in the near future. “People feel safe with the teams visiting the offices, however, more importantly it acts as a major deterrent. Imagine how a terrorist feels when they see a dog and handler on site?” While the increase of companies minimising their risks through using RFA Security’s explosive sniffer dogs means that more and more businesses are going to be safe, it does mean other organisations need to revisit their risk assessments. Nic Atterton again: “Clearly we know that terrorists prefer a soft target; they prefer to minimise their own exposure and encountering one of our teams, and most crucially one of our dogs is not something they want to do. Consequently they avoid such hardened targets and look for the soft option. “This means businesses that may have considered themselves not at risk may actually be considered by terrorists who find their first choice too difficult.” Protecting the Houses of Parliament, Guy Fawkes may have been thwarted in his attempt to blow up the House of Lords in 1605 by an anonymous tip off, but clearly vigilance and prevention is the order of the day amid myriad threats against the UK Government. Naturally sniffer dogs are an essential part of this mix and RFA Security is proud to have been contracted to provide explosive detection teams for the Palace of Westminster’s filtration facilities. Tony Foster explained: “RFA is contracted via a third party to supply our explosive detection dog service to these filtration facilities operated by the Palace of Westminster, specifically the House of Lords and House of Commons.” As you would expect RFA as a company, its managers and deployed staff, are all vetted by security departments within HM Government, on behalf of the Palace of Westminster. “We take pride in the calibre of our staff at RFA and are confident of their integrity, yet it is rewarding to be subject to this higher level of vetting too. I think it gives peace of mind to all our clients to know we are protecting
EXCLUSIVE PARTNERSHIP MEANS HIGHER STANDARDS RFA Security is exclusively partnered with Vikkas Canine Services Ltd for the provision and training of both dogs and handlers and is the only nongovernment client of VCS International. Owner, former RAF dog handler Gareth Elliott – better known as Gaff – explains why: “RFA is the only private agency we work with simply because we are impressed by their high standards and professional approach, which mirrors our own. “VCS has been working with dogs and clients since 1997 and from our Training, Kennel and Breeding Facilities in Lincoln UK we provide a wide range
of benchmark leading programmes. “We have the ability to train handlers and dogs to fulfil any canine task. Ranging from arms and explosive search, to combustible accelerants, VCS provides bespoke training services and follow-on operational consultancy to clients around the world. “We can respond quickly and make immediate and non-politically motivated decisions that are always to the best interest of our clients. We are a flexible training provider that delivers, and we pride ourselves on offering solutions that embrace client requirements, no matter how diverse or complicated they might be.”
LIBYA AND THE INCREASED THREAT The spectre of terrorism looms large as the conflict continues in Libya; not so long ago Muammar Gaddafi was a notorious state sponsor of terrorism and there are fears that he may revert to this approach in light of the enforcement of a no fly zone. Tony Foster says: “Cast your minds back to last year and the shocking news that a printer bomb has been hidden in a UPS package and was not detected during an initial examination at East Midlands airport. “This was a viable bomb and was only found after a tip off. This, once again, triggered the debate of sniffer dogs versus electronic explosive detection and while there is a role for machinery, clearly time critical logistics such as air freight will surely benefit from highly experienced, trained and vetted explosive detection dog teams from RFA Security as the Palace of Westminster and they can expect the same level of service. “Also, it is worth mentioning that we employ all our handlers and own all our dogs. That may sound obvious, but clients value the integrity that brings and do not like it when they have a different sub contractor each day. With RFA Security you are guaranteed to get the highest calibre handler and dog.” DIVERSE DEPLOYMENT While Westminster and high profile finance houses might be obvious locations for deploying explosive detection dogs, there are a host of other occasions when they are being used. “Exhibitions and arena type events create a demand,” explained Nic Atterton. “Depending on the event or client the risk may be greater and we can clear a venue before it is opened to the public and can also provide passive patrols where the dog screens everyone as they pass through the entrances and will signal anything suspicious. Naturally this has a deterrent effect. “Sports stadiums are another key venue
part of the ongoing screening operation. “The dogs have no agenda and are incredibly flexible, fitting into spaces where man and machinery cannot go and can search large quantities of freight in a very short time. This is vital when time is so important and where safety cannot be compromised. “Many private airlines are already using sniffer dogs and have recognised that a dog’s nose beats technology in so many ways. Their clients are often reassured to know dogs like those RFA Security can provide are keeping their freight safe and I am sure that in many ways it may increase business for those seen to be taking the threat seriously. The Freight Transport Association said that every piece of cargo undergoes a form of security before it flies in the UK, from x-ray scanning to sniffer dog inspection and hand searches. where dogs like ours can be useful and most of the Premiership sides will deploy sniffer dogs to ensure public safety. “Ahead of the arrival of important or vulnerable guests, hotels are other areas we work in and we could also be called in to screen buildings before a company or family take up occupancy, recognising the premises may have been targeted before they move in. “Sadly terrorists are devious and always looking for the soft option. It is our job to be one step ahead and ensure to the best of our ability that it does not happen on our watch.”
FOR MORE INFORMATION To find out more call +44 (0)1494 513516 or e-mail tony.sharpstone@rfasecurity.co.uk There is more information on our website: www.rfasecurity.co.uk and we also blog about security issues at http://explosivedetection.co.uk. For those using social media we are also @SnifferDogsUK on Twitter and on Facebook you can ‘like’ our page at www.facebook.com/ExplosiveDetectionDogs
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
115
AVIATION
www.counterterrorbusiness.com
INTEGRATED SYSTEMS APPROACH TO VEHICLE SECURITY BARRIER DESIGN MIRA is at the forefront of providing the complete package of design, test and validation of various engineering products and systems, whether they are automotive, civil or military SI PAS 68 GUIDELINES address the needs of organisations wishing to have assurance that vehicle security barriers will provide the level of impact resistance that they seek. This is done by a classification system for the performance of the barrier, and its supporting foundation and installation environment, when subjected to a single horizontal impact. The barrier is assigned its PAS 68 rating in relation to the range of impacts conducted, which then allows the organisation to align the barrier product to the site of interest to be protected, as guided by BSi PAS 69.
B
DESIGN AND TEST CAPABILITY MIRA is at the forefront of providing the complete package of design, test and validation of various engineering products and systems, whether they are automotive, civil or military. With respect to PAS 68, all our key skills to deliver effective solutions and provide consistent results are required. From a test aspect, the availability of a three hectare secure site, with capability to allow testing of vehicles up to 30 tonnes at 80kph, is a distinct advantage. This allows for the full plethora of impacts as defined in PAS 68, to be conducted with ease. As part of the capability package, MIRA has experienced suppliers that manufacture and install client designs, either developed in-house at MIRA for clients or by the client directly. All of which is project managed by MIRA engineers, from the initial design sketches to validating and certifying the product. Working closely with the Centre for the Protection of National Infrastructure (CPNI), MIRA has further enhanced the design capability to develop and assess products for PAS 68 and 69, by creating and owning the only fully correlated computer simulation vehicle models. For those who are experienced in the use of CAE, to design, develop and validate systems, this is the most effective tool to reduce product development costs and timelines. Furthermore, the ability to readily evaluate alternative designs and applications, combined with definitive predictions and imagery allows for all aspects of the customer disciplines, from the design engineer through to the marketing department, to be provided with all the information needed to deliver and promote their product. PRODUCT DESIGN The starting point for most products is an idea, an “I wonder if this would
116
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
work” inspiration. This then finds its way onto paper, adding primary information to enable a technical drawing or CAD representation to be created. In parallel, if not prior to creation of any models, the initial test and installation conditions are defined, to which the model represents, for example, the area and depth of the installation and the type of foundation. Also, it is best to evaluate the CAD information to relate any manufacturing attributes, such as the amendment of any weld interfaces, the definition of build tolerances, material availability etc. In an ideal world, the initial CAE model could be allowed to run with all system attributes set to match the intended actual condition. However, running such a model can be ineffective if it is likely to result in an impact simulation that takes five days to complete. The realisation is that some attributes have to be modified, and with experience, the right attributes are modified. A typical example is the foundation. In the real world often the foundation would be “made up soil”, which in CAE terms is a fluid. This can cause concerns to replicate the reaction stiffness. For an initial prediction it is far more pragmatic to treat the foundation as rigid within the CAE model, and it is far more important to replicate the installation, which is typically going to be a grade of concrete
with or without a level of rebar content. The net result is a model that would run in a day, and have minimal instabilities. With the model parameters defined, and the predictive boundaries known, the system model presents a result that meets the performance required. At this stage it is still a predictive model. The options to progress are virtually limitless, ranging from further improving the predictive quality of the model with actual sub-component data, possibly from coupon material tests, or even conduct a sub-system test, which could be a high energy pendulum impact to all the way to “let’s make the product and test it fully”. It is always a fine line, frequently dictated by cost and time, but with the wealth of experience and quality of model data at MIRA, more often than not it is a case that once a suitable final predictive model is achieved, the resultant design is ready to be sent for manufacture, installation and undergo the full PAS 68 system test.
FOR MORE INFORMATION Web: www.mira.co.uk
AVIATION
www.counterterrorbusiness.com
AN EVOLVING CHALLENGE James Kelly, chief executive of the British Security Industry Association reminds us of what steps should be taken to ensure vulnerable sites such as airports are effectively protected OR MANY OF US, it’s hard to believe that almost ten years have passed since the World Trade Centre attacks of 9/11 shook the world, bringing the aviation security industry firmly into the spotlight. Since then, airport security has been at the forefront of counter-terror measures, as procedures and technology are continually updated to face the ever-changing security threat. As the terrorist threat level for the transport sector was recently raised from substantial to severe, it is now more important than ever to ensure that Britain’s ports and airports are secured at all times, for the safety of staff and passengers.
fortunate was Moscow’s Domodedovo Airport in early 2011, as over 100 people were injured and 35 killed as a bomb was detonated in the arrival hall of this, one of Russia’s busiest airports just days after the UK’s terrorist threat was raised from ‘substantial’ to ‘severe’. A large, transient population, high volumes of luggage and easy access by members of the public means that airport security measures are always tested to their limits. Because of this, security personnel have come to rely heavily on technology to support them in ensuring the safety of passengers, crews, equipment and airport staff.
VULNERABLE AREAS Since 9/11, despite advances in counterterror measures, airports have remained vulnerable. In 2007, Glasgow airport was attacked as a Jeep Cherokee loaded with explosives was driven into the main atrium. Luckily, this attempt was unsuccessful, as was an attempt on Christmas Day 2009 to detonate explosives on a Detroit-bound aeroplane in an incident worryingly reminiscent of 9/11. Not so
CHANGING PROCEDURES With regulations strictly enforced around the items allowed within carry-on hand luggage, the use of security technology for luggage screening and monitoring the movement of bags from check-in desks to the aircraft in order to reduce the risk of tampering has become increasingly complex. This latter area is a critical aspect of flight safety, and includes the use of bar code readers to scan the labels
F
As the terrorist threat level for the transport sector was recently raised from substantial to severe, it is now more important than ever to ensure that Britain’s ports and airports are secured at all times, for the safety of staff and passengers
of bags, automatically linking them to individual passengers at the time they board to ensure that unaccompanied luggage is not loaded onto an aircraft. Radio Frequency Identitifcation (RFID) chips can also be used for this purpose and can be particularly useful in moving freight around the airport. Tag identification and location information is instantly forwarded over a network to a host computer running software to provide realtime management solutions via powerful reporting, display, and decision and control functions. Linked assets and people can be tracked and located within close proximity, thus providing an automatic, non-invasive asset protection solution while enabling freedom of movement. Other systems are capable of screening hold baggage using computer tomography equipment to generate a detailed, three dimensional image of the contents of a bag. Computer tomography comprises a non-destructive evaluation technique for producing two- and three-dimensional cross-sectional images of an object from flat x-ray images. It allows the characteristics of the internal structure of an object to be determined, such as dimensions, shape, internal defects, and density. The baggage passes between a radiation source and an imaging system, connected to a computer, developing a cross-sectional view of the object and its contents. This has the ability to speed up the scanning process, which is of course a key factor in any mass transit environment and increases the throughput of baggage and personnel scanning systems and reducing their susceptibility to false alarms. A LARGE-SCALE CHALLENGE By their very nature, airport sites are expansive, with a meandering perimeter and plenty of wide open spaces that are often difficult to police and secure. As such, the outermost perimeter of the site represents a key starting point in terms of physical protection combined with electronic measures such as CCTV and motion-detection technology. Attempts to breach fencing, for example, can be electronically monitored using fence-mounted vibration detectors that trigger an alert in the security control room. Working in conjunction with these detectors, automatically directed CCTV camera observation can be triggered to track intruders’ movements in order to direct security patrols towards them quickly. The difficulty of controlling large perimeters is compounded by an operating environment that presents a number of challenges not encountered in the protection of other locations, including the risk of interference and false alarms arising from jet blast vibration and the presence of systems such as ground surveillance radar. A combination of sensors and analysers therefore allows systems to be programmed to recognise the kinds of vibration specifically caused by intruders.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
117
AVIATION
www.counterterrorbusiness.com
The analyser will respond to events such as cutting, ramming or climbing, whilst ignoring the sort of movement caused by air and ground traffic or wind.
identify personnel before allowing them access to the cockpit, a capability which works in conjunction with the requirement to fit intruder resistant flight deck doors.
A WATCHFUL EYE At Luton Airport, CCTV is employed both for internal and perimeter security and to monitor the majority of airport operations. The active airside area of the airport is covered by cameras incorporating an analytics mode ‘virtual tripwire’, which identifies designate a unauthorised areas in each camera’s field of view. Whenever a vehicle or person crosses into these areas an alarm is automatically triggered and the appropriate camera view is displayed in the control room. The surveillance system is also linked to air traffic control monitoring of runways, taxiways and aprons, baggage handling areas, Customs & Excise, retail and catering operations and car parking. Control software provides authorised users with access to the video feeds from anywhere on the network. CCTV technology is not only useful in securing the airport buildings and perimeter, but can also be utilised on board aircraft themselves to address the potential threat from terrorists who may want to hijack a plane or detonate a device on board. Such systems – which are already in operation across a number of airlines – consist of covert and/or overt CCTV cameras installed throughout the passenger cabins of an airliner and connected to an advanced Digital Video Recorder (DVR). Of course, an especially critical area that these systems can help to secure is the cockpit door, preventing unauthorised access to the flight deck. Using the latest surveillance technology, flight deck crew can now readily view the area outside the flight deck door and adjacent galleys, via monitors, to access any situation and
ACCESS CONTROL Effective security technology that’s easy to use is a feature of ‘smart’ access control systems, which represent the next layer of protection beyond the perimeter. Depending on the location and sensitivity of the building or area involved, access control measures can range from paper-based logging systems for temporary contractors’ permits through to access control cards using RFID chips for more convenient proximity reading of card details and activation of gates, turnstiles and vehicle barriers. Biometric-based systems such as fingerprint readers and iris scanners are alternatives for higher risk locations. These use the unique human characteristics of a person to provide irrefutable proof of identity. Besides their important security function, access control systems can be used as a health and safety tool in the event of evacuation by quickly producing an accurate register of anyone still within a building or area. One British Security Industry Association (BSIA) member provided a fully integrated access control solution to London’s Heathrow Airport during the construction of its new Terminal 5. This system is used for managing access throughout the airport and preventing unauthorised access to secure areas. It is also used for managing the flow of passengers, visitors and baggage through access points inside the airport. In order to meet T5’s requirements, the BSIA member was able to customise its system to the airport’s needs. Consequently, the member fulfilled T5’s request to integrate access control with a CCTV
system as well as design a card reader that enabled operators to automatically segregate international, domestic, arriving and departing passengers. A further challenge revolved around the efficient use of available departure gates, which was achieved with a system of 14 interlocked doors to enable staff to easily control the flow of travellers, whilst maintaining security and segregation between international and domestic passengers. A PHYSICAL PRESENCE Despite these recent advances in security technology, a physical security presence is essential to maintaining order in airports, and also to manage and act upon the intelligence gathered through CCTV and access control systems. The presence of uniformed security guards at access points, as well as regular security patrols of buildings and the perimeter area can help to enhance the feeling of security for passengers. Airports combining CCTV with access control and physical security measures such as fencing, bollards, doors and locks, backed up with security patrols can be confident that their overall security solution is robust, effective and intimidating to would-be criminals. The British Security Industry Association is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services and adhere to strict quality standards.
FOR MORE INFORMATION Tel: 0845 3893889 E-mail: info@bsia.co.uk Web: www.bsia.co.uk
ARE YOU STILL USING LIVE DATA IN TESTING AND DEVELOPMENT? NINTENTIONAL disclosure of personally identifiable information (PII) can be the root cause for privacy issues in large corporations. One of the biggest challenges companies are facing is finding solutions to ensure they are using compliant test and development data that is meaningful and business intact in industries where sensitive data is an issue. Gartner has reported that over 80 per cent of companies are still using a direct copy of their live production database to provision data for test and development environments, an incredibly risky process.
U
118
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
Grid Tools has experience in working with some of the largest and most important government agencies internationally on provisioning secure, high quality data for non-production environments. With methods like data
creation and data masking, Grid Tools can ensure the data you are using is completely de-identified and secure, whilst maintaining the structure and relationships of the original environment. There is no need to continue with risky processes like copying live environments to provision test data when easy and efficient solutions are available to create and secure this data.
FOR MORE INFORMATION E-mail: info@grid-tools.com Web: www.grid-tools.com
AVIATION
www.counterterrorbusiness.com
OFFICIAL FREIGHT CONTRACTOR FOR UK PAVILION AT DSEI 2011 N 2009, Premier Showfreight Ltd was awarded the A|D|S contract to provide freight services to their members exhibiting in the UK Pavilion at DSEi. We successfully fulfilled this role by handling the transportation arrangements for a significant number of UK companies, utilising our logistics experience to make collections from multiple locations, and consolidate onto trailers at our Heathrow freight facility for onward delivery to ExCeL Centre, in accordance with the target movein schedule. At the venue, exhibits were offloaded and delivered to each company’s stand, with empty cases removed to storage in a timely manner after unpacking, ready to be returned on the night of closing. On completion of repacking, exhibits were carefully re-loaded onto trailers for return to our freight facility for distribution back to exhibitor’s own premises or direct to their next scheduled event. Premier Showfreight Ltd also secured the BAE Systems contract to coordinate the transportation logistics of their six working vehicles and howitzer to the event, including those certified as ‘Section Five’. All vehicles were successfully delivered on-time in accordance with
I
the client’s specific move-in schedule. Premier organised collection of additional display equipment from various overseas BAE sites, providing international freight services and temporary import facilities. DSEi 2009 proved to be a particularly successful event for us and enhanced our position as the UK’s leading exhibition freight service provider to the defence, security and aerospace industries. This position has been maintained by our ongoing commitment to the industry and determination to provide the highest level of service, whilst constantly striving to add value by working closely with our customers to become an important and integral part of their overall event planning. At DSEi, Premier Showfreight Ltd handled significant freight volumes, including
a number of consignments with highly sensitive and specialised equipment, within time constraints. Delivery to stand was achieved on or ahead of schedule and within budget. Every shipment was treated with the same degree of care and attention to detail, from a single box of marketing literature, to a full-scale howitzer gun. It is this type of approach borne out of our vast experience in the industry which, we believe, sets us apart from our competitors and enhances the level of service that we provide to our customers.
FOR MORE INFORMATION Tel: +44 (0)20 8915 1070 Fax: +44 (0)20 8915 1050 E-mail: info@premiershowfreight.com Web: www.premiershowfreight.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
119
Designed to Defend
Innovative Fabric Engineered Structures Rubb’s EFASS (Expeditionary Forces Aircraft Shelter System) is uniquely suitable for the military services, designed to be rapidly deployed and erected anywhere in the world. With innovating and unmatched relocatable buildings in action across the globe, Rubb has the ideal solution to military application requirements.
Advantage points •
Complete range packs into 20ft ISO containers
•
Multiple state-of-the-art hangar door options
•
Roof mounted twin track maintenance crane
•
Hangars available in spans from 11m-25m
we will never stop innovating RUBB BUILDINGS LTD. Dukesway, TVTE, Gateshead, NE11 0QE, England. Email: info@rubb.co.uk Tel: +44 191 482 2211
www.rubbmilitary.com
AVIATION
www.counterterrorbusiness.com
A RIGHT ROYAL VISIT FOR RUBB Her Royal Highness The Princess Royal commended the efforts of all those involved in helping to combat piracy in the Seychelles during visits to meet representatives from EU NAVFOR and the Seychelles Coastguard at Rubb Buildings Ltd’s latest installation UXEMBOURG based CAE Aviation commissioned the Expeditionary Forces Aircraft Shelter System hangar from Rubb to house two SA227 MERLIN IIIC aircraft on anti-piracy missions in the Somali basin. The Luxembourg detachment in Seychelles is part of the EU operation ATALANTA, steered by the European Union Naval Force (NAVFOR) Operation HQ in Northwood, UK. The client saw Rubb hangars in action in Afghanistan and decided a 20.4m (66.9ft) EFASS with Trident doors at both ends would meet CAE’s needs. The hangar was delivered and erected at Seychelles International Airport in Victoria in November, 2010. Princess Anne visited the facility on Tuesday, 30 November. Following the Royal Party’s return from Praslin, where they met members of the local community and visited the Vallee de Mai, The Princess and Vice Admiral Laurence were accompanied by Minister for Home Affairs, Environment and Transport Mr Joel Morgan and the British High Commissioner Mr Matthew Forbes, to the new purpose built hangar. HONOUR “EU NAVFOR was very honoured to welcome Her Royal Highness The Princess Royal and Vice Admiral Laurence as part of their visit to Seychelles,” said Lieutenant Commander Richard Sturman. “Seychelles is one of our most important partners in the region and we’re proud of the work we’re doing together to fight against the piracy threat in the Indian Ocean. I am working hand to hand with the Seychelles Coastguard, to ensure our forces operate jointly every day when in the vicinity of the Archipelago.” On arrival the Royal Party was given a briefing on EU NAVFOR’s operations by Luc Audoore, detachment commander (EU NAVFOR Luxembourg Detachment), outlining the cooperation between the EU nations and Seychelles to combat piracy. The briefing included details of the joint EU NAVFOR/Seychelles operation to rescue seven Seychelles fishermen, 19 and 20 November. “We had the chance to visit the joint facilities at the airport that EU NAVFOR have and The Princess Royal had the opportunity to see for herself the types of work done and how the element of air surveillance contributes to the overall efforts against piracy. I think she has gained a greater understanding of the entire work done, which involves a very close partnership between the Seychelles Peoples Defence Forces and EU NAVFOR,” said Minister Morgan.
L
NEW FACILITIES Luc Audoore, detachment commander and deputy general manager of CAE Aviation, said: “My personnel here are delighted by the new facilities which will make our work here so much easier, more comfortable and effective. The technicians can now do their work while being sheltered, and the aircrew no longer have to sit in a 55°C cockpit with all survival gear on during start-up. Assembly went very well, despite the very hot weather conditions. In four-and-a-half days the hangar was operational, thanks to the excellent support by Rubb technician David Cromarty. Rubb can be proud as a company to have such employees. We are really happy the way it is designed and works. We now use the facility for daily bed down of both aircraft and all maintenance inspections will also take place in it.” CAE Aviation has been in the Seychelles since September 2009. Having flown over 1,800 hours in 300+ sorties, CAE
is quite unique as the only civilian asset in the EU, NATO and third party (Chinese, Japanese) anti-piracy forces. RUBB EFASS SPECIFICATIONS • Span – 20.4m (66.9ft) • Length – 30m (98.4) • Leg height – 4.2m (13.8ft) • Overall height –8.3m (27.2ft) • Door – Trident door x2 • Frame – Aluminium • Membrane – Insulated PVC • Electrics – Three Phase electrical kit and power distribution Please visit www.rubbmilitary.com for additional EFASS options and specifications.
FOR MORE INFORMATION Please contact marketing manager Clare Wilson on 0191 4822211, e-mail cwilson@rubb.com or visit www.rubbmilitary.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
121
Emergency Notification
txttools allows you to send and receive txt messages to multiple people in an instant using your computer. simple :) 2 way communication that is quick, to the person, to the point, secure and cost effective. clever ;)
Realtime Emergency Notification e: w: t:
info@txttools.co.uk www.txttools.co.uk +44 (0)113 234 2111
A strategic SMS txt message plan can be an invaluable way to communicate with your community in the event of an emergency. Successful organisations, large or small, prepare themselves for all potential eventualities. txt messaging provides the perfect rapid response mechanism in the event of a disaster or incident as everyone has their phone with them at all times. A txt message can be sent from a computer or even a pre-authorised phone to every member of your community in a matter of minutes, whether that be tens of people or hundreds of thousands.
SMS txt messaging is socially and digitally inclusive, over 98 percent of UK adults have a mobile phone. Many organisations are adopting simple-to-use interfaces from companies such as txttools.co.uk This service allows the user to send and receive SMS txt messages from their computer and track the delivery, much like email, but with audited delivery. Having the ability to create discreet groups of customers, clients, patients or staff can have major benefits when you want everyone to be notified with a single message. The tool is completely flexible, messages can be sent instantly or scheduled months or even years in advance and sent out when that message is relevant. Messages can be edited
some facts: At least 20% of all organisations will suffer fire, flood, storm, power failures, terrorism, hardware or software disaster. Of those without a business continuity plan: 43% will never re-open 80% fail within 13 months 53% of claimants never recoup the losses incurred by a disaster. Source: Aveco Major systems downtime costs (15% Of Organisations) over £50,000 Per Hour. Source: Information Age
e:
info@txttools.co.uk
right up until the scheduled time to allow for changes in arrangements. Customers can be added to lists requesting information and replies may be automated or custom sent. Many organisations are now incorporating txttools into their disaster planning, it is proven to be the fastest, most reliable method for communicating with large groups of people.
txttools® emergency incident planning SMS is a powerful disaster contingency tool, which enables your organisation to: + Communicate directly with all members of your organisation quickly and efficiently, from individuals & small groups to tens of thousands
Why are they choosing txttools® ? txttools has had an uninterrupted message delivery in the public sector for the last 9 years, used by councils, police forces, schools, hospitals, clinics, connexions and over 48% of the UK colleges and universities. The txttools team have and continue to respond to development needs of the community. The application includes an array of features; 2 way messaging, secure online access 24hours a day 7 days a week from any PC (using the same security as online banking). A further benefit, unlike email, delivery of every message can be tracked.
+ You will be able to send safety alerts of areas to avoid, prevent unnecessary journeys and wasted time + Contact ALL customers and staff instantly from your computer + Send a message securely from your mobile via your txttools account to ALL customers or staff instantly, from wherever you are + Provide a route for staff and students to contact you and your team + Works even when network coverage is poor
It is possible to convert a txt message to voice mail if number is a landline, there are inbox rules, RSS feeds and auto responders. The txttools team have an outstanding reputation in both their face-2-face customer training and unlimited support which is included in the package.
w:
www.txttools.co.uk
+ In an unfolding situation send regular up-dates to advise all vested parties + Pre-write message templates to allow quick, but well thought out messages to be sent by any member of staff
t:
+44 (0)113 234 2111
DELivEring LowEr Cost inCiDEnt ManagEMEnt through tEChnoLogy Business Design Centre, Islington, London | Conference & Exhibition: 13-14 April
Designed to educate and inform, the 13th annual BAPCO Conference and Exhibition addresses how to deliver success at a time of exceptional financial restrictions
The annual conference and exhibition for all professionals engaged in major incident public safety communications and information management
Images courtesy of Hertforshire Fire and Rescue Service, British Transport Police and Frequentis
Exhibition
• Over 100 specialist suppliers showcasing the latest equipment, technology and information & data management systems • Gain expert advice on the use, implementation and management of communication equipment • Compare and source new products, systems and services direct with the supplier
ConfErEnCE
• Delegates can choose from a comprehensive programme of topics under the theme ‘Delivering lower cost incident management through technology’. The full conference programme is available at www.bapco.co.uk • Recognised as a vocational training opportunity that can count towards CPD points • Explore how the latest technology can help deliver lower cost incident management
for exhibition and conference enquiries, contact: Lucy McPhail
t +44 (0)20 7973 6635 E l.mcphail@hgluk.com
Jude Coverdale
t +44 (0)20 7973 6671 E j.coverdale@hgluk.com
Register now at www.bapco.co.uk
www.counterterrorbusiness.com
EMERGENCY COMMUNICATIONS
PLAN FOR THE UNKNOWN BAPCO is a unique annual event presenting the latest services and technologies for all professionals in the business of inter-agency communications and data management in major incidents and emergency situations of all kinds APCO 2010 saw leading decision makers and influencers attend from all quarters of public safety communications including members of local and central government, the emergency services, utilities, transport, fire authorities, MOD, British Army, Department of Health and the police.
B
SUCCESS Following on from the success of last year, the BAPCO 2011 Conference and Exhibition will take place 13-14 April at the Business Design Centre in Islington, London. The two-day event offers a comprehensive conference programme and exhibition, a wealth of networking and learning opportunities for attendees, and a unique opportunity to sample the latest technologies that will shape the future of the industry. The call for papers has now closed. The conference programme is being finalised at
the time of writing, and promises high-level speakers addressing the key issues facing the security communications business. The theme for this year’s conference is ‘Delivering lower cost incident management through technology’. Designed to educate and inform the conference will address how to deliver success at a time of exceptional demand, unanticipated threat and financial restrictions, with a focus on these key areas: • How particular approaches have saved lives, reduced casualties and enhanced communication at a reduced cost for
your organisation and/or across services • Forward planning for the 2012 Paralympics and Olympics and other major events, incorporating past learning and upcoming technologies • The utilisation of the best technologies in critical major incident management • The challenges faced by emergency services, utilities, transport, and similar bodies in response to the new financial restrictions facing them. With increasing budgetary pressure on communications professionals involved
The two-day event offers a comprehensive conference programme and exhibition, a wealth of networking and learning opportunities for attendees, and a unique opportunity to sample the latest technologies that will shape the future of the industry
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
125
EMERGENCY COMMUNICATIONS
in incident management, counter terror and business continuity, the BAPCO 2011 conference and exhibition provides an essential meeting point to discover solution technologies and services as well as cost saving options. NEW DEVELOPMENT An exciting new development for BAPCO 2011 will see live demonstrations taking place in the exhibition hall with representatives from the three emergency services working together in a rescue scenario live in the exhibition. Look out for canine device detection, body identification technology, and an abseil from the roof of the exhibition hall. In addition Excelerate will show off the latest in mobile command technology in the outdoor display at the front of the hall. The BAPCO 2011 exhibition is free to attend and open to all emergency services and local and national governmental agency professionals engaged in incident management, civil contingency response, disaster relief, business continuity and information management.
FOR MORE INFORMATION For further information please visit www.bapco.co.uk
www.counterterrorbusiness.com
The BAPCO 2011 exhibition is free to attend and open to all emergency services and local and national governmental agency professionals engaged in incident management, civil contingency response, disaster relief, business continuity and information management
DEDICATED ENCRYPTION HARDWARE IN HIGH SPEED NETWORKS A N ORGANISATION’S high-speed WAN carries the lifeblood of the business – communications and data. This could be anything from voice calls, e-mail, file server storage, database accesses and server backups. All of these contain sensitive information not only to the running of the business, but also sensitive information relating to customers. All these WAN links are vulnerable to unauthorised access, therefore potential exposure to attack is becoming an ever greater threat that could easily cost millions of pounds in damages should a breach occur, as well as cause irreparable loss of reputation. So if security is needed, then what’s the best approach? There are two things to consider: the technology you choose and how this impacts and performs on the network itself. One common approach is to integrate an add-on encryption module to a product designed to perform a different role (such as a firewall or a router). Adding encryption to a device that is meant to do something else means that you are taking some processing power away from that device’s primary purpose. Encryption at high speeds is not a simple matter – it takes considerable processing power to achieve. So all you’re
126
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
really doing by adding encryption to a router or firewall is causing the device to perform both tasks much slower than usual. Using a product that has been designed to perform at the speed of the network will ensure a smooth and simple transition from an unencrypted network to a truly secure network, with no degradation in network and application performance. The most common encryption solution uses IP security. IPSec is a flexible solution that allows encryption between individual systems, network to network, and also from remote devices such as roaming laptop users, hand-held devices and automated systems. These encrypted connections travel over any network that runs TCP/IP, including the Internet. Due to IPSec’s flexibility and popularity it is assumed by many in the IT security industry that IPSec will work for any application over any network. There are actually two reasons why IPSec is not well suited to high speed
networks. Firstly it adds overhead to the encrypted data. Secondly, and largely due to the encryption overhead, IPSec causes information to be fragmented in order to be sent across the network. This adds even further overhead. Encrypting Ethernet traffic at the Ethernet layer avoids any overhead that IPSec creates, which means there is no loss of bandwidth. However, with IPSec encryption you can lose up to 40 per cent of your bandwidth to IPSec and fragmentation overhead. Choosing the appropriate encryption technology for your network will ensure smooth network operations, no issues with your current and future applications that run over the network, and will help to avoid any network security issues from having no encryption at all. Senetas has a range of high speed network encryption hardware, designed to operate with no overheads, providing full network throughput and certified to the highest levels, for both commercial and government use.
FOR MORE INFORMATION Tel: +44 (0)1256 345599 E-mail: enquiries@senetas.com Web: www.senetas-europe.com
EMERGENCY COMMUNICATIONS
www.counterterrorbusiness.com
PROTECT USA – INDUSTRY-LEADING SECURITY TRAINING AND SERVICES M
R ITAY GIL is the head of Protect USA and is also the man who conducts the training for various special forces, special police and security organisations and individuals around the world. Mr Gil’s impressive background includes 13 years as a Captain in the Israeli Special Forces. Working for Yamam, Israel’s elite counter-terror and hostage rescue commando unit, Mr Gil participated in as many as three missions per day over ten years. He became executive director of all training programmes for the Israel Border Police as well as the Undercover Police Intelligence Unit. Recently Mr Gil was called in as a consultant for the Domodedovo Airport bombing in Moscow as well as for the Mumbai incident. Protect USA is among the very few official private outsource solutions for Israel government agencies and the Israel Defense Forces. Israel has traditionally relied on quality manpower in its more than 50 years of continuous war, counter terrorism and low-intensity conflicts. In this time, Israel has acquired counterterrorism field-experience that is unrivaled by any other country in the world. The courses we regularly conduct
I s r a e l i
include weapons and tactics, counter terrorism training, close combat, homeland security logistics, chemical and biological threats and precautions, high level executive protection, flight attendants’ counter terror training and more. Mr Gil is also available to conduct lectures in counter terrorism and is able to bring with him almost any high ranking intelligence operative, military general, etc. from Israel you feel would be beneficial – Mr Gil is extremely well connected in the world of counter terrorism. We can arrange for Mr Gil to train your people at your own facilities or alternatively you can use our training area in Israel. Our training and solutions are
flexible and we are certain that together we can find the answer you need. As you can see, Mr Gil can rightly be called an expert in all areas of counter terrorism. As such, if you believe that his services may be beneficial to your people then we can arrange for Mr Gil to be there. Please feel free to contact us with any questions you may have or for course brochures and we will help you as much as we can. We look forward to being able to solve your problems.
FOR MORE INFORMATION Tel: +44 7595293058 E-mail: mick.franklin@hotmail.com Web: www.protect-usa.com
Protect
S e c u r i t y
S o l u t i o n s
A w a r e n e s s I n s t i n c t R e a c t i o n
MR ITAY GIL IS THE HEAD OF PROTECT USA AND CONDUCTS THE TRAINING FOR VARIOUS SPECIAL FORCES, SPECIAL POLICE AND SECURITY ORGANISATIONS AROUND THE WORLD.
Mr Gil’s impressive background includes 13 years as a Captain in the Israeli Special Forces. Working for Yamam, Israel’s elite counter-terror and hostage rescue commando unit, Mr Gil participated in as many as 3 missions a day for 10 years. He also worked for and trained the Israel Border Police. The courses we conduct include Weapons and Tactics, Counter Terrorism Training, Close Combat, Homeland Security Logistics, Chemical & Biological Threats & Precautions, High Level Executive Protection, Flight Attendant Counter Terror and more. We can arrange for Mr Gil to train your people at your own facilities or alternatively you can use our training area in Israel. Our training and solutions are flexible and I am certain together we can find the answer you need.
CONTACT DETAILS
Email: mick.franklin@hotmail.com Tel: +44 7595293058 Web: www.protect-usa.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
127
Through technical expertise and commitment to customer care our aim is to deliver the best rapid prototyping service in the UK.
• Stereolithography • Selective Laser Sintering • Vacuum Casting • CNC Machining • Reaction Injection Moulding • Traditional Model Making • Silicone Moulding • Low Volume Production
Discover the ultimate prototyping experience for your product development requirements.
sales@paragon-rt.com www.paragon-rt.com +44 (0)1325 333141
POLICE & LAW
www.counterterrorbusiness.com
WORKING TOGETHER FOR A SAFER COMMUNITY Amanda Beesley of the British Security Industry Association looks at how the private security industry can help meet the challenges of public sector budget cuts S BUDGET CUTS begin to bite across the public sector, police forces across the country will be faced with increased pressure to cut costs while maintaining an excellent level of service to local communities. The private security industry can do much to help police forces overcome this challenge, especially when it comes to protecting national and regional infrastructure in times of natural disaster or terrorist threat. Currently making its way through the Houses of Parliament is the Police Reform and Social Responsibility Bill, which has been introduced to increase the accountability of the police service to local communities and better equip police to tackle crime and anti-social behaviour in the community.
A
EFFECTIVE PARTNERSHIPS Later this year, the British Security Industry Association (BSIA) will host its second annual conference for police and resilience forums to highlight ways in which the private security industry can help meet the challenges of public sector budget cuts. Examples highlighted at last year’s conference demonstrated how effective working partnerships between police and the private security industry have resulted in budgetary savings and more efficient resource allocation at a time when local authority resources are stretched to the limits. In addition to providing day-to-day support in non law-enforcement roles, freeing up police officers to focus on higher priority tasks, the private security industry has proven an indispensable resource in the wake of natural disasters, such as fire or flood, as well as in the aftermath of terrorist attacks. One such example of a successful partnership approach was Operation Outlook, an initiative that was formed in Gloucestershire in response to the severe flooding experienced by the region in 2007, the largest peacetime emergency experienced by Gloucestershire police since World War Two. Chief inspector Derek Jones explains: “With the advent of the Civil Contingencies Act of 2004, police became responsible for dealing with emergency situations and taking the lead in a multi-agency response. Shortly after the floods of 2007, roads became gridlocked, power went down and two thirds of the population lost its mains water supply. In addition, there are two power stations in
Currently making its way through the Houses of Parliament is the Police Reform and Social Responsibility Bill, which has been introduced to increase the accountability of the police service to local communities and better equip police to tackle crime and anti-social behaviour in the community Gloucestershire that would have affected the national grid had they failed.” Police received over a thousand calls in just eight hours, with a massive search and rescue operation launched to evacuate households and businesses and rescue stranded motorists trapped on a flooded M5 motorway. One of the region’s major A-roads, the A46, completely disintegrated in places, making access to certain areas of the county even more challenging. The major problem, though, was that of water shortage. The county’s main water
treatment plant had been shut down, with around 24 hours’ worth of water left in the system. This quickly depleted to around six hours’ worth once word had spread and people began to stockpile water in preparation for a shortage. As such, the police were forced to implement a water distribution plan to ensure that vulnerable and stranded people received bottled water in a fair and controlled manner. It was at this point that the private security industry began to play its part.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
129
at Vi C ou st sit nt an u er Te d s rro I9 3 rE xp o ‘1 1
POLICE & LAW
www.counterterrorbusiness.com
Smarter Global Connections Cable Assemblies Connectors Cables Fibre Optics Cabinets & Accessories
Accurate Shooting
Personal Safety
Wind Speed
Air Pressure
Temperature Heat Stress Wind Chill Dew Point Wet Bulb Humidity Air Density
- Handheld - Robust - Waterproof
- Data storage - Data upload - Bluetooth®
Direction Cross, Head
& Tail Winds
Barometric
Pressure
To find out how our cabling and network infrastructure solutions can save your precious time and resources call 01727 845 750 www.gemcable.co.uk
Transport | Broadcast | Satellite | Aerospace | Telecoms
Are you still using live data in testing and development?
Mitigate risk in non-production environments with the most innovative data masking and data obfuscation solutions
www.grid-tools.com
Specialist in test data creation, data masking and test data management tools and solutions
130
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.r-p-r.co.uk Tel: +44 (0) 1590 679755 or email sales@r-p-r.co.uk
COUNTER TERRORISM DESIGN FROM CONCEPT TO COMPLETION ROSYNC PRIDES ITSELF on its in-depth technical ability and understanding of electronics for the counter terrorism world, enabling us to precisely meet the customers’ needs with the core competences that benefit the whole supply-chain. Prosync Ltd has an extensive knowledge and expertise in the design and development of electronics equipment using switched technology for the commercial and defence worlds. We use a Systems Engineering approach to develop your hardware/ software requirement. Whatever your requirement,
P
Prosync will design, develop and plan the right equipment to give a “ready to market” product, this includes: • PCB design and layout • Custom electronics design • Product development • Product prototyping • Electronic design process • Systems architectures Prosync Ltd focuses on developing special relationships with universities, commerce and industry to give you the right product.
FOR MORE INFORMATION Tel: 07771 643205 E-mail: info@prosync.co.uk Web: www.prosync.co.uk
POLICE & LAW
www.counterterrorbusiness.com
In addition to providing day-to-day support in non law-enforcement roles, freeing up police officers to focus on higher priority tasks, the private security industry has proven an indispensable resource in the wake of natural disasters, such as fire or flood, as well as in the aftermath of terrorist attacks FREEING UP TIME Up until that point, the role of the private security contractor had been to secure police buildings, but by enlisting their help with water distribution, over 140 front line officers were relieved from water distribution centres to return to business as usual, dealing with criminality, deaths and securing water convoys. Although sceptical at first due to the contractor’s lack of formal Police training, Derek Jones was soon reassured. “There was a positive and flexible approach,” he reports. “Our confidence in [the security provider] soon increased to the point that I was able to give positive feedback to the gold commander and arrange rest days and redeployment for police staff.” Key to this partnership approach, the likes of which has been viewed with suspicion
by other police forces, was the inclusive approach adopted by Gloucestershire constabulary. As Derek Jones comments: “We incorporated them into our briefings, training and information sharing to embed a positive culture and demonstrate that we were one unified team.” VALUABLE RELATIONSHIPS BSIA chief executive, James Kelly, comments: “Working alongside the Police has long been a priority of the BSIA, and following the announcements of budget cuts across the public sector, it is important to reinforce the value of this relationship with key stakeholders including police forces and local resilience forums. “When a positive approach is adopted, such as that demonstrated by Operation Outlook, private security companies can
prove a vital asset to police at times when an increased pressure is placed on their resource. Not only does this apply in emergency situations, but can also be very relevant in community policing, where the presence of uniformed security officers has proven instrumental in reducing anti-social behaviour and alcohol-related crime in some areas.” AREAS OF SUPPORT In fact, there are a number of ways in which members of the Police and Public Services Section can provide support, thereby freeing up specialists to pursue their core duties. These include: court warrant services, court security/custody assistance, immigration services, lost/ found/seized property management, scenes of crime protection, statement taking, street patrols (local authority and resident groups), town centre CCTV schemes, police and public services specific training and warden schemes. The BSIA operates a dedicated Police and Public Services Section, which comprises private security companies specialising in supporting law enforcement.
FOR MORE INFORMATION To find out more, visit www.bsia.co.uk/pps
www.yelo.co.uk
AFFORDABLE TEST SYSTEMS FROM THE COMPANY YOU TRUST AUTOMATED TEST SYSTEM DEVELOPMENT > FIXED PRICE TURNKEY > TIME & MATERIALS SUB-CONTRACT
Mechanical fixturing, electrical, electronic and software expertise in-house NATIONAL INSTRUMENTS PARTNER • LABVIEW CERTIFIED ARCHITECT • TESTSTAND
For a no risk trial phone Christine on 02893 357 300
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
131
POLICE & LAW
www.counterterrorbusiness.com
CCTV SYSTEMS AID SAFER DETENTION IN CUSTODY Protection of persons in custody, as well as staff, is of the utmost importance. This is why West Midlands Police turned to Visimetrics when the force decided to implement a network based custodial CCTV system linking its 23 police stations with custody blocks to force headquarters EST MIDLANDS POLICE (WMP) is the UK’s second largest police force after the Metropolitan Police Service. The force serves a population of 2.6 million across 348 square miles. WMP is divided into ten police areas serving the major centres of Birmingham, Coventry and Wolverhampton as well as the districts of Dudley, Sandwell, Solihull and Walsall. WMP established a project board to evaluate and recommend an appropriate CCTV system for use within all custodial suites throughout the force. The board
W
consulted with relevant internal and external bodies such as Professional Standards Department (PSD) and AntiCorruption unit, the Independent Police Complaints Commission (IPCC) as well as ACPO and the Home Office to ensure compliance with Safer Detention policies. INTENSIVE EVALUATION & TESTING Only the highest image and audio quality was acceptable to WMP. Many manufacturers were evaluated on this basis before the board narrowed the selection to two – Visimetrics and Vicon.
Custody CCTV images often form part of murder investigations. As the footage can be used by expert witnesses in facial mapping it is essential that the recorded images are of the highest quality – Colin Holder, CCTV project manager
132
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
WMP took the unusual step of installing a complete recording system from each manufacturer at two separate custody suites to evaluate the overall system including network management and performance from force headquarters. Colin Holder, CCTV project manager for the force, explains some of the key considerations used to compare the two systems: “Custody CCTV images often form part of murder investigations. As the footage can be used by expert witnesses in facial mapping it is essential that the recorded images are of the highest quality. Image quality was, by far, our most decisive consideration. Further key evaluation criteria included audio quality and demonstrable synchronisation between video and audio as well as user management of the recordings.” Colin continues: “Visimetrics held a clear advantage in delivering against our key requirements. However, a further benefit provided by the Visimetrics system
POLICE & LAW
www.counterterrorbusiness.com
spare’ configuration assuring maximum redundancy. The required retention period for all recordings is 90 days. To achieve this at the specified frame rate, resolution and quality requires over 1,400TB (1.4 Petabytes) of storage. Despite such large numbers the system design is very flexible using 4 and 8-channel encoders as the basis for building a fully distributed CCTV storage system.”
I can cite numerous examples where the system has proved its worth already. A common example is increased detection of persons attempting to drop drugs prior to searches. Another is dealing with returned property disputes was the ability to download dual format footage to DVD in a single step process. Crucially, both standard data (PC) format DVD, and ‘movie’ format DVD, as used in standard DVD players are created by users simultaneously. Given that the Criminal Justice System has moved to this standard, it has massively streamlined the process of getting evidence to our ‘customers’.” PROJECT IMPLEMENTATION With a budget allocation of £2.5 million in place, the force started the installation work early in 2009. The aim was to complete two custody suites per month. For operational reasons the force chose suites geographically separated for installation at the same time. The project team managed to adhere to the installation plan despite the force undergoing a major re-structuring programme during this time. WMP custody suites are housed in a variety of buildings – from Victorian structures to modern complexes. A common system design was established to minimise the potential for surveillance blind spots. The number of cameras installed at each site is, therefore, directly related to the size and construction of the custody block. The CCTV coverage throughout all custody blocks is as close to 100 per cent efficient as is practical.
The overriding principle is that persons in custody are recorded from the moment they arrive at the dedicated van dock, and from then on, at every point, as they are processed through the block – to the cell. Colin adds: “The key areas for us are around the charge desks. Regardless of site we have devised a 3-camera layout giving full coverage of both sides of the desk. A further camera is used to overview the desk itself so that property transactions are fully recorded. Other areas such as rooms housing intoximeter and fingerprint equipment are covered in a similar fashion.” A FORCE WIDE NETWORKED SYSTEM Tim Wood, business development director for Visimetrics, has been involved with the project from the start. Tim explains: “The WMP solution is effectively a very large integrated recording system (over 1,000 cameras) operating across the force’s Wide Area Network. The system is a distributed network of video encoders and RAID storage systems located throughout the force’s 23 custody suites.” Tim continues: “Ensuring on demand access to all recordings at all times is essential. This calls for a robust, redundant storage configuration. The installed system uses a RAID level 6 with ‘hot
OPERATIONAL USE OF THE SYSTEM The CCTV recording system is used by various persons. In addition to HQ based staff, local access is available to the relevant recordings for review and export. Colin Holder explains: “I can cite numerous examples where the system has proved its worth already. A common example is increased detection of persons attempting to drop drugs prior to searches. Another is dealing with returned property disputes. The clarity of the images and associated audio allows us very quickly to resolve these issues – something that in the past could escalate into a significant investigation in its own right.” A NEW WAY OF WORKING Visimetrics has worked extremely closely with WMP to ease the transition. More than 200 users have received training, ensuring knowledge is spread over all shift patterns at all times. Tim Wood comments: “Regardless of whether they are local or advanced users, everyone uses the same user interface with the same level of operational functionality. Advanced users such as the video librarians or professional standards have more of an interest in using features such as playlist creation allowing them to piece together an event in a chronological order and then export that playlist to DVD. This process provides a significant saving on time particularly when events are exported to ‘movie’ DVD in a playlist format. Viewers of the DVD simply watch the event unfold in the order created by the investigating officer.”
FOR MORE INFORMATION Judge the performance of Visimetrics recording systems for yourself. Contact Tim Wood directly on 01292 673770 or wood@ visimetrics.com to organise your evaluation.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
133
FALCON PCB GROUP
One of Europe’s leading PCB providers from concept to production
• AS9100 • SC21 • ISO14001 • High Technology Specialist • 5 UK PCB manufacturing sites • Offshore PCB supply division
Offshore PCB Solutions
Rigid & HDI PCB
Flexible and Flex-Rigid Circuits
Technologies
Design for Manufacture
• 1 to 32 layer HDI Rigid PCB • Flexible and Flex-Rigid Circuits • Fine pitch • Sequential bonding • Microvia • Controlled impedance • Copper filled vias • Embedded components
• HDI Rigid experts • Specialist in flexible & flex-rigid • Innovative solutions • High reliability • Cost reduction support • Early customer engagement • DFM reporting • On site DFM Seminars
Markets Defence Telecoms
Homeland Security Industrial Controls
Aerospace Medical
info@falconpcbgroup.com www.falconpcbgroup.com
EVENT SECURITY
www.counterterrorbusiness.com
BRINGING HOME THE GOLD IN EVENT SECURITY James Kelly, chief executive of the British Security Industry Association, reports on the challenges and obstacles organisers of the security strategy for large-scale events encounter VENT SECURITY is now, more than ever, subject to fierce public and governmental scrutiny, with the increased threat of terrorism and the advent of high profile events such as the Royal Wedding this month and the London 2012 Olympic and Paralympic Games. Effective security for these types of high profile public events require a coordinated approach by both the public forces and the private security sector; all aspects from the management of crowds, the monitoring of access points and the protection of high profile attendees must be given the maximum consideration, whilst ensuring that security strategies do not get in the way of the smooth running of the event.
E
SAFETY AND SECURITY STRATEGY The recent publication of a revised Safety and Security Strategy for the 2012 Olympic and Paralympic Games, setting out the key aims and objectives for Police, government agencies, organisations and departments responsible for delivering a secure event, has renewed the focus on the importance of ensuring the effective and safe delivery of high profile events. The document outlines the key security threats faced by the Games, citing terrorism, cyber attack, international military crises and major accidents or natural hazards as the most significant risks, and acknowledging the additional security requirements of non-competition venues nationwide, such as hotels, airports, training venues and live screenings. Therefore, security measures for such events need to be sturdy and reliable, but not too invasive, to ensure the protection of event attendees and staff, without ruining the experience for the spectators. Sections within the British Security Industry Association (BSIA) such as Crowd Management, Police and Public Services, Security Guarding, Access Control, Close Protection and CCTV all have extensive experience in carrying out security functions during events of all kinds. PUBLIC AND PRIVATE FORCES Public forces are often involved in high profile event security, where an extensive number of officers are required. However, in times where resources are already
stretched to the limit, the private security industry can be of great assistance by alleviating the pressure on the police force and by picking up some of the functions required to secure events. For the London 2012 Olympic and Paralympic Games, the Police will be heavily supported by the private security industry, and even the largest of private security contractors will be working with smaller companies to provide effective security. The BSIA is engaging early with the Association of Chief Police Officers (ACPO), as well as government departments such as the Olympic Security Directorate (OSD), Olympic Delivery Authority (ODA) and the London Organising Committee for the
Winter Olympics, a 3:1 ratio of security guards to athletes, with an estimated total security cost of over ÂŁ600 million. CCTV Although guarding and crowd management teams are excellent ways to ensure the security of an event, they are often not enough. CCTV footage helped make important convictions following the disastrous 1985 European Cup Final between Liverpool and Juventus FC at Heysel Stadium in Brussels, where 39 people died after fights broke out. These systems are now installed on almost every London football ground, acting as a deterrent as well as allowing officers to review the video
For the London 2012 Olympic and Paralympic Games, the Police will be heavily supported by the private security industry, and even the largest of private security contractors will be working with smaller companies to provide effective security Olympic Games (LOCOG), to ensure that the effectiveness of this working relationship is maintained in the run-up to the Games. CROWDS AND INDIVIDUALS During events, crowds can vary from hundreds to hundreds of thousands, but in all cases it is always advisable to ensure crowd management and security guards are constantly on hand, be it to act as deterrents to possible criminals hiding in the mass or to maintain order should there be a threat of fights breaking out. Officers’ duties include crowd management, operating of electronic security systems such as CCTV and access control, car park attendance and general monitoring duties. Security personnel also provide a physical presence on the day and are a useful port of call for members of the public requiring assistance or information. Moreover, they cover the essential role of ensuring the health and safety of the event and guiding the crowds through emergency procedures. In total, it was estimated that around 15,000 security personnel were on hand throughout Vancouver 2010
content after incidents occur, to gain an understanding of how events unfolded and to secure convictions. In addition, a particular application of CCTV technology, known as Video Content Analysis, can now be applied for external and internal intruder detection, the monitoring of buildings for health and safety, people counting, automatic event and incident detection, safety enhancements for public areas, smoke and fire detection and camera failure or sabotage detection. ACCESS CONTROL Access control systems allow event organisers to control the traffic of people in the premises and to keep away unauthorised visitors. The systems are widely used across the events industry, and there are a number of solutions that can be employed to ensure speedy yet effective monitoring of access points. For outdoor events, portable turnstiles are simple to transport and use, only needing a power plug and an IP point to operate. These types of flexible access control points are ideal for outdoor music
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
135
www.counterterrorbusiness.com
ATG ACCESS LAUNCHES FIRST SURFACE MOUNT BOLLARD SYSTEM A
TG ACCESS is proud to launch the word’s first surface-mounted impact tested bollard system at Counter Terror Expo 2011, as well as launching the SP400 Independence bollard; an impact tested bollard that can be installed in areas without power. The ATG Access Topmount Surface Mounted Deployable Bollard System has been designed by our engineering department to a CPNI brief for a specific requirement. The original brief called for a system that could be pinned to the ground, and whilst it may have seemed the most obvious approach, our engineering department considered that this would significantly limit the usability in real world scenarios. This is because the integrity of the ground surface to be used may not be consistent, and authorities would most likely be reluctant to have surfaces damaged when a temporary solution is installed. Due to the unique way this bollard system is installed they provide PAS68 certified protection via the simple use of an anchor point at each end, negating the need to be bolted down. This means that you can easily and quickly deploy these bollards safe in the knowledge that you
are not compromising on protection, and you are not compromising the ground surface (i.e. paving stones) underneath. With rapid deployment capability for temporary events this bollard system could offer a short to mid-term solution for almost any perimeter security brief. We are currently in the process of testing this system as a buried solution that would only require a surface depth of less than 75mm, easily transforming the short term solution into a more permanent one if required. The SP400 Independence bollard can be raised or lowered in a variety of ways which do not require power or hydraulics. This means that as soon as the bollard is installed it is ready for action and is ideal for applications where
limited operations, remote location or lack of power is an issue. ATG Access is one of the world’s largest manufacturers of anti-terrorist vehicle barrier systems. The company has the widest range of impact tested bollard systems in the world, tested to both UK (PAS68) and US standards. Our innovative security solutions can be applied to almost any access security or perimeter protection requirement. Our industry leading SupaSlim Shallow Mount Systems continue to be used for protection of major infrastructure including recent projects at Singapore’s Changi Airport, Abu Dhabi Investment Centre, London’s major railway stations, UK Supreme Court and many more. We will be exhibiting at the event both days at stand H70. Come along and see these innovative products up close, or simply come and talk to one of our staff who would be more than happy to answer any questions you may have on access security.
FOR MORE INFORMATION Tel: +44 (0)8456 75 75 74 Fax: +44 (0)8456 75 99 55 E-mail: sales@atgaccess.com Website: www.atgaccess.com
ATG ACCESS BOLLARDS AND BARRIERS Bollards provide the solution to more security problems than any other single piece of security and access equipment. ATG Access bollards and barriers are world renowned as being the very best products available with industry leading technology. Combine this with a world class engineering team, global installation & service back up, and the choice is simple. Some of our innovative products include a full range of shallow foundation solutions of bollards, gates and barriers including: The SP Shallow TT Standing 1 metre tall yet requiring only 900mm foundation depth, this is the world’s shallowest automatic bollard PAS68 tested to 40mph. The VBB Utilises a hydraulically activated, horizontal bar that is stored below the road surface, that when deployed offers full protection against vehicle borne improvised explosive devices. CityScape Gate Installed in a foundation of only 400mm, and using synthetic materials and state of the art design, this is the world’s strongest manually operated gate. Tel: +44 (0)8456 75 75 74 Fax: +44 (0)8456 75 99 55 Email: sales@atgaccess.com Web: www.atgaccess.com
136
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
EVENT SECURITY
www.counterterrorbusiness.com
festivals or gatherings, as they are hassle free to transport and install, yet reliable and sturdy in ensuring only authorised people will have access to the area. Sporting grounds make use of access control systems as well. Many of the major football stadia in the country have started adopting full height electronic turnstiles, often combined with smart cards, to help identify individuals entering the stadium. Amongst the many uses of these systems, they allow organisers to calculate visitor flow in and out of the premises, monitor how many seats are left and estimate fill times. In addition, access control systems carry out an important health and safety function, by producing an accurate register of the number of people within a building or area in case an evacuation needs to take place. CLOSE PROTECTION Close protection officers are a must when protecting VIPs such as celebrities and politicians attending events, especially wellpublicised or controversial ones. In the case of the London 2012 Games and the Royal Wedding, heaps of high profile attendees are expected to partake in the celebrations, including national and international politicians, celebrities, members of the Royal Family and well-known sport personalities.
The close protection officer’s work starts before the event, with the in depth scrutiny of the venue to ensure all angles are covered. In most scenarios, officers must ensure that high profile attendees are able to go about their daily business with almost an invisible bubble around them, reacting only when required. All the individual security requirements for each VIP will need to be integrated in the wider security strategy for the event, adding to the pressure on event organisers to make sure all aspects are being considered. Therefore, communication amongst the various security teams and providers involved needs to be accurate and efficient before, during and after an event. SHARING BEST PRACTICE Although security strategies need to be targeted to the individual requirements of each event, it is not uncommon for organisers to share best practice with each other, to avoid the same mistakes being repeated twice. Earlier this year, the British Security Industry Association’s project director for 2012, David Evans, visited Brazil as a member of a UKT&I DSO delegation. The visit was part of an arrangement by which cities that host the Olympic & Paralympic Games share their planning and hosting experience so that the Games
are in a virtual cycle of improvement. Rio de Janeiro will host the Olympic and Paralympic Games in 2016. In addition Brazil will host the FIFA World Cup in 2014. COOPERATION The bigger an event, the greater the scope of a security strategy, which will cover not only the areas where the event will take place but also equally impacted premises such as athletes or performers’ residences, hotels, local attractions, transport system, etc. For this reason, cooperation between public forces and experts in the private security industry is essential. The number of products and services available for event security goes beyond the above list, to include also physical security equipment – such as fences – property marking for valuable equipment, electronic security systems, etc. Companies from across the BSIA’s 17 sections of membership have expertise in securing all kinds of events, both large and small. BSIA members meet strict corporate requirements, so customers who source security solutions from them can be confident that they will receive quality advice and an excellent service.
FOR MORE INFORMATION Web: www.bsia.co.uk
PRECISION ENGINEERING AT YOUR FINGER TIPS
FASTEC ENGINEERING SERVICES LTD
For an Online Quote Please Visit WWW.FASTECENGINEERING.CO.UK
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
137
www.logicallysecure.com
Optimise your security Logically Secure was founded in 2005 from a core of former military IT, counter-intelligence and security specialists. As a well-respected and trusted security consultancy; our CESG approved staff (CLAS) deliver services to industry, Government and CNI.
• We
have a complete understanding of the whole UK HMG Security process from our extensive experience gained inside both the MOD and Commercial spectrums.
• If you are planning your own List-X environment we can help you meet the Authority’s physical and technical security requirements including IT system Accreditation.
• Our former MOD Crypto staff can support your Project Crypto
Planning (PCPs) to ensure you get the right Crypto equipment on time and with the minimum of project risk.
• We have undertaken many HMG and commercial lockdowns of networks, laptops and mobile devices. We can help you both harden and document the configuration, ensuring you are best positioned to gain Accreditation.
• We have security cleared CLAS and CREST staff to support your
testing requirements; we can support web application, wireless, network, server and workstation testing in the UK and overseas.
See us at Counter Terror Expo, London Olympia, 19th & 20th April 2011 on stand J79
Logically Secure Ltd, Festival House, Jessop Avenue, Cheltenham, GL50 3SH • Telephone: 01242 220 040
www.counterterrorbusiness.com
LOGICALLY SECURE Logically Secure can help you take the necessary measures to minimise your vulnerability to cyber attacks and ensure that pragmatic and effective contingency plans are in place
N OCTOBER 2010 the government published its National Security Strategy ‘A Strong Britain in an Age of Uncertainty’, drawn up by the newly created National Security Council. The strategy highlighted the need for the UK to be able to react effectively to evolving security threats from a wide range of sources. Acts of terrorism and cyber threats are listed among the four Tier One risks to the UK’s security, with a recognition that cybercrime could escalate into cyber terrorism. In an attempt to combat these threats the government has committed £500m to tackling cyber crime. MINIMISE YOUR VULNERABILITY Logically Secure helps organisations take the necessary measures to minimise their vulnerability to cyber attack and ensure that pragmatic and effective contingency plans are in place should an attack succeed. Logically Secure continues to provide a wide range of IT security consultancy services to a diverse range of clients across a number of industrial sectors, from the music and entertainment industry to major government programmes, including the MOD and defence industry. These services have ranged from providing incident response, investigation and recovery,
I
security architecture advice and design, penetration testing, security accreditation support, and assistance with the Common Criteria (CC) evaluation process. INCIDENT RESPONSE Over the past 12 months we have been called on to assist clients with IT incident response investigations following either a suspected or actual hacker attack or an unauthorised data release. The nature of these incidents necessitates a rapid response from Logically Secure to ensure that the integrity of forensic evidence is maintained, and can require sustained round-the-clock effort to resolve. Regular updates are provided throughout the incident, followed by a post incident report fully detailing the causes of the incident, investigation findings and our recommendations on preventing a recurrence. NETWORK DESIGN AND TESTING One of our international defence sector clients had previously had very little exposure to the HMG security accreditation process. Their requirement was to build an accredited network to carry Impact Level 3 (IL) data; the network was designed to connect two data centres and numerous sites throughout the UK as well as providing remote access facilities
for authorised users. The network was also connected to MOD systems at the same IL. Logically Secure were contracted to provide security advice on the design, carry out penetration testing of the network, produce relevant accreditation documentation, and provide the interface with the accreditation authorities. Accreditation support was also provided to a MOD project providing a pre operational deployment training simulation capability to the British Army. This system provided an extremely flexible facility that could be used to simulate numerous theatres of operation; this drive for flexibility also introduced extra challenges to be able to meet the accreditation process requirements. Logically Secure provided security architecture advice and assisted with the production of the accreditation documentation required to successfully achieve full accreditation. COMMON CRITERIA Logically Secure has for a number of years been involved as the lead security consultant for the evaluation and accreditation of the IL3 ground communications and information systems component of a major defence Private Finance Initiative (PFI) programme. The evaluation is being carried out to meet the requirements of CC Evaluation Assurance Level (EAL) 3. This has involved regular and extensive liaison with the Commercial Evaluation Facility (CLEF), CESG (a GCHQ department), System Accreditor and the main contractor providing the system. Logically Secure helped to streamline the design, provided the documentation in support of the evaluation, and produced the test scripts to be run against the system to prove that the installed security enforcing functions actually provided the claimed level of security. The Logically Secure penetration test team also carried out penetration testing at different stages of the build process to de-risk the evaluation and ensure that the approved installation design was met.
FOR MORE INFORMATION For further details or to discuss your system security and accreditation requirements please contact us at: Logically Secure, Festival House, Jessop Avenue, Cheltenham GL50 3SH Tel: +44 (0)1242 220040 Web: www.logicallysecure.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
139
EVENT SECURITY
www.counterterrorbusiness.com
RENFREW GROUP TAKES SCIENCE FROM THE LAB TO THE MARKET A T RENFREW GROUP INTERNATIONAL we have all the facilities in one location to successfully take the science from the lab to the market. In a 4,000m2 complex our integrated innovation teams have at their disposal development laboratories, testing areas, in-house tool making and injection moulding and low volume production facilities. But much more than that, backed up by scientists, they have advanced skills in production engineering and the creative abilities to deliver practical, scalable innovations. Translational design – The engineering of devices to detect biohazards for example. Our early involvement in technology concepts, often before the science leaves the bench, ensures that production design and a user centred approach is factored in at the optimum stage in development. This combination of disciplines ensures a fast and effective route to market and maximises return on investment. Fast to market – Our integrated innovation process and knowledge of the clinical and regulatory environment allows a shortening of the overall time to market, reducing the time to a return on your R&D spend.
Risk reduction – Concise and regular reviews involve teams of product designers, scientists, engineers and tooling experts – accessible every day. Close contact with the key testing centres and involvement at precritical stages minimises the commercial risk. Evidence based – Our integrated innovation process is centred on testing. Research models, prototypes and simulations with user groups, gathering evidence from a perception study or multi-centred trials allows us to evaluate complex stakeholder interactions. Test rigs – The development team has direct access to workshops and labs to build and test rigs at any stage. This is critical to the process as physical models
provide a dimension of feedback for the creative engineer which is not available via CAD and simulations. Prototypes for user trials – Engaging with multiple stakeholder groups in early user trials allows designs to be assessed more deeply than with computer simulations alone. Perception studies employing full size mock ups reveal user requirements that cannot be uncovered with any other method. Interactive design studies and in depth collaboration frequently requires multiple pre-production prototypes. RGi has state of the art facilities to seamlessly provide full R&D support to SMEs, multinationals, academic institutions and public sector bodies. Low volume production – We have precision machine tools for mould making to close tolerances and high quality moulding facilities in-house. We also have product assembly facilities for small to medium batch production of devices and equipment.
FOR MORE INFORMATION Contact: Bruce Renfrew Tel: +44 (0)116 2531961 E-mail: bruce@rg3.com Web: www.rg3.com
THE METALISE IT PROCESS FROM 3DDC GOES FROM STRENGTH TO STRENGTH E STABLISHED IN JUNE 2007, 3DDC is based in North Crawley in the UK. 3DDC was the first European company to set up a metal coating facility specifically for plastic parts that have been produced using additive manufacturing (AM) technologies. Whether for prototypes, final concept models or production pieces, the Metalise™ it… process has had unprecedented results producing the highest quality of plated plastic parts available on the market today. The team of professionals at 3DDC has exceptional in-depth knowledge of the range of additive technologies that produce plastic parts and how to plate them. This, together with a philosophy of ongoing development with the Metalise it… process, ensures that the company remains at the cutting-edge of technical breakthroughs as new applications continue to emerge. 3DDC works in collaboration with its clients to achieve the right metal plating solution and once the parameters for plating have been determined – whether technical, aesthetic or both – 3DDC will plate the parts to achieve the required layer thickness and surface finish. The Metalise it… plating process was
originally formulated specifically for AM models, but it has also had impressive results with vacuum casting parts and plastic injection moulded models. The most important fact to note about the Metalise it… process and what it brings to AM applications is that when the composite metal material is applied to the plastic part, it adds a structural coating as well as a cosmetic finish. The surface finish of AM models has traditionally proved to be a limitation, however, the Metalise it… process is an effective surface treatment that can drastically improve these limitations and in some cases eliminate them altogether. The benefit for the
customer lies in the rapid availability of experimental and small series components whose mechanical characteristics are comparable with series production components. Applying the Metalise it… process to specific parts has demonstrated improvements with mechanical properties such as strength, creep characteristics and aging stability. Other advantages include resistance to moisture, temperature, humidity and corrosion – allowing the parts to be used in more aggressive and corrosive environments. Furthermore, the Metalise it… process has seen great success with applications that require Electromagnetic Interference (EMI) shielding. 3DDC offers full and partial metal plating options for EMI shielding and once the EMI copper shield has been plated, 3DDC can also plate an additional nickel layer onto the product to achieve excellent anti-corrosion properties.
FOR MORE INFORMATION Contact: Graham Barton Tel: +44 (0)1234 39189 E-mail: graham@3ddc.eu Web: www.3ddc.eu
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
141
DEFENCE & EQUIPMENT
www.counterterrorbusiness.com
THE NEW AND IMPROVED SECURITY FOCUSED SHOW From 13 to 16 September 2011, Defence and Security Equipment International (DSEi 2011) takes place at ExCeL in London’s Docklands and promises to be bigger and better than ever HE EXHIBITION is well-known as a leading event for land, sea and air applications for the defence sector, but this year will include a much greater focus on security. The borders between defence and security have become more and more blurred over the last five years and the show has seen an increasing participation from companies specialising in areas such as border security and national security, which has resulted in DSEi focusing more on these issues and nations’ responses to them. This year’s plans include a security showcase and demonstration area which will be hosting live scenario and product based demonstrations. This platform allows exhibitors to promote their technology and services to a highly targeted audience including security and military delegations.
T
SECURITY EXHIBITORS From the security sector, leading specialist companies exhibiting at DSEi include G4S, Explora Security, Smiths Detection, Cristanini and Avon Protection. The latter specialises in the supply of advanced CBRN, Hazmat and riot control respiratory solutions to the world’s military and security services. Silver Sponsor Chemring EOD will be running a thought leadership session at the event and leading security prime contractors including Northrop Grumman, Lockheed Martin, Finmeccanica and Raytheon will also be exhibiting. The US Department of Homeland Security is lending its weight to DSEi 2011 and will be giving a briefing on its latest national security requirements and technologies. SEMINARS AND SPEAKERS In addition to a high profile series of keynotes, an on-floor seminar series will include speakers covering the most pressing topics facing national security around the world today. Combating cyber warfare, for example, will be high up on the agenda here. Western governments are taking threats in cyber space very seriously and there are rising expectations that they will be able to build and sustain effective cyber defences. Over the summer of 2010 the international news media picked up on a computer worm, known as Stuxnet,
that had been attacking the computer systems controlling Iran’s controversial nuclear programme. The Stuxnet affair reinforced concern across the world that computer networks could be deliberately targeted to cause massive damage to societies that have come to rely on the internet and its associated technologies. These range from the simple infection of a business’s computers, to e-crime and e-espionage through to the disruption of the computers that control electricity power and other essential utilities. GOVERNMENT MONITORING Many governments have now moved to set up cyber operations centres to monitor, on a real-time basis, the operation of computer networks in their country. While in the past many countries were able to separate crucial military and national security networks from the mainstream civilian internet, the ubiquitous nature of the internet in the 21st century means that it is very difficult now to separate out government and military networks from purely civilian networks. For example, many of the cyber domains that the western armed forces use, run on commercial networks that reside in several countries so individual governments do not have a dominant say in the structure and operation of the internet anymore. The view is also growing that the defence of civilian cyber resources and infrastructure is a proper role of governments, as part of its duty to protect their nation’s populations and economic interests. ELECTRONICS PAVILLION DSEi is a major springboard for the introduction of cutting edge technology, as well as the equipment already being used in today’s operations. In 2009 there were 1,280 companies exhibiting from 40 countries and this included whole supply chains covering a variety of programmes. Spanning the whole supply chain, the event brings together everyone from the largest prime contractors right down to the SMEs producing the smallest of electrical components, whose role, although small, is none the less vital in a programme’s performance. For this reason, DSEi 2011 will feature a dedicated electronics pavilion to provide specialist
electronics companies with a powerful platform for presenting their products and services – to the benefit not only of visitors, but other exhibitors as well. The DSEi Electronics Pavilion will allow electronics companies to exploit the potential of the defence and security market. The pavilion will act as a focus area for electronics companies of all sizes; it will include a lounge area for the use of all those exhibiting in the pavilion and will be designed to allow exhibitors an easy way to promote what can be complex products, many of which are too small to be viewed by the naked eye alone. UNMANNED SYSTEMS ON SHOW The Association for Unmanned Vehicle Systems International (AUVSI) is supporting a new Robotics & Unmanned Systems Showcase this year. It will be used for live demonstrations of Unmanned Ground Vehicles (UGVs) and Unmanned Aerial Vehicles (UAVs) during the show. A football pitch-sized area has been set aside for the demonstration and viewing arena, making it the largest showcase of this type of technology at an exhibition in the world. DSEi continues its strong maritime focus with visiting ships providing a valuable platform for the demonstration of new systems and equipment, which visitors can inspect on specially conducted tours. The UK MOD is planning to allocate a modern Frigate or Destroyer and an Offshore Patrol Vessel to DSEi, while the Royal Netherlands Navy will also be sending a vessel. BRITISH ARMY DEMONSTRATION AREA The highly popular British Army Demonstration Area returns for DSEi 2011. Showcasing some of the equipment used by the British Army, the area is organised and staffed by members of the British Export Support Team, who are able to talk to visitors about the capabilities of the equipment on display. DSEi has also created a new Land Vehicle Park so that visitors can see some of the vehicles that are being used around the world by military and security forces.
FOR MORE INFORMATION Web: www.dsei.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
143
A DIMENSION AHEAD
DOM ACCESS CONTROL ® DOM GUARDIAN ®
DOM GUARDIAN
Using the latest advances in transponder technology, DOM has developed a revolutionary product designed to meet the demands of a growing electronics market easily integrated into existing access control systems. With the new DOM Guardian®, DOM has incorporated all of the electronic features of the DOM Protector® into one fitting. Key Features • The reader unit, functional parts, mechatronics and the battery compartment are in the external fitting • External or internal mounting, electronically controlled • DIN left or right can be adjusted during mounting • Locking authorisations are controlled using a mastercard or with DOM software solutions • Online system: events relayed in real time • Available with a choice of handles and finishes S E C U R I T Y, Q U A L I T Y, D O M .
Ronis-Dom Ltd, Unit 1, Junction 2 Industrial Estate, Demuth Way, Oldbury, Birmingham B69 4LT. T +44 (0) 800 988 43 48 F +44 (0) 800 988 43 49 sales@ronis-dom.co.uk
www.ronis-dom.co.uk
SECURITY
www.counterterrorbusiness.com
PROTECT AGAINST EMERGING CYBER AND PHYSICAL THREATS IFSEC 2011 is the world’s leading global annual security event, uniting more than 22,000 security professionals with more than 700+ world leading companies, spread over six product areas ECENTLY, SECURITY and counter-terrorism minister Baroness Pauline NevilleJones spoke on the subject of tackling online jihad: “The threat is diverse. Not only do terrorists use the Internet for propaganda, providing supposed Qu’ranic justifications for their activities and commentaries to persuade others of their view, but they also use it to share information about weaponry, armaments and training, as well as approaches to the taking of hostages, kidnapping and assassination.” What’s more, last November the Baroness announced the government was developing a cyber security plan to counter criminal activity and protect IT networks during the 2012 Olympics. Indeed, the fact the government is taking cyber security so seriously should encourage organisations of all levels to review their current levels of protection. OPENING KEYNOTES The opening keynotes of the IFSEC Conference, held alongside the IFSEC exhibition, the annual international security event, will examine cyber terrorism and provide thought-provoking debate on the best solutions for organisations. Led by Brian Sims, the well respected editor of Security Management Today Online and info4security.com, the debate will explore how cyber terrorism is defined and the vulnerability of organisations, measures to identify the weak links within existing infrastructure and the best practice methods for combating cyber terrorism. The online threat isn’t restricted to terrorists, as criminal gangs and corporate espionage will seek to exploit the weak links in your security. Organisations need to protect their firewalls, ensure sensitive information doesn’t fall into the wrong hands, and prevent physical security systems from being hacked into and overridden before an attack. James Willison, principal consultant, Incoming Thought & Convergence Lead, ASIS UK, will chair the IT Security module, supported by SC Magazine, at the IFSEC Conference. A number of key speakers will join James investigating strategies for cloud security, protecting physical security using shared networks and converging physical and IT security. Meanwhile for visitors to the IFSEC exhibition, 16-19 May at the NEC Birmingham, the Intelligent Integration Zone, sponsored by ISM, will provide a range of solutions, valuable information
R
and advice for businesses looking to protect their organisation from wider threats. The Gatwick Immigration Removal Centre saw an innovative system introduced by Reliance HighTec using the ISM Genesys front end control system as the overall security management platform. It incorporates the latest proven technology over a full IP infrastructure where the products and systems exceeded the latest Home Office specification. To reduce the time spent installing the system a test bed off-site facility was secured where all the essential equipment could be set up and tested, while the building was being completed. The detainees are now in the facility with ISM’s standard tagged reset and welfare check monitoring Cell Call system. This records who has visited a cell and the exact time of their visit. When the detainee is on a watch routine the system also alerts the staff if a welfare check is late. The same tag is used for the pegging tours, alerting operators should the detainee fail to reach the next point in the allotted time; this outstanding capability is unique to ISM. As a little twist, the Home Office Scientific Development Branch (HOSDB) decided to test the ISM system for clarity of speech. ISM’s proven digital audio system passed with flying colours on every single cell tested. Other projects ISM has worked on include the ISM Genesys integrated security management system to provide the security solution for the new State Street Bank building in London’s Canary Wharf, and a world first with the implementation of a full IP network with CCTV and audio dispersed concierge system for five blocks of flats at the Loughborough Estate Concierge, Lambeth, London.
The IFSEC exhibition will also be addressing some of the major talking points within the security industry this year, including the dilemma of IP vs analogue? HD vs megapixel? How new technology will work with existing systems and products, and can you mix and match between manufacturers or go for a full service solution? EXHIBITORS With more than 700 exhibitors, including Axis Communications, BPT Security, D Link, Dallmeier, Dedicated Micros, Gallagher, Genie CCTV, HID, HIK Vision, IndigoVision, Milestone, Norbain, Optelecom, Panasonic, RISCO, Samsung, Sanyo, SATEL, Sony, Synectics, Texecom, TYCO, American Dynamics, CEM, Kantech, Software House, Urmet Domus and Y3K, a free to attend seminar programme, the new SITC Innovation Pavilion, a brand new Public Security feature area, the Future of Security Competition and a host of other show features; the world’s largest annual security event is back again showcasing the latest innovations from the industry.
FOR MORE INFORMATION To visit the IFSEC exhibition, please visit www.ifsec.co.uk and register for free entry. The IFSEC exhibition runs 16-19 May, at the NEC, Birmingham, UK. The IFSEC Conference is a paid to attend conference running alongside the exhibition, more information can be accessed at www.ifsec.co.uk/conference IFSEC is co-located with International Firex, Safety and Health Expo and The Facilities Show, all of which are free to attend for IFSEC visitors and delegates.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
147
INNOVATION MOVES ON... IFSEC IS EUROPE’S FIRST OPPORTUNITY TO SEE NEW SECURITY PRODUCTS BROUGHT TO LIFE ACCESS CONTROL |CCTV INTRUDER ALARMS |IP/NETWORK SECURITY PUBLIC SECURITY | SECURITY SOLUTIONS
REGISTER FOR FREE ENTRY AT WWW.IFSEC.CO.UK REGISTRATION CODE CTBA
THE INTERNATIONAL SECURITY EVENT
IFSEC is part of the Protection & Management Series, uniting security with fire, safety and facilities management professionals. CERTIFIED BY SUPPORTED BY
OFFICIAL MEDIA PARTNER
ORGANISED BY
SECURITY
www.counterterrorbusiness.com
NEW TECHNOLOGIES PROVIDE FAST AND EFFECTIVE ACCESS CONTROL HE FOG BANDIT is widely used 24/7 for the protection of people and assets across financial institutions, CViT and cash processing, bullion rooms, retail, warehouse distribution, commercial offices, leisure, and public sectors. Protecting entire buildings or controlling access or movement within dedicated areas at risk, the FOG BANDIT is the fastest and highest density security fogging system of its kind in the world. The FOG BANDIT leads the field by taking security fogging systems to a totally new level of effectiveness and reliability. Utilising the latest patented technologies, the FOG BANDIT delivers harmless, ultra dense fog at unprecedented speed to provide the very highest levels of access control protecting against the losses and property damage associated with burglaries. Once traditional security defenses are breached the FOG BANDIT rapidly releases its plume of dense visually impenetrable fog to inhibit the intruder from entering a premises and from stealing valuable assets. FOG BANDIT can also be configured to obscure designated access routes so as to create and segregate safe areas. Introducing new or strengthening existing perimeter defenses simply increases their
T
repair costs after a burglary attempt, costs which are often far greater than the value of goods stolen. Investing in a FOG BANDIT can avoid these costs, stop the losses and deter intruders from returning in the future. The FOG BANDIT can also be configured to deter against daytime robbery risk as well as overnight burglary risks. Using a Panic Alarm button, a short controlled activation, run in parallel with a warning voice announcer, is configured for daytime robbery risk to provide a combination of the following: • Break the raiders eye contact
and threat to staff • Push the raider out of the premises or dedicated area of risk • Create a screen of fog in areas where assets are displayed or accessed. For overnight burglary protection, sensors activate the FOG BANDIT, which is set up to “room-fill” the fog to the size of the area it is protecting. A single FOG BANDIT unit has between 3 and 25 activations from one fog cartridge and an engineer call out is not required after each activation. The FOG BANDIT can be configured as either a stand-alone system or integrated as an extension of the existing alarm system. Backed up with a five-year warranty, not surprisingly the FOG BANDIT is the market leader in mainland Europe and the UK, and is consistently used to complement security systems preventing burglaries and robberies, minimising loss, damage and threats to staff. For the latest FOG BANDIT news, accreditations and approvals, case study video footage including live CCTV coverage and much more, please visit our website.
FOR MORE INFORMATION Tel: 0844 5577870 E-mail: enquiries@bandituk.co.uk Web: www.bandituk.co.uk
STRIKE POINT FROM ICS 676,000 incidents of workplace violence and aggression were experienced in 2009/10. Workers in a position of authority and dealing with members of the public are found to be at greatest risk and in need of systems to provide assistance and reassurance in an emergency. Strike Point is a continuous linear switch designed for use in standalone or proprietary systems where activation of a switch is required over a continuous length, suitable for use in high risk areas such as Banks, Hospitals, Police Stations, Prisons and Government Offices as an affray/panic switch. Designed for ease and reliability of use in an emergency with a large strike area, Strike Point provides reassurance to individuals on the status of the alarm by illuminating the entire length of the switch. Text and graphic can be added to provide further information if required. Installation of Strike Point could not be easier, simply cutting to length to suit particular site layout and terminate using any of the pre-wired fittings. No special tools are required during the installation yet Strike Point is robust, reliable and vandal resistant.
If you wish to learn more go to www.strike-point.co.uk or email info@strike-point.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
149
Ballistic Absorption Barrier Systems www.babs.us.com
blocks are a revolutionary new product utilizing ‘green technology’ to manufacture a new method of protection against ballistic and blast events
During blast survivability testing conducted at the Aberdeen Test Center (Maryland, USA) a wall constructed of BABS blocks showed 99% blast attenuation
Testing performed December 2009 - US Army Aberdeen Test Center, Maryland Demonstrated at Quantico Marine Base - Virginia USA 2009
are custom designed and installed for each unique application for use in perimeter protection, embassy protection, airport security, major event security, pipeline protection, military installations, blast and ballistic protection have been designed for ease of movement and quick deployment. They are constructed to be positioned similar to building blocks. They are portable, reusable, and protective.
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
Ballistic Absorption Barrier Systems utilize recycled scrap tires to create blast absorption barriers for use in perimeter and check point security, embassy fortification, pipeline protection, and major event security Scrap tires are one of the world’s largest environmental problems. Hundreds of millions of tires are produced each year increasing the total number of tires worldwide. Most current applications for scrap tires involve burning or burying tires. These options can have a large environmental impact.
260
=
www.babs.us.com
At 30lbs (13.6kgs) per block, the Eco-Blok has been developed as a durable and reusable alternative to standard sandbags
Each BABS block uses 260 scrap tires
Ballistic protection Erosion control Major event security Flood control Crowd control
Military uses Civil engineering Parks and recreation Emergency response
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
10th Annual
11th-13th May 2011 • Olympia Conference Centre • London, UK www.MilitaryHelicopterEvent.com
Implementing Lessons Learned in the Programme Management, Requirements Setting and Operation of Military Helicopters •
Comprehensive examination of 30+ world-leading platforms
•
Over 35 conference sessions, with an audience of over 150 helicopter experts from 20+ nations
•
2 brand new Focus Days: Platform Self Protection and Networked & C4ISR Technologies for Helicopters
•
Over 11 hours of networking opportunities
•
New for 2011: an expanded exhibition and special 10th Anniversary Gala Dinner
KEY SPEAKERS: Colonel Hans Werner Salewski, Commander, 15 Medium Transport Helicopter Battalion, German Army
Colonel Sam Michaud, Commander, 12 Wing Shearwater, Canadian Forces
Colonel Billy Thompson, Commander, 563rd Rescue Group, US Air Force
Colonel Christian J.H. Drouin, Wing Commander,1 Wing, Canadian Forces
Commander Jolyon Woodard, Officer Commanding, 845 Naval Air Squadron, Royal Navy
FREE ONLINE RESOURCES To download free podcasts, interviews and articles on the military helicopter community, visit www.MilitaryHelicopterEvent.com
Receive 15% off with discount code IGC_IMH_CTB.
For more information or to register, call +44 (0)207 368 9300, visit www.MilitaryHelicopterEvent.com or email defence@iqpc.co.uk
www.counterterrorbusiness.com
AN END TO END SERVICE FROM ASSEMBLED ELECTRONICS SOLUTIONS A SSEMBLED ELECTRONICS Solutions (AES) is a Midlandsbased business that offers you an end to end service. Whether you require contract manufacturing capacity or a design and manufacturing partner, AES is ready to assist. With a broad sector base we offer a range of electronics-based services from one-off prototype production and testing through to volume manufacture. The integration of enclosure design, wiring, programming and testing means that the end product is not only functionally sound but aesthetically tuned to meet your requirements. AES provides a range of services to new and established clients in the following sectors: security, defence, automotive and motor sport, aerospace, medical and OEM. In addition to physical manufacture, AES offers both project and supply chain management. Following final assembly, inspection and functional testing, finished products may be delivered using one of the following delivery options: single delivery, scheduled delivery, call off, kanban, direct to end user. Rapid prototyping and the development of innovative solutions are core activities.
Recent examples of AES innovation include remote monitoring and control systems, data logging, tracking and detection. Specific applications include smart battery chargers for blue chip retailers, contactless switching for public sector healthcare applications and the conversion of existing security devices to layouts suitable for automated, surface mount assembly. With over 40 years of experience, we can assist in technological upgrades to exisiting products both to increase functionality and to reduce unit costs through “design for manufacture”. Whether you require a basic manufacturing and assembly service or an end to end solution we can
assist you in bringing your products to market efficiently and competitively. If you have identified a specific requirement but do not, as yet, have a solution we would be pleased to hear from you.
FOR MORE INFORMATION Assembled Electronics Solutions LLP Masons Road, Stratford-uponAvon, Warks CV37 9NF Tel: +44 (0)1789 204879 Fax: +44 (0)1789 299727 E-mail: info@assemtron.com Web: www.assembled-electronics.com
CARGO TERROR BOMB THREAT SPURS NEW LABEL LOCK™ LAUNCH T HE RECENT PLOT to detonate an ink cartridge bomb over the eastern seaboard of the USA has prompted a thorough review of aviation security, and particularly in the area of cargo shipping. With increasing calls for more comprehensive cargo screening, Security Labels International – the company manufacturing the famous Label Lock brand – has brought forward the launch of its latest product, Tamper Evident Security Tape. Hugo Gell, sales director, said: “Clearly there is a need to secure screened cargo between screening and its delivery to airside. Known cargo shippers need to ensure nothing can be added to or removed from the consignments before take-off. Regulatory bodies are now looking very closely at this as a matter of urgency, and all international cargo, freight and parcel shippers will be reviewing their procedures as a priority. “In order to assist shippers in conforming to regulatory demands, we have announced the launch of a secure, cost effective and quick way of confirming the integrity of scanned cargo. Tamper Evident Security Tape can be wrapped around everything
from pallets to envelopes, bags, boxes and parcels with ease. A sub-surface unique coded number every 15cms (6 inches) makes tracking and verification easy. If or when the tape is removed, an opened message will appear on the packaging and tape, making re-use impossible. In addition, the tape is translucent, so you can’t just add new Label Lock tape over the old opened message – you will be able to see the opened message through the tape.” The tape will be available in perforated 50m rolls, and application is possible with a standard tape gun. Every roll will contain unique numbering throughout its length, making it traceable and removing the need for customisation. This was seen as an important feature in maintaining the highest integrity while keeping the costs to a minimum. Customisation
in the form of both colours and text (including the tamper message) will be available to those who wish to increase their brand awareness or differentiate their cargo quickly and easily. Label Lock Tape will contain a number of security features to increase its integrity, including in-register text (both surface and covert), coded and variable numbering, sub-surface printing, transparent areas, clear borders in each section, all as standard and with many other covert features available. The new tamper evident tape is an addition to the now famous Label Lock brand of tamper evident security labels. These labels are available in both no-residue format for vehicles, aircraft, cabinets, computers and furniture, as well as dual layer format for securing boxes, documents and other single-use items.
FOR MORE INFORMATION For more information on a wide range of security label solutions, please see the websites at www.securitylabels.com and www.labellock.com Covert and bespoke versions of Label Lock are also available, please e-mail for more information sales@ securitylabels.com, or call +44 (0)1543 431099.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
153
DISCOVER INNOVATIVE FIRE SAFETY SOLUTIONS THE LEADING EVENT FOR FIRE SAFETY PROFESSIONALS 140+ MAJOR MANUFACTURERS| FREE EDUCATIONAL SEMINARS AT THE| INFO4FIRE.COM LEARNING ZONE PASSIVE FIRE PROTECTION EXPERTISE AT| THE ASFP PASSIVE FIRE PROTECTION ZONE GUIDANCE ON THIRD PARTY APPROVAL AT| THE LPCB RED BOOK PAVILION FIRE SAFETY INFORMATION AT THE FIKE VILLAGE|
REGISTER FOR FREE ENTRY WWW.INFO4FIRE.COM/INTERNATIONALFIREX AND ENTER CODE CT THE INTERNATIONAL FIRE SAFETY EVENT
International Firex is part of the Protection & Management Series, uniting fire protection with security, safety and facilities management professionals. IN ASSOCIATION WITH
SUPPORTED BY
OFFICIAL MEDIA PARTNER
ORGANISED BY
FIRE SAFETY
www.counterterrorbusiness.com
FIREX – A WORLD OF FIRE SAFETY UNDER ONE ROOF International Firex will be showcasing the latest products and services from more than 150 exhibitors, key decision makers and qualified fire protection professionals from across the globe
Industry Association – the UK’s leading trade organisation for the fire safety sector. There will be a range of free seminars and presentations on fire risk assessment, fire alarm system design, emergency lighting, business advice, portable extinguisher maintenance and fire safety legislation. If you’re an installer of fire alarms or have concerns about fire safety requirements and legislation, this is where you will find the answers. FIKE VILLAGE – NEW FOR 2011 Fike Village will provide a relaxed and informal village for Fike Protection Systems and Fike Safety Technology customers to meet and entertain key specifiers and end users attending the show. Working with a number of key distributors, the latest Fike suppression and alarm fire safety products are essential aspects of the Fike Village where the emphasis will be on innovation and technical expertise.
HERE THE DEFENCE arena is concerned, fire protection and prevention is a significant element of the wider safety portfolio. As such the obligation to minimise and effectively manage fire risk is vital. The opportunity to distinguish any level of threat through the introduction of innovative resources, including the latest fire safety products and services, is therefore fundamental. As the UK’s leading fire protection and prevention show, International Firex is returning to the NEC Birmingham 16-19 May. Showcasing the latest products and services from more than 150 exhibitors, key decision makers and qualified fire protection professionals from across the globe will congregate at one of the largest dedicated fire safety events in the world. With a vast audience of professionals, including end users directly responsible for fire safety in their premises and places of work, facilities and health and safety managers, and building control officers, International Firex provides the ideal opportunity to showcase an extensive range of specialist fire safety solutions. Presentations based on the latest product innovations, best practice, standards, approvals and compliance, and current fire safety legislation will run alongside the comprehensive exhibition – all free of charge. Industry bodies including the Association of Specialist Fire Protection, Fire Industry Association, BSI Global, LPCB (BRE Global) are also amongst those oragnisations exhibiting. The International Firex exhibition will
W
also incorporate four unique feature areas: ASFP Passive Fire Protection Zone, Info4fire.com Learning Zone, LPCB Red Book Pavilion, and the Fike Village. ASFP PASSIVE FIRE PROTECTION ZONE – NEW FOR 2011 This combined hospitality and free seminar area hosted by the Association of Specialist Fire Protection (ASFP) will focus on products, services and best practice in built-in fire protection. With a strong emphasis on professional expertise and the requirements for approved installers and contractors, the Passive Protection Zone will provide visitors with exclusive access to industry experts and knowledge. The seminar theatre within the Passive Protection Zone will host a number of presentations from specialists in the passive protection field. Each 20-minute presentation is designed to inform visitors about responsibilities with which they may be unfamiliar and offer practical solutions. Seminar sessions on passive fire protection will include themes such as: • Designing buildings with appropriate built-in fire protection • The Risk Relay – fire safety communication between designers, builders and occupants of buildings • Fire risk assessments and passive fire protection • Saving lives and property and staying out of court. INFO4FIRE.COM LEARNING ZONE The Info4fire.com Learning Zone will be run in association with the Fire
LPCB RED BOOK PAVILION Successfully launched in 2009, this key feature returns to International Firex to provide visitors with vital information on third party approval schemes and product testing currently undertaken by the BRE Global/ LPCB. The free seminar programme and exhibitor village will also provide advice and guidance on the importance of third party approval. FIRE EXCELLENCE AWARDS 2011 Held every two years and coinciding with the International Firex exhibition, the Fire Excellence Awards 2011 celebrate the best products, services and individuals in the fire safety industry. The Fire Excellence Awards offer the chance to gain unrivalled industry recognition as an award winner or finalist. For further information on entering or attending the awards visit www. info4fire.com/fireexcellenceawards2011 The Fire Excellence Awards will take place at the Hilton Birmingham Metropole during the evening of Tuesday 17 May. IFSEC, the world’s largest annual security event, Safety & Health Expo, Europe’s largest annual safety and health event, and The Facilities Show, the UK’s biggest and fastest growing FM event, will take place alongside International Firex 2011 and are free to attend for all pre-registered visitors.
FOR MORE INFORMATION For further information on International Firex 2011 or to register for free entry, please visit www.info4fire.com/internationalfirex
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
155
Delivering More With Less Public sector budgets are being stretched and scrutinised like never before. While still expected to deliver more widespread and higher quality services, these conflicting pressures must somehow be satisfied. Many departments see collaborative procurement and shared programmes as the answer. Cable&Wireless Worldwide is already a key partner for both Central and Local Government, helping to enhance services by delivering secure communications, enabling ground-breaking collaboration between agencies and providing best value.
Cable&Wireless Worldwide Your Communications Partner Contact us on
0500 090 999 or visit
www.cw.com
www.counterterrorbusiness.com
THE FIRST CHOICE FOR MISSION CRITICAL COMMUNICATIONS The Cable&Wireless Worldwide PNN3 framework arrangement is the fastest route to data and telecommunications services ABLE&WIRELESS WORLDWIDE is responsible for the Government Secure Intranet, NHSnet, Government Telephone Network, GovernmentConnect and the PNN3 Framework Arrangement. We’re joining-up the public sector and our secure infrastructure, messaging and mail services enable you to operate securely from any location, exchange information and collaborate.
C
WHAT IS PNN3? The PNN3 Framework Arrangement provides designated users with a comprehensive suite of data and telecommunication services without the need for a procurement exercise. These services enable the secure transmission of voice and data and are accredited by the National Accreditor for Police Systems (NAPS). Cable&Wireless Worldwide is the current Service Provider and the Contracting Authority is the National Policing Improvement Agency (NPIA), on behalf of ACPO and ACPO(S). WHO CAN USE PNN3? All UK police forces can use PNN3, plus over 100 other criminal justice organisations and government agencies. WHY USE PNN3? PNN3 is a fast route to data and telecommunication services. If you are a designated user, you can access any of the Framework services direct from Cable&Wireless Worldwide, rather than putting your requirements out to tender and negotiating separate pricing and service level agreements. This quick, easy procurement method saves time, effort and expense. PNN3 offers a common communications platform that is scalable and flexible. It facilitates secure information and data sharing between police and criminal justice organisations and also enables secure data sharing with organisations outside the criminal justice community. WHAT’S AVAILABLE UNDER PNN3? Criminal Justice Extranet (CJX) – Secure National IP Network (NIPN) designed exclusively for the use of criminal justice agencies and accredited to RESTRICTED. CJX Premium – Bundle of features and services on top of CJX, provided over high-speed access links, to enable instantaneous, flexible bandwidth. xCJX – Encrypted overlay network running over the CJX and accredited to CONFIDENTIAL. Used for secure data exchange and being expanded to incorporate CONFIDENTIAL e-mail
capability between all forces and other CONFIDENTIAL services. Secure Communities Network (SCN) – Private network allowing organisations unable to meet the CJX Code of Connection to communicate securely with CJX members and access limited CJX applications. In-Network Interconnect (INNI) – Interconnection between existing Cable&Wireless Worldwide WAN and one of the following communities: CJX, SCN, xCJX or Pre-Existing Community Intranet. Public Sector Interconnect (PSI) – Provision of hardware that provides capability for inter-community access to applications across the Government Secure Intranet (GSi), NHS, Europe (TESTA)
IT team or third party application provider. Alternatively, have your own servers within our secure hosting centres, with direct access to our Internet backbone or CJX. Public Switched Telephony Network (PSTN) – IP Trunk, Managed IP PBX (site based or centralised) and IP Centrex, with associated services such as PBX Maintenance and Managed LAN to assist in the smooth migration to IP Voice. Messaging Services – Secure two-way messaging with citizens. There are a number of options, including e-mail to fax, SMS, MMS and voice, plus fax, SMS and MMS to e-mail. You can also securely manage high volume and targeted mass communications, create a dedicated public facing registration page, and conduct web and telephone surveys. Video Conferencing (VC) – Fully managed and secure video service, easy to install, allows
PNN3 offers a common communications platform that is scalable and flexible. It facilitates secure information and data sharing between police and criminal justice organisations and also enables secure data sharing with organisations outside the criminal justice community and MOD in a secure environment. Connectivity Services and Bandwidth – Additional bandwidth to suit your operational needs, including connection to Extranets, pre-negotiated pricing for Wide and Local Area Networking and Ethernet Wireline. CJX Secure Remote Access Service – Encrypted access to your network from home, remote office or Internet. CONFIDENTIAL Remote Access Service – Connects directly to your network using Enhanced Grade encryption, approved under the CESG Assisted Product Scheme (CAPS) and suitable for CONFIDENTIAL traffic. Firewall – Comprises hardware and software acting as a barrier between your network and external networks such as the NIPN or the Internet. Managed Encryption Service (MES) – Native network services for PROTECT solutions and end-toend solutions for higher levels of Information Assurance which are fully aligned to current CESG guidance. Hosting – Run critical applications and key infrastructure elements within our secure List-X hosting centres. We provide the hardware and management of the virtualisation layer, OS and database, leaving control of the application to your
two or more CJX members with suitable equipment to hold a remote meeting across the NIPN to discuss RESTRICTED information. Professional Services – Project managers, security consultants, engineers and solutions architects to help design/ commission services, and resolve issues outside PNN3 service boundary. Mobile Data Accelerated Package (AP) – Managed, mobile data solution for UK police forces, providing interfaces with national and local systems via a handheld device, such as a BlackBerry or PDA. National systems: PNC, Voters, PVH, PNLD and, when available, DVLA and DVS. Local systems: STORM, NICHE, IMS, CIS, OASIS, STOPS and Microsoft Outlook.
FOR MORE INFORMATION If you would like to find out more call 0500 090999, e-mail pnn3vealed@cw.com or ask your Cable&Wireless Worldwide representative.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
157
The ultimate portable thermal imaging camera.
Simple to operate
High resolution viewing screen
Light weight
For search, patrol and surveillance operations. It gets results.
See the BIGGER picture Argus Long Range Telemetry Argus LRT transmits clear, secure thermal video footage to on-scene commanders. From tower blocks to subterranean tunnels, this upgrade to the Argus SC gets a better view of the situation • Designed using COFDM technology for a secure transmission • Noise free quality picture • Up t0 1km range • Integrated into camera battery For more information or to book a demonstration please go to
www.argusdirect.com
LRT
The Argus SC is excellent at locating people hiding in foliage, regardless of the time of day. By locating a suspect with an Argus SC, officers can approach and apprehend a suspect without risking dangerous confrontations and involving many officers.
Argus SC cameras detect and reveal the heat created by the powerful lighting systems used to grow marijuana indoors. In a row a hot roof stands out.
The Argus SC can identify threats to personnel such as hidden suspects, guard dogs, and dangerous obstacles. It can also warn them of any potential threats lurking in the dark.
Argus SC thermal imaging can view large areas of land or water, searching rapidly to identify hot bodies and requiring less manpower than conventional methods. Searches can be conducted efficiently whether carried out on foot, or from vehicles or boats.
Thermal imagers can immediately highlight if a vehicle has recently moved (hot tyres, brakes and engine heat reflection). r superior surveillance capability in an Consequently they urban situation.
Officers can quickly and ctively scrutinise between homes and buildings. In total darkness, officers can go virtually undetected, as they search for prowlers, peeping toms, and other criminal misbehaviour.
Police officers, fire fighters and military personnel are all required to operate in low, or no visibility, environments. The Argus SC can help train people in reconstructions of real-life night operations.
Argus SC thermal imaging cameras can help at various stages in collision investigation. Whether locating key clues to the collision (such as skid marks), missing people, or missing vehicle parts.
During a vehicle pursuit, if the occupier/occupiers abandon the car and continue to run on foot, officers can point the camera inside the vacated vehicle to determine how many occupants were present.
If used immediately after an incident, such as a burglary, the Argus SC can help forensic teams locate and record evidence. Heat signatures from the burglar’s body, like handprints on handles etc may still be evident (time dependent on body heat temperature, length of time contact has been made and the material touched).
www.counterterrorbusiness.com
UNDERSTANDING A TERRORIST SYSTEM Jonathan Crook of Xpect Software LLC, a specialist UK/US software company, explains how Xpect is forging ahead in working with governments across the world to help understand terrorist groupings by comprehensive analysis of Improvised Explosive Device (IED) systems HE BEHAVIOUR of international terrorist groupings exhibits a number of functions and processes that have goals and which participate in circular, causal chains that move from action to sensing, to comparison with desired goal, and again to action. Across the dynamics of human and system relationships within a terrorist grouping, a mass of structured and unstructured information is produced, which if found, can be collated through multiple source fusion, leading onto the exploitation of information and ultimately the conduct of proportionate action, whether in the realms of international policy or more direct and immediate ways. The IED or roadside bomb has become ubiquitously notorious in modern media as a significant weapon of the adversary. Mitigating IEDs requires a comprehensive systemic approach, with trade-offs in capability and effect a constant reality. Analysis of IED systems demonstrates that they are never in unique isolation and relationships to parallel areas of weapons smuggling, narcotics and organised crime are frequently apparent. For governments, the emphasis has to be on enabling individuals and organisations involved in the fight against terrorism to understand quicker, learn faster and adapt more rapidly and effectively than the adversary.
T
INTELLIGENCE MANAGEMENT Xpect Software has offices in the UK, US and Australia and provides products to 21 countries, which are used by over 47 agencies and organisations. The core product is Dfuze, a multi-layered intelligence management system. The central premise is to empower individuals and organisations through technology to make better informed decisions. Dfuze was originally conceived as a system for use in National Bomb Data Centres. First responders such as bomb technicians, through using Mobile Dfuze, could gain a better understanding of the nature of a device, its components and identify ways to conduct render safe procedures. All information could be rapidly exchanged between the deployed personnel, mobile mission command facilities and the National Bomb Data Centre. The centre would then be closely involved in assimilating all information gleaned from exploitation of a device and the context surrounding how the device came to be laid, through
the use of bespoke databases. The results of this fusion commonly have immediate implications for technical understanding, biometric identification and most recently, the comprehension of individual and organisational behavioural patterns and trends. TECHNOLOGY DEVELOPMENTS Increasingly the adversary is maximising the use of commercially available technology. Likewise, Xpect has placed greater emphasis on enhancing the technology available to a first responder, with geolocation and tracking, object and facial recognition, integration of Automated Fingerprint Identification Systems, and both secure and compressed data transmission capabilities now a common standard. Furthermore, customers are gaining a growing comprehension of the potential of augmented reality for practical application. Xpect software has actively sought out suitable third party hardware and software providers to provide a series of modular intelligence management capabilities that can be blended together as a solution suitable to the specific requirements or nature of the problem of a customer. Globalisation, mass digitisation and the democratisation of technology affords opportunities to both sides. All activities occur or are perceived to occur at a point in space (location) and time and today’s technology, with the increased presence of GPS, provides greater chances to find and collate such information. The importance of fusing this information into mature Geospatial Information Systems (GIS), which are in turn truly embedded within an intelligence management system, has now become paramount in the efforts to mitigate terrorism. THE FUTURE Xpect is working closely with academic establishments to enhance the way by which open source information of consequence can be found, with emphasis on developing contextual taxonomies from the semantic web, whilst concurrently harvesting related imagery. The data deluge will also provide more opportunities to understand trends and patterns in terrorists’ individual and collective behaviour. However, for the immediate future, the most important factor in effective counter-terrorism will continue to be the personnel employed by government organisations. This importance will bring a need to train more effectively,
resulting in a significant growth in the use of simulation. In parallel, detailed analysis of the adversary’s options for direct action will become more commonplace. Xpect is proud to be at the forefront of the fight against global and national terrorism. It looks to form strategic partnerships with similar minded companies, or companies with products that can add to the multitude of capabilities available for deployment globally.
FOR MORE INFORMATION
Tel: +44 (0)20 70609730 Fax: +44 (0)20 70609733 E-mail: info@xpect-software.com Web: www.xpect-software.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
161
COUNTER TERROR EXPO
www.counterterrorbusiness.com
The Complete Electronics Service... • Rapid Prototyping • Design & Development • Product Styling • Contract Assembly • Innovative Solutions Assembled Electronics Solutions LLP
AES
Tel: 01789 204879 • www.assembled-electronics.com The publishers accept no responsibility for errors or omissions in this free service 3DDC 4C Strategies Aeroflex Alpha 3 Manufacturing ALR Printed Circuits Argus SC Arinc Assembled Electronics Solutions ATG Access Bandit UK BAPCO 2011 Blazepoint Broughton Controls Cable&Wireless Celestix Central Scanning Cintec International Cobham Antenna Systems Continuity Shop Counter Terror Expo CP Top Cover Cyber Defence 2011 Design Works Windsor ECA Group Falcon PCB Group Fastec Engineering Services Flir G&A Moulding Technology G6 Global Communications Gallagher Security GarrettCom Gem Cable Solutions Goliath Footware GPS Perimeter Systems
162
140 100 113 54 110 158 IBC, 80 162 136 149 124 44 98 156 24 104 12 95 18 72 42 16 52 66 134 137 32 48 40 64 142 130 66 99
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
GPS Grid-Tools Gunnebo UK Hadleigh Enterprises Hallmark Electronics Hitek Electronic Materials HyGie-Tech ICS Ideal Power IFSEC 2011 In Cad Services Infranor Innovative Concepts International International Firex International Military Helicopter ISC 2 UK Isoclad KABA Kärcher Futuretech Kestrel L3 TRL Technology LG Motion Lochrin Bain Logically Secure Mascot AS Mercian Labels Minitec UK Mira Morrigan Partners M-TEK Neutronics North East Objectivity Origin Storage Paragon Rapid Technologies
90 130 96 58 8 28 70 149 22 148 36 86 150 154 152 20 66 75 106 130 26 82 74 138 84 2 82 116 69 144 56 73 10 128
Pragmatic Defence Premier Showfreight Procter Fencing Systems Proengin Prosync Protect USA Qosmos Radio Tactics Renfrew Group RFA Security Ronis-Dom Rubb Buildings Samsung Savant Senetas Europe Shore Design Smiths Detection Stonesoft Corporation Sysco International Tata Steel Projects Techno Group Thales txttools Vale Fencing Security Solutions Visimetrics Wearnes Cambion Winkelmann Xpect Software Yelo Zareba Security Zaun Zero Cases UK
14 119 97 38 86 127 15 34 140 114 146 120 OBC, 88 102 126 50 108 112 78 30 62 76 122 60 132 4 46 160 131 94 92 6
Security is not just something we do at ARINC–it’s part of who we are For years, we’ve helped develop and implement solutions for commercial, government, and defense industries to help strengthen security around the globe. Whether it’s sending and receiving information securely, providing mobile wireless networks, supporting systems that guard nuclear power plants, or developing the latest biometric tools, ARINC delivers. As a capabilities-driven company with communications, engineering, and integration as our core competencies—you can trust us to handle your greatest security challenges.
arinc.com/secure
The WiseNet2 DSP chipset with Full HD
Capturing every detail
IPOLIS LOGO 2007.01.05 Lim hyun-jee
PANTONE 654C
Wide Dynamic Range
Built in SD card slot
H.264 Compression
Samsung Super Noise Reduction
Power over Ethernet (PoE)
Smart Codec
Net-i viewing software
Progressive Scan
Up to 3 megapixel (2048 x 1536) and Full HD (1920 x 1080p) resolutions supported
Hybrid dual Ethernet and BNC outputs
The SNB-7000 is the first of a new generation of iPOLiS megapixel cameras featuring the Samsung WiseNet2 DSP chipset and capable of delivering Full HD (1080p) resolution images.
of Samsung’s Smart Codec allows you to highlight critical areas within a scene which can then be transmitted at a higher frame rate than the rest. When coupled with high level H.264 compression and the option to simultaneously stream a variety of resolutions, including Full HD (16:9 format) and up to 3MP (4:3 format) images, the user is put firmly in control of how images are managed.
The WiseNet2 DSP chipset brings a host of advanced functionality to your security application whilst minimising bandwidth requirements. For example, the inclusion
Wide Dynamic Range delivers a well balanced image in scenes with high light and dark contrasts whilst third generation Samsung Super Noise Reduction (SSNRIII) eliminates
Full 1080p High Definition (HD) has arrived with the SNB-7000
T +44 (0)1932 455 308 E STEsecurity@samsung.com W samsungsecurity.com SAMSUNG CITY 5/D130
Samsung Techwin Europe Ltd. Samsung House. 1000 Hillswood Drive. Chertsey. Surrey. KT16 0PS. UK
image noise in low light conditions to greatly improve image quality and reduce bandwidth and recording space requirements. Offering seamless integration with Samsung’s range of standalone network video recorders, NET-i recording software and license-free NET-i viewing software, the SNB-7000 is also fully ONVIF compliant and compatible with a host of leading third-party video management platforms.