www.counterterrorbusiness.com | ISSUE 4
AIRFREIGHT The weak point in aviation security?
PERIMETER SECURITY Integrating systems and technology to prevent hostile attacks
sponsored by
PORT SECURITY | POLICE & LAW ENFORCEMENT | CYBERCRIME
COMMENT
www.counterterrorbusiness.com
www.counterterrorbusiness.com | ISSUE 4
A REAL THREAT METROPOLITAN POLICE COMMISSIONER Sir Paul Stephenson has said the threat of terrorism is at its most dangerous levels since 2007, making it real, persistent and unpredictable. As we prepare for the festive season, the public must continue to act as ‘eyes and ears’ within communities, and report any suspicious behaviour to the police and security services, as this can save lives.
AIRFREIghT The weak point in aviation security?
Ultimately though, it is the government and its agencies that are tasked with protecting the country and its citizens. In this issue of Counter Terror Business, we take a look at whether the National Security Strategy and Strategic Defence and Security Review is paving the way for a more integrated approach to the formulation and delivery of UK security policy on page 33, and the National Counter Terrorism Security Office advises businesses how protect themselves from a real or potential terror attack on page 81.
PERIMETER SECURITY Integrating systems and technology to prevent hostile attacks
sponsored by
PORT SECURITY | POLICE & LAW ENFORCEMENT | CYBERCRIME
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 EDITOR Sofie Lidefjard ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION ASSISTANT Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone BUSINESS DEVELOPMENT Anthea Astley PROJECT MANAGER Rachael McGahern SALES ADMINISTRATION Jackie Carnochan ADMINISTRATION Victoria Leftwich, Lucy Carter PUBLISHER Sally Brockman GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
Enjoy the issue.
Sofie Lidefjard, Editor editorial@psigroupltd.co.uk
MEMBER OF THE PERIODICAL PUBLISHERS ASSOCIATION
© 2010 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
MAGAZINE SUBSCRIPTION I would like to receive a copy of Counter Terror Business magazine for 1 year (4 issues) £35 I would like to receive Counter Terror Business magazine digitally Name
Position
Company Address Postcode Phone
Fax
E-mail Signature
Date
PLEASE SIGN AND FAX BACK TO 020 8532 0066 THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
03
CONTENTS
www.counterterrorbusiness.com
07
COUNTER TERROR BUSINESS NEWS
The latest security technology news
11
CYBERCRIME
Where does the threat of cybercrime lie? What techniques are cyber criminals using and how can you safeguard against attacks?
19
PERIMETER SECURITY
Securing the perimeter is the first layer of security, making it difficult for intruders to physically breach the perimeter and enter the site, writes James Kelly from the British Security Industry Association We look at the various different perimeter security and access control measures that can help prevent a hostile attack
33
NATIONAL RESILIENCE
Hugo Rosemont, security policy adviser at A|D|S discusses the governement’s National Security Strategy and Strategic Defence and Security Review
39
PORT SECURITY
The British Security Industry Association investigates how an integrated approach to security can prove invaluable when protecting ports
42
AVIATION
Terrorists are using increasingly sophisticated devices to target airfreight, warns Chris Yates We look at what took place at the 47th Farnborough International Airshow
51
81
The annual conference and exhibition organised by the British Association of Public Safety Communications Officers will take place in April 2011
Chris Phillips, head of the National Counter Terrorism Security Office, advises businesses how protect themselves from a real or potential terror attack
POLICE & LAW
COUNTER TERRORISM
A new National Police Air Service will deliver a nationally organised air support system but delivered locally
89
63
Counter Terror Expo is the globally renowned event at the top of the must attend list for counter terrorism professionals
Clear and reliable communications in the time of crisis is vital for a successful and panic-free emergency response
109
COMMUNICATIONS
67
INFORMATION SECURITY
We preview Infosecurity Europe, which is where information security professionals address the challenges of today whilst preparing for those of tomorrow
77
COUNTER TERROR EXPO
HOSTILE VEHICLE MITIGATION
The Centre for the Protection of National Infrastructure looks at the challenges facing the security industry
117
TRANSPORT SECURITY
We review Transport Security Expo, which gathered experts from the areas of aviation, air cargo, maritime and supply chain security
BIOMETRICS
We look at how biometrics technology is boosting military intelligence
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY www.counterterrorbusiness.com THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
05
COUNTER TERROR BUSINESS NEWS
www.counterterrorbusiness.com
TECHNOLOGY TO DETECT EXPLOSIVES ON TRIAL AT AUSTRALIAN AIRPORTS THE AUSTRALIAN DEPARTMENT of Infrastructure and Transport is to trial technology to detect explosives in liquids, aerosols and gels at Melbourne and Sydney airports. They are expected to provide important data on the most effective technologies to use to prevent acts of terrorism targeted at the aviation sector. The trails are being undertaken as part of the Australian Government’s $200 million Strengthening Aviation Security Initiative and run in partnership with the United States and United Kingdom.
The executive director of the Office of Transport Security in the Department, Paul Retter AM, said: “On trial are two new multi-view explosive detection x-ray machines and a number of bottled liquid scanners that use a range of technologies to detect explosive substances.” “These trials are an important step toward the roll out of these technologies in Australia’s international airports in the future, gathering data that will assist in implementing new technologies with the minimum disruption to passengers.”
GOVERNMENT OUTLINES 2012 OLYMPIC GAMES SECURITY STRATEGY BARONESS PAULINE NEVILLE-JONES has announced the government’s security strategy to combat security risks threatening the 2012 Olympic Games in London. Speaking at the Olympic and Paralympic Safety and Security Conference 2010, NevilleJones announced a National Olympic Exercise programme is to start, involving all levels of management and responsible parts of the government to test procedures in a range
of scenarios including counter terrorism. It was also announced that security has been consciously built into the design of the Olympic venues and their buildings, and that a specific Olympic intelligence capability is already in place in advance of the Games, which allow the government to identify the threats and dangers now, plan operational responses and give us the capacity for disruption.
NEWS INBRIEF Americans support full body scans Almost two-thirds of American citizens advocate the new full-body security screening machines at 70 of the country’s 450 airports. Most say they would rather combat terrorism than protect their personal privacy. But half of those polled by The Washington Post said pat-downs are a step too far.
Sniffer dogs in training for London 2012 A group of eight dogs and their handlers are learning to detect explosives to prepare for London’s Olympics. The Labradors, springer spaniels and cocker spaniels are attending the 10-week course at the Metropolitan Police dog training centre in Keston, Kent where they’re being trained to search open spaces, cars, buildings, trains and boats.
Police to be freed from unnecessary red tape © London 2012
CYBER SECURITY CENTRE OPENS IN AMERICA A 24-HOUR WATCH and warning facility, the MS-ISAC Cyber Security Operations Center, has opened in New York State. The new operations centre builds on a long-standing information sharing partnership between MS-ISAC and the Department of Homeland Security
(DHS). It will both enhance situational awareness for the National Cybersecurity and Communications Integration Center (NCCIC) and allow the federal government to quickly and efficiently provide critical data on cyber risk, vulnerability, and mitigation to state and local governments.
Proposals have been discussed in Parliament which will see a reduction in the amount of information police officers need to take when doing stop and searches. It is estimated that the changes will save 800,000 hours of police time every year. Steps have been taken to scrap the stop and account form and in future, police will need to record just seven items of information rather than 12. “We’re determined to free police from unnecessary red tape so they have more time for frontline duties and responding to the real concerns of their communities,” said policing minister, Nick Herbert.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
07
COUNTER TERROR BUSINESS NEWS
www.counterterrorbusiness.com
US COLOUR-CODED SECURITY ALERTS MAY BE SCRAPPED THE DEPARTMENT of Homeland Security is proposing to replace the US colour-coded security alerts. It may be replaced with clearer language to describe the threat from terrorism, officials say. The current eight-year-old system runs from green, signifying a low threat, to red, meaning severe and is used in airports, government buildings and on news programmes.
However, critics have dismissed it as being too vague. The details of the new alert system are still being worked out internally by multiple government agencies and the White House. Meanwhile the current colored system remains in place. Department spokeswoman Amy Kudwa said: “We are committed to providing specific, actionable information based on the latest intelligence.”
COLLABORATIVE WORK TO COMBAT PIRACY A NEW UN RESOLUTION urges all 192 member countries to work with INTERPOL and Europol to fight criminal networks involved in maritime piracy off the coast of Somalia. “A multi-faceted approach that pools resources and forges strategic partnerships is key to bringing about change and deliver better resources to address this problem,” said INTERPOL Secretary General Noble. Meanwhile, the commander of the EU’s anti-piracy naval force in the Indian Ocean, Philippe Coindreau, has called for the international community to find a better way of bringing
captured Somali pirates to justice. “Our action enables us to contain piracy but certainly not to resolve it,” he said. “It is desirable that the countries of the region agree to judge the pirates and that an international solution be found as quickly as possible.” Kenya, which last year signed a deal with Western states to try suspected pirates in its courts, acquitted 26 suspected Somali pirates last month, saying handling the cases was too big a burden. More than 700 suspected and convicted pirates are now in detention in 12 countries, more than half of them in Somalia, UN officials said.
POLICE GET CYBER TERRORISM TRAINING TO COUNTER THE ENTRY of cyber terrorism in the Philippines, members of the Police Regional Office (PRO) 6 have attended a six-day Investigation and Seizure of Digital Evidence Course in an effort to fight acts of cyber terrorism. The training was held in partnership with the Philippine Public Safety College through its Anti-terrorism Office in cooperation with the United States Anti-terrorism
Assistance Program. It was designed for Law Enforcement and Information Technology Security Specialist, which is responsible for planning and coordinating the investigation and prosecution of cyber crime-related incidents. The training aimed to assist law enforcement agencies to acquire the skills needed to detect, prevent, and investigate incidents related to acts of cyber terrorism.
COMMENT Time to up airfreight security? When news of the attempt to assassinate Saudi Deputy Interior Minister, Prince Mohammed Bin Nayef, first emerged in August 2009, it was clear to me that the type of Improvised Explosive Device (IED) used presented a very serious threat to aviation. I posed pertinent questions to security chiefs amongst various regulatory bodies. The feedback was disturbing but not entirely surprising. I was told that the attempt on the Prince’s life was a localised issue, wasn’t perceived as a threat to the wider community and most certainly did not impinge on flight safety. Over a year on, we have witnessed Umar Farouk Abdulmutallab attempt to take down Northwest Airline flight NWA 253 over Detroit with a very similar IED. By dint of good fortune rather than design, we have only just averted disaster with the discovery of two very powerful IEDs concealed in airfreight. Perhaps it’s now time to re-evaluate that initial incident, take aboard the fact that Al Qaeda in the Arabian Peninsula (AQAP) has very apparent knowledge of the fallibilities of the air security regime and take forward a system wide secuirty review? President Obama talked about connecting the dots earlier in the year. He sent Janet Napolitano, the Secretary for Homeland Security, on world tours to forge supposedly meaningful accords. Documents have been produced and hands have been shaken in the full glare of the cameras. Accords amount to nothing but the fantasy of public relations spin when connecting a politically expedient subset of the dots. The United States suffered greatly on September 11, 2001. I counselled that precipitous action should be replaced by a carefully considered approach to air security. A new regulatory regime sprung out of the attacks, vast sums of money were thrown at the problem, lots of companies got rich, but the same old problems have come back to haunt us. While the focus has been on the passenger end, the airfreight issue has languished in ignorance and incompetence. The International Federation of Airline Pilot Associations (IFALPA), the British Airline Pilots Association (BALPA) and others have warned that airfreight remains the soft underbelly of the air security regime. Philip Hammond, the current UK Secretary of State for Transport, convened a meeting of industry luminaries after the East Midlands airport IED discovery. His governmental department negleted to invite pilot representative bodies or myself. Pilots represent our best intelligence resource in regard to airport security processes. The invite oversight is probably because we are viewed as the awkward squad, with a tendency to ask the questions nobody want to answer. By Chris Yates
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
09
CYBERCRIME
www.counterterrorbusiness.com
BLIND FAITH? LET US SHED LIGHT ON YOUR IT SECURITY INFRASTRUCTURE I N TODAY’S HETEROGENEOUS networks, organisations are faced with multiple security technologies, each with their own management console, each providing alerts according to their own set of criteria and each with no single view of the entire IT security infrastructure. Cyber Security Situational Awareness (CyberSSA) assimilates data from diverse information feeds and provides users with a full map of their current infrastructure, the threats to their infrastructure and how their defences are mitigating these threats; thereby aiding the complex decision making process. Pharos from PragmaticDefence provides organisations with a true Cyber Security Situational Awareness (CyberSSA) platform. A simple 3-step process of Collection, Analysis and Visualisation facilitates the collation of data from a number of disparate information sources, analyses that data in accordance with the user’s specific criteria, and visualises the results in a way that makes sense to all. Pharos is Cyber Security Situational Awareness. Designed to monitor IT and security solutions across a multitude of industries, the unique and extensible architecture allows you to monitor your
infrastructure quickly and easily, from anywhere in the world, providing faster reporting and benchmarking of the overall security status of your organisation. The Pharos Data Fusion Engine integrates seamlessly with your existing software and hardware. Its open architecture and simplicity in approach allows for a significant reduction in the cost of monitoring and visualising your overall security status with drill down capability for further investigation and decision support. By collecting and analysing the various data feeds from your deployed security technology and integrating them with real time security intelligence data from both open and proprietary sources the Pharos platform provides you with the capability to pro-actively manage your information security as threats are identified.
In addition to providing an overall situational awareness solution, Pharos also allows customers and third party suppliers alike to analyse and visualise their performance with the creation of customised SLA/KPI/KRI. If you are a service provider you can provide a performance portal to your customers. When it comes to reporting, Pharos delivers whatever is needed. From the CEO’s overall status report to the requirements of the CRO, the CTO and the Incident Response Team, the flexibility and configurability of Pharos’s visualisation engine is designed to satisfy all.
FOR MORE INFORMATION To find out more about Pharos, Contact PragmaticDefence at info@pragmaticdefence.com or telephone 0845 1309039.
THE SONA ECO POINT SENSOR FROM SYSCO INTERNATIONAL T HE SYSCO ECO LINE range of products has been designed to provide a secure cost effective perimeter intrusion detection system for industrial applications of any size. The Eco Point is particularly suited to applications utilising heavier fence fabrics such as weld mesh or palisade and other rigid structures such as walls, building, window grills, skylights and roof structures. The Eco Point technology is based on a network topology where up to 1,000 sensors can be installed on the system and connected together using a single cable to provide both data and power. Each point sensor is fully addressable and individually adjustable to detect all forms of penetetration and climbing attacks. The system is able to log and store all alarm data which can be subsequently interrogated by sensor location, time and date and alarm type. Each alarm zone can consist of one sensor to allow pin point detection of the alarm location for surveillance by ptz or dome CCTV cameras or as multiples of sensor to match the field of view of fixed line CCTV cameras, all of which is electronically configured at the Eco Point controller. The Eco Point range of product is the future for low cost, high performance perimeter detection technology offering:
10
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
• Ease of installation • High performance operation • Multiple range of object protection The Sysco range of products has been installed into many high security projects and has met the demanding requirements of such clients as the Nuclear Industry, MOD, NATO, and various European prison authorities. The complete range of Sysco detection systems is supported with dedicated Graphic User Interface management systems which has been designed to provide
a cost effective means of monitoring both large and small installations. Supporting information regarding independent test and evaluations of the Sysco range of product can be supplied on request including reference list for: • Fence mounted systems • Free standing systems • Buried systems • Building and wall mounted systems
FOR MORE INFORMATION E-mail: psmsysco@aol.com
CYBERCRIME
www.counterterrorbusiness.com
THE EVER-EVOLVING CYBER CRIMINAL Cybercrime is a rapidly growing phenomenon which does not discriminate between the public and private sectors YBERCRIME is perhaps the most pressing issue of the 21st century. Though this may be a bold statement, it is one that the public and private sector must resolve to maintain trust in online services. This article will go some way to explain where the threat of cybercrime lies, what techniques cyber criminals are using, and how to safeguard against attacks.
C
NO AWARENESS Lack of awareness of the threat landscape is something that industry experts indicate as being the bread and butter to cyber criminals. It is not just the case that the criminals are after your money and details, as one might expect, but very often citizens are unsuspectingly roped into performing tasks such as money laundering for criminals that pose as legitimate businesses, and so effectively become part of the criminal organisational structure. With new and highly sophisticated methods of attack, even the most IT savvy among us are vulnerable. Education is the mantra of security professionals as this, along with security technology, is the key to minimising the success of organised cybercriminals. Michael Hamelin, chief security architect
for Tufin Technologies says that: “The security threats of today are a long way from what we had to deal with ten years ago. Today we find a constant wave of cyber criminals assaulting every system and service we have. The truth is, anywhere there is information to steal, or money to be made illegally, we find a new wave of cyber criminals has cropped up.” According to the most recent research by the Office of Fair Trading, cyber criminals cost 3 million United Kingdom consumers to lose a total of £3.5bn through online fraud each year. Hamelin goes on to talk of the organisational structure of the new cybercriminals: “The constant onslaught of cybercriminal gangs popping up around the world is truly one of the most amazing side effects of the Internet. We see gangs organising activity in multiple countries simultaneously with skill and ease never before seen. The fact is you will be attacked sometime soon if you haven’t already. It might be an annoying denial of service attack, it may be a botnet inside your network, or it may be a direct attack on the web services. The corporate victims that have had to disclose their losses have shown staggering numbers in real money lost to these new criminal gangs. “Today’s cyber criminals are well
armed; they have skilled tacticians, trained developers, and are capable of writing unique zero-day attacks. “When we look back at the attacks on corporate systems like Hartland Payment Systems, TJX Co. and RBS WorldPay, we see that criminals have determination and know how to target our sensitive systems. If we look at the RBS WorldPay heist cashers simultaneously hit more than 2,000 ATMs with the fraudulent cards, netting about $9.5 million USD in less than 12 hours.” THE CHANGING CYBER CRIMINAL It would appear that industry experts are in agreement. Cyber-criminals are growing and evolving; becoming increasingly organised in their structure, and very commercial with their wares. A series of predictions by Imperva, data security specialists, has detailed the imminent threats to security in the coming year. The rise in threat is paralleled by the rise in security, showing that cyber criminals are quick to adapt to their surroundings. Their ninth prediction, of a series of ten, authored by the company CTO Amichai Shulman, states: “In 2011, the cyber crime landscape will change in two ways. First, more and more smaller cyber-gangs will go out of business. Why? Security researchers will continue to look into the hacker operations and will unearth the smaller or less diligent criminals. “In general, the hacker industry will react by investing more resources in their attack techniques and detection evasion. The hackers that cannot make this investment will go out of business. Other cyber criminal organisations will ‘buy-out’ other groups or merge their operations with other groups.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
11
CYBERCRIME
www.counterterrorbusiness.com
The security threats of today are a long way from what we had to deal with ten years ago. Today we find a constant wave of cyber criminals assaulting every system and service we have. The truth is, anywhere there is information to steal, or money to be made illegally, we find a new wave of cyber criminals has cropped up – Michael Hamelin, chief security architect for Tufin Technologies “This will lead to the second change. The current powerful cyber-crime organisations will consolidate their power and grow (after all, antitrust laws don’t apply to them).” WHAT TO LOOK OUT FOR? An example of the types of techniques that are increasing, and also growing in sophistication, are variants of the man-in-the-middle (MITM) attack. The public must become aware of this type of attack, and also educated as to how they can prevent it in order to give the cyber criminals as little chance as possible to prey on the ignorance, or indeed, the trusting nature of users – the former and the latter not being mutually exclusive. Perhaps the most recent, and also incremental, technique that cyber-criminals are using is man-in-the-mobile (MitM0) attacks. Trusteer reported that the hackers behind the infamous ZeuS Trojan have modified their attacking strategy in order to remotely take over smartphones. The Trojan infects a user’s PC and then proceeds to send a false bank authentication request to the user’s mobile number. Having obtained this information, the hacker sends a text message to the user asking them to download a ‘digital certificate’ which actually installs an applet that blocks sensitive information, such as bank details, and instead diverts the details to the hacker’s own device. Essentially the hacker takes over the banking session and can then initiate transactions. Any authentication that the bank needs verifying is sent via SMS to the hacker, who then proceeds to send the previously stolen details to complete the transaction. The reason why this type of attack is more troubling than other techniques is that authentication via Smartphones, twofactor authentication i.e. mother’s maiden name and place of birth, and other remote devices, was initially seen as a solution to Man-in-the-Browser (MitB) and other Man-in-the-Middle (MitM) type attacks. As is usually the case, the baton is passed to the next innovative hacker, leaving security experts to wait for theirs in the form of a vendor released patch or solution. Organisations must recognise that, amongst their user base, there will always
12
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
be some people whose machines and devices will have been compromised. Using active technologies like secure browser services, the communication channel with the customer can be secured, whether that channel operates across the regular internet or in the case of mobile phones via the mobile Internet and/or text channels. Only then should this be used for transactions and authentication. Experts are keen to emphasise that current protection software is effective, but also that hackers can often take advantage of a user’s lack of awareness. It is all well and good having the electronic equivalent of bolts, chains, and deadlocks on your door, but if a burglar can simply put on a convincing disguise, in order that you let him in, the technology in place is rendered useless. Education is the key. Being aware of your bank’s correct verification procedure, for example, is the kind of knowledge that can prevent you from unsuspectingly opening the door for cyber criminals. EDUCATING THE PUBLIC Professor John Walker, a member of ISACA, notes that there is very little in the news about what organisations and crime prevention agencies are doing to combat cybercrime. He says, in reply to the question of how large the problem of cybercrime is: “Take whichever number you see and double it and you might be approaching the right number.” Considering the public’s lack of awareness, paired with the rising threats cited above, the seriousness of the situation should be apparent. Walker believes that a national campaign, akin to the anti-smoking movement, should be implemented to gain the attention of the general public. From children to the elderly, it is vital that every user of technology understands the dangers that lie in wait as cyber criminals do not discriminate between victims. The line between the public and private sector, with regards to security has now become somewhat blurred. Users often use personal hardware such as USB sticks and smartphones to carry their organisation’s sensitive data, and also their own. Similarly, employees may also use work-supplied devices for
personal activities such as banking and online shopping. So the aforementioned line is in a constant state of flux. PERSONAL DEVICES Sean Glynn, vice president of product marketing for Credant, who are endpoint data security specialists, said: “No longer restricted to laptops and mobile phones, a growing trend is for employees to take advantage of the latest must-have gadget, even using personal devices to supplement company owned technology, to maintain contact while out of the office. Whilst memory sticks are arguably still the weapon of choice, even those whose primary purpose isn’t data storage are being used to conceal sensitive information – from iPods to digital cameras and netbooks – anything with a digital memory capacity.” What this potentially means for hackers is that they can be doubly rewarded with personal user details and an organisation’s sensitive data. A spokesperson for Lieberman Software said: “According to many security experts, the most prevalent IT security threat arises from negligent insiders. Malicious hackers prey upon enterprise users with the knowledge that no matter how many times your employee may hear about security policies and risks, eventually that user will click a questionable link on Facebook, respond to a phony e-mail from Her Majesty’s Customs & Excise, or be duped by a targeted spearphishing attack.” Professor John Walker sees the solution to this problem as being a way of emphasising the ultimate repercussions of ineffectual security on employees’ own lives. When a user considers, for example, the possible side-effects of something as elementary as unsecured browsing in the workplace – compromised personal information being the most salient – they begin to get an idea of the damage that can be wrought on their personal lives. Examples such as this should be held up as a testament to how an individual’s personal habits can compromise both their own security, and also their organisation’s. The line between the two is fickle as it is essentially the user that draws it, protracting and contracting it, according to their activity at any given time. It is plain to see that education must spread its light on all sections of society in order to combat the malevolent shadow that keeps us in the dark. Organisations that want to learn more about securing themselves from Cybercrime will find it useful to visit Infosecurity Europe which takes place at Earls Court, London, from 19-21 April 2011. For free entry and further information about Infosecurity Europe, visit the website at www.infosec. co.uk. Pre-register today and avoid the £20 booking charge for those who miss the deadline and need to register at the door.
CYBERCRIME
www.counterterrorbusiness.com
DATA ENCRYPTION IN A MOBILE WORLD Encrypting mobile devices can be a minefield and with over a third of the worldwide workforce set to become mobile workers by 2013, it will continue to challenge IT departments
HILE COMPLIANCE is seen as the top driver, the key areas where attention should be placed when it comes to encrypting data are all related to mobility. This is a fair indicator of how challenging the nature of the increasingly mobile workforce can be when it comes to complying with regulations. The top three ideal-world targets for encrypting everything are, in order: • Data stored on Notebooks used by mobile workers • Data stored on Smartphones and other portable/handheld devices • Data stored on Desktops/Notebooks used in home locations It’s no coincidence that all three are distributed/mobile working related. MOVING TOWARDS A MOBILE ENVIRONMENT The executive who found himself personally responsible for a data breach when his laptop was stolen from his house may have been taken by surprise, as there is a lingering mindset that security is a central infrastructure thing. As we know this is not the way IT works and the rules on data security are completely different when we move into a mobile environment. There are all sorts of employer/employee
W
issues that arise in this situation, but supplying staff with a self-encrypting laptop drive can solve the problem. So just what should organisations examine when drawing up a shortlist of solutions? Below are five key factors to consider when evaluating security solutions. Accreditation: FIPS, CESG and CAPS have a place, but should not be considered the be all and end all to product selection. While a useful tool in assessing the security of encryption products, it is not a guarantee that a product is secure, the onus is on the end user to understand what they’re using. What they do provide is a benchmark for comparing and contrasting products against another solution that meets these criteria, but without the certification, can still be included in the evaluation if you want to make sure you are looking at ALL the options. Cryptography: the Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the US Government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256. It will depend on the sensitivity of the data whether you need 256 or if 128 would be adequate.
Data: The United Kingdom currently uses five levels of classification – from lowest to highest, they are: protect, restricted, confidential, secret and top secret. It stands to reason that it depends on the level of sensitivity that is being stored on the device that will determine what standards they would need to have or what kite marks are in place to ensure the level of protection. Device: Considering where sensitive data resides will help determine the type of product you need and the standard it should have. If you’re looking to protect mobile devices a central management policy would be advisable. Cost: A number of factors will influence just how much you spend on protecting the data. There is the argument that you can’t put a price on security but it has to make commercial sense. There’s no point having a top of the range encryption solution if the data its protecting is the lunch time sandwich order. By the same token a minimal encryption solution would not be deemed adequate by the Information Commissioner’s Office should the device contain personal health records transported by a GP. The solution should be appropriate for the data it is protecting. ENIGMA SED FROM ORIGIN The Enigma SED (self-encrypted drive) from Origin Storage is the first solution to provide companies of all sizes with a quick and cost effective way to secure laptops using the highest levels of hardware AES 256-bit encryption. The kits, which were launched by Origin Storage at the Infosecurity Europe show earlier this year and start at just £228 for a 250GB version, include a USB/SATA data transfer cable and Acronis drive cloning software. But the real key to the Enigma kits is the Winmagic encryption/ decryption software that works with the SATA drive at the BIOS interface level and allows the data to be written or read in encrypted format on-the-fly. QUICK AND SIMPLE SOLUTION “Rather than supply the bare drive, the Enigma SEDs (self-encrypting drives) Origin supplies comes with all the cables and software needed to allow laptop users to move their data from the old drive to a new one, and install it very quick and simple,” “We said at the time of the launch that we thought the kits were a unique solution in the industry and that continues to be the case. The kits are an ideal solution to the problem of unencrypted data on business laptops.” – Andrew Cordial.
FOR MORE INFORMATION Tel: +44 (0) 1256 813988 E-mail: andyc@originstorage.com Web: www.enigmased.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
13
CYBERCRIME
www.counterterrorbusiness.com
REDUCING THE COST OF SECURITY DEPLOYMENT Celestix Networks produces a rapidly expanding range of ready-to-deploy security solutions for IT networks N TODAY’S INTERCONNECTED world it is no surprise that the type of data being shared is diversifying rapidly and the volume of data is rising steeply. Data sharing raises many considerations for any organisation and the balance between enabling collaboration and ensuring compliance with regulatory governance is a difficult one to get right. Allowing data availability and complying with regulations is only part of the formula. Organisations need to consider whether simply meeting compliance standards also means that their valuable and sensitive data is secure. Security along with compliance and availability needs to be considered in equal measure. The value of data will depend on its type, and its value can be determined in many ways. Confidential data can include corporate secrets such as product roadmap and designs through to personal customer information, patient and payment records.
I
14
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
With such a diversity of data in circulation it is likely that the way in which it is shared will differ, as will the levels of access and security required to view it. Whilst the levels of availability and security that are applied to data can be determined by the owner, the need for compliance is often enforced by governing regulatory bodies. However, not all data is the same. Information that is of high value to companies, but is not subject to regulatory pressures like the Data Protection Act, is often overlooked. This information can be of such high strategic value that its compromise could have major financial or public relations implications and possibly disastrous consequences for the company. DEFINING YOUR DATA An organisation must assess the different types of sensitive data that is being shared and needs to consider the risks attributed to sharing it with collaborative workers. It is important to understand
the different types of sensitive data an organisation has. A recent Forrester study1 assessed the use of data in a broad range of enterprises and they distinguished two tangible types of data. Secrets – valuable confidential data such as financial reports, design documents, product roadmaps. Custodial Data – data that is held on behalf of others such as bank data, patient data, legal contracts etc. Custodial data is typically benign when stored in a secure location. Patient records, banking details and education grades are all meaningless if they are locked away from prying eyes. But custodial data becomes extremely toxic if it is ever leaked. The impact of the loss of custodial data differs from the loss of secrets. The effect of the Data Protection Act along with many industry specific regulations for the handling of data such as PCI means that financial penalties can be incurred by non-compliant organisations. However, the impact of custodial data loss can also be felt through lack of customer confidence and loss of short term revenue. Company secrets are often strategic, high value items that help a business to drive profitability, compete in their market and protect their intellectual property. The value of corporate secrets may not be instantly obvious to a third party but in the wrong hands it can cause significant and long lasting negative impact to a company. The results of the loss of confidential secrets can
CYBERCRIME
www.counterterrorbusiness.com
CUSTODIAL DATA
SECRETS
Creator/Owner
Business Partners/Customers
Enterprise
Relationship to data
Custodian
Owner
Examples
Credit Card Numbers Government Identifiers
Trade Secrets Strategic Plans
Source value
External: determined by regulators and criminals
Internal/External Competitive
Compulsion to protect
Controlled by regulation, statute or contract
Would cause strategic harm
Regulation
DPA, PCI-DSS
Consequences
Clean up, notification costs, reputation
Revenue loss, reputation, risks to security
Key Question
Why is the data circulating?
Who needs to know?
Priorities
Stop unnecessary circulation Reduced use
Control circulation Reduce abuse
be far reaching, from lost project plans to forecast data, all companies should address risk associated with the loss of secrets. In all cases, the way in which an organisation manages its data will depend on how it categorises it and what regulations apply to the handling of data in their industry. MEETING REGULATORY GUIDELINES Regulatory bodies such as the Information Commissioner’s Office (ICO), PCI Security Standards Council, and the Financial Services Authority have the ability to impose sanctions against organisations that fail to meet minimum standards for handling data. Perhaps the most tangible example of this is the ICO which is now able to order organisations to pay up to £500,000 as a penalty for serious breaches of the Data Protection Act. Enforcing a financial penalty is the strongest method available to deal with the most serious personal data breaches, but regulatory bodies may also act to enforce other measures against non-compliant companies. However, it is worth noting that no such regulation applies to the handling of secret data. Confidential secrets represent a higher value and the impact of a data breach could be more significant in the long term, and yet there is no formal regulation, only best practice and the option to be assessed against standards such as ISO 27001. Whilst there is a rise in the number of companies wishing to be monitored against such standards, there is still a substantial risk in the way corporate secrets are handled. COMPLIANCE VERSUS SECURITY Only after analysing and understanding the different types of data in use can an organisation formalise a strategy for how best to secure their assets. It is essential that all organisations secure their custodial data but this should not be done to the detriment
of confidential secret information. Custodial and secret data is often handled in different ways, has different inherent values and represents different scales of risk to any organisation. This does not mean that processes for the handling and control of different data types need to be separate. Ideally the process for handling both data types will allow for compliance targets to be met but will also allow collaboration to take place securely. APPROACHING THE DATA CHALLENGE Traditional approaches to security and compliance tend to deliver answers to specific problems without addressing the end to end nature of data sharing. • Perimeter security, for instance, is a foundation for restricting access to internal systems but they struggle to address the security risks associated with individual data files. • Data encryption technologies are an excellent choice for securing end point devices and data when in storage but once the data is in use it is inherently insecure. • Secure File Transfer is an effective means of securing data files in transit but again the data is exposed once it arrives at its destination. Most traditional approaches to the handling of data actually leave the data exposed to risk at some point in the sharing process. Further, due to the evolution of data security technology, it is likely that organisations are using multiple technologies in order to try and control data and the sharing process. Data leakage can occur not just from external malicious attacks but also from user error, personal theft and poorly designed business processes. With so many different ways to lose data it is not surprising that tradition methods for handling data can often fail to meet security, compliance and sharing requirements. Traditional solutions address only parts of the data usage lifecycle and so there will always be an element of risk
associated with collaboration. In order to truly deal with the need to share data securely whilst complying with regulations it is necessary to approach the issue from a different perspective. Organisations should ask themselves whether their current solutions allow them to: • control access to data of any type regardless of where it is held • share data whilst ensuring the data owner remains in control of their files • secure both custodial and secret data to the same level • encrypt data not only in transit but wherever it resides • manage access to data based on predetermined usage policies • limit the risk of data loss through human error • meet and exceed compliance regulations • collaborate with external parties without exposing data to loss. Recent advances in data-centric security provide organisations with the ability to share individual items of data that can be secured regardless of where in the sharing cycle they reside. Files can be encrypted in transit and wherever they reside and access to the files can be granted only to authorised users who meet specific criteria. The ability of a user to interact with a file can also be restricted through granular usage policies. In all cases the data owner remains in control of the data file and can dictate how other users may handle and view the content. Compliance drives a significant amount of spend from the security budget but complying alone does not ensure that data is secure. Organisations have obligations to ensure that custodial data is handled in a secure manner but the need to secure confidential secrets is just as great. Modern data-centric security solutions allow organisations to address the risks associated with sharing of any type of data. They allow companies to comply with regulations whilst also securing all data of value. The real advantage with such technologies is that they allow for the sharing and collaboration process to continue whilst the data owner remains in full control of the files and how they are handled. Notes 1 The Value of Corporate Secrets, Forrester. March 2010
FOR MORE INFORMATION Web: www.celestix.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
15
For all public and private sector organisations, unintentional, malicious and fraudulent misuse of information is a huge and growing threat. Regulatory, legislative and business process compliance is a massively growing headache. • • •
The risks are high, most often internal, and the economic and reputation costs can go off the scale. Complete protection and peace of mind can only be found in a complete approach. Only Overtis VigilancePro delivers a complete 360° user-centric solution.
For a no-obligation discussion about how Overtis User Activity Management can help you reduce risk, and prevent the consequential cost in revenue, time and reputation of insider attack, call us on 08456 589962 or visit us at www.overtis.com
CYBERCRIME
www.counterterrorbusiness.com
THE SIMPLICITY AND SOPHISTICATION OF CYBERTERRORISM Cyberterrorism may have entered a new era, but it still relies on simple human behaviour to achieve its aims N JUNE THIS YEAR a new piece of malware, subsequently called Stuxnet, was identified that targeted Siemens industrial control software and installed on systems that, for security reasons, are not traditionally connected to the Internet. The code is able to issue new instructions to industrial devices including pumps, valves, brakes and motors – reversing what they would normally do. The malware is incredibly sophisticated exploiting not one but four zeroday exploits (previously unknown vulnerabilities) in Microsoft Windows. While the code may be sophisticated, the vector of infection is simple. It is introduced on USB keys. Once on the internal network, however, the code uses six different techniques to spread. It also uses previously unseen methods to hide itself on USB sticks and on systems running the industrial control software. INSIDER KNOWLEDGE What is alarming is the level of insider knowledge of the target systems and the amount of effort that has gone into writing the highly elaborate code. The scale of the development project suggests that it has been written by a highly organised and well-funded group, leading some experts to speculate that the malware is the result of a state-sponsored project. From the number of infections and specific nature of the commands, it has also been suggested that the malware is targeting a particular sector, and even a single controversial nuclear plant in Iran. Stuxnet is causing much concern in international anti-terror organisations because it is the first piece of malware designed to control mechanical processes to cause physical harm. Deploying malicious computer code to attack critical national infrastructure is not a new phenomenon. In 2007 Estonia was subjected to a targeted cyber attack by Russia. Estonia is a small but technically advanced Baltic state, where 40 per cent of people read their morning newspaper online, 90 per cent of banking transactions are carried out online and free Wi-Fi is ubiquitous. At 11pm on 8 May, Estonia’s web servers were swamped with web traffic at a rate of four million packets per second, generated from just under one million zombie computers worldwide. The Estonian foreign ministry, all major
I
commercial banks, telecommunications companies and media outlets were hit – hard. In addition, the attack was focused on the 13 root DNS servers that translate meaningful domain names into IP addresses. It was only a close relationship with Netbod in Stockholm, which runs one of these critical systems, that minimised the impact of the attack on Estonia. The sophistication in the Estonia attack lay in the speed and intelligence with which the traffic dynamically changed to subvert filters applied locally. Georgia and Kyrgyzstan have also been similarly targeted. These attacks have led governments to seriously consider implementing private country internets, with clearly defined interfaces to other county-specific internets, in order to protect what is increasingly becoming a national security asset. Will this address the problem? While having a private country web network may facilitate a faster, more effective in-country response to attacks on that network, it is highly unlikely to tackle the root cause of systems being compromised. Network security may slow the spread, but it is often powerless against the initial infection. No matter how sophisticated, or well coded a piece of malware is, defeating it more often than not comes down to simple management of user activity. Initial infection comes down to the insertion of an infected USB stick or a user opening a dubious e-mail attachment, or clicking on an unknown link and landing on a malicious web page. Sophisticated targeted attacks still rely on simple human behaviour. The root to protecting systems is to guide behaviour, enforce policy and audit activity at the computer human interface. USER ACTIVITY MANAGEMENT User Activity Management solutions see everything the user sees and everything the user does. These are designed to promote positive user behaviour, in line with stated policy and business process, with softer “learn as you work” user mentoring features. Rather than unexplained blocking of activity, which is more likely to lead users to seek a workaround that introduces risk to the system, user activity management solutions present a dialog box to the user to query their activity before they proceed. For example, presenting an on screen prompt, simply asking “Do you trust this
link?” or “Are you sure?” when a user is preparing to open an e-mail attachment from an unknown domain. This kind of lightweight intervention is enough to make people stop and think about their actions. Where activity is deliberate and malicious, user activity management technology can equally be used to block and audit any activity that blatantly goes against stated security policy and process. In addition to improved security, organisations that introduce user activity management often derive significant additional benefits. A comprehensive audit trail of events across all user activity provides a unique insight into how users interact with sensitive information and assets. Regular review of activity event alerts and volumes can be used as the basis for tuning rules, or to strengthen and improve controls. Audit trails containing actual desktop screenshots, screen captures of web browser and other application windows, and even CCTV images, enable powerful visualisation of exactly what users are doing on the system: WTUSIWYG – What The User Sees Is What You Get. User activity management therefore supports ongoing compliance with company, industry and regulatory requirements and continuous review of how applicable and effective security controls are, based on actual user activity and behaviour. The rich audit trail provides answers to difficult questions from internal and external auditors and demonstrates action taken to identify, measure, mitigate and manage risk. INFECTED COMPUTERS In conclusion, the Stuxnet worm has demonstrated that no matter how well coded computer malware is, cyber terrorism still relies on human activity as the vector of infection. Someone has to insert an infected USB stick. The cyber attack on Estonia, relied upon compromised zombie machines sending out millions of packets of data to overwhelm the web servers associated with its critical national infrastructure. Those zombie machines were owned by unsuspecting users, whose computers had been infected with malware because they forgot to update antivirus software, clicked through links in e-mails, opened attachments, or visited infected websites. Their machines connect back to command and control servers and silently take up position in the illicit networks controlled by cyber criminals and terrorists. Cyberterrorism, as traditional terrorism, still relies on humans being tricked, compromised, coerced, or incentivised to carry out activities that provide a link in the chain of command from terrorist to victim.
FOR MORE INFORMATION Tel: 08456 589962 Web: www.overtis.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
17
. . . . . . . . . . .
Pulsed Electric Perimeter Fence Deterrent & Detection System Tamper resistant PC based GUI with mapping Simple to maintain & repair Integration with CCTV etc... Compliant with BSEN60335-2-76 Compliant with BSEN1722-17 Manufactured in the UK Design & after sales support Installation training
Tel: +44 (0)1572 725911 www.zarebasecurity.com ®
Induced Pulse
Z
areba Security is a leading global provider of customised perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • Utility companies • Correctional & prison facilities • Government or military installations • Industrial/commercial property • Airports, Ports, auto dealers • Critical infrastructure • Transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates. This means the security guard and/or local alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is the ideal solution. It is an electric fence system that combines a barrier with intrusion sensing and a shock
a proven perimeter deterrent and detection system deterrent to prevent security breaches. Adaptive fence sensing technology (patent pending) makes for a very stable system. It can ignore voltage on the fence line but still give rapid response to fence attacks. The system features: • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customise to any zone length or wire array • Standalone installation or mounted on existing fence, roof or wall tops • PC Windows based user interface • Graphical mapping overlay • Customer friendly GUI • Interfacing with most common data bus systems • Integration with CCTV systems • Integration with Access Control & Building Management systems • Listed in the 2009 UK CPNI approved product list for use in areas of strategic importance • Listed in the UK Secure By Design (SBD) product list
Zareba Security have designed and engineered perimeter fence systems globe. We have sales and technical staff based in the UK. We also have our own UK in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their site. Zareba Security only sell to approved installers. We offer in house training courses to Lantra standards. Zareba Security 8 Lands End Way Oakham Rutland LE15 6RF Visit us on stand F40
PERIMETER SECURITY
www.counterterrorbusiness.com
KEEP YOUR DISTANCE Securing the perimeter is the first layer of security, making it difficult for intruders to physically breach the boundary and enter the site. James Kelly, chief executive of the British Security Industry Association, investigates effective ways in which to secure the perimeter of your site N EFFECTIVE SECURITY strategy integrates various systems and technologies to ensure that all possible threats are being accounted for. Perimeter security is an essential part of this integrated approach; it is the first layer of security, and makes it difficult for intruders to physically breach the perimeter and enter the site. There are various ways to secure a perimeter, and these can include use of CCTV technology, physical barriers and security patrols. Effective security strategies make use of a combination of these measures.
A
PHYSICAL PROTECTION Physical solutions such as fencing, bollards, doors and locks are a great place to start when securing the perimeter of a site. Sturdy measures are a deterrent to intruders and can be further reinforced through use of technology, for example by mounting fence vibration detectors that trigger an alert in the security control room, with automatically directed camera observation of the area often used to track intruders’ movements and direct security patrols towards them quickly. With physical protection measures such as these, even if an intruder was to manage to enter a site, they will find it difficult to get back out. ROUND-THE-CLOCK MONITORING As has been proven over the years, CCTV can be an extremely efficient form of security protection. Cameras strategically placed around the perimeter of the site can provide a thorough coverage of large areas. Round-the-clock monitoring of the system can either be outsourced to a remote monitoring centre, or be done on site to enable an immediate physical response. There are many ways to ensure maximum efficiency as possible when watching over an area that will require multiple screens. Recent advances in technology mean you could streamline this process by employing either motion sensors for the CCTV, where the cameras only start rolling when movement is detected, or by using fencemounted vibration detectors that trigger an alert in the security control room. BS8418 SOLUTIONS CCTV systems that adhere to the BS8418 standard are becoming an increasingly popular method of monitoring a site. BS8418
There are various ways to secure a perimeter, and these can include use of CCTV technology, physical barriers and security patrols. Effective security strategies make use of a combination of these measures
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
19
®
Sliding gates
Design , Manufacture and installation of site specific ‘bespoke’ high security gate solutions.
In recent times many Utility sites have been classed as ‘High Risk’ from possible terrorist threat. The security upgrades of these sites stressed great concern of the access points (gates / automatic gates) Inova Gates High Security solutions have won many testimonials from Government bodies , major Utilities and local authorities making them the market leader in this area. Recent Inova High Security Projects :
®
Gates UK
Part of the Rogers Fencing Group Head Office : Inova Gates ; 76 Derrynoid Road , Draperstown Co. Derry , Northern Ireland , BT45 7DW Int +44 (0) 28796 29962 t: 0845 331 3377 f: 0845 331 3388 e: sales@inovagates.com w: www.inovagates.com
2012 Olympic Project London
National Grid Upgrades - various locations UK
E.S.B security upgrades - various locations Ireland
EDF Energy Substations - London
An Post Depots - Ireland
Prison Authorities - Dublin
Royal Mail Contract - 23 Units to various cash counting centres
High Speed Gate to Emergency response Police Unit Warwickshire
Luton Airport
Belfast City Airport - (32.0 m wide opening)
PERIMETER SECURITY
www.counterterrorbusiness.com
solutions consist of cameras and detectors placed strategically around the perimeter of the site, linked together by specialised transmission equipment to a Remote Video Response Centre (RVRC). Here, operators can visually confirm what is happening, call up on-screen plans of the site and even issue verbal warnings to intruders via on-site speakers. If necessary, the RVRC operators can also alert the police who, as the incident is confirmed visually and is associated with a URN (Unique Reference Number), should provide a rapid response. VIDEO CONTENT ANALYSIS Another aspect of CCTV which proves particularly useful in securing the perimeter of a site is Video Content Analysis (VCA), which is an intelligent form of security used in securing large areas that are difficult to patrol and pose a challenge in securing. VCA is the automatic analysis of CCTV images to create useful information about the content. The scope of VCA is certainly impressive and expands all the time, for instance it can now be applied for external and internal intruder detection; the monitoring of buildings for health and safety; people counting; automatic event and incident detection; safety enhancements for public areas; smoke and fire detection and
camera failure or sabotage detection. In theory any behaviour that can be seen and accurately defined on a video image can be automatically identified and an appropriate alert raised. Such an intelligent approach, with attention focused on the most relevant CCTV footage, has the potential to allow resources to allocate more effectively and remedial action to be taken before incidents have a chance to escalate to a more serious level. SECURITY PATROLS While technology is essential in securing a site’s perimeter, a physical, personal presence can also be extremely effective in deterring potential intruders. Security patrols by foot or by vehicle are fundamental when responding to intruder detection and also give a highly visible security presence around a site’s perimeter. The feeling of security for both visitors and staff is also enhanced by the presence of security officers manning access points and by security guards carrying out random patrols in the perimeter area. The ability of security personnel to react quickly to developing situations, as well as posing an obvious deterrent to potential intruders mean they play an essential role in an integrated security solution. Aspects such as the size of the site, location
and resources available all play an important role when choosing which approach to take in protecting the perimeter of your site. Perimeter security solutions alone are often not enough, so combining these with on-site measures such as access control systems will ensure you are giving your site the best possible level of protection. If you are new to planning security for the perimeter of your site, it is a good idea to seek expert advice by employing a security consultancy. Working independently, security consultancies act as a guide to the many products and services on the market and provide unbiased recommendations based on an assessment of the individual requirements of their clients. The British Security Industry Association is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services and adhere to strict quality standards.
FOR MORE INFORMATION To find out more about the various elements of perimeter security, visit www.bsia.co.uk, e-mail info@bsia.co.uk or telephone 0845 389 3889.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
21
AIRPORTS INFRASTRUCTURE
DESIGNED TO SECURE AND PROTECT
MILITARY INSTALLATIONS PORTS POWER SUPPLIES RAILWAYS REFINERIES UTILITIES
Introducing the Stronguard range. TM
High security products that have been tested and approved by HM Government, and recommended for sites that demand maximum security.
stronguard
TM
stronguard
TM
maximum security palisade
secureguard-358
The latest development in super strong, durable, ultimate security palisade. Designed for the security of strategic assets which form part of the critical national infrastructure, Stronguard provides unrivaled attack delay against saws, cutting, hammers, jacks, levers, power tools and hand tools. Recommended for the military, rail, utility, petrochemical plants, and all sites that demand maximum security.
This high performance system is ideal for use in utility sites, airports and secure units. Designed for high security, demanding applications, the Stronguard Secureguard358 system can have multiple optional features to aid additional security including detection and electrified fencing.
TM
stronguard
security enhanced products
stronguard
stronguard
A surface mounted gate that can be installed with minimum disruption to the surrounding area and underground services. Fully tested by TRL (Transport Research Laboratory) to PAS 68: 2007 with a 7.5 tonne truck travelling at 50mph (80km/h).
A range of high quality access controlled gates suitable for sites that require operational safety and security. This range of cantilever gates integrates seamlessly with the entire portfolio of Barkers Fencing perimeter security systems and harmonises with all styles of existing or new boundary installations. With an extensive choice of widths and heights and an endless array of infills.
TM
Call us now for a copy of our complete guide to high security perimeter solutions, and for the full range and more information visit our website...
Tested & Approved
TM
TM
cantilever
stronguard
stronguard
Manually operated or fully automated gates. Powered swing can be controlled using various access control systems; swipe cards, remote control key fobs, ground loops, coded key pads, intercom systems, camera intercom systems, iris readers and finger-print readers. Hydra close, closes at a controlled constant speed. This fluid motion provides a quiet and safe operation.
Crash tested wall to PAS 68, and SEAP tested fence. A long term permanent perimeter security solution. Combined with Stronguard maximum security palisade it is a single defensive line saving valuable space. Further details and specifications are available upon request.
TM
swing gates
TM
invicta
TM
Duke Street | Fenton | Stoke-on-Trent | ST4 3NS Tel 01782 319264 | Fax 01782 599724 | sales@barkersfencing.com
www.barkersfencing.com/applications/max-security
or call us now! +44(0)1782 319264
The ultimate defence against hostile attack.
200602
PERIMETER SECURITY
www.counterterrorbusiness.com
SETTING THE STANDARDS Securing the perimeter of critical national infrastructure sites from a terrorist threat, organised crime and unwanted intruders all pose different security criteria for the authorities, but these can be resolved with a coherent specification driven secure gate and fence line OR DECADES, fences have been the first lines of defence, from basic boundary demarcation through to high security perimeters for military, utilities, airports and prisons. Understanding the importance of security in today’s world, Barkers Fencing provide ultimate perimeter security systems. Barkers Fencing has been designing and manufacturing perimeter security solutions for more than 40 years and during that time developed an extensive service related to security infrastructure projects.
F
FROM BOARD TO BORDER At Barkers Fencing there is a dedicated team of professional perimeter security advisors to assist in all aspects of the tender and specification process. From the very start, Barkers Fencing has the expertise to offer help and guidance for each and every step. We understand how difficult and time consuming it can be to find exactly the right products for each stage of your project. Fencing design, specifications and requirements are no different. If you have a concept or design, we can create a bespoke system or recommend a solution from our perimeter security range to perfectly match your needs. We can prepare detailed specification documents and provide complete drawings ready to be inserted straight into your tender documents and sent to your main or sub contractors. And with our network of preferred contractors we can also recommend an approved installer local to your project. A UNIQUE APPROACH ISO 9001:2000 accredited, and members of the Gate Automation and Access Barrier Association (GAABA) Barkers Fencing offers a unique start-to-finish package: with on-site manufacturing, galvanising and a state-of-the-art powder coating plant, all on one site, plus a free consultancy and bespoke design service to satisfy unique requirements. BS1722 set the standard for manufacturers to work within, but this has been eroded over the years with architects, specifiers, clients and contractors looking for cost savings. Such savings can be achieved using thinner wire in mesh products, reduced wall thickness in posts, narrower strip sections and reduced rail thickness for palisade fencing. Galvanising and powder coating can also be used
Barkers Stronguard™ palisade fencing
to get the thickness back in line with the specification. The actual post used on the majority of palisade fences is an IPE post 100 x 55, not an RSJ 102 x 44 as specified by the standard. The main reason behind this is a commercial one. Barkers Fencing is a manufacturer that still supplies and manufactures to BS1722, but constantly come up against the client who feels he can get better value for money elsewhere. As the saying goes “you get what you pay for”. MAINTAINING QUALITY The only way to maintain the quality and give your perimeter the protection required is to purchase products from a manufacturer who makes the investment to develop their perimeter fences to SEAP or LCPB specifications, for barriers and gates both SEAP and PAS 68 standards can be applied. This has to be driven by Security Consultants and Architects – specification short-cuts should be discouraged. CPNI advisors are always on hand to offer free impartial advice on the latest specifications. As hand-held tooling power develops, so does the level of threat to a perimeter fence. The Home Office strives to stay ahead of this threat by working with reputable manufacturers who enhance their fencing systems to meet the latest SEAP standards. Barkers Fencing ensures their systems meet the latest SEAP standard
by performing regular tests and checks with the CPNI – older systems may not stand up to the current arsenal of weapons would-be intruders have at their disposal. Barkers Fencing has introduced an approved/licensed installer’s scheme which maintains the integrity of the product and also ensures correct installation procedures are followed. To ensure satisfactory installation an audit is completed after the fence line is installed, and a written report issued to the client. The installer is required to maintain a high standard of compliance or they run the risk of losing their accreditation. The Barkers Fencing ‘Licensed Installer’ scheme delivers a complete, compliant standard from start to finish. Working together in partnership with Barkers Fencing, a safe and secure working environment for service personal, employees and their families can be created, and assist in protecting the country’s vital national infrastructure.
FOR MORE INFORMATION Barkers Fencing Duke St, Fenton, Stoke-onTrent, Staffordshire ST4 3NS Contact: Russell Ridgway, sales & marketing director Tel: 01782 319264 E-mail: russellr@barkersengineering.com Web: www.barkersfencing.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
23
Fencing systems that push back the boundaries.
Zaun is a supplier of government tested and approved, integrated high security fencing systems. Contact us for a FREE technical design and specification service or a FREE brochure.
Tel: 01902 796699 sales@zaun.co.uk www.zaun.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
THE FIRST LINE OF DEFENCE Defence has come a long way since the days of fortified castles and moat and drawbridges, and now encompasses sophisticated technology such as biometrics and underground sensors EFENCE IS AN ANCIENT concept that we have practiced through the ages. It has come a long way since the fortified walls and moat and drawbridge methods of days gone by. It now encompasses sophisticated technology such as biometrics and underground sensors. Regardless of the size of the area to be protected – whether it’s a large airport or office block – protecting a building or site involves putting up a series of barriers designed to completely deter, or at the very least, slow down the perpetrator. While each barrier, whether these are fences, bollards, alarms or ID badges, may not completely deter the perpetrator by their own individual merit, by the time they’ve got to their fourth or fifth barrier, they may rethink their attack.
D
Alternatively, the time it takes to consider each obstacle at least slows down entry, giving time for security officers to react appropriately. In other words, the more barriers put up, the better. In some cases, however, even the threat of security measures can be enough. A Smartwater logo on a window for example, is often sufficient at diverting intruders. A SmartWater system sprays intruders with a water-based solution, which contains a unique ‘forensic code’ which will remain detectable on skin, hair and clothing for weeks. This creats an irrefutable link between the criminal and the crime scene. STOPPING AT THE BOUNDARY Security controls may include the physical presence of security staff, alarms, CCTV and electronic access systems.
Perimeter security is the first line of defence in hostile attacks. If perimeter security has been successful, then it will have physically stopped the intruder from entering the boundary in the first place
But perimter security is the first line of defence in hostile attacks. If perimeter security has been successful, then it will have physically stopped the intruder from entering the boundary in the first place. There are numerous types of fences depending on the level of security required. Steel palisade, weld mesh and vertical bar fencing is suitable where a medium level of security is required. For a higher level of security, there are numerous options to choose from, including electric fences, fences with wall spikes, razor mesh fencing and fences with anti-climb and anti-cut through barriers. The threat of pain and high visibility of an electric or spiked fence make it a highly effective deterrent to intruders. Intelligent fence solutions have sensing devices that detect wire movement, sending an alarm to central security control monitors. BURIED AND INFRARED SENSORS Infrared beam sensor detection is also a highly effective form of perimeter security. Invisible beams are transmitted across the protected area and any interruptions in the beam will raise an
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
25
MOTION
technology a unique resource for specialist motion components, assemblies and systems. D E AN COM THE T I S I V ORY FACT
C us today and arrange a visit to meet Call th the Team and experience the technologies. W We look forward to seeing you.
Pixel Perfect Everything you need in a Megapixel Lens 1 MP to 5MP & the worlds first true 3 MP to HD ready Lenses
●
Linear Slides
●
Electric Actuators
●
Rotary Tables
●
Linear Bearings
●
Elevator Tables
●
Drives and Motors
●
Single and Multi-Axis
●
Standard and Custom
●
Manual and Motorised “Goods received, amazed at quick turn around, thank you” RUTHERFORD LABORATORY
Design Manufacture Supply UK based designer and manufacturer of positioning systems offering you experience, knowledge and full engineering capabilities.
The Worlds Number 1 in CCTV Lenses For more info visit: www.cbceurope.com Computar. Part of the CBC family.
LG Motion Limited Tel: +44 (0)1256 365600 Fax: +44 (0)1256 365645 info@lg-motion.co.uk www.lg-motion.co.uk Engineering excellence - by design
PERIMETER SECURITY
www.counterterrorbusiness.com
With today’s ever-evolving terrorist threat, it is important to always stay one step ahead. The combination of the latest innovative technology for perimeter security and access control, with viglient and competent security personnel in place, makes it harder for a hostile to successfully carry out an attack alarm signifying an attempted entry. Buried sensors offer another invisible form of perimeter security as they are completely concealed to potential intruders. The buried sensors generate an electromagnetic field and if an intruder disturbs the field, an alarm is declared. To prevent unauthorised vehicle access, barriers, and fixed and automatically rising bollards can be installed. CCTV surveillance that allows security teams to proactively monitor perimeters is also highly effective at enabling early intervention or containing a hostile attack. It is worth noting, however, that perimeter security must also be flexible enough to allow the natural flow of people as to not disrupt day-to-day
operations. And it must not get in the way of an emergency evacuation. ACCESS CONTROL In an ideal world, perimeter control measures would be enough to deter an intruder. But organised crime and terrorism has become increasingly savvy to modern security measures. Therefore, access control must be vigilant. Access control incorporates a range of features including the use of biometrics, keys, password and personal identification (PINs), swipe cards and entry phones. Biometrics is increasingly being used to ensure authorised access. It is defined as the measurement and recording of physical characteristics of an individual – such as fingerprint
patterns, hand and eye structures – for the use of personal identification. Unlike microchips in cards and the need for a personal identification number, biometrics cannot be stolen or copied and is therefore a highly effective access control measure. THE HUMAN ELEMENT Despite the best of intentions and money pumped into security, the human element is still a major factor and complacency can be the downfall of any well-intended security measure. Personnel, if not tasked with security, can sometimes view security measures as a nuisance and inconvenience, and are almost always less vigilant when it comes to workplace security as they would in their own homes. Therefore all staff and security personnel must be trained and engaged at all times to uphold the appropriate security principles in a diligent and consistent manner. With today’s ever-evolving terrorist threat, it is important to always stay one step ahead. The combination of the latest innovative technology for perimeter security and access control, with viglient and competent security personnel in place, makes it harder for a hostile to successfully carry out an attack.
AN END TO END SERVICE FROM ASSEMBLED ELECTRONICS SOLUTIONS A SSEMBLED ELECTRONICS Solutions (AES) is a Midlandsbased business that offers you an end to end service. Whether you require contract manufacturing capacity or a design and manufacturing partner, AES is ready to assist. With a broad sector base we offer a range of electronics-based services from one-off prototype production and testing through to volume manufacture. The integration of enclosure design, wiring, programming and testing means that the end product is not only functionally sound but aesthetically tuned to meet your requirements. AES provides a range of services to new and established clients in the following sectors: security, defence, automotive and motor sport, aerospace, medical and OEM. In addition to physical manufacture, AES offers both project and supply chain management. Following final assembly, inspection and functional testing, finished products may be delivered using one of the following delivery options: single delivery, scheduled delivery, call off, kanban, direct to end user. Rapid prototyping and the development of innovative solutions are core activities.
Recent examples of AES innovation include remote monitoring and control systems, data logging, tracking and detection. Specific applications include smart battery chargers for blue chip retailers, contactless switching for public sector healthcare applications and the conversion of existing security devices to layouts suitable for automated, surface mount assembly. With over 40 years of experience, we can assist in technological upgrades to exisiting products both to increase functionality and to reduce unit costs through “design for manufacture”. Whether you require a basic manufacturing and assembly service or an end to end solution we can
assist you in bringing your products to market efficiently and competitively. If you have identified a specific requirement but do not, as yet, have a solution we would be pleased to hear from you.
FOR MORE INFORMATION Assembled Electronics Solutions LLP Masons Road, Stratford-uponAvon, Warks CV37 9NF Tel: +44 (0)1789 204879 Fax: +44 (0)1789 299727 E-mail: info@assemtron.com Web: www.assembled-electronics.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
27
PERIMETER SECURITY
www.counterterrorbusiness.com
IN TODAY’S WORLD SECURITY MATTERS!
expected vehicle throughput, operator and driver safety, provision for access by unusually large vehicles, emergency site lock down facility, operation during power failure, lane signage and traffic lights, Installation program. All these works were to be undertaken on the existing operational site. As an example of our level of involvement and expertise, during the design process a requirement for an Emergency UP facility, to override all safety features and raise all road blockers, was identified, however, the electrical current required was greater than the available supply to the site. To provide this facility, without the installation of an upgraded power supply, costing tens of thousands of pounds, Broughton Controls design engineers linked all road blocker control PLCs and incorporated a short, several millisecond, delay between each blocker operation. This practically indiscernibly delay manages the initial inrush current and provides seamless and reliable operation whilst utilising the existing site power supply.
Turnkey solutions at work with the assistance of entrance control systems provider Broughton Controls Ltd ROUGHTON CONTROLS LTD designs, manufactures, installs and services a vast range of vehicle road blockers, automatic vehicle security barriers, pedestrian security turnstiles and automatic gate systems throughout the UK and the Middle East.
B
HIGH SECURITY DATA CENTRE – MIDLANDS Broughton Controls High Security Division recently completed a project requiring the fast track design and installation of a high security perimeter fence upgrade together with a flexible and secure entrance control system. The location was an existing modern warehouse unit, with a particularly challenging layout and slopes across the entrance area. Broughton Controls undertook the fencing and civil works associated with the project, including the provision of drainage for the bollards, in addition to the supply and installation of the security access equipment. The requirement to allow occasional access to large plant, and site constraints limiting vehicle turning arcs meant that an 18m clear opening would sometimes be needed, whilst day to day operation has to accommodate pedestrians, cars, and small commercial vehicles. SITE REQUIREMENTS The site requirement can be considered in two parts: 1. Pedestrian security was addressed by utilising two bespoke “bi-parting” cantilever (trackless) sliding gates, profiled to maintain a constant and secure under gate gap across the sloping entrance area. One gate is manually operated for use when large plant access is required, whilst the other is automated with three opening options: Pedestrian access – 1.2m opening, Normal vehicle access – 4m opening, Plant access – 9m opening. New High Security perimeter fencing was provided and installed, which included a mechanically locked “contingency” gate for emergency access. 2. Vehicle Access/HVM, the need for flexible operation lead to the selection of a combination of crash tested, automated hydraulic bollards and shallow foundation static bollards, all installed in accordance with CPNI guidelines. The automated bollards are controlled by a custom designed HPU and PLC, which integrate gate and bollard operation, lowering bollards in
28
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
sequence with the required gate opening to maximise site security at all times. In accordance with company policy the automated gate is fitted with full pedestrian safety systems with vehicle detection ground loops also providing safety on the bollards. To simplify site operation the gates and bollards are controlled from a console located within the site security office. Once again, at Broughton Controls Ltd we proved our ability to deliver complex integrated site access solutions, on time and on budget. NORTH WEST AIRPORT – VEHICLE SCREENING AREA Broughton Controls was asked to assist with a project to upgrade the Land Side/Air Side screening area of a major North West Airport. The area comprised of five IN and two OUT vehicle lanes, plus the Cyclamen facility. The client had identified the requirement to
THE SYSTEM PARTS The system comprises of Broughton Controls model 420 High-Sec heavy duty, hydraulic vehicle barriers with full height folding lattice skirts, model 700 full height Turnstiles, and model 360 heavy duty Pedestrian Gates, together with, shallow foundation, model 950 crash tested, (PAS
Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage
improve both pedestrian and vehicle security access, including the installation of PAS 68 Hostile Vehicle Mitigation measures. Working with the client, consultants and main contractor during the design stage, all aspects of the project were examined including: Level of pedestrian security required, level of HVM equipment required, size and frequency of vehicles to be screened,
68) Road Blockers and Bollards, all installed in accordance with CPNI guidelines. Custom designed PLC controllers in each lane provide Air-Lock operation of entry and exit barriers with automatic sequential operation of exit barriers and road blockers, in addition to controlling traffic lights and, above lane, canopy mounted, LED signage. An online, PC based, proximity access control system, together with a bespoke control console within each search lane allows security officers full control of there individual lane, together with management audit reporting.
FOR MORE INFORMATION Broughton Controls Ltd, 33 Stakehill Industrial Estate, Middleton, Manchester M24 2RW Tel: 0161 6551020 Fax: 0161 6551021 Web: www.broughton-controls.co.uk
PERIMETER SECURITY
www.counterterrorbusiness.com
EARLY DETECTION SYSTEMS FOR HIGH SECURITY SITES External intruder detectors can provide significant cost savings in terms of loss recovery and damage limitation
LTHOUGH THE TRAGIC EVENTS of September 11, 2001 forcibly brought the terrorist threat to the attention of the world, it was by no means the first such event and people who have been involved in the business of security for many years will be well aware of the efforts that have gone on over the years to provide effective protection against these types of activity. Before September 11, much of the emphasis was on protection against “conventional” crimes, such as burglary, robbery and vandalism, but now there has been a significant shift towards the effects of terrorism. The objectives are to: • Detect – some suspicious activity is taking place that can be detected. • Verify – if possible verify, audibly or visually, that it is a genuine threat. • React – take some action that can prevent or reduce the effect. What the terrorist threat has highlighted is the need to increase the time available for any reaction. The longer we have to react the more likely we are to be able to prevent damage and, more importantly, save lives. Detect as early as possible to create those precious extra moments. Perimeter Intrusion Detection Systems (PIDS) are designed to provide this early warning. The concept is simple; deploy a series of detectors around the asset or people to be protected, far enough away from them to provide adequate time for verification and to make an appropriate response. Of course an early warning
A
will also serve to reduce “conventional” criminal activity such as theft and robbery. An extremely large number of variables have to be factored in when considering perimeter detectors. The layout and topography of the site, the end user requirements (visible or invisible security etc), the existence of physical barriers such as walls and fences, and the climate of the area are all variables that will impact upon the suitability of a detection system. It is obvious that no one system or technology can provide the correct, most effective solution for all these different applications and so it is important to consider all the alternatives before committing to a particular solution. GPS Perimeter Systems has more than 30 years of worldwide experience in the provision of different technology solutions for perimeter security. The different technologies include: INVISIBLE BURIED DETECTION SYSTEMS The various techniques used for these include differential pressure based systems, radio frequency systems, or fibre optic cable systems. The main feature is that they are invisible once installed and therefore difficult for an intruder to locate. They can follow the shape and contours of irregular boundaries and are not constrained to “line of sight” applications. This makes them ideal for irregular shaped sites and means that they do not require a specific physical barrier such as a wall or fence. It is also essential that they work under many different surfaces such as grass, gravel, asphalt and paving.
GPS Perimeter Systems has a double technology system, DPP, intended for the highest security sites, that uses a combination of radio and differential pressure to provide a system with detection resolution down to 5m. FENCE SECURITY Using microphonic, fibre optic cable, and taut wire detection systems, these types of systems are attached to an existing fence (although the taut wire can form its own physical barrier), and are designed to detect any hostile activity on the fence such as cutting or climbing. They follow the shape and contours of fence lines and make them ideal for irregular shaped sites with existing fence structures. It is therefore essential that they work on many different types of structure such as chain link, welded mesh and palisade fencing, and are able to withstand environmental effects such as wind and rain. Of particular interest are the new generation of sensitive fibre optic systems, such as GPS Perimeter’s Miles System, that can protect very long fences such as national borders, and surface or subterranean pipelines. This is possible using fibres already in place, substantially reducing installation costs. FREE STANDING SYSTEMS Free standing systems such as microwave barriers, Doppler detectors, and IR beams provide cost effective security over long straight perimeters. They are used in “line of sight” applications, where the two ends of any particular section must be visible to each other. They do not require a specific physical barrier such as a wall or fence but are often used in conjunction with a physical structure to provide additional protection and detection. They also provide a form of visual security, sometimes particularly useful as a deterrent, and again it is essential that they work in many different weather conditions. It is clear that when considering perimeter security there are many different variables to be aware of and that a suitable technology must be used in the correct situation. GPS Perimeter Systems is a company capable of finding the solution to virtually any perimeter security problem and when installed in the correct way, a secure perimeter will greatly enhance the security of any site.
FOR MORE INFORMATION Tel: +44 (0)1604 648344 Fax: +44 (0)1604 646097 E-mail: sales@gpsperimeter.co.uk Web: www.gpsperimeter.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
29
Visit us on Stand G120
Critical Infrastructure
Civilian Borders
Protecting Critical Infrastructure with Fibre Optic Acoustic Surveillance
Real data showing footsteps from an installed Fibre. Helios can monitor up to 50km of perimeter with an undetectable sensor accurate to within one metre
Transport
PERIMETER SECURITY
www.counterterrorbusiness.com
THE NEXT GENERATION OF BORDER SECURITY Helios – intelligent sensor for perimeter and border security passing beneath roads and paths to monitor vehicle or people movements in the facility. No other sensor type can provide such versatile sensing performance with this level of detection accuracy.
OST SECURITY SOLUTIONS are developed in layers, and it is generally held that more layers create a greater deterrent effect. This leads to the implementation of security solutions that combine multiple individual elements, such as the physical presence of manned security operatives with high-security fencing. This core infrastructure is then overlaid with other traditional sensors, such as microwave, CCTV and infrared cameras to create a highly visible security solution. Other systems are included for point sensing or more sophisticated intruder detection and alert. A layered security solution is a complex integration environment that is blended together against the specific risk and cost requirements of the installation. A fibre optic based solution removes the complexity, whilst creating a step-change in how the security solution is delivered. THE NEXT GENERATION IN FIBRE OPTIC SENSING The Helios system from Fotech Solutions delivers the next generation in fibre optic sensing; providing all the benefits of existing fibre based perimeter sensing systems, but with increased intelligence, accuracy, versatility, and reduced installation and maintenance costs. Helios is a unique, patented monitoring and security technology that delivers unprecedented levels of sensitivity and range. Through the practical application of cutting edge optical physics, the Helios Distributed Acoustic Sensor is able to detect and identify events by their sound or vibration signatures and position them to a one metre accuracy over a 50-kilometre range.
M
Translate this performance to the perimeter of a key facility or a national border and you instantly have a highly accurate sensing system that provides pinpoint positional information of an intrusion event to other system layers, or provides real-time situational awareness in a way that is unachievable with existing systems. The patented Helios system is a “distributed” sensor, using back-scatter analysis of pulsed laser light to turn the entire length of a fibre optic cable into a high fidelity monitoring instrument that detects acoustic and vibration events at every metre. MINIMISING FALSE ALARMS Where increased sensitivity would usually mean more false alarms, Fotech Solutions has recognised that minimising the issue of “false positives” is paramount. The high sensitivity of Helios has therefore been harnessed with advanced Acoustic Analytics Intelligence techniques, which recognise the specific vibration characteristics of certain events and inform operators accordingly. This allows for the differentiation between a suspect event and the “false positive”. The system can also be taught to recognise specific events, giving a true intelligent sensing capability. Helios is highly tuneable to the specifics of an operating environment. Thousands of individual zones may be created along the fibre, each of which can be tuned to alert against different fibre response parameters. With this feature, a single fibre on a perimeter can be buried to provide an undetectable sensing capability, then mounted on fences or the buildings themselves for intrusion alert, before
BALANCING RISK AND COST Where the balance between risk and cost is pivotal to the design or review of a security solution, it is essential that any new system will enhance the existing approach. Helios was designed for low installation and “through-life” cost, which is why the system is able to operate with nothing more than a standard telecommunications fibre as its sensor. For installation the fibre may be easily attached to fences, walls, pipelines or other infrastructure, or it may be buried in any ground conditions. Helios may also be attached to existing fibres to create a highly effective sensing system with existing or redundant fibres. The sensor fibre requires no power or additional equipment along its length and is resistant to RF or EMI. It also does not corrode, so once deployed the system is virtually maintenance free. In security applications, Helios provides highly accurate point alert information to security users. By providing precise GPS coordinates to the intuitive user interface and other sensors, including the cueing of CCTV and PTZ, the system provides real situational awareness to security teams, enabling the rapid detection, identification and appropriate response to all security issues. With a buried configuration the system creates a sensing zone in which footsteps can be detected at 15 metres from the fibre and vehicles at 40 metres. When combined with the huge range performance, this sensitivity provides a truly versatile sensor system that is in deployment to solve a number of key national security issues around the world, including border protection, perimeter security and the protection and management of transport infrastructure. The Helios system from Fotech Solutions is demonstrating its performance as the next generation sensor for perimeter and border security applications.
FOR MORE INFORMATION Web: www.fotechsolutions.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
31
“We’ll make sure you see it before it’s too late” CONTRACTING I PROJECT ENGINEERING I EQUIPMENT RENTAL
“Making a Visible Difference”
• Worried about seeing in hazardous locations? • Worried about the risks of man entry? • Worried about downtime? Equipment Rental, Contracting or Project Engineering - Inspectahire has flexible solutions. Using our inspection technology we can find the weak spots, and reduce the safety and cost worries.
Discover how at www.inspectahire.com/oilandgas
ENERGY
OIL & GAS
PHARMACEUTICALS
PETROLEUM RETAIL
PROCESS INDUSTRIES
PHYSICAL ASSETS
T: +44 (0)1224 789692 E: enquiries@inspectahire.com www.inspectahire.com
NATIONAL RESILIENCE
www.counterterrorbusiness.com
AN AMBITIOUS VISION FOR NATIONAL SECURITY Has the Coalition Government’s National Security Strategy and Strategic Defence and Security Review paved the way for a more integrated approach to the formulation and delivery of UK security policy? Hugo Rosemont, security policy adviser at A|D|S, investigates HE PRIME MINISTER revealed the Coalition’s much anticipated new national security approach with his dual part announcement on 18 and 19 October in ‘A Strong Britain in an Age of Uncertainty: The National Security Strategy (NSS)’, and ‘Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review (SDSR)’. These documents did much to set out a full strategy for national security as well as outlining the government’s approach to the management of security risks as outlined in the NSS. Much has been made of the unprecedented nature of the inclusion of security and counter-terrorism alongside defence in the NSS and the SDSR. Have these new documents paved the way for a more integrated approach to the formulation and delivery of UK security policy? BLURRING BOUNDARIES The government argued consistently that the SDSR would, for the first time, go wider than traditional defence issues and include wider security considerations. The
T
publication of the document confirmed this – it includes security issues such as international terrorism, cyber security, border security, UK resilience, serious organised crime and energy security. DEFENCE & SECURITY Many analysts now agree that the formal convergence of defence and security policy was one of the most significant aspects of this new suite of documents. It has long been a cliché to say that the boundaries between defence and security are blurring but this idea is now firmly cemented into the UK’s strategic approach to security. In truth, the Conservative Party had
been laying the foundations for the development of a more integrated approach to national security policy for some time. As one of his first acts as Prime Minister, David Cameron established a new National Security Council (NSC) for the UK on 12 May 2010. The creation of this new body had been promised within the Conservative Party’s (January 2010) National Security Green Paper: A Resilient Nation. The NSC already appears to be driving through new levels of crossdepartmental cooperation on security policy issues. Whilst many leading figures were justifiably concerned by the hasty nature of the SDSR process, its
There are differing views in industry on the long-term impacts of the Spending Review on the UK’s defence and security capabilities, and industry itself. What is clear is that both the MoD and the Home Office have been tasked to make substantial budgetary reductions THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
33
POWER SUPPLIES AND CHARGERS AC/DC · DC/DC · DC/AC · NiMH · LI-ION · LEAD-ACID Call us for a competitive quote 01722 504853
0% 10
C
O
N
T
RoHS MPLIA
True to the power of quality www.mascot.com · sales@mascot.no
www.counterterrorbusiness.com
NATIONAL RESILIENCE
completion before the publication of the Spending Review on 20 October suggests that it can operate effectively. If a cross-departmental approach to national security is genuinely emerging, what can be said about resources allocated to the variety of security risks that have been identified? How did the Spending Review affect the SDSR and what were the major investment decisions of relevance to the security industry? SECURITY AFTER THE SPENDING REVIEW The 2010 Spending Review declined to “ring fence” national security expenditure. The budgets of the Ministry of Defence (MoD) and the Home Office – both of which contribute to the delivery of the UK’s counter-terrorism strategy, CONTEST – were subject to significant overall reductions (7.5 per cent and 23 per cent respectively). There are differing views in industry on the long-term impacts of the Spending Review on the UK’s defence and security capabilities, and industry itself. What is clear is that both the MoD and the Home Office have been tasked to make substantial budgetary reductions. On the domestic security agenda, for example, the overall 14 per cent reduction to UK policing expenditure is significant, as are the potential impacts on the private sector supply chain which supports the service. However, the overall figure of a 23 per cent cut to the Home Office’s total expenditure does not tell the full story. On the most important issue within the department’s portfolio, counter-terrorism, the Spending Review announced a minimal reduction of ten per cent (over four years) to government spending. The Spending Review makes clear that counter-terrorism must be supported by significant investment.
Industry has long argued that opportunities exist to identify areas where defence industrial capability can be deployed more effectively in security and resilience contexts, and vice versa. This new approach should allow the government to harness dual use technologies for effective national security, to identify economic efficiencies and to deliver a coherent overarching framework for industrial policy across both defence and security
NEW AREAS OF INVESTMENT The latest government documents also announced that there will be new areas of public sector investment in some vital areas of security. There is now a major focus arising from the SDSR on the UK’s strategy for cyber security and information assurance. This includes a greater allocation of public resources (£650 million over four years) to the security of this domain which may offer some opportunities for the security sector. But if elements of wider security were considered alongside the defence aspects of the SDSR, can the same be said of the security industrial elements of national security policy? TOWARDS A DEFENCE AND SECURITY INDUSTRIAL POLICY? The SDSR explained that it would be followed by a “Defence Industrial and Technology Policy that seeks to secure the independence of action we need for our Armed Forces, while allowing for increased
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
35
OMEGA PLASTICS DELIVERS LIFESAVER
omega plastics
The UKs leading rapid plastic injection mould maker Omega Plastics has completed delivery of a major order for the Lifesaver bottle. The ‘Lifesaver’ filtering bottle is an ingenious idea by Suffolk based entrepreneur Michael Pritchard. Omega manufactured the tooling, moulded the components, packaged and assembled the product at is state of the art facility in Blyth Northumberland. Omega Plastics specialises in the manufacture of Rapid Cut injection mould tooling, low volume moulding and assembly. Omega’s ability to produce off tool parts in 2-4 weeks from Aluminium and Steel tooling from its solely UK based manufacturing facility was what first attracted Mr Pritchard.
For further information on the above please visit www.lifesaversystems.com www.omega-plastics.co.uk sales@omega-plastics.co.uk Office 01670 541 89
NATIONAL RESILIENCE
www.counterterrorbusiness.com
numbers of off-the-shelf purchases and greater promotion of defence exports.” On 2 November 2010, the Minister for Defence Equipment, Support and Technology, Peter Luff MP, and the Minister of State for Security and CounterTerrorism, Baroness Neville-Jones, announced at an event hosted by A|D|S that security issues would be included within the (renamed) Defence & Security Industrial and Technology Policy (DSITP). Announcing the new combination, Baroness Neville-Jones argued that a joint approach to defence and security industrial and technology strategy was needed for a number of key reasons. These included the need for industry to reflect upon the government’s outlook which increasingly treats security and defence as closely linked; the recognition that security and defence challenges are increasingly similar; and the realisation that technology challenges are overlapping, if not identical. Furthermore, technology has a role to play in both security and defence operations and many defence companies are security contractors (and vice versa). These are solid arguments and the rationale for the Minister’s decision to include security issues in the DSITP is to be welcomed. AN INTEGRATED APPROACH Industry has long argued that opportunities exist to identify areas where defence industrial capability can be deployed more effectively in security and resilience contexts, and vice versa. This new approach should allow the government to harness dual use technologies for effective national security, to identify economic efficiencies and to deliver a coherent overarching framework for industrial policy across both defence and security. Furthermore, there are some very specific areas where it makes sense to align security industrial and technology policy with defence. Firstly, there would be benefit in the clarification alongside defence of the industrial capabilities associated with security that the UK would wish to maintain onshore. The definition of what constitutes ‘operational sovereignty’ in national security and resilience is at an early stage of development. The benefit of including operational sovereignty for security purposes in the DSTIP is to provide the UK’s security departments and agencies with assurance that the country has the ability to deliver sensitive capabilities onshore. Secondly, benefits would be gained from developing an integrated science and technology programme across defence and security policy, and by increasing transparency around the resource choices that different departments and agencies may be considering over sponsoring research and development (R&D) for NS&R purposes. Greater transparency
The country’s new national security posture announced by the NSS, the SDSR and the forthcoming DSITP presents the UK security industry with significant new opportunities; especially around exports and in the development of science and technology for national security purposes and continued investment in science and technology will ensure that new security capabilities can be “pulled through” for use on the front line by both the military and the civilian first responders. There is a particular need to ensure adequate levels of R&D funding for defence and security purposes. Thirdly, the UK should strengthen its focus on the export of defence and security capabilities overseas. Like the SDSR process itself, the UKTI Defence & Security Organisation (DSO) brings defence and security together and could support a comprehensive approach to exports across these sectors. It is extremely encouraging that industry and government share the goal of achieving a major uplift in the performance of UK security exports with the government playing a similar role in security to that played in relation to defence exports. A major focus on security exports can help to generate economic growth and influence overseas security arrangements. Finally, alongside defence considerations it is important that the DSTIP pays special attention to the role played by, and the needs of, small and medium-sized enterprises (SMEs) operating in the security sector. Within the A|D|S membership, SMEs comprise 92 per cent of security-related companies with a heavy focus on upper tier technologies. This part of the security community is highly innovative and more can be done to maximise its contributions to national security and economic growth. RECOGNISING SECTOR DIVERSITY Whilst aligning industrial policy across defence and security will offer significant opportunities, the DSITP process must recognise that the defence and security markets differ in noticeable ways. It will be important to ensure that the process takes account of the maturity of the national security market, its structure and a variety of other unique characteristics. These factors are important to take into account because the defence and security markets operate in very different ways. They are also starting from very different baselines. For example, on the one hand it is widely accepted that the system for defence procurement is in urgent need of reform after decades of neglect. On the other
hand, the security market is in some senses immature and it is characterised by a much more diverse range of public and private sector customers. It will also be important to ensure that as the MoD leads on the defence elements of the DSITP the appropriate government departments involved in security issues – including in particular the Office for Security and Counter-Terrorism, the Centre for the Protection of National Infrastructure and all security-related departments in the Cabinet Office – are fully engaged with industry in the formulation of the DSITP. Furthermore, industry believes that new mechanisms will be needed to support the wider security aspects of the DSITP. A|D|S fully supports the main policy recommendation of the UK Security and Resilience Industry Suppliers’ Community (RISC) that there should be appointed within government an authority with the task of driving forward the measures that are necessary to realise the benefits that the security industry can bring, at home and internationally, through greater engagement. The work that flows from the SDSR through the DSITP offers a good opportunity to launch such an authority. CONCLUDING REMARKS At the launch of the engagement for the DSITP on 2 November, Baroness Neville-Jones explained that: “We need a joint effort between government and industry, building on our already fruitful relationship, in order to secure a greater percentage of the global security market.” The inclusion of security in the DSITP can help to realise this ambitious vision. The country’s new national security posture announced by the NSS, the SDSR and the forthcoming DSITP presents the UK security industry with significant new opportunities; especially around exports and in the development of science and technology for national security purposes. A|D|S and its members look forward to continuing to help to support the country’s national security and economic objectives through an even more fruitful partnership.
Hugo Rosemont is Security Policy Adviser to A|D|S and secretary to the Policy Committee of the UK Security and Resilience Industry Suppliers’ Community (RISC).
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
37
Inspection-class ROV made easy.
Easy to deploy. Easy to use. Easy to maintain.
Creating Environments
Temperature & Climatic Chambers Test & Evaluation Systems
The Predator-ROV is a low-cost, light weight, high capability inspection-class ROVs for shallow-water inspection, monitoring, and surveying jobs across the full spectrum of subsea and underwater industries.
Why the Predator?
➣ Know-How Built-In: by marine engineers with practical, hands-on experience ➣ Up To The Minute: the latest technology for high reliability and performance ➣ Meet Your Exact Needs: fullfeatured core, broad range Want to Learn More? of options That’s easy too… ➣ More Know-How Built In: email: sophisticated diagnostics info@predator-rov.com simplify maintenance Available worldwide, the PredatorROV is the first in a family of ROV’s from Global Marine Systems, an industry leader in subsea services for over 150 years.
or call: UK + 44 (0)1508 518046 USA: +1-703-251-4479
Tel: 01628 850611 www.unitemp.co.uk
www.predator-rov.com
3D MOUSE FOR ENGINEERS, DESIGNERS AND ARCHITECTS
It’s like holding the 3D model in your hand Discover what’s possible with a 3D Mouse... Redefine the way you work with 3D applications. Pan, zoom and rotate as if you are holding the model in your hand or fly like a helicopter through threedimensional worlds. It’s a level of control that’s simply not possible with a traditional mouse and keyboard. Whether you‘re creating dazzling 3D models or exploring virtual worlds, with a 3D mouse you can set your imagination free!
SpaceExplorerTM £ 199*
SpaceNavigatorTM for Notebooks £ 99* Free 14-day Test Drive
SpaceNavigatorTM £ 99*
www.3dconnexion.co.uk/testdrive facebook.com/3dconnexion twitter.com/3dconnexion
3Dx-Ad-ProductLine-178x125-EN-UK-v1.indd 1
* SRP excl. tax
SpacePilotTM PRO £ 299*
08.10.10 10:28
PORT SECURITY
www.counterterrorbusiness.com
PROTECTING PORTS
Alessia Vinerba, of the British Security Industry Association, investigates how an integrated approach to security can prove invaluable when protecting ports HE PRESSURE to maintain high levels of security measures in ports continues to rise as the threat of terrorism and challenges such as arson, theft and vandalism increase. Nowadays, ports are faced with multiple risks including intruders entering the site, and threats of terrorism, piracy and chemical, biological, radiological, nuclear and explosive (often referred to collectively as CBRNE) type attacks. The complicated structure of port premises also means there is a multitude of hiding spaces available for intruders who breach the perimeter defences or find their way onto the site by any other means. It has therefore never been more important to ensure that sturdy security measures are in place at all times. Most types of security breaches in ports can be countered by adopting what is known as an ‘onion ring’ approach, where several layers of security are used starting from the site’s perimeter all the way back to individual building security or main asset security in order to deter would-be intruders.
T
SECURING THE PERIMETER The outer perimeter layer is the key starting point in terms of physical
protection combined with electronic and/or a security patrol. Patrols with dogs can also be used. Fence-mounted vibration detectors can be used to monitor attempts to breach fencing, triggering an alert in the security control room. Thermal imaging is also an effective method used to spot intruders in darkness and adverse weather conditions, and can be used to detect stowaways and other unauthorised personnel. Ports often use this type of technology to detect whether there are intruders swimming in the water. MONITORING THROUGH CCTV CCTV systems are particularly effective in enhancing the security of ports, by acting as a deterrent to criminals and trespassers, while monitoring the activity of authorised
personnel such as staff and passengers. A specific element of CCTV, known as Video Content Analysis (VCA) is increasingly being used. VCA automatically analyses CCTV images, and is used to create meaningful information about the content. It can be used to automatically detect intruders, identify unattended baggage or count the number of people entering or leaving an area. CCTV systems can either be monitored by remote monitoring centres, or by security personnel on-site, both of which provide an immediate response to any suspicious behaviour. ACCESS CONTROL Should an intruder be successful in breaching the outer layer of port security, access control systems can represent the next crucial layer of protection beyond a site’s perimeter. The type of access control measure employed depends on the location and sensitivity of the building or area involved, ranging from paper-based logging systems through to access control cards using radio frequency identification
The complicated structure of port premises also means there is a multitude of hiding spaces available for intruders who breach the perimeter defences or find their way onto the site by any other means. It has therefore never been more important to ensure that sturdy security measures are in place at all times THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
39
PORT SECURITY
www.counterterrorbusiness.com
It is not easy to plan security for open and multifaceted spaces such as ports, but the key is to have in place a number of security measures that can complement each other (RFID) chips for more convenient proximity reading of card details and activation of gates, turnstiles and vehicle barriers. For higher risk locations, use of biometricbased systems such as fingerprint readers and iris scanners can be invaluable. Access control systems can also be used as a health and safety tool in the event of evacuation by quickly producing an accurate register of anyone within the building area. A PHYSICAL PRESENCE Security patrols by foot or by vehicle are fundamental for responding to intruder detection. They also play a crucial role in giving visitors and staff a feeling of security. This is particularly enhanced by the presence of security officers manning access points and by security patrols carrying out random patrols both in the buildings and in the perimeter area. Security officers play a vital part in port security
and are often responsible for managing technological aspects of a site’s security solutions, such as CCTV or access control. For those ports whose functions include the operation passenger vessels, passenger protection and luggage security checks are another essential part of port security. It is the most visible of security measures, and entails security checks conducted on all passengers before boarding boats and ships. Surprisingly, many of the staff involved in this process, including on-board customer service crew, are often contracted-out security personnel. This seamless, discreet presence enables security checks to be carried out with minimum disruption to passengers’ journey, while affording them full protection. INTEGRATING SECURITY MEASURES It is not easy to plan security for open and multifaceted spaces such as ports, but the key is to have in place a number of security
measures that can complement each other. Combining CCTV with access control and physical security measures such as fencing, bollards, doors and locks, backed up with security patrols can provide an overall security solution that is robust, effective and intimidating to would-be criminals. If you are new to procuring security solutions, or would benefit from some additional advice, enlisting the help of an expert on all aspects of security can be a great place to start. The unbiased advice of a security consultancy will provide a useful overview of the broad-based challenges faced by each individual premises, and can provide a tailored solution based on each client’s challenges, taking into account budgetary and resource limitations. The British Security Industry Association (BSIA) is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services, and adhere to strict quality standards.
FOR MORE INFORMATION Tel: 0845 3893889 E-mail: info@bsia.co.uk Web: www.bsia.co.uk
Metalise it ... Our Strength...
...Your Application
The strength of the Metalise it … process comes not just from the addition of metal on to plastic — but also from the experts at 3DDC. The company specialises in the metal plating of plastic parts utilising its proprietary Metalise it … process, which allows plating parameters to be adjusted to suit the application at hand to achieve the required layer thickness and metal finish. The key characteristic is that when the composite metal material is applied to the plastic part it adds a structural coating with demonstrable improvements to mechanical properties. Moreover, the Metalise it … process has seen great success with applications that require Electromagnetic Interference (EMI) shielding. The company offers full and partial metal plating options for EMI shielding with no electrical contact for sensitive areas. A metal layer thickness of 20–30µm is recommended. Furthermore, once the EMI copper shield has been plated, 3DDC can also plate an additional Nickel layer onto the product to achieve excellent anti-corrosion properties.
3DDC Limited Unit 4B, Hurst End Farm, North Crawley, Buckinghamshire, MK16 9HS T: +44 (0)1234 391 894 E: 3ddc@3ddc.eu W: www.3ddc.eu
40
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.counterterrorbusiness.com
SECURITY YOU CAN SEE Cargo terror bomb spurs new Label Lock™ launch, to assist shippers and screeners HE RECENT PLOT to detonate an ink cartridge bomb over the eastern seaboard of the USA has prompted a thorough review of aviation security, and particularly in the area of cargo, freight and parcel shipping. In turn, this has brought forward the latest Label Lock product launch. With increasing calls for more comprehensive known cargo screening, Security Labels International, the company manufacturing the famous Label Lock brand, has brought forward the launch of its tamper evident tape, to be known as Tape Lock. Hugo Gell, sales director, said this week: “Clearly there is a need to secure screened
T
for customisation. This was seen as an important feature in maintaining the highest integrity while keeping the costs to a minimum. Customisation will be available to those who wish to increase their brand awareness or differentiate their cargo quickly and easily. HIGHLY SECURE The new tamper evident tape is an addition to the now famous Label Lock brand of tamper evident security labels. These no-residue and dual layer labels are a highly secure, very effective yet simple and cheap solution, incorporating a host of features so they cannot be replicated, but are easily monitored. This saves hours
Clearly there is a need to secure screened cargo between the point of screening and its delivery to airside. Known cargo shippers need to ensure nothing can be added to or removed from the consignments before take-off cargo between the point of screening and its delivery to airside. Known cargo shippers need to ensure nothing can be added to or removed from the consignments before take-off. Regulatory bodies will now be looking very closely at this as a matter of urgency, and all forms of international cargo, freight and parcel shippers will be reviewing their procedures as a priority.” COST EFFECTIVE SOLUTION “In order to assist shippers in conforming to regulatory demands, we have announced the launch of a cost effective and quick way of confirming the integrity of scanned cargo as it travels between secured areas. Tape Lock can be wrapped around everything from pallets to envelopes, bags, boxes and parcels with ease. A sub-surface unique coded number every 15cm (6 inches) makes tracking and verification easy. If or when the tape is removed, an opened message will appear on the packaging and tape, making re-use impossible. In addition, the tape is translucent, so you can’t just add new Label Lock tape over the old opened message – you will be able to see the opened message through the tape.” The tape will be available in perforated 50m rolls, and application possible with a standard tape gun. Every roll will contain unique numbering through its length, making it unique, traceable and removing the need
of productive time for logistics and security managers, airports, airlines, buildings and perimeter managers – and provides peace of mind for anyone who comes across them. Because the surface of each security seal changes dramatically once removed to display the word ‘OPENED’, these labels have uses for a wide range of items from CD and DVD cases and laptops to aircraft, doors and documents. Whereas a padlock can be picked, or more than one person may have legitimate access, these labels will alert the inspector instantly if someone has gained entry. They can’t be replaced because each one has a unique sub-surface printed number. What’s more, there is no need to drill holes in doors
or install expensive monitoring equipment – Just Label Lock™ and leave. The website at www.labellock.com tells you the rest, and includes a helpful video of the labels in action. Distribution worldwide is handled through a network of carefully chosen distributor partners. THE SECURITY FEATURES Most so-called “security labels” are made from a bulk supplied that usually just consists of a wallpaper “void” text. Such materials are widely distributed, and so easily obtained by fraudulent printers. Label Lock™ labels have a clear border, and no wallpaper void text, making it impossible to construct from bulk rolls of material. Even the unique serial numbers are encoded and sub-surface printed to ensure they can be traced but can’t be altered. So every label is unique, but available off the shelf in convenient rolls, packed into numbered dispenser boxes. This removes the need for customisation, making life easier, quicker and cheaper. • Use no residue to protect aircraft, doors, hatches and panels and windows, exits and furniture. • Use dual layer for documents, seals, plastic bags and disposables. • Use tape to secure cargo, shrink-wrapped pallets, boxes, bags, packaging and parcels. Label Lock is manufactured solely and securely by Security Labels International, experts in bespoke tamper evident labelling.
FOR MORE INFORMATION For more information on a wide range of security label solutions, please see the websites at www.securitylabels.com and www.labellock.com. Covert and bespoke versions of Label Lock are also available, please e-mail for more information sales@securitylabels. com, or call +44 (0)1543 431099.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
41
AVIATION
www.counterterrorbusiness.com
ARE THE DOTS STILL DISCONNECTED? Airfreight has been acknowledged as the soft underbelly of aviation security. So isn’t it high time that we re-evaluate this failed security regime, questions Chris Yates HEN PRESIDENT Obama famously spoke of a “failure to connect the dots” earlier this year, he was speaking about the attempted bombing of Northwest Airlines Flight 253 on Christmas Day 2009. Obama promised swift and decisive action to fix the issues that led to an Al-Qaeda in the Arabian Peninsula (AQAP) operative, Umar Farouk Abdulmutallab, getting on the plane with an improvised explosive device (IED) and attempting to detonate it during the descent to Detroit Metro Airport. So when two powerful and deadly IEDs were discovered in airfreight at East Midlands and Dubai airports in late October, their discovery was said to be proof of effective intelligence-gathering thwarting another attempted terrorist strike.
W
PLANNED INTERDICTION OR GOOD FORTUNE? Press reports suggest information about the plot came from Jaber al-Faifi, a repentant AQAP operative, who handed himself over
42
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
to the Saudi Arabia authorities two weeks before the IEDs were found. His status is unclear. We’re told he had been an inmate at the Guantanamo Bay detention facility, had subsequently been repatriated to Saudi Arabia and had undergone a well-publicised rehabilitation programme. Apparently he then went off the radar, joined AQAP in Yemen and reappeared on that same radar just prior to shipment of the IEDs. This appears far-fetched to many sources. Most of them suggest that Jaber al-Faifi had been turned by the Saudi authorities, that he was probably acting as an intelligence resource in Yemen and only resurfaced after belatedly discovering that the IEDs were
in motion. This version of events makes more sense, not least because it seems inconceivable that Saudi Arabia would sit on information of this magnitude until the 11th hour. However, it does suggest that the discovery of the IEDs came about through good fortune, rather than wellplanned interdiction. Whatever the truth behind Jaber al-Faifi’s involvement, we are now certain that AQAP was behind the plot. MASTER BOMB MAKER We are also pretty certain that the master bomb maker was Ibrahim Hassan Tali al-Asiri. He is thought to be hiding out with AQAP’s leader, Nasser al-Wuhayshi, a former aide to Osama Bin Laden, under the protection of local tribes in the mountainous Yemeni governorates of Shabwa and Marib. Ibrahim Hassan Tali al-Asiri and his brother, Abdullah, are said to have disappeared from the family home in the holy city of Mecca in 2007. In August 2009, Abdullah carried out an unsuccessful suicide attack on Saudi Arabia’s deputy interior minister, Prince Mohammed Bin
When two powerful and deadly IEDs were discovered in airfreight at East Midlands and Dubai airports in late October, their discovery was said to be proof of effective intelligence-gathering thwarting another attempted terrorist strike
AVIATION
www.counterterrorbusiness.com
Nayef. He wore a device designed to evade the airport-style security which protected the prince. Forensic examination revealed the force of the blast went downwards, as evidenced by a crater in the concrete floor of the Jeddah offices where he met Bin Nayef. This is thought to be the primary reason the deputy interior minister suffered only minor injuries. Ibrahim Hassan Tali al-Asiri made the IED worn by his brother and the device is believed to have been very similar to the one worn by Umar Farouk Abdulmutallab. At least one of the IEDs discovered in the recent airfreight attempts in East Midlands and Dubai, contained a detonator strikingly similar to one made for Abdulmutallab. HONING SKILLS It is becoming painfully evident that Ibrahim Hassan Tali al-Asiri has intimate knowledge of how the aviation security system works, the capability of the technology deployed to prevent IEDs from being spirited aboard aircraft and where the weak points exist. The devices seen so far have all contained the highly explosive Pentaerythritol Tetranitrate (PETN) in various quantities. PETN can be mixed with a plasticiser to form Detasheet/Primasheet and is a constituent of Semtex. Lead Azide, an inorganic compound often found in detonators, has allegedly been discovered in at least one, if not both, of the airfreight IEDs. Both these components are produced in powder form and have clearly been selected to limit the possibility of detection. Airfreight dockets attached to the parcel found at East Midlands Airport apparently show that it was x-ray screened in both Yemen’s capital, Sana’a, and Dubai, before being transshipped via Cologne, onwards to Philadelphia and then Chicago. An initial examination of the parcel revealed nothing and it’s understood to have been re-cleared for flight when information came from the Dubai authorities that prompted a fresh examination. Bundeskriminalamt (BKA) investigators have received copies of the x-rays from Dubai and admit that German security staff would not have identified the explosive either. Had the device not been intercepted, the Metropolitan Police says it was timed to explode somewhere over the United States eastern seaboard. The level of skill exhibited in the construction and concealment of both airfreight IEDs, grimly indicates that the master bomb maker continues to hone his expertise. Ibrahim Hassan Tali al-Asiri came perilously close to taking an airliner out of the skies, but the next time around he may very well succeed. AIR SECURITY CONUNDRUM Whenever the threat cannot be sensed by one method or another, it is fair to conclude that a potent threat exists.
44
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
Passenger facing security systems in some parts of the world have an inbuilt ability to identify the presence of the likes of PETN. The same can’t be said of the cargo environment. Organisations like the International Federation of Airline Pilot Associations (IFALPA) and the British Airline Pilots Association (BALPA), have consistently warned that airfreight remains the soft underbelly of aviation security Passenger facing security systems in some parts of the world have an inbuilt ability to identify the presence of the likes of PETN. The same can’t be said of the cargo environment. Organisations like the International Federation of Airline Pilot Associations (IFALPA) and the British Airline Pilots Association (BALPA), have consistently warned that airfreight remains
the soft underbelly of aviation security. The system is geared towards relying on security at the departure airport, says German Interior Minister, Thomas de Maizière. Security processes at point of airfreight origin represent the glue holding a flaky system together. Perhaps it’s high time that we re-evaluate this failed regime and get real about air security?
AVIATION
www.counterterrorbusiness.com
PREVENTING UNWANTED VEHICLE INCURSION Townscape’s CT Blocks are designed to effectively prevent unwanted vehicle incursion into a zone around a building or other secure area projecting a strong visual deterrent
N RECENT DECADES continuing terrorist threats have resulted in heightened security globally, raising awareness of the various risks to public safety and buildings, particularly at airports. This was thrown into sharp relief by the incident at Glasgow Airport in 2007 when two terrorists crashed a jeep into the main terminal building shattering glass doors only yards from passengers queuing at check-in counters. UK airports recognised the increased urgency for innovative and robust vehicle defence systems at their terminals. Manchester, Cardiff, Belfast, Gatwick and Heathrow all chose to install CT Blocks (Counter Terrorist) manufactured by Nottinghamshire-based Townscape Products Limited. The over-riding priority was security but the design of the blocks also lent itself to imaginative landscaping. VISUAL DETERRENT Townscape’s CT Blocks are designed to prevent unwanted vehicle incursion into a zone around a building or other secure area including busy pedestrian plazas. Obviously protected areas adjacent to vehicle drop off points must also facilitate the easy passage of high volumes of pedestrians. The installations are usually in “front of building” locations and, while projecting a strong visual deterrent, need also to complement the surrounding building fabric and landscaping. The CT Blocks are manufactured from a unique reconstituted natural stone mix using specially selected aggregates. Townscape recommends an exposed
I
aggregate finish that is both attractive and robust. Additional quartz rich Cornish fines can be added to enhance the finish of the exposed natural stone. They are cast around a steel reinforced frame that connects to four stainless steel inserts for lifting with eyebolts. Each Block weighs 2.2 tonnes and is manufactured to the PAS 68 standard (N2-7500-48). The units were tested and approved at TRL for CPNI. The dimensions of a typical Block are 1,490mm long by 990mm depth by 600mm high. The Blocks can be installed in different orientations to suit specific client requirements. They only need to be recessed into the surrounding tarmacadam, concrete or paved area to a depth of 100mm. The installation of the blocks is very straightforward – the surface of the recessed area merely needs to be flat and parallel with the road surface from which any approach to the defensive block would be expected. COST SAVINGS The installation of CT Blocks can generate overall project cost savings of around 50 per cent over fixed bollard solutions. The savings result not only from a lower unit cost for the blocks but also, more significantly, from a substantially lower installation cost due to the absence of major groundworks. As the installation does not require deep foundations there is no need to re-route underlying services. The lack of disruption associated with this method of installation has been a major consideration for Townscape’s clients. Manchester wanted to prevent unwanted vehicle incursion onto the busy pedestrian
plazas at the front of its airport terminals adjacent to the vehicle drop off points. The additional measures were required at the Departure and Arrivals of T1, T2 and T3 terminals. Following the Glasgow incident Manchester Airport reacted vigorously. However, rather than view the additional measures as a hindrance to the normal operation of a very busy international airport, Manchester grasped the opportunity to incorporate the required changes with revised public transport and taxi drop off arrangements. The changes not only improved customer transit times but also enhanced the whole airport appearance. Townscape’s CT Blocks combine the elements of form and function perfectly and when installed the blocks collectively convey a strong visual deterrent while adding an attractive feature to the open plaza. The easy installation meant a minimum of disruption for this busy airport, reflected in costs that were lower than those for other solutions. ENHANCED SECURITY Cardiff Airport has installed a line of Townscape’s CT Blocks at the airport perimeter between the Passenger Terminal and the car park. Cardiff’s growing prosperity, including the arrival of the Ryder Cup competition at Celtic Manor, faster access to the city centre and increased traffic, meant an increase in the strategic importance of the airport to the city and to the local economy. The major refurbishment at the airport to accommodate the increase in passenger traffic needed to incorporate enhanced security measures. Gatwick Airport also chose Townscape’s CT Blocks during recent developments to modernise and improve access to its airport. The CT Blocks have been used in many other locations including transport hubs, heritage sites, MOD facilities, police stations and other public buildings. Townscape is one of the UK’s leading manufacturers and suppliers of a wide range of quality street furniture, shelters, covered walkways, paving and vehicle defence products. Its products can be produced in various materials including cast iron, steel and stainless steel, concrete, timber, polymer and aluminium. Townscape’s manufacturing flexibility means it can offer bespoke designs and adapt its own products to suit any requirement.
FOR MORE INFORMATION
Tel: 01623 513355 E-mail: sales@townscape-products.co.uk Web: www.townscape24.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
45
far more to come
9-15 July
2012 www.farnborough.com
AVIATION
www.counterterrorbusiness.com
FARNBOROUGH SHOW FOCUSES ON SECURITY 2010 event proves Farnborough is far more than just an Airshow HE 47TH FARNBOROUGH International Airshow (FIA) took place earlier this year and 2010 proved to be another superb year for the biennial event which is organised by Farnborough International Limited (FIL). The world’s largest temporary exhibition, the Airshow is held at the historical Farnborough Aerodrome and is one of the most prestigious trade events in the world, with a long and distinguished tradition for showcasing aviation technology from the UK and abroad. At this year’s show, more than 107,000 sq m of exhibition space was sold to 1,455 exhibitors from 40 countries; orders were announced of more than US$47bn; 120,000 trade visitors attended over the five trade days and 70 delegations visited from 44 countries. EXHIBITORS Representation from the worldwide security industry was stronger at Farnborough in 2010 than ever before. Some of the show’s biggest exhibitors are companies such as BAE Systems, Lockheed Martin, Raytheon, Northrop Grumman and Finmeccanica, to name but a few, all of whom are currently highly active in the security and resilience marketplace. One of the main highlights of this year’s show was a programme of themed conferences, a first for Farnborough. Each trade day was themed around a specific industry sector with the aim of the conferences being to focus on key issues surrounding the sector, to
T
provide a platform for engaging with the new government and to offer more targeted opportunities for networking. THE SECURITY CONFERENCE The Security Conference took place on Thursday 22 July and was the vehicle for the first major speech by the coalition government on the industrial contribution to national security and resilience, given by Baroness Neville-Jones, Minister of State for Security and Counter Terrorism. Echoing one of the aims of the organisers for the conference itself, the Minister addressed
the need for better interaction and a closer relationship between government and industry. She also highlighted that the security industry has a huge amount to offer by way of innovative solutions to security problems and stressed the need for UK industry to develop a stronger focus exporting security capabilities overseas. As with the advent of the conference
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
47
Save time, money, and effort Easy, versatile modular assembly solution.
Equipment Sales and Bureau Service
The MiniTec Profile Building System ■ ■ ■
■
Easy to use No power tools required Standard and customised solutions Cutting service ce
n Steinbichler Comet 5 Technology 1.4 to 11.0 Mega Pixel (fringe projection) All new Steinbichler Comet 5 with modular design with more measurement fields of view and increased resolution. n Steinbichler Latest Software New Inspect Plus 5.0 Inspection Software New Comet Plus version 9.0 Software New T-Scan Plus version 9.0 Software n Steinbichler T-Scan 3 Laser Scanning Technology New capabilities within laser scanning Now able to scan gloss black and chrome !!! n Artec Scanner Technologies As UK agents Central Scanning continues to broaden its range with MH, MHT & L scanners n Aicon agents Central scanning now offer DPA Pro and Move Inspect with their extensive range of scanning solutions
FREE samples FREE design advice ce FREE design toolss Contact us now and see how easyy MiniTec is to use and adapt. Limitless range of applications including: Machine Guards, Workstations, Conveyors and Customised Enclosures.
Call us today to discuss how we can help you. Alternatively, come in and see us.
THE ENGINEER’S CHOICE
T: 01256 365605 E: info@minitec.co.uk www.minitec.co.uk 15957 MiniTec 275x92mm ad .indd 1
Tel:01527 558282 Email:sales@central-scanning.co.uk Web:www.central-scanning.co.uk
6/9/10 15:45:50
AVIATION
www.counterterrorbusiness.com
programme, the main objective for FIA organisers in 2010 was to work together with parent company A|D|S to develop further new means by which to add value for exhibitors and visitors from all sectors taking part in the show. Significantly for the security sector, another new concept for 2010 and one which has not yet been done at any other airshow in the world was that of indoor UAS flying demonstrations. These happened in one of the exhibition halls with companies such as Air 2 Air and Aurora Flight Sciences taking part in a daily programme of flying displays, which were accompanied by seminars and drop in advice clinics for UAS manufacturers and developers. Daily UAS flying demonstrations also took place outdoors just before the main flying displays began. SCIENTIFIC DEVELOPMENT EXHIBITION Though only a few SMEs in the UAS and security markets currently have a presence as exhibitors at Farnborough, a much greater number will be present at next year’s Home Office Scientific Development Branch exhibition (HOSDB), which is also held at Farnborough. This event moved to Farnborough in 2010 and saw its largest exhibitor presence ever with 360 companies displaying thousands of products and solutions for the world’s law enforcement and security community. HOSDB 2011, which will take place 22-24 March is expected to be another
The world’s largest temporary exhibition, the Airshow is held at the historical Farnborough Aerodrome and is one of the most prestigious trade events in the world, with a long and distinguished tradition for showcasing aviation technology from the UK and abroad well-attended event and one of great significance with the spotlight of the recent Strategic Defence and Security Review (SDSR) highlighting everincreasing requirements for solutions for civil emergencies, national resilience, cyber security and counter-terrorism. NEW INITIATIVES Traditionally, companies have used FIA as the stage on which to announce major deals, as well as to launch new initiatives to an international trade audience and the many thousands of media that attend the show. An important announcement for the security industry to take place at Farnborough 2010 and one which will also be particularly significant to the SME community within the UK security industry was the launch by the Office for Security and Counter-Terrorism (OSCT) of its new initiative in conjunction with Thales, known as the INSTINCT – Technology Demonstrator 2 (TD-2). This project aims to encourage
industrial innovation by trialling new technologies, solutions and ideas, which can be submitted by any sized business or academic institution and which could be used to enhance aviation security. As it did following its 2008 event, FIL is currently undertaking a strategic review of this year’s show, speaking to exhibitors and visitors and gathering feedback with which it will formulate plans for moving forwards in the planning of its next event in 2012. Based on feedback received at the event itself, FIL has already highlighted its commitment to develop the security presence at Farnborough and the company plans to continue with the themed conference programme as well as build on the initial progress it has made with regards to UAS participation and grow this concept with a more complex demonstration area and better facilities for viewing and networking. The next Farnborough International Airshow will take place 9-15 July 2012.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
49
Trusted to protect the networks and the critical information of the world’s most secure organisations. Law enforcement agencies throughout the world are faced with an ever increasing Cyber security threat. However, mention Cyber security and almost everone will immediately think of virus protection, Trojans and other PC attacks. They will tell you they use firewalls and a host of protection software. These are perfectly good safeguards for keeping the bad guys out and it’s fine if your organisation keeps the data secure within and never sends information beyond the perimeter walls. Unfortunately, today’s agencies just do not fit that description. Inevitably they need to send and receive data across the Internet or external networks. In the conduct of their business the police and other law enforcement will constantly move data from one location to another; from head offices to data centres, to disaster recovery centres for data back-up and other critical purposes. Once the data leaves the company’s physical network, even if it is travelling on a telecommunications provider’s network, all the anti-virus protection and event detection becomes irrelevant. The information is in the public domain.
The SENETAS family of network encryptors secures your network to internationally recognised standards with no loss of quality. SENETAS encryption technology provides simple transparent security to protect sensitive data in transit.
SENETAS has an excellent record for securing law enforcement and defence agencies worldwide.
Protocols Sonet/SDH ATM
OC3
OC12
OC3
and OC12
Fibre channel
1G
OC48
2G
and OC192
and 4G
Ethernet Link
10M
100M
1G
10M
100M
1G
10G
2M
Throughput Senetas Europe Limited
Phone: +44 1256 345599 Email: corporate@senetas-europe.com
10G
www.senetas-europe.com
POLICE & LAW
www.counterterrorbusiness.com
INCIDENT MANAGEMENT THROUGH TECHNOLOGY BAPCO 2011, taking place 13-14 April, is the must-attend event for counter terror communications professionals APCO is a unique annual event presenting the latest services and technologies for all professionals in the business of inter-agency communications and data management in major incidents and emergency situations of all kinds. BAPCO 2010 saw leading decision makers and influencers attend from all quarters of public safety communications including members of local and central government, the emergency services, utilities, transport, fire authorities, MOD, British Army, Department of Health and the police. Following on from the success of BAPCO 2010, the BAPCO 2011 Conference and Exhibition will take place from 13-14 April 2011 at The Business Design Centre in Islington, London. The two-day event offers a comprehensive conference programme and exhibition, a wealth of networking and learning opportunities for attendees, and a unique opportunity to sample the latest technologies that will shape the future of the industry. The call for papers has now closed. The conference programme is being finalised at the time of writing, and promises
B
high-level speakers addressing the key issues facing the security communications business. The theme for next year’s conference is ‘Delivering Lower Cost Incident Management through Technology.’ Designed to educate and inform the conference will address how to deliver success at a time of exceptional demand, unanticipated threat and financial restrictions, with a focus on these key areas: KEY FOCUS • How particular approaches have saved lives, reduced casualties and enhanced communication at a reduced cost for your organisation and/or across services • Forward planning for the 2012 Paralympics and Olympics and other major events, incorporating past learning and upcoming technologies • The utilisation of the best technologies in critical major incident management • The challenges faced by emergency services, utilities, transport, and similar bodies in response to the new financial restrictions facing them With increasing budgetary pressure on
communications professionals involved in incident management, counter terror and business continuity, the BAPCO 2011 conference and exhibition provides an essential meeting point to discover solution technologies and services as well as cost saving options. An exciting new development for BAPCO 2011 will see live demonstrations taking place in the exhibition hall with representatives from the three emergency services working together in a rescue scenario live in the exhibition. Look out for canine device detection, body identification technology, and an abseil from the roof of the exhibition hall. In addition Excelerate will show off the latest in mobile command technology in the outdoor display at the front of the hall. The BAPCO 2011 exhibition is free to attend and open to all emergency services and local and national governmental agency professionals engaged in incident management, civil contingency response, disaster relief, business continuity and information management.
FOR MORE INFORMATION Web: www.bapco.co.uk
COUNTER TERRORISM DESIGN FROM CONCEPT TO COMPLETION ROSYNC PRIDES ITSELF on its in-depth technical ability and understanding of electronics for the counter terrorism world, enabling us to precisely meet the customers’ needs with the core competences that benefit the whole supply-chain. Prosync Ltd has an extensive knowledge and expertise in the design and development of electronics equipment using switched technology for the commercial and defence worlds. We use a Systems Engineering approach to develop your hardware/ software requirement. Whatever your requirement,
P
Prosync will design, development and plan the right equipment to give a “ready to market” product, this includes: • PCB design and layout • Custom electronics design • Product development • Product prototyping • Electronic design process • Systems architectures Prosync Ltd focuses on developing special relationships with universities, commerce and industry to give you the right product.
FOR MORE INFORMATION Tel: 07771 643205 E-mail: info@prosync.co.uk Web: www.prosync.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
51
POLICE & LAW
www.counterterrorbusiness.com
MAXIMISING AIR POLICE CAPABILITY A new National Police Air Service is set to provide a more efficient and accessible air support service throughout England and Wales that offers better value for money ESPONDING to the findings of a comprehensive review commissioned in 2009, Association of Chief Police Officers (ACPO) members have approved the central recommendation to replace the current air support system with a service organised nationally, but delivered locally. The government has expressed a commitment to establishing the National Police Air Service (NPAS) by April 2012. An ACPO led project team has been supported by the National Policing Improvement Agency (NPIA) to develop an implementation plan for this national service.
R
A CO-ORDINATED WAY OF WORKING Previously air support in England and Wales was primarily delivered locally and independently – there were 30 Police Air Support Units (ASU), operating 33 aircraft. In 2009 a comprehensive review commissioned by CC Bernard HoganHowe identified serious inefficiencies with current arrangements – both in terms of cost and capability. ACPO and the Policing
Portfolio Group therefore approved its central recommendation to replace the current system with ‘a national service, organised regionally and delivered locally.’ In difficult financial times, NPAS illustrates how the police service is pro-actively moving towards a national, co-ordinated way of working. The new service will work collaboratively to provide capability from the air that maximises the delivery of frontline public services, but with a lower cost than services procured and managed on a local basis. The proposed model predicts a saving of an estimated £15.27M (22.8 per cent) over current provision. OPENING AIR BOUNDARIES Head of the NPAS, chief constable Alex Marshall said: “This is not merely a cost saving exercise. While the current service is capable of doing its day job, artificial boundaries have meant that helicopters are restricted to operating within their own force area. A national, borderless service will ensure effective coverage of urban and rural areas.” Deputy chief constable, Nick Gargan,
acting chief executive of the National Policing Improvement Agency said: “This will be a truly national policing service that will be at the heart of improving public safety. The NPIA has played a substantial role in helping to set up the service which will bring operational efficiencies and allow for the introduction of innovative contracts that offer better value for money for the service and the tax payer.”
FOR MORE INFORMATION Web: www.acpo.police.uk Web: www.npia.police.uk
ABOUT ACPO The Association of Chief Police Officers (ACPO) is an independent, professionally led strategic body. In the public interest and, in equal and active partnership with government and the Association of Police Authorities, ACPO leads and co-ordinates the direction and development of the police service in England, Wales and Northern Ireland. In times of national need ACPO, on behalf of all chief officers, coordinates the strategic policing response. ACPO’s 341 members are police officers of Assistant Chief Constable rank (Commanders in the Metropolitan Police and City of London Police) and above, and senior police staff managers, in the 44 forces in England, Wales and Northern Ireland, and other forces such as British Transport Police and States of Jersey Police.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
53
100% Guaranteed Secure Data Destruction • On-site secure hardware destruction • Data capture and auditing of assets • On-site secure data erasure • Data centre decommissioning • Secure logistics • Data and hardware destruction to the highest international standards • Secure vehicles with operators cleared to DV standards • Unique online asset tracking system • All materials recovered and recycled in full compliance with legislation Standards include: ISO 9001 Quality Management, ISO 14001 Environment Management, OHSAS 18001 Health and Safety Management systems and working in accordance with ISO 27001 Information Security Management system. One of the world’s 100 most sustainable corporations.
0845 604 7317
www.SimsRecycling.co.uk
Certificate No. OHS 511434
Certificate No. EMS 93774
Certificate No. FS 37108
POLICE & LAW
www.counterterrorbusiness.com
DATA DESTRUCTION – CAN IT BE GUARANTEED?
Data security has fast become the biggest headache for anyone responsible for equipment that contains confidential information, says Sims Recycling Solutions NE OF THE BIGGEST challenges is how do you get rid of data when it’s no longer needed? What do you do with all those hard disks, police radios or back-up tapes when they have retired from use or are replaced due to failure? Currently many organisations feel forced to store such items as they are not aware of any alternatives. However, the Computer Electronics Security Group (CESG) guidelines around the amalgamation of data mean that relatively low risk data once stored can soon increase in impact level as quantities build. MOBILE SHREDDING SERVICE Sims Recycling Solutions has the answer in the form of its highly successful mobile shredding service using the Sims Disk Shredder 6.0M. The disk shredder is a mobile unit that can come to your site and is able to securely destroy to government standards any form of magnetic media or any device that could contain sensitive information. These include hard disks, DLT tapes, CDs, PDAs, USB sticks, police radios and even whole laptops and PCs. Fully accredited and approved by the Defence Product Co-operation Group (DIPCOG), the Sims Disk Shredder is approved to destroy data up to and including the category of Top Secret.
O
Sims Recycling Solutions’ operatives are SC cleared as standard and upon request, DV cleared staff can perform the service at your site. PEACE OF MIND Sims Recycling Solutions’ security consultant Chris Stevens, says the increase in demand is ultimately to do with peace of mind. He explains: “By taking this vehicle around the country, we have been able to show clients and potential clients the total on-site data destruction process that is carried out inside the vehicle. People are very impressed by the process but I think the deciding factor is that they can witness the process themselves. “The security sector is only too well aware that data security goes far beyond just protecting the organisation. It is paramount and for many clients it is simply not an option to allow data to leave their site. By having the destruction procedure carried out on-site at their own premises, they can physically watch, monitor and audit the entire process first hand, from start to finish. This provides them with complete peace of mind that all of the data has been totally destroyed. I am convinced that this peace of mind is what is driving demand.” Sims Recycling Solutions’ on-site data destruction services are designed to
ensure that all sensitive data is destroyed and that the process is fully auditable. The data destruction vehicle carries the company’s unique online tracking system, WebView, which enables clients to track the destruction of their data/assets. The data/assets are firstly captured in WebView before being shredded down to particles no larger than 6mm in size. This guarantees the total destruction of both the data and the hardware. A Certificate of Destruction can then be provided prior to the vehicle leaving site. MAXIMISING SECURITY Chris concludes: “Many organisations have reviewed and changed their data security policies in light of new legislation and the fines being imposed by the Information Commissioner’s Office. Many – especially the intelligence services, police and military sectors – have found that our on-site data destruction vehicle provides the best option if they are to maximise data security, prevent data loss and avoid heavy fines. We are expecting demand to continue to rise as a result.”
FOR MORE INFORMATION Tel: 0845 050 8470 Web: www.simsrecycling.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
55
Delivering lower cost inciDent management through technology Business Design Centre, Islington, London | Conference & Exhibition: 13-14 April
The annual conference and exhibition for all professionals in major incident public safety communications and information management
Images courtesy of Hertforshire Fire and Rescue Service, British Transport Police and Frequentis
exhibition
• Over 100 specialist suppliers showcasing the latest equipment, technology and information & data management systems • Gain expert advice on the use, implementation and management of communication equipment • Compare and source new products, systems and services direct with the supplier
conference
• Dual conference streams offer delegates a wider variety of key topics • Recognised as a vocational training opportunity that can count towards CPD points • Explore how the latest technology can help deliver lower cost incident management and how to meet the challenges faced by emergency services, utilities and transport
for exhibition and conference enquiries, contact: lucy mcPhail t +44 (0)20 7973 6635 e l.mcphail@hgluk.com
Jude coverdale t +44 (0)20 7973 6671 e j.coverdale@hgluk.com
For more information visit www.bapco.co.uk
POLICE & LAW
www.counterterrorbusiness.com
GREEN LIGHT FOR FLAG’S BLUE LIGHT REMARKETING PROCEDURES F OLLOWING A RECENT VISIT, NHS Security Management Service personnel from the Ambulance Sector Counter Terrorism & Security division, praised The Fleet Auction Group (FLAG) for its procedures when remarketing blue light vehicles. Strict guidelines, embodied in Fleet Operations Procedures 44 (FOP 44), are in place for the disposal of all front line ambulances, PTS vehicles Chris Jager, sales and business and any support vehicles. development manger at FLAG said: “As Nicholas Chang, senior policy officer with a remarketing company for ex-blue light the NHS Security Management Service fleet vehicles, we have a responsibility to and one of the people who visited FLAG ensure full accountability and on-going commented: “As an organisation we take traceability for the vehicles that pass the threat of a blue light ex-NHS vehicle through our hands. We adhere strictly falling into the wrong hands very seriously. to the detailed FOP 44 guidelines in When we reviewed how NHS trusts dispose all remarketing for this sector.” of their ambulances, the Fleet Auction When it came to choosing a remarketing Group was keen to engage with this work. partner, East Midlands Ambulance “Having worked with the company on Service (EMAS) chose The Fleet Auction formulating guidelines and standards Group for all the service’s ambulances, we have been impressed with their patient transport and support vehicles. dedication to security in this area, their EMAS operates 820 vehicles: Renault proactive campaigns such as ‘Blue Lights Masters, Mercedes Sprinters, Vauxhall lift Barriers’ and their policy of corporate Movano are on the frontline, Volvo, social responsibility. We are pleased to see Skoda, Ford Focus, Toyota Rav, for these examples of good practice by the response vehicles and Renault Master, Fleet Auction Group and look forward to VW Crafter, Fiat Ducato, Citroen Dispatch Blue light advert CT 12/11/10 12:41 pm Page 1 continued future engagement with them.” and Skodas for patient transport.
Around 70 per cent of the fleet is owned with approximately about 30 per cent on lease. The service currently operates on a seven-year replacement policy, although Andy Watson, assistant manger for fleet services at EMAS, says they are aiming to reduce this to five years over the coming months. Under the solus agreement, all the owned units will be remarketed through FLAG; around 90 in 2010 due to the large intake of new vehicles this year. Residuals are set in conjunction with FLAG. “Our vehicles are usually well used when they arrive at FLAG, so no reserves are set,” Watson commented. “We tend to know from experience how much they will fetch, but every now and again we will attend a sale of EMAS vehicles in person just to ensure our thinking is in line with current market trends.” Key to the deal were FLAG’s strong corporate social responsibility policies and high services levels. “We get excellent service from Chris Jager and the team at FLAG – quick turn around, decent returns from sales, strict adherence to FOP 44 and a ‘can do’ attitude,” Watson says.
FOR MORE INFORMATION Web: www.fleetauctiongroup.com
Blue lights lift barriers. Who are YOU selling to?
Don’t let a terrorist’s dream become your worst nightmare Disposing of ex blue light and security vehicles? Be sure they are properly de-commissioned and only offered to verified motor trade professionals.
Call The Fleet Auction Group now on 01530 833535. The Fleet Auction Group Ltd, Brindley Road, Stephenson Industrial Estate, Coalville, Leicestershire, LE67 3HG Tel. 01530 833535 Fax. 01530 813425 Email: chris.jager@fleetauctiongroup.com www.fleetauctiongroup.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
57
A NOSE FOR TERROR
Wagtail UK Train Detection Dogs to Sniff Out Trouble They provide highly trained dogs around the world for Governments, the Military, Police Forces and Sporting Venues to name but a few. Why has this company become such a vital partner for so many in the detection against international terrorism?
Wagtail UK Ltd was established in October 2002. Since then the company has grown rapidly by size and reputation into the UK’s leading specialist dog company, providing their bespoke services worldwide. In the UK the company provides specialist dogs for the Civil Police, Armed Forces the UK border Agency as well as the private security industry. Internationally the company already supplies dogs and related services to the Middle East, Mainland Europe, Africa, North America and the Far East.
claim within their highly sought after portfolio of clients the likes of the UK Border Agency, The construction site of the 2012 London Olympic Games, Civil Police Forces, Ministry of Defence, The Defence Animal Centre, Mostyn Estates, Private Investigation Companies, Leading Aircraft Manufacturers, Paris International Air Show, Farnborough International Air Show, major sporting venues as well as other exclusive customers for whom for obvious security reasons cannot be named herein.
The rapid growth of the company during the last 18 months is in large part due to securing two of the highest profile European contracts available under tender, in addition to securing other key contracts internationally. As a company Wagtail UK provides dogs to detect explosives, firearms, drugs, cash, tobacco, live bodies, human remains (cadaver) and also provides search and rescue/disaster search dogs. Such is the quality of their work, in 2008 Wagtail UK was the first private company to supply dogs at the construction site of the 2012 London Olympic Games supplying explosive detection dogs, drug detection dogs and security/patrol dogs. In addition to the Olympic contract, shortly afterwards they were also awarded the highly sought contract to supply body detection dogs to the Home Office, UK Border Agency in Northern France.
Wagtail UK are now truly an international company, providing dogs to the most hostile of environments in the Middle East, delivering seminars in Singapore to the Singapore Police, its armed Forces and Homeland Defence. Other overseas clients include Kudumba (Mosambique) and EWT
Wagtail UK staff are continually working with UK Border Agency officers in Northern France to search freight and ensure that the UK’s border security is maintained to the highest of standards. This contract supplements the work of existing UK Border Agency dog teams and will mean that the success of body detection dogs can be expanded and used to search freight 24 hours a day, 7 days a week, 365 days a year. Such is the quality of the work, the professionalism coupled with the success tally of searches Wagtail UK were nominated for a Home Office Supplier Value Award after just 3 months of UK border Agency operations in 2009 and have received a further nomination in February 2010. In addition to this vital work, Wagtail UK also provides Drug Detection dogs for the Police. Assisting with drug searches at licenced premises, business premises, factories, transport and to carry out search warrants. Wagtail UK often work hand in hand with the Police within schools as part of a drug awareness scheme or health and safety week at the schools as part of a drugs education programme.
Explosive Detection Dogs – Middle East
Explosive Detection Dogs – Middle East
(Endangered Wildlife Trust, South Africa). Wagtail UK are available for consultancy and project management should the client require the expertise of over 30 years in this key sector, Wagtail UK’s global client base alone is testimony to just how specialist and well respected they are in terms of the services they provide. Approved by the Career Transition Partnership (CTP) of the Ministry of Defence to deliver courses to service leavers, the courses and training are based on the British Military and Civil police methods of training incorporating ACPO guidelines. So what’s in store for Wagtail UK during 2011 and beyond? Undoubtedly it will continue to build on its excellent reputation to deliver its professional services either by supply of specially trained dogs with or without handlers detecting the threat of terrorism encompassing the ongoing search for explosives, firearms, drugs etc. as well as other areas of search for cash, tobacco, humans to name a few. They will continue to act as consultancy experts wherever in the world their specialised knowledge is sought, right the way through to providing training courses and attending local schools alongside the Police on drug awareness courses. Wagtail UK are exhibiting at the Counter Terror Expo 19th - 20th April 2011 and you are invited to visit them at stand C104 where your specific requirements can be discussed and how best you can make of use of the company’s expertise. Further endorsing their reputation in the industry, Managing Director, Collin Singer has specifically been asked to be a speaker at two workshops again following the success of last years’ workshops. The first at 09.50 on the 19th April on Man and Dog - The Ultimate Team, and his second talk will be on the 20th April 2011 at 14.25 on Specialist Detection Dogs. The question asked on the opposite page has surely been answered. Wagtail UK are recognised by many key decision makers in the security sector to be the premier dog detection and training company. It is likely that wherever you see a dog being used, because of the growing success of the company, it will be a Wagtail UK dog.
Body Detection Dog – Northern France
It is clear that the company has grown both in size and reputation purely by their superior performance supported by their impressive results in whatever genre their services are utilised. As a result Wagtail UK can proudly
Explosive Detection Dog – International Air Show
Working in Partnership
WAGTAIL UK LTD www.wagtailuk.com info@wagtailuk.com Tel: +44 (0)1745 561 166
www.counterterrorbusiness.com
HOW MUCH DOES PEACE OF MIND COST? No one likes to imagine the effects of an explosion at their workplace but the chilling reality is that your site could be a target. Ward Security’s specialist bomb search dog team can provide real peace of mind, such a priceless commodity in today’s nervous society! UE TO THE NATURE of the work undertaken by Ward Security’s Dog Section search teams, which is both highly skilled and dangerous, it is imperative that handlers and dogs develop a strong bond, both at work and at home. This is why many of the dogs have been with their handlers from puppy hood giving time for a bond to develop, and to allow the trainer and handler to assess the potential of the dog from an early age. Training only commences once the dog demonstrates a level of maturity that will enable them to undertake the various training activities. The handlers, who are already highlytrained general purpose dog handlers, work through an intensive in-house training course. This is run by Peter Williams, associate director, who oversees the Dog Section and Response Department. Peter is a Home Office-accredited dog instructor in General Purpose, Narcotics, Weapons Recovery and Explosive Search. Ward’s search teams train on a range of real explosives rather than the synthetic products that are available on the market. This is important as, the more realistic the training can be, the better. The company holds a Home Office license allowing it to hold its own stock of training materials. A detailed list of materials used for training is available subject to client status verification. Handlers receive regular continuation training in line with ACPO guidelines; this is evidenced in the handlers training records, which are available for client inspection if required. This training is imperative
D
to ensure the search team is kept at the highest operational standard at all times. During operational searches, the company is under the control of its own search coordinator who will also oversee the in-house physical search teams if deployed. The coordinator works closely with the client, both before and during the task, to ensure the search requirements are fully understood and then carried out. Search units are available to be deployed throughout the UK and overseas for both short and long term contracts as required. EXPERTISE Ward Security is able to provide bespoke and general canine security solutions for both private and public sector organisations across London, the Midlands and the South of England. The specific and specialist expertise of the professionally managed canine services includes: • General purpose patrol dogs • Specialist search teams • Parks and open spaces security • Explosive detection dogs • Narcotics search dogs The dog section is a particularly sought after, valuable and much utilised service with regard to the heightened security levels prevalent today. General purpose dogs are employed for handler protection, patrolling schools, college campuses, parks, open areas and public spaces as well as providing an efficient solution to security concerns on commercial and industrial estates. The company has spent a number of years working to actively assist in reducing the anti-social elements with great and
demonstrable success. Company dog teams have proved particularly effective in promoting community spirit, so only those handlers displaying high-level communication and people skills are selected. Flexibility and versatility are key to dog team operations. All dogs are “homed” with their handlers on a strict one-dog, one-handler basis to ensure close bonding. Continuation training is provided and monitored, and is essential for the further development of the team. Ward Security’s principle role is to ensure its clients are free to concentrate on their core activities, safe in the knowledge their working environments are secure and protected. Ward’s expertise lies in the ability to providing security solutions for any situation. The Dog Section manager and supervisors have a combined wealth of experience and expertise. The direct benefit of this is realised in the added-value passed onto customers in terms of increased operational effectiveness and tangible pro-activity. The handlers and dog teams’ combined abilities and effectiveness are cornerstones of Ward Security’s Dog Sections continued success. All the operational personnel are provided with appropriate equipment for their task. Dog welfare is assured and individually audited, therefore all dogs are presentable and more importantly in excellent condition. Clients can be assured that the dog units will present a professional, identifiable and immaculate image at all times. All operational staff has direct access to a 24hr contact centre via land line, mobile telephone and/or radio communications. The exact communicative methodology is established to ensure the best fit with a business and the continued safety of deployed personnel. Overall Ward Security’s Dog Section provides a very effective, flexible and accountable service to any business.
FOR MORE INFORMATION Tel: 0845 467 6180 info@ward-security.co.uk www.ward-security.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
61
COMMUNICATIONS
www.counterterrorbusiness.com
CRISIS COMMUNICATION Clear, reliable and effective communication is key to coordinating a successful response in the event of a disaster ERIOUS CRIMINAL and terrorist networks are becoming increasingly sophisticated and adaptable. Police and defence forces must therefore continue to adopt innovative technologies in order to stay one step ahead of terrorists and protect the public from harm. Efficient communication is vital in the response to a terrorist attack, both between the public involved in the incident, and between police and emergency response agencies.
S
BUILDING ATTACK During the attack of a building, people may instinctively attempt to leave the building. However, in certain circumstances the correct course of action could be to remain in the building, in a designated safe area. This is because the terrorist’s plan could actually be to round up as many people as possible into the same place so another attack, such as a car bomb, could cause even more devastation.
Those in charge of security and incident response in the building must therefore have a clear plan of action and, most importantly, be able to communicate it effectively to everyone involved for a smooth and panic-free response. One such way to communicate to building personnel is to send an SMS text message. Text messaging is an ideal tool to communicate in the event of a disaster as the majority of people have their phone with them at all times. A text message can be sent from a preauthorised computer to every person in the building instantly, regardless of the size of the personnel. RADIO COMMS Radio communications plays a major part in any communications strategy, whether it’s for a shopping centre, hotel or an operation in Iraq. Ensuring you have the right radio equipment and that it is being used correctly is crucial to the success of any incident response.
A report published in July 2009 by the Home Affairs Select Committee stated that the key failing during the London bus and tube bombings in 2005 was the inadequacy of emergency communications. Since then, however, the government has rolled out a hi-tech radio communications system onto the London Underground network. The system, provided by Airwave, is a separate Tetra-based radio system that provides communication for the emergency services. On the London Underground, it allows police officers to move from above to below ground without having to make any changes to their radio settings, enabling them to always have clear radio communication. The system is invaluable in large scale events such as New Year’s Eve, the Notting Hill Carnival and football matches. For the 2012 Olympics, Airwave is designing and building a Private Mobile Radio service, known as Apollo, on behalf of the London Organising Committee of the Olympic and Paralympic Games. This will provide guaranteed, secure coverage for up to 12,500 organisers across all London 2012 venues, allowing them to always remain in contact and coordinate a successful and incident-free event.
G6 GLOBAL – LEADING THE WAY IN SUCCESSFUL COMMUNICATIONS IN AN UNCERTAIN WORLD G 6 IS A LEADING SPECIALIST in the provision of communications solutions to frontline organisations working in the fight against global terrorism. Our clients work in some of the most hostile and challenging environments in the world, and we are frequently there right alongside them. Our capabilities are extensive, from the supply of simple analogue and digital two-way radio communications systems, right up to the specification, design and implementation of multiplatform, fully integrated voice, data and video networks across multiple and diverse geographic locations. Our range of deployable and covert solutions are specifically designed and built in-house, for specialist operations such as surveillance tasks and response to rapid onset emergencies. The solutions allow teams to deploy on operations at very short notice, secure in the knowledge that their communications will work, first time, every time. Each of our solutions is scalable and can be tailored to your specific
requirements. Our extensive knowledge and understanding of the newly emerging digital radio products positions us as your logical first point of contact if you are looking to really get the most form a private mobile radio network. Working extensively with surveillance and covert operators, we have a unique knowledge of the challenges of this type of operation and our understanding often enables us to make suggestions that our clients may not have considered for themselves. In this way we can enhance both the operational effectiveness and maximise value for money. Our offices, situated in a discreet location in the Gloucestershire countryside, include full electronic and mechanical workshops. Here we provide both technical and operator training in a variety of disciplines.
Our vehicle workshop enables us to fit vehicles with a range of covert systems for both voice and video surveillance. We also design and build command & control (C2) vehicles incorporating broadband satellite terminals giving unrivalled communications connectivity regardless of your geographic location. Like everything else in our portfolio, flexibility is the key and these can be built into any type of vehicle and can be fitted with your own communications suite specific to your organisation; nothing is set in stone. Analogue or digital; voice, data or video; clear or encrypted; covert or conventional; static or mobile; simple or complex: whatever your requirements, trust us to work with you to ensure that you get the right solution, regardless of the situation. Our fully security cleared team is waiting to speak to you so please, call or e-mail with no obligation.
FOR MORE INFORMATION Tel: 01454 610050 Fax: 0870 7622167 E-mail: andrew@g6-global.com Web: www.g6-global.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
63
Emergency Notification
txttools allows you to send and receive txt messages to multiple people in an instant using your computer. simple :) 2 way communication that is quick, to the person, to the point, secure and cost effective. clever ;)
Realtime Emergency Notification e: w: t:
info@txttools.co.uk www.txttools.co.uk +44 (0)113 234 2111
A strategic SMS txt message plan can be an invaluable way to communicate with your community in the event of an emergency. Successful organisations, large or small, prepare themselves for all potential eventualities. txt messaging provides the perfect rapid response mechanism in the event of a disaster or incident as everyone has their phone with them at all times. A txt message can be sent from a computer or even a pre-authorised phone to every member of your community in a matter of minutes, whether that be tens of people or hundreds of thousands.
SMS txt messaging is socially and digitally inclusive, over 98 percent of UK adults have a mobile phone. Many organisations are adopting simple-to-use interfaces from companies such as txttools.co.uk This service allows the user to send and receive SMS txt messages from their computer and track the delivery, much like email, but with audited delivery. Having the ability to create discreet groups of customers, clients, patients or staff can have major benefits when you want everyone to be notified with a single message. The tool is completely flexible, messages can be sent instantly or scheduled months or even years in advance and sent out when that message is relevant. Messages can be edited
some facts: At least 20% of all organisations will suffer fire, flood, storm, power failures, terrorism, hardware or software disaster. Of those without a business continuity plan: 43% will never re-open 80% fail within 13 months 53% of claimants never recoup the losses incurred by a disaster. Source: Aveco Major systems downtime costs (15% Of Organisations) over £50,000 Per Hour. Source: Information Age
e:
info@txttools.co.uk
right up until the scheduled time to allow for changes in arrangements. Customers can be added to lists requesting information and replies may be automated or custom sent. Many organisations are now incorporating txttools into their disaster planning, it is proven to be the fastest, most reliable method for communicating with large groups of people.
txttools® emergency incident planning SMS is a powerful disaster contingency tool, which enables your organisation to: + Communicate directly with all members of your organisation quickly and efficiently, from individuals & small groups to tens of thousands
Why are they choosing txttools® ? txttools has had an uninterrupted message delivery in the public sector for the last 9 years, used by councils, police forces, schools, hospitals, clinics, connexions and over 48% of the UK colleges and universities. The txttools team have and continue to respond to development needs of the community. The application includes an array of features; 2 way messaging, secure online access 24hours a day 7 days a week from any PC (using the same security as online banking). A further benefit, unlike email, delivery of every message can be tracked.
+ You will be able to send safety alerts of areas to avoid, prevent unnecessary journeys and wasted time + Contact ALL customers and staff instantly from your computer + Send a message securely from your mobile via your txttools account to ALL customers or staff instantly, from wherever you are + Provide a route for staff and students to contact you and your team + Works even when network coverage is poor
It is possible to convert a txt message to voice mail if number is a landline, there are inbox rules, RSS feeds and auto responders. The txttools team have an outstanding reputation in both their face-2-face customer training and unlimited support which is included in the package.
w:
www.txttools.co.uk
+ In an unfolding situation send regular up-dates to advise all vested parties + Pre-write message templates to allow quick, but well thought out messages to be sent by any member of staff
t:
+44 (0)113 234 2111
Developing skills to think securely
In the ever-changing field of information security, merely keeping up is not an option. Anticipating future challenges and combating them adeptly requires intense education from the globally respected organisation: (ISC)2® (ISC)2 certifications, such as the CISSP ® and SSCP ®, have become synonymous with excellence in information security around the globe. They’re also among the first information security credentials to meet the stringent requirements of ANSI under ISO/IEC Standard 17024, a global benchmark for assessing personnel certification programs. Invest in developing the skills required to successfully establish policies, set governance and compliance, and secure confidential information. Contact (ISC)2. www.isc2.org/ctb Faisal Malik Head of Business & Corporate Development (ISC)2 EMEA fmalik@isc2.org 0203 283 4383
Discounts available for on-site official (ISC)2 Review Seminars. Inquire for details.
INFORMATION SECURITY
www.counterterrorbusiness.com
FORESIGHT IN A COMPLEX WORLD Infosecurity Europe, taking place in London 19-21 April, is where information security professionals address the challenges of today whilst preparing for those of tomorrow HE INFORMATION COMMISSIONER recently fined two organisations for serious breaches of the Data Protection Act. The first penalty, of £100,000, was issued to Hertfordshire County Council for two serious incidents where council employees faxed highly sensitive personal information to the wrong recipients. The first case, involving child sexual abuse, was before the courts, and the second involved details of care proceedings. The second monetary penalty, of £60,000, was issued to employment services company A4e for the loss of an unencrypted laptop that contained personal information relating to 24,000 people who had used community legal advice centres in Hull and Leicester. Stoke-on-Trent City Council had a lucky escape from being fined after it lost a USB memory stick containing sensitive personal information of 40 children. In their case, as the incident occurred before 6 April the powers now available to the Information Commissioner to issue penalties of up to £500,000 for serious breaches of the Data Protection Act, could not be considered. So the last 12 months have not been great for the public sector in terms of information security with many more headlines of data breaches. With increasing reliance on the internet to deliver public services, and the growing trend to outsource parts of these networks and services to the Cloud, every one of these headlines damages the already fragile public confidence that the public sector is not adequately protecting our data.
FREE EDUCATIONAL PROGRAMME The free educational programme addresses issues facing the information security community, drawing on the knowledge and experience of nearly 100 leading security experts, industry innovators and speakers from the end-user community who will provide expert analysis, real-life case studies, strategic advice and predictions to ensure attendees have the information needed to protect the operations of their companies. Nowhere else can you gain such valuable information from the industry’s leading lights free of charge, all in one event. This years Keynote programme includes a diverse range of topics that will address the security issues and pressures that organisations face in an increasingly mobile and global working environment. In keeping with its reputation Infosecurity Europe 2011 has put together a riveting programme of expert speakers on a range of different subjects – from cyber terrorism to the rise of mobile malware. All the immediate threats that exist at the cutting edge of the cyber-world will be expounded upon. Our expert speakers have been carefully chosen for their contemporary presentations as it is our aim to be able to provide the answers, or suggested solutions, to the most pressing issues facing the world of information security; in an increasingly digitalised age, this field is at the vanguard of technological evolution, Infosecurity Europe aims to reflect this ethos.
FINDING SOLUTIONS With the Information Commissioner now enforcing his new powers to fine organisations who deliberately breach the Data Protection Act (DPA) up to £500k, isn’t it time to make sure you’re up to speed with the latest guidelines for best practice, emerging technology and future developments that will ensure that not only your organisation is secure, but everyone’s sensitive data is adequately protected? A visit to Infosecurity Europe presents those responsible with securing their organisations the opportunity to research key trends and the emerging products to arm them against data breaches and information security threats. With 300+ top infosecurity providers exhibiting from across the globe, the event offers the most comprehensive showcase of solutions,
GOOD ENOUGH? The first talk taking place will ask the question, in short, “When is security good enough?” This talk aims to disseminate the myths of security from the facts, focusing on the practical need for sensible security solutions that do not simply go along with accepted standards, but consider the overall reasoning behind specific solutions. Organisations need to understand why they have the security that they do, which, in turn, is conducive to an understanding of the particular threats that are ranged against them. The speakers will therefore consider the above, and further consider the merits of varying security methodologies. The next talk focuses on the pressing, but undecided issue of whether mobile devices should be used to our advantage, as perhaps a means of
T
products and services in the largest information security exhibition in Europe.
remotely authenticating details, or whether the inevitable increase of mobile malware makes this option feasible. Are smart devices currently secure enough for what they are being used for? Is it worth compromising your business’ security for the sake of convenience? How can smart devices be improved to assuage these concerns? Two speakers will put forward their cases for and against the motion in what should prove to be a lively debate. MOBILE DATA STORAGE It must be remembered that employees do not materialise in the atriums of organisations in the morning, and then subsequently vaporise when they exit their place of work. Too often it is taken for granted that employees are following assumed standards of IT practice, with specific regard to mobile data storage devices such as USBs, laptops and smart-phones etc, both personal and work-supplied. The next talk will posit that the crossover of work and personal devices is a problem that organisations must wise up to, and therefore educate their staff about, through effective employee awareness training. With the advent of social media the problems of regulating employee activity, and thus the threat landscape, has accordingly increased. Only through making employees aware that their activity of the dangers of a lax attitude towards security, on both a personal and a business level can organisations tighten up their security perimeters and achieve a solid IT infrastructure. “If you had to lose 30 per cent of your security budget in the next 24 hours, what would you lose and why?” This is the opening question that will be answered by a panel of experts. The resulting conversation will aim to mine the complications that arise from existing in a post recession financial environment; focusing on budget cuts and organisational restructuring on one hand, and on the other, considering the large sums that have been committed to security by the government. So where exactly are we? How can you deploy technologies that maximise your existing security infrastructure and where are the smart investments? HALL OF FAME The history of computing and information security has attracted many brilliant minds that have dedicated their lives to its advancement. This year’s Infosecurity Europe is proud to once again host the Hall of Fame in the Keynote Theatre, where internationally recognised inductees will be sharing their expertise. Previous winners have included David Lacey, Professor Fred Piper, Professor Howard Schmidt, Lord Erroll, Bruce Schneier and Phil Zimmerman. The speakers in the Hall of Fame, are nominated and voted for by professionals in the industry. If you wish
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
67
INFORMATION SECURITY
to nominate someone that has made a clear and long-term contribution to the advancement of Information Security you can do so on www.infosec.co.uk CYBERCRIME Kicking off day three is a session that addresses the core issue of whether cybercrime is truly the scourge of the 21st century. Today’s threat landscape is vast, complicated, sophisticated, and seriously big business; but just how persistent are the threats? Looking at the dangers of under-defended business, the speakers will review the threats faced over the last 12 months, paying particular attention to trends and the geographics of attacks, and also assessing current security strategies. The debate on cloud computing is one that never ceases. It is the lofty aim of the next session to provide clarity on the issue by clearing the fog when it comes to security in the cloud. The panel of speakers will provide some guidance when debating cloud by honing in on issues such as the number of clouds; BC planning; who owns what and when?; the geographics of cloud; how to push the debate beyond cost-savings; the value of network security in the cloud; how not to build a cloud. Everything you want to know about cloud computing will be
www.counterterrorbusiness.com
discussed, so come in out of the rain and have some light spread on the issue. INSIDER THREAT The insider threat is the canker of a healthy business, but what percentage of incidents can really be attributed to a disgruntled or infiltrated employee? With ever widening security perimeters, it cannot be denied that many factors must be considered, particularly with an extended enterprise and deciding how much, and what, to share with your suppliers and customers. So what about your own people? This panel will discuss the insider threat in 2011, giving special attention to employeeowned IT in the workplace, and how to best manage the risks therein. The last session will inform on how your business can operate with agility and flexibility whilst maintaining identity and access management across your network. The question of how to create a control system that works across a broad range of risks, yet also integrates with your suppliers and customers, is one that covets an answer; and the speakers of this session will share their answer. The panel will discuss what safeguards you should have in place, and also how to coordinate controls to tackle issues such as encryption trends and
effective log management, among many others. This discussion will provide listeners with the Holy Grail for identity and access management which, if implemented, could prove your organisation to be ahead of the curve and an attractive partner for new clients. INFORMATION SECURITY EXCHANGE In addition to the usual format, an exciting development in 2011 is the Information Security Exchange, which is an opportunity for visitors to really get to grips with the latest and greatest innovations within the information security sphere in a practical, businessapplication format. The discussion therefore promises to be lively and progressive to ensure visitors can position themselves and their organisations at the forefront of the industry. Organisations that want to learn more about securing themselves from security breaches, cybercrime, hacktivism or even cyber terrorism will find it useful to visit Infosecurity Europe which takes place at Earls Court, London, 19-21 April 2011.
FOR MORE INFORMATION Pre-register today and avoid the £20 booking charge for those who miss the deadline and need to register at the door, by visiting www.infosec.co.uk
POCKET-SIZED PROTECTION FOR HIGH GRADE NETWORKS
Mini-CATAPAN: the UK’s leading High Grade encryption solution Developed by L-3 TRL Technology, Mini-CATAPAN offers a compact solution that protects sensitive networks at the highest level. Rugged, reliable and small enough for tactical operations, Mini-CATAPAN can protect SECRET and TOP SECRET voice and data communications and is fast becoming the IP encryption solution of choice for many MOD and OGD systems worldwide. For more information on this industry-leading solution, call L-3 TRL Technology on 01684 278700 or email marketing.trl@L-3com.com TRL Technology
68
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
L-3com.com/TRL
INFORMATION SECURITY
www.counterterrorbusiness.com
SECURITY AS AN ASSET NOT A COST The challenge to business today is in knowing how to manage business assets in a technology environment. Cryptic Software offers protection for information assets to meet privacy, risk and compliance requirements
E EXIST IN A WORLD of cyber-crime where threats are planned and attacks come in from both within the trusted business firewall as well as from outside. Listening and visibility technology is needed to determine where threats are coming from, and when they do exist technology is needed to determine if a crime has been committed as part of forensic evidence gathering. Information today exists in many different environments, obviously at the office, and the servers and now in the cloud, on the go, and yes we do bring business into the home; and sometimes overlooked, our information is part of a supply chain of employees, partners, suppliers, and customers, and all of their data environments. We need to protect our environments and our information assets in all these spaces. So it does not matter if we are 100 per cent protected, when the data is used and shared by 3rd parties – how can you be sure that their environment is fully protected? At Cryptic, we offer products and services that monitor, create visibility for and protect information, the assets that manage information and the people who handle information, into a single appliance that is easy to install and requires little administration. Cryptic’s Cybersight software enables prevention of information loss using unique detection capabilities; alerts; audits; forensics; and reporting intelligence. Who should use Cybersight Forensic products? • Business
W
• Law enforcement • Government and security • Organisations liable to experience or have provision for forensic investigation • Forensic service providers • Military A major and unique benefit of Cybersight is that you can add threats to the detection engine as the business may already know when they have a problem but don’t know how to defend and protect from it. Cybersight can detect all new EXE files coming into company not just viruses. This would pick up most of the unknown hacking and spying tools. Cybersight can detect the presence of USB devices being plugged in. Real time forensics could help identify a threat’s source, so the hole can be patched – key in future protection of unknown threats. FORENSICS TRIAGE SERVICE Cryptic has developed the Forensics Triage service that enables enforcement teams to build forensic level evidence about any criminal activity that may exist on a suspect computer. The service takes the form of a USB key, which can be inserted into any Windows machine. The machine is then booted up and the key takes control, so at this point there is no tampering with any evidence that may exist. The Forensics Triage key will then detect any images or threats that may exist and it will also scan for data in the contact database in order to be able to continue further investigation on other criminal suspects. Once the machines are deemed to be
suspect and have evidence, they can be taken away for further investigation and kept as part of an evidence trail. SECURITY IN THE CLOUD An IBM global survey of 500 IT managers has shown that 77 per cent of businesses believe that cloud computing requires a privacy trade-off. 50 per cent were worried that cloud could also lead to a data breach, and 23 per cent fear that cloud computing will weaken corporate security. Working in cyberspace or the cloud is becoming more of the norm with both mobile and home users. Data centres are now responsible for providing services to protect your information wherever that may be in the world. Data centres are, however, vulnerable to threats from within as well as outside the firewall. Your business has a need and a legal requirement to know who is looking at your data, where it might be at any time, and when it is copied or moved by any unauthorised persons. In addition you need to know that all users of cloud based services are monitored and that there is a forensically sound trace of all activity in and out of the cloud. Cybersight can provide these services both for your own peace of mind, but also as the data centre is now part of your supply chain, you need to ensure and vet that they have complete protection for your assets. KEYGUARD Cryptic Keyguard offers protection from improper use of USB devices and allows the business to create sound and flexible USB data exchange rules.
FOR MORE INFORMATION There is more information about Cryptic Software products and services at www.cryptic.co.uk. Ask for your free trial, which can be set up in a matter of an hour, using the Cybersight appliance. You can also follow us on Twitter @privacytalks Email: asktheteam@cryptic.co.uk
TEN KEY FACTS • USB keys and media are an essential tool in sharing data • USB keys and media are a high data leakage and loss risk • Removing USB keys from an organisation impedes working practice • Controlling USB key usage enhances security and working practices • Detecting un-authorised USB usage is essential in protecting digital assets • USB blockers are not 100 per cent effective and easily by passed or hacked • Auditing of USB usage improves compliance monitoring • Solutions are rigid and do not meet user needs • Monitoring information exchange is critical to any business and difficult to monitor • The larger the organisation, the more difficult it is to control data exchange
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
69
“The event was a very good opportunity for networking and sharing the latest information. The conference achieved its goals and was very well organised." 2010 Border Security Attendee, Romanian Border Police
SMi’s 4th Annual Conference
Border Security
In partnership with
28th February & 1st March 2011, Sheraton Hotel Balkan, Sofia, Bulgaria BORDERPOL ADVISORY BOARD
Don’t miss presentations from: General Commissioner Zaharin Penov, Director, Chief Directorate Border Police, Bulgaria
Thomas Tass, Executive Director, Borderpol
Principal Police Quaestor Ioan Buda, General Inspector, Romanian Border Police
Special Advisor
Colonel Zoltán Szabó (Ret'd), Director of European Secretariat Office, Borderpol Keynote Speaker
Colonel Leszek Elas, Commander in Chief, Polish Border Guard Commodore Dan Thorell, Director & Head of Regional Command South, Swedish Coastguard Major Roman Obert, Director, Slovakian Border Police
Serge Rinkel, Director of Technical Committee, Borderpol
Nenad Banovic, Chief, Serbian Border Police Administration Police Colonel Dr. Gábor Kovács Ph.D, Resident Twinning Advisor, EU Twinning Project, Hungarian National Police
Keynote Speaker
Lieutenant Colonel Tõnu Hunt, Deputy Director General, Estonian Border Guard
PLUS A POST-CONFERENCE INTERACTIVE WORKSHOP:
Border Security & DocEx: Controlling the Manipulation of Personal Identity Wednesday 2nd March 2011, Sheraton Hotel Balkan, Sofia Led by British DocEx & Border Security Experts
Lieutenant Colonel Thomas Zehnder, Commander 2nd Region, Swiss Border Guard Fred Berk, Head of Border Police and Immigration Unit, Seaport Police Rotterdam – Rijnmond Superintendent Salih Morali, Deputy Head, Foreigners Borders Asylum Affairs Department, Turkish National Police Senior Representative, Sector for Border Affairs, Ministry of Internal Affairs, Republic of Macedonia
Sponsored by
Register online at
www.border-security.co.uk
Alternatively contact Steven Myers on +44 (0) 207 827 6090 or email smyers@smi-online.co.uk
www.counterterrorbusiness.com
GWENT POLICE SEES ICU BENEFITS Gwent Police steps up security at the 2010 Ryder Cup with two advanced mobile incident command units featuring command communications technologies from satellite broadband specialists Excelerate Technology T IS ONLY PLAYED once every two years, and never before in Wales, but 1-4 October 2010 saw the cream of the golf world come to Newport, South Wales to compete in the 38th Ryder Cup – ranked as one of the top 10 global sporting events with a television audience in excess of two billion people. Contested between teams of 12 players from Europe and the United States, the Twenty Ten course at the Celtic Manor Resort in Newport played host to what many observers felt was one of the
I
best series of matches yet. Europe’s win (by 14.5 points to USA 13.5 points) at the end of an extra day’s play caused by torrential rain earlier in the competition now means that they have won eight of the last 13 competitions with the 1989 competition tied (with Europe retaining the Cup). Security and policing of the event was carried out by Gwent Police, with the costs being met by Ryder Cup Limited and the European Tour, at a time of heightened UK security threat levels. Central to the successful management of the event were
A spacious working environment inside each of the vehicles has been created with three workstations with ruggedised screens on which a wide range of specialised command support applications can be run
Roof mounted satellite broadband solution enables streaming of live video to Gold Command
the two Gwent Police Incident Command Units, one operating as Silver Command and the other as Bronze, crucially providing a Common Operational Picture to Gold Command. Both vehicles’ command and communications systems were supplied by Excelerate Technology Ltd, the Cardiffbased satellite broadband communications and command systems integration company, which has seen rapid growth supporting its emergency services, broadcast and event support customers in recent years. FACILITIES A spacious working environment inside each of the vehicles has been created with three workstations with ruggedised screens on which a wide range of specialised command support applications can be run. These include risk and asset management database information and e-mail, instant messaging and video-conferencing as well as an independent GSM network for backup. A roof-mounted transportable satellite solution enables real-time voice, data and video information to be shared with Gold Command to provide a Common Operational Picture of an incident or event. Two large flat screen monitors had also been installed inside the ICU to enable Silver command staff to view television news pictures and live video images transmitted into the vehicle from the external, mast-mounted optical and dual
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
71
“Great value in having such a diverse group of experts from the international community that both highlighted some common problems for all of us while educating me on some things unique to Europe & other nations. Very professional forum & professionally enhancing.” US NORTHCOM, 2010 Counter CBRN Operations Attendee
Counter CBRNe Operations The National and International Challenge 2nd and 3rd February 2011 Millennium Gloucester Hotel, London
CONFERENCE HIGHLIGHTS: ✔ Attend a pre-conference site visit to the UK Defence CBRN Centre ✔ Take part in a fully interactive group scenario briefing focusing on first response in the initial 12 hours ✔ Don’t miss the opportunity to attend our multiple stream sessions on C-IED and CBRNe training ✔ Hear high level briefings from the UK, Estonia, USA, NATO, OPCW and Interpol ✔ Benefit from networking with the people you want to meet from the CBRNe community
OUR INTERNATIONAL LINE-UP OF SPEAKERS INCLUDES: Chief Superintendent Stuart Harrison, Police Military Liaison Officer, ACPO, Home Office, UK Lauri Luht, EU CREMEX 2011 Co-ordinator, Ministry of the Interior, Estonia Gennadi Lutay, Head Assistance and Protection Branch, International Cooperation and Assistance Division-OPCW John Conaghan, Counter Terrorism Security Coordinator, London 2012 Olympic and Paralympic Games, British Transport Police Simon de Gruchy QGM MCMI MIExpE MIABTI, Director, Explosive Risk Management (Former Deputy Director of UK Operations, Joint Service EOD operation Centre, Ministry of Defence, UK)
PLUS A PRE-CONFERENCE SITE VISIT
UK Defence CBRN Centre 1st February 2011, UK Defence CBRN
Captain Michael Collins, Chief of Staff, Joint Task Force Civil Support, US NORTHCOM William Lippert, Criminal Intelligence Analyst, Specialized Crime and Analysis Directorate, Criminal Analysis Sub Directorate, Interpol Dr Edward Clayson, Deputy Joint Project Manager, CBMS Joint Program Executive Office for Chemical and Biological Defence, USA David Ladd, Director, Hazardous Materials Emergency Response, Massachusetts Department of Fire Services, USA Chief Warrant Officer 4 Domah Diggs, Director, CBRN Defence School, US Marine Corps
PLUS TWO HALF DAY PRE-CONFERENCE WORKSHOPS Countering the Improvised CBRNe Threat
CBRNe and HAZMAT Response in an Economic Downturn
In association with
In association with
Centre, Wiltshire
Sponsored by
Register online at
www.cbrn-operations.com Alternatively contact Steven Myers on +44 (0) 207 827 6090 or email smyers@smi-online.co.uk
www.counterterrorbusiness.com
Officers with body-worn cameras and radios policed the course on mountain bikes
Mobile Silver incident command vehicle on the course
Excelerate Technology is the UK market leader in the supply and integration of command and communications systems delivering data, video, voice and internet into Incident Command Vehicles via satellite broadband and wireless solutions thermal cameras or body-worn cameras. Several officers policed the course on mountain bikes wearing body-worn cameras and radios, enabling a rapid response to any developing incident. An additional heli-tele down link enables aerial images to be received in real-time from helicopters flying over the incident ground and all images can be streamed via the satellite links to a secure server where they can be accessed by Gold Command. REPUTATION FOR EXCELLENCE Excelerate Technology has an unrivalled reputation of excellence within its
core market working alongside the emergency services, providing data, video, voice and internet via satellite and wireless onboard incident command and control vehicles. The company provides innovative and proven communication solutions for the emergency services, with technology that is both resilient and operator friendly, in addition to a built-in ability to evolve with customers’ needs as they and their projects develop. A total of only 150 officers policed this high profile event, some of whom used mountain bikes to get around the course quickly. They were equipped with body-
worn wireless cameras and radios, enabling them to feedback live imagery of any incident on the course. In addition to the 45,000 plus spectators on the actual course each day, Gwent Police was also responsible for the security of the golfers and VIP guests including Prince Charles and Deputy Prime Minister Nick Clegg. Contingency plans also had to be made to manage the security requirements for the possibility of visiting former US Presidents, Bill Clinton, George Bush Snr and George W Bush. With the eyes of the world watching Newport, the additional pressure on security with such high profile visitors brings obvious operational requirements and acted as an excellent precursor to the 2012 Olympics. INDUSTRY LEADERS “Excelerate Technology is the UK market leader in the supply and integration of command and communications systems delivering data, video, voice and internet into Incident Command Vehicles via satellite broadband and wireless solutions. These different systems help emergency services improve the speed and effectiveness of their response to emergencies of all kinds,” confirmed CEO and Founder David Savage. “We are delighted that Gwent Police chose Excelerate for their ICU requirements and that the vehicles have played such an important role at this prestigious event,” he added. “When we were developing the plans for the Ryder Cup it was clear that there was an opportunity to use technology to give the commanders as much information as we could before they took operational decisions. This was the first major event where we deployed our command vehicle, and it really paid off. The Bronze commander was able to brief his staff and keep updated on everything that was going on from the middle of a golf course,” explained Superintendent Nigel Russell of Gwent Police. “All our systems, plus those of the HOSDB, meant everyone had all the information they needed. Deploying officers on mountain bikes with live streaming of images from the body-worn cameras meant we could see and hear what was going on wherever they were on the course. Without this it may have been we would have needed additional police officers to attend incidents or to be available on the course.” All photos ©Rob Munro – www.stewartcomms.com
FOR MORE INFORMATION Web: www.excelerate.info
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
73
SPOTLIGHT FOCUS: IP SECURITY
www.counterterrorbusiness.com
USING THE NETWORK FOR YOUR SECURITY SYSTEM Market leader Samsung Techwin Europe Ltd looks at some of the areas to consider when specifying a surveillance system that operates over a network and explores some recent developments of network surveillance products driving the electronic security industry HE SECURITY INDUSTRY has long been synonymous with the term Closed Circuit Television (CCTV), but in fact the CCTV industry has been anything but “closed circuit” for many years. Analogue systems that use coaxial or twisted pair cable for transmission have benefitted from the ability to connect to networks via control equipment for a long time now. Even with the most cost effective equipment, full viewing, control and administration of such a security system is possible via a PC connected to the Internet. The trend of plugging a surveillance camera directly into the network is one that continues to gather pace. As a result, IP and network security products are now the single largest contributors to the growth of the security market as new installations take full advantage of the benefits that operating over the network brings. Not
T
existing network can be used instead of installing totally new cables. A single network cable is also able to carry video, audio and data, as well as provide telemetry and PoE (Power over Ethernet). • The opportunity to control and monitor the system from anywhere on the network as well as connectivity to anywhere in the world. • Resilience – Mission critical video recording can be stored at any location on the network and retrieved from any PC by an authorised user. A high level of redundancy can therefore be introduced by choosing to simultaneously record and store video at multiple locations. • IP based surveillance systems allow users to gain maximum benefit from the latest generation of high resolution cameras that can deliver so much more than conventional analogue CCTV cameras which typically generate images
A major investment in a surveillance system is not something you would wish to repeat on a regular basis. You would therefore want to purchase a solution that is not just fit for today’s purpose but is also future proof in terms of its expandability only can companies save money on cabling infrastructure, but the products themselves offer numerous benefits over traditional analogue systems that are hard to ignore. A major investment in a surveillance system is not something you would wish to repeat on a regular basis. You would therefore want to purchase a solution that is not just fit for today’s purpose but is also future proof in terms of its expandability. Equally important is the ability to get the best out of all your existing systems by having them interact with each other, such as access control, door entry, intruder and fire alarms, BMS and perimeter protection systems. The opportunity to pass video, data or alarm information between these systems, each of which can be located anywhere on a network, has obvious operational benefits. The key advantages of an IP based surveillance system are: • The potential for substantial savings on cabling installation costs in that an
74
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
comprising of just 0.4m pixels. For example, a 1.3 megapixel camera, depending on the field of view, can do the job of several analogue cameras as it can cover a wide area and then zoom in very close when required to a distant object without pixilation appearing in the image. The recent availability of multi-megapixel cameras offers the possibility of even higher resolution images, but the much higher recording requirements of these impressive cameras needs to be taken into consideration at the system design stage. • The interoperability of cameras and recording equipment produced by different manufacturers has been made possible by the introduction of PC based video management software. However, to ensure the option to include or introduce compatible products in the future, it is advisable to consider purchasing products which are ONVIF compliant. ONVIF is an open industry forum for the
development of a global standard for the interface of network video products. SECURITY CAMERAS ARE NOT WEBCAMS It is important to note that IP cameras developed for security environments have very little in common with webcams other than the use of the protocols to communicate and transmit. The latest generation of IP based security cameras incorporate features and functions many of which users have come to expect from traditional analogue CCTV cameras. These include Wide Dynamic Range (WDR), Backlight Compensation (BLC) and noise reduction technology, which are all geared towards ensuring the best possible image quality both during the day and at night and can handle challenging lighting conditions such as strong back-light from the sun or car headlights. It is extremely important to specify the correct camera for the job at hand and the choice is now absolutely astounding. The upside to this is that you should be able to find a solution to exactly match the requirements for your specific sites. Companies like Samsung offer a free design service to help users find out which product is best for their needs. THE LATEST BREED OF NETWORK CAMERA The term High Definition (HD) is now commonplace in our homes and places of work. The digital revolution has enabled design engineers to develop IP security cameras capable of capturing images at resolution levels which were unimaginable just a few years ago. There is the danger though that users might be confused with all the technical jargon on manufacturers’ websites and specification sheets and so here is a brief explanation of what allows a camera to be described as HD. A megapixel camera is simply a camera capable of capturing an image at a resolution of one million pixels or more. 1.3 megapixel cameras are amongst the most common on the market and this figure equates to a resolution of 1280 x 1024 pixels. However, even though a camera may be able to capture images of one million pixels, it cannot be described as a true HD camera unless it complies with the widely accepted HD standard. This requires the camera to output resolutions of either 1920 x 1080 or 1280 x 720. Unlike standard CCTV
SPOTLIGHT FOCUS: IP SECURITY
www.counterterrorbusiness.com
• PoE (Power over Ethernet). An HD camera can draw its power from an existing network offering the potential for substantial savings on cabling installation costs. • Full compatibility with license free NET-i viewer Centralised Management Software (CMS), which provides out of-the-box network capability for all connected Samsung products to empower you to get the very best out of your investment in HD camera technology.
cameras, an HD camera displays images in 16:9 format (widescreen) and has to be able to output images in real-time at 25 images per second. In summary therefore, all HD cameras are megapixel but not all megapixel cameras can be described as HD. HD MEGAPIXEL – THE BENEFITS Although megapixel cameras allow for very detailed images, one of the benefits is that lower resolutions can also be transmitted as resolutions that include QVGA (320 x 240), VGA (640 x 480) and SVGA (800x 600) at the same time, allowing the most relevant stream to be transmitted to your viewing device. For example, full 1.3 megapixel imagery can be recorded at the control room, whilst QVGA video is viewed on a Smartphone simultaneously. HD megapixel cameras offer a lot more than just remarkable evidence quality images and a helpful display aspect ratio. They also come with a range of other features which equip operators to respond more effectively to any suspicious activity or emergency. Most of these added value features are likely to be incorporated into a camera’s DSP chipset. The Samsung WiseNet1 DSP chipset has been designed specifically to allow users to gain maximum benefit from megapixel camera technology. Not by any means, the least of these benefits is the option to choose from multiple compression methods and select from a range of image resolutions allowing different authorised users to be able to simultaneously monitor live images at one location, record video evidence at another or view live and recorded images on a Smartphone. At the same time, JPEG images of an incident can be attached to an alarm e-mail notification with the additional facility of storing pre and post-alarm images on a camera’s internal SD memory card. Another substantial benefit of most HD
megapixel cameras is the use of Intelligent Video Analytics (IVA). Samsung’s WiseNet1 DSP chipset has a built-in licence-free IVA capability which includes optical tripwire and enter/exit direction detection, as well as an Appear/Disappear function to detect the movement of objects. IVA also has a scene change tampering function which creates an alert if, for example, paint is sprayed on a camera lens or there is unauthorised movement of a camera away from its usual field of view. Other keys benefits of Samsung HD megapixel camera technology include: • Dual Ethernet and BNC connectivity so that video can be transmitted via coaxial cabling as well as over a network. This provides an upgrade path for hybrid security systems and allows cameras and domes to be set up easily using standard test monitors. • Full duplex bi-directional audio which provides the option of interactive communication between a camera’s location and a control room. It may be that you just need to verify who is trying to gain access to your site but being able to communicate with, as well as being able to see high quality images of the driver of a vehicle, makes remote monitoring a viable alternative to employing static guards. And with the HD megapixel camera providing evidence quality images of any suspicious activity, the bi-directional audio facility will also provide you with a means to communicate a warning message to any unwanted visitors. • Polygonal privacy zones to ensure that the whole of your site and adjacent areas can be monitored without contravening the Data Protection Act by affecting a neighbouring site’s right to privacy. • SD memory slot for internal recording, providing an easy method of backing up images of alarm events.
HOW ABOUT RECORDING IMAGES? Users wishing to record images from any network camera will need to look carefully at where and how they store the recorded video. There are both software recording solutions that run on a PC and standalone Network Video Recorder (NVR) hardware solutions available. The compression methods built into high definition cameras do, however, allow for efficient recording storage of images. The H.264, MPEG4, MJPEG and JPEG compression methods incorporated into the WiseNet1 DSP chipset, for example, provides users with the ability to simultaneously transmit and record images at multiple locations at various frame rates and at different resolutions. Noise reduction technology such as Samsung’s highly acclaimed Super Noise Reduction technology, SSNRIII can also play a part in reducing storage requirements, whilst maximising bandwidth when viewing over a network. The simple solution, however, may be to introduce NVRs (Network Video Recorders) which can of course be located anywhere on a network, or if there are a large number of high definition cameras deployed, a server based recording solution may prove to be the most cost effective solution. It is possible to record images locally at the edge on-board cameras, for example, whilst a lower resolution image is streamed to operators. This means that should an incident occur, the high resolution video can be downloaded and viewed at the appropriate time without hogging bandwidth. Video analytic functionality, which has become synonymous with network cameras, also adds intelligence to video to make it a much more powerful tool in identifying and deterring incidents. TRAINING Consultants, installers and system integrators who do not normally get involved in physical security projects might find the number of options overwhelming or confusing. This is why manufacturers such as Samsung conduct free to attend training courses which comprehensively cover all aspects of CCTV and IP/network based security systems.
FOR MORE INFORMATION Web: www.samsungsecurity.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
75
BIOMETRICS
www.counterterrorbusiness.com
BIOMETRICS BOOSTS MILITARY INTELLIGENCE Both the UK and the United States are investing money in biometrics both for military intelligence and security purposes
RIS RECOGNITION and palm print identification may seem like a preserve of sci-fi movies, but such technology is becoming increasingly prevalent in military intelligence and homeland security. These hi-tech tools fall under the wider process of biometrics, which uses automated methods to recognise an individual based on measurable biological and behavioural characteristics. According to the United States government, these systems have been researched and tested for use in the likes of military intelligence over the past few decades, but they have only recently entered the public consciousness, partly because of entertainment media.
I
COMMONLY-USED TECHNOLOGY The government highlights that the way such technology is used for civilian and military intelligence in TV shows and films are often not realistic, but its application in day-to-day activities is also helping to raise the profile of the technology. For example, the FBI’s Integrated Automated Fingerprint Identification System is one of the better-known
instances, while companies are also starting to implement biometrics to secure areas. Iris recognition involves taking an illuminated picture of the coloured portion of an individual’s eye, with no discomfort to them, while palm print identification entails collecting aggregate information presented in a friction ridge impression. Friction ridges do not necessarily flow continuously throughout a pattern, and palm recognition technology is designed to interpret the course of the overall ridges. Other common biometrics frequently implemented are face, voice, signature and hand geometry, with combinations of these often used as part of military intelligence and homeland security. BIOMETRICS INVESTMENT Both the United States and the UK are investing money in biometrics, both for military intelligence and security purposes. For example, more than $50 million (£32 million) of the United States’ 2010 federal budget recently announced by President Barack Obama is going towards security related to visas, including biometric technology and enhanced information sharing between the Department of
Homeland Security and airlines. Over in the UK, state-of-the-art facial recognition technology is being used at Gatwick, Birmingham, Manchester, Stansted, Cardiff and Bristol airports, scanning biometric details which are checked against a range of watch lists before passengers are allowed to enter the country. In addition, the government is rolling out a visa scheme whereby foreign nationals are used with identity cards containing biometric data. Most recently, the Home Office extended the programme to include skilled migrants seeking to renew their visa, along with students and foreign nationals married to British people. “Identity cards are a secure and simple way for foreign nationals to prove they are entitled to live, work or study in the UK,” said border and immigration minister Phil Woolas. “The biometric data contained on the card ties migrants to one identity and prevents those here illegally from benefiting from the privileges of life in Britain,” he added. MILITARY INTELLIGENCE CONTRIBUTION Among the companies, who is contributing significantly to biometric technology used for military intelligence is American Reliance, or Amrel. In May last year, the company unveiled its revolutionary new handheld device, developed with military intelligence in mind. The Handheld Biometric System 2 (HSB-2) has been developed using feedback from warfighters and has been tested by the United States Department of Defense Fusion Center. It weighs just two pounds, can capture face, finger and iris data, and allows soldiers to check the identities of a group of villagers in Afghanistan, for example, within minutes. “With other systems the same task could take hours which would expose the soldiers to unnecessary risk,” said Richard Lane, vice-president of Amrel. The HSB-2 also allows users to connect to distant databases through easy integration with standard tactical radios, facilitating military intelligence operations.
This article was provided by IQPC, hosts of Aviation Security 2011. Taking place on 22-23 February at America Square Conference Centre, London, the event has an impressive line-up of high profile speakers who will be discussing the most pressing aviation security issues. For more information please visit www.aviationsecurityconference.com.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
77
Ballistic Absorption Barrier Systems www.babs.us.com
blocks are a revolutionary new product utilizing ‘green technology’ to manufacture a new method of protection against ballistic and blast events
During blast survivability testing conducted at the Aberdeen Test Center (Maryland, USA) a wall constructed of BABS blocks showed 99% blast attenuation
Testing performed December 2009 - US Army Aberdeen Test Center, Maryland Demonstrated at Quantico Marine Base - Virginia USA 2009
are custom designed and installed for each unique application for use in perimeter protection, embassy protection, airport security, major event security, pipeline protection, military installations, blast and ballistic protection have been designed for ease of movement and quick deployment. They are constructed to be positioned similar to building blocks. They are portable, reusable, and protective.
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
Ballistic Absorption Barrier Systems utilize recycled scrap tires to create blast absorption barriers for use in perimeter and check point security, embassy fortification, pipeline protection, and major event security Scrap tires are one of the world’s largest environmental problems. Hundreds of millions of tires are produced each year increasing the total number of tires worldwide. Most current applications for scrap tires involve burning or burying tires. These options can have a large environmental impact.
260
=
www.babs.us.com
At 30lbs (13.6kgs) per block, the Eco-Blok has been developed as a durable and reusable alternative to standard sandbags
Each BABS block uses 260 scrap tires
Ballistic protection Erosion control Major event security Flood control Crowd control
Military uses Civil engineering Parks and recreation Emergency response
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
The Complete Product Development Partner Shore Design, pride ourselves on customer satisfaction and quality design development. Our customers all benefit from our direct no nonsense approach to product development, verification / validation and extensive knowledge of global manufacturing process capabilities. Over many years this has meant multiple repeat projects with our customers delivering a very rapid ‘return on investment’ that in many cases promotes our clients ahead of the competition; these clients include small start up businesses all the way up to well known multi-nationals. All our developments are carried out under ISO 9001.
Who are Shore Design A creative, professional design consultancy with a proven track record in product development. • A blend of innovation, industrial design and mechanical engineering skills. • An experienced team of 22 designers, engineers and manufacturing consultants. • Experience in designing, testing and delivering numerous successful product solutions over many years. What do Shore Design Offer A complete product design partnership with flexible, tailored and cost effective solutions. • Experience in all aspects of new product design development, with core expertise in: • Military Specific Requirements & Ruggedised Design to IP68 • Avionics Product Design • Industrial & Commercial Applications • Medical Device Design • “Design to Cost” & “Intelligent Design” – A quality design solution does not mean additional cost. • An opportunity to increase market share whilst lowering your unit costs. A two fold increase in your profit margin. In-house 3D Rapid Prototyping Our service can produce high quality models in ABSplus plastic directly from our CAD data in a matter of hours, whilst ensuring customer confidentiality is maintained. Typical Applications Include: • Proof of Concept
• Ergonomic Models
Quality Assured Shore design are an ISO 9001 & ISO 13485 accredited company.
• Appearance Models
• Functional Testing
Contact details: Shore Design Consultancy Tel: + 44 131 554 2626 Email: info@shore-design.co.uk
COUNTER TERRORISM
www.counterterrorbusiness.com
PREPARING THE BUSINESS COMMUNITY FOR TERRORISM
Detective chief inspector Chris Phillips, head of the National Counter Terrorism Security Office, advises businesses what to do if they wish to reduce their vulnerability to terrorism
A
NYONE WHO THOUGHT that
terrorism is a thing of the past should have been woken up to the dangers we continue to face after the attempted attacks via the cargo system in November. What is clear is that the terrorist threat is as real as ever. The fact that we continue to go about our business in safety is a testament to the work of the various security services around the globe. The absence of a successful attack in the UK does not mean the absence of a very real desire of individual and groups of terrorists to attack us. THE EVOLVING TERRORIST
I am often asked what a terrorist attack may look like. Well that really depends on the terrorist themselves. It is the terrorist who will make that decision. The simple fact is that whilst there has been a certain degree of consistency of targeting and the methods used, the one thing we can be pretty sure of is that the methods, tactics and targeting will change and evolve as they learn what will be most successful from their perspective. If our long history in having to confront terrorists proves one thing, it is that the threat will evolve. Our response therefore must be strategic, and we must give as much advice as possible to those likely to be targeted, that will allow them to best consider what measures they should take to protect themselves and to reduce their vulnerabilities accordingly. The National Counter Terrorism Security Office (NaCTSO) has been working on ways to help business protect themselves, giving advice on physical, information and personnel security as well as business continuity and resilience. We are acutely aware that we need to work in a consistent way throughout the UK. We do not know where in the UK an attack may take place. It is always interesting to note that many across the UK see terrorism as a London problem. Perhaps the attack in Glasgow, and recent arrests in Exeter and Bristol have gone some way to persuade those who do not have access to the full intelligence picture of the terrorist threat, will realise that terrorism can impact in any area of the UK. MULTIPLE CO-ORDINATED ATTACKS
One of the most consistent attack methodologies is the use of multiple and co-ordinated attacks to cause mass
ABOUT THE AUTHOR Detective chief inspector Chris Phillips is the head of the National Counter Terrorism Security Office (NaCTSO). He has 29 years policing experience which has varied between major public order and community based policing. He has spent the last 15 years specialising in major event security and in particular is a specialist within counter terrorism protective security. He took over as head of NaCTSO in 2005 and has led the organisation to national and international prominence and recognition for their ground breaking work in CT protective security. As Head of NaCTSO he has three major responsibilities within the United Kingdom. Firstly, for the protection
of crowded places within the UK and to reduce the vulnerability of British nationals overseas from the terrorist threat to crowded places and soft targets. The role involves providing counter terrorist advice to all business involved in crowded places including hotels, stadiums, shopping centres, visitor attractions and licensed premises. Secondly, he has responsibility for protecting hazardous sites and dangerous substances. His team works with the business community to make the terrorist acquisition of weapons more difficult, thereby reducing the likelihood of a successful attack on the UK. Finally, he supports the CPNI to protect the UK’s Critical National Infrastructure.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
81
General Ad Version 1_Layout 2 16/09/2010 18:14 Page 1
Technical expertise and proven delivery. • • • • • • • •
Stereolithography Selecive Laser Sintering Vacuum Casing CNC machining Reacion Injecion Moulding Tradiional Model Making Silicone Moulding Low Volume Producion
Discover the ulimate prototyping experience. sales@paragon-rt.com paragon-rt.com +44 (0)1325 333141 5/11/10
15:46
Page 1
Electronic product design from concept to completion Our Mission at Prosync Ltd is to provide a consultancy for the design of remote switches and timers. Whether your application is industrial, commercial or governmental Prosync Ltd has a solution, giving you enhanced control capabilities, improved efficiency and ensuring regulatory compliance. It enables improved asset and staff security and protection, and provides you the opportunity to reduce operating expenses. At Prosync Ltd we like to add value to your project.. not cost. We use Intelligent engineering to support new designs. We are always available to assist on any aspect of system/board integration or application suitability for new design, or replacement of obsolete board. Contact us today for a friendly, no-obligation initial discussion.
Prosync
Contact: Email: info@prosync.co.uk Phone: 07771643205
www.Prosync.co.uk
Prosync_halfpageAd:Layout 1
COUNTER TERRORISM
www.counterterrorbusiness.com
casualties. This in itself brings into focus what we advise the public to do in the minutes, hours and days after an attack. Taking this as an example, we know that terrorists have consistently used an attack method where they set off one explosion in order to get potential victims to evacuate themselves to a more open environment where they can be easier to attack either with a large bomb or firearms. This use of firearms seen in Mumbai and Lahore also brings into question our usual response to an emergency. The natural reaction to evacuate from the building could not only increase the death toll but also increase the fear value associated with the attack. Almost all the attacks outside of Iraq and Afghanistan are examples of this including Bali where a small device was exploded inside the nightclub to move victims out into the large car bomb outside causing catastrophic loss of life. We also know that in an urban area flying glass has caused the majority of injuries in a bomb blast. Therefore we must challenge the practice of automatic evacuation. It may be much more appropriate if a bomb attack happens in the street outside that the occupants take shelter in an already designated protected space or bomb shelter, if possible within the building (invacuation). Automatic evacuation could mean taking those who are in the relative safety of a building out into a highly dangerous environment of secondary
Automatic evacuation could mean taking those who are in the relative safety of a building out into a highly dangerous environment of secondary fragmentation and falling glass and of course possibly into another explosion fragmentation and falling glass and of course possibly into another explosion. Of course we must be careful not to advise invacuation as the automatic response, especially if the building is on fire or in danger of collapse. In those circumstances evacuation is the obvious answer, however those in key areas within business, must be aware of the potential consequences of each option so that they can make an informed decision. We can also do much to make Crowded places less vulnerable. To do that business must take their security seriously. MINIMUM REQUIREMENTS FOR SECURITY
The following are crucial areas for a business to consider and take action on if they wish to reduce their vulnerability to terrorism. A secure and resilient business should have a well thought out and practiced: • Personnel security strategy • Information security strategy • Emergency/incident response plan • Business continuity plan
These businesses should also understand that they will be responsible for their staff and customers if a terrorist attack takes place and have an evacuation and invacuation plan. The business should have a security culture, with buy in from all aspects of the business including the very top (often the most difficult to persuade). Staff should be trained to understand what is expected of them in an emergency. The majority of the items mentioned above come at very little cost to the business. The point is what is the cost if these things aren’t in place, and an attack happens in their town or city? How would their business reputation stand up to such a failure to prepare? Now is the time to prepare. Use the tools that can be found on the NaCTSO website, www.nactso.gov.uk. They are all free and will help you to protect your business and your people. FOR MORE INFORMATION Web: www.nactso.gov.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
83
COUNTER TERRORISM
www.counterterrorbusiness.com
THERMAL IMAGERS ENHANCE SECURITY AT AIRPORTS With the threat of intruders, or even worse, terrorist attacks, making sure that passengers and staff are safe is of the utmost importance to commercial airlines and authorities. FLIR Systems thermal imaging cameras help to make airports even safer airports than ever before is a site where all necessary safety and security precautions are taken. Passengers that are passing through Munich airport do not only need to feel safe, they have to be safe. In order to achieve this, Munich Airport has not only the necessary security personnel, such as walking patrols, in place, they have also installed a complete CCTV network. All together more than 1,000 cameras are monitoring critical areas of the airport. Cameras are not only installed inside the airport – Munich Airport is also monitoring activities that are taking place on the outside perimeter of the airport. A giant area, since Munich airport covers a surface of 1,560 hectares.
EEING WHAT IS HAPPENING with CCTV cameras is not a problem during daytime. But during night or in bad weather conditions it becomes a different story. Thermal imaging needs no light whatsoever to operate. It produces a clear image in the darkest of nights. And so one might think these cameras are only used in darkness, but nevertheless the thermal imaging cameras are very useful during daylight as well. Potential intruders that are trying to hide in shadows are seamlessly detected by thermal imaging cameras. Thermal contrast is also extremely difficult to mask – people that are trying to camouflage themselves become clearly visible on a thermal image. The FLIR SR-Series feature the same thermal imaging technology found in many of FLIR’s most sophisticated security and surveillance systems, but are
S
84
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
packaged for users who have mid-range security and surveillance as their primary application. The SR-Series are excellent tools to install in new or existing security installations, therefore, the FLIR SR-Series are being installed at several airports. MUNICH AIRPORT A very good example is Munich Airport. The FLIR Systems SR-100 thermal imaging cameras help to protect the outside perimeter of this important airport. Being among the world’s top five airports means that international passengers rank Munich airport extremely high with regard to items like waiting time before check-in and immigration, restaurant staff, retail assistants. Something which is probably not considered by passengers that are passing through Munich Airport and filling out a survey, is safety. Travellers consider it to be obvious that an airport
SURVEILLANCE OF THE PERIMETER WITHOUT HINDERING AIR TRAFFIC The outside fences of the airport run parallel with the runways. Installing lights to illuminate 12 kilometers of fence line is an expensive exercise. And at an airport, there are other factors that come into play. Because the fence runs parallel with the runway, installing too much light might confuse pilots. Therefore this is not an option, so in order to see what is happening around the fence during the nights, Munich Airport had light amplification installed. Light amplification, also referred to as I2 technology, amplifies small amounts of visible light thousands of times so that objects can be seen at night. These systems scan an area and amplify the available ambient light to produce an image. Light amplification does require a certain level of ambient light, but even a starlight can produce an image on a cloudless night. A high-end image intensified camera can produce outstanding images on a clear moonlit night. Because the system requires at least a minimum level of ambient light, conditions such as heavy overcast can limit its effectiveness. Similarly, too much light may overwhelm the system and reduce its effectiveness. And that was exactly what happened at Munich Airport. When airplanes were landing or taking-off, their landing lights were disturbing the light amplification. When the light amplification system was ready for replacement, Munich Airport decided to explore the market for other technologies as well. This is how Munich Airport discovered thermal imaging cameras. The solution for Munich Airport was
COUNTER TERRORISM
www.counterterrorbusiness.com
fairly simple. The thermal imaging cameras needed to guard a straight 6 kilometer line, one on each side of the airport. The right camera was the FLIR SR-100. This FLIR thermal imaging camera has excellent range performance and is able to detect a man-sized target at a distance of about 1.6 kilometers. Besides these advantages, the camera also has an excellent image quality and price. FLIR THERMAL IMAGING CAMERAS The FLIR SR-100 thermal imaging cameras have been installed together with a CCTV camera on a pan/tilt. This way they can look wherever they want. Now Munich Airport can seamlessly switch between daylight and thermal camera. During daylight they are using the CCTV cameras. In low light conditions and in total darkness they switch to the SR-100 thermal imaging camera. The images produced by the SR-100 go over fiber optic cable to the control room. Munich Airport can control the pan/tilt and look at the images on every screen or on the video wall. If a threat is detected Munich Airport can take immediate action. COPENHAGEN AIRPORT Another excellent example of the use of thermal imaging at airports is Copenhagen Airport. Copenhagen Airport covers an area of 12.4 square kilometers and has a 30 kilometre perimeter fence. Organising appropriate surveillance for such a large area is an enormous task. In addition to camera surveillance, the airport is also monitored by driving and walking patrols, both indoors and outdoors, around the clock. Although Copenhagen Airport is monitoring the entire airport meticulously, they are especially concentrating on the Critical part of the Security Restricted Area (CSRA). This area comprises all
buildings accessible to passengers, the piers used for boarding and unboarding the passengers and the parking area for airplanes. Everyone going into CSRA, needs to be thoroughly security checked before they can enter. Nothing can enter or leave the area without the Security Operations Center knowing about it. One of the problems Copenhagen Airport was facing was that the CSRA borders the runways. Airplanes going from piers to the take-off area, or airplanes that have just landed and are taking their passengers to one of the piers, are coming from an unsecure area into the CSRA. Cars and people from other areas within the airport, but outside the CSRA, could also enter the area. Therefore they thoroughly monitor all the entrances and exits of the CSRA with different types of sensors and with ground radar. Furthermore, all planes and airport personnel going into the area or leaving it have to notice the Security Center. Although ground radar and sensors warn them when something is happening, they can’t see what it is. Therefore, everyone and everything entering or leaving the CSRA is also followed with cameras, so the Security Center knows what is happening. MONITORING: THERMAL IMAGING, THE SOLUTION FOR SEEING AT NIGHT Monitoring and following objects with a camera is easy during daytime. During night time they could not see anything with their daylight cameras. It is impossible to light up the entire CSRA, since Copenhagen Airport can not put lighting poles everywhere. This would obstruct the airplane traffic from and to runways. However, if an alarm is triggered, the security department wants to be able to see what caused the alarm before they send out security guards to check the situation. In order to solve this
problem they thought of thermal imaging. Being able to see in total darkness is great for security people, especially in Scandinavia where there is not much daylight in wintertime. After careful consideration, Copenhagen Airport chose to install FLIR Systems SR-100 thermal imaging cameras. They chose the SR-100 because they give them a great range performance. Equipped with a 100mm lens, they allow the Security Center to detect objects from 1.6 kilometers away. Another great advantage for the airport is that the cameras contain an uncooled thermal imaging detector. This reduces the downtime to an absolute minimum. Copenhagen Airport needs to be sure that the cameras are working 24 hours per day, 365 days per year. The cameras were also mounted on a standard pan/tilt mechanism. Once an alarm goes off, the security department needs to be able to turn the camera to the right direction immediately. This way they can see what has triggered the alarm and they can follow the object with the FLIR thermal imaging camera if necessary. EASY INTEGRATION IS KEY One of the key elements in the decision process was the integration in their own security network. Copenhagen Airport is operating more than 200 CCTV cameras and the thermal imaging cameras needed to be installed in the same network. Just like all other cameras they are using, the FLIR Systems thermal imagers can be operated using the PelcoD protocol and could easily be integrated in their existing network. Now that the SR-100 thermal imaging cameras are installed, they do even more than Copenhagen Airport initially planned. The Security Center looks at well-lit areas with the FLIR cameras. They are not blinded by lights in any circumstance and deliver a crisp image on which the smallest of details can be seen. Furthermore, they are a great help in difficult weather conditions like fog, where normal CCTV cameras do not see anything. Thermal imaging has proven its value at Munich and Copenhagen Airport. Just like at any major airport, assuring the safety of passengers, planes and their crew, airport staff and any other person that comes to the airport is a priority at Munich and Copenhagen Airport. FLIR Systems thermal imaging cameras make sure that no threat goes undetected.
FOR MORE INFORMATION Web: www.flir.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
85
Surveillance. Acquisition. Tracking. Identification. Verification. An ONCAM Total Security Solution is
Without verification, a supposed threat to
developed using a comprehensive 5-stage
an airport could for example result in the
approach called the
terminal being closed down with significant
SM
process:
Surveillance utilising 360-degree total
and unnecessary costs.
situational awareness, allowing for the early
Verifying the authenticity of a threat is
warning of potential threats
critical and demands effective surveillance,
Acquisition of the potential threat
acquisition, tracking and interrogation.
Tracking the threat
ONCAM utilises cutting edge technologies to
Interrogation of the threat
ensure our solutions embrace verification.
Verification of the threat Traditional security systems are not always designed to emphasize the verification of a threat, typically leaping from surveillance to action which can be a costly proposition.
ARCHITECTS
OF
T O TA L
SECURITY
w w w. o n c a m g l o b a l . c o m
SOLUTIONS
www.counterterrorbusiness.com
Written by Dr. James Ionson
A SECURITY BREACH WITH AN APPROPRIATE RESPONSE HE INABILITY OF HUMAN and electronic security systems to consistently react to security breaches with intelligent, measured responses can be solved by integrating the concept of threat profiling with the right technologies. Unfortunately, vast sums of human and financial resources continue to be squandered at key transportation infrastructure sites across the globe because systems and people consistently fail each other. SWIFT AND EFFECTIVE RESPONSES Merging threat profiling and a range of technologies appropriate to a particular threat profile so that swift and effective security responses can be implemented on a scale appropriate to a given situation, object or location that is being secured is a challenge we can meet today. The key is integration – not just of technologies, but of technologies in concert with threat profiling, which is simply recognition of what a potential enemy wants and would try to accomplish at the area you seek to protect. Understanding those goals and integrating them into the design of a security system with the appropriate hardware – the cameras, scanners, trip wires, motion detectors or a simple alarmed handle at an airside door – is preparation for the SATIV approach to physical security. Surveillance. Acquisition. Tracking. Interrogation. Verification. All in the blink of an eye. HYPOTHETICAL BREACH: A PINT TOO FAR To illustrate let’s use Heathrow Airport, a major transportation hub that has experienced more than its fair share of security breaches. Security there is tough and is handled by some of the finest security experts in the world, but even they can
T
benefit from taking the SATIV approach. Let’s pretend a young foreign national studying in London finds himself desperately homesick and in a pub a few kilometers from the airfield. His mates grow weary of his talk of home despite their efforts to cheer him via multiple pints. Exasperated, they decide the best place for their pal is Heathrow – where his national airline serves – and unceremoniously deposit him along the perimeter fence on the north side of the field. Energised by alcohol and the sight of jets roaring in queue beside the north
observers ascertain and evaluate the threat’s physical profile, as well as its proximity to taxiing aircraft, nearby buildings and other vital infrastructure points. This technological integration allows security to spot the threats that the system is designed to recognise (surveillance), lock onto it (acquisition), follow it (tracking), then immediately use facial and other recognition analytics (interrogation), and access to multiple databases for verification. This process allows security to determine the proper scope of the so-called “threat” posed by a staggering intruder
Merging threat profiling and a range of technologies appropriate to a particular threat profile so that swift and effective security responses can be implemented on a scale appropriate to a given situation, object or location that is being secured is a challenge we can meet today runway, our subject – much to his own amazement – manages to scramble up the fence and uses his coat and gloves to help surmount the angled wire and mesh. In the moment he disturbed the fence an imbedded motion detector signaled the location, and with simple software integration, an alert was transmitted to both perimeter security stations and Heathrow’s central security center. Cutting-edge imaging technology enabled operators to observe both a detailed, focused view of the climber while at the same time – all on one screen – maintaining overall 360-degree coverage of the larger area around the breach point. Immediately, in this hypothetical event,
bouncing off the inside of the fence. The measured response: Roving patrol vehicles linked electronically to the security system arrived before the climber could dust himself off. Our intruder went to jail and a template press release was issued, but dutifully ignored at news desks as boring. Just as important, at the same time, no flights were delayed, no runways closed and no news bulletins interrupted the afternoon talk shows to exploit preconceived hysteria as speculation overwhelmed sketchy facts. When threat profiling, technology and human intuition and experience work together, costly responses can be avoided and ultimate safety enhanced.
James Ionson, Ph.D., CEO, Oncam Global Group Dr. Ionson was a member of the U.S. Department of Defense Senior Executive Service credited with the creation of the Innovative Science and Technology Directorate for President Reagan’s Strategic Defense Initiative (“Star Wars”), now called the Missile Defense Agency. He has held top-secret and other national security clearances with the Defense Intelligence Agency and has advised the Pentagon and NASA on critical technology issues.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
87
COUNTER TERROR EXPO
www.counterterrorbusiness.com
COUNTER TERROR EXPO – BIGGER, BRIGHTER, BETTER Counter Terror Expo 2011 delivers both focus and clarity to the complex and multifaceted task of protecting people and assets from those with intent to do harm OUNTER TERROR EXPO is shifting to the prestigious Grand Hall at London Olympia next year. The move has been prompted by unprecedented demand from exhibitors and delegates alike and marks Counter Terror Expo out as being the premier global event for professionals at the sharp end in delivering a robust defence against the threat presented by international terrorism. RECOGNISING THE THREATS “The counter-terrorism world is dynamic and the range of threats faced is diverse. Therefore it is incumbent upon us to deliver an event that reflects the operational demands placed on professionals in this vitally important national security arena,” comments Peter Jones, managing director, Counter Terror Expo. “Substantial demand for more space and feedback from exhibitors, speakers and delegates who regularly attend has directed our thinking and driven the changes we have
C
made in order to deliver an even bigger and clearly focused event in 2011.” Counter Terror Expo’s carefully researched conference programme brings over 70 world renowned issue specific experts together to deliver insight, analysis and perspective to the threats faced, across four conference streams developed to accurately reflect the most critical issues and deliver clear focus for debate. The showcase exhibition brings the world’s
leading industrialists together to display and demonstrate the counter-measure tools available to professionals in the field, as well as to discuss future requirement with governmental strategists and develop refinement with those delivering countermeasures in the operational environment. Counter Terror Expo’s carefully crafted programme of educational workshops brings the world leading industry experts together with end users to
Counter Terror Expo’s carefully researched conference programme brings over seventy world renowned issue specific experts together to deliver insight, analysis and perspective to the threats faced, across four conference streams developed to accurately reflect the most critical issues and deliver clear focus for debate
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
89
COUNTER TERROR EXPO
www.counterterrorbusiness.com
deliver an in-depth understanding of the strategic use of technology in clearly defined operational scenarios. “We continually evolve the event to reflect the ever changing dynamics of the counter-terrorism world. This evolution will be even more evident in 2011, with delivery of live and interactive demonstrations, particularly of EOD/IEDD hardware, in a specially constructed open plan theatre at the heart of the exhibition floor. This is just one of the many visible changes including our new look branding,” Peter adds. WEBSITE CHANGES Coinciding with news of significant expansion in the Counter Terror Expo programme, we are also pleased to announce that our online presence is undergoing a makeover. “Visitors to our website will soon experience a new look and feel which brings core information firmly to the forefront and ensures that key resources are never far away. The website is not only our face to the world but also a portal to vital support tools designed to make exhibiting and registering for the event a breeze,” concludes Peter Jones. Counter Terror Expo’s new look website went live at the beginning of September and delivers in-depth information for participants, up to the minute news about
ABOUT COUNTER TERROR EXPO Held annually in the host city of the next Olympiad summer games, Counter Terror Expo is recognised as the foremost annual gathering for counter-terrorism professionals from across the globe. The two-day event brings over 200 internationally renowned experts in their respective fields, together with more than 400 industrialists and regularly attracts in excess of 7,000 delegates and visitors. the event itself, emerging issues and incidents, as well as key feature material and announcements from the very many exhibitors attending this world class event. The new look and feel, including, logo, colour schemes and layout concepts carry over to related supporting materials and publications. Counter Terror Expo will be held in the Grand Hall of the Olympia Exhibition & Conference Centre, 19-20 April 2011.
FOR MORE INFORMATION For more information about Counter Terror Expo, contact Nicola GreenawayFuller on 020 85429090 or e-mail ngreenaway@niche-events.com
TRANSFORMING THE MOBILE SECURITY AND ENCRYPTION INDUSTRY RE YOU RESPONSIBLE for security of a State Agency? A security force? A global corporation? If so you should be concerned about the security of mobile data and mobile phone interception. Data is mobile. Every day, sensitive data leaves employees mobile phones. Voice and mobile data is the weakest link in secure communications. Growth of Smartphone use is driving the need for mobile encryption security to prevent the rapidly increasing number of data breaches. Morrigan has launched a groundbreaking encryption solution; ensuring critical voice and data communications remain robust and completely secure. The Morrigan Secure Application (MSA) has closed a significant security gap for Smartphone users that deal in sensitive data. • No specialist hardware is required • Military level encryption • Secure and encrypted voice • Secure and encrypted voicemail • Secure SMS
A
• Secure data transfer • Secure conference calling • Remotely and securely downloaded onto users existing Smartphones • Inter-operability across multiple government and security agencies • Operates seamlessly across all data enabled networks including 2G,3,4G, Wi-Fi and satellite • No geographical restrictions Contact Morrigan Partners for a confidential security consultation and overview.
FOR MORE INFORMATION Morrigan is exhibiting at Counter Terror Expo, 19-20 April 2011 in London. Tel: +353 1 6319730 E-mail: enquire@morrigan partners.com Web: www.morrigan partners.com
PROTECTIVE STORAGE & TRANSIT CASES • Dustproof and waterproof to IP67 • Ruggedised high level protection • Custom fitted interiors • Standard size range • Heavy duty, standard and custom designed including 19” racks • Performance level cushioning and ANTISHOCK protection • Aluminium containers and cases • Long term re-usable
BUILT TO TAKE ANYTHING CF CASES LTD 9 Consul Road, Rugby. CV21 1PB Tel: +44 (0) 1788 535 484 Fax: + (0) 1788 570 933 Email: sales@cfcases.co.uk Web: www.cfcases.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
91
COUNTER TERROR EXPO
www.counterterrorbusiness.com
THE NEXT GENERATION INTELLIGENT SENSOR FOR PERIMETER SECURITY F OTECH SOLUTIONS has developed Helios, the next generation in fibre optic sensing. Helios is a unique, patented monitoring and security technology that delivers unprecedented levels of sensitivity and range. Through the practical application of cutting edge optical physics, the Helios Distributed Acoustic Sensor is able to detect and identify events by their sound or vibration signatures and position them to a onemetre accuracy over a 50-kilometre range. This patented system uses back-scatter analysis of pulsed laser light to turn the entire length of a fibre optic cable into a high fidelity sensor that detects acoustic and vibration events at every metre. The high sensitivity of Helios has been harnessed with advanced Acoustic Analytics Intelligence techniques, which recognise the specific vibration characteristics of certain events and inform operators accordingly. This differentiates between a suspect event and the “false positive”. The system can also be taught to recognise specific events, giving a true intelligent sensing capability. Helios is highly tuneable and allows for the creation of thousands of individual zones along the fibre, each of which can be tuned to alert against different response
parameters. A single fibre on a perimeter can therefore be buried to provide an undetectable sensing capability, then mounted on fences or the buildings for intrusion alert, before passing beneath roads and paths to monitor vehicle or people movements in the facility. Helios provides precise GPS coordinates to the intuitive user interface and is capable of queuing of CCTV and PTZ cameras to help security teams rapidly detect, identify and respond to all their security issues. When buried the system creates a sensing zone in which footsteps can be detected at 15 metres from the fibre and vehicles at 40 metres. With the huge range performance, this sensitivity and intelligence creates a truly versatile sensor system that is in deployment to solve a number of key
national security issues around the world. The system has been designed for low installation and “through-life” cost and operates with nothing more than a standard telecommunications fibre as its sensor. This requires no power or additional equipment along its length. It also does not corrode and is resistant to RF or EMI, so once deployed the system is virtually maintenance free. The Helios system from Fotech Solutions is demonstrating its performance as the next generation intelligent sensor for perimeter and border security requirements.
FOR MORE INFORMATION Tel: +44 (0)1252 560570 E-mail: info@fotechsolutions.com Web: www.fotechsolutions.com
PERIMETER SECURITY FOR HIGH RISK SITES FROM GPS PERIMETER SYSTEMS T HE CONCEPT of a perimeter security system is simple; deploy a series of detectors around assets or people to be protected, far enough away from them to provide adequate time to make an appropriate response. To select an appropriate solution we must consider the layout and topography of the site, the end user requirements (visible or invisible security etc), the existence of physical barriers such as walls and fences, and the climate of the area, all of which will impact upon the suitability of a detection system. There is no single system or technology that can provide the correct, most effective solution for every application. Perimeter systems are not new and some of the technologies used have been around for many years, such as infrared beams and microwave barriers. However, because there has been an increase in awareness of perimeter detection systems there have been some noticeable changes and enhancements to the existing technologies, in particular the introduction of very advanced signal processing techniques to eliminate the signals created by the innumerable environmental effects. Interesting new technologies include fibre optic sensing systems designed for use on
very long perimeters or on surface and subterranean pipelines. The GPS Perimeter Systems Miles unit can sensitise fibres that are already installed for data collection and provide location information about an attack anywhere along the fibre. The use of existing fibres, if available, can significantly reduce the system installation costs. The system is flexible enough to protect secure fibre cable ducts running around sensitive sites. The DPP buried detection system provides covert security for high security sites by combining two alternative technologies, radio frequency and differential pressure, giving extremely stable and sensitive security. Using very sophisticated time and frequency domain
analysis the system virtually eliminates unwanted alarms and can provide programmable detection resolution down to 5m. This makes it ideal for integration with modern CCTV systems. Microwave barrier and Doppler technology have developed significantly and the ERMO range of digital microwave barriers, used in prison, petro-chemical and power generation applications throughout the world, provide significant advantages over the older, analogue processing barriers that are available. Built in behaviour patterns, event and signal memories and fuzzy logic analysis mean that each system can be tailored to the environment it is working in. GPS Perimeter Systems has more than 30 years of worldwide experience in the provision and application of different technology solutions for perimeter security. This means that we are able to give advice on the most secure and cost effective solutions, without relying on only one or two technologies.
FOR MORE INFORMATION Contact: John Bowerman Tel: 01604 648344 E-mail: sales@gpsperimeter.co.uk Web: www.gpsperimeter.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
93
Tel: +44 (0)1732 356911 Fax: +44 (0)1732 773007 sales@medicalwarehouse.co.uk www.medicalwarehouse.co.uk
COUNTER TERROR EXPO
www.counterterrorbusiness.com
EXHIBITION SOLUTIONS DELIVERED BEYOND YOUR EXPECTATIONS Z AREBA SECURITY is a leading global provider of customised perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • utilities • correctional or prison facilities • government or military installations • industrial/commercial property • airports, marinas, auto dealerships • critical infrastructure • ports and refineries • transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates. This means security guard and/ or local authorities can respond to a verified alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is the ideal solution. It is an electric fence system that combines a barrier with intrusion sensing
and shock deterrent to prevent security breaches. The Induced Pulse® system is ideal for correctional or high security installations and has a variety of head end control options available. The system features: • Proven effective in hundreds of miles of perimeter applications worldwide • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customise to any zone length or wire array • Standalone installation or mount on existing fence, roof or wall tops • PC Windows based user interface • Graphical mapping overlay • Customer friendly GUI
• Interfacing with most common data bus systems • Integration with CCTV systems • Integration with access control systems • Listed in the UK CPNI approved product list • Listed in the UK Secure By Design (SBD) product list Zareba Security has designed and engineered perimeter fence systems for satisfied customers around the globe. We have sales and technical staff based in the UK. We also have our own UK based in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their site. Zareba Security only sells to approved installers. We offer in house training courses to Lantra standards.
FOR MORE INFORMATION Zareba Security, 8 Lands End Way Oakham, Rutland LE15 6RF, UK Tel: +44 (0)1572 722558 Fax: +44 (0)1572 757614 Web: www.ZarebaSecurity.com
INOVA INDUSTRIAL SLIDING GATES SECURITY THROUGH INNOVATION I NOVA GATES IS very confident that we will become the preferred choice for all your security and access solution needs in the future. But why choose us? INOVA GATES is recognised as one of the UK’s leading security and access control solution providers. We offer a definitive service, from initial security evaluations at your premises, through design and manufacture, to full installation (including civils work) and comprehensive after-sales and maintenance. With over 25 years combined experience in the security fencing and access control solutions market, and hundreds of installations under our belt, we feel justified in claiming to be genuine experts in our field. We are a familyowned company that has succeeded in a specialist industry by focusing on traditional business values and cutting edge technology in equal measure, and our “account management” approach and attention to detail has enabled us to build an ever-growing portfolio of blue chip clients such as National Grid UK wide, Warwickshire Police Constabulary, Royal Mail, Luton Airport, Belfast City Airport, EDF Energy at the London 2012 Olympic Project, to name but a few. The unique, patented design, drive unit
on INOVA sliding gates is housed invisibly inside the lower beam, instead of being mounted on the outside edge of the gate leaf itself, as is the case with conventional gates. This cantilevered design, brilliant in its simplicity, has already won several European prizes, and is justifiably recognised as the leader in its field. Furthermore, our commitment to design innovation, through close liaison with suppliers and ongoing client relations enables us to continually offer you
improved quality, safety, and security. Whether you operate from small retail premises, a modern business park, large industrial site, or a HIGH SECURITY environment INOVA GATES will ensure you have the best security available.
FOR MORE INFORMATION Tel: 0845 3313377 Fax: 0845 3313388 E-mail: sales@inovagates.com Web: www.inovagates.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
95
File: 179230-9-10 CPD Liddle Ad size: A4 1/4P (90mm wide x 130mm high)
Liddle Doors Limited are the established leaders and innovators of Bespoke Certified Steel Security products. With over thirty years experience in the security industry we are ideally placed to meet your individual requirements with a unique range of products to suit virtually any non-standard application. Design, manufacture and installation of: •
Steel Security Doorsets Security Ratings Level 2, 3 & 4.
•
Steel Security bottle Storage Frames Security Rating Level 2.
•
Steel Security Barsets Security Ratings Level 2 & 3.
•
Steel Security Boxes Security Ratings Level 2 & 3.
•
Anti-Terrorist range of Steel Security Cabinets and Enclosures.
•
Controlled Steel Entrance Doors and Secure Glazed Screens.
Liddle Doors work closely with Security Advisors and Specifiers in finding effective solutions to security problems, offering technical support and advice on product selection, specification and performance. Our Company continues to invest in product development to ensure we meet the demands of an increasingly security conscious market place.
LIDDLE – SPECIFY WITH CONFIDENCE
Liddle Doors Limited Wagonway Road Industrial Estate Hebburn Tyne and Wear NE31 1SP T: 0191 4835449 F: 0191 4890698 sales@liddledoors.co.uk www.liddledoors.co.uk
COUNTER TERROR EXPO
www.counterterrorbusiness.com
FIRST LINE OF DEFENCE – LOCHRIN® BAIN PERIMETER PROTECTION A T LOCHRIN® BAIN, established in 1859, we appreciate long term value and treat each project on its own merits, mindful of its priorities and requirements, bearing in mind the importance of balancing quality and subsequent downstream maintenance costs. It is important to us that you, our client, are confident knowing the product that you buy today is the same as the product tested. We at Lochrin® ensure the continuity of not only our component suppliers but, their raw material suppliers further down the supply chain. Lochrin® Bain is well known in industry for the manufacture and supply of the patented high security fencing system – the Lochrin® Combi. Testament to this is that the Combi is currently being utilised as the first line of defence in many UK economic key asset sites. Tested to recognised standards – prior to the new testing criteria being established, the Lochrin® Combi met legacy SEAP Classes 3 & 4 (3.0m & 3.6m High specs respectively). The Lochrin® Combi Gates also achieved a SEAP 3 rating. Consequently, the aforementioned systems meet the new ‘Enhanced’ Criteria
Classification set out by the Home Office Scientific Development Branch (HOSDB). Further testing of the Lochrin® products is due to take place in February 2011. We can allocate our skills on a one-off basis, or as part of an inclusive package with an established portfolio of highlevel projects already successfully delivered in the UK, on behalf of Utilities, railways, MOD, Telecommunications etc including a catalogue of diverse commercial developments. We can apply our specialist design as a bespoke service to suit specific business needs. Our aim is to minimise
the risk to your assets and networks, securing both new-build and existing infrastructure projects. Business developments – In August 2010, Lochrin® Bain was aquired by the H. W. Martin Group which has delivered successful specialist public and private works contracts for over 30 years. The Group’s key areas of activity include waste recycling and management, traffic management systems, commercial fencing and vegetation management, permanent and temporary road safety barrier, plant and vehicle provision and maintenance. This amalgamation together with the UK wide installation service will prove a more attractive package to our clients providing turnkey solutions for the future. Latest news – Lochrin® Bain now offers a comprehensive consultation service to include all aspects of site vulnerability assessment, procurement and product testing & evaluation. This service will be carried out by a fully authorised government auditor.
FOR MORE INFORMATION Web: www.lochrin-bain.co.uk You will find us on Stand H36 at Counter Terror Expo 2011.
MCARTHUR GROUP LTD – BASTION PERIMETER FENCING SYSTEMS I
NCREASED SECURITY levels are becoming a necessity in the modern day, and no compromise can be given to the security of property. For a high level of perimeter security fence, whilst maintaining a discreet visual impact on the environment, the Bastion Secure 358 panel system provides an aesthetically pleasing see-through fencing system complete with the anti-cut, antivandal and anti-climb qualities desired. Bastion Secure 358 is a contemporary and visually appealing heavy weldmesh fence panel system ideally suited for most types of boundary, general and antiintruder applications. The manufacturer of the Bastion 358 fencing system has achieved the standards required for Police Preferred Specification status. This means it has been independently tested and approved as effective crime prevention to Secured By Design levels. Panels range from 1.8m to 5.2m high security. In addition the Bastion Secure Beam 358 system provides all the qualities of the Secure 358 plus the shape and number of integral beam profiles increases the rigidity resulting in a maximum security product. This system is available in 2.4m high, with the option of extensions for barbed wire to deliver that complete defence system.
McArthur Group supplies a wide range of Bastion fencing systems, each delivering their own unique panel style and specification. There are various fixing alternatives including the patented Hexaclip RHS Posts, which have an exclusive fixing method specially designed to give maximum possible resistance to vandalism and attempts to force entry. Each fencing system supplied by McArthur Group comes with the option of fully matching gates, including swing, cantilever and tracked sliding gates. All swing gates are manufactured to the customer’s specification and can open inwards or outwards, with posts being free standing or to fit within the fenceline. McArthur Group is now the distributor of Lochrin® Bain security palisade including both Classic and Combi ranges. Lochrin
Bain palisade supplies the unique style where the vertical rails pass through the horizontal rails to provide added strength and security to all palisade applications. McArthur Group offers our full range of fencing and panel systems across the UK and Ireland. With 13 strategically positioned distribution branches and our own fleet of vehicles we can offer a fast and efficient national delivery service. You will find McArthur Group representatives available to discuss your requirements on Stand H36 at the Counter Terror Expo.
FOR MORE INFORMATION Tel: 0845 3721839 Fax: 0870 2384486 E-mail: enquiries@mcarthur-group.com Web: www.mcarthur-group.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
97
The ultimate portable thermal imaging camera.
Simple to operate
High resolution viewing screen
Light weight
For search, patrol and surveillance operations. It gets results.
See the BIGGER picture Argus Long Range Telemetry Argus LRT transmits clear, secure thermal video footage to on-scene commanders. From tower blocks to subterranean tunnels, this upgrade to the Argus SC gets a better view of the situation • Designed using COFDM technology for a secure transmission • Noise free quality picture • Up t0 1km range • Integrated into camera battery For more information or to book a demonstration please go to
www.argusdirect.com
LRT
The Argus SC is excellent at locating people hiding in foliage, regardless of the time of day. By locating a suspect with an Argus SC, officers can approach and apprehend a suspect without risking dangerous confrontations and involving many officers.
Argus SC cameras detect and reveal the heat created by the powerful lighting systems used to grow marijuana indoors. In a row a hot roof stands out.
The Argus SC can identify threats to personnel such as hidden suspects, guard dogs, and dangerous obstacles. It can also warn them of any potential threats lurking in the dark.
Argus SC thermal imaging can view large areas of land or water, searching rapidly to identify hot bodies and requiring less manpower than conventional methods. Searches can be conducted efficiently whether carried out on foot, or from vehicles or boats.
Thermal imagers can immediately highlight if a vehicle has recently moved (hot tyres, brakes and engine heat reflection). r superior surveillance capability in an Consequently they urban situation.
Officers can quickly and ctively scrutinise between homes and buildings. In total darkness, officers can go virtually undetected, as they search for prowlers, peeping toms, and other criminal misbehaviour.
Police officers, fire fighters and military personnel are all required to operate in low, or no visibility, environments. The Argus SC can help train people in reconstructions of real-life night operations.
Argus SC thermal imaging cameras can help at various stages in collision investigation. Whether locating key clues to the collision (such as skid marks), missing people, or missing vehicle parts.
During a vehicle pursuit, if the occupier/occupiers abandon the car and continue to run on foot, officers can point the camera inside the vacated vehicle to determine how many occupants were present.
If used immediately after an incident, such as a burglary, the Argus SC can help forensic teams locate and record evidence. Heat signatures from the burglar’s body, like handprints on handles etc may still be evident (time dependent on body heat temperature, length of time contact has been made and the material touched).
Project1_Layout 1 04/11/2010 17:37 Page 1
DESIGNED TO SECURE AND PROTECT
Introducing the Stronguard range. TM
High security products that have been tested and approved by HM Government, and recommended for sites that demand maximum security.
stronguard
Tested & Approved TM
security enhanced products
Call us now for a copy of our complete guide to high security perimeter solutions, and for the full range and more information visit our website...
www.barkersfencing.com/applications/max-security or call us now! +44(0)1782 319264
Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture Electronic Warfare, Unmanned Systems, Radar, Surveillance The most important thing we build is trust
• • • • • •
Large Standard Product Range Customised Antenna Development Sector and Multi Sector Omni, Multi-Stacked Omni High Gain Directional COFDM Applications
• • • • • •
European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas
CounterTerror20100908.indd 1
UAV, UMS, UGV Direction Finding, Tracking Covert/Overt PMR, Tetra, Cellular DAS Ultra Wideband IED Countermeasures
Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: antennasystems.ma@cobham.com www.cobham.com/antennasystems/newmarket
Antenna photos not to scale
25/11/2010 15:33
COUNTER TERROR EXPO
www.counterterrorbusiness.com
ZAUN’S PERIMETER SOLUTIONS – THE FIRST LINE OF DEFENCE Z AUN’S INDUSTRY leading security perimeter solutions have been tested and approved to leading government standards. This enables us to provide a complete range of solutions to meet the security requirement for any high security perimeter application. Our first class range of perimeter fencing solutions is designed and manufactured in our state of the art production facility in the heart of the West Midlands. Solutions can be tailored to any application and can be provided as part of a complete turnkey solution. Zaun’s range of products include 358 systems to our new ArmaWeave® range. This patent pending design sets the benchmark in perimeter protection. The range, which has received the Secured by Design (SBD) Award, is the first of its kind on the market that has been specifically introduced to set new standards in high security perimeter solutions. The innovative design of ArmaWeave® has been developed to meet the growing niche for high security fencing. The unique properties of this mesh system offer substantial advantages in delay times from attacks such as cutting with hand, powered and non-contact tools,
when compared with traditional welded mesh systems. The tight mesh pattern of this fence offers no climbing aids thus again limiting the potential for attack. Tested by various government departments, the ArmaWeave® range meets the current criteria for forcible attack. Another option from Zaun is Multi-fence. A patent pending design, Multi-fence is a mobile high security fence. This durable solution offers high security protection for situations that require temporary to longterm protection; the solution is also ideal for applications such as utility plants, as no foundations are required. Our system uses anti-climb fencing, giving protection up to 5m in height. With fence posts mounted onto concrete blocks which, due to an ingenious bolting method, can follow a curve or go from a flat surface to an incline with ease. Manufactured to meet the stringent quality
standards of BS EN 1317 Part 2 (vehicle restraint systems), the blocks are approved for use by the Highways Agency. This solution gives considerable space saving over separate roadblocks and temporary fencing solution and is available for rental or sales. Our range of vehicle and pedestrian security gates meet the demands of each site. Our gate technologies combine our industry leading fencing solutions to ensure they meet the same, leading government standards. These solutions can combine electronic locks, panic latches and electronic fence toppings as well as integrated camera systems and access control. This range extends to impact rated barriers and blockers, which have been tested to the highest government approved standards. Zaun can offer an integrated installation package to best meet your direct needs. Our fully accredited, specialist managed installers, ensure the installation meets the same high quality benchmark of our supplied products. This can be further enhanced with our leading product and installation guarantee.
FOR MORE INFORMATION For more information on Zaun and its extensive range of fencing solutions visit www.zaun.co.uk or call 01902 796699.
BROUGHTON CONTROLS HIGH SECURITY – SOLVING YOUR SECURITY MATTERS B ROUGHTON CONTROLS LIMITED has over 35 years of experience in the design, manufacture, installation and service of a vast range of entrance control and perimeter protection solutions throughout the UK and EMEA regions. Ranging from vehicle road blockers, security barriers and pedestrian equipment including pedestrian speed gates and impact tested PAS 68 products. Broughton Controls prides itself on not merely supplying equipment but providing solutions to clients’ problems by helping design systems for each specific project, by utilising its vastly experienced engineers and the latest auto-CAD design system. Broughton uses this experience to its advantage giving the company the ability to design new or customise existing products to meet exact customer requirements, whilst using standard control and automation systems to maintain reliability. This allows a precise solution to each customer’s requirements, rather than the compromise of trying to use existing, off-the-shelf products. Broughton’s policy of involvement in
project design and management with a dedicated project manager ensures smooth progression from order to handover, and with ongoing maintenance support through sister company Eisotech Services Ltd this ensures long term system reliability for years to come. The High Security Division of Broughton Controls Limited provides commerce, industry and governments around the globe with a range of security rated products designed for high risk applications. As a
dedicated resource this division contains the ability, experience and knowledge to address and solve the perimeter and entrance control issues thrown up by the evolving threats in today’s ever changing world. To meet the increasing demand for high security solutions both abroad and here in the UK, Broughton Controls High Security Division is constantly developing a varied range of crash rated products to PAS68 criteria to compliment its existing range of proven industrial equipment by taking on the role of the terrorist, criminal and vandal. The company puts the best current products to the test and home in on the weaknesses found. This is where the hard work starts as they explore new technology, re-design and continually re-test until a successful, practical and robust solution is found.
FOR MORE INFORMATION Broughton Controls Ltd, 33 Stakehill Industrial Estate, Middleton, Manchester M24 2RW Tel: 0161 6551020 Fax: 0161 6551021 Web: www.broughton-controls.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
101
COUNTER TERROR EXPO I9 – 20 April 20II Olympia London www.counterterrorexpo.com
Counter Terror Expo delivers both focus and clarity to the complex and multifaceted task of protecting people and assets from those with the intent to do harm. This critically acclaimed event provides a vital forum for debate and plays a key role at the epicentre of the development of future counter-terrorism strategy. Unique, dedicated exhibition showcasing counter terrorism and specialist security technologies High level conference with six streams featuring over 200 leading international speakers Over 120 free-to-attend technology and practical workshops Live product capability demonstrations Meet the buyer programme Networking functions For more information please contact: Nicola Greenaway t: + 44 (0) 208 542 9090 e: nicola.greenaway@clarionevents.com w: www.counterterrorexpo.com
Register today at www.counterterrorexpo.com/register2011
COUNTER TERROR EXPO
www.counterterrorbusiness.com
AUDIONATION-UK SECURITY AND DEFENCE SYSTEMS UDIONATION-UK is a growing company in the security and defence sector, offering the latest systems in acoustic hailing, optical communications and detection. A long established business in acoustic hailing devices and prime supplier of LRAD systems supporting maritime security, crowd control, and land defence. Many LRAD systems are now deployed through AudionationUK, filling an important capability gap of long range communication and notification. Continuing its growth market in non-RF communications, Audionation-UK is a main supplier of Lightspeed technology from Torrey Pines Logic, a ground breaking secure wireless optical voice/ data link integrated into a Binocular or handheld unit. The B20 Binocular kit is now available and new systems will support data speeds beyond 40MBPS, all utilising eye-safe
A
LED technology. Optical/sniper detection systems are increasingly becoming an important security capability, not just to detect gun scopes but to potentially identify unauthorised surviellence through video, camera, binoculars or other lens mounted systems. The easy to use handheld units can detect optics up to and beyond one kilometre away, giving the user a fast scanning capability and instant notification of a potential target. We look forward to the Counter Terror Show 2011 and welcome visitors to our stand to see the latest products.
FOR MORE INFORMATION Tel: +44 (0)1934 642555 Fax: +44 (0)1934 823726 E-mail: info@audio nation-uk.com Web: www.audio nation-uk.com/About.html
CUSTOM BATTERIES AND PORTABLE POWER MS technologies, an ISO9001:2008 accredited company, has a long experience of developing battery-based portable power solutions across a broad range of market sectors, notably where wide operating parameters are required. Our expertise encompasses all battery technologies including NiMH, Lithium, NiCd and sealed lead acid. We have designed and manufactured a range of Red Flash™ Remote Portable Power Units. These have been designed for operating in the field in remote and rugged environments, particularly suitable for tactical units who require silent, odourless power for ancillary equipment, and are available in 600W AC or 44Ah DC outputs. The packs incorporate connectors permitting re-charge from either vehicles or mains voltage. They can also be linked for added run-time/capacity.
D
Resilience Through Security
For more information please call
0118 976 7544
or email cmr@ecalimited.co.uk
FOR MORE INFORMATION Tel: +44 (0)1794 525400 Fax: +44 (0)1794 525450 E-mail: sales@dmstech.co.uk Web: www.dmstech.co.uk
ECA GROUP – RESILIENCE THROUGH SECURITY HE ECA GROUP specialises in the protection of government and commercial businesscritical information and critical national infrastructure. We are specialists in HMG Accreditation for IA and Commercial Business Assurance. Our track record: Delivered secure UK Government Gateway infrastructure; built and managed UKOnline; helped design the national fire and rescue control centres; Network Rail Technical Design Authority; reviewed UK CNI data centres; provided national ID card programme security/ integrity team; architecture and security advisors to the Trusted Borders Programme with a significant portfolio of information assurance, business assurance and business continuity/disaster recovery assignments in national institutions and the commercial arena, including authoring the latest government and banking industry guidelines
T
The ECA Group
Rugged cases enable the units to withstand high impacts and extreme environments. Another aspect of our business encompasses engine start for 12v and 24V vehicles, aircraft and generators. These rugged powerpacks, available with a range of suitable connectors, are in service with military customers, emergency services and roadside assistance organisations as well as commercial fleet operators. In addition to our built packs, we are able to supply high performance batteries for applications including specialist vehicles, marine, telecommunications and rail infrastructure.
for the protection of data centres. We don’t stand still: Our Innovation Lab sifts and evaluates emerging technology delivering resilient, cost-effective and sustainable business benefit utilising secure cloud, virtualisation and open source intelligence. Leaders in business assurance, business continuity and disaster recovery, we drive legal, regulatory and best practice requirements to ensure business optimisation and resilience. We remain in the forefront of new technology and policy development; offering products and methodologies which provide solutions that deliver cost effective, sustainable business benefit. Our ethos: resilience through security.
FOR MORE INFORMATION Tel: 0118 9767544 E-mail: cmr@ecalimited.co.uk Web: www.ecalimited.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
103
COUNTER TERROR EXPO
www.counterterrorbusiness.com
THE NEW APPROACH TO COUNTERING TERRORISM Thales discusses how collaborative working can increase resilience and protect people, economy, infrastructure and territory throughout the world ERRORISM is not a new threat to the UK or the world. It has been around for centuries in many forms, but in the modern world these threats have increased in both frequency and intensity. Over the last few decades the ability of terrorists to carry out devastating attacks has increased ten fold as technologies have advanced and as the terrorists themselves have become smarter and more savvy to countering terrorism operations. It is a constant battle for governments throughout the world to stay ahead of the curve and develop counter measures that enhance their ability to prevent attacks before they occur or to have the best possible contingency plans should an attack happen. The requirement for these improved prevention capabilities has been paramount to the leading global governments since both the 9/11 and 7/7 attacks, which sent shock waves around the world. These devastating attacks, not only took the lives of thousands of innocent people, but highlighted the fact that two of the most secure countries in the world were not impenetrable from significant terrorist attacks. Given the UK’s experience of terrorism from terrorist groups in Northern Ireland, you would have thought the UK would have learnt its lessons. GOVERNMENT INVESTMENT Both of these attacks have led to significant increases in government investment to counter terrorism, but both countries still remain on high alert from potential attacks from international terrorist organisations such as Al Qaida. The increased threat of these attacks has posed government with a real problem, especially during the global financial crisis. Many questions have been asked about how threats can be reduced or negated whilst reducing the costs in order to help the UK regain financial stability. The government spending review has set out the plans for reducing the financial deficit, whilst the Strategic Defence and Security Review and The National Security Strategy have set out how the government intends to do more with less. These documents set out two clear objectives: to ensure a secure and resilient UK by protecting our people, economy, infrastructure and territory along with shaping a stable world by actively seeking to reduce threats
T
104
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
from international organisations. Both of these documents clearly outline the requirement to increase the investment into national security across the spectrum. Much research has been undertaken to review where the main sources of threats to our national security will come from over the coming years, with investment in these areas set to increase over previous budgets. The new strategies focus around removing bureaucracy and streamlining bilateral organisations in order to identify risks and threats earlier instead of having to deal with the consequences. KEY AREAS Two of the key areas which have been identified as critical to increase national and international security are cyber security and counter terrorism measures. Counter terrorism measures are diverse and cover everything from UK border security to covert intelligence gathering deep within the origins of the threat source. Key priorities in countering terrorism include working closely with international organisations to provide enhanced intelligence and communications, helping to identify when threats are building so that counter measures can be implemented to prevent the attack. Other key elements include increased border security systems that operate across multiple organisations within the UK and throughout the world. This collaborative working is a critical requirement if terrorist threats are to be reduced and strengthening of these international relationships will help to squeeze the terrorist groups in smaller pockets, thus reducing the opportunities for attacks. CYBER THREATS Cyber threats, on the other hand, can be significantly more challenging to overcome. The digital age has spread to the four corners of the earth, and now forms the basis of much of 21st century society. However, as the dependency on cyber technologies has grown so has the threat that accompanies it. The source of the threat is also far wider in cyber security. Unlike physical terrorism, which often requires coordination across groups or countries, cyber threats can be promulgated from the opposite side of the world from anyone with a computer. Although this may sound unrealistic, this is very much the case. Cyber
threats come from far wider than opposing governments. They also pose a much greater threat to normal people than perhaps we perceive them to. With so much personal information now stored in electronic format this means that not only national security data is open to attack, but also information on every single person who holds a bank account or uses the internet. It is the diversity of this threat that makes cyber security such a difficult challenge to overcome. So what does all this mean and how are these new strategies going to be realised? One of the key elements to come out of the SDSR and NSS is the need to increase the collaboration across industry to deliver the best solution at the best
COUNTER TERROR EXPO
www.counterterrorbusiness.com
price, without compromising on security. A major stepping-stone to achieve this will be much closer working relationships between governments, industry and academia. Developing this relationship will enable industry to get a much clearer idea of what the issues are. By doing this industry can establish if a solution already exists in a different sector, helping to reduce the costs of creating a new solution when one may already exist that requires only minimal tailoring in order to meet the requirement. This could lead to huge cost savings both for
the customer and the supplier, helping to provide better economies of scale and making industry more cost effective. MAKING THE WORLD A MORE SECURE PLACE The UK has long been known as one of the world’s leading innovators and if we are to succeed in making the world a more secure place, it is the collaboration across industry that will be key. Having laid out the strategy the government will be looking for not only large primes to work better together to deliver solutions,
Unlike physical terrorism which often requires coordination across groups or countries, cyber threats can be promulgated from the opposite side of the world from anyone with a computer
but also to look at bringing through new and emerging technologies from SMEs. This cross working approach will help to ensure that technologies are not overlooked purely because they are provided by smaller businesses, with the larger primes being able to absorb some of the risk associated with new technologies. Developing this approach will also have a knock on effect in terms of helping to repair the global economy. Increased business growth will not only provide more income to the global financial market, but it will also help to create jobs and provide economic stability to countries like the UK. An example of how this process has already begun is with the INSTINCT Technology Demonstrator 2 programme, which aims to showcase new and existing technologies to enhance aviation security, which is a highly targeted area for terrorists. The programme has brought SME technologies to the fore which will pave the way for future aviation security. Many of the SMEs involved in this programme may not have previously had the funds or the ability to show their technologies to key stake holders in the aviation sector, but this programme, which is headed up by OSCT, could lead to substantial changes in how airports operate and significantly improved security. BATTLE Although the SDSR and NSS set out the objectives that will help to reduce the threats we all face on a daily basis the future requirements for counter terrorism and cyber security are constantly and rapidly evolving. For every counter measure that is created to prevent and negate physical and cyber attacks on the world we live in, the terrorists are already looking at ways to circumvent the very things which are put in place to prevent them. It is a battle which will be raging on for future generations to come, and for each threat that is eradicated another one will appear. Of course technology is only one part of a complicated jigsaw that needs to be put into place. However, by accepting the challenge and working closer together across government, industry, academia and international boundaries we at least improve our chances of success. We know what needs to be done, and where the focus needs to be, now it’s down to us all to work towards a common goal of stamping out terrorism wherever and whenever it rears its ugly head.
FOR MORE INFORMATION Web: www.thalesgroup.com/uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
105
Modelling real situations in strategic buildings - Quantifying the risk
Left side, gas propagation in a lab. Right side, modelling of the same gas using HG_Flow CFD software in the same lab, under same aeraulic conditions.
Propagation of a toxic gas released in a sports arena under predefined atmospheric conditions and display of the hazardous volume. HyGie-Tech SA, Avenue de Gratta-Paille 1, CH-1018 Lausanne Switzerland Email: info@hygie-tech.ch – Website: www.hygie-tech.ch
COUNTER TERROR EXPO
www.counterterrorbusiness.com
BIOLOGICAL AND CHEMICAL DEFENCE HyGie-Tech opens route to high-speed quantitative assessment of airborne contaminants with its CFD software HG_Flow N A CONTEXT of increasing threats with a possible usage of dirty weapons associating biological and/or chemical agents, defense and protection agencies are facing a serious situation. Becoming aware that such aggressions can hardly be prevented if not detected, these agencies are nevertheless expected to get ready and enhance their preparedness to reduce impacts and consequences. To achieve that goal, it requires a clear knowledge of probable targets and, in case of event, it requires the capacity to rapidly determine or assess the criticality of the situation and provide with relevant decision. To help in addressing it, HyGie-Tech has come up with the unique CFD solver HG_Flow (and more precisely with its module HG_Flow.protect designed for protection programmes). HG_Flow.protect enables with very high-speed a quantitative evaluation of diffused contaminants (either gaseous or airborne aerosol) in both usages: prospective (eg in preventive action plans) and retrospective (eg in curative actions). By design, HG_Flow.protect is well adapted to meet user’s requirements and possesses following major merits:
I
HIGH-SPEED AND CONSISTENCY HG_Flow.protect takes advantage from the fact that the modeling and the numerical method are specific to that particular domain so that the calculation time and required resources are markedly reduced. Thanks to it, HG_Flow.protect can provide with a first approximate solution in less than 15 minutes rapidly followed by refined solution. ACCURACY AND FIDELITY Through other HyGie-Tech proprietary software, HG_Flow directly interfaces with a 3D laser scanner that provides
with precise representation, at millimetre or centimetre scale, of existing facilities with installed equipment and population so that the environment in which CFD modeling runs is an exact reproduction of the reality. Then HG_Flow generates meshes that can be directly integrated in CFD. This system has already been conveniently used by HyGie-Tech on very large clouds of points (over one billion points) without alteration of computational performances. Once numerised by laser scanning and processed by HG_Flow to generate 3D meshes, environmental data are stored in a databank. Aeraulic conditions are added with their current uncertainties. CONTAMINATING AGENT AS A VARIABLE Various contaminating agents (chemical and biological) are stored in a second databank. Related information, such as physical and chemical properties or toxicological data, is associated to each contaminating agent. Thus, for an initial released quantity from a given emitting point, located in a consistent system of coordinates with the one used for the environment, HG_Flow.protect provides for that particular agent the 3D volume where various levels of toxicity are assessed. Combination of these three marking merits of HG_Flow.protect would provide users (ie defense and protection agencies) with unmet relevancy in protecting installations and assessing risk in case of event. In case of occurrence of the latter, rescue teams can be directed with a clear perception of invisible concentration of contaminating agent. These characteristics of HG_Flow. protect are in fact inherited from the root software HG_Flow which comes with the following marking points: HG_Flow has been designed and developed by experts of airflow and
airborne contamination. HG_Flow has to date been thoroughly validated in various configurations involving gaseous and aerosol contaminants. Either in a rapid risk assessment (diagnostic modus) or in a deeper analytical screening (for a precise localisation of contaminated volume and determination of areas to decontaminate), HG_Flow proceeds with the level of performance adapted to the target. Beside its unique computational performance, HG_Flow affords total security to the user as far as all data (either downloaded or uploaded in the system) are encrypted according to an enhanced process with possible individual and nominative key. RISK ORIENTED COMPUTATIONAL FLUID DYNAMICS If one had to remember only one feature about HG_Flow, it should, to our sense, be its total implementation in a world of risk management. Thus, HG_Flow has integrated as design input the current principles of risk evaluation and risk assessment. All calculations run by HG_Flow and all solutions displayed are targeting the objective of providing the user with a rapid and a non-ambiguous evaluation of risk as emerging from a given event. HG_Flow is the decision tool when an intuitive approach cannot afford the required level of relevancy and consistency. For these reasons, HyGie-Tech affirms that its HG_Flow has succeeded in merging in unique platform the CFD science, the available knowledge in fields of toxicology and the risk management methodology to create a new branch that has been named risk oriented Computational Fluid Dynamics, or roCFD. To meet design requirements, roCFD should remove from its interface useless information to focus on risk level in given environment and that is exactly what HG_Flow provides in its current version. In Hygie-Tech, we aim at democratising CFD, by the usage of roCFD, and remove existing barriers between experts and end users.
FOR MORE INFORMATION Web: www.hygie-tech.ch
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
107
As a company our strength lies in our experience, expertise and flexible approach to our customers. We have well established designs for most applications such as:
We are a world leading provider of specialist RF Protected environments such as EMPP and Tempest facilities. Along with our vast amount of experience in the EMC and antenna measurement world we can ensure compliance with the very highest quality international requirements.
n Tempest n RF & Microwave protection n EMPP n Electronic warfare n Aircraft & Military equipment testing We are a UK based company operating on a global scale with representation in many countries throughout the world. and are ISO9001 & ISO14001 certified for Design, manufacture, installation and testing of our product range.
Web: www.rainfordemc.com Telephone: +44 (0)1942 296190
Value Added Motion Control Solutions. Infranor Group offers innovative solutions from detailed design through to manufacture.
We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defense, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.
www.infranor.com
Info.uk@infranor.com
HOSTILE VEHICLE FEATURE MITIGATION SECTION
www.counterterrorbusiness.com
DESIGNING AND DEVELOPING EFFECTIVE PROTECTION The Centre for the Protection of National Infrastructure discusses hostile vehicle mitigation measures and challenges facing the security industry protecting public sites EVELOPING hostile vehicle mitigation (HVM) measures with industry that can effectively blend into a range of public realm and private site scenarios is the challenge that faces a team of specialists at the UK’s Centre for the Protection of National Infrastructure (CPNI). CPNI is the UK government authority that provides protective security advice to the businesses and organisations of the national infrastructure. CHALLENGES Protection options for more industrial and military sites have been effectively fulfilled over the past years through a range of functional access control and perimeter protection systems. However, the challenges of protecting architecturally delicate, and pedestrian and utility-rich public realm sites have required lateral thinking and a vigorous research and development programme by CPNI and industry. Some of the results lie not only in new materials and construction techniques but also in new project management methods and partnerships with local authorities, urban planning professionals, architects and designers. “Shallower”, “more economic” and “more aesthetically attractive” are the three main
D
tenets by which CPNI direct their research and development work in this field. Examples of newer developments in the impact resistant product market include: “sprung steel” cores that can be shrouded in less voluminous shrouds and street furniture items; incredibly shallow-plated or framed bollard systems that reduce the need to divert utilities; polycarbonate bollards through which light can be shone to give more artistic protective security streetscape enhancements; cycle stands and surface-pinned planters; and blast resistant and shallower foundation walling and balustrade systems. PUBLIC REALM DESIGN GUIDE CPNI has worked with the urban planning and landscape architecture profession to produce guidance, to be published shortly, showing how design can be used to create HVM measures; providing inspiration and ideas for the integration of HVM measures within the public realm; giving example scenarios to show how a designer might approach the integration process; and listing important points to consider for a structured and thorough design process. It contains useful references, contacts, sources of information and precedents. Crucially, it has been written by designers for designers, based on the strong foundations from CPNI’s physical security research programme.
VEHICLE BORNE THREATS There are five styles of vehicle borne threat, typically Vehicle Borne Improvised Explosive Devices (VBIEDs), against which CPNI recommend that sites should consider protecting themselves. The parked vehicle threat: Encroachment threat; no impact takes place but a vehicle meanders its way through a clear route in the defences because the line of defence is incomplete; or the defences are inappropriately spaced (wider than a 1.2 metre air gap between adjacent fixed measures); or a hostile vehicle tailgates a “clean” vehicle through a single line of active barriers such as a gate or retractable bollard; or a hostile operative tampers with the electronic or hydraulic control apparatus at an active barrier system so that it opens and allows a hostile vehicle to then enter unimpeded. Penetrative (ramming) threat: This is either up to the achievable mass and speed of vehicle in the traversable terrain (the more “determined” style of threat including the use of suicide operatives); or up to an impact deceleration tolerable by the driver, if more “survivivable” styles of threat are being considered. Entry by deception: This is using false credentials, human “blag” or a “trojan” vehicle that is taken for granted.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
109
HOSTILE VEHICLE MITIGATION
Entry by duress: This is against a legitimate driver, forcing them to take a device into a site; or against a guard, forcing them to open a barrier. LAYERED ATTACKS Layered attacks may involve one or more forms of the above to get a device closer to a target. Although, typically, the threats on which CPNI provides advice are in relation to national security and involve VBIEDs, some sites or events may need to mitigate threats from just the determined use of a hostile vehicle as a weapon against people or property. CPNI’s training and advice recommend the installation, where possible, of a purely static barrier system at a suitable stand-off from a site, in order to negate deception and duress styles of attack and mitigate tampering and tailgating forms of encroachment attack. However, most retrofit schemes to premises involve reflecting an element of traffic flow into the cordon. This then requires extra mitigations to be considered to reduce the vulnerability from providing the access control point. VEHICLE SECURITY BARRIERS In order to address the penetrative vehicle borne threat, CPNI has continued to sponsor BSI to issue both an impact test specification and installation advice for vehicle security barriers. The expert panel for these documents comprises government security advisers, barrier manufacturers, security consultants, barrier installers and test house personnel. Earlier this year, a revised version of their impact test specification for vehicle security barriers (BSI PAS 68:2010) was published. The PAS 68 test process classifies
110
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
www.counterterrorbusiness.com
The challenges of protecting architecturally delicate, and pedestrian and utility-rich public realm sites have required lateral thinking and a vigorous research and development programme by CPNI and industry vehicle security barriers after impacting them with one of five vehicle types at one of seven speeds and measuring the postimpact “penetration” of typically the loadcarrying part of the vehicle relative to the original back face of the security barrier. The vehicle types are a 1.5 tonne car; 2.5 tonne 4x4 pickup; a 3.5 tonne flat bed van; a 7.5 tonne truck; and a 30 tonne rigid truck. Test speeds are 10, 20, 30, 40, 50, 60 and 70mph and expressed in km/h in the standard (16, 32, 48, 64, 80, 96, 112 km/h). Products which stop the vehicle but exhibit a high “penetration” are less suitable for use at sites with less stand-off distance from the barrier line to the asset being protected. CPNI has also sponsored and chaired a new CEN Workshop Agreement (CWA) 16221 on this same subject, embracing a wide European audience of governmental experts, consultants, manufacturers and test houses. The CWA adopts the same test specification as PAS 68 and “amalgamates” with the site survey and installation advice found in BSI PAS 69:2006 including reference to the crucial maximum air gap between adjacent HVM structural elements of 1.2 metres. Currently CPNI is sponsoring the process of developing a new International Working Agreement (IWA) on the same subject, embracing complementary and parallel international activities. The PAS 68 specification defines how to carry out impact tests to classify the
performance of a vehicle security barrier product. However, the tests are very expensive, particularly if a number of design iterations are tested in the design process. To help reduce the number of crash tests, CPNI has worked with MIRA, a test house and modelling contractor, and opted to develop validated Finite Element (FE) models of the whole suite of PAS 68 vehicle models. DIMENSIONAL DATA Dimensional data and component weights were taken from vehicle tear downs, with the material data sourced from MIRA’s extensive library of material models or adapted as a result of carefully controlled component and full vehicle tests. The vehicle models have been correlated to rigid bollard and flat rigid load cell wall tests to improve their accuracy. Innovatively, the FE models were also correlated against a range of kerb impact tests to simulate suspension and tyre response. To date, the models have been used successfully during the design process on a number of customer concept security products.
FOR MORE INFORMATION Further information on the measures outlined in this article can be obtained at www.cpni.gov.uk
HOSTILE VEHICLE MITIGATION
www.counterterrorbusiness.com
HOSTILE VEHICLE MITIGATION As one of the few mitigation experts in the UK, MFD is a leading design authority of Hostile Vehicle Mitigation (HVM) systems, specialising in counter-terrorist measures N CONJUNCTION with the UK Government as sole technical advisor, MFD has been central to civil engineering design input to the design of foundations appropriate to resist the high energy dynamic impact from hostile vehicles. As a specialist designer in security engineering and blast analysis the MFD’s engineering team have the capability to design HVM schemes and advise on the co-existent blast effects and collateral damage arising from this form of terrorist attack. For the past ten years MFD has supported focused research and development into effective security barriers as a means of Hostile Vehicle Mitigation (HVM). Public Available Specification British Standard, PAS68 Impact Test Specification for Vehicle Security Barriers has been prepared to address the needs of organisations that wish to have the assurance that vehicle security barriers will provide the level of impact resistance which is sought. Many systems are available that are either promoted or considered suitable for use as vehicle security barriers. As their characteristics differ in both function and form, a comparative means of assessing their performance is required. When considering the most effective barrier configuration for a site, the threats to be mitigated (postal, encroachment, penetrative, deception, duress, armed or physical attack or a layered attack) must first be clearly identified. Once identified, the potential vulnerabilities of each configuration against the defined threats may be assessed. The key to designing an effective HVM solution is to understand the consequence of hostile vehicle attack. Vehicleborne threats range from vandalism to sophisticated or aggressive attack by determined criminals or terrorists. The payload capacity and manoeuvrability of a vehicle can offer a convenient delivery mechanism for a large explosive device.
I
Hostile vehicles can be parked, manoeuvred or rammed into or out of a target location. Firstly, assess the site vulnerability to hostile vehicle threats and undertake a Vehicle Dynamic Assessment (VDA). The VDA identifies the likely vehicle impact speed for the various attack directions around the site. Therefore, the most appropriate PAS68 crash-tested vehicle security barrier or range of barriers can be selected to demonstrate, once integrated, how they form an effective and enforceable stand-off perimeter. The solution will also mitigate the effects of a consequential explosive detonation or ram raid. The preparation of a scheme design will also provide a number of costed options for stakeholder consideration. During the site survey stage, any existing site record information relating to buried structures, foundation, services and utilities should be made available for review. Clearly if the entrance to the site is above a subterranean basement, recommending rising bollards would be inappropriate, equally recommending a rising arm barrier with a low structure over is not practical. Also, the effects of site-specific ground conditions can be determined. Long fenced perimeters will require a static form of continuous vehicle barriers; ie PAS tested walls, berms, wire rope systems are appropriate. For permeable perimeters, barriers, such as bollards or planters and other architectural solutions can be used. Controlling vehicle access on and off the site is considered the most challenging aspect of an effective HVM solution. Depending on type and use of site it will be necessary to design a vehicle access control point (VACP). Active vehicle barriers are typically installed at VACPs, emergency access points or vehicle entrances to buildings. There are effectively two forms of active barriers; those that are manually operated by a guard or those that have a powered drive mechanism. These barriers normally comprise a physical barrier, foundations and infrastructure,
power supplies, control system, drive mechanism and a user interface, which could be either a human operator or an automatic access control system (AACS). VACP barriers are typically installed in three basic configurations: 1. Single line of barriers controlled by either AACS or guard force intervention and a single product in each lane such as a set of bollards, a blocker, rising arm barrier or gate. 2. Inter-locked barriers creating a secure vehicle containment area with inner and outer barriers which can only be opened one at a time. This system is significantly more secure than single lines of barriers, but has cost implications and significantly reduced vehicle throughput. 3. Denial barriers comprise two key areas: i) the pass checked location and ii) the final denial active vehicle security barrier at some distance away. The barrier will often remain open so as not to impede traffic flow. However, it can only be adopted in locations where available room and enforceable stand off is not an issue. The guard force must be well trained and have sufficient time to recognise and correctly interpret any potential threat activity and then to react proportionately in a timely manner to close the barrier. MFD’s team of multi-disciplined engineers undertake security surveys, threat assessments, security planning, concept and feasibility studies, budgeting and throughlife costings, outline and detailed designs and project management. To date they have designed over 60 HVM schemes at palaces, embassies, financial institutions, government buildings and airports. MFD is currently conducting surveys of the transport infrastructure and a number of public realm, central government funded schemes, prior to preparing the detail designed HVM solution.
FOR MORE INFORMATION Tel: 01794 516171 Fax: 01794 524460 E-mail: mail@mfdgroup.co.uk Web: www.mfdgroup.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
111
www.counterterrorbusiness.com
CPM - 100 Colour & Cut PRINT ANY SHAPE, SIZE AND COLOUR Alpha Lettering Systems 10 New Street, Ossett West Yorkshire, WF5 8BH Tel: +44 (0)1924 275747 Fax: +44 (0)1924 275740 Email: sales@alphalettering.co.uk Web: www.alphalettering.co.uk
ELECTRONIC PRODUCT DESIGN SERVICES FROM VPN SOLUTIONS PN Solutions Ltd is a small, dynamic, electronic product design consultancy. We can fulfill all your requirements for any project from one-off, bespoke/ dedicated test equipment to mass market products. Our services include: • Bespoke electronic engineering design services in discrete analogue, high speed digital and RF systems. • Microprocessor and DSP based systems as well as re-programmable logic, such as FPGA. • Embedded software, real time systems and PC based software tools. • Printed wiring board design and development. • On-site ‘hire an engineer’ service.
V
THE CPM-100 PRINTS IN UP TO 7 COLOURS ON OUTDOOR VINYL CUTS OUT SHAPES, TEXT & GRAPHICS INCLUDES SOFTWARE WITH OVER 2300 BUILT IN SAFETY SYMBOLS For EQUIPMENT LABELS SAFETY LABELS WARNING SIGNS WAREHOUSE LABELS SEQUENTIAL NUMBERING & MUCH MUCH MORE
Even if you are still in the early stages of development, our highly trained engineers will help you develop your requirements and specifications drawing on over 18 years of experience. Our engineers are trained in Altium Designer, Protel and Pro/Engineer, as well as many simulation and modelling software packages. Call us now and find out what we can do to assist you for all your electronic design needs.
FOR MORE INFORMATION Tel: +44 (0)115 9899472 Fax: +44 (0)871 6615746 E-mail: sales@vpn solutions.uk.com Web: www.vpn solutions.uk.com
REQUEST A FREE DEMONSTRATION
www.yelo.co.uk
AFFORDABLE TEST SYSTEMS FROM THE COMPANY YOU TRUST AUTOMATED TEST SYSTEM DEVELOPMENT > FIXED PRICE TURNKEY > TIME & MATERIALS SUB-CONTRACT
Mechanical fixturing, electrical, electronic and software expertise in-house NATIONAL INSTRUMENTS PARTNER • LABVIEW CERTIFIED ARCHITECT • TESTSTAND
112
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
For a no risk trial phone Christine on 02893 357 300
www.counterterrorbusiness.com
MAGNETIC COMPONENTS REMAIN CRITICAL TO OPERATIONAL SUCCESS I N EVERYDAY LIFE and from accounts handed down over the years, we are all familiar with instances of defences penetrated and lives lost due to operational failures. While vigilance and risk analysis can minimise certain “accidents waiting to happen”, there remain agents prepared and quite literally waiting to exploit operational failure and downtime. It is tempting to focus on top level system specifications, sophistication and technical features, yet without costly redundancy or reconfigurability no system is more robust than its constituent component parts. Key to the design and production of critical components is a comprehensive grasp not only of concepts and potentials, but also of limitations and failure modes. How far can the performance envelope be pushed without compromising integrity? Whilst every component supplier is able to deliver some sort of tangible product, what the customer ultimately desires is peace of mind. Best Windings specialises in those largely unseen and unsung inductive components that are critical to system performance. Whether in power supplies for fighter planes or EMC countermeasures in nuclear
submarines; from intrinsic safety in explosive gas environments to ultra-high temperature sensors in oil wells; from submarine cable magnetisers to sensors for detection of explosives, chemical agents and biohazards; from syringe pump dosimetry in life support to power modules in MRI scanners – in these and many other applications, products designed and manufactured by Best Windings are in continual critical service. Best Windings is experienced in the design of a wide range of magnetic components but is equally prepared to build to customer designs, or if required to suggest improvements or cost reductions to existing designs. Whether it be a
new design concept, an existing product, or a product running into obsolescence, Best Windings offers support founded on knowledge and experience stretching back many years. As well as building high integrity parts at its own UK premises, Best Windings works with a number of carefully chosen partners. Offshore manufacturing is available for less demanding, highly price-sensitive applications. The company also sells finest in the field standard components: UL recognised ETAL safety-critical line transformers, Magnelab current transformers for monitoring currents to 5000A with accuracies of one per cent and 0.5 degrees phase, and Intronics Power modules. To extend life, improve reliability and minimise downtime, Best Windings is able to supply replacements for obsolete or hard-to-find magnetic components, including legacy products such as Analog Devices power and function modules.
FOR MORE INFORMATION Tel: +44 (0)1394 448424 Fax: +44 (0)1394 448430 E-mail: sales@bestwindings.co.uk Web: www.bestwindings.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
113
TRANSPORT SECURITY
www.counterterrorbusiness.com
SECURING CARGO AND PASSENGERS WORLDWIDE Transport Security Expo, held in London earlier this year, delivered a holistic examination of the dynamic and continually evolving threats faced and the solutions to them RANSPORT SECURITY EXPO saw a significant upswing in visitor numbers during its first outing in the capital, with over 2,000 attendees visiting the exhibition and conference over the two days. The visitor hike reflected a heightened level of concern over high profile actual and attempted strikes against the system during the course of the year and emphasised the need to do more, often timed with less as austerity measures begin to bite, to protect the travelling public and international commerce.
T
AVIATION AND MARITIME With transport security industry news for the year to date having been dominated with terrorist strikes against the air sector and the marked increase in acts of piracy on the high seas, the event was dominated by high level conferences focusing on the travails in the aviation and maritime sectors. The operational failures that led to the attempted bombing of a
Northwest airlines flight late last year have exposed the fact that the aviation world is still wide open to the machinations of those with intent to harm. A shift in tactics by pirates has demonstrated that a naval show of force alone is insufficient to prevent the seizure of vessels in the vast swathe of ocean where they maraud with apparent impunity. A sense emerged during the course of the Transport Security Expo conference programme that the need for a step change in how the protection afforded the travelling public and international commerce is delivered has become much more acute and demands careful consideration in currently austere times. LEADING VENDORS A tour de force of the world’s leading security solution sellers marked the Transport Security Expo exhibition as best in class and ensured that almost all aspects of security relevant to the transportation sector were covered. Vendors such as Smith, Rapiscan, L3 and AS&E had substantial presence, but so to did a number of the emerging technology companies such as Kromek and others. A paradigm shift of sorts has been ongoing in the marketplace. With traditional hardware having reached the limits of capability, the shift is toward squeezing
more out of the available data stream through high end, software driven, digital signal processing techniques. In a very real sense, the future in the security world lays within the software code on a disc. NEW REGULATIONS The high number of visitors to the exhibition also reflected change afoot in the regulatory framework controlling delivery of security in the aviation sector. EU regulation published in April of this year, sets the ground rules on multiple aspects of the process from the public facing screening for liquid threats through to behind the scenes screening of belly-hold cargo. Many of the deadlines contained within the regulation are tight – the question remains whether they will be met, but it does seem likely they could drive a sales spike in the short term to medium term. Standing room only during the open theatre technology workshop sessions, emphasised the eagerness amongst delegates and visitors to learn more about each of the solutions showcased and how they could be harnessed to enhance security across the board. Transport Security Expo is one of the only such events to works closely with the leading industry bodies, including the North Atlantic Treaty Organisation (NATO), International Maritime Organisation (IMO) and very many others, to deliver a thought provoking conference and extensive workshop programme supported by one of the best exhibitions of its kind annually. Transport Security Expo will next be held 13-14 September 2011.
FOR MORE INFORMATION Web: www.transec.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
117
ADVERTISERS INDEX
www.counterterrorbusiness.com
The Complete Electronics Service... • Rapid Prototyping • Design & Development • Product Styling • Contract Assembly • Innovative Solutions
AES
Assembled Electronics Solutions LLP
Tel: 01789 204879 • www.assembled-electronics.com The publishers accept no responsibility for errors or omissions in this free service 3D Connexion 3DDC 3DX-ray A|D|S Group Alpha Lettering Systems ALR Printed Circuits Assembled Electronics Solutions Audionation UK BAPCO 2011 Barker Engineering Best Wingdings British Security Industry Association Broughton Controls CBC Europe Celestix Networks Central Scanning CF Cases Cobham Antenna Systems Counter Terror Expo Cryptic Software DMS Technologies Dynamiq Engineering ECA Group Eptheca Global Excelerate Technology EZV Flir
38 40 43 46 112 76 27, 118 96 56 22, 100 113 90 28, 60 26 14 48 91 100 102 69 96 6 103 52 71, OBC 98 84
Fotech Solutions G&A Moulding Technology G6 Global Garrett Com Global Marine Systems Goliath Footwear GPS Perimeter Systems Hothouse Product Development Partners Hygie Tech Infranor Innovative Concept International Inspectahire ISC 2 UK Kaba L3 TRL Technology Label Lock LG Motion Liddle Doors Lochrin Bain M Tek Assembly Mascot Medical Warehouse MFD Minitec UK Morrigan Partners Omega Plastics On Cam Global
30 4 62 88 38 51 29 21 106 108 78 32 66 96 68 2, 40 26 96 97 114 34 94 111 48 91 36 86
Origin Storage Overtis Group Paragon Rapid Technologies Pragmatic Defence Production Design & Supply Prosync Rainford EMC Systems Rogers Fencing Samsung Techwin Senetas Europe Shore Design Sims Recycling Solutions SMI Group Sysco International Thales The Fleet Auction Group Towergate Wilsons Townscape Products Txttools Unitemp VPN Solutions Wagtail Ward Security Yelo Zareba Security Zaun
NEXT ISSUE DEFENCE BUSINESS Supplement
118
13 16 82 10 8 51, 82 108 20 74 50 80 54 70, 72 10 104 57 92 45 64 38 112 58 61 112 18 24
Covert Buried Sensor
Simple to Install
No Special Ground Preperation required
Ground Heals Within Days
SYSCO COVERT GROUND SENSOR The Sonaflex covert buried sensor is ideally suited for locations that require a discrete covert sensor that is both cost effective and simple to install without the necessity for major groundwork’s. As the sensor is passive, it is not compromised by existing utility cables or water pipes within the sensor proximity. Field proven in many demanding high security installations, the Sonaflex buried senor is the ideal choice where performance and reliability is a key requirement.
SYSCO INTERNATIONAL psmsysco@aol.com