Counter Terror Business Magazine Issue 6

Page 1

www.counterterrorbusiness.com | ISSUE 6

sponsored by

AVIATION

Addressing the liquid explosive threat to civil aviation

POLICE & LAW

The key strengths of current counter terrorism policing arrangements

CYBER SECURITY | CRISIS COMMUNICATIONS | PERIMETER SECURITY | PIRACY



COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 6

sponsored by

AVIATION

Addressing the liquid explosive threat to civil aviation

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

WELCOME With the terrorist threat forever changing and developing, so must counter terrorism measures. It was recently revealed the MI6 used an innovative solution to foil the launch of an Al Qaeda website, replacing bomb making instructions with a cake recipe.

POLICE & LAW

The key strengths of current counter terrorism policing arrangements

CYBER SECURITY | CRISIS COMMUNICATIONS | PERIMETER SECURITY | PIRACY

The internet and online operations have been bringing benefits and opportunities to people and organisations across the globe for some time now but we must also recognise the potential risk and dangers that come with it. We discuss this and what precautions we need to take on page 55. As we are nearing the ten-year anniversary of 9/11, and with the Olympic Games around the corner, assistant commissioner John Yates, the National lead for Counter Terrorist Policing for England & Wales, takes stock of where we are and offers his views as to how this critical area of policing might be delivered in the future on page 39. I would like to thank Chris Yates for his insightful contributions. Enjoy the issue.

Sofie Lidefjard, Editor editorial@psigroupltd.co.uk

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit the Counter Terror Business website at:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITOR Sofie Lidefjard ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Andrea Griffiths, Chris Jones PUBLISHER Sally Brockman SALES ADMINISTRATION Jackie Carnochan, Martine Carnochan ADMINISTRATION Victoria Leftwich, Joanne Mackerness GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media

© 2011 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

03



CONTENTS 07 NEWS 11 AVIATION To counter the threat to civil aviation the EU can build on a set of already established measures, says Gilles de Kerchove, EU counter terrorism coordinator With the threat of liquid explosives still very real, Chris Yates investigates if the restrictions on liquids, aerosols and gels ever will be lifted The Paris Air Show, 20-26 June, remains a key point in the industry’s economic cycle The forthcoming white paper should properly recognise the value of defence, says A|D|S

39 POLICE & LAW

73 DEFENCE & EQUIPMENT

Assistant commissioner John Yates, the National lead for Counter Terrorist Policing for England & Wales, discusses the threat of international terrorism

DSEi offers visitors the opportunity to see the latest technology and products in action through an increasing number of feature areas and demonstrations

45 INFORMATION SECURITY

81 SECURITY

The doors have closed on Infosecurity Europe 2011 after another well-attended event

Security professionals, manufacturers, distributors and trade installers from all over the world recently gathered at IFSEC 2011, to find out what the annual security event had to offer

55 CYBER SECURITY We discuss some of the precautions we should consider taking as we exploit the online revolution

61 CRISIS COMMUNICATIONS

89 OLYMPIC SECURITY The British Security Industry Association’s Crowd Management section discusses the challenge of ensuring security at next year’s Games

Intellect discusses the rise of social media in international affairs, security and defence

The Business Continuity Institute looks at ways to respond to a major incidence and explains what benefits training in crisis management techniques can bring to your organisation

95 EMERGENCY SERVICES

29 COUNTER TERRORISM

67 PERIMETER SECURITY

103 PIRACY

23 DEFENCE TECHNOLOGY

Counter Terror Expo 2011 surpassed records in terms of exhibitor, delegate and visitor numbers We look at the impact and dynamics of the Omagh bombing in 1998

The ability to effectively secure the perimeter of a diverse range of vulnerable sites, as a first line of defence, is a key concern for government agencies, says the British Security Industry Association

Counter Terror Business

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Emergency Scotland 2011 will take place alongside the annual Emergency Planning Society Resilience Symposium

We find out more about the International Maritime Organization’s action plan against piracy

www.counterterrorbusiness.co.uk Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

05


UORUM PRO

UORUM

codestuff smart IP video solutions

UORUM

WALL

UORUM SITE

Quorum — where simplicity meets intelligence.... a no nonsense IP Video Management System designed to work ďƒžrst time in the modern security installation

Codestuff secures Manchester International Airport http://www.codestuff.net AG


AIRPORT SECURITY

NEWS IN BRIEF

MEPs seek body scanner safeguards

Arguments in favour of voluntary body scanning at EU airports were heard at the European Parliament’s Transport Committee during May as new rules were drafted. If scanners are used, said MEPs, health and fundamental rights must be safeguarded along with personal data, dignity and privacy. Also discussed were suggestions that body images should not be seen, while X-ray-based scanners should not be used on health grounds. The European Commission intends to propose new rules this summer that would add body scanners to the list of EU-authorised methods for screening passengers. Some member states (the UK, the Netherlands, Germany, Italy, France and Finland) have already tested the technology. Acknowledging that body scanners would enhance aviation security, MEPs will ask member states to deploy technology that is the least harmful for human health and which addresses privacy concerns. It also said scanners using ionising radiation should be prohibited in the EU.

NATIONAL SECURITY Intelligence agency chief deems Australia’s terror list ‘fallible’ Australia’s Immigration Department’s list of people who pose a possible security risk has been labelled ‘’very fallible’’ by the head of the Australian Security Intelligence Organisation. ‘’The movement alert list is a list of individuals,’’ David Irvine, head of the ASIO told a Senate estimates hearing. ‘’It’s a very fallible document. There are people who perhaps should be on it who aren’t.’’ He did, however, say the movement alert list – a database of almost 630,000 people – was ‘’an immense assistance’’ to ASIO when trying to prevent potential terrorists entering the country. More than half of those listed are so for reasons relating to national security, such as terrorism or espionage.

US not prepared for cyber attack on electricity

Passengers should be given the right to refuse body scanning and submit to alternative screening methods that guarantee effectiveness while respecting their rights and dignity, says the committee. “Such a refusal should not give rise to any suspicion of the passenger,” it says. Random selection should be applied and passengers must not be selected to pass through a body scanner on the basis of discriminatory criteria, stressed MEPs, adding that any form of profiling based on sex, race, colour, ethnicity, genetic features, language, religion or belief is “unacceptable”. Member states should also provide extra control points and security staff to ensure that passengers are not slowed down by the need to pass through body scanners, said the Transport Committee. MEPs also restated their view that the ban on carrying liquids on planes should be lifted by 2013. The committee wants member states and airports to ensure, “adequate technology is available in good time so that the scheduled end of the ban does not undermine security”.

CYBER WEAPONS

Defending against cyber attacks The UK government is developing cyber weapons designed to bolster defences against and preempt online attacks from hackers. Minister of State for the Armed Forces Nick Harvey told the Guardian newspaper that a “toolbox of capabilities” will afford protection to civil infrastructure, particularly critical services and government departments. He also recognised the need for countries to work together saying: “There is a lot of work being done bilaterally and multilaterally to develop common understanding and common positions. But this work needs to be guided by discussion of how states should act in cyberspace. “It would be foolish to assume the West can always dictate the pace and direction of cyber technology. Instead, we should act now to influence positively the evolution of behaviour in cyberspace.”

News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The United States is ill-prepared to deal with a cyber attack on the nation’s electric grid, the House Energy and Commerce Subcommittee has been told. Paul Stockton, of the Department of Defense, commented that a collapse of the electric power grid caused by a natural disaster or an attack could challenge defence capabilities. “I believe the power grid has very strong resilience but it’s not designed to deal with the kinds of threats we’re talking about today,” he said.

US and Pakistan and US team up to hunt terrorists The United States and Pakistan are building a joint intelligence team to go after top terrorist suspects inside Pakistan. The investigative team will be made up of mainly intelligence officers from both nations, according to US and Pakistani officials. The Pakistanis say the US has failed to share its best intelligence, instead running numerous unilateral spying operations on its soil. US officials say they need to see the Pakistanis target militants they’ve long sheltered.

NATO and Russia exercise together against air terrorism NATO and Russian fighter aircraft have taken part in a counter terrorism exercise designed to prevent attacks that use civilian aircraft. The NATO-Russia Council Cooperative Airspace Initiative shares information on movements in NATO airspace and Russian airspace, and coordinates interceptions of renegade aircraft.

New Defence Material Strategy announced A new strategy programme is being developed to ensure value for money is achieved when delivering equipment and support to members of the Armed Forces. The strategy is considering how Defence Equipment and Support (DE&S), the organisation that equips and supports the Armed Forces for current and future operations, can operate differently to become more effective. TO READ MORE PLEASE VISIT...

www.counterterrorbusiness.com/n/001

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

07


&

De f

uf ac tur

r ts pe Ex

In

e.

PCB Ass em bly •

g

l Product Tes y • Ful ting l b m •B e s ox s A Bu e l b ild a C s

tion olu yS ke rn Tu ll Fu

W ir in

Experience & Expertise You Can Rely On.

en

ce, cu Aero e S space &

AEMS ELECTRONICS Tel: 020 8669 0999 Email: info@aemsonline.co.uk Web: www. aemsonline.co.uk

r it y

M

an


APPOINTMENTS

Home Office reshuffles its security staff UK Home Secretary Theresa May has announced that James Brokenshire, Conservative MP since 2005, will assume responsibility for security and counter terrorism at the Home Office, replacing Baroness NevilleJones who has a new role related to cyber security in business. Additionally, Baroness Angela Browning has joined the department as minister for crime prevention and antisocial behaviour reduction. Her

brief includes responsibility for drugs strategy, licensing, community activism and football safety. Browning will also lead all Home Office business in the House of Lords. May said: “Maintaining public safety and security remains my top priority and I will continue to take the lead for the department in ensuring the UK’s national security and counterterrorism strategy responds to the evolving terrorist threat.”

News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NEWS IN BRIEF Poll suggests war on terrorism is failing Many Americans and Australians think the wars in Afghanistan and Iraq have not been worth the cost and are not helping to win the war on terrorism, according to new research by the United States Studies Centre at the University of Sydney. Almost a decade after the September 11 attacks, the US Studies Centre conducted a major survey of Australian and American attitudes towards security and the war on terror. The responses, gathered after Osama bin Laden’s death, show that the majority of Australians (63 per cent) think the war on terrorism will never end with only 30 per cent of Americans and 20 per cent of Australians confident the war is being won. “Both Australians and Americans are clearly sick and tired after the 9/11 decade of war,” says professor Geoffrey Garrett, chief executive of the Centre. “They doubt the prohibitive costs have been well spent and don’t think the West is winning. People have moved on from the 9/11 decade to focus on their economic anxieties TO READ MORE PLEASE VISIT... after the global www.counterterrorbusiness.com/n/003 financial crisis.”

Project ARGUS helps Brentwood businesses prevent, handle and recover from attacks

CYBER SECURITY

Governments from 43 countries discuss cyber security collaboration Government, industry and technical leaders from 43 countries gathered in London recently to discuss threats and issues around cyber security. Speakers at the Eastwest Institute’s Second Worldwide Cybersecurity Summit called for cooperation between businesses, between governments, and across sectors. Shawn Henry of the FBI explained how the US is tackling cyber crime by spreading FBI resources globally, saying that the FBI arrested over 200 cyber criminals in 2010. “Our ability to partner with many different countries allowed us to not only identify those actors but extradite them and bring them to justice,” he said. In light of the recent hacking of hundreds of Gmail accounts, thought to have originated in China, Liu Xiaoming, China’s

ambassador to the United Kingdom said: “China is facing an increased overseas cyber security threat. China is the victim of cyber space crime. It is therefore not factual to blame the hackers as originating from China, nor is it conducive to international cooperation in cyber security. “No single country can deal with cross border issues such as hacking, viruses, or spam. China stands for extensive international cooperation.” Sir Michael Rake, chairman, BT Group plc, said in a keynote address: “We need to be more open about discussing the threats and the issues around cyber security. I think that it’s an area that will require huge investment and governmentbusiness cooperation.” TO READ MORE PLEASE VISIT... www.counterterrorbusiness.com/n/002

Brentwood Borough Council has teamed up with the National Counter Terrorism Security Office (NaCTSO) to deliver an initiative called Project ARGUS (Area Reinforcement Gained Using Scenarios). An event was recently organised for local businesses to take them through a simulated terrorist attack and identify the measures to take for preventing, handling and recovering from a terrorist attack. Cllr Mark Reed, chair of the Business & Community Panel, said: “Project Argus will provide a unique opportunity to learn from and contribute to valuable lessons. We haven’t received a specific threat but given our key strategic position, this is a great way to increase awareness of counter terrorism issues and help make us more resilient and aware as a community.”

New regime for counter terror measures 23 May marked a milestone for the UK’s coalition government in delivering its commitment to making British counter terrorism arrangements both “proportionate and focused”. The Terrorism Prevention and Investigation Measures Bill will be used to restrict the behaviour of terror suspects who cannot be prosecuted or deported. It will replace the existing control order regime, making sure restrictions that impact on a suspect being able to follow a normal daily life are kept to the minimum necessary to protect the public. Home Secretary Theresa May said: “The threat from terrorism remains serious and complex, and the first duty of this government is to protect national security and public safety. Our absolute priority is to prosecute and convict suspected terrorists in open court. But there will remain a small number of people who pose a real threat to our security but who cannot be prosecuted or, in the case of foreign nationals, deported. “The new regime of terrorism prevention and investigation measures will mean these individuals cannot go freely about their terrorism-related activities, and we can protect the public from the threat they pose.”

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

09


See the whole picture

r e v

0ors 5 3 ibit

O

h Ex

Š WRVS

Š RNLI/Paul Philby

Exhibition and Two Day Conference The event for all involved in emergency planning, response and recovery. See the latest products, innovations and examples of best practice

www.emergencyuk.com


CIVIL AVIATION

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER THE THREAT Several incidents in the recent months have shown that ensuring civil aviation security continues to be a challenge, says Gilles de Kerchove, EU counter terrorism coordinator Civil aviation is a high priority terrorist target. It has a huge symbolic importance, as international mobility is both essential to the modern world but also fragile to disturbance, and public transport by definition needs public access. Several incidents in the recent months have shown that ensuring civil aviation security continues to be a challenge. In late October last year, two parcel bombs made of explosives hidden in printer cartouches were sent by airfreight from Yemen to the US. One was intercepted at Dubai and the other in the UK. An Al Qaeda affiliate, Al Qaeda in the Arabian Peninsula (AQAP), claimed responsibility. This was the second significant incident planned and executed by this terror organisation. The first was the so called “underpants bomber”, who tried to bring down Northwest Airlines Flight 253 from Schiphol to Detroit on Christmas Day 2009, during its final descent only 20 minutes before landing. AQAP has even boasted of doing training to circumvent aviation security measures. On 24 January this year another group attacked the public area of Moscow’s Domodevo Airport, killing more than three dozen people and injuring more than a hundred. COUNTER MEASURES To counter the threat to civil aviation the EU can build on a set of already established measures. While in the past these were mainly focusing on the security of passengers (e.g. screening of luggage and on board items, banning liquids to prevent terrorists from bringing liquid explosives on board an aircraft, etc.), recent events mean cargo security has now become a central theme.

Immediately after the Yemen cargo plot, the EU established a High Level Working Group (HLG) for cargo security to analyse security gaps and to suggest additional measures. Its report was endorsed by the Council in December. It provides for actions designed to harmonise and strengthen EU rules, to improve coordination and information exchange within the EU, and to enhance global standards. This includes measures such as the establishing of common criteria for assessing risks posed by cargo from non-EU countries, reviewing procedures for the designation of “trusted” consignors and carriers, improved training – and, outside the EU, further initiatives to help some other countries to enhance their security capacities. LEGISLATION This June the European Commission presented its first report on the implementation of the HLG report. The Aviation Security Regulatory Committee (AVSEC) is discussing a legislative proposal imposing enhanced screening for cargo originating from third countries with high risk – enhancing security before it enters the EU. Here is an urgent need to adopt and implement such stronger measures and regulation. The Commission is also establishing an initial framework for an EU risk assessment for air cargo. This will be an early concrete result of the project announced by the Commission in its ‘Internal Security Strategy in Action’ to assess risks on the basis of threat assessments at an EU level. Cargo security measures need to respond to the high flexibility and dynamic routing of cargo within the EU, which makes a consistent EU approach essential. However – again as illustrated by the

underpants bomber – terrorists will continue to explore our vulnerabilities. Therefore we cannot lean back and reduce our level of activity. RISK BASED APPROACH Scanning technology, security scanners or the prohibition of certain items will not be effective on their own, and neither will intelligence collection, including PNR. We need a risk based approach using a variety of measures that together assure a proper balance between the need to protect people’s lives, and their privacy and dignity. For example an integrated use of customs data can be of help to get a better idea of the potential threat from incoming cargo. We have to use different data and improve information exchange on risks for aviation security to “better connect the dots” among the different players (including security agencies and knowhow of private industry), so that the physical layer is only the last in a row of preventive measures. We also have to continue to enhance our technical capabilities in the field of screening and detection technology, and make sure that the upcoming 8th EU Research Framework Programme will intensify activity in this field. The attack on Domodevo Airport illustrates that terrorists are trying to attack us where we are most vulnerable. They will always try to circumvent our measures, either by finding gaps in the security chain or by attacking less protected areas. A good way to counter this would be to set up a forum of policy makers and experts on transport and security to discuss the threat to transport facilities and to develop scenarios and an action plan towards better integrated protection of all means of transport. L

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

11



BIOLOGICAL & CHEMICAL DETECTION

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UNIQUE TECHNOLOGY PROENGIN biological and chemical detection for the field (and real life) Proengin has developed biological and chemical warfare agents field detectors using flame spectrophotometry. The wellknown and widely used AP2C has proven the capacity of that technology to be the most reliable on the field with the lowest false alarm rate and the simplest ease of use. HANDHELD CHEMICAL DETECTOR AP4C New developments such as the AP4C have extended the capacity of that technology to include chemical warfare agents and toxic industrial material in a simultaneous mode. There is no limitation in number of gas detected by the AP4C. All nerve agents, all blister agents and all blood agents can be detected by AP4C within the requirements of response time and sensitivity of NATO recommendations. The AP4C has extended the range of chemicals that can be detected by Proengin chemical detectors. All dangerous compounds containing Sulfur, Phosphorous, Arsenic and/ or HNO chemical bond can be detected in a simultaneous way. Of course, as for the AP2C, the AP4C has the capacity to work in very severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of gases and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemicals manufactured by terrorists that would not fit into traditional libraries of other detectors. Moreover AP4C will detect without upgrade new agents that will be developed in the future, as well as still not precisely known agents like Novichok agents (or non traditional agents). The response time is among the shortest on the market, but what makes the AP4C unique is the recovery time after a positive detection. The AP4C is therefore the chemical detector that has the highest level of availability of the field. AP4C has been derived on other detectors, dedicated to the following uses: • use on reconnaissance vehicles and battle tanks • use aboard naval ships • use for critical buildings and areas protection AP4C-V FOR USE ON RECONNAISSANCE VEHICLES AND BATTLE TANKS Based on the same detection technology and the same internal design, air entrance has been designed to face high wind: AP4C-V is

able to take in representative sample of the outside air, even with a direct cumulated wind and speed of 100 km/h. Data are shown on easy to understand control box or directly on the control computer of the vehicle. Sensitivity, short time to answer, low false alarm rate and short recovery time are the same as for AP4C, making AP4C-V the perfect detector for all kinds of reconnaissance missions and battle field exploration. AP4C-F FOR USE ABOARD NAVAL SHIPS At sea, ANEP-57 recommendations stipulate the availability of both fixed and mobile means of chemical detection. As AP4C is the perfect mobile chemical detector for contamination control, the use of AP4C-F provides the naval ships with reliable and efficient chemical detection. This ruggedised detector shows the same detection performances as the AP4C, with two supplementary features. It produces its consumable gas by electrolysis, thus lightening daily maintenance, and more than an alarm, is able to trigger the ventilation of the vessels, thus protecting the citadel from the chemical danger. The AP4C-F is able to be operated on open deck, with the same performances. AP4C-F FOR CRITICAL BUILDINGS AND AREAS PROTECTION National palaces, courts and parliaments are more and more equipped with fixed chemical detectors. AP4C-F, being able to be operated on naval citadels, is of course able to provide the same detection and protection on terra firma, for this kind of critical buildings. BIOLOGICAL AND CHEMICAL DETECTION The MAB is a new generation of biological field detector. MAB has the unique capacity of detecting and categorising biological particles with a proven extremely low false alarm rate and the unique capacity to discriminate dangerous or suspicious biological particles such as Anthrax spores from natural background. The very liable MAB has been designed to be mounted on track vehicles. It is insensitive to diesel exhausts. As all Proengin products, and thanks to the flame spectrophotometry technology, MAB is able to run in very severe outside conditions, shows the lowest false alarm rates (negative and positive) and requires reduced maintenance. It shows such a high level of availability. Government premises, courts and parliaments are also increasingly equipped with fixed chemical and biological detectors.

AP4C-FB combines both chemical detection as for the AP4C-F, and biological alarm as for the MAB. This detector may be associated with a radiological probe, featuring the all in one full CBRN detector. L

Images courtesy of JP. Lagiewski FOR MORE INFORMATION www.proengin.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

13


O P TOS EC U R IT Y


LIQUID EXPLOSIVES

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THE SCREENING SOLUTION Heightened security controls were put in place at Indonesian airports in late May, following the discovery of a bag containing “liquid materials used to make explosives” in a passenger lounge at Juanda International Airport. Airport authorities said the discovery was made after a facilities search prompted by a threat to explode a bomb mid-air on an unspecified Garuda flight to Jakarta. Little is presently known about the materials found, whether they formed a viable device and who may have been behind the attempt to down an airliner mid-flight. Concern is being voiced that it may have been the work of Al Qaeda-linked militants, who have been behind a string of terror attacks across the country that have killed more than 260 people over the past eight years. Emerging just three weeks after the US Special Forces killing of Al Qaeda leader Osama bin Laden at his compound hideout in Pakistan, this incident may indicate that militants affiliated with the terrorist organisation are once again targeting the civil aviation sector with a type of weapon there’s no deployed protection against. THE THREAT The liquid explosive threat to civil aviation first hit the news headlines in August 2006, following discovery of a plot to down multiple transatlantic airliners whilst in flight from the United Kingdom to the USA and Canada. That plot initially led to an outright ban on liquids, aerosols and gels (LAGs) being carried in passenger hand baggage. Latterly, the limits we have today (100ml per item contained in a 1 liter bag) were imposed on passengers. These restrictions were put in place pending development of screening solutions able to determine whether passenger presented LAGs were a threat or entirely benign. Under the direction and guidance of the European Commission (EC) and the European Civil Aviation Conference (ECAC), several companies stepped to the plate in the intervening period to devise hardware and software solutions. These solutions were thoroughly tested under the ECAC Common Evaluation Programme (CEP), declared fit for purpose and categorised and approved for active service deployment in airports across the region. European Union (EU) regulation therefore requires airports with transit passenger traffic to deploy these solutions forthwith, whilst all other airports are required to deploy a LAGs threat detection capability by 2013. So, where are they?

Written by Chris Yates, principal, Yates Consulting

EU regulation requires that airports install LAGs capable screening solutions at transit airports by end April 2011 but where are they? And who’s wagging the dog’s tail at the EU?

Incompetence at all levels has shifted the master plan from an incredibly simple sequence of processes to a constantly shifting nightmare of processes, that have conspired to leave the travelling public unprotected against one of the most serious threats to civil aviation today, despite the best effort of technologists. The master plan to addressing this clear and present threat to the wellbeing of all of us who travel by air was incredibly simple. The legislative body (EU) set the goals, tasked the administrative body (EC) to manage the project and required the principal institution (ECAC) to coordinate the activity. INCOMPETENCE & INTERFERENCE Incompetence at all levels has shifted the master plan from an incredibly simple sequence of processes to a constantly shifting nightmare of processes, that have conspired to leave the travelling public unprotected against one of the most serious threats to civil aviation today, despite the best effort of technologists. Take, for example, the setting of goals.

In the very earliest stages of this process, a decision was taken to involve particular stakeholders (regulators, airlines, airports and technologists) within the project. This stakeholder group agreed a set of outcomes and these outcomes dictated the categorisation of the solutions produced. ECAC began evaluating and approving LAG screening solutions in the autumn of last year. At almost the same time the principal airport representative body, Airports Council International – Europe (ACI-Europe), withdrew collective acceptance and simply declared the approved solutions as not for purpose. Despite a bronze, silver and gold standard having been achieved, ACI-Europe stuck its heels in, demanding a platinum standard and E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

15


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Kromek – ready to meet the European challenge: Customer collaboration provides launch pad for exciting innovations in flagship bottle scanner Airport and passenger security remains a major concern for everyone involved in aviation.There has been a lot of discussion in some sections of the media about when and whether the current ban on carrying liquids, aerosols and gels (LAGs) should be lifted and even discussion on the relative merits of the equipment available. For everyone on our side of the industry, there is no argument; such equipment has been designed to meet the exacting standards determined by the aviation industry itself and tested according to the European Civil Aviation Conference (ECAC) protocols. But we’ve not rested there. We’ve been working closely with our customers and listened to what they have to say. As a result, we have implemented some exciting and innovative features and functionality in our flagship bottle scanner, making it even easier to use, with faster scanning times and lower false alarm rates, while ensuring robust and uncompromising probability of detection of threat liquids. We also have full networking capability and printer functionality. Thanks to this, the Kromek Bottle Scanner Identifier is now one of the most advanced liquid threat detection systems available.

‘PASS’ or ‘FAIL’ outcome. The database can easily be customised or upgraded to meet specific customer requirements or take into account emerging threat materials. The Identifier scans containers of any shape and material – glass, plastic, metal and cardboard. Labels and surface finish do not affect the accuracy of detection. It’s safe, easy to use and totally non-invasive, requiring no sampling and no consumables, and is capable of scanning partially filled bottles. The temporary deferment on lifting the ban on LAGs for transit passengers provides airports with the perfect opportunity and time to be fully prepared for the autumn go-live with the right equipment in place and staff fully trained. We’re happy to work with you, whether it’s providing ConOps and logistical support, helping you optimise your systems or training your staff. Using the latest multi-spectral x-ray technology, the Bottle Scanner categorises each item it scans against a digital database that contains the spectral signature of all internationally recognised threat materials and provides the operator with a simple

We stand by our equipment... The Kromek Bottle Scanner Identifier is Type B, ECAC approved and ready for service. The temporary deferment on lifting the ban on LAGs for transit passengers provides airports with the perfect opportunity and time to be fully prepared for go-live with the right equipment in place and staff fully trained. We’ve listened to what our customers have had to say and implemented some exciting and innovative features in our flagship bottle scanner; making it easier to use, faster scanning times and lower false alarm rates, while ensuring an uncompromising probability of detection of threat liquids. At Kromek, we’re happy to work with you whether it’s providing ConOps and logistical support, helping you optimise your system or training your staff. To find out how we can help you why not call me, Nigel Day, on: +44 (0) 1740 626060 or visit www.kromek.com

16

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

FOR MORE INFORMATION To find out how we can help you or arrange a demonstration, contact Angus de Villiers +44 (0)1740 626060, or Jerome Brugnago +44 (0)7808 768027, e-mail: sales@kromek.com or visit www.kromek.com


LIQUID EXPLOSIVES E nothing else would suffice for its members. This latter capability required that technologists come up with a solution that enabled airports to screen hand baggage for all potential threats in a single pass and without a need for passengers to separate LAG products. Given the complexity of a typical X-ray image and the difficulties involved in extracting threat information from the available data stream, the screening capability demanded is simply not available from any vendor as yet. Thus, an impasse emerged. On the one hand EU regulation required that airports install LAGs capable screening solutions at transit airports by end April 2011, but on the other hand airports cried poverty, denigrated the available solutions and simply said no to the legislators. ENTER WASHINGTON Then, with the deadline looming and a face off between the EC and ACI-Europe became ever more likely, Washington entered into the affray and really set the cat amongst the pigeons. 24 hours before EU regulation was supposed to take effect, Washington sent a letter to Brussels, stating that it would require additional security measures applied to all US bound flights, if transit liquid restrictions were to be lifted. The impact of this intervention was felt across the region almost immediately. Shortly after the letter’s receipt – and roughly at the same President Obama signed secret orders instructing US Special Forces to go get that country’s principal bogey man – airports were told to defer implementation pending further instruction. Ostensibly issued to ensure passengers were not faced with inconsistent security measures at airport checkpoints across the region, behind the scenes meetings and correspondence reveal a rather different and darker reasoning to order deferred implementation. The European Commission organised a special meeting of the EU Regulatory Committee to discuss the situation with Member States and the United States on 4 May. An ‘agreement in principle’ on a way forward was reached that, subject to approval by the participants, would have been finalised quickly and allowed Member States and airports to get back on track with the screening of LAGs. Washington declared that the ‘agreement in principle’ was not acceptable a few days later. Further meetings of the Regulatory Committee have followed but have not resulted in any concrete proposals to facilitate the implementation of EU Regulation 297/2010 at press deadline time. Instead, the EC simply states that it remains committed to the 2013 deadline when all LAGs product must be screened. This poses the rather interesting question as to who’s wagging the dog’s tail within the EC?

PAYING THE PRICE When companies step up to the plate to develop solutions to pressing national security problems, there’s a natural expectation that once they are assessed and approved, active service deployment will commence promptly and a return on investment will be seen in fairly short order. Companies on the EU approved vendor list have collectively invested an estimated US$250 million of mostly private equity funding, to develop the tools needed to guard against liquid or gel based explosive being used to down an airliner in flight. Having seen a short term return on this invested ripped from beneath their feet at the 11th hour, many of these companies are questioning whether such heavy investment in EU projects constitute a safe bet and some are actively contemplating legal action to recover losses. Vague promises that the EU remains committed to the 2013 for airport compliance with regulation don’t cut the mustard in the real world of business. From conversation with many senior executives, it’s been made abundantly clear that when the EU goes cap in hand to industry to solve really big issues in the future, it had better come up with a damned sight better master plan offering fiscal support and guaranteed investment outcomes. If the rarified EU fantasy world delivers anything less, the answer from the real world of business will most likely be a flat no, non, nein. So, where does the fiasco leave crew and passengers? They’re the electorate; they either work for an airline or pay through the nose to fly with one. They’re the people the aviation industry survives on and creams every penny it can out of. Promises and platitudes are all well and good whilst airports haggle over the cent on the dollar or penny in the pound, but the events of a decade ago show that the public in particular votes with its collective feet when shafted. When 19 men boarded four planes and flew three of them into two of the most iconic buildings in the world on the morning of September 11, 2001, their actions decimated public confidence in the ability of this industry to meet threats with solutions head on and challenged its very survival. The numbers wracked up from that event make grown men cry and prompt a couple of straightforward questions. When a liquid explosive device results in one of your planes falling out of the sky, which side of the garden fence will you be sitting on? Bean count by all means, but history has a disturbing tendency to repeat itself, with often alarming regularity. If the liquid explosive discovery in an airport lounge in Indonesia is anything to go by, this threat will likely be visited upon a major airport elsewhere and sometime soon. Surely, it’s not a space and time you want to be in on your watch? L

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Profit before safety in the airline world Seven days after US Special Forces seized and killed Al Qaeda leader Osama bin Laden and at a time of heightened concern about possible retaliatory action, multiple civil air carriers flew aircraft through European skies without required security controls applied to the passengers aboard them. How do I know this? Well, I just happened to be one of the passengers. The flights in question emanated from Tunisia’s brand spanking new Enfhida International Airport. The country is a popular destination for European travellers seeking sun and sand in convivial surroundings. It’s also a country without a functional government due to recent events, the military is in control pending elections for a new civil administration and it has a problem with terrorist insurgency. It therefore came as something of a shock to turn up at this airport on the morning of 8 May, just after a dusk to dawn curfew in the capital had been lifted, to find literally hundreds of travellers undergoing minimal security checks and being allowed to carry large litre bottles of water and soft drink airside in contravention of international regulation. In light of this fact, one might have expected the two European air carriers in question, Thomas Cook and Thomson, to require additional gate checks? Think again. Us passengers were shuffled onto the aircraft just as quickly as they could be prepped for the return flight and without any consideration for security. Moreover, crews on my Thomas Cook flight didn’t have a clue who was supposed to be aboard and where they should have been sitting, as evidenced by the arguments that ensued over who had and had not paid for extra legroom seats and in-flight meals. The security rules airlines are expected to follow are clear. It seems some in the low cost world simply disregard them in pursuit of swift turnaround times and maximum profit though. At press time neither airport operator TAV, Thomas Cook nor Thomson had responded to detailed questions regarding the security of the flights in question.

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

17


Are you buying commercial grade inductors from one supplier and then sending them to another to be up-screened, tested or lead-tinned? Now you can specify robust inductors, tested to meet your specs, directly from Coilcraft Critical Products & Services. Compared to third-party tinning and testing, you’ll save money, save time and receive parts with an unbroken pedigree. Coilcraft CPS products offer the highest degree of robustness and longevity to meet your toughest challenges. Whether you’re working in aero-space, military, medical or other mission critical applications, Coilcraft CPS can get the job done. Visit our web site, or contact us to learn more about Coilcraft CPS magnetics for high-reliability applications. www.coilcraft-cps.com

+44 (0)1236 784905

Creating Environments

Temperature & Climatic Chambers Test & Evaluation Systems

cps@coilcraft-europe.com

PROTECTIVE STORAGE & TRANSIT CASES • Dustproof and waterproof to IP67 • Ruggedised high level protection • Custom fitted interiors • Standard size range • Heavy duty, standard and custom designed including 19” racks • Performance level cushioning and ANTISHOCK protection • Aluminium containers and cases • Long term re-usable

BUILT TO TAKE ANYTHING Tel: 01628 850611 www.unitemp.co.uk

CF CASES LTD 9 Consul Road, Rugby. CV21 1PB Tel: +44 (0) 1788 535 484 Fax: + (0) 1788 570 933 Email: sales@cfcases.co.uk Web: www.cfcases.co.uk


PARIS AIR SHOW 2011

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

49TH PARIS AIRSHOW PRIMED TO SIGNAL ECONOMIC RECOVERY With all its available exhibition space sold out, excitement is building for the world’s largest aerospace industry show being held at Le Bourget Exhibition Centre 20-26 June Despite challenging international trading conditions, show chairman Louis Le Portz is upbeat and says he has been delighted by the support given to the long-running event. “Apart from a very small number of chalet units, the show is now full, a few weeks ahead of the usual marketing schedule. We are extremely confident and are convinced that this year’s show will mark the economic recovery for our sectors.” The last show, in 2009, was the centenary of the event’s creation, and featured some 2,000 exhibitors from 50 countries; 140,000 trade visitors; over 200,000 visitors; 3,000 journalists from all over the world, and 142 civil and military aircraft. This summer’s event – the 49th iteration – will open its doors at the end of June. Trade visitor days are 20-26 June, from 09:30 to 18:00, with the event open to the general public 24-26 June. The International Paris Air Show – Paris Le Bourget, was created in 1909 at the Grand Palais in Paris. It is the oldest event in the world within this sector and traditionally has many aviation and space events aligned with it. Today it continues to showcase the latest industrial and technical innovations to a large professional audience and to the general

public. As such, it is an excellent source of commercial and industrial opportunities. BUSINESS MEETINGS Since 2007, the event has included a programme of scheduled business meetings to assist exhibiting SMEs to meet contract principals more efficiently. This programme, which aims to bring together some 500 professionals at each show, with more than 5,000 arranged meetings, is organised in conjunction with BCI Aerospace, and will be held 21-23 June. Since it was created, the International Paris Air Show has always hosted a large number of aircraft, among the most up-to-date and emblematic of their eras. In 2009, 142 aircraft were present, with around 40 giving daily flying displays. This tradition will continue in 2011, especially given the unprecedented number of new programmes scheduled. Indeed, organisers anticipate a large number of new aircraft being present at the show. “We will probably have some surprises, and are doing our utmost to secure the presence of some of the best, most innovative aircraft for the show; it is always a challenge and something we work at long-term with constructors,” says Le Portz.

UK PAVILION A|D|S will host the UK Pavilion in its traditional spot Hall 2B for the 49 International Paris Air Show at Le Bourget. Reflecting the positive mood in the industry as demonstrated at last year’s Farnborough Airshow, the UK Pavilion space has been sold out since early 2011. Further space was created to account for the high demand, resulting in one of the strongest showings from UK exhibitors in recent years at the Paris event. Rees Ward, CEO of A|D|S, said: “Last year’s Farnborough Airshow ended on a high note with over $47bn worth of orders announced, and this buoyancy in the commercial aerospace market would appear to be reflected in the very strong turn out from the UK exhibitors. “Of course there are the household UK names present, but we are also witnessing an encouraging amount of interest from the UK SME community eager to engage in the international marketplace, with a range of companies such as Cooper Antennas or Amfin making their presence known.” L FOR MORE INFORMATION www.paris-air-show.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

19


A|D|S is the premier Trade Organisation advancing UK AeroSpace, Defence and Security Industries globally.

For more information about A|D|S membership, contact here2help@adsgroup.org.uk

0845 872 3231 • here2help@adsgroup.org.uk • www.adsgroup.org.uk


DEFENCE

Aviation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RECOGNISING THE VALUE

Derek Marshall, managing director – Policy & Public Affairs, A|D|S, looks ahead to the forthcoming white paper on equipment, support and technology for UK defence and security With the UK defence industry’s submission to the government’s consultation green paper on Equipment, Support and Technology for UK Defence and Security being presented in late March, industry now begins the uncertain wait for the publication of the white paper expected to be before the summer recess in July. At the heart of industry’s response is the concern that the white paper should properly recognise the value of defence both in its contributions to the UK economy but also as a vital part of our national security. Defence is a UK industry that provides and ensures

KEY ISSUES Industry in its response laid out a number of key issues that should be essential parts of future defence policy as will be laid out in the white paper. An area for great concern is that there is real need for visibility of sector capability plans. This is essential as it will focus public and private investment on the necessary areas of capability. The white paper should reinforce the need for clear forward plans based on a thorough analysis of the capabilities that our Armed Forces will require. These plans will ensure

Defence is an ideal industry to aid the government’s growth strategy. To maximise this potential the white paper should show an increased focus on increasing legitimate and licensed exports of equipment and services to maximise the sector’s potential. employment across the length and breadth of the British Isles with over 300,000 people working towards providing our armed forces with the best possible equipment for the job at hand. The UK economy benefits immensely from the annual turnover at £35bn, and enjoys a further boost through the average £5bn in exports per year. An Oxford Economics report recently demonstrated that £100m invested in defence would see a £230m benefit to the domestic economy, placing it in the top five UK sectors to invest in – above pharmaceuticals, telecoms and financial services. It is to be hoped that the white paper will recognise these facts and act accordingly to ensure that the defence industry can continue benefiting the UK.

the retention of industry skills which once lost are costly and difficult to regenerate. Such a skills base is built upon the bedrock of the incredibly diverse and innovative SME community, which industry believes needs an established framework allowing the Ministry of Defence to engage more productively with SMEs. A main issue faced by the SME community is the burdensome nature of bidding for contracts, and an established framework of engagement could do much to reduce this burden. It would also give MOD an opportunity to understand fully areas of concern such as intellectual property or the incoming transparency policy. To this end, the promise of an SME impact assessment

on all new relevant government measures would be most welcome in the white paper. A VIBRANT MARKET The white paper needs to demonstrate how the defence and security markets can be vibrant and forward looking so as to attract the foreign investment that in turn will help generate the capability for Future Force 2020. This indicated the need for long term technology roadmaps involving government, academia and industry. Such roadmaps would enable all stakeholders to rationalise the limited resource available while ensuring that investment is fully exploited to benefit both national security and the economy. They would also allow for stronger links between defence and civil technologies, presenting greater opportunities for dual-use potential being fully appreciated – for instance in areas such as trauma medicine or autonomous systems. Defence is an ideal industry to aid the government’s growth strategy. To maximise the sector’s potential the white paper should show an increased focus on increasing legitimate and licensed exports of equipment and services to maximise the sector’s potential. It should also consider the stark contrast of seeking to promote a successful industry while increasingly buying off the shelf equipment. By using available funds in such a way, UK research and technology is inevitably being reduced, which will be reflected in diminishing intellectual property and subsequently also in the supply chain and ultimately exports. The futures of the UK defence industry and Future Force 2020 are tied up with the conclusions the white paper will draw, and it is to be hoped that as it is drawn up, industry’s concerns will be addressed and satisfactorily resolved. L This article forst appeared in the May 2011 edition of Defence Global

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

21


MAINTAINING YOUR SECURITY... Alpha 3 Manufacturing consolidates three manufacturing businesses under one organisation: CCS Electronics, CTL Manufacturing and DEM Manufacturing. These three facilities provide a UK-wide coverage and an impressive capability in value-added manufacturing. This ranges from cable harness assembly and wiring harnesses, to custom enclosures, as well as all types of contract electronics manufacturing and production of specialist EMC EMI filters and aluminium enclosures. In partnership with some of the world’s market leaders in the Security and Communications industry, Alpha 3 manufacture a wide range of cable harness and electronic control assemblies for the following applications: n n n n n n n

Base station electronics Global System for Mobile Communications (GSM) Military antenna RF and satellite communications Satellite navigation, GPS and tracking equipment Traffic management equipment Video surveillance and security equipment

In addition to the above, Alpha 3 Manufacturing is the solution partner of choice for many British companies supplying high-end electronics, telecom and power distribution products, into the following markets: n n n n

Aerospace Military Renewable Energy Transportation

Alpha 3 Manufacturing’s range of enclosures, branded Deltron, are manufactured from either ABS or aluminium. All enclosures can be customised and finished to your exact requirements including machining, surface treatment, nylon and powder coating, and component assembly. The Deltron Enclosure range has been certified to IP65, IP66, IP67 and IP68, therefore providing exceptional protection against dust and water ingress. For added electrical performance, the use of our EMI gasket provides excellent RFI/EMI protection.

...WITH A RELIABLE CONNECTION Tel: +44 (0) 1724 273200 Web: www.alpha3manufacturing.com


Defence Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SOCIAL MEDIA

SECURITY AND THE STATE 2.0 Francis West, programme executive, Intellect’s Defence & Security section, discusses the rise of social media in international affairs, security and defence, and what impact this has had so far

Twitter sparked the Arab Spring; it helped Ahmadinejad cripple his political opponents; it gave a running commentary on the assault on Bin Laden’s Abbottabad compound; it enhances the Israeli military’s situational awareness; it is a medium for terror cells to communicate and recruit. Twitter also fuelled the anti-cuts protests in London; it allowed the Met Police to warn the public of the violent ‘Black Bloc’ tactics; it coordinated humanitarian relief in the wake of the Haitian earthquake and Pakistani floods; and it is the favoured tool of the US State Department to monitor democratic opposition in authoritarian regimes. It is quicker to tweet than call 999 and as Ryan Giggs can testify, Twitter has now outstripped UK law. And it does all this in 140 characters. Clearly, the meteoric rise of social media in international affairs, security and defence is riddled with contradictions and simplifications. While reducing the movement

for democratic change across the Middle East to a prolific Facebook page is plainly myopic, it is evident that the emergence of social media platforms that facilitate realtime communication between disparate groups and persons has been a distinct advantage for decentralised, fluid social movements or terror organisations that do not place a high premium on hierarchy, operational security or formal leadership. REAL-TIME AWARENESS This does not mean that states will inevitably suffer greater insecurity, but it does mean the opposition now have appropriate real-time situation awareness and can outperform the conventional and protracted decision cycle of government security forces. As a consequence, governments need to take Twitter, Facebook et al seriously, to learn their advantages and to adapt operations as necessary to fully exploit the potential of social media.

THE ARAB SPRING With President Mubarak resigning just 17 days after 26-year old Asmaa Mahfouz’s Facebook page encouraged 15,000 Egyptians to join her in Tahrir Square, it is easy to see why social media has been championed as the catalyst for change in the Arab world. As a mobilising tool to rapidly communicate messages to vast swathes of the population, social media is peerless with Facebook alone boasting over seven million users in Egypt. Facebook, YouTube and MySpace are three of the top five most popular websites in the US while Twitter’s popularity sky-rockets with unique visitors growing 1,382 per cent from February 2008 to February 2009. Smartphones have made social media ubiquitous with information shared in unprecedented volumes and at unprecedented speed. Common agendas are formed and online communities constructed with individual citizens and bloggers wielding new levels of influence. E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

23


DELIVERING YOUR COMPLETE ELECTRONICS MANUFACTURING SERVICES n PCB Manufacture (UK facility/Overseas) n Flex, Flex Rigid & Aluminium Clad Technologies n Single Sided through to 40 Layer Multilayer n Fast prototype service n Electronic Conceptual Design n PCB Layout Design n PCB Assembly, SMT, PTH & BGA n Full Box Build & Test Solutions n Over 30 years of Electronic Manufacturing Experience

IPC-A-610D class 3

Tel: 01782 562255 Fax 01782 565 684 Email: info@hallmarkelectronics.com Web: www.hallmarkelectronics.com Loomer Road, Chesterton, Newcastle-under-Lyme, Staffordshire, ST5 7LA


SOCIAL MEDIA E Without the monopoly of information over the narrow channels of the traditional print and broadcast media, the state no longer has such a grip on public opinion and the direction of the news agenda. Despite these dramatic changes, it is dangerous to draw conclusions about the destabilising and democratising effects of social media purely on the basis of the Arab Spring. On the surface, Twitter appears to have presented a similar challenge to the Iranian authorities during the 2009 elections, with the US State Department using the site as a source of intelligence on the anti-government protests and a litmus test for public opinion on the ground. The Obama Administration went as far as requesting that the site delayed a server upgrade so that the Iranian opposition could continue to organise. Ayatollah Ali Khameini and President Ahmadinejad soon fought back however, denouncing “deviant websites” such as Twitter. On state television, the Revolutionary Guard produced the programme ‘Gerdab’ that identified bloggers, accused them of immorality and encouraged their persecution, with the ruthless paramilitary group the ‘Basij’ willingly using Twitter to locate and attack pro-democracy protestors. In spite of the infamous YouTube video of Neda Agha-Soltan’s death logging millions of hits, the Iranian example demonstrates that far from being seen as the midwife for democracy and as inherently destabilising to the existing state apparatus, social media can be another string to the bow of the security state. As such, any analysis of the impact of social media cannot divorce the technology itself from the social, political and military context in which it is used. PROTESTS AND THE POLICE It would be wrong to depict social media’s political footprint as unique to the Middle East. Long before attacking VISA and MasterCard during the Wikileaks saga, the Anonymous group had been employing social networks to organise protests in the US. Research undertaken at the University of Washington provides an insight into the group’s Project Chanology campaign against the Church of Scientology in 20081. Explicitly discouraging the emergence of individual leaders, Chanology’s decision making process emphasised consensus and collaboration, with members volunteering for tasks based on their experience in a particular field. The horizontal structure of the organisation made it more resilient to the loss of individuals; it also engendered innovative political and tactical approaches by pulling together the expertise of individuals from a range of disciplines. Members’ identities remained anonymous, making them less prone to disruption by the robust Scientology lobby. Conversely, a strong group identity emerged as strangers were forced to use knowledge of Chanology culture and norms

to establish each other’s credentials as legitimate group members. This dynamism and flexibility was replicated throughout the anti-cuts rally in London in March 2011. The tapestry of protest groups, including UK Uncut, used Google Maps and even an iPhone app to post live updates of police activity to avoid kettling. Just as social media has made it easier to find people with common interests and for a network to crystallise around these issues, protestors’ situational awareness has also been enhanced, particularly through Twitter. Aware of the way in which this information could be monitored by the Police, the Black Bloc anarchists intentionally published erroneous detail on Facebook on where they were due to meet and how they would operate. As with the experience of the Arab Spring, however, the story of social media in domestic security is far from one-sided. Responding to Black Bloc violence, the Metropolitan Police tweeted that light bulbs filled with ammonium had been thrown on Oxford Street, pre-emptively quashing potential criticism of the security around the march. Championing its utility as both a public relations and operational tool, chief constable Richard Crompton stated “social media is coming to the fore – in London it gave officers the opportunity to put out clear messages and dispel rumours that would have been circulating among the crowds”. WARFARE 2.0 In the military sphere, much has been made of the advantages social media presents to terrorist organisations – the Mumbai attacks were planned using Skype and Google Maps. Just ten years ago, the geospatial planning capability provided by Google Maps was the domain of boutique military mission planning software, while Skype today is in many ways a less constrained and more flexible solution to most platforms on offer to the military. The horizontal command structures of loose groups such as Al Qaeda are naturally inclined towards the successful exploitation of social networks, which can offer rich pickings in terms of young, impressionable recruits and provide a channel to disseminate tactical information on activities such as bombmaking. The internet and the 24-hour media boom has made the military’s job in winning the battle for public opinion within its own borders, as well as that within the conflict zone, infinitely more difficult. Israel’s war with Hizbollah in 2006 is a case in point. On top of using Google Maps to determine the accuracy of its rocket fire, Hizbollah skilfully leaked information, images and video streams of the conflict zone via the internet, expertly integrating its social and mainstream media strategies. Several minutes after the successful targeting of Israel’s Hanit warship, Hassan Nasrallah was on air on the pro-Hizbollah Lebanese television station Al Manar describing the attack in

detail. Images of the missile assault were then released on Al Manar and crucially on YouTube. Luddites by comparison, the Israeli Defence Force (IDF) floundered for a full day before dropping leaflets and (pointlessly) jamming Al Manar’s images of the incident. Israel’s reaction to the patent failures in 2006 was to stand up the National Information Directorate to address ‘hasbara’ or explanation. As a result, during Operation Cast Lead in Gaza in December 2008 the IDF posted 46 videos on its own YouTube channel. Illustrating the IDF delivering aid and Hamas launching rocket attacks, the videos received 6.5 million views and could have helped the Israelis garner international support. That worldwide public opinion turned against the IDF was due to the refusal to allow traditional media outlets into Gaza throughout the operation, thus rendering all of Israel’s news releases subject to criticism as biased. Rather than an error in its use of social media, in this instance the IDF was guilty of failing to integrate its social media and overall communications strategies.

Defence Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADAPTING TO NEW RULES With the right mindset, however, state militaries can, and indeed must, adapt to the new social media environment, as research at the US Naval Postgraduate School indicates. Social media can dramatically improve the coordination of partners within a multi-lateral intervention that may involve various national forces and humanitarian aid agencies. With information superiority now a critical battle-winning asset, the speed with which social media facilitates the transferral of key data to those that need it most would greatly enhance the operational capability of a particular force as Vice Admiral N. Brown testifies: [social networking] “made it much easier for me to manage the critical information I needed.” Admittedly, a pre-cursor to the successful exploitation of social media is a significant cultural change within the military, from a “need to know” to “need to share” policy on information-sharing, accompanied by the discarding of rigid hierarchical operational structures2. While this challenge is daunting, it is not to be shirked – as we can be sure that those that seek to subvert our security will not give up on the new technologies available to them so easily. L Notes 1. Patrick Underwood and Howard Welser ‘The Internet is Here: Emergent Coordination and Innovation of Protest Forms in Digital Culture’, iConference 2011, February 8-11, 2011, Seattle, WA, USA 2. Jeffrey G. Bennington and Ryan H. King, ‘Perceptions on Social Networking: A study on their operational relevance for the Navy’, March 2010, Naval Postgraduate School, Monterey, California

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

25


The ultimate portable thermal imaging camera.

Simple to operate

High resolution viewing screen

Light weight

For search, patrol and surveillance operations. It gets results.

See the BIGGER picture Argus Long Range Telemetry Argus LRT transmits clear, secure thermal video footage to on-scene commanders. From tower blocks to subterranean tunnels, this upgrade to the Argus SC gets a better view of the situation • Designed using COFDM technology for a secure transmission • Noise free quality picture • Up t0 1km range • Integrated into camera battery For more information or to book a demonstration please go to

www.argusdirect.com

LRT


The Argus SC is excellent at locating people hiding in foliage, regardless of the time of day. By locating a suspect with an Argus SC, officers can approach and apprehend a suspect without risking dangerous confrontations and involving many officers.

Argus SC cameras detect and reveal the heat created by the powerful lighting systems used to grow marijuana indoors. In a row a hot roof stands out.

The Argus SC can identify threats to personnel such as hidden suspects, guard dogs, and dangerous obstacles. It can also warn them of any potential threats lurking in the dark.

Argus SC thermal imaging can view large areas of land or water, searching rapidly to identify hot bodies and requiring less manpower than conventional methods. Searches can be conducted efficiently whether carried out on foot, or from vehicles or boats.

Thermal imagers can immediately highlight if a vehicle has recently moved (hot tyres, brakes and engine heat reflection). Consequently they r superior surveillance capability in an urban situation.

Officers can quickly and ctively scrutinise between homes and buildings. In total darkness, officers can go virtually undetected, as they search for prowlers, peeping toms, and other criminal misbehaviour.

Police officers, fire fighters and military personnel are all required to operate in low, or no visibility, environments. The Argus SC can help train people in reconstructions of real-life night operations.

Argus SC thermal imaging cameras can help at various stages in collision investigation. Whether locating key clues to the collision (such as skid marks), missing people, or missing vehicle parts.

During a vehicle pursuit, if the occupier/occupiers abandon the car and continue to run on foot, officers can point the camera inside the vacated vehicle to determine how many occupants were present.

If used immediately after an incident, such as a burglary, the Argus SC can help forensic teams locate and record evidence. Heat signatures from the burglar’s body, like handprints on handles etc may still be evident (time dependent on body heat temperature, length of time contact has been made and the material touched).



COUNTER TERROR EXPO 2011

NO RESPITE IN THE FIGHT AGAINST EVOLVING TERROR

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

This year’s Counter Terror Expo delivered a full schedule of thought-provoking debate and lively discussion on and around those issues setting the agenda now and in the future Ten days after the doors closed on Counter Terror Expo 2011, the annual gathering of the world’s top counter terrorism and law enforcement professionals, US Special Forces captured and killed Osama bin Laden, the leader of the Al Qaeda terrorist network, in a daring cross border raid on his compound in northern Pakistan. In the immediate aftermath of that raid, the world was declared a much safer place, with some commentators hinting at a peace dividend being on the near horizon after a decade of war on terrorism. Such a possibility actually remains distant given the instability in many parts of the world – meaning we continue to live in uncertain times with the threat from terrorism remaining high. A decade on from the 9/11 attacks, which resulted in Al Qaeda becoming perhaps the most feared of all terrorist organisations, EU Home Affairs Commissioner Cecilia Malmström pointed delegates within the Global Counter Terrorism conference to the words of Al Qaeda on the Arabian Peninsula leader Nasir al-Wahishi as reason why it remains a potent threat with a capability far from diminished. “America’s actions require us to wipe them out of the map completely,” he recently declared. “America is a cancer that needs to be removed along with the west.” He also called on followers in the west to “acquire weapons and learn methods of war,” adding they are “living in a place where they can cause great harm to the enemy.” A POWERFUL ORGANISATION Al Qaeda on the Arabian Peninsula has emerged as one of the most dangerous branches of the organisation in recent years. It is responsible for the attempted assassination of the Saudi Deputy Interior Minister in August 2009; the plot to blow up Northwest Airlines flight 253 over Detroit in December 2009 and the almost successful downing of two in-flight cargo aircraft over America in October 2010. It has the capability to design and deploy innovative explosive devices that are extremely difficult to detect with current screening methods. “I do not know how you feel about this threat but I take it very seriously. This quote explains what we face and why the conference is so important. Let’s not for a second think that the terrorists are stupid. As we discuss current loopholes in the

systems, they have surely found new ones and plan to attack us there. We must therefore never lower the guard in the fight against terrorism,” Malmström told delegates. John Yates, assistant commissioner Specialist Operations, Metropolitan Police, emphasised the point: “Last year we saw a demonstration of just how innovative terrorists can be, when a device was intercepted on an aircraft transiting East Midlands airport concealed within a computer printer’s cartridge. “Carefully designed to confound our security procedures, this further attempt to use our international airlines as a means of attack poses a whole new set of challenges both for police and the aviation industry,” he said. The virtually undetectable explosive device had already been cleared for onward carriage when information from overseas prompted reexamination. A similar explosive device had been discovered at Dubai International Airport and only swift intelligence sharing prevented disaster. Both these cleverly constructed and concealed devices had flown on multiple passenger and pure cargo flights prior to their discovery. This attempted attack cost Al Qaeda on the Arabian Peninsula just US$4,000 to plan and execute. The cost to the aviation and security sectors in finding a solution before it is repeated will likely run into millions, warned the assistant commissioner. Within the context of the centrepiece Global Counter Terrorism conference, other principal speakers included Muhammad Rafiuddlin Shah, Counter Terrorism Implementation Task Force (CTITF) and director, CTITF Office, United Nations; Jean Dominique Nollet, Europol, Admiral the Right Honourable Lord West of Spithead GCB DSC ADC DUniv, Lindsay Clutterbuck, RAND Europe, and Patrick Mercer OBE, AllParty Parliamentary Group on Transatlantic and International Security, amongst many other renowned experts in the field. HIGH PROFILE TARGETS Although high profile targets such as aviation and mass transit systems remain the preferred choice, other national critical infrastructure assets continue to be in the crosshairs. Critical National Infrastructure and Resilience conference delegates heard that that protection of large spaces and E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

29



COUNTER TERROR EXPO 2011 E the people within them continue to be a high priority issue, whilst threats to energy, telecommunication and water infrastructure remain very real. United Kingdom authorities remain on a heightened state of alert against acts of terrorism, as the country gears up to host the Olympic Games next year. Mindful that major events such as this are potent targets for those who would wish to cause harm, security planners have had many unique challenges to overcome, in affording maximum protection for the millions of visitors and thousands of athletes expected at the Games. This work is still ongoing and lessons learned will help better protect large spaces in the future. Delegates were also warned of the pressing need for major investment in infrastructure renewal and hardening against a wide range of threats. In a thought-provoking presentation, professor Jim Norton, president, BCS, the Chartered Institute for IT, said: “We live today in a complex, densely-networked and heavily technology-reliant society. Extensive privatisation and the pursuit of competitive advantage in globalised markets, have also led us to pare down the systems we rely upon until little or no margin for error remains. “We have switched to lean production, stretched supply chains, decreased stock inventories and reduced redundancy in our systems. We have outsourced, offshored and embraced a just-in-time culture with little heed for just-in-case. “This magnifies not only efficiency but also vulnerability. Everything depends on infrastructure functioning smoothly and the infrastructure of modern life can be brittle. Interdependent systems can make for cascades of concatenated failure when one link in the chain is broken.” CYBER RESILIENCE Late last year the UK government committed £650 million to cyber resilience of key national infrastructure and defence assets. The decision to do so signalled that the government has identified cyber threats as one of the most serious national security challenges alongside global terrorism, a major accident or natural hazard and an international military conflict. Counter Terror Expo 2011 conference delegates and exhibition visitors were given first hand insight into how computer systems are being targeted by criminals, foreign intelligence services and other malicious actors seeking to exploit people, corrupt systems and steal information. Companies across the world have discovered to their cost, that this is an activity being waged day in and day out and one that can have profound consequences. Lockheed Martin and Sony are two of the more globally high profile companies to have been caught out recently. The former denied the attack on its systems resulted in classified information being accessed, but

analysts have characterised it as a grave attempt to steal data. The latter had the personal details of more than 100 million of its PlayStation customers stolen and was forced to shut down the gaming network for nearly a month while it resolved security issues. In the interconnected and interdependent world in which we work today, well designed and carefully monitored computer security is evidently vital. NATURAL DISASTER An important message driven home to Counter Terror Expo 2011 attendees, was that acts of terrorism and cyber security threats are not the only issues that can impact on national security. Resilience to climate change and the ability to mitigate the impact of natural disaster and extreme weather events is equally important. Volcanic ash clouds over Europe, earthquake and tsunami events in the Caribbean and Japan, and hurricane and tornado devastation across the United States of America, have all recently taken their toll on the infrastructure that national economies depend upon. The ash cloud crisis cut off Europe from much of the rest world and cost regional business an estimated US$2.5 billion. An earthquake in Haiti has resulted in an estimated US$14bn of reconstruction costs. The impact of flooding and tornado events across the United States is considered to be around US$24bn. Japan’s recent earthquake and tsunami has impacted the national and global economy to the tune of US$300bn. Such eye watering sums demand that planners exercise foresight in the short term to protect against unsustainable cost in the long term. BAA plc, the operator of London Heathrow learned this lesson the hard way, when it was castigated for its lack of preparedness in dealing with heavy snow, which shut the

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

airport for days on end. Underinvestment in snow clearing equipment and lack of a coherent emergency plan were cited as two of the reasons for the shutdown. BAA plc has subsequently had to put a significant reinvestment programme in place, to remedy the situation before the coming winter. STRENGTH TO STRENGTH Counter Terror Expo focuses on all the major incidents impacting on the wellbeing of people and commerce, and continues to go from strength to strength. “Counter Terror Expo’s conference programme brought sharp focus to the challenges faced going forward, outlined in some considerable detail methods to address them and provided a forum for considerable on-site and on-going debate,” said a spokesperson for the show. “We are indebted to the very many experts and analysts in the counterterrorism sphere for their insightful contributions, which collectively make the Counter Terror Expo conference programme a globally dominating event.” The conference programme was supported by one of the world’s most extensive hardware and software exhibitions, which included interactive demonstrations and specialist workshop presentations covering the gamut of counter-terrorism and resilience issues. Over 400 of the principal and leading global defence and security companies exhibited, emphasising that Counter Terror Expo remains a vitally important and key calendar event amongst professionals in the field. Counter Terror Expo returns to the Grand & National Halls of the Olympia Conference and Exhibition Centre 25-26 April 2012. L FOR MORE INFORMATION www.counterterrorexpo.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

31


Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THERMAL TECHNOLOGY

FLIR – THE PERFECT SECURITY SOLUTION All over the world the perimeters of industrial parks, airports, harbours, petro-chemical and nuclear facilities are being protected with the help of thermal imaging cameras from FLIR Systems Featuring the industry-leading line of IP thermal security cameras, the FLIR Thermal Fence gives you instant, automated threat detection and visual threat assessment capability around the clock in one easy-touse package. By combining FLIR’s thermal security cameras and the FLIR Sensors Manager (FSM) control and management software, the FLIR Thermal Fence provides automated perimeter surveillance for every single perimeter security application possible, including petro-chemical facilities, nuclear facilities, commercial campuses, and residential installations, to name just a few examples. INTEGRATED SOLUTION FLIR Sensors Manager is a comprehensive sensor management software package that not only allows you to manage your FLIR thermal imaging cameras, but also integrates a large range of third-party security tools, including fence sensors, ground sensors, radars, seismic sensors, fiber nets and similar sensors into one security network. The biggest advantage of the FLIR Sensors Manager software, however, is the fact that it contains advanced video analytics algorithms that enable you to automatically detect intruders. The software allows you to set up virtual trip wires and other advanced spatial rules like exit or enter triggered alarms. Combined with thermal imaging cameras from FLIR this powerful software can help protect your perimeter 24 hours a day, 7 days a week with accurate intrusion detection and instant visual alarm assessment capability, while minimising false alarms. To set up the FLIR Thermal Fence you need several fixed thermal imaging cameras that monitor the entire perimeter and one or more thermal imaging cameras mounted on pan and tilt platforms that can cover the entire premises. The fixed FLIR thermal imaging cameras will continually send live thermal footage to the video analysis software. FLIR Sensors Manager contains advanced video analysis algorithms that are specially designed for the analysis of thermal video footage. It will detect and follow all types of movement and compare it with previously determined parameters. The user friendly interface allows you to create customised rules for trip wires, exclusion zones, temperature alarms, and directional alarms. If the Sensors Manager software detects unauthorised movement an alarm will go off.

32

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

QUICK VISUAL CONFORMATION The operator can immediately see what is happening on the thermal video footage from the fixed thermal imaging cameras. If additional visual confirmation is required the pan and tilt mounted thermal imaging cameras come into play. FLIR Sensors Manager has a built in georeferenced mapping feature that allows for FLIR’s unique slew-to-cue function. This means a FLIR pan and tilt mounted thermal imaging camera will automatically

quite easily using the FLIR Thermal Fence. • Low total cost of ownership: The cameras require no maintenance whatsoever and because no lighting is required the cost of ownership is kept very low. • Fewer unwanted alarms: Due to the high contrast of the thermal video footage and the special video analytics algorithms in the FLIR Sensors Manager software the FLIR Thermal Fence has a lower rate of unwanted alarms than other security packages. • Easy to modify and expand: Due to the

By combining FLIR’s thermal security cameras and the FLIR Sensors Manager (FSM) control and management software, the FLIR Thermal Fence provides automated perimeter surveillance for every single perimeter security application possible, including petro-chemical facilities, nuclear facilities, commercial campuses, and residential installations. be pointed at the precise coordinates of any alarm generated by any sensor on your FLIR Thermal Fence network. This allows the operator to quickly perform a visual inspection of the alarm, which in turn enables a swift response to the event. THE ADVANTAGES OF THE FLIR THERMAL FENCE • Easy to integrate with existing security network: FLIR Sensors Manager software can effortlessly integrate the FLIR thermal imaging security cameras with other IP compatible sensors or CCTV cameras. • Cost effective: The FLIR Thermal Fence is less expensive than installing an actual physical barrier. If compared with a CCTV network the FLIR Thermal Fence needs fewer cameras due to the excellent range performance of FLIR thermal imaging security cameras. • Non intrusive: This way of securing your perimeter is much less intrusive than a physical barrier or wildlife disturbing lighting infrastructures. • Secures inaccessible areas: Areas that cannot be fenced due to economic, environmental or logistical reasons can usually be secured

flexibility if the FLIR Thermal Fence you can easily modify and expand your security system as your needs evolve. THERMAL IMAGING CAMERAS The real power of the thermal fence lies in the thermal imaging security cameras. Unlike all other nighttime vision systems thermal imaging cameras need no light whatsoever to function, because they rely on minute differences in thermal radiation to produce high contrast thermal images. Not only does this mean that thermal imaging cameras can see in complete darkness, they also allow you to see clearly when obscurants smoke, dust, and light fog render your normal vision useless. Thermal imaging security cameras allow you to see farther than any other night vision technology on the market today, but in certain situations they also function better than CCTV cameras during the day. One daylight advantage thermal imaging cameras have over regular CCTV cameras is that the latter can be blinded by direct or reflected sunlight. Thermal imaging cameras don’t have that problem. But there’s more. Regular CCTV cameras depend on visual E


The flexibility of the FLIR Sensors Manager software makes the FLIR Thermal Fence the only solution on the market today that brings the control and monitoring of all of your perimeter security sensors together in one place. E contrast to provide enough information for the video analysis software or the human viewer to detect an intruder. Even at moderate ranges, weak colour contrast can render these cameras useless. Thermal cameras don’t have this limitation. Human beings always emit much more thermal radiation than their surroundings. That means that it is much easier for video analysis software or human viewers to spot trespassers on the footage from a thermal imaging camera than on the footage from a CCTV camera. LOW TOTAL COST OF OWNERSHIP The total cost of ownership of a security system with thermal imaging cameras is generally much lower than a CCTV security system. First of all you need fewer thermal imaging cameras then you would need CCTV cameras due to the excellent range performance. Each camera needs a mast to be mounted on, a power line and a video feedback connection, so needing fewer cameras means that you can keep the infrastructure simple, keeping maintenance costs to a minimum. Given the fact that thermal imaging cameras work perfectly in complete darkness, you don’t need to install any lighting. Not only does lighting cost a lot of money to install, but it also requires a lot of electricity to keep the lights burning every night. FEWER UNWANTED ALARMS Thermal imaging cameras produce fewer unwanted alarms than CCTV cameras. A spider crawling across the camera’s lens, branches of a tree moving in the wind, there are numerous possible causes for unwanted alarms. Thermal imaging cameras trigger fewer unwanted alarms for the same reason as why they have a better range performance then CCTV cameras. The thermal contrast is usually bigger than the visual contrast so the video analysis software can much more accurately distinguish between a branch moving in the wind, to name just one example, and a trespasser trying to enter the premises. Not only do thermal imaging cameras cause fewer unwanted alarms than CCTV cameras, the FLIR Sensors Manager video analytics software further lowers the rate of unwanted alarms. The advanced video analytics algorithms included in the FLIR Sensors Manager software are specially designed for the analysis of thermal video footage. This means that FLIR Sensors Manager software – if combined with FLIR thermal imaging cameras – will provide

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

a much lower rate of unwanted alarms than any other analytics package. THE ADVANTAGES OF FLIR SENSORS MANAGER FLIR Sensors Manager offers powerful and efficient management capabilities for any security installation with FLIR Systems thermal imaging cameras. FLIR Sensors Manager allows to automatically locate FLIR Systems thermal imaging cameras in the network and to easily control them. Just connect the thermal imaging camera to the network, install FLIR Sensors Manager and hit the “discover” button and you will be able to manage and control the camera. Thanks to FLIR Sensors Manager, the management of FLIR Systems thermal imaging cameras over a network will become extremely easy. FLIR Sensors Manager is a commercial “Out of the Box” software. Fully designed and supported by FLIR Systems, this application guarantees an intuitive and simple user experience. Just install the software and you will be ready to use it immediately. INTEGRATE ALL YOUR SECURITY SENSORS The flexibility of the FLIR Sensors Manager software makes the FLIR Thermal Fence the only solution on the market today that brings the control and monitoring of all of your perimeter security sensors together in one place. It operates over the same IP network as your existing CCTV camera network, but displays all of your thermal camera video and other sensor outputs on a single convenient display. All your thermal cameras and other perimeter security sensors are fully integrated and georeferenced on a map of your facility for rapid detection and threat assessment, allowing you to deploy your assets efficiently, effectively, and to their full advantage. Because FLIR Sensors Manager operates in parallel with your existing security video network, there’s no disruption to that network while you implement the Thermal Fence, and no expense incurred for re-training on a new CCTV sensor networking solution. L FOR MORE INFORMATION For more information about FLIR Sensors Manager, visit www.flir.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

33


Manufacturing www.ml-electronics.co.uk

our

experienced multi-disciplined team working alongside you

giving you supporting you to

analysing your requirments

prototypes and

market-leading products focus on what matters to you

Value Added Manufacturing Services

Manufacturing Services

Additional Services

-

-

Protoype Design & Manufacture Bespoke Low Volume Production STTE Design & Build Obsolecence Management Test & Repair IMS/Planar Transformers/Flexi-Circuits Hybrids & Multi-Layer

Power Management Design Inverter Design Energy Harvesting Techniques Distributed Sensor Systems Low Power RF Design DSP Processing Designs

Contact MLE Creative Electronics with your enquiry today - enquiries@ml-electronics.co.uk


NORTHERN IRELAND

MAJOR RISK AND CONCERN

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Risk and security expert Anthony Stead offers insight into the events of 15 August 1998 when the Real Irish Republican Army targeted a busy shopping street in Omagh, Northern Ireland On 13 August 1998 a maroon Vauxhall Cavalier was stolen from Carrickmacross, County Monaghan in the Republic of Ireland (RoI) (Ware, 2000:1). It was reported that the criminals replaced the vehicle’s RoI registration plates 91-DL2554 with false plates MDZ 5211 of the style used in Northern Ireland (NI) in order to remain inconspicuous when driving across the border (Kelly et al, 2008:1). On Saturday 15 August 1998 the car was driven across the border from RoI to NI and at approximately 2.19pm the vehicle laden with an estimated 500lb of fertiliser-based explosives was parked outside Kells’ Clothes Shop in Market Street, Omagh, Northern Ireland. This was a busy day for Omagh shoppers. It was only two weeks until school resumed after the summer and many parents had their children with them shopping in Omagh’s two school-uniform specialists SD Kells and Watersons. Elsewhere, students home from university were working their summer jobs in shops. Other people were shopping for music, groceries, getting a haircut or just meeting friends. Later that day, a carnival was due to move through the town centre. The town was packed (Johnston, nk). PHONE WARNINGS At 2.32pm Ulster Television received a telephone warning stating “There’s a bomb, courthouse, Omagh, Main Street, 500lb, explosion 30 minutes”. One minute later, the office received a second warning saying “Martha Pope [RIRA’s recognised codeword], bomb, Omagh town, 15 minutes.” A minute later the Samaritans’ office in Coleraine received a call stating that a bomb would explode in Main Street about 200 yards from the courthouse. All information was passed to the Royal Ulster Constabulary (RUC). RUC officers were clearing the area around the Omagh Court Office when the bomb detonated approximately 40 minutes after the telephone warnings (BBC, 1998). Unbeknown to the RUC, they had been clearing the wrong area and had inadvertently chaperoned the public in to the area where the bomb laden vehicle was parked. At approximately 3.10pm the bomb exploded to devastating effect. 21 people were killed outright with initial reports of 220 injured. Later reports counted 31 dead, including an expectant mother of twins and over 300 injured (Melaugh and McKenna, nk). Brennan (2008:1) stated “Some were killed at the scene, some died later in hospital. Some suffered severe head injuries, some

suffered multiple internal injuries, some suffered traumatic amputation of arms and legs and one victim was decapitated.” The efforts of the emergency services at the scene were hampered by a burst water main that sent water flooding down the street, broken electricity cables, which presented danger, and the complete collapse of the telephone system in the centre of the town. The Omagh bomb remains the deadliest single attack in the history of Irelands’ “Troubles”. On 18 August 1998 the Real Irish Republican Army (RIRA) claimed responsibility for the bombing. THE REAL IRA The Real IRA or RIRA has close overlapping links with Óglaigh na hÉireann (Volunteers of Ireland), the 32 County Sovereignty Movement (32CSM), Sinn Fein and the Provisional IRA (PIRA). The 32CSM is widely regarded as the political wing of the “Reals”. Along with

to damage the economic infrastructure. RIRA targets those deemed legitimate targets, generally members of the security forces, by close quarter assassination shootings. Additional methods of attack include the use of land mines, home-made mortars and car bombs (Boyne, 1998:1). RIRA is an illegal organisation in the Republic of Ireland and designated as a terrorist organisation in the United Kingdom and the United States. STRUCTURE In varying reports it has been suggested that RIRA has a membership of up to 300 activists. Research has found that the media rarely publishes the names of arrested or incarcerated members, but does publish the names of deceased suspected members. The command structure of RIRA mirrors that of PIRA in that it is hierarchical. There is a seven-member Army Council, a chief of staff, a quartermaster general, a director of

RIRA is a nationalist paramilitary organisation with the ideology of a united Ireland, to be created by forcing British withdrawal from Northern Ireland through the use of physical force. the Continuity IRA and Óglaigh na hÉireann, they constitute the republican dissidents whose activities generate alarm and derision in equal measure from the political and media mainstream (McCann, 2010:1). RIRA is a nationalist paramilitary organisation with the ideology of a united Ireland, to be created by forcing British withdrawal from Northern Ireland through the use of physical force. In its Real Irish Republican Army statement (Melaugh, 2003:1), the organisation rejects the Mitchell Peace Principles and the Belfast Agreement, comparing the latter to the 1921 Anglo-Irish Treaty which resulted in the partition of Ireland. RIRA aims to uphold an uncompromising form of Irish republicanism and opposes any political settlement that falls short of Irish unity and independence. RIRA formed in 1997 following a split in the Provisional IRA in dispute over the 1997 ceasefire and the Good Friday Agreement, with RIRA choosing instead to continue the armed struggle against the British Government and loyalists. RIRA employs the same tactics as PIRA used in the 1990s by bombing town centres

training, a director of operations, a director of finance, a director of publicity and an adjutant general (Mooney and O’Toole, 2003:40-45). CEASEFIRE Following public outcry and media pressure, RIRA announced a “suspension” of military activities three days after the Omagh bombing. On 8 September 1998 RIRA announced a ceasefire (BBC, 1998:1). Security forces (SF) on both sides of the Irish border believe that RIRA abandoned its ceasefire in June 1999. SF received a genuine a coded statement from an outfit called the “true” IRA which SF said consisted of former members of the IRA and Real IRA (Mullin, 1999,1). The statement received in June 1999, said the “true” IRA was abandoning its ceasefire because of recent arrests on both sides of the border of individuals suspected of involvement in the Omagh bombing. The statement also cited the UK Government’s decision to deploy a further 1,300 troops to Northern Ireland to cope with an increased threat of violence during the Orange Order marching season (Mullin, 1999:1). E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

35


Save time, money, and effort Easy, versatile modular assembly solution.

technology

The MiniTec Profile Building System ■ ■ ■

MOTION

a unique resource for specialist motion components, assemblies and systems.

Easy to use No power tools required Standard and customised solutions Cutting service ce

D E AN COM THE T I S I V ORY FACT

C us today and arrange a visit to meet Call th the Team and experience the technologies. W We look forward to seeing you.

FREE samples FREE design advice ce FREE design toolss Contact us now and see how easyy MiniTec is to use and adapt. Limitless range of applications including: Machine Guards, Workstations, Conveyors and Customised Enclosures.

Linear Slides

Electric Actuators

Rotary Tables

Linear Bearings

Elevator Tables

Drives and Motors

Single and Multi-Axis

Standard and Custom

Manual and Motorised “Goods received, amazed at quick turn around, thank you” RUTHERFORD LABORATORY

Design Manufacture Supply

Call in for a chat and a coffee to see how we can help.

UK based designer and manufacturer of positioning systems offering you experience, knowledge and full engineering capabilities.

THE ENGINEER’S CHOICE

LG Motion Limited Tel: +44 (0)1256 365600 Fax: +44 (0)1256 365645 info@lg-motion.co.uk www.lg-motion.co.uk

T: 01256 365605 E: info@minitec.co.uk www.minitec.co.uk 15831 MiniTec 275x92mm ad.indd 1

20/4/10 17:41:05

Engineering excellence - by design


NORTHERN IRELAND E RIRA continues to this day with its economic and so called ‘legitimate’ targeting of representatives of British governance, i.e. security force personnel. RIRA has claimed responsibility for numerous attacks including firebomb attacks in Belfast in 2004, attacks on Police Service Northern Ireland (PSNI) patrols in 2006, attacks on businesses in Newry in 2006 through to the killing of PC Ronan Kerr in April 2011. PSNI found a 500lb bomb inside a van under a bridge below the main Belfast/Dublin road in April 2011, which has been attributed to RIRA (Hicks, 2011). RIRA does not enjoy the support or funding from USA that PIRA once enjoyed. Arguably the events of 9/11 changed the global appetite to support terrorist causes no matter how romantic. RIRA continues to recruit in Ireland and the UK mainland and focuses on recruiting young disenchanted teenagers. Evidence of RIRA recruiting at Glasgow Celtic’s Parkhead stadium was recently uncovered (Mills, 2009). THE TARGET From 2.32pm on that fateful day in 1998, three telephone calls had been made within minutes of each to warn of the bomb in Omagh town centre. The calls used the same codeword that had been used in RIRAs bomb attack in Banbridge (BBC, 1998:1). Calls were unclear in giving the location of the bomb; it is not known whether this was intentional. The location Main Street was given, but Omagh does not have a Main Street. A second warning had mentioned “courthouse” and a third message stated “Omagh Town”. The unclear location prompted RUC to cordon the area around the Court Office and marshal the public to the area of where the bomb was located. Bombing of the courthouse would fit with RIRA/PIRA past tactical profiles as the legal system has been associated as a reminder of British rule in Ireland, further, the legal system incarcerates many terrorists. There remain theories that the bombers intention was to bring the public close to the vehicle so as to increase the devastation. RUC initially believed the intended target was the courthouse, however, in a twist of fate, there was no parking bay available. The terrorists stationed the vehicle in an alternative location on Market Street (Melaugh, 2000:1). Market Street as a target would also fit with past RIRA/PIRA tactics in bringing economic turmoil to local communities, highlighting that the British Government has no control in Northern Ireland. The size of the bomb, 500lb was the largest used by RIRA. Market Street is relatively narrow in diameter with stone/ glass fronted buildings. Such a large bomb in a small enclosed environment would clearly create a devastating effect, impacting almost the length and breadth of the street. Arguably, it would have been very naive of experienced RIRA planners not to have considered this devastating impact.

Lord Daniel Brennan QC (2008:1) stated during the subsequent civil case in Belfast High Court that it was the plaintiff’s case that those behind the bombing had set out to cause massive carnage and he rejected statements made by the Real IRA in the wake of the bombing that “they had not intended injury or death, purely commercial damage”. THE IMPACT The impact of the bomb was wide ranging and encompassed loss of life, economic instability, it generated national and international condemnation and it may have played a significant role in reinforcing the peace process. If RIRAs intention was to destabilise the peace process following the signing of the Good Friday Agreement on 10 April 1998, by discharging the Omagh bomb, then it was a very poor calculation on their part. Sympathy in the North and South of Ireland following the bombing proved to unite communities rather than divide. Support for unity and the peace process gained international support with RIRA receiving much condemnation. The British and Irish governments introduced new legislation in an attempt to destroy RIRA (Mooney and O’Toole, 2003:232). With the organisation under intense pressure, which included founding members Michael McKevitt and Bernadette Sands-McKevitt being forced from their home after the media named McKevitt in connection with the bombing, the RIRA called a ceasefire on 8 September 1998 (BBC, 1998:1) THE AFTERMATH The town’s infrastructure required a rebuild, with the aim of a return to normality being a priority. The Omagh Bomb Memorial Working Group was established to create a fitting memorial to those maimed or killed in the atrocity. The working group involved all quarters of the community, government and partnerships including with the Spanish Government, who’s ambassador had visited the bomb scene to offer support – one of the victims was a Spanish student. Dr Black (2003:2) reports that many of the emergency responders and hospital medical staff left their jobs in the aftermath of the Omagh bombing. Black’s studies found that many such professionals found that, despite assisting in the care of victims throughout the Troubles, Omagh became the straw that broke the camel’s back, and that some clinicians who worked with the bereaved and injured became so isolated they felt unable to continue working. Financially it is not possible to calculate the cost of the Omagh bomb. Businesses lost their trade, families lost loved ones, governments funded rebuilds and community care that continues to support survivors. It is likely that there was an impact on national and international businesses development as well as a decrease in tourism.

The Omagh bomb remains a significant part of the lives of Omagh citizens. In 2008 the community recognised the 10th anniversary of the bomb by holding numerous services. Community care groups, established specifically to offer victim support, continue to report high usage and dependency amongst the population. More recently, the murder of PC Ronan Kerr on 2 April 2011 has reportedly impacted on the psyche of Omagh citizens as bloodshed and bombing return to the region (www.Omagh.gov.uk). In 2008, victims of the bombing raised the first ever civil case of its kind against those suspected of being involved in the bombing. After a 14-month hearing, a judge in Belfast ruled that four alleged members of the RIRA – chief Michael McKevitt, Liam Campbell, Seamus Daly and Colm Murphy – were responsible for the 1998 attack and the murder of 29 people and unborn twins. They were held liable for £1.6 million of damages. RIRA as an organisation was also found to be responsible for the deaths (McClements, 2009).

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UNANSWERED QUESTIONS The Omagh bomb was intentional. RIRA planned the event from the manufacture of the fertiliser explosive to the vehicle theft in Carrickmacross and subsequent drive across the border and changing of number plates. The style of attack matches RIRA’s model of the day, with an increased payload in contest to the peace process. What remains unclear is whether the intention was to attack the courthouse or Market Street, or if, as it seems, the telephone warnings were intended to generate the RUCs response of cordoning and chaperoning civilians in the direction of the bomb. Lord Brennan’s challenge to RIRA’s statements bring present legal credibility to the case that massmurder was the intention. Those convicted under the civil case continue to challenge the courts findings with an on-going appeal. Arguably RIRA is short in history yet contains a wealth of terror knowledge and experience that has been honed, tried and tested from years of activity in PIRAs rank and file. One must recognise that RIRA continues to develop the capability for mass casualty attacks. Omagh brought RIRA international media coverage the likes of which PIRA had enjoyed in the 1990s, however, such was the widespread consternation including from PIRA, that RIRA had little option but to declare a ceasefire. That the ceasefire did not hold for 12 months affirms RIRAs desire for continued hostility and significant casualty figures albeit with minimal support from the catholic or protestant population of Ireland. That RIRA continues to recruit at football grounds and amongst disenchanted teenage groups, whilst increasing the scale of attacks indicates that RIRA will continue to be a major risk to the population and a concern to the security forces. L

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

37


R

SER . M U -

E

AT

D

. INTE G R

A

FAC TU U R N

OR . EN

Securing Passengers and Cargo Worldwide ■

Focused Exhibition

Aviation Security & Air Cargo Conference

30 Free to attend Technology Workshops

Maritime Security Conference

Networking Functions

Supply Chain Security Conference

Free to attend Evening Reception

Public Transport Security Conference

Aviation

Cargo

Maritime

For more information please call +44 (0) 208 542 9090 or email info@niche-events.com

Supply Chain

Conference partners

www.transec.com 13-14 September 2011 | Olympia, London


COUNTER TERRORISM

Police & Law

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ACHIEVING NATIONAL SECURITY POLICING Assistant commissioner John Yates, the National lead for Counter Terrorist Policing for England & Wales, discusses the threat of international terrorism and how to respond to it Terrorist Policing network, forged from, and intrinsically interwoven within, the mainframe of UK policing. Indeed, when people talk of policing reform it’s easy to forget that in terms of CT we have in fact been in a constant state of reform since 2005 and thus have arrived at where we are by a process of evolution and development rather than by accident. SKILLS AND RESOURCES The Met Police’s Counter Terrorism Command (CTC) remains the natural base for a large proportion of the skills and resources, not to mention the operational focus provided by the capital city. The four regional Counter Terrorism Units, and the smaller Counter Terrorism Intelligence Units – fused as they are with their host forces and other local constabularies – were constructed to complement the London-based CTC, and harness the all-important local knowledge, skills and community relationships that are so essential for success in any aspect of delivering counter terrorism policing. The fact that many recent and significant CT operations have been run from these hubs supported by the London CTC, rather than the other way round, is a tribute to the way the whole network has developed over the past five years. This is the key strength of our current CT policing arrangements; that proverbial “golden thread” that links the frontline local police officer with his or her regional counter terrorism hub and thereby makes them an integral part of our national CT policing response. As we are fast bearing down on the ten year anniversary of 9/11, and with the Olympic Games around the corner, it seems a timely juncture for me – as the National lead for Counter Terrorist Policing for England & Wales – to take stock of where we are and to offer some views as to how this critical area of policing might be delivered in the future. The death of Usama bin Laden is a hugely significant event, however, it does not mark the end of the threat. We must all remain alert to the continuing threat from Al Qaeda, its affiliates and those acting alone. The threat from international terrorism is as severe as it has been for a long time and it has evolved and is evolving in a way that few could have predicted. We must also remain alert to threats from Irish

Dissident Republican terrorism highlighted so starkly by the recent murder of constable Ronan Kerr in Northern Ireland. RESPONDING TO THE THREAT Our response to the threat, therefore, has to be equally agile. This means that the likely and proper desire of the current government to examine and review the effectiveness of current policing arrangements must be seen as an opportunity to further improve our response rather than an unwelcome threat to the status quo. We have come a long way in the last five years but that should not breed any sense of complacency. We have been – and continue to be – able to draw on the significant capacity and capability built up in what is now a national Counter

FRONTLINE PROTECTION I am able also to reach out via my fellow chief constables and fine tune our frontline protective security posture across the UK; from advising on target hardening at specific locations to recommending the implementation of additional measures nationwide if necessary. The latter has been a very significant component of our coordinated protective security response and uplift over the last 12 months to counter any potential threat of a Mumbai-style attack. This pyramidal model of command in counter terrorism policing – from the national lead to frontline nationwide – has been rightly described many times as the envy of our international partners. Of course, against a burgeoning and ever- E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

39


Accurate Shooting

Personal Safety

Wind Speed

Air Pressure

Temperature Heat Stress Wind Chill Dew Point Wet Bulb Humidity Air Density

- Handheld - Robust - Waterproof

- Data storage - Data upload - Bluetooth速

Direction Cross, Head

& Tail Winds

Barometric

Pressure

www.r-p-r.co.uk Tel: +44 (0) 1590 679755 or email sales@r-p-r.co.uk

Call us now to find out more on +44 (0)1279 456320 or visit us at www.c3headsets.com Headsets, Microphones and more

Clement Clarke Communications Ltd Unit A, Edinburgh Way, Harlow, Essex, CM20 2TT, UK Tel. +44 (0)1279 456320 Fax. +44 (0)1279 456339 Web. www.c3headsets.com


COUNTER TERRORISM

The death of Usama bin Laden is a hugely significant event, however, it does not mark the end of the threat. We must all remain alert to the continuing threat from Al Qaeda, its affiliates and those acting alone. E diversifying threat backdrop, with budget cuts in other areas of mainstream policing to be managed and the broader background of wider police reform, it is perfectly valid at this point that we should take an objective step back, pan across our current policing structure and ask ourselves if wider structural change in the current CT arrangements is needed. OPTIONS FOR CHANGE There appear to be several options. The first and most obvious is to retain the current set up but keep refining and improving them through experience and events. The next appears to pull the current network out of mainstream policing and place it in the soon to be formed National Crime Agency. The third is to morph the current network into a lead force arrangement with, in all probability, the Metropolitan Police Service, through size, experience, location of threat and expertise, being that Force. The fourth option is to create a stand-alone agency to deal with CT. In

essence, a 44th, but national, CT Policing Force. It will be possible to make a case for each of these options and they each come with specific advantages and disadvantages, some more weighty than others in terms of their impact. We will also need to be conscious of the impact of the introduction of locally elected Police & Crime Commissioners and what this may mean in terms of both future governance and the resourcing demands for national security. In examining the options for change we not only need to be aware of the public safety aspect and financial consequences but also of the need to be extremely careful that we do not break something that may only need a service rather than an overhaul or re-build. We must also recognise that we didn’t get where we are today by accident and that the key interdependencies and relationships with partner agencies and communities may not readily adapt to a simple plug and play process.

Police & Law

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

OLYMPIC SECURITY For all the potential developments that I have set out, the one thing that has been made clear by the government is that there will be no change to the current CT arrangements before the Olympic Games. Whilst there is much more planning to be done over the coming months, I am confident that the CT policing structure we have is more than fit for purpose to deliver a safe and secure Games. Next year as the flame is lit we will face the biggest policing and security challenge that we have ever seen in the United Kingdom. From 27 July to 9 September 2012 we will have 14,700 of the world’s finest athletes competing in 771 different medal events at 34 different venues with an estimated 9.1 million spectators. The focal point of our Games will be the Olympic Park – itself the size of 357 football pitches – in the heart of East London and a stone’s throw from East Ham. On the peak day of travel it is estimated that an additional 800,000 spectators will use our public transport network and the whole thing is being covered by 21,000 journalists and broadcasters. It is truly the oldest and greatest show on earth and the world will be watching us and the all consuming priority for myself and colleagues is to deliver a safe and secure Games against the backdrop of challenges that I have outlined. L

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

41


www.logicallysecure.com

Optimise your security Logically Secure was founded in 2005 from a core of former military IT, counter-intelligence and security specialists. As a well-respected and trusted security consultancy; our CESG approved staff (CLAS) deliver services to industry, Government and CNI.

• We

have a complete understanding of the whole UK HMG Security process from our extensive experience gained inside both the MOD and Commercial spectrums.

• If you are planning your own List-X environment we can help you meet the Authority’s physical and technical security requirements including IT system Accreditation.

• Our former MOD Crypto staff can support your Project Crypto

Planning (PCPs) to ensure you get the right Crypto equipment on time and with the minimum of project risk.

• We have undertaken many HMG and commercial lockdowns of networks, laptops and mobile devices. We can help you both harden and document the configuration, ensuring you are best positioned to gain Accreditation.

• We have security cleared CLAS and CREST staff to support your

testing requirements; we can support web application, wireless, network, server and workstation testing in the UK and overseas.

See us at Transport Security Expo, London Olympia, 13th & 14th September 2011 on stand A46

Logically Secure Ltd, Festival House, Jessop Avenue, Cheltenham, GL50 3SH • Telephone: 01242 220 040


CYBER SECURITY

LOGICALLY SECURE Logically Secure can help you take the necessary measures to minimise your vulnerability to cyber attacks and ensure that pragmatic and effective contingency plans are in place

In October 2010 the government published its National Security Strategy ‘A Strong Britain in an Age of Uncertainty’, drawn up by the newly created National Security Council. The strategy highlighted the need for the UK to be able to react effectively to evolving security threats from a wide range of sources. Acts of terrorism and cyber threats are listed among the four Tier One risks to the UK’s security, with a recognition that cybercrime could escalate into cyber terrorism. In an attempt to combat these threats the government has committed £500m to tackling cybercrime. MINIMISE YOUR VULNERABILITY Logically Secure helps organisations take the necessary measures to minimise their vulnerability to cyber attack and ensure that pragmatic and effective contingency plans are in place should an attack succeed. Logically Secure continues to provide a wide range of IT security consultancy services to a diverse range of clients across a number of industrial sectors, from the music and entertainment industry to major government programmes, including the MOD and defence

industry. These services have ranged from providing incident response, investigation and recovery, security architecture advice and design, penetration testing, security accreditation support, and assistance with the Common Criteria (CC) evaluation process. INCIDENT RESPONSE Over the past 12 months we have been called on to assist clients with IT incident response investigations following either a suspected or actual hacker attack or an unauthorised data release. The nature of these incidents necessitates a rapid response from Logically Secure to ensure that the integrity of forensic evidence is maintained, and can require sustained round-the-clock effort to resolve. Regular updates are provided throughout the incident, followed by a post incident report fully detailing the causes of the incident, investigation findings and our recommendations on preventing a recurrence.

process. Their requirement was to build an accredited network to carry Impact Level (IL) 3 data; the network was designed to connect two data centres and numerous sites throughout the UK as well as providing remote access facilities for authorised users. The network was also connected to MOD systems at the same IL. Logically Secure were contracted to provide security advice on the design, carry out penetration testing of the network, produce relevant accreditation documentation, and provide the interface with the accreditation authorities. Accreditation support was also provided to a MOD project providing a pre operational deployment training simulation capability to the British Army. This system provided an extremely flexible facility that could be used to simulate numerous theatres of operation; this drive for flexibility also introduced extra challenges to be able to meet the accreditation process requirements. Logically Secure provided security architecture advice and assisted with the production of the accreditation documentation required to successfully achieve full accreditation.

Information Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COMMON CRITERIA Logically Secure has for a number of years been involved as the lead security consultant for the evaluation and accreditation of the IL3 ground communications and information systems component of a major defence Private Finance Initiative (PFI) programme. The evaluation is being carried out to meet the requirements of CC Evaluation Assurance Level (EAL) 3. This has involved regular and extensive liaison with the Commercial Evaluation Facility (CLEF), CESG (a GCHQ department), System Accreditor and the main contractor providing the system. Logically Secure helped to streamline the design, provided the documentation in support of the evaluation, and produced the test scripts to be run against the system to prove that the installed security enforcing functions actually provided the claimed level of security. The Logically Secure penetration test team also carried out penetration testing at different stages of the build process to de-risk the evaluation and ensure that the approved installation design was met. L FOR MORE INFORMATION For further details or to discuss your system security and accreditation requirements please contact us at: Logically Secure, Festival House, Jessop Avenue, Cheltenham GL50 3SH Tel: +44 (0)1242 220040 www.logicallysecure.com

NETWORK DESIGN AND TESTING One of our international defence sector clients had previously had very little exposure to the HMG security accreditation

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

43


Helping you mask for less! • Green Polyester Tapes & Discs • Silicone Caps & Plugs • Kapton Tape & Discs • Protective Clothing • 2000 Paper Masking • 1500 Paper Masking • Sandblasting • Lead Foil • More Items Available

Welcome to The Masking Shop, manufacturer, stockist and distributor of the largest masking range online. We guarantee easy to order quality products at sensible prices; fast delivery services, no carriage charges on orders over £50.When viewing our web-site you will find all the right products to solve your masking problems.You can purchase just one roll of tape and small quantities of discs with no MOQ’s across our product range.

T: 01268 762066 E: sales@themaskingshop.co.uk W: www.themaskingshop.co.uk

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture Electronic Warfare, Unmanned Systems, Radar, Surveillance The most important thing we build is trust

• • • • • •

Large Standard Product Range Customised Antenna Development Sector and Multi Sector Omni, Multi-Stacked Omni High Gain Directional COFDM Applications

• • • • • •

European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas

CounterTerror20100908.indd 1

UAV, UMS, UGV Direction Finding, Tracking Covert/Overt PMR, Tetra, Cellular DAS Ultra Wideband IED Countermeasures

Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: antennasystems.ma@cobham.com www.cobham.com/antennasystems/newmarket

Antenna photos not to scale

25/11/2010 15:33


INFOSECURITY 2011

INVESTMENT IN DATA SECURITY CONTINUES Infosecurity Europe provided access to an unrivalled free education programme, exhibitors showcasing new and emerging technologies, and offered practical and professional expertise Organisers of Infosecurity Europe 2011, held in London recently, have hailed the event a great success, despite the economic malaise that continues to affect UK plc. Event director Claire Sellick attributes the success of the event to the fact that it is not just the need for organisations to protect their data that is driving investment. “Information security technology is now seen as an essential enabler for business to provide profitable and exciting new services,” she said. Perhaps the most obvious reflection of this was the announcement of the second annual Cyber Security Challenge UK, a scheme designed to raise awareness of IT security skills amongst students of all ages. The challenge was launched at the end of July 2010 and three competitions were immediately opened for registration: the SANS and Sophos Treasure Hunt; the QinetiQ Network Defence competition; and the US Department of Defence Cyber Crime Centre (DC3) Digital Forensics Challenge. Revealing the scheme’s plans for its second year, Judy Barker, the scheme’s director and Tony Neal, the EMEA director of key sponsor the SANS Institute, said that the challenge had been a great success over the last year, and is set to greatly expand in the year ahead. “We’ve come a long way in a year. There will be more streams next year, thanks to the support of our platinum spo nsors, who include PWC, Sophos, HP Labs, Cassidian, the SANS Institute and QinetiQ,” said Barker. As part of the expansion, the challenge’s partnership with DC3, the US Department of Defence’s cybercrime centre, continues. EFFECTS OF PCI DSS Data security specialist Imperva announced the results of a major report – written in conjunction with the Ponemon Institute – which found that PCI DSS is not, as many professionals have assumed, having a positive effect on IT security. The survey measured responses from more than 670 IT professionals on both sides of the Atlantic and looked at how their efforts to comply with the standards affect their company’s data protection and security. 64 per cent of PCI-DSS-compliant organisations reported suffering no data breaches involving credit card data in the past two years. At the same time,

researchers found that only 38 per cent of non-compliant businesses reported suffering no data breaches involving credit card data in the past two years. Amichai Shulman, Imperva’s CTO, said that over the past few years, most companies have matured in their understanding of the PCI mandate and have worked to meet strict compliance deadlines. Back on the IP connectivity trail, and AEP Networks took the wraps off its SCOPE – Secure Communications Optimised Packet Engine – technology that allows business to fall back on low-bandwidth services like 3G and even 2G cellular data links, when their primary internet connection goes down. The most interesting aspect of SCOPE is that the technology can strip away the transport layer of a TCP/IP data connection, leaving the underlying data intact, push that data over a low bandwidth connection, and then reconstitute it at the other end. The technology has gone down well with AEP’s diverse range of customers, including the British Army, which uses the system for mini hotspots in battlefield conditions, as well as when using cellular picocells on board transport ships. The key feature with SCOPE, says the firm, is that it works under very low bandwidth conditions and where the user – be they military or police – has to have an IP data connection that has to work under any and all conditions. INDUSTRY TRENDS IN FOCUS The free educational programme at Infosecurity Europe continued this year with a variety of senior industry professionals explaining the latest trends in the ITsec industry. Eugene Kaspersky, CEO of Kaspersky Lab, explained that cybercrime has become a business like any other, but with the important difference that the revenues involved are significant for the fraudsters at the top of the chain. “It’s a business,” Kaspersky told his audience. “There are affiliate schemes, partner events and rewards way ahead of any other market. The rewards for some criminals are measured in hundreds of thousands of dollars. It’s so easy.” Using examples from some of the cybercriminal investigations that he and his team have carried out, Eugene explained how

Information Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

some criminals do not see that what they are doing amounts to real crime. Their claim, he says, is that it’s only virtual money and no one gets hurt when they rip internet users off. The solution to the growing problem of cyber crime, Kaspersky explained, is the use of cloud-based IT security, which a number of vendors are now adopting. “Cloud security has become the norm in the IT security industry. It’s not a replacement for conventional IT security – it’s an addition,” he said, adding that the bad news is that even cloud IT security does not stop advanced and complex malware like Stuxnet from hitting home. The only piece of good news to emerge from the complex world that is IT security today, he noted, is that the cost of successful entry to the world of cybercrime is actually becoming a lot more expensive. “It’s clear that traditional AV technology is not enough any more. But it’s still a must,” he said. CLOUD CONFIDENCE Another industry veteran singing the cloud siren song at the show was Amer Deeba, chief marketing officer of cloud security vendor Qualys. Deeba noted that, over the last six months, he and his team have seen a number of large firms move some or all of their IT resources into the cloud, mainly as a result of the cost savings that cloud computing engenders. “Cost is a huge issue,” he said, adding that some of the old security issues that many corporates said were a barrier to cloud adoption are now starting to disappear. One of the most common fears amongst corporates when they are thinking of moving their IT assets to the cloud is, of course, the possibility of a DDOS (distributed denial of service) attack, he added. Deeba explained how this is one of the most frequently-raised issued by corporates. But, he said, with today’s flexible internet platform, and duplication of data centres around the world, the effects of a DDOS attack can be significantly reduced. “We have seen a number of DDOS attacks being attempted in recent months,” he continued, adding that none of them have been successful, largely because of multiple points of entry that companies now have into the cloud computing environment. ENCRYPTION PERILS Encryption was also high on the agenda at the show, with 40 per cent of IT staff surveyed revealing that problems with E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

45


PARAPRO CASES.

Are employed in a wide variety of applications for organisations such as: n n n n n n

Military Manufacturing industry Fire & rescue/ emergency services Scuba & sub Aqua Photographic Police

The cases combined with our in-house foam engineering and design facility can provide solutions for all storage and protection requirements. BS EN ISO 9001: 2008 Certified

Parat UK Ltd Unit C1, Europa Trading Estate, Stoneclough Rd, Radcliffe Manchester M26 1GG, T: 01204 868630 F: 01204 868631 E: sales@paratuk.co.uk W: www.paratuk.co.uk


INFOSECURITY 2011 E encryption keys could cause severe problems with office IT systems if designated people leave their employer and for some reason do not release the encryption keys. According to Venafi, which sponsored the survey of 500 IT professionals at Infosecurity Europe, 43 per cent of managers claim to have been denied access to information because they could not find their encryption keys. A third of survey respondents said that their knowledge of and access to encryption keys means they could bring the company to a grinding halt with minimal effort – and with little to stop them. This, claimed Venafi, is due to lack of oversight and poor management of their organisation’s encryption keys. Many organisations, said the company, could find themselves in this position if the person responsible for overseeing vital information left, with no systems being in place to ensure that vital data they are working on can be retrieved. 23 per cent of survey respondents admitted they would not be able to access their encrypted data, leaving them vulnerable to data breaches and loss. The survey also found that 82 per cent of companies now use digital certificates and keys, however, 43 per cent admitted to being locked out from their own information – perhaps because people have left the

organisation, or keys are lost – and 76 per cent would use automation if they knew it existed. These same companies, said Venafi, are unaware of how to manage their keys and certificates, leaving them open to a total lock-out from their own information. Jeff Hudson, CEO, said that it is a shame that so many people have been sold encryption but not the means or knowledge to manage it. “They have found out the hard way – after being locked out from their own information – that they need an automated solution to manage the thousands of keys and certificates they have,” he said. According to Hudson, organisations have to quickly get to grips with automating key and certificate management. The keys, he explained, are crucial to safeguarding your whole enterprise. “It’s no longer rocket science,” he said. DATA BREACHES The actions – or rather, the lack of action – by the Information Commissioner’s Office was something of a hot topic at the show, with Chris McIntosh, CEO of ViaSat, launching a blistering attack on the ICO. According to McIntosh, the ICO needs to do a lot more to penalise organisations for data breaches. ViaSat’s Freedom of Information

request showed that, between 6 April 2010 – when the ICO gained the power to fine organisations for breaches of the DPA – and 22 March this year, 2,565 likely breaches were reported to the organisation. Yet according to the ICO’s own website, McIntosh said that just 36 have resulted in action from the ICO to date, with four attracting civil penalties. “The problem is that the ICO doesn’t release all the data it could do, especially when it comes to data breaches. Furthermore, the size of the fines is laughable,” said McIntosh. The ViaSat CEO added that he cannot figure out why the ICO does not impose severe fines on organisations that breach the provisions of the Data Protection Act and where a data breach is involved: “The bottom line is that if you do get reported for a breach, then you don’t tend to get prosecuted.” McIntosh also noted that, despite the ICO being able to issue penalties of up to £500,000, those given to date have not reached above £100,000 and total £310,000 so far. The solution, said McIntosh, is that the ICO needs to go after major company breaches and publicise that fact: “Not all of the time, just in blatant cases – that way the message will get out and companies who have poor security will quickly understand what might happen.” L

Information Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Who’s watching your physical security? Digital Assurance offers comprehensive and effective services Digital Assurance is a specialist information security advisory and consultancy practice based in London and Cheltenham. Our HMG security vetted staff have been providing expert security advice and consultancy to private and public sector bodies throughout the UK and further afield since 2006. A key area where we proffer assurance services is around the provision of electronic security systems for buildings, campuses and other facilities. There are numerous companies that specialise in pure IT security and a number who specialise in physical security, however, very few manage to effectively bridge the gap between these two fields. As such, systems including CCTV, access control and intrusion detection alarms are often poorly understood and often integrators and installers are the only source of knowledge, with few organisations that can say they truly understand the level of security offered by their facility security systems. Digital Assurance can offer comprehensive security assessments of building and facility security systems that dovetail perfectly into our information security and physical security assessments to provide a fullspectrum security assessment service and provide you with the whole picture rather than compartmentalised snap-shots.

Using our expertise and knowledge we can rapidly assess any electronic security system and identify flaws or weaknesses in the technology, the implementation or the operation of such systems, vulnerabilities that may provide an attacker with the ability to gain unauthorised access to facilities and/or to avoid detection. Some examples of issues we have identified recently include: • Modems attached to access control systems to allow proximity cardholder details to be synchronised between buildings have inadvertently permitted an external attacker to ‘dial-in’ to the access control systems and modify settings including disabling cards, doors and potentially bypassing perimeter security controls. • Proximity cards providing very little security by being vulnerable to extended range cloning/skimming (in excess of one

metre). This very common problem allows an attacker within range of a cardholder to copy their access card and subsequently use it to gain access to a site. A trivial attack may include placing a long range skimmer near an entrance or nearby sandwich bar. • CCTV and access control systems being connected to the internal IT network and thus exposed to network based attack by internal intruders or other parties with access (directly or indirectly) to the IT network. Get in touch to discuss any potential requirements you may have or to learn more. FOR MORE INFORMATION Digital Assurance Consulting Limited 83 Victoria Street, London SW1H 0HW Tel: 020 70609001 Fax: 020 70609005 contact@digitalassurance.com www.digitalassurance.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

47


Information Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CYBERCRIME

A GLOBAL CALAMITY Crimeware has become big business and its evolution is being driven by commercial and financial interests. M86 SWG offers immediate protection against zero day threats without the need for signature-based protection Millions of enterprises of all sizes are losing hundreds of billions of pounds a year to cybercrime and malware attacks. We are facing an epidemic on a truly global scale. The security industry is struggling to keep pace as it tries, unsuccessfully, to extend legacy database solutions to counter the problem. Crimeware has become big business and its evolution is being driven by commercial and financial interests. Profit-motivated and highly skilled crimeware writers are continuously finding new ways to mask, disguise and obfuscate their attacks. The rationale is simple – the longer their malicious code remains undetected, the more they can infect, and the higher their revenues grow. Recent attacks on a number of UK banks using Zeus v3 Trojan and revelations that a leading global financial services firm was a victim of Chinese hackers (Project Aurora), highlight how cybercriminals are targeting the global financial services industry as a lucrative source of income. THE REAL COST OF CYBERCRIME A recent report published by Detica in the UK has sparked much debate on the global scale of cybercrime. The report estimates the total cost to the UK economy from cybercrime is in excess of £27bn per annum, the vast majority of which represents losses to commerce and industry. The report warns that the true cost of cybercrime may be much higher than the £27bn estimated since cyber-attacks tend to go unreported due to lack of awareness or due to concerns about loss of reputation. In many cases, the report suggests, companies may even be completely unaware that they are the victims of industrial espionage. While many debate the actual number, a conservative view projects the worldwide cost to be at least US$100bn per annum. Economic costs of cybercrime are estimated to have grown by at least 376 per cent since 2007, a much higher rate than the estimated 41 per cent increase in IT security expenditure over the same period. Clearly organisations are not keeping pace with the problem and the government warns that they are not doing enough to protect themselves from internetrelated corporate espionage and data theft. SO WHAT IS THE PROBLEM? The primary attack vector for cybercrime and malware in general is the web. The vast majority of attacks (92 per cent) stem from innocent browsing of websites. In fact, of all infected websites, 84 per cent of them are legitimate. The web is impossible to

48

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

Profit-motivated and highly skilled crimeware writers are continuously finding new ways to mask, disguise and obfuscate their attacks. The rationale is simple – the longer their malicious code remains undetected, the more they can infect – and the higher their revenues grow. turn off; over 80 per cent of network traffic is now web traffic and it is growing with the popularity of cloud computing and web applications. The malware deployed is more dynamic and targeted than ever before and is growing exponentially year on year. The explosive growth of cybercrime is being driven by the ease with which it is perpetrated and the relative impunity compared to other forms of crime. Exploit kits are the cybercriminals “command and control” for creating, launching and monitoring their cyber-attacks. These kits are easy to acquire and easy to execute. With cybercriminals now starting to embrace cloud computing, the barrier to entry is getting lower all the time.

Trends such as evasive attacks and dynamic code obfuscation have become de facto standards for current crimeware attacks. These attacks often combine multiple propagation methods and anti-forensic techniques to significantly improve the chances of going undetected by traditional security systems. More worryingly, new targeted threats are now being seen, where the target’s IP gateway address is being hard coded into the attack so that only a user browsing from within the target to a website will receive the malware, making them invisible to all products relying on reputational technologies, which are fed from either other users’ experience or “crawlers” E


* Data for year 2011 not yet complete

E visiting the sites from different IP addresses. There is a constant stream of security updates from the popular applications that we all run – from Adobe and Internet Explorer to Java installations – as vendors seek to patch exploited vulnerabilities. These constant updates present many challenges for organisations, with regards to change control processes and standard desktop builds. In the 2nd half of 2010, M86 Security Labs observed that, of the top 15 most used vulnerabilities in cyber-attacks; all of them had previously been patched by the application vendor. This tells us that the IT industry is simply not doing a good enough job in keeping its applications up to date. WHAT IS THE IT SECURITY INDUSTRY’S RESPONSE? The advice given in the Detica report to make sure you are using a firewall, have an up-to-date AV scanner and buy insurance, is the best most of the IT security industry can offer. Firewalls are based on a 2,000 year old security premise of keeping all your valuables inside walls, moats and the like, and some industry commentators still claim that this “locked door” approach to security is as good as you can expect. However, this is at odds with the growth in corporate data that resides outside the traditional network perimeter, as is the case with cloud computing. AV scanners have been around for over 20 years and there have been many studies that show that catch rates are now below 50 per cent. Even senior executives in the security industry itself admit that the effectiveness of many security solutions is going backwards. The reality is that anti-virus and other traditional security technologies like URL filtering and reputational databases are no

longer an effective defence against web borne malware. This is only now becoming widely acknowledged in the light of cybercrime figures which are growing ten times as fast as the entire security industry’s revenue. WHAT IS THE ANSWER? Signature- and database-reliant internet security solutions are limited in preventing new types of dynamic web-borne attacks. Due to the volatility of website content and the evasive nature of modern attacks, the task of tracking or categorising malicious web content is virtually impossible. Obfuscated malicious code lurks behind innocent-looking websites, ready to infect corporate networks and systems long before a signaturebased anti-virus solution can be updated or a software patch can be installed. However, it is possible to find effective solutions. Best practise has now moved to pre-emptive technologies, rather than reactive signatures and databases. Behavioural analysis tools and vulnerability controls that assess web content in real time without reliance on signatures or updates offer a truly proactive real time approach to protection. Proactive Real-time Code Analysis identifies malicious code the first time it appears. It analyses web content in real-time, understands its intent and blocks crimeware when detected. The analysts all agree that utilising a Secure Web Gateway (SWG) as your network protection is now an imperative. However, the SWG needs to provide more than the traditional reactive security controls like AV scanning, reputation and URL filtering, all of which are built around a database that has to be updated before it can protect you. With reactive security controls you are taking the gamble that your security vendor finds

the attack before your users do. Proactive security controls that can detect completely new and targeted attacks without having seen the attack before, are vital for protection from today’s cybercrime. Technologies built around real-time code analysis, like M86 Security’s Secure Web Gateway, are leading the field in protecting against this increasing and sophisticated threat landscape. Earlier this year, M86 Security ran a benchmark test at a Fortune 5 bank in the US in a head-to-head testing against two trusted IT security solutions. The M86 Secure Web Gateway solution caught 106 malicious URLs compared to the other solutions’ four and two. Interestingly, M86 did not catch the URLs from the other two vendors because, at the time of the test, those URLs were no longer infected (legitimate sites are typically only infected for hours at a time). In a further test of a selected 10,000 URLs, the M86 Secure Web Gateway found two malicious URLs while the other two vendors did not detect any. Using these two catches per 10,000 URLs as an average, and propagating that over 100,000 users, will see 504 PCs infected every day based on two hours of daily web use. The cost to an enterprise for each major incident is estimated at $234,000 plus around $3m annually in PC re-imaging. The M86 Security Secure Web Gateway recently gained the CESG Claims Test Mark (CCTM). The aim of the CESG kite mark scheme is to make it easier for buyers in the public and private sectors to select the vendors whose products actually ‘do what they claim on the box’. Independent tests established that the M86 SWG is able to offer immediate protection against zero day threats without the need for signature-based protection, eliminating the vulnerability window introduced by waiting for patches and updates from anti-virus vendors. REAL TIME SOLUTIONS Cyber terrorism has traditionally been the poor cousin in comparison to eCrime in terms of market knowledge, information on actual attacks and preventive expenditure (due to their sensitivity). So, to the reader of this article, we would pose one final question: “What good will a cyber-defence strategy based around needing an update – which in the eCrime world is now less than 50 per cent effective – be to you should your organisation fall victim to a targeted terrorist attack using the web to gain initial access to your systems?” It’s time for proactive real-time solutions against cybercrime to be considered a business imperative. L

Information Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FOR MORE INFORMATION www.m86security.com/cyberattacks

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

49



THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TRAINING

UNDERSTANDING A TERRORIST SYSTEM

Xpect Software LLC, a specialist UK and US software company, explains how Xpect is forging ahead in working with governments across the world to help understand terrorist groupings by comprehensive analysis of Improvised Explosive Device (IED) systems The behaviour of international terrorist groupings exhibits a number of functions and processes that have goals and which participate in circular, causal chains that move from action to sensing, to comparison with desired goal, and again to action. Across the dynamics of human and system relationships within a terrorist grouping, a mass of structured and unstructured information is produced, which if found, can be collated through multiple source fusion, leading onto the exploitation of information and ultimately the conduct of proportionate action, whether in the realms of international policy or more direct and immediate ways. The IED or roadside bomb has become ubiquitously notorious in modern media

decisions. Dfuze was originally conceived as a system for use in National Bomb Data Centres. First responders such as bomb technicians, through using Mobile Dfuze, could gain a better understanding of the nature of a device, its components and identify ways to conduct render safe procedures. All information could be rapidly exchanged between the deployed personnel, mobile mission command facilities and the National Bomb Data Centre. The Centre would then be closely involved in assimilating all information gleaned from exploitation of a device and the context surrounding how the device came to be laid, through the use of bespoke databases. The results of this fusion commonly have immediate implications for technical

The IED or roadside bomb has become ubiquitously notorious in modern media as a significant weapon of the adversary. Mitigating IEDs requires a comprehensive systemic approach, with trades offs in capability and effect a constant reality. as a significant weapon of the adversary. Mitigating IEDs requires a comprehensive systemic approach, with trades offs in capability and effect a constant reality. Analysis of IED systems demonstrates that they are never in unique isolation and relationships to parallel areas of weapons smuggling, narcotics and organised crime are frequently apparent. For governments, the emphasis has to be on enabling individuals and organisations involved in the fight against terrorism to understand quicker, learn faster and adapt more rapidly and effectively than the adversary. INTELLIGENCE MANAGEMENT Xpect Software has offices in the UK, US and Australia and provides products to 22 countries, which are used by over 48 agencies and organisations. The core product is Dfuze, a multi-layered intelligence management system. The central premise is to empower individuals and organisations through technology to make better informed

understanding, biometric identification and most recently, the comprehension of individual and organisational behavioural patterns and trends. TECHNOLOGY DEVELOPMENTS Increasingly the adversary is maximising the use of commercially available technology. Likewise, Xpect has placed greater emphasis on enhancing the technology available to a first responder, with geo-location and tracking, object and facial recognition, integration of Automated Fingerprint Identification Systems and both secure and compressed data transmission capabilities now a common standard. Furthermore, customers are gaining a growing comprehension of the potential of augmented reality for practical application. Xpect Software has actively sought out suitable third party hardware and software providers to supply a series of modular intelligence management capabilities that can be blended together as a solution suitable to the specific requirements or nature of

the problem of a customer. Globalisation, mass digitisation and the democratisation of technology affords opportunities to both sides. All activities occur or are perceived to occur at a point in space (location) and time and today’s technology, with the increased presence of GPS, provides greater chances to find and collate such information. The importance of fusing this information into mature Geospatial Information Systems (GIS), which are in turn truly embedded within an intelligence management system, has now become paramount in the efforts to mitigate terrorism. THE FUTURE Xpect is working closely with academic establishments to enhance the way by which open source information of consequence can be found, with emphasis upon developing contextual taxonomies from the semantic web, whilst concurrently harvesting related imagery. The data deluge will also provide more opportunities to understand trends and patterns in terrorist’s individual and collective behaviour. For the immediate future, however, the most important factor in effective counter terrorism will continue to be the personnel employed by government organisations. This importance will bring a need to train more effectively, resulting in a significant growth in the use of simulation. In parallel, detailed analysis of the adversary’s options for direct action will become more commonplace. Xpect is proud to be at the forefront of the fight against global and national terrorism. It looks to form strategic partnerships with similar minded companies, or companies with products that can add to the multitude of capabilities available for deployment globally. L FOR MORE INFORMATION Tel: +44 (0)20 70609730 Fax: +44 (0)20 70609733 info@xpect-software.com www.xpect-software.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

51


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

BORDER MANAGEMENT

INTELLIGENCE-LED BORDER MANAGEMENT Andrew Preistley, business development director at Arinc, looks at how intelligent-led border management is fundamental to fighting terrorism “Without tools man is nothing, with tools he is all,” proclaimed Scottish historian Thomas Carlyle over 200 years ago. What he should have added was that tools alone – whatever the situation – are never enough. Their effectiveness depends on the way in which they are used. So while those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease. The truth is that even the most cutting edge border control technology needs two additional factors if it is to be really effective. The first is back-up by personnel trained to spot the nuances of human behaviour that escape electronic detection. The second is a system of international standardisation and collaboration that enables passenger information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers, and then acts on that information appropriately. So what’s the hold-up? COMMON-LANGUAGE DATA SERVICE The main stumbling block is said to be the technical problems created by the range of different data sources and formats used by various agencies. This can be easily overcome with the use of ARINC’s Electronic Borders – an end to end immigration service that combines many data sources, potentially including Advance Passenger Information System (iAPIS) and Passenger Name Records (PNR) along with other data sources, such as government watch lists. Translating messages from disparate agencies and systems, it provides a unique screening solution that enables Border Control Agencies (BCAs) to make accurate and swift decisions on every traveller whilst maintaining passenger privacy. Using ARINC’s private, highly secure AviNet global communications network, Advance Passenger Information (API) can easily be sent to the country of origin and/or destination, allowing seamless, efficient and reliable communications between airlines and BCAs. Designed to

52

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

While those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease. handle critical, sensitive information and with 99.999 per cent availability, AviNet is a proven industry standard around the world. More and more governments require airlines to provide API so they may collate electronic lists of passengers and crew in advance of travel. With any carrier that fails to supply this information being hit where it hurts – in the pocket – by a heavy perpassenger fine, Electronic Borders offers the ideal standards based solution. Configured to be as cost-effective as possible, it requires no new system development, and in many cases, even the modification of existing systems, thanks to ARINC’s recognition of the industry’s need to minimise operating costs and avoid putting additional strain on budgets that are already stretched to the limit.

The combined use of iAPIS and PNR enables security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. BCAs, law enforcement organisations and intelligence services get a valuable headstart on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects. ADDRESSING DATA SECURITY CONCERNS Understandably, data protection remains a real concern for many, particularly where API messages are transmitted by e-mail and over the internet. This is not an issue with a fullymanaged IP network like ARINC’s AviNet, E


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

E which provides a level of reliability and end-to-end security that is lacking in a public internet connection. Carriers using AviNet can be confident of fully complying with their legal obligations whilst simultaneously protecting the privacy of their passengers. The subsequent use and storage of data by the recipients, however, is not always so assured. Within the European Union there are strict regulations in addition to international guidelines on how the data may be used by law enforcement agencies. However, you don’t have to be a cynic to suspect that some countries may take a more relaxed view of the guidelines. While the vast majority of travellers pose no security risk it is essential that law enforcement and intelligence agencies are able to make best use of the information they have at their disposal. EU data protection laws mean that there are strict rules on retention of passenger information if the individual is not of interest. It is therefore important to be able to identify those who are of interest quickly and easily. Would-be terrorists often enter a country a long time before undertaking any illegal activity so the ability to track

the varying border regime requirements as well as ensuring that biometric systems integrate with existing airline and airport processes. The company’s fully-integrated Identity Management System (IdMS) offers a solution that is designed to be applicable in many critical settings and that can collect, verify, and maintain biometric and biographical information as well as supporting all phases of the identity management lifecycle. ARINC supports token-based identity verification, which uses smart cards, 2D barcodes, or other devices containing the biometric data gathered during enrolment. This data is compared with a passenger’s biometric data collected at the verification location – usually a kiosk with a nearby attendant. It also supports tokenless identification, which uses only biometric input that is compared with data on file. IMPLICATIONS OF SELF-SERVICE TRAVEL Over 80 per cent of passengers now make use of mobile devices, the internet and selfservice kiosks for a more convenient check-in away from traditional, dedicated airport workstations. Although this is a welcome time- and money-saver that alleviates

The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk. their previous movements or access their travel itinerary can be crucial. Similarly, the ability to access an audit trail of movements is vital in risk-assessing passengers and establishing whether further examination by an immigration officer is warranted. Airlines have rather different concerns regarding data collation. Those using legacy systems find government demands to extract data can entail budget-breaking costs. Worse still, the absence of standards harmonisation, compliance with the varying data requirements of different governments involves has additional time and cost implications. The use of ARINC’s Electronic Borders alleviates these costly problems. EFFICIENCY-BOOSTING BIOMETRICS API and PNR alone do not go far enough in today’s security-conscious climate to guarantee accurate passenger identification. Complementing biographical data screening and other forms of risk management, biometric technology helps prevent a range of criminal activities made possible with forged documents and stolen identities. It can also be used to confirm employee identification and permit access to sensitive airport facilities. With a long and successful track record in systems integration, ARINC recognises the need for software flexibility to accommodate

queuing and space constraints within airports, it does mean that passengers taking only hand luggage could have no interaction with the airline until they reach the gate. From a security point of view this is potentially problematic. It is vital to be able to track the arrival and progress of each passenger in the airport and this has led to an increase in demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. This PRS complements ARINC’s IdMS, which uses biographical and biometric information to help create fast lanes for preregistered passengers as well as checking employees and crew members. In addition, links to watch lists assist government agencies responsible for border control, hazardous material management and for securing other high-risk facilities. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary. The system also supports the secure transition to more common-use self-service (CUSS) applications and off-site check-in options.

SHARED INFORMATION BOOSTS SECURITY Information sharing is a crucial element in the fight against terrorism and ARINC’s MultiUser System Environment (MUSE) family of passenger and flight information systems, currently supporting over 300 airlines at more than 100 airports worldwide, allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional check-in desks, airlines can access the information they need whenever they need it. As all transactions – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced. The 21st century has witnessed a transformation in aviation security, with no let-up in the battle to stay one step ahead of terrorists and other law-breakers. Every incident – from the atrocity of 9/11 to last year’s discovery of bombs hidden inside printer toner cartridges – leads to calls for more rigorous passenger screening. This is followed by howls of protest from travellers who are increasingly exasperated by the hoops they have to jump through in order to get from A to B, as well as hand-wringing across an aviation sector that sees its costs soar and resources stretched to adopt the additional measures. The reality is though, that we already have the ability to identify and detain suspect travellers. Part of the problem is the fact that the plethora of constantly-evolving technology leading the fight against terrorism is not universally employed. Of greater concern is that the effective use of the information gathered continues to be hampered by a lack of international harmonisation of standards, failures in intelligence-sharing and, last but not least, human error. The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk. What hasn’t been agreed is precisely how this is to be achieved. That, though, is just the beginning. Those charged with border control must make proper use of all the available information at their disposal – not only that gathered by airlines and airports but also personal information available in the public domain on personal websites, blogs and on social networking sites. Intelligence-led border management means analysing and correctly interpreting this information if it is to be effective in the ongoing crusade against terrorism. For a single weak link in the security chain is all it takes to let the terrorist succeed. L FOR MORE INFORMATION www.arinc.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

53


Industrialization of Hacking

Imperva is the global leader in data security. Thousands of the world’s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent data breaches, meet compliance mandates, and manage data risk.

Hacking has become “industrialized” with a well organized infrastructure, defined roles and responsibilities, and sophisticated attack vector automation that generate large-scale attacks of unprecedented size, speed, and devastation. The industrialization of hacking coincides with a critical shift in focus. Sensitive data is the new target. Data drives businesses more today than ever. In order to protect the business, organizations need to protect the web applications and the data. This level of defense requires the next generation web application firewall. Learn more and download the following two whitepapers: www.imperva.com/go/NG-WAF White Paper: The Industrialization of Hacking This whitepaper identifies the “Industrialization of Hacking”

White Paper: Next Generation Web Application Firewalls (NG-WAF) This whitepaper explores Imperva’s vision of next generation WAFs, or NG-WAF in three interrelated sections covering: industrialized attack mitigation, interoperability and service delivery models, and risk management. It also highlights some of the capabilities currently delivered through Imperva’s SecureSphere solution.

Protecting the Data That Drives Business®

200 Brook Drive, Green Park, Reading Berkshire, RG2 6UB United Kingdom Tel: +44 0118 949 7147 © Copyright 2011, Imperva All rights reserved. Imperva, SecureSphere, and “Protecting the Data That Drives Business” are registered trademarks of Imperva.


Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ONLINE RISK

TEMPER YOUR WEB WONDER WITH VIGILANCE

What are the advantages and dangers when connected to the internet? Professor John Walker looks at some of the precautions we should consider taking as we exploit the online revolution Let us consider why we would even wish to consider connecting to the Internet, and pose another question: do we really need it? Let us then realise that we live and work in a digital age in which society has become heavily reliant on electronic systems to support both private and business lives, underpinned by the thing we call the net. We take for granted the simple creation and sending of an e-mail to a friend or colleague. We don’t give a second thought to being connected to our corporate network whilst working from home as we create

and share a business-related spreadsheet. It may be that we are creating content and posting it to our personal website or blog, straight into the eyes of the public. It may be we are using an online service to book a holiday or to buy goods. No matter the type of production, or the methodology under which the internet is being leveraged, it can prove to be of some use. But is it that important? Who actually cares? And who needs it? Well, to be honest, we do, and we have become very reliant on this invisible labyrinth of connected wires, servers, and services. And, for the

We have become very reliant on this invisible labyrinth of connected wires, servers, and services. And, for the majority, a life without the Internet would be like returning to the dark ages.

majority, a life without the Internet would be like returning to the dark ages. ONLY ONLINE Not convinced? Well, one should also remember that, in this internet-driven world, a growing number of businesses only trade via online services, so to be disconnected from the global highway would place some restrictions on our ability to procure goods and services. One should also consider the fact that a growing number of businesses recognise the advantage of internet trading, thus additional discounts may be achieved, placing a trading advantage in the hands of the buyer. And then, of course, there is the prospect of staying in on a cold, wet winter day whilst your local supermarket processes your order in readiness for a doorstep delivery. So I guess we need to yet again enquire: who needs the Internet anyway? We do! But of course, wherever such benefits and opportunities exist there will also be those who see this interconnected world as a means of exposure, exploitation, crime, or as a medium through which other diverse and miscreant activities may be conducted. In other words, E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

55


Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ONLINE RISK E this globalised, interconnected environment is a double-edged sword representing both good and bad, which could manifest in a cyber attack, compromise, or exploitation. RISKS This circumstance of potential risk promotes another question – should such potentials of attack, compromise, or inadvertent disclosure be something we should be concerned about? Well, if we care about personal and business privacy and security, then the answer should (must) be in the affirmative with a resounding ‘yes’. So, given that we may be ageing, there are potential risks when we interface with the internet; let us delve under the hood and investigate where such threats may be lurking. There has been much recent debate about the levels of cyber risk faced by users, business, and governments alike, ranging from the casual criminality of the opportunist, through to the very real cyber dangers manifesting out of state sponsored cyber attacks, through to electronic spying on both governments and commercials. Threats may be classified into distinct categories, such as the four I suggest here: • Those seeking targets for purpose of grooming or abuse, for instance, paedophiles • Persons, or groups who utilise cyber space to drive political, antisocial activities, such as hacktivists • Organised, or home grown cyber criminals seeking to profit from exploitation of selected targets • Cyber belligerents, acting as mercenaries, or state-sponsored groups. We should also remember that what all classifications of cyber threat have in common is that their miscreant crafts have been in play for many years prior to computers – it is just a matter of moving into a wider arena of modern technologies, which allows options for safer, remote white collar types of crime. CRIMEWARE A second profile associated with these groups, is the sophistication of crimeware, tools and logical opportunities that are available for leverage. However, there is no doubt that having the right tools to do the job will increase attackers’ success rates. To accomplish this, engineered applications may be sourced as COTS (criminal-offthe-shelf) ready-made, or as bespoke, one-off developments. This is nothing new as, way back in the heyday of computer viruses, such utilities were readily available in the form of virus creation kits, with which the average fledgling hacker could create his/her own vector of infection. What has changed with the advance of time is that such products are now more sophisticated and also commercially driven in the criminal sense. In fact with some operations, the criminal masterminds have even migrated their line-of-sale

56

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

operations into the cloud, to embrace the advanced options of crime-commerce. VIRUSES AND PHISHING Experience tells us the computing world has excelled in the art of ultimate acceptance of new vectors of risk. This was the case with computer viruses, and Trojans (where some anti-virus providers actually removed Trojans from their applications, as they did not meet the purist definition of a virus). Then there was the continued acceptance of spam, which was only considered a nuisance in its early days. Of course, the one fact that may be relied on is, once such risks are identified, and accepted, the commercial machines of security solution providers will kick in, albeit after the wave has arrived on the beach. The same level of risk acceptance equally applies to phishing. In its early incarnations this new quirky and imaginative threat was somewhat tolerated. Notwithstanding it demonstrated all the attributes of crimeware – it was going where the money was and targeting the susceptibility of the user endpoint. But just how exposed and vulnerable are the systems we use each day? It’s a big question. Given the reported cyber attacks and levels at which successful infiltrations occur, one could argue that exposure exists, which should not be considered acceptable. It could also be concluded that criminal entities may just be waiting for the next opportunity to exploit, maybe in the form of virtualisation or cloud – who can say? One thing is for sure, when one uses the internet, security must be a proactive partner. BEST DEFENCE So how do users and organisations defend their perimeters and assets? Whilst no single silver bullet solution exists, one might consider seven interlinked steps: 1. Notwithstanding they no longer represent the all-encompassing protection they once did, nevertheless, ensure that the anti-malware application(s) are maintained up-to-date. 2. Ensure that applications and operating systems are up to date, and fully patched against known, and reported, vulnerabilities. 3. Consider using a personal firewall, such as those that may have been supplied with the Microsoft operating system. 4. Consider subscribing to cyber-intelligence services, which may be used to identify online threats, misrepresentations or online frauds targeting brands – examples are Cyveillance, and Secunia. 5. As phishing attacks predominantly target end-users, for the business, drive to the heart of the problem by investing in a security education and awareness programme to raise the profile of risk – including for your clients. 6. Watch out for those unexpected e-mail communications delivered to your computer, tablet, or smartphone mail client – if it’s

unexpected, smells a little fishy, or simply looks too good to be true, don’t open it. 7. Don’t fall into the trap of believing your particular operating system can never be subject to compromise or incursion – attacks and malware are far reaching, so to some extent the intentions of the cyber adversaries are agnostic to the end point. It’s not rocket science, just simple solutions and practices, aligned with common sense. L FOR MORE INFORMATION www.isaca.org

About ISACA With 95,000 constituents in 160 countries, ISACA is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and ITrelated risk and compliance. Founded in 1969, the non-profit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) designations. ISACA continually updates COBIT, which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business. Professor John Walker is a member of the Security Advisory Group of ISACA’s London Chapter.

John Walker


CYBER CRIME

CYBER SECURITY REQUIRES A SECOND LINE OF DEFENCE

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

contractors, critical infrastructure industries, and centralised Security Operations Centers to protect sensitive networks in near real time. The need for a second line of cyber defence Using the Qosmos ixEngine Software Development Kit (SDK), developers can quickly and affordably build a custom barrier, based on their specific knowledge about their network environment and what constitutes normal network behavior. Applications can be built to identify threats that evade COTS products, such as the detection of ICMP, DNS and Tor tunnelling, abnormal e-mail, and malware transfer through IM files. This second line of defence gives security specialists complete control over these applications and rules based on their knowledge and experience in their environment. Any anomaly in network behavior can be detected and mitigated

The metadata provided by Qosmos enable rapid correlation and analysis of information. They not only complement data logs, but are more valuable than full packet payloads to identify traffic patterns. more valuable than full packet payloads to identify traffic patterns. Metadata require less storage than full packet capture, which means historical data can be retained for longer periods of time, improving investigative capabilities. The use of metadata enables much faster forensic searches, with the ability to search two terabytes of data in less than two minutes. The metadata can also be used to quickly index traffic flows and packet contents. In total, Qosmos Network Intelligence technology examines IP packets in real time by identifying the communications protocols used and extracting traffic information at the flow, session and application levels for rapid analysis of data relationships and communication patterns. This network and application visibility improves situational awareness and cyber defence. Where COTS products can take weeks to detect and mitigate new threats, Qosmos enables government agencies and their major

in minutes. The custom barrier based on Qosmos Network Intelligence also improves the confidentiality of cyber defence. SOURCING NETWORK INTELLIGENCE TECHNOLOGY FROM A SPECIALIST Integrating this proven technology saves time, expense and project risks compared to developing network and application visibility from scratch to feed a cyber defence solution. Moreover, Qosmos’ applications-agnostic approach to Network Intelligence is repeatable for multiple cyber security and lawful intercept solutions. The Qosmos ixEngine comes with access to the technology as well as development support and professional services to the levels chosen by customers. Qosmos is an experienced and trusted partner in working with cyber security teams and confidential processes supporting highly sensitive networks. Not even Qosmos

ce

The key advancement with Qosmos technology is the use of communication metadata that describe information extracted or computed from network data flows for more accurate protocol decoding and deep, real-time visibility into applications traffic. This technology goes beyond Deep Packet Inspection (DPI) and treats the network as a real-time, dynamic database, from which information is extracted and fed to cyber security solutions. In much the same way Business Intelligence provides context around enterprise data to improve decision making and business agility, the Qosmos-engineered traffic metadata provides the intelligence to put context around network usage and events, improving the insight and agility of cyber security teams to be effective. The metadata provided by Qosmos enable rapid correlation and analysis of information. They not only complement data logs, but are

ce

Network intelligence technology from Qosmos enables cyber security specialists to fortify defence against zero-day attacks and weaponised malware. Qosmos provides the capability to build a second line of defence to rapidly detect and mitigate advanced threats

knows the details of security solutions in which its technology is used. Support includes a dedicated, passwordprotected customer portal and regular updates to the industry’s most extensive protocol and metadata libraries. ixEngine recognises hundreds of protocols and applications including the most complex tunnelling protocols, and extracts thousands of metadata from network traffic at all layers – network to applications Layer 7. All versions of protocols and applications are decoded. Qosmos also provides on-demand development of protocol and application signatures for custom and regional protocols, and offers a software development kit for customers wanting to create their own protocol plug-ins. Resources available through the support portal include release updates, developer and reference manuals, documented APIs and tutorials, complete lists of signatures for protocols and applications and their attributes, and a customer case management interface. For anyone needing detailed, real-time network and application visibility inside cyber security solutions, there is now a new strategic option: source network intelligence and DPI technology in the form of an SDK from Qosmos. L FOR MORE INFORMATION info@qosmos.com www.qosmos.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

57


CAMBION® - THE STORY SO FAR

The Cambridge Thermionic Corporation was founded in the 1930’s in Cambridge, Massachusetts USA. The name Cambion® being derived from the first four and last three letters of that name. The company quickly established a reputation in the USA as a quality supplier of small electro-mechanical and electronic components for the military and professional electronics markets. In 1961 a parallel manufacturing facility was established in Castleton, Derbyshire, England to service an ever-expanding global market. During the 1980’s ownership changes gave rise to various name iterations such as Midland Ross, IPI Limited & Hollingsworth. In 1991 the Singaporean multi national Wearnes Corporation acquired the organisation to support its objectives for a greater Global presence. Today Wearnes Cambion Limited is a fully autonomous operation within its 40,000 square feet of manufacturing and office space.

CAMBION® - WORLD-CLASS MANUFACTURING

As the history shows Wearnes Cambion has a long and established pedigree for high performance electro-mechanical and inductive components. Wearnes Cambion is well placed in their vision to be the preferred partner in the Electronics industry offering a high level of innovation, services and support. Wearnes Cambion has a high growing customer portfolio in world class industries serving professional, automotive, military, aerospace and industrial markets. Continual investment, especially in the latest machinery and automation, has resulted in substantial manufacturing and assembly capabilities to cover a broad and comprehensive range of disciplines and technologies. Wearnes Cambion’s machining competency has the capacity to manufacture over 10 million precision components each week. Moulding capabilities of transfer moulding, injection and complex insert moulded assemblies combined with high speed stamping equipment offers solutions for most applications. Wearnes Cambion brings together extensive experience and knowledge to offer a full design and prototype service. Our Engineers are able to provide a solution to a customer’s individual requirements where standard components may not be suitable. Wearnes Cambion works closely with its associated worldwide group facilities in supporting the Electronics market with an array of services and products, ranging from precision electronic components and assemblies, PCBA, Die Casting, to full turnkey box build devices. All facilities have ISO9001 as a minimum; with most accredited ISO14001, OHSAS18001 and TS16969. In addition Cambion has been awarded several service and system distinctions from its blue chip customer base.

CAMBION® - PRODUCT PORTFOLIO

Wearnes Cambion has an extensive product catalogue containing industry recognised generic products: • • • •

Wearnes Cambion Ltd Mill Lane, Castleton, Derbyshire, S33 8WR Tel: 01433 621 555 Fax: 01433 621290 E-mail: sales@cambion.com Web: www.cambion.com Cage Code: K3105

Miniature Single Pole Sockets PCB Connector Pin Interconnects Solder Terminals Inductive Products and coils and many more.

Wearnes Cambion also manufactures hybrids of these standard products to suit customer specific applications. Wearnes Cambion can also offer RF Connectors, utilising its turning competency and specialising in the manufacture of custom variants of industry standards, such as N types, 7/16, SMA. SMB, MCX and many more incorporating blind mates and quick termination, all with minimal outlay. Furthermore Wearnes Cambion has project managed and developed inductive and connective solutions specific to customer programs, working closely with the customer from the early stage of concept designs.

FOR FURTHER DETAILS VISIT WWW.CAMBION.COM, EMAIL SALES@CAMBION.COM OR CALL 01433621555.


DATA SECURITY

DATA PROTECTION AND CYBER SECURITY

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Becrypt’s range of data security solutions helps the UK defence sector tackle its cybersecurity challenges Data security has never been more critical for the defence sector, as the UK Government strives to meet the increasing need for flexible off site working both to increase productivity and as part of its building rationalisation programme. Mobile working has brought more responsibility to ensure the security of devices and protection of data throughout the government organisation, whether this flexibility involves taking data home on a CD or USB stick, or using a laptop remotely from home, another office or even a public place, presenting heightened cyber security issues. ENSURING SECURITY FOR DATA For some years now Becrypt’s encryption solutions have supported the government’s need to enable mobile working, providing proven and verified protection of classified

on any removable device with a zero footprint, allowing a recipient to access protected data without needing to install software. The data can be very quickly encrypted and saved to removable media or attached to e-mail, and shared with a recipient with no further need for Becrypt software to be installed on the recipient’s computer. Password protection is built into the software that ensures that access to the data is authorised. FULL DISK ENCRYPTION Ensuring that laptops and devices are appropriately protected can also be addressed by installing encryption solutions prior to issuing them. Becrypt’s DISK Protect provides a full disk encryption software solution that happens transparently with no impact on performance. Unauthorised access is prevented by strong user authentication.

Mobile working has brought more responsibility to ensure the security of devices and protection of data throughout the government organisation, whether this flexibility involves taking data home on a CD or USB stick, or using a laptop remotely from home, another office or even a public place, presenting heightened cyber security issues. data both inside and outside of official buildings. In 2008 Becrypt was the key supplier to provide an encryption solution that protected data to Restricted level, deployed across 20,000 MOD laptops used by the British Army, Royal Navy and RAF. However, today’s challenges also involve the protection of data on removable devices, including CDs and USB sticks. Lightweight, portable and easily lost, securing data on such items must now meet strict government guidelines. The policy document (DIAN 15) sets out the necessary steps that must be followed to protect portable technology and communications devices that support remote working, including the use of CESG approved encryption solutions. Becrypt’s Media Client meets these guidelines by offering a simple and easy way of protecting data in transit, up to the Restricted level required for the MOD. It resides

Even if the equipment is disposed of, and specialist recovery tools are used to recover the data, full disk encryption insures data remains safe. Both versions of DISK Protect (Baseline CESG CAPS approved to CONFIDENTIAL Impact Level 4, DISK Protect Enhanced: CESG CAPS approved to Enhanced grade) now support Microsoft Windows 7. The management of the equipment estate is an important part of ensuring secure use. Using Becrypt’s Enterprise Manager solution an IT security team can manage and monitor what is happening centrally. The team can deploy products quickly and easily without the need for administrators to visit each machine, or requiring the end-user to perform any tasks. They can also ‘remote kill’ any device if it is believed to be compromised. It helps to enforce a security policy and can also help to demonstrate compliance through auditing and reporting. The solution

enables more control over usage – an alarm system can flag when someone is trying to copy protected data, or connect a non-secure device, such as an IPAD to a laptop. Repeated tries to copy data may result in access being denied until the potential security breach is investigated. THE FUTURE WITH SECURE WI-FI While encryption solutions can protect data and devices, there is one area that still poses a risk to flexible working – the use of public internet access points (hotels, conference centres and Wi-Fi hotspots). The use of these access points by mobile workers are on the increase, yet the challenge for government is that none meet the policy and security restrictions for IL3 data for remote access connections. While connected to a wireless network, a computer is vulnerable to attack from connection to a local proxy server before connecting to the VPN. There may be a malicious application resident on the network or a maliciously designed proxy server – both may attack the connecting machine immediately or become resident for later attack. Becrypt is already working on a solution to address this area. It is focusing on providing an application that registers the device being used when connecting to the VPN. Based on its proven Trusted Client product, the solution provides a robust platform to enable secure, remote access for thin client devices over public networks. L FOR MORE INFORMATION For more information about how Becrypt can help MOD and defence contractors secure data both on site and while mobile, please call 0845 8382050 and speak to Rod White or e-mail: marketing@ becrypt.com or visit: www.becrypt.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

59



INFORMATION MANAGEMENT

THE HIDDEN AFTERSHOCK

Crisis Communications

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Lyndon Bird of the Business Continuity Institute looks at ways to respond to a major incidence and explains what benefits training in crisis management techniques can bring to your organisation It has long been treated as almost axiomatic that following any serious incident that threatens life the most critical time is the first hour – in fact this has been coined by many as the “the golden hour”. Certainly for physical disasters, failure to properly notify key people and communicate accurate messages to service providers not only loses time and money – it can cost lives as well. Many would argue that this applies equally well to incidents that may not so obviously put lives at risk. In the event of a cyber attack, the volume of data and number of transactions that could be compromised in seconds probably means we should be talking about “the golden minute”. If we look at some high profile incidents of the past year, excluding natural disasters, you could argue that these are terrorist related. The Gulf of Mexico Deepwater Horizon disaster caused loss of life, massive environmental destruction and enormous damage both financially and to reputation to the company involved. The failure of Toyota to respond adequately to product safety concerns, particularly in the US damaged the world’s largest car maker financially and probably blackened its reputation for many years. Very recently, the failure of the Sony Corporation to protect client sensitive data has proved extremely costly and embarrassing for a company that prides itself on quality, competence and high standards. PAYING THE PRICE Such examples and many others that occur every day of the year demonstrate the high price that organisations face when things go wrong. Usually they go wrong through management failures or unfortunate circumstances, no-one is trying to make the systems and safeguards fail – they just inevitably do. Compare this with what could actually happen if there was deliberate intent to create mayhem or destruction. This could be to either physical facilities or virtual facilities through cyber attack. Recently I was speaking to Chris Phillips, head of the National Counter Terrorism Security Office, and he expressed the view that if you can manage through a terrorist attack, you can probably deal with almost any other threat or hazard. I think he has a good point, although natural catastrophes such as the one witnessed in Japan set the bar much higher than the consequences of any feasible act of terror. MANAGING INFORMATION One trend I think is of particular concern. The phrase “perception is the new reality” is often banded about with the implication

Most serious physical incidents show lack of proper communication and a failure of those in control to gain access to accurate information. that if only BP, Toyota, Sony, Rolls Royce, Amazon and others affected by serious incidents just managed the media better all would be well. Actually it wouldn’t; oil workers would still be dead, cars would still be unsafe, millions of people would still be at risk of identify fraud, aircraft engines would still need to be modified. The reality is that when an incident occurs, immediate decisions have to be taken. These decisions often cannot wait but the person responsible for making them lacks the level of accurate information really needed to make them in an informed manner. In the panic and chaos following a successful (or even failed) terrorist attack, confusing and misleading information abounds. Most serious physical incidents show lack of proper communication and a failure of those in control to gain access to accurate or useful information. This is partly because in the early stages it is difficult to find out definitive information

about what has happened and why. If we take an incident such as the London bombings, initial indications suggested there was a network failure caused by a power surge. It took considerable time before what had happened was understood and communicated to those who had the duty to respond. Let us assume that in many situations it is not clear to people in the vicinity of an incident what the cause is. However, the instinct of most people is to respond directly to the outcome, not think about the cause. During the Glasgow Airport terrorist attack, the initial indication of a problem was someone seeing some smoke and in accordance with procedure triggered the fire alarm. Normally this would lead to evacuation but in the case of this incident that would have been the worst possible course of action. Thousands of people might have been evacuated into an area where a massive car bomb might have exploded. E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

61


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Choosing the right CEM at the prototyping stage is critical, which is where C-Tech Electronics can help It is not always appropriate to outsource your prototyping to a CEM (Contract Electronics Manufacturer) but where it is possible a good CEM can provide valuable manufacturing support, reduce overall costs, increase quality control and stimulate growth without committing to heavy investment. Recognising the ever growing demand for high quality prototyping, C-Tech Electronics has recently expanded its service offering to include a rapid prototyping service. Having invested over £350k in new equipment and training, C-Tech began to offer the new service to existing customers earlier this year. Following the success of this they are now talking to prospective new customers about taking advantage of the service. C-Tech has over 30 year’s of contract manufacturing experience and has built up an enviable reputation for providing incredibly high levels of support when taking on new projects. This approach lends itself particularly well to prototyping, as a high degree of flexibility is required at such a critical stage in the life cycle of a new product. Our customers want flexibility and a prototype service enables them to work with us from the very early stages of a project, right through to production, which not only provides them with the flexibility they want but speed and continuity as well, says Mike Crowley,

commercial director of C-Tech Electronics. A recent project involved a request from a customer who wanted a ten off PCBa with BGA and FPGA placement, on a five-day turnaround. Due to the time critical nature of the project the customer opted to free issue the BGA/FPGA. C-Tech were happy to work on this basis but still assisted the customer by securing a line of component supply for the BGA through their own network of suppliers, which saved the customer £500 on the over all build cost. C-Tech subsequently processed the build in the agreed five days and the same customer has since placed three

similar prototype projects on the same basis. When looking for a prototype partner, Mike’s advises:“Make sure that they have a very clear idea of what it is you want to achieve, and look around at other suppliers offering similar services. This will ensure you ultimately choose the supplier with the flexibility you need.” FOR MORE INFORMATION If you would like to know more about C-Tech Electronics visit our website www.c-techelectronics.co.uk or call our sales team on 01903 524600.

High Quality Rapid Prototype Services • Full Turnkey (Box Build) • Material Management (Procurement & Free Issue) • Surface Mount Assembly (including BGA) • Conventional Assembly • Conformal Coating • Testing

C-Tech Electronics Limited, Technology Centre, Easting Close, Worthing, West Sussex, BN14 8HQ e:sales@c-techelectronics.co.uk – t: 01903 524600

62

COUNTER TERROR BUSINESS MAGAZINE | Volume 6


INFORMATION MANAGEMENT

During the Glasgow Airport terrorist attack, the initial indication of a problem was someone seeing some smoke and in accordance with procedure triggered the fire alarm. Normally this would lead to evacuation but in the case of this incident that would have been the worst possible course of action. Thousands of people might have been evacuated into an area where a massive car bomb might have exploded. E Evacuation would have been the worst possible decision in that particular case but how does an individual know that? The person designated as responsible for the Initial Incident Response does not have time to assess the situation, decide the best tactical response and communicate that decision to vast numbers of staff and customers. By the time that process is complete, thousands of individuals would have made their own personal decisions. Certainly after 9/11, many who survived were those who ignored corporate instructions to stay in the building and took decisions into their own hands. CHALLENGING ASSUMPTIONS The trouble with many Business Continuity Plans is that they have build-in (although not always stated) assumptions about the level and type of disaster that might occur. Terrorist attacks challenge those assumptions because they create outcomes which are outside of the experience of those caught up in them. So how could this situation be improved? Firstly, I believe in better quality executive thinking. The CEO of one leading retailer called his senior management team together and told them to come up with scenarios that were “our equivalent of Deepwater Horizon”. What could happen to a retailer that could cause such corporate shock; would it be a range of food that killed customers, would it be a corporate scandal, would it be a media exposure of child slavery by one of its suppliers – or would it be something that no-one had even considered before? Scenario planning and horizon scanning have roles to play in helping companies focus on their real exposures. Secondly, recognise the need to provide clear, consistent and rapid information to those mobilised to deal with the aftermath of an attack. Manual call trees and cascade systems can work but are labour intensive and take people away from more important duties. The use of automated computerised telephony has become increasingly popular in supporting Incident Management Plans. TAILORED SYSTEMS In general, these systems consist of preprogrammed instruction sets so that against

individual scenarios telephone numbers can be automatically dialled, customised messages given and responses monitored by use of the telephone keypad. Some products link a fairly simple auto-dial facility to a list of disaster recovery vendors – to speed up the acquisition of a locksmith, glazier or the like. Others are much more sophisticated and can be tailored to provide call-out scenarios in a wide range of situations. Usually such products are a combination of hardware, software and telephone network services. Because they are so time critical, users will normally have dedicated equipment to support such products. The key things to look for in these systems are: • speed of notification achieved • confirmation and feedback of the message delivery service • flexibility in type of technology supported • ability to modify scenario and call-out lists easily • ability to activate the call out process remotely. A fully hosted route is the most effective approach, with the end-user simply having to activate the service via a security code at the time of an incident. DECISION-MAKING The most information element of success is, however, to ensure that data is readily available and can be shared so that decisions can be made with necessary input from key stakeholders. Traditionally this has been a weakness of many plans in the sense that formal structures such as Gold, Silver and Bronze require a level of formality. This certainly improves ongoing management of an incident but slows up the immediate response. Centralised Command Centres (or Emergency Operations Centres) require set up, commissioning and the capability of key players to actually get there. Physical battle boxes stored off-site are excellent for practical items like hard hats but are not ideal for things that can be stored digitally (maps, diagrams, plans, contracts, procedures). Recently there has been a move to virtual command centers and virtual battle boxes, which are now very feasible given the myriad of internet services available, including virtual

meetings, chat rooms, video conferencing and social networking. There is also a range of expert software products designed to support this faster response approach. Such products are designed to give full management control of all the information resources and communications needed immediately following an incident. They also allow virtual command centres to be set up, thus saving time and travel. In such products all essential data can be made available via secured internet access to all members of an Incident Management Team, public and private chat room facilities can be utilised, virtual battle boxes of charts, maps, contracts etc can be accessed and recovery status monitored and made available for later analysis and audit. These tools can be very powerful but they do require some rethinking about the conventional views of how a crisis or incident should be managed.

Crisis Communications

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INTEGRATED SOFTWARE The following features are essential if this type of software is to be fully integrated into an organisational incident management response plan: • Plan invocation by multiple means of communication • Immediate access to vital documents via a Virtual Battle Box feature to ensure decisions based upon same data • Remote access to digitalised photographs, maps and video clips • Team orientated secured Instant Messaging Channels • Integrated e-mail and SMS messaging capability • Company defined Incident Escalation with pre-programmed automated notification based upon trigger points • Task Allocation and Monitoring with built in task libraries • Real team information sharing and access to external news sources/feeds • Dashboards and traffic light system monitoring of key systems and recovery progression. However, as with all decisions about supporting tools, the justification should not be whether the software has every conceivable feature but rather whether it will fit with your culture, meet your business objectives and is provided by suppliers who understand how a crisis enfolds and has to be managed. So in conclusion, getting a positive spin on your response is vital but it is far from all you have to do to deal with a major threat such as terrorism. In fact, if people are properly trained and exercised in crisis management techniques, with sophisticated response tools in place, the likelihood of finding the media against you is much reduced. L FOR MORE INFORMATION bci@thebci.org www.thebci.org

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

63


Tempest shelter Personnel security Deployable screening Seizure vaults For further information contact: HITEK Electronic Materials Ltd 15 Wentworth Road, South Park Industrial Estate, Scunthorpe, North Lincolnshire, DN17 2AX Tel. +44 (0)1724 851678 Fax. +44 (0)1724 280586 Email. sales@hitek-ltd.co.uk www.hitek-ltd.co.uk


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURE COMMUNICATIONS

DEPLOYING SECURE COMMUNICATIONS Being able to communicate without fear of eavesdropping is essential in today’s climate of cyber threats Imagine, if you will, a covert surveillance team deep behind enemy lines, monitoring movements of potential targets, unwittingly broadcasting their location and identity because a piece of equipment had been left switched on and is desperately trying to find a base station, switching its mode to high power, and scanning for a response. Or consider a politician, travelling in a foreign country, anxious to feed back information and intelligence but unsure of how secure the phone system is. Or a large tactical armoured command vehicle that must be checked out in theatre to ensure there are no rogue emissions. All of these scenarios have an easy solution with the use of deployable Tempest tactical shelters, or by the use of shielded vaults or bags which can give over 65dB of shielding up to and beyond 10GHz. PROTECTION FROM DETECTION With the advent of smartphones and tablets, it is becoming more difficult to protect these devices from detection and tracking. As these devices can be “always on” they can transmit their location and identity whenever they come in to range of a searching network. Unbeknown to the user, the device can “handshake” with a network, giving up critical data, especially if an app such as Google Latitudes is enabled. It is possible to do a quick search for enabled Bluetooth devices, and it should be noted that a laptop with Bluetooth enabled, but with the lid closed, is still able to give out its identification and ultimately its location, allowing a car thief to know which vehicle to break into. SHELTERS Being able to communicate without fear of eavesdropping is essential in today’s climate of cyber threat. When you have a need to travel, and to communicate securely, you need access to highly mobile, shielded, secure deployable shelters that can be inserted rapidly, allowing quick secure communication protocols to be established. Shelters are available in a range of performances, giving shielding levels from 10KHz to 10GHz+, depending on the construction. For shelters working below 30MHz a third layer of fabric is required, which includes a knitted layer of stainless steel wire which copes with H field emissions. Protecting sensitive equipment in transit and securing evidence where portable electronic

devices are involved, can be made easier with the use of Seizure Vaults, and shielded computer and tablet bags. Able to block all Bluetooth signals and everything up to 4G, these bags ensure that all data is protected, and that tracking devices can be blocked from locating sensitive devices and corrupting them. When used in conjunction with a deployable shielded shelter, it is possible to scan personnel in a sterile environment ensuring unintended radiation is detected and resolved before insertion into a hazardous location. TEMPEST TACTICAL SHELTERS Deployable Tempest tactical shelters, with their attendant crypto facilities can also ensure that all electronic communications coming out of the shelter are fully encrypted, and therefore, secure. It is possible to use Radar Absorbing Materials (RAM) to reduce the radar cross section (rcs) of vehicles, ships, UAVs and structures so as to reduce the possibility of detection by low cost commercial radars. RAM can be supplied that will negate the effects of radars operating from L Band up to K Band and these can be supplied installed on panels, fully weatherproofed, able to be quickly and easily mounted, and able to resist all climates for up to eight years. Using these RAM Materials it is possible to defeat microwave “attacks” on communications systems by attempts to overload them where the RAM simply absorbs all incoming energy in a particular band. The basic design of electronic equipment that will carry secure data is critical. With the ElectroMagnetic Compatibility (EMC) and Electro Magnetic Interference (EMI) it is important to carefully select the conductive gaskets that will bond the connectors, windows and lids and doors to form a complete Faraday cage, ensuring high levels of shielding and screening. TEMPEST SCREENING Tempest screening as described on the BBC website in an article (www.bbc.co.uk/ dna/h2g2/A4075463) lists the issues and problems that exist in ensuring that classified data remains so. Only materials that are manufactured to a recognised Mil Standard such as Mil-DTL 83528 and produced by a company listed on the relevant Qualified Products List (QPL) should be used in the

design and manufacture. These materials, when properly designed in, should give a life in excess of 15 years in service. L FOR MORE INFORMATION Details of the products and materials in this article are available from John Terry, managing director, HITEK Electronic Materials Ltd, jterry@hitek-ltd.co.uk

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

65


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Concertainer® units – providing protection for personnel, vehicles, equipment and facilities Based in the United Kingdom, HESCO Bastion Ltd has been manufacturing Concertainer® units since 1990. Manufactured to ISO International Standards, the Concertainer unit has been acknowledged as the most significant development in field fortification since the Second World War. Today, they are a key component in military hardware and a benchmark in force protection throughout the world. Available in a variety of different sizes and delivery systems, each unit has been developed to provide the optimum solution for a wide range of protective and structural requirements. In order to maintain the integrity of its product design, HESCO works closely with many of the world’s leading testing authorities. In addition to the standard Concertainer unit, HESCO continues to enlarge its market presence by developing products protection characteristics. A wide range in response to customer requirements. of sizes offers the optimum solution Concertainer units are the benchmark in force for any protection requirement. protection for many military organisations HESCO has also developed a portfolio including the US Army, USMC, USAF, NATO and of products in direct response to customer the United Nations. They have been used for requirements: RAID® is a delivery system protection in many countries around the world that reduces the logistic burden of moving including Afghanistan, Iraq, Bosnia, Kosovo, large quantities of barriers into theatre; Yemen, Sri Lanka, Jordan, UAE and Turkey. the HESCO Accommodation Bunker (HAB), The Concertainer® Mil® range of currently provides protected accommodation units from HESCO provides rapid and in bases throughout Afghanistan; and HESCO Ad CTB May 2011.qxd:Layout 1 3/5/11 16:37 Page 1 efficient fortification with dependable the HESCO Redeployable Security Fence

(HRSF), is a rapidly erected and high level security fence, with no requirement for ground preparation or foundations. FOR MORE INFORMATION Contact: Jonathan Bird, Operations Address: Knowsthorpe Way, Cross Green Industrial Estate, Leeds LS9 0SW Tel: +44 (0)113 2486633 Fax: +44 (0)113 2483501 info@hesco.com www.hesco.com

Simple, fast & redeployable security fencing from HESCO The HRSF (The Hesco Redeployable Security Fence), is a rapidly erected and redeployable high level security fence, with no requirement for ground preparation or foundations. Rated to PAS68, HRSF can be built on almost any unprepared surface. Heights of up to 3.6m with anti-climb face are available. For more information go to: hesco.com

66

COUNTER TERROR BUSINESS MAGAZINE | Volume 6


INTRUDER DETECTION

FOCUSING ON PERIMETER PROTECTION TO COMBAT THE TERRORIST THREAT

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

James Kelly, CEO of the British Security Industry Association, looks at the complex challenges faced by those who secure perimeters and assesses some of the dynamic measures now available Given the continued heightened threat level in place in the UK, the ability to effectively secure the perimeter of a diverse range of vulnerable sites, as a first line of defence against potential terrorist attack, is undoubtedly a key concern for government agencies, the police and security managers on the ground. Whether the location in question is a transport hub – such as an airport or port – or another element of the critical national infrastructure, from power stations to oil terminals, it is imperative that integrated and robust security measures are in place. The modus operandi of terrorists is constantly evolving, as is their willingness to consider extreme measures, which could even involve chemical and radiological attacks. The reality is that terrorists will look to exploit any perceived vulnerability to their advantage, so constant vigilance remains a necessity. PRACTICAL CHALLENGES Significantly, many of the locations in question cover large geographical areas and, as a direct consequence, have extensive perimeters that need to be monitored around the clock. This should be part of an effective security strategy that seamlessly combines various systems and technologies so potential threats can be addressed in a timely manner. There is also the challenge, for those who have to manage perimeter security, that some of the most vulnerable locations also have a high throughput of individuals who should legitimately be there – for instance passengers at an airport. Consequently, a key consideration here is achieving an appropriate balance that ensures round-the-clock security of clearly defined areas of a site, where only authorised personnel should have access. This needs to be done without infringing too negatively on visitors and staff, helping to maintain wider public support, which is critical to effective counter terrorism operations. Looking more closely at the type of security measures that can be put in place to meet the need for the continued vigilance of site perimeters, there have undoubtedly been major developments in the ability to create a layered integrated defence strategy. Effective perimeter security can therefore E

For those who have to manage perimeter security, it’s a challenge that some of the most vulnerable locations also have a high throughput of individuals who should legitimately be there – for instance passengers at an airport. Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

67


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INTRUDER DETECTION E be achieved by combining technology – which can be deployed and managed to provide an early warning of suspicious activity – with physical security measures and manned guarding capabilities. AN EYE ON SECURITY Undoubtedly, CCTV has a major role to play in keeping a watchful eye on critical perimeter areas as a deterrent and an active measure for early intervention. In recent times we have seen a growth in the take-up of HD (high definition) CCTV which, when in place, offers the potential to deliver a much greater level of detail of high risk areas, compared to conventional solutions, for example at site entrances and exits. This greater clarity is invaluable when CCTV operators need to be able to distinguish between normal and suspicious activity, in a timely fashion, and allows them to pass on more detailed information to the authorities should police and other intervention be required. VIDEO ANALYSIS In addition, many sites are now opting to deploy intelligent, proactive, CCTV measures such as VCA (video content analysis) – as evidenced by BSIA research conducted last year – otherwise know as video analytics.

A key advantage with this approach is the ability to automatically analyse CCTV images, using powerful algorithms, against specific parameters to produce meaningful information about the content. This is invaluable when CCTV operators are faced with footage from hundreds of cameras.

of VCA include the identification of items that have been abandoned or removed, known as Object Left and Object Removed. CCTV based ANPR (automatic number plate recognition) is also a useful perimeter protection and access control measure, ultimately ensuring that it is only authorised

With the extent of the security assets that can be readily implemented to keep sites safe and secure from terrorism, it is vital that as much attention is paid to ensuring that the right management systems are in place – such as a Graphical User Interface (GUI) in a control room with associated site plans – to deliver an effective situational overview of the information provided. An example of VCA in practice would be the setting up of a virtual tripwire at a site perimeter either as a measure where it is not possible to have a physical barrier or as an additional security layer. This basically creates a virtual line which, if someone crosses, will result in an alert being triggered. Other types

Zaun_CTB 148x420 Ad June_Layout 1 04/05/2011 14:45 Page 1

vehicles that can enter a location. To secure access to high risk buildings and other areas of a site – including entrances and exits – ‘smart’ technologies are being implemented. These measures range from access control cards using radio frequency identification (RFID) chips to allow the proximity reading E

Security fencing systems

Zaun is a supplier of government tested and approved, integrated high security fencing systems. Contact us for a technical design and specification service or a FREE brochure.


E of card details, to biometric-based systems with fingerprint readers and iris scanners. TAKING A REMOTE VIEW Remotely monitored, detector-activated CCTV, which complies with the revised BS8418 standard, is finding favour to keep a watchful eye on sites out of hours, by linking in CCTV cameras and detectors, strategically positioned on the perimeter, to an RVRC (remote video response centre). In this set-up, should someone attempt to scale a fence they will be picked up by a detector and images from an associated CCTV camera will be sent to an operator at the RVRC. The operator could potentially issue a verbal warning through on-site speakers to stop the intruder in their tracks – this tends to be a sufficient deterrent in over 90 per cent of cases. However, when considering potential terrorist involvement, it may be more advisable to take another tack and avoid letting the individual know that they have been detected. Instead, operators can covertly direct the authorities to the scene where they can take the appropriate measures to deal with the suspect. ENHANCED DETECTION TECHNOLOGIES For enhanced surveillance some sites are now deploying infrared thermal imaging

cameras, which can offer the potential for longer range detection of potential intruders. Where perimeters are extensive at sites such as ports or airports, which are prime terrorist targets, additional measures such as fence detection systems, UGS (unattended ground sensors) and even radar may form part of the security strategy. Mobile assets are extremely flexible for perimeter security as practically they can be deployed to specific areas of vulnerability. This could be where points are not fully covered by the static infrastructure – for instance if refurbishment works are underway – or to provide another layer of security, whether it be mobile in-vehicle CCTV or manned patrols by security officers, or dog handlers. There is little doubt that high visibility security patrols are able to provide a real deterrent, particularly when security personnel randomise their patrol routes to keep one step ahead of would-be attackers. They are also fundamental when it comes to responding to intruders and helping to ensure the safety of staff and members of the public who may be on-site during an incident. With the extent of the security assets that can be readily implemented to keep sites safe and secure from terrorism, it is vital that as much attention is paid to ensuring that the

About BSIA

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The British Security Industry Association (BSIA) is the professional trade association of the UK security industry. Its members produce over 70 per cent of the country’s security products and services to strict quality standards.

right management systems are in place – such as a Graphical User Interface (GUI) in a control room with associated site plans – to deliver an effective situational overview of the information being provided by the CCTV, access control and other measures, so informed and timely action can be taken. L FOR MORE INFORMATION Tel: 0845 3893889 www.bsia.co.uk

that set new boundaries.

Tel: 01902 796699 security@zaun.co.uk www.zaun.co.uk


Designing Simple Solutions to Complex Problems innovation consultants

Delivering practical solutions There are few organisations that can offer our unique combination of electronics expertise, industrial design and regulatory experience, all under one roof. This means that we deliver solutions to some of the most technologically challenging security problems. We partner with our customers to ensure reliability and design quality from concept right through to approvals and production. Whether it is the improvement of an existing product or the development of a new device we have the necessary expertise to fulfil your needs.

Design and Development includes: • Technology Research & Analysis • Due diligence and IP creation • Engineering Electronic and Software development • Industrial Design & Mechanical innovation • UI and full user based expertise • Development and pre-production Prototyping • In house Electronic production • Complete documentation for Approvals • Management of manufacture, assembly and testing • Regulatory advice and Liaison Meet us at DSEi, London Excel Centre, 13-16 Sept 2011

Triteq Ltd 3 The Courtyard Stype Hungerford Berkshire RG17 0RE UK t +44 (0)1488 684554 f +44 (0)1488 685335 info@triteq.com


Designing a Secure Future Triteq’s technology and product development expertise has brought many innovative and successful designs to the market over the last 19 years. With a creative team of electronic, software and industrial designers, supported by prototype manufacturing and test services, the business has excellent resources to develop new products. Triteq works in partnership with customers to ensure that requirements are met throughout a project; seamlessly resolving design challenges, managing regulatory approvals and transition to production. Triteq’s Commercial Director, Steve Lane, talks about some of the products that Triteq has developed using the latest security technologies.

Passenger Air Security

packed in reliable communications control for mobile and satellite tracking, combined with excellent battery life, while minimising the size and weight of the device. It was also important that the device was ergonomically designed for maximum user comfort. As well as human tracking, Triteq has developed a unique dog tracking collar which used technology that was compatible with hand-held electronic devices, so that owners could benefit from live and interactive tracking. Triteq used a three-layer technology solution: GPRS and GSM text messaging, as well as radio frequency tracking, making it possible to locate a dog virtually anywhere. The product was waterproofed to IP67 and ergonomically designed for shape and size so that it would lock in position on top of the dog’s neck for optimal signal. A theft-deterrent feature was also included which meant that any attempt to cut or force the lock would transmit a location alert. In both of these tracking projects, Triteq used smart programming to enable the device to conserve as much energy as possible when in a safe location, but once it went beyond its perimeter the power increased accordingly. This made a battery life of several weeks possible, compared to only a few days.

Secure Communications & Personal Safety Air traffic across Europe is at an all time high and consequently, the aviation industry is running short of radio spectrum for communications. Onboard security has also presented a new challenge to airlines. To help find a solution to this, the European Commission and Eurocontrol began exploring 3G as a potential solution for Air Traffic Management (ATM) security and approached Triteq to find a solution. Triteq designed a system which aimed to develop a high capacity air-ground downlink to support the transmission of encrypted voice, flight data and onboard video. This data could be transmitted from the cockpit of an aircraft during a security alert. Triteq’s system overcame the many technological challenges that exist when transmitting data from a high speed plane to ground stations. A prototype system was developed by the project and has been successfully tested by Eurocontrol, both on the ground and in the air with ground to air communication achieving high-speed live data and video transmission.

Tracking Technologies

Triteq has developed several high-tech tracking products. It designed a highly successful offender tagging system in the form of a strap-on tag, which used GPS technology to follow the location of offenders. The challenge was to design a product that

Discretion is often a key feature of high-tech security products. When developing lone-worker safety solutions for a client, Triteq was tasked with designing a device that had the look and feel of a normal identity (ID) cardholder, but with full tracking capabilities. The ID cardholder format meant it was always within immediate reach and could be discreetly activated. Triteq’s technology ensured an open voice call, capturing any verbal abuse, as well as identifying potential issues of physical abuse. Other unique features enabled the worker to check their ability to raise an alarm before entering a potentially hazardous situation, plus the ability to set a timer

mechanism where failure to respond to the timer would initiate an alert. An intelligent lanyard ‘rip alarm’ also ensured that the device would signal an alert if it was forcibly removed from the wearer.

Discreet Solutions for high risk environments

Another product that demanded a discreet appearance was a portable docking station for a hand held satellite phone. Triteq was required to design a device that looked like a low-tech walkie talkie, as it was to be used by people operating in high risk areas such as war zones. Making use of the satellite phones ability to connect anywhere in the world, it was possible to add additional technology in the dock which would automate reporting of the users location. The system featured a small key fob, which could be used to relay position and activate an emergency call if the user was within range. In addition, if the phone and key fob became separated, it could automatically initiate an emergency call. The device provided a market-leading level of performance, accuracy, portability and features. Triteq is unique in offering such a high level of electronic and technological expertise in combination with industrial design and regulatory support. It specialises in providing solutions to the most complex problems, from concept to production and beyond. Its engineering output to BS:8888 and close relationships with manufacturing sources ensures that high standards are maintained throughout. The company has been successful in developing products across a number of industry sectors and has established long standing relationships with its clients to provide continuity and a technical resource for the future. For further information Please call: +44 (0)1488 684554, email: info@triteq.com or visit our website at: www.triteq.com.


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Axis Electronics – the specialists in providing unique electronic manufacturing services Originally part of a leading international electronics company, Axis Electronics was formed in 1995 as an independent UK based contract electronic manufacturing services provider with a unique combination of service and technological capabilities. The company specialises in providing Electronic Manufacturing Services including design, microelectronics, contract electronic manufacture and test of high technology, high mix, low to medium volume, complex, high reliability products where quality and on time delivery is most important. All manufacturing is carried out by the 150 highly trained staff based in Bedford, England. Modern technological demands mean smaller packaging requirements and custom board designs. Axis Electronics advanced microassembly facility offers an ISO7, class 10,000 cleanroom for bare die attach, wire bonding and skilled integration processes for RF and microwave frequency products. The area is manned with a skilled and experienced team with many successful projects completed. Axis Electronics has a range of skills and capabilities in supporting design, from developing concepts right through to completing design assurance tests. Typically designs are completed using ‘Altium Designer’ which provides a comprehensive solution for the entire design process.

The company provides a complete test solution, from formulating a customer’s test strategy during NPI phase, through to developing the most appropriate and cost effective working test system. If it is a PCB assembly test or a full suite of tests, including a system test and end of line product configuration, Axis Electronics has a team of

engineers that have the skills and experience to design and implement the best solution. With over 15 years of experience managing supply chain dynamics, Axis Electronics has the processes and, most importantly, the people to deliver excellence in managing today’s complex and diverse supply chains. The company’s experienced and professional team of people offer a dedicated materials management and supply chain service for each customer enabling Axis to become experts in your business needs and drive its supply chain to deliver services to ensure demanding requirements are met. Axis Electronics’ objective is to establish a long term business partnership where it is an extension of the customers facility, a dedicated, manufacturing excellence resource that allows customers to develop world beating product concepts and take them to market. Quality systems are aligned to the needs of aerospace, defence and high reliability industries. Accredited to BS EN (AS)9100 including ISO9001:2008 and workmanship standards to IPC A 610 Class 3. FOR MORE INFORMATION Contact: Nikki Hillson Tel: +44 (0)1234 321601 nikki.hillson@axis-electronics.com www.axis-electronics.com

Specialist Defence and Security Electronic Manufacturing Services

Axis Electronics specialises in the manufacture of high technology, high mix, low to medium volume, complex, electronic products where product quality and long term reliability is a key requirement. Difficult product, design clarifications, changes, component obsolescence and a close working relationship is the norm. n n n n n

High Technology Electronic Manufacturing Microelectronics Clean Room Facility Design Services Test development Prototypes and NPI

n n n n

Conformal Coating Repairs and after sales service Environmental Stress Screening MCM and COB , RF and Microwave, Hybrid Circuits, Opto Electronics

CALL US NOW ON 01234 321601

www.axis-electronics.com 01234 321601 nikki.hillson@axis-electronics.com

72

COUNTER TERROR BUSINESS MAGAZINE | Volume 6


Defence & Equipment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DSEi 2011

LATEST TECHNOLOGY AND PRODUCTS IN ACTION With the ever changing needs of the defence and security industry, DSEi is creating a range of new features to better enable you to meet with suppliers, showcase your products and see exciting new developments From 13 to 16 September, Defence & Security Equipment International (DSEi 2011) takes place at ExCeL in London’s Docklands. The exhibition is well-known as a leading event for land, sea and air applications for the defence sector, but this year will include a much greater focus on security. The borders between defence and security have become more and more blurred over the last five years and the show has seen an increasing participation from companies specialising in areas such as border security and national security; this

has resulted in DSEi focusing more on these issues and nations’ responses to them. Plans include a Security Showcase and Demonstration area hosting live scenario and product based demonstrations. This platform allows exhibitors to promote their technology and services to a highly targeted audience including security and military delegations. From the security sector, leading specialist companies exhibiting at DSEi include G4S, Explora Security, Smiths Detection, Cristanini and Avon Protection. The latter specialises in the supply of advanced CBRN, hazmat and

riot control respiratory solutions to the world’s military and security services. Silver Sponsor Chemring EOD will be running a thought leadership session at the event and leading security prime contractors including Northrop Grumman, Lockheed Martin, Finmeccanica and Raytheon will also be exhibiting. The US Department of Homeland Security is lending its weight to DSEi 2011 and will be giving a briefing on its latest national security requirements and technologies. DEBATING TODAY’S SECURITY CHALLENGES In addition to a high profile series of keynotes, an on-floor seminar series will include speakers covering the most pressing topics facing national security around the world today. Combating cyber warfare, for example, will be high up on the agenda here. E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

73


Phoenix Components stripping back the gimmicks of Electronic Distribution. For more than 15 years Phoenix Components UK Ltd have been supplying Leading Defence OEM’s and CEM’s in UK and Europe. For all your Electronic Component requirements Phoenix Components is the only name you need.

n Component allocation issues n Obsolete components n Long lead times n Alternative manufacturers n Component testing PHOENIX COMPONENTS UK LTD, RICCALL GRANGE, RICCALL, NORTH YORKSHIRE YO19 6QL Tel: 01757 249349 Fax: 01757 249393 sales@phoenix-components.com www.phoenix-components.com

Value Added Motion Control Solutions. Infranor Group offers innovative solutions from detailed design through to manufacture.

We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defense, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com

Info.uk@infranor.com


DSEi 2011

In addition to a high profile series of keynotes, an on-floor seminar series will include speakers covering the most pressing topics facing national security around the world today. E Western governments are taking threats in cyberspace very seriously and there are rising expectations that they will be able to build and sustain effective cyber defences. E-CRIME Over the summer of 2010 the international news media picked up on a computer worm, known as Stuxnet, that had been attacking the computer systems controlling Iran’s controversial nuclear programme. The Stuxnet affair reinforced concern across the world that computer networks could be deliberately targeted to cause massive damage to societies that have come to rely on the internet and its associated technologies. These range from the simple infection of a business’s computers, to e-crime and e-espionage through to the disruption of the computers that control electricity power and other essential utilities. Many governments have now moved to set up cyber operations centres to monitor, on a real-time basis, the operation of computer networks in their country. While in the past many countries were able to separate crucial

military and national security networks from the mainstream civilian internet, the ubiquitous nature of the internet in the 21st century means that it is very difficult to separate out government and military networks from purely civilian networks. For example, many of the cyber domains that the western armed forces use, run on commercial networks that reside in several countries so individual governments do not have a dominant say in the structure and operation of the internet anymore. The view is also growing that the defence of civilian cyber resources and infrastructure is a proper role of governments, as part of its duty to protect their nation’s populations and economic interests. MORE VIP VISITORS DSEi 2011 will be looking to increase the number of international security delegations attending the show. The DSEi VIP engagement team is already working closely with the UKTI Defence & Security Organisation, which is extending invitations to national

Defence & Equipment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

security/paramilitary forces and border security organisations, that will form top level international security delegations. The last time that DSEi was held, in 2009, 70 official military delegations attended, from 49 countries. The organisers are hoping to increase this number for DSEi 2011 – again working with UKTI DSO. DSEi is also renowned for attracting senior military personnel outside the remit of the official delegations – and this programme of invitations has been expanded for this year. Recognising that one of the main reasons Tier One and Tier Two suppliers, as well as SMEs, participate in DSEi is to meet and network with prime contractors, the DSEi VIP engagement team is also putting together Prime Contractor Industry Delegations. While these prime contractor personnel – including purchasing directors, chiefs of engineering and heads of supply chains – traditionally attend DSEi anyway, this will be the first time that they will be involved in specifically programmed delegations. NEW FEATURES DSEi is a major springboard for the introduction of cutting edge technology, as well as the equipment already being used in today’s operations. In 2009 there were 1,280 companies exhibiting from 40 countries and this included whole supply chains covering a variety of programmes. Spanning the whole E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

75


NEW FOR 2011

Image Copyright of Force Protection Europe

NEW Waterborne Demonstrations

NEW Static Vehicle Display for Land, Air & Naval Sectors

Image Copyright of BAE Systems

MORE Visiting Naval Ships than the 2009 show

NEW Innovation Showcase

Image Copyright of Lockheed Martin Corporation

NEW Security Focused Exhibitors

Image Copyright of Smiths Detection

Infinite opportunities. One world-leading event.

NEW Security Demonstrations & Showcase

NEW Increased Air Capabilities

NEW Robotics & Unmanned Systems Showcase

With 1,300 exhibitors and a host of exciting features, DSEi is the world’s leading Defence & Security exhibition, allowing you to meet the whole supply chain in four productive days; 13-16 September 2011, ExCeL London.

REGISTER AT WWW.DSEI.CO.UK/EARLY FOR EARLY BIRD DISCOUNT Platinum Sponsors


DSEi 2011 year. AUVSI, which is dedicated to advancing the technology of unmanned systems, is helping to create a dedicated area that will be used for live demonstrations of unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs) during the show. A football pitch-sized area, located in one corner of the North Halls, has been set aside for the demonstration and viewing arena, making it the largest showcase of this type of technology at an exhibition in the world.

Defence & Equipment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NAVAL PROWESS DSEi continues its strong maritime focus. Visiting ships provide a valuable platform for the demonstration of new systems and equipment, which visitors can inspect on specially conducted tours. The UK MOD is planning to allocate a modern Frigate or Destroyer and an Offshore Patrol Vessel to DSEi, and the Royal Netherlands Navy will be sending a vessel as well. Waterborne demonstrations are always a highlight and for 2011 the plan is to further develop the waterside area alongside the venue to include a larger space for exhibitors to showcase their products. There will also be a larger grandstand viewing area to allow more visitors to watch at any one time. Demonstrations will recreate possible naval operational scenarios allowing exhibitors to showcase a range of equipment, such as RIBs, pontoon equipment and offshore raiding craft. BRITISH ARMY DEMONSTRATION AREA The highly popular British Army Demonstration Area returns for DSEi 2011. Showcasing some of the equipment used by the British Army, the area is organised and staffed by members of the British Export Support Team, who are able to talk to visitors about the capabilities of the equipment on display. DSEi has also created a new Land Vehicle Park so visitors can see some of the vehicles that are being used around the world by military and security forces.

E supply chain, the event brings together everyone from the largest prime contractors right down to the SMEs producing the smallest of electrical components, whose role, although small, is none the less vital in a programme’s performance. For this reason, DSEi 2011 will feature a dedicated electronics pavilion to provide specialist electronics companies with a powerful platform for presenting their products and services – to the benefit not only of visitors, but other exhibitors as well. Drawing on the expertise of NEW Events – which organises the highly successful National Electronics Week – and supported by Intellect, the DSEi Electronics Pavilion will allow electronics companies to exploit the potential

of the defence and security market. The pavilion will act as a focus area for electronics companies of all sizes; it will include a lounge area for the use of all those exhibiting in the pavilion and will be designed to allow exhibitors an easy way to promote what can be complex products, many of which are too small to be viewed by the naked eye alone. Leading international electronics players such as XJTAG, Vicor, Lauterbach, Humiseal and Phaedsys have already committed to exhibit.

IMPROVED VISITOR EXPERIENCE Since DSEi last took place the venue has expended in size so visitors will be able to access the exhibition from ExCeL’s East Entrance as well as the West. This, combined with an enhanced registration procedure, means that visitors will be able to access the exhibition floor with minimum delay. All the major demonstrations are also being scheduled so the times do not clash with other feature areas, thus maximising audiences and improving the experience for all. The last DSEi attracted 25,000 visitors from 98 different countries; this year’s event is on course to beat both targets. L

UNMANNED SYSTEMS ON SHOW The Association for Unmanned Vehicle Systems International (AUVSI) is supporting a new Robotics & Unmanned Systems Showcase this

FOR MORE INFORMATION For the latest information on what is taking place at DSEi 2011 please visit www.dsei.co.uk

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

77



SURVEILLANCE SOLUTIONS

A NEW GENERATION OF VIDEO SURVEILLANCE

Spotlight Focus

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

New generation of video surveillance security solutions from Samsung offer powerful tools to counter terror experts Samsung’s largest ever booth at IFSEC 2011, the international security exhibition which took place at the NEC Birmingham 16-19 May, provided Europe’s fastest growing security brand with the opportunity to give hands-on demonstrations of the latest video surveillance products and technologies to security personnel involved in counter terror. Unsurprisingly, a large number of counter terror experts were particularly interested in the Samsung cameras that have an Intelligent Video Analytics (IVA) capability. “Cameras which incorporate our WiseNet1 and SV-5 and DSP chipsets all feature IVA which provides a powerful tool to ensure that users achieve maximum benefit from cameras deployed for public space and critical infrastructure protection,” said James Smith, European marketing manager for Samsung Techwin Europe Ltd. INTELLIGENT VIDEO ANALYTICS Samsung’s license-free Intelligent Video Analytics (IVA) capability includes optical tripwire and enter/exit direction detection, as well as an Appear/Disappear function to detect the movement of objects. IVA also has a scene change tampering function that creates an alert if, for example, paint is sprayed on a camera lens or there is unauthorised movement of a camera away from its usual field of view. “One of the cameras that attracted considerable attention was the SNP-5200 1.3 Megapixel high definition network PTZ dome camera, which incorporates a true day/night camera and features a 20x optical zoom lens,” said James Smith. “Despite being competitively priced, it is packed full of features and is ‘bandwidth friendly’ which makes it the ideal choice for a wide range of applications where a high definition PTZ dome is required as part of an IP based video surveillance system.” The SNP-5200 utilises Samsung’s WiseNet1 DSP chipset, allowing users to gain maximum benefit from the very latest megapixel camera technology, including license-free Intelligent Video Analytics and dual streaming H.264/MJPEG compression, which provides the option to simultaneously transmit images to multiple locations at various frame rates and at different resolutions. With such a wide range of compression methods and resolutions to choose from, a number of different users, if authorised, are

able to simultaneously monitor live images at one location, record video evidence at another or view live and recorded images on a smartphone or iPhone via the Samsung iPOLiS application. At the same time, JPEG images of an incident can be attached to an alarm e-mail notification with the additional facility of storing pre and postalarm images on a camera’s internal SD memory card. Four programmable Motion Detection zones, eight programmable Privacy Zones, bi-directional audio support and PoE (Power over Ethernet) are just a few of the impressive features built into the SNP-5200. SAMSUNG’S DSP CHIPSETS There is a large diversity of reasons why surveillance cameras are used and an equally large number of different environments where cameras may physically be installed. Recognising that trying to pack every possible function onto a single DSP chipset is not economical or practical, Samsung’s design engineers have developed a series of chipsets each with a set of functions to provide the optimum solution for specific types of applications and projects. As well as IVA, one of the striking features of the SV-5 chipset is its ability to capture reliable quality images at up to 650TVL colour, which is further enhanced by a new powerful Super HAD (960H) CCD. The Wide Dynamic Range (WDR) technology built into the SV-5 chipset compensates for backlight problems 160 times more effectively than standard BLC by applying an optimum fusion ratio when combining the high speed shutter used in bright areas and the low speed shutter used in dark areas. It carries out a precise analysis of the picture to get detailed information from the dark areas without any saturation from the bright areas. NOISE REDUCTION Cameras incorporating the SV-5 DSP chipset also feature Samsung Super Noise Reduction (SSNRII) technology. Noise in CCTV images is one of the most common causes of video material being considered unreliable as evidence. This is particularly so in low light environments, although not exclusively, as noise can be generated in all lighting conditions. SSNRIII is able to eliminate image noise in low-light conditions without creating ghosting or blurring. There is also the added bonus

that this amazing technology can save up to 70 per cent hard disk space on a digital video recorder, whilst maximising bandwidth when viewing the video over a network. “Fortunately with the threat of attacks continuing to dominate the thoughts of senior security managers as well as the emergency services, recent significant advances in technology has ensured that video surveillance equipment is very much part of the solution,” said James Smith. L FOR MORE INFORMATION If you would like further information on the comprehensive range of cameras and domes which benefit from the results of Samsung’s investment in DSP chipset technology, please e-mail STEsecurity@samsung.com or telephone +44 (0)1932 455308.

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

79



IFSEC 2011

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

LATEST INNOVATIONS DRAW GLOBAL SECURITY AUDIENCE Leading security professionals, manufacturers, distributors and trade installers from all over the world recently gathered at IFSEC 2011, to find out what the annual security event had to offer Drawing an audience of security professionals from across the globe, May’s IFSEC 2011 event presented a variety of educational content, including the annual IFSEC conference and seminar sessions, innovative, cutting edge security solutions and interactive product areas. FOCUS ON TECHNOLOGY With an over-arching focus on technology exhibitors such as Panasonic (demonstrating its new profiling technology) and Sony (unveiling its new high definition CCTV camera) ensured that IFSEC was once again the number one destination for a number of innovative industry product launches. The Intelligent Integration Zone sponsored by ISM (Integrated Security Manufacturing Limited) also proved to be a magnet for IFSEC visitors, demonstrating how its integration

software integrates perimeter protection, video surveillance, digital CCTV recording, access control, intruder alarms, staff personal alarm systems and alarm/call strips. As a direct result of its attendance at IFSEC

2011, ISM made contact with government buyers, resulting in an upcoming trip to the Middle East and a potential multimillion pound project, according to sales and marketing director Steve Smith. E

The Intelligent Integration Zone sponsored by ISM (Integrated Security Manufacturing Limited) proved to be a magnet for IFSEC visitors, demonstrating how its integration software integrates perimeter protection, video surveillance, digital CCTV recording, access control, intruder alarms, staff personal alarm systems and alarm/call strips. Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

81


ANPR YOU CAN TRUST

secureanpr CitySync are renowned for having the best ANPR software and for offering innovative ANPR solutions into the Traffic, ITS, Parking and Security markets. The company also provides bespoke ANPR solutions aimed at the Homeland Security and Counter Terror markets. Products include Jet Mobile, Blackbird Micro Covert ANPR Processor and Rapid Deployment systems. To find out more visit www.citysync.co.uk or phone +44 (0) 1707 275169 and quote ref: CTB0611

Š 2011 Image Sensing Systems, Inc.


IFSEC 2011

“It was a pleasure to host the introduction of a free education centre for interested parties wanting independent views of the latest technologies in a non-jargon style together with the opportunity to speak freely on a one-to-one basis to independent and supplier specialists. The feedback received from the many that completed a critique form indicated that they would certainly be back next year” – Mike Tennent. E The IFSEC conference incorporated modules based on IP-based security, CCTV, thermal imaging and converged systems including the convergence of physical security and IT security; whilst the seminar programme presented by leading industry professionals focused on a range of topics.

These included wireless CCTV, physical security information management (PSIM), biometrics and multimodality, HD in wideangle applications, lone worker device, lighting design and IP video surveillance. The educational aspect of IFSEC continued with the introduction of the Tavcom Training

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Theatre, a joint collaboration between the independent educational centre, Tavcom Training and IFSEC. Developed to help everyone in the security profession fully understand the meaning of IP, including its benefits and limitations, the informal and practical sessions proved very popular with audiences learning about the latest advances in IP technology, what it can do for their business and how best to gather CCTV images. Discussing the success of the Tavcom Training Theatre, the company’s managing director Mike Tennent said: “It was a pleasure to host the introduction of a free education centre for interested parties wanting independent views of the latest technologies in a non-jargon style together with the opportunity to speak freely on a one-to-one basis to independent and supplier specialists. “The feedback received from the many that completed a critique form indicated that they would certainly be back next year and tell their colleagues of the high-value content of the education sessions.” E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

83


2 Megapixel Video over existing COAX

Smart

Search

8 Channels H.264, HD-SDI, Full HD DVR, Real-Time Recording & Playback, Megapixel Video Over Coax • 1080p or 720p HD CCTV camera support for superlative image clarity

• Express setup, Express archive, Express playback,

• HD real-time recording and playback rate for all cameras (at 720p)

• Express search, Smart Search, Snapshot search

• HDMI 1080p and VGA multiplex view main monitor outputs

• Gigabit Ethernet interface for remote network

• Simultaneous high resolution recording (1080p/720p) with reduced

• viewing and configuration

• bandwidth remote view streaming

• On-screen PTZ control via mouse or front panel

• Mobile Viewing from PDA or SmartPhone

• Per channel audio recording capabilities

• Pentaplex operation (simultaneous live, recording, playback, archiving

• Built-in DVD burner

• and remote viewing)

• 3 USB 2.0 ports for video archive and mouse usage

• Free EverFocus DDNS service

• Multi–language support

• User friendly GUI

• 19" rack mountable (rack ears included) • Broadcast Quality • Real Time HD video over Co ax • No IP set up. No Latency, simple BNC connector

• Support 4 fixed internal HDD and eSATA external HDD • Multiple control inputs: mouse / front panel / IR remote controller / • EKB500 keyboard

EverFocus Europe - UK: .

Phone or email for Free 130 page catalogue

Unit 12, Spitfire Business Park, Hawker Road, Croydon,Surrey CR0 4WD, UK TEL: +44 (0) 20 8649 9757 / 0845 430 9999 FAX: +44 (0) 20 8649 9907 www.everfocus.com .salesuk@everfocus.com


IFSEC 2011

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

E FUTURE OF SECURITY IFSEC 2011 also saw the launch of the Future of Security Competition. The new initiative sought to find new technological innovations that can be used to prevent, defend against, recover from or cope with any kind of terrorist incidents or other criminal acts. Bringing out the best in up-and-coming technologists, the nine finalists pitted their next generation security innovations against each other in a ‘Dragon’s Den’ style battle, judged by an influential panel. The closely-fought contest resulted in 2020 Imaging gaining the judges’ stamp of approval and US$10,000 to put towards the development of their technological innovation. When asked to review IFSEC 2011, James Blue, of organisers UBM, said: “It is evident that the economic unease throughout the last couple of years has put a strain on the security industry world wide, however, we have observed from the visitors and exhibitors at IFSEC this year, a new, buoyant outlook, which was clearly evident across the whole exhibition. “Indicative of the evolving security landscape, new ideas and product innovations are fundamental, which is why we take great pride in organising the annual leading security event, showcasing the best in future security, products, services and technological innovations that the global market has to offer.” Demonstrating its standing where the global audience is concerned, IFSEC’s international pavilions for Belgium, Canada, China, France, Italy, Korea, Taiwan and the US presented an abundance of products and developments from across the globe. With more than 650 exhibiting companies, IFSEC 2011 presented a wealth of gamechanging products and exclusive sampling opportunities. The positive feedback from both visitors and exhibitors verified the abundance of cutting edge technology and educational opportunities on offer. E

Counter terrorism design from concept to completion Prosync prides itself on its in-depth technical ability and understanding of electronics for the counter terrorism world, enabling us to precisely meet the customers’ needs with the core competences that benefit the whole supply-chain. Prosync Ltd has extensive knowledge and expertise in the design and development of electronics equipment using switched technology for the commercial and defence worlds. We use a Systems Engineering approach to develop your hardware/software requirement.

• Custom electronics design • Product development • Product prototyping • Electronic design process • Systems architectures Prosync Ltd focuses on developing special relationships with universities, commerce and industry to give you the right product. Whatever your requirement, Prosync will design, develop and plan the right equipment to give a “ready to market” product. This includes: • PCB design and layout

FOR MORE INFORMATION Tel: 07771 643205 info@prosync.co.uk www.prosync.co.uk

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

85


Strike-Point a new reliable safety and affray switch /alarm Features 

Ease of activation

Inherent shape retention

Flexible contact

Tamper Proof

Colour Options

Illumination option

Quick & easy to install

Range of ABS fittings

Easily Integrate with proprietary systems

Rated IP65 & above

Successful Launch of Strike-Point at IFSEC ICS successfully launched Strike-Point at IFSEC 2011. This exciting new safety system was developed for Custody Suites, Courts & Prisons, as a affray switch/ alarm. The switch which incorporates a unique flexible contact that is an integral part of the switch body, ensuring a reliable continuous switching action is enhanced with a range of purpose made tamper proof fittings. That enables Strike-Point’s to be tailored to suit individual installation on site. If you wish to learn more then ring +44 (0) 114 224 2522 or email info@strikepoint.co.uk or go to www.strike-point.co.uk

Industrial Control Systems Ltd Tel : +44(0) 1142 242522 Fax: +44(0) 1142 242222 Email: info@strike-point.co.uk Web: www.strike-point.co.uk


IFSEC 2011

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

E LOOKING AHEAD IFSEC International returns to the NEC Birmingham in May next year. It will be held alongside its co-located events, Safety and Health Expo and The Facilities Show, with each show forming part of the UBM Live Protection and Management series. A brand new lone worker protection feature is to be launched at IFSEC International next year, and is set to deliver a unique visitor experience by allowing attendees the opportunity to meet with the leading suppliers of lone worker equipment. With an estimated 6.8 million lone workers in the UK, which is 22 per cent of the UK working population, this brand new section of the exhibition is aimed squarely at educating lone workers and their employers from multiple vertical sectors – including healthcare, retail, education, the utilities, facilities, local authorities and housing associations – about the merits and benefits of the latest approved lone worker protection systems. Visitors to IFSEC International in 2012 can expect to network with top-tier professionals and experience the latest security innovations and technological advances from across the globe. L FOR MORE INFORMATION www.ifsec.co.uk

ARMOURED SAFETY UNCOMPROMISED NEW LANDROVER DISCOVERY 4 FULL B6 ARMOURED TOYOTA LANDCRUISER 200 FULL B6 ARMOURED UNREGISTERED BMW 330i LHD & RHD B4, VR4 ARMOURED BMW X5 4.4i LHD & RHD B4, VR4 ARMOURED HOT AND COLD CLIMATE SPECIFICATION BMW 530i & 550i LHD & RHD B4,VR4 ARMOURED

0044 121 700 7165 info@armoured.uk.com www.armoured.uk.com

£195,000 £109,900 £34,900 £59,700 £67,900

CALL US NOW ON 0044 121 700 7165 Please contact Armoured for further details on the full specification and details of our immediate delivery vehicles, which comprise of 50 new vehicles and a selection of 20 used vehicles. Armoured can assist with all shipping and export license requirements

LAND ROVER - RANGE ROVER - BMW - MERCEDES - CADILLAC - TOYOTA - CHEVROLET

SUPPLIERS OF ARMOURED VEHICLES WORLDWIDE Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

87


your people your property protected The Security Systems Division of C3S Projects has been involved in the design, manufacture and installation of physical security systems for over 20 years. The company’s security systems protect people and property in a wide range of locations.

C3S Projects people protection

The company’s service starts with the specification and design of a security system and ends with its installation. It creates secure areas and security measures, which provide effective protection to the occupants.

security systems

security screens - glazed and rising Glazed and rising security screens to provide protection against physical and ballistic attack from a wide range of weapons/firearms. Associated equipment including counterwork, manual or motorised pass trays, electronic speech enhancement systems and induction loop systems. DDA compliant counter designs alongside a Rise & Fall Counter & Screen to enable DDA compliance at the touch of a button.

security doors and framing systems Glazed – part/fully – and solid security doors to provide protection against physical and ballistic attack from a wide range of weapons/firearms. Constructed from aluminium, steel or timber and incorporating mechanical or electric locking systems; master and slave leaf options.

security airlock systems (SAS) Electrically interlocked door systems to control personnel access to a building and protected areas within it. Constructed from aluminium, steel or timber, providing protection against physical or ballistic attack from a wide range of weapons/firearms. Rotating airlocks providing physical or ballistic attack resistance.

modular secure units Prefabricated secure units to allow rapid installation and commissioning. Physical and ballistic attack resistant options for temporary or permanent locations and providing banking facilities, guardhouses, ticket offices, control rooms.

explosion resistant Aluminium door, partition, window and curtain walling systems designed for both new and retrospective installation. The system’s unique blast mitigation properties “share” the blast loading between structure, fixings and frame/glass and, as a result, rarely needs structural reinforcement, making it particularly suitable for installation in older buildings. Blast containment wall lining for structural re-inforcement.

C3S Projects Ltd. Canal Mills, Elland Bridge, Elland, West Yorkshire HX5 0SQ F: +44 (0)1422 313808

T: +44 (0)1422 313800 e-mail: info@c3sprojects.com

www: c3sprojects.com


EVENT SECURITY

THE GAME PLAN – SECURING LONDON 2012

Tony Ball, chairman, British Security Industry Association’s Crowd Management section, looks at some of the action the security sector has taken in the lead up to next year’s major event The countdown to the London 2012 Olympic and Paralympic Games is well underway. Just a few weeks ago, the route the torchbearers will take around the UK was revealed, while the millions of people who registered for tickets have just found out exactly what events they have tickets for, and the ongoing, enormous challenge of putting all the logistics in place rumbles on. Part of the challenge will be the varied and extremely difficult task of ensuring security at the events. The safety of athletes and public alike is of paramount concern to the security services, whose task is made all the more difficult by the geographical spread of the locations where the Olympic events will take place. Moreover, the different types of arenas in each site pose multiple security

concerns, including transport security, crowd control and the threat of potential terrorist activity at the games. These separate considerations, when joined together, mean that this is one of the largest scale security operations ever undertaken in the UK. Is the UK ready for this challenge? MULTIPLE EVENTS Games-time security relates to far more than the sporting events taking place at the Olympic Park in London. Some sporting events, such as sailing, mountain biking and football, will take place in other cities across the UK, including Newcastle upon Tyne, Glasgow and Cardiff. In addition, parallel events are due to take place across the country, also requiring

a strong security presence. These events, which will include street parties, big-screen events and local festivals, will run at the same time as the London 2012 Games even though they are not officially part of them, and were highlighted as being at particular risk from terrorist attack in a government report released last November. Then Security Minister, Baroness NevilleJones, said at the time: “We shall focus on getting the level of security right at the so called ‘parallel’ events, those activities running alongside the official games which will add much to people’s pleasure. “These can be expected all over the country and especially in London. […] Variety will be characteristic and the locations will be various too, some temporary, some permanent and they will be attended by audiences ranging from the hundreds to the thousands. “Making sure that these occasions, which should be fun, are also not vulnerable, is also at the forefront of our planning.”

Olympic Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURITY PERSONNEL Lessons from previous Olympic Games and other large scale sporting events such as last year’s World Cup in South Africa must also be taken into consideration. As the leading trade association representing the UK’s private security industry, the British Security Industry Association (BSIA) has been at the forefront of security planning for London 2012. Working alongside Government departments such as the Olympic Security Directorate (OSD) E

© London 2012

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

89


Hostile vehicle protection system • • • • • • •

Fast to install LegoTM like system Removable / Relocatable No ground anchor - uses its own weight Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 kmph (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment

Cable system creates necklace effect to spread the impact

The Redi-Rock hostile vehicle protection system is used to guard buildings of high importance.

The necklace effect means the blocks slide to absorb impact Result: Only 1.6m penetration of the load carrying space

The security barrier system that protects from vehicle impact The fast, effective, re-usable solution to perimeter hostile vehicle attack. Ideal for: • Airports • Train stations • Military facilities

Attractive face has the appearance of natural stone.

• Utility and critical infrastructure

The Redi-Rock Force Protection system has successfully been tested by the Transport Research Laboratory (TRL) using the BSi specification PAS 68:2007, and achieved a classification of V/7500[N2]/48/90:1.6/0.0 To achieve this the freestanding concrete blocks systems interconnected with steel cable successfully arrested a 7.5 tonne lorry at an impact speed of 48 kmph (30mph) with only 1.6m penetration of the load carrying space.


EVENT SECURITY About BSIA

Olympic Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The British Security Industry Association (BSIA) is the professional trade association of the UK security industry. Its members produce over 70 per cent of the country’s security products and services to strict quality standards.

E and Olympic Delivery Authority (ODA), as well as the London Organising Committee for the Olympic Games (LOCOG), BSIA has helped to identify both the opportunities and challenges that both public and private sectors will face in securing the Games. Recruiting staff in particular will prove challenging, as we saw during the World Cup where over 44,000 officers from the national South African Police Service (SAPS) were dedicated solely to the tournament, and an extra 10,000 personnel from metropolitan forces were also drafted in to boost the total force to around 54,000. During the Winter Olympics in Vancouver, forces were stretched to the limit. A huge cooperation of security personnel including the Vancouver Police force, United States security forces and a number of the Canadian military all worked alongside the private security industry to ensure continuous safety to athletes and visitors alike. This arrangement looks likely to be similar at the 2012 Olympics, with Police supported heavily by the private security industry, and even the largest of private security contractors will be working with smaller companies to provide effective security. Initiatives such as Bridging the Gap will help meet security resource requirements. Bridging the Gap – a joint initiative between LOCOG, the BSIA and further education colleges – aims to train as many as 8,000 young people to Security Industry Authority standards specifically to work in security roles at the Olympics. MANAGING CROWDS The practical application and involvement of the security personnel will be a crucial factor in ensuring a safe, successful Olympics. During events, crowds can vary from hundreds to hundreds of thousands, but in all cases it is always advisable to

ensure crowd management and security guards are constantly on hand, be it to act as deterrents to possible criminals hiding in the mass or to maintain order should there be a threat of fights breaking out. Officers’ duties include crowd management, operating of electronic security systems such as CCTV and access control, car park attendance and general monitoring duties. Security personnel also provide a physical presence on the day and are a useful port of call for members of the public requiring assistance or information. Moreover, they cover the essential role of ensuring the health and safety of the event and guiding the crowds through emergency procedures. In total, it was estimated that around 15,000 security personnel were on hand throughout Vancouver 2010 Winter Olympics, a 3:1 ratio of security guards to athletes, with an estimated total security cost of over £600 million. LARGE AMOUNTS OF VISITORS Maintaining the infrastructure of London during Games-time will also present a large scale challenge. Most disruptive to the daily lives of London residents will be the huge influx of visitors during Games time. This includes not just spectators from around the world, but also visiting dignitaries, athletes and sponsors, all of whom require varying levels of security. When Beijing hosted the 2008 Olympics, a single Games sponsor took an astonishing 6,000 VIPs from Europe to China. In addition to this, larger participating nations host their own Nation Houses, for example, Brazil will be taking over London’s Somerset House for the duration of the Games. Roundthe-clock security will play a vital role in protecting all of these VIPs in addition to maintaining high standards of safety and security at the events themselves.

CLOSE PROTECTION Protecting the many VIPs likely to attend the events who need one on one protection means that a comprehensive, close protection detail needs to be in place, as close protection officers are a must for protecting VIPs such as celebrities and politicians attending events. In the case of the London 2012 Games, a large concentration of high profile attendees will be in attendance, including national and international politicians, celebrities, members of the Royal Family and well-known sport personalities. The close protection officer’s work starts before an event, with the in depth scrutiny of the venue to ensure all angles are covered. In most scenarios, officers must ensure that high profile attendees are able to go about their daily business with almost an invisible bubble around them, reacting only when required. CASH IN TRANSIT The movement of cash, which forms part of the UK’s Critical National Infrastructure, has to continue unhindered by the large volumes of additional visitors in the city and the impact of the Olympic and Paralympic Route Networks. These networks of road alterations have been designed to ensure the smooth transport of officials and athletes to and from venues. Three years ago, the BSIA represented its cash-in-transit members in the early stages of Olympic planning, to ensure that cash machines, supermarkets, banks and retailers will continue to receive timely and secure cash deliveries throughout this busy period. With the eyes of the world on London next summer, a huge logistical challenge is well underway to ensure that the Games take place safely and securely. What will be missed by the millions who tune in to see these historic events take place is the thousands of hours of planning, organisation and hard work that has gone in to ensure that the games are safe and secure. So, if you are fortunate enough to have secured a ticket for any of the eventsremember that your safety has been of paramount importance to the event planners, who want to make this the most successful, and most secure Olympic Games, of all time. L FOR MORE INFORMATION Tel: 0845 3893889 www.bsia.co.uk

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

91


With HG_Flow速 by HyGie-Tech, roCFD enters virtual 3D reality

With HG_Flow速 and its unmet performances in risk oriented Computational Fluid Dynamics preparedness in control of airborne contamination becomes effective and relevant.

min. HG_Flow is a computer-based solver, optimized for the assessment of airborne contamination and subsequent risk evaluation. Algorithms used by HG_Flow aimed at reducing computation time (first solution in less than 15 minutes) without impairing the required level of accuracy.

Enemies you have to face may not be those you would expect


AIRBOURNE CONTAMINANTS

BIOLOGICAL AND CHEMICAL DEFENCE

Olympic Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

With HG_Flow, roCFD can now be brought into outdoor environments To address a permanent need of controlling risk of diffusion of airborne contaminants, HyGie-Tech has combined in its software HG_Flow features of Computational Fluid Dynamics (CFD) and principles of risk analysis and thus it opens domain of risk oriented Computational Fluid Dynamics (roCFD). HG_Flow provides with quantitative evaluation of diffused contaminants (either gaseous or airborne aerosol) with the following marking characteristics: HIGH-SPEED AND CONSISTENCY HG_Flow takes advantage from a customised numerical method, which has been optimised to run in the parametric domain of roCFD so that the calculation time and required resources are markedly reduced with a preserved reliability. Through another HyGie-Tech proprietary software, HG_Flow directly interfaces with a 3D laser scanner that provides with digitalised of surrounding environment. Hence, the world in which CFD modeling runs is an exact reproduction of the reality. Various contaminating agents (chemical and biological) are stored in a proprietary databank. Related information, such as physical and chemical properties or toxicological data, is associated to each agent. Thus, HG_Flow integrates the characteristics of the released agent for an enhanced reliability of computed solution. AWARD NOMINEE Until now, HyGie-Tech has quite exclusively reported about the performances of HG_Flow when used in indoor environment. Examples of successful implementation of HG_Flow in operational contexts are now multiple and received feedbacks witness the satisfaction of clients. Experts have also assessed the performances of HG_Flow, as HyGie-Tech was recently a finalist in 2011 CTSS awards in the category ‘Internal Building and Facilities Protection’. Today, HyGie-Tech comes with an extension of the scope of HG_Flow’s possible applications to outdoor environments. This opens promising perspectives as the use of CFD is still considerably less pronounced for outdoor applications. This can be primarily understood as a consequence of the high variability of wind conditions when compared to HVAC system in indoor environment. Hence, examining the steady state flow

alone, as required in conventional CFD, alone may not always be the best method when dealing with dispersion of contaminant in outdoor condition. Moreover, the acquisition of the environment is often far too simplistic to allow necessary reliability of computed solutions. Once conjugated together both issues cause sufficient difficulties to the CFD provider so that he either resigns in front of the amount of parameters he has to deal with or integrates a so poor model that the outcomes cannot be assessed. For those reasons among others, conventional CFD is yet not widely used in outdoor application whenever it could theoretically be. OUTDOOR ISSUES Thus, even in the 21st century, Experimental Fluid Dynamics (or EFD i.e. smoke-tests, wind tunnels) is still preferred to CFD by project managers when they have to face outdoor issues. This approach is also enhanced by the fact that we live in a world where

permit a rational assessment of diffused profiles of airborne substances in outdoor environment and allows quantitative assessment of the concentration of contaminant agent in unit space volume. To achieve it, HG_Flow user’s interface is fed with information provided by local weather stations that record extremes and mean values in wind speeds, in wind directions and in other relevant parameters and the assessed emitting points (or volumes) of toxic substances in the pre-digitalised environment. Once all those inputs are loaded in HG_Flow, the roCFD tool computes the space volume of the outdoor domain in which the probability to get a concentration in toxic substance over the set limit is assessed. Then, HG_Flow determines as a cloud the zone where there is a risk to exceed the set limit under any of the possible recorded weather parameters. Hence, the computed cloud volume corresponds to a worst case. This means that the concentration in substance might not be always over the

AHG_Flow takes advantage from a customised numerical method, which has been optimised to run in the parametric domain of roCFD so that the calculation time and required resources are markedly reduced with a preserved reliability. people exaggerate the importance of what they can see. No matter the fact that the configuration they observe can only be true under restricted set condition and should not be extrapolated to other configuration. This clearly disqualifies EFD approaches for any usage in preparedness and action plan because it is absolutely impossible to consider in advance all configurations. INTEGRATION Thanks to its unique construction as a roCFD tool, HG_Flow circumvents drawbacks of both conventional CFD and EFD. Firstly, HG_Flow with its interface to 3D laser-scanner digitalisation of the environment allows a precise integration of all elements to be considered in the computational domain. Secondly, HG_Flow is designed to integrate variability of boundary conditions. Thus, HG_Flow has the capacity to compute and

set limit of toxicity within the cloud but it could under possible given conditions. This opens perspectives for those who have to control outdoor environments and assess the risk of a voluntary or not release in the atmosphere of toxic agent. For instance they might be concerned with sport arenas, street canyons or chemical plants. HG_Flow will be soon validated in various outdoor environments to prove the reliability of computed solutions. L FOR MORE INFORMATION www.hygie-tech.ch

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

93


extra layer of protection to your safety

Add an

ducts ew pro ot her n d n a e t his d 2011 and se Come gency Scotlan gow r C, Glas at Eme he SEC 011, T – 6th, 2 July 5th

Five layers of tear-proof chemical protection. Even when being dragged along the ground, as in a rescue, the new Dräger CPS 7900 gas-tight chemical protection suit prevents injury from hazardous substances and abrasive surfaces. – Tear-proof, five-layer, laminated D-Mex material keeps wearer safe even if outer layer is damaged – Freedom of movement due to ergonomic design – All round visibility and no fogging increase wearer safety – Hands kept free for immediate use; pressure gauge holder within field of view – Wearer safety in uncertain conditions due to flame resistance, performance in extreme temperatures

and suitability for potentially explosive environments – Accessories include Dräger-Connect, which helps in rescue scenarios

The Dräger CPS 7900 gives you the highest level of protection available and still keeps you comfortable and operationally ready. www.draeger.com.

2597_RefNo_7906

CONTACT US TO ARRANGE A DEMONSTRATION QUOTING REF CP7906 TEL: 01670 561 200 marketing.uk@draeger.com


Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EMERGENCY SCOTLAND

CONDITION CRITICAL

The comprehensive Emergency Planning Society Recilience Symposium will take place alongside Emergency Scotland, 5-6 July in Glasgow, bringing together resilience professionals under one roof From suicide bombing to offensive fighting, terrorist attacks remain a significant concern for governments and private sector organisations worldwide. In the wake of Al Qaeda leader Osama bin Laden’s death in May, the potential for terrorist attacks has heightened. Counter-terrorism plans need to be updated and emergency plans put into place that involve all segments of society and/or many government agencies. These unfolding events provide a natural wake up call for collaboration within the industry to ensure a clear and coherent plan is put into place, after all preparation is vital. EMERGENCY SERVICES EVENT Subsequently, the team behind the successful annual UK emergency services event, The Emergency Services Show, held at Stoneleigh,

is pleased to announce that it will be holding a new event dedicated to the Scottish emergency services sector. Emergency Scotland 2011 will take place alongside the annual Emergency Planning Society (EPS) Resilience Symposium 2011, 5-6 July at the Scottish Exhibition and Conference Centre, Glasgow.

Emergency Scotland 2011 is Scotland’s only exhibition for anyone involved in emergency planning, response and recovery. This free to attend event will provide a fresh and more convenient opportunity for emergency services personnel and planning officers from Scotland, the North of England and E

In the wake of Al Qaeda leader Osama bin Laden’s death in May, the potential for terrorist attacks has heightened. Counter-terrorism plans need to be updated and emergency plans put into place that involve all segments of society and/or many government agencies. Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

95


Meet the SP SERVICES team at Emergency Scotland 2011 on stand 86

Unit D4, Hortonpark Estate, Hortonwood 7, Telford, Shropshire, TF1 7GX

Tel: 01952 288 999

www.spservices.co.uk


EMERGENCY SCOTLAND

The symposium offers a range of subjects with over 20 sessions aimed at tackling the most important issues in the resilience profession, including case studies, expert insights and master classes and offers an opportunity to gain insight into future risks and the environments we face. E Ireland to attend a dedicated exhibition. David Brown, show organiser, Emergency Services (MMC) Ltd, comments: “As well as allowing exhibitors to showcase their latest products and services, the exhibition provides an ideal way for professionals to discuss cooperation, ideas and initiatives and learn from each other in preparation for major events taking place over the coming years or prepare for the unexpected.” PERFECT OPPORTUNITIES Launched at a time when budget cuts are at their peak, this event will help facilitate and share information, good practice and

provide a platform to consider innovative and creative ways of working together in the future. It will also provide the perfect opportunity for individuals to research methods of doing more with less. Visitors will be able to speak to exhibitors about how they might achieve better ways to operate, thereby making efficiency savings. The event is open to emergency and resilience professionals and is considered crucial for those with a role in operations, procurement, training, recruitment, emergency planning and business continuity. The types of products on show from exhibitors includes communications

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

and IT, first response equipment, PPE, station equipment, training and education, vehicles and vehicle equipment, business continuity, and outsourcing. In addition to trade exhibitors displaying the latest equipment, there will also be up to 30 end users exhibiting within the Emergency Response Zone. This zone – essential for operational staff and emergency planning officers – is made up of other Category 1 and 2 responders, professional, government and voluntary organisations, offering perfect networking opportunities to affiliated organisations. SYMPOSIUM The Emergency Planning Society Resilience Symposium 2011 will be tackling the theme ‘Condition Critical: A Symposium for Resilience Professionals’. The symposium offers a range of subjects with over 20 sessions aimed at tackling the most important issues in the resilience profession, including case studies (lessons identified from the past 12 months), expert insights, master classes, energising practitioner skills and importantly offers an opportunity to E

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

97


Delta LTC Tactical Carrier

MSA Paraclete Lightweight Tactical Carrier for Police

For more information please contact your local MSA representative

RDRDS Hard Plate Carrier

Rapid Donning Rifle Defense System for Tactical Operations

For more information please contact your local MSA representative

MSA Britain Limited, Lochard House , Linnet Way, Strathclyde Business Park , Bellshill Tel: +44 (0) 1698 573357 Fax: +44 (0) 1698 740141 Web: www.msanet.com


EMERGENCY SCOTLAND E horizon scan and gain insight into future risks and the environments we face. This year sees a fresh, exciting programme providing delegates with a myriad of choice and topics aligned to national risks, dynamic and topical and at the forefront of the resilience profession highlighting the most important issues, including Critical National Infrastructure; Economic, Social and Political Wellbeing of the UK; Exposed to the Elements – Nature the Adversary; and National Security Framework – The Emerging World. Chair of the Emergency Planning Society (EPS) Marc Beveridge, comments: “The resilience profession faces a number of key challenges in a world of uncertainty. The road ahead is a rocky one; the need for innovation and creativity ‘doing more with less’, developing our knowledge and skills, ensuring that we are at the forefront and cutting edge of our profession has never been so critical.” L

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FOR MORE INFORMATION For more information and to register to attend Emergency Scotland 2011 call 01273 453033 or visit www.emergencyscotland.com For further information on the Symposium please visit www.epsresiliencesymposium2011.org

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

99


PEAK

PERFORMANCE For optimum performance in demanding conditions, Houghton metalworking fluids lead the way. Tool life measurements in new independent titanium milling tests show Hocut 795B as the top performer amongst all leading aerospace coolant technologies. With its ultra long life, economy in use, versatility for all materials and array of global approvals it’s not surprising that Hocut 795B is the world’s best selling aerospace coolant. For more information on Houghton products or details of the titanium machining research contact us via our website or call our Customer Services desk on +44 (0)161 874 5000.

www.houghtonglobal.com

Fluid Technology & Service Worldwide

Houghton Plc, Beacon Road, Trafford Park, Manchester M17 1AF. Tel: +44 (0) 161 874 5000 Fax: +44 (0) 161 874 5001 Email: uk.enquiries@houghtoneurope.com


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CHEMICALS

METALWORKING FLUIDS IN THE AEROSPACE SECTOR – HIGH TECH OR BLACK ART?

Metalworking fluids are essential in the manufacturing of defence and aerospace components but probably the least understood element of the process In reality the latest technology metalworking fluids are highly complex blends formulated by specialist companies such as Houghton to meet a range of criteria including compatibility with materials being machined, filters, elastomers and plant make-up waters. Fluids must have the ability to deal with tramp oil contamination, high pressure application systems and at the same time ensure long sump life without being harmful to users and the environment. To deal with all this a typical, modern water based metalworking fluid is a complex blend of twenty or more additives all critical in some way to the performance, stability or safety of the product. Metalworking fluids are formulated by experienced chemists and this corner of the market for lubricants is an intensely specialist area far removed from the world of petrol forecourts and formula one imagery. RESEARCH AND DEVELOPMENT The leading metalworking fluid suppliers operating in the defence and aerospace sectors have to invest a great deal of technical resource into research and development in order to gain prime approvals for their products. Houghton is a key global defence and aerospace supplier and employs teams of chemists in laboratories around the world to formulate products for these exacting specifications. There is no margin for error with formulations; where chemical attack on sensitive materials can lead to stress corrosion and component failure. For example Houghton provides the leading water based coolant for Rolls Royce gas turbine engine production. To gain approval against Rolls Royce specification the formulation must undergo an array of chemical and mechanical tests against all materials commonly used by the company. Other primes are no less demanding, for example BAE Defence Systems insists on a similar programme of testing to Rolls Royce but also wants to see evidence that a product will not cause inter-granular corrosion of its aluminium alloys. Other primes issuing their own approvals include Airbus, Boeing, Bombardier and SNECMA in chemical specifications, which

blacklist many additives to make sure that products meet the latest demands for safety of workers and the environment. Chemistry is not the only science necessary for metalworking fluids. Houghton’s Microbiology department carries out challenge testing of water based formulations against commonly encountered bacteria. Bacteria contamination has always been a common failure mode of water based coolants but microbiology of products in use is now becoming much more important as new health guidance insists that users protect workers from exposure to bacteria laden mist. Far from purveyance of a black art, Houghton facilities provide high technology technical service support for a sophisticated range of metalworking production fluids including Hocut 795B, the world’s best selling coolant technology in the aerospace sector. Technical manager Paul Smith says: “As a leading metalworking fluid supplier to the aerospace sector, we recognise that a high level of laboratory investment is needed in both R&D and technical service. Anyone visiting Houghton laboratories in Europe will see the resources committed and the skill and attention to detail applied to our metalworking fluids. Not all metalworking fluids are the same. We spend many thousands of development hours formulating, testing and validating products before we are able to fill a single machine in this sector. Customers can be confident that our products have the necessary accreditation from aerospace primes, having passed an intense approval process on the laboratory bench and on the shop floor.” KEY SUPPLIER Houghton is one of the world’s principal suppliers of speciality metalworking lubricants and fluid management services. The company is a key supplier to Boeing and Rolls Royce and has one of the largest portfolios of approvals in the world aerospace market for high quality products including metalcutting oils and heat treatment fluids. Houghton has European production and research facilities in Dortmund, Barcelona, Rouen, Turin and Manchester. L FOR MORE INFORMATION www.houghtonglobal.com

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

101


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Renfrew Group has all the facilities in one location to take cutting edge science from the lab to market At Renfrew Group International we have all the facilities in one location to successfully take the science from the lab to the market. In a 4,000m2 complex our integrated innovation teams have at their disposal development laboratories, testing areas, in-house tool making and injection moulding and low volume production facilities. But much more than that, backed up by scientists, they have advanced skills in production engineering and the creative abilities to deliver practical, scalable innovations. Translational design – The engineering of devices to detect biohazards for example. Our early involvement in technology concepts, often before the science leaves the bench, ensures that production design and a user centred approach is factored in at the optimum stage in development. This combination of disciplines ensures a fast and effective route to market and maximises return on investment. Fast to market – Our integrated innovation process and knowledge of the clinical and regulatory environment allows a shortening of the overall time to market, reducing the time to a return on your R&D spend. Risk reduction – Concise and regular

102

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

reviews involve teams of product designers, scientists, engineers and tooling experts, accessible every day. Close contact with the key testing centres and involvement at precritical stages minimises the commercial risk. Evidence based – Our integrated innovation process is centred on testing. Research models, prototypes and simulations with user groups, gathering evidence from a perception study or multi-centred trials allow us to evaluate complex stakeholder interactions. Test rigs – The development team has direct access to workshops and labs to build and test rigs at any stage. This is critical to the process as physical models provide

a dimension of feedback for the creative engineer, which is not available via CAD and simulations. Prototypes for user trials – Engaging with multiple stakeholder groups in early user trials allows designs to be assessed more deeply than with computer simulations alone. Perception studies employing full size mock ups reveal user requirements that cannot be uncovered with any other method. Interactive design studies and in depth collaboration frequently requires multiple pre-production prototypes. RGi has state of the art facilities to seamlessly provide full R&D support to SMEs, multinationals, academic institutions and public sector bodies. Low volume production – We have precision machine tools for mould making to close tolerances and high quality moulding facilities in-house. We also have product assembly facilities for small to medium batch production of devices and equipment. FOR MORE INFORMATION Contact: Bruce Renfrew Tel: +44 (0)116 2531961 bruce@rg3.com www.rg3.com


MARITIME SECURITY

Piracy

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ACTION PLAN TO TACKLE ‘UNACCEPTABLE’ PIRACY The escalating problem of piracy off the Somalian coast is “completely unacceptable” and requires an urgent and coordinated response, according to UN Secretary-General Ban Ki-moon. The decision by the International Maritime Organization to address the issue is, he says, “timely and important” Ki-moon was speaking at the launch of an action plan to promote the 2011 IMO World Maritime Day theme: ‘Piracy: orchestrating the response’. The International Maritime Organization (IMO) is the specialist United Nations agency with responsibility for the safety and security of shipping, and the prevention of marine pollution by ships. The body says it has been combating maritime piracy for some time and a series of measures, developed with the cooperation of the littoral States and the wider industry, helped significantly reduce piracy in the hot spots of the late 1990s and early 2000s: the South China Sea and the Straits of Malacca and Singapore. More recently the problem has manifested itself off the Somalian coast. IMO secretarygeneral Efthimios E. Mitropoulos said: “Piracy and kidnapping have blighted the maritime community for too long and it is seafarers who bear the brunt. We believe that we can use the experience gained and the successes achieved in reducing piracy elsewhere to good effect in the current arena but to do so requires a well orchestrated response.” UNIFIED VOICES Mitropoulos and Ban Ki-moon were joined at the launch by Josette Sheeran, executive director of the World Food Programme; Yury Fedotov, executive director of the United Nations Office on Drugs and Crime (UNODC); Robert Lorenz-Meyer, president of BIMCO, representing the shipping industry; and David Cockroft, general secretary of the International Transport Workers’ Federation, representing seafarers. All support the IMO initiative. Fedotov said: “It is clear that the only viable long-term solution to the Somali piracy problem is to restore law and order in Somalia, including in its waters. It is also clear that this solution is some years off and will require concerted and coordinated international effort. UNODC’s counter-piracy programme focuses on supporting regional prosecutions and on rebuilding Somalia’s criminal justice capacity.” Sheeran focused on the humanitarian aspects of the problem when she noted the success of naval escorts in protecting food aid for Somalia. She also highlighted new challenges created by the worsening situation: “The presence of Somali pirates in an ever expanding area is of great concern

because they threaten not just food bound directly for Somalia, but our food transiting through the ports of Mombasa, Dar es Salam and Beira for vital operations in Zimbabwe, the Democratic Republic of Congo and other places with humanitarian needs.” Speakers at the launch of IMO’s action plan also spoke of the economic cost of piracy. “Ransom payments adding up to hundreds of millions of dollars have created a ‘pirate economy’ in some areas making them more resistant to efforts to develop alternative livelihoods. Economies throughout East Africa and beyond are experiencing the fallout,” Ki-moon commented. Lorenz-Meyer said: “The attacks are not only attacks on ships, but also on the global supply chain in one of the world’s most vital sea lanes. They threaten a supply line of vital interests to the international community.” BREAKING POINT Cockroft said many crew members were at breaking point because of the stress of passing through affected areas. “If the risks cannot be eliminated, seafarers will demand not to sail into the area at all and responsible ship owners will support them,” he said. Mitropoulos said IMO’s action plan is aimed at an escalating problem: “In the past 12 months alone there have been 286 piracy-related incidents off Somalia. They have resulted in 67 hijacked ships, with 1,130 seafarers on board. At present, 714 seafarers are being held for ransom on board 30 ships.” This year IMO will use information-sharing, coordination of military and civil efforts, and the development and implementation of regional initiatives (such as the IMOled Djibouti Code of Conduct) to promote increased cooperation between states, regions and organisations in order to reduce the risk of attacks on ships. A COMPLEX ISSUE IMO’s action plan will build on previous efforts to tackle the problem. Through the Djibouti Code of Conduct, for example, information-sharing centres are being established in Yemen, Kenya and the United Republic of Tanzania, as well as a regional training centre in Djibouti. In partnership with the UNODC, IMO is

The six primary objectives of IMO’s 2011 action plan increase pressure at the political level to secure the release of all hostages being held by pirates review and improve the IMO guidelines to administrations and seafarers and promote compliance with industry best management practice and the recommended preventive, evasive and defensive measures ships should follow promote greater levels of support from, and coordination with, navies promote anti-piracy coordination and cooperation procedures between and among states, regions, organisations and industry assist states to build capacity in piracyinfested regions of the world and, elsewhere, to deter, interdict and bring to justice those who commit acts of piracy and armed robbery against ships provide care for those attacked or hijacked by pirates and for their families helping to develop the legal framework necessary to prosecute pirates. “Although piracy manifests itself at sea the roots of the problem are to be found ashore,” said Ki-moon. “This is a complex issue. Piracy is a criminal offence driven by economic hardship. It flourishes in the absence of effective law enforcement and the only truly successful way to address the problem in the long term is through a strategy that focuses on deterrence, security, the rule of law and development.” L FOR MORE INFORMATION www.imo.org

Volume 6 | COUNTER TERROR BUSINESS MAGAZINE

103


Ballistic Absorption Barrier Systems www.babs.us.com

blocks are a revolutionary new product utilizing ‘green technology’ to manufacture a new method of protection against ballistic and blast events

During blast survivability testing conducted at the Aberdeen Test Center (Maryland, USA) a wall constructed of BABS blocks showed 99% blast attenuation

Testing performed December 2009 - US Army Aberdeen Test Center, Maryland Demonstrated at Quantico Marine Base - Virginia USA 2009

are custom designed and installed for each unique application for use in perimeter protection, embassy protection, airport security, major event security, pipeline protection, military installations, blast and ballistic protection have been designed for ease of movement and quick deployment. They are constructed to be positioned similar to building blocks. They are portable, reusable, and protective.

Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com


Ballistic Absorption Barrier Systems utilize recycled scrap tires to create blast absorption barriers for use in perimeter and check point security, embassy fortification, pipeline protection, and major event security Scrap tires are one of the world’s largest environmental problems. Hundreds of millions of tires are produced each year increasing the total number of tires worldwide. Most current applications for scrap tires involve burning or burying tires. These options can have a large environmental impact.

260

=

www.babs.us.com

At 30lbs (13.6kgs) per block, the Eco-Blok has been developed as a durable and reusable alternative to standard sandbags

Each BABS block uses 260 scrap tires

Ballistic protection Erosion control Major event security Flood control Crowd control

Military uses Civil engineering Parks and recreation Emergency response

Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service AEMS Aerospace Defence Security Group Aicontrol Point ALR Printed Circuits Alpha 3 Manufacturing Arinc Armoured Cars Axis Electronics Becrypt C-Tech Electronics C3S Projects CitySync Clement Clarke Communications Cobham Antenna Systems Codestuff Coilcraft Europe CPM Digital Assurance Consulting Draeger Safety UK DSEi 2011 Edesix Emergency Services Show EverFocus EZV Flir G6 Global Goliath Footwear Hadleigh Enterprises Hallmark Electronics Hesco Military Products Hitek Electronic Materials Houghton HyGie-Tech

8 20 60 30 22 OBC, 52 87 72 59 62 88 82 40 44 6 18 90 47 94 76 80 10 84 26 32 28 40 44 24 66 64 100 92

ICS Imperva UK Infranor Innovative Concept International Kromek LG Motion Logically Secure M86 Security Mercian Labels MiniTek UK Mira ML Electronics MSA Britain Oakleigh Cases Optosecurity Paragon Electronic Components Parat UK Phoenix Components (UK) Proengin Prosync Qosmos Renfrew Group Richard Paul Russell Samsung Techwin SP Services UK ST Electronics Transport Security Expo Triteq Unitemp Wearnes Cambion Xpect Software Zaun

P ONLINE P IN PRINT P MOBILE P FACE TO FACE

http://www.counterterrorbusiness.com 106

COUNTER TERROR BUSINESS MAGAZINE | Volume 6

86 54 74 104 16 36 42 48 2 36 IBC 34 98 99 14 4 46 74 12 85 57 102 40 78 96 46 38 70 18 58 50 68


Smarter Safety Technology. MIRA offers the complete range of testing and product development services to meet PAS 68 and ASTM F2656. We have unique computer simulation capabilities, product development expertise and a full scale crash test facility to provide solutions from concept design through to product certification.

MIRA’s ‘Mace 2’ Unmanned Ground Vehicle. A multi-application platform capable of taking people out of harm’s way by fulfilling a number of roles currently requiring human input.

Barrier: Heald Roadblocker (30)

For further information, please contact: Lee Thompson Business Development Manager Safety Engineering MIRA Ltd Watling Street, Nuneaton, Warwickshire, CV10 0TU UK T: +44 (0)24 7635 5000 F: +44 (0)24 7635 8000 E: lee.thompson@mira.co.uk

www.mira.co.uk


Security is not just something we do at ARINC–it’s part of who we are For years, we’ve helped develop and implement solutions for commercial, government, and defense industries to help strengthen security around the globe. Whether it’s sending and receiving information securely, providing mobile wireless networks, supporting systems that guard nuclear power plants, or developing the latest biometric tools, ARINC delivers. As a capabilities-driven company with communications, engineering, and integration as our core competencies—you can trust us to handle your greatest security challenges.

arinc.com/secure


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.