www.counterterrorbusiness.com | ISSUE 7
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY
COUNTER TERRORISM Norway attacks expose flawed European strategy
CYBER SECURITY
Tackling online crime as well as threats to national security
FIRE SAFETY | AVIATION | PERIMETER SECURITY | TRANSPORT SECURITY
COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 7
COUNTER TERRORISM Norway attacks expose flawed European strategy
CYBER SECURITY
Tackling online crime as well as threats to national security
FIRE SAFETY | AVIATION | PERIMETER SECURITY | TRANSPORT SECURITY
Comment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WELCOME The recent terror attacks in Norway showed that hotbeds of right-wing extremism continue to exist in Europe. To many, the events acted as a wake up call to the threat of homegrown radicalism and we must now take stock and discuss how to work to prevent such violence from happening again. Chris Yates takes a look at multiculturalism and extremism, and Europe’s flawed counter terrorism strategy on page 11. How can you use your fire alarm as part of a counter terrorism strategy? Risk assessments and business continuity plans should be in place, and together with a good fire management plan this can go a long way in helping secure buildings after a terrorist attack, says the Fire Industry Association on page 27. Enjoy the issue.
Sofie Lidefjard, Editor editorial@psigroupltd.co.uk
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit the Counter Terror Business website at:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITOR Sofie Lidefjard ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman SALES ADMINISTRATION Jackie Carnochan, Martine Carnochan ADMINISTRATION Victoria Leftwich, Alicia Oates GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
© 2011 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
03
Smarter Safety Technology. MIRA offers the complete range of testing and product development services to meet PAS 68 and ASTM F2656. We have unique computer simulation capabilities, product development expertise and a full scale crash test facility to provide solutions from concept design through to product certification.
MIRA’s ‘Mace 2’ Unmanned Ground Vehicle. A multi-application platform capable of taking people out of harm’s way by fulfilling a number of roles currently requiring human input.
Barrier: Heald Roadblocker (30)
For further information, please contact: Lee Thompson Business Development Manager Safety Engineering MIRA Ltd Watling Street, Nuneaton, Warwickshire, CV10 0TU UK T: +44 (0)24 7635 5000 F: +44 (0)24 7635 8000 E: lee.thompson@mira.co.uk
www.mira.co.uk
CONTENTS 07 NEWS
43 BORDER CONTROL
63 MILIPOL
11 COUNTER TERRORISM
The key to effective security is to verify the legitimacy of a journey before departure
Milipol Paris is the major technological showcase for products and services in the public and industrial sector
45 POLICE & LAW ENFORCEMENT
71 DEFENCE & EQUIPMENT
Chris Yates investigates what the Breivik attack in Norway says about European counter terrorism strategy Tony Stead takes an in depth look the terrorist organisation Hamas, including overseas operations and recruitment methodologies
21 CYBER SECURITY The birth of new technologies and the internet has transformed everything about our society for the better. But with it comes risks, warns Francis Maude, Cabinet Office Minister leading on cyber security
27 FIRE SAFETY What is the role of fire protection during a terrorist attack, asks the Fire Industry Association The Association for Specialist Fire Protection highlights what needs to be considered during a fire risk assessment in a complex fire engineered building
37 PERIMETER SECURITY The Perimeter Security Suppliers Association describes some of the concerns that have come out of recent work with the security industry and end-users, and some of the solutions now in the pipeline
How can law enforcement agencies and police forces overcome IT barriers to achieve fast and effective information sharing?
49 AVIATION Chris Yates examines a shift in government policy from a system of prescribed security controls protecting air travellers, to an outcome-focused risk-based approach AVSEC World allows global leaders and senior decision makers to discuss strategies and find solutions for the aviation industry
55 COMMUNICATIONS & TECHNOLOGY Experts from Kingston University share their newly developed technology to ensure breakdowns in communication are a thing of the past
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Defence and Security Equipment International provides an opportunity to meet the whole defence and security supply chain
85 TRANSPORT SECURITY Transport Security Expo gathers the world’s leading experts from the areas of aviation, air cargo, maritime, and supply chain security
91 PORT SECURITY At International Port Security key senior policy and decision makers will meet and discuss the global port security challenge
92 EMERGENCY SERVICES The Emergency Services Show attracts a vast array of exhibitors, traders and area demonstrations
57 IP SECURITY Research suggests that security spend is on the rise across Europe, especially in the area of network/IP video surveillance
Counter Terror Business
www.counterterrorbusiness.com Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
05
shephard.co.uk/events
13th Exhibition & Conference 19-20 October 2011 FIVE at Farnborough, UK
Why should you attend as an exhibition visitor? > See the latest equipment > Hear about the latest developments in this fast-paced market > Outside static helicopter display > Make new contacts ranging from the supply chain to the end user > Heli-Power is the place to conduct business > It’s free to attend as an exhibition visitor
Free exhibition. Register now at www.smartregister.co.uk/events/shephard 240
W
270
N 300
Sponsors and supporting organisations at 15 July 2011
At:
Official Media:
Organised in association with:
Lead Sponsor:
Media Partners:
Sponsors:
330
0
30
60
E
90
120
AIRPORT SECURITY
New software further enhances passenger privacy at airports The Transportation Security Administration (TSA) will begin installing new software on its millimeter wave Advanced Imaging Technology (AIT) machines. The upgrades are designed to enhance privacy by eliminating passenger-specific images and instead use a generic outline of a person for all passengers. “Our top priority is the safety of the travelling public, and TSA constantly strives to explore and implement new technologies that enhance security and strengthen privacy protections for the travelling public,” TSA administrator John Pistole said. “This software upgrade
enables us to continue providing a high level of security through advanced imaging technology screening, while improving the passenger experience at checkpoints.” The new software automatically detects potential threats and indicates their location on a generic, computer-generated outline of a person that appears on a monitor attached to the AIT unit. As with the current version of AIT, if a potential threat is detected, the area will require additional screening. If no potential threats are detected, an “OK” appears on the monitor with no outline, and the passenger is cleared.
News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NEWS IN BRIEF New chief executive for UK Border Agency appointed Rob Whiteman has been appointed the new chief executive of the UK Border Agency. He is currently the MD of the Local Government Improvement and Development Agency, and has extensive experience of public service. He was chief executive of the London Borough of Barking and Dagenham for five years, and was previously the deputy chief executive for the London Borough of Lewisham. Home Secretary Theresa May said: “This is a hugely important post. Protecting our border effectively is absolutely critical to the work of the Home Office. Rob brings a wealth of experience to the department and I look forward very much to working with him.” TO READ MORE PLEASE VISIT...
www.counterterrorbusiness.com/n/004
Technology to help protect NYC against ‘dirty bombs’
NATIONAL SECURITY Stolen passports pose threat More than 1,000 Canadian passports are stolen across the country every month, new figures reveal. Passport Canada’s latest annual report says 13,077 passports were stolen in the fiscal year 2009/10. By comparison, only 631 were swiped overseas. “Over the last three years, the number of passports reported lost/ stolen has remained consistent at about 0.3 per cent (of the total number of valid passports),” Beatrice Fenlon, spokeswoman for Passport Canada, said. The Canadian Security Intelligence Service (CSIS) says terrorist groups engage in crimes including passport forgery to raise money. In 2006, the Royal Canadian Mounted Police claimed about 50,000 Canadian passports lost or stolen in the four previous years were suspected of falling into the hands of criminals or terrorists.
Report highlights US homeland security progress The Department of Homeland Security (DHS) has published a report highlighting the progress that DHS, along with its partners, have made in fulfilling specific recommendations by the 9/11 Commission seven years ago. The report details advancements in strengthening and evolving the homeland security enterprise to better defend against evolving terrorist threats. “Ten years after the September 11, 2001 attacks, America is stronger and more resilient than ever before, but threats from terrorism persist and challenges remain,” said Secretary Napolitano. “Over the past decade, we have made great strides to secure our nation against a large attack or disaster, to protect critical infrastructure and cyber networks, and to engage a broader range of Americans in the shared responsibility for security. We recognise and thank the many men and women of DHS, all of our partners, and the law enforcement officers and emergency management professionals who work on the frontlines everyday protecting America, at home and abroad.”
The New York City Police Department is testing ground-breaking counter terror technology to help law enforcement prevent a “dirty bomb” attack. Officials say 2,000 officers will carry radiation detectors around the city, sending real-time wireless alerts to a Manhattan command centre. “This is the first and only place you’ll see it,” said Jessica Tisch, an NYPD counter terrorism official. “It’s been tested in the field. It works, and we’re hoping to get (the wireless detectors) deployed in a few months.”
DOD launches new cyber strategy website US Department of Defense has launched a new website to highlight DoD’s first unified strategy for cyberspace announced 14 July. The website is a tool to help explain and consolidate DoD’s cyber security accomplishments and new way forward for military, intelligence and business operations in cyberspace. The new website is designed to help users explore the five pillars of DoD’s cyber strategy: treating cyberspace as an operational domain; employing new defence operating concepts; partnering with the public and private sector; building international partnerships; and leveraging talent and innovation. Additional content on www.defense.gov/cyber includes links to cyber security jobs in government, key news items, press releases, and video of discussions on cyber security.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
07
Servo Connectors now has a fully QPL’d assembly area and is offering D38999 Series 1 and 111 on a 3/5 day lead time incorporating shells with the following finishes Olive Drab Cadmium Olive Drab Zinc Cobalt Electroless Nickel Black Zinc Nickel Stainless steel
Please request details
News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COMMUNICATIONS
Dedicated broadband spectrum needed to achieve 21st century communications system The ability of first responders to communicate with one another across jurisdictions and agencies has improved significantly since 9/11 but will remain incomplete without dedicated broadband spectrum that can transmit large caches of data, witnesses have told the Homeland Security and Governmental Affairs Committee. Committee chairman Joe Lieberman and senator John McCain have introduced legislation that would dedicate the so called D Block bandwidth to first responders. A similar bill has recently been reported out of the Commerce Committee and is headed to the Senate floor. Lieberman said: “In an age when the weather, not to mention extremist and terrorist groups, is so unpredictable, dedicated spectrum is essential. If the D-Block legislation passes, that would be a giant leap forward for the ability of first responders to do what we ask and need them to do every day in cities and states across the country.” In its 2004 report, the 9/11 Commission recommended that the federal government help state and local governments establish interoperable communications for emergency responders in response to their inability to communicate across agency and jurisdictional lines at the World Trade Center, the Pentagon,
and in Somerset County Pennsylvania. Committee ranking member Susan Collins, said: “Public safety officials should have access to state-of-the-art, interoperable communications equipment to use during emergencies. But we must be sure that resources are invested carefully and that an effective and efficient structure is established to manage emergency communications. “My own state of Maine has done a great deal to increase the ability of first responders to communicate with each other. Notably, the state has also been working with Canada to ensure that first
responders across our more than 600-mile international border can communicate with each other in an emergency.” The ‘Implementing Recommendations of the 9/11 Commission Act of 2007’, which originated in the Homeland Security and Governmental Affairs Committee, created the Office of Emergency Communications (OEC) within the Department of Homeland Security to coordinate with state and local governments on interoperability. Each state and territory now has a communications interoperability plan and a statewide interoperability coordinator.
COUNTER TERRORISM European Union to tighten rules on fertiliser sales The EU is set to impose stronger regulatory controls on the manufacture and sale of materials such as fertilisers. The announcement came following a meeting of the Council’s terrorism working party (TWP) and counter-terrorism group (COTER) in the wake of the Norway bombing. Timothy Jones, the representative of the EU counter-terrorism coordinator Gilles de Kerchove, said that a series of measures had been triggered by the meeting, including the first ever deployment of a new Europol network designed to coordinate intelligence information relating to terrorism.
OSLO ATTACKS
PORT SECURITY
Met Police to join European task force over Norway massacre
New task force helps protect against crime at the Port of Virginia
The Metropolitan Police has been invited to join an investigation into the Norway massacre that left 77 people dead and more than 90 wounded. Scotland Yard’s counter terrorism chief, assistant commissioner Cressida Dick, has been requested to supply specialist officers to join a new European task force dedicated to investigating European-wide far right links to a bomb attack in Oslo and a shooting spree on Utoeya. The request for specialist
The Hampton Roads Border Enforcement Security Task Force (BEST), dedicated to security at the Port of Virginia, has been launched. It is comprised of officers and agents from ten federal, state and local agencies, responsible for identifying, interdicting and investigating a wide variety of maritime-related crime including trade fraud, cargo theft, and the illegal smuggling of drugs, persons, currency and weapons. “Previously established seaport-based BEST teams in places like Los Angeles, New York and Miami have already had an impact on smuggling and other criminal activity in their regions,” said John P. Torres, special agent in charge of US Immigration and Customs Enforcement’s Homeland Security Investigations in Washington, D.C. “We expect to replicate
British officers to aid the Norway investigation has been made by the European law enforcement agency Europol. It is drafting in senior counter terrorism experts from a number of European countries to work in its headquarters in The Hague. Rob Wainwright, Europol’s director of operations, said: “As soon as it happened we opened our operational centre to connect the investigation with an international platform of counter terrorism analysts.”
that success in Hampton Roads, and will work with our partners to combat the criminal and terrorist organisations that might seek to exploit the Port of Virginia’s large cargo volumes to commit maritime-related crimes such as smuggling.” 21 BESTs currently exist throughout the US at major gateways like the Miami Seaport, the Southwest Border and the New York Seaport/Canadian Border.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
09
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Written by Chris Yates, Principal, Yates Consulting
OSLO ATTACKS
THE EMERGING ULTRA RIGHTWING EXTREMIST Has the Breivik attack in Norway exposed a flawed European counter-terrorism strategy? Chris Yates investigates Politicians like to tell us they have everpresent oversight on the threats we face. It’s one of those comfort blanket statements trotted out to keep the great unwashed from asking awkward questions. But every so often something happens that rips the veneer away and exposes the ineptitude of those who profess to
be in touch with day to day reality. Anders Behring Breivik ripped that veneer away in late July, when he set about methodically slaughtering 77 members of Norway’s present and future political elite, in an excruciatingly long four-hour rampage against multiculturalism at home and abroad. As grim television pictures revealed scenes
Breivik is said to be the kind of extremist that law enforcement agencies have feared emerging in the region for some time. His direct action has inevitably turned him into the new poster-boy of the European ultra right-wing movement.
reminiscent of the carnage wrought on New York, Madrid and London during this past decade, it came as a shock for many to learn that the unfolding horror was not islamist inspired, but rather the equally deadly work of an ultra right-wing extremist. A RISING FORCE Breivik is said to be the kind of extremist fanatic that European law enforcement agencies have feared emerging in the region for some time. His direct action has inevitably turned him into the new poster-boy of the European ultra right-wing movement. Law enforcement agency fears must now be compounded by the possibility that others may be inspired to follow suit. Europol moved quickly to establish an expert task force to aid northern European countries in investigating right-wing terrorism in the aftermath of the killings. The agency warned that such groups are getting more aggressive and professional in the way they attract others to their cause. Europol’s rapid move underscores that the well documented rise in xenophobic sentiment and consequent danger it represents, has been largely overshadowed by the ever present threat from beyond regional borders. DISCONNECTED DOTS Unclassified versions of the last three Norwegian Police Security Service (PST) reports assessing the threat to national E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
11
Complete manufacturing solutions from one manufacturer – Endless possibilities ANR offer in house manufacturing facilities to develop and build complete products for many Industries including the security, surveillance and access control markets. An ISO approved company, established for over 20 years, specialising in low to medium production volumes, offering design support through to full production and supply solutions, ANR have a proven, positive track record for developing concepts through to realisation.
Manufacturing facilities include in house electronics assembly (PCB’s / Cable Assemblies / Turn Key Box Build) CNC Milling and Turning, over moulding, test capabilities as well as final product packaging and logistics. Whether clients are looking for ‘me too’ manufacturing, cost reductions, quality improvements or new project support – ANR are the ideal partner. Offering a high quality, low cost and fast turn around service our flexible operations ensure a reliable manufacturing partnership.
Final Assembly / PCB’s / Cable Assemblies / Over Moulding / Engineering.
Five Divisions. Five Solutions. For any of your Electronic and Engineering requirements please contact our sales team ANR Manufacturing Limited. Unit 1, Jackson’s Industrial Estate, Wessex Road, Bourne End, Buckinghamshire SL8 5DT
Telephone: 01628 819157 Email: sales@anrltd.com Web: www.anrltd.com
OSLO ATTACKS due largely to resource issues switching the focus of attention elsewhere.
For the past decade our security services have been heavily geared towards AlQaeda and Northern Ireland, which has left a real gap in their coverage of the far-right. Scandinavian countries have also been involved in Afghanistan and Iraq and their security services have the same problem. E wellbeing, played down any threat by right-wing and nationalist extremists. Instead, the reports emphasised the dangers posed by radical islamist groups. The most recent of these reports, released earlier this year, concluded that far-right and far-left extremist communities will not represent a serious threat to Norwegian society. Matthew Goodwin, a lecturer at the University of Nottingham in England and an expert on far-right groups, says that the focus on islamist extremism had let other extremists go neglected. “For the past decade our security services have been heavily geared towards AlQaeda and Northern Ireland, which has left a real gap in their coverage of the farright. Scandinavian countries have also been involved in Afghanistan and Iraq and their security services have the same problem,” he told the AFP news agency. Much the same can be said for the
very many other European countries who have either been actively involved in or provided political support for the various campaigns against islamist terrorism since the events of 9/11. A theme now becoming eerily familiar is that in looking outward to perceived threats beyond national and regional borders, potential internal threats are being dismissed due largely to cultural difference and biased systemic failure. Norwegian intelligence has confirmed widespread press reports that Anders Behring Breivik was on their radar. He was flagged by the customs service earlier in the year, over a consignment of certain chemicals purchased online from Poland. The intelligence service apparently determined that no further action needed to be taken. Similarly, the islamist extremists behind the 7/7 attacks in London had been on the intelligence radar both individually and collectively, but no further action was taken
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
RHETORIC OF TERROR Politicians are not generally noted for subtlety and have a tendency to spill forth with rhetoric and action whilst giving little thought for the possible consequence. German Chancellor Angela Merkel, British Prime Minister David Cameron and President Nicolas Sarkozy of France have all recently declared an end to multiculturalism in one form or another. Merkel told fellow Christian Democrats last October that multiculturalism had “utterly failed”. Mr Cameron declared that multiculturalism had encouraged “segregated communities” where Islamic extremism can thrive at a conference in February. Mr Sarkozy resorted to banning Muslim women from wearing the Hijab in April. How such messages play out on the domestic and international stage is a matter of considerable debate. Whilst they may play well amongst those who subscribe to the allegedly populist debate on internal and external immigration issues, they may also send a quite different signal to those with a much more hostile agenda born out of hatred for people of different ethnicity. This nuance is probably lost on the multitude of special advisors and spin doctors who advise world leaders in the modern age, but it is high time it is taken into account given the febrile world we live in. LACKING PREPAREDNESS Jan Egeland, director of the Norwegian Institute of International Affairs and the former UN Undersecretary General for Humanitarian Affairs, has said that “in a population of less than five million people, it must be, proportionally, the worst act of terror in any Western country in this generation.” Abject grief has turned into deep anger amongst people across the country, with many beginning to question the level of response capability and preparedness for an event such as this. Breivik apparently chose his time and method well. Confirmed reports suggest that his attack coincided with well documented summer downtime for governmental entities including the legislature, intelligence community, health service and law enforcement. A particularly telling report states that Oslo had no police or military air cover over the legislative quarter of the city at the time of the bombing. Media helicopters hovered over Utoeya and witnessed the shooting spree on camera. Police and military air, water and road assets allegedly took between 60 to 90 minutes to respond. Norway can be considered a relative backwater in geopolitical terms, but events over the past few days have demonstrated that it is no less immune from acts of terrorism. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
13
Protecting the worlds’ most demanding security environments Synectics has over 20 years experience designing, engineering and manufacturing specialist surveillance and recording systems for the worlds’ most demanding security environments. We offer government and enforcement agencies the technology advantages they need to observe and monitor borders, city centres, critical assets and military targets from a safe distance. Our advanced technology products operate in a wide range of fighting vehicles from tanks to troop carriers, and are also deployed in public rapid transit, airport, port, and border applications. Synectics advanced surveillance solution, with integrated monitoring, recording, command and control, and intelligent video analytics, is engineered to meet the pressing demands of airports and ports. By interfacing leading third party access control, fire, radar and behaviour recognition alarm systems directly into our Synergy™ user interface, security operators can quickly and efficiently identify and respond to threats to better protect the passengers, staff and critical assets. Synectics has engineered and installed its enterprise-class surveillance solution in key city centres in the UK, Middle East, Europe, South Africa and North America. Our success in public security is based on delivering large-scale, integrated solutions that combine exceptional reliability and picture quality with flexible, scalable and user-friendly Synergy™ command and control software.
Synectics' latest family of ESM sensor systems gives unrivalled capability and versatility in a genuinely body-worn form. With size, weight & power ever critical to the warfighter, Synectics have developed the world’s smallest full-featured ESM sensor suite. Replete with a unique and uncomplicated user interface, critical and timely tactical intelligence is delivered to the mobile soldier. The modular design approach allows a range of sensor configurations to be deployed: from the simple body-worn alerter, through to a comprehensive and sophisticated networked signals analysis system. Lightweight, Small and portable operates in small Bergen. HandHeld console for on-the-march-use
CHILI BODY-WORN ESM
Powerful software tools enable detailed analysis
Simultaneous listening & recording of up-to 16 channels with 22 MHz wideband stare and scan rate of 1GHz/
Configurable alarms and alerts shown visually and/or audibly
Simple HMI allows soldiers, as well as SIGINT experts, to obtain signals intelligence
synx.com/chili
sales@synx.com | www.synx.com
ISLAMIC RESISTANCE MOVEMENT
TERRORIST ORGANISATION PROFILE: HAMAS Risk and security expert Tony Stead looks at the past, present and future strategies of terrorist organisation Hamas, including overseas operations and recruitment methodologies Following the intifada of December 1987 Hamas (Harakat al-Muqawammah alIslammiyya) became established as the political arm for Muslim Brotherhood activities in the West Bank, where Hamas members began actively promoting an uprising against Zionist Israel. In 1988 the founding charter of Hamas commits the organisation to the destruction of Israel. The Charter states that the “land of Palestine has been endowed to Islam, and it is therefore the duty of all Muslims to liberate Palestine through violent jihad,” (Tamimi, 2007:5). Hamas is a violent outgrowth of the Muslim Brotherhood, an Islamist transnational movement which is the largest political opposition organisation in many Arab states, (Moss, 2009:1). Hamas won the Palestinian Legislative Elections in 2006 ousting Fatah in the Battle of Gaza in 2007. Fatah, a major Palestinian political party, also seek the complete liberation of Palestine and eradication of Zionist economic, political, military and cultural existence. Since the Battle of Gaza Hamas and Fatah both claim to be the Palestinian National Authority government although reality sees Hamas control Gaza and Fatah control the West Bank. Neither group recognises legitimacy within the other. PEACE ROAD MAP In 2002 the international community sought to resolve the Israeli Palestinian conflict by proposing a ‘quartet’ of international entities; the United Nations, the European Union, the United States and Russia. The proposal included a ‘road map’ for peace presented by US President Bush (Tristam, 2007:1) which introduced a framework for progress towards lasting peace in the Middle East. The road map was designed to implement peace and was thoroughly dependent upon metamorphosis in three key areas. Firstly, that the high levels of misgiving between EU/Israel and UN/Israel is to be substantially reduced. Secondly, recognition that reliance upon the quartet to insure and enforce against acts of terrorism lacks credibility due to failure
to disarm Hezbollah. Finally, that required cultural changes including the incitement of hatred require sweeping innovation from stakeholder leaderships, (Steinberg, 2002:1). Hamas political intent remains unchanged since the publication of their Charter in 1988. The 23 years since Hamas inception has seen war, political success and elevation in prominence for this Islamist group whose unfaltering belief in their cause remains unabated. POLITICAL INTENT Recent rhetoric remains as vitriolic as ever. Fendel (2011) reports of Hamas teaching ‘Destroy Israel’ lessons in Gaza schools referring to Hamas parliamentarian Yihye Mussa’s visit to Khan Yunis high school in January 2011. One of the teachers who also addressed the students requested that they study well, because “this is the best weapon on the way to victory and liberation” (www.israelnationalnews.com). On 25 January 2011 two Qassam missiles were fired at a Negev kibbutz despite Gaza’s Hamas leaders pledging support for the ‘national consensus’ truce and deployment of forces to the border. No injuries were reported, (Gedalyahu, 2011:1). On 31 January 2011 a Grad rocket from the Hamas-ruled Gaza Strip hit the southern Israel town Netivot, followed shortly by a second grad rocket that hit the city Ofakim. There were no injuries reported (Benari, 2011:1). Both events accompanied by numerous tit-for-tat aggressive exchanges reaffirm and highlight the continued drive by Hamas to attack Israel. That Israel responds militarily arguably fuels justification for the next wave of Hamas attacks. In recent rhetoric during 2010/11 Hamas has displayed increased aggression reinforcing the unwavering and continued demands for the total withdrawal of Zionists from Palestine remains unchanged. In January 2011 Hamas’ political deputy stated that the: “West Bank will not put up with Palestinian Authority much longer,” (Marzouk, 2011:1). Marzouk continues that there will only be Zionist discussions providing all Palestinian groups are invited
to negotiate. Commenting on the stance of USA, Marzouk states that USA has “realised the error of its policy” and has no option but to recognise the need for negotiations stating that it would be impossible to isolate Hamas from the Palestinian issue.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CURRENT GOALS By 2007 suicide attacks in Israel had diminished considerably, but Gaza and the West Bank are entirely walled off economically from Israel. The “abject poverty” Bush referred to in his quartet address remain a fact of daily life for many Palestinians, who must contend with unemployment and severe restrictions on movement (Steinberg, 2002). Palestinians travelling within the West Bank were said to face 542 obstacles, 83 of which are guarded by soldiers, compared with fewer than 400 a year ago (Fisher, 2006:1). A ceasefire brokered by Egypt lasted 26 weeks from June to December 2008, the collapse of which led to the Gaza War on 27 December 2008. In 2009 political violence in the form of physical assaults, torture and executions of Palestinians suspected of collaboration with the Israeli Defence Force or Fatah took place. Hamas denied any connection to these events (Toameh, 2009). By 2010 the Palestinian militancy campaign 13 groups coordinated by Hamas to derail the Palestinian Authority/ Israeli peace talks, declared advanced preparedness of all options for highest level, more effective attacks (Weiss, 2010). BICOM (2011) reports that latest gestures from the quartet are to include reviving discussions on the Gaza Marine gas field, to approve in principle to supply offshore gas to Gaza power plants and approved projects, whilst extending the Palestinian Authority security presence in the West Bank. BICOM acknowledges the recent improvement in relations between Israel/ Palestine seeing an increase in construction work and goods entering the strip. Hamas continues to display an aggressive and unfaltering stance in its demands for an uncompromising Palestinian state. Indications of a much harder line by Hamas leadership are reinforced by the adoption of expressions of genocidal intent in its war against Israel and the Jewish people (Halevi, 2011:1). Rumours that Hamas has embraced the toppling of Mubarak in early 2011 and continues to fuel the instability in Egypt are yet to be officially confirmed. Various websites are reporting Hamas cross-border activities in support of the Egyptian Muslim Brotherhood as the Egyptian police are no longer patrolling the Rafah border. The Muslim Brotherhood has reportedly engaged in national demonstrations whilst conducting people’s committees to protect public property whilst also coordinating demonstrator activities whilst providing refreshments and first aid (www.stratfor.com). To achieve its desired aim, Hamas E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
15
ELECTRONIC MANUFACTURING ELECTRONIC MANUFACTURING AND DESIGN SERVICES AND DESIGN SERVICES
In partnership with 42 Technology ELECTRONIC In partnershipMANUFACTURING with 42 Technology AND DESIGN SERVICES
We provide
provide In We partnership with 42 Technology • SMT & Through Hole PCB Assembly
• SMT & Through Hole PCB Assembly
• Complete We provideProduct Build • • • • • • • • • • • •
• Complete Volume ProductManufacturing Build Low/Medium SMT & Through Hole PCB Assembly • Low/Medium Volume Manufacturing BGA/µBGA Placement & Inspection Complete Product Build Test Solutions/JTAG/AOI • BGA/µBGA Placement & Inspection Low/Medium Volume Manufacturing Product Design & Development • Test Solutions/JTAG/AOI BGA/µBGA Placement & Inspection Electronic Circuit Design • Product Design & Development Test Solutions/JTAG/AOI Software & Firmware Product DesignCircuit & Development • Electronic Design
To yourCircuit Quality, Flexibility • meet Electronic Design • Software & Firmware &• Delivery Softwaretargets & Firmware
To meet your Quality, Flexibility To meet your Flexibility & Delivery targets Call our salesQuality, department today & Delivery targets
01234 266300 Call our sales department today
Call our sales department today www.britonems.co.uk
01234266300 266300 01234 www.britonems.co.uk www.britonems.co.uk
KM85790
Briton EMS Ltd 4 Shuttleworth Rd Elms Industrial Estate KM85790 Bedford • MK41 0EP
KM85790
Briton EMS Ltd [e]: sales@britonems.co.uk Briton EMS Ltd 4 Shuttleworth Rd 4 Shuttleworth Rd Elms Industrial Estate Elms Industrial Estate Bedford Bedford • MK41 0EP • MK41 0EP [e]: sales@britonems.co.uk [e]: sales@britonems.co.uk
ISLAMIC RESISTANCE MOVEMENT E continues to utilise any tool of terror in pursuing its aims including hostage taking, bombing and armed assaults. METHODS OF ATTACK Since September 2000, Hamas is reported to have conducted hundreds of attacks targeting civilians including foreign residents, workers and students and Israeli citizens. There have also been repeated attacks on Fatah members (Ein, 2009). Preferred methods of attacks have included rocket and mortar attacks, with drive-by shootings increasing since 2009. Kafile (2010) indicates the development of a new Hamas strategy importing terrorist death squads from its ranks in Syria and Lebanon, such squads are unknown to Israeli security forces. Evidence indicates that Hamas targets indiscriminately against perceived enemies including random attacks on Israeli society, Fatah or believed Palestinian collaborators. Hamas present great skills and acuteness in operating within tightly monitored and controlled borders show a degree of ingenuity in devising weaponry to achieve their terror aims. Hamas’ political deputy recently declared: “Whoever thinks we are preparing for Israel’s next assault on the Gaza Strip without possessing the necessary tools is mad. We are using every possible means to obtain defensive capabilities so that we can resist the occupation forces,” (Marzouk, 2011:1). Reports emanating from Iran in January 2011 endorse Hamas claims with the speaker of the Iranian Parliament Ali Larijani quoted as stating: “It is Iran’s policy to fight against the global arrogance and support the oppressed, so we say openly that we back Hezbollah and Hamas,” (www.tehrantimes.com). RECRUITMENT Hamas recruitment methodologies are said to be brutal, aggressive and successful with techniques including radicalisation through student associations in West Bank universities and forced recruitment incorporating blackmail and inciting pressure, coercing recruits to conduct attacks (UNHCR, 2011:1). UNHCR research did not uncover any consequences for those who opt not to be recruited. According to Hamas officials, thousands of young Palestinians in Gaza have registered their names in the past month in hope of joining Hamas’ security forces (Reuters, 2011). Hamas is said to be actively recruiting in Egypt, Syria and Lebanon (Kafile, 2010:1), it is not known if there is an active recruitment drive in South America. Gaza is a closed region. Occupants are quoted reporting it being like a prison where there are no choices. Such environments create the perfect conditions for breeding and extremist mentality. Due to the difficulty of life within Gaza, it is not onerous to radicalise recruits into the ranks of Hamas. Media suggests that Hamas has been training operatives in Judea and Samaria
regions, allegedly right under the noses of the Palestinian Authority with reports that Israeli Defence Force soldiers found a complex network of tunnels and caves in regional mountains during a raid in summer 2009. Following Hugo Chavez’s ascension to power in Venezuela in 1999, Hamas have reportedly increased training activities in the region with the intention to bridge other Latin American countries (Ferrand, 2010:1). Gore (2009) adds further dimension by suggesting that the presence of Hezbollah, Al Qaeda and Hamas training camps in Venezuela, Bolivia and Ecuador facilitates training in preparation for a terrorist attack on USA. Hamas fighters are said to be motivated by both God’s reward and a social motive, an appreciation from the people he is defending (Heen, 2008). Islam rewards martyrdom with glory in this world and paradise in the next. For the 1.5 million Palestinians in the slums and refugee camps of the Gaza Strip, the question of why one of their compatriots would sacrifice his or her life to kill Israelis needs little soul-searching. One fighter is quoted as saying:“Being unable to defeat Israel is no reason to surrender,” (al-Mughrabi, 2008:1). LIVING WITH HAMAS Prolonged analysis since their 2006 election win shows that Hamas is open to negotiation and a degree of democracy within its model of governance. There has been a drive to return to more conservative Islamic customs which has impacted on the lives of women in the community with occasional cases of intimidation due to style of dress, the wearing of trousers, with the societal role of females being preferred as the keeper of the home rather than dynamic business women. Rumours are said to include that one ‘must’ stay at home, the feared female fashion police, reportedly doing rounds to remind women of more religious and traditional dress styles, have not materialised (www.bbc.co.uk). Gaza’s education system runs in accordance with Hamas beliefs, developing ideology and recruiting within learning environments. 92.4 per cent of the population, male 96.7 per cent, female 88 per cent, aged over 15 years of age can read and write. The average child is said to attend academia for 14 years, (www.cia.gov). Gaza suffers from drought, shortage of drinking water, electricity and gas. Support, including employment opportunities are said to reflect political allegiance. There are no reports of direct Hamas pressure on females although Sharia Law dictates that women loose custody of children at the ages of (boys) nine and (girls) 11. Life for disabled women, elderly or those widowed remains challenging as Hamas policies favour traditional Islamic male superiority (www.bbc.co.uk). The standard of living in 2011 is said to have made little progress since the second intifada in 2000 primarily due to Israeli
imposed access controls and security concerns impacting on labour and trade flows, industrial capacity and basic commerce.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ANALYSIS Hamas continues to show unfaltering dedication to its cause of freeing Palestine from Zionist invaders. That Hamas has gained political credibility by winning the 2006 elections, albeit a surprising and unpopular result in the West, forces the international community to negotiate with the ruling power – no matter how distasteful. In many instances international governments must breach national policies as they now negotiate with Hamas, a proscribed terrorist group. The impact of what can be deemed a successful Hamas strategy presents a stalemate in which the quartet with remaining international stakeholders have little option but to involve all militant groups within Hamas to negotiate peaceful resolution to the Israeli/Palestinian situation. Hamas repeatedly states they will not participate in discussions without representatives from all of its militant groups. Recent protest events in North Africa and the Middle East may offer the opportunity for Hamas to either exploit or re-design its philosophy in order to develop any possible advantage of events, including re-armament opportunities via Egypt, Syria and Libya. Neighboring Egypt, Syria and Lebanon remain recognised recruitment strongholds for Hamas and the Muslim Brotherhood. Hamas and Muslim Brotherhood objectives since Mubarak’s fall remain unknown. What is clear, however, is that Egypt’s military leaders are being distracted from previous security duties to deal with internal policing, politics and international scrutiny. Border controls and road checkpoints have been abandoned by the military, offering Hamas and the Muslim Brotherhood an opportunity for increased cross-border activity. This is assessed as an ideal time for Hamas to smuggle and re-arm, to recruit amongst disillusioned Egyptians and offers greater scope for petty crime on Egyptian territory, whilst allowing unrestricted cross-border redeployment of activists. Hamas’ opportunity to reconfigure at this time will likely cause concern in Israel and the West. The historic and relative stability of the region has been accepted in the past with its necessary evils on the grounds that the greater good, peace, was maintained. Should regional civil unrest persist and further governments fall, historic models show that replacement governments that are unprepared for democracy and transparency will also fail; the cycle inspires the return of civil unrest. The ball is now in Hamas’ court. There is an opportunity to recruit, re-arm and regroup, which would likely lead to a new offensive against Israel. Furthermore, there is also scope to have greater influence via regional Islamist partners like the Muslim Brotherhood. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
17
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BIOLOGICAL & CHEMICAL DETECTION
UNIQUE TECHNOLOGY PROENGIN biological and chemical detection for the field (and real life) Proengin has developed biological and chemical warfare agents field detectors using flame spectrophotometry. The wellknown and widely used AP2C has proven the capacity of that technology to be the most reliable on the field with the lowest false alarm rate and the simplest ease of use. HANDHELD CHEMICAL DETECTOR AP4C New developments such as the AP4C have extended the capacity of that technology to include chemical warfare agents and toxic industrial material in a simultaneous mode. There is no limitation in number of gas detected by the AP4C. All nerve agents, all blister agents and all blood agents can be detected by AP4C within the requirements of response time and sensitivity of NATO recommendations. The AP4C has extended the range of chemicals that can be detected by Proengin chemical detectors. All dangerous compounds containing Sulfur, Phosphorous, Arsenic and/ or HNO chemical bond can be detected in a simultaneous way. Of course, as for the AP2C, the AP4C has the capacity to work in very severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of gas and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemicals manufactured by terrorists that would not fit into traditional libraries of other detectors. Moreover AP4C will detect without upgrade new agents that will be developed in the future, as well as still not precisely known agents like Novichok agents (or non traditional agents). The response time is among the shortest on the market, but what makes the AP4C unique is the recovery time after a positive detection. The AP4C is therefore the chemical detector that has the highest level of availability of the field. AP4C has been derived on other detectors, dedicated to the following uses: • use on reconnaissance vehicles and battle tanks • use aboard naval ships • use for critical buildings and areas protection AP4C-V FOR USE ON RECONNAISSANCE VEHICLES AND BATTLE TANKS Based on the same detection technology and the same internal design, air entrance has been designed to face high wind: AP4C-V is
able to take in representative sample of the outside air, even with a direct cumulated wind and speed of 100 km/h. Data are shown on easy to understand control box or directly on the control computer of the vehicle. Sensitivity, short time to answer, low false alarm rate and short recovery time are the same as for AP4C, making AP4C-V the perfect detector for all kinds of reconnaissance missions and battle field exploration. AP4C-F FOR USE ABOARD NAVAL SHIPS At sea, ANEP-57 recommendations stipulate the availability of both fixed and mobile means of chemical detection. As AP4C is the perfect mobile chemical detector for contamination control, the use of AP4C-F provides the naval ships with reliable and efficient chemical detection. This ruggedised detector shows the same detection performances as the AP4C, with two supplementary features. It produces its consumable gas by electrolysis, thus lightening daily maintenance, and more than an alarm, is able to trigger the ventilation of the vessels, thus protecting the citadel from the chemical danger. The AP4C-F is able to be operated on open deck, with the same performances. AP4C-F FOR CRITICAL BUILDINGS AND AREAS PROTECTION National palaces, courts and parliaments are more and more equipped with fixed chemical detectors. AP4C-F, being able to be operated on naval citadels, is of course able to provide the same detection and protection on terra firma, for this kind of critical buildings. BIOLOGICAL AND CHEMICAL DETECTION The MAB is a new generation of biological field detector. MAB has the unique capacity of detecting and categorising biological particles with a proven extremely low false alarm rate and the unique capacity to discriminate dangerous or suspicious biological particles such as Anthrax spores from natural background. The very liable MAB has been designed to be mounted on track vehicles. It is insensitive to diesel exhausts. As all Proengin products, and thanks to the flame spectrophotometry technology, MAB is able to run in very severe outside conditions, shows the lowest false alarm rates (negative and positive) and requires reduced maintenance. It shows such a high level of availability. Government premises, courts and parliaments are also increasingly equipped with fixed chemical and biological detectors.
AP4C-FB combines both chemical detection as for the AP4C-F, and biological alarm as for the MAB. This detector may be associated with a radiological probe, featuring the all in one full CBRN detector. L
Images courtesy of JP. Lagiewski FOR MORE INFORMATION www.proengin.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
19
Cyber Security Written by Leon Ward, field marketing manager for EMEA at Sourcefire
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IT SECURITY
WHY EVERYONE NEEDS TO CARE ABOUT IPV6 The IPv6 transition has already begun and will continue over dozens of years affecting every organisation differently. The transition will have an impact on us all and requires some level of preparation in order to maintain the operational integrity we expect from our IT infrastructure There’s been a lot of noise around the transition to IPv6, beginning with government mandates as early as 2003, and building up to World IPv6 Day on 8 June. While lots of organisations felt mislead by the Y2K hype more than a decade ago, the IPv6 transition has been different. The IPv6 transition has already begun and will continue over dozens of years affecting every organisation differently. But one thing all organisations share is that the transition will affect us all and requires some level of preparation in order to maintain the operational integrity we expect and require from our IT infrastructure. WHAT’S DRIVING THE TRANSITION? There are various factors driving the transition from IPv4 to IPv6. The pool of available IPv4 addresses has been fully allocated to the regional Internet registries (RIRs) and is nearly depleted. US federal government agencies and departments are being mandated to integrate IPv6 into their network infrastructures. Companies serving the federal government,
the path of defining and developing the architecture and migration strategy, and have begun the actual implementation of IPv6 systems and networks. But have you considered how you’ll secure your IPv6 infrastructure? It isn’t safe to assume that your current security controls, policies and processes will protect your IPv6 environment as well as your IPv4 environment. Most security companies have lagged networking companies in introducing full-fledged IPv6 support. PROTECTING YOUR NETWORK However, even if you aren’t implementing an IPv6 network, you still need to be concerned about the transition. Most operating systems and many new printers and other network devices are IPv6 enabled, offering a dualstack configuration to support IPv6 traffic in addition to IPv4. As IPv6-enabled consumer devices such as smartphones and tablets enter your network, intended or not, you now have two potential communication channels you need to worry about. You
As IPv6-enabled consumer devices such as smartphones and tablets enter your network, intended or not, you now have two potential communication channels you need to worry about. You need to know that your security controls and policies uniformly support IPv4 and IPv6. such as defence contractors, Managed Service Providers and Internet Service Providers, have become, in effect, subject to these mandates and need to transition to IPv6 to be in compliance. Companies in industries building large-scale networks, such as major web companies and communications providers, need to implement IPv6 systems and networks to enable business growth and innovation. If you are subject to the Office of Management and Budget (OMB) or Department of Defense (DoD) IPv6 mandates or if you are in an industry that is in the process of rolling out IPv6 technology, then chances are you’ve been planning for quite some time. You may even be well down
20
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
need to know that your security controls and policies uniformly support IPv4 and IPv6. So how can you be sure your network remains protected as the industry moves towards IPv6? Start by asking your IT security vendors the following questions: • Have their solutions satisfied UK and industry required standards? In the US, for example, the government has delivered a mandate stating that if you want a technology purchased by the government then it has to be certified. There is a possibility that something similar will appear in the UK. • Can they demonstrate that their solutions work comparably with IPv4 and IPv6
traffic? For example, in the case of IPS/IDS solutions, does the product identify and block IPv6-based attacks as well as IPv4 based attacks? • Does their solution support a wide variety of tunnelling mechanisms? Tunnelling mechanisms, such as 6to4 and Teredo, are transition technologies that enable IPv6 hosts and routers to communicate over IPv4 networks. Some security tools don’t recognise such mechanisms and therefore can’t provide protection. • Can their solutions operate and be managed over an IPv6 network? It’s important that you are able to designate an IPv6 IP address to a vendor device and manage it via IPv6 in order to deploy it on an IPv6 network. • In the case of vulnerability assessment, network discovery and IPS/IDS tools, are the vendor’s security tools reliant on active vulnerability scanning? Active scanning tools may become crippled under the weight of the incredibly large number of IPv6 addresses available to search. • In the case of Firewall policies and access control lists (ACLs) that are configured to block all IP traffic, do they in fact block IPv6 traffic as well as IPv4? Some network appliances require extra configuration to deal with IPv6 and use the term “IP” to only refer to IPv4. SUPPORTING GROWTH & INNOVATION IPv6 will enable organisations to build larger, more efficient networks to support growth and innovation. The transition is well underway and every network is becoming an IPv6 network, whether we choose it or not. The transition needs to focus not only on operational issues, but security as well. Identifying controls, solutions and policies that support IPv6 alongside IPv4 is essential to maintaining your organisation’s security standards. L FOR MORE INFORMATION www.sourcefire.com
CYBER DEFENCE STRATEGIES
KEEPING AN EYE ON CYBERSPACE The birth of new technologies and the internet has transformed everything about our society for the better. But with it comes risks and a whole new way for criminals to work, writes Francis Maude, Cabinet Office Minister leading on cyber security As the Minister for the Cabinet Office, I-am is principally responsible for the public sector efficiency and reform agenda, a key part of which is the drive towards government transparency – in other words, opening up every sort of government-held information to public scrutiny and commercial enterprise. Underpinning all this, computing and the internet are absolutely fundamental. Technology on its own, however, is not enough; it needs to be underpinned by genuine confidence in its use. Confidence
that it will work, confidence that it is resilient and confidence that it is secure. Furthermore this confidence has to be shared equally by the providers of these services – the government – and the consumers of these services – industry and the general public. THE MODERN WAY It’s worth reminding ourselves how revolutionary all this is. Some of us are old enough to remember Reuters’ ticker-tape, the first fax machines and answer phones,
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
and mobiles the size of suitcases. In less than a generation we’ve gone from that to the iPhone and the internet – to being able to talk, shop, look things up, get something translated, play games, send a document, watch a movie – all on an affordable device that’s small enough to slip into your pocket. A recent McKinsey report published for the e-G8 at Deauville estimates that some two billion people – almost a third of the world’s population – are now connected to the internet, and that almost eight trillion dollars change hands each year in e-commerce. What this revolution is usually, and rightly, likened to, is the invention of the printing press. However the analogy that’s perhaps more relevant here is that of the motor car. A century ago, the invention of the combustion engine gave birth to an age of mass travel – of freedom to explore, investigate, journey far beyond our own immediate horizons. It transformed everything about our society, overwhelmingly for the better. But it also brought road accidents, and to reduce them a whole panoply of new rules and regulations. The superhighways of the internet are similarly transformative for the good, but E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
21
Industrialization of Hacking
Imperva is the global leader in data security. Thousands of the world’s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent data breaches, meet compliance mandates, and manage data risk.
Hacking has become “industrialized” with a well organized infrastructure, defined roles and responsibilities, and sophisticated attack vector automation that generate large-scale attacks of unprecedented size, speed, and devastation. The industrialization of hacking coincides with a critical shift in focus. Sensitive data is the new target. Data drives businesses more today than ever. In order to protect the business, organizations need to protect the web applications and the data. This level of defense requires the next generation web application firewall. Learn more and download the following two whitepapers: www.imperva.com/go/NG-WAF White Paper: The Industrialization of Hacking This whitepaper identifies the “Industrialization of Hacking”
White Paper: Next Generation Web Application Firewalls (NG-WAF) This whitepaper explores Imperva’s vision of next generation WAFs, or NG-WAF in three interrelated sections covering: industrialized attack mitigation, interoperability and service delivery models, and risk management. It also highlights some of the capabilities currently delivered through Imperva’s SecureSphere solution.
Protecting the Data That Drives Business®
200 Brook Drive, Green Park, Reading Berkshire, RG2 6UB United Kingdom Tel: +44 0118 949 7147 © Copyright 2011, Imperva All rights reserved. Imperva, SecureSphere, and “Protecting the Data That Drives Business” are registered trademarks of Imperva.
CYBER DEFENCE STATEGIES
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Francis Maude
A recent McKinsey report published for the e-G8 at Deauville estimates that some two billion people – almost a third of the world’s population – are now connected to the internet, and that almost eight trillion dollars change hands each year in e-commerce. E similarly need their speed cameras and crash barriers – not so as to stop people travelling, but so as to let them do so safely. CYBER CRIMINALS Amongst the greatest threats to the safety of the internet are, of course, cyber-crime and cyber-espionage. The recent spate of stories to hit the news – the attacks on the CIA, the IMF, Citigroup, Sony, Google and Lockheed Martin amongst others – have focused our attention on the risks to security that cyberspace poses. The alleged ‘hacktivist’ behind the attacks on the Serious Organised Crime Agency (SOCA) – a 19 year-old living with his mother in Essex – was arrested only recently. It’s not clear whether these high-profile cases signal a new crime wave, or simply that companies are now more confident in admitting to data losses – the stigma of the past is beginning to ebb away. But either way, they are only the tip of an iceberg. Exact figures are impossible to pin down, but a recent study suggests that cybercrime – state-sponsored, criminal, or merely mischievous – now costs the UK £27 billion annually. £2.2 billion of these losses are borne by government, £3.1 billion by individuals,
in the form of fraud and ID theft, and by far the largest portion – £21 billion – by industry, in the form of theft of intellectual property, customer data and price-sensitive information. And that’s not counting reputational damage. Though these are only rough estimates, they give an idea of the vast scale of the problem. Just as cyber-criminals act internationally, so must cyber crime fighters. Britain has finally ratified the Budapest Convention on Cybercrime, which is designed to speed up the investigation of computer crime that crosses national borders. The treaty was signed by the Foreign Secretary in May and deposited at the Council of Europe. William Hague will also be hosting an international cyber conference in London this autumn, designed to develop a worldwide consensus around what constitutes acceptable behaviour in cyberspace. WORK IN THE UK Here in Britain, our new National Security Strategy cites cyber security as a Tier One risk – one of only four, the others being international terrorism, a major industrial accident or natural disaster, and an international military crisis. Hence our new National Cyber Security Programme (NCSP), which after only five
months of preparation has now gone live, with £650m of new funding allotted to cyber security over the next four years. Designed to tackle online crime and industrial espionage as well threats to national security, it has a broad remit. New money will go to GCHQ to build on existing, world class cyber capabilities and to a new cyber defence unit within the MOD. But it will also go into the police, into developing formal training courses in schools and colleges, into public awareness campaigns, and into learning from the private sector, which is often far in advance of government in this field. POOLING KNOWLEDGE The UK government is helping facilitate what we are calling for short ‘the hub’. This will be a forum within which businesses and public bodies can put short-term commercial interests aside in favour of regularly pooling knowledge and resources for the national interest. Though banks and financial institutions already work closely with SOCA and the Metropolitan Police’s e-crime unit in this regard, and energy providers share information with the Centre for the Protection of Critical Infrastructure (CPNI), we are the first country to take this approach in such a broad and systematic way. Cyber security isn’t just about geeky teenagers sitting in their bedrooms. Increasingly it’s about hostile governments and well-organised criminal gangs. Nor is it a fringe issue, the province of techies and conspiracy theorists. It affects us all. Year by year, the internet becomes ever more integral to our society – to the way we chat, do business, learn, pay our taxes, find the best surgeon for an operation or the right school for our children. Whole new communities, businesses, ways of becoming better informed or simply having fun exist on the back of a technology that is still only twenty years old. Like for all pioneers, there’s still a long way to go, and all we can say for sure is that we will get to places that today we can’t even imagine. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
23
Developing Secure Solutions for Next Generation Communication Networks
Huawei is a leading global information and communications technology (ICT) solutions provider. Through our dedication to customer-centric innovation and strong partnerships, we have established end-to-end advantages in telecom networks, devices and cloud computing. We are committed to creating maximum value for telecom operators, enterprises and consumers by providing competitive solutions and services. Our products and solutions have been deployed in over 140 countries, serving more than one third of the world’s population.
Huawei’s vision is to enrich life through communication.
NETWORK SECURITY
COOPERATING ON SECURING YOUR NETWORK
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Developing secure solutions for next generation communication networks Recently there has been a lot of press about the potential risks we face on our networks as a result of terrorist or criminal activities. Events such as Stuxnet and the LulzSec exploits have been all over the news, which has raised many concerns related to how safe our critical network infrastructure would be under attack. A recent Detica report (2011) claims that UK industry loose in the order of £27 billion due to digital crime, with the majority of this loss being seen as the result of IP theft and espionage. What we are seeing is that it is becoming easier for criminal activity to be conducted online or in the networks that our social environment and economies have become reliant on for our day to day existence. When considering the potential for terrorism on these self same networks, it is not hard to imagine the scare tactics that could be employed by these sorts of organisations in order to generate some form of mass hysteria or propaganda that has the potential to significantly disrupt a nation. FORMS OF ATTACK Attacks could come in many forms all of which could result in significant loss or disruption; the most typical attacks often tend to be focused in the following areas: destruction, corruption, removal, disclosure or interruption. We can further analyse these attacks in order to ascertain whether they are focused on exploiting network confidentiality, integrity or availability, what has become known as the CIA model. Further analysis of network exploitation leads us to consider the source of the attack, whether this be from an external source or as the result of an insider attack. Depending on the source of the attack we will need to consider different protection methodologies to defend against the potential of a network attack. Broadly speaking we try to secure our network against these types of attacks in one of two ways, either by putting in place boundary security mechanisms or by embedding into the products the relevant levels of security authentication. But is this enough? IMPROVING NETWORK SECURITY Huawei has been working successfully with a number of key stakeholders and we believe that vendors have a responsibility to work more closely with industry in an attempt to improve network security. There are several activities that can be undertaken by the vendor community
that will support the establishment of improved network security and help to ensure that stakeholders are better informed about the products they deploy in their networks. These activities are things like in-depth analysis of the code quality and structure that will power these network nodes; understanding and gaining control of the 3rd party supply chains to gain a better understanding of potential vulnerabilities; implementing a program of ethical hacking against our own products to assess if they are able to be compromised and by improving the information assurance so that we are able to better understand how to deal with network attacks, to name but a few. Alongside this code evaluation there needs to be the assessment and analysis of the hardware components as well, identifying the product build, the security design and the capability of the product to deal with an attack. VULNERABILITIES Taking on board all the potential to identify and resolve any software or hardware vulnerabilities, we now need to understand what else must be considered that will support an improved security assessment model. This additional work, we believe, is related to understanding the potential threat
analysis, how the platform or products could be exploited once deployed in a network. There are several issues that we need to consider, some of which are under a vendors direct control and others that are outside a vendors direct control. In order to ensure we understand the full scope of the risks, vendors need to work more closely with industry to assess the end to end full lifecycle for security in order to provide improved security. At Huawei we believe that by working together in a more cooperative manner we will be better positioned to take on board the wider industry concerns related to security and this will allow us to develop improvements that will ultimately lead to a higher level of network security. L FOR MORE INFORMATION Andy Hopkins andy.hopkins@huawei.com 01295 226000 07833 082961 John Frieslaar john.frieslaar@huawei.com 01295 226000 07870 172497
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
25
You’ve invested heavily in securing your customers’ personally identifiable data, but what about your non-production environments? Using copies of production data might seem like the easiest route to mirroring how data operates in current systems, but it’s illegal and a data breach would mean irreparable damage to your reputation. Awarded UK IT Achievement of the Year 2010, Grid-Tools create purely synthetic data for use in non-production environments, taking into account appropriate referential connections and encompassing maximum coverage and combinations for the ultimate in quality test data. Rather than attempting to generate data, your staff could be putting their skills to better use whilst Grid-Tools’ software, Datamaker, identifies holes in your test data and quickly creates all of the robust data you need to rigorously test your systems. Find out how Grid-Tools can save your time and your reputation.
Visit www.grid-tools.com or give us a call 01865 884 600 and ask about getting a data quality health check. Twitter: @GridTools, Facebook: Grid-Tools Datamaker
FIRE STRATEGIES
Fire Safety
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
MEANS OF ESCAPE Where does fire protection fit in with protecting companies and personnel from the impact of terrorism, asks Robert Thilthorpe, technical manager at the Fire Industry Association One consequence of a terrorist bomb explosion is usually a fire, either caused by the blast itself or by resulting damage to the infrastructure, such as fractured gas pipes or, as happened at Glasgow airport, an attacker could drive a car into the airport to cause a fire. Either way, if a terrorist incident occurs you need to evacuate people and warn them of the incident. In the case of fire, the process of warning and evacuation is no different to that of any other incident; you need people aware and evacuating in a safe and orderly manner. Under UK Fire Safety legislation, all companies are required to provide protection from fire to staff and visitors. This involves warning of fire; means of fighting fire when appropriate; and ensuring safe evacuation of the premises in the event of a fire. A recent article in Counter Terror Business by DCI Chris Philips touched on this and posed the question of how to safely evacuate in an incident. DCI Phillips challenged the old premise of sounding the bell and everyone heads to the evacuation point. This could put your staff in more danger if it is a multiple attack, which we will look at a bit later. RISK ASSESSMENTS Counter terrorism strategies should be risk assessed, which is exactly what you have to do for your fire safety strategy. In complex buildings we have staged fire alarms and evacuations practice, so it would seem logical to extend that to evacuation for a terrorist attack. In the UK, insurance related property protection reasons aside, the legislative requirement for fire protection is for protecting the means of escape. The current British Standards and codes consider the protection of the means of escape in terms of its resistance to fire, not necessarily to explosions and most definitely not from projectiles (bullets/shrapnel). I’m by no means suggesting that when the fire engineer or fire risk assessor is looking at the fire protection of a building they should be putting this at the front of their decision process. However, if you are looking at this from the business continuity and protection of your staff, you need to consider what steps to take if the attack compromises the fire protection of the means of escape. When considering the emergency evacuation plan if such an incident were to occur, it is worth asking the following questions: • What if the incident compromised the water supply to the sprinkler or watermist system? • Could the limited system provide sufficient
protection to ensure everyone leaves the building safely? • Will the system prevent the fire from spreading to adjacent properties? • If the structural protection of the building is compromised, will it hold back any resulting fire for the required period of 60 or more minutes? Most competent fire strategies allow for multiple escape routes from a building and this should be the same in a terrorist incident; the fire escape plan should be synonymous with the terror escape plan. When you have your fire escape drill, consider using this to train your staff for other emergency events, simultaneously. INTEGRATED SYSTEMS Modern fire detection and alarm systems (FD&A) use intelligent technology and are, more often than not, integrated into the building management system. It is worth asking how you can use the fire alarm as part of your counter terrorism strategy. Similarly, the management of Voice Sounders, Public Address Voice Alarm fire alarm systems (PA/ VA), and Mass Notification Systems (MNS) are all part of the modern fire alarm system. All of these can be used to warn staff about incidents other than fire; let’s face it, for years fire alarm systems have been used in schools for class change notification. Voice Sounders can be pre-programmed with specific messages so one of those can relate to the evacuation. If your building has two or more staircases that are used to evacuate personnel, then the message can direct them to the most appropriate one, depending on the threat. So, if the incident is centered on the northern side of the building, then the message can direct staff to a safer escape route on the south side. In some cases it may be better not to evacuate at all, for example, people evacuating from a modern high-rise glass clad building may be at greater risk from falling glass if nearby explosion shatters the glass. During a terrorist attack or some other unexpected event, instructions need to adapt to the threat. Voice Alarm systems have the ability to override the standard messages to cater for a specific risk/alert. A particular advantage of a Voice Alarm FD&A system is that these systems are typically robust, with multiple signal paths and power supply unit redundancy. This will be the same type of characteristics required of a Mass Notification System. The use of fire alarm systems as part of a mass notification is being recognised in standards and codes, for example, in the USA, NFPA 72, National Fire Alarm and Signalling
Code was amended in 2010. In this Code, chapter 24 covers Emergency Communications Systems and sets out the requirements for the installation and operation of such systems. The Code defines an In-building Mass Notification System as providing live voice and pre-recorded localised messaging within an individual protected building, areas surrounding the building and other outdoor designated areas, for the purpose of notifying and instructing occupants in an emergency. At an International level, IEC 60849 covers standards for sound systems for emergency purposes. European (EN) and UK (BS) Standards will follow. Also, in the USA, UL 2572 allows products used in such systems to be tested and certificated. HOW DOES IT WORK? So, how do these systems actually work? The MNS integrates into the FD&A system and manages the audio and visual notification appliances for both fire and MNS, and then reports trouble and supervisory signals through the fire alarm system. The system uses the existing FD&A audio and visual devices with supplementary MNS visual devices, and extra audio for extending the system outdoors, if required (in a university campus, for example). A dedicated microphone for the MNS will E Rob Thilthorpe
About the FIA The FIA is a not-for-profit trade association which promotes professional standards in the UK fire safety industry. The Association was formed in April 2007 out of a merger between two longstanding and well-respected trade associations, FETA and BFPSA.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
27
Design, manufacture and supply of plastic components With many years of experience, customer focus and innovation we are able to help our customers in our core areas of design, manufacture and sales of plastic and metal fasteners. Visit our website today for full product details, order a catalogue or samples and download 3D models.
www.richco-int.com Richco International Co Ltd Richco House, Springhead Enterprise Park, Springhead Rd, Gravesend, Kent DA11 8HE UK
tel: +(44) 1474 327527 fax: +(44) 1474 327455 email: sales@richco.co.uk web: www.richco-int.com
With over 100+ years combined industry experience; we at TBS have been supplying our unique design services across all industry segments from defense to telecoms since 1998. From concept through to manufacture, we at TBS can integrate at any stage into your design process. By providing pure PCB layout capability to full schematic entry library development to board manufacture we at TBS will work closely with your design team supporting your process. Our specialist knowledge ranges from high-speed digital design across to RF and analogue layout. With links into the fabrication and assembly facilities we are able to provide a complete layout design solution, as well as supporting the leading design automation software such as Mentor Graphics速 Expedition and Board Station XE/RE and Altium Designer.
Andy Critcher, Total Board Solutions Ltd, Loddon View, Lower earley, Reading RG6 7YA
Tel: 01183 778 550 Mobile: 07785 578770
FIRE STRATEGIES E override the FD&A system messages with live voice messages or recorded messages. Once the MNS stops, the FD&A system either goes back to its quiescent state, if there is no fire, or into fire full alarm according to the emergency response plan. The deactivation of the fire alarm signal occurs only if the FD&A system is in alarm and a MNS message is activated, however, all the other functionality of the FD&A system is unaffected. AVAILABLE SOLUTIONS There are a variety of different MNS solutions available; one of the latest trends that security professionals are recognising is the need for a System-of-Systems approach to emergency communications. There is no single technology that fits every situation. The NFPA Code recognises this and states that relying on just one technology to do the job in an emergency could result in a relatively large population not receiving the message. The overall solution is to utilise multiple communication systems that combine to produce a reliable and robust design, ensuring that information will successfully reach the affected audience. The System-of-Systems approach to MNS includes; broadcasting alerts over indoor or outdoor mass notification systems; sending text messages and e-mails; distributing automated voice calls; utilising display signs; desktop alerts and social media. However, businesses are realising that launching alerts from multiple communication systems can greatly increase the time it takes to send and receive messages. It also has to be kept in mind that the alarm system could be part of the threat; there have been cases, such as American campus mass shootings, where the attacker(s) have used the fire alarm to cause an evacuation and then shot people as they attempt to escape by fire exits. A good fire management plan, with a suitable delay and investigation period will go some way to limit this. CYBER TERRORISM Furthermore, articles in Counter Terror Business have also looked at cyber terrorism, in particular, new cyber-attack proof facilities. But what can be done to protect these remote bunkers, as it were, from conventional threats like fire? British Standards BS 6266 (fire protection for electronic equipment installation – code of practice) and BS 5306-0 (Fire protection installations and equipment on premises Part 0: Guide for selection of installed systems and other fire equipment) both give guidance of suitable systems for the protection of these areas. In this article I have only scratched the surface of how the fire protection systems, and in particular, the FD&A systems can, and should, be incorporated in the protection from terrorist threats; and in light of recent events worldwide, terror alerts may well increase. L FOR MORE INFORMATION www.fia.uk.com
Fire Safety
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
New FD&A Route to Certification Scheme The Fire Industry Association (FIA), in conjunction with the National Security Inspectorate (NSI), has launched a new Route to SP203 (FD&A) Certification Scheme, aimed at helping companies who wish to achieve the BAFE SP203 Registration for Fire Detection & Alarm Systems. The BAFE scheme is one of the Third Party Certification schemes in place within the fire industry and is one way a company can prove competency in this field. The FIA is a firm advocate of Third Party Certification to help prove competency, which is why they have teamed up with NSI, a certification body who are UKAS accredited to inspect against the SP203 scheme. The package has been set up following demand from companies for information and assistance to achieve Third Party Certification, which is a requirement of FIA membership for installers and maintainers of FD&A systems. Graham Ellicott, CEO of the FIA, says: “Independent Third Party Certification has been our association’s mantra for nearly 30 years. We see certification to such schemes as demonstrating competence, thus providing the end user with the confidence that checks and balances are in place to ensure they can rely upon a supplier who is certificated. “Having brought over 250 new members to the association over the last four years we have a good understanding of the issues companies face when trying to reach the Third Party Certification benchmark. We have worked with our strategic partners – NSI and BAFE – and devised a package to genuinely help companies achieve this.” NSI is the specialist approvals and
certification body that inspects companies providing home security, business security and fire safety services, including fire detection and alarm systems. NSI approved companies must prove their competence on an on-going basis, including meeting all relevant British and European Standards and providing staff with the highest level of training required to do their jobs. Jeff Little, CEO of NSI says: “It can often be a significant challenge for service providers to justify the costs, criteria, processes and the very benefits of belonging to one or more of the industry organisations open to them nowadays. But this new scheme, offered by the FIA, brings everything together within one tidy envelope to present the service provider with a clear, direct and straightforward roadmap through to membership. “The four pillars of this package – the consultancy, certification BAFE approval and trade association membership – will all help equip service providers with the visible manifestation that demonstrates real dedication to providing a top quality service.” The new Route to SP203 (FD&A) Certification Scheme compliments the FIA’s existing Route to SP101/ST104 (PFE) Certification Scheme, which was launched in 2009 to help companies who maintain and service portable fire extinguishers to become BAFE registered on their Technicians Scheme SP101/ ST104. This new package is a natural progression to assist FD&A companies. It is expected that the process to achieve full certification will take 12 months and payment will be spread over a number of months to help those in the process.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
29
Your agile and committed partner in the design and manufacture of electronic solutions. High reliability design & manufacturing solutions for low and medium volume complex electronic systems, coupled with excellent customer communications and on-time delivery, Call Texcel. Texcel are able to work with you at any stage of the process, from concept through to production and in-life support, of your electronic products and sub-systems. Texcel has many years working
with all the tier one military suppliers, providing complete solutions down to assembled printed circuit boards. Texcel establish long term partnerships with their customers that allows them to develop solutions and take them to market in an effective and timely manor. Quality systems are aligned to the needs of aerospace, defence and high reliability industries. Accredited to ISO9001:2008 and workmanship standards to IPC A 610 Class 3.
Sectors and Solutions n High Reliability Solutions n Marine Solutions n Sub-Sea n Land based vehicles n Communications n Instrumentation n Secure Communications Systems n RF Products
n Test Systems Operational Equipment n RADAR Systems n Gyroscope Systems n 400 Hz Power Systems n Aircraft Engine Starter Systems n Unique Power Supply Solutions n Telemetry Systems n Seismic Digitizers
Texcel gives you experience in product design with hardware and software designers, full validation testing, managing supply chain dynamics, assembling PCBs and systems, functional testing solutions, and full in-life support.
Thames Road, Crayford, Kent Da1 4SB Tel +44 (0)1322 621700 Fax +44 (0)1322 557733 www.TexcelTechnology.com Email sales.office@texceltechnology.com
RISK ASSESSMENTS
Fire Safety
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
of engineering techniques such as hot smoke extraction systems, smoke venting, smoke curtains, extensive automatic fire detection, fire suppression systems, compartmentation of high risk areas and well defined operational procedures. Such an approach demands a high standard of fire safety management covering the day-to-day operational arrangements for the building; for example, the maintenance of low fire loads and/or sterile areas in foyers or large circulation spaces. It also requires a robust planned preventative maintenance regime in respect of fire safety systems. Whilst this is feasible, is it realistic in the day-to-day running of buildings? What happens over time when, bit by bit, small changes are made to the building which compromise or invalidate the fire safety measures which are essential to a fire engineered building working correctly? This in turn raises another fundamental question, what happens if the building should come under significant terrorist attack by way of an explosive detonation either to the external fabric of the building or within its internal structure?
ASSESSING THE RISK IN COMPLEX BUILDINGS Niall Rowan, technical officer at the Association for Specialist Fire Protection, highlights what needs to be considered during a fire risk assessment in a complex fire engineered building It can be argued that the subject of risk management in complex buildings is probably beyond the competence of the average fire risk assessor. While this is possibly a controversial observation to make, especially at the start of an article on risk management in complex buildings, as more problems with fire risk assessments arise and become widely reported in the press, it is increasingly becoming accepted opinion. It is well known that under the Regulatory Reform (Fire Safety) Order, there are currently no qualification, knowledge or experience requirements for fire risk assessors. Anybody can do it and as a result there are a number of substandard risk assessments in circulation. The more infamous assessments (e.g. those for Lakanal House) have been well documented, but what about more complex buildings such as fire engineered buildings?
What special requirements do they have that make them ‘beyond the competence of the average fire risk assessor?’ FIRE ENGINEERED BUILDINGS Fire engineered buildings are complex and offer a lot of advantages to the building owner, the occupier and the developer/contractor, such as: • Innovative design • Extended escape distances • Reduced fire resistance periods for the structure • Increased compartment sizes • Removal of stairs resulting in an increase in the useable floor plate • Flexibility in the use of space for the end user • Reduced construction costs. To enable this, fire engineered buildings are reliant upon a number
THE RESPONSIBLE PERSON The fire risk assessor evaluating a complex building will need to review the Fire Safety Strategy (FSS) in order to be able to undertake a ‘suitable and sufficient’ assessment. Whilst fundamentally accepting its validity, since it will have been signed off by the regulator, the assessor will need to review the FSS for deviations present in the building which will need addressing; either by requiring compliance or developing an alternative strategy. It should be noted that the FSS will often be justified by detailed models and calculations which are outside the scope of a fire risk assessment. They are also likely to be outside the competence of any fire risk assessor who is not a fire engineer. In order to undertake the fire risk assessment, the assessor will also need extensive support from the ‘Responsible Person’ because he/she must hold all the information on all the fire safety systems that make the building safe. This will include all the passive fire protection (structural or built-in) measures, all the active fire protection (detection, alarm, suppression) measures and for complex buildings, the Fire Safety Strategy including the assumptions made in producing it. For buildings built since 2006, the requirement to maintain such information is enshrined in regulation 16b of the Building Regulations. This requires that information be given to the Responsible Person so that any fire risk assessor can obtain the information from them and undertake their fire risk assessment. Unfortunately, 16b information is rarely available which makes it more difficult for the Responsible Person and the fire risk assessor to come E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
31
Designed in Catia Analysed in Nastran Accurate Shooting
Personal Safety
Wind Speed
Air Pressure
Temperature Heat Stress Wind Chill Dew Point Wet Bulb Humidity Air Density
- Handheld - Robust - Waterproof
- Data storage - Data upload - BluetoothÂŽ
Direction Cross, Head
& Tail Winds
Barometric
Pressure
Desktop Engineering supplies both 01993 883 555 www.dte.co.uk info@dte.co.uk
www.r-p-r.co.uk Tel: +44 (0) 1590 679755 or email sales@r-p-r.co.uk
Value Added Motion Control Solutions. Infranor Group offers innovative solutions from detailed design through to manufacture.
We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defense, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.
www.infranor.com
Info.uk@infranor.com
RISK ASSESSMENTS E up with a credible fire risk assessment. There are four areas that the fire risk assessor will need to concentrate on in conducting a fire risk assessment on a complex building based on the a review of the Fire Safety Strategy. These are now considered in detail. REVIEW OF BUILDING GEOMETRY Has the building layout or geometry been changed from that specified in the Fire Safety Strategy? In particular, has the building been modified? Does the compartmentation and use of the building reflect what is stated in the strategy? In undertaking his/her assessment, the assessor will need to review any modifications to the building or maintenance that could have compromised the compartmentation. He/she will need to determine if there is a record of such works and the action taken to ensure that compartmentation has been maintained. For example, is there a certificate of conformity from a specialist passive fire protection contractor, or did the responsible person undertaken his/ her own inspection to verify adequacy? The obvious item to look at in any fire risk assessment of passive fire protection is the condition and operation of fire doors as they are readily accessible. Unfortunately fire travels in difficult to access areas and in concealed spaces and cavities. That’s why there is so much guidance in AD-B on fire stopping and subdividing large concealed spaces. Consequently, other questions that will need answering are: • Have new services been installed e.g. above suspended ceilings that penetrate fire compartment walls/floors? • Has the compartmentation been made good following installation? • Have penetration sealing systems been modified or removed? • Are fire dampers in situ as required? • Are the fire dampers accessible for inspection and/or testing by the local authorities? If fire dampers are not accessible from a grill, an access door in the ductwork is required. • Has the operation of fire dampers been compromised by lagging to ducting or other obstruction of the moving parts, or where applicable, the fusible link? • Are the dampers maintained and checked at least annually? (Annex W of BS9999 gives guidance on maintenance of fire resisting ducts and fire dampers). REVIEW OF FIRE SAFETY SYSTEMS In the same way that all the passive fire protection measures need reviewing, so do the active fire protection measures. Consider the fire safety systems listed below and ask yourself if the average Responsible Person or fire risk assessor can answer the questions related to each. • Fire alarm including automatic fire detection • Smoke and heat extract
ventilation systems (SHEVS) • Smoke control pressurisation systems • Fire Suppression systems e.g. sprinklers, water mist and gas suppression systems • Evacuation lifts/fire-fighters lifts OPERATIONAL ARRANGEMENTS Operational arrangements covering the management and operation of the building will need to be reviewed as part of any fire risk assessment, specifically to ensure it is in alignment with the Fire Safety Strategy. In doing this the fire risk assessor will have to use his skills and experience to address the following areas: means of escape, control of fire load, displays and temporary furnishings, and housekeeping and the removal of waste. Looking first at means of escape, the risk assessor will need to ask the following: • Has the use and occupation of the building changed from that recorded in the Fire Safety Strategy? Consideration needs to be given to the number of people in the building and their distribution • Is the fire alarm protocol unchanged, for example, supporting a simultaneous, phased, or horizontal evacuation? • Are all the means of escape designated in the Fire Safety Strategy still available? Consideration needs to be given to potential obstructions, checking compartmentation and fire safety systems • Is the resource in terms of personnel adequate to support the evacuation strategy? • Are personnel adequately trained and instructed? • Are personnel shift changes, work rotas and leave adequately catered for? • Is adequate equipment provided? Increased compartment sizes and extended travel distances, often based around a fire engineered solution that requires atrium, balcony and gallery spaces, need to be kept to agreed fire loads complying with the fire safety strategy. Smoke extraction capability is usually also based upon agreed fire sizes and fire loads (typically found in PD 7974) and agreed with the regulator. Management of the fire load is therefore critical to the performance of the systems specified in the FSS, more so than in a building of prescriptive design and consequently, the assessor will need to verify that it has been controlled adequately. Displays are often located in corridors, entrance foyers and shop floors, and often comprise materials which provide a means for the rapid spread of fire. The risk assessor should assess how these materials could contribute to the development of a fire. Possible control measures include: • Avoiding the use of displays in corridors and foyer • Minimising the size and number of display areas to discrete, separated areas • Treating displays with flame retardants and/or using display boxes • Keeping displays away from curtains.
Fire Safety
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Good housekeeping will lower the chances of a fire starting, so the accumulation of combustible materials in premises should be monitored carefully. It is essential to reduce the chances of escape routes and fire doors being blocked or obstructed. Waste material should be kept in suitable containers prior to removal from the premises. Considerable quantities of combustible waste material need to be managed by the development of a formal plan. PLANNED PREVENTATIVE MAINTENANCE Planned preventative maintenance and the testing of fire safety equipment essential to the Fire Safety Strategy is crucially important in a complex building because the operation of the systems is critical in affording the required level of safety to the occupants. The greater variety of systems in complex fire engineered buildings, such as smoke extraction and pressurisation systems require detailed PPM programmes. Complex ‘cause and effect’ matrices are often linked to the automatic fire detection. Changes to the building, its usage, or the procedures, may render these inappropriate. Consequently, systems of scheduling PPM and record keeping are very important in ensuring the relevant systems are maintained in working order. The fire risk assessor will need to investigate these as part of his risk assessment. CONCLUSION This article highlights the many special factors that need to be considered in undertaking a fire risk assessment in a complex fire engineered building. There are a myriad of specialist questions under each of the four areas of passive fire protection, active fire protection, operational requirements and planned preventative maintenance that need detailed answers. Undertaking such a risk assessment is not for the feint hearted and can probably only be undertaken by a qualified fire safety engineer. Simpler buildings also need qualified and experienced people (although to a lower level) to undertake fire risk assessments. Consequently the ASFP fully supports efforts being made by the fire risk assessor industry to develop a set of agreed competencies, experience and qualifications in preparation for a national register of fire risk assessors. The ASFP, in line with its policy promoting third party certification for the manufacture and installation of passive fire protection products, supports those schemes which require full third party certification, either for individual assessors under a personnel certification scheme, or for companies who employ assessors under a company scheme. Any such schemes will need to be accredited by UKAS – the UK body responsible for accrediting certification bodies – to ensure credibility. It is only in this way will we see the status of the profession of fire risk assessor rise to the level that it deserves. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
33
The ultimate portable thermal imaging camera.
Simple to operate
High resolution viewing screen
Light weight
For search, patrol and surveillance operations. It gets results.
See the BIGGER picture Argus Long Range Telemetry Argus LRT transmits clear, secure thermal video footage to on-scene commanders. From tower blocks to subterranean tunnels, this upgrade to the Argus SC gets a better view of the situation • Designed using COFDM technology for a secure transmission • Noise free quality picture • Up t0 1km range • Integrated into camera battery For more information or to book a demonstration please go to
www.argusdirect.com
LRT
The Argus SC is excellent at locating people hiding in foliage, regardless of the time of day. By locating a suspect with an Argus SC, officers can approach and apprehend a suspect without risking dangerous confrontations and involving many officers.
Argus SC cameras detect and reveal the heat created by the powerful lighting systems used to grow marijuana indoors. In a row a hot roof stands out.
The Argus SC can identify threats to personnel such as hidden suspects, guard dogs, and dangerous obstacles. It can also warn them of any potential threats lurking in the dark.
Argus SC thermal imaging can view large areas of land or water, searching rapidly to identify hot bodies and requiring less manpower than conventional methods. Searches can be conducted efficiently whether carried out on foot, or from vehicles or boats.
Thermal imagers can immediately highlight if a vehicle has recently moved (hot tyres, brakes and engine heat reflection). r superior surveillance capability in an Consequently they urban situation.
Officers can quickly and ctively scrutinise between homes and buildings. In total darkness, officers can go virtually undetected, as they search for prowlers, peeping toms, and other criminal misbehaviour.
Police officers, fire fighters and military personnel are all required to operate in low, or no visibility, environments. The Argus SC can help train people in reconstructions of real-life night operations.
Argus SC thermal imaging cameras can help at various stages in collision investigation. Whether locating key clues to the collision (such as skid marks), missing people, or missing vehicle parts.
During a vehicle pursuit, if the occupier/occupiers abandon the car and continue to run on foot, officers can point the camera inside the vacated vehicle to determine how many occupants were present.
If used immediately after an incident, such as a burglary, the Argus SC can help forensic teams locate and record evidence. Heat signatures from the burglar’s body, like handprints on handles etc may still be evident (time dependent on body heat temperature, length of time contact has been made and the material touched).
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PERIMETER PROTECTION
WHO’S LOOKING AT YOUR PERIMETER?
Perimeter protection solutions have never been more important in today’s highly volatile world. This is why Britpave developed the BsecB perimeter security protection system, the first line of defence against a vehicle borne terrorist threat
The threat of acts of terrorism on our national infrastructure continues to be a major issue. By developing a high security protection system for airfields, military areas, utilities, fuel storage and other infrastructure assets, Britpave understands the importance of a secure perimeter. Britpave provides an extensive service in relation to its security barrier projects. INVESTING IN THE FUTURE At Britpave we work with a team of dedicated professional advisors, to assist you in all aspects of the specification process. From the very start, they offer the expertise and guidance needed to make the right perimeter security decision. We understand how difficult and also time consuming it can be to find exactly the right product for each stage of your project. Finding the right perimeter for now and into the future is no different. Our licensed installers are happy to meet with you and discuss your requirements to make sure we recommend the right solution for your specific needs. Our system can be coupled with other government approved systems to provide an all-encompassing solution, including security gates, fencing and intruder monitoring systems. BsecB is a high impact barrier and has been successfully tested to comply with BSI PAS 68:2010. It is predominantly surface mounted and has the ability to stop a 7.5 tonne truck and thwart a subsequent follow-on vehicle encroachment. With the installation
36
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
of a BsecB system you are investing in a long term security solution, to protect for years ahead. The design life of BsecB is over 50 years and will require little or no maintenance, apart from a routine inspection. COMBINED SYSTEM CAPABILITIES Combining BsecB with other government approved systems, such as security fencing, security entry gates and the mounting of CCTV systems, is often required at the perimeter of important sites to achieve a single high level defence system. The need for separate fencing and vehicle barrier systems is removed. These protect infrastructure assets from threats ranging from peaceful protest to terrorism events. Many barrier systems are designed purely with terrorist threats in mind but in the event of accidental impact they are damaged and then have to be repaired in order to return the necessary security to the site/facility in question. The BsecB system is designed to withstand angular impacts typically below 45 degrees and more typical of an accidental situation without sustaining damage that would compromise its on-going PAS 68 performance. INSTALLATIONS Installations have been carried out at airports, power stations and cash processing facilities, some of the recent project details include: BAA - Edinburgh Airport – In December 2009 a BsecB security barrier installation was completed alongside the terminal
building at Edinburgh Airport. This gives the terminal building the protection it needs from would-be suicide bombers, approaching from the adjacent road. This project has a length of 120 metres, took just four weeks to complete and was built on the existing asphalt pavement. No foundation was required except at the end anchorages. BsecB can be constructed using slipform machinery or fixed formwork. In this instance fixed formwork was used as the practical solution. This was due to the project location and the need for two road traffic lanes to be closed if slipform machinery was needed. This also meant BAA would benefit from a higher quality surface finish being achieved. So you can see even in restricted working spaces BsecB can be the best protection system. Nuclear power installation – Approximately 200 metres of Britpave BsecB barrier with a mesh fence on top was provided at a nuclear power facility where upgrading of a section of perimeter boundary protection was required. BsecB is a surface mounted barrier system with minimal foundation requirements and this was an important factor given the shallow location of existing underground services. Due to layout and access constraints construction was by traditional formwork. Banking facility – Approximately 500 metres of Britpave BsecB barriers with a Barkers Stronguard fence was provided at a Bank of England facility. The design and construction of the installation benefited from a close working relationship between the Britpave Licensed installer and the client’s architect. The installation followed both the irregular line of the existing site perimeter with acute changes of horizontal and vertical alignment catered for. The installation included both high output machine and traditional hand lay construction. PAS 68 automated gates, pedestrian turnstiles and personnel gates were incorporated within the BsecB demonstrating the flexibility of the system. L FOR MORE INFORMATION For more information, contact Britpave, who will put you in touch with the licensed installers and designers of the BsecB system: Britpave, Atrium Court, The Ring, Bracknell, Berkshire RG12 1BW Tel: +44 (0)1344 393300 info@britpave.org.uk www.britpave.org.uk
HOSTILE VEHICLE MITIGATION
HIGH SECURITY PERIMETERS – STILL SOME WAY TO GO TO A TRUE HOLISTIC APPROACH?
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Laurence Goode, chairman, the Perimeter Security Suppliers Association, describes concerns that have come out of recent work with the security industry and end-users, and some of the solutions Great strides have been made, especially in the UK in recent years, in the development of some aspects of high security perimeters. Yet recent work by the Perimeter Security Suppliers Association (PSSA) shows that there is still some scepticism across the industry, including among many end users, regarding the quality, suitability and effectiveness of many high security perimeters being installed today. Ironically, in some respects this scepticism reflects rising standards; developments in some areas are highlighting shortcomings in others. However, this also emphasises the general concern; there are still a number of obstacles negating the ability to take a truly holistic approach to high security perimeter design, implementation and use. HOSTILE VEHICLE MITIGATION One area to have really moved forward is the understanding and development of high impact-resistant Hostile Vehicle Mitigation (HVM) products. This has seen a lot of testing and development with many new innovative products meeting the PAS68 standards for impact resistance. This is all constructive, however, there is still a widespread myth that PAS68 is a catch-all credential bestowing a total fit-for-purpose badge on a product, and this is simply not the case. Though a successful impact test to PAS68 may have taken place there remains no verification that any product being sold is the same (or has been installed the same) as the product that was actually tested. Also, a PAS68 designation says little about a product’s reliability, longevity, duty cycle, serviceability etc. but many purchasers assume a product’s PAS68 designation means it meets some minimum levels for these criteria. The PSSA has worked with UKAS certification bodies, and players right across the industry and user community to develop a certificated verification scheme and to agree the standards to certify against. For the first time there will soon be an independent certification process available for HVM products. OPERATIONAL REQUIREMENTS Another area that has moved forward is the much more widespread use of properly developed Operational Requirements. A general view across the industry is that
the most critical factor determining the success of any high security perimeter system is whether it started with a properly drawn up, comprehensive Operational Requirement document. Since this should define every subsequent stage this is where a true holistic approach succeeds or fails. This needs to have considered every facet of the site’s operation including not only threat types, levels and possible responses, but also abnormal situations such as unexpected equipment failure, and post incident scenarios when resources and attention are displaced from normally expected areas and duties. Reassuringly, the PSSA’s work detects a rising confidence that greater and more comprehensive use is being made of Operational Requirements generally. However, there still remain inhibitors to their full and proper use. Of greatest concern is that due to the high security nature of any Operational Requirement document it is difficult to share this across all involved in its implementation. It is rarely seen as a whole document (if at all) by any but the end-user, client or system designer. The main contractor, specialist integrator, and the manufacturer are generally excluded, and see only the parts deemed relevant to themselves. Often no-one sees the complete picture, negating everybody’s ability (even assuming they all had the skill) to contribute to a fully integrated system. A PSSA objective based on this is that all involved should have a minimum defined level of training in all aspects of high security perimeter design. This would apply to all PSSA membership classes, designer, manufacturer, integrator or service provider, and ensure that any shortcomings won’t get overlooked. INTEGRATING PRODUCTS Another concern revolves around main contractors and their ability under the current regime to fully integrate diverse high security products and services. Not that main contractors lack construction skills or commitment to fully meeting a specification, but rather their focus is on meeting a fixed specification with high emphasis on minimising timescales and cost for their clients. This, it is felt, negates the ability to refine the detail of Operational Requirement
documents as each specialist perimeter product or installation/service provider is brought on board. The level of detail required to ensure complete and proper integration cannot take place until final decisions regarding products and providers have been made and this selection process often takes place after selection of, and within the remit of, the main contractor. The industry feels that there must be a way to allow controlled, appropriate refinement of requirements as a project progresses and its full details emerge. A third concern is that often the Operational Requirement document doesn’t go chronologically far enough and is often silent on post-installation activities. An appropriate servicing regime based on the specific equipment selected, usage levels, and site conditions is a good starting point. However, repair lead times also need to be considered, and take account of site operational constraints. This includes usage levels and organisational resilience, for instance alternative entrance control strategies and resources available during emergency situations to operate them, but also the reliability of specific equipment installed. Repair lead times need to start to be considered before product selection and installation takes place, but often this doesn’t happen. One further consideration that the Operational Requirement document needs to address from the outset is that of unintended damage to installed equipment by vehicle impact. Even minor impacts can compromise the impact rating of certain products and having the skill available to determine this quickly is often necessary if a site’s operation is not to be compromised. This skill level is not normally available at most sites and addressing this in the Operational Requirement document ensures this is taken into account at the product/supplier selection stage. MAIN FOCUS So far, the PSSA’s main focus has been on launching a certification scheme, and developing the standards to go with it, for HVM rated products and manufacturers. Since there are still relatively few HVM rated fence systems most of this work E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
37
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HOSTILE VEHICLE MITIGATION
E by definition has focused on entrance perimeter can on occasion also include control systems. However, the plan is that other systems such as doors and glazing this work continues so that before long the intention is that these eventually can the scheme covers the entire perimeter, also be covered by the PSSA’s scheme. including high security (non HVM) fencing. Another reason for this staged approach Interestingly, the PSSA expects a is that high security fencing is some way convergence technically between standards behind HVM equipment in terms of having employed for fencing (mostly manual attack usable, generally accepted standards. ratings) and HVM products (mostly impact While the standard applicable to HVM ratings); the industry is starting to recognise rated products, PAS68 doesn’t go much that both products in some degree often beyond impact rating. It does, however, need both ratings. This makes good logical cover a complete range to the very highest sense and introduction of the PSSA’s scheme impacts, it is very widely adopted, is will hasten and simplify this process. publicly available, and is an operational Similarly, it is also intended that once rather than prescriptive (i.e. doesn’t define running the scheme is quickly extended to actual product specifications) standard. cover the design, integration, installation and maintenance phases of projects, with SECURITY REQUIREMENTS certification available for PSSA members to The same is not true for high security fencing. verify their competence, training, processes, While LPS 1175 is now generally accepted methods and quality of work in these areas. as an excellent starting point for fencing in This staged approach is being taken since such terms of manual attack rating, and is freely a large task needs to start somewhere and available, well developed and widely adopted, it makes sense to focus first on product and there are higher security requirements already its manufacture. Also, since HVM equipment being fulfilled by the industry for which there tends to be the most complex part of a are now no generally recognised standards. perimeter in terms of design, manufacture Rightly or wrongly, the industry previously and testing, then any scheme developed used government ratings to define high for HVM should be fairly easily and rapidly security fencing but these have recently been applicable to the fencing and the rest of the completely overhauled and re-named, and Zaun_CTB 148x420 Ad Sept_Layout 1 21/07/2011 09:04 Pagetheir 1 use limited to government applications, perimeter. This may be much more difficult the other way around. Since a high security with proper confidentiality now being
enforced. These standards can therefore no longer be used commercially. The PSSA’s work to eventually include high security fencing in its certification scheme will help to clarify and move forward this important area. Based on the industry’s concerns, the PSSA’s objectives, in order, are to complete the launch of a basic certification scheme for HVM products and manufacturers, extend the scope to include high security fencing and other products, then quickly extend participation to include the design, integration, installation and maintenance phases of work. While recognising that this is a huge task, much of the groundwork is already complete, and with the industry’s support the PSSA are confident this will accelerate the adoption, convergence, and raising of standards, and contribute greatly to the industry’s desire for a much more holistic approach to high security perimeters. L
Notes LPS1175 is the property of BRE Gobal limited and subject to their conditions relating to use and reproduction. PAS68 is the property of BSI and subject to their conditions relating to use and reproduction. FOR MORE INFORMATION www.pssasecurity.org
Security fencing systems
Zaun is a manufacturer and supplier of fully integrated high security solutions which can be supplied as part of a full turnkey package. Contact us for a technical design and specification service or a FREE brochure. 38
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Expanding UK perimeter security specialist highlights advantages of British-made technology Harper Chalice is highlighting the advantages of British-designed and manufactured technology – better design, quality and cost – in a new campaign aimed at top-end buyers, not just in the UK but internationally. “Harper Chalice’s PulseSecure and FenceSecure advanced electrified and electronic perimeter security systems are made in one of the centres for British manufacturing and design – the West Midlands – and that gives us important advantages that we are able to pass on to our customers,” says managing director Graham Harper in an article published on the company’s website. Not least, the company argues, UKmanufactured fencing systems can be developed, made and delivered more quickly than equipment shipped in from overseas. But perhaps the most important advantage is the fact that the company’s technology works better, because the systems have been designed from the ground up, having been subject to the UK’s particularly demanding testing regimes. Submitting the Harper Chalice PulseSecure™ PROTECTOR high and low voltage system to independent testing by various official agencies has been an important part of their development and one of the key drivers to
innovation, says Graham Harper: “There was a useful pressure on us to evolve and improve, in order to compete for top level UK contracts. As a result we developed meaningful operational advantages that are as attractive to international buyers as much as those in the UK.” In effect the company has responded to pressure in the security-conscious UK to make its technology work better, and this is giving it an advantage in markets around the world. Harper Chalice’s turnover grew by more than 120 per cent last year, and it is expected expand more rapidly year on year to
meet the growing world markets demands for reliable, effective and dependable electronic perimeter security increases. Reflecting on the manufacturing tradition that his company is part of, Graham Harper says that for a variety of reasons British companies have been slower to promote their ‘national quality brand’ than those from countries such as Germany and France – even when they have every right to do so. “When you talk to a German company at an international trade fair the ‘Made in Germany’ slogan is always one of the first selling points, because it is seen around the world as a guarantee of quality. We are equally confident in promoting the ‘Made in Britain’ message, and that’s why we have made it one of our key marketing themes for the coming year. “Our company is a prime example of how British manufacturers are now very smart and very quality-driven – we are part of an industrial tradition that is evolving and finding effective ways to compete in highly competitive global markets,” adds Graham Harper. FOR MORE INFORMATION The full article appears on www.harperchalice.com
that set new boundaries.
Tel: 01902 796699 security@zaun.co.uk www.zaun.co.uk
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
39
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ELECTRONIC COMPONENTS
QUALIFIED HI-REL DEVICES DMTL provides electronic components for high-rel military applications Designers of electronics-based systems for Military and Aerospace applications never compromise on their choice of components. Component manufacturers and suppliers must meet an array of quality, reliability and performance standards, which ensure that each and every part will function correctly in the harsh electrical and mechanical environments often encountered in military and aerospace applications. Vibration, extremes of temperature and electromagnetic compatibility are just some of the conditions that must be overcome if a critical system is to perform. AN EXPERT IN PASSIVE COMPONENTS Although the UK has never been a major player in semiconductor manufacturing, it can demonstrate a significant history in evolution of passive component design and production, particularly at the time when it was also a dominant force in radio, television and car production. Passive components provide a communications or control system with the levels of electrical stability and protection demanded by today’s highly complex and very expensive computing devices. Specialist distributors are generally long established and staffed by qualified and experienced individuals capable of helping customers make the most of the products on offer. One such passive components specialist is Distributed Micro Technology Ltd, these days better known as DMTL, which has been around for almost 25 years working alongside a number of industry leading component manufacturers helping customers to integrate the latest passive components into their designs. These suppliers include AVX, Kyocera, HolyStone, Viking Tech, Thinking Electronics, Coilmaster, HTR, and Kepo. As a result, DMTL is now recognised by many as a leading supplier of circuit protection devices, frequency control components, resistors, capacitors and specialist connectors as well as a variety of ceramic devices and sensors and is able to supply a wide variety of components approved to relevant military standards. MILITARY APPLICATIONS DEMAND QUALIFIED HI-REL DEVICES One of the manufacturers that DMTL turns to for MIL-spec product is the leading passive components manufacturer AVX, which produces a wide variety of High-Rel ceramic and tantalum capacitors and is recognised by many in the industry as a driving force in high performance passive component development. AVX have several purpose-built facilities
that only manufacture passive devices for military and aerospace applications, and have been responsible for many recent advances in capacitor performance and size reduction. DMTL has worked alongside AVX for many years not only helping customers to design-in existing AVX products, but also assisting in the development of new components specifically for DMTL customers and their applications. AVX passive components can be found in many military applications including communications systems, fighter aircraft, UAVs and weapons. Below are just two examples of how AVX is pushing the barriers in chip capacitor technology. TINY AND FLEXIBLE With the trend very much towards reducing size while maintaining or improving performance, AVX recently announced the world’s smallest military approved tantalum chip capacitors in capacitance/ voltage combinations previously only available in much larger packages. Based on the revolutionary AVX TACmicrochip technology, these offer designers a significant opportunity to downsize circuits for military and aerospace applications. As well as producing the smallest device, another recently introduced and military approved AVX product range offers the most flexible of surface mount form factors, offering nine case sizes. The molded construction is compatible with a wide range of surface mount assembly processes including wave or reflow solder, conductive epoxy or compression bonding techniques. CHOICE With a huge choice of electrical specification, format and size from which to choose, matching the passive component to an application is no easy task and it is a specialist distributor’s design and component integration expertise that customers look for. DMTL works with its customers from initial project concept to final production helping designers with their component selection and their purchasing teams with inventory management. DMTL is currently helping a number of manufacturers of military and aerospace products with all manner of design initiatives. Many of these manufacturers are market leaders in a variety of sectors including communications and control systems, power supplies and medical systems where the same high performance and reliability issues are key. L FOR MORE INFORMATION www.dmtl.co.uk
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
41
Save time, money, and effort
MOTION
Easy, versatile modular assembly solution.
technology
The MiniTec Profile Building System
a unique resource for specialist motion components, assemblies and systems.
■ ■
D E AN COM THE T I S I V ORY FACT
■
C us today and arrange a visit to meet Call th the Team and experience the technologies. W We look forward to seeing you.
■
Easy to use No power tools required Standard and customised solutions Cutting service ce
FREE samples FREE design advice ce FREE design toolss Contact us now and see how easyy MiniTec is to use and adapt. Limitless range of applications including: Machine Guards, Workstations, Conveyors and Customised Enclosures.
●
Linear Slides
●
Electric Actuators
●
Rotary Tables
●
Linear Bearings
●
Elevator Tables
●
Drives and Motors
●
Single and Multi-Axis
●
Standard and Custom
●
Manual and Motorised “Goods received, amazed at quick turn around, thank you” RUTHERFORD LABORATORY
Design Manufacture Supply
Call in for a chat and a coffee to see how we can help.
UK based designer and manufacturer of positioning systems offering you experience, knowledge and full engineering capabilities.
THE ENGINEER’S CHOICE
LG Motion Limited Tel: +44 (0)1256 365600 Fax: +44 (0)1256 365645 info@lg-motion.co.uk www.lg-motion.co.uk Engineering excellence - by design
15908 LG Motion 275x92mm indd 1
T: 01256 365605 E: info@minitec.co.uk www.minitec.co.uk 15831 MiniTec 275x92mm ad.indd 1
7/7/10 17:14:50
20/4/10 17:41:05
PASSENGER DATA
THE INFORMATION GAME
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The key to effective security is to verify the legitimacy of a journey before departure – and that requires effective cooperation and information sharing across a raft of bodies
SECURE QUEUES Over the past decade, air passengers have been subjected to ever more stringent security controls. Limits on liquid, requests to remove shoes and belts, and increasingly personal security questions have extended queues and created a stressful travelling environment. In some countries (particularly the US), fingerprints and retina scanning are now standard procedures; while additional delays are being caused by scanning baggage after arrival as well as prior to departure. The result is the collection of a huge amount of information at every stage of the journey. Airlines record information that extends from passport details to payment card number, travel companions, seat number, onward flight itinerary, meal request and price of ticket; while hotels routinely request passport and address details from customers. This information collection is increasingly being shared with the respective governments. Under the Passenger Name Record Directive, EU member states will be expected to gather this information from airlines – a move that builds on the Advanced Passenger Information (API) already demanded by
the US Customs and Border Protection Agency (CBP) for travel to a large number of countries, including the Caribbean and others. This information includes, full name, gender, date of birth, nationality, country of residence, travel document type (passport) and travel document number. But does this current model make our borders any more secure? While, in theory, this information will be made available to those investigating criminals, the information is not being used proactively to identify travellers as they enter the airport. The result is that every passenger is subjected to the same stringent security controls and checks – and delays – irrespective of the risks they pose. INTEGRATED APPROACH Gathering passenger data is a positive step for securing our borders and preventing terrorism – notwithstanding privacy and sovereignty concerns. However, the current approaches being adopted globally, including the Passenger Name Record and forthcoming UK e-Borders development, appear fundamentally flawed by the lack of integration with other databases. In almost all national governments, customs, police, immigration and similar agencies all act autonomously with no automatic sharing of information. Contrast this approach to the continued shift towards information sharing across every other aspect of government – from social services to the justice system. It is possible today in the UK, for example, to renew car tax online with real time checking of a vehicle’s MOT and insurance status. Of course, tracking passengers’ movements across national borders is essential. But surely instead of relying on disparate sources of stand-alone information it is far
Written by Peter Forrest, managing director, DPM Systems
Is imposing ever more stringent checks on passengers really the way to secure national borders against the threat of terrorism? The EU recently announced plans to capture even more passenger information under the Passenger Name Record Directive. But will this initiative really deliver effective counter intelligence when it is just another stand alone information source? What is the point of collecting vast amounts of information throughout a journey, from departure to destination, if there is no way of reconciling this information in real time?
better to integrate the sources of related data to provide a complete passenger picture. Critically, these integrated data sources should be used to verify the legitimacy of a journey before departure. What is the value of collecting limited personal data from travellers’ passports in one place, while address details of where passengers are staying in the destination countries are manually collected on arrival and stored elsewhere? There is minimal correlation and no checking of the veracity or legitimacy of the address. The only value is the chance for security agencies to review this information to track passenger movements after the event. Great for reviewing strategy, but no good for proactive, preventative security. Instead, passport data and precise destination address details should be gathered before departure, verified through integrated criminal systems and stored in such a fashion that relevant countries can access the data when necessary: one set of highly integrated local databases, accessible to authorised governments and agencies, that track and authenticate in advance crossborder journeys and passengers’ identities. With such an interrelated process, complete pictures of individuals’ current and previous cross-border movements can be constructed in a timely manner. Without such integration, as is the current case globally, the ability to prevent terrorism is thoroughly undermined. BETTER SOLUTIONS Continually expanding airport queues may provide a perception of safety and security. But with limited cross-agency and real-time information, current processes are flawed. In reality, today’s tedious security demands are forcing 99.999 per cent of passengers to pay for the problems created by just a handful of individuals. This approach is damaging the economy. Growing numbers of individuals – both business and leisure passengers – are eschewing airline travel; and not just due to the escalating fuel-related costs. The inquisition, time in queues and luggage limits are making the entire process of airline travel increasingly unappealing, at a time when the industry is already struggling to make a profit. The vast majority of security experts agree there are better ways of delivering border security. With faster first time checks, border security can identify people in a timely manner. But unless governments can move beyond ever-expanding data collection techniques towards true cooperation and collaboration between all vested parties, passengers will continue to bear the brunt of terrorism fears. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
43
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Save Valuable Investigation Time with Automated CD, DVD and Blu-ray DiscTM Solutions Digital Evidence Processing Counter Terror Investigation Evidence Management
Surveillance Archiving Incident Export and Distribution Surveillance Data Retention
RIMAGE Evidence Solutions
www.rimage.com 44
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
Rimage – the world’s leading provider of workflow integrated digital publishing solutions Rimage is the world’s leading provider of workflow-integrated digital publishing solutions that produce CD/DVD/Bluray Discs™ with customised content and durable colour or monochrome disc labeling. Key vertical markets and applications for the systems include video surveillance, digital forensics, video workflows, retail, medical imaging and law enforcement. Headquartered in Minneapolis, Minnesota, Rimage is a global business with operations in North America, Europe and Asia. With a growing number of digital surveillance cameras, increased image quality and recording required, along with complicated retention requirements, organisations and companies are facing critical data management and archiving strategy challenges. Most are asking the same question: Do I purge my data and potentially lose critical content, or do I keep adding hard drives? A leader in software solutions targeting storage and distribution of digital content, Rimage has developed an integrated solution that solves critical content distribution and long term archiving issues in the surveillance industry. Rimage Surveillance Publisher and Rimage Surveillance Archiver completely automate the process of exporting content for publishing and managing long-term archiving to DVD and/ or Blu-ray Disc™ (BD) media. Rimage Surveillance Solutions utilise evidentiary grade DVD and BD media. This highquality media enables users to securely and cost effectively distribute content as needed and to archive surveillance
video data for extended periods or permanent storage. Rimage Digital Forensics Solutions – the Rimage Evidence Disc System™ (EDS) is changing the way CD/DVD/Blu-ray Disc™ (BD) evidence is processed. The EDS series of automated optical media evidence analysis systems includes the EDS-Enterprise and the EDS-Pro. Rimage systems are the highest-performing, most reliable, dual-purpose solutions for disc based evidence collection and disc publishing. By automating data extraction, disc imaging and content reporting for disc-based evidence, the Evidence Disc System saves valuable time in the lab when compared to manual examination methods. Studies show a 72 per cent decrease in the time required to process a typical batch of CD/ DVD/BD evidence (200 discs) transforming an arduous weeklong examination process into a simple overnight operation. The EDS-Pro and EDS-Enterprise combine professional grade robotics with feature-rich Rimage software to provide the most complete solution for automated evidence processing. The included Rimage disc publishing software enables the EDS to perform double duty both as a network disc publishing and archiving appliance. The EDS is the perfect addition to your digital evidence and asset management workflow. FOR MORE INFORMATION Rimage Europe GmbH Albert-Einstein-Str. 26 63128 Dietzenbach Germany Tel: +49 6074 8521500 Fax: +49 6074 8521100 sales@rimage.de www.rimage.com
INFORMATION SHARING
A PROBLEM SHARED, A PROBLEM SOLVED
Police & Law Enforcement
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Effective information sharing between law enforcement agencies and police forces plays a key role in enhancing the efficiency of criminal investigations, but often technical barriers get in the way, writes Joanne Taylor, director of public security at SAS Since the attacks on New York and Washington in September 2001, we have seen a growing urgency worldwide in tackling the ever present threat of terrorism, a need that was underlined in the UK by the London bombings on 7 July 2005, and, most recently, by the twin attacks in Norway. All the indications are that this trend is set to continue unabated. As Dr Ekaterina Stepanova, a lead researcher in Russia’s Institute of World Economy and International Relations recently put it: “We have seen a three-fold increase in terrorism over the past decade, which is unlikely to decline in the next couple of decades.” FUSION CENTRES One of the direct consequences of this escalating threat has been the emergence of fusion centres. Initially, these were US-based terrorism prevention and response facilities.
threats. Again, information sharing plays a key role in making sure that executives at the centre are notified in a timely manner to be able to make informed decisions. IT INFRASTRUCTURE Fusion centres have unique IT needs due to the need to integrate multiple agencies under one roof, share data with different levels of law enforcement, support local and regional investigation, and produce intelligence reports for executive decision-makers. In achieving these goals the centres face one central challenge: how do they convert data and information into actionable intelligence and ensure that data is available to those who require it without compromising the security of that intelligence? To do this an IT infrastructure needs to be in place that enables data to be
Fusion centres have unique IT needs due to the need to integrate multiple agencies under one roof, share data with different levels of law enforcement, support local and regional investigation, and produce intelligence reports for executive decision-makers. In recent years, however, the concept has spread outside the US and their role has grown also, far beyond their initial remit, to encompass an ‘all risks, all hazards’ approach. One of the basic tenets of the fusion centre approach is the role the centres play in enabling information sharing between multiple agencies working to deter terrorist acts. This is critical not least because of the broad range of different roles most centres have to fulfil. One of the most important of these is intelligence management, covering the entire intelligence lifecycle – from information collection to review, evaluation and analysis. In this area, information sharing is key. In particular, systems have to ensure that the right information gets to the right person at the right time. Equally important is the role of fusion centres in providing threat assessment to leadership, so that law enforcement resources can be focused on high-priority
collated, converted into intelligence, analysed and then shared out among key stakeholders in a timely manner. Currently, the need to handle data integration and facilitate data sharing between different agencies creates significant challenges. Analysts do not necessarily have the time or are allowed to search and analyse all the information held in the IT systems of separate agencies or centres. Key data points may therefore be overlooked, resulting in inefficient investigations and potentially dangerous consequences. And these issues are magnified further by the need to share intelligence cross country. To rectify all this, stakeholders need to be working from an integrated IT platform, which provides a single view into multiple systems and provides a streamlined process workflow, helping save time and drive faster responses to perceived threats. The immense challenge faced by law
enforcement agencies in putting in place this kind of capability includes the need to deal with massive data volumes, changing and growing data feeds and evolving regulations surrounding the use of data. The nature and level of threats are also constantly evolving as the threat landscape develops and methods and motives change. To ensure any solution that is deployed today can meet the needs of tomorrow, it is essential that the solution is flexible and scalable allowing it to continuously provide timely intelligence both now and into the future. Ease of use is a key requirement here. Disparate data, different structures, formats and update rates must be brought together in a way which makes sense to operatives. And information needs to be served to analysts and investigators through a comprehensive searching capability, allowing efficient dissemination to tactical and strategic decision-makers. After all, in the long-term, the success of any fusion centre or investigative agency will hinge on its ability to obtain ‘actionable intelligence’ quickly and efficiently. FINDING A SOLUTION Critically too, any system that is implemented needs to be flexible enough to be tailored to fit a centre or agency’s operational processes and not the other way around. One of the biggest risks and greatest hidden costs involved in the purchasing of any IT solution is having to change existing processes to fit around a new system. It is vital that the chosen system can be tailored on an ongoing basis to meet the changing and future needs of a particular organisation. This ensures that the agency or centre can reduce risk by evolving and adapting to address new or emerging legislation, responsibilities or threats and in turn improve overall return on investment. To achieve these objectives, agencies and centres urgently require systems that present their analyst teams with the relevant information ‘all in one place’. This is where solutions providers can help in delivering solutions that provide intelligence management and analytics, allowing investigators to analyse the data more effectively and to forecast and predict likely future patterns of behaviour. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
45
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BORDER MANAGEMENT
EFFECTIVE TOOLS AGAINST TERRORISM Andrew Preistley, business development director at ARINC, looks at how intelligent-led border management is fundamental to fighting terrorism “Without tools man is nothing, with tools he is all,” proclaimed Scottish historian Thomas Carlyle over 200 years ago. What he should have added was that tools alone – whatever the situation – are never enough. Their effectiveness depends on the way in which they are used. So while those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease. The truth is that even the most cutting edge border control technology needs two additional factors if it is to be really effective. The first is back-up by personnel trained to spot the nuances of human behaviour that escape electronic detection. The second is a system of international standardisation and collaboration that enables passenger information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers, and then acts on that information appropriately. So what’s the hold-up? COMMON-LANGUAGE DATA SERVICE The main stumbling block is said to be the technical problems created by the range of different data sources and formats used by various agencies. This can be easily overcome with the use of ARINC’s Electronic Borders – an end to end immigration service that combines many data sources, potentially including Advance Passenger Information System (iAPIS) and Passenger Name Records (PNR) along with other data sources, such as government watch lists. Translating messages from disparate agencies and systems, it provides a unique screening solution that enables Border Control Agencies (BCAs) to make accurate and swift decisions on every traveller whilst maintaining passenger privacy. Using ARINC’s private, highly secure AviNet global communications network, Advance Passenger Information (API) can easily be sent to the country of origin and/or destination, allowing seamless, efficient and reliable communications between airlines and BCAs. Designed to
46
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
While those in charge of border management have highly sophisticated tools at their disposal – everything from electronic passports to full body scanners – it seems that some potential terrorists manage to slip through the security net with consummate ease. handle critical, sensitive information and with 99.999 per cent availability, AviNet is a proven industry standard around the world. More and more governments require airlines to provide API so they may collate electronic lists of passengers and crew in advance of travel. With any carrier that fails to supply this information being hit where it hurts – in the pocket – by a heavy perpassenger fine, Electronic Borders offers the ideal standards based solution. Configured to be as cost-effective as possible, it requires no new system development, and in many cases, even the modification of existing systems, thanks to ARINC’s recognition of the industry’s need to minimise operating costs and avoid putting additional strain on budgets that are already stretched to the limit.
The combined use of iAPIS and PNR enables security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. BCAs, law enforcement organisations and intelligence services get a valuable headstart on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects. ADDRESSING DATA SECURITY CONCERNS Understandably, data protection remains a real concern for many, particularly where API messages are transmitted by e-mail and over the internet. This is not an issue with a fullymanaged IP network like ARINC’s AviNet, E
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
E which provides a level of reliability and end-to-end security that is lacking in a public internet connection. Carriers using AviNet can be confident of fully complying with their legal obligations whilst simultaneously protecting the privacy of their passengers. The subsequent use and storage of data by the recipients, however, is not always so assured. Within the European Union there are strict regulations in addition to international guidelines on how the data may be used by law enforcement agencies. However, you don’t have to be a cynic to suspect that some countries may take a more relaxed view of the guidelines. While the vast majority of travellers pose no security risk it is essential that law enforcement and intelligence agencies are able to make best use of the information they have at their disposal. EU data protection laws mean that there are strict rules on retention of passenger information if the individual is not of interest. It is therefore important to be able to identify those who are of interest quickly and easily. Would-be terrorists often enter a country a long time before undertaking any illegal activity so the ability to track
the varying border regime requirements as well as ensuring that biometric systems integrate with existing airline and airport processes. The company’s fully-integrated Identity Management System (IdMS) offers a solution that is designed to be applicable in many critical settings and that can collect, verify, and maintain biometric and biographical information as well as supporting all phases of the identity management lifecycle. ARINC supports token-based identity verification, which uses smart cards, 2D barcodes, or other devices containing the biometric data gathered during enrolment. This data is compared with a passenger’s biometric data collected at the verification location – usually a kiosk with a nearby attendant. It also supports tokenless identification, which uses only biometric input that is compared with data on file. IMPLICATIONS OF SELF-SERVICE TRAVEL Over 80 per cent of passengers now make use of mobile devices, the internet and selfservice kiosks for a more convenient check-in away from traditional, dedicated airport workstations. Although this is a welcome time- and money-saver that alleviates
The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk. their previous movements or access their travel itinerary can be crucial. Similarly, the ability to access an audit trail of movements is vital in risk-assessing passengers and establishing whether further examination by an immigration officer is warranted. Airlines have rather different concerns regarding data collation. Those using legacy systems find government demands to extract data can entail budget-breaking costs. Worse still, the absence of standards harmonisation, compliance with the varying data requirements of different governments involved has additional time and cost implications. The use of ARINC’s Electronic Borders alleviates these costly problems. EFFICIENCY-BOOSTING BIOMETRICS API and PNR alone do not go far enough in today’s security-conscious climate to guarantee accurate passenger identification. Complementing biographical data screening and other forms of risk management, biometric technology helps prevent a range of criminal activities made possible with forged documents and stolen identities. It can also be used to confirm employee identification and permit access to sensitive airport facilities. With a long and successful track record in systems integration, ARINC recognises the need for software flexibility to accommodate
queuing and space constraints within airports, it does mean that passengers taking only hand luggage could have no interaction with the airline until they reach the gate. From a security point of view this is potentially problematic. It is vital to be able to track the arrival and progress of each passenger in the airport and this has led to an increase in demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. This PRS complements ARINC’s IdMS, which uses biographical and biometric information to help create fast lanes for preregistered passengers as well as checking employees and crew members. In addition, links to watch lists assist government agencies responsible for border control, hazardous material management and for securing other high-risk facilities. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary. The system also supports the secure transition to more common-use self-service (CUSS) applications and off-site check-in options.
SHARED INFORMATION BOOSTS SECURITY Information sharing is a crucial element in the fight against terrorism and ARINC’s MultiUser System Environment (MUSE) family of passenger and flight information systems, currently supporting over 300 airlines at more than 100 airports worldwide, allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional check-in desks, airlines can access the information they need whenever they need it. As all transactions – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced. The 21st century has witnessed a transformation in aviation security, with no let-up in the battle to stay one step ahead of terrorists and other law-breakers. Every incident – from the atrocity of 9/11 to last year’s discovery of bombs hidden inside printer toner cartridges – leads to calls for more rigorous passenger screening. This is followed by howls of protest from travellers who are increasingly exasperated by the hoops they have to jump through in order to get from A to B, as well as hand-wringing across an aviation sector that sees its costs soar and resources stretched to adopt the additional measures. The reality is though, that we already have the ability to identify and detain suspect travellers. Part of the problem is the fact that the plethora of constantly-evolving technology leading the fight against terrorism is not universally employed. Of greater concern is that the effective use of the information gathered continues to be hampered by a lack of international harmonisation of standards, failures in intelligence-sharing and, last but not least, human error. The industry agrees that the key to enhanced security lies in finding a way to share intelligence through the standardisation and widespread use of technology to minimise the security risk. What hasn’t been agreed is precisely how this is to be achieved. That, though, is just the beginning. Those charged with border control must make proper use of all the available information at their disposal – not only that gathered by airlines and airports but also personal information available in the public domain on personal websites, blogs and on social networking sites. Intelligence-led border management means analysing and correctly interpreting this information if it is to be effective in the ongoing crusade against terrorism. For a single weak link in the security chain is all it takes to let the terrorist succeed. L FOR MORE INFORMATION emea@arinc.com www.arinc.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
47
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Specialist provider of EDM machines, EDM consumables, EDM accessories and EDM wear parts We sell EDM machines, consumables, wear parts and accessories, wire erosion machines, edm drilling, sink erosion, and edm service. EDM Plus (UK) Ltd supplies a full range of high precision high performance EDM machines. • ISO 9001-2000 accredited • Precision EDM machines • Wire erosion machines • Sink erosion machines • Drill erosion machines • Micro erosion machines • Used machines EDM offers a full machine consultation, set up and support service. The machines that EDM Plus provides range from small manual start hole drilling to large capacity cnc wire erosion and die sink. Bespoke EDM drilling machines are also designed and built to meet specific requirements. EDM+ offer a range of EDM spares, consumables and wear parts to suit most manufacturers. When making any purchase from us you can be assured of highly trained service back up. Any machine down time is expensive and time cannot be replaced, which is why we strive to be onsite within the least time possible to remedy any fault. Unable to get support for your machine? Our engineers are not only able to look after
48
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
the machinery we supply but a range of die-sink, drill and wirecut EDM equipment. Call us to see what we can do for you. Accreditation can mean stringent checks on a machine’s performance. Our annual calibration package gives machine service and multi point calibration ensuring your machine’s performance. We offer you the complete package. Our focus is to provide a complete solution to our clients, which offers them cost effective, consistant, reliable performance. EDM is our business and our business is EDM, we
are committed to your success. Testimonials from our clients confirms our comittment to serve their needs, what can we do for you? Our mission is to be the preferred EDM supplier to our clients and to achieve this aim, we focus on the service that we provide, after all time is money. FOR MORE INFORMATION Tel: +44 (0)2476 67 8888 Fax: +44 (0)2476 71 2059 info@edmplus.co.uk www.edmplus.co.uk
SECURITY
Aviation
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
exercise. This type of outcomes-based approach would be similar to that which existed in the US prior to the 2001 attacks. The airlines themselves were responsible for security and it was [highlighted] in the 9-11 Commission Report that this was an inadequate method of ensuring security,” suggests a paper published earlier this year by the Royal United Services Institute (RUSI). Government insists that the proposed changes will allow airports and airlines greater flexibility to deliver high standards of security in ways that are better integrated with their day-to-day business and designed around the needs of the passenger. It goes on to say that it expects the policy reform will incentivise airports and airlines to invest in innovative solutions which pave the way to an advanced future security model. “The outcome-focused risk-based model has the potential to bring a fundamental change to how we implement security regulations. We are keen to be involved in the development of this project, to ensure it meets the needs of our airports and delivers the best service for our passengers,” says Ian Hutcheson, director of Security, BAA plc.
FULL CIRCLE
Chris Yates, principal, Yates Consulting, examines a shift in policy from a system of prescribed security controls protecting air travellers, to an outcome-focused risk-based approach In the midst of the hacking scandal dominating an obsessed media in July, the government quietly announced a shake up in aviation security policy, that could have potentially serious consequence for national security in coming years. In a written statement to the House of Commons, Transport Secretary Phillip Hammond launched a six month consultation over government proposals to shift from a system of prescribed security controls protecting air travellers, to an outcome-focused risk-based approach giving the aviation industry much greater control over security measures deployed in the operational environment. “Under the new regulatory approach the focus will primarily be on the delivery of security outcomes rather than the delivery of specified processes. It will be for the Department to set overall requirements
based on the level and nature of threat at the time. The industry will then be able to design security processes that deliver specified security outcomes rather than having to follow detailed rules,” the proposal states. This shift in government policy has courted controversy since first intimated in the Strategic Defence & Security Review (SDSR) published in the third quarter of last year. A STEP TOO FAR? While few people involved with aviation security have any doubt that reform is long overdue, some openly question whether government is taking a step too far in placing responsibility for this vital function in the hands of a commercial sector, perhaps more attuned to profitability than national security. “As the UK experiences extensive governmental budget cuts, it is unclear whether this is a thinly veiled cost-cutting
Government expectation that an outcome-focused risk-based approach to the aviation security conundrum will lead to a more robust security model, presently appears based more on hope rather than any firm investment commitment.
HIGH COST TECHNOLOGY Government expectation that an outcomefocused risk-based approach to the aviation security conundrum will lead to a more robust security model, presently appears based more on hope rather than any firm investment commitment. Conversation with some airport community members reveals an abhorrence for possibly high cost advanced technology solutions, but strong support for unproven behavioural techniques. The US General Accounting Office (GAO) reported in its most recent finding, that a Department of Homeland Security (DHS) study conducted last year determined behavioural techniques were more effective than random sampling in identifying travellers with fraudulent documents or outstanding arrest warrants, but no evidence existed that the technique was effective in identifying anyone engaged in acts of terrorism. The report stated that the “high variability of traveller behaviours highlights the challenge that Transport Security Administration (TSA) faces in effectively implementing a standardised list of Screening of Passengers by Technique (SPOT) behavioural indicators.” This doesn’t come as a particularly great surprise. It’s possible to see the wide variety of traveller behaviour exhibited in the space of an hour sitting in the average airport coffee shop on any given day. Determining who amongst the mass of humanity is dangerous or merely a nervous traveller is an enormously challenging problem, to which there are no easy answers. Proponents of behavioural analysis continue to argue that the technique has great utility in the airport environment and this may well prove to be the case. E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
49
Knowledge Transfer Network
We know who has what … and who needs what
Electronics, Sensors Photonics
What?
Why?
How?
We are a free-to-join network for anyone with an interest in underpinning technology. Our membership stands at over 4000, and includes researchers and developers and end users of electronics, sensors, photonics, systems engineering, embedded systems, robotics…and more.
Our purpose in life is to facilitate connections between people who don’t know each other yet. We constantly work on our knowledge of who is doing what in the UK, and are very good at bridging between problem solvers and problem owners. Our activities are mostly sponsored by the Technology Strategy Board, and are free to users. We have special threads of activity in many defence and security related technologies: why not contact us if you need a link?
Join our network at www.espktn.org where you will find a route to valuable connections in our network: and the 30,000+ technology professionals in the other Knowledge Transfer Networks. Put useful information in your profile and accelerate your networking.
We grow and maintain a valuable network, and run networking activities internationally, for the purpose of promoting and exploiting innovation.
www.espktn.org | Paul.Smith@espktn.org Premier House, 7 St Leonard’s Road, Horsham, West Sussex RH13 5RJ
SECURITY
Aviation
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
E But behavioural analysis can only be seen as a tool delivering knowledge to help identify those travellers who may need to be screened more thoroughly. The technique must therefore be supported by advanced technology screening solutions. PERCEPTION ISSUE Consultation exercise documents reveal that the government proposal accords with the principal of a reduction in governmental oversight and intervention in favour of industry led and government supported initiatives encouraging growth. Under the proposed approach, those responsible for implementing the European Union (EU) regulations and all directed parties under the Aviation Security Act 1982 (ASA), would be required to implement a Security Management System (SeMS), through which an operator plans and delivers its security processes. “A SeMS is a dynamic management process, which is continually monitored and reviewed to take account of changes in the threat environment, organisational changes and the results of analysis. A key feature would be a process whereby the industry itself regularly reports on its own security performance, significantly increasing the volume of performance data available to the security regulator. The reporting of certain serious lapses would be mandatory (comparable to safety incident reporting in industry) with criminal penalties applying that are available in existing legislation. All entities that are required to comply with European Union common basic standards and domestic directions will of course continue to have to do so,” consultation documents explain. The UK Civil Aviation Authority (CAA) will be the regulator with airports reporting security matters in similar fashion to airlines reporting safety issues under the proposal. Anyone who has taken the time to discuss either security or safety matters with commercial airline pilots can readily testify to this being fraught with danger. The airline world is replete with allegations of commercial airline operators putting pressure on pilots not to report safety issues or actively controlling disclosure to the regulator. There is every reason to assume that the same will hold true in a commercial airport environment, given the need to make a profit while processing large passenger volumes for airline clients. Consultative documents argue that adequate provision to counter such a possibility is being made. Confidential Human Factors Incident Reporting Programme (CHIRP) schemes are highlighted as evidence of this commitment. In the real world operational environment such schemes are often woefully underfunded and constantly challenged by commercial operators. TRANSATLANTIC DISCORD Airports seem to be reluctant to invest in new solutions to meet modern day threats. Most
A SeMS is a dynamic management process, which is continually monitored and reviewed to take account of changes in the threat environment, organisational changes and the results of analysis. recently the airport community has simply said no to a EU requirement to deploy liquid screening solutions in airports any time soon. Anecdotal evidence exists to suggest that vague promises by airports to achieve this capability at a later date will not be met either. United States authorities also took a dim view of legislative attempts to introduce liquid screening at airports any time soon, warning that it would introduce prescriptive measures for all US bound flights if an easing of restrictions were to go ahead on schedule. The US boast of a mature two-way dialogue between government and industry about the threats faced and the hardware performance requirements needed to address these threats. The EU doesn’t have these threat information sharing protocols in place, leading to a view that the region is behind the curve and only capable of responding to old threats. US aviation security policy was born out of the events of September 11 and for better or worse is deemed the only standard worth considering. UK proposals to shift responsibility for aviation security to the commercial sector must have sent shockwaves through Washington D.C. unless suitably robust threat sharing protocols form a part of the recently announced protocols. With almost half of the total global demand for aviation security technology coming from the US – the budget for passenger screening is some $769 million in this fiscal year alone –
vendors will quite naturally focus attention on this market segment. The obvious conclusion drawn from this is that any UK specific requirements – assuming airports fulfil the government expectation to invest and innovate – will be well down the priority list. BORDER CONTROL The government consultative exercise comes hard after a recent damning report on the UK’s ability to control its borders. The BBC report stated that the multi-million pound E-borders programme doesn’t have the capability to feed information to UK Border Agency (UKBA) personnel in real time. “We don’t get the details direct to our terminal, the method is no more sophisticated than a piece of A4 paper torn up and then distributed to the staff. You then have to keep an eye out for those people. There’s no joined up IT thinking, we’re living in the Dark Ages,” a UKBA source told the broadcaster. The issue led to the controversial cleric Sheikh Raed Salah, who is banned from entering the country, being able to walk through immigration at Heathrow and deliver a speech in Leicester after arriving in June. He was arrested before he could address a meeting in the House of Commons and is appealing against his deportation on human rights grounds. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
51
2011 SECURING THE FUTURE 4-6 October 2011 l Amsterdam, The Netherlands
What does the future hold for Aviation Security? IATA’s premier annual aviation security and facilitation conference will celebrate its 20th Edition this year with Amsterdam hosting for the first time. AVSEC World gathers global leaders and senior decision makers to discuss strategies and solution-seeking opportunities for the aviation industry. This year’s conference is all about the future – building a global vision for security to meet the challenges of growing passenger numbers, increased cargo opportunities, and ever-changing threats. Conference participants will be invited to consider what’s possible in the near term and how we can design and build solutions for the long term. Learn about leading edge cargo screening technologies.
Hear industry experts discuss new and emerging threats. Help shape strategies, solutions and opportunities for the air transport industry. Leverage new ideas and concepts into your company’s security strategy.
Walk through the Checkpoint of the Future. Connect with high level cargo and security representatives from airlines, airports, governments, national, regional and international organizations, manufacturers, suppliers, and police and law enforcement personnel from all over the world. Learn about the latest technology from leading aviation security suppliers at a special conference exhibition. IATA Member Airlines and Strategic Partners can also attend Security and Facilitation Forums before the main event, which will include detailed discussions of operational issues, including the latest on Supply Chain Security. “This is the event to attend if you wish to meet with those who matter in the AVSEC industry.” (testimonial from AVSEC World 2010 participant)
www.iata.org/events/Pages/avsec-world.aspx
Host Airline
Host Airport
Sponsors
Media Sponsors
Supporting Organizations
EVENT PREVIEW
Aviation
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SECURING THE FUTURE AVSEC World, 4-6 October, gathers global leaders and senior decision makers to discuss strategies and solution-seeking opportunities for the aviation industry IATA’s premier annual aviation security and facilitation conference will celebrate its 20th edition this year with Amsterdam hosting for the first time. AVSEC World gathers global leaders and senior decision makers to discuss strategies and solution-seeking opportunities for the aviation industry. The conference is a two-and-a-half day event that will look to the future, building a vision for security to meet the challenges of growing passenger numbers and ever-changing threats. It will consider what’s possible in the near term, and how we can design and build processes and solutions for the long term. Issues such as screening through intelligence, emerging threats, passenger experience, future technologies and building for security will be discussed. HIGH LEVEL REPRESENTATIVES The event brings together high level representatives from airlines, airports,
years? Aviation security has irrevocably changed since 9/11. How has the global security environment responded and are the changes for the better? An exploration of how aviation security can move forward more intelligently and efficiently. SEAMLESS, SAFE, IMPROVED TRAVEL IATA’s vision of the next generation travel experience implements both new processes and technologies. Bringing the whole passenger process together into a seamless experience through a combination of the Checkpoint of the Future and Fast Travel, IATA’s vision is one that puts the fun back into flying for the passenger. Beyond Pat-Downs and X-rays: Security screening is more than x-ray machines, body scanners, and metal detectors – it’s using intelligence, data, and behavioural analysis to identify those people who present a risk. Can we use passenger information to
On the tenth anniversary of 9/11, we will have the chance not only to reflect on what has changed in the past ten years, but also to find innovative approaches to security. Attendees can walk through the Checkpoint of the Future, as well access a major industry exhibition on the latest technology provided by leading security suppliers in the industry. governments, security agencies, industry manufacturers and suppliers, regulators, aviation professionals, customs and immigration authorities, police and law enforcement personnel as well as national, regional and international organisations. Past events have attracted global media attention, with BBC and CNN reporting live from the floor. On the tenth anniversary of 9/11, we will have the chance not only to reflect on what has changed in the past ten years, but also to find innovative approaches to security. Attendees can walk through the Checkpoint of the Future, as well access a major industry exhibition on the latest technology provided by leading security suppliers in the industry. Let’s look at the topics to be discussed at the event. Building a Future on Lessons Learned: What have we learned in the past ten
categorise individuals? Should issues of privacy and discrimination be our concern? A dynamic discussion of interest to all. Breaking Down the Walls: How do we leverage best practices and improve collaboration between government and industry, regulator to regulator, state to state, and region to region for a truly effective global security system? A discussion of the critical needs for the future, such as data sharing, risk management, and mutual recognition of standards and practices, and who defines them. A TOUCH-LESS JOURNEY It’s a perennial issue: how to make the passenger journey as seamless and pleasant as possible, without compromising security. Is it possible to integrate processes in security, customs, and immigration for a better travel experience? Add your voice to the debate.
Planning, Design and Construction for Aviation Security: What are the building blocks for a strong infrastructure that can withstand increased passenger traffic, throughput, and ever-changing security threats? What are the boundaries for securing public areas inside and outside of the terminal building? Who pays for security? A not-to-be-missed discussion. Future Technologies - Science Fact, Not Science Fiction: Future technologies are expected to help us improve processes and learn more about passengers. Hear the vision for technology that will help to gather more data, screen more clearly, and detect problems early on. An analysis of how technology will help the industry evolve. THREATS ON THE HORIZON Emerging threats to security may become more complex as chemical and biological weapons are perfected, explosives made more difficult to detect, and lasers become more powerful. A study of how the industry can best respond to anticipate and mitigate these threats. The Insider Threat – Can Anyone be Trusted? Are aircraft and airports safe from its own personnel who may not fit a “profile”? How much vetting of employees is necessary and appropriate? Who’s watching the screeners? A new twist on a continuing issue. Cargo Security of Tomorrow: The events of last October underscored the fact that innocent objects can be turned into tools of destruction. Whether looking for an explosive, weapons, or other tools of the terror trade, technology, data, and intelligence need to work hand in hand to find bad things before damage is done. Cyber Crime: The sophistication, number, and cost of cyber attacks are increasing, and the global aviation system is an attractive target. Experts in this field consider what the real risk is of cyber attack and the vulnerability of the globally connected air navigation, aircraft flight control and reservation systems. Managing Danger in the Air: Security screening is not the only thing that changed after 9/11. The method by which air traffic control authorities manage incidents has changed, as have aircraft design, in-flight procedures, and crew training. Can in-flight measures and international response procedures prevent such an event ever happening again? L FOR MORE INFORMATION http://www.iata.org/events /Pages/avsec-world.aspx
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
53
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Procom – providing high quality products and solutions for your communication requirements Procom is well known within the communications industry as a manufacturer and supplier of high quality antennas, filters and combining equipment. Having over 30 years of experience in the design and manufacture of equipment, Procom is the ideal partner for your communication solutions. Procom provides a range of products to new and established clients in the airports, blue-light, defence, marine, PMR, security and transport sectors. Our in-depth knowledge of antennas and filters makes us the perfect partner for MOD and government sectors. Our technical expertise and continuously developing range of bespoke products have enabled us to successfully supply solutions in some of the most demanding areas within radio communications. Our products and solutions cover the following applications: • Base and marine antennas that are well known for their high quality and stability under extreme working conditions. • GPS antennas such as our GPS Combi-mount, which is setting industry standards with high-gain noise amplifier and a unique mounting concept. • Mobile antennas covering a broad range of applications with both permanent
and temporary installations. Alongside a comprehensive variety of cables and connectors to meet of all your requirements. • Portable antennas comprising of end fed, helical, flexible and rubber design. • Microwave antennas designed from 5 to 110GHz for fixed connections and point-to-omni-point applications. • Filters include both cavities and helical resonators using high-quality components combined with an extensive QA system to ensure unparalleled performance. Covering duplex, band-pass, band reject, low-pass and high-pass filters.
Call us now to find out more on +44 (0)1279 456320 or visit us at www.c3headsets.com Headsets, Microphones and more
• Multicouplers manufactured with built-in adjustable gain including receiver multicouplers, rx power splitters and low noise amplifiers. • Combiners are available as either cavities or hybrid for transmitting equipment. Combiners are supplied with either single or double isolators. Product categories are TX combiners, couplers, dummy loads, attenuators and power dividers. Procom products have a reputation for quality and are characterised by having a large degree of handmade components which are thoroughly tested to provide stability, function and durability. If you have a particular project that requires a specialised solution or would like further information on our products we would like to hear from you. FOR MORE INFORMATION Contact: Michael Hudson Address: Procom UK Sales Ltd Unit 5B Altira Park Herne Bay Kent CT6 6GZ Tel: 01227 743099 Fax: 01227 743098 sales@procomuk.co.uk www.procomuk.co.uk
Come and visit us at Stand N8-387 Clement Clarke Communications Ltd Unit A, Edinburgh Way, Harlow, Essex, CM20 2TT, UK Tel. +44 (0)1279 456320 Fax. +44 (0)1279 456339 Web. www.c3headsets.com Email. info@c3headsets.com
54
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
CRISIS COMMUNICATIONS
COMBATING COMMUNICATION BREAKDOWNS In the aftermath of the London bombings, mobile phones and radios stopped working, hampering the rescue operation. This triggered experts from Kingston University to find a way to ensure breakdowns in communication are a thing of the past
Kingston researchers Dr Christos Politis, Arvind Ramrekha, Emmanouel Panaousis and Grant Millar
Discussions about emergency services usually diverge into discussions about most prominent natural catastrophes and terrorist attacks. Such events tend to create crisis and inflict panic over the general public. For this reason, it is important to define an appropriate crisis handling management framework. This strategy will coordinate all the available resources in terms of public services (i.e. police, authorities, hospitals, fire-brigade) so that the crisis is resolved smoothly. RADIO COMMUNICATIONS Two major radio systems are used in Europe for public safety and security purposes: TETRA and TETRAPOL. The main differences between these professional mobile radio (PMR) systems and other public mobile cellular systems, such as GSM or UMTS, are faster call set-up, group calls, priority calls, encryption, and the ability to make direct calls without connection via a base station. There have been heated discussions on which system is better, in terms of reliability and cost. Both TETRAPOL and TETRA are digital, cellular trunked radio systems. Lately, there have been some reports of health issues related to the use of the TETRA technology
but no health problem has been reported with TETRAPOL technology so far. Work and development in the area of emergency services has often resulted in a separate communication infrastructure with specialised radio frequencies, protocols and hardware. This has often proven expensive and non-interoperable across communication platforms and services. While current approaches such as TETRA already provide a networking technology that will be available to different emergency agencies it is still a closed network with very expensive equipment and OPEX costs. Besides its low bandwidth, there are already different non-interoperable flavours of the TETRA technology that are used in various EU countries. This would make the communication between emergency agencies from different countries just as difficult. MULTI MEDIA TRAFFIC Research at Kingston University, London, looked at how we communicate in a major disaster or emergency. When there’s a major terrorist event, earthquake or large forest fire, traditional phone lines and radios often cannot cope and tend to jam because of the volume of calls or other multimedia traffic.
The goal of the Kingston University research team was to realise emergency services based on an all-IP network and standardised platforms such as IMS (IP Multimedia System) and MANETs (Mobile Ad-hoc Networks) which are proposed by 3GPP, ETSI and IETF respectfully as the basis for multimedia communication in next generation networks. The team led by Dr Christos Politis and comprising Arvind Ramrekha, Emmanuel Panaousis and Grant Millar, has designed a sophisticated, internet-based software platform to keep rescuers and their central control room in touch independently, rather than using central wireless access points (GSM, UMTS or WiFi) or the TETRA system. Then any device the size of an iPad or other personal digital assistant using this software technique will also allow emergency service workers in the United Kingdom to talk to counterparts across Europe on a secure system. The devices can operate in licenseexempt (i.e. WiFi or licensed spectrum such as UMTS) and can stay connected for as long as their batteries last.
Communications & Technology
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HOW IT WORKS The software runs optimisation algorithms in order to reduce power consumption, increase QoS (quality of service) and maintain security rules. The design allows one of the mobile devices carried by a rescue worker to act as the super-node letting other mobile devices communicate with each other. This is based on a unique DHT (distributed hash table) algorithm that the researchers have implemented and it is integrated within their software platform. As soon as a device passes a virtual intelligence security-check, it can start to find others in the location. Each worker can then talk or send video or data to individual workers or entire groups up to the distance of about 500 metres. The devices have been further optimised to work with sensors. These sensors are able to pick up humidity levels, workers’ heart rates, temperatures, movement and pass these on to the super-node for further forwarding or processing. GOING FORWARDS We believe our invention offers huge potential in the fight against terrorism and natural disasters. If the optimised devices take off then in the future it could transform the way rescuers search for survivors in an earthquake. The Kingston design recently won backing from emergency service experts and EC bureaucrats in a workshop in Portugal. The team has also liaised with the Internet Engineer Task Force (IETF), an international community of Internet professionals who work to advance the Internet architecture, as the application has been developed. At the same time, the Kingston team has filed a patent on the implementation and will now be refined and could be rolled out to emergency services within two years. L
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
55
EE_D25 UNITEMP
7/3/08
16:34
Page 1
www.unitemp.co.uk +44 1 628 850 611
ARMOURED SAFETY UNCOMPROMISED NEW LANDROVER DISCOVERY 4 FULL B6 ARMOURED TOYOTA LANDCRUISER 200 FULL B6 ARMOURED UNREGISTERED BMW 330i LHD & RHD B4, VR4 ARMOURED BMW X5 4.4i LHD & RHD B4, VR4 ARMOURED HOT AND COLD CLIMATE SPECIFICATION BMW 530i & 550i LHD & RHD B4,VR4 ARMOURED
0044 121 700 7165 info@armoured.uk.com www.armoured.uk.com
£195,000 £109,900 £34,900 £59,700 £67,900
CALL US NOW ON 0044 121 700 7165 Please contact Armoured for further details on the full specification and details of our immediate delivery vehicles, which comprise of 50 new vehicles and a selection of 20 used vehicles. Armoured can assist with all shipping and export license requirements
LAND ROVER - RANGE ROVER - BMW - MERCEDES - CADILLAC - TOYOTA - CHEVROLET
SUPPLIERS OF ARMOURED VEHICLES WORLDWIDE
SECURITY BUDGETS
IP Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
A BRIGHT SCENARIO FOR SECURITY SPEND Security spend is on the rise across Europe, especially in the area of network/IP video surveillance, according to the latest research from major security event IFSEC and Frost & Sullivan In a time of austerity, where budgets continue to be slashed, new research has highlighted an encouraging rise in security spending, with end-users* reporting a three per cent increase in budgets for video surveillance systems and a two per cent predicted rise for access control and security systems integration over the next 12 months. Conducted in association with the world’s largest annual security event – IFSEC (International Fire & Security Exhibition and Conference), this latest Frost & Sullivan survey forecasts a bright scenario for security spend across the next five years, with video surveillance budgets set to increase by in excess of five per cent and access control and security integration pegged to between three and four per cent. Conducted to help heads of security, intelligence officers, procurement officials and department heads in local and central government to understand budgets and future spend on security technologies, European Security Industry Outlook 2011 is also helping organisations to assess the awareness of new technologies and better evaluate supply chain relationships. A GROWTH IN BUDGETS Channel players such as system integrators, consultants and distributors are naturally more optimistic anticipating an increase in video surveillance budgets of close to eight per cent, systems integration (six per cent) and access control (five per cent) over the next year. Intrusion detection will see a modest growth in budgets of close to one per cent. Growth in UK budgets of four per cent is believed to be lagging behind the rest of the world. The positive outlook for network/IP video surveillance is also supported by the survey
with 12 per cent of respondents planning to install an IP/network video solution within the next 12 months. Network/IP Video Surveillance cameras already have a fairly good penetration of large businesses tasked with the role of delivering robust counter terror defences and therefore growth is expected to be faster with small to medium organisations under 1,000 employees. Video analytics is also set to experience strong new demand though this will be with larger organisations. The optimistic picture for network/IP video surveillance is shared by channel players with 71 per cent of respondents believing that the pace of migration to IP systems will quicken in 2011/12. Systems integrators have the strongest expectations with security consultants, installers and distributors all having broadly the same opinion. THE END OF ANALOGUE? Over the next two years the analogue market will remain flat with the loss of revenues from customers switching to network/IP video surveillance being balanced out by replacement sales or new sales in applications that require a relatively simple security solution. Decline in analogue camera usage will be highest in very large organisations with 50 per cent reporting a reduction in spend. Convergence between physical security and IT remains top of mind with most channel players believing that it will have a positive impact on their business. However challenges still exist including the compatibility of different manufacturer’s products and lack of cross standard platforms, installation costs and lack of IT skills and knowledge. To support the migration from an analogue system to a network/IP video surveillance
Conducted to help heads of security, intelligence officers, procurement officials and department heads in local and central government to understand budgets and future spend on security technologies, European Security Industry Outlook 2011 is also helping organisations to assess the awareness of new technologies and better evaluate supply chain relationships.
solution most end-users partnered with an IT systems integrator (29 per cent) and/or trained existing IT staff (26 per cent). Training existing security staff was the least preferred of the key migration strategies. Channel players on the other hand are placing much more emphasis on training existing staff (44 per cent) whilst also recruiting IT talent (five per cent) to bridge the knowledge gap. As an example, the use of access control for time and attendance is clearly gathering momentum with 35 per cent of customers currently utilising it for this application and a total of 64 per cent (including current users) interested in implementing it. Furthermore, 25 per cent of the survey sample are currently employing security technology in other applications ranging from health and safety (employees are wearing correct PPE for example), monitoring occupancy levels and asset tracking and operational processes. A summary report of the survey is available at www.ifsec.co.uk/frostandsullivan. Tell us how you see security spend changing over the next 12 months, join our LinkedIn group ‘IFSEC Show’ and join in the discussion! L *A survey of 355 end-users and channel players.
IFSEC 2012 IFSEC International 2012 (14-17 May 2012 at NEC Birmingham) offers security professionals from all over the world the opportunity to discover cutting-edge security solutions as well as benefit from a comprehensive educational programme and innovative interactive feature areas. Hosting more than 25,000 visitors every year from over 120 countries, IFSEC is the central meeting place for the international security industry. The IFSEC brand can now be found throughout the world with IFSEC South Africa, IFSEC West Africa, IFSEC India, IFSEC South India and the recently announced IFSEC Arabia. IFSEC International 2012 will be colocated with two other industry leading events – Safety & Health Expo 2012 and The Facilities Show 2012. Please keep visiting the website at www.ifsec.co.uk and follow us on Twitter @IFSEC for the latest information.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
57
CAPTURE. RECORD. DISPLAY. CAPTURE. A Samsung HD Network Security Solution captures up to 5 times the detail of standard resolution systems. HD image capture up to 1080p, recording and display combine to provide a security system which delivers an incredibly high level of picture detail. HD cameras and displays deliver a wide aspect 16:9 view of a scene and allow operators to pin-point specific areas of interest for closer inspection, without losing definition or suffering from pixilation. And by using HD recording this can be achieved on recorded footage with the same clarity. With a host of cameras, a choice of hardware or software recording options, plus HD displays, you can develop a security solution perfectly suited to your business.
Samsung HD Network Security Solutions. Smarter Security.
T 01932 455 308 E STEsecurity@samsung.com W samsungsecurity.com Samsung Techwin Europe Ltd 1000 Hillswood Drive. Chertsey. Surrey. KT16 0PS. UK
ACCESS CONTROL
IP Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ACCESS TO AN INTEGRATED SECURITY SOLUTION In this article Paul Taylor of Samsung Techwin Europe Ltd highlights key developments in access control that could be of interest to those involved in detecting and preventing terrorist activity Paul Taylor takes a look at some recent developments in access control that could be of interest to security professionals working against terrorists. With end-users looking for maximum benefit from their investment in security, a major objective to the success of any access control system is to seek ways in which it can interact with other security systems. A major trend we are seeing at the moment is linking access control with CCTV systems. The opportunity to pass video, data or alarm information between these systems has obvious operational benefits. As well as providing visual verification of anyone attempting to gain access to restricted areas, there is also an opportunity to obtain valuable management information such as time and attendance records. CONFIDENCE For end-users to have confidence in the information provided by a video surveillance system and an access control system working in harmony, it is obviously important that access control events and alarms can be reliably and consistently synchronised with the relevant video. Until now there has not been a low cost method of doing this and for many years users have suffered the frustration of finding that the video they have retrieved from a DVR relates to an event that occurred several seconds or even minutes before or after the actual event they wished to view. RETURN ON INVESTMENT There is, however, some good news for endusers who are looking to gain maximum ROI from their security systems as this technology becomes more widely available. Samsung already provides, as a standard feature, time synchronisation between its fingerprint recognition, proximity, and smart card and PIN based access control systems and its SRD digital video recorder range. This can also be taken onto the network by using an encoder with a built-in SD card that records an event when access is granted or denied at the access control reader, allowing users to view video via a web page. This easy to implement and powerful feature provides installers and system integrators with an opportunity to increase revenue streams, whilst offering both new and existing clients with reliable access control data, verified by high quality video evidence.
ACCESS CONTROL MANAGEMENT SOFTWARE Samsung’s Access Control range allows it to compete for projects that have up to 128,000 doors with choice reader technologies which encompass fingerprint recognition, proximity, and smart card and PIN, as well as time and attendance options. Our biometric fingerprint reader capability is particularly impressive in that it can hold up to 4,000 fingerprint templates and yet has a read time of just half a second. Whilst our standalone controllers offer the ideal solution for single door security, we also provide the option to link multiple doors together over a network. When networked, it is possible to easily share the biometric database to other connected standalone controllers without the need for a separate computer or additional software. FULL CONTROL The challenge is to ensure users can have full control over what may be a complex system and as such be able to monitor, record and retrieve valuable data which could be needed as evidence when looking to prosecute unwanted visitors who have engaged in criminal activity. The good news is that Samsung Access Management Software (SAMS) is able to provide detailed reports on card holder activity which can be exported in Excel or PDF form for integration with other software packages, e.g. Time & Attendance, ERP or Payroll. The professional version, SAMS Pro does the same, but also provides additional advanced functionality, including the support of integrated access control and video monitoring to allow an operator to view video activity related to a specific card holder. The status of readers and cameras can also be monitored on a user defined map. Further good news for limited budget projects is that SAMS is available free of charge for installations that have up to 40 doors and/or 1,000 users and includes video integration. L FOR MORE INFORMATION For further information on Samsung’s comprehensive range of RFID and biometric technology based access control systems, please e-mail STEsecurity@samsung.com telephone +44(0) 1932 455308 or visit www.samsungsecurity.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
59
Ballistic Absorption Barrier Systems www.babs.us.com
blocks are a revolutionary new product utilizing ‘green technology’ to manufacture a new method of protection against ballistic and blast events
During blast survivability testing conducted at the Aberdeen Test Center (Maryland, USA) a wall constructed of BABS blocks showed 99% blast attenuation
Testing performed December 2009 - US Army Aberdeen Test Center, Maryland Demonstrated at Quantico Marine Base - Virginia USA 2009
are custom designed and installed for each unique application for use in perimeter protection, embassy protection, airport security, major event security, pipeline protection, military installations, blast and ballistic protection have been designed for ease of movement and quick deployment. They are constructed to be positioned similar to building blocks. They are portable, reusable, and protective.
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
Ballistic Absorption Barrier Systems utilize recycled scrap tires to create blast absorption barriers for use in perimeter and check point security, embassy fortification, pipeline protection, and major event security Scrap tires are one of the world’s largest environmental problems. Hundreds of millions of tires are produced each year increasing the total number of tires worldwide. Most current applications for scrap tires involve burning or burying tires. These options can have a large environmental impact.
260
=
www.babs.us.com
At 30lbs (13.6kgs) per block, the Eco-Blok has been developed as a durable and reusable alternative to standard sandbags
Each BABS block uses 260 scrap tires
Ballistic protection Erosion control Major event security Flood control Crowd control
Military uses Civil engineering Parks and recreation Emergency response
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
EVENT PREVIEW
STAYING AHEAD OF MAJOR RISKS
Security professionals from around the world will gather at Milipol Paris 2011 to see first hand the latest security products and services that help protect the public from serious threats In October 2011 Milipol Paris, the international exhibition of internal state security, will open its doors for four days of meetings, discovery and discussion. Milipol Paris 2011 will be welcoming more than 1,000 exhibiting companies from 43 countries and is expecting 30,000 visitors. Milipol Paris is the undisputed meeting place for technological innovation in the field of the security of people and property.
The exhibition, taking place 18-21 October at the Paris Porte de Versailles Exhibition Centre, covers some 18 business sectors and showcases a comprehensive range of solutions, developments and services that help countries to protect their populations. As partners of Milipol Paris, the French and European administrations have confirmed their participation at the exhibition, including the French Ministry of Interior; the
Milipol Paris, taking place 18-21 October at the Paris Porte de Versailles Exhibition Centre, showcases a comprehensive range of solutions, developments and services that help countries to protect their populations.
French Ministry of Justice; French Customs; CESCOF (Joint centre for the support of soldiers and the forces); and Europol.
Milipol Preview
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THE MAJOR RISKS AREA GETS BIGGER In 2009, for its 25th anniversary, Milipol Paris created a new area dedicated to the protection of countries and their populations in the face of major risks from environmental, climatic and industrial sources. This new area brought together all the players in each of these fields around the French Directorate of Civil Defence and Security. Exhibitors involved in the prevention and management of risks and disasters, whether natural, technological (industrial), health-related or terrorist showcased their products and services. In response to the interest shown by visitors to the previous show, the major risks area will be expanded in 2011 to allow all relevant stakeholders to showcase their innovations in this ever-changing field. The protection of populations is now more relevant than ever before. Indeed, the recent succession of natural disasters such as the Xynthia storm, the Iceland volcanic ash cloud, and the earthquake and tsunami in Japan, makes it even more crucial for states to rethink their public security policies. BUSINESS MEETINGS Launched by the European Commission, Enterprise Europe Network is the first E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
63
EVENT PREVIEW
Milipol Preview
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Useful information DATES: Tuesday 18 to Friday 21 October 2011
OPENING HOURS: Tuesday to Thursday, 9.00 am - 6.00 pm Friday 9.00 am - 4.00 pm
WHERE: Paris Porte de Versailles exhibition centre – Pavilion 1, France
TRANSPORT: • Subway line 12 – Porte de Versailles station • Subway line 8 – Balard station • Tramway lines 3 & 2 – Porte de Versailles station • Autobus lines 39 & 80 – Porte de Versailles • The exhibition is reserved for security industry professionals. • Access is only available with an official invitation card or electronic badge. • Proof of identity will be requested together with the badge.
Areas covered • Data protection
Milipol Paris is recognised internationally as the flagship event of the security sector. The 2009 show attracted 887 exhibitors, of which 64 per cent were international from 43 countries, and 27,650 trade visitors from 132 countries contributed to the success of the 16th event. E European network supporting SMEs that aims at promoting innovation and competitiveness. Its services include partner searches for technology, research and business cooperation, technology audits, advice on European regulations, current FP7 programmes and funding opportunities. This event is organised in partnership with other members of the Enterprise Europe Network, which brings together 44 countries from continental Europe and beyond. The support of European advisers will help companies make the most of
these partnership meetings with buyers and vendors coming as exhibitors and visitors. Register now on the official business meetings platform of Milipol Paris 2011, which allows you to select international companies in advance and to pre-schedule meetings with them. THE UNDISPUTED WORLD STANDARD Milipol Paris is recognised internationally as the flagship event of the security sector. The 2009 show attracted 887 exhibitors, of which 64 per cent were international from 43 countries, and 27,650 trade E
• Economic and industrial intelligence • Systems integration • Risk analysis and management • CBRN • Civil defence • Forensic science services • Law enforcement • Anti-terrorism – Special Forces • Protection of industrial and sensitive sites • Fight against organised crime • Security of public places – Urban security • Transport security • Port and airport security – Border control • Road safety • Security of financial systems • Prison sector • Oil and gas sector
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
65
ONE COMPANY - TOTAL SECURITY An OSI Systems Company
MORE
SCAN
SECURE
MORE
Rapiscan Systems - the Leading Provider of Security Screening Solutions Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it. With the broadest range of security screening products for customs and border protection, aviation security and defence applications we provide comprehensive, fullyintegrated security solutions.
The Rapiscan Eagle M60
And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget. To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA) or +1 310-978-1457 (Americas). The Rapiscan Optimised Checkpoint
Visit Rapiscan Systems at the following exhibitions: AVSEC -September 19-21 - Amsterdam Transec - September 13-14 - London - stand number C2 Milipol - October 18-21 - Paris - stand number 2E 110
sales@rapiscansystems.com • www.rapiscansystems.com
ONE COMPANY - TOTAL SECURITY
EVENT PREVIEW E visitors from 132 countries contributed to the success of the 16th event. Milipol Paris 2009 was marked by the arrival of 10,433 visitors from outside France, representing an increase of 27 per cent compared with 2007 and confirming the international positioning of the world’s leading event dedicated to internal state security. The previous event also showcased a trail of the changes in equipment and technologies since 1984. The Police Nationale, the Gendarmerie Nationale and Customs partnered this project to review the history of internal security. A genuine technological showcase, the exhibition demonstrated how innovations have emerged each year and, for 2009, several key trends were highlighted: video-protection, a subject which new cameras are making more topical than ever, increasingly advanced drones and cars which are becoming “smart”. Other areas of innovation were the “Policeman of the future” and his equipment, as well as cuttingedge techniques for combating major risks. HISTORY OF THE EXHIBITION At the end of the 1970s, various French manufacturers supplying police equipment were worried that they had limited commercial contacts at an international level. Contrary to the aeronautics and defence sectors, the interior security sector did not have a promotion and communications
platform that matched its importance in France. As a result, the idea of organising a specific international exhibition took hold. EXPOL (EXposition POLice), the first private initiative, showed the way. In 1984, the International Milipol Committee came to life as an association whose goal was the promotion of security technology and equipment. That same year, the first international Milipol Show was organised in Paris as the principal information and public relations tool, open widely to professionals in the field of security, including manufacturers, end-users, buyers and exhibitors of all nationalities. The quasi-confidential field of police, civil and military security equipment, virtually unknown to the general public until that time, was thus brought to light. FROM STATE SECURITY TO THE CIVIL PROTECTION While the subsiding cold war still held centre stage, security services were already at work in the wings, fighting against such growing menaces as criminality, drugs, organised crime, terrorism, industrial and economic espionage. They expressed their latest requirements and needs for equipment, while investigating all the technologies available. The Milipol Show evolved within this climate of expectation and demand. It broadened
out to include the field of security which encompasses private and public communities, that of industry and business, the protection of populations, and internal State security. Held annually during the 1980s, the Milipol Paris Show found its current rhythm as of 1991, the year in which the biennial scheduling was adopted. In 1995, it acquired new dimensions of considerable importance. As it was now held under the patronage of the French Ministry of the Interior, the Milipol Paris Show became an official event, along the same lines as the international Eurosatory exhibitions for land armament, Euronaval for naval equipment and the Paris-Le Bourget Aeronautics-Aerospace Exibition. From 1970 to 2011, the international economic and security has been evolving very rapidly. The creation of Milipol allowed to answer a growing demand for information and matchmaking in the field of internal security, before spreading to the areas of civil defence and major risks. Today, the international Milipol Trade Show is recognised for its professionalism and the quality of its exhibitors and visitors attending from the various security sectors around the world. L
Milipol Preview
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR MORE INFORMATION www.milipol.com
Seven Technologies Ltd is a growing, dynamic, global technical surveillance enabler Seven Technologies is borne from a passionate desire to provide counter terror and law enforcement officers with solutions that work. The company provides specialist surveillance capability delivering R&D, product design and production, skills based training and specialist support worldwide to government specialists. “Our approach to everything starts with the user and no matter how technically adept our solutions maybe, you will always find that they are fit for purpose and intuitive to use”
Seven Technologies understands that capabilities readily employed by the specialist military and law enforcement user also have many broader applications. Resultantly we developed our capabilities to provide not only covert solutions but also force protection, situational awareness, close protection and border security capabilities to the broader community.
We look forward to chatting over our capabilities at Milipol on stand 1 3K 047
For more information please visit www.seventechnologies.co.uk
TECHNICAL | TACTICAL | PRACTICAL Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
67
PEAK
PERFORMANCE For optimum performance in demanding conditions, Houghton metalworking fluids lead the way. Tool life measurements in new independent titanium milling tests show Hocut 795B as the top performer amongst all leading aerospace coolant technologies. With its ultra long life, economy in use, versatility for all materials and array of global approvals it’s not surprising that Hocut 795B is the world’s best selling aerospace coolant. For more information on Houghton products or details of the titanium machining research contact us via our website or call our Customer Services desk on +44 (0)161 874 5000.
www.houghtonglobal.com
Fluid Technology & Service Worldwide
Houghton Plc, Beacon Road, Trafford Park, Manchester M17 1AF. Tel: +44 (0) 161 874 5000 Fax: +44 (0) 161 874 5001 Email: uk.enquiries@houghtoneurope.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CHEMICALS
METALWORKING FLUIDS IN THE AEROSPACE SECTOR – HIGH TECH OR BLACK ART?
Metalworking fluids are essential in the manufacturing of defence and aerospace components but probably the least understood element of the process In reality the latest technology metalworking fluids are highly complex blends formulated by specialist companies such as Houghton to meet a range of criteria, including compatibility with materials being machined, filters, elastomers and plant make-up waters. Fluids must have the ability to deal with tramp oil contamination, high pressure application systems and at the same time ensure long sump life without being harmful to users and the environment. To deal with all this a typical, modern water based metalworking fluid is a complex blend of 20 or more additives all critical in some way to the performance, stability or safety of the product. Metalworking fluids are formulated by experienced chemists and this corner of the market for lubricants is an intensely specialist area far removed from the world of petrol forecourts and Formula One imagery. RESEARCH AND DEVELOPMENT The leading metalworking fluid suppliers operating in the defence and aerospace sectors have to invest a great deal of technical resource into research and development in order to gain prime approvals for their products. Houghton is a key global defence and aerospace supplier and employs teams of chemists in laboratories around the world to formulate products for these exacting specifications. There is no margin for error with formulations; where chemical attack on sensitive materials can lead to stress corrosion and component failure. For example Houghton provides the leading water based coolant for Rolls Royce gas turbine engine production. To gain approval against Rolls Royce specification the formulation must undergo an array of chemical and mechanical tests against all materials commonly used by the company. Other primes are no less demanding, for example BAE Defence Systems insists on a similar programme of testing to Rolls Royce but also wants to see evidence that a product will not cause inter-granular corrosion of its aluminium alloys. Other primes issuing their own approvals include Airbus, Boeing, Bombardier and SNECMA in chemical specifications, which blacklist many additives to make sure that
products meet the latest demands for safety of workers and the environment. Chemistry is not the only science necessary for metalworking fluids. Houghton’s Microbiology department carries out challenge testing of water based formulations against commonly encountered bacteria. Bacteria contamination has always been a common failure mode of water based coolants but microbiology of products in use is now becoming much more important as new health guidance insists that users protect workers from exposure to bacteria laden mist. Far from purveyance of a black art, Houghton facilities provide high technology technical service support for a sophisticated range of metalworking production fluids including Hocut 795B, the world’s best selling coolant technology in the aerospace sector. Technical manager Paul Smith says: “As a leading metalworking fluid supplier to the aerospace sector, we recognise that a high level of laboratory investment is needed in both R&D and technical service. Anyone visiting Houghton laboratories in Europe will see the resources committed and the skill and attention to detail applied to our metalworking fluids. “Not all metalworking fluids are the same. We spend many thousands of development hours formulating, testing and validating products before we are able to fill a single machine in this sector. Customers can be confident that our products have the necessary accreditation from aerospace primes, having passed an intense approval process on the laboratory bench and on the shop floor.” KEY SUPPLIER Houghton is one of the world’s principal suppliers of speciality metalworking lubricants and fluid management services. The company is a key supplier to Boeing and Rolls Royce and has one of the largest portfolios of approvals in the world aerospace market for high quality products including metalcutting oils and heat treatment fluids. Houghton has European production and research facilities in Dortmund, Barcelona, Rouen, Turin and Manchester. L FOR MORE INFORMATION www.houghtonglobal.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
69
Defence & Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
DSEi 2011
OPPORTUNITIES AND LATEST INNOVATIONS Defence & Security Equipment International, 13-16 September at ExCeL London, is the key event for this sector. It provides a unique platform allowing you to meet the whole supply chain in four productive days From 13 to 16 September, Defence & Security Equipment International (DSEi 2011) takes place at ExCeL in London’s Docklands. The exhibition is well-known as a leading event for land, sea and air applications for the defence sector, but this year will include a much greater focus on security. The borders between defence and security have become more and more blurred over the last five years and the show has seen an increasing participation from companies specialising in areas such as border security and national security; this has resulted in DSEi focusing more on these issues and nations’ responses to them. Plans include a Security Showcase and Demonstration area hosting live scenario and product based demonstrations. This platform
allows exhibitors to promote their technology and services to a highly targeted audience including security and military delegations. SPECIALIST EXHIBITORS From the security sector, leading specialist companies exhibiting at DSEi include G4S, Explora Security, Smiths Detection, Cristanini and Avon Protection. The latter specialises in the supply of advanced CBRN, hazmat and riot control respiratory solutions to the world’s military and security services. Silver Sponsor Chemring EOD will be running a thought leadership session at the event and leading security prime contractors including Northrop Grumman, Lockheed Martin, Finmeccanica and Raytheon will also be exhibiting. The US Department of Homeland Security
is lending its weight to DSEi 2011 and will be giving a briefing on its latest national security requirements and technologies. DEBATING TODAY’S SECURITY CHALLENGES In addition to a high profile series of keynotes, an on-floor seminar series will include speakers covering the most pressing topics facing national security around the world today. Combating cyber warfare, for example, will be high up on the agenda here. Western governments are taking threats in cyberspace very seriously and there are rising expectations that they will be able to build and sustain effective cyber defences. E-CRIME Over the summer of 2010 the international news media picked up on a computer worm, known as Stuxnet, that had been attacking the computer systems controlling Iran’s controversial nuclear programme. The Stuxnet affair reinforced concern across the world E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
71
All Eley Metrology products are designed, manufactured and verified to the relevant ISO or British Standard at our premises in Derby UK. For all enquiries please Email: sales@eleymet.com Phone: 01332 367475 To see our complete range of products, please visit our website www.eleymet.com
Precision Long Bore CMM measuring a Jet Engine component
Eley Metrology Beaufort Court Mansfield Road Derby DE21 4FS
DSEi 2011
In addition to a high profile series of keynotes, an on-floor seminar series will include speakers covering the most pressing topics facing national security around the world today. E that computer networks could be deliberately targeted to cause massive damage to societies that have come to rely on the internet and its associated technologies. These range from the simple infection of a business’s computers, to e-crime and e-espionage through to the disruption of the computers that control electricity power and other essential utilities. Many governments have now moved to set up cyber operations centres to monitor, on a real-time basis, the operation of computer networks in their country. While in the past many countries were able to separate crucial military and national security networks
from the mainstream civilian internet, the ubiquitous nature of the internet in the 21st century means that it is very difficult to do this. For example, many of the cyber domains that the western armed forces use, run on commercial networks that reside in several countries so individual governments do not have a dominant say in the structure and operation of the internet anymore. The view is also growing that the defence of civilian cyber resources and infrastructure is a proper role of governments, as part of its duty to protect their nation’s populations and economic interests.
MORE VIP VISITORS DSEi 2011 will be looking to increase the number of international security delegations attending the show. The DSEi VIP engagement team is already working closely with the UKTI Defence & Security Organisation, which is extending invitations to national security/paramilitary forces and border security organisations, that will form top level international security delegations. The last time that DSEi was held, in 2009, 70 official military delegations attended, from 49 countries. The organisers are hoping to increase this number for DSEi 2011 – again working with UKTI DSO. DSEi is also renowned for attracting senior military personnel outside the remit of the official delegations – and this programme of invitations has been expanded for this year. Recognising that one of the main reasons Tier One and Tier Two suppliers, as well as SMEs, participate in DSEi is to meet and network with prime contractors, the DSEi VIP engagement team is also putting together Prime Contractor Industry Delegations. While these prime contractor personnel – including purchasing directors, chiefs of engineering and heads of supply chains – traditionally attend DSEi anyway, this will be the first time that they will be involved in specifically programmed delegations.
Defence & Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NEW FEATURES DSEi is a major springboard for the introduction of cutting edge technology, as well as the equipment already being used in today’s operations. In 2009 there were 1,280 companies exhibiting from 40 countries and this included whole supply chains covering a variety of programmes. Spanning the whole supply chain, the event brings together everyone from the largest prime contractors right down to the SMEs producing the smallest of electrical components, whose role, although small, is none the less vital in a programme’s E
A flexible new concept in personal protection The portable self-installable Panic Room has been conceived in consultation with police and military experts to safeguard HNWIs alongside those at risk of attack on a temporary or long-term basis – each requires a safe, sustainable refuge as a last point of defence. Target audiences would be senior forces officials targeted by insurgents, international oil millionaires’ relatives under threat of tiger kidnap, police and closed protection industry utilising Panic Rooms as refuge for VIPs at public events or as disguised emergency arms stores at political conferences. The Panic Room solution is cost-effective, flexible, scalable and technologically cutting-edge. Delivered flat-pack, the Panic Room can be installed in half a day with minimal manpower – this provides flexibility of
use and portability. Low costs allow for multiple purchases with various size options available as well as customisation. The unit can be disguised to unobtrusively blend in with any environment. Dependent on use, Panic Rooms can withstand physical attacks with hand tools up to shotgun fire and more powerful arms
attacks as required. Each unit can then be adapted to various levels of connectivity to complementary devices – this may be a ‘panic button’ activating the home alarm system, iPad-2 technology using ISDN or 3G to contact external help or bespoke computer systems able to drive smoke screens or security cameras. Although the time spent within is likely to be minimal, the Panic Room environment is comfortable and sustainable with external ventilation and air filtration, breathing equipment, lighting, back-up power supplies, fresh water and basic toilets all considered. FOR MORE INFORMATION Tel: 08000 467232 info@thepanicroomcompany.com www.thepanicroomcompany.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
73
Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture Electronic Warfare, Unmanned Systems, Radar, Surveillance The most important thing we build is trust
• • • • • •
Large Standard Product Range Customised Antenna Development Sector and Multi Sector Omni, Multi-Stacked Omni High Gain Directional COFDM Applications
• • • • • •
UAV, UMS, UGV Direction Finding, Tracking Covert/Overt PMR, Tetra, Cellular DAS Ultra Wideband IED Countermeasures
Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: antennasystems.ma@cobham.com www.cobham.com/antennasystems/newmarket
European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas
UK ad counter terror 7 2011:Layout 1
Antenna photos not to scale
7/12/11
11:36 AM
Page 1
CounterTerror20100908.indd 1
25/11/2010 15:33
www.pcb.com/sure
Blast Detection Measurements? We Do! We do it all TM
- sensors to measure vibration, acoustics, force, pressure, load, strain, shock and torque - Sure we do!
LTD.
7 Paynes Park, Hitchin, Herts SG5 1EH, UK Tel: 01462 429710 ■ Fax: 01462 429798 E-mail ukinfo@pcb.com ■ www.pcbsensors.co.uk
DSEi 2011 E performance. For this reason, DSEi 2011 will feature a dedicated electronics pavilion to provide specialist electronics companies with a powerful platform for presenting their products and services – to the benefit not only of visitors, but other exhibitors as well. Drawing on the expertise of NEW Events – which organises the highly successful National Electronics Week – and supported by Intellect, the DSEi Electronics Pavilion will allow electronics companies to exploit the potential of the defence and security market. The pavilion will act as a focus area for electronics companies of all sizes; it will include a lounge area for the use of all those exhibiting in the pavilion and will be designed to allow exhibitors an easy way to promote what can be complex products, many of which are too small to be viewed by the naked eye alone. Leading international electronics players such as XJTAG, Vicor, Lauterbach, Humiseal and Phaedsys have already committed to exhibit.
Defence & Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
UNMANNED SYSTEMS ON SHOW The Association for Unmanned Vehicle Systems International (AUVSI) is supporting a new Robotics & Unmanned Systems Showcase this year. AUVSI, which is dedicated to advancing the technology of unmanned systems, is helping to create a dedicated area that will be used for live demonstrations of unmanned ground vehicles (UGVs) and unmanned E
PARAPRO CASES.
Are employed in a wide variety of applications for organisations such as: n n n n n n
Military Manufacturing industry Fire & rescue/ emergency services Scuba & sub Aqua Photographic Police
®
The cases combined with our in-house foam engineering and design facility can provide solutions for all storage and protection requirements. BS EN ISO 9001: 2008 Certified
Parat UK Ltd Unit C1, Europa Trading Estate, Stoneclough Rd, Radcliffe Manchester M26 1GG, T: 01204 868630 F: 01204 868631 E: sales@paratuk.co.uk W: www.paratuk.co.uk
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
75
Defence & Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
DSEi 2011 E aerial vehicles (UAVs) during the show. A football pitch-sized area, located in one corner of the North Halls, has been set aside for the demonstration and viewing arena, making it the largest showcase of this type of technology at an exhibition in the world.
used by the British Army, the area is organised and staffed by members of the British Export Support Team, who are able to talk to visitors about the capabilities of the equipment on display. DSEi has also created a new Land Vehicle Park so visitors can see some of the vehicles that are being used around the world by military and security forces.
NAVAL PROWESS DSEi continues its strong maritime focus. Visiting ships provide a valuable platform for the demonstration of new systems and equipment, which visitors can inspect on specially conducted tours. The UK MOD is planning to allocate a modern Frigate or Destroyer and an Offshore Patrol Vessel to DSEi, while the Royal Netherlands Navy will be sending a vessel as well. Waterborne demonstrations are always a highlight and for 2011 the plan is to further develop the waterside area alongside the venue to include a larger space for exhibitors to showcase their products. There will also be a larger grandstand viewing area to allow more visitors to watch at any one time. Demonstrations will recreate possible naval operational scenarios allowing exhibitors to showcase a range of equipment, such as RIBs, pontoon equipment and offshore raiding craft. The highly popular British Army Demonstration Area returns for DSEi 2011. Showcasing some of the equipment
IMPROVED VISITOR EXPERIENCE Since DSEi last took place the venue has expended in size so visitors will be able to access the exhibition from ExCeL’s East Entrance as well as the West. This, combined with an enhanced registration procedure, means that visitors will be able to access the exhibition floor with minimum delay. All the major demonstrations are also being scheduled so the times do not clash with other feature areas, thus maximising audiences and improving the experience for all. The last DSEi attracted 25,000 visitors from 98 different countries; this year’s event is on course to beat both targets. L FOR MORE INFORMATION For the latest information on what is taking place at DSEi 2011 please visit www.dsei.co.uk to register. Call +44 (0)845 00556243 or e-mail register@dsei.co.uk
Objet 24/30 Desktop 3D Printers Accurate-Reliable-Clean-Affordable
Print and Validate your designs in hours F
£14,40rom 0*
CMM - Metrology Services & Products
For more information call
01782-814551 or visit
www.tri-tech.net *Price for UK. International pricing may vary. Price excludes VAT, options, shipping, and installation
76
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
n CMM Test Item measurement reports (measurement volume of co-ordinate measuring machine: - 90 cm x 150 cm x 90 cm) n CMM Turn Key projects, dimensional & SPC data reports n CMM Reverse Engineering development data n CMM Batch & 1st Off measurement reports n CMM Training & support n CMM Auxiliary Equipment & Accessories
26 Tyne Road, Sandy, Bedfordshire, SG19 1SA Tel: +44 (0) 1767 680300 - Fax: +44 (0) 1767 680400 E-mail: kinemat@kinematic-eng.co.uk Web: www.kinematic-eng.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
AWS Group – one of Europe’s leading Specialist Electronics Manufacturing Solutions (EMS) providers A significant amount of counter terrorism and security goes on covertly in the background and the same can be said about the AWS Electronics contribution to this sector where it supports a range of technology specialists with electronic equipment and services. The AWS Electronics Group is one of the leading Specialist Electronics Manufacturing Solutions (EMS) providers, offering services for the whole electronic product life cycle from design through manufacture, to contract service and repair. AWS manufactures and repairs in a AWS works with customers to enable early wide range of industry sectors from involvement of the project, preferably at the defence, security, medical, aerospace, PDR stage, where informed decisions can be scientific and data storage. It contributes made with reference to DfM, DfT and DfMnt, to a wide range of products including: thereby ensuring robust manufacturing • Satellite systems processes can be applied, delivering repeatable • UAV – power systems and amplifiers quality and cost effective maintenance. • IED detection and immobilisation equipment Our experience in providing equipment • Data security and encryption that has to endure rugged environments • Monitoring and sensors (such as down hole exploration, mining, • Biometric readers remote metering and monitoring) enables • Vehicle Number Plate Recognition (ANPR) us to offer enhanced capabilities in • Radio systems encapsulation and potting techniques, • Covert surveillance which is a complimentary support to • Scanning and screening systems standard conformal coating requirements. The AWS comprehensive quality systems and AWS half page Aug 10 v2 23/8/10 12:54 Page 1
controls have been recognised and awarded the ADS Silver award for Supply Chain Excellence (SC21) for the last two consecutive years. AWS is fully accredited to ISO 9000: 2008 and other specialist quality management systems, such as AS9100 for the aerospace customers it serves. Earlier this year AWS took a another significant step forward by gaining the AC7120 (electronics) accreditation from NADCAP. Do not hesitate to contact us with your direct needs or talk to our experienced engineers who can provide solutions to your manufacturing problems. Whether you are looking for direct contract manufacturing, design or design for manufacture services, AWS can help. FOR MORE INFORMATION For more information please go to our website www.awselectronicsgroup.com or contact Mike Fairclough, group sales manager Tel: +44 (0)1905 453808 mike.fairclough@ awselectronicsgroup.com
Services for the Entire Product Life Cycle AWS Group is one of Europe’s leading specialist EMS providers, offering services for the whole product life cycle from design through manufacture, to whole life support and repair. AWS operates through four manufacturing centres of excellence, three in the UK and one in Eastern Europe.
ELECTRONICS
MANUFACTURING
SOLUTIONS
www.awselectronicsgroup.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
77
TRAINING
UNDERSTANDING A TERRORIST SYSTEM
Defence & Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Xpect Software LLC, a specialist UK and US software company, explains how it is forging ahead in working with governments across the world to help understand terrorist groupings by comprehensive analysis of Improvised Explosive Device (IED) systems The behaviour of international terrorist groupings exhibits a number of functions and processes that have goals and which participate in circular, causal chains that move from action to sensing, to comparison with desired goal, and again to action. Across the dynamics of human and system relationships within a terrorist grouping, a mass of structured and unstructured information is produced, which if found, can be collated through multiple source fusion, leading onto the exploitation of information and ultimately the conduct of proportionate action, whether in the realms of international policy or more direct and immediate ways. The IED or roadside bomb has become ubiquitously notorious in modern media
decisions. Dfuze was originally conceived as a system for use in National Bomb Data Centres. First responders such as bomb technicians, through using Mobile Dfuze, could gain a better understanding of the nature of a device, its components and identify ways to conduct render safe procedures. All information could be rapidly exchanged between the deployed personnel, mobile mission command facilities and the National Bomb Data Centre. The Centre would then be closely involved in assimilating all information gleaned from exploitation of a device and the context surrounding how the device came to be laid, through the use of bespoke databases. The results of this fusion commonly have immediate implications for technical
The IED or roadside bomb has become ubiquitously notorious in modern media as a significant weapon of the adversary. Mitigating IEDs requires a comprehensive systemic approach, with trades offs in capability and effect a constant reality. as a significant weapon of the adversary. Mitigating IEDs requires a comprehensive systemic approach, with trades offs in capability and effect a constant reality. Analysis of IED systems demonstrates that they are never in unique isolation and relationships to parallel areas of weapons smuggling, narcotics and organised crime are frequently apparent. For governments, the emphasis has to be on enabling individuals and organisations involved in the fight against terrorism to understand quicker, learn faster and adapt more rapidly and effectively than the adversary. INTELLIGENCE MANAGEMENT Xpect Software has offices in the UK, US and Australia and provides products to 22 countries, which are used by over 48 agencies and organisations. The core product is Dfuze, a multi-layered intelligence management system. The central premise is to empower individuals and organisations through technology to make better informed
understanding, biometric identification and most recently, the comprehension of individual and organisational behavioural patterns and trends. TECHNOLOGY DEVELOPMENTS Increasingly the adversary is maximising the use of commercially available technology. Likewise, Xpect has placed greater emphasis on enhancing the technology available to a first responder, with geo-location and tracking, object and facial recognition, integration of Automated Fingerprint Identification Systems and both secure and compressed data transmission capabilities now a common standard. Furthermore, customers are gaining a growing comprehension of the potential of augmented reality for practical application. Xpect Software has actively sought out suitable third party hardware and software providers to supply a series of modular intelligence management capabilities that can be blended together as a solution suitable to the specific requirements or nature of
the problem of a customer. Globalisation, mass digitisation and the democratisation of technology affords opportunities to both sides. All activities occur or are perceived to occur at a point in space (location) and time and today’s technology, with the increased presence of GPS, provides greater chances to find and collate such information. The importance of fusing this information into mature Geospatial Information Systems (GIS), which are in turn truly embedded within an intelligence management system, has now become paramount in the efforts to mitigate terrorism. THE FUTURE Xpect is working closely with academic establishments to enhance the way by which open source information of consequence can be found, with emphasis upon developing contextual taxonomies from the semantic web, whilst concurrently harvesting related imagery. The data deluge will also provide more opportunities to understand trends and patterns in terrorists’ individual and collective behaviour. For the immediate future, however, the most important factor in effective counter terrorism will continue to be the personnel employed by government organisations. This importance will bring a need to train more effectively, resulting in a significant growth in the use of simulation. In parallel, detailed analysis of the adversary’s options for direct action will become more commonplace. Xpect is proud to be at the forefront of the fight against global and national terrorism. It looks to form strategic partnerships with similar minded companies, or companies with products that can add to the multitude of capabilities available for deployment globally. L FOR MORE INFORMATION Tel: +44 (0)20 70609730 Fax: +44 (0)20 70609733 info@xpect-software.com www.xpect-software.com
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
79
Secure your company’s future SHOWCASE YOUR FULL SECURITY BASED CAPABILITIES AT DSEI
DSEi 2011 will feature: • Security Demonstrations and Showcase allowing you to display your product’s full performance • On floor security seminar series enabling you to discuss key topics with the leading international security stakeholders • Position your maritime security products in the Waterborne Demonstrations and ensure delegations are talking about you
FOR MORE INFORMATION VISIT WWW.DSEI.CO.UK
DSEi attracts
and in 2009
You company can access
primes, integrators, manufacturers and suppliers
of exhibitors focused on security
attendees from 98 countries and 70 official delegations from 49 countries.
1300 30% 25,170 Confirmed security capability providers include Detica, G4S, Remotec, & Avon Protection
Platinum Sponsors
TO BOOK YOUR SPACE AT DSEI 2011 CONTACT: Alexander Jakes Sales Executive T +44 (0) 20 7370 8527 E alexander.jakes@clarionevents.com North American Enquiries Doug Schlam T +1 (203) 275 8014 E doug.schlam@clarionevents.com
Offi cial Show Daily Partner
TRAINING INITIATIVES
Training
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THE TRAINING IMPERATIVE
Recent downgrading of the level of the security alert in Britain from ‘severe’ to ‘substantial’ in no way reduces the need for agencies and organisations to prepare themselves for the worst In fact, the opposite applies, I would argue. The Irish problem has returned – albeit in a milder form – as outbreaks of unrest in Ulster threaten the peace initiative that Prime Minister Blair and preceding governments struggled for so long to establish. Terrorism across the world has flaired again this year, making us all mindful that in just 12 months’ time, London will stage the UK’s largest ever sporting event, when all eyes will focus on our security forces as well as Team GB. Without wishing to trot out old platitudes, eternal vigilance is the price society must pay to secure its people, fabric and infrastructure and that state of watchfulness comes in the form of training – at all levels, from office staff to bomb squads. An awareness of how, where and when terror can strike, prepares us – as far as is possible – for that eventuality. TRAINING INITIATIVES For 17 years, Strings Security has supported agencies and organisations worldwide with a spread of customised and off-the-shelf training initiatives that have kept pace with the constantly shifting challenge that terrorist groups and individuals present. Edexel accredited through an associate company, our modules are delivered by qualified presenters with the skills to portray the key elements of course content succinctly and compellingly to delegates at any level in the security industry, from first-timers to experienced bomb disposal personnel. Here, I focus on arguably the most important aspect of guarding against a terrorist attack – the first point of access into an organisation. Our International Basic Search Awareness and IED Recognition course provides those new to the industry or with no previous experience of counter-terrorism with first-base knowledge of the threat from improvised explosive or incendiary devices (IED/IIDs) and recognition of their component parts. The course is targeted at all levels of an organisation – from security and maintenance staff to mailroom personnel, receptionists and secretaries. POINT OF CONTACT TRAINING In huge financial and office centres such as Canary Wharf and in banks, finance houses, insurance companies and shopping malls, the first access to a building or an organisation is usually a desk official or receptionist. As such, they are at the frontline of a possible bombing outrage and the need for them to be vigilant and alert to the modes and
For 17 years, Strings Security has supported agencies and organisations worldwide with a spread of customised and off-theshelf training initiatives that have kept pace with the constantly shifting challenge that terrorist groups and individuals present. methods of terrorist access is critical. Our one to two-day course, extendable up to four days, covers the threat, device recognition and method of attack terrorists might employ, how personnel should respond if they receive a bomb warning or discover a suspect package, as well the effect of a bomb blast. TECHNIQUES Postal devices and phone bomb threats are discussed before we move on to tackle the search methods that different personnel can employ in locations as diverse as buildings themselves, site perimeters, car parks, vehicles and access routes – not forgetting searches of individuals. The scope of our training includes search and bomb awareness, refresher modules for supervisors and security officers, search planning and our instructors increasingly utilise techniques such as video scenarios to present lifelike situations powerfully and graphically. When terrorism can strike from any quarter and in new modes of assault (the Mumbai
attacks came from the sea, while the 7/7 rucksack bombings unleashed suicide terrorists on to an unsuspecting public) training content has to reflect both the trend and the technology of terrorism. MAXIMUM IMPACT Demand for evacuation and fire procedures for high-rise buildings is growing as Britain witnesses the return to the skyscraper mentality of the 1960s, with London’s Shard glass structure leading the charge. Perhaps most important to emphasise is the ability of Strings Security to customise courses to the specific requirements of individuals, organisations and agencies so that we can maximise the impact and value of the training function in the fight against terrorism. We are in the environment of constantly shifting sands and must act accordingly. L FOR MORE INFORMATION Tel: +44 (0)1403 270190 info@strings-security.co.uk www.strings-security.co.uk
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
81
R
SER . M U -
E
AT
D
. INTE G R
A
FAC TU U R N
OR . EN
Securing Passengers and Cargo Worldwide ■
Focused Exhibition
■
Aviation Security & Air Cargo Conference
■
30 Free to attend Technology Workshops
■
Maritime Security Conference
■
Networking Functions
■
Supply Chain Security Conference
■
Free to attend Evening Reception
■
Public Transport Security Conference
Aviation
Cargo
Maritime
For more information please call +44 (0) 208 542 9090 or email info@niche-events.com
Supply Chain
Conference partners
www.transec.com 13-14 September 2011 | Olympia, London
EVENT PREVIEW
SECURING CARGO AND PASSENGERS
Transport Security Expo focuses on mass transit in run up to 2012
Transport Security Expo, the annual gathering of professionals at the sharp end of delivering protective security measures across transportation networks, returns to London Olympia 13-14 September. This year’s event brings sharp and timely focus to the challenges faced by those tasked with securing and protecting public transport systems as the capital gears up to host the 2012 Olympic Games. London is no stranger to attack on its transport networks. The suicide terrorist strikes on underground and bus services in 2005, in which 52 people died and over 700 were injured, remain etched in the mind. These almost simultaneous attacks serve as a potent reminder that such mass
transport systems are extremely vulnerable to those with intent to do harm. Train, underground and bus networks will have a pivotal role to play in transporting an estimated third of a million visitors a day to the various Olympic venues around London and elsewhere across the country. The task of delivering utmost security and crime prevention across this diverse and dispersed transport network has presented substantial challenges to planners and required innovative thinking. Delegates attending the ‘Securing & Protecting Public Transport Systems’ conference will be given valuable insight into the challenges faced in securing such open and accessible transport systems, as well
as an overview of the preparations being made for the Olympic Games, in two keynote presentations by Niki Tompkinson, security consultant and former director TRANSEC, and Stephen Thomas QPM, assistant chief constable operations, British Transport Police. History has shown that global events such as the Olympics are considered high value targets. Being held against a backdrop of increasing instability across the world and the potential that such unrest may give rise to further terrorist activity, it is hardly surprising that vast sums are being invested in ensuring the Games remain open and accessible but safe and secure. Delegates attending this vitally important conference will discover that lessons learned in preparing transport networks for their pivotal role in the 2012 Games have significant legacy benefits in the years to come. Richard Harris, director – Intelligent Transport Systems, Logica, will outline how technology and innovation is the key to strengthening public transport security and how this might be applied in the years to come. An enquiry conducted by the London Assembly as well as findings from coroners’ inquests have laid bare failings by emergency services and others in the intervening years since terrorists struck on the capital’s transport network. Responding to such a devastating and near simultaneous sequence of events presents significant challenges. Paul Dadge, senior consultant, PC Paramedic Solutions Limited, and deputy assistant commissioner Bernie Higgins, head of Special Operations Group, London Fire Brigade, will deliver insightful commentary on what was done well and what could have been done better and the complexities and complications facing emergency first responders to such horrific events. Transport Security Expo’s Securing & Protecting Public Transport Systems conference will bring clarity to the present day challenges imposed across mass transit networks across the globe.
Transport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOCUS ON FREIGHT Transported Asset Protection Association (TAPA), the multinational agency with a sharp focus on mitigating supply chain losses, has joined forces with Transport Security Expo, to drive the message home that such losses are reaching unsustainable proportion. Theft of in motion high value products within the European supply chain remains lucrative business for criminals. A four year old report commissioned by the European Union (EU) estimated the cost to business to be in excess of e8.2 billion a year and there is every reason to expect this figure has risen substantively in the intervening period. TAPA will focus attention toward intelligence, auditing and insurance issues and deliver key insight into the threats faced within the UK E
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
85
COUNTER TERROR EXPO 25 – 26 April 20I2 Olympia London www.counterterrorexpo.com
The UK’s largest show for International counter terrorism and specialist security. 500 Exhibitors Over 9,000 International Attendees High Level Conference Programmes Free Workshops & Live Demonstrations Exhibitor Meet the VIP Buyer Programme Networking Functions For more information, please contact: Nicola Greenaway t: + 44 (0) 208 542 9090 e: nicola.greenaway@clarionevents.com w: www.counterterrorexpo.com
EVENT PREVIEW About Transport Security Expo
Transport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Transport Security Expo focuses specifically on the key issues faced in the aviation, maritime and supply chain chain networks. This leading global event is held annually at London Olympia and is now in its 9th year. Transport Security Expo brings government, military, law enforcement and academia experts from across the globe together, to debate the issues faced in a secure conclave. Transport Security Expo features an extensive technology led programme of educational workshops and is supported by a world beating exhibition of security solutions.
About TAPA
E operational theatre in consort with TruckPol. TAPA is a unique forum that unites global manufacturers, logistics providers, freight carriers, law enforcement agencies, and other stakeholders with the common aim of reducing losses from international supply chains. Its membership includes many of the world’s leading manufacturing brands as well as their logistics and transport providers with combined annual sales of over US$900 billion. TAPA security requirements are recognised as the industry standard for cargo facility and transport security globally. The organisation’s Incident Information Service (IIS) captures and shares data, enabling its members to use the latest cargo crime intelligence to avoid incident hotspots, protect goods in transit and, if required, report and trace stolen property. Statistics show that the United Kingdom has topped the European league table for truck crime for the entirety of the year. TruckPol recorded 349 truck thefts in the first quarter alone. Many of these trucks were probably stripped down for their components as well. DANGEROUS OCCUPATION This type of crime is also becoming increasingly violent. The death of a Polish lorry driver in the UK seven months ago highlighted the dangers that drivers of high value loads are exposed to when on the road. Bogdan Bartczak’s lorry was found minus its load of televisions. Six men and teenager will go on trial faced with charges including kidnap and robbery in relation to this theft. Police say his death was mostly likely due to a heart attack. Elsewhere in Europe, drivers have been incapacitated with pepper spray and severely injured by criminals armed with knives, within the first five months of this year.
Many of these attacks are carried out by organised criminal gangs. Although police forces across Europe are having some success in countering this crime, much more needs to be done. A recent Europol coordinated international operation in France, Hungary and Romania, resulted in the arrest of a 22 member strong gang who had been targeting vehicles across the European Union. Spain’s Civil Guard arrested 10 Romanians suspected of involvement in cargo thefts from trucks in motion earlier in the year. The gang is accused of carrying out at least 50 cargo thefts on national roads in several provinces, including Zaragoza, Valencia, Madrid and Alicante. They specifically targeted vehicles carrying electronics, mobile phones and perfumes. TAPA and TruckPol clearly have an important message to deliver within their conference at Transport Security Expo. KEY CALENDAR EVENT Transport Security Expo, taking place at Olympia in London, also focuses on security issues in the aviation and maritime sectors. Aviation has been on the terrorist radar again in the past couple of years, and the industry is battling to find methods to identify hard to detect and highly innovative improvised explosive devices implicated in several attempts to down passenger and cargo aircraft inflight. Maritime is still struggling to address the issue of piracy within the vital sea lanes around the Horn of Africa and Indian Ocean. Despite a significant naval presence within the region, Somali pirates continue to seize and hold vessels, crew and high value cargos for ransom. A significant number of vessels and hundreds of crew members remain in captivity. L
The Transported Asset Protection Association Europe (TAPA-EMEA), is an association of security professionals and related business partners from various manufacturing and transportation companies who have come together for the purpose of addressing the emerging security threats that are common to the relevant industries. The aim of the Association is to provide a forum for responsible managers and share professional information for mutual benefit.
About TruckPol TruckPol is a national intelligence unit that forms part of the national ACPO Vehicle Crime Intelligence Service, collating and disseminating statistical data and intelligence on road freight crime within the UK, an ongoing problem that is estimated to cost the UK economy up to £250 million per year. The theft of large goods vehicles and their loads causes significant economic and logistical harm to manufacturers, operators and retailers alike. TruckPol is a public/private sector partnership, supported by the Home Office, Association of Chief Police Officers and industry stakeholders from haulage, insurance, security and manufacturing. This partnership is crucial in sharing information on national road freight crime to deliver solutions to minimise opportunities for criminals to target business and drive down road freight crime.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
87
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
An end to end service from Assembled Electronics Assembled Electronics Solutions (AES) is a Midlands-based business that offers you an end to end service. Whether you require contract manufacturing capacity or a design and manufacturing partner, AES is ready to assist. With a broad sector base we offer a range of electronics-based services from one-off prototype production and testing through to volume manufacture. The integration of enclosure design, wiring, programming and testing means that the end product is not only functionally sound but aesthetically tuned to meet your requirements. AES provides a range of services to new and established clients in the security, defence, automotive and motor sport, aerospace, medical and OEM sectors. In addition to physical manufacture, AES offers both project and supply chain management. Following final assembly, inspection and functional testing, finished products may be delivered using one of the following delivery options: single delivery, scheduled delivery, call off, kanban, direct to end user. Rapid prototyping and the development of innovative solutions are core activities. Recent examples of AES innovation include remote monitoring and control systems, data logging, tracking and detection. Specific applications include smart battery
chargers for blue chip retailers, contactless switching for public sector healthcare applications and the conversion of existing security devices to layouts suitable for automated, surface mount assembly. With over 40 years of experience, we can assist in technological upgrades to exisiting products both to increase functionality and to reduce unit costs through “design for manufacture”. Whether you require a basic manufacturing and assembly service or an end to end solution we can assist you in bringing your products to
market efficiently and competitively. If you have identified a specific requirement but do not, as yet, have a solution we would be pleased to hear from you. FOR MORE INFORMATION Assembled Electronics Solutions LLP Masons Road, Stratford-uponAvon, Warks CV37 9NF Tel: +44 (0)1789 204879 Fax: +44 (0)1789 299727 info@assemtron.com www.assembled-electronics.com
30 off-line programmed CNC machines Tool, Fixture & Gauge making facilities Precision fitting & Polishing services Small/Medium Batch High Precision All Materials
www.edseng.co.uk 01245 355351 88
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Research and development puts the VestGuard team in number one spot...twice! Essex-based VestGuard UK, one of the UK’s largest exporters of body armour, has been recognised in developing a major breakthrough in the hard body armour plate industry. The MAX-1 plate was recently acknowledged in winning the CTSS award for Innovation in Personal Protective Equipment. It is a new, ultra-lightweight (1.68kg), multi-shot plate designed to stop up to nine rounds of the SS109. The plate is the world’s lightest for this performance and as a result, VestGuard UK has been receiving orders from all corners of the world. VestGuard’s operations director Michael Smith noted: “This revolutionary armour will help to save the lives of many soldiers and personnel working in hostile environments. We have been amazed at just how well it has performed. Consequently, we have been delighted that the plates are now in demand from both foreign and government agencies as well as from other sectors, including maritime and press.” During early testing the armour was so effective that the equipment was checked to ensure the bullets were hitting the target. On inspection all nine shots fired had hit the armour, but six had left no measurable back face signature, which is
“extremely impressive”, Mr. Smith added. VestGuard, which also recently celebrated becoming International Business of the Year at the Essex Countywide Business Awards, has put this success down to the hard work of its team members. Mr. Smith recently credited the research and development team, headed by Philip Smith, to the success of the MAX-1 plate and has had his sales team working round the clock to cope with the orders for the new, innovative plate. This has not allowed VestGuard’s research and development team to sit back, they are already using some of the ballistic technology from the MAX-1 plate and combining it with further cutting edge ballistic engineering to create the MAX-R plate. The world’s lightest plate to NIJ Level IV protection, the
MAX-R combines brand new processing techniques to achieve a weight of just 1.9kg. Mr. Smith continued: “The MAX-R is our brand-new innovation that we are extremely proud of at VestGuard. It just goes to show how the team have not rested on the success of the MAX-1, but instead pushed on to create something even better.” The MAX-R plate is not only extremely lightweight, but can be configured to offer multi-shot protection upwards of six shots at NIJ Level IV at the same low weight. The company, manufacturing in the United Kingdom, is already accepting orders for the MAX-R, which they believe could offer soldiers a huge advantage in agility, giving a weight saving of over 20 per cent compared with the nearest competitor. VestGuard UK Ltd, Essex International Business of the Year 2011 and Winner of the 2011 CTSS Award for Innovation in Personal Protective Equipment. FOR MORE INFORMATION Tel: +44 (0)1621 816614 Fax: +44 (0)1621 814316 Sevenacres, Sevenacres Lane, Barnhall Road, Tolleshunt Knights, Essex CM9 8HD oliver@vestguard.com www.vestguard.co.uk
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
89
SMI’S 4TH ANNUAL CONFERENCE WEDNESDAY 28TH-THURSDAY 29TH SEPTEMBER | INNTEL HOTELS ROTTERDAM CENTRE
International Port Security 2011 | Rotterdam Mitigating threat and securing your maritime borders • HEAR how and why the busiest container and passenger seaports in the world are investing in security solutions
ESTEEMED CHAIRMAN: Rear Admiral Philip Wilcocks CB DSC, Director, CEMPA UK HIGHLIGHTS FROM THE SPEAKER PANEL:
• DISCOVER the latests projects, programmes, initiatives and directives that are driving thought leadership in the port security domain
Anderson Fagundes Silva, Port Facility Security Coordinator,
• LEARN how to best effect cooperation in the battle against future threat
Dr. Priyath Bandu Wickrama, Chairman, Sri Lanka Ports
• MEET the world’s leading subject-matter experts and your peers in the glorious setting of Rotterdam
Steven Heukelom, Port Operations Executive Manager, New Doha
Port of Santos Authority Port Project*
At International Port Security 2011 you may meet a global line-up of budget holders and experts from:
Jerome Ntibarekerwa, Secretary General, The Port Management
Qatar, Brazil, Sri Lanka, The Suez Canal, China, Germany, The Netherlands, Eastern and Southern Africa, USA, UK, Spain, Belgium, the EU Commission, BORDERPOL and the International Maritime Organisation ...plus many more...
Kamel Girgis, Security Manager, Suez Canal Container Terminal*
Association of Eastern and Southern Africa
Commander Gregory Walcott, Port Security Unit Commander, Trinidad & Tobago Coast Guard* Bill Johnson, Director, Port of Miami Thomas Fransson, Senior Security Manager, Port of Gothenburg
PLUS, BOOK ONTO OUR PRE-CONFERENCE WORKSHOPS FOR THE ULTIMATE STRATEGIC LEARNING EXPERIENCE Tuesday 27th September 09.30- 12.30 WORKSHOP A INTERACTIVE THREAT-BASED SCENARIO: Port Security Breach Hosted by: ProTeez 14.00-17.00 WORKSHOP B CONTAINER SECURITY AND PACKING ISSUES Hosted by: Cambridge Academy of Transport
Sponsored By:
Rik Verhaegen, Deputy Port Security Officer, Port of Antwerp Robin Dodridge, Director of Operations, Port of Dover Tony Smith, Senior Director, London 2012 Olympic Programme, UK Border Agency Jay Grant, Chief Executive, InterPort Police Christian Dupont, Deputy Head of Unit, DG Transport and Energy, EU Commission Serge Rinkel, Director of the Technical Committee, BORDERPOL Sascha Pristrom, Maritime Safety Division, International Maritime Organization
*Subject to Final Confirmation
In Association With:
www.internationalportsecurity.com Register online or contact Teri Arri on: +44 (0)20 7827 6162 or email: tarri@smi-online.co.uk
EVENT PREVIEW
INTERNATIONAL PORT SECURITY Introducing the leading forum for security professionals in Europe Seaports remain the primary gateway for international trade and the importance of maintaining their security cannot be understated. SMi’s International Port Security Rotterdam conference concisely addresses the latest developments in seaport defence, law, treaty enforcement, counter-terror and organised crime activities by exploring a series of global case studies and briefing sessions, thus keeping you, the delegate, upto-date with high priority information that enables you to best secure your seaports, economies and means of trade. The event will host an exceptional roster of thought leadership and provide unrivalled insight into the defence against theft, people trafficking, illegal immigration, drug smuggling and weapon smuggling within your borders. Global spending on maritime security in 2010 totalled around US$15bn. With 2011 showing no sign of slowing down in terms of investment in the sector, it is imperative that stakeholders understand where and why this huge figure is being spent and to have the opportunity to compare the best practice of global leaders against their own mitigation of threat. Delegates will have the opportunity to hear case studies delivered by leading port operators from across the world and to understand the real security concerns that exist at today’s terminals and port facilities. In addition, they will get the chance to examine the latest directives
and programme updates from key decision makers within the IMO and EU. The format of the event will ensure that networking opportunities with key security policy setters and leading industry representatives of major ports and prime vendors will be made readily available to attendees. LEADING KEYNOTE ADDRESSES Event organisers are proud to announce that rear admiral Philip Wilcocks CB DSC, director, CEMPA UK, will be chairing the 2011 conference. He will be joined by a stellar line-up of key international experts to discuss topics including: Port security at the Port of Santos; security at the Port of Dover and UKBA initiatives to enhance security and ports of entry for the London 2012 Olympics; a case study on the award winning safety and security standards at the Port of Miami; the future security systems at New Doha Port; security operations in the Port of Antwerp; a review of the European Union (EU) Ship and Port Facility Security System. The conference will feature a first-rate programme with further keynote addresses from esteemed speakers including Dr. Priyath Bandu Wickrama, chairman, Sri Lanka Ports Authority, who will discuss the past successes of securing Sri Lankan ports and the predicted effects of future growth on security mechanisms, and a case study presented by Jerome Ntibarekerwa, secretary general, The Port Management Association
Port Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
of Eastern and Southern Africa, examining the security and safety challenges that are facing ports in Eastern and Southern Africa. Visit the website to view the full speaker line-up, which includes representation from Qatar, Brazil, Sri Lanka, the UK, the US, Africa, the Caribbean, the EU and beyond. INTERACTIVE PANEL DISCUSSIONS The conference will also feature two interactive panel discussions, led by key security professionals. Day one’s discussion topic will be ‘The Implementiation of the ISPS Code: On Paper vs. The Reality’ and day two will highlight the subject of ‘How to Combat Organised Crime in EUROPORTs’. This conference also presents two exclusive pre-conference workshops on 27 September. Delegates will have the chance to attend the morning workshop, hosted by Proteez, which will centre on an interactive threat based scenario or ‘Port Security Breach’. Delegates also have the option of enjoying the afternoon workshop, hosted by Cambridge Academy of Transport, which will concentrate on container security and packing issues. International Port Security Rotterdam serves as a platform to meet and network with a diverse mixture of international experts and is specifically designed for the Port Security community. Delegates will rest assured that they are kept up-to-date with the latest challenges, threats and solutions emerging in the sector. This conference will bring together decision makers, influencers and those involved with current operations from Europe, USA and the rest of the world to give you the crucial feedback that you need. L FOR MORE INFORMATION Register today by visiting www.internationalportsecurity.com or contact Teri Arri on: +44 (0)20 7827 6162 or e-mail tarri@smi-online.co.uk for more information.
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
91
Emergency Services
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT PREVIEW
THE EMERGENCY SERVICES SHOW AND CONFERENCE
With over 380 exhibitors and 4,000 visitors attending the show last year, the Emergency Services Show and Conference 2011 is a key event for anyone involved in emergency planning From suicide bombing to offensive fighting, terrorist attacks remain a significant concern for governments and private sector organisations worldwide. In the wake of the attacks carried out by Anders Breivik’s in Norway – fears are growing that terrorism from far-right extremists is becoming a real threat – the potential for terrorist attacks has heightened. Counter terrorism plans need to be updated and emergency plans put in place that involve all segments of society as well as many government agencies. The impact of changing policies and reduced global budgets will make it essential for emergency services and associated agencies to continue to work collaboratively to ensure public safety and security. To help this sector cope with this environment and overcome the challenges of the future, close working relationships with partners are vital. Networking and collaboration with suppliers, colleagues and contemporaries is and will continue to be, an essential part of ensuring an emergency is dealt with as efficiently and effective as possible – the Emergency Services Show and Conference 2011 facilitates the necessary communication by bringing together everyone involved in emergency situations. With over 380 exhibitors and approximately 4,000 visitors attending the successful show last year, the Emergency Services Show and Conference 2011 is the key event for anyone involved in emergency planning, response or recovery, both in the UK and abroad. This year’s show and conference will be taking place 23-24 November at Stoneleigh Park, Coventry. WHO CAN ATTEND? From buyers and specifiers, operational planners to emergency responders, this show unites colleagues, contemporaries and suppliers. Every year emergency and resilience professionals with a role in operations, procurement, training, recruitment, emergency planning and business continuity, attend. A plethora of sectors attend the show and conference, including: • Police • Fire and rescue
92
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
• Public and private ambulances • Emergency planning • Maritime and Coastguard Agency • MOD • NGOs and voluntary sector – such as RNLI, Red Cross, St John Ambulance • Search and rescue • LGAs • Utility operators • Transport and port authorities • Government agencies • Health authorities • Primary Care Trusts • Commercial business • Embassies • Refineries • Forestry/agriculture • Heritage sites • Airports • Control of Major Accident Hazards (COMAH) sites • Nuclear sites ENDLESS OPPORTUNITIES As the importance of security to individuals, to business, to governments and to nations grows year on year, the UK continues to lead the way and is viewed as the model for quality – from counter terrorism strategies to fire and safety measures. The Emergency Services Show 2011 will provide access to the latest technology, ideas and initiatives focused on improving public safety and protecting the environment and the Critical National Infrastructure. Visitors to the exhibition can discover the latest security equipment and services from a range of leading companies. With its breadth of international experience, the UK is well placed to tackle arising terrorist threats and UK companies continue to provide expertise and systems for groundbreaking counter terrorism solutions. Exhibitors such as Respirex, Bluecher, Trelleborg, PPS, Scott Safety, DuPont, Draeger and TEEX will be displaying equipment and services, allowing visitors to learn and benefit from their expertise. The products and services on display include security equipment and services, personal protective equipment, communications and IT, first response equipment, station equipment, training and education, vehicles
and vehicle equipment, business continuity and outsourcing. Many exhibitors will also be carrying out a number of live demonstrations throughout the two days. There will also be approximately 100 end users exhibiting within the Emergency Response Zone. This zone – essential for operational staff and emergency planning officers – is made up of Category 1 and 2 responders, professional, government and voluntary organisations, and hence offers perfect networking opportunities to affiliated organisations. There is also a dedicated UK Search and Rescue (SAR) Zone. DOING MORE WITH LESS At a time when budgets are being squeezed, this free to attend exhibition provides the perfect opportunity for visitors to research methods of “doing more with less” funds. Visitors will be able to speak to exhibitors about how they may operate more effectively and efficiently, thereby resulting in the highly desirable outcome of more for less. David Brown, show organiser, Emergency Services (MMC) Ltd, comments: “In these uncertain times it is more important than ever for all emergency professionals and E
Event at a glance
Emergency Services
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
From strategic planners and first responders to the manufacturers and suppliers of equipment used by these leading professionals, the Emergency Services Show brings together everyone involved in an emergency, over an action packed two days. Visitors to the Emergency Services Show and Conference can: • Discover how to make vital cost saving efficiencies on behalf of their organisation • Learn from industry experts by attending the supporting two day conference • Network with like minded individuals to share information and good practice, together with discussing resources, framework agreements, income generation and outsourcing • Witness exciting live demonstrations • Meet with up to 100 end users exhibiting within the Emergency Response Zone. This zone (essential for operational staff and emergency planning officers) is made up of other Category 1 and 2 responders, professional, government and voluntary organisations, offering perfect networking opportunities to affiliated organisations. • Consider innovative and creative ways of working with their peers in the future. • Source equipment and services from over 350 specialist suppliers, showcasing the latest innovations in the industry.
E associated agencies to communicate with one another, this may allow resources to be shared and budgets to be maximised. The Emergency Services Show offers the unique opportunity to meet with specialist equipment and service suppliers from the UK and abroad to facilitate mutually beneficial buying arrangements and discuss new important innovations and products. “As well as allowing exhibitors to showcase their latest products and services, the exhibition provides an ideal way for professionals to discuss cooperation, ideas and initiatives and learn from each other in preparation for major events taking place over the coming years or prepare for the unexpected.” David concludes: “As the threat of terrorism continually changes and develops so must the counter terrorism methods. The show provides a unique platform for security professionals to discuss fresh challenges in the industry and consider best practice methods.” LONDON 2012 Whilst the 2012 Olympics will be a major opportunity for the UK to prove its expertise in handling large scale events, it will also
present a major challenge. As the 2012 Olympics draws closer, it will be vital for responders to discuss cooperation, ideas and initiatives focused on improving public safety and learn from their foreign counterparts in preparation for this major event. The show will help facilitate this communication and provide a final chance for organisations’ representatives to meet. CONFERENCE The show’s high profile conference is delivered in tandem with the exhibition and this year will facilitate professionals to discuss the latest industry news, developments and strategic advances, as well as hearing about lessons learnt and new initiatives affecting them. The programme is set to offer delegates an informative couple of days both for personal development and their organisations. For further information on the conference programme please visit the website, www.emergencyuk.com, regularly. Emergency Services (MMC) Ltd is the organiser of the show and conference; it has extensive experience working with those involved in the emergency sector and publishes Emergency Services Times, Fire
Times and the Emergency Services Times Who’s Who Directory. It also organised the new Emergency Scotland 2011 exhibition, which took place 5-6 July, SECC, Glasgow. The venue of the show and conference, Stoneleigh Park, is a 15-minute drive from Coventry railway station, free courtesy coaches will be running frequently between the station and venue. Stoneleigh Park is a short drive from several motorways including M1, M40, M42, M45, M6 and M9, and free parking is available on site. Please note that signposts to the venue also refer to it as the National Agricultural Centre. Finally, the venue is a short distance from Birmingham International Airport. L FOR MORE INFORMATION To register for your FREE visitor pass or to learn more about attending The Emergency Services Show and Conference 2011, please visit the event’s new website www.emergencyuk.com Be sure to put Wednesday 23rd and Thursday 24th November in your diary, this is an event for all security professionals not to miss. Spread the word amongst your colleagues!
Issue 7 | COUNTER TERROR BUSINESS MAGAZINE
93
Advertisers Index
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service Adani ANR Manufacturing Ansmann Energy UK Arinc Armoured Cars Assembled Electronics Solutions AVSEC World AWS Electronics Briton EMS Britpave Clement Clarke Communications Cobham Antenna Systems Counter Terror Expo Desktop Engineering Distributed Micro Technology DSEi 2011 EDM Plus UK EDS Engineering Eley Metrology ESP KTN EZV Flir G6 Global Grid Tools Harper Chalice Heli-Power 2011 Houghton Huawei Imperva UK Infranor Innovative Concept International International Port Security 2011
64 12 70 OBC, 46 56 94 52 77 16 36 54 74 86 32 40 80 48 88 72 50 34 62 10 26 39 6 68 25 22 32 60 90
Kinematic Engineering LG Motion Mercian Labels MiniTec Mira M-Tek Assembly Oakleigh Cases Parat PCB Piezotronics Procom UK Proengin Rapiscan Renfrew Group Richard Paul Russell Richo International Rimage Europe Samsung Techwin Servo & Electronic Sales Seven Technologies Sourcefire Stings Security Synetics Surveillance Technology Sysco International Texcel Technology The Panic Room Company Total Board Solutions Transport Security Expo Tri-Tech Engineering Unitemp VestGuard Xpect Software Zaun
76 42 2 42 4 83 72 75 74 54 18 66 26 32 28 44 58 8 67 20 81 14 IBC 30 73 28 84 76 56 89 79 38
The Complete Electronics Service... • Rapid Prototyping • Design & Development • Product Styling • Contract Assembly • Innovative Solutions
AES
Assembled Electronics Solutions LLP
Tel: 01789 204879 • www.assembled-electronics.com 94
COUNTER TERROR BUSINESS MAGAZINE | Issue 7
PF-32 DIGITAL TAUT-WIRE Digital Taut-Wire, the rugged and durable solution High probability of detection with near zero false alarm rate In all weather conditions Simple low cost maintenance Ideal solution for critical assets and remote unmanned sites Field proven with NATO and other government organisations
SYSCO INTERNATIONAL psmsysco@aol.com
Security is not just something we do at ARINC–it’s part of who we are For years, we’ve helped develop and implement solutions for commercial, government, and defense industries to help strengthen security around the globe. Whether it’s sending and receiving information securely, providing mobile wireless networks, supporting systems that guard nuclear power plants, or developing the latest biometric tools, ARINC delivers. As a capabilities-driven company with communications, engineering, and integration as our core competencies—you can trust us to handle your greatest security challenges.
arinc.com/secure
emea@arinc.com