www.counterterrorbusiness.com | ISSUE 8
EVENT SECURITY The vast security challenge of securing the London 2012 Olympic Games
BLAST RESISTANT BUILDINGS
Preventing and minimising the devastating effect of explosions
PIRACY | PERIMETER SECURITY | CYBER SECURITY | TERRORISM INSURANCE
COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 8
EVENT SECURITY The vast security challenge of securing the London 2012 Olympic Games
BlAST RESISTANT BUIldINgS
Preventing and minimising the devastating effect of explosions
Comment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WELCOME The Home Office has said it has ‘full confidence’ in security for the Olympics and that everything is on track, after reports of concern from the United States. The Guardian reported the US was unhappy about security plans and wanted to send up to 1,000 of its own people, including 500 FBI agents. While the deployment of overseas security officers at the Olympics has become standard procedure in recent years, final responsibility for security rests with the host government.
PIRACY | PERIMETER SECURITY | CYBER SECURITY | TERRORISM INSURANCE
The Guardian article says the London riots, the arrest of a security guard at the Olympic site, and arrests before the visit of the Pope last year, all have raised US anxieties. On page 55, Tony Ball, chairman of the BSIA’s Crowd Management section, explores some of the considerations that the security sector has taken into account for the London 2012 Olympic Games, and highlights the lessons that can be learned from past global events. Enjoy the issue.
Angela Pisanu
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit the Counter Terror Business website at:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Grist PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Alicia Oates GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
© 2011 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
03
DON‘T TAKE OUR WORD FOR IT SEE IT LIVE AT PENTAX CTX-STAND
GRAND HALL I80
20X
MEGAPIXEL ZOOM LENS
This series of zoom lenses are available with megapixel resolution. With super high-speed zoom motors it needs just 2 seconds to cover the whole range of the zoom and/or the focus. All lenses have a high f-stop of f1.6.
Large Focal Range of 12-240mm Megapixel Resolution 1/2“, C-Mount Iris Override Presets Compact and Robust Available with High-Speed and Super-High-Speed Motors
Optimised for use in Port Facilities, Border Patrol, Coast Oil Fields, Highway Monitoring etc. United Kingdom & Ireland - PENTAX RICOH IMAGING UK LTD. - Security Systems Division - Heron Drive Langley - Slough SL3 8PN - United Kingdom Office: +44 (0)1753 211071 - Sales: +44 (0)7973 154430 - Fax: +44 (0)1753 211090 - Email: ssd@pentax.co.uk - Web: www.pentax-security.com
CONTENTS 07 NEWS 11 PERIMETER SECURITY
IFSEC International 2012 is set to provide a comprehensive business platform for counter terror best practice and innovation
When undertaking a security review of a building, a number of key factors and different threat scenarios need to be considered, writes the PSSA’s John Marshall
51 BORDER CONTROL
The PSSA shares information about its Product Verification Scheme, the first industry scheme for high security perimeter systems
55 EVENT SECURITY
26 BLAST RESISTANT BUILDINGS The BSIA’s Chris Lawrence discusses how blast resistant security can prevent and minimise danger to buildings and the people in and around them
33 COUNTER TERRORISM David John Bryan examines how the UK-USA security agreement and intelligence sharing can help in the fight against international terrorism We preview Counter Terror Expo 2012 – the critically acclaimed, highly specialised event for those who are tasked with delivering defence against international terrorism
Chris Yates explores recent concerns over UK border security and the business of securing the forthcoming Olympic Games
With the countdown to the London 2012 Olympic and Paralympic Games underway, the BSIA explains the varied and extremely difficult task of ensuring security
58 COMMUNICATIONS Enhanced and converged communications are critical to the effective and co-ordinated response to incidents, writes Simon Barton
61 SECURITY & POLICING A preview of Security and Policing, the Home Office annual security event on 31 January to 2 February 2012
65 EMERGENCY SERVICES The Emergency Services Show and Conference is the key event for anyone involved in emergency planning, response or recovery
Counter Terror Business
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
72 CYBER SECURITY Attacks on internet-facing services are growing, both in terms of frequency and sophistication. Thankfully, managed mitigation services have evolved to meet the challenge
77 VEHICLE CRIME TruckPol highlights the problem of vehicle, fuel and cargo theft
78 DEFENCE & SECURITY EQUIPMENT A review of Defence & Security Equipment International (DSEi), which attracted more than 29,000 attendees to the four-day exhibition
81 TERRORISM INSURANCE Chris Phillips discusses modern day terrorism insurance
85 MARITIME SECURITY Recent statistics regarding piracy are continuing to show an increase in attacks as well as an increase in the number of successful hijackings taking place on a worldwide basis Preventing Criminal Disruption to Maritime Operations 2012 will bring together security representatives from across the global maritime industry
www.counterterrorbusiness.com
FAX THIS FORM BACK TO 020 8532 0066 BEFORE APRIL 1ST TO QUALIFY FOR A FREE SUBSCRIPTION www.co
unterter
rorbusi
ness.co
m | ISSU E5
Name Company Position Email Phone Signature
Date
Public Sector Information, 226 High Road, Loughton Essex IG10 1ET. Phone 020 8532 0055 Fax 020 8532 0066
NATO
Adapting the evolvi to meet terrorism ng threat
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
05
unlimited For companies with a large security system it is important to be sure of unlimited growth, both in size and functionality. Nedap AEOS is the only system in the market that offers unlimited possibilities concerning the number of doors, sites, security levels, carriers and functionality.
For more information: Nedap Security Management +44 (0)1189 821038, info@nedap-securitymanagement.com, www.nedap-securitymanagement.com
AIRPORT SECURITY
Stansted airport conducts major CBRN emergency response exercise Stansted Airport has carried out a major training exercise to test emergency response to a chemical, biological, radiological and nuclear (CBRN) incident – the first UK airport to undertake an exercise of this scale. More than 200 Essex Police officers, fire and ambulance crews from across the east of England, the British Red Cross and students from Chelmsford College were involved in Exercise Orange at the end of October. The event was part of the government’s national programme to prepare the UK for a CBRN incident and was the culmination of three years’ planning and preparation. Adrian Battaini, exercise director and Stansted airport’s business continuity manager, said: “The Exercise gave us an excellent opportunity to continue our work with the Home Office and all the emergency services to test how we collectively respond to a rare but challenging incident. “The exercise presented a challenge you
hope you would never actually have to experience, but we can be confident we have the plans and procedures in place to deal with every and any emergency situation.” The scenario simulated an incident on a plane flying from Dalaman in Turkey to Aberdeen that had diverted into Stansted following reports of a potentially dangerous powder being released on-board. TO READ MORE PLEASE VISIT...
www.counterterrorbusiness.com/n/005
MARITIME SECURITY
Prime Minister announces u-turn on arming merchant marine vessels Prime Minister David Cameron has announced that merchant vessels flying the red ensign will be allowed to carry armed guards for protection against acts of piracy. Previous governments have been opposed to arming the merchant marine, but with no sign of a respite in acts of piracy on the high seas and naval assets spread thin, the decision has been welcomed as a common sense measure that could save ship owners and the insurance market many millions of pounds. The announcement comes following talks
at the recently concluded Commonwealth Heads of State meeting in Australia. Many member states face the same escalating piracy issue in the waters of their shores. The Home Secretary will be given the power to license maritime armed guards under the new plan, but they can only be deployed while passing through dangerous waters, such as the Red Sea, Gulf of Aden and the Somali Basin. TO READ MORE PLEASE VISIT...
www.counterterrorbusiness.com/n/006
News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NEWS IN BRIEF India’s Nasik airport deploys handheld explosive detectors Handheld explosives trace detectors that use Ion Mobility Spectrometry to rapidly detect and identify trace amounts of a wide variety of military, commercial, and homemade explosives, have been deployed at India’s Nasik airport The Quantum Sniffer QS-H150 uses no radioactive materials and features a low-maintenance design that is self-calibrating and self-clearing, providing very high levels of operational availability.
Terror organisation proscribed The Home Secretary Theresa May has laid an Order proscribing Muslims Against Crusades. May said the order means that: “being a member of or supporting the organisation will be a criminal offence. I am satisfied Muslims Against Crusades is simply another name for an organisation already proscribed under a number of names including Al Ghurabaa, The Saved Sect, Al Muhajiroun and Islam4UK. The organisation was proscribed in 2006 for glorifying terrorism and we are clear it should not be able to continue these activities by simply changing its name.”
CCTV in favour after UK riots A shift in public perception of CCTV has been revealed following the UK riots. Despite historical controversy around the use of CCTV systems, the high-profile and crucial role played by the technology in the police’s post-riots crackdowns, which have resulted in excess of 3,000 arrests so far, has allowed for a positive shift in the general public’s perception towards the security system. Research commissioned by a member of the BSIA’s CCTV section following the UK riots has in fact revealed that 76 per cent of individuals surveyed feel safer knowing that CCTV is in operation in public areas, with 62 per cent saying they would like to see more CCTV in their local area. TO READ MORE PLEASE VISIT...
www.counterterrorbusiness.com/n/007
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
07
Business Continuity Planning A strategic SMS txt message communication plan can be an invaluable way to reach your community in the event of an emergency.
Reach your community when it matters most Successful organisations, large or small, prepare themselves for all potential eventualities. txt messaging provides the perfect rapid response mechanism in the event of a disaster or incident as everyone has their phone with them at all times. A txt message can be sent from a computer or even a pre-authorised phone to every member of your community in a matter of minutes, whether that be tens of people or hundreds of thousands. SMS txt messaging is socially and digitally inclusive, over 98 percent of UK adults have a mobile phone. Many organisations are adopting simple-to-use interfaces from companies such as txttools.co.uk This service allows the user to send and receive SMS txt messages from their computer and track the delivery, much like e-mail, but with audited delivery. Having the ability to create discreet groups of customers, clients, patients or staff can have major benefits when you want everyone to be notified with a single message. The tool is completely flexible, messages can be sent instantly or scheduled months or even years in advance and sent out when that message is relevant. Messages can be edited
Some facts: At least 20% of all organisations will suffer fire, flood, storm, power failures, terrorism, hardware or software disaster. Of those without a business continuity plan: 43% will never re-open 80% fail within 13 months 53% of claimants never recoup the losses incurred by a disaster. Source: Aveco Major systems downtime costs (15% Of Organisations) over ÂŁ50,000 Per Hour. Source: Information Age
txt info to 88020
right up until the scheduled time to allow for changes in arrangements. Customers can be added to lists requesting information and replies may be automated or custom sent. Many organisations are now incorporating txttools into their disaster planning, it is proven to be the fastest, most reliable method for communicating with large groups of people. Why are they choosing txttoolsÂŽ ? txttools has had an uninterrupted message delivery in the public sector for the last 10 years, used by councils, police forces, schools, hospitals, clinics, connexions and over 52% of the UK colleges and universities. The txttools team have and continue to respond to development needs of the community. The application includes an array of features; 2 way messaging, secure online access 24hours a day 7 days a week from any PC (using the same security as online banking). A further benefit is that unlike email, delivery of every message can be tracked to the handset.
txttoolsÂŽ Business Continuity Planning SMS is a powerful disaster contingency tool, which enables your organisation to: + Communicate directly with all members of your organisation quickly and efficiently, from individuals & small groups to tens of thousands + You will be able to send safety alerts of areas to avoid, prevent unnecessary journeys and wasted time + Contact ALL customers and staff instantly from your computer + Send a message securely from your mobile via your txttools account to ALL customers or staff instantly, from wherever you are + Provide a route for staff and students to contact you and your team + Works even when network coverage is poor + In an unfolding situation send regular updates to advise all vested parties + Pre-write message templates to allow quick, but well thought out messages to be sent by any member of staff
It is possible to convert a txt message to voice mail if number is a landline, there are inbox rules, RSS feeds and auto responders. The txttools team have an outstanding reputation in both their face-2-face customer training and unlimited support which is all included in the package.
e: info@txttools.co.uk
w: www.txttools.co.uk
t: +44 (0)113 234 2111
txttools, Marshalls Mill, 4th Floor, Marshall Street, Leeds, LS11 9YJ, United Kingdom
A service of Blackboard connect
News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WEAPONS
UN acts to stem arms proliferation from Libya Calling for action to stem the proliferation of portable surface-to-air missiles and other arms from Libya by the country’s interim authorities, regional States and other relevant Member States, the UN Security Council has authorised the Libya Sanctions Committee to propose a strategy to keep such material out of the hands of terrorists and others. Through the unanimous adoption of Resolution 2017 (2011), the council called upon Libyan authorities to take all necessary steps to ensure the proper custody of portable surface-to-air missiles, known as MANPADS (man-portable air defence systems), and all other arms and related material. It also urged Libyan authorities to meet Libya’s arms control, disarmament and nonproliferation obligations under international law, and continue close coordination on the destruction of all stockpiles of chemical weapons with the Organization for the Prohibition of Chemical Weapons. States in the region were called upon to take appropriate measures to prevent proliferation of those weapons as well. Other Member States and international and regional organisations were called upon to take appropriate action to assist the Libyan authorities and States in the region towards that goal. The Committee established pursuant to Resolution 1970 (2011) on Libya sanctions,
with assistance from its Panel of Experts and in co-operation with other relevant bodies, was requested to assess threats and challenges, in particular those related to terrorism, posed by the proliferation of weapons. The Committee was asked to submit a report to the Council on proposals to counter those threats, including stockpile management, border control and transport security. Following the adoption representatives of Germany and the Russian Federation welcomed the action. The former noted that, since control of any nuclear materials was implied by the resolution, the International Atomic Energy Agency (IAEA) should have a role in the anti-proliferation efforts, as
should the Organization for the Prohibition of Chemical Weapons. His country would support sending a team to Libya to assess the situation regarding weapons of mass destruction. Germany’s representative also voiced his country’s position that the Panel of Experts should report directly to the Security Council panels and not, as provided in the Resolution, through the Sanctions Committee. Direct reporting was the usual practice and was meant to preserve the independence of such panels. Stressing the danger that MANPADS posed to aviation, the representative of the Russian Federation proposed that civil aviation organisations be engaged in the counter-proliferation effort.
MARITIME SECURITY Piracy centres expand information network The piracy information-sharing infrastructure covering Asia and the Indian Ocean has been significantly enhanced with the signing of an important agreement in Singapore. The International Maritime Organization (IMO) is the United Nations specialised agency with responsibility for the safety and security of shipping. The new agreement, signed by the three Information Sharing Centres (ISCs) set up under the IMO-led Djibouti Code of Conduct and the Singapore-based ReCAAP ISC, establishes a set of standard operating procedures for communicating and exchanging TO READ MORE PLEASE VISIT... piracy-related information and will result in a major www.counterterrorbusiness.com/n/008 expansion of the reporting area of such incidents.
AIRPORT SECURITY
CYBER CRIME
£13.2m integrated security contract for Heathrow’s Terminal 2
Homeland Security to boost cyber security through online training
Heathrow Airport has signed a contract to provide its new Terminal 2 with an integrated fire safety, public address and voice alarm system, along with advanced lighting controls and building management systems covering mechanical and electrical operations. Honeywell’s integrated fire detection, public address and voice alarm system is designed to allow for smart
US government agencies and organisations will undertake online training on email authentication to prevent targeted email attacks. This effort is a critical part of the frontline defence against cyber threats as outlined by President Obama and Cybersecurity co-ordinator Howard Schmidt. Training provider Online Trust Alliance (OTA) has created a curriculum that is being delivered through the CERT Program at the Carnegie Mellon University Software Engineering Institute (SEI) to the Department of Homeland Security (DHS) for online delivery to federal employees. Email authentication is a key defensive cybersecurity tool for the public and private sector to aid in the detection of malicious and deceptive email. This initiative reflects the DHS’s
evacuation procedures in the case of emergency. Clear, intelligible voice alarm messages are transmitted by loudspeaker in affected areas only, making evacuations quick and controlled. The system also communicates non-emergency and live flight announcements through the same individuallyaddressable speakers, enabling each communication to target the intended audience.
commitment to accelerating best practices in cyber-security and supporting the National Strategy for Trusted Identities in Cyberspace (NSTIC), and will allow federal employees to better protect agencies, employees and US citizens. TO READ MORE... www.counterterrorbusiness.com/n/009
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
09
Hostile vehicle protection system • • • • • • •
Fast to install LegoTM like system Removable / Relocatable No ground anchor - uses its own weight Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 kmph (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment
Cable system creates necklace effect to spread the impact
The Redi-Rock hostile vehicle protection system is used to guard buildings of high importance.
The necklace effect means the blocks slide to absorb impact Result: Only 1.6m penetration of the load carrying space
The security barrier system that protects from vehicle impact The fast, effective, re-usable solution to perimeter hostile vehicle attack. Ideal for: • Airports • Train stations • Military facilities
Attractive face has the appearance of natural stone.
• Utility and critical infrastructure
The Redi-Rock Force Protection system has successfully been tested by the Transport Research Laboratory (TRL) .6/0.0 To achieve this the freestanding concrete blocks systems interconnected with steel cable successfully arrested a 7.5 tonne lorry at an impact speed of 48 kmph (30mph) with only 1.6m penetration of the load carrying space.
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BUILDING & SITE PROTECTION
DESIGNING FOR IMPROVED COUNTER TERRORISM
John Marshall, director of the Perimeter Security Suppliers Association, outlines the security challenges facing the UK and highlights best practice to protect buildings against attack The UK threat level has fluctuated for some years now between ‘critical’, ‘severe’ and ‘substantial’, the three highest levels of threat, It is apparent that we are still very much at risk from attack by international terrorist groups. Understanding the threat level is key when determining the ‘risk’ to a facility. Risk is defined as a function of probability and resulting consequences of an attack. However, threat levels do change, so when determining a protective strategy the future variability of the threat level must be considered at the outset. RECENT PROGRESS Over the past few years much has been done to protect against terrorist attack. New security organisations have been put in place by HM Government, much good guidance issued and best practice published, and many high risk sites are now better protected. In this latter context protecting crowded places (including transport hubs, shopping centres, exhibition and convention centres and sports arenas) together with high profile government, public and commercial sites, has been the focus of much attention.
The government has set up several key bodies to advise on anti-terrorist measures, two of which are the Centre for the Protection of National Infrastructure (CPNI) and the National Counter Terrorism Security Office (NaCTSO). Both provide essential guidance on protecting the UK’s most vulnerable and valuable sites and assets, enhancing the UK’s resilience to terrorist attack, and generally raising awareness of the terrorist threat and how we can prepare for, and protect ourselves from an attack. SEEKING AUTHORITATIVE ADVICE Government guidance on counter-terrorism states: ‘As the level of risk varies, counter terrorism protective security measures should
be proportionate to the risk of terrorist attack.’ The guidance also includes a definition of the different site risk levels. There are four in all – high, medium-high, medium and low. The two highest risk categories will be an immediate focus for Counter Terror Security Advisors (CTSAs) – a nationwide team of police security experts whose purpose is to advise on how to best protect against terrorist, and criminal, attacks. DESIGNING-IN SECURITY Anyone currently involved in commissioning, planning, designing and managing new developments or major redevelopments within the built environment should consider security requirements from the outset. There is E
Anyone currently involved in commissioning, planning, designing and managing new developments or major redevelopments within the built environment should consider security requirements from the outset. Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
11
NEW bristorm IVP Bristorm Integrated Vehicle Personnel (IVP) fence provides an unrivalled range of anti-vehicle and anti-personnel performance within a very narrow fence line. By bringing the Hostile Vehicle Mitigation (HVM) of Bristorm fence and anti-personnel protection into a single foundation, without altering the performance of either system.
• Hostile vehicle mitigation and anti-personnel protection in a single foundation • Tested to BSI PAS 68 • Remains in place, preventing subsequent vehicle encroachment • Fence lines behave independently as if installed in isolation
Tel: +44 (0) 1902 499 400 | Email: info@bristorm.com
www.bristorm.com
BUILDING & SITE PROTECTION E considerable scope in the design and planning of facilities to include proven and effective protective security measures based on best practice guidance on bomb blast and hostile vehicle mitigation (HVM) available from CPNI. Fundamentally, a holistic approach is required that provides increased protection to life and assets by designing-in proportionate security measures, whilst ensuring any facility remains visually attractive and functionally useable. Measures do exist for reducing risk with particular relevance to mitigating potential consequences. However, the big question is, how much should we do? Ultimately this will require an assessment of investment compared with the resulting potential benefits. The term ‘proportionality’ continues to generate much debate. Another similar approach is to consider providing mitigation measures that reduce consequences to As Low As Reasonably Practical (ALARP). But this still requires consideration of cost/benefit in determining and implementing protective schemes. ASSESSING WHAT IS REQUIRED Whilst local CTSAs provide an invaluable service, organisations whose sites are in the high or medium-high category may wish to employ the services of expert security consultants to fully evaluate the risks and provide detailed recommendations. When undertaking a security review of this type a number of key factors and different threat scenarios need to be considered. These include car and truck bomb attack (Vehicle Borne Improvised Explosive Devices, static and dynamic), forced entry, covert/ insider entry, firearms/ballistic attack and stand off weapons. Typical expertise required from the security consultant will include blast and structural engineering, knowledge of the different types of threat scenarios and perimeter protection options that involve the use of vehicle and pedestrian security barriers to manage access control and maintain stand-off distance. Experts in this particular field can be found by contacting the relevant security and built environment trade bodies, organisations
such as the Institution of Civil Engineers, and the ADS Group. Supplier organisations including Tata Steel also have considerable expertise in this field and can provide a comprehensive security consultancy service. Aesthetic considerations now play a major part in the selection of appropriate security measures. One scheme recently completed delivered the very best in robust hostile vehicle mitigation measures in a way that was sympathetic to the local landscape and consistent with the local architecture. The Whitehall Streetscape Project undertaken by Westminster City Council in partnership with The Cabinet Office included measures to protect from hostile vehicle attack using high performance bollards and Portland stone clad steel framed walls, both balustrade and solid. Although both have the appearance of the traditional bollards and stone walls that predominate in this part of the city, the bollard systems and the stone clad steel wall frames were provided by Tata Steel, having been fully tested to withstand an attack by a hostile vehicle. SECURING OUR FUTURE There is now an increased awareness of the need to incorporate appropriate anti-terrorist measures into higher-risk buildings and sites with high levels of pedestrian traffic. There is also now considerable expertise available, both from relevant government organisations, industry bodies, the design community and suppliers of blast protection and physical security equipment. The terrorist threat will be with us for some time to come and those responsible for future development of the built environment (including developers, designers and end-user occupiers) must continue to embrace the need to build-in security at the earliest possible stage in order to protect people and critical infrastructure from attack. L FOR MORE INFORMATION www.cpni.gov.uk www.nactso.gov.uk www.dft.gov.uk www.pssasecurity.org www.tatasteelsecurity.com
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Attractive stone clad balustrade walls and crash rated bollards
Car parking areas need to be carefully assessed for risk
Surface mounted walling systems and pedestrian portals
Shallow foundation bollard systems
PSSA raises industry standard with the Product Verification Scheme At the 2011 annual conference, the PSSA will share the details of the first industry scheme for high security perimeter systems: the ‘PSSA Product Verification Scheme’, and announce the first companies to have successfully achieved certification of their nominated products. The scheme initially includes verification of vehicle security barriers, vital to hostile vehicle mitigation, to standards such as PAS 68, but is modular to allow extension into all facets of perimeters. Work is already being done to also encompass high security fencing, as well as installation services. Developed with involvement from across the entire industry and with government backing, this scheme is
unique and fulfils a function that has long been lacking, giving real confidence that products being sold have been properly tested, meet specified standards in terms of performance and construction, and reflect the actual product that was originally tested. Up until now testing has focused generally on a single criteria (in the case of H.V.M. products, just impact resistance), and there has been no way to determine that any product being sold is the same as the product originally tested. From today, seeing the ‘PSSA Verified’ logo on a product can alleviates these concerns. The scheme will not only provide a focal point for the whole UK industry around which raise standards, but will enhance promotion of our industry around the world.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
13
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PAS68 BOLLARDS AND BARRIERS
BEAUTY, NOT A BEAST
Safetyflex presents its slimline, aesthetically sculptured PAS68 anti-terrorist barriers that blend into the landscape and urban street environment When we refer to PAS68 barriers and bollards, and hostile vehicle mitigation, people straight away think of these products as ugly, over-engineered and over-bearing, which scar the landscape. PAS68 products have always been known to be oversized and military or industriallooking. They are however needed to protect our assets and key infrastructure, therefore aesthetics have been put aside. Safetyflex Barriers has invented one of the most innovative PAS68 security products in the world today. We’ve taken away the overpowering large bollard, and concentrated on designing products that are slimline, aesthetically sculptured and that blend into the landscape and urban street environment, which architects and clients are always searching for. Unlike standard PAS68 steel tube bollards, Safetyflex’s unique PAS68 bollards are manufactured using a special composition of spring steel allowing them to absorb extreme amounts of energy/impact thanks to its springflex technology. On impact, the dynamics of Safetyflex’s spring steel bollards can move around five Cartesian co-ordinates, as opposed to a standard steel concrete tube bollard which can only move through one co-ordinate. It’s this technology which enables the spring steel bollard to return to its starting point after impact – whereas other bollards would collapse. We have found that most PAS68 Barrier and Bollard systems in the market place today are heavily over-engineered, with a large mass of steel, in and out of the ground.
14
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
They require this large mass to stop the vehicle impact, fighting force with force. Our concept is more of an engineered product. We do not fight force with force – we let the vehicle impact into the spring steel barriers. The spring steel barriers absorb the energy from the impact and transfer the energy back into the vehicle. This allows us to use a very small amount of steel, and a small amount of rebar in a shallow footing of only 400mm. Making the Safetyflex Bollards a lot
The group has a solid base of 40 years of manufacturing experience during which time it has won a string of top awards – including a prestigious Chartered Institute of Highways & Transportation CIHT/CPNI Security in the Public Realm Award in 2010. The award was for PAS68 Bollards at the Bournemouth Conference centre. TESTED TO THE MAX Every single Safetyflex bollard and barrier is rigorously load tested at the company’s inhouse testing facility – providing customers
The world’s number one manufacturer of PAS68 spring steel barriers and bollards have a solid future after entering the busiest trading period in the company’s history. smaller and streamlined than existing PAS68 bollards in the market place also brings down the cost dramatically. SAFETYFLEX – LEADING THE WAY The world’s number one manufacturer of PAS68 spring steel barriers and bollards has a solid future after entering the busiest trading period in the company’s history. Safetyflex Barriers, a division of the GME Springs group which has operations in the Midlands, Yorkshire and Scotland, has live enquiries worldwide of more than £100 million and has made more than 10,000 antiterrorist PAS68 bollards in the last 12 months.
with a guarantee that the product they install will withstand extreme pressure. Director Marcus Gerrard said demand for Safetyflex’s services has gone through the roof. “We are now the world’s number one manufacturer of PAS68 spring steel barriers and bollards, and one of the major factors behind this is very much down to the vigorous pre-testing we carry out on every product we produce,” he said. “These are the only pre-tested PAS68 bollards available on the market and we see this as a major factor why they can be seen protecting high-profile buildings across the UK and beyond. “Our customers demand the highest quality E
E products and need to have confidence that in the event of an impact the barriers and bollards are going to work. “Without the extreme testing we carry out as standard, there’s no way we’d be able to give them that guarantee. It’s this level of service which sets us apart from our competitors.” Gerrard said the Bollard foundations in Safetyflex’s products are only 400mm deep and the spring steel is designed to withstand extremely heavy impacts and more than 20 years of wear and tear. “In years gone by anti-terrorist bollards would only be used at high-security sites around the perimeter and to guard key infrastructure,” he added. “Due to the environment we live in today we now supply these bollards to protect cash centres, sports arenas and shopping centres along with key government buildings and airports – so basically to secure any potentially vulnerable area. We also offer our PAS68 street furniture, benches, bike racks and planters. In addition we can offer a bespoke design, as all our products are manufactured in-house.” EDGBASTON CRICKET CLUB One of the world’s top sporting venues is among the latest high profile clients of Safetyflex Barriers and the GME Springs group. Around 200 PAS68 anti-terrorist security bollards have been installed by Safetyflex to protect the entrance to the new £32 million Pavilion End at Edgbaston.
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Phil Macdonald, project director at Warwickshire CCC, said he was pleased to work with an innovative manufacturer like Safetyflex. “We were hugely impressed by Safetyflex’s expertise and pleased a Midlands manufacturer has designed a top quality security system which really blends in well with the character of the stadium,” he said. ATTENTION TO DETAIL “Everyone at Warwickshire CCC is absolutely delighted with the new Pavilion End. Every attention to detail was taken into account on the renovation and the bollards fit perfectly into the scene outside the ground,” Macdonald continued. Gerrard added: “We were really pleased to be approached by Warwickshire CCC project director Phil Macdonald to provide our expertise and play a part in the expansion of one of the world’s leading cricket grounds “The club didn’t want the standard PAS68 bollards, as they would have been too over-bearing for the new plaza, so were overjoyed with our slim line PAS68 bollards. “The stadium looks fantastic following the renovation and we’re proud to have one of our bespoke security systems at the front of the ground.” L FOR MORE INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry. Tel: 024 76 664911 www.safetyflexbarriers.co.uk
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
15
Stops you in your tracks Introducing the HESCO® Redeployable Security Fence. An anti-climb, rapidly erected and redeployable high-level security fence that doesn’t require ground preparation or foundations. Rated to PAS-68, the fence can be built on almost any unprepared surface, and with available heights of up to 3.6m it provides a formidable temporary perimeter or a steadfast hostile vehicle mitigation barrier. www.hesco.com
HESCO is a registered® trade mark of HESCO Bastion Limited.
CONFERENCE PREVIEW
RAISING CONFIDENCE IN SECURITY PRODUCTS
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The PSSA’s annual conference will share the details of the first industry scheme for high security perimeter systems – the PSSA Product Verification Scheme, and the first companies to comply At this its annual conference, taking place at the London Chamber of Commerce and Industry on 8 December, the Perimeter Security Suppliers Association (PSSA) will share the details of the first industry scheme for high security perimeter systems; the PSSA Product Verification Scheme. The PSSA will also use this opportunity to announce the first companies to have successfully achieved verification of their nominated products. The scheme initially includes verification of vehicle security barriers, vital to hostile vehicle mitigation (HVM), to standards such as PAS 68, but is modular to allow extension into all facets of perimeters. Work is already well on the way to also encompass high security fencing, as well as installation services. INDUSTRY COLLABORATION Developed with industry-wide cooperation, the scheme is unique. It fulfils a function which has long been lacking and gives real confidence that products being sold have been properly tested, meet specified standards in terms of performance and construction, and reflect the actual product that was originally tested. Up until now testing has focused generally on a single criteria (in the case of HVM products, just impact resistance), and there has been no way to determine that any product being sold is the same as the product originally tested. From today, seeing the ‘PSSA Verified’ logo on a product puts these concerns to bed. The scheme is independently managed and run in conjunction with a UKAS accredited certification body (HPA) and utilises several forward-thinking features, such as risk assessed pre-surveillance analysis of companies, their process and products, and a unique assessment regime. The former ensures a company’s greatest focus is on those aspects of its performance most pertinent to customer’s requirements, and the latter demands constant improvement over time, thus raising overall industry standards. These features also provide a powerful tool for companies to identify and generate internal improvement across all areas, in a very effective way. A FLEXIBLE SCHEME The ‘designed-in’ modularity of the scheme not only allows development to cover all aspects of perimeter protection, but also allows E
Stephen Cooper to speak on Olympic security Stephen Cooper, head of security at the Olympic Delivery Authority (ODA), will be one of the key speakers at the PSSA annual event. Cooper will present an in-depth insight into the challenges encountered with the physical installation of security at Stratford and other ODA sites. The ODA is working closely with the government and a host of policing, safety and security agencies to achieve a safe and secure Games. The Authority is also working with local communities and businesses to develop and promote its security approach.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
17
Perimeter Protection Security Fencing Gates and Barriers JB Corrie is a specialist Fencing Company dealing with the installation and manufacture of High Security Fencing Systems. Offering fully integrated perimeter protection, access control, CCTV intruder detection, security management and anti – terrorist solutions. JB Corrie have been manufacturing and installing Security Fencing since the Company was established well over eighty years ago. During this time the Company has gained a vast amount of experience and expertise within the Security sector and is one of the leading Fencing Contractors and Manufactures in the UK.
SPECIALIST SERVICES OFFERED INCLUDE
JB Corrie operate with an experienced and multi-disciplined management team with all of the relevant skills requires to meet client needs. The Company is fully committed in ensuring that all the work carried out is of a constant high standard, meeting all of the relevant security standards in terms of health and safety and quality of workmanship. JB Corrie are able to offer its clients high security installations of fencing, gates, barriers, civil work and special fabrications etc. JB Corrie offer a specialist service at project concept, specification, planning, site survey, manufacture, installation and commissioning etc. We also have our own inhouse CAD team offering detailed drawings etc.
J B Corrie & Co Ltd
Frenchmans Road, Petersfield, Hampshire GU32 3AP
Tel: 01730 237100
Fax: 01730 264915 Email: admin@jbcorrie.co.uk
High Security Fencing and gates Power Fencing to BS 1722 PT 17 Perimeter Fencing to Government level Access Control CCTV Perimeter Intrusion Detection Systems (PIDS) Sliding gates and speed gates Blockers Bollards Rising Arm Barriers Security Barriers Turnstiles Site Surveys Review existing Security installs In House CAD Team offering detailed drawings and proposals Manufacturers and install special Metal fabrications
J B Corrie & Co Scotland
Signal Box Road, Blairgowrie, Perthshire PH10 6ER
Tel: 01250 873989
Fax: 01250 875884 Email: jbcscotland@jbcorrie.co.uk
www.jbcorrie.co.uk
CONFERENCE PREVIEW
Developed with involvement from across the entire industry, the scheme is unique and fulfills a function which has long been lacking, giving real confidence that products being sold have been properly tested, meet specified standards in terms of performance and construction, and reflect the product that was originally tested. E development over time to reflect changing standards. For instance, BSI 68 PAS (the current UK specification for vehicle security barrier impact testing) can be adapted to take account of emerging international standards. The scheme is also designed to take account of the eventual (and inevitable) convergence of technical standards across all aspects of high security perimeters, including fencing. The conference will give attendees the opportunity to gain a complete understanding of the new verification scheme, its mechanisms, aims and benefits. Representatives from the pilot companies, with first-hand experience of the scheme, will be on hand to answer questions. Laurence Goode, the PSSA’s chairman, said: “This has taken a huge effort and resource, put in mostly by PSSA council members (who also have full-time/paid jobs to fulfil) and PSSA founder members and members, and
all should be very proud to be able to offer this scheme to the industry. The scheme is recognised by the UK government, and will not only provide a focal point for the whole UK industry to raise standards, but will enhance promotion of our industry around the world.” KEY SPEAKERS Stephen Cooper, head of security at the Olympic Delivery Authority (ODA), will be one of the key speakers at the event. Cooper will present an in depth insight into the challenges encountered with the physical installation of security at Stratford and other ODA sites. In addition, the Centre for the Protection of National Infrastructure (CPNI) will also present at the conference, covering current threats, testing, and movement towards centralised standards within the industry. Future work for the PSSA will include widening the PSSA Verification Scheme
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
to encompass high security fencing and installation services. A Fencing Forum to start exploring the needs of this part of the security industry will be held prior to the annual conference. The Forum will be by invitation only, so if you would like to be included, please contact the PSSA offices as soon as possible. The PSSA will also, in the coming year, extend its range of activities to engage with and shape our industry. International export is one of the areas in which we hope to offer support to our members and we have invited the UK Trade & Investment Defence & Security Organisation (UKTI DSO). The UKTI DSO provides specialist export advice and practical assistance to industry in order to build and maintain relationships with overseas customers, providing the essential government-to-government interaction. As well as providing support to enable effective promotion of products and services, it also ensures customer’s requirements are appropriately met and supported by industry throughout the life of the equipment. This is an exciting time to join the PSSA and we would welcome any prospective members from across the industry to come to the 2011 annual conference. The event is free of charge, but places are limited, so please apply swiftly. L FOR MORE INFORMATION +44 (0)208 253 4509 admin@pssasecurity.org www.pssasecurity.org
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
19
NEW PAS 68 STRONGUARD FENCE
2.5 TONNE AT 48KPH
7.5 TONNE AT 48KPH
STOPPED! stronguard RETROFIT
crash system
stronguard
TM
maximum security palisade
TM
JUST ONE OF THE HM GOVERNMENT APPROVED SECURITY ENHANCED PRODUCTS. STRONGUARD RCS CAN ALSO BE RETRO FITTED TO EXISTING STRONGUARD SYSTEMS.
stronguard
TM
invicta
stronguard
TM
stronguard
TM
cantilever
stronguard
www.barkersfencing.com sales@barkersfencing.com or call us now! +44(0)1782 319264
STRONGUARD . DESIGNED TO SECURE & PROTECT. TM
TM
swing gates
200602
HOSTILE VEHICLES
HOSTILE VEHICLE MITIGATION
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Give your perimeter the protection it needs with a palisade hostile vehicle mitigation fence Securing the perimeter of Critical National Infrastructure sites from the terrorist threat, organised crime and unwanted intruders poses different kinds of security challenges but each can be resolved with a coherent specification-driven secure gate and fence line. For decades, fences have been the first lines of defence, from basic boundary demarcation through to high security perimeters for CNI sites such as power/sub stations, military establishments, ports, airports, water treatment plants, banking facilities and refineries. The only way to maintain the quality and give your perimeter the protection required is to purchase products from a manufacturer that makes the investment to develop its perimeter fences to security-approved specifications. STRONGUARD RCS25 & RCS75 Adding to the HM Government-approved StronGuard range of security enhanced products, Barkers Fencing is pleased to announce that the highly successful StronGuard RCS high security palisade fence system recently passed two crash tests conducted at Transport Research Laboratory and gained the following PAS68 classifications: PAS68:2010:2500(N1G)/48/90 and PAS68:2010:7500(N2)/48/90 The development brief was simple: “We need a retrofit system!” After many hours of research and testing by the Barkers Fencing development team a solution was reached that enabled an existing StronGuard fence to be refitted on site and StronGuard RCS25 was born. After the successful test at the TRL, we were given the task of tackling the 7.5 tonne vehicle. A few weeks later we were back on the test facility and after a loud bang we can now introduce StronGuard RCS75. “We are really proud that StronGuard RCS is the first Palisade based fence to achieve these PAS classifications. It can be retro fitted to the many kilometres installed both here in the UK and around the world. If ordered as a new fence system, many components will be incorporated in to the manufacture to make the onsite installation extremely simple.” StronGuard RCS25 and StronGuard RCS75 fit well within the existing StronGuard Security Enhanced product range which also comprises: Interceptor, Invicta, articulated static bollards, road blockers and secondary fence systems all giving hostile vehicle mitigation protection, but now with the addition of StronGuard RCS existing installations can be retrofitted for added strength and security. • StronGuard Interceptor • StronGuard Invicta • StronGuard Cantilever gate
• StronGuard Swing gates and fencing Alongside the many advantages and additional security of the RCS system, the two main benefits are: the fenceline footprint will not increase by having to install two different perimeters performing two completely different functions, and users only have to install the posts with standard foundations, not the large amount of concrete that some other PAS products require. FROM BOARD TO BORDER At Barkers Fencing there is a dedicated team of professional perimeter security advisors to assist in all aspects of the tender and specification process. From the very start, Barkers Fencing has the expertise to offer help and guidance for each and every step. We understand how difficult and time consuming it can be to find exactly the right products for each stage of your project. Fencing design, specifications and requirements are no different. If you have a concept or design, we can create a bespoke system or recommend a solution from our perimeter security range to perfectly match your needs. We can prepare detailed specification documents and provide complete drawings ready to be inserted straight into your tender documents and sent to your main or sub contractors. INSTALLATION Barkers Fencing has also introduced an approved/licensed installer’s scheme which maintains the integrity of the product and also ensures correct installation procedures are followed. To ensure satisfactory installation an audit is completed after the fence line is installed, and a written report issued to the client. The installer is required to maintain a high standard of compliance or it runs the risk of losing its accreditation. The Barkers Fencing ‘Licensed Installer’ scheme delivers a complete, compliance standard from start to finish. Working together in partnership with Barkers Fencing, a safe and secure working environment for service personnel, employees and their families can be created, and assist in protecting the country’s vital national infrastructure. L FOR MORE INFORMATION Contact: Russell Ridgway, sales & marketing director, Barkers Engineering Limited Tel: 01782 319264 russellr@barkersengineering.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
21
. . . . . . . . . . .
Pulsed Electric Perimeter Fence Deterrent & Detection System Tamper resistant PC based GUI with mapping Simple to maintain & repair Integration with CCTV etc... Compliant with BSEN60335-2-76 Compliant with BSEN1722-17 Manufactured in the UK Design & after sales support Installation training
Tel: +44 (0)1572 722558 www.zarebasecurity.com ®
Induced Pulse
Z
areba Security is a leading provider of perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • Utility companies • Correctional & prison facilities • Government or military installations • Industrial/commercial property • Airports, Ports, auto dealers • Critical infrastructure • Oil reneries • Transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates (In recent UK government long term trials the Induced Pulse system had the lowest incidence of false alarms amongst the systems being tested). This means the security guard and/or local authorities can respond to a veried alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is
a proven perimeter deterrent and detection system the ideal solution. It is an electric fence system that combines a barrier with intrusion sensing and a shock deterrent to prevent security breaches. Adaptive fence sensing technology (patent pending) makes for a very stable system. It can ignore voltage uctuations caused by wet vegetation and other contaminates on the fence line but still give rapid response to fence attacks. The system features: • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customised zones and wire array • Standalone installation or mounted on existing fence, roof or wall tops • PC Windows based user interface • Graphical mapping overlay • Customer friendly GUI • Interfacing with most common data bus systems • Integration with CCTV systems • Integration with Access Control & Building Management systems • Listed in the UK Secure By Design (SBD) product list • Solid & robust construction
Zareba Security have designed and engineered perimeter fence systems for satised customers around the world. We have sales and technical staff based in the UK. We also have our own UK in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their clients site. Zareba Security only sell to approved installers. If you are interested in becoming an installer we would like to hear from you. We offer in house training courses to Lantra standards.
Zareba Security (Rutland Electric Fencing) 8 Lands End Way Oakham Rutland LE15 6RF Tel: +44 (0) 1572 722558 Fax: +44 (0) 1572 757614 www.zarebasecurity.com
VEHICLE BARRIERS
KEEPING VEHICLES AWAY
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The PSSA has recently launched a product verification scheme which aims to raise the standard of vehicle barrier systems. ATG explains the benefits of complying with this new standard The single product test standard – PAS 68 (Public Available Specification 68) has been prepared to address the needs of organisations that wish to have assurance that vehicle security barriers will provide the level of impact resistance they require and have been tested to a uniform standard. Vehicle barriers, such as gates, blockers and bollards, are installed around buildings and public areas to secure entrances and access points against vehicle-borne attacks. The National Counter Terrorism Security Office provides guidelines for access control measures and how to optimise site protection, referring to the PAS 68 single product test standard. A variety of different trade organisations have constructed a host of standards and quality measures that are used to benchmark product excellence across the access control industry. The Perimeter Security Suppliers Association accreditation (PSSA) is one of
internationally, such as PAS 68, ASTM (American Standard), ASTM (American Standard), and the new CWA 16221, which is an European workshop agreement that combines the detail from BSI PAS 68 and PAS 69 providing guidance on test methods for determining vehicle security barrier performance classification. The standard also includes a series of informative annexes that advise on appropriate product selection, installation and use. Although important, these certifications are still individual product standards whereas the PSSA verification will offer a more holistic product and company accreditation. COMPETITIVE EDGE Vehicle barrier system manufacturers based in the UK that pursue these well regarded standards will have a competitive edge. They will soon see the benefit when tendering for jobs both nationally and internationally. It no longer seems
ATG Access is at the forefront of current access control solutions with a world leading research and development programme to constantly innovate perimeter security products. the newest standards to the industry and is specifically designed for products, companies and users of high security perimeter products. This industry body is the trade association for companies involved in the supply of equipment and services designed to provide the highest levels of physical protection for sites and their perimeters from terrorist or criminal attack. RAISING STANDARDS The PSSA has recently launched a product verification scheme which aims to raise the standard of vehicle barrier systems both nationally and internationally. This is only the first step as the trade association also plans to extend this verification scheme to all perimeter protection systems and even the installation provided by contractors. The system aims to promote and audit the quality of not only products but the surrounding system and company standards also. This relates to the quality of drawings, electrical control systems and quality standards adhered to throughout the company. This will give the end user reassurance of supplier and product quality. This UK drive to raise industry standards and provide a focal point for the market will benefit British manufacturers internationally. Multiple product testing schemes exist
enough for companies to successfully pass an impact test. With the requirement to make the full product PAS 68 designation available to potential customers, not only do products have to pass the impact test, they will now be compared with similar and substitute products to analyse the quality of the product pass. With new product and industry standards being embraced and regulations across the access control market being improved, companies need to be wary of being left behind. One of the companies leading the way to promote industry standards is ATG Access. The company is one of the founding members of the PSSA and has recently been one of the first to volunteer itself for audit by the trade association, applying to meet the new product verification scheme. ATG’s continuous commitment to meet the emerging standards within the market place has secured it a variety of high profile jobs across the globe. Recent projects have included contracts in London, Malaysia, Doha, America, Canada, the Netherlands and Thailand, to name but a few. ATG Access is at the forefront of current access control solutions with a world leading research and development programme to constantly innovate perimeter security products;
this is at the heart of its business. The company has grown by 30 per cent over the last year and is on track to grow a further 20 per cent again this year. There is no doubt that this success can partly be attributed to British standards being promoted and held in higher esteem internationally. The access control market is becoming more regulated and the superior products are becoming easier to identify. Investment and partnership with eminent trade associations and government bodies such as the PSSA, CPNI and the NaCTSO will help British Manufacturers of vehicle protection barriers succeed internationally in the future. The recent terrorist attack in Norway and against other soft targets demonstrates that the global terror threat needs to be taken seriously. This indicates that a market-wide push to raise standards is not a ‘flash in the pan.’ Companies who conform and work with trade associations now will most certainly reap the benefits later. Supporting the new industry standards should not be seen as an inconvenient, additional audit but an opportunity to showcase quality and innovative access control products. Come and visit ATG Access, which will be exhibiting at both the Counter Terror Exhibition (stand F181) and Security & Policing Exhibition (stand G16). L FOR MORE INFORMATION For more details on this story or on the product range of ATG Access please contact the marketing department on 01942 407 735 or e-mail: lucy.foster@atgaccess.com. Visit the website at www.atgaccess.com for extensive product information.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
23
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Perimeter security solutions from Cova Security Gates During 2011, Cova Security Gates successfully tested its innovative new CSG 10140 Sliding Gate to PAS 68:2010*1, at last offering a low cost solution to the market. This new product from the Sussex-based perimeter security specialists was designed and developed by its experienced in-house R&D team to provide discreet protection for critical infrastructure, whilst maintaining the outward appearance of an equivalent non-crash-tested gate. The CSG 10140 sliding gate is the latest gate in Cova’s counter terrorism family, joining the already-successful CSG 10610 crash-tested bi folding gate, with a crash test rating of 40mph*2, which was followed shortly thereafter by the CSG 10611 with a crash test rating at the higher speed of 50mph*3. The 10610 was the world’s first crash tested speed gate available and, along with its big brother – the 10611– remains the only PAS compliant product of its type available globally. It’s something of which the company is justifiably proud. Not known for resting on its laurels, the R&D team then developed the patented arrestor device for use on a sliding gate to allow specifiers and customers to select the most appropriate specification for their needs. All of these products provide an elegant solution to the sometimes difficult issue of blending high security protection into an otherwise standard-looking perimeter
line. Bespoke finishes can be incorporated into the design phase, working closely with architects, consultants, building contractors or the end-user on all projects from initial specification to commissioning, resulting in a high quality installation that will provide long-term reliability and effectiveness. Providing a one-stop shop, Cova’s portfolio also includes crash-rated road blockers in both full depth and shallow configurations and crash rated bollards. Field-proven control systems complete the picture, enabling full integration via a range of options. Increasing interest in the counter terrorism range is coming from high security sites in sectors such as defence, government, utilities providers, food and pharmaceutical production, and aviation security.
Cova Security Gates also offers installation and an extensive aftersales programme on all products, including planned preventative maintenance and breakdown service. FOR MORE INFORMATION Tel: 01293 553888, sales@covasecuritygates.com www.covasecuritygates.com Notes *1 CSG 10140 Sliding Gate V/7500[N2]/64/90:2/0) *2 CSG 10610 Swing Gate V/7500[N2]/64/90:2.2/0.0 *3 CSG 10611 Swing Gate V/7500[N3]/80/90:6.8/9.1
The UK’s Premier PerimeTer secUriTy manUfacTUrer A quArter of A century trAding in the design, mAnufActure, instAllAtion And service/mAintenAnce of : crash tested and standard trackless speed gates crash tested and standard sliding gates crash tested and standard boom barriers crash tested and standard rising bollards crash tested and standard static bollards Pedestrian gates, manual and automated turnstiles
contact us for further information, or to discuss your detailed requirements. cova security gates limited
tel: 01293 553888 email: sales@covasecuritygates.com
www.covasecuritygates.com
24
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
PHYSICAL SECURITY
INNOVATION FOR WHEN SECURITY MATTERS
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Broughton Controls Ltd designs, manufactures, installs and services a vast range of innovative vehicle road blockers, automatic vehicle security barriers, pedestrian security turnstiles and automatic gate systems throughout the UK and the Middle East Broughton Controls Limited is proud to be amongst the founding group of Physical Security businesses within the PSSA and at the forefront of innovative product development and testing. Broughton Controls is recognised within the high security specialist trade, and among consultants, specifiers and direct end users as the company to consult when seeking innovative solutions that address potential attack from either a vehicle borne or pedestrian threat. INNOVATIVE SOLUTIONS During 2011 our continuous development programme has witnessed the launch of impact resistant barriers comprising of the Defender 941 and Defender 942 barriers. These innovative solutions to vehicle borne threat utilise a unique composite cassette beam assembly which is simple to exchange in the event of impact and proves cost effective when compared to alternative products. By identifying key criteria during the development and review phase of production and maintaining those principles despite setbacks along the development path, the company is able to satisfy key components of desirability. The Broughton Control’s 941 Barrier is a heavy-duty vandal-resistant dual beam vehicle barrier which has been crash tested to PAS 68/2010. In achieving an outstanding performance classification of V/3500(N1)48/90:0.5/0.0 it will limit site penetration of a 3.5
tonne vehicle at 48km/h to only 0.5m. The 941 barrier has been crash tested with a clear opening of 6m but is also available for wider entrances subject to slightly increased penetration distance. • High traffic volumes requiring frequent access and egress with speedy operation, thereby minimising opportunity threat when in live deployment. • Shallow foundation minimal depth allows ease of installation and suitable for areas with existing under-road services/utility routes. • Simple beam exchange: the 941 incorporates our unique interchangeable ‘composite cassette’ technology. In the event of deployment, and subject to resultant damage, the beam may be exchanged within minutes, thereby aiding business continuity. • Economical engineering: available in manual and motorised options with choice of powder coated colour finishes to suit application and budget. 942 BARRIER In order to support the Centre for the Protection of the Critical National Infrastructure’s drive for economical and innovative solutions to stay ahead in the defence of CNI risk reduction we have continued product development and launched the 942 barrier. The series maintains all the features of the 941 and affords enhanced test protection of PAS68:2010 V/[N2]7500/48/90:0.0/7.9
criteria and incorporates our new composite cassette vehicle restraint technology. This produces a lightweight design allowing faster operation and greater durability than traditional ‘big and heavy’ systems. Broughton Controls Limited is continuing its design and development plans into 2012 and is confident that during the coming year it will yet again be launching new and innovative products for deployment within applications to protect the Critical National Infrastructure. Broughton Controls Limited has a range of PAS 68 products available and will be exhibiting at the Security & Policing 2012 Exhibition, Farnborough, Hampshire, between January 31 and February 2, 2012, and at Counter Terror Olympia London on April 25-26. Broughton Controls’ policy of involvement in project design and management by a dedicated project manager ensures smooth progression from order to handover. And ongoing maintenance through its sister company Eisotech Services Ltd ensures long term system reliability. Broughton Controls would be pleased to meet and discuss your requirements. Alternatively please feel free to make direct contact as per the details below. L FOR MORE INFORMATION Tel: 0161 655 1020 Fax: 0161 6551021 info@broughton-controls.co.uk www.broughton-controls.co.uk
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
25
Blast Resistant Buildings
BUILDING RISK ASSESSMENTS
STRUCTURAL RESILIANCE How can blast resistant security strategies prevent and minimise danger to buildings and the people in and around them, asks Chris Lawrence, chairman of the BSIA’s Security Consultancy section Terrorism is an ongoing risk in the UK and overseas, and with September marking the 10th anniversary of the terrorist attacks on the US’ World Trade Center and the Pentagon, national security remains high on the country’s agenda. Although UK Government counter-terrorism advice has historically focused mainly on crowded places, which remain highly attractive targets, other places at risk include iconic buildings, government, military and diplomatic installations, infrastructure sites, and any site neighbouring these.
with counter terrorism, and where new measures are necessary they can often be designed with this dual purpose in mind. The starting point of counter terrorism design applied to public buildings should always be a risk assessment, to understand the overall risk profile of the activities and organisations that will be housed in a facility and of the facility environs. It is important to engage with relevant stakeholders as early in the design process as possible to establish to what extent, if any, these enhanced security measures are necessary.
ASSESS THE RISK LEVEL KEEP THREATS AT A DISTANCE The UK is a world leader with a body of Improvised explosives devices (IEDs) are growing expertise in creating resilient the dominant terrorist threat to buildings buildings. When putting together an effective and their occupants, and can be effectively security strategy that looks at making a mitigated by keeping them at a distance. building blast resistant, the level of protection Hostile Vehicle Mitigation Measures can be should vary to suit the risk level of the facility. critical in maintaining the maximum standThere are many ways in which security and off from large IEDs. Traffic management site management concerns can be integrated Zaun_CTB 148x420 Ad Nov_Layout 1 19/10/2011 15:08 Page and 1 parking options with static barriers can
eliminate or reduce the need for active barrier systems that can be breached by deception or duress, even if they are designed to resist penetration or encroachment. Static barriers do not need to be intrusive, particularly in new developments. Creative use of hard landscaping and water features can in many cases be designed to prevent vehicle access while remaining aesthetically pleasing. Area based approaches can also be very effective in counter terrorism protection for both the public realm and the associated buildings and facilities. The pedestrianisation of a square, for example, by using robust street furniture as vehicle barriers can protect both crowded public places and private buildings. Similarly, systems designed for congestion control can be used to reduce the number of active control points required around a high risk area, and allow resources to be concentrated. Moreover, access control measures, whether at active vehicle barriers, at reception E
Security fencing systems
Zaun is a manufacturer and supplier of fully integrated high security solutions which can be supplied as part of a full turnkey package. Contact us for a technical design and specification service or a FREE brochure.
CONSIDER THE STRUCTURE From a structural point of view, glass facades often require careful analysis because of the extensive and severe injuries that can be caused by glass fragments in case of a blast.
This results in uneconomic facades that are not a realistic option for most buildings. The alternative solution is to design glazing that retains the glass fragments after cracking. For new construction, this can best be provided using a PVB laminated glass inner leaf, adequately anchored to the frame. Similar effects can be obtained by applying anti-shatter film to the inside of existing glazing, although usually to a lower level of protection. Blast design is not fully standardised, so
The UK is a world leader with a body of growing expertise in creating resilient buildings. When putting together an effective security strategy that looks at making a building blast resistant, the level of protection should vary to suit the risk level of the facility. There are two possible solutions to the risk of glass fragments caused by blast. The first is to design the glazing not to break. However, this leads to very thick glass that causes very high reactions and requires very strong frames and structural supports.
solutions tend to be site or client specific, although some standards do exist, e.g. recipe glazing designs for normal risk levels to UK government buildings. For more severe blast levels, blast testing or dynamic analysis informed by blast testing is the
norm, using laminated glass of appropriate make-up anchored into enhanced frames. SEEK ADVICE General advice is available from government sources and expertise from specialists can also be sought to ensure a meticulous and appropriate assessment is undertaken. Counter Terrorism Security Advisors (CTSA) in the various UK police forces can give initial advice on risk levels, and provide general advice on practical mitigation measures that are preferred for medium and low risk sites, such as most public buildings. Moreover, the Centre for the Protection of National Infrastructure (CPNI) is a government authority which provides protective security advice to businesses and organisations across the national infrastructure. Taking on board a reputable and experienced security consultancy is also essential when planning counter terrorism measures for buildings. Members of the BSIA Security Consultancy section meet strict quality criteria, and can provide expert advice and assistance from the initial risk assessment through design considerations and solutions, to design detailing and testing of solutions. L
Blast Resistant Buildings
E facilities or at rear and escape doors are a key defence to keep IEDs away from and outside buildings. These defences can be strengthened by technical measures such as intruder alarms, surveillance CCTV and automated number plate recognition.
FOR MORE INFORMATION www.bsia.co.uk/consultancies
that set new boundaries.
Tel: 01902 796699 security@zaun.co.uk www.zaun.co.uk
WHEN LIVES ARE ON THE LINE If you wear the badge of protection and work for law enforcement, the military or a security organization, the SDS Group is your partner in fighting crime. Our state-of-the-art search and detection equipment includes Portable X-Ray Equipment, Metal and Mine Detectors, Explosive and Drug Detection Equipment as well as Backscatter X-Ray. We not only provide the equipment you need to counter terrorism, we offer specialized training to aid in your search to detect, cover and neutralize explosives and explosive devices. Additionally, the SDS Group provides comprehensive consulting services involving threat assessment, risk analysis, blast mitigation and x-ray image analysis. When Lives Are On The Line, let SDS be your First Line of Defense Partner. SDS Group Limited Courtlands Farm #2-#4 Turnden Lane, Cranbrook, Kent. TN17 2QL, United Kingdom Phone: +44 (0)1580 715038 Email: sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk
SEARCH DETECT SECURE
BUILDING PROTECTION
BUILDING SECURITY IN AN AGE OF TERRORISM
Blast Resistant Buildings
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
High profile buildings are primary targets for extremist groups, warns SDS Group We live in a tumultuous era characterised by political unrest, terrorism and high crime levels. Today’s security managers need to be prepared for a multitude of threats against their building: everything from natural disasters like earthquakes, hurricanes and even tsunamis, to the manmade threats of terrorism and crime. With so many things to protect yourself against, how does a security manager decide which threats warrant their attention, and a portion of their limited funds? The best way is to perform a comprehensive threat assessment and evaluation. Recent incidents in Afghanistan, Iraq and Pakistan as well as past attacks in Mumbai, Jakarta and London have shown that high profile buildings and hotels are primary targets for extremist groups. The recent London riots further demonstrate that the threat to buildings can take many forms. High profile buildings are the focus of extremist efforts because they are both easy targets and are seen as symbols of Western capitalism, imperialism and corporate greed. Because of the dangers involved it’s important to have your building assessed to determine the threat, level of preparedness and steps needed to effectively protect the building. Achieving a high level of security at hotels, commercial buildings and offices, revolves around a few simple steps that, if taken, can noticeably increase the preparedness of a building to withstand a terrorist attack as well as increase their odds of resisting one. ASSESSMENT There are three components to a proper building assessment – assessment of the threat, a vulnerability assessment, and the assessment of the building’s physical structure. Let’s look at the three areas in detail. Before we can prescribe a set of preventative measures and mitigation technologies for a property, we need to define the threat. There are only so many things we can realistically prepare for so we need to determine which threats have the greatest probability of occurring. As far as hotels and buildings are concerned the traditional terrorist threat has been a bomb or explosive device. The critical next step is to determine the likelihood of such an event happening at that particular property. This can be done by studying historical trends and relevant statistics of incidents and determining which particular groups are active in the area along with their usual operational methodology. Each individual property will also need a site specific assessment
to categorise the basic threats in terms of likelihood for that particular building. This can be somewhat subjective, but is a critical part of determining that building’s threat probabilities. An important consideration is to design building security measures that effectively address the threat and interfere with building operations as little as possible. To do this we need to ensure the security measures implemented do not exceed those required. How involved and intrusive your security measures need to be of course, depends on the threat. High level, high probability targets involve more intrusive security measures than those locations in little danger of attack. Determining what we need to prepare ourselves against is accomplished by conducting a threat assessment. This is where we determine the most likely threats there are to our building. Once this is done, we move onto the next assessment, the vulnerability assessment. VULNERABILITY ASSESSMENT Once we’ve determined the threat, the next step is to determine our building’s strengths and weaknesses in relation to the high probability threats. Different threats require different responses and preparation. For instance, if it is determined that the major threat to a building is from crime and rioting, the necessary steps to mitigate and prevent these from happening are far different than they would be if the threat were from terrorist bombings. Likewise, if there was a terrorist threat, we would need
to analyse the most likely method employed by terrorists in our area. Are the most likely terrorists to attack our building likely to use explosives, or do their actions revolve primarily around kidnappings? Only by assessing our vulnerability to the most probable threats can we adequately take precautions against them. The third component of the assessment determines the condition of a building’s physical structure to withstand the stresses of the various threats and the current level of security. The physical assessment will revolve around three primary areas – blast protection, ballistic protection and intrusion prevention while an examination of the current security procedures and protocols will determine how effective building security personnel are at addressing security issues. From this assessment we can establish a baseline level of security and make recommendations for cost effective ways to improve on the weak areas. Safety is a tough sell, especially when it comes to terrorism, because terrorist incidents are thankfully rare. A terrorist bombing is a low probability/high consequence event but is still a possibility. Having a proper building assessment completed and the recommended procedures and mitigation steps put into place will make your building safer and more secure. L FOR MORE INFORMATION Tel: +44 (0)1580 715038 Fax: +44 (0)1580 712056 sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
29
Blast Resistant Buildings
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
STRUCTURAL REINFORCEMENT
PROTECTING MASONRY STRUCTURES AGAINST TERRORIST ATTACKS Cintec, a market leader in the field of specialised structural reinforcement, has developed its advanced structural engineering systems to resist the effects of blast attacks A decade later and it is evident that the tragic events of September 11, 2001 have truly highlighted the vulnerability of existing structures to terrorist attack, and countries all over the world are becoming increasingly aware of the devastating damage caused by such activity to both people and buildings. In fact, all western democracies now acutely understand the apocalyptic consequences of a well-orchestrated attack on high-profile government facilities and other related targets, and thus protection against these problems is continually high on the agenda. In response to this augmenting concern, structural engineering firm Cintec International has developed a highly advanced total blast mitigation technology to assist governments in preparing for such devastating attacks. AWARD-WINNING COMPANY Cintec International is a South Wales-based company that has for over two decades been a market leader in the field of specialised structural reinforcement. Having been awarded the Queen’s Award for strengthening masonry arched structures, Cintec now commercialises patented anchoring and reinforcement systems across the globe. The renowned Cintec system is found in heritage restoration projects throughout the world and provides internal strengthening anchors that literally stitch the fabric of a structure and resolve problems of cracking and subsidence. The company has maintained many highprofile and often sensitive structures including, Windsor Castle, the European Parliament Buildings in Athens, the Mangi Bridge in Delhi prior to the commencement of the Commonwealth Games, and has more recently won a three-year contract to strengthen the façade of the Confederation Building which overlooks St.John’s, in Newfoundland, Canada. A particularly exciting ongoing project for the team is the use of the Cintec specialist anchors to restore the world’s first pyramid, the Pyramid of Djoser, in Egypt, after an earthquake which left the structure’s ceiling at increasing risk of collapse. However, the versatility of the anchoring system allows for many adaptations and over the last decade the portfolio has broadened to include systems for mitigating against the effects
30
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
of an explosion such as terrorist attacks. Cintec has been at the forefront of blast mitigation since the 1980s. Motivated by the collapse of Ronan Point in London in 1968, where a gas explosion on the 18th floor triggered a progressive collapse, Cintec developed a strengthening system to reinforce masonry walls in order to resist accidental gas explosions and earthquakes. In the mid 1980s, approximately 15km of Cintec reinforcement anchoring was installed in large panel system buildings in both North America and Europe to resist against progressive collapse. The process continues today in many areas. Many of the buildings at risk from terrorist attacks today are historical, ornate, listed and constructed using traditional techniques with masonry elevations. Used in such structures, many of the modern retrofitted reinforcement techniques necessary to strengthen the existing building against terror attacks are unsightly, inelegant, intrusive and inappropriate. However, security specialists are well aware that whilst there may be little that can be done to defend a building against an aircraft attack, there is plenty of scope to defeat the more traditional car bomb and bullet, and it is within this arena that Cintec has developed its advanced structural engineering systems to resist the effects of blast attacks. BLASTEC RANGE Known as ‘Blastec’ this range includes highly advanced masonry fixings that anchor blastproof windows into masonry walls to counter the effects of a bomb blast or perhaps a nondeliberate event such as a gas explosion. The
system can also reinforce an entire building, such as an embassy or a bank, using anchors many metres in length invisibly installed throughout the walls. The Blastec System is a complete analysis, design and installation process that enables structures to withstand the adverse effects of blast loads. With each project and application, from high-rise E
The Blastec System is a complete analysis, design and installation process that enables structures to withstand the adverse effects of blast loads. With each project and application, from high-rise buildings to historical structures, Cintec’s cost-effective Blastec System provides an innovative solution for total building protection.
The Blastec system is arguably the only one in the world capable of modelling accurately the complex behaviour of masonry structures exposed to explosive loads. E buildings to historical structures, Cintec’s cost-effective Blastec System provides an innovative solution for total building protection. To understand the system further it is important to note that the Blastec System begins with structural analysis and design. Cintec’s specialist Blastec structural engineers have many years of international civilian and military experience gained in the analysis and design of structures subjected to weapons effects. This experience is used to detail the response of the threatened structure when subjected to adverse explosive loads without causing initial damage to the building. Following local guidelines, once both the structure and its surroundings have been analysed, a number of blast mitigation possibilities are considered including temporary self-inflating water walls, permanent permeable blast walls, vehicle anti-ram barriers, and blast bins. Based on the award-winning retrofitted masonry anchor, Cintec is able to analyse and strengthen all types of masonry structures in order to make them resist impulses associated with blast loads in excess of 250 psi-ms (1620 kPa-ms). Using the results of our on-going research and development programme into the behaviour of masonry structures subjected to dynamic loads, the Blastec system is arguably the only one in the world capable of modelling accurately the complex behaviour of masonry structures exposed to explosive loads. Although retrofitting masonry structures is Cintec’s specialty, the engineering firm is able to accept commissions across the full spectrum of building types and environments
from simple single-storey buildings to complex multifloor industrial framed structures in both steel and reinforced concrete. Peter James, MD of Cintec International, says: “Many structures, particularly those in urban areas where there are high concentrations of historic or prestigious buildings, are of traditional masonry construction. However, using our advanced discrete element software and engineering techniques, our Blastec technology is able to avoid any damage caused to the outer façade of a masonry building. The anchors, for example, can be installed without the need to remove internal or external finishes preserving architectural, historical and commercial details. “This allows historic structures to be protected from terrorist attacks without sacrificing the outlook of the building itself, which has additional benefits in not disclosing the level of defense enclosed within the structure.“ STRENGTH EVALUATION The Blastec System involves the detailed modelling of a masonry structure using advanced three-dimensional discrete element analysis to evaluate its strength. The process provides an accurate prediction of the performance of the structure against blast loads. If required, the masonry can then be retro-reinforced using a unique treatment of custom designed high-grade reinforcement anchors specially developed for each application. The anchors consist of steel bars sleeved in a woven fabric sock and fed into cored holes within the masonry. The sleeves are then filled with cementitious grout,
creating an internal bond to the steel core and an external bond to the masonry substrate. The high stresses within the steel core of the anchor are distributed through the grout to the masonry surface. The diameter of the hole and the corresponding sock are carefully selected so that the stresses at the surface of the sock are matched to the shear strength of the parent masonry. In this way, weak or friable masonry substrates can be successfully reinforced to resist the high loads and pressures associated with an explosive event. However, in certain situations it is more cost effective to isolate the structure from the effects of an explosion rather than harden the structure to resist it. Cintec has produced a range of self-inflating waterfilled components capable of protecting personnel and property against the effects of terrorist devices such as a car bomb as well as for the safe disposal of unexploded ordinance. In sufficient quantity, this waterwall technology dramatically reduces the damage caused by primary and secondary projectiles and interacts with the chemistry of the explosion, reducing heat and the overall effectiveness of the primary explosive material. DEVELOPMENT James says: “We are continually developing our range of services and products to ensure the best and most cost effective means of protecting and strengthening structures in countries all over the world. Over the past decade, this work has increasingly included protection against terrorist attacks which we understand to be an important yet sensitive issue. We always carry out our reinforcement and repair work to respect the beliefs and regulations of local communities, cultures and governments. “Our technology aims to not only protect buildings but the people within them should a terrorist attack occur, which we feel is extremely important following the tragic events of 9/11 and other terrorist attacks that have followed over the past decade.” As a market leader in counter-terrorism related engineering solutions and products such as the Waterwall technology and advanced anchoring systems, Cintec International is currently part of the Blast Mitigation Action Groups’ commercial-off-theshelf (COTS) programme and is a registered contractor with the US Defence Logistics Agency. The Blastec System is also known by the USACE Protective Design Center as the Masonry Reinforcement Technique (MRT). The structural engineering firm is also a recipient of numerous international awards for engineering, and thus the team behind it is universally recognised and respected not only for its Blastec technology but for the application of advanced and innovative engineering systems to historically respected structures across the globe. L
Blast Resistant Buildings
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR MORE INFORMATION www.cintec.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
31
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Toyota Landcruiser & Hilux Double-cab pick ups B6 + Armour Protection Shipping and export licenses can be arranged by Armoured info@armoured.uk.com
0121 700 7065
WHAT DO YOU LOOK FOR IN A COMPONENT SUPPLIER? n n n n n n
Someone who understands my needs for both quality and cost control Provides a reliable and consistent supply on a global scale Guarantees to maintain the best possible service Acts with speed and flexibility to my requests Stock availability when and where I need it A company I can build a trustful working relationship
SOMEONE LIKE BF COMPONENT SOLUTIONS Contact us now - give us the chance to support you in achieving your companies’ long term goals and needs.
www.bfcsltd.com
32
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
www.armoured.uk.com
UK-USA SECURITY AGREEMENT
David John Bryan examines how the UK-USA security agreement and intelligence sharing in general can both help in the fight against international terrorism We need to go backwards before we go forwards. In 1607 England established its first colony in North America called Jamestown. Our joint history goes back literally hundreds of years – a real special relationship still exists 404 years later. Our special relationship encompasses trade, political affairs, finance, technology, arts and science and, most important, the sharing of government and military intelligence which includes joint military combat operations in theatres of conflict throughout the world. Our joint population exceeds 380 million and the UK and USA are each country’s largest investors, some would say we speak the same language – but there are differences. Trade and investment including tourism continue to be an important part of our joint relationship which arguably has been continually strengthened by the UK-USA Security Agreement dating back to 1940-1944, later signed as the BR-USA, and now known as the UK-USA Agreement that marked the vital World War Two co-operation between the United Kingdom and the United States. Since 1946, appendices to the agreement were drafted and revised to include details of a strong working relationship between Australia, Canada and New Zealand covering both cultural and military subjects which helped further trust and teamwork between all countries. WHAT IS THE AGREEMENT? The UK-USA Security Agreement is still shrouded in secrecy and hence there are some restraints within this article. This is what we do know. We continue on a daily basis to exchange SIGINT information on all matters of interest between the US National Security Agency and the British GCHQ Government Communications Headquarters based in Cheltenham, sometimes as a re-direct from the UK Communications Electronics Security Group and from our joint armed forces
worldwide. This group monitors a large variety of intelligence information, including updates on the continuing threat from terrorism, threats to our airlines, increasing cyber threats, national infrastructure, chemical, biological, radiological, nuclear and explosive threats. ECONOMIC THREATS The UK-USA Security Agreement also monitors economic threats to the member Group. The agreement monitors closely the movement across borders of explosives and chemicals that could be used against us, such as CBRN and threats to the recovery programmes that are necessary to counter long term damage to
society. The agreement also covers science and technology exchanges that offer social and economic advantages to promote the further sharing of information and data including intercept programmes and protocol to help keep us safe and secure in our homes and businesses. The UK-USA Security Agreement has been described as the single most important bilateral partnership in our history as evidence by our well aligned political, trade, commerce, financial, technological and academic sharing of high quality government and military intelligence information. As stated earlier, we are also each country’s largest foreign investors. An excellent example of the UK-USA
Security Agreement is the way we co-operated during World War Two. Most Americans were sympathetic towards the UK and France during the dangerous confrontation with Nazi Germany, whilst there was some opposition to American intervention into European affairs. Who remembers that Winston Churchill’s mother was an American? Our UK wartime Prime Minister and the UK must thank Franklin Roosevelt for US help after the fall of France for lots of aid including the possession of 50 destroyers – in return the UK gave the United States rent free leases on numerous land and air bases throughout the British Empire. Later the USA lent-leased Sherman tanks, fighter airplanes, munitions, bullets, food and medical supplies. The USA by 1941 became extensively involved in the European theatre of conflict due to the real fear that Germany could eventually reach American shores. 73,000 British and 60,000 Americans stormed the beaches of Normandy on 6 June 1944 and continued to fight alongside each other until the end of the Second World War. Throughout the war scientists and physicists from the USA and the UK and many other friendly countries worked in total secrecy on the Manhattan project which eventually achieved success in building an atomic bomb – all scientist research for the project was headed by the American physicist Robert Oppenheimer – Winston Churchill was informed later about the secret testing of the atomic bombs. Since World War Two, the UK-USA Security Agreement is even more important. After the 1939-1945 war we had the Cold War due partially to our joint relations between the UK and USA and our old ally the Soviet Union. The United States and United Kingdom became increasingly suspicious of the motives of the USSR – capitalism vs. communist power. This resulted in the formation of the North E
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
Written by David John Bryan, security consultant, UK-USA Research & Innovations, LLC, California, USA
INTELLIGENCE SHARING AND THE FIGHT AGAINST TERROR
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
33
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
GPS Perimeter Systems – specialists in high security, perimeter intrusion detection systems GPS Perimeter Systems Ltd is a supplier of high security intruder detection products for external applications. The company has been operating in the UK high security perimeter detection market for more than 11 years. The group overall has more than 35 years’ experience in the design, development and application of perimeter detection products and has helped install thousands of systems all over the world since its inception in 1974. Continuous research and development has lead to the use of new technologies and techniques in the wide range of detection systems designed and manufactured in house. The range of products the company supplies is diverse enough to ensure that it has a cost effective solution to virtually any high risk perimeter. There are multiple technology buried detection systems, used for covert or aesthetic reasons, fence mounted fibre optic and cable technology intrusion systems and free standing microwave and infrared sensors for high security applications. The company also has a complete range of management and integration systems, which allows simple integration of the different technologies into a simple, seamless management environment. Matching
different technology detection techniques to the correct areas of a large site is now easily achieved. Integration of other security systems such as CCTV control and recording is also possible using the modular SCS Security Management software suite. The range is the subject of continuous development and enhancement and recent new products include fibre optic based systems for the protection of very long perimeters, fences, pipelines and underground cable ducting and a covert,
single cable, buried detection system. Of particular interest is the new system, Miles, used to detect interference with cables in underground ducts. The theft of cable from ducting can cause significant disruption and loss of revenue to a large number of companies and individuals. It can also be used to detect attempts to intercept communications on existing copper or fibre optic infrastructure. Such diversity allows GPS Perimeter Systems to specify for virtually any type of application, from the most secure government sites to prestige residential properties. Current major customers in the UK include the prison service, nuclear and other power generation plants, oil and gas distributors and new systems for solar panel parks. In short, if you have something to protect, property, assets or people, GPS Perimeter Systems can supply the solution. FOR MORE INFORMATION GPS Perimeter Systems Ltd 14 Low Farm Place, Moulton Park Northampton NN3 6HY, UK Tel: +44(0)160 4648344 info@gpsperimeter.co.uk www.gpsperimeter.co.uk
Another 5 reasons why you should use our detection systems to secure your perimeter . . . 1
GPS Perimeter Systems provide a complete range of external detection systems and the range is continuously updated with new technology as it becomes available. Expert advice on the correct, most cost effective solution to
2 solve any perimeter security problem.
All the systems can be integrated with CCTV surveillance
3 systems to provide fully confirmed alarms. 4
Systems have been long term performance tested by independent government test facilities achieving high security classifications.
This property is protected by one of our buried detection systems, which are completely invisible once installed.
to operate, with extreme reliability, a well designed 5 Simple system can reduce manpower requirements for large sites.
Call now: on +44 (0)1604 648344 Or email to: info@gpsperimeter.co.uk www.gpsperimeter.co.uk
34
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
Our rapid deployment, portable systems can be used to provide short term protection for high value assets in many different locations.
UK-USA SECURITY AGREEMENT Ground Zero
Accurate Shooting
Personal Safety
Wind Speed
Air Pressure
Temperature Heat Stress Wind Chill Dew Point Wet Bulb Humidity Air Density
- Handheld - Robust - Waterproof
- Data storage - Data upload - Bluetooth®
Direction Cross, Head
& Tail Winds
Barometric
Pressure
The UK-USA security agreement has been described as the most important bilateral partnership in our history, evidenced by wellaligned political, trade, commerce, financial, technological and academic sharing of high quality government and military intelligence. E Atlantic Treaty Organization (NATO) which agreed to the formation/alliance whereby if one country is attacked then it is seen as an attack on all countries signed up to the alliance. SPECIAL BOND Our history books remind us of the Korean War, Vietnam War, the Falklands War, Iraq, Afghanistan and lots of smaller conflicts over the past 70 years that serve to remind us of the special bond between our countries. Today the agreement is even more important. If we are brutally honest, the UK-USA Security Agreement failed us prior to the September 11, 2001 terrorist action, resulting in the loss of 2,669 American and 67 British who perished at the World Trade Centre, The Pentagon and Shanksville, Pennsylvania. Others have commented on what went wrong, what we should have done better, and what lessons we have learned and put into action. We can perhaps feel comforted that a recent very long investigation for the Washington Post revealed that the USA has over 1,200 government organisations and nearly 2,000 private companies working on top secret programmes related to the threats and actions from terrorism, counterterrorism, homeland security and intelligence gathering and dissemination of information that (hopefully) gets passed as part of the UK-USA Security Agreement to the United Kingdom security organisations. The article further revealed that over 850,000 Americans now have top secret clearance and over 10,000 security organisations are located across the USA – Washington DC has 33 buildings occupying about 17 million square feet of floor space.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
www.r-p-r.co.uk Tel: +44 (0) 1590 679755 or email sales@r-p-r.co.uk PAYING THE PRICE As a reality check to try to comprehend the total cost of just the USA’s part of the UK-USA Security Agreement, the official figures concerning the war in Iraq for an almost nine year period include the loss of 4,400 Americans with more than 30,000 US troops wounded – all at a cost to the US taxpayer of around 800 billion US dollars. And tens of thousands of Iraqi people also lost their lives. The Security Agreement has had its problems; allegations of faulty intelligence information regarding Iraq’s possession of weapons of mass destruction, and the then Prime Minister Tony Blair ‘pandering’ to the requirements of President George W Bush caused a media storm. And later the Scottish Parliament released Abdelbaset al-Megrahi – allegedly the Pan American Flight 103 bomber – back to Libya. These did not help the special relationship between the UK and USA. In 2010 the BP-owned Deepwater Horizon drilling rig led to further diplomatic friction as a gigantic oil spillage hit the coast of the USA. Despite the sometimes rocky relationship, the United States and United Kingdom remains ‘the most important bilateral relationship in the world’. Trade and mutual investments account shows the United States and United Kingdom total trade of import and exports as more than $110 billion in 2008. The agreement also yields over $606 billion in foreign direct investment. Add this to tourism, transportation between countries, and our common cultures, the music and arts – all bound by a shared history, common language and similar legal system that goes back many hundreds of years. Today we face together new challenges such as cyber terrorism, an overcrowded world, global warming and the ever-present nuclear threats from certain countries, as well as many other complicated operational and strategic challenges. These all reinforce the need to continue with the unique UK-USA Security Agreement. L
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
35
EVENT PREVIEW
COUNTER TERROR EXPO 2012
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Counter Terror Expo – the critically-acclaimed, highly-specialised event for those who are tasked with delivering a robust defence against the threat posed from international terrorism – returns to London Olympia 25-26 April 2012 Counter Terror Expo is a widely-acclaimed and world-beating premier event for public and private sector professionals working at the sharp end in ensuring an effective and consistent response to the threat we face from terrorism. It is now in its fourth year and continues to grow exponentially. Counter Terror Expo remains the only event of its kind to gather the world’s leading experts, together with top industrialists from across the globe, in a unique and secure environment designed to foster close co-operation in the complex and multi-faceted task of combatting terrorism at transnational, regional and local level. UNCERTAIN TIMES Counter Terror Expo is being held at a time of great uncertainty in the world. The capture and death of Al Qaeda (AQ)
leader Osama bin Laden is said to be proof positive that the decade old campaign against terrorism is being won. Although hailed as a great success, the infringement of Pakistan’s sovereign territory by United States military assets, has not played well and resulted in a difficult relationship with that country which has apparently become distinctly frosty.
Meanwhile, the tumultuous upheaval we have seen across great swathes of the Arab world over the past year has led to a shift in the balance of power regionally, which may present a significant danger on our own doorstep if the vacuum is not filled appropriately. While it is hoped that the ousting of E
Counter Terror Expo remains the only event of its kind to gather the world’s leading experts together with top industrialists from across the globe, in a unique and secure environment designed to foster close co-operation in the complex and multi-faceted task of combatting terrorism.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
37
EVENT PREVIEW E hardline leaderships in Tunisia, Libya and Egypt will bring about greater stability, the power vacuum has been filled by interim military leaderships that appear reluctant to let go of the reigns in two of these countries. Thus public dissent is once again being heard on the Arab street. Civil unrest also continues unabated at
devastating attacks against Western targets over the past three years. The hardline leadership of the latter country looks increasingly fragile as it strives to hang on to power against a backdrop of international indignation at civilian killings and detentions. Syria’s leadership is said to have no
Counter Terror Expo will be held at a time of deep governmental cost cutting as national economies globally strive to address issues gripping the financial markets. the time of writing in Yemen and Syria. The former country has proven to be a relatively safe haven for Al Qaeda in the Arabian Peninsula (AQAP), which has been successful in launching potentially
appreciable opposition capable of holding the country together in the event that Bashar al-Assad eventually goes. Assuming a meltdown does occur in the country, it will likely give rise to significant danger
on Europe’s porous Eastern borders. Bahrain has also been the scene of a crackdown on civilian opposition to the ruling elite with military support from Saudi Arabia and the United Arab Emirates. Saudi Arabia most recently introduced limited societal reforms in an effort to quell rising voices of dissent. The so called ‘Arab Spring’ could potentially be turning into the ‘Arab Winter.’
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CUTTING COSTS Counter Terror Expo will be held at a time of deep governmental cost cutting as national economies globally strive to address issues gripping the financial markets. National defence budgets (including counter terrorism efforts) are not immune to such pruning. Irrespective of deeply devastating acts of terrorism in the past, some of these national budgets are being slashed as a E
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
39
An OSI Systems Company
MORE.
SCAN
SECURE MORE.
Rapiscan Systems - the Leading Provider of Security Screening Solutions Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it.
Metor 6M
With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions. And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget.
Rapiscan 620DV
To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac). Rapiscan Systems is the official security equipment and systems supplier for the London 2012 Olympic and Paralympic Games.
sales@rapiscansystems.com • www.rapiscansystems.com
Rapiscan 638DV
ONE COMPANY - TOTAL SECURITY
EVENT PREVIEW
Counter Terror Expo’s operationally critical and highly respected centrepiece conference has a well deserved reputation for its delivery of insight, analysis and perspective on the range of threats faced. E result of a perceived peace dividend. History has demonstrated that such a policy has a tendency to leave the gate open to future attack. It is incumbent on the military, security services, industry and academia generally to drive this point home, whilst engaging in dialogue and developing solutions that fit with the current world politics at an acceptable and achievable price point. THE EVENT Counter Terror Expo’s operationally critical and highly respected centrepiece conference has a well deserved reputation for its delivery of insight, analysis and perspective on the range of threats faced. Each year the event gathers together over 100 internationally recognised
speakers in the field of counter terrorism, to debate the issues faced, define the operational strategies, and help to shape future policy within the secure conclave of conference. Principal conference sessions include: • Global counter terrorism • Cyber security and electronic terrorism • Protection of crowded places (including designing out terrorism & emergency service response) • Critical national infrastructure protection • Tactical counter terrorism SHOWCASE EVENTS The conference is held alongside a wide range of hands-on showcase events designed to highlight the capabilities of many of the technology solutions E
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Conference Themes Global Counter Terrorism A full decade on from the horror of 9/11, what lessons have been learned? Critical National Infrastructure Security How do you mitigate against the problems caused by a loss of a part of the Critical National Infrastructure? Protecting Crowded Places Crowded spaces are amongst the most difficult to secure and demand appropriate surveillance and vigilance. The Cost of Terrorism to Business – Best Practice Risk Management Aon’s one-day conference will look at developments in the global terrorism landscape, and the human and economic impact on business. Cyber Security and Electronic Terrorism How can the government and private sector critical national infrastructure providers deliver a response to emerging threats?
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
41
A M AT T E R O F N AT I O N A L S E C U R I T Y
EVENT PREVIEW
E available to counter terrorism professionals today, as well as an extensive range of educational workshops presented by key experts from the industry sector. Counter Terror Expo will feature several new showcase events. The IEDD Live Theatre has specific relevance to the police, fire, military, transport security and other emergency responders. It will showcase ROV (remote operated vehicle) capability through scenario-based demonstrations, as well as demonstrating ancillary equipment, such as hook & line, jamming and ground scanning. The event highlights current generation suit mobility & maneuverability in extreme situations including victim recovery. ACCESS CONTROL SUITE Access to potentially high risk buildings and facilities remains a key consideration in counter terrorism planning. The Access Control Suite highlights the substantial range of solutions available in the marketplace today, as well as circumstance-dependent deployment methodologies, and hands on ability to assess current solutions. This world-beating counter terrorism event E
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Counter Terrorism and Specialist Security Awards – Royal Garden Hotel, Kensington This prestigious event celebrates excellence and achievement in counter terrorism and specialist security and will take place at the Royal Garden Hotel in Kensington after day one of the Counter Terror Expo 2012. Guests will enjoy a champagne reception, followed by a four course dinner, live bands, magicians, and an expert industry speaker. The 2012 awards will be presented in the following categories: • CCTV and monitoring • Communication systems • Surveillance, data and intelligence • Armoured vehicles, support vehicles and emergency vehicles • CBRNE detection and protection • Cyber security and electronic security • Personal protection equipment • Improvised explosive disposal device
• Perimeter protection and intrusion detection • Electro optic, thermal Imaging and night vision • Access control, ID and biometrics • Building and facilities protection The entries for the awards will be reviewed by a judging panel in order to form a shortlist for each catergory. The shortlist will then be open to an industry vote. The judging panel comprises Mike Bluestone, chairman of the Security Institute; Robert de la Poer, co-founder of Albany Media; Chris Phillips from the International Protect and Prepare Security Office and former Head of NaCTSO; Chris Holt MBE, consulting director of Aon Risk Solutions; and Kerry Underhill from the Olympic Delivery Authority. Entry deadline is 6 January.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
43
EVENT PREVIEW E is supported by an extensive exhibition of hardware and software solutions from across the globe which spans both the Grand and West Halls at the prestigious Olympia Conference & Exhibition Centre. Counter Terror Expo is an annual gathering and in its fourth year is taking place against the backdrop of the United Kingdom (UK) hosting the summer Olympic Games. In deciding to host this globally significant sporting event, the country has become a potentially major target for those who would wish to cause harm on the world stage.
The conference is held alongside a wide range of hands-on showcase events designed to highlight the capabilities of many of the technology solutions available to counter terrorism professionals today, as well as an extensive range of educational workshops presented by key experts from the industry sector.
OLYMPIC GAMES SECURITY Olympic Games security planning has been ongoing since the International Olympic Committee (IOC) awarded the summer Games to the UK. Arrangements are widely regarded as the most robust defensive security model delivered in the history in the Games. Counter Terror Expo delegates will gain valuable insight into this planning in the immediate run up to the summer Olympic Games. Gathering over 100 internationally recognised speakers in the field of counter terrorism, together with over 400 leading industry technologists to debate the issues faced, define the operational strategies, and help to shape future counter terrorism policy, this event remains the
only one of its kind in the world today that evolves in line with global geopolitics. AWARDS The Counter Terrorism & Specialist Security (CTSS) Awards celebrate excellence and achievement in counter terrorism and specialist security and will take place at the Royal Garden Hotel in Kensington after day one of the Counter Terror Expo 2012. Guests will receive the finest treatment, starting with a champagne reception and followed by a four course dinner, live bands, magicians, and a top industry speaker. Award catergories will cover excellence in CCTV and monitoring, communication systems, surveillance, armoured vehicles, cyber security and CBRNE detection and protection,
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
to name a few. For 2012, the entries for the awards will be reviewed by a judging panel in order to form a shortlist for each catergory. The shortlist will then be open to an industry vote. The deadline for submission is 6 January. L
Counter Terror Expo 2012 is a secure event and all attendees wishing to enter will go through a security process and your application will be screened to ensure that you are allowed access. Counter Terror Expo is a pre-registration only event and registration will not be permitted on-site. FOR MORE INFORMATION Please contact Nicola Greenaway-Fuller on +44 (0)208 542 9090. Register now at www.counterrorexpo.com
An end-to-end service from Assembled Electronics Assembled Electronics Solutions (AES) is a Midlands-based business that offers you an end-to-end service. Whether you require contract manufacturing capacity or a design and manufacturing partner, AES is ready to assist. With a broad sector base AES offers a range of electronics-based services from one-off prototype production and testing through to volume manufacture. The integration of enclosure design, wiring, programming and testing means that the end product is not only functionally sound but aesthetically tuned to meet your requirements. AES provides a range of services to new and established clients in the security, defence, automotive, motor sport, aerospace, medical and OEM sectors. In addition to physical manufacture, AES offers both project and supply chain management. Following final assembly, inspection and functional testing, finished products may be delivered using one of the following delivery options: single delivery, scheduled delivery, call off, kanban, or direct to end user. Rapid prototyping and the development of innovative solutions are core activities. Recent examples of AES innovation include remote monitoring and control systems,
data logging, tracking and detection. Specific applications include smart battery chargers for blue chip retailers, contactless switching for public sector healthcare applications and the conversion of existing security devices to layouts suitable for automated, surface mount assembly. With over 40 years of experience, AES can assist in technological upgrades to exisiting products both to increase functionality and to reduce unit costs through ‘design for manufacture.’ Whether you require a basic manufacturing and assembly service or an end-to-end solution we can
assist you in bringing your products to market efficiently and competitively. If you have identified a specific requirement but do not, as yet, have a solution, we would be pleased to hear from you. FOR MORE INFORMATION Assembled Electronics Solutions LLP Masons Road, Stratford-uponAvon, Warks CV37 9NF Tel: +44 (0)1789 204879 Fax: +44 (0)1789 299727 info@assemtron.com www.assembled-electronics.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
45
EVENT PREVIEW
RECOGNISING THE GLOBAL THREAT IFSEC International 2012 is set to provide a comprehensive business platform for counter terror best practice and innovation With terrorist attack an ever-present concern facing the public and private sector around the world, it is imperative that the entire security industry has access to a professional business platform where every element of the buying chain can share best practice and innovation. Heads of security, intelligence officers, procurement officials and department heads in local and central government should visit the world’s largest annual fire and security event, IFSEC International 2012, on 14-17 May at NEC Birmingham. The event delivers over 650 leading security companies and 25,000 security professionals from over 100 countries across the entire buying and influencing chain. These include manufacturers and distributors, installers, integrators, consultants, specifiers and end-users. INDUSTRY SUPPORT Supported by all of the leading associations worldwide, including the BSIA, Security Institute, London First and ASIS, IFSEC International has acted as a barometer for
the security industry for 39 years, bringing together product innovations and services that are vital to those responsible for implementing effective counter-terrorism strategies. Reflecting the need for today’s society to have effective counter terror measures against the ever-present threats on the UK and international landscape, thousands of products will be on display including counter terror, physical security, access
control, CCTV, fire safety, intruder alarms and integrated security/IP networks. IFSEC International 2012 will bring together international companies that will assist organisations on national resilience, counter-terrorism, border security, surveillance and policing issues, offering visitors an opportunity to browse products, services and technologies to reduce the vulnerability of the national infrastructure.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
LISTENING TO THE MARKET Understanding the time and budget constraints felt by the security industry and the need for a solid business case to justify event attendance in the current economic climate, the IFSEC International team has worked in partnership with several external research organisations to keep abreast of industry trends and gain valuable feedback from visitors and exhibitors. One key finding from this research was E
Reflecting the need for today’s society to have effective counter terror measures against the ever-present threats on the UK and international landscape, thousands of products will be on display including counter terror, physical security, access control, CCTV, fire safety, intruder alarms and integrated security/IP networks.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
47
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Same Day Express Delivery Service
Overnight Pallets and Storage Hi-Speed Services Ltd are celebrating 25 years this year in offering first class services to all our customers old and new. With a full range of vehicles including Motor cycles, Small vans, Mid size vans, Luton Box, 7.5 ton lorries, 18 ton lorries and Articulated lorries, we cover every vehicle requirement to anywhere in the UK, Europe and Worldwide. Also specialising in security deliveries, using the most enviromental vehicles, I.S.O.accredited, nothing is to much trouble, aswell as offering a next day pallet service for less urgent deliveries saving our customers costs. Our company has been built around customer service and we will adapt to any situation to make sure you the customer are 100% completely satisfied. The vehicles we operate are chosen for their least CO 2 emissions and we are fully committed to helping the environment as much as possible. With offices based in the South and Midlands, we can react to urgent requests very quickly.
Contactable 24 hours a day, everyday, with a human voice not an answer phone. MIDLANDS OFFICE Tel: 0800 0565559 Email: midlands@hispeed.co.uk
SOUTHERN OFFICE Tel: 0800 0199033 Email: southern@hispeed.co.uk
www.hispeed.co.uk
HYDRAULICS ALL MAKES OF HYDRAULICS SUPPLIED JAPANESE, AMERICAN, EUROPEAN ACCESSORIES AND SPARES
POWER UNITS 3 LTR -800 LTR STANDARD & CUSTOMISED
CETOP 3 & 5 DIRECTIONAL CONTROL VALVES AND STOCK VALVES AXIAL PISTON PUMPS
RADIAL AND VANE PUMPS
GHD HYDRAULICS LTD Tel: (+44) 01625 263963 (+44) 01625 266917 Fax: (+44) 01625 260258 email: gaynord7@msn.com WEB: www.ghdhydraulics.gbr
48
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
EVENT PREVIEW
E the greater need for exhibitors to launch brand new services and solutions at IFSEC International, with 67 per cent of visitors citing the sourcing of new products and/or suppliers as an important expectation of the show. Developed to help meet this demand, a New Product Innovation Showcase will launch at IFSEC International 2012 providing visitors with the perfect platform to see and experience new products and solutions, and discuss them face-to-face with suppliers. With over 90 per cent of visitors finding new products or suppliers they had not previously considered using, the new innovation showcase area is set to be a key feature of the 2012 show. Recent research conducted for UBM demonstrated that visitors’ experience at an exhibition could be enhanced with the use of an interactive smartphone app. Ninety five percent of respondents who visited IFSEC International 2011 owned some sort of smartphone with 44 per cent saying that they would be interested in using a smartphone app at a trade exhibition. Following this feedback, IFSEC International will be launching an app for 2012 to provide a truly interactive experience and help visitors get the very best out of the show. IFSEC International also conducted research with end-users in attendance in 2011 and can reveal that over 70 per cent quoted exhibitions as a key way of keeping up-to-date with industry knowledge. Combining this with the fact that over 55 per cent of those taking part in the survey have a direct reporting line into their company’s board to influence security spend, IFSEC International provides the optimum CPD, networking and business environment for both end user delegates and those from across the buying chain. EDUCATION, EDUCATION, EDUCATION “Over the last few months we have spent considerable time with visitors, exhibitors and thought leaders all associated with IFSEC International,” says Charlie Cracknell,
IFSEC International’s event director. “We wanted to get a real idea of what people want from the show and the overriding feedback was the need for quality content that makes the most of their time on the floor; from business opportunities to professional development.” To support this, an extensive seminar and workshop programme will take place at IFSEC International 2012 to help visitors keep abreast of the latest industry issues, legislation and innovations across the fire and security market. Many people in the UK are now working alone – either away from their company’s office, at home or during abnormal hours. Now the BS8484 code of practice is firmly in place and cases of employee neglect under the Corporate Manslaughter Act are being prosecuted, IFSEC International is launching its new Lone Worker Protection Pavilion to showcase the latest lone worker solutions and where this market is heading. Cracknell says: “There are increasingly greater numbers of lone workers across numerous industries and whether you are an employer of lone workers, or a self employed lone worker, you have a duty of care to provide solutions to manage risks in the workplace. If you don’t understand the potential risks to you and your business then how can you protect yourself? Working alongside the BSIA Lone Worker steering committee, we believe this feature will provide vital education to employers and lone workers from around the UK and enable them to manage risks on their doorstep”. UNDERSTANDING IP Developed in partnership with Anixter, a leading global supplier of communications and security products, the brand new IP Assured Zone (Hall 4, stand B150) will showcase at IFSEC International 2012. Set up to help end-users and the channel alike better understand IP and the impact it is having on their customers’ business today and in the future, this exciting new feature area will comprise of an engaging mix of educational
workshops and sharing of best practice. Steven Anson, EMEA marketing VP at Anixter, says: “IP was a hot topic at IFSEC International 2011 across the buying chain, however, we believe there is still much education and support needed to help the industry embrace this migration towards converged solutions. We are excited to help inform visitors to IFSEC International 2012 about such a business-critical issue and help support their individual migration paths”. With 57 per cent of visitors to IFSEC International 2011 expressing interest in CCTV installation and 47 per cent interested in CCTV monitoring, the brand new demonstration area ‘How Lighting Affects Surveillance’ will feature at IFSEC International 2012. This product area will demonstrate how different lighting conditions affect surveillance from low lighting/ambient conditions to complete darkness. It will highlight the difficulties faced and provide effective solutions through IR illumination, thermal and night-vision technologies. This highly interactive area will comprise of three rooms featuring different lighting conditions and will highlight how effective use of lighting and surveillance solutions can overcome these extreme and challenging conditions. While a greater emphasis is being placed on IP solutions, there are also many legacy systems and businesses that are integrating both analogue and IP technologies to manage investment and facilitate current systems to create hybrid solutions. Continuing the focus on hybrid solutions, ISM (Integrated Security Management) will once again be sponsoring and providing expert insight and advice at the Intelligent Integration Zone. Visitors will be able learn and see where they and their business can benefit from creating multi product hybrid solutions and what integration capabilities will help their business security and business management. This is a must see for any security professional responsible for handling the security of an organisation, including security installers, manufacturers, distributors, IT integrators, consultants, end-users and other key decision-makers.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
AN INTERACTIVE EVENT “First and foremost, visitors are at the show to do business, but we want to make it worth their while to spend more time at the show and this year’s educational programme is looking stronger than ever to help achieve this,” says Cracknell. “Gone are the days of the traditional standorientated exhibition, event organisers must complement their offering with a mixture of education and networking opportunities to enable visitors to truly engage, interact and share best practice at all levels.” L FOR MORE INFORMATION www.ifsec.co.uk
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
49
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
VEHICLE BARRIERS
PROTECTING AIRPORTS FROM VEHICLE INCURSION Many of the UK’s airports are now being protected by a simple product manufactured in Nottinghamshire
Manchester, Cardiff, Belfast, Bournemouth, Gatwick and Heathrow have all chosen to install CT Blocks (Counter Terrorist) manufactured by Townscape Products Limited. Continuing terrorist threats in recent decades have resulted in heightened security globally. The incident at Glasgow Airport in 2007, when two terrorists crashed a jeep into the main terminal building, shattering glass doors only yards from passengers queuing at check-in counters, threw the threat into sharp relief. It raised awareness of the various risks to public buildings and personal safety in general. UK airports in particular recognised the increased urgency for innovative and robust vehicle defence systems at their terminals. However, while the over-riding priority is security, the design of Townscape’s CT blocks also lends itself to imaginative landscaping. The installations are usually at the front of building and, while projecting a strong visual deterrent, also complement the surrounding building fabric and landscaping. They are designed to prevent unwanted vehicle incursion into zones around buildings or other secure areas including busy pedestrian plazas. Obviously protected areas adjacent to vehicle drop off points must also facilitate the easy passage of high volumes of pedestrians. TRIED AND TESTED The CT Blocks are manufactured from a unique reconstituted natural stone mix using specially selected aggregates. Each Block weighs 2.2 tonnes and is typically 1490mm long,
50
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
990mm deep and 600mm high. Manufactured to the rigorous PAS 68 standard, the units are tested and approved at TRL for CPNI. Townscape recommends an exposed aggregate finish that is both attractive and robust. Additional quartz rich Cornish fines can be added to enhance the finish of the exposed natural stone. They are cast around a steel reinforced frame that connects to four stainless steel inserts for lifting with eyebolts. The Blocks can be installed in different orientations to suit specific client requirements. They only need to be recessed into the surrounding tarmacadam, concrete or paved area to a depth of 100mm. The installation of the blocks is very straightforward – the surface of the recessed area merely needs to be flat and parallel with the road surface from which any approach to the defensive block would be expected. VALUE FOR MONEY The installation of CT Blocks can generate overall project cost savings of around 50 per cent over fixed bollard solutions. The savings result not only from a lower unit cost for the blocks but also, more significantly, from a substantially lower installation cost due to the absence of major groundworks. As the installation does not require deep foundations there is no need to re-route underlying services. The lack of disruption associated with this method of installation has been a major consideration for Townscape’s clients. Manchester wanted to prevent unwanted
vehicle incursion onto the busy pedestrian plazas at the front of its airport terminals adjacent to the vehicle drop off points. The additional measures were required at the departure and arrivals of areas T1, T2 and T3 terminals. Following the Glasgow incident Manchester Airport reacted vigorously. However, rather than view the additional measures as a hindrance to the normal operation of a very busy international airport, Manchester grasped the opportunity to incorporate the required changes with revised public transport and taxi drop off arrangements. The changes not only improved customer transit times but also enhanced the whole airport appearance. Townscape’s CT Blocks combine the elements of form and function perfectly and when installed the blocks collectively convey a strong visual deterrent while adding an attractive feature to the open plaza. The easy installation meant a minimum of disruption for this busy airport, reflected in costs that were lower than those for other solutions. Cardiff Airport installed a line of Townscape’s CT Blocks at the airport perimeter between the passenger terminal and the car park. Cardiff’s growing prosperity, including the arrival of the Ryder Cup competition at Celtic Manor, faster access to the city centre and increased traffic, meant an increase in the strategic importance of the airport to the city and to the local economy. The major refurbishment at the airport to accommodate the increase in passenger traffic needed to incorporate enhanced security measures. Gatwick Airport also chose Townscape’s CT Blocks during recent developments to modernise and improve access. The CT Blocks have been used in many other locations including transport hubs, heritage sites, MoD facilities, police stations and other public buildings. Townscape is one of the UK’s leading manufacturers and suppliers of a wide range of quality street furniture, shelters, covered walkways, paving and vehicle defence products. Its products can be produced in various materials including cast iron, steel and stainless steel, concrete, timber, polymer and aluminium. Townscape’s manufacturing flexibility means it can offer bespoke designs and adapt its own products to suit any requirement. L FOR MORE INFORMATION Tel: 01623 513355 sales@townscape-products.co.uk www.townscape24.com
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
OLYMPIC SECURITY
BORDER INSECURITY – A SIGNIFICANT RISK TO THE OLYMPIC GAMES? Chris Yates notes recent concerns about border security following the suspension of three senior officials When the UK Home Secretary, Theresa May, stood up in the House of Commons in early November and admitted that the UK Border Agency, for which she is ultimately responsible, didn’t know how many illegal entrants had passed unchecked and unchallenged into the country during a period from July onward, her pronouncement sent shockwaves throughout government, the opposition benches and the travelling public at large. Ms May’s statement followed the suspension of three senior UK Border Agency officials for allegedly authorising the abandonment of warnings index, biometric and fingerprint checks on foreign nationals at particular times without her explicit approval. The three senior officials suspended were Brodie Clark, the head of the Border
Force, Graeme Kyle, the border director for Heathrow, and Carole Upshall, director of Border Force South and Europe, who has responsibility for checks at Calais and the Eurostar terminal in Paris. At issue is a pilot programme which allowed border control personnel to relax some checks on European Economic Area (EEA) nationals, instead focusing more attention and resources to higher risk travellers from further afield. TRIAL SCHEME The pilot scheme was rolled out at 28 ports and airports across the country and border officials were essentially told to use their discretion to:
• Stop automatically checking all biometric chips on every passport belonging to UK nationals and other citizens from inside the EEA. • Stop automatically checking all EEA children travelling with their families or in a school party against the warnings index. All other travellers would, the Home Office says, have continued to undergo the full gamut of border checks. However, it’s been alleged that one of the suspended senior officials, Brodie Clark, authorised border officers to go further and to: • Abandon the verification of fingerprints contained in visas given to non-EEA nationals. E
According to reports, the US government has voiced significant displeasure regarding arrangements for the safety and security of its athletes and diplomats during the period of the Games. Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
51
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
OLYMPIC SECURITY E • Abandon watch list checks at Calais. After being singled out for greatest condemnation in the fiasco, Mr Clark has resigned his post. He is said to have launched a legal case against the Home Office for constructive dismissal, citing that his position had become untenable due to public statements made by the Home Secretary. Giving evidence before the powerful Home Affairs Select Committee in mid November, Mr Clark insisted that he “did not extend or alter” the pilot scheme “in any way whatsoever”. He argued that problems have arisen because of a “conflation” of two distinct things - the pilot and the existing guidance, in place since 2007, that border staff must follow. That guidance apparently gives border personnel permission to relax some checks, when requested to do so by either the port/ airport management or law enforcement officials, on health and safety grounds at exceptionally busy times. This guidance allows border staff to forgo checks on EEA passengers against the warnings index, but doesn’t allow for suspension of checks on non-EEA
that he would be “surprised” if ministers didn’t know about the contingency plans, although he conceded that he had “no evidence” that they did and admitted he should have “more thoroughly checked what the Home Secretary knew or did not know”. INTERNAL INVESTIGATION Teresa May has ordered two internal investigations, which are unlikely to be completed before January at the earliest. One will examine when, where and why border checks were suspended and the other will look into the role and activity of officials who worked directly under Mr Clark. Meanwhile, John Vine, the independent watchdog with responsibility for the UK Border Agency, will look into the wider issues of chain of command structures including ministerial orders. Had these border control issues not spilled into the public domain, the outcome of these investigations might well have ended the matter quietly. But the fact that UK border security has been called into question
It is understood that the Ministry of Defence and the Home Office have yet to make a final decision on the number of armed forces that might be needed to back up the private security personnel. nationals or a suspension of fingerprint checks. Under detailed questioning by members of the Select Committee, Mr Clark says he became aware earlier this year, that border control personnel at Heathrow were routinely foregoing fingerprint checks in preference for warnings index checks. He admitted that he did not stop this practice, believing it to be “a very sensible decision”, since warnings index checks were more important. He argued that he took this decision “to keep the border strong” rather than to weaken it. However, when the pilot scheme was originally set up, the Home Secretary is said to have expressly ruled out any relaxation of fingerprint checks as part of it. It seems that Teresa May was not aware of the existing long-term contingency arrangements contained within the 2007 guidance and Brodie Clarke did not think to draw her attention to it whilst the extent of the pilot scheme was being determined. Rob Whiteman, the newly appointed UK Border Agency chief executive, told members of the Home Affairs Select Committee that ministers had made it perfectly clear that they wanted fingerprint checks to be carried out at all times. He said it was “disingenuous” of Mr Clark not to have given the Home Secretary the “full picture” of other policies that were in use when the extent of the scheme was under discussion. In defending his position, Mr Clarke argued
52
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
demands a transparent investigation. Ministers may not be able to keep the issue in house and under wraps, since the Home Affairs Select Committee possesses sufficient power to require government to disclose all relevant documentary material thus far restricted to the internal investigators and question anyone it deems fit to question. Some of its members are not averse to speaking out publicly on matters that concern them most. SUCCESS CLAIMS Despite the controversy currently surrounding it, the now abandoned trial has been described as a great success. Prime Minister David Cameron has hailed the pilot scheme results in the House of Commons and Home Secretary Teresa May has referenced the increased number of illegal entrants detected when compared with the same period in the previous year. Nevertheless, when news of the fiasco emerged in the public domain, she admitted that the now evident failures at border posts, might well have allowed an unknown number of individuals who would normally have been denied entry to actually cross the borders. Over 10 million travellers passed through UK borders whilst the scheme operated. This border control issue has emerged in the background of repeatedly expressed international concerns regarding the safety
and security of athletes intending to compete in the forthcoming London Olympics. According to reports, the US government has voiced significant displeasure regarding arrangements for the safety and security of its athletes and diplomats during the period of the Games. Washington is reportedly demanding that it be allowed to flood London with up to 1,000 Federal Bureau of Investigation (FBI) and other agents to protect its team and other significant VIPs. American officials are understood to have expressed substantial unease that the UK government has restricted the scope of anti-terrorism stop and search powers and have sought a detailed breakdown of the number of police and other security personnel on duty next summer. This comes on the back of the London Organising Committee of the Olympic and Paralympic Games (Locog), apparently grappling with a potential crisis over venue security. Reports suggest that it has underestimated the number of security personnel needed by almost a half. The committee originally believed that it would need 10,000 security personnel deployed across 32 sites, but a review conducted during this past summer has apparently revealed that upward of 21,000 staff will be needed. Venue safety and security has been contracted out to G4S. The company has begun an advertising drive to meet the target, but reports suggest the organising committee doesn’t have enough money to pay it to make up the shortfall and doesn’t believe it can find the additional personnel required. Ministers are understood to have turned to the Ministry of Defence (MOD) for assistance and have been offered upward of 5,000 armed forces personnel. IMPACT NEGLIGIBLE UK Coalition Government sources have dismissed the reports as unrecognised, say that all government departments have been fully engaged in preparing the country to host the Olympic Games and say that the focus of everyone involved is to deliver a safe and secure event that the world can enjoy. It is understood that the Ministry of Defence and the Home Office have yet to make a final decision on the number of armed forces that might be needed to back up the private security personnel. Recently appointed Defence Secretary Phillip Hammond admitted that a decision might well be taken to deploy surface to air missile batteries around London located and other venues to counter a potential airborne threat to the security of the Games. With border and other national security issues emerging as the UK enters the final lap to hosting the next Olympic Games, these are testing times for a coalition government determined to get a grip on the national fiscal deficit. L
PASSENGER INFORMATION
INTELLIGENCE-LED BORDER MANAGEMENT
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Andrew Priestley, business development director at ARINC, looks at how intelligent-led border management is fundamental to fighting terrorism Every time there is an aviation-related terrorist incident – whether successful or not – it is airlines and airports that take the flak. Then come demands for tougher security measures, swiftly followed by passengers complaining of increasingly intrusive procedures. Yet with equipment ranging from e-passports to full body scanners, we already have highly sophisticated methods of identifying and apprehending criminals. To be really effective though, this cutting edge technology needs to be backed up by a system of international standardisation and collaboration that enables information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers. COMMON-LANGUAGE DATA SERVICE Technical problems created by the varying data sources and formats used by different agencies is cited as the main problem to such standardisation. This is easily overcome by using ARINC’s
provide a cost-effective solution. The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. BCAs, law enforcement organisations and intelligence services get a valuable headstart on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects. SECURE DATA PROTECTION Data protection is a concern for many passengers, particularly where Advance Passenger Information (API) messages are transmitted by e-mail and over the internet. This is not an issue with a fully-managed IP network like ARINC’s AviNet, which provides a level of reliability and end-to-end security that is absent from a public internet connection. Airlines, too, have concerns regarding data collation. Those using legacy systems find government demands to extract data, particularly in the absence of standards harmonisation, can entail budget-breaking costs. With a long and successful track record
The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. Electronic Borders – a common-language immigration data service combining items such as interactive Advance Passenger Information System (iAPIS) with Passenger Name Records (PNR). Translating messages from disparate agencies and systems, it provides a unique screening solution that enables airlines to meet their legal obligations whilst maintaining passenger privacy. ARINC’s private, highly secure AviNet global communications network, with its 99.999 per cent availability, provides seamless, efficient and reliable communications between airlines and border control agencies (BCAs). More and more governments require airlines to use iAPIS and impose hefty fines for those that fail to do so. Electronic borders, requiring little or no new system development, or even the modification of existing systems,
in systems integration, ARINC recognises the need for software flexibility to accommodate varying border regime requirements. BIOMETRIC TECHNOLOGY Complementing API and PNR is biometric technology, which helps prevent a range of criminal activities made possible with forged documents and stolen identities. ARINC’s fully-integrated Identity Management System (IdMS) is designed to be applicable in many critical settings and can collect, verify, and maintain biometric and biographical information – ensuring that biometric systems integrate with existing airline and airport processes – as well as supporting all phases of the identity management lifecycle. Over 80 per cent of passengers now use
mobile devices, the internet and self-service kiosks to check in away from traditional, dedicated airport workstations. The downside is that passengers taking only hand luggage need have no interaction with the airline until they reach the gate. Since the ability to track the progress of each passenger in the airport is crucial, this self-service travel has boosted demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. VeriPax not only complements ARINC’s IdMS but also has links to watch lists, assisting government agencies responsible for border control. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary. INFORMATION SHARING IS CRITICAL Information-sharing is a crucial element in the fight against terrorism and ARINC’s Multi-User System Environment (MUSE) family of passenger and flight information systems allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional check-in desks, airlines can access the information they need whenever they need it. Since each transaction – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced We have the tools – what’s missing is international harmonisation of standards and reliable intelligence-sharing with every effort made to eliminate opportunities for human error. Border control agencies must use all the available information at their disposal, including that which is in the public domain on personal websites, blogs and on social networking sites. Analysing and correctly interpreting this information is fundamental to intelligence-led border management. L FOR MORE INFORMATION emea@arinc.com www.arinc.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
53
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
AIRPORT SECURITY
A NEW APPROACH TO SECURITY SCREENING How centralised remote screening improves airport checkpoint screening Managing security screening operations has become a demanding task worldwide. The growing number of threats combined with an overwhelming amount of visual information has added more complexity to screening operations, impacting throughput and operational costs. Other operational and management challenges remain since no real-time information from the checkpoint is available: operations management and system management among others, remain isolated, non-optimised processes. How can we improve screening to generate faster throughputs and operational gains and create a better passenger experience? Bigger boxes? Probably not enough. NEW APPROACH The new approach to security screening consists of taking advantage of networks and new related technologies to streamline the screening process with centralised data and resources, generating operational efficiencies from better resource allocation and workload balance and smoother throughput. Following this new approach, data from X-ray equipment is now fed into the network through a centralised repository to allow for remote screening. Security screeners no longer need to work next to the X-ray equipment. Instead, they are centrally located and receive images from any of the lanes using queue management. This new approach based on the latest web services also enables managers to get live information on operations from the distance, using remote monitoring. THE SOLUTION The eVelocity suite brings innovative value-added capabilities to existing X-ray equipment to improve efficiency of screening operations while reducing the overall costs of security operations. eVelocity enables networked screening operations from a unique centralised location to perform remote screening with real-time centralised images using a clear-mark bag or tray decision model. Any bag or tray marked for inspection is automatically displayed at the checkpoint for alarm resolution. The solution provides capabilities to screening process automation through the use of Optosecurity’s automated threat detection algorithms including EU Certified Type C LEDS OptoScreener® and XMS® Software Suite. eVelocity also enables airports to remotely monitor screening operations, with status
54
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
updates on all lanes and scanned images through tablets or other portable equipment. Detailed operations data is available in realtime, anywhere. eVelocity also allows for unique system management with system health monitoring and predictive analytics. PASSENGER EXPERIENCE The eVelocity suite enables for better passenger screening and experience. The solution supports operations, monitoring and management, resources and system management, as well as reporting, generating significant productivity gains and operational efficiencies. L FOR MORE INFORMATION Optosecurity Inc. PO Box 1194, Waterbeach, Cambridge, CB25 9UX, UK Mobile: +44 (0) 7817.207634 Fax: +44 (0) 1223.864090 info@optosecurity.com www.optosecurity.com
Based on centralised data repository and resources, eVelocity provides opportunities for airports to enhance throughput, improve security and lower operational costs.
LONDON 2012
GAMEPLAN FOR THE GAMES The safety of athletes and public alike is of paramount concern to the security services, whose task is made all the more difficult by the geographical spread of the locations where the Olympic events will take place. Moreover, the different types of arenas in each site pose multiple security concerns, including transport security, crowd control and the threat of potential terrorist activity at the games. These separate considerations, when joined together, mean that this is one of the largest scale security operations ever undertaken in the UK. Is the UK ready for this challenge? Tony Ball, Chairman of the British Security Industry Association’s Crowd Management section, looks at some of the considerations that the security sector has taken into account, and highlights the lessons that can be learned from past global events. MULTIPLE EVENTS Games-time security relates to far more than the sporting events taking place at
the Olympic Park in London. Some sporting events, such as sailing, mountain biking and football, will take place in other cities across the UK, including Newcastle upon Tyne, Glasgow and Cardiff. In addition, parallel events are due to take place across the country, also requiring a strong security presence. These events, which will include street parties, big-screen events and local festivals, will run at the same time as the London 2012 Games even though they are not officially part of them, and were highlighted as being at particular risk from terrorist attack in a government report released last November. Then Security Minister, Baroness NevilleJones, said at the time: “We shall focus on getting the level of security right at the so called ‘parallel’ events; those activities running alongside the official games which will add much to people’s pleasure. “These can be expected all over the country and especially in London. […] Variety will be
characteristic and the locations will be various too, some temporary, some permanent and they will be attended by audiences ranging from the hundreds to the thousands. “Making sure that these occasions, which should be fun, are also not vulnerable, is also at the forefront of our planning.” SECURITY PERSONNEL Lessons from previous Olympic Games and other large scale sporting events such as last year’s World Cup in South Africa must also be taken into consideration. As the leading trade association representing the UK’s private security industry, the British Security Industry Association (BSIA) has been at the forefront of security planning for London 2012. Working alongside government departments such as the Olympic Security Directorate (OSD) and Olympic Delivery Authority (ODA), as well as the London Organising Committee for the Olympic Games (LOCOG), the BSIA has helped to identify both the opportunities and challenges that both public and private sectors will face in securing the Games. Recruiting staff in particular will prove challenging, as we saw during the World Cup, where over 44,000 officers from the national E
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
Written by Tony Ball, chairman of the BSIA’s Crowd Management section
With the countdown to the London 2012 Olympic and Paralympic Games underway, a major part of the vast logistical challenge is the varied and extremely difficult task of ensuring security
Event Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
55
Event Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
LONDON 2012 the-clock security will play a vital role in protecting all of these VIPs in addition to maintaining high standards of safety and security at the events themselves.
Security personnel provide a physical presence and help members of the public requiring assistance or information. Moreover, they help ensure the health and safety of the event and guide crowds during emergency procedures. E South African Police Service (SAPS) were dedicated solely to the tournament, and an extra 10,000 personnel from metropolitan forces were also drafted in to boost the total force to around 54,000. During the Winter Olympics in Vancouver, forces were stretched to the limit. A huge cooperation of security personnel including the Vancouver Police force, United States security forces and a number of the Canadian military all worked alongside the private security industry to ensure continuous safety to athletes and visitors alike. This arrangement looks likely to be similar at the 2012 Olympics, with Police supported heavily by the private security industry, and even the largest of private security contractors will be working with smaller companies to provide effective security. The practical application and involvement of the security personnel will be a crucial factor in ensuring a safe, successful Olympics. During events, crowds can vary from hundreds to hundreds of thousands, but in all cases it is always advisable to ensure crowd management and security guards are constantly on hand, be it to act as deterrents to possible criminals hiding in the mass or to maintain order should there be a threat of fights breaking out. Officers’ duties include crowd management, operating of electronic security systems such as CCTV and access control, car park
56
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
attendance and general monitoring duties. Security personnel also provide a physical presence on the day and are a useful port of call for members of the public requiring assistance or information. Moreover, they cover the essential role of ensuring the health and safety of the event and guiding the crowds through emergency procedures. In total, it was estimated that around 15,000 security personnel were on hand throughout the Vancouver 2010 Winter Olympics, a 3:1 ratio of security guards to athletes, with an estimated total security cost of over £600 million. HUGE AMOUNTS OF VISITORS Maintaining the infrastructure of London during games-time will also present a large scale challenge. Most disruptive to the daily lives of London residents will be the huge influx of visitors during Games time. This includes not just spectators from around the world, but also visiting dignitaries, athletes and sponsors, all of whom require varying levels of security. When Beijing hosted the 2008 Olympics, a single games sponsor took an astonishing 6,000 VIPs from Europe to China. In addition to this, larger participating nations host their own Nation Houses, for example, Brazil will be taking over London’s Somerset House for the duration of the Games. Round-
CLOSE PROTECTION Protecting the many VIPs likely to attend the events who need one-on-one protection means that a comprehensive, close protection detail needs to be in place, as close protection officers are a must for protecting VIPs such as celebrities and politicians attending events. In the case of the London 2012 Games, a large concentration of high profile attendees will be in attendance, including national and international politicians, celebrities, members of the royal family and well-known sport personalities. The close protection officer’s work starts before an event, with the in depth scrutiny of the venue to ensure all angles are covered. In most scenarios, officers must ensure that high profile attendees are able to go about their daily business with an almost invisible bubble around them, and reacting only when required. CASH IN TRANSIT The movement of cash, which forms part of the UK’s Critical National Infrastructure, has to continue unhindered by the large volumes of additional visitors in the city and the impact of the Olympic and Paralympic Route Networks. These networks of road alterations have been designed to ensure the smooth transport of officials and athletes to and from venues. Three years ago, the BSIA represented its cash-in-transit members in the early stages of Olympic planning, to ensure that cash machines, supermarkets, banks and retailers will continue to receive timely and secure cash deliveries throughout this busy period. So, with the eyes of the world on London next summer, a huge logistical challenge is well underway to ensure that the games take place safely and securely. What will be missed by the millions who tune in to see these historic events take place is the thousands of hours of planning, organisation and hard work that has gone in to ensure that the games are safe and secure. The BSIA has been working closely with the government’s Olympic Security Directorate, The London Organising Committee for the Olympic Games and various industry stakeholders to ensure the celebrations of 2012 run smoothly, safely and, most importantly, securely. The British Security Industry Association (BSIA) is the professional trade association of the UK security industry. Its members produce over 70 per cent of the country’s security products and services to strict quality standards. L FOR MORE INFORMATION Tel: 0845 389 3889 www.bsia.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Detecting and preventing under-vehicle bombs This form of attack presents the terrorist with one of the most efficient means of assassination in terms of the risk of detection during the assault and the amount of explosive material used. The victim can be selected precisely, to cause the maximum alarm and dismay amongst the community to which he or she belongs. A death rate of one person per week was caused by this method of attack during one period of the 30 year IRA campaign in the UK. The targets, security personnel, prominent politicians and citizens, were chosen with precision to gain maximum effect. Since the 1980s Intelligent Security has been involved in signal processing for a range of security products from perimeter intrusion detection systems, which at one time were installed at 21 of the UK’s high category prisons, through to today’s Talos Under Car Bomb Detection System and the Heartbeat Detection system. The Talos Undercar detection system development came about in 1988 as the result of the IRA’s attack on a minibus carrying soldiers who had just taken part in the Lisburn Half marathon for charity – six were killed. In late 1989 the Talos system designed to detect the placement of magnetically attached IEDs had under gone trials by the UK’S Defence and Research
Agency and was being installed by the Home Office for at risk personnel. Today with over 11,800 units in service Intelligent Security continues to monitor and develop the Talos system in order to meet new threats. Magnetically attached IEDs are still the most widely used undercar devices as they are selective both in their target identification and placement of the device on a vehicle. However other means are now used occasionally; the bomb may be wedged between the plastic under car tray that is now present on many upmarket cars or perhaps with elastic cord or by some other means. This plastic under car tray in itself renders the magnetically attached
bomb obsolete for those vehicles. The Talos Plus system has solved this problem. The method relies on the changes that occur in the vibrational resonance of the vehicle when the device has been attached. The resonance pattern of the vehicle is recorded by piezo-electric sensors placed at four or more positions on the car. This vibration pattern is processed by a microprocessor and if an anomalous pattern is detected an alarm is indicated. FOR MORE INFORMATION Tel: (0)844 8268074 Fax: (0) 844 8268084 info@intelsec.com www.intelsec.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
57
Communications
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CONVERGED COMMUNICATIONS
COMMUNICATING A CRISIS
Written by Simon Barton, Metropolitan Police Technology Strategist and CMA Strategic Board member
Enhanced and converged communications are critical to the future cost-effective delivery of emergency services and a co-ordinated response to incidents, writes Simon Barton
58
We live in interesting times; reductions in funding and the steady increase in the demand for emergency services will lead to significant changes in the way the emergency services work and their relationships with other supporting agencies and voluntary bodies. Threaded through this is a genuine wish among those in charge and those at the sharp-end of these organisations to deliver a better, and more appropriate service to those in need. Underpinning all of this is a need to improve how we communicate. The government target for a budget reduction in the region of 25 per cent is driving a massive cost saving exercise, requiring the re-thinking of the way in which services are delivered, both by the front-line and the back office. MULTI-AGENCY RESPONSE Increasingly the emergency services are working more closely together in their response to incidents; from the headlinemaking events, such as a terrorist bomb, or a major rail accident. Incidents often require the attendance of two or three of the bluelight services. Frequently this collaboration extends well beyond the traditional emergency services and also requires the attendance of the social services, vehicle recovery, volunteer search teams and many others. Finally, after the immediate emergency is over, there are a wide range of other partners that can become involved through issues such as a criminal prosecution, the protection of vulnerable people, and long-term medical care. A single incident, starting with a simple 999 call, can lead to the engagement of dozens of different agencies and entities. Alongside this, the society in which the emergency services operate is changing; population is increasing, technology is changing how we live and how we interact, and we are living longer. The changing society also drives the expected capabilities of the emergency services. As the advent of smartphones, on-line services and social media has changed the way we communicate, they will impact on the emergency services in two fundamental ways; they can be leveraged within the emergency services to improve the way that communication occurs internally, and to reduce the cost of that communication. And they can be used to improve how the emergency services contact and collaborate with stakeholders and partners. The first directly supports the requirements to reduce operating costs. Modern converged communications systems are usually cheaper to implement and more cost effective to
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
use compared to traditional technology such as stand-alone radio systems and private telephone networks. Part of this is due to the general reduction in technology costs, but the most significant impact is due to the economies of scale associated with a technology used by a wide range of businesses and consumers, rather than the cost of technology to support a specific niche business. Put simply, when you have to recover the development costs, a dedicated police radio, that would sell at most 150,000 units, is always going to be more expensive than a smart-phone that could sell ten million or more units. Similarly, a single larger contract, supporting a converged solution, is going to be more cost effective than managing multiple smaller contracts for many different communications systems on many different technologies. The other significant driver is the need to
requires the convergence of the communications technologies. Without this there is a severe risk of increased costs through running multiple contracts supporting multiple technologies, utilising multiple interconnections. However, convergence at a technological level is now common place and being delivered to consumers. This gives an opportunity to take advantage of existing developments. The complexity here for most services is around internally re-organising their support teams to be able to deliver these converged solutions. It is not only the contact centre that benefits from convergence, being able to deliver the same multiple methods of communication to all in the service gives significant advantages, along with the one key development: presence. Presence allows the availability, and the best method of contact, for an individual to be shared with others. This reduces the wasted
Modern converged communications systems are usually cheaper to implement and more cost effective to use compared to traditional technology such as stand-alone radio systems and private telephone networks. improve communication with partners and service users. These two communities have different relationships with the frontline emergency services; in general the public want to rapidly get information to the right part of the service to obtain some form of action, or gain an appropriate response. In communicating with partners, then the role is reversed, and the emergency service wishes to access quickly the right part of the partner agency to obtain service from them, or to start that agency’s internal process. COMMUNICATION HUBS This need to present the right part of a service to the user has led to the adoption of centralised communication hubs, such as the Metropolitan Police’s Central Communications Command, able in principle to address or reliably forward all caller requests. As the variety of communication methods from the public increases, these centres and the organisations using them need to adopt a wide range of communications methods, from simple telephone calls, through e-mail and SMS to instant messaging and Twitter. Handling these different communications methods, with their differing characteristics,
effort in contacting people, and enables a person to manage more efficiently how they are contacted. Extending this across an organisation allows the contact centre to pass calls more efficiently without multiple attempts; it enables teams of people to be assembled more quickly based on skills and availability. It removes the guesswork from attempting to contact people. All of this can now be delivered to anyone, anywhere in an organisation using normal, consumer grade equipment and services. Only for specialist rolls are toughened and highly resilient services required. Tayside Fire and Rescue were among the early emergency service adopters and have demonstrated significant savings and operational advantages through the use of fully converged technology, although others are now following close behind them now that the business case for this has been proven. The advantages of converged communications and presence are even more significant if they can be shared across multiple agencies. This is now happening as organisations collaborate in procuring the underlying infrastructure for these joined up solutions. In Wales, a PSN (Public Services Network) E
As applications, such as e-mail, become more critical to the delivery of the emergency response, rather than a back office convenience, then the underlying infrastructure becomes of critical importance. Enhanced and converged communications are critical to the future cost effective delivery of emergency services and the co-ordination of the response to incidents. E contract has been agreed connecting eight public-sector bodies in Gwent, including the emergency services. A similar arrangement is being progressed between the Greater London Authority bodies and others across London, with many other local and regional schemes at varying stages of completeness. As they are all using the Cabinet Offices PSN frameworks, these new jointly procured networks all interconnect, giving any PSN subscriber access to the services provided by any other. This progression towards large scale commonly procured networks is driven by the two fundamental needs to reduce costs and improve the collaboration between agencies. There are, however, several issues that have
to be addressed as part of this collaboration: • There is a cost associated with the establishment of the new services, and while savings are delivered throughout the lifetime of the service, these costs are upfront. • There may be significant differences in the capabilities, requirements and business focuses of the participating agencies. This can cause tension in any relationships. • Different agencies have different governance and approvals regimes. This needs to be delegated to a single entity to prevent a continual cycle of approval for each minor change. • The contractual arrangements
are different from those of a single service for a single agency. However, as has been shown in Gwent, Hampshire, Kent and many other places, these are not insurmountable problems, and the opportunities that converged technology and delivery give are significant. CRITICAL DEMAND While the methods of communication are increasing, the types of services being offered through these communications systems are also increasing. The move of applications to centralised, virtualised, cloud type solutions puts a critical demand on the performance and integrity of the communications network. As applications, such as e-mail, become more critical to the delivery of the emergency response, rather than a back office convenience, then the underlying infrastructure becomes of critical importance. Enhanced and converged communications are critical to the future cost effective delivery of emergency services and the co-ordination of the response to incidents. Getting there is now very possible, following the precedents already being set by the early adopters both within the emergency services and among other commercial enterprises. For those that are able to make this progress, the rewards are significant. L
Communications
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Cobham Antenna Systems, Microwave Antennas Overt and Covert Antennas Designed and Manufactured for Security, Surveillance, PMR, Tetra, Cellular DAS, COFDM and Unmanned Systems The most important thing we build is trust
(1)
(2)
(3)
(4)
Customised Antenna Development plus Standard Product Range (1) Ultra Wideband Directional antenna, 800MHz to 6GHz (2) Multi Sectors - Gain everywhere, including overhead, for ground stations (3) C-Band Omni with Quick Deployable Spring Mount (4) Omni antennas for Software Defined Radio projects (5) Ultra Wideband Directional antenna for IED Countermeasures (6) Low Profile, Directional antenna for Covert use
European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas
(5)
(6)
Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket
Antenna photos not to scale
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
59
seventechnologies “Seven Technologies Ltd is a growing, dynamic, global technical surveillance enabler” Seven Technologies is borne from a passionate desire to provide counter terror and law enforcement officers with solutions that work. The company provides specialist surveillance and security capability delivering R&D, product design and production, skills based training and specialist support worldwide to government professionals. “Our approach to everything starts with the user and no matter how technically adept our solutions maybe, you will always find that they are fit for purpose and intuitive to use” Seven Technologies recognises the need for specialist capability to be useable by real people. Resultantly, our capabilities provide not only covert solutions that are intuitive to use but also force protection, situational awareness, close protection and border security capabilities to the broader community. Seven Technologies is now also a ‘Group’ after acquiring Ultrafine Technologies, a specialist optical company, expanding and complimenting Seven Technologies customers capabilities further. www.ultrafinetechnology.co.uk Capabilities areas Research & development Product design Manufacture Skills based training Specialist support www.seventechnologies.co.uk
enquiries@seventechnologies.co.uk
SPECIALIST TECHNICAL SURVEILLANCE
EVENT PREVIEW
A CRUCIBLE OF KNOWLEDGE FOR THE INDUSTRY Security and Policing, the Home Office annual security event, will examine the priority areas of security and counter terrorism, crime and policing, border security and immigration control Formerly known as the Home Office Scientific Development Branch exhibition (HOSDB), Security & Policing 2012 is the UK’s only secure event for police, law enforcement and security professionals tasked with security, civil protection and national resilience. It will be running in 2012 at FIVE (Farnborough International Venue & Events) in Hampshire from 31 January to 2 February. With a 30 year history and a global influence, this UK Government event has grown to be the cornerstone of the security calendar. It brings together international professionals and experts from government, law enforcement, police service, critical national infrastructure (CNI) and industry in a crucible of shared knowledge and experience, focusing on the Home Office priority areas: security and counter terrorism, crime and policing, border security and immigration control. APPROVED ATTENDEES The event is attended by Home Office agreement only, meaning all visitors and exhibitors are approved to participate before
they are allowed entry. This allows visitors to discuss operational requirements with exhibitors, who can demonstrate more sensitive equipment in confidence. The event is organised by ADS, the UK trade organisation representing the aerospace, defence, security and space sectors, on behalf of the Home Office, which directs the event in partnership with UK Trade & Investment Defence & Security Organisation (UKTI DSO). In March 2011 ADS signed an agreement with the Home Office Centre for Applied Science and Technology (CAST) to organise the event on their behalf for a further 10 year period. HOSDB 2011 saw 3,954 registered and approved visitors from the police, public security and Critical National Infrastructure spheres, representing 572 UK and international organisations (including police forces, government organisations, departments and agencies; and key providers of CNI). The event hosted over 400 security companies, all approved by the Home Office in advance of their attendance.
Written by Tim Ives, ADS Group
A unique aspect of the event is the way in which companies are allowed to present themselves. Exhibitors are limited in exhibition stand size to ensure that the focus of the event is on the technology being displayed and not the power of the PLC. Small and Medium sized Enterprises (SMEs) can therefore exhibit their, often niche, products alongside major UK primes, offering full security systems and solutions in a comfortable environment where the focus is on technological capability. Since 2010 a formal government overseas delegation programme has been running at the event, with security dignitaries and operators from around the world being hosted at the exhibition by UKTI DSO. This will continue in 2012 and representatives from over 50 countries will be in attendance at Security and Policing 2012.
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
INDUSTRY FEEDBACK In October 2011 ADS released its inaugural survey of member companies operating in the security sector. The survey comes as the third chapter of ADS’ analysis of the sectors it represents, following on from the established aerospace and defence surveys. The Security Survey presents the performance of the security sector as represented by ADS. It identifies the importance to the UK of the security sector in both the UK and in terms of potential exports. In the UK, surveying only ADS security members, the industry employs around 51,000 people directly in the hi-tech and service-oriented end of the sector. Domestic security sales dominated overall revenue, being worth £1.8bn (81 per cent) of the total £2.23bn in 2010, while export sales totaled £430m – with cyber security sales being particularly high (for further details on the Security Sector Survey please see www.adsgroup.org.uk/security). It is clear that the security sector is of vital importance to the UK’s safety, both financially and physically – and a major contributor to sustaining this business and developing it further is the Security and Policing equipment exhibition. Security and Policing provides government security professionals with a unique opportunity to source thousands of technologies and solutions showcasing the latest specialist security products, technology and services. DEBATING TODAY’S THREATS The event hosts a unique Government Zone which brings together government agencies from the policing and security sphere, to create a forum designed to tackle the unique threats posed by today’s security environment against a background of increasing financial pressure. Security professionals can access the latest and often very sensitive, technologies on the market and assess their ability to improve operational capabilities. A highlight of the exhibition are the Home Office briefings, delivered in the form of E
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
61
31 January – 2 February 2012 FIVE at Farnborough, Hampshire, UK The UK’s premier security and law enforcement exhibition
Define the cutting edge
Register to visit now at:
www.securityandpolicing.co.uk
3 A unique world-leading security exhibition 3 Source the latest technology 3 Networking opportunities with UK and International colleagues 3 Home Office briefings on critical topics 3 UK Government represented
EVENT PREVIEW E an Outreach Programme which focuses on critical and prominent topics to inform industry of current government thinking. Originating from the Home Office’s desire to engage with industry, the Outreach Programme first appeared at the event in 2010. It proved highly successful and has this year grown further to provide the opportunity for senior government security officials to host a series of short workshops and briefings. In 2012 these workshops will provide insight, depth and clarity on key areas of government planning, as well as information on current and future programmes. Particular emphasis will be placed on the challenges facing the policing, security and Critical National Infrastructure landscape in an atmosphere of austerity, and on how working and developing initiatives with industry will drive the future of policing, law enforcement and security. These free-to-attend sessions are open to all visitors and exhibitors at the event. The 2012 Outreach programme will focus on surveillance, e-crime and the Olympics. CONFLICT MANAGEMENT In addition to the Outreach Programme, the Association of Chief Police Officers (ACPO) Conflict Management annual conference will be held at Security and Policing 2012. This is the first time this important conference has been held during the event and represents the
further realisation of the need for engagement between government and industry, particularly in regard to security and policing. Protecting the CNI and ensuring the continuation of political, social and economic activity is vital to the UK. Any disruption, damage or destruction to part of the CNI could result in grave consequences to the functions of government, the economy and society. Securing and protecting CNI from threats as diverse as terrorism, natural disasters and climate change is a constantly-evolving challenge. This challenge is met at Security and Policing 2012, which aims to demonstrate solutions through industry’s technology, capability and expertise at delivering simple solutions to complex problems. AWARD FOR INNOVATION The UK security industry is a world-leader in the innovation of Advanced Engineering, Manufacturing and Services and ADS is committed to raising the profile of the industry. As part of this initiative we have developed the ADS Security Innovation Award. Now in its sixth year, the ADS Security Innovation Award is presented to the winning creator of a piece of equipment, technology or service, which is deemed to be unique and innovative. Judges, from industry and government, have traditionally looked for innovation that has been conceived and
BODY WORN SYSTEM and 3G Transmission in ‘real time’
marketed commercially in the previous two years, and equipment or technology which has significantly improved crime prevention, or has made Police/Law Enforcement Agencies’ operability more efficient. Entering the ADS Security Innovation Awards has proved to be a great way of showcasing innovation to the security community for industry. The awards are presented at the Security and Policing gala dinner. GALA DINNER The 2012 Dinner will be held at a prestigious and exclusive venue and will host over 250 guests including specially-selected guests from CAST, UKTI DSO, Office of Security and Counter Terrorism (OSCT), Law Enforcement Agencies, leading Industrialists, Security and Policing 2012 exhibitors and their guests. The Security and Policing dinner has always been hugely popular as it offers an opportunity for exhibitors to host their guests and to network with other exhibitors and guests. Further information and visitor registration for Security and Policing 2012 is available on the event website. L
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR MORE INFORMATION Tel: 020 7091 7828 securityandpolicing@adsgroup.org.uk www.securityandpolicing.co.uk www.adsgroup.org.uk
MOBILE SECURITY SOLUTIONS
BODY WORN SYSTEM HIGHLIGHTS
Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memory Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options n n
You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location. The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/Edge/GPRS SIM based cellular provider. Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications. Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: info@audaxuk.com W: www.audaxuk.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
63
US Office 169 S. Main St. Orrville, Ohio USA 44667 Telephone: 330.682.7015 Fax: 330.684.1190
UK Office Windmill Hill Business Park Whitehill Way Swindon SN5 6QR Telephone: +44 (0) 1793 441 475
Singapore Office 1 Fullerton Road, #02-01 One Fullerton, Singapore 049213 Telephone: +65-6832 5689 Fax: +65-6698 3631
EVENT PREVIEW
EMERGENCY PLANNING, RESPONSE AND RECOVERY
Emergency Services
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
From strategic planners and first responders to equipment manufacturers and suppliers, the Emergency Services Show and Conference 2011 brings together everyone involved in an emergency, both from the UK and abroad From suicide bombing to offensive fighting, terrorist attacks remain a significant concern for governments and private sector organisations worldwide. Following the attacks carried out by Anders Breivik’s in Norway, fears are growing that terrorism from far-right extremists is becoming a real threat and the potential for terrorist attacks has heightened. Counter-terrorism plans need to be updated and emergency plans put in place that involve all segments of society as well as many government agencies. The impact of changing policies and reduced global budgets will make it essential for emergency services and associated agencies to continue to work collaboratively to ensure public safety and security. To help this sector can cope with this environment and overcome the challenges of the future, close working relationships with partners is vital. Networking and collaboration with suppliers, colleagues and contemporaries is and will continue to be, an essential part of ensuring an emergency is dealt with as efficiently and effective as possible. The Emergency Services Show and Conference 2011, on 23-24 November, facilitates the necessary communication by bringing together everyone involved in emergency situations. MULTI-AGENCY COLLABORATION Now in its sixth year, the Emergency Services Show is a firmly established annual show that promotes multi-agency collaboration by bringing together all stakeholders involved in an emergency – from the strategic planners and first responders, to the manufacturers and suppliers of equipment and services used by these leading professionals. With over 380 exhibitors and approximately 4,000 visitors attending the successful show last year, the Emergency Services Show’s overall aim is to improve public safety. From buyers and specifiers, operational planners to emergency responders, this show unites colleagues, contemporaries and suppliers. Every year emergency and resilience professionals with a role in operations, procurement, training, recruitment, emergency planning and business continuity, attend. As the importance of security to individuals, to business, to governments and to the nation, grows year on year, the UK continues to lead the way and is viewed as the model for quality – from counter terrorism E
The Emergency Services Show is a firmly established annual show that promotes multi agency collaboration by bringing together all stakeholders involved in an emergency – from the strategic planners and first responders, to the manufacturers and suppliers of equipment and services used by these leading professionals. Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
65
International Supplier of Medical, First Aid, Ambulance, Paramedic and Emergency Rescue Equipment
24 HR EMERGENCY NUMBER
(07710 920 775
Unit D4, Hortonpark Estate, Hortonwood 7, Telford, Shropshire, TF1 7GX MEET THE TEAM FROM SP AT THE EMERGENCY SERVICES SHOW STAND 84
Tel: 01952 288 999
www.spservices.co.uk Facebook: http://www.spservices.co.uk/facebook
Twitter: http://www.spservices.co.uk/twitter
EVENT PREVIEW E strategies to fire and safety measures. The Emergency Services Show 2011 will provide access to the latest technology, ideas and initiatives focused on improving public safety and protecting the environment and the critical national infrastructure. Visitors to the exhibition can discover the latest security equipment and services from a range of leading companies. With its breadth of international experience, the UK is well placed to tackle arising terrorist threats and UK companies continue to provide expertise and systems for groundbreaking counter-terrorism solutions. Exhibitors such as Respirex, Bluecher, Trelleborg, PPS, Scott Safety, DuPont, Draeger and TEEX will be displaying equipment and services, allowing visitors to learn and benefit from their expertise. PRODUCTS & SERVICES The products and services on display include: security equipment and services, personal protective equipment, communications and IT, first response equipment, station equipment, training and education, vehicles and vehicle equipment, business continuity and outsourcing. Many exhibitors will also be carrying out a number of live demonstrations throughout the two days. There will also be approximately 100 end users exhibiting within the Emergency Response Zone. This zone (essential for operational staff and emergency planning officers) is made up of Category 1 and 2 responders, professional, government and voluntary organisations, and hence offers perfect networking opportunities to affiliated organisations. There is also a dedicated UK Search and Rescue (SAR) Zone. Additionally a water cannon from Northern Ireland police will be on display, allowing visitors to view first-hand a piece of equipment that’s use was widely discussed by English politicians to quell the riots in England. DOING MORE WITH LESS At a time when budgets are being squeezed, this free to attend exhibition provides the perfect opportunity for visitors to research methods of ‘doing more with less’. Visitors will be able to speak to exhibitors about how they may operate more effectively and efficiently, thereby achieving ‘more for less’. David Brown, show organiser at Emergency Services (MMC) Ltd, comments: “As the threat of terrorism continually changes and develops so must the counter terrorism methods. The show provides a unique platform for security professionals to discuss fresh challenges in the industry and consider best practice methods.” THE 2012 OLYMPICS Whilst the 2012 Olympics will be a major opportunity for the UK to prove its expertise in handling large scale events, it will also present a major challenge. As the 2012 Olympics draws closer, it will be vital for responders to discuss co-operation, ideas
and initiatives focused on improving public safety and learn from their foreign counterparts in preparation for this major event. The show will help facilitate this communication and provide a final chance for organisations’ representatives to meet. CONFERENCE The decision has been made to make this year’s conference a one day event on Wednesday 23 November; this will be run simultaneously with the two day exhibition. It will be hosted in the dedicated conference centre (opposite the exhibition centre) at Stoneleigh Park and will be free of charge to attend. High profile speakers will cover a number
Emergency Services
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
of challenging subjects, with a choice of sessions aimed at senior management and all professional and non-professional operational emergency responders involved in facilitating the planning, response and recovery process in multi-agency incidents. The conference is CPD certified. The new format of the conference will provide delegates with the flexibility to select sessions they wish to attend throughout the day. These sessions will be free to attend on a first come first served basis – but pre-registration is essential. Details of the conference programme and how to register are available on the show’s website, www.emergencyuk.com L
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
67
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THERMAL IMAGING
EMBRACING THE LATEST THERMAL TECHNOLOGY Argus introduces its latest range of thermal imaging cameras for law enforcement agencies There’s no doubt that our law enforcement officers rely ever more heavily on new technology. Highly advanced equipment helps police to locate criminals, communicate clearly and quickly, and keep the peace. The latest technologies are important investments, providing evidence and allowing the police to be more efficient in carrying out their duties. One particular piece of technology in increased use is the thermal imaging camera. If you’ve seen the news lately you will have heard about the recent London protests, where thermal imaging cameras were used on police helicopters to monitor the event. It’s a demonstration of the wide uses of thermal imaging – but it goes beyond simply locating people. Leading the market in highly advanced thermal imaging cameras, Argus cameras surpass their competitors in technology, providing a range of settings and viewing options, with increased accuracy for use in many policing applications. ARGUS TT TYPE In early 2012 Argus thermal imaging will launch a range of cameras designed with the guidance of a number of specialist police and security departments. The range will include a thermal torch for first responders called the Argus TT Type, a monocular camera called the Argus P Type for covert surveillance, and a specialist search camera called the Argus F Type. The TT may resemble a normal torch but benefits the user in countless ways a torch never can, providing patrol officers with the ultimate advantage over criminals. Not only does it detect the heat signatures of people and objects in daylight hours, it also provides an abundance of additional advantages in the dark of night. Officers can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. They can scan car parks, where they can see suspects hiding between cars, and can identify vehicles that were recently driven. When used in total darkness, officers can go virtually undetected, as they search for prowlers, and other criminal behaviour. Officers will be able to use this new technology for a range of patrol applications including: fugitive/suspect search, officer safety, search and rescue, detecting evidence, routine patrols, training and assessing, routine raids, occupancy evaluation and collision investigation.
ARGUS P TYPE The Argus P type is a handheld, robust, simple-to operate, lightweight monocular thermal imaging camera which can power up fast. It is capable of withstanding harsh environments and provides the most superior features available on the market. Designed using sophisticated digital technology, the P Type offers users advanced thermal image quality, providing video recording and image capture to support the gathering of evidence. The P type has interchangeable lenses so will be a fantastic tool for covert surveillance operations, officer safety, fugitive/suspect search, collecting evidence, border surveillance and marine patrol. ARGUS F TYPE The Argus F Type offers a simple-to-operate configuration; it is a robust, self-contained camera with fully automatic operation. The camera is lightweight at less than 3lb and specifically created to help police and security personnel to detect heat signatures in specialist search operations. The F type uses a high-resolution 320 x 240 pixel Amorphous Silicon (ASi) microbolometer detector. It has been designed using advanced digital imaging technology providing it with the sharpest picture available and superior performance. The F Type comes with the most advanced features available in any thermal imaging camera on the market and is a superb tool for applications such as: • Drug interdiction operations • Detection of hidden compartments • Finding embedded electronic equipment The benefits to law enforcement agencies are clear: suspects can be caught quicker using less manpower and most importantly thermal imaging keeps the good guys safe and one step ahead of the criminal. The cameras are not as expensive as you might think, Argus cameras have been designed to keep purchasing cost down, creating affordable effective tools for the fight against crime. Clearly these cameras have a wide range of applications. Why not witness them yourself? The Argus sales team will be demonstrating its new range of cameras at the Emergency Services Show in the UK, as well as Intersec in Dubai. This new range of cameras will be available to purchase in the new year why not book a demonstration now? L FOR MORE INFORMATION www.argus-tics.com
Drug interdiction
Suspect search in woodland
Argus TT Type – officer patrol
Argus P Type – covert surveillance
Argus F Type – specialist search
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
69
23-24 November 2011
e anc l u a b Am itime • e m ar scu s • M overn e R nd NGO cal G esilie a o Fire ctor • y • L nal R tho • o u c lice ary Se Agen /Regi ort A er o P l t P un uard Loca and Comm A l o V g s• lth ort s• ast Co horitie ransp encie • Hea s • e T t Au ms • nt Ag rusts bassi nc T e Tea ernm Care • Em mbula n s v Go imary rator e • A ime a e u t r it • P ty Op Resc Mar nmen • r li Uti e and GOs Gove nce T e ir N l • F tor • Loca Resili Gov Sec ncy • ional ities • s • s r g e Ag al/Re utho usine Ut A Loc Port rcial B ities • o r and mme utho D • P o O r A • C alth s • M lunta e • H assie e • Vo Age b c d Em ulan tguar cal/R b Am Coas s • Lo Po and horitie rt and m t Au anspo • Com A r • T ncies ealth O e Ag ts • H s • M s Tru assie e • V b c Em ulan gua t b Am Coas s • and horitie rt t Au anspo • r • T ncies e Ag ts • H s Tru ass b Em ula b Am Co and
Exhibition and Conference for category 1 and 2 responders The Emergency Services Show 2011 is the key event for anyone involved in emergency planning, response or recovery, in the UK and abroad. This FREE to attend exhibition provides you with the opportunity to: • view the latest equipment and services • network with like minded people • share best practice • discover ways of making vital cost saving efficiencies • learn from the UK’s industry experts
REGISTER NOW!
r e v
0 s 5 r 3 to
O
i b i h x E
www.emergencyuk.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
INFORMATION MANAGEMENT
TAKE AIM – TO PROTECT CRITICAL INFRASTRUCTURE ARINC’s Advanced Information Management (AIM) commandand-control platform creates a common interface that combines advanced technology and functions to enhance security The advent of open borders across Europe heralded a bright new era of quicker and easier travel and more straightforward distribution of goods and utility services. At the same time, however, the open borders threw up a raft of security issues around the protection of the critical infrastructure – the transportation and service delivery platform. Security at airports, seaports, railways, metros, highways, coach stations and national borders has had to become increasingly sophisticated, yet managers are well aware that solutions need to be regularly updated to be effective against future threats. So those responsible for security need not only the expertise to identify potential risks and operational weaknesses but also the tools to deal with them – for European prosperity is dependent on a secure, interconnected infrastructure in transport, energy, technology and many other sectors. ADAPTABLE INTEGRATED SOFTWARE SYSTEM Difficulties can arise, however, as the tools needed to tackle the job become more advanced, rendering current equipment inadequate. The solution can be found in fully integrated software systems that maximise the efficiency of disparate legacy equipment whilst simultaneously adapting to incorporate new technology. Such tried-and-tested software is available from ARINC, an international company with vast experience in providing hardware, software and networking solutions that integrate smoothly with existing IT systems. ARINC’s flexible Advanced Information Management (AIM) command-and-control platform is a market leader in the USA’s critical infrastructure security industry. The success of AIM in creating a common interface that combines advanced technology and functions to enhance security across an entire operation is demonstrated by the fact that it has been effectively configured for the protection of nuclear power facilities, mass transit systems, airports, seaports, government facilities, military installations and education campuses. Such credentials speak volumes about AIM’s effectiveness, stresses Paul Hickox, operations
director of ARINC International, who points out that the company has unequalled expertise in transport communications, engineering, systems integration and project management. AFFORDABLE SOLUTION FOR ALL ORGANISATIONS “AIM is designed to be an effective and affordable solution for a diverse range of applications and for organisations of any size,” he said. “It has been deliberately positioned in the middle ground between expensive, custom-built, one-off designs and pre-packaged, one-size-fits-all offerings. “We offer a fully-managed, end-to-end solution which begins with the individual needs of each AIM customer being assessed to decide on the most appropriate equipment
closed-circuit television (CCTV), vehicle identification, asset management and integrated geographical information systems (GIS), AIM ensures continuous and safe operations for an entire facility. AIM’s capabilities were ably demonstrated when it was implemented to provide highlevel supervisory control and communications for the US Strategic Petroleum Reserve sites. The brief included integration of legacy alarm, access control, security, and surveillance systems that had been installed over a number of years, as well as adding new equipment upgrades where needed. “This involved integrating numerous legacy third-party access control and video surveillance systems, some 15 years old, as well as a number of separate intrusion detection and alarm systems – precisely the type of application for which AIM is designed,” said Hickox. SCALED-DOWN VERSION FOR SELF-MIGRATION In situations where fast deployment and straightforward integration with existing infrastructure are the main concerns a scaled-down version, AIM Enterprise Security Platform (ESP), allows organisations to manage their own migration to newer types of security technologies at their own pace. AIM ESP is also ideal for any facility with changing security needs or where fast response to threats is crucial. AIM ESP also provides security
Security at airports, seaports, railways, highways, coach stations and national borders has had to become increasingly sophisticated, yet managers are well aware that solutions need to be regularly updated to be effective against future threats. and software. All solutions are based on industry standards, open architectures and certified interfaces designed and implemented to leverage existing infrastructure. “Furthermore, we make sure that we deliver on time, in scope and within budget.” SCALABLE ACROSS MULTIPLE ZONES AND FACILITIES AIM is scalable across single or multiple zones within one or more facilities. This enables sophisticated monitoring of all sub-system activities and alarms and gives operators a common picture of their facilities. Handheld devices can also be used, allowing first responders to receive video and data for real-time decision-making on the front line. By offering interfaces for intrusion detection, access control, video surveillance management, physical security information management (PSIM), credential management, biometrics-based identity management,
integrators with a ‘technology bridge’ for those looking for a newer and open security enterprise environment while maximising the return on their existing investment in security infrastructure. The two AIM solutions offer the highest levels of operational efficiency and reliability – qualities that come as standard with every one of ARINC’s 150-plus products and services. “We provide solutions for commercial, government and defence customers around the world,” said Hickox. “Every ARINC customer, whatever their size, can be confident of receiving a topquality product, a first-class service and, equally important, superb after-sales support – all underpinned by over 80 years’ experience in communications, engineering and system integration.” L FOR MORE INFORMATION emea@arinc.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
71
Cyber Security Written by Paul Steadman, CEO, Adversor
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ONLINE ATTACKS
DYNAMIC TOOLS FOR REPELLING BOTNET ARMIES Attacks on internet-facing services are growing, both in terms of frequency and sophistication, says Paul Steadman. Thankfully, managed mitigation services have evolved to tackle the threat This summer, Peter Gibson, 22, a student from Hartlepool, was charged with taking part in on-line attacks carried out by international hacking group Anonymous. He is accused of ‘conspiracy to do an authorised act in relation to a computer’ contrary to the Criminal Law Act of 1977. And whilst it is hard not to smile at the Pythonesque legal language, authorities around the world are taking his offence very seriously. In fact Gibson is only one of dozens of people who have been arrested in recent months for similar activities – 32 in Turkey alone last month – as police and security forces struggle to keep up with a new generation of cyber terrorists.
Denial of Service attacks has entered the mainstream public consciousness. But ironically, despite the publicity and notoriety, the wider citizenship has little clear impression of what DDoS are, or why, in a world increasingly dependent on internet reliability, they matter a lot. WHAT ARE DDOS ATTACKS? In the simplest terms, a DDoS attack uses malicious codes to infect computers to trigger mass attacks against targeted websites, causing them to be inaccessible to legitimate traffic. DDoS attacks, although unsophisticated, are difficult to defend against. A DDoS attack is an attempt to make sites unavailable to intended users. Although
Research shows that DDoS attacks are not only getting larger and more frequent, but are also becoming more sophisticated as they pinpoint specific applications with smaller, more targeted and stealthy attacks. It is not hard to see why the authorities are concerned. The CIA, the UK’s Serious Organised Crime Agency, Spain’s National Police Force, Bank of America, Sony, WordPress, PayPal, Mastercard, Visa, the governments of Georgia, Ireland, Turkey, South Korea, Twitter, Facebook, wikileaks – this is a roll call of well-publicised victims of online attacks or, to be specific, Distributed Denial of Service (DDoS) attacks. Perpetrators such as the hacking activist groups LulzSec and Anonymous have acquired a curious celebrity. In part this reflects the public mood. There is a sneaking sympathy for what its presented as civil disobedience, especially when it is conducted by ‘harmless teenagers’ in suburban bedrooms and directed at the global capitalist establishment. The language of DDoS crime has attracted attention, too. From Smurf attacks, Ping floods, Teardrop attacks and the Nuke, to Botnets, Zombie agents and Script Kiddies – what’s not to like? As a result, the concept of Distributed
72
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
the means to carry out, motives for, and targets of a DDoS attack may vary (the recent attack on Spain’s national police force was explicitly in retaliation for the arrest of fellow hackers), it generally consists of a concerted effort to prevent an internet site or service from functioning efficiently or at all, temporarily or indefinitely. One common method of attack involves saturating the target with external communications requests, so that it cannot respond to legitimate traffic, or responds so slowly as to be effectively unavailable. Despite their recent infamy, DDoS attacks have been wreaking havoc on Internetbased services for years. But significantly, the size and frequency of these attacks have grown dramatically as attackers take advantage of Botnets (collections of compromised computers connected to the internet) and other high-speed internet access technologies to overwhelm their victim’s network infrastructure.
And this trend is accelerating. Research by international DDoS security experts Arbor Networks shows that not only are DDoS attacks getting larger and more frequent, but they are also becoming more sophisticated as they pinpoint specific applications with smaller, more targeted and stealthy attacks. This means that organisations with internetfacing services must now be prepared to protect themselves from two very different types of DDoS attacks: firstly, volumetric DDoS attacks that strive to overwhelm network infrastructure and servers with high-bandwidth-consuming flood attacks; and secondly, application-Layer DDoS attacks that attempt to target specific well-known applications such as Hypertext Transfer Protocol (HTTP), domain name system (DNS) or Voice over Internet Protocol (VoIP). NEW TACTICS REFLECT NEW MOTIVES The cyber threats that have acquired the most public attention have been those that attempt to compromise the networks and systems of businesses and governments globally. Rather than merely infiltrate and infect the target, the objective now appears to be to cripple, or to demonstrate the ability to cripple, a public-facing web operation by overloading the website delivery infrastructure. E
About the author Paul Steadman is CEO of Adversor, a company providing True Dynamic Mitigation against DDoS attacks in applications where server availability is of critical importance. Customers include major banks and financial institutions, telecommunications operators, gaming and betting businesses, Internet hosting companies and e-tailers. Paul is a chartered accountant who has held the posts of chairman, managing director and financial director in numerous service based small and medium sized enterprises where he has successfully implemented growth and recovery strategies.
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Perversely, they can be an involuntary contributor to the attackers’ objective of slowing or disrupting the normal flow of traffic. So given the general assumption that high traffic volume DDoS attacks will continue to grow the network owner is caught in a continuous cycle of upgrading both appliances and bandwidth, which is why the concept of managed services protection against DDoS is gaining traction.
E We may speculate on the ultimate objectives of these attacks, but what is not in doubt is that a whole swathe of ubiquitous public activity from e-commerce to banking, online recreation to public safety, is at risk. Web properties are now ingrained in the modern world – in how business is conducted, political positions articulated, citizens served. Consequently, complacency in defending against DDoS attacks is unacceptable, both for potential victims and regulators. SO WHAT TO DO? When Internet-facing services go down due to DDoS attacks, the impact can be severe and have several effects. These include variously lost revenue and profit, lower productivity, higher costs due to penalties or breaches of service level agreement (SLA) contracts, and tarnished reputation or brand. But despite increased levels of threat and consequence, many organisations are still relying on antique security products such as firewalls and intrusion protection systems (IPS) to protect themselves from DDoS attacks. These no longer suffice. This issue becomes even more acute in the always online, always available environment of Cloud computing – and it is fundamental
to the business case of a new generation of Cloud service providers that they can offer the levels of security and connectivity that a virtualised infrastructure implies. The traditional response to this dilemma has been over-provision – investment in sufficient website delivery infrastructure to not only serve the legitimate traffic but also to accommodate the demands of the attackers. Over-provision as insurance against attack is expensive – at the very least everything from the websites delivery infrastructure, the web servers, routers, switches, load balancers and bandwidth would have to be duplicated. And ironically, over-provision works for the attackers too – so it can be an own goal. SPECIALISED APPLIANCES Similarly, there is a plethora of specialised appliances available that offer protection of sorts. They are generally deployed near the network firewall and in the direct flow of network traffic. These inline appliances view all inbound traffic and do complex technical inspection of it, looking for intrusion. The problem with these appliances is that as the volume of DDoS attacks rises, and the complexity and sophistication of the attack signatures and profiles increases, they struggle to keep up and can cause bottlenecks.
MANAGED SERVICES PROTECTION Managed Services Providers – MSPs – tend to operate like this: once an attack is detected, inbound website traffic is redirected to globally distributed ‘scrubbing centres’ for mitigation (the process of examining the web traffic and data to confirm the existence of spurious traffic). Rather than redirecting to a scrubbing centre located in your ISP’s network, website traffic is redirected to an internet based centre unassociated with the website-serving ISP. Whilst not even specialised DDoS MSPs can guarantee client system availability some do provide an assurance of 99.999 on their infrastructure – and financial compensation against that 0.001calamity. For web-based businesses, that does offer them and their customers a degree of confidence, and it gives beleaguered internal IT departments some expert relief. And the uncomfortable fact is that as more organisations become web-dependent, so the means to launch a DDoS attack against them is only likely to rise. The number of potentially vulnerable internet-connected devices is growing exponentially around the world. Smartphones, netbooks and e-readers – devices always on, or in frequently-connected mode – these are a Botnet army in waiting. Peter Gibson and friends will not be alone in hijacking them. Only DDoS Managed Service Providers are likely to stand in their way. L FOR MORE INFORMATION www.adversor.net
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
73
3
simply secure The only touch screen USB 3.0 hard drive with 256-Bit hardware encryption. Available in 320GB, 640GB and 1000GB. No software, no fuss. Keep you data safe in style.
TM
Call 0844
288 6868 or visit us today
originstorage.com
DATA PROTECTION
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
AN END TO DATA BREACHES Study shows that 41 per cent of IT professionals carry sensitive information on mobile devices A study by Origin Storage – the secure storage specialist, has revealed that 41 per cent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected. In fact, 19 per cent revealed that their organisations had suffered a data breach following the loss of a portable device (i.e. laptop, USB, CD) with 54 per cent confessing the device had not been encrypted – an offence under the Data Protection Act and subject to regulatory action by the ICO. With 70 per cent of organisations making data encryption mandatory, 11 per cent of those respondents carrying sensitive information unprotected are actually
as there have been incidences where products have fundamental design problems, or even companies that have made false claims. My advice – don’t leave security to chance. Lock it down with something that’s actually proven to work or there is a strong possibility you’ll be crying over spilled data.” The Information Commissioner’s Office (ICO) will have enhanced powers to fine organisations up to £500,000 for serious breaches of the Data Protection Act, as previously the maximum fine was a paltry £5,000. The ICO has also called for more powers to be granted so more serious action can be taken.
A recent survey found that two thirds of 500 city workers (65 per cent) are still blissfully unaware that they could cost their organisations £500K if their actions cause a ‘deliberate or negligent’ breach of personal data. breaching their organisation’s data protection efforts while the other 30 per cent are simply following their organisation’s woefully inadequate example. When digging a little deeper, the study amongst IT security professionals at this year’s Info security Europe show, uncovered a staggering 37 per cent of respondents who confided that between 81 and 100 per cent of all sensitive data stored on their device(s) was actually left unprotected – so not just one or two documents transferred in a hurry. Andy Cordial, Origin’s managing director, explains: “When you consider the level of knowledge this audience is assumed to have – working in IT and having some form of security remit – the below par protection used for sensitive data means it is hardly surprising data breaches are increasing in frequency and size. I’m astounded that 30 per cent of organisations are still oblivious to the Data Protection Act and the recommendation from the Information Commissioner that encryption be used to protect sensitive information.” DON’T LEAVE SECURITY TO CHANCE Andy concludes: “The ICO recommends any solution should meet FIPS 140-2, yet 31 per cent of our sample state that it ‘doesn’t matter’. Certification is the only proof that the product actually does what the company claims it does. It’s not just me saying this because our products have the certification
The tougher measures will be imposed alongside compulsory audit notices to central government departments found culpable for data breaches. The new powers will allow the UK’s privacy watchdog to deal with serious personal data breaches that arise through negligent behavior. Precautions and circumstances of a breach will be taken into account before deciding a fine. Severe fines will be imposed in cases where the ‘data
controller has seriously contravened the data protection principles and the contravention was of a kind likely to cause substantial damage or substantial distress.’ AWARENESS The enhanced powers for the ICO were approved by parliament earlier this year. However a recent survey found that two thirds of 500 city workers (65 per cent) are still blissfully unaware that they could cost their organisations £500K if their actions cause a ‘deliberate or negligent’ breach of personal data. The study, sponsored by CyberArk Software, found that employers are often doing little or nothing to inform workers of important changes in UK data privacy rules. CyberARk called on firms to develop and apply appropriate security policies to minimise the impact of device loss, which now carries the possibility of a much larger fine. However other security watchers are unconvinced that the increased fines alone will prompt major changes in behavior by corporates, at least in the short term. That’s because far too many organisations still believe that data breaches are something that happen to other people, despite reports of data loss stories almost every day. L FOR MORE INFORMATION Richie Maure richiem@originstorage.com DDI: 01256 813986 www.originstorage.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
75
Second generation Forensic Marking has just arrived SelectaDNA is the world’s most advanced forensic acquisitive crime reduction tool Feared by criminals Identifies property instantly Links criminals with crime scenes immediately Cost effective solution with no annual licence fees Now used by 80% of UK Police Forces In a Police trial SelectaDNA reduced theft by 83%
Selectamarkplc Advanced Asset Protection
Our range also includes:
Label
Traceable Asset Identification
Anti-Tamper Solutions
For further information visit
www.selectadna.co.uk DA0045/1
FREIGHT CRIME
Vehicle Crime
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THE CRIMINAL APPEAL OF VULNERABLE VEHICLES The theft of large goods vehicles, their fuel and cargo causes significant economic and logistical harm, and drivers should be made aware of how to avoid such incidents, writes TruckPol Further tips to avoid fuel theft include: • Park in a well lit and populated area. • Park close to other lorries, fuel tank to fuel tank, making it more difficult for offenders to access them. • Park with your fuel tank facing the road so passing traffic makes it less of a target. • Consider using an anti-siphoning device. • Consider using CCTV. • Ensure that you report any suspicious incidents/behaviour to the police.
As fuel prices have risen there has been a marked and noticeable increase in the theft of fuel. TruckPol, part of the ACPO Vehicle Crime Intelligence Service (AVCIS) that specialises in freight crime, has received mounting reports of this type of offence, both from vehicles parked at the roadside and in secure parking areas, such as company compounds. So far this year (up until the end of September) 1,228 instances have been reported to TruckPol; this is a significant increase in comparison to previous years. However, TruckPol do not believe this is the full picture as many cases go unreported. And, as fuel prices continue to inflate, TruckPol is predicting that offences will escalate. A NATIONAL PROBLEM In relation to the crime hotspots, TruckPol’s statistics show that fuel theft is country wide; however, vehicles parked overnight in lay-bys on arterial routes such as the A14, A50, A34, A43 and A1 are in the main being targeted. This is not to say that vehicles parked at service stations, industrial estates and in company compounds are any less vulnerable as intelligence suggests that fuel theft is
both an organised and opportunist crime. With diesel from freight vehicles a prime target, this of course has a knock-on effect on the economy, but both TruckPol and regional police forces are working hard to combat this. Derbyshire in particular have been proactively patrolling the A50 checking lay-bys throughout the night in an effort to both catch and deter fuel thieves; as a result they stopped a suspicious van which was found to contain three bulk containers about to hold 1,000 litres, various hoses and pumps, together with evidence of diesel. The driver was subsequently arrested and his vehicle seized. PROTECT YOURSELF With fuel prices at an all-time high, motorists are advised to be extra vigilant and to park in a well-lit area. Lorries should be parked fuel tank to fuel tank to make access more difficult, or with the tank facing the road, using passing traffic as a deterrent. Alternatively, using an anti-siphoning device or installing CCTV in company compounds should be considered, as well as ensuring that any suspicious behaviour is reported to the police to assist in driving down this type of offence.
ROBBERY OFFENCES Robbery offences are shown as increasing. In the first two months of the year, a noted rise in attacks on vehicles transporting easily disposable goods, such as cigarettes and alcohol indicate criminal targeting of cash-generating product. These loads are often in transit to small retail units. The offenders in these cases often travel in groups of four or five individuals and will follow the victim vehicle for some miles before launching an attack. They will either attack the vehicle whilst the driver is carrying out a delivery, forcing entry to the rear of the vehicle, or will ‘jump’ the vehicle whilst the driver is still inside. The offenders are extremely persistent and will travel many miles in order to get the result they require. They may travel in convoy with other offenders and often use a white Transit-sized vehicle for ferrying contraband. Criminals are becoming increasingly violent towards drivers in order to get hold of the load. TruckPol urges companies to ensure all their drivers are made aware of the problem and that they could potentially be being followed, or monitored. Companies should instruct drivers to take note of the vehicle behind, and, if it is has been persistent for some miles and they are suspicious – then they should drive to a safe, built-up area, and call their dispatcher/control room. If there is any degree of concern – a call to the police is essential. Drivers should note down, where possible, registration numbers, circumstances and locations of suspicious vehicle activity and inform TruckPol. TruckPol has made its colleagues nationally aware of the problem and all police forces should have a trigger plan in place to instigate should a robbery be reported. L FOR MORE INFORMATION www.truckpol.com
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
77
Defence & Security Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
DSEi 2011 REVIEW
DEFENCE AND SECURITY SHOWCASE WINS PRAISE Defence & Security Equipment International (DSEi) attracted more than 29,000 attendees to the four-day exhibition this year – an increase of 16 per cent compared to the 2009 event As one of the world’s largest displays of land, sea and air applications of defence and security products and technologies, the event featured 1,391 exhibiting companies representing 46 countries, and included 30 national pavilions. This was not only the largest DSEi ever but it brought in official overseas delegations from 55 nations – a 12 per cent increase on the number of countries who sent delegations in 2009. Official delegations attended from countries including Australia, Brazil, Estonia,
Republic of Korea, Romania and Turkey. In addition, there were record numbers of DSEi VIP guests from the UK and around the world – an increase of 30 per cent overall in terms of senior military and government visitors. There were unprecedented levels of attendance from UK Government ministers, including the Minister of State for Trade and Investment, Lord Green; the Minister for International Security Strategy, Gerald Howarth MP, and the Minister for Defence Equipment, Support and Technology, Peter
DSEi staged a number of high level briefings held away from the show floor to provide an in-depth understanding of a wide variety of topics, including trauma care, defence offsets and cyber security.
78
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
Luff MP. James Brokenshire MP, Minister for Crime and Security at the Home Office, also paid a special visit to the event. Other visiting dignitaries included the UK MOD’s Chief of Defence Materiel, Bernard Gray; First Sea Lord and Chief of the Naval Staff, Admiral Sir Mark Stanhope; Chief of the General Staff, General Sir Peter Wall, and Chief of the Air Staff, Air Chief Marshal Sir Stephen Dalton. NEW FEATURES For the first time this year, DSEi staged a number of high level briefings, which were held away from the show floor to provide an in-depth understanding of a wide variety of topics, including trauma care, defence offsets and cyber security. Features such as the UK Capability Showcase, staged for the first time by UKTI Defence & Security Organisation, the Robotics & Unmanned Systems Showcase, which included E
E a twice-daily scenario demonstration, and the Waterborne Demonstrations were particularly well attended. The Ships Visits Bureau was also kept busy organising hundreds of tours on-board the five visiting ships. This year also saw the launch of the DSEi Innovation Challenge, in association with Bryers. More than 30 entrants put forward their latest designs for enhancing international defence and security capabilities. Six finalists made presentations to the judging panel on Thursday, September 15. The ultimate winner was Revision Military, which received a free stand for DSEi 2013 as well as £500 towards its expenses during the event. Under Secretary of State and the Lords Spokesman on Defence, Lord Astor, presented the prize to Revision Military’s Richard Coomber for its Batlskina Head Protection System. This is thought to be the first fully integrated and modular solution of its kind – it comprises a ballistic helmet, trauma liner, front mount, retention system, mandible guard and visor.
Defence & Security Equipment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SOMETHING FOR EVERYONE There were many new product innovations dedicated to supporting military life on land, sea and in the air. In the land systems arena, visitors had the chance to see General Dynamics UK’s representative prototype of the Scout SV for the first time. First-time exhibitor TEK Military Seating was showing its newly developed adjustable blast attenuation vehicle seating system. Designed to protect occupants from the effects of both ‘shock wave’ and ‘slam down’ experienced during an IED blast, the Blast Protector seat is suitable for driver, commander and crew seating for most types of military vehicles. It has also been designed to keep lower pelvic compression rates well below 6,600N throughout a blast incident during viable velocity changes. There was also a strong showing from maritime product exhibitors. Cassidian’s next-generation TRS-4D shipborne surveillance and target acquisition radar made its DSEi debut, while the Autonomous Surface Vehicles (ASV) stand was used to showcase the company’s C-Target naval drones. Just less than 9m in length the C-Target has been designed to carry out a variety of seafaring roles, including weapons testing and ship command and control assessments, operating at an impressive 50kt. French exhibitor HGH Systèmes Infrarouges displayed the Vigiscan, which boasts new levels of surveillance technology to covertly detect and track potentially hostile targets. HGH has recently been selected by the French Navy to supply Vigiscan in its operation against global piracy. The show also provided the pioneering integrated bridge and navigation system developed by Raytheon Anschütz with the ultimate showcase – it was fitted onboard the Type 45 destroyer HMS Dauntless and the German K 130 corvette FGS Braunschweig. AIR CAPABILITIES Air capability highlights included AgustaWestland’s AW159 Lynx Wildcat, visiting DSEi for the first time as the programme gears up to become fully operational in 2014. Two production helicopters are now flying, and the development fleet is more than halfway through the flight test programme – 62 are on order for the Royal Navy and British Army with the first aircraft expected to be delivered to the army next year. There was also a more prominent focus on security equipment this year. Thales showcased its Integrated CBRNe Assessment System (iCAS); this modular detection and monitoring system can rapidly assess CBRNe incidents and provide key information to emergency responders within the ‘golden hour’. Mounted in a 4/5-passenger 4x4 vehicle, iCAS comprises an onboard environmental monitoring system with a touchscreen display that can be operated even when wearing protective clothing; an offboard information management system; and a reconfigurable package that accommodates the sensor payload. Using a vehicle for this role is far quicker than the traditional method of performing the task on foot, allowing the emergency responders to begin their work much earlier. The DSEi team is already working on enhancing the success of this year’s show as it starts to plan for DSEi 2013, which will take place between September 10-13, 2013 at London’s ExCeL. L FOR MORE INFORMATION www.dsei.co.uk
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
79
Terrorsim Insurance
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
RISK MANAGEMENT
AN INTEGRATED APPROACH TO RISK MANAGEMENT Aon’s crisis consulting team helps its clients to anticipate, prevent and respond to terrorism risks Events in Oslo earlier this year provided a tragic reminder that the use of terrorism is not confined to groups either affiliated to, or inspired by, Al Qaeda. Aon’s Terrorism Tracker database recorded a global average of 12 successful attacks per day in the 12 months to September 2011, and there is little sign of a reduction in either the frequency or severity of incidents. An event might generate property damage, business interruption and have a human impact that can lead to significant operational, financial, legal and reputational risks for our clients. THE FINANCIAL COMPONENT Many organisations we work with have an extremely mature security approach and are aware that, with additional funding, enhanced measures could be put in place to ameliorate terrorism risk. However, in many cases, as counter terrorism is ‘owned’ by the HSSE function, it is perceived to be a cost rather than ‘brand and reputation protection’. Terrorism risk management is rarely seen as an area that generates significant cost savings. One of the initial ways we assist our clients is to help them to articulate the financial component of terrorism risk. As with all perils, those terrorism risks beyond the tolerance of an organisation can be transferred into the insurance market through an appropriate insurance policy. For smaller organisations the cost of terrorism insurance may not be
significant, but once asset values or staff numbers start to rise, risk transfer can require significant annual spend. Property damage and business interruption cover for terrorism can run well into seven figures, but terrorism risks can also drive premium spend for death in service, public liability and other lines of cover. Some boards understandably lean towards a very conservative approach to terrorism, with risk managers steered towards buying limits that may be well in excess of the worst case loss scenarios. This situation presents an opportunity for the security and risk functions to work together to achieve three broad aims: • Robust corporate governance of the risk by credibly quantifying the worst case scenarios and financial impacts • A potential return on investment in the form of reduced premium spend • The ability to invest in enhanced terrorism risk mitigation that can further reduce premiums or improve governance THE FIRST STEP – QUANTIFY THE RISK Aon’s crisis consulting team adds value by helping clients to anticipate, prevent and respond to terrorism risks, but the first step is always to quantify the risk. Whether this involves complex quantitative modeling of threats to inform insurance markets, three dimensional blast analysis of structures to determine expected property damage, or a simple review of threats and risks, defining the organisation’s actual
exposure in financial terms to terrorism risk is always a worthwhile exercise. Our most sought after solution is the terrorism Probable Maximum Loss study (PML). As with most of our terrorism related work, this starts with a client specific threat and risk assessment. This is followed by an identification of the worstcase scenarios for planning purposes; with the focus either on property damage, business interruption or human vulnerability. Where the worst-case scenarios are high explosive in nature, we then produce three dimensional blast modeling to determine the maximum probable loss, expressed in financial terms. Once the PML is established we are then able to work with a client’s security team to identify which security risk mitigation measures might directly affect the PML, and potentially generate a reduction in the insurance limit purchased. In terms of the scale of benefit, one recent terrorism PML allowed our client to save £1m per annum on premium spend. Whilst the aims and objectives of a risk management department are often extremely closely aligned to the security team, there is not always a shared view on the nature and magnitude of the terrorism risks to which an organisation is exposed. A healthy dialogue between risk and security professionals, specifically when it comes to an agreed position on risk assessments, can sew the seeds of a more integrated approach to terrorism risk management. L FOR MORE INFORMATION For further information, please contact crisismanagement@aon.co.uk or visit aon.com/crisis-consulting
Chris Holt MBE, consulting director During his first career as an officer in the Royal Engineers, Chris Holt MBE served as a bomb disposal officer and developed a broad understanding of CBRNe threats. Since leaving the army in 2005, he has moved between management consultancy and special risk management appointments, joining Aon in 2009 as a consulting director.
80
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
FINANCE
THE FINANCIAL PAYBACK OF SECURITY MEASURES
Terrorism Insurance
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
For many years it was difficult to insure against a terrorist attack. But today those who take security seriously are rewarded with lower premiums on their insurance, writes Chris Phillips News that seven suspects have been charged with terrorism related charges in Birmingham should wake us all up to the very real possibility of a mass casualty attack on one of our cities. Whilst we are all aware that you are innocent until proven guilty, the charges include preparing for an act of terrorism, including travelling to Pakistan for training in terrorism, making a martyrdom video and planning a bombing campaign. A BIG ISSUE The suspects stand accused of ‘being concerned in constructing’ a home-made explosive device for terrorist acts and stating an intention to be a suicide bomber. Yet, it is amazing to note the lack of reporting of these charges. The BBC had it 5th from the top of their headlines and it was even topped by the hot topic of orphaned baby red squirrels.
The fantastic work of the police and security services, saving hundreds of innocents from being murdered in the most horrendous fashion does not make big news apparently. Can you imagine if they slipped through the net, if there was an intelligence failure? Those same journalists and every other commentator, many of whom should know better would be up there calling for heads to roll. Cressida Dick, the new assistant commissioner and chair of the Association of Chief Police Officers’ Terrorism & Allied
Matters (ACPO-TAM) business area, who is responsible for co-ordinating national counter terrorism and security policy would be waiting for the dreaded call asking the inevitable question, whose fault was it? Whether you want to call it terrorism fatigue or just the fact that we are a resilient nation, it really is quite amazing that we are all just getting on with life as if nothing will ever happen. Have a look around the news websites and try to find mention of the terrorist attacks happening more and E
For many years and in particular following the Dissident Irish Republican terrorist attacks in the 1990s in London and elsewhere in England, there was a difficulty in insuring against a terrorist attack.
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
81
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Value Added Motion Control Solutions. Infranor Group offers innovative solutions from detailed design through to manufacture.
We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defense, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.
www.infranor.com
82
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
Info.uk@infranor.com
FINANCE E more regularly in Northern Ireland. You will probably have to go to the N.I. part of the BBC website as it’s not deemed newsworthy for the rest of the UK to know that people are committing acts of terrorism on our own land. Whether attacks are Al Qaeda (AQ) inspired from trained terrorists, the increasingly active Dissident Irish republicans or indeed the rest of the society who want to make a splash and commit mass murder such as Anders Breivik in Norway, the result is much the same. We will have to face some form of terrorism for all our working lives. The tactics will change but someone somewhere will want to terrorise society. In fact the lessons we need to learn from attackers such as Breivik (who used AQ tactics of multiple and co-ordinated attacks, bombs and bullets) is that we can reduce our vulnerabilities. The same good practices work to reduce your vulnerabilities whatever the motives of the attacker. INDIVIDUAL STEPS To be quite honest there is nothing you as an individual can do to reduce the threat of terrorism, that is the role of the police and security services, but you can do something to reduce your vulnerabilities as
are free or very nearly free. Most are more about the way we do things and simply require an understanding of why and what we need to do to protect ourselves. For instance, ensuring that you have good housekeeping policy on your premises will help to prevent an opportunity for an attacker to hide a device. Encouraging a security culture within your organisation will help all staff understand the need to take security seriously. These are simple and effective changes to procedures and behaviour and cost nothing. Small changes can make a big difference. Just giving your employee the encouragement, responsibility and authority to challenge strangers makes a massive difference. Ensuring that they are aware of the dangers of allowing tailgating in your building can prevent strangers gaining unrestricted access to your building. This may prevent your commercially sensitive secrets from being leaked to a competitor, or worse, stop a bomb being placed inside your building. VALUE FOR MONEY For many years we have been grappling with the issue of getting security improvements regarded as good value for money. This is
Certain insurance companies will conduct an innovative and intelligent review of an individual business’ assets. They measure and analyse the risk faced by that business. Using this method there are some great examples of businesses actually reducing their premiums. a person or business. In fact I would go so far as to say that you have a responsibility to protect yourself, your family, your business, your staff and your customers. There is no doubt that the threat of terrorism is evolving and increasing. An attack not only on, but near your operations could result in human casualties, property damage, business interruption, legal liability issues and long term damage to brand and reputation. Terrorist attacks must now be viewed as a foreseeable risk. In today’s litigious society, businesses need to ensure corporate governance and duty of care responsibilities are integral to their crisis management strategy. The challenge comes from the fact that security is viewed by many in the business community as having a negative impact on the bottom line. SIMPLE MEASURES Time and again I hear the difficulties that security manager’s face in persuading their boards of the need to upgrade their security. The truth of the matter is that many of the changes to security in an organisation
even more important than ever at a time when budgets are being slashed across the board. Now perhaps there is an answer. Perhaps the insurance industry has come up with a way to solve this conundrum. Reductions in insurance premiums reflecting good security practice just could be the Holy Grail we have all been looking for. For many years and in particular following the Dissident Irish Republican terrorist attacks in the 1990s in London and elsewhere in England, there was a difficulty in insuring against a terrorist attack. Insurers depended on reinsurers for financial protection should very large claims occur and, accordingly, both insurers and reinsurers decided they could no longer provide terrorism cover using traditional methods. The losses had the potential to be massive. Pool Reinsurance Company Limited, also know as Pool Re, was formed. This was a joint initiative between the government and the Insurance industry to offer terrorism Insurance cover. But Pool Re has limitations. For instance when taking up Pool Re insurance, there is a requirement to insure all of your assets. Well clearly, where a business has a wide
portfolio of assets some will need terrorism Insurance but some of those assets will not. A small asset in the middle of Dartmoor is clearly not at the same risk as a city centre HQ. Businesses with a spread of assets really need a more intelligent and considered means of understanding their risk portfolio.
Terrorism Insurance
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CHANGE FOR THE BETTER The good news is that the insurance industry is now stepping up to the mark. Certain insurance companies will conduct an innovative and intelligent review of an individual business’ assets. They measure and analyse the risk faced by that business. Using this method there are some great examples of businesses actually reducing their premiums. Often the insurer offers the opportunity to provide a service which actually reviews the sites and then provides specific advice on the worst case scenario. Using experts in terrorism and bomb blast engineers they can give detailed advice on the probable maximum losses (PML) that would be suffered in a worst case scenario. This is in almost every case lower than the sum previously used for insurance purposes. It also offers the opportunity to make changes which reduce that PML. For example if by improving the security at the gate, or increasing the strand-off for a vehicle bomb you can reduce the PML by £10 million you also reduce the amount of insurance cover you need. Not only for year one but for the following years. This is potentially a massive saving on insurance premiums. Obviously the security improvements then pay for themselves. A REWARD FOR SECURITY What the government, the police and anyone with any common sense wants, is to create a virtuous circle where those who take security seriously and frequently review and improve their security and business continuity plans are rewarded with lower premiums on their insurance. At present the big savings will be for the larger company that buys terrorism insurance. Many of these businesses would benefit from an intelligent review of their assets. The savings have the potential to be massive, and they will allow that business to understand better what they are willing to tolerate and give them funds to treat their higher risk assets. In the same way insurance companies give reductions for having good locks on doors or being part of a Neighbourhood watch scheme, businesses would be rewarded for having good security by reduced premiums. This surely is the way to reduce the vulnerability not only of the individual company but also increase the security of UK PLC, making us a much better protected and resilient nation. By taking out these policies, security managers would be able to show a quantifiable and measurable return on the investment of good security and this has to be a massive step forward. L
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
83
COUNTER TERROR EXPO 25 – 26 April 20I2 Olympia London www.counterterrorexpo.com
The UK’s largest show for International counter terrorism and specialist security 400 Security & Counter Terrorism Focused Exhibitors OVER 9,000 International Attendees FIVE High Level Conferences FREE Workshop Programme covering the latest technologies LIVE Demonstrations for IEDD & Access Control NEW Light Armoured & Support Vehicle Display INTERNATIONAL Meet the VIP Buyer Programme
PRE-REGISTRATION ADMITANCE ONLY. NO ONSITE REGISTRATION. Register Now at www.counterrorexpo.com/advert Conference Partner
Network Reception Sponsor
(UK) LIMITED
Supported by
Co-located
SHIP PROTECTION
PIRACY: MORE THAN A MARITIME PROBLEM attacked a tanker, the security team fired rocket flares but the skiffs kept approaching. Only when warning shots were fired did they finally move away.
The first quarter of 2011 was the worst on record with 77 attacks and hijackings having taken place. This is happening even with the presence of a multi-national task force patrolling the world’s maritime hot-spots. The areas where the greatest numbers of pirate attacks are occurring are the Gulf of Aden and the Indian Ocean. When combined, this covers such a large area it is proving impossible to police all of it effectively. This is putting more of the responsibility on the shipping companies to provide their own protection. By the time an alarm has been raised by a ship’s captain that a pirate attack is imminent, there is every possibility that the pirates will have boarded the ship before the task force arrives at their location. Normally the pirates have a window of between 15-20 minutes to board the ship after the alarm has been raised and before the arrival of the task force. If the pirates are on board the ship, there can be no engagement by the military, in case any of the crew are injured or killed during any armed exchange that takes place between the task force and the pirates. At this point the situation becomes the sole responsibility of the countries flagship and government.
ALTERNATIVE SECURITY The use of private security companies on board ships could now be an alternative that shipping companies find themselves resorting to. This presents its own problems as an armed response to the pirates by the security company on board could easily escalate the seriousness of the situation. This could result in a fire fight causing unacceptable injuries and fatalities to both the crew and members of the security team on board the ship. Another direction being taken by ships’
PIRATE INCIDENTS Somali pirates currently hold about 30 vessels and over 700 hostages. The following are examples of incidents reported in one week in April 2011: On 1 April on the Gulf of Aden, a chemical
tanker was attacked after a skiff was launched from a suspicious fishing vessel. The pirates fired RPG and guns towards the tanker but aborted the attack after a security team returned fire. Again on 1 April, off Somalia, a bulk carrier was attacked and boarded by armed pirates. The crew took shelter in a citadel. On 2 April in Yemen a skiff with three pirates came alongside a bulk carrier but moved away when a security team fired warning shots.
Written by Victor Kerr
Recent statistics regarding piracy are continuing to show an increase in attacks as well as an increase in the number of successful hijackings taking place on a worldwide basis
Maritime Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Piracy is growing daily. It is no longer limited to the Somali and Nigerian coastal waters. Attacks are now happening on a more regular basis in the Indian Ocean, the Gulf of Aden, the Red Sea and the Arabian Sea. On 3 April in Tanzania two skiffs armed with RPG and guns attacked a bulk carrier, but aborted after the captain raised the alarm and increased speed. Also on 3 April, in Indonesia, robbers boarded a general cargo ship and stole the ship’s store while at anchor. On 5 April in Indonesia five robbers came alongside and tried to board a chemical tanker, but aborted the attempt after crew members gathered on deck. On 5 April on Socotra Island two skiffs
owners is the investment in security equipment for use by the ships’ crews to protect themselves and the ship against attack. Long range hailing deterrents and on-board water cannons have been used in the past with some success. A more recent addition to equipment available for use by either the ships’ crews or a private security company is the shoulder-mounted laser defence dazzler (SMU100), built by Photonic Security Systems (PSS) which is capable of taking effect at 500 metres which is outside E
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
85
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
How long-range surveillance technology can provide ground-breaking advantages for today’s forces Accurate and efficient long-range surveillance technology can be a vital asset to a wide range of applications within the defence sector. It may be impossible to place surveillance equipment close to the target and it may be necessary to observe activity from significant distances. Long-range reconnaissance, homeland security, border and coastal protection, military tracking and counter insurgency are some of these key applications. The ability to see far beyond the naked eye is a must for today’s forces, and every technological advantage possible is needed to make each operation a successful one. Being able to obtain accurate, high quality visuals in harsh environments such as night or lowlight can make the difference between life and death. Being able to observe activity and even make identifications at extreme ranges can radically change the way border control, marine and coastal surveillance and counterterrorist operations are conducted today. Where day and night surveillance is crucial, the very latest in electro-optic technologies can lend that vital helping hand. Top-of-therange cameras with the capability of supplying high-quality imaging 24 hours a day means no important event will ever be missed. The LRS camera range brought to you by Synectics Defence Systems features cameras capable
of producing high quality imaging in colour day, cooled monochrome low-light, and night vision. They also feature motion detection and will detect any movement within range, so it is not left to the eyes and reflexes of the observer to notice and react to all activity, therefore eliminating the risk of important events being missed due to human error. Being able to observe at extreme ranges can also prove to be a vital ally in monitoring hostile situations and criminal or terrorist activity. Using cutting-edge camera systems and observation equipment can allow activity
to be observed from extreme distances. Therefore, any events occurring can be monitored covertly from a safe distance, drastically increasing the safety and security of personnel and the mission, and thereby increasing mission success rates. With the LRS range, you are able to observe activity from beyond 25km, which can prove crucial to the prevention of drug smuggling, border insertion and terrorist activity. FOR MORE INFORMATION synx.com/lrscameras
Defence solutions You blink we don’t Compact and lightweight yet powerful and robust, the long range surveillance (LRS) is a family of systems for long-range reconnaissance, homeland security, border protection, coastal surveillance, military tracking and counter insurgency. Long range surveillance cameras can be deployed with integrated long-range thermal cameras to provide total day and night surveillance. Employing the very latest in electro-optic technologies, the LRS camera range provides surveillance at extreme ranges-providing 24 hour capability in long-range observation, and the detection and identification of vehicles and personnel.
synx.com/lrscameras
86
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
SHIP PROTECTION
Evidence is now showing that Somali pirates are now better trained and more organised than they have been in the past. This could be an indication that terrorist organisations have probably infiltrated into what has become a very lucrative business. E the 250-350 metres range of an AK47 or RPG, allowing effective protection in a non-lethal manner. Photonic’s managing director Paul Kerr said: “PSS recognised a gap in BMP3/BMP4. It was our aim to build an effective non-lethal defence system that was capable of neutralising a threat at a safe distance. The SMU100 was designed for use by security teams on board. At 500 meters it paints its target with a wide scanning laser making the ship too uncomfortable to look at. “We believe properly equipped and trained security personnel are the keys to safe passage as they allow the crew to go about their normal duties, leaving the security of the ship to the specialists.” A GROWING PROBLEM The problem of piracy is growing on a dayby-day basis. It is no longer limited to the Somali and Nigerian coastal waters. Attacks are now happening on a more regular basis in the Indian Ocean, the Gulf of Aden, the Red Sea and the Arabian Sea. A worrying factor is the increase in the use of intimidation and unnecessary violence by the pirates against ships’ crews. There is also a noticeable increase in the amount of ransom being demanded by the hijackers. A recent ransom of US $9.5m was paid for the Samho Dream and US$2.5m for the release of a Syrian owned and Togoflagged ship hijacked earlier this year. There are also reports that the Somali government recently seized two aircraft with
over US $3million dollars on board, believed to be a ransom payment intended for the pirates who were holding the Chinese owned cargo ship Yuan Xiang, which was seized last November along with 29 of its crew members. The rewards for the Somali pirates are now reaching tens of millions of dollars through seizing tankers, dry bulk carriers and general cargo ships in the Indian Ocean and Gulf of Aden, even with the presence of foreign navies patrolling these high risk areas. These areas patrolled by the task force are now being expanded to include locations where attacks are becoming more frequent. Following an agreement by the International Bargaining Forum (IBF), made up of the ITF and Joint Negotiating Group (JNG) it was decided that as from 1 April 2011 an extended zone of risk has been added to the designated high risk area in the Gulf of Aden and Indian Ocean. The IBF agreed vessels transiting the zone should adopt increased security measures which should include appropriate personnel or systems to reduce vulnerability. EXPENSIVE BUSINESS The cost of piracy to shipping is now estimated globally to be between US$7b and US$12b per year to the industry. There is also now a difficulty of finding crews that are willing to transit the high risk areas, a problem that will have to be addressed by the shipping companies perhaps by paying a larger bonus to crews who are willing to transit high risk
areas. Together, these complications could, along with the continuing increase in the number of pirate attacks, create a situation where a blockade of the danger zone could be inevitable, creating a no-go area in the Gulf of Aden and the Indian Ocean for shipping. If this happened, it would mean all of the ships that normally use these routes would have to transit around the Horn of Africa. This additional distance would add extra days on to their voyages and greatly increase all of their transport costs, raising the cost of fuel for the ships to a much higher level than it is at present, the consequences of this would have a knock on effect on the world’s delicate economies, as the world’s trades and industries would pass the extra expenses charged by the operators on to the consumer. Approximately 7.5 per cent of world trade uses the Suez Canal. It would also have a direct effect on 40 per cent of the world’s seaborne oil shipments which equates to 20 per cent of the world’s entire oil shipments. Geographically, the Straits of Hormuz lead to the Arabian Sea, through which an average of 17 million barrels is transported every day. Any disruption to this vital supply to the world’s trade could have a disastrous effect on the global economy.
Maritime Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
A LUCRATIVE BUSINESS Evidence is now showing that Somali pirates are now better trained and more organised than they have been in the past. This could be an indication that terrorist organisations have probably infiltrated into what has become a very lucrative business. Meaning that the pirates/terrorists are not only looking for the rewards of piracy to satisfy their own needs but are now helping to finance their related terrorist organisations, creating a much greater and better coordinated problem for the authorities to deal with. It is thought that Al-Qaeda may be training these gangs of pirates in camps in secluded areas of Sudan and Somalia into a militia, increasing the Al-Qaeda presence in the area by using converted young members of the local population to greatly boost their numbers. Now that the gap between terrorism and piracy is narrowing, plus a growing availability of terrorists with local knowledge, it is becoming more obvious that the international community will have to provide both Sudan and Somalia with the same level of assistance that is given to other vulnerable countries in their war against terrorism. In order to achieve this, the level of support to these nations would have to be more than just a military presence. Education, basic humanitarian needs, hospitals are all as important if not more so than a military solution. Without these countries having properly elected and nationally trusted governments, any help will be shortlived, meaning any solution will be a long way off allowing terrorism to get an even stronger foothold in the African continent. L
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
87
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Central Scanning advert September 2010_Layout 1 21/09/2010 10:47 Page 1
Equipment Sales and Bureau Advice
Who is in your waters? We can tell you... Integrated or stand alone, Cerberus Mod 2 provides world class diver detection capability.
n Steinbichler Comet 5 Technology 1.4 to 11.0 Mega Pixel (fringe projection) All new Steinbichler Comet 5 with modular design with more measurement fields of view and increased resolution n Steinbichler Latest Software New Inspect Plus 5.0 Inspection Software New Comet Plus version 9.0 Software New T-Scan Plus version 9.0 Software n Steinbichler T-Scan 3 Laser Scanning Technology New capabilities within laser scanning Now able to scan gloss black and chrome!!! n Artec Scanner Technologies As UK agents Central Scanning continues to broaden its range with MH, MHT & L scanners n Aicon agents Central Scanning now offer DPA Pro and Move Inspect with their extensive range of scanning solutions.
Tel: 01527 558282 Email: sales@central-scanning.co.uk Web: www.central-scanning.co.uk
88
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
World leading performance. Small, lightweight & affordable. Atlas Elektronik UK provides a centre of excellence for maritime and port security and is 100% owned by Atlas Elektronik GmbH, a joint company of ThyssenKrupp and EADS.
ATLAS ELEKTRONIK UK Ltd. Dorset Green Technology Park Winfrith Newburgh Dorchester DT2 8ZB United Kingdom +44 (0) 1 305 212400 enquiries@uk.atlas-elektronik.com www.uk.atlas-elektronik.com
Meadows Road Queensway Meaodows Industrial Estate Newport, SouthWales NP19 4SS United Kingdom +44 (0)1 633 292025
EVENT PREVIEW to combine their experience and operational expertise and identify improvements to their command and control systems, security policy, field operations, training and more. “With this level of expertise in the audience this is an event that has to be attended,” said Yury Ichenico, DPA/CSO, Norgas Carriers AS.
TACKLING THE WIDER MARITIME SECURITY THREAT
Whilst piracy makes headlines, an abundance of other critical security threats are being faced daily, including drugs, arms and people smuggling, stowaways, vandalism and opportunistic theft Organised and opportunistic crime in shipping, ports, offshore infrastructure and local supply chain is a significant problem, and understanding how to adapt security strategies to identify and tackle these breaches is crucial to any operational security. 121 incidents of maritime crime were reported between January and September this year. There has been a notable increase in incidents involving theft at anchorage and at port as well as very significant (Category 1) incidents. Preventing Criminal Disruption to Maritime Operations will take place in Hamburg between 29 February – 1 March 2012, and bring together security representatives from across the global maritime industry. The agenda shines a spotlight on how to deal with opportunistic theft, organised crime
and terrorism. Packed with case studies of first hand experiences of maritime crime, attendees will leave with a clear understanding of the latest practical measures they can implement to maximise the security of their assets. REPORTS FROM THE FRONTLINE This is the only meeting to provide reports from the front line. These case studies offer timely, first hand accounts across the broad spectrum of security risks being faced. Each incident provides critical information on where, how, and with what result, a security programme was breached. And crucially, what lessons have been learnt and improvements made as a result. With case studies from shipping, ports, offshore oil and gas, and coastguards all the stakeholders come together for the first time
Packed with case studies of first hand experiences of maritime crime, attendees will leave with a clear understanding of the latest practical measures they can implement to maximise the security of their assets.
Maritime Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
REASONS TO ATTEND Visitors attending the event can learn by example and hear how peers faced different security situations and how they have improved processes as a result. Delegates can evaluate the technologies and solutions available to heighten their security, learning from others about what has worked and what has not. What’s more, the latest military and coastguard intelligence on the tactics being used by pirates will be explained. Visitors can learn about the legal and insurance consequences of breaches as well as debate ISPS code, identifying where the code has been successful and where it has not been enough to avoid breaches. Early confirmed speakers include Captain Peter Jodin, safety manager, D.P., CSO, Wallenius Marine AB; Geoff Hunt, quality assurance superintendent, “K” Line LNG Shipping (UK) Ltd; and Giles Noakes, chief maritime security officer, BIMCO. L FOR MORE INFORMATION Tel: 020 3141 8700 info@hansonwade.com www.maritime-crime.com
Who should attend? Ship owners, operators, managers and charterers from the global shipping industry, including: • CEOs and COOs • Heads of Operations/Technical • DPA & CSOs • Quality and Security Directors • Marine Superintendents Representatives from Oil & Gas companies, including: • Heads of Corporate Security • Managers, International Security • Company Security Officers • Security Advisors • Project Managers Attendees will also include: • Port operators • International Government Agencies (including defence, police, coast guard, customs, immigration and port authorities) • Military Authorities • P&I and Insurance • Associations • Ship and Offshore Security Officers • Lawyers
Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
89
CAPTURE. RECORD. DISPLAY. CAPTURE. A Samsung HD Network Security Solution captures up to 5 times the detail of standard resolution systems. HD image capture up to 1080p, recording and display combine to provide a security system which delivers an incredibly high level of picture detail. HD cameras and displays deliver a wide aspect 16:9 view of a scene and allow operators to pin-point specific areas of interest for closer inspection, without losing definition or suffering from pixilation. And by using HD recording this can be achieved on recorded footage with the same clarity. With a host of cameras, a choice of hardware or software recording options, plus HD displays, you can develop a security solution perfectly suited to your business.
Samsung HD Network Security Solutions. Smarter Security.
T 01932 455 308 E STEsecurity@samsung.com W samsungsecurity.com Samsung Techwin Europe Ltd 1000 Hillswood Drive. Chertsey. Surrey. KT16 0PS. UK
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SURVEILLANCE
TECHNOLOGY TO THE RESCUE HD-SDI technology can deliver all the benefits of the very latest full HD cameras over existing cabling The outstanding quality of the images delivered by the latest generation of full HD cameras needs to be seen to be believed. Full HD cameras can offer security professionals who are involved in detecting and preventing terrorist activity, a powerful and effective tool which can provide identification grade images of any suspicious activity. Until now, the capture, viewing and recording of high definition images has been synonymous with IP network systems. However the technology built into Samsung’s new HD-SDI cameras and DVR allows the transmission of uncompressed and non-packetised full HD (1080P) video over analogue cabling. KEY BENEFITS This makes Samsung’s new SCB-6000 fixed camera and SCD-6080 internal dome ideal for mission critical applications such as airports, ports, government buildings, bus and train stations, but where it is not viable or cost effective to transmit the images over a network. One of the key benefits of HD-SDI technology is that there is zero loss of image data and zero latency (or delay) when viewing images and this of course could be crucial when quick, affirmative action needs to be taken while a serious incident is happening. “Whilst it is inevitable that in the future the vast majority of video surveillance systems will be IP based, there will always be situations where an analogue based solution best meets the requirements of specific projects and that will quite often be the case in high security environments,” said Peter Ainsworth, senior product manager at Samsung Techwin Europe Ltd. “The HD-SDI technology built into the new camera and DVR range makes it possible to offer customers all the benefits of HD megapixel cameras without them or their preferred installation company having any specialist knowledge of Ethernet cabling, switches, hubs and servers associated with IP based systems.” ONE COMMON PLATFORM The Samsung HD-SDI solution is fully compatible with Samsung’s licence-free Net-i Viewer software, allowing users to view analogue, network and HD-SDI technologies on one common platform across an entire site. In order to offer a complete HD-SDI solution,
Samsung has also introduced the HD-SDI fourchannel SRD-480D DVR which offers real-time 1080p across selected channels or real-time at 720p resolution across all channels. DAY AND NIGHT The SCB-6000 fixed camera and SCD-6080 internal dome are both true day/night cameras which can capture and transmit full HD images up to 100 meters over analogue cabling in real-time at 25 frames per second. Both models feature Super Noise Reduction (SSNRIII) technology, Samsung Super Dynamic Range (SSDR) and Highlight Compensation, whilst delivering over five times the image resolution that standard definition analogue cameras are able to achieve. The maximum transmission distance between a recording device and the SCB6000 or SCD-6080 can be increased to 200 metres when low-loss L-6CHD coaxial cable is installed. The transmission distance will be further extended when Samsung introduce the SPH-120R Repeater in the near future. As is the case with all Samsung professional security products, the HDSDI range is supplied with full support services from Samsung Techwin Europe Ltd, including free system design, free technical support and a full three-year warranty. QUALITY AND VALUE Samsung is one of Europe’s fastest growing professional security brands. The company’s security products, which are widely accessible across Europe via an extensive network of distributors, are not only highly respected for their quality, but also for their superb value backed-up by unbeatable pre and post sales support. By listening carefully to its clients, Samsung continues to develop products to meet the current and future needs of security professionals and by following this path the company has developed a number of unique technologies specifically for use in security applications. These new technologies have ensured that Samsung’s professional security products have been consistently rated highly in independent product tests. L FOR MORE INFORMATION For further information please e-mail STEsecurity@samsung.com, telephone +44 (0)1932 45 5308 or visit www.samsungsecurity.com
By listening to its clients, Samsung continues to develop products to meet the current and future needs of security professionals. Issue 8 | COUNTER TERROR BUSINESS MAGAZINE
91
Ballistic Absorption Barrier Systems www.babs.us.com
blocks are a revolutionary new product utilizing ‘green technology’ to manufacture a new method of protection against ballistic and blast events
During blast survivability testing conducted at the Aberdeen Test Center (Maryland, USA) a wall constructed of BABS blocks showed 99% blast attenuation
Testing performed December 2009 - US Army Aberdeen Test Center, Maryland Demonstrated at Quantico Marine Base - Virginia USA 2009
are custom designed and installed for each unique application for use in perimeter protection, embassy protection, airport security, major event security, pipeline protection, military installations, blast and ballistic protection have been designed for ease of movement and quick deployment. They are constructed to be positioned similar to building blocks. They are portable, reusable, and protective.
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
Ballistic Absorption Barrier Systems utilize recycled scrap tires to create blast absorption barriers for use in perimeter and check point security, embassy fortification, pipeline protection, and major event security Scrap tires are one of the world’s largest environmental problems. Hundreds of millions of tires are produced each year increasing the total number of tires worldwide. Most current applications for scrap tires involve burning or burying tires. These options can have a large environmental impact.
260
=
www.babs.us.com
At 30lbs (13.6kgs) per block, the Eco-Blok has been developed as a durable and reusable alternative to standard sandbags
Each BABS block uses 260 scrap tires
Ballistic protection Erosion control Major event security Flood control Crowd control
Military uses Civil engineering Parks and recreation Emergency response
Innovative Concepts International SBMM R&D Center - 605 Laurel St. - Mishawaka, Indiana 46544 USA (+1) 574-968-3011 toll free (+1) 877-315-BABS (2227) please direct inquiries to: don.zimmerman@babs.us.com
Advertisers Index
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service ADS Group AON Risk Solutions Arinc Armoured Cars Assembled Electronics ATG Access Atlas Elecktronic UK Ltd Audax Global Solutions Ltd Barkers Engineering Bela Electronics Design Ltd BF Component Solutions Ltd Bristorm Broughton Controls Ltd Central Scanning Ltd Cintec International Cobham Antenna Systems Counter Terror Expo Cova Security Gates CPM Group Emergency Services Show EZV Flir G6 – Global UK GHD Hydraulics Limited GPS Perimeter Systems Hesco Military Products Limited Hi-Speed Services Infranor Ltd Innovative Concept International
62 80 OBC, 53, 71 32 45, 94 23 88 63 20, 21 88 32 12 25 88 30, 31 59 84 24 10 68 68, 69 36 44 48 34 16 48 82 92, 93
Intelsec JB Corrie LESAR M Buttkereit Ltd Nedap Optosecurity Inc Origin Storage Pentax Imaging Systems Proengin Rainford Rapiscan Renfrew Group Richard Paul Russell Ltd Safety Flex Barriers Samsung Techwin Europe SDS Group Security Labels Selectamark Seven Technologies SP Services UK Ltd Synectics Syco International Townscape Products Ltd TXT Tools Limited Will-Burt Winkelmann Zareba Zaun
57 18 46 79 6 54 74 4 38 82 40 32 35 14, 15 90, 91 28, 29 2 76 60 66 86 IBC 50 8 64 42 22 26, 27
The Complete Electronics Service... • Rapid Prototyping • Design & Development • Product Styling • Contract Assembly • Innovative Solutions
AES
Assembled Electronics Solutions LLP
Tel: 01789 204879 • www.assembled-electronics.com 94
COUNTER TERROR BUSINESS MAGAZINE | Issue 8
Covert Buried Sensor
Simple to Install
No Special Ground Preperation required
Ground Heals Within Days
SYSCO COVERT GROUND SENSOR The Sonaflex covert buried sensor is ideally suited for locations that require a discrete covert sensor that is both cost effective and simple to install without the necessity for major groundwork’s. As the sensor is passive, it is not compromised by existing utility cables or water pipes within the sensor proximity. Field proven in many demanding high security installations, the Sonaflex buried senor is the ideal choice where performance and reliability is a key requirement.
SYSCO INTERNATIONAL psmsysco@aol.com