www.counterterrorbusiness.com | ISSUE 9
COUNTER TERROR EXPO
DEFENCE
PERIMETER SECURITY | IFSEC PREVIEW | CYBER THREAT | EXPLOSIVE TRAINING
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CONTENTS 05 COUNTER TERROR NEWS
103 SECURITY & POLICING - THE CYBER THREAT
143 DEFENCE NEWS
07 AIRPORT SECURITY
Mitigating the cyber threat to a company’s business model, its shareholder value, its data, and its reputation is not something to be delegated to the CIO or the head of security, writes SOCA chair Sir Ian Andrews. Plus CTB asks Chris Higgins, security events manager at ADS Group for the lowdown on the Security & Policing event held in February
145 EXPLOSIVES TRAINING
Liquid Explosive Detection Systems vendors hold their breath as EC ponders deadline, writes Chris Yates
13 COUNTER TERROR EXPO PREVIEW On 25-26th April, counter terror experts will debate the issues faced, define operational strategies, and help to shape future counter terrorism policy at an event which evolves in line with global geopolitics
73 PERIMETER SECURITY Ritchie Bignell, director, Perimeter Security Suppliers Association sees that a holistic approach to protecting the perimeter of high security sites is on the horizon. James Kelly, chief executive of the BSIA, explains how effective perimeter security seamlessly combines various systems so potential threats can be addressed in a timely manner
115 IFSEC INTERNATIONAL 2012 In its 39th year, IFSEC International features plenty of educational content, with sessions from experts in counter-terrorism
125 INFOSECURITY EUROPE 2012 PREVIEW More than 12,500 information security professionals and 300 international solution providers come together over three days at London’s Earls Court, April 24th-26th
Major Ken Cross MBE, President of the Institute of Explosives Engineers discusses blowing stuff up for a living
151 DVD 2012 Information on Defence Equipment and Support’s (DE&S) annual stakeholder event for the land equipment community
155 MARITIME NEWS Any ransom ban would have huge effect on seafarers says Alastair Evitt
157 CBRNE Details of CBRNe Asia, the regions first and largest CBRNe conference
159 EUROSATORY 2012 With a growing homeland security focus, June’s Eurosatory event continues to be a key international meeting point for the land defence and security community
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £35 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit the Counter Terror Business website at:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan PRODUCTION DESIGN Jacqueline Lawford PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Lucy Carter, Charlotte Casey GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media
© 2012 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
03
Second generation Forensic Marking has just arrived SelectaDNA is the world’s most advanced forensic acquisitive crime reduction tool Feared by criminals Identifies property instantly Links criminals with crime scenes immediately Cost effective solution with no annual licence fees Now used by 80% of UK Police Forces In a Police trial SelectaDNA reduced theft by 83%
Selectamarkplc Advanced Asset Protection
Our range also includes:
Anti-Tamper Solutions
For further information visit
www.selectadna.co.uk DA0045/2
News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
TRANSFORMING DEFENCE PROGRAMME
Defence Secretary formally launches NEWS IN BRIEF Independent review favours new Joint Forces Command body return of Control Orders Scrapping control orders that allow terror suspects to be moved out of London is likely to achieve the ‘reverse’ of improving national security, a government watchdog warned. David Anderson QC, the independent reviewer of counterterror laws, said provisions in the old control order system that permitted relocation of suspects had helped disrupt extremist networks.
across the Ministry of Defence in a generation. Joint Forces Command has been designed and delivered from scratch in only nine months. Over the next year, it will assume its full range of its planned responsibilities, It will also oversee the development of weapons for cyberwarfare, and recommend new ‘smart’ equipment that might make the difference in future campaigns. Head of the new body, Air Chief Marshal Sir Stuart Peach, would not be drawn on the kinds of cyber-capabilities the UK will be looking to develop, and said the UK needed to better understand the threat. In an interview with the Guardian, Sir Peach stated: “One of key ways to exploit this new command is to make sure that lessons are applied into education and training, so that our soldiers, sailors and airmen are better prepared.”
Indian PM says new age terrorists are tech savvy Indian Prime Minister Manmohan Singh told The Indian Express: “Newage terrorists are invisible and possess far better capability to create networks for sharing knowledge, skills and resources. It is therefore of critical importance that a security agency like the Special Protection Group should continue upgrading itself continuously, both in terms of technology and training.”
Photograph courtesy of Israel Weapon Industries
April marked the launch of the Joint Forces Command, recognised as a major milestone in the MOD’s Transforming Defence programme. Secretary of State for Defence Philip Hammond MP, attended a ceremonial event at JFC’s new Northwood headquarters. The Joint Forces Command has been established to ensure that a range of vital military capabilities, functions and organisations – such as medical services, training and education, intelligence, and cyber – are organised and managed effectively and efficiently to support success on operations. By bringing together a number of joint defence organisations, the new body plans to ensure investment in joint capabilities is appropriate and coherent. Its creation was recommended by the Defence Reform review, led by Lord Levene, as part of the most significant programme of change
University counter terror and airport security degrees
OLYMPIC SECURITY Torch security team ready for action after training at Hendon In the run up to the Olympics, the Metropolitan Police Olympic Torch protection team have been put through their paces in training exercise at Hendon. The Olympic Torch arrives in the UK on 18 May and will embark on a 70 day tour of the country before arriving at the Olympic Stadium on 27 July for the opening ceremony. It will be accompanied on its journey by a 69 strong policing team, chosen in December 2010 following an eight month selection process and drawn from a range of policing roles including borough policing, CID, diplomatic protection group, traffic and airports. The team, not all on duty at the same time, will cover a number of roles on a 24-hour seven-day a week basis. During the Relay the team will keep pace with each torch bearer and could see officers running up to 30 miles every day, for several consecutive days.
University backlash to UK Prevent strategy? The government’s counter-terrorism strategy, Prevent, is facing opposition on university campuses over concerns it is discriminatory and encourages spying, reports the Guardian. The National Union of Students (NUS) is expected to table a motion at its conference in April condemning as “totally unacceptable” approaches by Prevent officers asking for details of student Islamic society members. On 6 February a home affairs committee review of Prevent concluded that students with extremist views were not always “subject to equal and robust challenge” at universities and recommended this be remedied with new government guidance. A Home Office spokesperson said: “Prevent aims to turn people away from violent extremism. It is not about spying or intelligence gathering. The Prevent strategy makes clear that universities have a responsibility to help protect vulnerable young people from radicalisation. The vast majority of them recognise this and take part in Prevent.”
The University of Central Lancashire is introducing an undergraduate degree in airport security management and a postgraduate degree in counterterrorism. Both will be delivered by the university’s School of Forensic and Investigative Sciences. Former detective chief inspector Andy Johnson said:“Our BSc in Airport Security Management is the first in the country.”
UK-Italy high level group on terrorism planned Following the tragic deaths of Chris McManus and Franco Lamolinara in Nigeria, William Hauge and Minister Giulio Terzi have announced plans establish a UKItaly high level group on terrorism A statement said: “We will support further work to build regional capacity to tackle the kidnap threat posed by terrorist groups.” TO READ MORE PLEASE VISIT...
tinyurl.com/co2497g
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
05
COUNTER TERROR EXPO 25 – 26 April 20I2 Olympia London www.counterterrorexpo.com
The UK’s largest show for International counter terrorism and specialist security 400 Security & Counter Terrorism Focused Exhibitors OVER 9,000 International Attendees FIVE High Level Conferences FREE Workshop Programme covering the latest technologies LIVE Demonstrations for IEDD & Access Control NEW Light Armoured & Support Vehicle Display INTERNATIONAL Meet the VIP Buyer Programme
PRE-REGISTRATION ADMITTANCE ONLY. NO ONSITE REGISTRATION. Register Now at www.counterterrorexpo.com/advert Conference Partner
Network Reception Sponsor
(UK) LIMITED
Supported by
Co-located
Airport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WILL THEY OR WON’T THEY? Although some airports have already started the procurement process, Liquid Explosive Detection Systems vendors hold their breath as EC ponders deadline, writes Chris Yates A report will land on the desk of European Union (EU) Transport Commissioner Siim Kallas this month that will directly influence whether or not EU airports will be required to meet an impending deadline to deploy Liquid Explosive Detection Systems (LEDS) equipment. The report was ordered after last year’s debacle over the limited deployment of such equipment to enable a lifting of Liquid, Aerosol and Gels (LAGs) restrictions on transit passengers passing through European airports. This move descended into farce after intransigence by the aviation industry and interference from Washington DC, led to cancellation of the plan on the eve of its implementation.
BACKGROUND The civil aviation liquid explosive threat first emerged following discovery several years ago of a plot to down multiple transatlantic airliners whilst in flight from the United Kingdom to the USA and Canada. That plot originally led to an outright ban on Liquids, Aerosols and Gels (LAGs) being carried in passenger hand baggage, but was subsequently relaxed to the 100ml per item contained in a 1 liter bag quantity restrictions we have today. The restrictions were put in place pending development of screening solutions able to determine whether passenger presented LAGs might be a threat or entirely benign.
Under the guidance and direction of the European Civil Aviation Conference (ECAC) and the European Commission (EC), numerous companies began an intensive development programme aimed at bringing hardware and software solutions to the LAGs threat to the marketplace. These solutions were thoroughly tested under the ECAC Common Evaluation Programme (CEP), declared fit for purpose and deemed suitable for active service deployment in airports across the region. EU regulation originally envisaged a dual stage deployment programme focused initially on transit passenger hand luggage and thereafter rolled out to E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
07
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Cobham Antenna Systems, Microwave Antennas Overt and Covert Antennas Designed and Manufactured for Security, Surveillance, PMR, Tetra, Cellular DAS, COFDM and Unmanned Systems The most important thing we build is trust
(1)
(2)
(3)
(4)
Customised Antenna Development plus Standard Product Range (1) Ultra Wideband Directional antenna, 800MHz to 6GHz (2) Multi Sectors - Gain everywhere, including overhead, for ground stations (3) C-Band Omni with Quick Deployable Spring Mount (4) Omni antennas for Software Defined Radio projects (5) Ultra Wideband Directional antenna for IED Countermeasures (6) Low Profile, Directional antenna for Covert use
(5)
(6)
Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, UK T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket
European Antennas Limited trading as Cobham Antenna Systems, Microwave Antennas
Antenna photos not to scale
Plug-’n’-Play Real-Time Video Enhancement
Bridge in low light
Enhance your existing analogue video system without replacing anything!
Come see for yourself: 25 - 26 Apr 2012 Harbour in fog
Airport in fog
Counter-Terror-Business-2012-halfpage-.indd 1
10
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
www.lyyn.com | info@lyyn.com UK: 0844 3189106 | Others: +46 46 286 5790
2012-01-30 13:49:24
AIRPORT SECURITY E encompass all passenger hand luggage. The plan looked good on paper, but the relevant EU legislative and regulatory bodies didn’t factor opposition from the end user airport community and outright hostility from the region’s primary trading partner into the equation. The regulation was therefore amended to reflect a desire amongst all parties to begin easing the much-derided restrictions on what can and cannot be carried in passenger hand baggage by the second quarter of 2013. DEBATE Argument over the lifting of liquid restrictions has raged back and forth for a couple of years. Despite expressing comforting words about a desire to support an easing of controls on what passengers may and may not carry in their hand luggage, the aviation industry continues to lobby against having to refactor existing solutions deployed in central screening.
product as a EU certified Standard 2 compliant Type C Liquid Explosive System (LEDS) software upgrade for single-view X-ray machines in December 2011. This solution automatically detects liquid explosives and chemical threats in real time, in containers up to 2 L passing through the X-ray system. Within seconds, the software discriminates between dangerous and safe liquids even when their physical properties are very similar. AMERICAN OPPOSITION US policy on aviation security may be a more intractable hurdle to overcome as the EU endeavors to ease the restrictions. US officials previously demonstrated their opposition by formally warning that additional security measures on EU originating passengers would be arbitrarily imposed if the controls were eased in line with regulation. This step effectively prevented the few EU states already capable of screening LAGs
Compliance with the regulation may not necessarily lock airports into expensive hardware renewal though. In many cases, the capability to accurately screen LAGs can be achieved through a relatively straightforward software upgrade to already deployed x-ray systems. It argues that any move toward lifting restrictions should be based on a sustainable technological solution being available, that ensures a high degree of probability of detection of a wide range of liquid explosive threats, but which should be passenger friendly and enhance the passenger experience rather than hinder it. Behind this populist sentiment is the issue of cost. Figures indicate that security now accounts for almost thirty percent of aviation sector operational costs annually. Lobbyists continue to argue that this is an unfair and unsustainable burden, particularly in an era when it has collectively stacked up multi billion dollar losses in seven of the past eleven years. They contend that terrorism is a national security that should be addressed by national governments rather than commercial enterprises. Compliance with the regulation may not necessarily lock airports into expensive hardware renewal though. In many cases, the capability to accurately screen LAGs can be achieved through a relatively straightforward software upgrade to already deployed x-ray systems. Canada’s Optosecurity Inc, won coveted European Civil Aviation Conference (ECAC) classification for its OptoScreener
for potential threats from lifting restrictions and prompted the rewriting of regulation. Despite an ongoing dialogue between the two sides, no formal agreement has been reached as yet. The issue was last raised at the G20 Summit held in Cannes in November, but resulted in little more than the EU delegation urging their US counterparts to adopt more proportional security measures, to aid the free flow of passengers and goods in the transatlantic area. The G-20 Summit is the avenue for member states to discuss, plan and monitor international economic cooperation. It resulted in little progress on the issues under discussion, including the lifting of the particularly onerous security restrictions. HARDWARE Liquid Explosive Detection Systems (LEDS) equipment began to emerge in the marketplace a couple of years ago. Industry end users argued against immediate deployment of the systems, challenged the protocols under which they were assessed and demanded further testing including in live airport environments. ECAC bowed to industry demands for more rigorous testing, required that vendors resubmit their originally vetted
solutions for further assessment and subsequently published a revised list, at the end of last year, of verified hardware and software solutions meeting the highest standards currently attainable. EU regulation encourages airports to take all necessary steps to begin installing this equipment well ahead of the currently proposed compliance date, but given the caveat that a final decision on whether to enforce the long proposed deadline will not be made for some weeks yet, the greater majority of airports are holding back from committing spending. A small handful of more forwardthinking airport operators have begun the tendering process without waiting for a formal pronouncement from EC Transport Commisioner Siim Kallas. Dublin Airport Authority (DAA), which is responsible for Dublin, Cork and Shannon airports, has most recently invited the manufacturer base to tender to upgrade its presently deployed screening hardware. However, by far the greater number of airports must still move forward and appear intent on leaving any procurement decisions until the very last moment. The biggest system vendors such as Smith and Rapiscan can weather the delay in implementing the liquid screening regulation. This isn’t as easy for the many smaller specialist companies, such as Durham based Kromek and Cobalt Light Systems in Oxford, who have invested heavily in developing solutions, only to see regulation deadlines revised at the last hurdle. Vendors are said to be quietly seething at the lack of progress and some are openly questioning whether politicians and the industry are merely paying collective lip service to enhancing public safety. The acid test will be whether the green light to go ahead with deployment is given or whether some other excuse is found to delay further still.
Airport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NATIONAL SECURITY The fear amongst vendors is that one or more governments opt to retain the LAGs controls for national security reasons. If this were to happen it could put the entire project in jeopardy, since the prospect of the confusion caused to passengers would likely result in suspension, pending a uniform lifting of the restrictions. As vendors hold their breath and hope that nothing will conspire to prompt further costly delay, Transport Commissioner Siim Kallas remains uncharacteristically tight lipped on the issue, which is serving to caste doubt as to whether air passengers will finally see an end to restrictions as planned in 2013. L ABOUT THE AUTHOR Chris Yates, former aviation security editor at IHS Jane’s Defence, is principal of Yates Consulting.
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
11
M A N U FAC T U R I N G A N D D E S I G N S E RV I C E S In partnership with 42 Technology We provide • • • • • • • •
SMT & Through Hole PCB Assembly Complete Product Build Low/Medium Volume Manufacturing BGA/µ BGA Placement & Inspection Test Solutions/JTAG/AOI Product Design & Development Engineering & Consultancy Innovation & Technology Management
See us a t Counte r Terror Expo
STAND NUMB ER i-175
To meet your Quality, Flexibility & Delivery targets KM85790
Call our sales department today
01234 266300 www.britonems.co.uk
Briton EMS Ltd 4 Shuttleworth Rd Elms Industrial Estate Bedford • MK41 0EP
[e]: sales@britonems.co.uk
COUNTER TERROR EXPO 2012 PREVIEW
A GLOBAL CENTREPEICE FOR COUNTER-TERRORISM TACTICS AND TECHNOLOGY
Taking place at London Olympia on 25-26 April, the fourth Counter Terror Expo will gather over 100 internationally recognised speakers with over 400 leading industry technologists to debate the issues faced, define operational strategies, and help to shape future counter terrorism policy. It remains the only event of its kind that evolves in line with global geopolitics.
POWER VACUUM Meanwhile, the tumultuous upheaval across great swathes of the Arab world over the past year has led to a shift in the balance of power regionally, which may present a significant danger on our own doorstep if the vacuum is not filled appropriately. While it is hoped that the ousting of hardline
This widely acclaimed event for public and private sector professionals working at the sharp end in ensuring an effective and consistent response to the threat from terrorism is now in its fourth year and continues to grow. Counter Terror Expo is being held at a time of great uncertainty in the world. The capture and death of Al Qaeda (AQ)
The tumultuous upheaval across great swathes of the Arab world over the past year has led to a shift in the balance of power regionally, which may present a significant danger on our own doorstep if the vacuum is not filled appropriately.
leader Osama bin Laden is said to be proof positive that the decade old campaign against terrorism is being won. Although hailed as a great success, the infringement of Pakistan’s sovereign territory by United States military assets has not played well and resulted in a difficult relationship with that country apparently becoming distinctly frosty.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
leaderships in Tunisia, Libya and Egypt will bring about greater stability, the power vacuum has been filled by interim military leaderships which appear reticent to let go of the reigns in two of these countries. Thus public dissent is once again being heard on the Arab street. Civil unrest also continues unabated at the time of writing in Yemen and Syria. The former country has proven to be a relatively safe haven for Al Qaeda in the Arabian Peninsula (AQAP), which has been successful in launching potentially devastating attacks against Western targets over the past three years. The hardline leadership of the latter country looks increasingly fragile as it strives to hang on to power against a backdrop of international indignation at civilian killings and detentions. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
13
Creator of electronic access solutions
Included Modules
Great Features
INTEGRATED ACCESS CONTROL Edition 5.1
GUARD TOUR MANAGEMENT
LIFT CONTROL
Introducing Centaur Integrated Access Control, CDVI group’s flagship access control platform.
PARKING MANAGEMENT
78
56 3
1
Versatile and secure, Centaur offers flexible installation using a multitude of connection methods from hard wired to IP, Centaur provides access control from 1-64 sites local or remote.
VISITOR MANAGEMENT
Powerful Integration
DVR & NVR
TIME & ATTENDANCE
GRAPHICAL INTERFACE
With market leading functionality and many add-on modules included as standard, why not make Centaur your access control platform of choice?
ALARM INTEGRATION
2 4
CARD COUNTER
Featuring powerful integration with CCTV, Fire, Intruder and Biometrics, Centaur is constantly evolving to fulfill your access control requirements.
IP CAMERAS
* Refer to Limited Lifetime Warranty condtions.
ALARM MANAGEMENT
ENERGY MANAGEMENT
BIOMETRIC INTEGRATION
CDVI Reader Technologies
STAINLESS STEEL MIFARE®/DESFIRE® READER
RF RECEIVER
Perfect to install in the following enviroments.
BIOMETRIC READER Commercial
STAINLESS STEEL PROXIMITY READER
POLYCARBONATE PROXIMITY READER
Industrial
Public Buildings
Multi-tenant Occupancy
LONG RANGE READER
CDVI UK Scan the QR code to download the Centaur Brochure
www.cdvigroup.com
Unit B1, Knaves Beech Business Centre, Davies Way, Loudwater, High Wycombe, HP10 9QR Tel: 01628 531300 www.cdvi.co.uk
COUNTER TERROR EXPO 2012 PREVIEW
E SYRIA MELTDOWN Syria’s leadership is said to have no appreciable opposition capable of holding the country together in the event that Bashar al-Assad eventually goes. Assuming a meltdown does occur in the country, it will likely give rise to significant danger on Europe’s porous Eastern borders. Bahrain has also been the scene of a crackdown on civilian opposition to the ruling elite with military support from Saudi Arabia and the United Arab Emirates. Saudi Arabia most recently introduced limited societal reforms in an effort to quell rising voices of dissent. The so called “Arab Spring” could potentially be turning into the “Arab Winter”. COST-CUTTING Counter Terror Expo will be held at a time of deep governmental cost cutting as national economies globally strive to address issues gripping the financial markets. National defence budgets (including counter terrorism efforts) are not immune to such pruning. Irrespective of deeply devastating acts of terrorism in the past, some of these national
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Principal conferences themes include Global Counter Terrorism; Cyber Security and Electronic Terrorism; Protection of Crowded Places (including Designing Out Terrorism & Emergency Service Response); Critical National Infrastructure Protection, and Tactical Counter Terrorism. budgets are being slashed as a result of a perceived peace dividend. History has demonstrated that such a policy has a tendency to leave the gate open to future attack. It is incumbent on the military, security services, industry and academia to drive this point home, whilst engaging in dialogue and developing solutions that fit with the current world politic at an acceptable and achievable price point. THE CONFERENCE Counter Terror Expo’s operationally critical and highly respected centrepiece conference has a well deserved reputation for its delivery of
insight, analysis and perspective on the range of threats faced. The event gathers over 100 internationally recognised speakers in the field of counter terrorism together annually, to debate the issues faced, define the operational strategies, and help to shape future policy within the secure conclave of conference. Principal conference themes include Global Counter Terrorism; Cyber Security and Electronic Terrorism; Protection of Crowded Places (including Designing Out Terrorism & Emergency Service Response); Critical National Infrastructure Protection, and; Tactical Counter Terrorism. The conference is held alongside a E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
15
secure, hygienic and simple
melaphone visaudio
secure speech windows Melaphone is a completely unique and innovative security and hygiene solution all in one. Melaphone is specifically designed to allow secure sterile communication with a high degree of vision and safety. There is no thru-air flow, therefore, no transmission of germs, draughts or dust. Speech is transmitted through a transparent diaphragm which also gives protection against noxious sprays. Melaphone is designed for use in areas where hygiene and security are essential. Examples of its use can be seen in Clean & Dust Free Rooms, Pharmacies, Hospitals, Reception Areas, Cash Desks, Booking Offices, staff entrances and in any position where safe communication is paramount. The Melaphone is very simple yet highly effective with its use of high quality engineered materials. The high impact resistant dished 3mm polycarbonate guard is designed to maximise staff communication security yet be almost invisible to the eye for take full advantage of the almost glass-like properties of the polycarbonate. There is a highly tensioned clear diaphragm between the cast aluminium rings
that amplifies and resonates sound. For added security, a stainless steel wire mesh can be installed in between the diaphragm and the clear guard to further add to the security of the users. Each ring is layered with closed cell neoprene foam rubber to eliminate the ingress of dust, bacteria and germs. These compress against the glass surface of the main fitting window to give an air-tight seal. In particular Melaphones are easily fitted into double glazing or through double walls. Melaphones are used in many diverse situations throughout the World, from simple kiosks in amusement parks to highly protected areas in pharmaceutical laboratories and clean room areas where secure germ free and dust free conditions are of the essence. If you think you could benefit from the features of a Melaphone in your next installation, “When you need to talk� call us to discuss your project and join the thousands of satisfied customers that have trusted Melaphone with staff security and hygiene over the last 30 years.
Melaphone VisAudio
Tel 01359 233191 Fax 020 8349 0294 Web www.melaphone.co.uk Email info@melaphone.co.uk
COUNTER TERROR EXPO 2012 PREVIEW E wide range of hands-on showcase events designed to highlight the capabilities of many of the technology solutions available to counter terrorism professionals, as well as an extensive range of educational workshops presented by key experts from the industry sector.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
GLOBAL COUNTER TERRORISM In the twelve months since the Global Counter Terrorism conference last convened in London, dramatic events have occurred which have reshaped the threat horizon. Al Qa’ida leader Osama bin Laden is dead; its remaining leadership is being successfully targeted and the much-weakened terrorist organisation has further fragmented. Meanwhile, hard-line leaderships across large swathes of the Arab-speaking world have been toppled in popular uprisings, bringing about a shift to democratic principles in governance and freedom of expression. These dramatic events force us to reassess and realign counter terrorism strategies in line with the shifting threat horizon, but against a backdrop of considerable fiscal upheaval that threatens our ability to maintain secure borders, civil order and safe societies. This two-day conference brings clarity and focus to the important task at hand. CRITICAL NATIONAL INFRASTRUCTURE: PROTECTION, SECURITY & RESILIENCE The loss or compromise of any of the critical elements of the national infrastructure could have a major and detrimental impact on the national wellbeing, and possibly lead to severe economic and social impact. This is the potentially stark consequence of a failure to properly protect the physical assets, services and supplies a modern society requires to function. This two-day conference examines the threat to the key areas of energy, water, food, fi nance, communications, transport, health, emergency services and governance, delivering insight into the threats each faces. PROTECTING CROWDED PLACES Crowded places remain amongst the most vulnerable to possible terrorist attack and continue to be the most difficult of spaces to secure. Thousands of people pass through our transport hubs, visit major shopping centres, go to the theatre or catch a movie every day, and all are at risk from some form of attack. This conference examines the utilisation of a combination of innovative building design, blast mitigation techniques and effective surveillance and policing methodologies to secure our most crowded places and protect the people who use them. With the more traditional of terrorist targets having been significantly hardened against attack, the imperative is to devise solutions that work for the remaining soft targets in these fiscally challenging times.
In today’s increasingly litigious society, businesses must ensure corporate governance and duty of care responsibilities are a central tenant of their crisis management strategy. THE COST OF TERRORISM TO BUSINESS: BEST PRACTICE RISK MANAGEMENT The threat from terrorism continues to evolve, with the number of incidents and plots growing each year. With no peace dividend yet in sight the risk to business remains acute. An business directed attack could result in major property damage, operational disruption, human casualties and long-term damage to both brand and reputation. In today’s increasingly litigious society, businesses must ensure corporate governance and duty of care responsibilities are a central tenant of their crisis management strategy. AON’s one-day conference will look at developments in the global terrorism landscape, and the human and economic impact on business. It will examine the full range of risk management options and what companies need to consider around their duty of care obligations. CYBER SECURITY & ELECTRONIC TERRORISM Increasing global interconnectivity brings huge benefits to the way we live and work, but conversely delivers with it many challenges that we must still overcome. In the few relatively short years since the internet
became a reality, this digital phenomenon has become a playground for terrorists, criminals and hacktivists, bent on infiltrating computer networks and individual computer systems to steal information and disrupt operations. The cyber security and electronic terrorism conference examines the magnitude of the threat and outlines how government agencies and corporate entities are putting in place effective counter-measures to appropriately protect restricted information, intellectual property and customer data. IEDD LIVE THEATRE Counter Terror Expo will feature several new showcase events including the IEDD Live Theatre. On the battlefield, in the public transport arena and within the urban environment, the threat from Improvised Explosive Devices (IEDs) remains potent. Advanced threat detection methods, threat handling techniques and threat containment solutions are helping to mitigate the danger inherent in safe IED disposal and enhance the safety of those engaged in this difficult work. The range of tools available to the specialists who carry out this role is impressive and E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
17
YOUR HIGH QUALITY PRODUCTS.... ...REQUIRE HIGH QUALITY PROFILES.
Laser Cutting, WaterJet Cutting, & Sheet Metal Folding Mild Steel, Stainless Steel, Aluminium, Copper, Brass, Bronze, Wood, Acrylic, Perspex, Hardox, Zintec, Galvanised Steel, Nylon, Titanium, Composite Materials, Fibreglass, Ceramics, Marbles, Stone, Rubbers, Foams, Fabrics and many more! Up To 200mm Thickness. Delivery to anywhere in the UK mainland.
sales@yorkshireprofiles.co.uk Tel: 01904 737 095 Fax: 01904 737 096
www.YorkshireProfiles.co.uk
Unit 6a, Hessay Industrial Estate Hessay York North Yorkshire YO26 8LE
COUNTER TERROR EXPO 2012 PREVIEW E includes remote operated vehicles, highly sophisticated jamming technologies to prevent remote control explosive devices being detonated, specialist body armour to protect against shrapnel and flying debris, hook and line kits and non-magnetic tools. The demonstration feature will showcase active scenario based IEDD demonstrations featuring ROV (Remote Operated Vehicle) capability. Ancillary equipment such as hook & line, jamming and ground scanning will be covered, along with protective suit mobility & maneuverability in extreme situations, including victim recovery. The showcase will be chaired by Major Chris Hunter, a retired British Army counterterrorist bomb disposal operator. During his 17 years in the military he served in a variety of operational explosives ordnance disposal (EOD) appointments and has seen active service in a number of high threat theatres including Iraq, Afghanistan, Colombia and Northern Ireland. Later, he played an instrumental role during the July 2005 London bombings when he was seconded to COBR-A as a suicide terrorism subject matter expert. Major Hunter retired from the MOD in 2007 to become a counter-IED consultant and television broadcaster. He is the author of two best-selling memoirs and a regular contributor to international news stations on
For 2012 Counter Terror Expo will have a new Access Control feature targeted at integrators and end-users, offering a wide range of solutions and featuring an interactive, hands on walk-through experience. A dedicated workshop will examine the capabilities of the
IED related issues, as welll as being a Fellow of the Institute of Explosives Engineers and a Member of the International Association of Bomb Technicians and Investigators. Exhibitors taking part include ATOM Training, Cobham, Allen Vanguard,
In deciding to host this globally significant sporting event, the country has become a potentially major target for those who would wish to cause harm on the world stage. vast range of access control technologies. The Access Control Suite will feature a series of doors and access points, providing buyers with a first-hand experience to test multiple systems Companies demonstrating the latest solutions include: Andrews & Wykeham, Traka, CDVI, Abloy UK, Access Management Solutions and Pensher Skytech.
iRobot, Explosive Learning Solutions, Ramora and Northrop Grumman. ACCESS CONTROL FOCUS Access to potentially high risk buildings and facilities remains a key consideration in counter terrorism planning. Gaining access to a building or facility, especially critical areas, is sometimes all the terrorist needs to successfully carry out an attack. Without access control measures in place like high security locking, key management, biometric verification and identification, a terrorist is able to survey all the vulnerabilities of the building in order to commit a planned attack.
ARMOURED VEHICLE ZONE Armoured vehicles offer crucial protection to the services of homeland security, E
Counter Terror Mag April 2012_Layout 1 09/02/2012 16:18 Page 1
RAPID PROTOTYPING
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Through technical expertise and commitment to customer care our aim is to deliver the best rapid prototyping service in the UK. • • • • • • • •
Stereolithographpy Selective Laser Sintering Vacuum Casting CNC Machining Reaction Injection Moulding Traditional Model Making Silicone Moulding Low Volume Production
Discover the ultimate prototyping experience for your product development requirements.
www.paragon-rt.com
+44 (0) 1325 333141
www.facebook.com/ParagonRT
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
19
Mission:
Detect & Protect Integrated Perimeter Security Systems Vale Security Solutions are specialists in the provision of Fully Integrated Perimeter Intruder Detection, CCTV Surveillance & Intelligent Access Control Systems With over 30 years experience, Vale Security Solutions Ltd will take you from project conception to completion with our full consultancy, system development, construction, commissioning and maintenance service, uniquely tailored to your individual security requirements
Visit us at Stand H26 Vale Security Solutions Ltd Tel: +44 (0) 1386 443588 info@valesecuritysolutions.co.uk • www.valesecuritysolutions.co.uk
COUNTER TERROR EXPO 2012 PREVIEW
E counter-terrorism, police security, force protection and SWAT teams, as well as protecting key personnel in more volatile areas of the world. In situations ranging from crowd control through civil disturbance to terrorist attack, within the counter terrorism arena a wide range of vehicles designed specifically for the task at hand are deployed. Latest generation armoured vehicles give enhanced protection to the personnel aboard in light-weight and highly manoeuvrable form through the use of advanced carbon fibre and ceramic materials. Modern day support vehicles provide critical on-scene functions including command post, surveillance, communication and emergency medical response services. The Vehicle Zone will bring together the suppliers of armoured and aupport vehicles together in one area. It will also showcase retro-fit, up-armouring & upgrade solutions. Exhibitors taking part include Farmingtons Automotive, Jankel Armouring, Streit Group, Land Rover Jaguar, STOOF and Project Support Vehicles. OLYMPICS Counter Terror Expo is being held in its fourth year against the backdrop of the UK hosting the summer Olympic Games. In deciding to host this globally significant sporting event, the country has become a potentially major target for those who would wish to cause harm on the world stage. Olympic Games security planning has been ongoing since the International Olympic Committee (IOC) awarded the Summer Games to the UK. Arrangements are widely regarded as the most robust defensive security model delivered in the history in the Games. Counter Terror Expo delegates will gain valuable insight into this planning in the immediate run up. L
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Venue details, travel and opening times
KENSINGTON OLYMPIA
Olympia opened its doors to the public on Boxing Day 1886 when people flocked to see the Hippodrome Circus – some 400 performers, 300 horses and six ‘funny’ elephants. Olympia Grand Hall is famous for its stunning Victorian architecture, magnificent galleries and ornate barrel-vaulted roof, and provides a dramatic setting.
COUNTER TERROR EXPO OPENING TIMES 25 April 09:00 - 19:30 26 April 09:00 - 16:30
HOW TO GET THERE BY TRAIN
Kensington Olympia (Mainline trains)
Silverlink and South Central Trains run direct services to both these stations from Clapham Junction, Gatwick Airport, Brighton, Watford Junction, Milton Keynes, Northampton and Rugby. For National Rail enquiries phone +44 (0) 8457 48 49 50.
BY TUBE
Kensington Olympia (District Line) For further information call London Underground Travel Information +44 (0)20 7222 1234
PARKING
If you intend to drive to Olympia, due to limited parking available it is advised to pre-book. For further information visit the venue website at www.eco.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
21
THE NEW TrijicoN SrS™
Dual Power Souces: Solar Cell & Single AA Battery ACOG® Ruggedness No “Tube-Effect” and Less Rail Space 1.75 MOA Dot for Quick Acquisition 10 Brightness Settings (including 3 NVG Settings) Made in the USA © 2012 Trijicon, Inc.
Fredericksburg, VA USA
1-540-286-1827
PML7008-1 Rev(1)
www.trijicon.com
COUNTER TERROR EXPO 2012 FLOORPLAN
NAT ME
NA BR
Ticket Collection Entrance
ROO
UBI FR DAY & DAY
MEI M
P
Gate K FIRE EXIT
FIRE EXIT
21 Person
LIFT 32
FACP
A110
21 Person
LIFT 33
A105
A80
A100
t
FACP
FIRE EXIT
ACCESS CONTROL SHOWCASE
HR R
B112
A130
DELEGATE & SPEAKER CATERING
SECURITY VERIFICATION C176
CLOAK ROOM
B110 B106
B111
D176
D180
D170
C165
B104 B102
D130
B96
B97 B95
B99
D111
C110
C104
C100 C98 C96 C92
C90
WORKSHOP THEATRE 1
D90
C111
C109
C105
D106
D140
E190
B100
B105
D110
C160
B98
B109 B107
C112
D112
D181
D182
A (
D109
D120
D91
ACCESS CONTROL SHOWCASE
E193 E195
E194
E181
E178
E180
E177
E182 E186
E176
E160 E158
E174 E167
E140
E170 E165
E179
E159
E183 E184
E192
E150 E148
E155
E130
E120
E149
E116
E110
E100 E96
E90 E89
E109
E119
E139
E106
E166
FIRE EXIT
H204
F190
F194
F185
F181
EXHIBITOR LOUNGE F154
H202
F152
F150
ARMOURED VEHICLE ZONE
G194
G180
G190
G160
G200
WORKSHOP THEATRE 3
G202
FIRE EXIT
H194
H190
H185
H191
H192
H180
H176 H174 H170
H179
H175
I180 I175
H160
F140
F130
F120
F121
F131
F119
F115
G140
F132
G139
G131
I170
G110
G116
F100
G106
G108
H110 H108
WORKSHOP THEATRE 2
H109
G102
H100 H96
H107
I160
I150
I110 I108
I159 I155
I149
I109
I139
G95 G
G105
G100
G109
G119 G117
F90
F105
F109
H150 VISITOR SEATING
I179 I178 I177 I169
G120
F106
F110
G103
H92
G97
H88
H97
I106
I107 I105
I100
I98 I96
I99
I95
I90
I93
I89
ATM (temp)
VISITOR SEATING
VISITOR SEATING
J160
HR
J110
FACP
HR
FP
R
J108
FACP
Workshop Theatre 3 CBRNE - DAY 1 ELECTRO OPTICS - DAY 1 SURVEILLANCE, DATA AND INTELLIGENCE - DAY 2 COMMUNICATIONS SYSTEMS - DAY 2
Workshop Theatre 2 HUMAN FACTORS - DAY 1 PERSONAL PROTECTION EQUIPMENT - DAY 1
J100
Up to First Aid
CRUSSH Hospital Ave Link Entrance
J104
Up To Ladies and Medical Centre
FIRE EXIT FIRE EXIT
TO CONFERENCE THEATRES
PROTECTING CROWDEED PLACES DAY 1 & 2 ACCESS CONTROL - DAY 2 AON - DAY 1 SCREENING AND SCANNNG - DAY 2 CYBER SECURITY AND ELECTRONIC TERRORISM DAY 2
J98
R
FA
FACP
ROOM 1
KITCHEN
TO MEET THE BUYER PROGRAMME - INVITE ONLY
TO BIOLOGICAL EETING - DAY 1
ATO PRIVATE RIEFING - DAY 2
VIP LUNCH – INVITE ONLY
ROOM 2
AEV SECURITY WORKING GROUP MEETING - DAY 2
THE HENLEY SUITE
PROTECTING CROWDEED PLACES DAY 1 & 2 AON - DAY 1 CYBER SECURITY AND ELECTRONIC TERRORISM DAY 2
OM 3
RANCE Y1 & Y2
HR
H2O
STAIRS TO GROUND FLOOR
Stairs To/From Ground Floor
ROOM 4
MEETING DAY 1
PSSA - DAY 2
STAIRS UP TO OFFICES
Conference Theatre Pillar Hall Global Counter Terrorism Day 1 & Day 2
Gate L Baby Change
EXIT
FIRE EXIT
Baby Change
FRENCE PAVILION
Taste Italia
FACP FACP HR R
the Orchard
Access Required To Lift Machinery
A70
A60
A68
ATM (temp)
A50
A45
A40
A30
FIRE EXIT
A20
GERMAN PAVILION
ATM (temp) R
R
FRENCH PAVILION B70
B59
B50
B67
B69
SEATING
B60
B66
B56 C86
C80
C75
C74
C78
C76
C73
D80
D78
D70
D79
C70
B33
B25 B24 B23
B55
B32 B31 B30 B29
B28
B22
B21 B20
C50
C46
C40
C28
C20
C16
C27
C19
C15
C56 D56
D60
C36
C30 C31
C32
C52
D50
D52
D45 D40
D20 D19
D31
D51
D71
D21 D35 D38
E70
E80
B01
SEATING
B44
C60
D73
B36 B35
B49
B37
E65
E63
D30
C01
C10
D02 D18
D25 HR R H2O
D26
D01
D23
D32
D22
E60 D24
Up
Pre Registration Entrance
GERMAN PAVILION
F80
F60
G90
F50
G60
G56
H76
H70
H71
H65
H74
I80
I78 I76
I85
I79
I75
J80 J79
G50
G41
H60
H50
H46
I50
I70
J78
F22
F19
F18 F01
H40
VISITOR SEATING
J74
I42
I52 I49
FACP
FIRE EXIT
R
DP Cappucino Express
HR
J42
J40 J39
Workshop Theatre 1
G02
H36
H30
H26
H31
H22
I30 I35
I19
I29
J30 J29
K36
Bar Cafe
VISITOR SEATING
I27
J24
J20
J22
R
FACP
J23
K34
Stairs to Gallery
J18
J25
J21
K32
FACP
ROLLER SHUTTER DOOR
ROLLER SHUTTER DOOR
USA PAVILION
FIRE EXIT ROLLER SHUTTER DOOR
TO CONFERENCE THEATRES
Disabled Access
K30
USA PAVILION
FIRE EXIT
London Room Conference Suite CNi - Day 1 & Day 2
H20
H32
CCTV - DAY 1 BUILDING AND FACILITIES - DAY 1 PERIMETER SECURITY AND INTRUSION DETECTION - DAY 2 IEDD - DAY 2
G01
F36
F33
G42
J44
K40
H2O R HR
I40 I41 I39
F02
F12
F24 F34
H42
I74
F32
G40 G43
H62
I86
ACP
F31
G52
G66 G64
H80
F20
G45 G44
G88
H82
F30
F40
F23
IEDD DEMO AREA
Olympia Room Conference Suite DSEi Briefings - Day 1 TSU Meeting - Day 2
FACP
PROTECTING CROWDEED PLACES DAY 1 & 2 AON - DAY 1 CYBER SECURITY AND ELECTRONIC TERRORISM DAY 2
COUNTER TERROR EXPO 2012 FLOORPLAN
A M AT T E R O F N AT I O N A L S E C U R I T Y
COUNTER TERROR EXPO EXHIBITORS
EXHIBITORS 3DX-RAY Ltd 3M Cogent Inc 5 Stones intelligence A E Solutions (BI) AB Precision (Poole) Ltd Abloy UK Access Management Solutions Access Risk Control Ltd Adani Limited ADS AGXA Aid Training & Operations Aigis Blast Protection Ltd Alford Technologies Allen-Vanguard Allens Total Perimeter Security Ltd Altadona SA Analysed Images Ltd Andrews & Wykeham Applied New Technologies Aon Risk Solutions Applied SatelliteTechnologySystems APT Security Systems ARINC Ascot Doors Ltd ASI/CTG Asis Chapter 208 UK Asquith College ATG Access ATG Sitec GmbH ATOM Training Audionation-UK Ltd Autoclear Avon Barrier Co Ltd Avon Protection Systems Axon Cable Ltd B&W International GmbH BACTEC Bannerbridge plc BBI Detection BCB International Ltd BDEC / BRITISH SECURITY BECATECH Beechwood Equipment Bellwood Prestbury Limited Berkeley Varitronics Systems Betafence Ltd Birmingham Barbed Tape BMS Broadcast Microwave Services Europe GmbH Booth Industries Ltd Bosch Security Systems Ltd Bridge Systems Ltd Britannia 2000 Ltd Briton EMS Ltd Britpave Broughton Controls Ltd Bruker Daltonics Ltd Buckinghamshire New University Business Insight3 Calumet Photographic Canon UK Ltd
H50 H31 C36 E110 D180 G140 J10 F19 D50 H175 68 D111 G56 E65 H160 F50 D110 G88 D51 D24 C56 B106 E106 J18 B96 B104 H174 I105 F181 A40 E65 B70 G41 F19 F131 I42 D25 D182 I79 H185 G109 F24 E90 C31 B98 I27 G108 F119 ??? D22 F02 F140 G42 E96 I175 E116 H12 A80 I35 G117 G4 G4
CBRNe World CDVI UK Ltd CEFA CEIA SpA Cellebrite Mobile Synchronization Ltd Chemring Defence UK Chemring EOD Ltd Chronos Technology Limited CitySync Ltd Clarion Defence and Security CNIguard CNL Co-Decision technology Cobalt Light Systems Cobham COFREXPORT Cognitec Systems GmbH Consolite Forensics Ltd Cortech Developments Counter Terror Business Cova Security Gates Ltd Covert Hides CP Cases CPM Elettronica SRL CPM Group Ltd. CRH Fencing & Security Group (UK) Crib Gogh Ltd Crisis Response Journal Cross-guard/ Bradbury Security CSECO Custom Interconnect (CIL) Cyalume Technologies SAS D.J. Goode & Associates Ltd Darfen Durafencing De Beers DebTech Defence Management Journal Detection Technologies Ltd DEVERYWARE Diamond Aircraft Industries Digital RF Ltd DM Systems and Test DM+ Security DMS Technologies Draeger Safety UK Ltd DUCON Europe GmbH Dynasystems Ltd Dytecna Limited Eagle Automation Ltd ECA ROBOTICS ECT Industries EDSL Ltd Electrosonic Ltd Environics UK-Vantage Safety Ltd Environmental Defence Systems (EDS) Esri Etherstack Ltd Excelerate Technology Ltd Expert System S.p.A Explora Security Ltd Explosive Learning Solutions Extendor/ Professional Barrier Systems Farmingtons Automotive GmbH
H190 E176 B25 E89 B56 F22 F22 G116 E149 J160 C86 D78 B37 J98 F18 B30 C74 C78 H40 I108 G50 I75 D01 G40 C46 F12 E110 C32 B50 C110 H92 French Pavilion C73 H12 B44 E178 I30 B31 I49 G102 I149 H65 I29 F152 G119 H100 F106 C40 C98 French Pavilion I160 I30 F33 C27 J24 B107 F30 G95 C10 I50 I95 G190
Fendor Ltd Fibre Technologies Limited Fibreco Field Forensics Inc FISCAN Fischer Connectors Ltd Flir Systems Focus 2000 Infrared Forensic Pathways Foster & Freeman Ltd Fotech Solutions Franklins International Frontier Pitts FUJIFILM Europe GmbH Furnitubes International Ltd Future Fibre Technologies Ltd G3 Defence G6-Global Gallagher Security (Europe) Ltd Game Engineering Ltd Garrett Metal Detectors Gas Data Limited Genalog Ltd General Dynamics UK Limited Geoquip Limited Ginsbury Electronics GK PROFESSIONAL Glass and Glazing Federation Glenair UK Ltd Global Media Applications Goodwolfe Energy GPS Perimeter Systems Ltd GSA Exhibitions Pte Ltd Guartel Technologies Ltd Gunnebo UK Ltd Hardstaff Barriers Harper Chalice Group Ltd HC Security Solutions Heald Limited HeatArmor LLC Heras UK Fencing Systems Hesco Bastion Ltd HGH Infrared Systems HITEK Electronic Materials Holmatro UK Horus Security Consultancy Hosokawa Micron (HML) HS Security/Barkers /Bristorm/Access HyGie-Tech SA ICM X Ray ICTS (UK) Ltd. ImageWare Systems Inc. Imix Vision Support Systems IndiComm Global Limited IndigoVision Ltd Intelligent Security Ltd Interconnective Ltd Intergrated Security Manufacturing International Procurement Services (Overseas) (IPS) International Professional Security Association (IPSA)
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
A70 B69 C112 J23 E140 D52 F90 H70 G45 I70 H46 H176 H108 H110 C104 B67 I177 C60 D90 I74 D120 C176 H76 D18 H12 B66 French Pavilion B111 D80 I180 H88 D45 I98 D176 D30 F40 E100 F40 H71 J21 H12 D31 I40 D130 E179 E194 I109 E80 J78 G100 D32 K40 G66 I159 G160 C105 A50 I30 D112 c165
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
27
An OSI Systems Company
MORE.
SCAN
SECURE MORE.
Rapiscan Systems - the Leading Provider of Security Screening Solutions Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it. With the broadest range of products for major events, aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fullyintegrated security solutions.
Metor 6M
And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget. To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).
Rapiscan 620DV
Come and visit us at Counter Terror Expo 2012, London Olympia, April 25-26, stand number E70.
Rapiscan Systems is the official security equipment and systems supplier for the London 2012 Olympic and Paralympic Games.
sales@rapiscansystems.com • www.rapiscansystems.com
Rapiscan 638DV
ONE COMPANY - TOTAL SECURITY
COUNTER TERROR EXPO EXHIBITORS (cont) Intersec IntSec Ltd iRobot Corporation J + S Franklin Ltd - DefenCell Jacksons Fencing James Fisher Inspection and Measurement Jankel Armouring Limited JB Corrie KABA LTD Keela International Kenko Tokina Kenwood Electronics UK Ltd KeTech Systems Ltd KI Canada I Kingsley Plastics Ltd Kinneir Dufort Kirintec Ltd L-3 Security and Detection Systems L-3 TRL Technology Land Rover/Jaguar Lapa Security Solutions Ltd LDS (Laser Detect Systems) Ltd Lemo UK Ltd Lesar UK Limited LINCAD Lincoln Security Ltd Link Microtek Lista UK Littlewood Fencing Logically Secure London Chamber of Commerce Lowa LPCB (BRE Global ltd.) LYYN Maritime Guard Group Marlborough Communications Marlow Ropes Ltd MAS Zengrange Ltd (A Member of Hall & Watts Defence Group) Matt Black Systems Meesons Melaphone Vis Audio MG Squared Lowering Systems MGT Europe Microsemi Corporation /Brijot Imaging Systems Microwave Amps MIL-SIM-FX International Milipol Military Technology Mirion Technologies Mobile Mark Europe Ltd Molecular Products Ltd Morgan Marine Limited Morpho Detection International Morse Watchmans UK Ltd MSS Professional Ltd MultiX Nallatech NCTech Ltd Nemtek Netco NIC Instruments Ltd Nikon UK Northcott Global Solutions Northrop Grumman Nuvia Objectivity Inc Odu Ltd
F20 C80 G131 F36 F110 B49 G194 D91 F23 C75 J108 D70 D19 E186 E150 C20 E183 F100 F100 G180 H42 D38 E120 I52 C50 E192 E195 D73 G110 I110 I90 F154 B01 I89 I139 G106 I107 G120 I106 E130 H192 J42 G64 K30 H194 I150 B22 J79 B49 H74 D181 B95 G52 I41 I85 B23 I96 E159 I178 G64 D60 I86 C90 F60 C19 J22 D23
Omnetics Connector Corp Openhouse Products Optex / Fiber SenSys Optical Sciences / ATI Ovation Systems Ltd Panasonic UK Ltd Peli Products (UK) Ltd Pensher Skytech Pentax Ricoh Imaging UK Pickersgill-Kaye Ltd Plantscape Ltd Police Product Insight Magazine Policing Today Magazine Primetake Ltd Procter Fencing Systems Proengin Professional Protection Systems (PPS) Project Support Vehicles GmbH Protaurius AB Protechnic Ltd Protel (Professional Telecom Solutions) Proteus Project PSF Wales Limited PSSA Quebec Government Radio Tactics Limited Radiocoms Systems ltd Ramora UK Rapiscan Systems Ltd. RCS S.p.A. REBS H.ENRIKSEN RED Scientific Reliance High-Tech Ltd Remploy Frontline RFA Security Services Rhino Engineering Ltd Roke Manor Research Ltd RSDecon S MacNeillie & Son Ltd Saab Technologies UK SafetyFlex Barriers SAIC/SET Salzer GmbH Savox Communications Scanna MSC Ltd Scotty Group SDS Group Ltd Sea & Sea Ltd Securiclad Security Blinds Ltd Security Institute Security Labels International Security Watch UK Select Cables Ltd Selectaglaze Ltd Sellex International Senstar Sepura Plc SeSys ShawCity Silent Sentinel Ltd Simtec Solutions Limited Smiths Detection Southwest Microwave Ltd SP Services (UK) Ltd Spectra Group (UK) Ltd SSAIB Stafford Bridge Doors Ltd
H76 D02 G90 C16 G103 I155 D109 G97 I80 H60 F34 J80 G200 H80 E160 B32 E155 F185 B60 J40 C109 H204 B95 E177 E180 B105 C100 F32 E70 F121 B97 I179 E160 H107 D140 A110 F22 C28 C160 H62 F130 D79 G119 F105 D170 I49 J74 B109 E148 I99 I170 F109 F31 G02 H82 I76 D20 C96 H109 I100 B102 I169 E60 D106 A30 A20 H179 G01
Steatite Ltd Steelway Stemmer Imaging & Xenics Steria STOOF International GmbH STREIT Group Sunray Engineering Ltd Surelock McGill Ltd Sykes Global Services Limited Synectic Systems Group Ltd SystemWare Europe Ltd T W Kempton (Corporate Clothing) Ltd Tactical Defence Media: Armour and Mobility Tactical Electronics Tata Steel Projects Terma A/S Terrafix Ltd Tetracore, Inc. Thales Communications The Enigma Encoding Co Ltd The Expanded Metal Company The Medical Warehouse Ltd The OGara Group-Sensor Systems Division The Panic Room Company The Protector Group Theil Ltd Thermo Fisher Scientific Thermoteknix Systems Ltd Timespace Technology Ltd. Tindall Engineering Ltd Todd Research Limited Totalpost Services Plc Townscape Products Limited Tracerco Monitor Services (A Division of Johnson Matthey) Traka Plc Transeco TruePosition, Inc TRW Conekt Twisted Pair Solutions U.S. Commercial Service UBI France University College London Department of Security and Crime Science Ultra Electronics Vale Security Solutions VCS Ltd Vemotion Verney Carron SA Vigilant technology UK Visor Systems Ltd VOTI Wagtail UK Ltd Warrior Doors Ltd Wavestore Ltd Wiley X Europe LLC Winkelmann Wolfcom Enterprises WorldSecurity-index Xanalys XTSafety LLC Zaun Ltd Zinn GmbH
H170 B59 B99 D21 F194 I19 E139 C70 C92 F150 I39 H97 B112 C15 F132 B55 F120 J20 G44 I93 D40 C90 E109 E184 J110 H32 C01 H96 F115 A105 G60 D56 H30
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
B110 H20 F160 J39 C111 J30 J44 B35 G20 D35 H26 D140 C76 B29 I78 C52 E181 F01 H36 D71 G105 E119 E63 B100 C30 G139 F40 G119
Stand numbers correct at time of going to press.
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
29
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THERMAL IMAGING
EMBRACING THE LATEST THERMAL TECHNOLOGY Argus introduces its latest range of thermal imaging cameras for law enforcement agencies There’s no doubt that our law enforcement officers rely ever more heavily on new technology. Highly advanced equipment helps police to locate criminals, communicate clearly and quickly, and keep the peace. The latest technologies are important investments, providing evidence and allowing the police to be more efficient in carrying out their duties. One particular piece of technology in increased use is the thermal imaging camera. If you’ve seen the news lately you will have heard about the recent London protests, where thermal imaging cameras were used on police helicopters to monitor the event. It’s a demonstration of the wide uses of thermal imaging – but it goes beyond simply locating people. Leading the market in highly advanced thermal imaging cameras, Argus cameras surpass their competitors in technology, providing a range of settings and viewing options, with increased accuracy for use in many policing applications. ARGUS TT TYPE In early 2012 Argus thermal imaging will launch a range of cameras designed with the guidance of a number of specialist police and security departments. The range will include a thermal torch for first responders called the Argus TT Type, a monocular camera called the Argus P Type for covert surveillance, and a specialist search camera called the Argus F Type. The TT may resemble a normal torch but benefits the user in countless ways a torch never can, providing patrol officers with the ultimate advantage over criminals. Not only does it detect the heat signatures of people and objects in daylight hours, it also provides an abundance of additional advantages in the dark of night. Officers can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. They can scan car parks, where they can see suspects hiding between cars, and can identify vehicles that were recently driven. When used in total darkness, officers can go virtually undetected, as they search for prowlers, and other criminal behaviour. Officers will be able to use this new technology for a range of patrol applications including: fugitive/suspect search, officer safety, search and rescue, detecting evidence, routine patrols, training and assessing, routine raids, occupancy evaluation and collision investigation.
ARGUS P TYPE The Argus P type is a handheld, robust, simple-to operate, lightweight monocular thermal imaging camera which can power up fast. It is capable of withstanding harsh environments and provides the most superior features available on the market. Designed using sophisticated digital technology, the P Type offers users advanced thermal image quality, providing video recording and image capture to support the gathering of evidence. The P type has interchangeable lenses so will be a fantastic tool for covert surveillance operations, officer safety, fugitive/suspect search, collecting evidence, border surveillance and marine patrol. ARGUS F TYPE The Argus F Type offers a simple-to-operate configuration; it is a robust, self-contained camera with fully automatic operation. The camera is lightweight at less than 3lb and specifically created to help police and security personnel to detect heat signatures in specialist search operations. The F type uses a high-resolution 320 x 240 pixel Amorphous Silicon (ASi) microbolometer detector. It has been designed using advanced digital imaging technology providing it with the sharpest picture available and superior performance. The F Type comes with the most advanced features available in any thermal imaging camera on the market and is a superb tool for applications such as: • Drug interdiction operations • Detection of hidden compartments • Finding embedded electronic equipment The benefits to law enforcement agencies are clear: suspects can be caught quicker using less manpower and most importantly thermal imaging keeps the good guys safe and one step ahead of the criminal. The cameras are not as expensive as you might think, Argus cameras have been designed to keep purchasing cost down, creating affordable effective tools for the fight against crime. Clearly these cameras have a wide range of applications. Why not witness them yourself? The Argus sales team will be demonstrating its new range of cameras at the Emergency Services Show in the UK, as well as Intersec in Dubai. This new range of cameras will be available to purchase in the new year why not book a demonstration now? L FOR MORE INFORMATION www.argus-tics.com
Drug interdiction
Suspect search in woodland
Argus TT Type – officer patrol
Argus P Type – covert surveillance
Argus F Type – specialist search
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
31
DESIG N
STEELWAY
Protect
E X P E R T S
I N
MANUFACTURE INSTALLATION
S T E E L
• Kiosks • Cages • Window Bar Sets & Grilles • Access Covers • Single Skin Door • Double Skin Doors • Perimeter Security • Ancillary Items •Supply only or Supply & Install
Steelway Protect, is a new and continually expanding range of high security fabricated steel products. The range currently includes a multitude of physical protection products, at varying levels of specification, certification and accreditation. These include rigorous testing from BRE’s Loss Prevention Certification Board an independent third party approvals organisation who’s rigorous testing’s and approvals are carried out by recognised industry experts from world class facilities. In today’s climate, security is a primary concern for most people thinking of asset protection and personal safety. At Steelway, we have recognised the need for high security products that provide maximum protection from not only minor vandalism or opportunistic thieves, but also aggressive intrusion or terrorist attack. The correct specification of approved security systems and products is critical to protecting buildings and their occupants from crime and terrorism. The flexibility of the Protect range enables you to choose the right product, with the right level of security, in a cost effective manner for the application area to be protected.
Tel: 0121 521 4525 Fax: 0121 521 4551 Email: marketing@steelway.co.uk
www.steelway.co.uk
CTSS AWARDS 2012
Addressing the security threat through product innovation
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR EDUCATION – www.educationbusinessuk.net
To be held on the 25th April after day one of Counter Terror Expo, the CTSS Awards will showcase the best in counter terrorism and security products from companies around the globe Organised by A-Z Group in association with Counter Terror Expo, the prestigious CTSS (Counter Terrorism and Specialist Security) Awards celebrates excellence and achievement in counter terrorism and specialist security. Companies from across these arenas submitted a vast range products and services for consideration in 12 categories. After being reviewed by the official judging panel of counter-terrorism experts, almost 50 products made the shortlist. Voting went live on 14 February, with the winners to be decided by industry vote, independently audited, with the results announced at the CTSS Awards Gala Dinner after day one of Counter Terror Expo. The shortlisted products all demonstrate innovation and progress. ACCESS CONTROL, ID AND BIOMETRICS Abloy UK - CLIQ Remote CLIQ Remote was developed to enable the use of truly intelligent keys and solve a number of end-user issues, while integrating into existing master key systems. The uniqueness of CLIQ Remote comes from the ability to update in real-time
over the Internet and even using mobile devices, as well as integrating with padlocks. Security managers are able to easily change the access rights to doors in the system remotely in real time. Key holders can thus be given time schedules for planned work and operating hours. The system is ideal for managing access to multiple sites remotely, with a full audit trail for both keys and locks so complete information exists regarding key usage and site visits. Keys are updated using wall mounted or mobile updating devices. The mobile devices use GSM technology and can work over a mobile phone connection. This is ideal where access is required to a facility at short notice, such as for repairs, maintenance or emergencies. Access Management Solutions - Flex Flex enables absolute control over who may enter remote buildings or access infrastructure by enabling controlled access to sites using the power of a remotely dispensable and controllable intelligent key. The keys become valid when authorised by
use of a card/PIN combination, after which their time-restricted use is fully accounted for. Flex is ideally suited to utility companies and those charged with the protection of critical national infrastructure (CNI), including telecoms, rail and aviation. A user with legitimate reasons to access CNI benefits from the knowledge that the activity is controlled and monitored – despite the site being remote. No additional equipment to achieve access needs to be taken to the site. When on site, access to intelligent keys may be authorised interactively, or be pre-arranged. Meesons Al Ltd - Smart Access Control System – SMACS SMACS works by increasing existing security systems’ functions with enhanced recognition and bio-visual body mass analysis, thereby eliminating the threat of tailgating. This system can identify the individual requesting access based on their body mass, confirming they are the owner of the access control card. It also determines whether the person is alone. Access is only granted E
Land Rover Discovery 4 Armoured
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
33
Advanced Technology and Products for the Most Difficult Missions
The Sensor Systems Divison of The O’Gara Group is a leading designer and manufacturer of Imaging, Beacon and Laser Systems for Special Operations Forces.
Imaging Systems include low
Beacon Systems include Combat Identification / Identification of Friend or Foe (CID/IFF) as well as Tagging, Tracking, and Locating (TTL) systems. Our products are available in spectral bands that include UV, Visible, NIR, SWIR, MWIR, and LWIR.
profile, digital, and fused night vision devices; Heads Up Displays and viewers for night and day applications (HUD / HMD); and Intelligence, Surveillance, and Reconnaissance (ISR) equipment in the Visible, NIR, and SWIR spectral bands.
.ogara ogarasensor sensorsystems sensor systems.com
www
ContaCt: sensors@ogaragroup.Com phone: +1 (937) 490-2509
Laser Systems manufactured include illuminators, pointers, and designators. Our products are available in spectral bands that include UV, Visible, NIR, SWIR, MWIR, and LWIR.
CTSS AWARDS 2012 CTSS Awards Judging Panel MIKE BLUESTONE
Mike Bluestone is the director of security consulting for Corps Security. He is a Fellow and current chairman of the Security Institute. As an experienced security consultant and trainer, Mike has served in the military both in the UK and overseas and provides advice and guidance on counter terrorism, political extremism and crime prevention to public and private sector organisations. He has over forty published articles on security related issues.
ROBERT DE LA POER
Robert de la Poer is a journalist specialising in defence, homeland security and counter-terrorism. Having studied at Cardiff University’s School of Journalism, Robert worked as a reporter on such titles as Defence International, Naval Power, NBC International, Security and Protection Technology, CBRNe World and Resilience. In 2005 he was appointed editor of Resilience before moving to intersec in 2006. In early 2009 Robert co-founded publishing house Albany Media which now publishes intersec.
CHRIS PHILLIPS
Chris Phillips is the founder and managing director of the International Protect and Prepare Security Office, starting the company after thirty years as a Police officer. He has extensive policing experience in both public order and community based policing, and has been event commander for major sporting events and concerts at Twickenham Stadium. His specialism is in the field of strategic Counter terrorism advice and best practice. As head of the National Counter Terrorism Security Office he had three major responsibilities within the United Kingdom.
E if they match the body mass associated to the access card and if they are alone. So in the event of a card being stolen or used by another, access will not be granted. The SMACS range can be made to fit any situation, including the transit of materials or luggage, and ensure smooth and fast flow of personnel through a secure area. Where the transit of multiple authorised personnel is required, SMACS entry will allow access to all users who present their relevant identification to the access control devices. Should a user fail to present authorised identification, SMACS Entry will trigger an alarm output and the event will be reported to a security system. ARMOURED VEHICLES, SUPPORT VEHICLES AND EMERGENCY VEHICLES Access Risk Control - Mobile Checkpoint Unit The Mobile Checkpoint Unit creates a quick-to-deploy, risk-reducing access control point with screening and scanning provision including: instant area lighting towers, rooftop audience profiling platforms, intelligent CCTV data collection points, iris recognition technology, WiFi and cell mesh, walk-through scanners, conveyor style bag X-ray equipment, and a fully furnished temperature-controlled control room.
CHRIS HOLT MBE
Chris Holt MBE is the consulting director at Aon Crisis Consulting, which works with clients who are exposed to risks from terrorism, political risks, and employee security issues, including kidnap for ransom and extortion. Chris provides technical leadership on the delivery of risk management solutions to global clients; allowing Aon to accurately represent a client’s risk to the insurance market. During his first career as an Officer in the Royal Engineers, Chris served primarily in the field of security and counter terrorism; including bomb disposal, high risk search and unit security appointments. He has a detailed technical understanding of CBRNE threats, and organisational resilience planning. Since leaving the Army in 2005, Chris has been employed predominantly in consulting and special risks management.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
KERRY UNDERHILL
Kerry has been a senior procurement manager at the Olympic Delivery Authority (ODA) for three years, having worked for CLM, the ODA’s Delivery Partner, for eighteen months prior to that. She specialises in security as the category lead for Transport and Professional Services, and is a full member of the Chartered Institute of Purchasing & Supply (CIPS) part of the ODA’s award winning team - Best Public Procurement and Overall Winners 2011. Kerry began her career with BAE Systems in 2003 following an honours degree in Business Administration at Cardiff University. Having worked in many areas of the company, she opted to spend the majority of her time working as a Project Procurement Manager on FALCON, a secure communications system for the UK MoD.
The primary objective of the Mobile Checkpoint Unit is to reduce the risk of weapons, terrorism devices and individuals breaching a security cordon. The unit can be set up in 30 minutes and provides a wide range of options for risk reduction. Most importantly, the unit is mobile and it is supplied in a box trailer. The Mobile Checkpoint Unit is ideal for use anywhere a security risk exists, including prisons, schools, football stadiums, airports, sensitive buildings, police stations and public order areas. It can also be used by military establishments and in a theatre of war for site protection. Excelerate Technology Ltd - Integrated Mobile Command Vehicle (IMCV) The Integrated Mobile Command Vehicle’s primary function is to improve public safety responses by emergency and security services with advanced, fully integrated and easy to use incident management solutions, where public or terrestrial communication services are not available. The unit offers real-time information access and full communications interoperability using voice, video, Internet and data over mobile satellite broadband and wireless networks to give emergency commanders and their support teams access to as much E
Rapiscan Systems - Rapiscan Eagle T10
VIT Security Group Ltd - Longview 2
Cova Security Gates - CSG 10140 crash-tested sliding cantilevered gate
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
35
HAZARDOUS MATERIALS CONTAINMENT AND PROCESSING SOLUTIONS
STAND No.
I109 Counter Terror Expo
Hosokawa Micron Ltd. offers a wide range of standard and bespoke containment solutions for the safe handling, analysis and processing of hazardous materials. Systems supplied include gloveboxes, downflow booths, laminar flow booths and fume cupboards, ranging from small portable units to large scale integrated facilities including lead shielded systems. Bespoke applications include full glovebox integration of forensic analysis and evidence examination systems including Lasers and Microscopes, as well as fingerprint development systems including CNA Fuming cabinets and DFO/Ninhydrin treatment chambers.
Rivington Road, Runcorn, WA7 3DS • Tel: +44 (0) 1928 755100 • E.mail: info@hmluk.hosokawa.co.uk
PROCESS TECHNOLOGIES FOR TOMORROW SM
CTSS AWARDS 2012 E reliable information on what is happening during major incidents as is possible. These solutions allow commanders to communicate management decisions back out to their teams on the ground and to commanders in other services, thereby delivering a common operational picture within individual services and between different services. IMCV is aimed at emergency services, civil defence forces and security/counter-terrorism services. Its key objectives include delivery of a common operational picture with robust, fullyinteroperable communications, all supporting improved decision making by emergency service and counter terror commanders, thereby saving lives and property. Land Rover - Discovery 4 Armoured The Discovery 4 Armoured offers breadth of off-road capability while providing the same levels of B6 protection for occupants as the Range Rover Armoured. Almost indistinguishable from the nonarmoured Discovery 4, the Discovery 4 Armoured is certified by QinetiQ®, and is ideal for both VIP protection and support escort roles – as well as a platform for police and security organisations. Discreetly armoured with its first level protection delivered through its anonymity,
the Discovery 4 Armoured is a fully integrated product with B6 levels of ballistic protection and additional blast resistance. The vehicle offers a flexible seating layout with accommodation for five people. Optimum occupant protection is assured thanks to bullet-resistant glazing, ballistic steel armouring and Kevlar® floor protection. The vehicle retains functionality of the driver and front passenger facia airbags and seat belts comply with EC whole vehicle type approval for anchorage strength and installation. These features help optimise passenger protection. S.MacNeillie & Son Limited Incident Management Unit (IMU) The Incident Management Unit is a fully mobile, future-proof and sophisticated command and control system that provides an enhanced incident ground management system. This has been achieved by equipping the IMU vehicle with PC systems, applications, wireless communications facilities and incident deployable radio equipment, including tablet PCs and CCTV cameras. The IMU vehicle covers potential risks from petrochemicals, through industry, manufacturing, the airport and the docks, as well as those that can arise in inner city areas. It is equipped for all eventualities in an array of locations.
The fully self-sustaining unit provides fast and reliable information exchange between key personnel at an incident. It is capable of simultaneously capturing, coordinating and integrating three separate layers of multi-agency communications in real time. In addition, it can effectively apply its own wireless mesh network around an entire fire ground.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BUILDING AND FACILITIES PROTECTION Aigis Blast Protection - TABRE blast and ballistic partitioning TABRE semi-permanent blast and ballistic partitioning is a walling system that allows enclosed explosives working areas to be simply and easily erected within a factory, preventing fragments, blast effect and sympathetic detonations transmitting from work cell to work cell in the event of an accident. The walls are modular, allowing a variety of configurations, and can include transparent armour as well as vented roofs to enable the continued use of existing factory climate control and lighting systems. Not only do the walls prevent blast propagation, fragments and blast effects, but also they prevent cross-contamination of explosive natures – thereby allowing very different explosive devices and E
ANTENNAS MOBILE MARK
C O M M U N I C AT I O N S A N T E N N A S Anglesey Business Park, Hednesford, Staffordshire, WS12 1NR, UK Tel: +44 1543 878343 Fax: +44 1543 871714 e-mail: enquiries@mobilemarkeurope.co.uk www.mobilemark.com Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
37
CTSS AWARDS 2012 E systems to be manufactured side by side. Although originally intended for munitions manufacturing, the blast and ballistics partitioning has various applications and has been used for protection against blast in hotel lobbies, as safe rooms and as temporary protected buildings for sporting events and in war zones. Becatech Ltd - Watercress The Watercress intruder alarm system was developed to enable water utilities to comply with government requirements regarding the detection of attack on potable water supplies, reservoirs, treatment works and associated buildings. The Watercress solution protects hatches, water tanks, boreholes, water towers, fences, buildings and chemical stores. The sophisticated analytics filter out all environmental ‘noise’ so the false alarm rate is under one percent. The response to an alarm raised from the Watercress system is carried out to by NaCTSO. 87 percent of the UK’s water supply is now protected by Watercress, which exceeds all standards for commercially available intruder alarm systems. It can include audio and video verification and has dual path secure signaling to its own Flightdesk control console, or can be integrated to other PIMS systems.
Abloy UK - CLIQ Remote
Booth Industries Ltd - Booth Modular Wall System The Booth Modular Wall System is a profiled wall structure providing a lightweight solution incorporating windows and doorsets. The modular system provides protection to existing facilities against both accidental blasts and terrorist threats. The Booth system includes both hinged and sliding blast and security doorsets, thus providing a single source supply for blast protection. The integrity of the system also prevents fragmentation and provides projectile resistance. An inherent secondary function of the system is to provide fire protection (usually following a blast). In-house design allows the profile to be tailored to individual applications, with deflection criteria considered and deformation characteristics explored to maximise the potential benefits. The slim blast wall system is erected within a building, thus providing discrete protection without any external visual appearance. The modular steel wall can be dry lined and concealed from internal inspection or detection.
API Hawki Video Aiming Device
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NaCTSO - Vulnerability Self Assessment Tool (VSAT) The VSAT is an online service developed to ensure that all businesses have the ability to conduct a self-assessment of their assets. The objective is for the user to have access to the latest counter terrorism advice and training, thereby enabling the user to identify vulnerabilities and provide a means to reduce or eliminate these security issues. Not only does the VSAT provide the user with an assessment covering physical security, IT, housekeeping, personnel and risk management, it provides a bespoke survey report based upon the user’s input. The system secures the data and protects the commercial interests of its users. The VSAT system allows the user to conduct an online 32-question assessment, which only that user will have access to. Upon completion of the assessment, the user will be able to identify vulnerabilities, and make E
Zaun_Counter Terror Bus 125x178_Layout 1 01/03/2012 09:52 Page 1
The most effective border agency.
Zaun is one of the largest and most dynamic manufacturers of high security perimeter protection systems. Our comprehensive range is at the forefront of design and uses leading production technologies to ensure our solutions combat the rapidly changing security threat. Tested by independent organisations and governments to the most stringent criteria, our systems protect sites of critical and national importance on a global scale.
Tel: +44(0)1902 796699
security@zaun.co.uk
www.zaun.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
39
Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations.
• Powerful • Portable • Quick & silent operation Watch the videos on our website:
Holmatro | Rescue equipment rescue@holmatro.com | www.holmatro.com/rescue
CTSS AWARDS 2012 E reductions in weaknesses. Through continuous assessment, those reductions can be measured over time. The VSAT is the only product of its kind and it is currently available in the UK. It is completely free and also includes business continuity plans. The tool is completely automated and is located on a secure server, utilising the same security controls as online banking.
It is an easy-to-use compressed air foam (CAF) applicator. When a vehicle is struck by an improvised explosive device and is on fire, the people in the vehicle are required to stay with it until the fire is over so they can remove any of the sensitive material, leaving them in peril. The Macaw can extinguish a tyre fire within minutes, improving the safety of military personnel.
Security Blinds - Secur™ Secur™ security blinds are designed to provide physical security for glazed areas to protect against looting, ram raids, blast, secondary blast and industrial explosions. Targeted directly at public and commercial sectors including critical infrastructure, government, embassies, NGOs, banks, control centres, safe havens and guard houses. Secur™ fits most shapes and sizes of openings, and maximises the security of people, assets and business continuity to reduce loss in the event of an incident.
MultiX - ME100 The ME100 is a multi-energy X-ray detection system that can be retrofitted to existing X-ray equipment, improving its performance and matching the ever more sophisticated terrorist threat. The ME100 replaces conventional dual energy detectors with detectors that can count and discriminate between over 256 different energy levels. This information is fed into an algorithm that then detects the presence of threat materials within the X-ray image of an object. Multi-energy data is a better way to discriminate between benign and threat materials than existing dual energy detectors, as it improves detection and false alarm rate performance.
CBRNE DETECTION AND PROTECTION Intelagard, Inc - Macaw backpack The Macaw backpack is a multi-mission allhazard product. The pack can not only fight fire, but can also be used in decontamination and HAZMAT efforts without changing anything except the formula that is added.
Northrop Grumman - Integrated Tactical Rapid Assessment of CBRN Environment (I-TRACE)
I-TRACE provides a flexible multi-layer solution for the monitoring of a CBRN incident, the collection of relevant CBRN data that can be provided to experts at their facilities, and the provision of analysed data to authorised users through a web-portal. The versatile architecture and scalable configuration of I-TRACE make it suitable for use in a wide range of configurations across an array of environments. In the man-portable variant, flexibility is offered that enables transportation in a vehicle (land, sea or air) and deployment in confined or inaccessible locations.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CCTV AND MONITORING Becatech Limited - Mantis RDSS Mantis RDSS was developed in response to a request from the Home Office for a rapidly deployable security system for the protection of VIPs, crime scenes, areas containing seized contraband and country estates. Its primary function is to detect the approach of an intruder from as far away as possible to give the assigned response team time to react before an incident occurs. This is done using thermal images and CCTV running sophisticated video analytics – meaning the cameras/detectors act as alarms delivering footage of the incident trigger and live connectivity E
leading the way in product introduction
• design • rapid tooling • injection moulding • pre-production • quality
www.omega-plastics.co.uk Omega North East Limited 2 Coniston Court, Coniston Road, Riverside Business Park, Blyth NE24 4RP United Kingdom Telephone: +44 1670 541 890 Fax: +44 1670 541 891 sales@omega-plastics.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
41
Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.
www.infranor.com info.uk@infranor.com
XtraforsPrime, AC Servomotors
The Infranor Group is divided into two divisions:
The slot less stator design results in outstanding technical properties such as high speed, high torque, zero cogging, minimal torque ripple, high efficiency and high rigidity. This results in making these motors perfectly suited for various demanding servo applications within the defence, security and flight simulation industries.
The Infranor Division operates as an industryindependent drive specialist, particularly in the general servo and drive technology area. These products and services are used by manufacturers of machinery and equipment in many different industries. The Infranor Division is structured into product companies and engineering/sales companies.
The Inranor Group
The Cybelec Division is a total provider of automation equipment for bending presses including controls, i/o units, fieldbus systems, drives and motors. The company also supplies controls for machine-tool manufacturing and general machine automation.
Infranor creates added value for its customers by providing tailor-made motion solutions. Based on strong working relationships, Infranor offers extensive market know-how, comprehensive engineering skills and a wide range of high-quality products leading to productivity gains and therefore to comparative advantages for its customers in their respective markets.
www.infranor.com info.uk@infranor.com
CTSS AWARDS 2012 E to monitor the events as they unfold. The key objectives of Mantis RDSS are speed of deployment, flexibility of system design, self-supporting power, robust covert and resilient communications, ease of operation, as well as full service delivery and support. BRS Labs - AISight (‘eyesight’) AISight was developed to offer a selflearning behavioural analytic solution capable of delivering real-time intelligence from CCTV surveillance systems, by sending accurate video alerts to the operator whenever unusual or anomalous behaviour is detected within the video scene. AISight sends an operator a brief video clip of an event that has been detected by the system as unusual when compared to its ‘memories’ of stored normal behaviour. The main premise is that there are many millions of cameras deployed but most video is viewed after an event has occurred, which may be too late in certain scenarios. The BRS Labs system offers proactive alerts as anomalous events unfold and can be deployed across many thousands of cameras. The major benefit is twofold; firstly, proactive video alerts of anomalous behaviour are generated in real time and delivered to the operator 24/7 and with no set-up of the system or human intervention
required. Secondly, the system uses many criteria to determine whether an object is behaving unusually which ensures that the operator does not receive false alerts – each alert is a genuinely unusual event. Excelerate Technology Ltd Sherpa post-climbing camera and communications platform The Sherpa post-climbing camera and communications platform provides emergency services, security services, prison services, local authorities, companies, transport networks and border control agencies with a flexible CCTV solution that enables the fast deployment of temporary CCTV coverage where none was previously available. Cameras can be placed high on poles by the Sherpa climbing camera delivery unit without the costs and delays involved with permanent installations. The patented system also allows users to attach various different types of CCTV cameras already held in their equipment inventories, thereby giving them even greater value for money from their CCTV camera investments. VIT Security Group Ltd - Longview 2 Designed for professional surveillance use, the Longview’s unique three camera and dual lens technology offers the ability to
view in high resolution colour by day, ultralow light (0.00003 lux starlight at night) and uniquely, through a broad range of visibility-reducing conditions such as smoke, fog, dust and heavy rain at distance. The specialised optics offer 6 to 100x optical zoom ability to view objects and persons from a few metres to up to several kilometers away in the day and night conditions, providing evidential quality images at distances up to 20km. The Longview’s capacity to provide evidential quality images in situations of compromised visibility, near darkness and at long distances makes it ideal for the security needs of borders, sea ports, harbours and airports, all of which carry the responsibility for the security of the public, assets and even nations.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COMMUNICATION SYSTEMS Altadona S.A. - 4DScape®™ 4DScape®™ was developed post-September 11th in response to an evident governmental need to synchronise and integrate silos among a broad range of security systems into one common operating environment. It reduces operating costs and response times by converting raw data into intelligent information in one visual portal. 4DScape®™ is a groundbreaking security solution that is leading the market in E
POWER SUPPLIES BATTERY CHARGERS
tom Design rters • Cus e v n I C A / rs • DC onverte DC/DC C
Contact us for quote: +44 1722 504853 • sales@mascot.no
Quality since 1938 www.mascot.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
45
Security Rated GRP
Morgan Marine Limited is the ONLY Company to successfully test and certify an Enhanced GRP construction to LPCB SR level 2 and 3. Available with double or single door options with enclosure sizes from 1m2 up to 30m L x 14m W x 5.0m High. This provides our clients with an alternative material than steel. Applications particularly suited for this construction are dosing, borehole and wash water kiosks. Thermal U Value of the enclosures can be from 1.8 W/m2/oC as standard but by incorporating different composites can reach a U-value up to 0.25 W/m2/oC. Aesthetically the buildings can be supplied with a textured, brick, stone, wood effect finish with an option for a slate effect roof. To suit our client’s needs doors have been tested with a number of different types of locks from single point, pad lockable through to euro and oval cylinder 3-point locking systems, proximity readers can be incorporated Morgan Marine Limited & PSF Wales Limited, part of the Morgan GRP group of companies offers a full range of security Enclosures protecting key assets against vandalism, theft, contamination and terrorism. Our sister steel company PSF Wales Limited supplies steel housings and single and double door sets, both insulated and non-insulated from SR2 to SR4 ratings. From 1m2 up to 25m long x 10 m wide x 4 m high.
Morgan Titan SR3 Approved to LPS 1175: Issue 7 Security Rating 3 Cert. No. 1051a/02
Quality, Service, Flexibility Morgan Marine Limited, Llandybïe, Ammanford, Carmarthenshire, SA18 3GY, UK. Tel: (+44) 01269 850437 Fax: (+44) 01269 850656 Email: sales@morgan-marine.com
PSF Wales Ltd Llys Rhiannon, Cil yr Ychen Industrial Estate, Llandeilo Road, Llandybie SA18 3GY Tel: 01269 851777 Fax: 01269 851747 Email: sales@psfwales.co.uk
Visit us at Counter Terror Expo 2012 Olympia, London – Stand B95
CTSS AWARDS 2012 E security systems integration. The main factor setting the product apart is that it is ‘hardware agnostic’, meaning that any investments already made in security systems will be amortised rather than ‘ripped and replaced’. Cellcrypt Ltd - Cellcrypt Mobile Cellcrypt Mobile enables large-scale endto-end protection of sensitive mobile phone conversations from interception in an easy and high-performance, yet highly secure, solution with no specialist equipment. Traditional government and military cellular communications use specialised equipment that is difficult to use and manage, and not readily accessible to a large population of users. Cellcrypt provides government-grade secure communications on commercial off-the-shelf smartphones. Excelerate Technology Ltd Excelerate Digital Dashboard Management Interface (DDMI) Excelerate Digital Dashboard Management Interface (DDMI) has been developed to improve ease of use and lower potential downtime for emergency and security services’ mobile command systems management, real-time information access and communications interoperability.
The DDMI delivers enhanced communications interoperability and a clear, intuitive interface for monitoring the wide variety of sophisticated command and support technologies found on the latest command and control vehicles, in a way that allows operators more freedom to concentrate on key priorities. The interface provides easy-to-view status information and clear operational controls. The private branch exchange (PBX) facility included within the DDMI allows different types of radio and mobile phones to be patched together and linked into conference calls, thereby enhancing emergency services interoperability. Northrop Grumman - I-JOCCS Integrated Joint Operational Command and Control Services I-JOCCS provides a situational awareness picture integrated with a seamless command and control (C2) solution that is a force multiplier for homeland defence, crisis management and conflict resolution. The I-JOCCS capability offers a highquality, secure and user-friendly solution with high levels of interoperability with other coalition forces including UK/US. This capability addresses the needs the military, from the strategic HQ to the dismounted soldier, as well as addressing civil
Intelagard Macaw backpack
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
requirements, from the crisis management centre to the deployed first responder. CYBER SECURITY AND ELECTRONIC SECURITY Cellcrypt Ltd - Cellcrypt Mobile Cellcrypt Mobile enables large-scale endto-end protection of sensitive mobile phone conversations from interception in an easy and high-performance, yet highly secure, solution with no specialist equipment. Traditional government and military cellular communications use specialised equipment that is difficult to use and manage, and not readily accessible to a E
With over 100+ years combined industry experience; we at TBS have been supplying our unique design services across all industry segments from defense to telecoms since 1998. From concept through to manufacture, we at TBS can integrate at any stage into your design process. By providing pure PCB layout capability to full schematic entry library development to board manufacture we at TBS will work closely with your design team supporting your process. Our specialist knowledge ranges from high-speed digital design across to RF and analogue layout. With links into the fabrication and assembly facilities we are able to provide a complete layout design solution, as well as supporting the leading design automation software such as Mentor Graphics® Expedition and Board Station XE/RE and Altium Designer. IPC CID certified.
Andy Critcher, Total Board Solutions Ltd, Loddon View, Lower earley, Reading RG6 7YA pcbdesign@totalboardsolutions.co.uk www.totalboardsolutions.co.uk
Tel: 01183 778 550 Mobile: 07785 578770 Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
47
Prestwick Circuits GPS Global Procurement Solutions
the search is over
We supply all volumes of printed circuit boards on any technology
We can now supply LED lights for all requirements
Prestwick LEDs “The Search is Over”
Prestwick Circuits GPS Ltd 1 Steadman Place Riverside Business Park Irvine KA11 5DN, UK +44 1294 224631 pcb@prestwickgps.com www.prestwickgps.com
CTSS AWARDS 2012 E large population of users. Cellcrypt provides government-grade secure communications on commercial off-the-shelf smartphones. Northrop Grumman - Federated Cyber Range (FCR) The Federated Cyber Range’s (FCR) primary function is to host an emulation of an existing IP-based network so that a network’s vulnerability to cyber attack can be determined. The FCR can also be used for cyber defence operator training, research and development and general system performance testing. In its primary function (network vulnerability testing), the FCR’s target market is any public or private organisation that uses an IP-based network. The key objective is to identify network vulnerabilities that could not be discovered by normal penetration testing against a live network. The user benefit’s from having a network that is proven to be more robust against a realistic cyber attack, and from the ability to carry out incremental testing of future network modifications. ELECTRO OPTIC, THERMAL IMAGING AND NIGHT VISION e2v - Argus Thermal Imaging Camera Only recently has the cost of hand-held thermal imaging reduced to an extent
that it can become a realistic option for routine work. The Argus TT TYPE has been developed to transform the traditional torch used by many patrol officers. The Argus thermal imaging camera is a hand-held, robust, simple-to-operate, lightweight monocular camera that can power up fast. It is capable of withstanding harsh environments and offers many of the most advanced features available on the market. The user can go virtually undetected while searching for criminal activity. The target group for the product is law enforcement, police officers, security personnel and search and rescue teams. Other users include sailors and other security personnel on-board ships, where applications include piracy avoidance and detection, as well as the rescue of men overboard. FLIR Systems - Quark Quark is a next-generation thermal imaging (TI) camera core – and it is the world’s smallest and lightest available on the market. Quark brings TI to the next level for helmet mount applications, miniature hand-helds and (ultra) small unmanned aerial vehicles (UAVs). The Quark TI Camera core is primarily intended for use by special forces, fire fighters, MoD, (miniaturised) security applications and UAVs.
HGH Infrared Systems - VIGISCAN VIGISCAN was developed to offer the equivalent image that a traditional microwave radar gives, but in the long wave thermal imaging band (LWIR wavelength is 8-12μm). VIGISCAN gives the capability to track moving targets (both hostile and friendly) and then to alert an operator with the coordinates of hostile target. VIGISCAN is targeted at fixed high value assets, which need day and night 24/7 protection from hostile intrusion. The product can also provide the same day/night surveillance capability for ships, tankers or other high-value vessels operating on the high seas, where threats such as piracy may be present.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Laser Optical Engineering - Explorer The primary function of the Explorer scanner is to produce real-time images highlighting the location of any explosive residue within a target region. It was designed with the aim of allowing the user to operate the system using minimal manpower to achieve maximum security through complete scanning. The primary user group for Explorer is at package handling facilities where the real-time scan capability allows the user to check all items with no delay. The scanner checks each item for traces E
Lapa Security Solutions Ltd is a multi-disciplined company of the highest quality, providing professional security personnel and consultancy for all types of security work. With full management back up to all our work, we understand the need to be cost effective without compromising standards. In this extremely specialized field of anti-terror methods Lapa security solutions Ltd has a number of qualified olfaction approved (to MOD standard) handlers and dogs. We have our own training facility and conduct canine training courses and live senarios all in accordance with relivant and appropriate standards. Because of the nature of work and the diversity of the dog we can offer and supply a fully compliant search dog in the field that you require, such as Free Running Explosive Detection Dogs for private Freight companies, explosive detection teams for football clubs, shopping centres, security firms, aviation and shipping.
We have the following detection dog teams available for deployment: • Explosive detection dog teams • Explosive vehicle Search Teams • Drug detection dog teams • Body detection dog teams, for the detection of illegal immigrants or stowaways • Tobacco/counterfeit detection dog teams • Cash detection dog teams Other detection dog teams available with given notice General Purpose Qualified Security Dog Patrol Teams
BIG ENOUGH TO COPE, SMALL ENOUGH TO CARE OFFICE: 01322 615271 FAX: 01322 615954
MAIN OFFICE: UNIT 3 WESTED FARM EYNSFORD ROAD, SWANLEY KENT BR8 8EJ CENTRAL LONDON OFFICE: 85 TOTTENHAM COURT ROAD W1T 4TQ
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
49
Excellence is Our Commitment Practical Services
Explosive Ordnance Disposal (EOD), Improvised Explosive Device Disposal (IEDD), High Risk Search (HRS), Clearance Diving and EOD Search.
Training
Counter Terrorism explosives training, contingency planning, Improvised Explosive Device (IED) awareness and disposal training (IEDD).
This includes offshore operations, with our own specialist EOD clearance divers and offshore equipment, capable of relocating and disposing of any offshore ordnance. Ramora UK’s capability also extends overseas with standby teams of EOD operators ready to deploy worldwide for any EOD task, ranging from munition disposal to Battle Field Area Clearance or even IEDD.
Equipment
The use of IEDs by terrorist organisations means that it is essential that security forces and their support units are trained to the highest levels to combat this threat. Ramora UK provide specialist security training from IED awareness to IEDD. All of the courses that we offer are bespoke to client’s needs to maximise learning and improve capability. Our extensive instructor capability means that we are able to offer training and certification in land based and maritime IEDD operations.
Ramora UK provides a reactive 24 hour EOD response service throughout the UK, utilising a fleet of specially equipped vehicles and our highly trained, former military personnel.
Tel: 08454 608911 Email: enquiries@ramorauk.com Website: www.ramorauk.com Visit us on Stand Number: F32
Consultancy
Advice, guidance and project management services in many areas including Counter Terrorism Security and Risk Mitigation.
Counter Terrorism equipment solutions, advice and procurement. Associated training and integration.
CTSS AWARDS 2012 E of explosive residue and automatically signals an alarm if traces are detected. A threat can be identified and tagged for further checking, which can take place in a secure area to minimise threats and delays to the main throughflow at the facility. IMPROVISED EXPLOSIVE DISPOSAL DEVICE API Technologies - API Hawki Video Aiming Device The Hawki video aiming device is designed to take the guesswork out of ordnance disposal. The solution allows explosive ordnance disposal (EOD) technicians to quickly neutralise potentially lethal threats while keeping those nearby (and themselves) safe. The primary function of the Hawki is to place crosshairs on an EOD robot’s monitor, allowing the bomb technician to make an accurate shot and render an improvised explosive device (IED) safe. While approaching a target, the crosshair shifts based on range to target showing operators the true point of impact for their shot. No calibration or adjustments are needed by the operator to account for the range of the target. The system also displays range to target and tilt angle at which the disruptor/barrel is aimed. The Hawki aiming device can easily attach to any EOD robot using a PAN, disruptor or Bennelli M4 Super 90 shotgun.
Multix ME100
Explosive Learning Solutions - CounterIED MATT/Awareness Training During late 2008 and early 2009 the number of improvised explosive device (IED) casualties sustained by the British Army in Afghanistan increased at an alarming rate. It was clear that the training for the average soldier in dealing with this threat was inadequate and a new training system needed to be developed. The Army engaged a civilian training consultancy to help it examine the area of core Army operational training, that of counter-IED awareness training, for every soldier in the British Army. The IED is an often indiscriminate weapon; the target audience was therefore every soldier, sailor and airman in the UK Armed Forces. The training package is now a mandatory requirement for all serving personnel. The primary objectives of the Counter-IED MATT/Awareness training are to reduce the number of casualties; in order to ensure UK Forces could operate effectively in an IED environment; to improve the ability of the training system to react to changes in tactics and equipment; and to improve confidence in counter-IED tactics and equipment.
provided since 1970 to the British Army. The primary function of the product is for remote operations and explosive ordnance disposal (EOD). The CUTLASS system offers the latest technology in a modular design, enabling the user to deal with the full range of both military and improvised explosive devices (IEDs). Its highly versatile design means that it is capable of accommodating a wide range of payloads, sensors and tools. The manipulator arm is equipped with a state-of-the-art gripper and has nine degrees of freedom for greater movement and agility inside limited spaces, such as the interior of a car. The robot is able to creep along at deliberately slow speeds for delicate operations and can accelerate to high speeds to enable rapid travel. The six-wheeled design offers mobility on all types of hard and soft terrain in all weather conditions.
Northrop Grumman - CUTLASS CUTLASS was developed to replace the current in-service ‘Wheelbarrow’ which Remotec has
Rapiscan Systems - Rapiscan Eagle T10 The Eagle T10 is a unique product in the marketplace – a trailer-mounted cargo E
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WHAT DO YOU LOOK FOR IN A COMPONENT SUPPLIER? n n n n n n
Someone who understands my needs for both quality and cost control Provides a reliable and consistent supply on a global scale Guarantees to maintain the best possible service Acts with speed and flexibility to my requests Stock availability when and where I need it A company I can build a trustful working relationship
SOMEONE LIKE BF COMPONENT SOLUTIONS Contact us now give us the chance to support you in achieving your companies’ long term goals and needs.
www.bfcsltd.com Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
51
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
• FAST • RELIABLE • EFFICIENT
High Quality, Accuracy and Resolution 3D Digitizing Systems to meet all applications and budgets
For all your 3D Digitzing Requirements or to book a demo, please contact Steinbichler UK Limited on 01527 558282 or visit www.steinbichler.de for more information!
52
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
CTSS AWARDS 2012 E and vehicle scanner with a 1 MeV X-ray imaging system enabling the detection of improvised explosive devices (IEDs) in the majority of passenger and goods vehicles. The Eagle T10 is designed to enable the identification of threat items whilst ensuring the operational safety of the inspection teams. The X-ray image enables the operator to “see” what is hidden throughout a vehicle and/or container, including cargo containers, engine blocks, truck cabs. This rapidly deployed, ruggedised system can be operated in even the toughest environments. SET Corporation - CounterBomber CounterBomber has been designed to detect suicide bombers at stand-off distances beyond the blast radius and provide force protection with an early warning of potential threats. CounterBomber is a video steered radar integrator that can detect in less than five seconds if a man or woman is concealing a suicide vest without invading individual privacy. It is fully automatic and uses audio/ visual cues to allow force protectors the option to multi-task with an integrated base defensive system. CounterBomber is combat effective at distances greater than 100m from the device, and employs a simple-to-use graphical user Interface that provides audio chimes or horns that are associated with
cleared or positive threats. Instructions for a basic operator can be delivered in less than 10 minutes and can be translated into any language. Within seconds and without looking at a screen, the CounterBomber operator can know with confidence if an approaching subject is concealing a device or potential device that would require additional screening. PERIMETER PROTECTION AND INTRUSION DETECTION ATG Access - SP400 ‘Independence’ This product was developed to revolutionise the high-security bollard market by affording sites with limited access to a power supply the high-security protection they require. The SP400 ‘Independence’ is an aesthetically pleasing, manually retractable bollard. Easily operated by either a hand crank or a battery-operated drill, it provides a high level of anti-terror protection. Its modular design makes service and maintenance especially straightforward. Matching static bollards are also available to complement this product. Becatech - Cobweb Cobweb was developed to provide a simple, low-cost, rapidly deployable detection device to protect troops, snipers, improvised explosive device (IED) fields, downed aircraft, facilities or any protected area from intrusion. Its
primary function is to provide an easy-toset-up protected zone for applications such as entrapment operations, rapid securing of crime scenes, mobile force protection and sabotage detection. The product may also be used to respond to intelligence alerts regarding targets of terrorist attack. The key objective is simplicity: with Cobweb, anybody can set up a perimeter and intruder detection zone in minutes. The product is a self-contained batterypowered transmitter that is attached to a spool of specially manufactured break wire or a PIR (passive infrared). When the wire is broken or the PIR is triggered, they transmit a signal to a pager, mobile phone, PDA (personal digital assistant/ palmtop computer) or control room.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Cova Security Gates - CSG 10140 crashtested sliding cantilevered gate This crash-tested product was designed to offer a cost-effective perimeter security solution that could be used both to protect critical infrastructure in a counter terror/ threat scenario, and also to prevent unauthorised vehicle access such as ram raiding or riot-related crime, withstanding direct impacts of substantial force. The gate, which has the outward appearance of a standard product, can be E
Who is in your waters? We can tell you... Integrated or stand alone, Cerberus Mod 2 provides leading diver detection capability. World leading performance. Small, lightweight & affordable. Atlas Elektronik UK provides a centre of excellence for maritime and port security and is 100% owned by Atlas Elektronik GmbH, a joint company of ThyssenKrupp and EADS
Dorset Green Technology Park Winfrith Newburgh Dorchester • DT2 8ZB United Kingdom +44 (0) 1305 212400
Meadows Road Queensway Meaodws Industrial Estate Newport • SouthWales • NP19 4SS United Kingdom +44 (0) 1633 292025
enquiries@uk.atlas-elektronik.com www.uk.atlas-elektronik.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
53
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BELA EMS offers modern facilities and leading edge production technologies for electronic component design Bela EMS is a leading specialist electronics manufacturing solutions (EMS) provider offering a complete electronics design and manufacturing service aimed at building long term supply partnerships. Through its high level technical capabilities and leading-edge production technologies it is strategically positioned in the UK market to provide small to medium batch manufacture on both standard and rapid deliveries. Bela’s modern facility near Bedford is fully accredited to ISO9000:2008 and enables the company to support the manufacture of a wide range of PCB assemblies, from simple, singlesided boards, up to 16 layer high complexity boards with multiple BGAs. All assemblies are 100 per cent AOI inspected to IPC-A-610-E Class 3 as standard with x-ray inspection available as an option. Test (including J-TAG capabilities) and full box build are further service options that add value to its sub-contract services. Bela works with its customers to ensure an early involvement in a project, preferably at the PDR (post design review) where informed decisions can be made in relation to DFM (design for manufacture) and DFT (design for test) to ensure robust manufacturing solutions can be applied to deliver repeatable, sustainable and cost effective quality and delivery. A key part of its service is the ability to source full component kits and blank PCBs
54
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
through its strategic supplier alliances. Bela works closely with the supply chain to secure manufacturer-supported pricing where applicable whilst also managing component lead-times and MOQs through supplier selection or buffer stock solutions. REACT+ is a dedicated resource that responds to the customer’s prototype and fast turnaround requirements. Deliveries range from 24 hours for builds from freeissued kits, through to 3-5 days to include blank PCB and material procurement. Bela’s knowledgeable team works closely with the customer from the initial point of enquiry; this ensures that customer
requirements are fully understood and that they offer the customer a flexible and cost effective solution. From this point there will be no surprises as a dedicated point of contact manages the order through to acknowledging its despatch via email on the date promised. Through Bela’s culture, robust systems and commitment it is uniquely positioned to offer a world class service to its customers with the convenience of being on their doorstep. FOR MORE INFORMATION +44 (0) 1234 840242 michael.knight@bela.co.uk www.bela.co.uk
CTSS AWARDS 2012 E sympathetically blended in to any perimeter line through the use of cladding that complements a new or existing fence. With few moving parts, it is costeffective and requires little maintenance. Cyalume Technologies SAS - idIRt® – Infrared Tracing Powder by Cyalume Light Technology® idIRt® is an IR (infrared) self-illuminating dirt-like substance that indicates presence in a targeted area. It remains on items such as shoes or tyres as physical evidence signaling whether something has passed through a specific area, and is visible with night vision equipment. Applications include burglary investigations, public nuisance or trespass complaints, crime scene monitoring, localised drug activity and illegal border crossing. idIRt® is supplied in a 500g bag containing two proprietary components that provide IR illumination immediately when mixed, and is available in brown or desert colours. The product glows for 36-48 hours outdoors and for a week indoors, depending on environmental conditions. J&S Franklin Ltd - DefenCell Profile 300 The DefenCell Profile 300 was developed to meet a need for a lightweight,
economical, easily deployed hostile vehicle mitigation (HVM) barrier system that was environmentally friendly and maintenance free. The product is designed to provide internal reinforcement to bunds and berms so as to give a specific level of protection against vehicle-borne threats to critical infrastructure. It also provides effective blast mitigation and ballistic protection as a bonus. Users benefit from this discreet and aesthetically neutral system that gives a high level of temporary or permanent protection against all types of vehicle attack. Once installed, Profile can be planted with grass or shrubs and flowers or installed in concrete, wood or plastic planters to enhance protection of existing features. It requires minimum maintenance and is easy and economical to install. It does not rot or rust and does not interfere with radio frequency (RF) communications or IED (improvised explosive device) detection equipment. PERSONAL PROTECTION EQUIPMENT Armadillo Merino - The Python Baselayer Top Today, the majority of baselayer garments worn under protective clothing by soldiers and first responders are synthetic or cotton. In many instances they are dangerous
to wear and could potentially lead to severe skin injuries or even death. The Python baselayer top has built-in merino wool, which is naturally fire-resistant (up to 600°C). Users can wear the baselayer with confidence, knowing that they are wearing a garment that will give them a greater chance of survival in extreme environments. An additional benefit is the moisture management and thermo-regularity properties of merino wool which allows the wearer to feel more comfortable in the garment. The Python garment provides a next-to-skin buffer zone. This simple layering solution can help save lives, reduce fire-related injuries and improve the operational effectiveness of people working in extreme environments.
Counter Terror Expo 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HAZMATHOOD - Hazmat hood The Hazmat hood was developed to comply with new CEN guidelines on victim/potential victim protection from CBRN events. It provides victims/potential victims with a means of escape protection through a hazardous atmosphere or ‘hot zone’. Each unit costs only £10 and is small enough to fit in a shirt pocket. Furthermore, one size fits all and no training is required to operate the hood. The Hazmat hood has been assessed by health and safety executives as E
SECURITY BOUTIQUE™
SECURE ID CARDS INCLUDING SMART CARDS; ID SYSTEMS AND COMPONENTS HOLOGRAPHIC FEATURES AND SECURITY PRINTED DOCUMENTS VEHICLE IDENTITY PRODUCTS (SECURE PLATES, RFID WINDSCREEN LABELS)
Tel: +44(0)1256 477372 E-mail: enquiries@andrews-wykeham.co.uk Web: www.andrews-wykeham.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
55
Delivering bespoke perimeter solutions
VolkerFitzpatrick has proven expertise in project managing bespoke perimeter solutions. We have extensive knowledge and experience of selecting, designing and installing, to your timetable, a wide variety of perimeter solutions that best meet each site’s specific requirements.
VolkerFitzpatrick is a licensed installer of Britpave BSECB PAS 68 security barriers, CSB EN1317 vehicle barrier, and is a member of the Perimeter Security Suppliers Association (PSSA).
Contact: Joe Quirke VolkerFitzpatrick Ltd Hertford Road Hoddesdon, Hertfordshire EN11 9BX, England
T +44 01992 305 000 F +44 01992 305 001 W www.VolkerFitzpatrick.co.uk E joe.quirke@volkerfitzpatrick.co.uk
Cellcrypt Ltd - Cellcrypt Mobile
CTSS AWARDS 2012 E providing basic escape protection against smoke and CBRN events.
Verseidag Ballistic Protection - NPIA Shield The product was developed in response to request made by The National Policing Improvement Agency (NPIA) for a flexible shield capable of defeating threats up to and exceeding RF1, whilst remaining light enough and giving the user an adequate level of body protection. The primary function of this shield is to act as a ballistic defence barrier for first responders at the scene of a firearms incident. The targeted users for the product are police, military, ambulance and fire brigade personnel. Users can now utlise one standard lightweight product that will protect against all perceived threats. The product can also be folded in half and stored neatly in the back of a car, taking up minimal space. VestGuard UK - Triple Combination Kit VestGuard has created the triple combination kit to provide the maximum versatility in body armour so that users can wear threat-specific armour dependant on the environment they are in. This ensures maximum agility for the user who is not overburdened with unnecessary body armour. Equally, it can provide maximum protection when the wearer needs it most. The target audience for the kit is military and police organisations, as well as private security companies. The Triple Combination Kit can defeat anything from a 9mm, AK47 to .30 calibre M2 armour piercing rounds from a distance of just 15 metres.
SURVEILLANCE, DATA AND INTELLIGENCE Adaptive Imaging Technologies Panoramic Telescope The panoramic telescope enables the cost-effective, continuous monitoring of very wide and deep areas. The benefit is simple: the user can monitor a wide (160 degree) panorama, continuously obtaining ultra-high resolution zooms on any number of features within the panorama, along with lower resolution situational awareness of Companies the entire panorama, ese all simultaneously from across th a ted and all from a arenas submit cts single device. du The telescope vast range pro r can cover the and services fo 2 viewing area in 1 continuously in near terrorist domain, including web consideration s” e real time and does content. The product analyses ri o g te ca this without requiring captured text then understands any special bandwidth. and summarises the content. It is ideal for border IntuScan can then extract valuable surveillance, port and sea-border intelligence such as intentions, sentiment, surveillance, town centre security, airport matching of entities and identification of (runway and terminal) security and energy improvised explosives recipes. Its primary and other critical infrastructure security. function is to provide early warning through understanding of the hermeneutics of the text. Blackline GPS Corp - Flat Track IntuScan provides the user with realFlat Track is a GPS-based covert tracking time intelligence of a high quality and device that documents the movement access to the implicit meaning of texts that of a mobile target or asset. This product translation would not be able to provide. was developed to serve the need of The user receives intelligence more quickly, professional location-based surveillance, more cheaply and more comprehensively. where maximum discretion is required. Flat Track’s thin shape combined with Research Electronics International a large 5400 mAh battery, enables longOSCOR Green Spectrum Analyzer term tracking that allows use in new OSCOR Green was developed as a portable applications such as hidden compartments spectrum analyser that provides security within packaging and assets. Users can professionals with a radio frequency (RF) monitor battery life, and other status receiver incorporating signal identification information during surveillance operations. and analysis tools to detect illicit eavesdropping devices. Primary users of Co-Decision Technology OSCOR Green are corporate, private and decider.track with Co-Mining inside government security professionals. decider.track is a real-time and permanent OSCOR Green provides bench top spectrum augmented cognition system, which is able to analyser capability in a portable package amplify human investigative and reasoning that is easy for the security professional capabilities without interruption. The primary to use without the need for extensive function of the product is to reach hundreds technical training. The user can quickly of information sources to automatically detect analyse the RF environment for signals micro-elements of risk and aggregate them in that could compromise security. L a cognitive manner – which means following the interpretations of diverse intelligence FOR MORE INFORMATION services. The system is targeted at banks, For table & ticket sales contact intelligence services and cyber police. Kim Hardy - sales@ctssawards.com The CTSS Awards and Gala Dinner IntuView - IntuScan are organised by BDEC Limited IntuScan was developed to deal with document Tel: +44 (0)1737 645777 exploitation of texts acquired from captured Fax: +44 (0)1737 645888 digital media in non-English languages, in the www.ctssawards.com
“
HGH Infrared Systems - VIGISCAN
The Panic Room Company - Panic Room The Panic Room is designed to protect families, high net-worth individuals, VIPs, valued professionals and those working in high-risk environments such as foreign embassies., maritime vessels, the aid sector and utilities industries in developing countries. The product has scalable levels of ballistic/blast rating, is fully ventilated and allows occupants to communicate with the outside world even if mains power fails. For domestic use, the sizes are typically for two, four or eight people where the duration of use would be for a few hours. For embassy, commercial and maritime use the rooms can be made much larger, for up to 24 people, where the duration of occupation could be up to five days. The Panic Room forms part of a holistic security plan – being the last point of defence once other barriers have been breached. It is comfortable and sustainable with external ventilation and air filtration, breathing equipment, lighting, back-up power supplies, fresh water and basic toilets all considered. Delivered in flat-pack modular form, the panic room is portable and self-installable, and can be painted in any colour as part of the manufacturing process, dressed to blend in with the surrounding environment.
Counter Terror Expo 2012
www.counterterrorbusiness.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
57
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SUPPORTING EMERGENCY SECTOR COMMS Satellite broadband, wireless video and interoperable communications are transforming incident command possibilities Riots, demonstrations, major sporting events, terrorist attacks, multi-agency emergencies and fast-moving firearms incidents: police and security forces have their work cut out for them preparing response scenarios and resourcing for a wide range of major challenges. This is being done at the same time as budget cuts are forcing police forces to cut police numbers. One response to this major challenge is to use proven new communications solutions such as mobile satellite broadband, wireless imagery from throughout incident grounds, camera systems that automatically climb up poles and lamp posts, and integrated multi-channel voice communications – these give commanders working in mobile command vehicles and in control rooms a clearer, real-time view of what is happening on the ground so that they can deploy their forces more efficiently. A NEW GENERATION OF EMERGENCY COMMAND VEHICLES In recent years the new generation of emergency command vehicles developed by Excelerate, the UK market leader, and introduced by UK emergency services has helped deliver huge improvements in the way services manage the different types of incidents they deal with - at all levels: gold, silver and bronze. It is this type of new, high tech approach that helped Gwent Police manage the 2010 Ryder Cup with widely acknowledged success, using only modest levels of staffing while managing tens of thousands of spectators and high profile VIPs. New, improved communications across incident grounds and back to headquarters, using mobile satellite broadband, internet, voice and live wireless video, can deliver high speed data flows, real time situational awareness and a Common Operational Picture – within services and between services – at levels never previously achieved. This is important, because it means services are now able to perform much more effectively (and some of the mistakes of the past, highlighted by major incidents where lives have been lost unnecessarily, are less likely to happen). Supporting this pioneering collaborative work within the emergency sector Excelerate
58
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
has helped drive the development of what are now considered to be some of the most advanced mobile emergency command vehicles in the world. This is generating strong interest from police and security forces around the world. The company’s unique expertise means it has the capability to support a huge variety of different requirements from emergency services. With budgets tight, growing numbers of emergency services are now drawing on the company’s wide variety of skills – specification, design, prototyping, development of bespoke solutions, integration, training, support and consultancy – to implement new installations and retrofit communications solutions into existing vehicles. Surrey Police use an Excelerate-supplied ANPR camera solution linked from a vehicle by satellite broadband to provide live, completely up-to-date traffic monitoring, thereby enabling the force to obtain improved performance and even greater value from its communications investments. Excelerate has supported these initiatives by pioneering many of the new technologies and integrated solutions that emergency services are now adopting to support their plans and operations. Key among these technologies has been the use of mobile satellite broadband and wireless solutions to deliver data, voice, internet and video to commanders. Ten years ago the company was quick to see the potential of these emerging technologies and to adapt them for specific emergency service use. Critical to the success of these developments has been the need to identify how emergency service communications requirements can be best supported by the use of new technologies, followed by prototyping, systems integration within compact and ergonomically suitable work spaces, displays and control panels, thereby creating easy-to-use solutions. This has been complemented with testing, training and exercising to deliver maximum operational benefits for the investments made. These solutions are now being seen in increasing numbers of forward command vehicles and incident command units around the UK, vehicles which are changing command doctrine and the way emergency services work.
While there are variations in the different types of command suites and technologies used within the various emergency command vehicles supported by Excelerate Technology, there is generally a core set of common systems, features and functionality. Some of these solutions are unique to Excelerate, having been developed by the company’s research and development department. To help services identify which solutions are likely to be of most use to them, Excelerate has compiled a straightforward User’s Guide to Mobile Emergency Command Solutions, MOBILE SATELLITE BROADBAND COMMUNICATIONS This is at the heart of Excelerate’s technology offering, providing commanders with a robust, easily-accessible and high capacity capability. Roof-mounted transportable satellite solutions provide resilient stand-alone broadband connections giving access to secure telephony, data, video, internet and email facilities. Satellite broadband is highly robust, a key factor during major emergencies when other communications systems can be overloaded. Satellite communications enable command and control vehicles to receive and transmit data from all responders and emergency teams and achieve a Common Operational Picture. Combined with wireless networks, personnel using PDAs, laptops, mobile phones and data terminals can access tactical plans, live video streaming or information from E
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Sherpa automatic climbing camera, communications and ANPR platform
E strategic emergency planning software. The range can be extended using self-powered, rapidly-deployable MESH wireless nodes. Optical and dual-thermal cameras can be mounted on self-powered tripods, the Sherpa climbing camera platform, extendable, pneumatic masts and aerial platforms to transmit live video by COFDM into ICUs and control rooms for viewing by command staff operating at the scene of an incident, and streamed via secure servers to higher level command for online access in realtime by authorised personnel. Body-worn cameras, such as those worn by Gwent Police mobile officers on bikes, can also be used to provide fast reaction video of incidents. In addition, Excelerate can install receivers to provide ‘heli-tele’ downlinks, allowing aerial images from police helicopters and UAVs to be viewed in the command vehicle. DIGITAL DASHBOARD MANAGEMENT INTERFACE (DDMI) DDMI is a highly innovative new solution which enhances system performance, reliability and communications interoperability. The simple-to-use interface enables operators to monitor and control the systems and technologies on board command and control units effectively and efficiently, enabling them to focus primarily on their operational roles and to get the best out of their technology and training investment. The system also allows remote login for problem solving
and support by Excelerate personnel. Full voice interoperability between different communications systems - allowing users of a wide range of different systems such as TETRA, GSM, radio and landline to be patched together - can be achieved using the Communications Management Suite module, either on a standalone basis or within the Digital Dashboard Management Interface. An Excelerate-developed product (UK Patent Application 1116053.8), the Digital Dashboard Management Interface solution has been designed by Excelerate Technology’s R&D department specifically for the emergency services market.
Written by Stephen Prendergast
Excelerate’s mobile satellite broadband and other communications solutions integrate into large and small vehicles, such as this Mercedes Vito, and can also be retrofitted into existing vehicles
Excelerate is the developer of Sherpa, the highly innovative new ‘climbing camera’ CCTV and communications platform system that automatically climbs up poles and places cameras, including ANPR cameras, and other emergency response communications devices in high temporary viewing positions, giving police, emergency management, prison service and security personnel improved coverage of incidents and potential problems. Camera imagery can be controlled and viewed using iPads, iPhones or mobile and in-vehicle systems. Sherpa has the potential to make a major contribution to the policing of public order, transport and counter terror operations and is generating strong interest around the world. In a special package deal created by Excelerate, customers can now buy a complete ‘turnkey’ Sherpa solution (head unit, delivery unit, electronics unit, hand held controller and peli case) along with a tripod and a huge range of camera system options for attachment to the head unit (including dual thermal cameras) - all for an overall system price substantially less than other market offerings. Because of its versatility Sherpa can be used in a wide variety of different roles. It can be deployed quickly by police forces to monitor rioting and public order incidents.
INDEPENDENT GSM NETWORKS RapidNet is a Private Mobile Network system that enables an independent GSM network to be generated at the scene of an incident if public GSM networks are overloaded or compromised during major incidents or because of other problems. To support the new trend for using wireless cameras and ruggedised laptops across incident grounds, portable, battery-operated WiFi extension nodes can be used to create complete wireless MESH networks. Such nodes can be in the form of rapidly deployable tripods (with hot-swappable batteries), bodyworn nodes and vehicle-mounted nodes. L FOR MORE INFORMATION www.excelerate.info
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
59
WHEN LIVES ARE ON THE LINE If you work for the armed forces, police or a security organisation, the SDS Group is your partner for specialised security equipment. Our state-of-the-art search and detection equipment includes Portable X-Ray Equipment, Metal and Mine Detectors, Explosives and Drug Detection Equipment as well as Gamma Backscatter. We not only counter crime and terrorism, we oer bespoke training to give your team the expertise they require to ďŹ nd and neutralise contraband and explosive devices. Additionally, the SDS Group provides comprehensive consulting services involving threat assessment, risk analysis, blast mitigation and x-ray image analysis. When Lives Are At Risk, let SDS by your First Line of Defence Partner.
SDS Group Limited sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk TEL: +44 (0)1580 715038 FAX: +44 (0) 1580 712056
SEARCH DETECT SECURE
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Search is a critical part of effective security operations, and the equipment used should enhance the human senses, not replace them, says Steve Chambers, managing director of SDS Group Effective search is a critical and often overlooked and underemphasised component of an active security operation. Search operations tend to be a low skill, boring and routine function that often does not yield any results. Therefore, there is a tendency to ignore it. Of course, search operations are conducted at transit locations such as airports and border crossings, large events and specific high risk venues, but a good number of these searches are completed incorrectly. Often people assigned to conduct these searches are untrained, unmotivated and unsupervised. As search is a critical part of effective security operations, organisations need to focus more on conducting accurate and effective searches. I recently spoke with world renowned counter-terrorism expert Dr John Wyatt, MBE, who spent more than 25 years in the army, most of it as a bomb disposal officer. Dr Wyatt has an intimate knowledge of correct search procedures, techniques and the critical role search plays in security operations and he agreed that most search operations could be more effective. He stressed that “search is not high tech, it’s pretty basic, but like a lot of basic things if it’s not done properly it’s pretty ineffective”. Dr Wyatt pointed out some ways in which companies could improve the results of their search efforts. EFFECTIVE SEARCH There are three key components to an effective search: training, technique and supervision. Search personnel need to be trained in proper search techniques, which can be taught relatively quickly. This is a key missing component. Properly trained personnel, who rigorously follow a set of procedures based on their training, form an effective defence and deterrent against explosive and other illicit devices from being introduced into a secure area. Equipment is the next component of effective search, keeping in mind its limitations. While politicians, bureaucrats and building managers are always looking for that piece of equipment that will positively detect an explosive or incendiary device hundreds of meters away with 100 per cent accuracy, 100 per cent of the time, (and at low cost), this utopian device simply does not exist. Search equipment should enhance
the human senses, not replace them. The human element, using experience, instinct and training, is the critical element determining whether or not a more in-depth investigation is warranted. “Search is a human operation enhanced by equipment,” according to Dr. Wyatt. “It is not an equipment operation”. Proper supervision ties together your teams’ training and equipment by ensuring proper search procedures are consistently followed and the equipment used correctly. As previously stated, search operations tend to be routine, boring affairs which rarely find anything. This is the nature of search - there usually isn’t anything to find. In these situations it’s tough to keep people motivated, attentive and alert. That’s the management role, to keep searchers alert, focussed, motivated and following procedures. BARRIERS TO EFFECTIVE SEARCH Time constraints and a fear of false alarms are the biggest barriers to conducting an effective and thorough search, even for properly trained personnel. Think about the searches we’ve all experienced, the ones conducted at the airport or at the entrance to a museum or public event. Screening personnel often speed up the search process when queues become lengthy, often dramatically reducing search effectiveness. Dr. Wyatt relayed an experience he had with a museum that, when the queues became too long, implemented “quick searches” which, according to Dr. Wyatt, can be easily defeated. “They would have been better off randomly choosing individuals
for in-depth, proper searches rather than subjecting everyone to a quick, ineffective search. The element of randomness would have been a more effective deterrent to anyone seeking to bring in contraband.” Search personnel are reluctant to cause false alarms and often view them as a problem, but false alarms are not necessarily bad. False alarms, when based on a common sense analysis of the cause, where all the elements of an explosive or illicit device are present, are to be praised. These types of false alarms indicate search teams are effective. Management needs to take note however, as false alarms that are not based on real world criteria can be a problem. For example, an explosive detector that consistently tells you there are explosive elements when there are none, can destroy the team’s trust in that particular device. Like the boy who cried wolf, people will tend to discount the indications which could lead to tragic results. Little things make a difference. Something as fundamental and basic as search can be made much more effective when it is given the attention it deserves. Search personnel need to be trained in the proper procedures, given the appropriate equipment and managed to make sure they operate in accordance with effective search techniques and kept motivated. This is a simple step that can save lives and property whilst keeping us safe. L
Written by Steve Chambers, managing director of SDS Group Limited (part of Pentagon Protection Plc)
EFFECTIVE SEARCH: THE FUNDAMENTAL BUILDING BLOCK OF SECURITY
FOR MORE INFORMATION Tel: +44 (0) 1580 715 038 sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
61
HIDDEN PROTECTION AGAINST A HIDDEN THREAT
Life-Saving Counter-RCIED Technology from L-3 TRL
Introducing the new integrated vehicle system from L-3 TRL—the ultimate covert solution from the award-winning BROADSHIELD ® Counter-RCIED family of systems. Designed to sit discreetly inside a vehicle spare wheel recess, this innovative new system operates on a 12V vehicle supply, making it a highly effective, low-power solution for covert requirements. For more information, please go to L-3com.com/TRL. To view the full range of new BROADSHIELD® vehicle systems, visit the L-3 stand, F100, at the Counter Terror Expo, 25–26 April 2012, Olympia London.
TRL Technology
L-3com.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Innovating hostile vehicle mitigation services to meet the demands of a rapidly changing world Hostile vehicle mitigation solutions or HVM is a term that only 10 years ago most of us would not have come across; it is now unfortunately a term that is frequently used in our industry. In 2004 Avon Barrier was a traditional manufacturer of boom style rising barriers and commercial road blockers. It was bidding for a project in the Far East to supply road blockers for the entrances and exits of a high profile organisation, when it was asked to design a blocking system that could stop a vehicle if it tried to gain access by ramming or driving a large vehicle into it at speed. There began its journey into its continual development of a whole range of hostile vehicle mitigation solutions. An array of equipment is available today including road blockers, rising arm barriers, gates, fixed and rising bollards, fencing, walls, street furniture, planters and more, with various foundation depths, surface mounted products, fixed and portable solutions. Many UK industry organisations have helped to educate those responsible for building and specifying Avon Barrier’s critical infrastructure, to plan-in mitigating measures at design stage. A variety of components are
incorporated into a traffic management strategy to limit damage from a hostile vehicle attack, including: • Traffic calming to limit speeds of access to site; • Barriers for example in the landscaping surrounding the building or area to be protected, thus providing a stand-off, in the form of bunds, ditches or gradient landscaping; • Access control in the form of a physically active system, for example a gate or road blocker with a management plan for operation and emergency access. As one of the UK’s leading manufacturers
and exporters of crash-tested barriers, roadblockers, gates and bollards with products in over 70 countries, Avon Barrier is leading the way for PAS 68 products in the export market. A recent addition to its product range is the SG1100CR armoured vehicle gate with a clear opening gap of up to 7m – one of the widest PAS 68 impact-tested gates available. The gate is manufactured in high volumes and is commercially very competitive, competing with non-crash tested gates, making PAS 68 products accessible to a wider range of budgets. The company’s design policy has always been to ensure that it makes products simple to install and simple to maintain. Often installed in the most hostile of locations, reliability and maintainability are attributes required to make them viable for a host of end-users. Avon Barrier Company is a founder member of the PSSA (Physical Security Suppliers Association) and is exhibiting at the Counter Terror Expo in Olympia, stand F19. FOR MORE INFORMATION Tel: 0117 953 5252 sales@avon-barrier.co.uk www.avon-barrier.co.uk
Eagle PAS 68 Bi-Folding Trackless Speed Gate • 0.8m Penetration, Zero Debris • PAS 68:2010 V/7500(N2)/64/90:0.8/0.0 • Shallow Foundation 380mm • Integrated vehicle arrestor system (patent applied for) • Tested clear opening width of 4.2m and 2.2m height Designed to prevent hostile vehicle mitigation its flexible lightweight design means that it can be manufactured with different mesh infill to match existing perimeter fencing.
Eagle Automation Ltd. T: 01992 524800 www.eagleautogate.co.uk info@eagleautogate.co.uk Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
63
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
G
W
R UA
OR
L TE
LD
HEL
BEA
P I N G YO U TO C L E A R
TING
CIED & EOD
TH
D PRO
EW AY
UC
TS
EMAIL: i nf o@g uart el .com PHONE: + 44 (0) 20 7384 3001 FAX: + 44 (0) 20 7610 6856 WEB: w w w .g uart el .com
Range We offer one of the widest ranges of waterproof cases available Applications The strength, waterproof and dustproof characteristics of ParaPro cases ensure they offer absolute protection even in the most extreme and harshest of environments. The cases have been subjected to a series of test to prove their suitability for use in these environments and to ensure they meet the demanding standards of IP67 and Defence Standards. Interiors Parotec Solutions also provide an in-house foam interior design and manufacturing service to reduce lead time for a special design to a minimum. www.parotecsolutions.co.uk or Call Sales on: 01204 868630
64
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The Sona Eco Point Sensor from Sysco International detect all forms of penetration and climbing attack he Sysco Eco Line range of products has been designed to provide a secure cost effective perimeter intrusion detection system for industrial applications of any size. The Eco Point is particularly suited to applications utilising heavier fence fabrics such as weld mesh or palisade and other rigid structures such as walls, building, window grills, skylights and roof structures. The Eco Point technology is based on a network topology where up to 1,000 sensors can be installed on the system and connected together using a single cable to provide both data and power. Each point sensor is fully addressable and individually adjustable to detect all forms of penetetration and climbing attacks. The system is able to log and store all alarm data which can be subsequently interrogated by sensor location, time and date and alarm type. Each alarm zone can consist of one sensor to allow pin point detection of the alarm location for surveillance by ptz or dome CCTV cameras or as multiples of sensor to match the field of view of fixed line CCTV cameras, all of which is electronically configured at the Eco Point controller. The Eco Point range of product is the future for low cost, high performance
perimeter detection technology offering: • Ease of installation • High performance operation • Multiple range of object protection The Sysco range of products has been installed into many high security projects and has met the demanding requirements of such clients as the Nuclear Industry, MOD, NATO, and various European prison authorities. The complete range of Sysco detection systems is supported with dedicated Graphic User Interface management systems which has been designed to provide
a cost effective means of monitoring both large and small installations. Supporting information regarding independent test and evaluations of the Sysco range of product can be supplied on request including reference list for: • Fence mounted systems • Free standing systems • Buried systems • Building and wall mounted systems FOR MORE INFORMATION psmsysco@aol.com
Manufacturer and supplier of Quartz Crystals Oscillators and Filters High Shock Resilience Miniature Packages Military Specifications High Operating Temperature -55 ~ 220°C
Crystals Oscillators
Special Product Selection
Miniature Packages TCXO OCXO VCXO LVDS PECL LOW EMI
Euroquartz has been manufacturing and supplying quartz crystal product since 1982, our aim is to offer a comprehensive, design led, support for our customer’s. Euroquartz Ltd, Blacknell Lane Ind Estate, Crewkerne, Somerset, TA18 7HE TEL: 01460 230000 FAX: 01460 230001 Website: www.euroquartz.co.uk email: sales@euroquartz.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
65
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
DO YOU REQUIRE PRINTED CIRCUIT BOARDS? Who are we?
A privately owned PCB Manufacturer with highly skilled and experienced staff (Est. 1969) Provide customers with service & quality, and peace of mind we will be here for another 40+ years
Where are we?
Based in the South East of U.K. approximately 20 miles east of London
What can we do?
3 Multilayer – Flexible – PTH – Conventional 3 FR4 – PTFE – Polyimide – Polyester – Aluminium 3 24 hours to 15 day standard lead time available. 3 Prototype boards to large Antenna boards 3 Offshore facility also available
Why?
Because you would like an alternative, backup or replacement supplier Are you satisfied with the level of service your current supplier provides you?
Contact our sales team on 0845 166 50 50 or email sales@photomechanical.co.uk www.photomechanical.co.uk
66
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
New Totalpost XIS series features cutting-edge software to help detect a huge range of potential threats Mailroom solutions specialist Totalpost Services Plc, which will be exhibiting on stand D56 at Counter Terror Expo, is to partner with world-leading technology specialist firm Astrophysics Inc. to bring the most advanced x-ray mail, freight and baggage screening systems into the UK. The new XIS series features cutting-edge software that can help detect a range of potential threats in several environments needles, weapons or explosives. involving letter and parcel screening The variety of products available also and freight and baggage screening. includes mobile scanning units, perfect for Mailroom security is becoming on-site security at events or exhibitions, and increasingly important with postal screener assist software – a new technology to threats being one of the most common help clearly identify any obvious contraband. types of criminal attack on organisations The equipment also features a full range of and individuals across the country. multi-view and CT image manipulation tools Detecting hazardous materials in parcels to identify potential threats, whilst archiving or packets can be very difficult but the XIS up to 100,000 images at a time and offering system’s greater steel penetration, high a ‘test ability’ to ensure proper recognition wire sensitivity and real time diagnostics by the operator, which can also be enhanced makes it a leader in the security sector by a remote service provider available to and more advanced than competitive give an overview of a potential threat. equipment. The product range also comes Totalpost managing director David complete with industry-unique six colour Hymers comments: “We are very excited image detection for greater detection to bring such new technology into our and threat recognition capability. sector. Totalpost strives to bring only the This new technology offers highmost advanced and high quality products speed letter, packet, parcel, freight and to our customers, and these systems are baggage screening for detecting harmful the future15:26 of mailroom substances such as white powder, blades, 1 23/02/2012 11871_Totalpost_Advert178x125:Layout Page 1security”.
Think
That’s what they thought...
To discuss how we can help please call 0845 4900360 or email sales@totalpost.com
FOR MORE INFORMATION Tel: 0845 4900360 sales@totalpost.com www.totalpost.com
The Totalpost team can help protect your mailroom services and help develop your own Business Continuity plan.
happen only to other people’s companies? The fact is that 80% of businesses affected by a major incident close for good within three years if no proper Business Continuity plan offering Disaster Recovery support is in place.
Founded nine years ago, Astrophysics Inc has emerged as an industry innovator with the most technologically advanced systems on the market. “Security is now one of the biggest priorities for UK firms. By offering this market-leading technology we can help deliver a significant new level of service for a variety of organisations small and large from across the UK and help them minimise any threat to their organisation.” Totalpost, which has offices in Alston, Warrington and Swindon, supplies other products to the mailroom and office including franking machines, postal scales, shredders, letter openers and inserters.
sive e exclu Now th f the o ibutor UK distr nge ra s ic ys Astroph d a mail n of x-ray g in n e re sc freight ! ts c u d pro s. r detail Ring fo
Totalpost offers a nationwide disaster recovery service with strategically-located offices that can replicate a major mailroom. With access to the largest number of high-quality mail extraction sorting systems on the market, we can give your employees full training on our machines to help match - and enhance response times and processes. With our tailored Disaster Recovery service we can offer end-to-end processing from inbound mail through X-Ray mail screening, large capacity openers, batch and scanning with indexing, to an electronic image being sent to your Disaster Recovery server site.
www.totalpost.com Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
67
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Solutions that fit. Products that perform.
Features & Benefits Low insertion loss High Isolation Low IMD Excellent temperature stability Broadband Performance (Octave) Compact Footprint Competitive prices
Design & Manufacturer of RF/Microwave Circulators and Isolators from 300MHz to 26GHz
We specialise in working closely with our customers to provide bespoke solutions to meet their requirements. In addition to this we offer a wide range of standard products at competitive prices, designed and manufactured in the UK. We enjoy working with our customers whether it is a requirement for 1 or 10000 pieces.
Package Styles Surface Mount Drop In Coaxial Waveguide Tel: +44 (0) 5601 06 69 30 Fax:+44 (0) 1702 66 78 77 Email:sales@rfandnoisecomponents.co.uk ssaib ad 125 x 178_Layout 1 17/02/2012 15:20 Page 1
CERTIFYING
SECURITY
The leading certification body for Guarding Services. Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001 and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.
Telephone : 0191 296 3242
68
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
www.ssaib.org
SSAIB
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Hosokawa Micron extends equipment portfolio for the containing and processing of hazardous materials As a world leader in innovative powder and particle processing equipment and systems Hosokawa Micron is a reliable partner in the manufacturing, security, defence, nuclear and associated industries. Now with an extended portfolio of hazardous materials handling and processing and containment equipment, Hosokawa Micron works with you to support an effective and consistent response to the need for personnel and environmental protection. With continued investment in pioneering development of containment technology, Hosokawa Micron offers both off-the-shelf and bespoke clean air and barrier containment equipment and fully integrated process systems designed to meet the challenges of providing a robust defence against the threat posed from hazardous materials and contaminants. Hosokawa Micron’s range of lead shielded gloveboxes provide enhanced protection against operator and environmental exposure to radiation sources or radioactive contamination. The design of Hosokawa Micron containment systems for the nuclear, security
and defence industries is influenced by its extensive experience of containment systems for the pharmaceutical industry where primary considerations include operator protection, product protection, easy cleaning, easy maintenance of equipment and good ergonomics. Hosokawa Micron’s engineers work customers to develop the most with appropriate solution for their protective
security requirements. Applications of Hosokawa Micron fume cupboard, extracted booth and glovebox technology include: protection of personnel in post rooms; safe analysis and processing of CBRN contaminated materials; R&D and manufacture of hazardous materials; containment of forensic analysis systems including the full integration into gloveboxes of CNA fuming chambers; DFO & Ninhydrin treatment chambers; lasers and crimelites. Hosokawa Micron offers a comprehensive service from conceptual design, detailed design, manufacture, testing, installation and validation service.
FOR MORE INFORMATION Hosokawa Micron Ltd Rivington Road, Whitehouse Industrial Estatew Runcorn, Cheshire, WA7 3DS Tel: (01928) 755100 Fax: (01928) 714325 info@hmluk.hosokawa.com www.hosokawa.co.uk
Complete manufacturing solutions from one manufacturer – Endless possibilities ANR offer in house manufacturing facilities to develop and build complete products for many Industries including the security, surveillance and access control markets. An ISO approved company, established for over 20 years, specialising in low to medium production volumes, offering design support through to full production and supply solutions, ANR have a proven, positive track record for developing concepts through to realisation.
Manufacturing facilities include in house electronics assembly (PCB’s / Cable Assemblies / Turn Key Box Build) CNC Milling and Turning, over moulding, test capabilities as well as final product packaging and logistics. Offering a high quality, low cost and fast turn around service our flexible operations ensure a reliable manufacturing partnership.
Final Assembly / PCB’s / Cable Assemblies / Engineering.
Five Divisions. Five Solutions. Telephone: 01628 819157 Email: sales@anrltd.com Web: www.anrltd.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
69
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Access Risk Control draws upon half a century of operational experience and leading-edge market research to deliver major event innovation Access Risk Control (ARC) is launching its unique mobile security check point at this year’s Counter Terror Expo at Olympia in April. ARC has drawn on its management team’s 50 years’ experience in running major international public events both in the UK and abroad to identify the operational requirements of the event. The company has long-recognised the increasing threat of terrorist and crowd disruption at high profile gatherings. After extensive international research involving law enforcement forces, government agencies and leading security companies worldwide, ARC has drawn on security sector intelligence to address the ‘additional risks’ presented to organisers at major events such as sport stadia, rock and pop festivals, street fairs and protest marches; in fact any large or even not-so-large crowd gathering. The second generation model MCP2 is now available fully fitted with leading approved security management systems that include instant high level lighting, low and high level CCTV, scanning data collection, Iris
recognition, WiFi mesh data verification, long throw audio system, walk thru body and baggage scanners, narcotic and explosive detection, daylight video screens, and more. The ARC system is contained in one secure quick to deploy and position unit for use within minutes of its arrival on site. It is fully self contained and includes a staff operating and screen control cabin. The onboard equipment suppliers
include RapiScan, Tower Lights, Aralia Systems, One Delta and Etherlive. ARC’s experience has shown that not all users necessarily require the MCP2’s full capability, so the range and extent of on board equipment can be tailored to a client’s exact end user requirements. Staff training and hire packages are also available for the MCP2. As an example of the unit’s equipment flexibility, One Delta’s Dale Fence panels (PXP) can be incorporated to protect against explosion fragmentation and provide external noise reduction. The panels are made of mixed waste plastic and have a resistance to fragmentation travelling at 344 mp/s. To fully understand the MCP2’s capabilities and how it will fit your requirements visit the website to view the deployment and set up video or call the office for a demonstration. FOR MORE INFORMATION Access Risk Control Ltd Double Lodge, Pinewood Film Studios, Iver Heath, SL0 0NH www.accessriskcontrol.com
Flexible Security: CDVI’s centaur access solution provides powerful integration and management support CDVI is a worldwide supplier of class-leading access control and electronic locking solutions, with products ranging from biometric and online access control, electromagnetic locking, keypads, standalone entrance systems and door automation. The CDVI Group has offices and factories in over 15 countries, encompassing four continents, with a turnover in excess of Euro 50,000,000. Its business sectors include security product manufacturing, biometric analysis, plastic and metallic engineering. The group is able to draw on a wealth of experience, ensuring that CDVI remains at the leading edge of technology and customer service. Centaur is the flagship, enterprise level, integrated access solution offered by the CDVI group of companies. With communication options to suit every installation and the ability to scale the system to site requirements, Centaur provides a very secure and flexible solution. Supported by arguably the industry’s best looking and most robust readers in the Digiprox range, Centaur will
accommodate RFID, Mifare, Biometric and RF controls with ease thanks to its industry-standard Wiegand interface. Capable of managing 64 sites with remote client server architecture, Centaur can be used to manage sites remotely via IP and internet connections. Centaur offers an integrated flexible solution and many
high-end features, providing support for CCTV integration from leading manufacturers such as Genetec, Milestone, ONSSI, Dedicated Micros, Samsung, HikVision and Pelco, and biometrics from iEvo, L1 and Sagem With included modules free of charge for guard tour, parking management and visitor management, Centaur is an attractive investment for many security applications. With its international influence and global reach, CDVI has a core focus on access control to ensure security for a wide variety of installations and will be demonstrating the flagship Centaur integrated access solution at Counter Terror Expo 2012 (stand E174 & E176) and IFSEC 2012 (with Milestone Systems on stand F90 in hall 4). FOR MORE INFORMATION Tel: 01628 531300 sales@cdvi.co.uk www.cdvi.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
71
Perimeter protection Security Fencing ,gates and barriers Electrical detection & deterrents JB Corrie is a specialist Fencing Company dealing with the installation and manufacture of High Security Fencing Systems. Offering fully integrated perimeter protection, access control, CCTV intruder detection, security management and anti – terrorist solutions. JB Corrie have been manufacturing and installing Security Fencing since the Company was established well over eighty years ago. During this time the Company has gained a vast amount of experience and expertise within the Security sector and is one of the leading Fencing Contractors and Manufacturers in the UK. JB Corrie operate with an experienced and multi-disciplined management team with all of the relevant skills requires to meet client needs. The Company is fully committed in ensuring that all work carried out is of a constant high standard, meeting all of the relevant security standards in terms of health and safety and quality of workmanship. JB Corrie are able to offer its clients high security installations of fencing, gates, barriers, civil work and special fabrications etc JB Corrie offer a specialist service at project concept, specification, planning, site survey, manufacture, installation and commissioning etc. We also have our own inhouse CAD team offering detailed drawings etc.
High Security Fencing and gates Power Fencing to BS 1722 PT 17 Perimeter Fencing to Government level Access Control CCTV Perimeter Intrusion Detection Systems (PIDS) Sliding gates and speed gates Blockers Bollards Rising Arm Barriers Security Barriers Turnstiles
Site Surveys Review existing Security installs In House CAD Team offering detailed drawings and proposals Manufacture and install special Metal fabrications
JB Corrie & Co Ltd
Frenchmans Road, Petersfield, Hampshire GU32 3AP
Tel: 01730 237100
Fax: 01730 264915 Email: admin@jbcorrie.co.uk
www.jbcorrie.co.uk
JB Corrie & Co Scotland
Signal Box Road, Blairgowrie, Perthshire PH10 6ER
Tel: 01250 873989
Fax: 01250 875884 Email: jbcscotland@jbcorrie.co.uk
HIGH SECURITY SITES
MOVING TOWARDS HIGH SECURITY SITE VERIFICATION
The PSSA has long recognised the need for an integrated verification system for high security perimeter installation, as the historical approach of PAS 68 rated Hostile Vehicle Mitigation (HVM) products filling gaps in LPS 1175 rated fencing is inadequate for a number of reasons. Primarily, end users look for advice from external agencies and experts to recommend practical solutions to meet their operational physical security requirements. However, this has involved discussions with independent organisations such as the Centre for the Protection of National Infrastructure (CPNI), who work with critical national infrastructure sites, but does have a large influencing factor on other market sectors, and specialist security consultants to assist with the compilation of an appropriate operational requirement document. Ultimately, the end user needs to define the threat type they wish to protect themselves from, be it terrorist or criminal attack and their modus operandi. Whilst the PSSA can assist with this definition, it is recognised that the advice from CPNI generally drives the global specification of any physical perimeter security solution. Whilst in principle this should be adequate, due to the political necessity for the CPNI to remain fully independent, it does mean that they cannot recommend particular solutions which favour one manufacturer over another. This is where the PSSA has a very important role in the process, as it can work with the industry to categorise products in such a way to allow them to be selected and matched together, enabling the end user to select the best product(s) for an integrated solution. BUILDING ON THE PAS RATING As a first step, the PSSA decided to build on the recognised PAS rating system and instigate an independently certified verification scheme for individual HVM products. Often, PAS has been a misunderstood and misapplied standard when specifying HVM products, as it is a standard that confirms that a product manufactured and installed as tested should perform in the same manner as the crash E
Ritchie Bignell, director, Perimeter Security Suppliers Association
Ritchie Bignell, director, Perimeter Security Suppliers Association, sees that a holistic approach to protecting the perimeter of high security sites is on the horizon
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ATG SP400 Bollards
A holistic approach to physical perimeter security is one of the fundamental drivers of the PSSA, as it is critical that infrastructure is not only protected initially but is sufficiently robust and reliable in performance to continue the protection for a number of years. Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
73
ATG Access Pioneer the Security Market & Launch Another Leading Innovation ATG Access will be unveiling a new product at the Counter Terror exhibition, London Olympia 25-26th April (Stand F181). The new product being launched - the Titan MKII ‘Independence’ is ideal to be used on remote applications where access to any power supply is limited. The product has been successfully tested in accordance with the PAS 68 testing criteria, arresting a 7500kg truck at 50mph. This provides the new product with a very high level of protection against vehicle borne attacks. Not only does the product offer a high level of protection, it is also aesthetically pleasing and economical for sites with high security needs. A variety of different trade organisations have constructed a host of standards and quality measures that are used to benchmark product excellence across the access control industry. The Perimeter Security Suppliers Association accreditation (PSSA) has recently launched a product verification scheme which aims to raise the standard of vehicle barrier systems both nationally and internationally. This is only the first step as the trade association also plans to extend this verification scheme to all perimeter protection systems and even the installation provided by contractors. The system aims to promote and audit the quality of not only products but the surrounding system and company standards also. This relates to the quality of drawings, electrical control systems and quality standards adhered to throughout the company. This gives the end user reassurance of supplier and product quality. ATG Access was one of the first of three companies to be confirmed by the PSSA as fully verified by the pioneering scheme. This UK drive to raise industry standards and provide a focal point for the market will benefit British manufacturers internationally. Vehicle Barrier system manufacturers based in the UK will soon see the benefit of these standards when tendering for jobs both nationally and
Come and see ATG Access at the Counter Terror Show – stand F181. For further information or to secure an appointment before hand, please visit our website or email us marketing@atgaccess.com.
internationally. It no longer seems enough for companies to successfully pass an impact test. With the requirement to make the full product PAS 68 designation available to potential customers; not only do products have to pass the impact test, they will now be compared with similar and substitute products to analyse the quality of the product pass. ATG’s continuous commitment to strive and meet the emerging standards within the market place has secured them a variety of high profile jobs across the globe. Recent projects have included contracts in London, Malaysia, Doha, America, Canada, the Netherlands and Thailand to name but a few. The company has grown by 30 percent over the last year and there is no doubt that this success can partly be attributed to British standards being promoted and held in higher esteem internationally. The access control market is becoming more regulated and the superior products are becoming easier to identify. Investment and partnership with eminent trade associations and government bodies such as the PSSA, CPNI and the NaCTSO will help British Manufacturers of vehicle protection barriers succeed internationally in the future.
HIGH SECURITY SITES Replaced Front Radius
E test. In other words, as long as all the conditions remain equal, the result will be similar but it is fair to say that much changes between the test and final installation, due to numerous variables such as site specific needs, dimensions and ground conditions. Given the need to accommodate so many variations, the PSSA feels that removing one variable will give clients more confidence in their installation. Therefore, the Product Verification System launched at the PSSA annual conference on 8 December 2011 ensures that the product delivered to the client has been manufactured in exactly the same way as the one crash tested, with the same materials. GOOD REACTION With the entire industry present at the launch, the PSSA was pleased with the reaction from the manufacturers, specifiers and end users, who see the product verification scheme as an important step on the road to raising the profile of the industry and generating client confidence. During 2012, the PSSA expects to see the large number of applications submitted from its members, for verification of products, resulting in a successful conclusion. The independent verification scheme from the PSSA also encompasses the handling of changes to products to meet site specification requirements. It has long been accepted industry practice to offer ‘engineered solutions’, where PAS results are extrapolated to suit the modification, supported by an independent engineering report from a specialist consultant. The PSSA scheme has formalised this process, so that the product manufactured is covered by the same stringent requirements and process documentation as the PAS tested product. This offers continuity and consistency of approach, giving client’s confidence in the solution. Now that the HVM Product
Verification System is up and running, the next stage is to develop a complementary fencing scheme. There is a paucity of standards currently available, with the only recognised scheme primarily dealing with manual attack ratings. The PSSA feels that incorporating this factor with the applicable PAS rating elements will enable a fully compliant series of products to address clients’ HVM challenges. At the recent meeting on 23 February, the fencing members of the PSSA met to continue their discussions surrounding the fundamental challenges that the clients are asking them to address. It is clear that the plethora of fencing applications and lack of scheme is leading to client confusion and concern regarding over or under specifying products. As an industry, the PSSA Fencing Verification Scheme will address these concerns. In reality, the interaction between the HVM product(s) and fencing as an integrated solution to the operational needs of the client is the most important challenge the PSSA wishes to overcome. The current silo approach to this issue, with the stakeholders involved often working independently to achieve a cohesive solution, can be time consuming, prone to error and potentially expensive. These two schemes will bring the individual elements together and develop a system which enables clients to specify and match relevant products. INSTALLATION The final logical step in the process is an installation scheme, which the PSSA has begun working on. Its brief is not only to ensure that the way an HVM product(s) is finally installed complies as closely as possible to the PAS crash test condition, important as this is, but that it compliments and works with other products on site, be it PAS rated or not, such as access controls. One key element of any installation should
The Product Verification System launched at the PSSA annual conference last December ensures that the product delivered to the client has been manufactured in exactly the same way as the one crash tested, with the same materials.
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
be whole life costs, but this is often either overlooked or ignored, which is alarming given the economic times we currently live in. As this should be one of the major decision factors, the suite of PSSA scheme’s will have as its logical conclusion a process for deciding on the most suitable array of products to achieve a commensurate level of security within a given budget. WHOLE LIFE COSTS In fact, the volume of PAS tested products now available for selection by customers has increased competition and reduced cost. Coupled with an unrivalled level of innovation, offering differing solutions to the same problem, the client needs to have a mechanism of looking at whole life costs as one means of differentiating between manufacturers. Clearly, static products generally require less on-going cost in terms of service and maintenance than dynamic products, so understanding the needs of each site is critical to an effective solution. However, cost is not the only factor to be taken into consideration. As soon as a dynamic product fails, this can adversely affect the physical security of the site. The PSSA verification schemes will continue to work to improve the reliability of installed products, so that clients’ confidence in their security will grow. Also, the PSSA is well aware of how much networking goes on between customers and a consequence of this will be to raise the industry’s profile, further installing client confidence. From time to time, products are subject to unforeseen damage in genuine accidents rather than hostile attack. Achieving a balance between products preventing attacks, but being able to be repaired expediently and cost effectively will also be an integral part of the PSSA verification schemes. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
75
HIGH SECURITY SITES Paradise Gates 2,3 & 4
E At the end of the day, security schemes involve so many stakeholders, from the end user client, to the consultant and main contractor, all of which have differing wants and needs. The historical piecemeal approach to meeting these needs has relied on manufacturers discussing with each stakeholder their requirements and promoting suitable products. This is not always wholly appropriate, as often what the client initially believes is required in terms of product is very far from the best solution, which can have disastrous and costly consequences. In fact, at the extreme, the solution may not actually prevent the event the client is concerned about, with the resultant repercussions. FUNDAMENTAL DRIVER A holistic approach to physical perimeter security is one of the fundamental drivers of the PSSA, as it is critical that infrastructure is not only protected initially but is sufficiently robust and reliable in performance to continue the protection for a number of years. The PSSA verification schemes will drive the industry to ensure working with stakeholders during specification and on going operation will successfully achieve this. Members of the PSSA will be able to not only manufacture and, where appropriate, install and maintain suitable products, but
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
During 2012, the PSSA expect to see the large number of applications submitted from its members, for verification of products, resulting in a successful conclusion. they will be able to participate and advise at the design stage. As part of the PSSA rules, all members have to demonstrate an indepth underlying knowledge and experience, as well as undertake a level of training to achieve verification. This means that any client will have the confidence of knowing that the PSSA has independently verified the member’s products and installations, so the advice given at all stages will be robust and improve the effectiveness of the project. SAFE OPERATION Another area the PSSA covers is the safe use of product, so a client can be assured that they are dealing with an organisation that can assist with the conundrum of balancing the security of the site with the safe operation of the products installed. Ever-tightening regulations in this area are requiring the client to seek advice during the planning of the perimeter scheme, and the PSSA are well placed to assist.
The PSSA is well down the road towards a truly holistic approach and is setting the standards which it believes clients have been asking to be addressed. All its members are committed to see the PSSA achieve the raising of standards, both for the industry and the security of our critical infrastructure. PSSA SEMINARS The PSSA will be hosting a number of seminars at the Counter Terror Expo (day two) on April 26th at Olympia in London, where you can find out more about the work of the association and gain greater insight into the schemes. The PSSA will be available on stand E177 in the Grand Hall throughout the event. L FURTHER INFORMATION For PSSA membership information and application go to www.pssasecurity.org Tel: +44 (0) 208 253 4509
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
77
Stops you in your tracks Introducing the HESCO® Redployable Security Fence. An anti-climb, rapidly erected and redeployable high-level security fence that doesn’t require ground preparation or foundations. Rated to PAS68, HRSF can be built on almost any unprepared surface, and with available heights of up to 3.6m it provides a steadfast temporary perimeter or vehicle barrier. See more at: www.hesco.com
HESCO is a registered® trade mark of HESCO Bastion Limited.
PERIMETER SECURITY
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Written by James Kelly, chief executive, BSIA
FOCUSING ON PERIMETER PROTECTION
Effective perimeter security seamlessly combines various systems and technologies so potential threats can be addressed in a timely manner, writes James Kelly, chief executive of the BSIA
When it comes to providing effective protection against any potential terrorist attack, given the continued heightened threat level in place in the UK, the ability to effectively secure the perimeter of a diverse range of vulnerable sites, as a first line of defence, is undoubtedly a key concern for Government agencies, the police and security managers on the
ground. Whether the location in question is transport hub – such as an airport or port - or another element of the critical national infrastructure, from power stations to oil terminals, it is imperative that integrated and robust security measures are in place. With the modus operandi of terrorists constantly evolving, as is their willingness to consider extreme measures, which could even involve chemical and radiological attacks, constant vigilance is a necessity as the reality is that terrorists will look to exploit any perceived vulnerability to their advantage. PRACTICAL CHALLENGES Significantly, many of the locations in question cover large geographical areas and, as a direct consequence, have extensive perimeters which need to be monitored around the clock, as part of an effective security strategy which seamlessly combines various systems and technologies so potential threats can be addressed in a timely manner. There is also the challenge, for those who have to manage perimeter security, that some of the most vulnerable locations also have a high throughput of individuals who should legitimately be there – for instance passengers at an airport. Consequently, a key consideration here is achieving an appropriate balance which ensures round-the-clock security of clearly defined areas of a site, where only authorised personnel should have access, without infringing too negatively on visitors and staff, so helping to maintain wider public support which is critical to E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
79
PERIMETER SECURITY E effective counter terrorism operations. Looking more closely at the type of security measures that can be put in place to meet the need for continued vigilance, where site perimeters are concerned, there have undoubtedly been major developments in the ability to create a layered defence by integrating technology which can be deployed, and managed, to provide an early warning of suspicious activity; the physical security measures that can be put in place, and the level of awareness and training manned guarding capabilities.. AN EYE ON SECURITY Undoubtedly, CCTV has a major role to play in keeping a watchful eye on critical perimeter areas as a deterrent and an active measure for early intervention. In recent times we have seen a growth in the take-up of HD (High Definition) CCTV which, when in place, offers the potential to deliver a much greater level of detail of high risk areas, compared to conventional solutions, for example at site entrances and exits. This greater clarity is invaluable when CCTV operators need to be able to distinguish between normal and suspicious activity, and allows them to pass on more detailed information to the authorities should police and other intervention be required.
There is also the challenge, for those who have to manage perimeter security, that some of the most vulnerable locations also have a high throughput of individuals who should legitimately be there.
VIDEO ANALYSIS In addition, many sites are now opting to deploy intelligent, proactive, CCTV measures such as VCA (Video Content Analysis) – as evidenced by BSIA research conducted last year - otherwise know as video analytics. A key advantage with this approach is the ability to automatically analyse CCTV ultimately ensuring that it is only authorised images, using powerful algorithms, against vehicles that can enter a location. To secure specific parameters to produce meaningful access to high risk buildings and other areas information about the content, of a site - including entrances and which is invaluable when exits - ‘smart’ technologies are CCTV operators are faced being implemented. These Some with footage from measures range from access w o n sites are hundreds of cameras. control cards using radio ared fr in frequency identification An example of VCA g in y lo p e d (RFID) chips to allow in practice would be g in thermal imag the proximity reading the setting up of a r offe n a c h of card details, to virtual tripwire at a ic h w s camera r biometric-based systems site perimeter either e g n lo r fo l with fingerprint readers as a measure where the potentia f and iris scanners. it is not possible to ge detection o n ra have a physical barrier potential TAKING A REMOTE VIEW or as an additional Remotely monitored, detectorsecurity layer. This basically intruders” activated CCTV which complies creates a virtual line which, with the revised BS8418 standard if someone crosses, will result is finding favour to keep a watchful eye on in an alert being triggered. Other types sites out of hours, by linking in CCTV cameras of VCA include the identification of items and detectors, strategically positioned on that have been abandoned or removed, the perimeter, to an RVRC (Remote Video known as Object Left and Object Removed. Response Centre). In this set-up should someone attempt to scale a fence they will A QUESTION OF ACCESS be picked up by a detector and images from CCTV based ANPR (Automatic Number an associated CCTV camera will be sent to Plate Recognition) is also a useful perimeter an operator at the RVRC. The operator could protection and access control measure,
“
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
potentially issue a verbal warning through on-site speakers to stop the intruder in their tracks - this tends to be a sufficient deterrent in over 90 per cent of cases. However, when considering a potential terrorist involvement, it may be more advisable to take another tack and avoid letting the individual know that they have been detected, instead operators can covertly direct the authorities to the scene where they can take the appropriate measures to deal with the suspect. ENHANCED DETECTION TECHNOLOGIES For enhanced surveillance some sites are now deploying infrared thermal imaging cameras which can offer the potential for longer range detection of potential intruders. Where perimeters are extensive at sites such as ports or airports, which are prime terrorist targets, additional measures such as fence detection systems, UGS (unattended ground sensors) and even radars may form part of the detection umbrella. ON THE MOVE Mobile assets are extremely flexible for perimeter security as practically they can be deployed to specific areas of vulnerability. This could be where points are not fully E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
81
. . . . . . . . . . .
Pulsed Electric Perimeter Fence Deterrent & Detection System Tamper resistant PC based GUI with mapping Simple to maintain & repair Integration with CCTV etc... Compliant with BSEN60335-2-76 Compliant with BSEN1722-17 Manufactured in the UK Design & after sales support Installation training
Tel: +44 (0)1572 722558 www.zarebasecurity.com ®
Induced Pulse
Z
areba Security is a leading provider of perimeter intrusion detection systems (PIDS) that detect, deter, delay and respond to intrusions or escapes. These systems are recommended for: • Utility companies • Correctional & prison facilities • Government or military installations • Industrial/commercial property • Airports, Ports, auto dealers • Critical infrastructure • Oil reneries • Transport hubs Zareba Security offers innovative solutions for today’s heightened security challenges. The Induced Pulse® electric fence system provides a physical barrier that is an imposing deterrent and features extremely low false and nuisance alarm rates (In recent UK government long term trials the Induced Pulse system had the lowest incidence of false alarms amongst the systems being tested). This means the security guard and/or local authorities can respond to a veried alarm rather than a false alarm. For highly secure areas the Induced Pulse® perimeter security system is
a proven perimeter deterrent and detection system the ideal solution. It is an electric fence system that combines a barrier with intrusion sensing and a shock deterrent to prevent security breaches. Adaptive fence sensing technology (patent pending) makes for a very stable system. It can ignore voltage uctuations caused by wet vegetation and other contaminates on the fence line but still give rapid response to fence attacks. The system features: • Tamper-resistant with alternating high voltage and ground wires • Minimal nuisance alarms caused by birds, small animals, weather, etc. • Customised zones and wire array • Standalone installation or mounted on existing fence, roof or wall tops • PC Windows based user interface • Graphical mapping overlay • Customer friendly GUI • Interfacing with most common data bus systems • Integration with CCTV systems • Integration with Access Control & Building Management systems • Listed in the UK Secure By Design (SBD) product list • Solid & robust construction
Zareba Security have designed and engineered perimeter fence systems for satised customers around the world. We have sales and technical staff based in the UK. We also have our own UK in house engineering department who are continually looking at innovative ways of improving the product. We are committed to working with each customer to create a cost effective solution for their clients site. Zareba Security only sell to approved installers. If you are interested in becoming an installer we would like to hear from you. We offer in house training courses to Lantra standards.
Zareba Security (Rutland Electric Fencing) 8 Lands End Way Oakham Rutland LE15 6RF Tel: +44 (0) 1572 722558 Fax: +44 (0) 1572 757614 www.zarebasecurity.com
PERIMETER SECURITY E covered by the static infrastructure - for instance if refurbishment works are underway - or to provide another layer of security, whether it be mobile in-vehicle CCTV or manned patrols by security officers with dogs. There is little doubt that high visibility security patrols are able to provide a real deterrent, particularly when security personnel randomise their patrol routes to keep one step ahead of would-be attackers. They are also fundamental when it comes to responding to intruders and helping to ensure the safety of staff and members of the public who may be on-site during an incident.
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THE BIGGER PICTURE With the extent of the security assets that can be readily implemented to keep sites safe and secure from terrorism, it is vital that as much attention is paid to ensuring that the right management systems are in place - such as a Graphical User Interface (GUI) in a control room with associated site plans - to deliver an effective situational overview of the information being provided by the CCTV, access control and other measures, so informed and timely action can be taken. ABOUT THE BSIA The British Security Industry Association is the trade association for the professional security industry in the UK. Its members are responsible for more than 70 per cent of UK security products and services (by turnover) including the manufacture, distribution and installation of electronic and physical security equipment and the provision of security guarding and consultancy services. The Association is extremely active in liaising with government to ensure that legislation reflects industry and customer needs. It has lobbied for regulation of the security industry for over 15 years, culminating in the introduction of the Private Security Industry Act 2001 and the launch of the Security Industry Authority.
One of the BSIA’s top priorities is the maintenance of high standards within the industry, and it places rigorous requirements on companies wishing to become members. BSIA draws up industry codes of practice and technical documents, often then submitting documents for consideration as British Standards. Representatives work on European standards committees to ensure these will meet the practical needs of the industry and its customers L FURTHER INFORMATION www.bsia.co.uk
A large portfolio of equipment enables Frontier Pitts to meet demanding, high security specifications of clients Frontier Pitts is the British manufacturer of high security perimeter equipment solutions. Its large portfolio of products, comprehensive range of services and extensive research and development program and integrated turnkey solutions ensure that Frontier Pitts can meet the requirements of any high security application, whilst remaining at the forefront of design and technology. Company accreditations include ISO 9001, Secured by Design, CHAS and Safe Contractor. As one of the founding members of the PSSA (Perimeter Security Suppliers Association), Frontier Pitts was one of the first members to volunteer itself for auditing by the trade association, applying to meet the new product verification scheme. The PSSA Verification recognises Frontier Pitts’ promise to provide its clients with high-end, quality products and a fully comprehensive customer service package. Its PAS 68 Anti Terra Range includes the complete portfolio of PAS 68 HVM (Hostile Vehicle Mitigation) products. In 2010/2011 the new Terra Gate Mk II (Terra sliding cantilevered gate) was successfully PAS 68 impact tested with 7500kg at 50mph. The Terra Ultimate Barrier (7500kg at 50mph) and the Compact Terra Barrier (3500kg at 30mph) joined its PAS 68 drop arm barrier portfolio, whilst the Mark II Terra Blocker
was successfully PAS 68 impact tested with 7500kg at both 30mph and 50mph. Frontier Pitts’ new Planet range of PAS 68 static bollards with aesthetically pleasing stainless steel finishes complements its active bollard measures.
For the anti intruder pedestrian market the Terra Diamond Turnstile has been accredited with LPS 1175 security rating 3 & 4. The company’s heavy duty and parking control product ranges include rising/drop arm barriers, sliding security gates, hinged and bi-folding gates, road blockers and rising kerbs, active and static bollards and pedestrian control gates and turnstiles. Frontier Pitts is more than a manufacturer, with the ability to provide a complete range of services including design, site surveys, manufacture, installation, civil and electrical services, maintenance, spares, repair or refurbishment and full project management. As both a manufacturer and supplier the company also believes that maintenance is an integral part of customers’ equipment. Its range of maintenance contracts are designed to suit individual site requirements and include response times of just four hours. Visitors to stand H108 at the Counter Terror Expo at Olympia, London, between April 25-26 can see the full range of Frontier Pitts products and services. FOR MORE INFORMATION Contact: Sally Osmond +44 (0) 1293 422800 sales@frontierpitts.com www.frontierpitts.com Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
83
B U I LT O N I N N OVAT I O N
INSITU CONCRETE PERIMETER DEFENCE SYSTEM PAS 68:2010 accredited security system 7.5t vehicle (N2/N3) up to 90째 impact at 64kph and 80kph
PREDOMINANTLY SURFACE MOUNTED
RAPID PROFESSIONAL INSTALLATION
50 YEAR DESIGN LIFE WITH MINIMAL MAINTENANCE
THWARTS BOTH VEHICULAR AND PERSON-BORNE ATTACK
ACTS AS FOUNDATION FOR FENCES, LIGHTING AND CCTV
MINIMAL FOOTPRINT HIGH PROFILE CLIENT PORTFOLIO
Web: www.extrudakerb.co.uk | Email: security@extrudakerb.co.uk
Tel: +44 (0) 1709 862076
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Crime monitoring and prevention: Derbyshire Police benefits from expertise in image processing Electrosonic installs flexible video wall technology at Derbyshire Police’s Control Centre to help incident commanders with crime prevention and terrorist threat monitoring. The challenge: Electrosonic was selected by Derbyshire Police to install a flexible video wall and image processing system in their new control centre to increase the efficiency of their operations. Incident commanders identified a need to be able to view all of the CCTV images of an incident on a single, highly flexible platform and transfer selected images to displays in four meeting rooms within the centre, increasing collaboration amongst teams. The Solution: Electrosonic installed a 5×2 display consisting of an array of Mitsubishi 50inch rear projection cubes fed from an Extron Quantum Elite multi-image display processor with 24 CCTV and ten high resolution RGB sources. Electrosonic worked with Tyco Fire and Security, who supplied the CCTV control system for the security project. Control and placement of the sources was achieved using Tyco’s Mosaic software integrated into the Commander control software supplied with the Quantum processor. The entire system
was assembled and tested at Electrosonic prior to installation, minimising the on-site installation time and ensuring that it would perform to the agreed specifications. The Results: The control centre, which is central to crime prevention and terrorist threat monitoring, allows images to be sent from local authorities, site cameras and a helicopter link, to be received and displayed on the video wall. The image processor feeds images to four smaller rooms in the new control centre so that images displayed on the main video
wall can be shared for collaboration on larger operations. The system allows incident commanders to be more effective and efficient in the deployment of resources and in the command and control of incidents. Ongoing service and prevention: The critical nature of control rooms means they must be in full working order 24/7 every day of the year. Electrosonic’s service team continues to support Derbyshire Police with regular preventative maintenance visits, telephone support and a four hour response time to ensure the continuity of their control room operation. About Electrosonic: Electrosonic’s Control Rooms team provides technology solutions for control rooms and mission critical environments around the globe, including audio-visual design, systems integration, service and maintenance and lamp replacement programmes. FOR MORE INFORMATION Tel: +44 1322 222211 info@electrosonic.com www.electrosonic.com @electrosonicAV
S O LV I N G
TECHNOLOGY CHALLENGES Electrosonic selects the best combination of cutting-edge and established technology for your project. Our technology solutions have captivated and entertained audiences around the world for over 45 years.
Audio, Video and Control Solutions
info@electrosonic.com | +44.1322.222211 | www.electrosonic.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
87
SUPERIOR PERFORMANCE PROTECTIVE CHANNELS FOR DETECTION & COMMUNICATION CABLES CAN VASTLY REDUCE OR ELIMINATE THE NEED FOR CABLE DUCTING & CIVIL WORKS INTEGRATES WITH IP SYSTEMS AND ACCESS CONTROLS AVAILABLE IN THREE MESH TYPES
Contact us to talk about the design, supply, and installation of a fully integrated perimeter security solution. CRH FENCING & SECURITY GROUP (UK) LTD
T: 01302 760 861 E: info@crhfsg-uk.com www.crhfsg-uk.com VISIT US ON STAND F12
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Marking a quarter century of designing, manufacturing and installing innovative perimeter security products 2012 marks a quarter century of successful trading for Cova Security Gates, designing, manufacturing and installing perimeter security equipment globally. 1987: Initially based in Horley, Surrey, gates, road blockers, bollards and barriers were designed and engineered to provide high quality, often bespoke, solutions to perimeter security requirements. An ethos of innovation and development grew; the team worked closely with end-users, architects, consultants and building contractors, satisfying the need for products which could cope with long term continual usage, often in hostile environments. In the last decade, products which are CPNI regulated, TRL/MIRA tested and PAS68 compliant were added. A complete package is available, comprising design/ manufacture, installation, service and maintenance, giving customers reassurance that their perimeter security products will continue to give the best service possible. 2002: Introduction of tracked CSG10601/2/3 speed gates. 2003: Introduction of trackless CSG10604/5 speed gates. Cova was the first manufacturer worldwide to bring a trackless speed gate to market. 2005: CSG10503 road blocker gained a formal crash test rating (7.5 tonne @ 50mph) after the same (untested) blocker stopped
a vehicle-borne explosive attack in 2003 at the entrance to the British Consulate General in Istanbul, preventing detonation at the intended target, the main consulate building. 2005: CSG10506 shallow mount road blocker successfully crash tested (7.5 tonne @ 50mph). 2009: CSG10840/50 shallow mount bollards join Cova’s portfolio of crash rated products, providing two options, 7.5 tonne @ 40mph and 50mph respectively, designed for either straight or curved array installation to meet architectural requirements. 2010: A milestone year when, after requests from the company’s blue-chip clients for protection against hostile vehicle attacks, the world’s first crash tested speed gate (7.5 tonne @ 40mph), the CSG10610, was developed and introduced, followed swiftly by the CSG10611 (7.5 tonne @ 50mph). 2011: In response to specific client needs,
the standard sliding cantilevered gate was redeveloped using Cova’s patented arrestor technology, and the PAS68 rated CSG10140 sliding cantilevered gate was launched as a cost-effective perimeter security solution. 2011 also saw Cova move to a new and much larger, state of the art production facility in Crawley, Sussex. 2012: And today? That same patented arrestor technology is being integrated into a new urban barrier system: launch of this is expected once PAS68 testing is complete. Another product neatly fulfilling Cova’s ethos ‘Invention not convention’. In what promises to be a good year, Cova is Crawley constituency’s nominated manufacturer in the governmentled Made By Britain initiative; CTSS Awards finalist (Perimeter Protection and Intrusion Detection category); and Gatwick Diamond Business Awards finalist (Innovation & Technology category). Here’s to the next 25 years. FOR MORE INFORMATION Sales Department Cova Security Gates Limited, Unit C1 Sussex Manor Business Park, Crawley, West Sussex RH10 9NH Tel: 01293 553888 sales@covasecuritygates.com
The UK’s Premier PerimeTer secUriTy manUfacTUrer A quArter of A century trAding in the design, mAnufActure, instAllAtion And service/mAintenAnce of : crash tested and standard trackless speed gates crash tested and standard sliding gates crash tested and standard boom barriers crash tested and standard rising bollards crash tested and standard static bollards Pedestrian gates, manual and automated turnstiles
visit us at:
counter terror expo, olympia london grand hall, stand g50 25/26 April 2012 cova_ad_feb12_178x125mm-v3.indd 1
contact us for further information, or to discuss your detailed requirements. cova security gates limited
tel: 01293 553888 email: sales@covasecuritygates.com
www.covasecuritygates.com 13/03/2012 17:19
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
89
BROUGHTON CONTROLS LIMITED has over 35 years of experience in the design, manufacture, installation and service of a vast range of entrance control solutions throughout the UK and EMEA regions. Ranging from vehicle road blockers, security barriers and pedestrian equipment including turnstiles, gates and impact tested PAS 68 products. Broughton Controls prides itself on not merely supplying equipment but providing solutions to clients’ problems by helping design systems for each specific project, utilising its vastly experienced engineers and the latest CAD design systems. Broughton use this experience to its advantage offering the ability to design or customise existing products to meet exact customer requirements, whilst using standard control and automation systems to maintain reliability. This allows a precise solution to each customers requirements, rather than the compromise of trying to use existing, off-the-shelf products. Broughton’s policy of involvement in project design and management with a dedicated project manager ensures smooth progression from order to handover, and with ongoing maintenance support through sister company Eisotech Services Ltd, this ensures long term system reliability for years to come. The High Security Division of Broughton Controls Ltd provides commerce, industry and governments around the globe with a range of security products designed for high risk applications. As a dedicated resource, this division contains the ability, experience and knowledge to address and solve the perimeter and entrance control issues encountered by the evolving threats in todays ever changing world. To meet increasing demand for high security solutions both abroad and here in the UK, Broughton Controls High security division is constantly developing a range of impact tested products to PAS 68 criteria to compliment its existing range of proven industrial equipment. At the forefront of developing new solutions to resist impact are new technologies, these are utilised to launch robust, competitively priced solutions when compared to existing products currently available. Customers also have peace of mind, Broughton Controls are founder members of the PSSA supporting the drive to improve industry standards and compliance. Our Defender 941 and 942 products are approved within the PSSA product verification scheme. Broughton Controls Limited are part of CRH Fencing and Security Group this offers access to many respected group companies such as; Heras, Darfen and Geoquip. For those contractors seeking a ‘One Stop’ solution of fencing, perimeter intrusion detection and project management with associated services we are sure we can help.
Broughton Controls Ltd. 33 Stakehill Industrial Estate, Middleton, Manchester. M24 2RW Telephone: 0161 655 1020 Facsimile: 0161 655 1021 Email: info@broughton-controls.co.uk Web: www.broughton-controls.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Integrated perimeter solutions built on quality products and industry-leading experience Littlewood Fencing Ltd has been established for 16 years and in this time has developed a reputation for excellence within the fencing industry. At the forefront of perimeter protection, Littlewood Fencing has made its name providing an honest and reliable service to its clients. The organisation boasts a portfolio that spans a variety of industry sectors and having worked extensively on the nation’s rail network, highways, schools and NHS trusts is now establishing itself at the forefront of the security fencing market. With the threat to critical infrastructure remaining high it is important that these sites are sufficiently protected using the correct systems, installed by competent and specially trained operatives. Littlewood Fencing can accomplish this offering a complete service from consultation and design, through the construction phase, commissioning, maintenance and after sales support. Evident on the East London Line scheme, Mark Walker of Carillion testifies “Littlewood Fencing has performed to a high standard throughout the project,” “Sound management processes have enabled a fast and efficient installation period during strict time frames whilst also maintaining a strong H&S record on what are potentially hazardous sites. I would have
no hesitation in working with them again.” Working throughout the UK for Network Rail and as a framework contractor for the Ministry of Justice, Anglian Water and Wales and West Utilities Littlewood Fencing has developed key skills and a strong understanding of what is required on these sensitive sites. The company has the experience and expertise to be able to offer maximum security fencing solutions integrated CCTV, access controls, perimeter intrusion detection systems (PIDs), barriers, blockers and lighting.
Taking advantage of a vast array of project management experience Littlewood Fencing has successfully completed schemes with a contract value in excess of £3million and has recently completed the multi-faceted security upgrade at Gatwick Airport. As an independent contractor Littlewood Fencing is not tied to a single manufacturer or product line. This affords it the opportunity to source the best products from industry, ensuring it always offers the client the product they require at the most cost effective price. Littlewood Fencing’s experience, coupled with broad product and industry knowledge, allows it to provide integrated perimeter solutions rather than merely supplying independent ad hoc fence systems. Neil Dalley, engineering manager at Capex, Wales and West Utilities has worked closely with Littlewood Fencing over the past three years: “We have been continually impressed by their conscientious and diligent approach whilst operating on a series of high value and complex projects. We would have no hesitation in recommending their services”. FOR MORE INFORMATION Tel: 01424 775333 Fax: 01424 775444 info@littlewoodfencing.co.uk www.littlewoodfencing.co.uk
security l fencing l barriers
Project Management and Installation
Perimeter Protection and Security Fencing
Utilities, Infrastructure and Secure Environments
• Nationwide Main Contractor Capability
• Maximum and High Security Fencing
• 140 Highly Trained Operatives
• Complete Turn-Key Service
• Powerfence, PIDS and Access Control
• Health, Safety, Quality and Environmental Management (ISO9001:2008 and ISO 14001:2004)
• PAS Rated Barriers and Blockers
• Working in Partnership with Industry Specialists • Approved Framework Contractor
creating safe, sound, and secure environments Tel: 01424 775 333
ww ww.littlewoodfencing.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
91
www.avon-barrier.co.uk
Manufacturers of Specialist Security Systems
Impact Test Standards UK - PAS 68 US - ASTM F2656-07
Barriers Road Blockers Bollards Gates
Hostile Vehicle Mitigation sales@avon-barrier.co.uk Tel: +44 (0) 1179 535 252
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
GPS Perimeter Systems – specialists in high security, perimeter intrusion detection systems GPS Perimeter Systems Ltd is a supplier of high security intruder detection products for external applications. The company has been operating in the UK high security perimeter detection market for more than 11 years. The group overall has more than 35 years’ experience in the design, development and application of perimeter detection products and have helped install thousands of systems all over the world since its inception in 1974. Continuous research and development has lead to the use of new technologies and techniques in the wide range of detection systems designed and manufactured in house. The range of products the company supplies is diverse enough to ensure that it has a cost effective solution to virtually any high risk perimeter. There are multiple technology buried detection systems, used for covert or aesthetic reasons, fence mounted fibre optic and cable technology intrusion systems and free standing microwave and infrared sensors for high security applications. The company also has a complete range of management and integration systems, which allows simple integration of the different technologies into a simple, seamless management environment. Matching
different technology detection techniques to the correct areas of a large site is now easily achieved. Integration of other security systems such as CCTV control and recording is also possible using the modular SCS Security Management software suite. The range is the subject of continuous development and enhancement and recent new products include fibre optic based systems for the protection of very long perimeters, fences, pipelines and underground cable ducting and a covert,
single cable, buried detection system. Of particular interest is the new system, Miles, used to detect interference with cables in underground ducts. The theft of cable from ducting can cause significant disruption and loss of revenue to a large number of companies and individuals. It can also be used to detect attempts to intercept communications on existing copper or fibre optic infrastructure. Such diversity allows GPS Perimeter Systems to specify for virtually any type of application, from the most secure government sites to prestige residential properties. Current major customers in the UK include the prison service, nuclear and other power generation plants, oil and gas distributors and new systems for solar panel parks. In short, if you have something to protect, property, assets or people, GPS Perimeter Systems can supply the solution. FOR MORE INFORMATION GPS Perimeter Systems Ltd 14 Low Farm Place, Moulton Park Northampton NN3 6HY, UK Tel: +44( 0)160 4648344 info@gpsperimeter.co.uk www.gpsperimeter.co.uk
Suitable for protecting: Cable Ducts Pipelines Fences
GPSPerimeter.co.uk +44 ( 0 ) 1604 648344
The MILES fiber optic detection system
Very high detection capabilities
No power required in the field
Attack point identification
Works with new or existing fibers
Suitable for distances up to 25km
Also used for cable theft detection
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
93
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PAS68 BOLLARDS AND BARRIERS
BEAUTY, NOT A BEAST
Safetyflex presents its slimline, aesthetically sculptured PAS68 anti-terrorist barriers that blend into the landscape and urban street environment When we refer to PAS68 barriers and bollards, and hostile vehicle mitigation, people straight away think of these products as ugly, over-engineered and over-bearing, which scar the landscape. PAS68 products have always been known to be oversized and military or industriallooking. They are however needed to protect our assets and key infrastructure, therefore aesthetics have been put aside. Safetyflex Barriers has invented one of the most innovative PAS68 security products in the world today. We’ve taken away the overpowering large bollard, and concentrated on designing products that are slimline, aesthetically sculptured and that blend into the landscape and urban street environment, which architects and clients are always searching for. Unlike standard PAS68 steel tube bollards, Safetyflex’s unique PAS68 bollards are manufactured using a special composition of spring steel allowing them to absorb extreme amounts of energy/impact thanks to its springflex technology. On impact, the dynamics of Safetyflex’s spring steel bollards can move around five Cartesian co-ordinates, as opposed to a standard steel concrete tube bollard which can only move through one co-ordinate. It’s this technology which enables the spring steel bollard to return to its starting point after impact – whereas other bollards would collapse. We have found that most PAS68 Barrier and Bollard systems in the market place today are heavily over-engineered, with a large mass of steel, in and out of the ground.
94
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
They require this large mass to stop the vehicle impact, fighting force with force. Our concept is more of an engineered product. We do not fight force with force – we let the vehicle impact into the spring steel barriers. The spring steel barriers absorb the energy from the impact and transfer the energy back into the vehicle. This allows us to use a very small amount of steel, and a small amount of rebar in a shallow footing of only 400mm. Making the Safetyflex Bollards a lot
The group has a solid base of 40 years of manufacturing experience during which time they have won a string of top awards – including a prestigious Chartered Institute of Highways & Transportation CIHT/CPNI Security in the Public Realm Award in 2010. The award was for PAS68 Bollards at the Bournemouth Conference centre. TESTED TO THE MAX Every single Safetyflex bollard and barrier is rigorously load tested at the company’s inhouse testing facility – providing customers
The world’s number one manufacturer of PAS68 spring steel barriers and bollards have a solid future after entering the busiest trading period in the company’s history. smaller and streamlined than existing PAS68 bollards in the market place also brings down the cost dramatically. SAFETYFLEX – LEADING THE WAY The world’s number one manufacturer of PAS68 spring steel barriers and bollards have a solid future after entering the busiest trading period in the company’s history. Safetyflex Barriers, a division of the GME Springs group which has operations in the Midlands, Yorkshire and Scotland, has live enquiries worldwide of more than £100 million and has made more than 10,000 antiterrorist PAS68 bollards in the last 12 months.
with a guarantee that the product they install will withstand extreme pressure. Director Marcus Gerrard said demand for Safetyflex’s services has gone through the roof. “We are now the world’s number one manufacturer of PAS68 spring steel barriers and bollards, and one of the major factors behind this is very much down to the vigorous pre-testing we carry out on every product we produce,” he said. “These are the only pre-tested PAS68 bollards available on the market and we see this as a major factor why they can be seen protecting high-profile buildings across the UK and beyond. “Our customers demand the highest quality E
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
E products and need to have confidence that in the event of an impact the barriers and bollards are going to work. “Without the extreme testing we carry out as standard, there’s no way we’d be able to give them that guarantee. It’s this level of service which sets us apart from our competitors.” Gerrard said the Bollard foundations in Safetyflex’s products are only 400mm deep and the spring steel is designed to withstand extremely heavy impacts and more than 20 years of wear and tear. “In years gone by anti-terrorist bollards would only be used at high-security sites around the perimeter and to guard key infrastructure,” he added. “Due to the environment we live in today we now supply these bollards to protect cash centres, sports arenas and shopping centres along with key government buildings and airports – so basically to secure any potentially vulnerable area. We also offer our PAS68 Street furniture, benches, bike racks and planters. In addition we can offer a bespoke design, as all our products are manufactured in-house.” EDGBASTON CRICKET CLUB One of the world’s top sporting venues is among the latest high profile clients of Safetyflex Barriers and the GME Springs group. Around 200 PAS68 anti-terrorist security bollards have been installed by Safetyflex to protect the entrance to the new £32 million Pavilion End at Edgbaston.
Phil Macdonald, project director at Warwickshire CCC, said he was pleased to work with an innovative manufacturer like Safetyflex. “We were hugely impressed by Safetyflex’s expertise and pleased a Midlands manufacturer has designed a top quality security system which really blends in well with the character of the stadium,” he said. ATTENTION TO DETAIL “Everyone at Warwickshire CCC is absolutely delighted with the new Pavilion End. Every attention to detail was taken into account on the renovation and the bollards fit perfectly into the scene outside the ground,” Marcus continued. “We were really pleased to be approached by Warwickshire CCC project director Phil Macdonald to provide our expertise and play a part in the expansion of one of the world’s leading cricket grounds “The club didn’t want the standard PAS68 bollards, as they would have been too over-bearing for the new plaza, so were overjoyed with our slim line PAS68 bollards. “The stadium looks fantastic following the renovation and we’re proud to have one of our bespoke security systems at the front of the ground.” L FOR MORE INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry. Tel: 024 76 664911 www.safetyflexbarriers.co.uk
New product launch Safetyflex Barriers is delighted to announce the launch of its new range of Shallow Mount Bollards. The bollards have a shallow footing of only 200mm, a fraction of the underground depth many products on the market require, and as with all Safetyflex’s products provide the highest security without the high price.
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
95
NEW PAS 68 STRONGUARD FENCE
2.5 TONNE AT 48KPH
7.5 TONNE AT 48KPH
STOPPED! stronguard RETROFIT
crash system
stronguard
TM
maximum security palisade
TM
JUST ONE OF THE HM GOVERNMENT APPROVED SECURITY ENHANCED PRODUCTS. STRONGUARD RCS CAN ALSO BE RETRO FITTED TO EXISTING STRONGUARD SYSTEMS.
stronguard
TM
invicta
stronguard
TM
stronguard
TM
cantilever
stronguard
www.barkersfencing.com sales@barkersfencing.com or call us now! +44(0)1782 319264
STRONGUARD . DESIGNED TO SECURE & PROTECT. TM
TM
swing gates
200602
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PERIMETER SECURITY
HOSTILE VEHICLE MITIGATION
Give your perimeter the protection it needs with a palisade hostile vehicle mitigation fence Securing the perimeter of Critical National Infrastructure sites from the terrorist threat, organised crime and unwanted intruders poses different kinds of security challenges but each can be resolved with a coherent specification-driven secure gate and fence line. For decades, fences have been the first lines of defence, from basic boundary demarcation through to high security perimeters for CNI sites such as power/sub stations, military establishments, ports, airports, water treatment plants, banking facilities and refineries. The only way to maintain the quality and give your perimeter the protection required is to purchase products from a manufacturer who makes the investment to develop their perimeter fences to security-approved specifications. STRONGUARD RCS25 & RCS75 Adding to the HM Government-approved StronGuard range of security enhanced products, Barkers Fencing is pleased to announce that the highly successful StronGuard RCS high security palisade fence system recently passed two crash tests conducted at Transport Research Laboratory and gained the following PAS68 classifications: PAS68:2010:2500(N1G)/48/90 and PAS68:2010:7500(N2)/48/90 The development brief was simple: “We need a retrofit system!” After many hours of research and testing by the Barkers Fencing development team a solution was reached that enabled an existing StronGuard fence to be refitted on site and StronGuard RCS25 was born. After the successful test at the TRL, we were given the task of tackling the 7500 tonne vehicle. A few weeks later we were back on the test facility and after a loud bang we can now introduce StronGuard RCS75. “We are really proud that StronGuard RCS is the first Palisade based fence to achieve these PAS classifications. It can be retro fitted to the many kilometres installed both here in the UK and around the world. If ordered as a new fence system, many components will be incorporated in to the manufacture to make the onsite installation extremely simple.” StronGuard RCS25 and StronGuard RCS75 fit well within the existing StronGuard Security Enhanced product range which also comprises: Interceptor, Invicta, articulated static bollards, road blockers and secondary fence systems all giving hostile vehicle mitigation protection, but now with the addition of StronGuard RCS existing installations can be retrofitted for added strength and security. • StronGuard Interceptor • StronGuard Invicta • StronGuard Cantilever gate
• StronGuard Swing gates and fencing Alongside the many advantages and additional security of the RCS system the two main benefits are: the fenceline footprint will not increase by having to install two different perimeters performing two completely different functions, and users only have to install the posts with standard foundations, not the large amount of concrete that some other PAS products require. FROM BOARD TO BORDER At Barkers Fencing there is a dedicated team of professional perimeter security advisors to assist in all aspects of the tender and specification process. From the very start, Barkers Fencing has the expertise to offer help and guidance for each and every step. We understand how difficult and time consuming it can be to find exactly the right products for each stage of your project. Fencing design, specifications and requirements are no different. If you have a concept or design, we can create a bespoke system or recommend a solution from our perimeter security range to perfectly match your needs. We can prepare detailed specification documents and provide complete drawings ready to be inserted straight into your tender documents and sent to your main or sub contractors. INSTALLATION Barkers Fencing has also introduced an approved/licensed installer’s scheme which maintains the integrity of the product and also ensures correct installation procedures are followed. To ensure satisfactory installation an audit is completed after the fence line is installed, and a written report issued to the client. The installer is required to maintain a high standard of compliance or they run the risk of losing their accreditation. The Barkers Fencing ‘Licensed Installer’ scheme delivers a complete, compliance standard from start to finish. Working together in partnership with Barkers Fencing, a safe and secure working environment for service personnel, employees and their families can be created, and assist in protecting the country’s vital national infrastructure. L FOR MORE INFORMATION Contact: Russell Ridgway, sales & marketing director, Barkers Engineering Limited Tel: 01782 319264 russellr@barkersengineering.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
97
Aircraft Carrier Alliance - Case Study CP Cases awarded Aircraft Carrier Alliance (ACA) contract to supply Rackmount Enclosures to QE Class Aircraft Carriers Introduction
About the Product
CP Cases, the UK based specialist designer & manufacturer of protective rackmount enclosures and transit cases is proudly supplying more than 1200 custom-designed rackmount enclosures and more than 4000 adaptors and brackets, for installation onboard the two new Queen Elizabeth (QE) Class aircraft carriers currently under construction.
The primary function of the network equipment enclosures is to provide physical and electromagnetic security to various types of Cisco IE Ethernet network switches and the thousands of accompanying connecting datacoms, Ethernet and fibre optic cables.
CP Cases won the contract in competitive tender last year and manufacture is now underway at the company’s West London plant. “The building of these two mighty ships is a monumental engineering project and we’re very proud to be part of it” said Peter Ross, Managing Director of CP Cases. “It is humbling to think that we’re part of a small elite group of engineering companies, which represent the “crème de la crème” of the UK’s finest manufacturers, and that the enclosures we design and build here in our factory, will play a mission critical role on-board these Royal Navy flagships. We are part of a truly national project, supporting local jobs and communities throughout the whole country, with thousands of people working towards the single goal of making these ships part of our national heritage”.
The contract, worth in excess of GBP £1.25 million, is for datacoms enclosures of various sizes. The smallest enclosure accommodates 2 single units of 19” rack-mounted network switches; the largest cabinet stands almost 5 feet tall and can accommodate 29 units. Also developed especially for this project are a series of plinths and brackets, which secure telephone handsets to horizontal and vertical surfaces around the ship, these are being supplied in phases between now and 2014 as part of the design, build and commissioning process.
The communications requirement is substantial – the carriers need constant contact with all in-flight aircraft, the consort group, HQ and land forces. The network switches process and route this vital communications data. Each enclosure protects the 19” rack mounted switches from vibration, impact, particle and moisture ingress, and also provide screening from any electromagnetic interference (EMC/EMI) that could disrupt the mission communication systems from radar energy and other strong electromagnetic signals which are emanating from various positions on board, ensuring the ship’s sensors do their job without adversely affecting each other. The first shipment of 400 enclosures have been despatched to central stores in Motherwell, for onward shipping to Rosyth where the first carrier, HMS Queen Elizabeth is currently being assembled. Commenting, Dave Bickley, Supply Chain Specialist from BAE Systems Mission Systems said “ Yet again CP Cases have exceeded our expectations regarding the swift progress, attention to detail and willingness to do the best job possible at all times”.
Working closely with BAE Systems, one of the four Aircraft Carrier Alliance (ACA) partners, CP are also integrating the power supply wiring, voltage filter and cable management systems in order that once installed into the ships, the enclosures are ‘plug & play’ ready.
CP Cases Limited, Unit 11 Worton Hall Industrial Estate, Worton Road, Isleworth, Middlesex TW7 6ER, United Kingdom Tel +44 (0)20 8568 1881 | Fax +44 (0)20 8568 1141 | Email info@cpcases.com | www.cpcases.com All information believed to be correct at time of publication. No liability accepted for decisions made as a result of errors. Specifications may change without notice.
EMC Functionality CP Cases have introduced and utilised novel designs embracing the same materials developed specifically for EMC/EMI screening used as part of their own ‘ERACK’ series of portable Anti-Vibration rackmount containers, which are performance certified to provide a high level of electromagnetic sheilding. Their solution for providing electromagnetic compatibility throughout all sizes of enclosures, also manages interference which could potentially emanate where the data transfer cables enter and exit the enclosures. CP Cases have developed a unique Cable Entry Port (CEP) which allows cables, with accompanying connectors, to be fed into and out of the enclosure through a simple “foam flap” letterbox system.
In parallel with EMI/EMC security, a primary function was to provide simplicity during equipment installation, maintenance and cable connectivity. Top & front covers are secured with unique tamperresistant TORX PLUS® fasteners ensuring access is limited to authorised service personnel. Ventilation panels in key areas, provide natural convection that dissipates any heat build-up even East of Suez. The thermoplastic powder coated surface finish is applied onto an etch primed base; pale grey, it is applied electrostatically without solvents and cured with heat to provide a hard wearing semigloss surface finish. This is tougher and much less hazardous than conventional liquid paint coatings and has exceptionally high corrosion resistance.
This specially designed (and EMI/EMC performance certified) CEP, uses conductive closed-cell polyethylene foam, which compresses around individual data cables. Conventionally, each cable would have been installed via an individual four part metallic cable gland, and bearing in mind that many enclosures have up to 144 individual cable entry & exit points, the CEP system provides significant advantages on installation labour hours, providing substantial cost benefits and ensures any future systems upgrades are implemented efficiently. CP Cases chief project engineer Roger King, said “Working on the QE Class programme has provided an invaluable insight into what it takes to deliver this major engineering project. The unique nature of working within this alliance of companies from the outset provides a great opportunity to develop and integrate the most practical solutions for network communications and hardware protection.”
Internal Functions Cable management rails inside the enclosures with “hook-n-loop” cable ties ensure that the recommended bend radius for each datacoms cable is never compromised and that network switch gear connections are safe-guarded against accidental disconnections.
The Nations Flagships CP Cases is delighted to be part of the project for the two new QE Class aircraft carriers, a huge national endeavour rarely witnessed in the UK. The project has created or sustained between seven and eight thousand jobs at shipyards across the country, with many more engaged in the supply chain producing all component parts and build for the two ships, boosting local economies across the UK. Construction of the two new vessels is the largest shipbuilding project ever undertaken by the Royal Navy, and also one of the largest engineering projects ever undertaken in the UK, second only to London’s 2012 Olympic Park. When completed, the two aircraft carriers will be the largest surface warships ever constructed in the UK. Everything about the QE class aircraft carriers is on a gigantic scale, in fact the massive size of the project is more than most of us can contemplate: The sections for the two ships, which are being built in six different shipyards across the UK, will be transported to dry dock in Rosyth for assembly. Piecing together the mammoth three-dimensional jigsaw demands its own specialist equipment. Standing at a height of 68 metres (220ft), with a span of 120 metres (390ft) and a lift capacity of 1000 tonnes, the ‘Goliath’ crane is the biggest of its type in the UK.
CP Cases Limited, Unit 11 Worton Hall Industrial Estate, Worton Road, Isleworth, Middlesex TW7 6ER, United Kingdom Tel +44 (0)20 8568 1881 | Fax +44 (0)20 8568 1141 | Email info@cpcases.com | www.cpcases.com All information believed to be correct at time of publication. No liability accepted for decisions made as a result of errors. Specifications may change without notice.
The crane will lift and place the carrier sub-blocks and components without any disruption to the adjacent dockyard area. It dominates the south-west Fife skyline and is clearly visible from the Forth Road Bridge and approach roads. Goliath is currently undergoing testing and it is estimated that it will have its final handover by the end of the summer, with an operational target of later this autumn. Babcock project director Sean Donaldson said, “The civil works, crane, electrical package and general shipyard upgrade forms a £80 million programme designed to make the Babcock Rosyth facility capable of assembling the QE aircraft carriers. All projects within the programme are performing to budget and schedule, to high safety standards, and when complete the facility will be unique in the UK.” The number one dry dock at Rosyth, which was built in 1916, is understood to be one of the best locations for building the aircraft carriers. Rosyth has the largest non-tidal basin for ship repair in the UK, which is thought to be an ideal environment for assembly, outfitting and maintenance activities.
INSIDE THE HMS QUEEN ELIZABETH CLASS 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85
Aviation store F35 Lightning II Phalanx automated close-in weapons system Forward island bridge Navigation radar Long range radar Forward engine and gas turbine uptakes Forward aircraft lift Merlin helicopter After island emergency conning bridge Mainmast Medium range radar Communication outfit After engine room and gas turbine uptakes Flying control position After aircraft lift Chinook helicopter Automatic small calibre gun Inflatable life-raft stowage Forward mooring deck Junior rates’ six-berth cabins Junior rates’ showers and toilets Ship’s office complex Pyrolysis compartment Forward gas turbine space Forward engine down-takes Fire protection system Hangar forward bay Forward hangar doors Air squadron complex Mass evacuation system RN police office and cells After engine downtakes After gas turbine space After hangar doors Air filtration units Hangar mid bay Hangar aft bay Aft mooring deck Starboard mooring deck Port mooring deck Anchor (port and starboard) Water ballast compartment Chain locker trunk Gym Junior rates’ recreation space Mission systems office Mission systems complex Forward engine room uptakes Bakery Pipe passage Junior rates’ galley Junior rates’ dining hall NAAFI canteen spaces Low voltage distribution compartment After engine room uptakes Hospital area Ward area General medical area HQ1 and ship control centre Senior rates’ dining hall Officers’ and senior rates’ galley Wardroom Wardroom annexe Head of department cabins Flag and commanding officers’ galley Flag officer and commanding officers’ dining room Commanding officer’s suite Flag officer’s suite Rudder (port and starboard) Bulbous bow Auxiliary machinery space Naval stores complex Avcat tank Forward engine room Fresh water tanks Stabiliser compartment (port and starboard) Stabiliser (port and starboard) Heel correction tank (port and starboard) Bilge keel Void After engine room Propulsion motor compartment Propeller (port and starboard) Officers baggage coompartment
© Crown Copyright (MOD) 2010. Artwork: Ross Watton (Assoc.) RINA, PO Box 83, Llandysul, SA44 9AH, www.navalbroadsides.co.uk/info@ navalbroadsides.co.uk. With thanks to the many at the Thales Group who have helped in the production, plus: Lt Cdr Pauline Aird, Steve Lapsley, Rick Hassal, Eddie Trott, Jason Jones, Lt Tom Ivory, Lt Cdr Toby Mcann, Hempel UK Ltd, Hertel, Rolls-Royce and Wynn Marine. Extra thanks to Cdr Owen McDermott and Mr Tony Graham, especially for their patience.
BAE Queen Elizabeth CVF Cutaway.indd 1-2
CP Cases Limited, Unit 11 Worton Hall Industrial Estate, Worton Road, Isleworth, Middlesex TW7 6ER, United Kingdom Tel +44 (0)20 8568 1881 | Fax +44 (0)20 8568 1141 | Email info@cpcases.com | www.cpcases.com All information believed to be correct at time of publication. No liability accepted for decisions made as a result of errors. Specifications may change without notice.
19/7/10 15:15:11
THE HMS QUEEN ELIZABETH CLASS
Facts and figures Class: Queen Elizabeth-class Pennant number: R08 (Queen Elizabeth), R09 (Prince of Wales) Motto: semper eadem – always the same (Queen Elizabeth); ich dien – I serve (Prince of Wales) Builder: Aircraft Carrier Alliance Laid down: July 7 2009 Expected in-service dates: 2016 (Queen Elizabeth), 2018 (Prince of Wales) Displacement: 65,000 tons Length: 920ft (280m) Beam: 230ft (70m) Draught: 36ft (11m) Speed: 25+ knots Complement: 682 (up to 1,600 with embarked air group) Propulsion: 2 x Rolls-Royce MT30 gas turbines and 4 x diesel generator sets producing a total of 110MWe Range: 8,000-10,000 nautical miles Armament: Phalanx automated close-in weapons systems, 30mm guns and mini-guns to counter seaborne threats Aircraft: Tailored air group of up to 40 aircraft: initially Harrier GR9, later F35B Lightning II, plus Merlin and Chinook helicopters
BAE Queen Elizabeth CVF Cutaway.indd 3-4
19/7/10 15:15:55
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
New Range of
Electric Strikes 3 12/24v selectable 3 Easily reversible – Fail
Open(PTL)/Fail Secure (PTO) – no loose pins or springs
3 High holding force 3 ANSI short and long styles
alpro
®
Commitment to Excellence
3 AC compatability with Rectifier Sounder Module 3 Full range of accessories 3 Rugged construction with stainless steel faceplates 3 Very competitive prices
with shallow body = easy retrofit
First Choice for Locking Solutions T 01202 676262 E info@alpro.co.uk
F 01202 680101 W www.alpro.co.uk
’re e r wice! e ndCho o w st o N Fir
Toyota Landcruiser & Hilux Double-cab pick ups B6 + Armour Protection Shipping and export licenses can be arranged by Armoured info@armoured.uk.com
102
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
0121 700 7065
www.armoured.uk.com
CYBER CRIME THREATS
Mitigating the cyber threat to a company’s business model, its shareholder value, its data, and its reputation is not something to be delegated to the CIO or the head of security. Serious Organised Crime Agency chair Sir Ian Andrews says the company risk register could be the new cyber attack front line The National Security Strategy identifies criminal exploitation of the internet as one of the most serious threats to the United Kingdom, and government has committed substantial resources to tackling it. But this should not be seen by domestic businesses as some sort of security blanket which takes the pressure off the need for them to act. For all the upstream work that the Serious Organised Crime Agency and its partners are doing to contain risk and reduce opportunities for cyber criminals, the front line of defence is not a national or international boundary policed by law enforcement. It is in each and every company. Robert Mueller, the head of the FBI, warned in March 2012
that the threat to the US from online attacks will shortly become greater than that posed by terrorists. “In the not too distant future we anticipate that the cyber threat will pose the number one threat to our country,” he said. “We need to take lessons learned from terrorism and apply them to cybercrime”. A DRIVER FOR GROWTH The internet is a huge force for good and a powerful driver of economic growth and opportunity. But it also presents unique opportunities for criminals who are attracted by the ease of entry, low cost and risk, and relative anonymity it offers. Businesses need to understand the risks they face and the steps they need to take to protect themselves. Organised criminals are agile and entrepreneurial. They are also almost always more motivated to commit crime than potential victims are to take pre-emptive steps to stop them. The criminal community is forever testing the boundaries of what is possible – it does not have to conduct due diligence, or refer to investment committees!The evidence of this is stark and, you might imagine, powerfully persuasive in influencing corporate security policy? I’m not convinced it is - yet. But let’s consider the facts. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
Written by Sir Ian Andrews, chair, SOCA
UNDERSTANDING THE CORPORATE CYBER THREAT
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
103
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HIGH RISK LOCATIONS CLD’s Securus™ systems provide formidable protection for Oil sites, utility and nuclear sites, secure units, MOD and government buildings, airports and seaports. The mesh design creates a virtually impenetrable barrier with high visibility and an attractive appearance.
High Level Security Mesh Fencing & Gate Systems
RE
FI
R
C AC
INNOVATIVE DESIGN Securus™ systems feature CLD’s roll-formed posts to simplify installation and enhance security levels. The systems have a galvanised and polyester powder-coated finish to ensure longevity of the product. The future-proof design can be upgraded at any point during the products life time.
NA
FI
o.
D
C AC
tn cer
RE
DITAT
ION • BO
E
D
CTO
TRA CON
RE
NA
CLD has supplied security products for over 40 years. Today, the company is a UK leader in the sector with a global reputation for performance and design innovation. The company manufactures state-of-the-art fencing for all high-risk locations throughout the UK and across the world.
Securus SR1™ conforms to BS1722: Part 14: Category 4 with certification to LPS 1175 Category 1. Securus SR2™ is a double layer mesh system rated to LPS 1175 Category 2 and meets government requirements for high security in the UK and across the world.
ION • B O
DITATION • BO N
D
DITAT
VE PRO
RE
AP
O DITATI N • BO
C AC
AF
C AC
E
E
E
ID
SECURUS SYSTEM CREATES THE ULTIMATE DEFENCE
GLOBAL STANDARDS
Approved contractor scheme. Exclusive to CLD Fencing Systems
NA
FI
D
For more information call now on +44 (0)1270 764751
or visit our website: www.cld-fencing.com
MANAGEMENT SYSTEMS
LPCB UKAS Management
LPCB Certificate
Are you aware of what is actually available? Request a brochure & product demonstration now... T: +44 (0)1686 621 300 E: info@hafrenfasteners.com W: hafrenfasteners.com
Counter Terror Advert Mar-12 NEW.indd 1
104
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
23/02/2012 10:04
CYBER CRIME THREATS E Although chasing down a precise figure is never going to be possible, a study for the Cabinet Office last year found that, of the estimated £27bn a year cost to the UK economy from cyber crime alone, the hit on business is more than £20bn. Almost half involves the theft of Intellectual Property. Quite apart from direct financial losses, reputational damage also has a financial impact. Last year, a major multinational company reported direct losses from hacked personal data of £105m. The hidden cost in terms of damage to its brand, reputation, and shareholder value is almost certainly many times greater. THE PHISHING PROBLEM In 2011 the Anti Phishing Working Group reported that over 38,000 phishing websites were being detected globally every month. That was more than one new malicious site every 70 seconds. A CIFAS report around the same time reported that over 40,000 pieces of sensitive and financial information were traded on the black market every day. While cutting edge attack systems may remain in the hands of an elite, the expertise to steal data in large volumes is available to new entrants to the market with the right connections and enough money. Criminals operate their own self-regulated market for cyber crime goods and services, including stolen data, malicious software, technical infrastructure and money laundering: and they are able to operate on an unprecedented and industrial scale. They will always hold the initiative and risk can only increase as more data is acquired, stored and shared and ever greater use is made of mobile devices. It’s true that awareness of some risks is on the increase, for example around identity theft and credit card fraud. This is prompting more effective reporting and intervention and this month has seen losses at a ten year low. But other threats remain ahead of the business awareness curve. MONEY LAUNDERING How many businesses, for example, are unconscious vehicles for money laundering, or have considered the possibility that they might be? The Global Money Laundering and Terrorist Financing Threat Assessment, produced by FATF in July 2010, described the role insiders play in money laundering. Criminals are able to understand how to undertake transactions while concealing their own involvement. Inside knowledge of a profession or sector can allow them to access financial products in an indirect or non-attributable way, making the tracing of funds or assets lengthier and more difficult. The individual employee is also potentially the weakest link. This is rarely because they are malicious: more often it involves failure to apply basic security procedures. But the way in which individuals now openly communicate
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The individual employee is also potentially the weakest link. This is rarely because they are malicious: more often it involves failure to apply basic security procedures. personal information about status and personal interests, in and out of the workplace, inevitably increases the risk of exposure to criminals. Corporate websites openly display key post-holders within organisations and company networked systems are used daily by staff at all levels to connect to social networking sites and browse online. The use of personal devices is commonplace at work and this can bridge unconsciously into business fire-walled environments. Criminals know and exploit these vulnerabilities to breach systems, recruit vulnerable staff, hijack identities and steal data and assets. It is dangerous to underestimate how very subtle this can
be, or the lengths to which criminals are prepared to diversify and infiltrate apparently low-risk areas such as the back office. All this is evidence of the unavoidable fact that law enforcement can never expect to arrest its way to a cyber crime solution. As the private sector is the biggest economic victim of cyber attacks, it needs to be pro-active in mitigating the risks it faces. The crucial question is: where on the corporate ladder should a company vest responsibility for its cyber security? Mitigating the cyber threat to a company’s business model, its shareholder value, its data, and its reputation is not something E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
105
PIONEERS IN SECURE PORTABLE DATA STORAGE DEVICES The iStorage datAshur is the world’s most secure, easy to use and affordable USB flash drive, employing PIN code access with military grade AES 256-bit hardware encryption. The datAshur incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port. All data transferred to the datAshur is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access or if your datAshur is lost or stolen. The datAshur automatically locks when unplugged from the host computer or power to the USB port is turned off.
The iStorage Desktop Secure Hard Drive is the world’s first portable hardware encrypted hard drive with PIN code access and capacities of up to 3TB. The iStorage Desktop Secure Hard Drive utilises military grade AES 256-bit hardware encryption, which encrypts all data stored on the drive in real time. Should the drive be lost or stolen, the user can rest assured that all data held on the drive is safe and cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure.
Tel (office) +44 (0) 20 8537-3435 info@istorage-uk.com www.istorage-uk.com
The diskAshur is the world’s most secure, compact and affordable USB3 portable hard drive, employing PIN code access with Military Grade 128-bit or 256-bit AES Hardware Encryption. The diskAshur can only be accessed using a personalised 6-16 digit PIN code similar to using an ATM. All data stored on the drive is encrypted in Real –Time, making it 10 x faster than any non-encrypted USB2 hard drive. Should the diskAshur be lost or stolen, the user can rest assured that the data stored on the drive is safe and cannot be accessed by any unauthorised third party, even if the hard drive is removed from its enclosure.
CYBER CRIME THREATS Asking the right questions
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Do you have an accurate picture of the entirety of the cyber threat to your bottom line, reputation, or shareholder value? What about your supply chains? Do you know what patterns of misconduct tell you about levels of disaffection in the workforce? Or do you just leave that to HR? Do members of your workforce understand the threat and the role they play in countering it? Have you thought about how personal data is stored, managed and retrieved, including that of your clients? Are the right controls in place over access? What is your preparedness for the management of a critical incident involving data loss? E to be delegated to the CIO or the head of security. It is a strategic risk which should feature on the main Board risk register and be firmly in the grip of the CEO. Defaulting, whether through ignorance or nervousness, to ‘specialists’ is to lose sight of the fact that the real threat is to the performance of the business. As Clemenceau might have said, cyber-security has become too important to be left to the computer experts. So, if the evidence doesn’t incentivise Boards to take the threats to data security more seriously and protect themselves from attack, not to mention the legal obligation to protect the personal data they hold, what else might? Companies may be concerned about the impact on their business in terms of shareholder value or reputation should the story of a breach become public. But how can we help businesses to understand that the cost of addressing this business risk up front will be so much less than that of cleaning up after an attack? Indeed, should we perhaps be looking for a paradigm shift in how we regard companies who choose to make a virtue of demonstrating how they have responded to the attacks on them. It seems to me that the investor community also has a huge role to play here: particularly if it is to demand evidence of awareness of the threat and the measures taken to mitigate it as a pre-condition for investment. This might also encourage greater disclosure within companies themselves and end the culture of keeping the bad news story in the server room and away from the Boardroom. The Department of Business Innovation and Skills, which has the policy lead in this area, is actively working in partnership
How many businesses are unconscious vehicles for money laundering, or have considered the possibility that they might be? with business representatives, professional service providers and key professional bodies to facilitate the spread of best practice in managing cyber security as a corporate risk. FOSTERING A THRIVING MARKET Primary objectives of the UK Cyber Security Strategy, to be achieved by 2015, are for the UK to be one of the most secure places in the world to do business in cyberspace and to foster a thriving UK market in cyber security products and services. To get there, businesses need to understand how to help law enforcement to help them by reporting and information sharing, which should be aided by the placement of Action Fraud as the single point of entry for reporting. The enabling legislation of SOCPA 2005 provided the necessary gateways, and many companies are increasingly willing to share information with each other and with law enforcement. This dialogue will be enhanced by the joint private and public sector initiative launched by the Prime Minister last year to develop a national cyber security hub to facilitate information exchange between the private sector and government. Actionable information on cyber threats would be
Are your high value assets, including your intellectual property, adequately protected? Do your governance arrangements recognise the risks posed by cyber crime? Do your nonexecutive directors have the skills and competencies to ask the right probing questions to provide assurance? Does your senior team understand the need to ensure that they are not themselves vulnerable to attack? Would penetration testing show the Chair or Board members to be the weakest links?
shared by all participants to give a more comprehensive, and timely, understanding of malicious activity against computer networks. We might not have all the answers now, but we can begin by asking the right questions. (see panel above). Taken together, all of these initiatives will, I hope, help reposition security and fraud prevention so that they are seen as essential profit centres rather than unwelcome overheads. Because it is on the effectiveness of corporate defences against the threat from cyber crime that future prosperity is going to be increasingly dependent. That is what places the Risk Register on the front line. L FOR MORE INFORMATION Serious Organised Crime Agency Tel: 0870 268 8100 www.soca.gov.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
107
PDX First Response System (FRS) THE NEW PORTABLE AIRBORNE AND SURFACE DECONTAMINATION SOLUTION FEATURING THE PDX UNIQUE ATOMISATION TECHNOLOGY. ®
Features and Functions • Robust, lightweight and easy clean design for tough environments • 4 litre fluids vessel • Powered by a standard 6 litre 300 bar air cylinder • Gas and fluid re-fill in position capability • Less than 20kg total weight (full) • 2 minute run time • Compatible with a wide range of chemistries The perfect solution for CBRN decontamination in localised environments, vehicles and personnel.
The PDX® FRS decontamination back pack allows emergency personnel to work effectively in both confined and remote environments. This system incorporates the PDX atomisation technology creating a superfine mist to ensure even and consistent coverage. The system is compatible with a number of agents with best in class efficacy for chemical and biological decontamination. Highly mobile and simple to operate this robust back pack is designed for flexibility. The PDX FRS lance can be easily directed and controlled. The superfine mist ensures haptic dry surfaces with only 2 litres are used per minute ensuring no damage to sensitive and electronic equipment allowing them to stay functional throughout disinfection process.
SECURITY & POLICING
Meaningful dialogue between police and industry
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The Security & Policing event held in February brought together international professionals and experts in law enforcement, security, civil protection and national resilience to form a crucible of shared knowledge. Counter Terror Business asks Chris Higgins, security events manager at ADS Group, for the lowdown. Law enforcement professionals converged on Hampshire at the end of January for one of the most crucial annual events in the industry calendar. The Home Office Scientific Development Branch Exhibition this year re-branded as the Security and Policing event and took place at FIVE in Farnborough between January 31 and February 2. Security and Policing is organised by ADS, the UK trade organisation representing the Aerospace, Defence, Security and Space sectors, on behalf of the Home Office. It is operated as a ‘closed’ event bringing industry together with invited domestic and international visitors from the security and law enforcement areas. This approach enables credible, sensitive and meaningful dialogue to take place between industry and police, law enforcement and security professionals in a secure setting. Attendees must be approved by the Home Office in order to give visitors the confidence to discuss their requirements. The Home Office Centre for Applied Science and Technology (formerly HOSDB), in partnership with ADS and UK Trade and Investment Defence and Security co-host the event at FIVE, Farnborough, Hampshire.
What are the main hot topics that have emerged out of the Home Office event? Through the UK Government led Outreach Briefing programme at Security & Policing 2012, detailed analysis from senior government, police and industry representatives was provided on emerging developments in areas as diverse as Olympic security, technical surveillance, US-UK industrial engagement and EU counter terrorism strategy and investment. Conflict Management is now at the forefront of the police service and government’s
strategy for the future. The ACPO Conflict Management conference which was held at Security & Policing 2012 focused on ‘The Changing Nature of Policing Conflict’ and provided key insights into the development of security for the Olympic and Paralympic Games. The August 2011 disturbances and the use of social networking were just two of the topics covered by senior police officers. Information exploitation and cyber security received the attention of a dedicated conference programme covering the national resilience to cyber attack and how partnerships between law enforcement and industry can deliver the UK Cyber Security Strategy. Speakers on these vital subjects included James Brokenshire (Parliamentary Under Secretary of State for Crime and Security), Detective Chief Superintendent Ollie Shaw (London City Police), Laurence Marzell (CNI Scan programme lead, Serco), Deputy Chief Constable Paul Crowther (ACPO Forensic Triage Lead, British Transport
Police), Ruth Allen (head of operations, Child Exploitation and Online Protection Centre), and Detective Constable Gordon Holmes of the Police Central e-Crime Unit, Cyber Industry Liaison (PCeU).
What are your views on the current economic climate for security and policing? The impacts of austerity and the comprehensive spending review continue to be felt throughout the UK security sphere. However, cyber threats and e-crime are rapidly developing areas of considerable governmental interest and action. The National Security Risk Assessment identifies hostile attacks upon UK cyberspace and large scale cyber crime as a ‘tier one’ risk alongside international terrorism. The UK Government has allocated £650m over four years to improve national cyber security capability. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
109
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
110
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
SECURITY & POLICING E These developments also represent new and evolving challenges and opportunities to industry as they adapt to the new paradigm.
What do you think the future holds for security and policing in the UK? Police transformation, a changing procurement landscape and formation of the National Crime Agency will all have a significant impact on the UK policing and security over the coming months and years. This changing landscape and the likelihood of increasing levels of industrial engagement as outlined in the National Security Through Technology White Paper, provide the opportunities and framework for industry to work with government to meet the security challenges of the future through direct engagement at the Security & Policing exhibition.
Why do you think these types of events hold weight and are important? UK Security industry holds four per cent global share of market and is the fifth largest exporter of security capability
globally. The Security & Policing exhibition exists to promote growth and innovation within the security sector, especially amongst small and medium sized enterprises and strives to increase the UK share of the global sector market. The event provides the level of industrial engagement needed to enable UK Government to deliver its security and law enforcement priorities through the effective application of science, innovation and technology. Better engagement with industry brings with it understanding of the products and services available and the opportunity for UK government to inform industry of their emerging needs and priorities. Security & Policing exists to promote UK industry in the security sector as partners of choice to an international audience. This continues to be enhanced through the support of UKTI DSO in the delivery of an international VIP delegation programme to Security & Policing, significantly increasing new routes to international markets for UK industry attending and supporting the government’s growth agenda.
When do you plan to host something similar and why?
Security & Policing
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Continuing to drive the engagement between UK government and the security Industry, Security & Policing 2013 will take place from 12-14 March at FIVE, Farnborough. It will provide the vehicle needed to promote UK industry in global security market and is a key enabler to help grow the UK security industry; a desire reflected in the National Security Through Technology White Paper. Security & Policing 2013 promotes a strong industrial base for the Home Office and its partners to utilise more cost effective solutions for frontline operations in support of national security and resilience. It’s a platform to set out the challenges going forward, shaping how Home Office CAST would like the security industry to engage with UK government on future developments in national security. L FOR MORE INFORMATION Tel: 20 7091 7830 chris.higgins@adsgroup.org.uk www.securityandpolicing.co.uk
CLIO – a flexible IT critical incident management system to meet a wide range of policing needs CLIO is the UK’s leading IT critical incident management system and was developed by Badger Software in conjunction with the police and the emergency services. Although it was originally designed for managing critical incidents and crimes in action, it is now used extensively by police forces throughout the UK for public order event planning and management and counter-terrorism operations. The system has been chosen by the Metropolitan, Thames Valley and Dorset Police and National Olympics Coordination Centre (NOCC) for use during the Olympics and Paralympics and recently successfully supported the muchpublicised Forward Defensive exercise, held in central London to test security and emergency services in the event of a terror attack during the games. CLIO is also increasingly used in the commercial sector by companies that wish to protect against kidnapping, threat to employees and property, terrorist activity, product recall and contamination, public disorder and natural disasters. The system provides a virtual incident room that can be secured on the organisation’s network or accessed over the internet, allowing individuals to respond to emergencies from the office or remotely via a laptop, BlackBerry or Smartphone. CLIO allows all members of a critical
incident team to share accurate, detailed information, prioritise actions and track decisions, thus making the team more effective and better coordinated. In addition, CLIO provides a full, incorruptible audit trail with evidential proof for use in any subsequent civil or criminal legal action. Proven over 10 years in the most demanding of situations, CLIO is now used by almost all the police forces in the UK in many aspects
of police work and is the nationally approved system used by counter-terror units throughout the country for managing surveillance-led counter-terror operations. CLIO is used widely to manage public order situations. Kent Police used the system at the 2011 Open Golf Championship that attracted over 200,000 spectators to the Royal St Georges Golf Club, Sandwich, East Kent, where it was used to assist the policing operation to manage crowds and public safety issues and co-ordinate road traffic management and security across the site and access roads. A number of forces, both large and small, including Staffordshire and West Yorkshire, have used CLIO to manage and co-ordinate investigations arising from large scale public order events and demonstrations, while Staffordshire has also used it at the ‘V’ Festival – a large annual music event held at Weston Park. Several forces now use it to manage and co-ordinate major football matches. FOR MORE INFORMATION Badger Software Limited Delta House, 70, South View Avenue Caversham, Reading, Berkshire, RG4 5BB Tel: +44 (0) 118 946 4488 sales@ badger.co.uk www.badger.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
111
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
REVOLUTIONISING VEHICLE SYSTEMS’ INTEGRATION Brimar enables maximum flexibility for modern fighting vehicles without large cost overheads The current financial climate presents defence forces around the world with a common problem - the need for vehicles to be multirole rather than fixed configuration. The most significant problem with this requirement is generally the large overhead involved, in terms of both time and money, to modify the original installation. To allow vehicles to become truly multirole there needs to be a simple method of changing the configuration of the vehicle in-field rather than returning it to a third line depot for refit. There are two areas which need to be managed – firstly the exterior mounting / cable access points and, secondly, integration of the overall system. The issue of exterior mounting / cable access points is generally addressed by the initial design of the vehicle which will allow for a flexible mounting of auxiliary equipment. The issue of systems integration, however, becomes highly contentious, with different vendors vying to become a prime contractor and reducing the choice of available integrated equipment. PLUG AND PLAY SYSTEMS ARCHITECTURE Brimar has recognised this problem and has developed fully agnostic modular plug and play systems architecture for its displays and LSA systems, in addition to a complete range of sensor suites which will complement existing equipment. Its solution offers a common skeleton architecture, allowing multiple displays and auxiliary equipment to be changed ad-hoc and therefore dramatically reducing the cost and time required for new installations. The system comprises a central power/video/ communication hub or signal distribution unit (SDU) which all equipment plugs directly into, enabling access by any of the vehicle crew. The SDU in its maximum configuration can handle up to 28 different video sources. Each of the four connected video displays can also independently select a group of four video channels. The SDU can be equipped with different video interfaces or optional modules which can simultaneously process both analogue and digital video formats. One of the primary functions of the SDU is to act as a flexible power management system which accepts raw vehicle power and then provides clean 28 - 5VDC outputs for all auxiliary equipment. The SDU power system is fully compliant with military
vehicle requirements and eliminates the need for small satellite power supplies for auxiliary equipment. All connectors are military type (Mil- 38999) and are positioned and combined to facilitate system harnessing within the vehicle. The SDU also acts as a communication translator across RS232/422 & CANBus allowing multiple protocols to interact with each other via pre coded software layers which can be changed in field within seconds. This enables a flexible approach to the variety of sensor packs that can be used with a vehicle. The SDU also has up to eight filtered discrete I/O lines (28V). The SDU will support up to four displays, with each unit able to receive up to four video signals. It is compatible with Brimar’s complete range of rugged displays, allowing the appropriate display size and resolution for each crew position to be selected. CUSTOMISED DISPLAYS The displays are provided with a customised and tailored human machine interface (HMI) for each crew position which allows integration to the battlefield management system (BMS), driver’s view enhancement (DVE), navigation aid, remote controlled weapon system (RCWS) and local situational awareness system (LSAS). Most auxiliary third party equipment requires its own control interface and
screen, often resulting in users having to deal with a plethora of equipment and screens which are not fully integrated. Use of the Brimar SDU minimises the need for additional equipment, as all Brimar screens are able to process the received video images and configure any screen combination or layout which is required such as full screen images, wide panoramic view with two/three cameras, picture mosaic, windowed images or fused images. It also offers graphic and text overlays as well as peripheral integration such as joystick, keyboard, mouse & touchscreen. Brimar’s SDU is manufactured using an aluminium casing which is completely sealed and housed in two separate sections, with the video/coms component on a completely different level to the power distribution function. All electronics can withstand the temperature, humidity, vibration and shock requirements of the military vehicle. Brimar aims to revolutionise vehicle systems integration, enabling maximum use and flexibility for most modern fighting vehicles without a large cost overhead. L FOR MORE INFORMATION Brimar Ltd, Greenside way, Middleton Manchester, M24 1SN, UK Tel: +44 (0) 161 681 7072 sales@brimar-ltd.com www.brimar-ltd.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
113
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IFSEC International
sponsored by
EXPLORING ALL THE SECURITY OPTIONS AT IFSEC
In it’s 39th year, IFSEC International on May 14-17 at the NEC will feature eight dedicated product areas and plenty of educational content, with sessions from experts in counter-terrorism The National Counter Terrorism Security Office initiative, Project ARGUS, is just one of a plethora of not-to-bemissed educational sessions taking place at IFSEC International 2012. Highly regarded industry experts from Nottinghamshire Police, Wilson James, Morgans Hotel Group and CornerStone will be joining the line up at what is expected to be IFSEC International’s most impressive counter terror offering ever. Taking place in IFSEC International’s new Security Management Education Theatre, Project ARGUS will explore ways to aid delegates in preventing, handling and recovering from terrorist attacks. The session will guide attendees through a simulated attack to identify the measures to take for preventing, handling and recovering. It will provide visitors with an opportunity to both learn from and contribute to valuable lessons – helping to protect them, their business and their community, whether they are a national chain or a small business. Project ARGUS explores options, such as what is likely to happen in the event of a terrorist attack and what your priorities should
be, highlighting the importance of having the necessary plans in place to help safeguard staff, customers and company assets. The Security Management Education Theatre will feature a series of 30-45 minute presentations from key industry figures and security management professionals, followed by Q&A sessions. Tipped to be another popular session, Nottinghamshire
having served with the CID at every rank up to detective superintendent. His experience encompasses serious and organised crime, intelligence, undercover and covert policing. Another highly topical issue being discussed is ‘Dealing with the Insider Threat,’ to be led by Martin Smith MBE, chairman and founder of the Security Company. The former Royal Air Force officer, who was mainly assigned
Project ARGUS explores what is likely to happen in the event of a terrorist attack and what your priorities should be, highlighting the importance of having the necessary plans in place to help safeguard staff, customers and company assets. Police’s Assistant Chief Constable, Paul Broadbent, will lead a discussion alongside Mike Cherry, National Policy chairman at the Federation of Small Businesses, on the pertinent subject of ‘Integration not Isolation - the public/private response to business crime’. Broadbent has extensive experience
to counter-espionage and counter-terrorism duties throughout East and West Europe, will address the issue that the Mark 1 human being remains the greatest and continuing weakness in the entire protective regime. His session will discuss the recognition and how to tackle the human E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
115
If security is your business, can you risk ignoring Nedap?
Security Redefined Long-trusted providers can certainly be relied on when it comes to your security system. Having established standards makes life highly convenient. But your job becomes even more reliable and safe when you decide for technological market leader in security management. Nedap’s aim is the better system – this makes us the pacemaker in a dynamic market. Learn more about how easily AEOS already secures more than 37 million door movements per day at www.nedap-securitymanagement.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IFSEC INTERNATIONAL E aspects of security and fraud prevention. Plan B Consulting will present ‘Organisational Resilience’ which covers the role of a business continuity manager and focuses on the most vulnerable security risks. Mike O’Neil, managing director of Optimal Risk Management, will present ‘Procuring security services – some thoughts on why and how to change,’ while the directors of CornerStone will present a session entitled ‘How to ensure your security technology investment delivers the result you expect’. Reflecting the need for today’s society to have effective counter terror measures against the ever-present threats on the UK and international landscape, the Counter Terror Product Area in hall 3A again offers visitors an opportunity to browse thousands of products including counter terror/physical security, access control, CCTV, fire safety, intruder alarms and integrated security/IP networks. This area will bring together international companies that will assist organisations on national resilience, counter-terrorism, border security, surveillance and policing issues. CENTRE STAGE IFSEC International has invested heavily in its education programme this year. 2012 will see the debut of Centre Stage, a new high profile educational feature designed to focus on the most pressing and topical security issues of the day, to be discussed and debated live at this year’s show by the leading names in the sector. Topics are wide-ranging and include the 2012 Olympic and Paralympic Games, solutions models for security guarding procurement and management, the future of law enforcement, convergence and the future of security, the alarms standard PD6662: 2010, PSIM, security management training, lone worker protection, CCTV standards, security benchmarking, commercial and criminal investigations and more. IFSEC International’s event director Charlie Cracknell says Centre Stage is designed to be a focal point for debate on the wider issues affecting the security world. He stated: “Centre Stage will bring thought-provoking discussion on topics of crucial importance to the future of the industry directly to the show floor. This means all visitors will have the opportunity to attend at no cost. “The session on the future of law enforcement is a particularly enticing prospect, bringing together Don Randall, head of security for the Bank of England, and Nick Pickles, director of Big Brother Watch, the organisation which recently published a study suggesting that local councils had ‘wasted’ £515 million on CCTV over the past five years.” This session will focus on whether or not there’s a role for the private sector in terms of lower level policing duties and, if so, what that role might look like. This is an issue which will remain at the top of the news agenda, as elected Police and Crime
IFSEC International
sponsored by
‘Convergence and The Future of Security’ will examine how convergence, defined as the integration of physical and logical security, could change the dynamic of security management. Commissioners will be to the fore come November and forces deal with the impact of the Government’s budgetary cuts. OLYMPIC FOCUS There’ll be a session on preparing for the Olympic and Paralympic Games in terms of essential planning and business continuity, while another session, hosted by the BSIA’s 2012 project director David Evans, is scheduled to address the legacy of the Games from a security perspective. ‘Convergence and The Future of Security’ will examine how convergence – essentially defined as the integration of physical and logical security – could change the
whole dynamic of security management. This session, chaired by Chris NorthyBaker, principal security advisor and head of business resilience at the UK Hydrographic Office, will also examine the crucial question as to whether or not purchasing end users are really buying into the convergence and integration agenda. One of the biggest discussions in the security guarding world just now centres on the solutions model: some companies offer security ‘bundled’ with other services such as building maintenance, cleaning and catering. This is the ‘Total FM’ or multi-service solution, while others prefer to concentrate on providing just the core security function. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
117
25-26 APRIL 2012 DON‘T TAKE OUR WORD FOR IT SEE IT LIVE AT PENTAX CTX-STAND
GRAND HALL I80
55X
ALL NEW FULL HD PAIR MEGAPIXEL ZOOM LENS The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been combined with a HD Full HD resolution 55X zoom lens for even greater quality SD and definition to offer the best possible security.
PAIR-Technology Up to 140X ZOOM with build-in 2.5X Extender Full HD Resolution 1080p 2 Megapixels High Speed Motors 1/2", C-Mount Iris Override Presets Compact and Robust Optimised for use in Port Facilities, Border Control, Coastal Oil Fields, Highway Monitoring etc.
PENTAX RICOH IMAGING DEUTSCHLAND GmbH Security Systems Division
PENTAX RICOH IMAGING UK LTD. Security Systems Division
PENTAX RICOH IMAGING FRANCE S.A.S. Security Systems Division
Julius-Vosseler-Str. 104 22527 Hamburg Germany Sales: +49 (0)40 56192109 Email: ssd@pentax.de
Heron Drive, Langley Slough SL3 8PN United Kingdom Sales: +44 (0) 7973 154430 Email: ssd@pentax.co.uk
112 Quai de Bezons, B.P. 204 95106 Argenteuil Cedex France Sales: +33 (0) 680 614348 Email: ssd@pentax.fr
www.pentax-security.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IFSEC INTERNATIONAL E ‘Single Service versus Multi Service’ will look at the benefits of both approaches, with contributions from some of the guarding world’s foremost professionals: Bob Forsyth (managing director of MITIE Total Security Management), Geoff Zeidler (UK and Ireland managing director for Securitas), Shaun Cowlam (director of security at the OCS Group) and Peter Webster (CEO of Corps Security) will all be offering their considered opinions. With the investigations sector currently in the spotlight thanks to the ongoing phone hacking scandal, the Centre Stage Theatre session entitled ‘Commercial and criminal investigations: six of one and half a dozen of the other’ will address renewed calls for the licensing of private sector investigators to ensure uniformity of training, the removal of rogue operators and enhanced levels of professionalism. An opportunity to find out more about secured environments, the police accreditation scheme for organisations and new approaches to security management training will be provided by Professor Martin Gill of the Perpetuity Group. Educational content in the The Tavcom Training Theatre will this year includes sessions called ‘How CCTV can be more effective’ and ‘Can modern technology work for my company?’. LONE WORKERS Supporting the theme of employee protection, IFSEC International will also showcase its first ever Lone Worker Protection Product Area this year. Classified as anyone working alone, without close supervision or away from their fixed base, a staggering 40 per cent of the UK population are now recognised as part-time lone workers. Many industry names are supporting the feature and experts will be on hand to advise visitors throughout the show. Patrick Dealtry, Chairman of the BSIA Lone Worker Steering Group and creator of the British Standard for Lone Workers, said: “There is an increased understanding by companies and organisations that it really is important to take care of their employees who may be at risk because of the job their employer asks them to do. Last year, a small company was fined £385,000 for failing to do so. It is therefore highly relevant that IFSEC International includes a Lone Worker product area for the first time.” Dealtry continued: “Traditionally, IFSEC International has been focused on technical methods (CCTV, access control, alarms etc) of protecting organisations by protecting their buildings. Protecting the building protects the people and ‘things’ in them that make up those organisations activities. This feature of the show will cover how to protect their staff when they are perhaps at their most vulnerable.” Now that the BS8484 code of practice is firmly in place and cases of employee E
Free to attend seminar sessions at IFSEC International Security Management Education Theatre CPD seminars for security management professionals Next Generation CCTV & Surveillance Theatre Discussing the latest technologies and opportunities for the security industry IFSEC International Centre Stage Keynotes, industry debate and future insights delivered by leading industry figures including Don Randall, head of security for the Bank of England. ipAssured Education Zone Presentations for both channel and end user visitors on the latest in IP infrastructure and technology with the industry’s foremost technical experts. info4fire.com Learning Zone Must attend sessions for
IFSEC International
sponsored by
anyone either involved in or looking to install, design or distribute fire safety systems Lone Worker Protection Education Theatre Hear from Virgin Media, Orange, ACPO, IIRSM, Peabody and more on how lone worker solutions protect their employees How Lighting Affects Surveillance Live demonstrations from a number of manufacturers across three different lighting scenarios Tavcom Training Theatre Everything you need to know about IP and CCTV Intelligent Integration Zone Discover how an integrated security system comes together For the full seminar programme visit www.ifsec.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
119
14-17 mAy 2012 neC birminghAm, uk
IMPLEMENT EFFECTIVE COUNTER-TERRORISM STRATEGIES SEARCh IFSEC
Visit the Counter terror ProduCt AreA At iFseC internAtionAl And tAke AdVAntAge oF exPert AdViCe About nAtionAl resilienCe, Counter terrorism, border seCurity, surVeillAnCe And PoliCing issues. reduCe the VulnerAbility oF the nAtionAl inFrAstruCture And disCoVer 1000s oF sPeCiAlist seCurity solutions And innoVAtions to CombAt risks. iFseC internAtionAl is PArt oF the ProteCtion & mAnAgement series, uniting seCurity And Fire with FACilities And sAFety ProFessionAls.
FEATURING:
3 SECURITy MANAGEMENT EdUCATION ThEATRE 3 LONE WORkER PROTECTION PROdUCT AREA 3 NExT GENERATION CCTV & SURVEILLANCE ThEATRE 3 TAVCOM TRAINING ThEATRE 3 IP ASSUREd ZONE in association with anixter
3 INTELLIGENT INTEGRATION ZONE sponsored by iSm 3 IFSEC CONNECTIONS
ACCess Control | CCtV | Counter terror | Fire solutions | intruder AlArms | iP/network seCurity | lone worker | PhysiCAl seCurity
REGISTER FOR FREE ENTRy QUOting: ctBa AT WWW.IFSEC.CO.Uk SUppOrted BY
Official media partner
OrganiSed BY
IFSEC INTERNATIONAL E neglect under the Corporate Manslaughter and Corporate Homicide Act are being prosecuted (in the event of a death), it is now more vital that both lone workers and employers are up to speed with the latest guidance and solutions. Created for security and health & safety professionals, lone workers themselves and senior management who work within companies where lone working occurs, the product area is expected to draw attendees from across the public and private sector including those in the emergency services, retail, healthcare, logistics/haulage, education, care, utilities and guarding profession. 2012 will see the launch of IFSEC Connections – the show’s first high-level, one-to-one meetings service for its seniorlevel community. The feature will provide an opportunity for buyers involved in or planning projects to discuss products and systems on both a technical and strategic level with solution providers. Ultimately, this allows them to make informed procurement decisions through the specification and quote stages of the intended project. A key feature at IFSEC International 2012 will be the New Product Innovation Showcase which will provide exhibitors with a platform to highlight new products and solutions. With 67 per cent of visitors citing the sourcing of new products and/or suppliers as an important
Protecting the building protects the people and ‘things’ in them that make up those organisations activities. This feature of the show will cover how to protect their staff when they are perhaps at their most vulnerable. expectation of the show, this new feature will help them easily identify them. Ninety percent of last years’ visitors found new products or suppliers they had not previously considered using, which makes the 2012 innovation showcase area a must for exhibitors keen to launch products into the market. Among the fresh faces at the show this year is Anixter (UK), a global supplier of communications and security products which is set to lead on the highly topical IP and convergence debate within the security market. Recent work includes providing technical expertise for the development of an advanced perimeter security system for a Midwestern state’s Department of Corrections. The operation involves more than 30 facilities serving 8,000 adult prisoners. The result was an automated system with continuous operation that requires no human intervention, monitoring the entire perimeter with increased security and single-person
IFSEC International
sponsored by
monitoring with minimal maintenance requirements. Also new to the show are Kaba (UK), a provider of integrated access and workforce management solutions, Data Card, secure ID solutions, and Nortech Control Systems, specialists in the design, manufacture and distribution of access control solutions. ACCESS CONTROL The Access Control Product Area will allow delegates to identify and compare a range of integrated access control systems, readers, controllers and software systems. Sponsored by ASSA Abloy, this show feature will bring together many of the world’s leading companies including ievo, Gallagher, Kaba, TDSi, Paxton Access, Salto Systems and HID. ievo™ (Hall 4, Stand 4/H47) will be demonstrating its brand new biometric solution, the ievo micro™ internal only fingerprint reader. This clever technology includes a spoof detection feature, where E
VideoBadge
CMM - Metrology Services & Products n CMM Test Item measurement reports (measurement volume of co-ordinate measuring machine: - 90 cm x 150 cm x 90 cm) n CMM Turn Key projects, dimensional & SPC data reports n CMM Reverse Engineering development data n CMM Batch & 1st Off measurement reports n CMM Training & support n CMM Auxiliary Equipment & Accessories
26 Tyne Road, Sandy, Bedfordshire, SG19 1SA Tel: +44 (0) 1767 680300 - Fax: +44 (0) 1767 680400 E-mail: kinemat@kinematic-eng.co.uk Web: www.kinematic-eng.co.uk
www.edesix.com Sales@edesix.com VideoBadge
Simplicity of design and operation (wireless) Slide down on/off front plate (holds ID card or CCTV sign) 16 hr battery standby capacity 8 hr recording evidential quality video/audio Encrypted security - no unauthorised access to footage VideoManager back-office software providing: security encryption, time sync, user management, storage management and evidence production Designed and built in the UK – quality service and support Options for wearing the VideoBadge including Police Klickfast Robust, weatherproof and versatile Wireless docking station Extended warranty options
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
121
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IFSEC INTERNATIONAL E the reader is able to differentiate between live human fingerprints as opposed to synthetic man-made prints, and optimum retention of functionality even with types of creams and powders on the skin as well as some types of latex gloves. With the global launch taking place at the show, ievo™ plans to integrate a testing station on its stand for both its micro™ and ultimate™ products, whereby delegates can put different substances, liquids or latex gloves on their fingertips and try the products for themselves. ievo’s ultimate™ product has recently been installed in an Olympic site, the Scottish National Arena for the Commonwealth Games 2014, and the German Embassy in London. TDSi will display its DIGIgarde Plus, a compact optical fingerprint reader that is compatible with fingerprints, cards and PINs. It provides added security should a specific entrance require it, offering access using a combination of secure methods. Kaba evolo is the latest stand-alone electronic access control solution from Kaba (Hall 4, stand D40). Its wireless connection is Mifarecompatible allowing for integration with many security systems. With in-depth knowledge of critical infrastructures and a continuously developing range of bespoke products, Kaba’s solutions are extensively used within education, stadiums, finance, manufacturing,
transport, government and the MoD. For the first time ever, IFSEC will host a standby power company at the show. UPS Systems plc is a longstanding specialist in standby power for the security industry, for which it offers a wide range of specific products and services including battery back-up systems, static inverters, uninterruptible power supplies and the very latest fuel cell technology for remote power applications. Access control specialist Paxton has launched the most significant addition to its Net2 access control system range in over a decade. Net2 PaxLock is a networked access control system in a door handle which combines Paxton’s own reliable wireless protocol with the trusted technology of Net2. It comes ready to fit a standard Euro lock case. Retailing at just £325, it features a full battery management system and long battery life using AA batteries which can be changed in under a minute. Network Video Technologies (NVT) is inviting CCTV specifiers and consultants to learn more about their range of analogue and IP video transmission products, and enter into a prize draw for chance to win an Apple iPad. In their ‘Dem & Win’ competition, any security specifier, consultant, or end-user visiting NVT’s stand and completing a demonstration of the company’s UTP and coax video transmission solutions will be entered into the prize draw. L
Where and when
IFSEC International
sponsored by
IFSEC INTERNATIONAL 2012 Halls 3a, 4 and 5 National Exhibition Centre (NEC) TRAIN The NEC is situated adjacent to Birmingham International Rail Station. BY CAR Visitors from any direction can travel to The NEC site directly using the following motorways - M1, M5, M6, M6 Toll, M40 and M42. If using Sat Nav, enter the postcode B40 1NT. For full details of how to get to the NEC, visit www.thenec.co.uk/travel OPENING TIMES Monday 14 May - 10:00-17:00 Tuesday 15 May - 10:00-17:00 Wednesday 16 May - 10:00-17:00 Thursday 17 May - 10:00-16:00 TO REGISTER FOR THE EVENT, visit www.ifsec.co.uk
High security systems from AMC Security Products can protect against a wide range of specific threats Two new product ranges have been added to AMC’s range of High Security Products; 1. Tyre Killer barrier – the Predator available in automated and manual versions 2. Advanced Under Vehicle inspection System. The Automated Predator Spike Barrier acts as a traffic barrier combined with an integral retractable tyre spike system. The spikes cover the width of the road to be protected. It is a visual deterrent plus being able to disable an attacking vehicle by deflating its tyres. The spike system is mechanically linked to the barrier so that the spikes retract as the barrier beam rises ensuring a fast acting system suitable for high traffic volumes. The PLC control system is compatible with all current access control systems and can be equipped for fully automated operation and all current safety systems if required. Various LED lighting options are available including ‘in-ground’ Red/Green signalling. The Manual Predator Spike Barrier of the Tyre Killer System is available in various versions including manually operated tyre spike strips, and spring loaded one-way traffic control spikes – both are available as ‘in-ground’ or as surface mounted units. AMC Under Vehicle Inspection System is a breakthrough using advanced technology to provide reliable under vehicle monitoring and
detection.. The unique system allows users to perform automatic scanning, combined with high definition capabilities, to see above and across the under vehicle structure to view specific or hard to see locations. The adjustable view angle allows the operator to verify the threat from multiple angles without having to approach the vehicle. Available as a permanent built-in system, or as a quick response trailer mounted unit, suitable for use at border controls. the AMC UVIS range
of products enables you to maintain fast and accurate full vehicle security at any location. The system can be integrated with our ANPR and Face Scanning Technology to provide a comprehensive control package. All data from the system is recorded to DVR. FOR MORE INFORMATION Tel: +44 (0)1273 463344 sales@amcsecurity.com www.amcsecurity.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
123
Your network has a hole in it. Are you protected from advanced malware, zero-day and targeted APT attacks?
Advanced attacks get through the majority of networks today. Don’t get caught with a hole in your defenses left open by traditional security technologies.
Contact us to see if you are protected!
www.fireeye.com | europe@fireeye.com | +44 (0) 208 528 1067 STAND
H50
To speak to a FireEye representative in person,
visit us on Stand H50 at InfoSecurity Europe 2012
IT SECURITY
GANGING UP ON CYBER TERRORISM
Infosecurity Europe
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The thirst for new and innovative solutions to combat IT security threats will be quenched at this years Infosecurity Europe, when more than 12,500 information security professionals and 300 international solution providers come together over three days at London’s Earls Court, April 24th -26th It looks to be a challenging year for the IT security industry. The proposed new European Union (EU) data privacy laws include a common set of privacy standards to be applied to organisations across the entire EU for the first time. With potential fines of two percent of revenue for a data breach, the impact on organisations that fail to comply will be significant. With Europe still in recession, IT departments are under increasing pressure to deliver more with less. However, it appears that for cyber criminals business is still booming – and the rate at which it is growing is alarming. Costing the UK economy billions every year and with no sign of this cost decreasing, the fear of cyber criminals is one that makes everyone take note. TECH SAVVY The way people work is changing. There is more collaboration amongst organisations and the general workforce is tech savvy with the consumerisation of IT. Virtualisation and mobile working are increasingly the norm with virtualisation increasing the enterprises’ ability to scale and manage resources, and the introduction of phones that have the processing power of a desktop PC with all their attendant problems. Cloud based applications and internet accessibility mean business is no longer confined to within four walls. However, this is not all good news, as the criminal and terrorist communities are also taking advantage of these new technologies. The outsider threat has always been a big worry for organisations; more recently the industry has seen a disturbing rise in the number of inside hacks. This poses the question – does crime increase in a recession? Are some of us more likely to become cyber criminals since we think we are ‘anonymous’ and the rewards seem worth the risk? Combine the insider threat with the reality that cyber criminals are increasingly organised and we’ve got a recipe for disaster. For those IT professionals charged with securing their organisations there is a tough battle ahead, and they need to act fast to tackle the threat. A visit to Infosecurity Europe will give those securing their organisations the opportunity to find out how to defend against the latest threats, the newest technology
The Infosecurity Europe Hall of Fame 2012 will also take place on day two, as internationally recognised inductees will be sharing their expertise on the history of computing and information security. being wielded by the criminals and an insight into how companies can comply with legal requirements and best practice. Along with hundreds of exhibitors showcasing innovative products and services in the ever-changing IT security arena, there will be a wealth of educational as well as informative sessions all of which are entirely free of charge. If you’ve got an infosecurity problem, you’ll find the solution at Infosecurity Europe.
EXPERT SPEAKERS Central to this will be a programme of expert speakers in the Keynote Theatre, supplemented by parallel sessions in the Business Strategy Theatre and the Technical Theatre. This year’s Keynote Theatre will be alive with end users experiences of the security issues, the pressures faced and the solutions deployed in an increasingly mobile and global working environment. Presentations can be heard E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
125
IT SECURITY E on how to deal with the headache of rogue employees, cybercriminals and hacktivists. Leading experts will be on hand to give their analysis, strategic advice and predictions. The agenda will cover the key challenges facing the public sector, including the triumvirate of; security governance, risk and compliance, including - The Rising Role of the CISO, AET & APT: Is it Really the Next Generation of Attack, The Insider Threat, Cloud Based Solutions, Smart Devices, Payment Security, Hacktivism, Cyber Criminal Gangs and The Dark Side of Social Networks. The first day will kick off with a keynote address from Neelie Kroes, Vice President of the European Commission and the Digital Agenda Commissioner. This will be followed by the Security Governance Keynote, which will look at the relevance of the role of the CISO, how it is evolving in 2012 and what priorities they should be enacting. Daya Prakash, CIO of LG Electronics and Phil Cracknell, director at Yell Group, will present the session. THIRD PARTY PROVIDERS Can there ever be such a thing as a trusted third party provider? Third Party Providers by their very nature are a risk, but how can these risks be outsourced without bankrupting the business? Tracy Andrew, information security and compliance officer at Field Fisher Waterhouse will examine the risks and what organisations can do to manage them. The keynotes create an exciting meeting of minds, with a host of business leaders, end-users and international policy makers strutting the boards and providing their experience to help visitors gain invaluable insights into security strategies for 2012. These include over 100 senior officials such as Chris Swan, CTO Security at UBS; Boris Goncharov, CISO at G4S Secure Solutions; Jon Donaldson, head of security operations & compliance of Visa Europe; Matt Palmer, group information security officer at Skipton Building Society and Sean Quinn, head of UK IT security at BNP Paribas Securities Services. The Business Strategy Theatre will focus on the challenges and issues facing management, CEOs and other board level directors. Sponsored by Deloitte, there will be seminars from Barclays on understanding and addressing data governance in large scale enterprises from Paul Clarke, head of strategy at Barclays Global and Dietrich Benjes, UK & Ireland country manager at Varonis. The Technical Theatre, sponsored by SecurEnvoy, covers information security issues and technical advances. Security in a Virtualised Environment: An ethical hacker’s view will be presented by Peter Wood, CEO of First Base Technologies and London Chapter ISACA Security Advisory Group. Seminars on cyber criminal gangs, the dark side of social networks, how Oxford University Press eliminates malware threats will also feature in the Technical Theatre. Philip Lieberman, President and CEO of Lieberman Software E
Can there ever be such a thing as a trusted third party provider? Third Party Providers by their very nature are a risk, but how can these risks be outsourced without bankrupting the business?
Infosecurity Europe
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Keynote Theatre - Tuesday 24 April 10:00 - 10:15
Keynote video address Ms. Neelie Kroes, Vice President Of The European Commission & European Digital Agenda Commissioner, European Commission
10:30 - 11:30
SECURITY GOVERNANCE I: The Rising Role Of The CISO Bob Tarzey, Analyst & Director, Quocirca Daya Prakash, CIO, LG Electronics Phil Cracknell, Head of Global Security & Compliance, Yell Group
11:50 - 12:05
Keynote Address Rt Hon David Willetts MP, Minister of State for Universities & Science
12:05 - 13:00
The 2012 Cyber Security Breaches Survey official launch
13:15 - 14:15
SECURITY GOVERNANCE II: Can there ever be such a thing as a ‘Trusted’ third party provider? Andrew Rose, Principal Analyst, Forrester Research James McKinlay, Group IS Security & Audit Manager, Manchester Airport Group Tracy Andrew, Information Security & Compliance Officer, Field Fisher Waterhouse LLP
14:30 - 15:30
RISK: Defining ‘Risk Management’ & what it means in the context of Information Security Boris Goncharov, Chief Information Security Officer, G4S Secure Solutions Matt Palmer, Group Information Security Officer, Skipton Building Society Matthew Lord, Chief Information Security Officer - UK, Steria UK
16:00 - 17:00
COMPLIANCE: The 10 key steps for any organisation to be compliant Graham Edwards, Head of Group Information Risk, Centrica plc Tim Wilson, Associate Dir. Information Communication Tech, NHS City and Hackney
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
127
Š 2012 Fortinet, Inc. All Rights Reserved. Fortinet and the Fortinet logo are trademarks of Fortinet, Inc.
IT SECURITY E Corporation, will present a thoughtprovoking session entitled ‘Five security secrets your IT Administrators don’t want you to know’. Making its first apperance for this year, the New Exhibitor Zone is designed to showcase the latest products and services in the ever-changing IT security arena, and promises a wealth of informative, educational sessions, all of which are entirely free of charge to attend. Most security professionals just don’t have the time or budget to obtain the education they want, which is why Infosecurity Europe has established a reputation for offering an effective - and free - IT security education programme. It uses inspirational people from the world of information security who cover the important issues, with content created each year based on the latest research with business end-users. The 2012 programme covers a huge range of topics. HALL OF FAME The Infosecurity Europe Hall of Fame 2012 will also take place on day two, as internationally recognised inductees will be sharing their expertise on the history of computing and information security. The speakers on the Hall of Fame are voted for by the IT security industry, and must have provided intellectual or practical input that has shifted the advancement of information technology, and must also be a leader in information technology. There are three inductees into the 2012 Hall of Fame. Raj Samani is cureently VP, chief technical officer for McAfee EMEA, having previously worked as the chief information security officer for a large public sector organisation in the UK. Raj volunteers as the Cloud Security Alliance EMEA Strategy Advisor, is on the advisory councils for Infosecurity Europe, and Infosecurity Magazine. In addition, Raj was previously the vice president for communications in the ISSA UK Chapter, having presided over the award for Chapter communications programme of the years 2008 and 2009. He has had numerous security papers published, and appeared on television (ITV and More4), as well as providing assistance in the 2006 RSA Wireless Security Survey and part of the consultation committee for the RIPA Bill (Part 3). He can be found on twitter @Raj_Samani John Colley, CISSP, is the managing director for EMEA & co-chair of the European Advisory Board for (ISC)2, a non-profit professional consortium which has certified about 80,000 members worldwide. He was one of the first non-US professionals to sit on the (ISC)2 Board of Directors where he served for eight years including two as chairman. John has 20 years experience in information security. He has formerly held posts as head of risk services at Barclays Group, group head of information security (CISO) at the Royal Bank of Scotland Group and director of information
Keynote Theatre - Wednesday 25 April 10:00 - 11:00
The Infosecurity Europe Hall of Fame 2012 Colonel (Ret’d) John Doody, Director, Interlocutor Services Limited John Colley, Managing Director EMEA, (ISC)2 Raj Samani, McAfee VP CTO EMEA, Cloud Security Alliance (CSA) Neira Jones, Head of Payment Security, Barclaycard
11:15 - 12:15
Security v. Corporate Comms: How do you make a social media strategy work? Graham McKay, Chief Information Security Officer, D C Thomson & Co Ltd. Marcus Alldrick, CISO, Lloyd’s Sean Quinn, Head of UK IT Security, BNP Paribas Securities Services
12:30 - 13:30
BYO Policies - Just who’s in control? Chris Swan, CTO Security, UBS John Stubley, PSN Cyber Programme Director, Cabinet Office Nick McQuire, Research Director, Mobile Enterprise Strategies EMEA, IDC Vlatka Toukalek, Head of IT Infrastructure & Support Services, World Meteorological Organisation
13:45 - 14:45
Smart Devices - Are we providing smart enough security? Nigel Stanley, Practice Leader Security, Bloor Research Paul Hyland, Group Information Security Officer, Ardagh Group Robert Cockerill, IT Manager, Thames River Capital LLP Tony Doyle, Head of ICT Services, Blackpool Council
15:00 - 16:00
Keynote address Christopher Graham, UK Information Commissioner
Infosecurity Europe
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Thursday 26 April 10:00 - 11:00
AET & APT: Is it really the next generation of attack? Andrew Kellett, Ovum, Senior Analyst Jon Donaldson, Head of Security Operations & Compliance, Visa Europe Michael Juvin, Group Information Security Officer, LaFarge Spencer Mott, CISO - Security & Risk Management, Electronic Arts
11:15 - 12:15
Hactivism: Making things personal John Kindervag, Principal Analyst, Forrester Research
12:30 - 13:30
Insider Threat - How much can you really trust your workforce? Ionut Ionescu, Head of Threat Management, Group Security, Betfair James McKinlay, Group IS Security & Audit Manager, Manchester Airport Group Julian Jeffrey, Head of Policy & Corporate Reporting - Fraud & Security, Telefonica UK
13:45 - 14:45
Cloud-Based Solutions - Do you really know what you have signed up to? Des Ward , President,, Cloud Security Alliance - UK & Ireland Chapter Mark Adams-Wright, CIO, Suffolk County Council
security at Atomic Tangerine. John is a member of the ISSA UK chapter advisory board, sits on the Infosecurity magazine editorial advisory board, and is chairman of the UK Government Information Assurance Professional Bodies Advisory Group. John Doody is director of Interlocutor Services, a company established in 2003 to promote Information Assurance and Cyber Security issues both nationally and internationally. Prior to this, John served at CESG/GCHQ for 10 years in the appointment of Head of Information Assurance Customer Services. In this appointment he was a major contributor to CESG’s move to a commercial business footing and promoted a strong external customer relationship and marketing effort. He holds the unique role
of having been an Information Assurance Customer (MOD), a member of the National Technical Authority for Information Assurance (CESG) and now a supplier of cyber and information assurance services. Rounding off the list of attractions at the event will be the launch of the 2012 Cyber Security Breaches Survey, details of which will be revealed on the first day of the show at 12.05pm. L FURTHER INFORMATION Infosecurity Europe runs from the 24th – 26th April 2012, at Earls Court, London. For a complete seminar and workshop programme and to register to attend the event free of charge, visit www.infosec.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
129
DETECT INTERCEPT DENY
Superior Spectrum Management Solutions from L-3 TRL
For the ultimate Electronic Warfare (EW) capability, the SMARTSCAN EW portfolio from L-3 TRL offers a range of innovative, modular systems to direction find, exploit and disrupt target communications. Designed for a wide range of deployment options, the SMARTSCAN range of systems can be used independently or as part of a larger networked solution for spectral superiority. For more information, please go to L-3com.com/TRL. To view the full range of SMARTSCAN systems, visit the L-3 stand, F100, at the Counter Terror Expo, 25–26 April 2012, Olympia London. TRL Technology
L-3com.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Enterprise-wide data security monitoring providing a unified tactical overview of entire IT environments Unified IT-monitoring should be the foundation of a proactive information security strategy. It is increasingly common that information security risk is derived from a lack of overview and control within the IT environment. It is not uncommon for organisations making a system scan or review to find systems it either forgot about or did not know that it had. These systems are thus not properly maintained and updated. It is also common for a large number of devices and applications to have been introduced by users and departments without the IT organisation ever knowing. The challenges for modern IT organisations to work proactively in the context of information security issues constantly grows. Enterprise networks are already very complex to manage and are due to become even more complex with the increased use of IP-based technology, use of virtualisation technologies, the trend of moving production systems and applications to the cloud (SaaS vendors) as well as the sharp rise in mobile data and the usage of smart phones and tabs within the organisations network. Ultimately, CIO and IT departments have overall responsibility for ensuring an organisation’s information security. In order to work proactively with information security, monitoring of a whole organisation’s IT delivery process is a good baseline to identify and respond to vulnerabilities, threats and the constant changes made in
the organisation’s operational environment. Network managers need modern tools that give them a real-time global visibility as well as access to historical information in order to optimise the network infrastructure for application performance and to plan for changes. A complete and correctly-integrated implementation of a modern monitoring system provides the network manager with unified enterprise wide control. This makes it possible to create an understanding of how different parts of the IT integrate with each other and how they affect information security. op5 Monitor is a technology-transparent and vendor-independent next generation IT
monitoring solution that provides network managers with a unified tactical overview of the entire IT environment. Whether it is physical, virtual or in the cloud, the solution is able to see through all layers, including applications, services and traffic, across all platforms. This type of modern monitoring solution lets the IT department work proactively and helps to ensure that the entire IT environment and the information is safe. FOR MORE INFORMATION Tel: +44 208 133 2940 info@op5.com www.op5.com
Intrinsically safe, single-handed thermal imaging camera from Draeger provides a clear snapshot of the vicinity As part of its ongoing commitment to improving responder safety and operational performance, Draeger Safety has developed its UCF range of thermal imaging cameras. For the first time, responders no longer have to conduct a risk assessment before taking a thermal imaging camera into a potentially explosive environment because the range includes models which are intrinsically safe and have ATEX Approval applied for. Enabling entry without delay and ensuring that entry protocols can be followed with single-handed operation, the cameras also provide ‘the complete picture’ by combining traditional ‘firefighting’ and ‘normal’ view modes. An integrated laser pointer pinpoints the exact location of any thermal areas and ensures that hot spots are identified easily. In addition, when entering a new area such as a doorway, hatch, window, confined space or even turning a corner, the user can select a freeze frame facility to view hidden dangers. Providing a clear snapshot of the immediate vicinity, this allows the responder to observe the space, decide a plan of action and, if necessary, consult and share the image with colleagues before entering the danger zone.
Should they need more information or advice on a particular situation or risk, users can choose the data transmission option which uses both video and sound to send images back to the command team. These images can also be recorded for immediate or post event playback for training and evaluation purposes. Quick identification of a hazard or individual is vital when scanning an area, but it is equally important that nothing is overlooked. The enhanced shutter speed of the UCF cameras provides sharp, clear images of the incident during initial evaluation. Equally, it is imperative that any thermal changes are identified easily, regardless of the lighting conditions. When moving between rooms and buildings, or even into bright daylight, the integral ambient light
sensor on the Draeger UCF range automatically adjusts the screen so that the image remains clearly visible. Providing more safety as a result of longer visual support, the auto standby function conserves the four-hour battery life when the camera is not being operated. As with many incidents, confined space entry can be difficult, particularly when crawling and carrying a thermal imaging camera. An integral crawl handle ensures that responders can move more freely and allows the operator to use the UCF camera effectively. FOR MORE INFORMATION Customer Service, Draeger Safety UK Limited, Ullswater Close, Blyth Riverside Business Park, Blyth, Northumberland, NE24 4RG. Tel: 01670 561200 Fax: 01670 356266 marketing.uk@draeger.com www.draeger.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
131
Is your seat belt fastened? Game-changing threat
In 2010, Stonesoft discovered that there are millions and millions of ways to bypass even the most advanced network security solution without being detected, blocked or traced. This new breed of cyber threat was called Advanced Evasion Techniques or AETs. Today the risk of your network being compromised by AETs is growing faster than your security vendor is willing to admit. Why? Because the security industry was also taken by surprise: AETs are a real threat that can do serious damage to your business.
No stone unturned Stonesoft IPS is the most effective protection available against AETs. Combining full stack inspection and data normalization on all protocol layers, Stonesoft IPS leaves no stone unturned. It focuses on the actual content being transmitted in data streams and detects evasion techniques even when they are applied on multiple protocol levels. Stonesoft IPS can be adapted to any network environment – physical, virtual or hybrid – and is backed by the industry’s best AETs testing tools and environment
Find out if you are protected against AETS at:
aet.stonesoft.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SECURITY PARADIGM SHIFTS TOWARDS A NEW REALITY
It was thought that an organisation’s digital assets were protected by the security in front of them but a new threat - Advanced Evasion Techniques (AETs) - has revealed something entirely different. In 1959 Volvo invented the three point safety belt. The Swedish car maker thought its creation was so important they decided to make it available to everyone. However, other car manufacturers dismissed Volvo’s invention, downplayed its importance or simply ignored it all together. They claimed their cars were the final word in automotive safety. This resulted in car owners being confused over who they could trust. Today, a similar story is being played out in the network security industry. It is estimated that more than USD3bn is spent annually on network security devices. Customers expect to get the best protection money can buy, but the latest security trends tell another story. Because security devices protect mission critical computer networks, sensitive data assets and critical systems such as CRM and ERP and SCADA networks, cyber criminals target these same devices. DIGITAL ASSETS Until recently it was thought that an organisation’s digital assets were comprehensively protected by the security solutions put up in front of them but the discovery of a new threat vector called Advanced Evasion Techniques (AETs) has revealed something entirely different. Hackers have found a loophole in today’s network security solutions and can now infiltrate systems and launch successful attacks without ever being detected or leaving any evidence that a system has been compromised. Advanced evasion techniques essentially work like a ‘master key’ and allow criminals to use exploits that would otherwise be detected and blocked. In reality, there are countless evasion techniques that make malicious content more difficult to detect in network traffic. Although evasions have been documented extensively in the last 15 years, security vendors have systematically ignored the significance of the threat. Some vendors have even downplayed the threat posed by evasions as being purely theoretical. Yet this debate misses the bigger issue: the risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit the vulnerability. The recent string of successful yet
unexplained attacks against high profile organisations suggests that evasion techniques are being used effectively. This claim is supported by forensic cybercrime investigation. Stonesoft – for its own part – discovered the immense power of evasions in 2010, when leading security products were tested against advanced evasion techniques by Stonesoft’s research laboratory. The incredible result was that all the tested devices failed to detect exploits that applied evasion techniques. This raises the following questions: Is there a network security solution that protects against advanced evasion techniques? How would this solution
IPS devices are throughput-oriented and cannot perform full normalisation. Proper security devices should normalise data traffic 100 per cent on every protocol layer before executing payload inspection. The majority of existing security devices are architected to optimise the inline throughput performance in a clean (simulated) network that is never the target of a complex, hardto-detect attack. As a result, security devices use shortcuts and execute only partial normalisation and inspection. Evasions can exploit these shortcuts and weaknesses in normalisation and inspection processes. This is a fundamental design issue that is
Combining streambased inspection with data normalisation on multiple protocol layers, the Stonesoft IPS is highly resistant to advanced evasion techniques and offers a novel approach to IPS design and implementation. differ – in both approach and design – from existing security devices? The Stonesoft IPS (Intrusion Prevention System) answers this challenge. Combining streambased inspection with data normalisation on multiple protocol layers, the Stonesoft IPS is highly resistant to advanced evasion techniques and offers a novel approach to IPS design and implementation. Other Stonesoft products such as Stonesoft Security Platform incorporates design elements from the Stonesoft IPS and also provides effective protection against AETs. WEAK POINTS For end-user organisations, there are two critical questions. Why have many security vendors been unable to offer effective protection against evasions? And why is the problem impossible to fix in the same way as exploits? The answer lies in traffic handling, inspection and detection. Each of these capabilities is instrumental in building proper evasion protection in an IPS or nextgeneration firewall (NGFW) product. Many
extremely difficult to change. Especially in the case of hardware based products, the redesign of security devices would require a significant R&D outlay. Data stream-based inspection requires more memory and CPU capacity to continue to perform effectively in throughput. For many vendors, this is a ‘mission impossible’. Evasions exploit this liability by spreading attacks over segments or pseudo packet boundaries. Many of the leading IPS devices are vulnerable to evasion disguised attacks. When running 124 randomly selected advanced evasion techniques through any of the market-leading security devices, the results were indisputable: the devices were unable to detect advanced evasion techniques. The results of this study were reported through the CERT-FI vulnerability coordination process flow and all vendors were made aware of the results. L FOR MORE INFORMATION Visit us at Infosecurity Europe 24-26 April 2012 Earls Court, London (Stand D21) www.stonesoft.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
133
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
OLD COMPUTERS NEVER DIE, THEY JUST RETAIN THEIR DATA When cyber security is only half the story, having a respect for data will reap rewards Our privacy is under attack through all new streams of social networking and internet usage, even the simple ‘social media’ applications gather personal information about our hobbies, interests and habits. This information in the wrong hands will answer most of your email providers ‘security questions’. INFORMATION HARVESTING If you press a few simple buttons on your computer or ‘smart phone’ you can view your emails and if you have forgotten your password? ‘Where were you born’, ‘Name of your first pet’ are the typical questions asked and if you crack those, then hey presto! you have access to your email, or in other
equipment failing to securely erase the hard drives? All of your company’s internal security policies are now null and void and we are living in the realms of the unknown. Cyber-crime is one of the decade’s largest growth industries. Innocent people are losing their information every day – their social media programmes hacked and personal information lost. If we are clear about the implications of Security online, what happens to your data which is held on your personal computer, or laptop? As a routine, most of us password protect the machines (in case the little ones delete your work) but then one day, the screen breaks, your trusty computer fails to start and you decide it’s time to replace it!
Giving your information respect by using even a simple password encryption technique and ensuring you securely erase your data drastically reduces the amount of cyber crime and makes it harder for hackers. words an ‘information harvesting’ application will give a potential criminal access to your emails, giving your personal information or company’s details away to the undesirable. We are aware of most of the above problems but we feel safe in the knowledge that our ‘3rd party’ email provider is like a father figure and will look after you and respect your data. As a matter of basic policy you should research the security abilities of your email provider, encrypt your passwords and, when it comes to answering security questions, maybe look at some alternative basic methods. Try replacing a letter with a number instead (such as its corresponding number within the alphabet). Or use a symbol somewhere within your word. You can also use capitalisation. Back to ‘social media’. It may not be the intention of the application developer to use the information illegally, but do you know about their security practices and protocols? How do they look after your information? What happens if they ‘recycle’ their server
134
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
With your old machine now at the end of its life, what do we do now? We can safely assume that around a million computers are recycled in the UK each year through civic amenity centres, charities or computer recycling organisations. So what happens to your data next? PEACE OF MIND Some computers are properly erased using a certified data erasure software such as Tabernus Enterprise Erase v5.3 (CESG approved data-erasure software). The data cannot be recovered using any known recovery techniques nor technology and the software has been independently tested, verified and accredited. You also have qualified certificates of erasure, plus if you are using a Tabernus solutions partner they offer a full service and peace of mind. Tabernus also have a number of full synergy partners who are accredited by independent organisations such as ADISA
(Asset Disposal and Information Security Alliance), their internal processes are checked and verified. They are the leaders in secure data-erasure services, using Certified Tabernus CESG software. Other computers are either not erased or sold for parts ‘as-is’. Where these items and the related computer hard drives end up is very hard to tell, although the items seldom end up in the country of origin. Even Ebay for many has been a great source for finding data such as patient records, missile launch codes and the trusty corporate database, this makes the news because it hits us on an emotional level, we feel there is a lack of respect, lack of answers and that inevitable question: why? HIDDEN CRIMES In the wrong hands such information has a high value and has made the news many times recently. But the stories which do not make the news include the general public’s and commercial organisations’ lack of an effective information security policy and subsequent loss of their own personal, business or customer information. In conclusion, everyday people’s lives and general business are truly affected by these ‘hidden’ crimes. We are all at risk but this is so easily preventable. Giving your information respect by using even a simple password encryption technique and ensuring you securely erase your data drastically reduces the amount of cyber crime and makes it harder for hackers. Appointing a recognised computer recycling organisation using Tabernus CESG Erasure software to dispose of or remarket your equipment gives a verifiable audit trail and peace of mind. Take your ‘social media’ activities with a pinch of salt and treat your own personal and company information with the respect it deserves. L FOR MORE INFORMATION Tel: 0845 689 1350 www.tabernusuk.co.uk
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
MAKING CLOUD SECURITY YOUR PRIORITY Security breaches and hacks will always exist, so plan ahead, says Firehost Secure cloud hosting provider Firehost is keenly aware of the ever-present damagethreat that a breach in security can cause to an infrastructure. It believes that the cloud is here to stay and, as technologies have grown, become cheaper and made public access more affordable, the opportunity for exposure to more risk has also increased. Security should be the focus first in this arena, and then from there your other choices should be looked at, says Firehost, including performance, managed services, scale and control. The first thing you should be asking is what layers of protection are in place within the infrastructure and, furthermore, what else is offered, according to Firehost. If you understand how the public cloud works, do you want that key protection to be an optional item? If you were purchasing a car, you would assume it had brakes, but would you like to have the option on the emergency brake or air bags? Probably not. You would want all the protection that you have come to accept as standard. The same sort of preference should be exercised with your cloud experience. LAYERS OF PROTECTION Ask what security, beyond a firewall, is in place? Do providers have any mitigation appliances or web application firewalls? If you have secure data or if you have already experienced an attack, then you should delve into this area with your provider and get case studies or specific questions answered to deep information in the area of DDoS mitigation techniques to see if they have previously dealt with advance threats in this area. Hacks happen everyday, 24/7. You should make sure you have minimised all opportunity for it to happen to your data. If an attack happens, how will the company respond? Is it staffed 24/7 to monitor and report? Are there policies in place with action items to address the issues? This is key. It means that the company has defined procedures and everyone knows how to respond with a proportional sense of urgency. Network partitioning / VM policies, geolocation, high-level access, granular rate threshold and heuristic policies should all be addressed. The other key item within this security area is your involvement and the follow-up. Would a supplier notify you and work on next step preventative measures? Any company in charge of your information should declare the incident, immediately address the issue
and investigate how and why it happened. Analysis and documentation, containment and prevention should be detailed and become a focus for future improvement. SUPPORT Our infrastructure is built from the security aspect first, then performance, followed by scale and flexibility. Finally, by staffing 24/7/365 we address the need to always be connected to your cloud. You can call, chat or create a ticket and know that there will always be someone to answer your questions or assist you on your network. Our global network offers servers in Europe or the US and from our portal you can manage your servers and view your performance metrics in real time. You can scale three ways: manually, automatically or on a schedule that you choose. We report on blocked hacks
and you can see these in your portal, and we offer two-factor authentication for secure communication to discuss your environment. FireHost is a secure cloud hosting company focused on protecting sensitive data and companies’ brand reputation with an architecture built for security, scalability and performance. Clients, including some of the largest companies in the world, as well as many fast-growing ecommerce, SaaS and healthcare IT providers with specific compliance or performance needs, subscribe to FireHost’s PCI, HIPAA or high traffic solutions. FireHost provides services from Dallas, Phoenix, London and Amsterdam. L FOR MORE INFORMATION Tel: +44 0800 500 3167 sales@firehost.com www.firehost.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
135
Border Control
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PASSENGER INFORMATION
INTELLIGENCE-LED BORDER MANAGEMENT Andrew Priestley, business development director at ARINC, looks at how intelligent-led border management is fundamental to fighting terrorism Every time there is an aviation-related terrorist incident – whether successful or not – it is airlines and airports that take the flak. Then come demands for tougher security measures, swiftly followed by passengers complaining of increasingly intrusive procedures. Yet with equipment ranging from e-passports to full body scanners, we already have highly sophisticated methods of identifying and apprehending criminals. To be really effective though, this cutting edge technology needs to be backed up by a system of international standardisation and collaboration that enables information to be shared – speedily, reliably and securely. In other words, intelligence-led border management that collects and processes information to all relevant national and international agencies, harmonising standards of identifying, verifying and authenticating passengers. COMMON-LANGUAGE DATA SERVICE Technical problems created by the varying data sources and formats used by different agencies is cited as the main problem to such standardisation. This is easily overcome by using ARINC’s
provide a cost-effective solution. The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. BCAs, law enforcement organisations and intelligence services get a valuable headstart on checking names against watch lists, highlighting suspect travel patterns, assessing potential risks and locating suspects. SECURE DATA PROTECTION Data protection is a concern for many passengers, particularly where Advance Passenger Information (API) messages are transmitted by e-mail and over the internet. This is not an issue with a fully-managed IP network like ARINC’s AviNet, which provides a level of reliability and end-to-end security that is absent from a public internet connection. Airlines, too, have concerns regarding data collation. Those using legacy systems find government demands to extract data, particularly in the absence of standards harmonisation, can entail budget-breaking costs. With a long and successful track record
The combined use of iAPIS and PNR allows security resources to be employed more effectively to target undesirables for screening whilst enabling faster processing of low-risk passengers. Electronic Borders – a common-language immigration data service combining items such as interactive Advance Passenger Information System (iAPIS) with Passenger Name Records (PNR). Translating messages from disparate agencies and systems, it provides a unique screening solution that enables airlines to meet their legal obligations whilst maintaining passenger privacy. ARINC’s private, highly secure AviNet global communications network, with its 99.999 per cent availability, provides seamless, efficient and reliable communications between airlines and border control agencies (BCAs). More and more governments require airlines to use iAPIS and impose hefty fines for those that fail to do so. Electronic borders, requiring little or no new system development, or even the modification of existing systems,
136
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
in systems integration, ARINC recognises the need for software flexibility to accommodate varying border regime requirements. BIOMETRIC TECHNOLOGY Complementing API and PNR is biometric technology, which helps prevent a range of criminal activities made possible with forged documents and stolen identities. ARINC’s fully-integrated Identity Management System (IdMS) is designed to be applicable in many critical settings and can collect, verify, and maintain biometric and biographical information – ensuring that biometric systems integrate with existing airline and airport processes – as well as supporting all phases of the identity management lifecycle. Over 80 per cent of passengers now use
mobile devices, the internet and self-service kiosks to check in away from traditional, dedicated airport workstations. The downside is that passengers taking only hand luggage need have no interaction with the airline until they reach the gate. Since the ability to track the progress of each passenger in the airport is crucial, this self-service travel has boosted demand for Passenger Reconciliation Systems (PRS) such as ARINC’s VeriPax, which is designed to maximise security checkpoint operations while optimising passenger flow. VeriPax not only complements ARINC’s IdMS but also has links to watch lists, assisting government agencies responsible for border control. VeriPax validates the authenticity of barcodes on boarding passes using 2D scanners, automatically screens passengers against airline host systems in real time and determines clearance, providing audio and visual status alerts to agents when necessary. INFORMATION SHARING IS CRITICAL Information-sharing is a crucial element in the fight against terrorism and ARINC’s Multi-User System Environment (MUSE) family of passenger and flight information systems allows airlines to share vital passenger and baggage information in real time on high-speed multi-user networks. Whether from off-site locations, CUSS kiosks or traditional check-in desks, airlines can access the information they need whenever they need it. Since each transaction – from ticketing and baggage handling to car rental and hotel reservations – can be processed over the common network, communications barriers are completely eliminated and security is enhanced We have the tools – what’s missing is international harmonisation of standards and reliable intelligence-sharing with every effort made to eliminate opportunities for human error. Border control agencies must use all the available information at their disposal, including that which is in the public domain on personal websites, blogs and on social networking sites. Analysing and correctly interpreting this information is fundamental to intelligence-led border management. L FOR MORE INFORMATION emea@arinc.com www.arinc.com
CYBER SECURITY
Law Enforcement
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CYBER-SPACE: WHERE DO WE GO FROM HERE? As a constantly evolving force without well-defined legal boundaries and controls, cyberspace could be considered as the final frontier with regard to internet security. Chris Hardy, regional director, UK public sector, McAfee, discusses what governments and industry can do next following a recent report on the state of international cyber-security The internet is a truly global resource which is part of what makes it so accessible and useful. The web joins us all together as one global community, making the world smaller and allowing nations to connect in new and constructive ways. However these unique characteristics also present challenges, most obviously around security. Traditional, national notions of legal governance are ill-equipped to deal with the challenges posed by the internet’s amorphous and international nature.
In short, tackling cyber-security is a global challenge which requires close collaboration between organisations and governments. This might sound like a fairly simple measure, but the reality is far from straightforward. For a start, there are discrepancies between the levels of cyber-security that countries are perceived to have in place. According to a recent report commissioned by McAfee, from Brussels-based think tank Security & Defence Agenda, the UK is seen as lagging behind countries including Israel, Sweden and Finland in its preparation despite dedicating a huge amount to cyber-security from its four-year budget. These differences can make it hard for government officials to trust one another as there are concerns around exposing public infrastructure and informational assets to potential threats. However, with just under half of respondents recognising cyber-security to be as important as border security, it is crucial to build up international relationships between governments. While politicians work on addressing their differences and building common goals, there are some initial steps that can be taken to start developing a joint response
to cyber-crime. If these can be met, the international community should be able to achieve the delicate balance of working as one, while maintaining their own public services on which citizens depend every day. REAL-TIME GLOBAL INFORMATION SHARING The use of cross-border services has significantly increased as a result of new technologies like cloud computing, and consequently the online world has become increasingly integrated. From a public services perspective, and specifically considering the UK’s ‘digital by default’ strategy, that means it is now more important than ever for the government to have faith in these systems. Wherever they are located, systems must be safe as well as functional as it is likely that the information they hold is sensitive and confidential. Moreover, it’s not just civil servants who need to have faith in information security. The success of upcoming government initiatives such as Universal Credit rely heavily on public trust in online services, and the belief that any data entered online is properly protected. E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
137
Don’t leave
your safety to chance.
Come a n Counte d visit us on s r Terror tand F1 5 E on our product xpo for more 2 at the informa s and s ervices tion .
Safety solutions for counter terrorism applications from Draeger. Whether you are looking for personal protection, or gas detection in hazardous environments, Draeger has solutions available. Draeger’s portfolio includes portable gas detectors and Dräger-Tubes, thermal imaging cameras, breathing apparatus, chemical protection suits and escape sets. In addition to full- and half-face masks and eyewear, and civil defence and hazmat kits. The selection of training, care and maintenance, and service options on offer extends how we can help you. Draeger’s portfolio means that no matter what the hazards or situation might be, there will be a solution available, giving you peace of mind in often difficult and dangerous circumstances. When it comes to safety; don’t leave it to chance. www.draeger.com FOR MORE INFORMATION EMAIL US AT MARKETING.UK@DRAEGER.COM OR CALL US ON 01670 352891
CYBER SECURITY E The information flow within governments, between governments and between governments and private sector partners mean that there are a number of touch points where data is at risk. With no single international body holding a cyber-security mandate; national and regional organisations need to improve their cooperation and information sharing. This is difficult due to the lack of trust between one government and another but is key to guaranteeing internet security.
the other hand is supremely agile, has substantial funding streams and no barriers to information sharing. The contrast with national governments could barely be more stark, and yet these are the terms of combat. There are a number of treaties and agreements already in place to guard against cyber-crime, the most promising of which is the Interpol framework, used to deal with cybercrime in countries which do not have a current legal ruling.
INCENTIVISE SECURITY With no chain stronger than its weakest link and information often following freely across borders, countries with an absence of cyber-focused legislation can provide a haven for criminals. At a macro level, the best way to help with this is to improve the economic situation as internet crime is closely linked to unemployment rates. At a micro level however, financial incentives can go a long way to improving practices within individual government offices. In the UK specifically, the pressure on project leaders to meet deadlines on time and in budget is a real focus and providing budget for doing things right, can be the way to ensuring no corners are cut. Another incentive is the threat of penalties when an organisation falls short of expected standards. Debate is ongoing as to whether sanctions are appropriate for parties on the receiving end of successful cyber attacks. And who should bear the brunt of such penalties? A vulnerability in a particular piece of code would seem to be the software producer’s responsibility, were it not for the fact that producers absolve themselves of liability with contractual small print. The chain of responsibility is complex, and as a result it is unrealistic to pinpoint just one party as having ultimate liability.
DEVELOP INTERNATIONAL STANDARDS Establishing best practices is a first step in ensuring that cyber-security is practical, low-cost and can be quickly implemented. It involves a holistic approach that accounts for legal, regulatory and technical considerations as well as providing an ethical code of conduct. An Integrated Supply Network to
GIVE POWER TO GLOBAL LAW ENFORCEMENT With network and content now separated by international borders, the laws governing copyright and territorial security are no longer straightforward. Google, for instance, hosts one third of its cloud services in Canada. With this in mind, international collaboration on law enforcement is crucial with cyber-space now seen by many as the fifth dimension of warfare. Rulings need to be accepted across all countries in order to find a compromise between security and freedom, and the UK in particular has dedicated significant resource to this within its four-year budget. The Cyber Defence Report acknowledges that cyber-crime is growing, and sets out three reasons for this trend: it’s profitable, low-risk and anonymous. There are no national boundaries in cyberspace, which presents difficulties around enforcing traditional legal powers. The cyber-criminal community on
NGO, Impact. These types of organisations can give governments the confidence to share sensitive information, therefore alleviating concerns that any insight could be used to attack public services. Certain industries have recognised that they are at heightened risk from cyber-attacks, and this realisation has acted as a catalyst for cooperation. The Night Dragon attacks launched in late 2009 targeted proprietary operations and project-financing information on oil and gas field bids and operations. This information is highly sensitive, with multibillion dollar deals at stake in what is an extremely competitive industry. The oil and gas industries reacted by creating a global communication chain which became an industry group mirroring that set up by the US financial services industry – the Financial Services Information Sharing and Analysis
Law Enforcement
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The Night Dragon attacks launched in late 2009 targeted proprietary operations and project-financing on oil and gas field bids and operations. This information is highly sensitive. complement this should also ensure that similar procurement practices are followed around the world. Some standards are already in development however none have global support at this point. Those from ENISA, for example, only account for the 27 European member states. But regulation alone is not a complete solution. Laws take a long time to draft, agree and implement, and fixed legislation can quickly become ineffective against cyberthreats which are in a constant state of flux. Most commentators agree that involving the private sector at an early stage in discussions around new legislation will help to counteract this problem. Guidance from businesses can help to prevent legislation being drafted with a short shelf-life, by informing legislators who may otherwise be too distant from industry to fully understand its challenges and concerns around cyber-security. ADDRESS DIPLOMATIC CHALLENGES Secrecy concerns hamper the growth of trust between countries and can limit the success of conferences like the London Conference on Cyber-space. Fostering trust is the only way to develop agreements and standards internationally, otherwise the “good guys” are playing chess without half the pieces. One of the main reasons why cyber-criminals can prosper is their ability to share information quickly and without any regulation. This makes choreographing wellorchestrated attacks much more achievable. One way to address distrust between governments is through the use of independent bodies like the Malaysia-based
Centre (FS-ISAC). These are both positive examples of competitors in an industry realising the need to share information in order to combat a bigger threat. The internet was initially built on the basis of trust, but now with billions of pounds at stake and new global threats to infrastructure, that notion seems entirely outdated. Conversely the response to global cyber-crime now depends on such trust between national governments, and also private sector firms – which inevitably means working side-by-side with competitors. EDUCATION Cyber-security also depends on the behaviour of government workers and public alike as hackers exploit social vulnerabilities. As a result, education is crucial as technology users need to understand how to behave responsibly. If nothing else, recent advancements in technology have permanently changed younger people’s conception of privacy; something that many policy makers are yet to fully comprehend. Education should begin in schools, within school curricula, and be continued by companies teaching their employees. We are after all, in a new digital era and with government services increasingly moving online, it is more critical than ever that the right processes are put in place to ensure public sector security long term. L ABOUT THE AUTHOR Chris Hardy is regional director, UK Public Sector at McAfee, the world’s largest dedicated security technology company
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
139
simply secure The only touch screen USB 3.0 hard drive with 256-Bit hardware encryption. Available in 320GB, 640GB and 1000GB. No software, no fuss. Keep you data safe in style.
3
originstorage.com
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
DATA LOSS: ARE YOU SECURE? High penalties for data loss mean that it’s just not enough to ensure your sensitive data is encrypted – you need to prove it, says Andy Cordial, managing director of Origin Storage Limited Last month, penalties issued by the Information Commissioners’ Office (ICO) to local authorities for data loss officially hit £1 million. In every instance, the fine was related to data in transit. However, despite an increasing number of reported – and in some cases extremely high profile – incidents, the loss or theft of sensitive data from devices such as laptops and tablets continue to dominate the headlines. Despite overwhelming internet adoption, organisations often need to transfer or carry large amounts of sensitive data on physical devices, whether it’s laptops, tablets, USB sticks or other removable media or drives.
loss or theft of such sensitive data could lead to financial or emotional damage to individuals or businesses. In the case of the NHS Trust, the loss of confidential patients’ records from the hard drives could lead to reputational damage, or even blackmail. ENCRYPTION In both cases, had the data been securely encrypted, there may not have even been a need to report the incidents. Indeed, with the NHS case the trust had placed its trust in a third party to destroy the sensitive information but had no means of confirming if this had taken place.
Despite overwhelming internet adoption, organisations often need to transfer or carry large amounts of sensitive data on physical devices. Last year, the FSA fined Zurich Insurance a whopping £2.3 million for the loss of sensitive information for 46,000 of its customers. In the past, other banks including HSBC and Nationwide have been fined for similar offences. In most cases, the need to carry sensitive data is born from convenience, especially if secure internet access to a fixed source is not available, or if a dataset is large. RISKS But accidents do happen. Last year, the FSA fined Zurich Insurance a whopping £2.3 million for the loss of sensitive information for 46,000 of its customers. In the past, other banks including HSBC and Nationwide have been fined for similar offences. Also, last September more than 200 hard drives containing confidential information regarding thousands of patients were stolen from Brighton General Hospital. The NHS Trust had subcontracted the destruction of the drives to a registered contractor but instead they had appeared for sale on eBay. Following action by the police, the drives were all recovered but the ICO now intends to fine the Trust around £375,000 for the incident. The reason for these huge fines is that the
Subsequently, organisations are looking to create better frameworks for both handling and protecting data at rest and in transit. Having systems that require staff to change working practices and add processes to ensure better security should be a no-brainer. However, optional encryption schemes are inherently flawed if they can be circumvented by users. As such, both public and private firms are now embedding security at the device layer. This normally focuses around the hard drives of desktop or laptop computers that automatically encrypt and decrypt data on the fly in a transparent method. Specialist encryption solutions like the Data Locker 3 PIN-protected portable hard drive, and the Enigma SED FIPS 140-2 (self encrypting drive), both provide an increased level of security for laptops and PCs. The advantage of full disk encryption is two-fold. The first is
that the user cannot turn it off and every read, write or copy on the disk is encrypted. This ‘always-on’ approach leads to a second major advantage: accountability. By having unbreakable encryption at the physical disk layer, there is a certainty that this lost information is effectively non-actionable, and thus not able to cause damage. So while it’s essential that an organisation takes every step available to them to protect their data, it’s just as important that the firm can prove it to the authorities should the worst happen. Conventional security software alone can fail to effectively authenticate users and machines on the network or secure data on lost or stolen laptops – or importantly ensure compliance with laws that require disclosure of lost personal data. Fortunately, SEDs, trusted platform modules (TPMs) and BitLocker client PCs can help safeguard an organisation’s critical information. However, these technologies provide only half the answer. DEMONSTRATING COMPLIANCE Directory-based security management software like Wave’s EMBASSY remote administration server (ERAS) can help by remotely monitoring and logging all activity on the device, and offering advanced reporting capabilities. This ability to demonstrate compliance is as crucial as securing the data itself. The reality is that even with the most diligent staff working in secure environments, laptops or removable drives go missing. By not having encryption at the most basic layer, organisations are just waiting for the inevitable compliance failure and subsequent painful fine. L FOR MORE INFORMATION Tel: +44 (0)844 288 6868 www.originstorage.com
TM
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
141
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
MUNITIONS
RAF laser-guided bomb contract secures UK jobs A £60m deal announced for extra RAF precision munitions will help sustain hundreds of UK jobs. The contract is for Paveway IV, which is among the most advanced precision bombs in the world and considered the backbone of the RAF’s bombing capability. The contract has been awarded to Raytheon UK and will sustain some 450 jobs in advanced weapons manufacturing at its plants in Glenrothes, Scotland and Harlow, Essex. A number of jobs will also be kept at subcontractors Portsmouth Aviation and Thales plant based in Basingstoke. Paveway IV proved highly effective during the 2011 air campaign over Libya and is also currently used in Afghanistan on Tornado jets. It is fitted with Global Positioning System (GPS) technology and laser guidance systems which mean that the precision delivery of
the capability is unaffected by clouds or smoke screens, giving the UK the capability to conduct 24-hour attacks against a wide range of targets. The weapon has a UK-developed fail-safe fuse mechanism which means that the bomb will only detonate once it has reached its intended target. The Minister for Defence Equipment, Support and Technology, Peter Luff, said: “The Paveway IV bomb has been proven in combat in Afghanistan, where it continues to equip RAF Tornados, and in operations in support of the UN over Libya. “Paveway munitions have long been a success story for the Royal Air Force in terms of their precision bombing capability.The ability to operate in any weather means that we are able to support operations 24/7; Paveway IV weapons are a real asset to not only the Royal Air Force, but to Defence as a whole.”
NEWS IN BRIEF
Defence News
sponsored by
India’s nuclear subs nearly ready India will operate two nuclear powered submarines soon as it inducts the Russian Nerpa and launches the indigenous INS Arihant, Defense Research and Development Organisation (DRDO) Chief V K Saraswat has announced. “INS Arihant is in advanced stages. It will be ready for operations within the next few months,” he was quoted by The Economic Times as saying. India is also testing the Sagarika K-15 missile that will be carried by INS Arihant, V K Saraswat said. Launches have been carried out in the Bay of Bengal.
Industry chief warns of delayed reaction to cuts The impact of cuts to science spending at the Ministry of Defence will eventually be felt as skills and experience are lost, a defence industry chief has warned. Rees Ward, a retired rear admiral who now heads up defence industry body ADS, reportedly told an MoD science showcase event that there was a “great risk” resulting from the reduction in military science spending from £800m to £400m over the past decade. According to the BBC he said: “The effects of such a reduction are not going to be felt in the next two or three years.”
Army & Navy remove German V2 rocket remnants in Essex Royal Navy and Army bomb disposal experts have successfully removed the remnants of a German V2 rocket lodged in an Essex river bed since the Second World War. A four-footlong section was pulled from mudflats at low tide on the River Stour between Harwich and Felixstowe. The six-man Navy team from Southern Diving Unit 2 (SDU 2) in Portsmouth worked with the British Army’s 101 Engineer Regiment bomb disposal team.
AIRCRAFT SUPPORT
BAE wins £446m Typhoon jet support deal BAE Systems has announced a contract worth £446m to support the fleet of Typhoon jets. The fiveyear support deal will provide a range of engineering services and contribute to the 30 per cent savings target. The order will help to sustain around 600 jobs at BAE Systems’ Warton and Samlesbury sites in Lancashire focused on engineering, supply chain and project management. The in-service support agreement, known as Contract 1, will introduce efficiencies by
bringing together a number of legacy contracts and proposed new work into an umbrella contract. It demonstrates a commitment to the continued development of Typhoon. This work will provide the test and evaluation infrastructure for the future air-to-air and airto-ground Typhoon capability enhancements announced in the Strategic Defence and Security Review (SDSR). TO READ MORE... tinyurl.com/bmu3ues
HMS Dauntless sets sail for the Falklands One of the Royal Navy’s newest and most powerful warships set sail for the Falkland Islands the day before the 30th anniversary of the British task force setting sail for war. HMS Dauntless, the second of the Navy’s hi-tech Type 45 air defence destroyers, left Portsmouth Naval Base on April 4. The Royal Navy said it was the first operational deployment for HMS Dauntless since it was commissioned in 2010. However, at a ceremony to mark the 30th anniversary in Argentina, President Cristina Fernandez de Kirchner said: “Every day that goes by it looks more ridiculous, more absurd to the eyes of the world.”
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
143
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Detecting and preventing under-vehicle bombs This form of attack presents the terrorist with one of the most efficient means of assassination in terms of the risk of detection during the assault and the amount of explosive material used. The victim can be selected precisely, to cause the maximum alarm and dismay amongst the community to which he or she belongs. A death rate of one person per week was caused by this method of attack during one period of the 30 year IRA campaign in the UK. The targets, security personnel, prominent politicians and citizens, were chosen with precision to gain maximum effect. Since the 1980s Intelligent Security has been involved in signal processing for a range of security products from perimeter intrusion detection systems, which at one time were installed at 21 of the UK’s high category prisons, through to today’s Talos Under Car Bomb Detection System and the Heartbeat Detection system. The Talos Undercar detection system development came about in 1988 as the result of the IRA’s attack on a minibus carrying soldiers who had just taken part in the Lisburn Half marathon for charity – six were killed. In late 1989 the Talos system designed to detect the placement of magnetically attached IEDs had under gone trials by the UK’S Defence and Research
144
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
Agency and was being installed by the Home Office for at risk personnel. Today with over 11,800 units in service Intelligent Security continues to monitor and develop the Talos system in order to meet new threats. Magnetically attached IEDs are still the most widely used undercar devices as they are selective both in their target identification and placement of the device on a vehicle. However other means are now used occasionally; the bomb may be wedged between the plastic under car tray that is now present on many upmarket cars or perhaps with elastic cord or by some other means. This plastic under car tray in itself renders the magnetically attached
bomb obsolete for those vehicles. The Talos Plus system has solved this problem. The method relies on the changes that occur in the vibrational resonance of the vehicle when the device has been attached. The resonance pattern of the vehicle is recorded by piezo-electric sensors placed at four or more positions on the car. This vibration pattern is processed by a microprocessor and if an anomalous pattern is detected an alarm is indicated. FOR MORE INFORMATION Tel: (0)844 8268074 Fax: (0) 844 8268084 info@intelsec.com www.intelsec.com
INSTITUTE OF EXPLOSIVES ENGINEERS
THE EXPLOSIVES SECTOR: SETTING THE STANDARDS
Explosives Training
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Major Ken Cross MBE, president of the Institute of Explosives Engineers, talks about the qualifications needed to get involved in munition clearance and be paid to blow stuff up for a living in the wide-ranging explosives sector The explosives industry is very attractive to many servicemen and women coming to the end of a career where the use and management of Ordnance, Munitions and Explosives (OME) may have been an everyday occurrence. You may have been an Infantryman in Afghanistan, firing hundreds of rounds of small arms ammunition during an operational tour, you may have been a specialist searcher in the Royal Engineers, you may have been a RAF Armourer or a munitions storekeeper. Clearance Diver, Ammunition Technician, Military Police CSI: all of these are potential routes to a career in the explosives sector if you have the drive to make it so. Some of the fields of expertise in the explosives sector are: quarrying, mining, construction, demolition, security, the oil and mineral exploration industry, film and TV special effects (SFX), explosives licensing, munitions design and manufacture; explosives search and detection; EOD operations and training; logistics; explosives forensics. HARD FACTS There are some harsh realities to be taken into account when considering a career in the explosives sector. The UK’s explosives industry has generally been in decline for a number of years as the number of mines, quarries, explosives manufacturers and research establishments have reduced. The global recession has hit the explosives sector as hard as any other and those companies that have survived have done so by taking hard decisions and consolidating their positions. All of this can only mean that recruitment has been very limited in most specialist areas. That said, another factor that has been well recognised by explosives companies and government departments is that the workforce that has ‘always been there’ is declining due to normal retirement, leaving space for welltrained and motivated individuals to take up. TRAINING AND QUALIFICATIONS The Standards Setting Body for Explosives, Munitions and Search Occupations (SSB for E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
145
Innovation from EDSL
T h e r m i t e To r c h
Initiator Introducing 3 new products, designed and developed for use by military, security and disposal teams. EDSL offer an intelligent response to support operations in the field, with a range of innovative solutions and training on a worldwide basis.
Diver Hand Held Sonar
3 new innovative products from EDSL
TJet self fill thermite torch
CobraST Initiator
Artemis Diver Hand-Held Sonar
Optimised for the destruction of thin skinned ordnance. The TJet is easy to use, supplied with the tools to self-fill, easily ignited and cannot be weaponised.
A low cost initiator that is easy to use and is compliant with military electrical safety requirements. Exceptional levels of reliability are assured by the built-in LED counter.
Artemis is designed for underwater EOD, search and demolition work and experienced sports divers. An integrated, digital CHIRP system gives exceptional range.
Contact: EDSL, Bramble Island, Great Oakley, Harwich, Essex. C012 5JW. Tel:+44(0) 1255 887800 www.epc-groupe.com
INSTITUTE OF EXPLOSIVES ENGINEERS E EMSO) was established in 2000 in order to develop National Occupational Standards and National/Scottish Vocational Qualifications (N/SVQs) for those involved in munition clearance (ie bomb disposal – both EOD and IEDD) and search activities. The standards would provide specific, objective, measurable and nationally agreed statements of competence that could be used in any part of the explosives industry – military, civilian or private sector. These standards were launched in October 2003. In the autumn of 2003, the Defence Ordnance Safety Group (DOSG) of the Ministry of Defence (MoD) approached the SSB and asked for help in defining the competences known at the time in the MoD as Ordnance, Munitions and Explosives (OME) but which later became known as Explosive Substances and Articles (ESA). Since the MoD ideally wished its personnel to gain national accreditation for achievement of the resulting standards, the project was therefore widened to include all organisations that employed people who needed expertise in dealing with explosives (both military and civilian). The SSB was made up of experts from the Ministry of Defence (MoD), Royal Navy, Army and Royal Air Force, QinetiQ plc, the Atomic Weapons Establishment plc and the Defence Science and Technology Laboratories, along with representatives from commercial companies working with explosives in conjunction with a qualifications specialist. The NOS were to be the basis for a raft of S/ NVQs covering the whole explosives sector. 24 NVQs were developed, each covering one of the functional areas identified during mapping of the explosive substances and articles industry. Each NVQ is based on National Occupational Standards (NOS) and relates to the roles identified by the early research – from operator to operational manager level. The difficulty in developing these NVQs beyond the initial stage was the lack of take up by existing Awarding Bodies who perceived that the aforementioned decline in explosives workers population would automatically mean that there was little profit to be made from this sector. So, Homeland Security Qualifications (HSQ) was established to meet the needs of this niche market. The asterisked qualifications are immediately available from HSQ and more qualifications (in Defence Range Safety and in the vehicular movement of explosives) are currently under development. Some, but by no means all, of these NVQs have been migrated to the new Qualifications and Credit Framework (QCF) that is being phased in to replace the existing national qualifications system. Homeland Security Qualifications has begun the process of translating the majority of the ESA NVQs listed above into the QCF format and has also developed bespoke vocational qualifications for its client organizations that wish to accredit the training or competence of some its specialist personnel. E
IEE Training Courses
Explosives Training
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Research, Design and Development Research into Explosive Substances and/or Articles Level 4 Design and/or Development of Explosive Substances and/or Articles Level 4 Research, Design and Development of Explosive Substances and/or Articles Level 3
Safety Management Explosives Safety Management and/or Advice and/or Regulation Explosives Safety Supervision
Level 4 Level 3
Test & Evaluation Test and Evaluation Management of Explosive Substances and/or Articles Test and Evaluation Supervision of Explosive Substances and/or Articles Test and Evaluation Operations of Explosive Substances and/or Articles
Level 4 Level 3 Level 2
Manufacture Explosive Substances and Articles Manufacturing Management Explosive Substances and Articles Manufacturing Supervision Explosive Substances and Articles Manufacturing Operations
Level 4 Level 3 Level 2
Maintenance Explosives Maintenance Management Explosives Maintenance Supervision Explosives Maintenance Operations*
Level 4 Level 3 Level 2
Procurement Explosive Substances and/or Articles Procurement Management Explosive Substances and Articles Procurement
Level 4 Level 3
Storage Explosives Storage Management Explosives Storage Supervision Explosives Storage Operations
Level 4 Level 3 Level 2
Transport Explosives Transport Supervision Explosives Road Transport Operations
Level 3 Level 2
Entertainment Explosives Entertainment Management Explosives Entertainment Supervision Explosives Entertainment Operations
Level 4 Level 3 Level 2
Munition Clearance and Search Planning and Management of Munition Clearance Operations Planning and Management of Specified Targets Operations Supervisory Management of Munition Clearance and/or Specified Targets Search Operations Search for and Disposal of Munitions Search for Munitions and/or Specified Targets* Contribute to the Search for and/or Disposal Function Provide Support for Search or Munition Clearance Operations
Level 4 Level 4 Level 3 Level 3 Level 3 Level 2 Level 1
Disposal Explosive Substances and/or Articles Disposal Management Explosive Substances and/or Articles Disposal Supervision/Operations Explosive Substances and/or Articles Disposal Operations
Level 4 Level 3 Level 2
Hybrids General Explosives Operations
Level 2
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
147
INSTITUTE OF EXPLOSIVES ENGINEERS E Some of the explosives specialist occupational areas have very specific requirements and their own industry training and qualification standards. SFX is a growth area which requires specialist training through the BECTU, BPA or ASP schemes. If you wish to become a shotfirer in the mineral extraction industry you will need to qualify through one of the appropriate training providers - the Mineral Products Qualifications Council (MPQC) is the awarding body for vocational qualifications in Blasting Operations at level 3 - for operators, shotfirers, explosives supervisors, store keepers working within a blasting environment. TRANSFERABLE SKILLS Very few of the military qualifications in OME gained by servicemen and women were obviously transferable until quite recently. The past few years has seen a lot of effort in the Defence training organisations to map military qualifications to National Occupational Standards and S/NVQs. As the QCF becomes fully operational, these VQs will be re-developed into QCF-compliant qualifications as the awarding bodies and
the Institute of Explosives Engineers, Institute of Quarrying, Institute of Mining and the National Federation of Demolition Contractors. Trade bodies include BECTU, the BPA and ASP for those wishing to work as professional pyrotechnicians. The IExpE has individual members from most of the specialist areas within the explosives sector and military applicants with appropriate verifiable training and experience are always welcome. Through the Institute, members of all categories and from all disciplines have a live forum. Demolition contractors, explosives manufacturers, underwater specialists, miners, tunnellers, quarrymen, disposal contractors, vibration specialists, oil industry contractors, special effects technicians (pyrotechnicians), firework display operators, Police Explosives Liaison Officers, Legislators and members of the Armed Services find a common voice to express concerns and ideas and to understand better the requirements and concerns of those explosives engineering disciplines that are less familiar to them. Members receive a quarterly journal and access to a network of expertise. The IExpE now provides a route for explosives workers to registration with
Explosives Training
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The IExpE has individual members from most of the specialist areas within the explosives sector and military applicants with appropriate verifiable training and experience are always welcome. training organisations are driven by demand from the servicemen who need to show their abilities to civilian organisations. There are, of course, some specialist areas such as EOD where most of the civilian companies recognise and may insist on evidence of military training and experience. Service leavers should not forget all those additional skills and qualifications they have picked up over the years, and should ensure that as many of them as possible are still current at the time they leave the Service. Qualifications such as HAZMAT Instructor, ADR driver, Government Authorised Representative are worth their weight in gold in the outside world. Many companies will look for a multiskilled operator able to turn his or her hand to different facets of the task set. Remember that it is up to you to prove your competence, not to expect a civilian employer to accept military service as assurance that you have the skill set he is looking for.
the Engineering Council in the grades of Engineering Technician (EngTech), Incorporated Engineer (IEng) or Chartered Engineer (CEng), through a partnering arrangement with the Society of Environmental Engineers. Potential registrants must be members of IExpE. A WIDE-RANGING SECTOR The explosives sector is very wide-ranging, from research scientist to explosives manufacturer to ammunition storeman to tunnelling shotfirer to search adviser to EOD operator. Many service leavers will be attracted to work in this industry due to their military experience in the use of ordnance, munitions and explosives (OME) or in counter-terrorism or counter-IED operations. Some civilian or government specialist areas are in decline and some are growing, but there is always space for the well-trained and motivated individual with the right skills and qualifications L
PROFESSIONAL BODIES As with any sector of industry, there are a number of professional bodies that can provide advice on entry into particular specialisations. The explosives sector includes
FOR MORE INFORMATION Institute of Explosives Engineers www.iexpe.org Homeland Security Qualifications www.homelandsecurityqualifications.co.uk
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
149
Combat ‘CROCK POT’ Morale Booster just got better... Designed and Manufactured to :-
MIL-PRF-44466D NSF ANSI 4-2007
Heats or cools while on the move Chills water, heats MREs, gives hot potable water on demand Keeps contents hot for up to 6 hours Low thermal signature Non-spill relief system 24V DC
! s l o o c o s ...it now al
ELECTROTHERMAL UK ELECTROTHERMAL USA A Bibby Scientific comapny
A Bibby Scientific company
3 Terri Lane, Suite 10, Burlington, NJ 08016, USA TEL: +1 609 589 2560 FAX: +1 609 589 2571 www.electrothermalusa.com
A Bibby Scientific comapny
Unit 12A Purdeys Way, Purdeys Industrial Estate, Rochford, Essex, SS4 1ND, United Kingdom TEL: +44 (0) 1702 303350 FAX: +44 (0) 1702 468731 www.electrothermal.com
LAND DEFENCE
DVD Exhibitors (A-K)
Open systems in the land domain
Taking place on 20-21 June at Millbrook Proving Ground, the DVD 2012 land forces technology event will take a close look at LOSA - an open system of integration and interoperability to enable coherent military units
DVD is an important event in the defence diary for those involved in the equipment and support for the UK’s land forces. DVD is Defence Equipment and Support’s (DE&S) annual stakeholder event for the land equipment community. Held over two days at Millbrook Proving Ground, Bedfordshire, it is organised by DE&S - the part of the MOD responsible for equipping and supporting the UK’s armed forces for current and future operations. DVD brings together the acquisition community with military personnel and industry organisations for two days of informal discussion and briefings. As the sector continues to deliver the highest levels of technology, capability and service, DVD provides an opportunity to meet and share ideas about issues affecting current and future equipment and support. LOSA is the major theme for DVD 2012 through which MOD intends to develop and encourage systems integration and interoperability so that it can have coherent military units for peace time training and
for operations, now and into the future. Military units, such as an infantry platoon, consit of three platforms: soldiers, vehicles and headquarters (or base). For each platform, MOD is producing a generic architecture. These are open standards which relate the interfaces to the infrastructure, power and data. In the case of headquarters or bases, water, waste and fuel. They will be available to anyone wishing to build a sub-system, which can be quickly added to the platform and changed or upgraded as needed. The standards are developed by MOD and industry working together and are mandated by MOD for relevant projects. MOD is encouraging all DVD participants to take account of the standards in order to demonstrate how systems from different companies can be joined together through standard interfaces. The conference theme ‘Open Systems in the Land Domain’ is being held on 19th June, the day preceding the event. ADS and UK MOD Defence Equipment will discuss the application of open architectures and systems E
DVD 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
3M United Kingdom PLC - C3-130 A.E Petsche - C3-111 - C3-112 Active Electronics Plc - C3-63 Aero Tec Laboratories - C3-151 Aeroflex Ltd - C3-55 Allan Webb Ltd - C3-132 Alpha Armouring Panzerung GmbH - SP-19 Amphenol Ltd - SP46-47 Amsafe Bridport UK - C1-04 Antares (Europe) Ltd - C2-36 Arbil Ltd - C3-67 - C3-68 Automotive Trim Developments Ltd - C3-25 AWS Electronics Group Ltd - C2-09 Barloworld Handling Ltd - SP12-13 Blakley Electrics Ltd - C3-83 BMT Group Ltd - C3-126 - C3-127 Bradley Doublelock Limited - C2-28 Briggs Equipment UK Ltd - SP-29 Burgess Consulting Ltd - C3-144 C E Niehoff Co Ltd - C3-80 cablescan ltd - C3-81 CF Cases Ltd - C3-01 Chess Dynamics Ltd - SP48-49 Clark Masts Systems Limited - SP-50 Continental DataGraphics Ltd - C2-31 Conway Packaging Services - C3-107 Cooneen Watts & Stone/Hawk Protection - C3-108 Corporate Document Services Ltd - C2-32 CQC Ltd - C3-134 DCS Ltd - C2-17 Defence Support Group - OR-03 Design Reality - C3-57 Deutsch UK - C2-26 DMS Technologies - C3-128 Donaldson Filters Component Ltd - C2-10 DRS Technologies UK Ltd - SP-35 Dytecna Systems Ltd - SP-08 Eberspacher (UK) Ltd - C2-15 Edgar Brothers - C3-133 EKA Limited - OR15-16 Elaflex Ltd - C2-05 Enhanced Protection Systems - SP-27 Esterline Communication Systems - C3-113 E-T-A Circuit Breakers Ltd - C2-30 F C Lane Electronics Ltd - C3-86 Factair Limited - BP-27 Fibreco Ltd - C3-46 Firetrace Aerospace, LLC - SP-42 Fischer Connectors Ltd - C3-40 Fluid Transfer International - BP-28 FN HERSTAL - C3-124 - C3-125 Frazer Nash Consultancy - C1-02 Gallay Ltd - C3-29 General Dynamics UK Ltd - OR28-30 Gill Research & Development Ltd - C3-102 GKN Land Systems - OR-18 Glenair - C2-23 H&K UK - C3-75 Habia Cable - C3-88 Hardigg UK Ltd - C2-34 HDT Global - BP-16 Hellermann Tyton - C3-03 HITEK Electronic Materials Ltd - SP-43 Hobson Industries Ltd - OR-08 Hutchinson Defence & Security - OR-11 Hypertac Ltd - C3-138 IS-Rayfast - C3-70 Istec Services Limited - SP-16 ITEL Electronics LTD - C3-19 ITT Exelis - SP-31 ITURRI - C3-116 - C3-118 SP-37 - SP-38 Iveco Ltd - OR18A - OR20 Jacobs Sula - C2-29 Jankel Armouring Limited - SP-07 JitPak Technical Ltd - C3-50 - C3-51 Kaliber Ltd - C3-56 Kemtron Limited - C3-141
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
151
TEK Military Seating – Crew Seats That Set New Standards
Crew seat with side protection
TEK Military Seating offers an unrivalled range of Drivers, Commanders and Crew seating for most types of military vehicle, all tried and tested, manufactured and through-life supported in the UK. Key benefits include: Basic flip-up to vehicle tailored Blast Attenuation Suitable for both New Build and Legacy Fleets – wheeled and tracked
Bank of four crew seats
Blast Attenuation adjustable up to 10mps Fully integrated harness restraints Can be fitted/removed in seconds – TEK Stack System Strong, but weight saving Cost effective Multi Functional Mount System – fast platform change Superior ergonomics and protection Crew seat with blast and slam down protection
For more details contact David Parkman at TEK Military Seating on: T: +44 (0) 1892 515028 or +44 (0) 7702737709 E: david@tekmilitaryseating.com W: www.tekmilitaryseating.com 14 Decimus Park, Kingstanding Way, Tunbridge Wells, Kent TN2 3GP
LAND DEFENCE E in the military land domain. The keynote address will be by Major General Carew Wilkes, director of land equipment, UK MOD and Lieutenant General Gary Coward, chief of materiel (Land), will speak at the ADS reception that follows. UK MOD will be opening the conference with a presentation on LOSA. There will be a representational operations room where it will be possible to bring together and display a wide variety of data from across the exhibition. Visitors will be able to see what the various participant systems are doing, how they are performing etc. With a budget of £14bn, Defence Equipment and Support (DE&S) is responsible for the through-life approach to equipment procurement and support, and the provision of an improved service to front line customers. Headquartered in Bristol with other sites located across the UK and overseas, it provides management of defence equipment from before it is brought into service until it goes out of service. DE&S programmes are diverse, ranging from defence clothing and ammunition to armoured vehicles, ships and aircraft. It also manages the defence supply chain, information systems and HM naval bases. DE&S works closely with industry through partnering agreements and private finance initiatives in accordance with the Defence Industrial Strategy (DIS). Millbrook was purpose-built more than 40 years ago and has evolved into one of the
DVD Exhibitors (L-Z) most comprehensive test and development facilities available to the world’s transportation industries, making it the ideal location for DVD. From its site, close to the M1 motorway just north of London, Millbrook provides virtually every test and validation service necessary for the development of cars, components, commercial and military vehicles as well as specialist applications such as aircraft and marine interiors. It has established a world-wide reputation for confidentiality, service and competitiveness, using its combination of tracks and laboratories to help its clients improve almost every aspect of their vehicles’ performance. DVD 2010 was opened by MP Peter Luff, Minister for Defence Equipment, Support and Technology who summed up government objectives and expressed his pleasure to be at the event and the importance of the role of DE&S in his speech: “Our first priority must be ensuring that those we deploy on operations, and therefore those exposed to greater risk, are provided with the best possible tools available. We are the team that must make Defence acquisition work. It goes without saying that we have a shared interest in doing so: our brave men and women in uniform depend on getting the right equipment at the right time and in the right place.” L FURTHER INFORMATION www.theevent.co.uk
CDE displays grant-funded defence technology innovations in London The Ministry of Defence’s Centre for Defence Enterprise (CDE) held a display of cutting-edge defence science and technology at the Department for Business, Innovation and Skills in London. Equipment developed by small and mediumsized enterprises (SMEs) and funded by CDE grants included an ‘ex-fix’ bike which is being used by injured troops at Headley Court. Frazer-Nash developed the customisable bike to support patients’ changing needs throughout the rehabilitation process. An imagery-based system to locate hostile forces from the air - 2d3 Sensing - has had four CDE contracts totalling £240,000 and has been combining conventional GPS with a new vision-based tracking system. Also on demonstration were e-textiles, which allow electrical power and data to pass through material. Surrey-based Intelligent Textiles, which is developing the electrical fabric, holds the Guinness World Record for the ‘most advanced soldier system uniform’. The role of CDE, part of the Defence Science and Technology Laboratory, is set to grow as outlined in the Government White Paper - National Security Through Technology. This includes its ‘marketplace’ scheme to
provide dedicated support to mentor and promote the best projects from SMEs to help them grow and work with the main defence suppliers, MOD and other government departments. The first ‘marketplace’ will be held on November 1 this year. Minister for Defence Equipment, Support and Technology, Peter Luff, announced an additional £2m of funding for SMEs. The funding, from the Department for Business, Innovation and Skills’ Small Business Research Initiative, will help further support SMEs to develop their ideas. Head of CDE, Jonathan Byrne, said: “At CDE we reach out to the widest range of possible innovators, provide funding to prove the value of innovative concepts, and now, through our planned ‘marketplace’ events, champion the most successful outputs across both MOD and the established defence industry.” The Centre for Defence Enterprise was established in 2008 to encourage the delivery of research and development in support of front line operations. Since then it has provided funding of more than £23.5m almost half of which has gone to SMEs. tinyurl.com/bm29bjw
DVD 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Land Rover - OR-10 Latchways plc - BP-26 Level Peaks Associates Limited - C3-119 LiFeBATT Ltd. - C3-41 Linde Material Handling (UK) Ltd - SP-03 LPA Group Plc - C3-91 LSC Group Ltd - C1-05 MacNeillie & Son Ltd - SP-04 MAN Truck & Bus UK Limited - OR35-38 Marshall Land Systems - SP-06 SP-05 Mauderer Alutechnik GmbH - C3-146 - C3-147 Merlin Equipment Limited - C3-95 MGR Fluid Power Ltd - C2-16 Michelin Tyre PLC - C2-37 Microlease Asset Management - C3-20 Mildef Ltd - C2-06 Millbrook Proving Ground Ltd MineWolf Systems - OR-05 MIRA Limited - C2-08 MPE Ltd - C2-24 NAR Group Ltd - C2-11 National Metals Technology Centre - C3-122 Navistar Defense - OR39-40 Oldbury UK Limited - SP-28 Osborn Steel Extrsusions Limited - C3-85 Oshkosh Defense - OR31-33 Oxley Group Ltd - C2-27 Panasonic Toughbook - C2-13 Parmley Technologies Ltd - C3-87 Peli Products (UK) Ltd - C3-69 Penman Specialist Vehicles - SP-15 Allison Transmission - OR-24 Permex Ltd - C3-09 Persides - C2-18 pewag Austria GmbH - C3-37 - C3-38 Phoenix Dynamics Limited - C3-103 PLASAN - SP-09 Polamco Ltd - C3-148 PPG Industries - C3-23 Prestolite Electric Ltd - C3-02 Project Support Vehicles - SP39-41 Prolinx - C3-142 QinetiQ Ltd - SP-30 Qioptiq Ltd - SP32-33 Reconrobotics Inc. - C3-137 Revision Military B.V. - C3-27 Rheinmetall Technical Publications UK - C3-149 Ricardo UK Ltd - OR-01 Rolls-Royce - C1-09 Rud Chains Ltd - C2-33 Savox Communications UK - C2-07 Scanfiber Composites A/S - C3-94 Schroth Safety Products - C3-62 Select Cables Ltd - C3-89 Selex Galileo - SP-20 - SP-21 Socitec UK Ltd. - C3-135 SpanSet Ltd - C3-76 Specialist Mobility Training Ltd - SP-24 Specialty Fasteners & Components Ltd - C201-02 SSI Schaefer Ltd - C3-145 Stack Ltd - C3-14 Staubli (UK) Ltd - C3-45 STREIT Group - OR-41 Supacat Ltd - OR-09 Systems Consultants Services Ltd - C3-100 - C3-101 Tecalemit Garage Equipment Co Ltd - C2-25 TEK Military Seating - C1-06 - C1-08 TenCate Advanced Armour UK - SP-14 Terberg DTS (UK) Ltd - BP-11 Thomas Jacks Ltd - C3-17 - C3-18 TMS Support Solutions Ltd - C2-19 TRAC - SP44-45 UKTI Defence & Security Organisation - C1-10 Ultra Electronics, Precision Air & Land Systems - C2-03 Webasto Product UK Limited - C2-22 Westwire Harnessing Ltd - C3-36 WEW Westerwalder Eisenwerk GmbH - SP-25 Whispaire Ltd - C2-14 XCEL Power Systems Limited - C3-99 YAKUPO LU (YDS) - C3-96 - C3-98 Yamaha Motor UK Limited - SP-26 Zero Cases UK - C2-38
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
153
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com FLR2223 TS 178X125_Layout 1 30/01/2012 10:34 Page 1
Over 3550 students enrolled from over 75 countries
The leading educational insight into the fundamental issues behind terrorism Commences
4-week individual online e-learning modules 16-week accredited online e-learning course
May, September & January
UK MoD ELC Scheme: 2035 | CAGE/NCAGE Code: U0G02 | CCR Registered: DUNS 232915728
Understand the threat...reduce the risk Key Issues in International Terrorism
Terrorist Ideologies, Aims, Beliefs & Motivations
Terrorist Modus Operandi
International Policing Policy
Aviation Terrorism & Security
This online programme of study from the renowned Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews provides an easily assessable and rarely available educational insight into the fundamental issues behind terrorism as well as the motivations, methodology and modus operandi of the various strains of terrorism in the world today. In conjunction with:
Maritime Terrorism & Security
Critical Infrastructure Protection
Cyberterrorism
Radicalisation and De-Radicalisation
Knowing who, how and why terrorists plot against civilians, governments, corporations, transport or IT networks makes an unmistakable difference to your counter terrorism and security strategies, whilst providing a valuable context to operational duties.
www.terrorismstudies.com/FLR2223AA2D1 To talk to a course representative, and for group bookings Call +44 (0)20 3377 3210 / +1 (646) 957 8929 or email info@terrorismstudies.com
Quote VIP Code: FLR2223AA2D1
Scan with smartphone QR reader app:
Hi-Speed Services Ltd are celebrating 25 years this year in offering first class services to all our customers old and new. With a full range of vehicles including Motor cycles, Small vans, Mid size vans, Luton Box, 7.5 ton lorries, 18 ton lorries and Articulated lorries, we cover every vehicle requirement to anywhere in the UK, Europe and Worldwide. Also specialising in security deliveries, using the most enviromental vehicles, I.S.O.accredited, nothing is to much trouble, aswell as offering a next day pallet service for less urgent deliveries saving our customers costs. Our company has been built around customer service and we will adapt to any situation to make sure you the customer are 100% completely satisfied. The vehicles we operate are chosen for their least CO 2 emissions and we are fully committed to helping the environment as much as possible. With offices based in the South and Midlands, we can react to urgent requests very quickly.
Contactable 24 hours a day, everyday, with a human voice not an answer phone. MIDLANDS OFFICE Tel: 0800 0565559 Email: midlands@hispeed.co.uk
154
SOUTHERN OFFICE Tel: 0800 0199033 Email: southern@hispeed.co.uk
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
www.hispeed.co.uk
PIRACY
Ransom ban would have huge effect on seafarers Any move at government level to ban the payment of ransoms to pirates would have a massively detrimental effect on the risk to the world’s seafarers and the global economy, according to Alastair Evitt, president of InterManager and the newly appointed Chairman of the Save Our Seafarers Campaign. Addressing the opening session of this year’s Connecticut Maritime Association (CMA) conference in Stamford, USA, Evitt said not only would such a ban have an impact on the willingness of any crew to transit high risk areas, but any owner who then did not pay a ransom for his crew would be unlikely to ever attract a crew again. Responding to comments that came out of the recent London
conference on Somalia where governments called for a move to not pay ransoms to pirates, he said many vessels would be forced to reroute with the subsequent effect on costs. “And for those forced to transit pirate areas, insurance premiums would become prohibitive – to say nothing of the fact that in many cases vessels would become a total loss after six months. I, for one, would not sanction one of Meridian’s vessels transiting the high risk area – if there was no ultimate solution in the event of a vessel and her crew being held captive.” Addressing conference delegates, he went on to say: “I speak as Chairman of the Save Our Seafarers campaign when I say that we are opposing this apparent change of political will.”
FS Aconit hunts down suspected pirate activity
EU Counter Piracy Naval Forces (EUNAVFOR) have tracked down and stopped a group of suspected pirates who were believed to have tried to attack a Hong-Kong flagged tanker approximately 400 nautical miles off the coast of Somalia. EU Naval Force warship FS Aconit was called to investigate after the tanker came under attack on 26 March 2012. Aconit was directed onto the fleeing pirates by a Luxembourgish Maritime Patrol and Reconnaissance Aircraft (MPRA), which have recently completed 3500 Flights Hours with EUNAVFOR. The MPRA quickly located the suspects who were towing a small skiff behind a larger sea going whaler. TheMPRA provided imagery showing
pirate paraphernalia. In order to conceal the evidence of their piracy activities, it is believed that the suspected pirates had cut loose and sunk the smaller skiff, containing weapons, ladders and a certain amount of fuel. Aconit’s helicopter intercepted and stopped the whaler, which had 10 suspected pirates onboard, by firing warning shots on 27 March 2012. A team from Aconit boarded the whaler and the suspects have been transferred on board the frigate. Two suspects received medical care by the Aconit’s medical service. The French Navy frigate Aconit’s intervention made it possible to hamper the action of a complete pirate action group, thus preventing them from committing new attacks in the area.
Naval commanders gather at Dimdex 2012
Maritime
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Distinguished Naval Commanders, experts and decisionmakers convened at the Middle East Naval Commanders Conference (MENC) on the second day of the Doha International Maritime Defence Exhibition & Conference (DIMDEX 2012) to discuss maritime security in the region. This year’s theme, ‘The Strategic Importance of Maritime Security in Protecting the Global Economy: the role of technology and naval co-operation in securing trade at sea’, highlighted the significant role that naval forces play in generating and maintaining the stability needed for global economic prosperity by securing maritime trade routes. Due to the MENA regions enduring geo-strategic importance, the MENC conference this year came at an especially crucial time with the world’s focus on the continuing threat of piracy and terrorism. Speakers discussed the latest developments in technologies, research and future strategies designed to safeguard national and international interests with the broader goal of protecting maritime trade on which the world relies. One of many influential speakers, Lieutenant General Charles Bouchard, shared his observations and lessons learned as Chief of NATO Operations in Libya, notable as one of the most successful multilateral naval operations to implement UN resolutions to protect civilians and restore stability to an area of vital maritime interest.
AtoBviaC announces new anti-piracy routing tool The AtoBviaC tool enables the ship operator to select routes based on the most current intelligence, and accurately calculate the time and fuel implications of the voyage. “In many cases this can work out to be considerably more accurate than the other available options and provides a level of self-determination that is missing from other solutions,” said Captain Trevor Hall, Director of AtoBviaC. Anti-Piracy Routing from AtoBviaC within the BP Shipping Marine Distance Tables is based upon information on piracy activity obtained on a regular basis from the Joint War Committee bulletins, and from specific routings requested by ship operators. All routes calculated are navigable, taking account of the need to keep suitable distances off shoals, wrecks, coasts and obstructions and also avoid oil field development areas. The routes are reviewed weekly and updates are issued at 2 monthly intervals or more frequently if significant changes need to be made. The BP Shipping Marine Distance Tables are widely used within the marine industry and contains all ports, offshore terminals and transhipment areas needed by its many users, particularly: Worldscale; oil tankers; gas carriers (LNG & LPG); the container trade and the bulk shipping of coal and ore.
UAE minister worried about shipping threats The United Arab Emirates’ economy minister is asking for a global response to the concerns he has for the Gulf’s shipping industry. Worries include threats to close shipping lanes, increasingly violent piracy, and unpredictable oil prices. Being one of the world’s main exporters of oil, the UAE transports its crude through the Strait of Hormuz. Iran has recently been threatening to block this vital trade route, as sanctions and tensions between the West and Tehran have increased in recent months. Nearly a fifth of the world’s traded oil passes through the Strait and into the Indian Ocean. No confirmation has been made on whether Iran will go through with this threat. The Strait of Hormuz is also persistently patrolled by a fleet of naval vessels, as the area continues to be plagued by piracy. UAE officials would like more cooperation in battling maritime pirates. Chinese and U.S. naval forces have been aiding in protecting shipping across the Indian Ocean and in the Gulf of Aden.
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
155
y
Book b
arch
30th M and
Sav50e S$3
Organised by
In Full Partnership with the Royal Thai Government and is pending final endorsement from the Thai MoD
Connect with 300 delegates from over 30 countries Be visible and be recognised as a key CBRNe player
CBRNe Asia 2012 is Asia’s first and largest 5 day CBRNe event, exhibition and exercise and will bring together experts, end users, policymakers, industry and procurement staff. The event will be held in conjunction with the annual Thai National CBRN Exercise, which will focus on a number of chemical and radiological scenarios, and will be fully accessible to all conference delegates.
at the premier CBRNe event for the ASEAN community
Reach out and get your opinions across to the people that matter
Lead Exercise Sponsor:
Exercise Product Sponsor:
Delegate Bag Sponsor:
USB Sponsor:
Networking - 5 days of activities which include workshops, conference, 3 days of exhibition, Royal Thai Governemnt table top exercise day and the Thai National CBRN exercise make this the premier CBRNe event for networking in the world
Exhibitors:
Esteemed military and government
speakers from Asia, Europe, USA, South America and the Middle East ensure that you will hear timely case studies from those at the forefront of current operations
a TNO company
Endorsing Partners::
To Keep up-to-date with the Latest Programme Updates, Developments and Announcements Visit:
CBRNeAsia.com
Official Media Partner:
Event Sponsor:
CRBNE
CRBNE
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CBRNe Asia conference set to discuss Fukushima Daiichi nuclear disaster The CBRNe Asia conference, exhibition and exercise will take place on 3-7 September in Bangkok, Thailand, and will bring together experts, policymakers, industry and procurement staff involved in CBRNe and disaster recovery. The event is being organised in full partnership with the Royal Thai Government. Over five days, it will include a two-day conference with high level speakers from the Thai government, ASEAN and the NATO WMD Centre. A special focus session will examine the Fukushima case and simultaneous stream sessions will examine themes including detect and decon, medical CBRN countermeasures, CBRN forensics and improvised chemical devices. The event will be held in conjunction with the annual Thai National CBRN Exercise,
“Business has not recognised their role in natural disaster risk reduction in the changing environment” which will focus on a number of chemical and radiological scenarios, and will be fully accessible to all conference delegates. During the exercise, equipment made available by exhibiting companies will be used by the Thai civil and military authorities. Esteemed military and government speakers from Asia, Europe, USA, South America and the Middle East will present case studies from those at the forefront of current operations. Prof. Tao Zheng and Xu Zhijing from the Bejing Institue of Biotechnology will attend with a presentation entitled ‘The Emergency
Indian DRDO plans new CBRNE testing lab in Nagpur Senior scientists at the Indian Defence Research and Development Organisation (DRDO) have revealed plans for a new CBRNE testing lab in Nagpur, Maharashtra. According to Chief Controller Dr. William Selvamurthy, the lab “will be part of the Gwalior-based Defence Research and Development Establishment (DRDE) which is the nodal body for developing all kinds of technology to deal with CBRN emergencies. It will facilitate testing of various products in a closed environment without risking human exposure.” The construction of the DRDO’s open-field test lab – designed to simulate the mitigation of CBRNE threats - marks an important stage in the DRDO’s development of a CBRN capability. It is said the testing facility will be fully functional within a year.
Preparedness for Biological Incidents’. This will cover China’s current surveillance system and the modeling of biological incidents. The Asian Disaster Preparedness Center will also be speaking at the event, covering the tragic 2011 flooding in Thailiand. Killing nearly 657 people and affecting at least 65 provinces across the country, the World Bank’s estimates it as the world’s fourth costliest disaster, surpassed only by the 2011 earthquake and tsunami in Japan, the 1995 Kobe earthquake and Hurricane Katrina in 2005. A large part of the damage during this flood stems from the effect on the manufacturing industry, with 930 factories in 32 provinces affected, including multiple industrial estates in Ayutthaya and Pathum Thani Provinces, which have been flooded. Within the strong legal and institutional setup for disaster risk reduction in the country, the role of business sector is still seen as auxiliary and to an extent a contributor during disaster response. Businesses have not fully recognised their role in natural disaster risk reduction in the changing environment. This session, entitled: ‘Thailand Floods - Way forward to PublicPrivate Partnership for effective disaster risk reduction’ will examine the setting up of efficient institutions for mobilizing collaborative private sector engagement. WHEN & WHERE 3rd-7th September Plaza Athenee, Bangkok www.cbrneasia.com info@ibcevents.com
CRBNe Asia 2012 programme Monday 3rd September Pre conference workshop at the Dutch Embassy and an Icebreaker Drinks Reception at Le Meridien Bangkok. Tues 4th / Weds 5th September Two day conference with 40 high level military, government and industry presentations and case studies. Stream sessions will also run allowing you to pick the sessions of most relevance to you. Take the chance to see the latest products, technologies and solutions for the CBRNe community during the exhibition. Thursday 6th September The Royal Thai Government will run a full day of table top scenarios exercises at the Plaza Athenee Bangkok whilst the industry exhibition goes on for a third day. Friday 7th September The Thai National CBRN Exercise will take place in Ayutthaya the old Capital of Thailand. All attendees will have free access and coach transport will be provided from the conference venue.
CBRNe Convergence call for papers In Virginia, US, the fifth annual CBRNe Convergence conference will be held on 30th October until 2nd November at the Waterside Marriott, Norfolk, Virginia. For the first time this year, there will be section of the conference devoted to a response to an open call for papers on CBRNE defence. Papers can be considered for one or all categories, and submissions will be assessed by a panel drawn from scientists and first responders. Equal weighting will be given to scientific merit and benefit to practitioners. The panel includes leading scientists and first responders, so all the papers will be judged to be both practical and understandable. The panel includes Dr John Hassard (Imperial), Professor Malcolm Sperrin (Royal Berks), Dr Matthew Healy (Cranfield), Chief Bob Ingram (FDNY), Dr Efraim Laor (UNDAC), Chris Hawley (IAFC) Commissioner Eric Yap (Singapore Civil Defence Forces), Maarten Nieuwenhuizen (TNO) amongst other eminent professionals.
Back in 2010, the event was the largest CBRNE responder’s conference in the US that year. It brought together 650 delegates with 75 exhibitors, and culminated in a massive exercise involving units from the FBI, CST and local responders. This year’s event has the FBI WMD Directorate and Assistant Secretary for Preparedness and Response confirmed as supporting partner organisations, and NATO’s Allied Command for Transformation has also committed to participate. The Open Call section will be on the afternoon of the second day and will culminate in the poster sessions break - posters will be on presentation for the duration of the conference. SUBMISSION DEADLINE The deadline for submitting wwabstracts is 1700 EDT on 8 July 2012. For further information, email steve.johnson@cbrneworld.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
157
Protection without Compromise Armoured Vehicles from Jaguar Cars Limited and Land Rover
Jaguar Land Rover’s range of armoured vehicle solutions covers a spectrum of requirements that cannot be matched by any other original equipment manufacturer. They cover needs that range from head-of-state level to those of key workers operating in hostile environments.
Jaguar Land Rover, Banbury Road, Gaydon, Warwick, CV35 0RR www.landrover.com/armoured
|
www.jaguar.com/armoured
email: armoured@jaguarlandrover.com
LAND DEFENCE & SECURITY
Eurosatory 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HOMELAND SECURITY FOCUS GROWS AT EUROSATORY Eurosatory 2012, held from 11-15 June, will be a key international meeting point for the land defence and security community. A vast array of solutions with a growing homeland security focus will feature across five days The Eurosatory land defence and security exhibition will offer opportunities to enhance knowledge of the world defence and security markets. In 2010, Eurosatory featured more than 1,320 exhibitors from 54 countries and was attended by over 53,500 visitors from 130 countries. These figures are the result of the incredible history of the show and of its specific focus over the years. At the beginning in 1967, the exhibition was simply named ‘Satory’ and took place on the French military camp of
the same name, near Paris. At this time the exhibition was only dedicated to the French defence and security industries. In 1992, the first international exhibitors took part the show, with 14 different countries represented. This major transformation saw the show move to Le Bourget and named ‘Eurosatory’ for the first time. The internationalisation continued in 1994 with American exhibitors taking part, and Russian companies following in 1996. The first one-to-one business meetings were established in 1998, and with the world’s major military influences gathering at the show, a move to a bigger venue was required. Since 2002 it has been located at the Paris Nord Villepinte exhibition centre. MARKET DEVELOPMENTS In response to market developments and changing needs, the exhibition is expanding and developing content for security bodies (police, rescue and emergency services) as they become more involved in counter-
terrorism. This worldwide trend can be seen at state level in threat prevention and response organisations and forces, as well as in the design and manufacture of the products and systems promoted by industry. These products, which are often dual-use, are increasingly relevant to the security of the private sectors of the economy - the huge array on offer, such as protective equipment, operational medicine, homeland security and peacekeeping assets, training and simulation, infrastructure protection, optics and optronics, are being increasingly used by police and emergency services in civil contingency planning and disaster recovery. NEW PRODUCTS With a total of more than 350 new products publicly presented for the first time in 2010, Eurosatory constitutes a starting point for the negotiation of large contracts, with buyers and suppliers making contact and clarifying their requirements. Comprehensive product presentations are featured E
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
159
INTERNATIONAL EXHIBITION
2012
LAND SECURITY & DEFENCE The most comprehensive answer An opportunity to meet all actors of the Security-Defence Continuum
Under the patronage of
11 - 15 JUNE 2012 / PARIS www.eurosatory.com
Presided over by
LAND DEFENCE & SECURITY E throughout the event, and include a large selection of specially adapted armoured vehicles. In its purpose to allow exhibitors to demonstrate their equipment and systems in the best conditions, Eurosatory features indoor and outdoor exhibitions, along with two areas which allow for live demonstrations to take place in realistic scenery. The first outdoor area is dedicated to presentations of equipment and systems that designed are for both defence and security use. The second area features smaller products, such as ground robots, an allows for a closer examination. Eurosatory gives priority to business through its one-to-one business meetings, strategic consultancy service, organisation of VIP visits and its system for connecting exhibitors and visitors. Allowing visitors and exhibitors to enhance their strategic vision, the event has a dedicated area for ‘Think Tanks’ to present research. These take place during different conference cyles during the exhibition and feature workshop debates.
concerning future military requirements, doctrinal trends and geopolitical developments that influence markets. The increasing trend towards dual-use equipment for defence and security applications is a good example - 2012 will see a symposium dedicated to defence offset agreements organised by the international ECCO association. Other programmes and themeoriented workshops will look at the various current and future issues affecting the sector. The Land Operation Forum will host a three day seminar themed: “Simulation: a key weapon for operations” L
Eurosatory 2012
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR MORE INFORMATION The Eurosatory land defence and security exhibition will be held from 11 to 15 June 2012 at Paris- Nord-Villepinte. For further information, visit www.eurosatory.com
CONFERENCE INSIGHT Eurosatory 2012 will also offer a chance to gain new insights with its extensive conference programme, which is themed: “Today and tomorrow - Defence and Security”. The conference will enable delegates to find answers to questions
THE ULTRA-POWERFUL WARN WINCH LINEUP ®
ENGINEERING
For all your bespoke high performance air movement needs.
Providing highly reliable air moving systems since 1942 for the military; defence; aerospace and civil aviation markets. Dynamic-Air Engineering Europe: Suite F1 The Officers’ Mess Coldstream Road Caterham, Surrey. CR35QX United Kingdom
North America and the rest of the world: 620 East Dyer Road Santa Ana, California 92705 United States of America
acaruana@dynamic-air.com +44 (0) 1883 343 132
cs@dynamic-air.com +1 (714) 540 1000
www.dynamic-air.com
60+ years of service, and still the technology leader. Warn Industries offers a variety of field-proven hydraulic and electric winches and hoists, with capacities as varied as the terrain our troops encounter: 6,000 lbs. to 30,000 lbs.
New: the WARN Olympus 25 winch, the world’s most powerful and efficient electric winch
Learn more: www.warn.com, or contact Hugo Burgers, Business Director EMEA Phone: +31-20-653-24-05 Email: BurgersH@Warn.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
161
Stops you in your tracks Introducing the HESCO® Redployable Security Fence. An anti-climb, rapidly erected and redeployable high-level security fence that doesn’t require ground preparation or foundations. Rated to PAS68, HRSF can be built on almost any unprepared surface, and with available heights of up to 3.6m it provides a steadfast temporary perimeter or vehicle barrier. See more at: www.hesco.com
HESCO is a registered® trade mark of HESCO Bastion Limited.
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ARINC’S AIM PLATFORM EXPANDS INTERNATIONALLY
Fully-managed, end-to-end security solution that protects over 60 per cent of USA’s Nuclear Facilities and critical infrastructure now available in Europe and Middle East International trade and economic growth hinges on the efficient and secure movement of goods and services through the global supply chain. Identifying chinks in the armour of that supply chain and managing the risk is an ongoing task for security managers at airports, seaports, railways, metros, highways, coach stations and national borders. Solutions to deal with potential threats have to be regularly reviewed and updated to remain effective. The dangers are real. While open borders make travel quicker and easier, and the distribution of goods and utility services more straightforward, a secure, interconnected infrastructure – in transport, energy, technology and many other critical sectors – is crucial to the prosperity of every nation. INTEGRATED SOFTWARE SYSTEM Whilst it is financially impractical to regularly invest in new equipment, a fully integrated software system that makes the most of disparate legacy equipment whilst also adapting to incorporate new technology provides the ideal compromise. This is where the flexible Advance Information Management (AIM) commandand-control platform from technology specialist ARINC comes in. The fully-managed, end-to-end solution that protects over 60 per cent of the USA’s nuclear facilities and critical infrastructure is now being utilised by an increasing number of organisations throughout Europe and the Middle East. As a market leader in the USA, the proven software has been successfully configured to protect nuclear power facilities, mass transit systems, airports, seaports, government facilities, military installations and education campuses. “This is a roll-call of recommendation to inspire complete confidence,” said Paul Hickox, ARINC International’s operations director. “It confirms the success of AIM in creating a common interface that combines advanced technology and functions to enhance security across an entire operation.” AFFORDABLE SOLUTION FOR ALL APPLICATIONS AIM is an effective and affordable solution for a varied range of applications and for organisations of all sizes. ARINC has deliberately positioned it midway between
costly, bespoke designs and prepackaged, one-size-(allegedly)-fits-all offerings. “We start by assessing the individual needs of each AIM customer,” said Hickox. “This enables us to select the most appropriate equipment and software. Each of our solutions is based on industry standards, open architectures and certified interfaces that are designed and implemented to leverage existing infrastructure.” Master systems integrator ARINC has vast experience in providing hardware, software and networking solutions that integrate smoothly with existing IT systems. It also has unrivalled expertise in transport communications, engineering, systems integration and project management. “And it’s not just our product that is first-class,” Hickox says. “Our service is equally impressive – we make sure that we deliver on time, in scope and within budget. To sum it up, we are a straightforward company that delivers on our promises.” SCALABLE ACROSS MULTIPLE ZONES AIM can be scaled across single or multiple zones within single or multiple facilities. This enables sophisticated monitoring of all sub-system activities and alarms and provides operators with a common picture of their facilities. The use of handheld devices, if desired, allows first responders to receive the relevant video images and data for real-time, front-line decision making. AIM ensures continuous and safe operations for an entire facility by offering interfaces for intrusion detection, access control, video surveillance management, physical security information management (PSIM), credential management, biometricsbased identity management, closed-circuit television (CCTV), vehicle identification, asset management and integrated geographical information system (GIS). When AIM was installed to provide highlevel supervisory control and communications for the US Strategic Petroleum Reserve sites the brief included integration of legacy alarm, access control, security and surveillance systems that had been installed over a number of years. New equipment upgrades were to be added where needed. “The project involved integrating numerous legacy third-party access control and video surveillance systems, some 15
years old, as well as a number of separate intrusion detection and alarm systems,” said Hickox. “This is precisely the type of application for which AIM is designed.” There are situations where fast deployment and straightforward integration with existing infrastructure are the main concerns. In such cases a scaled-down version, AIM Enterprise Security Platform (ESP), allows organisations to manage their own migration to newer types of security technologies at their own pace. AIM ESP is also suitable for facilities where security needs change or where a rapid response to threats is critical. TECHNOLOGY BRIDGE AIM ESP also provides a ‘technology bridge’ for those seeking a newer and open security enterprise environment while maximising the return on their existing investment in security infrastructure. The two AIM solutions offer the highest levels of operational efficiency and reliability which is why they have rapidly become the first choice in critical infrastructure protection. “ARINC has an unequalled 80 years’ experience of developing innovative products and services for commercial, aviation, government and defence customers all over the world,” said Hickox. “Every customer can be confident of receiving a top-quality product, a first-class service and, equally important, superb technical support.” L FOR MORE INFORMATION emea@arinc.com www.arinc.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
163
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
TWELVE REASONS WHY THE SPECIAL FORCES CHOSE RUBB THE UAE special forces is the latest defence organisation to benefit from using Rubb military buildings in the field to provide a high quality solution that gets aircraft undercover quickly The client saw Rubb’s Expeditionary Forces Aircraft Shelter System in action for the Canadian forces and purchased a 25m span x 36m long EFASS featuring Heli-Doors (18.5m wide x 6.5m high) at both gable ends. The structure also benefits from a 2000kg internal roof mounted crane. The cutting-edge door and crane technology has raised Rubb Buildings Ltd’s game in the military sector. The company has been at the forefront of supplying vital hangars to the front line in conflict-torn Afghanistan. Now the UAE is set to reap the rewards of Rubb’s development of these invaluable accessories. The 25m EFASS can accommodate a wide range of aircraft – from UAVs to the largest military helicopters. The completed facility is big enough to facilitate maintenance of a MH-47 Chinook without removing the rotors. For delivery it all packs down into 20ft ISO shipping containers. Each hangar can be rapidly constructed using a number of steel fabricated components, together with uniquely-designed aluminium roof and leg sections that bolt together to form the span trusses. When assembled, tough PVC coated polyester fabric sheets slide between the aluminium extrusions of adjacent spans, to form the shelter. Ian Hindmoor, general manager at Rubb Buildings, said: “This is another new military client that has been impressed by the advantages our EFASS range has to offer and we hope that this leads to repeat business in the UAE”. LITTLE BIRD FLIES FOR UNITED STATES ARMED FORCES It has certainly led to repeat business with the USA and UK military forces with a further 11 EFASS hangars flying into action in late 2011 and early 2012. The United States Army (160th SOAR) recently bought seven structures - two 25m span x 36m EFASS hangars, each featuring an 18.5m Heli-Door, one closed gable end and a 2000kg crane. A further three 20m span x 28m structures were added to the order – the first 20m buildings to include the Heli-Door technology. Each hangar incorporates one Heli-Door, one closed gable end and a 1500kg crane. Two 11.1m span x 16m EFASS workshops complete the set. Hindmoor added: “These are the first 11.1m EFASS projects we have completed and we are very excited to see these hangars used for land, sea and air vehicle storage and maintenance. The ‘Little Bird’ hangars each
feature one 10m x 4m Heli-Door, one closed gable end and a 1000kg gantry crane.” Meanwhile the UK Royal Air Force purchased four 20.4m span x 30m Rubb Military shelters in September 2011 – all include Trident Doors at both ends of the structure and have the capacity to house Tornados and Apache helicopters. They will be used on the flight line at RAF Marham and replace others that have been deployed on expeditionary missions around the world. Rubb Buildings Ltd is a world leader in the design and manufacture of custom made relocatable engineered fabric structures. Highlights include ground-breaking military buildings (aircraft hangars, shelters, storage facilities), specialist sports buildings and structures for a variety of sectors including aviation, ports, construction, bulk storage and environmental (waste and recycling). All products are designed and manufactured at Rubb’s UK plant at the Team Valley Trading Estate in Gateshead, Tyne and Wear. The company was founded in 1977 and has a proud history of delivering innovative and quality structures to a wide range of clients. The Rubb Group has plants in the USA, Norway, Poland and China. HELI-DOOR This revolutionary door has been specifically designed and manufactured for the EFASS
range by Rubb Buildings Ltd, providing a robust, reliable and easy to use system. The main door horizontal members are standard EFASS building roof elements, which comply with the strict standardisation of parts code. The door is electrically operated via two slow moving helical geared motors, with emergency hand operation capability. This system does not require a base foundation or ramps and there are no locking bolts. The door goes up and down at the touch of a button. Locking and safety devices operate automatically. TRIDENT DOOR Specific to the 20.4m span EFASS, this full end-opening door speeds up aircraft deployment. The door is constructed using the same high quality aluminium framework as the main structure. Three framed PVC panels are hinged at the base of the hangar and the door operates via a button controlled motorised folding mechanism. L FOR MORE INFORMATION RUBB Buildings Ltd Dukesway, T.V.T.E. Gateshead, Tyne and Wear NE11 0QE UK Tel: +44 191 482 2211 Fax: +44 191 482 2516 info@rubb.co.uk www.rubbmilitary.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
165
www.logicallysecure.com
Optimise your security Logically Secure was founded in 2005 from a core of former military IT, counter-intelligence and security specialists. As a well-respected and trusted security consultancy; our CESG approved staff (CLAS) deliver services to industry, Government and CNI.
• We
have a complete understanding of the whole UK HMG Security process from our extensive experience gained inside both the MOD and Commercial spectrums.
• If you are planning your own List-X environment we can help you meet the Authority’s physical and technical security requirements including IT system Accreditation.
• Our former MOD Crypto staff can support your Project Crypto Planning (PCPs) to ensure you get the right Crypto equipment on time and with the minimum of project risk.
• We have undertaken many HMG and commercial lockdowns of networks, laptops and mobile devices. We can help you both harden and document the configuration, ensuring you are best positioned to gain Accreditation.
• We have security cleared CLAS and CREST staff to support your testing requirements; we can support web application, wireless, network, server and workstation testing in the UK and overseas.
See us at Counter Terror Expo London Olympia, 25th & 26th April 2012 on stand i-110
Logically Secure Ltd, Festival House, Jessop Avenue, Cheltenham, GL50 3SH • Telephone: 01242 220 040
CYBER SECURITY
LOGICALLY SECURE Logically Secure can help you take the necessary measures to minimise your vulnerability to cyber attacks and ensure that pragmatic and effective contingency plans are in place
In October 2010 the government published its National Security Strategy ‘A Strong Britain in an Age of Uncertainty’, drawn up by the newly created National Security Council. The strategy highlighted the need for the UK to be able to react effectively to evolving security threats from a wide range of sources. Acts of terrorism and cyber threats are listed among the four Tier One risks to the UK’s security, with a recognition that cybercrime could escalate into cyber terrorism. In an attempt to combat these threats the government has committed £500m to tackling cybercrime. MINIMISE YOUR VULNERABILITY Logically Secure helps organisations take the necessary measures to minimise their vulnerability to cyber attack and ensure that pragmatic and effective contingency plans are in place should an attack succeed. Logically Secure continues to provide a wide range of IT security consultancy services to a diverse range of clients across a number of industrial sectors, from the music and entertainment industry to major government programmes, including the MOD and defence
industry. These services have ranged from providing incident response, investigation and recovery, security architecture advice and design, penetration testing, security accreditation support, and assistance with the Common Criteria (CC) evaluation process. INCIDENT RESPONSE Over the past 12 months we have been called on to assist clients with IT incident response investigations following either a suspected or actual hacker attack or an unauthorised data release. The nature of these incidents necessitates a rapid response from Logically Secure to ensure that the integrity of forensic evidence is maintained, and can require sustained round-the-clock effort to resolve. Regular updates are provided throughout the incident, followed by a post incident report fully detailing the causes of the incident, investigation findings and our recommendations on preventing a recurrence.
process. Their requirement was to build an accredited network to carry Impact Level (IL) 3 data; the network was designed to connect two data centres and numerous sites throughout the UK as well as providing remote access facilities for authorised users. The network was also connected to MOD systems at the same IL. Logically Secure were contracted to provide security advice on the design, carry out penetration testing of the network, produce relevant accreditation documentation, and provide the interface with the accreditation authorities. Accreditation support was also provided to a MOD project providing a pre operational deployment training simulation capability to the British Army. This system provided an extremely flexible facility that could be used to simulate numerous theatres of operation; this drive for flexibility also introduced extra challenges to be able to meet the accreditation process requirements. Logically Secure provided security architecture advice and assisted with the production of the accreditation documentation required to successfully achieve full accreditation.
Information Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COMMON CRITERIA Logically Secure has for a number of years been involved as the lead security consultant for the evaluation and accreditation of the IL3 ground communications and information systems component of a major defence Private Finance Initiative (PFI) programme. The evaluation is being carried out to meet the requirements of CC Evaluation Assurance Level (EAL) 3. This has involved regular and extensive liaison with the Commercial Evaluation Facility (CLEF), CESG (a GCHQ department), System Accreditor and the main contractor providing the system. Logically Secure helped to streamline the design, provided the documentation in support of the evaluation, and produced the test scripts to be run against the system to prove that the installed security enforcing functions actually provided the claimed level of security. The Logically Secure penetration test team also carried out penetration testing at different stages of the build process to de-risk the evaluation and ensure that the approved installation design was met. L FOR MORE INFORMATION For further details or to discuss your system security and accreditation requirements please contact us at: Logically Secure, Festival House, Jessop Avenue, Cheltenham GL50 3SH Tel: +44 (0)1242 220040 www.logicallysecure.com
NETWORK DESIGN AND TESTING One of our international defence sector clients had previously had very little exposure to the HMG security accreditation
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
167
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BIOLOGICAL AND CHEMICAL DETECTION FOR THE FIELD
The MAB, a new generation of biological field detector from Proengin, has the means to detect and categorise biological particles with an extremely low false alarm rate Proengin has developed biological and chemical warfare agents field detectors using flame spectrophotometry. The wellknown and widely used AP2C has proven the capacity of that technology to be the most reliable on the field with the lowest false alarm rate and the simplest ease of use. THE NEW AP4C New developments such as the AP4C have extended the capacity of that technology to include chemical warfare agents and toxic industrial material in a simultaneous mode. There is no limitations in the number of gases detected by the AP4C. All nerve agents, all blister agents and all blood agents can be detected by AP4C within the requirements of response time and sensitivity of NATO recommendations. The AP4C has extended the range of chemicals that can be detected by Proengin chemical detectors. All dangerous compounds containing Sulfur, Phosphorous, Arsenic and/ or HNO chemical bond can be detected simultaneously. Similarly to the AP2C unit, the AP4C has the capacity to work in very severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds, such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of gases and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemicals manufactured by terrorists that would not fit into traditional libraries of other detectors. Moreover AP4C will detect without upgrade new agents that will be developed in the future, as well as still not precisely known agents like Novichok agents (or non traditional agents). The response time is among the shortest on the market, but what makes the AP4C unique is the recovery time after a positive detection. The AP4C is therefore the chemical detector that has the highest level of availability of the field. Grateful to its remarkable performances, AP4C has been derived on other detectors, dedicated to the following uses: • use on reconnaissance vehicles and battle tanks
• use aboard naval ships • use for critical buildings and areas protection AP4C-V Based on the same detection technology and the same internal design, air entrance has been designed to face high wind: AP4C-V is able to take in representative sample of the outside air, even with a direct cumulated wind and speed of 100 km/h. Data are shown on easy to understand control box or directly on the control computer of the vehicle. Sensitivity, short time to answer, low false alarm rate and short recovery time are the same as for AP4C, making AP4C-V the perfect detector for all kinds of reconnaissance missions and battle field exploration. AP4C-F At sea, ANEP-57 recommendations stipulate the availability of both fixed and mobile means of chemical detection. As AP4C is the perfect mobile chemical detector for contamination control, the use of AP4C-F provides the naval ships with reliable and efficient chemical detection. This ruggedized detector shows the same detection performances as the AP4C, with 2 supplementary features. It produces its consumable gas by electrolysis, thus lightening daily maintenance, and more than an alarm, is able to trigger the ventilation of the vessels, thus protecting the citadel from the chemical danger. The AP4C-F is able to be operated on open deck, with the same performances. National palaces, courts and parliaments are more and more equipped with fixed chemical detectors. AP4C-F, being able to be operated on naval citadels, is of course able to provide the same detection and protection on terra firma, for this kind of critical buildings. BIOLOGICAL DETECTION The MAB, a new generation of biological field detector. MAB has the unique capacity of detecting and categorizing biological particles with a proven extremely low false alarm rate and the unique capacity to discriminate dangerous or suspicious biological particles such as Anthrax spores from natural background. The very liable MAB has been designed to be mounted on track vehicles. It is insensitive to diesel exhausts.
As all Proengin products and thanks to the flame spectrophotometry technology, MAB is running in very severe outside conditions, shows the lowest false alarm rates (negative and positive) and requires reduced maintenance. It shows such a high level of availability. AP4C-FB Government premises, courts and parliaments are also more and more equipped with fixed chemical and biological detectors. AP4C-FB combines both chemical detection as for the AP4C-F, and biological alarm as for the MAB. This detector may be associated with a radiological probe, featuring the all in one full CBRN detector. L FOR MORE INFORMATION www.proengin.com
Volume 9 | COUNTER TERROR BUSINESS MAGAZINE
169
Advertisers Index
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service Access Risk Control 71 Adani Systems 38 Alpro Architectural Hardware 102 AM Security Products 123 Andrews – Wykham 55 ANR 69 Arinc 84, 85, 136, 142, 163 OBC Armoured Cars 102 ATG Access 74 Atlas Electronic 53 Avon Barrier Company 92, 63 Badger Software 111 Barkers Engineering 96, 97 Beechwood 22, 23 Bela Electronics 54 BF Components 51 Brimar 113 Briton EMS 12 Broughton Controls 90 BSIA 112 CDVI 14, 71 Central Scanning 52 CLD Fencing Systems 104 Cobham Antenna Systems 10 Coges 160 Cova Security Gates 89 CP Cases 98, 99, 100, 101 CRH Fencing & Security Group 88 DMS Technologies 69 Dynamic Air Engineering 161 E2V 30, 31 Eagle-Autogate 63 Edesix 121 Electro Sonic 87 Electrothermal 150 EPC-UK 146 Euroquartz 65 Excelerate Technology 58, 59 Extrudakerb 86
Fire Eye FireHost Flir Frontier Pitts G6 – Global GPS Perimeter Guartel Technologies Hafren Security Fasteners Heald Hesco Hi-Speed Services Holmatro Rescue Equipment Hosokawa Micron IB Consultancy Infranor Intelsec iStorage Jaguar Landrover JB Corrie L3 TRL Technology Lapa Security Lesley Ashburner Littlewood Fencing Lloyds Maritime Academy Logically Secure Lyyn Marlborough Communications Mascot AS Mobile Mark Morgan Marine Nedap Niche Events O’Gara Group Oakleigh Cases Omega North East OP5 Origin Storage Paragon Parotec
Zaun_Counter Terror Bus 125x178_Layout 1 01/03/2012 09:52 Page 1
124 135 114 83 70 93 64 104 76 78, 162 154 40 36, 69 156 42, 43 144 106 158 72 62, 130 49 131, 138 91 154 166, 167 10 44 45 37 46 116 6 34 52 41 131 140, 141 19 64
PDX Pentax Ricoh Phoenix Datacom Photomechanical Services Prestwick Circuits Proengin Rainford EMC Systems RAM Mount Ramora UK Rapiscan RF and Noise Components Rubb Buildings Rud Chains Safety Flex Barriers SDS Group Security Labels Selectamark Signtrade SSAIB Steatite Steelway Stonesoft Corporation Sysco International Tabernus Tek Seating/Sit Smart Thomas Jacks Total Board Solutions Totalpost UBM Vadition Vale Security Solutions Volker Fitzpatrick Warn Industries Winkelmann Yorkshire Profiles Zareba Security Zaun
108 118 126 66 48 24, 168, 169 66 110 50 28 68 164, 165 148 94, 95 60, 61 IFC 4 16 68 8 32 132 65, IBC 134 152 110 47 67 120 128 20 56 161 26 18 82 39, 170
The most effective border agency.
Zaun is one of the largest and most dynamic manufacturers of high security perimeter protection systems. Our comprehensive range is at the forefront of design and uses leading production technologies to ensure our solutions combat the rapidly changing security threat. Tested by independent organisations and governments to the most stringent criteria, our systems protect sites of critical and national importance on a global scale.
Tel: +44(0)1902 796699 170
COUNTER TERROR BUSINESS MAGAZINE | Volume 9
security@zaun.co.uk
www.zaun.co.uk
Covert Buried Sensor
Simple to Install
No Special Ground Preperation required
Ground Heals Within Days
SYSCO COVERT GROUND SENSOR The Sonaflex covert buried sensor is ideally suited for locations that require a discrete covert sensor that is both cost effective and simple to install without the necessity for major groundwork’s. As the sensor is passive, it is not compromised by existing utility cables or water pipes within the sensor proximity. Field proven in many demanding high security installations, the Sonaflex buried senor is the ideal choice where performance and reliability is a key requirement.
SYSCO INTERNATIONAL psmsysco@aol.com