FrontCover November2015_001 03/11/2015 14:08 Page 1
November 2015
Security and Fire Management
Vision of Tomorrow’s World Developing Future Security Management Strategies Digital Evidence: Technology’s New Dimension Unveiled Alterations Under Lock and Key: Refurbishment Planning The Security Institute’s View: Converged Threats Examined Vertical Focus: Protection Regimes for the Transport Sector
Project1_Layout 1 05/02/2014 17:39 Page 1
Have you tried Integriti yet?
Sophistication is not about size The Integriti Security Management System is an IP connected access control and intruder security system that offers sophisticated centralised management for both small systems on a single site, or large systems distributed across the country or across the globe.
With a growing list of new installations take a moment to think of what you’re missing! The Integriti system offers an advanced suite of software, hardware and integrated solutions to deliver complete management of your entire integrated system.
Inner Range Europe Limited Units 10-11 Theale Lakes Business Park Moulden Way, Sulhampstead Reading, Berkshire RG74GB UNITED KINGDOM
integriti@innerrange.co.uk a4 integriti 0ne page UK.indd 1
+44 (0) 845 470 5000 www.innerrange.com 4/12/2013 8:40 am
Contents November2015_riskuk_Dec12 03/11/2015 13:53 Page 1
November 2015
Contents 31 Security Solutions for the Transport Sector
CCTV and Video Analytics (pp28-29)
Risk UK’s Vertical Focus pinpoints security solutions for the transport sector. Risk UK previews Transport Security Expo 2015 (p33). Constant Rutten talks about situational awareness (p36). Lucas Young casts an eye over network video (p38) and Scott Brothers assimilates facts about 360-degree surveillance (p40)
43 Prepare to Evacuate 5 Editorial Comment 6 News Update Government appeals DRIPA surveillance ruling. University of Edinburgh Risk Showcase. ESRC Security Threats Centre launch
8 News Analysis: ‘Police Efficiency 2015’ Report Brian Sims analyses the findings of HMIC’s ‘Police Efficiency 2015’ Report which grades forces’ current performance levels
11 News Special: CoL Sheriffs’ Award for Bravery This year’s City of London Sheriffs’ Award for Bravery has been presented to Ms Zoe Brown. Brian Sims relates the citation
12 Opinion: Personal Safety Risk Management Referencing several recent security episodes, Peter Houlis determines to plot a path towards personal protection for us all
14 Opinion: Security’s VERTEX Voice Peter Webster concentrates on the growing problem of mental health issues among ex-Armed Forces personnel and examines why this can impact directly upon the private security sector
17 BSIA Briefing
John Robb maps out a plan for safe evacuation procedures
46 What Price Safety and Security? With safety and security ascending corporate agendas, Peter Jackson calls for a collective paradigm shift in thought processes
48 The Cloud: Ready for Surveillance? Stefano Torri focuses on several key issues for risk managers to consider before they move video surveillance into the cloud
50 The Security Institute’s View 52 In the Spotlight: ASIS International UK Chapter 55 FIA Technical Briefing 58 Security Services: Best Practice Casebook 60 BYOD: The Security Management Equation 62 Training and Career Development Ken Livingstone on the Level 7 Advanced Diploma for managers
64 Risk in Action
There has been much change in the transport security landscape post-9/11 and 7/7. James Kelly outlines the main observations
66 Technology in Focus
20 The Security Manager of Tomorrow
The latest people moves in the security and fire business sectors
What should the most appropriate, holistic and businessorientated management strategy look like for security and risk leaders? Mike Kenny reviews present and future scenarios
23 Transformation for Criminal Evidence The digital evidence sharing agreement formed between the West Midlands Police and the CPS could well set the scene for significant efficiency savings. Brian Sims has the detail
26 Alterations Under Lock and Key Jeremy Cassady explains why security risks will often need to be reassessed as a direct result of building refurbishment schemes
28 The Gateway to Successful Video Analytics Peter Ainsworth discusses the all-important area of camera placement when it comes to optimising today’s video analytics
69 Appointments 71 The Risk UK Directory ISSN 1740-3480 Risk UK is published monthly by Pro-Activ Publications Ltd and specifically aimed at security and risk management, loss prevention, business continuity and fire safety professionals operating within the UK’s largest commercial organisations © Pro-Activ Publications Ltd 2015 All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means electronic or mechanical (including photocopying, recording or any information storage and retrieval system) without the prior written permission of the publisher The views expressed in Risk UK are not necessarily those of the publisher Risk UK is currently available for an annual subscription rate of £78.00 (UK only)
Editor Brian Sims BA (Hons) Hon FSyI Tel: 0208 295 8304 Mob: 07500 606013 e-mail: brian.sims@risk-uk.com Design and Production Matt Jarvis Tel: 0208 295 8310 Fax: 0870 429 2015 e-mail: matt.jarvis@proactivpubs.co.uk Advertisement Director Paul Amura Tel: 0208 295 8307 Fax: 01322 292295 e-mail: paul.amura@proactivpubs.co.uk Administration Tracey Beale Tel: 0208 295 8306 Fax: 01322 292295 e-mail: tracey.beale@proactivpubs.co.uk Managing Director Mark Quittenton
Risk UK PO Box 332 Dartford DA1 9FF
Chairman Larry O’Leary
Editorial: 0208 295 8304 Advertising: 0208 295 8307
3 www.risk-uk.com
EditorialComment November2015_riskuk_jul14 03/11/2015 13:57 Page 1
Evacuate everyone
WINNER • (1 FHUWLÀHG EHDFRQ WHFKQRORJ\ • ([FHSWLRQDO OLJKW RXWSXW ZLWK PLQLPDO SRZHU • 0D[LPXP FRYHUDJH PHDQV IHZHU GHYLFHV DUH UHTXLUHG • Wide coverage pattern - one device can cover most rooms • (DV\ WR XSJUDGH H[LVWLQJ V\VWHPV QR DGGLWLRQDO FDEOLQJ
EditorialComment November2015_riskuk_jul14 03/11/2015 13:58 Page 2
Editorial Comment
Sonos Pulse Beacons feature:
Joining Forces he Conservative Party has unveiled bold plans to invest a substantial £5 million in building a national network of grassroots organisations that will challenge all forms of extremist ideology. In fact, the announcement was made immediately prior to publication of the Government’s all-new Counter-Extremism Strategy. At the very heart of that Counter-Extremism Strategy is a new partnership approach configured to strengthen community resilience and promote a coalition that will not be afraid to speak out against – and ultimately defeat – extremism. For this financial year, the new tranche of funding will be dedicated towards providing direct and in-kind practical support for groups such that they can expand the reach and scale of their work on confronting extremism in tandem with the development of “credible alternative narratives” to the dangerous views propagated by extremists. The former could well include structured training on social media. “We need to systematically confront and challenge extremism and the ideologies that underpin it,” explained Prime Minister David Cameron, “in turn exposing the lies and destructive consequences it leaves in its wake. We must stop extremism at its start by preventing seeds of hatred from even being planted in people’s minds and cutting off any oxygen for growth.” The Prime Minister continued: “The Counter-Extremism Strategy sets out our new approach to tackle this poison, vigorously counter the ideology that underpins it, take on the violent and non-violent parts of the creed, actively support the mainstream voices such that they might rise above those of the extremists and tackle the segregation and feelings of alienation that can help provide fertile ground for extremism to take root.” Extremists are increasingly using the Internet to inspire radicalisers into grooming new recruits through online peer-topeer relationships. Indeed, the past 18 months have witnessed a significant change in the way that extremists use the online medium to target their radical ideology directly at young minds. According to recent research conducted by the Quilliam Foundation, ISIL produces no less than 38 unique pieces of ‘high quality propaganda’ every day which is then disseminated widely by a network of thousands of supporters and sympathisers spread all over the world. That being so, the Counter-Extremism Strategy determines to go further in developing the existing partnership between industry, the police service and Government aimed at omitting terrorist and extremist material within the online space. Co-operation to take down such harmful terrorist and extremist content has significantly improved in recent years. By way of example, the Metropolitan Police Service’s CounterTerrorism Internet Referral Unit has now removed over 110,000 pieces of extremist propaganda since 2010 and over 38,000 items so far this year, with referrals from members of the public rising by 400% between the end of 2013-2014 and 2014-2015. Feeding on the vulnerable, extremist ideologies purport to offer a sense of belonging and purpose. We must summon all of our powers to defeat their erroneous and damaging narrative.
T
Superior EN54-23 Coverage Standard VAD Coverage
11.5m
11.5m
Sonos Pulse Coverage
11.5m
11.5m
Freedom of Positioning Standard VAD
[ P URRP
Sonos Pulse
[ P URRP
5HGXFHG 1XPEHU RI 'HYLFHV Standard VAD
Sonos Pulse
C-3-7.5 4 Beacons
C-3-15 1 Beacon
Brian Sims BA (Hons) Hon FSyI Editor
Tel: +44 (0)1706 233879 ZZZ NOD[RQVLJQDOV FRP ÀUH
December 2012
5
www.risk-uk.com
NewsUpdate November2015_riskuk_nov14 03/11/2015 14:11 Page 1
Government appeals High Court judgement that ruled DRIPA surveillance unlawful The Government’s appeal against a High Court judgement that ruled its surveillance legislation unlawful contests the July 2015 ruling, which upheld a challenge to the Data Retention and Investigatory Powers Act (DRIPA) brought by MPs David Davis and Tom Watson. The new Court of Appeal hearing comes as the Government prepares to put similar legislation before Parliament. The forthcoming Draft Investigatory Powers Bill is expected to seek to expand the mass data-gathering powers challenged in this case, states Liberty, “without regard for the lack of safeguards highlighted by the High Court”. It’s also anticipated that the draft Bill will attempt to enable the tracking of every person’s web and social media use and strengthen the Security Service’s powers for bulk interception of e-mails and other communications. The High Court found Sections 1 and 2 of the Act breached the British public’s rights to protection of personal data and to respect for private life and communications under the EU Charter of Fundamental Rights because: *they fail to provide clear and precise rules to ensure data is accessed only for preventing, detecting or prosecuting serious crime *they don’t require data to be authorised by a court or independent body, which could limit access to – and the use of – data to what is strictly necessary
The unlawful sections of DRIPA will remain in force until the end of March 2016, allowing time for the Government to legislate again. At that point they will cease to have effect. Liberty, which is backing Davis and Watson, supports the role of communications data in solving and preventing crime, but does not believe that justifies the “costly and lengthy” mass retention of records of the entire population. Liberty said: “The upcoming Draft Investigatory Powers Bill is a once-in-ageneration opportunity for Parliamentarians to legislate for proper, transparent safeguards – including a requirement that data only be retained and accessed as part of investigations into serious crime and to prevent death and injury, and that all surveillance requests be authorised by a Judge.” David Davis, Conservative MP for Haltemprice and Howden, commented: “By challenging the High Court’s judgement, the Government is placing itself under unnecessary time pressure given the generous provision granted to bring the law into compliance.” In conclusion, Davis asserted: “The Government’s defeat in July was not a surprise. Concerns over its surveillance powers have been voiced again and again. For some time, the Government has ignored all criticism of these powers and allowed policy in this area to be dictated by the Security Services.”
University of Edinburgh secures Risk and Resilience Innovation Showcase Edinburgh Research and Innovation, the commercialisation arm of the University of Edinburgh, has announced a new AIMday (Academic Industry Meeting day) for companies looking to anticipate possible future risks to their operations and plan resilience strategies for the global marketplace. Next January, AIMday Risk and Resilience will tackle topics such as risk and financial decisionmaking, the management of risk in day-to-day operations, strategic resilience, regulatory issues and climatic risk. With a defined focus on risk and resilience – both terms that have become increasingly commonplace in Boardroom discussions of late – the event places greater emphasis on planning for dramatic economic or climatic changes and technological advances that could have repercussions for companies, their customers, employees and supply chains. AIMday is a one-day event that allows companies to submit a question or commercial challenge around any element of risk and resilience. Academics from across the University of Edinburgh will self-select those questions where they believe their research could add the most value to the company discussion. On the AIMday itself, the companies and academics meet face-to-face in a one-hour Workshop to discuss possible pathways towards a solution, the emphasis being on generating innovative ideas to meet today’s challenges by using a multi-disciplinary approach. Douglas Graham, commercial relations executive at the University of Edinburgh Business School, told Risk UK: “Supply chains are increasingly outsourced and, on that basis, companies need to understand, anticipate and plan for strategic resilience in order to safeguard their bottom line and competitive edge into the future.” The event will be held on 27 January 2016 at the University of Edinburgh’s Business School.
6 www.risk-uk.com
NewsUpdate November2015_riskuk_nov14 03/11/2015 14:11 Page 2
News Update
KPMG: “Risk and strategy ‘two sides of same coin’ but many Boards failing to make the link” Corporate Boards are deepening their involvement in company strategy and refining their oversight of the critical risks facing the business, but there’s “still work to be done” if organisations are to meet the challenges set by the 2014 UK Corporate Governance Code. That’s according to the outcomes of a new survey by KPMG’s Audit Committee Institute. Compliance with the Code’s guidance on risk management and internal control requires inter alia that Boards make a robust assessment of the principal risks to their company’s business model and ability to deliver its strategy. However, while many UK Audit Committee members said their Board had increased its involvement in strategy formulation (67%), monitoring strategy execution (62%) and focus on technology issues including cyber security (51%), only half (51%) were satisfied that risk and strategy were well linked in Boardroom discussions. “The complexity and global volatility that we’re seeing – such as swings in commodity prices and currencies, a decelerating China, uncertainty in geopolitical hotspots, technology innovation and disruptive business models – are clearly impacting the Boardroom
ESRC launches dedicated National Centre for Research and Evidence on Security Threats In partnership with the UK’s security and intelligence agencies, the Economic and Social Research Council (ESRC) has commissioned the launch of a new knowledge hub dedicated to the development and use of economic and social science research to understand, mitigate and counter security threats. Based at Lancaster University, the Centre for Research and Evidence on Security Threats (CREST) brings together world-leading researchers at the universities of Birmingham, Cranfield, Lancaster, Portsmouth and the West of England to deliver a national hub focused around independent research, training and knowledge synthesis. The founding partners will oversee programmes of activity that attract the best social scientists from the UK and abroad to partner with industry and Government in a bid to “break new ground” in the overall understanding of – and overriding capacity to counter – contemporary threats. The project has been commissioned by the ESRC with a focus on maximising the impact of
involvement in strategy and risk,” asserted Timothy Copnell, chairman of the UK Audit Committee Institute. “There’s a real danger that many Boards are seeing risk management as a ‘bolt-on’ exercise, which potentially leaves them exposed to the strategic risks that could affect the company and its longer term viability.” Despite the increased focus on cyber security and technology risk as a critical business priority, 39% of UK respondents said the full Board should be devoting more attention to cyber risk. In parallel, the adequacy of cyber and technology expertise – via third parties and/or on the Board – continues to be a concern. Copnell went on to state: “Unfortunately, there remains a dearth of cyber and wider technology expertise on Boards of Directors. 50% of UK respondents recognise this need very well, but the risk and opportunities are so large. Someone on the Board has to know the right questions to ask and be in a position to understand the answers.” Emanating from more than 100 senior UK Audit Committee members (and over 1,000 directors worldwide), the survey findings suggest that, while many Boards are stepping up their game, significant challenges remain. They include linking strategy and risk and more clearly defining risk appetite.
existing research to inform approaches around countering contemporary security threats to individuals, communities and institutions. CREST is funded over three years with £4.35 million from the UK security and intelligence agencies and a further £2.2 million invested by the founding institutions. Paul Taylor from Lancaster University (the director of CREST) explained: “Bringing together the UK’s top economic, behavioural and social scientists with partners in industry and Government will provide unprecedented opportunities to develop our understanding of security threats and how best to mitigate them. Today’s threats are nothing if not both challenging and diverse. The ambitious and innovative activities of CREST over the coming years will meet these challenges.” Cranfield University will lead research on protective security and risk assessment. Dr Debi Ashenden, head of the Centre for Cyber Security and Information Systems at Cranfield, told Risk UK: “By focusing on key areas, we will look to improve our understanding of the security risks we face and how we make decisions about mitigating those risks.” The project will initially fund 13 PhD students working across all five universities.
7 www.risk-uk.com
NewsAnalysisPoliceEfficiency2015Report November2015_riskuk_mar15 03/11/2015 14:10 Page 1
Herculean efforts “not stopping the impact of budget cuts” warns Police Federation at risk, before something is done? The time is right to be considering a proper review of policing, what it delivers, how it delivers it and how it’s funded going forward.”
Efficiencies “must improve”
An official report criticising the efficiency of a number of police forces and casting doubt on the ability of others to withstand a new round of budget cuts should be a “wake-up call to the Government and the country,” the Police Federation has warned. Brian Sims examines the statements made
8 www.risk-uk.com
teve White, chairman of the Police Federation of England and Wales, has stated that Her Majesty’s Inspectorate of Constabulary’s (HMIC) detailed report absolutely demonstrates members of the public must be allowed the chance to state what it is they want their police service to do. The report, entitled ‘Police Efficiency 2015’, was published on Tuesday 21 October and unearths problems in the way the individual forces work together, as well as difficulties in procuring IT equipment that’s fit for purpose. A poll conducted alongside the survey suggests that many members of the public believe the policing service they’re receiving is now beginning to deteriorate. Steve White explained: “This report should be a wake-up call for the Government and the country regarding the future delivery of policing. It makes clear that, despite Herculean efforts, the impact of budget cuts on policing is now taking its toll.” White continued: “This report should be the catalyst to energise a full and proper debate on what the public wants from its police service across the next five years. All options should be considered and particularly those around collaborations, which are clearly not delivering as well as they should.” In conclusion, White stated: “Combined with deep concerns over Information Technology and the changing face of crime, this suggests a much more joined-up approach is required. How many forces need to fail, putting the public
S
The HMIC study examines how well forces understand the demand for their service and how well they match their resources to that demand and goes on to provide an assessment of their efficiency. The main document is accompanied by separate reports on each force based on inspections carried out from March to June 2015, as well as data provided by forces on their spending plans for future years. HMIC graded five forces as ‘outstanding’, 29 were ‘good’ and eight are deemed as ‘requiring improvement’ while, for the first time, one force has been found to be ‘inadequate’. HMIC’s Mike Cunningham, who led the inspection, said: “Since 2010, police forces have been through unprecedented change. It’s a tribute to the leadership of the police service and to officers, Police Community Support Officers and staff in all forces that the service has, on the whole, been able to absorb that change while measured crime has continued to fall and public satisfaction with the police has been maintained.” Cunningham outlined: “The next five years will be more challenging for forces as they strive to make further reductions in budgets and workforce numbers while also dealing with increasingly complex crime. Policing is entering uncharted waters.” He believes that police forces have made great strides in assessing the current demand for their service, but that they need to improve their ability to forecast demand. “Only by achieving this level of understanding can forces make informed decisions on how to make best use of their resources. Typically, forces think in terms of numbers of officers and staff when developing workforce plans rather than their skills and capabilities that will be required in the future. They need to start building capability now, informed by a clear understanding of demand.” This news comes at a time of great financial uncertainty for the police service, with the outcome of the review of the police funding formula yet to be revealed and the overall level
NewsAnalysisPoliceEfficiency2015Report November2015_riskuk_mar15 03/11/2015 14:10 Page 2
News Analysis: ‘Police Efficiency 2015’ Report
of funding to be announced in the next Spending Review due later on this month. Most forces have a good understanding of the current demand for their service and they know their current capacity (ie the costs and numbers of their workforce). However, too many forces have a weak understanding of their current capabilities (that is, the skills their workforces harbour). Forces appear to have little understanding of their future demand and the capability they need to meet it. The future planning and modernisation that’s taking place in forces is driven by capacity – how much money forces will have and how many people they can afford to employ, rather than what forces are likely to have to do. Police forces, states HMIC, need to improve their understanding of future demand and link it to their financial and organisational planning such that they’re in a fit and robust shape to face their future challenges. Forces’ IT needs to improve “considerably”. Indeed, HMIC has commented on this in previous reports. Too many systems are weak and ageing. Also, the police service isn’t optimising the use of IT to make it efficient. The robustness of police forces’ financial planning varies considerably while forces are looking at large reductions in their reserves in the years ahead. The reductions in forces’ workforces are likely to lead towards a further erosion in neighbourhood policing.
Force management statements Her Majesty’s Chief Inspector of Constabulary Sir Thomas Winsor said: “In order to ensure significant improvements in forces’ understanding of future demand, workforce capability and capacity, availability and means of deployment of resources, and what needs to be done to boost efficiency, HMIC is developing a template force management statement. Each force will be required to produce an annual statement covering all of these areas, projecting demand, capacity, capability and efficiency improvements for four-to-five years ahead. Force management statements will follow a national template, but be sensitive to and also reflective of local circumstances, including principally the Police and Crime Plan issued by the Police and Crime Commissioner.” As forces’ budgets reduce further, without significant efficiency improvements some of those forces could become financially unsustainable or operationally unviable. HMIC believes it’s “conceptually possible” that even an efficient force could become financially unsustainable or operationally
unviable if its funding doesn’t match the plans of its Police and Crime Commissioner. While forces are likely to face considerable pressures to maintain and improve their service with reduced budgets, their most promising way of meeting those pressures will, states HMIC, come from significant advances in efficiency and a more skilful workforce managed by “leaders of high ability”.
Fundamental changes ahead The police service will have to make “fundamental changes” in terms of how it’s structured and the role it carries out. That’s the considered view of Police and Crime Commissioners in England and Wales following their detailed analysis of possible budget reductions for the next five years. The Association of Police and Crime Commissioners recognises that budget reductions are necessary to play their part in reducing public spending and have made significant savings and improvements in productivity while still keeping communities safe from crime. However, with reductions in staff levels and support services already made, further budget constraints imposed by the Government would “lead to difficult questions” on how best to structure police forces to respond to changes in crime, and what this would mean for the local service provided to the public. With financial pressures on other local services such as health, ambulances and councils, people look towards the police service to help them. Paddy Tipping, Nottinghamshire’s Police and Crime Commissioner, commented: “Working with chief constables, Police and Crime Commissioners have made significant savings since 2012 and we know that more will be needed. Crime has changed and become more complicated and more global, with further resources needed for areas like cyber crime and counter-terrorism. The police service cannot respond to these challenges alone. Other sectors and industries will have to work with us to share the responsibility in responding to changes in crime.” Tipping added: “With more savings required, there will need to be a rethink on how we are organised, around the service we offer the public and the roles and skills demanded.” Varying between forces, since 2010 staff posts have reduced by 15,500 (19.5%). By 2020, police staffing levels could reduce to approximately 100,000 – the lowest level since the mid-1970s and a further reduction of 17% since CSR10. The funding shortfall could be approximately £400 million in the first year.
Steve White: Chairman of the Police Federation of England and Wales
Sir Thomas Winsor: Her Majesty’s Chief Inspector of Constabulary
9 www.risk-uk.com
Project1_Layout 1 02/11/2015 12:22 Page 1
NewsSpecialCityofLondonSheriffsAwardforBravery November2015_riskuk_feb15 03/11/2015 14:11 Page 11
News Special: City of London Sheriffs’ Award for Bravery
City of London Sheriffs’ Award 2015 W
orking in conjunction with Sir David Brewer (a former Lord Mayor and later Lord Lieutenant of London), the award scheme was launched by The Worshipful Company of Security Professionals after the 7/7 London Underground and bus bombings. On an annual basis, The City of London Sheriffs’ Award now duly recognises outstanding acts of bravery by individuals from right across the UK who, without any thought for their own safety, act diligently and effectively to confront danger in a selfless and inspirational manner. As has been the case in previous years, The Worshipful Company received a substantial number of high quality nominations in 2015. Following rigorous review by The Worshipful Company’s representatives and the Sheriffs of The City of London, the unanimous decision was made to award the 2015 prize to Ms Zoe Brown from Manchester.
The 2015 City of London Sheriffs’ Award for Bravery* was presented to Ms Zoe Brown on Monday 12 October by Dr Christine Rigden, the Sheriff of The City of London. The presentation ceremony took place as part of the Annual Dinner of The Worshipful Company of Security Professionals, held at The Plaisterers’ Hall, One London Wall
Citation for the 2015 winner Submitted by Greater Manchester Police, an extract from Ms Brown’s citation reads: “At 1.45 am on 1 January 2015, Zoe and her partner Matthew were at home with their baby. Zoe’s attention was drawn to a male banging on the window of an address close to her own abode. The male in question was attempting to climb through an open bathroom window and appeared to be shouting to his partner to let him in to the property. “The male claimed that he was locked out of his flat and asked for a screwdriver. The male eventually managed to gain access. Almost as soon as he had entered the property, Zoe and her partner heard a disturbance and the sound of a female screaming. The screams gradually became louder and louder and more desperate. “Zoe approached the house and peered inside. At this point, she saw a female being dragged by the hair along the hallway by a male. The female was screaming and shouting and appeared to be in a great deal of pain. Without any thought for her own safety, Zoe ran into the address and pushed the male away from the female, who at this point was lying on the floor. Zoe helped the female to her feet and began to lead her to safety when she saw the male return to the scene brandishing a threeinch kitchen knife. “The male threatened to stab Matthew with the knife and, without provocation, lunged at him. At this point, and again demonstrating no
Left to Right: The 2015 City of London Sheriffs’ Award for Bravery winner Zoe Brown with Sheriff Christine Rigden and Stuart Seymour, Master of The Worshipful Company of Security Professionals
regard for her own personal safety, Zoe lunged at the male and forced him to the ground. “Zoe and Matthew then managed to restrain the male and remove the knife from his possession. The male returned to his flat and emerged moments later holding a stainless steel object that was around one foot in length. He continued to shout and threaten Zoe and Matthew, who were now in their flat. He then smashed one of the windows before running back to his flat as the police arrived on scene. “Zoe put her own life on the line to apprehend a knife-wielding offender and protect her loved ones. Her actions undoubtedly saved Matthew’s life. Zoe had the courage and bravery to stand up for and protect a vulnerable victim from domestic violence and there’s no doubt at all that she prevented any further serious harm from being perpetrated on the woman by her violent partner.” As part of this unique award, Ms Brown receives a cheque for £2,500. Her name will now be inscribed on an Honours Board and placed in a Book of Honour which are both to be found on permanent display within the Central Criminal Court at The Old Bailey.
*The City of London Sheriffs’ Award for Bravery is launched in February each year, with the winner selected by the Sheriffs in September. This popular and highly prestigious award scheme is open to nominations from the general public, the business community, the Emergency Services and the Armed Forces **To ensure your nominee receives the recognition they deserve in 2016, visit The Worshipful Company of Security Professionals’ website at: www.wcosp.org for further details
11 www.risk-uk.com
OpinionPersonalSafetyandRiskManagement November2015_riskuk_apr15 03/11/2015 14:12 Page 1
Personal Safety: Managing The Risks T
There’s little doubt that the personal security stakes have risen steeply in recent years, in turn heightening the responsibility on every individual if they want to safeguard what’s rightfully theirs in light of an increasingly dynamic risk landscape. Referencing some recent security episodes that have hit the international headlines, Peter Houlis plots a path towards personal protection for us all
he increase in attacks against Western World targets perpetrated by extremist militant groups and terrorist sympathisers – including several so-called ‘lone wolf’ episodes – has been little short of alarming. Those ‘lone wolf’ attacks have been so graphically demonstrated, too. Just look at August’s shooting and stabbing incident on board the Thalys train passing through Pas-deCalais, the attack in Paris carried out against French satirical magazine Charlie Hebdo and the June massacre of innocent tourists in Tunisia. The stark warning is that more terror attacks will surely follow. Although not involving the loss of life, the recent cyber theft and posting of the personal details of some 37 million people registered on infidelity website Ashley Madison has undoubtedly devastated thousands of families. Then there’s the tragic death of a student who took toxic diet pills bought online, and what about the recent discovery of fake Botox? All of these occurrences have a common theme. Although very different and not truly comparable in nature, they do raise the issue of ‘self-preservation’ and reinforce the need for us all to take more responsibility for ‘self’ and our nearest and dearest.
Urban landscapes: the bigger issue
Peter Houlis CSyP MSyI: Managing Director of 2020 Vision Systems
12
www.risk-uk.com
When on holiday or working abroad, we need to be aware of the potential for being caught up in a Sousse beach-type massacre or involved in a gang shoot out. In some holiday destinations such as Borneo, there’s the very real threat of piracy while the potential for indiscriminate attacks is now a reality pretty much anywhere (a number of unsuspecting tourists have suffered savage attacks on the idyllic beaches of Thai Islands, for example). Generally, cities present a bigger problem. In some countries, there’s the threat of express kidnapping, a low risk operation involving ordinary people being held hostage for a short duration while the kidnappers splurge on their victims’ credit cards or attempt to extort money from their families. Closer to home, and for those associated with large amounts of cash or handling valuables, Tiger kidnapping is a heightened risk. We all face the potential of a mugging or exposure to physical violence simply from
being in the wrong place at the wrong time whether on holiday or working. Even our homes are vulnerable, with some police forces recently declaring they will no longer attend to house break-ins. Furthermore, there’s no respite in the virtual world. When we go online, we can inadvertently become the victim of any number of scams or risk someone else assuming our identity. As we further adopt The Internet of Things, we leave ourselves ever more vulnerable to criminality (as demonstrated by security researchers who, in July, highlighted the risk posed by hackers to motorists and their passengers by wirelessly hacking into a Fiat Chrysler Jeep Cherokee and tampering with the radio and air conditioning system before cutting transmission, resulting in the subsequent recall of 1.4 million vehicles). In reality, the world has always been a relatively dangerous place, particularly so for the complacent, with a variety of assailants ready to do us physical or financial harm – or both – that almost inevitably results in emotional damage. That being so, we simply must adopt sensible precautions if we’re to increase the odds of self-preservation in our favour whether we’re travelling, working, walking down the street, at home or online.
Staying safe in the virtual world I’m continually astounded at how much information people give away freely online and how blasé they can be with e-mails, instant messaging and surfing the Internet. Individuals need to be much more ‘cyber savvy’, becoming more wary of divulging personal information which criminals can use against them. At the very least, we need to take some simple precautions, like applying strong passwords of ideally no less than eight characters and using combinations of capitals and lower case letters, numbers and symbols. Why not use a password checker to test your password strength? Be particularly aware of the increased risks attributed to using Internet facilities provided by third parties, hotels, shops and cafés, etc, and notably so where Wi-Fi is involved. Other common sense advice on staying ‘cyber safe’ is to put up a good firewall, install antivirus and anti-malware software and ensure the frequent updating of programmes. Also, always back-up your systems. Of course, think carefully about the information you might be inadvertently giving away. In parallel, take extra precautions to secure your portable devices, laptops and mobiles, etc. A quick Internet search will provide some excellent advice on staying safe
OpinionPersonalSafetyandRiskManagement November2015_riskuk_apr15 03/11/2015 14:12 Page 2
Opinion: Personal Safety and Risk Management
online. Use the information provided. If you should be blessed with children, make sure they know how to stay safe online as well.
Survival tips for real life Moving into the physical world, we face a broad and dynamic threat landscape: terrorism, crime, civil unrest and anti-social behaviour, accidents and natural disasters are part of the mix. Staying safe is largely focused on common sense, situational awareness, confidence and a modicum of knowledge, but above all else it’s about gut instinct. If something doesn’t feel right to you then it probably isn’t. Although this cannot possibly be a definitive guide to survival, hopefully the points made will provide ideas and spark the personal security thought process within. There are some excellent books available on the subject. Remember that if we’re talking about staying safe in a business-related context, though, it’s a statutory obligation that risks to employees’ Health and Safety have been assessed by their employer and are properly controlled. Forewarned is forearmed. It’s an old saying but still very much pertinent, so on that basis pre-planning is essential. It’s also prudent to carry out some research on any new places you are going to visit. Learn about the locality, its culture, the potential dangers and how to navigate your way around. Know what you are doing or at the very least portray such an image. Don’t make yourself a walking advert as a target. Dress appropriately. Only carry with you what’s absolutely necessary and, most important of all, act confidently and with assuredness. Many things we preach to our children are also relevant to adults. Be careful when talking to or going somewhere with strangers. Don’t accept drinks from strangers unless you are certain they’ve not been contaminated. Don’t travel in an unknown person’s vehicle. It amazes me how many people wander around with a mobile phone clamped to their ear or, worse still, using earphones with one. Not only do they run the risk of a collision with a vehicle, but they also deny themselves one of their vital senses in spatial awareness: what’s going on around them.
Spatial or situational awareness Along with the often-promoted ‘run, hide and fight’ concept born out of the US active shooter incidents, spatial or situational awareness is a vital component of personal security. If you’re fully aware of what’s going on around you, hopefully you can remain remote from trouble or at the very least move away swiftly.
The ‘run’ ethic is all about removing yourself from danger as fast and as safely as possible. This does make it important to establish your escape routes. In the event that you cannot run, you might need to seek sanctuary: a location of relative safety, a place to hide until the danger passes. Even when staying in an hotel, always ask yourself: ‘How do I vacate the premises if there’s an incident?’ ‘Where can I seek help?’ and ‘Where might I be able to hide?’ Finally, if all else fails then use self-defence, which advocates the points already raised: threat avoidance and simple precautions to take in order to avoid a confrontation before being left with no option but physical intervention. Although a contentious issue, I believe everyone should learn some basic forms of self-defence. Taking up martial arts is a great way to invoke discipline, improve fitness and grow confidence, but I’m not suggesting we all become karate experts! TV personality and ex-SAS survival expert Bear Grylls suggests adopting Krav Maga, a self-defence fighting system developed by the Israeli military. It employs simple striking techniques and other combat methods to keep aggressors out of your personal space by way of pre-emptive counter-attacks delivered swiftly and accurately to vulnerable parts of your assailant’s body. While doing so, you continually move forward until such time that the threat is nullified. You never know. It might give you the edge when it comes to survival.
“Staying safe is largely focused on common sense, situational awareness, confidence and a modicum of knowledge, but above all else it’s about gut instinct” 13
www.risk-uk.com
OpinionSecurity'sVERTEXVoice November2015_riskuk_apr15 03/11/2015 14:13 Page 1
Post-Traumatic Stress Disorder: Bringing Hidden Illness into Focus someone experiences a disturbing event, it may also occur weeks, months or even years later (when it’s then known as delayed-onset PTSD).
Scale of the problem
In his regular monthly column for Risk UK, Peter Webster looks at the growing problem of mental ill-health among some exArmed Forces personnel and examines why this issue impacts directly upon the private security sector
14
www.risk-uk.com
he problem of mental ill-health among exArmed Forces personnel is particularly acute. Indeed, the number of ex-soldiers, sailors and airmen who accept and acknowledge that they’re suffering with this issue and who have sought help could just be the tip of the iceberg. Approximately 20,000 individuals leave our Armed Forces each year, most of whom have had their lives enriched by dint of experiences while serving their country, and most of whom manage to make the transition into civilian life without too many difficulties. That said, for far too many, a smooth transition is made impossible because of mental health issues resulting from occurrences and experiences that they may have endured either before, during or after their military service. Most of us have heard of the term posttraumatic stress disorder (PTSD). Caused by very stressful and/or frightening events, this anxiety disorder has become synonymous with those who have experienced the trauma of military combat. Some of those individuals who’ve served in Northern Ireland, the South Atlantic, Iraq and Afghanistan are suffering from PTSD in significant numbers. The symptoms of PTSD vary widely, but can include nightmares and flashbacks as well as feelings of isolation, irritability and guilt. While the condition can develop immediately after
T
Last year, the Ministry of Defence published figures showing a 12% increase in the rate of mental disorders experiened by Armed Forces personnel as a whole, including episodes of depression and anxiety. When it came to PTSD, the figure had risen by 19% from 2013. There are an estimated five million veterans in the UK, and with the aforementioned number of 20,000 personnel leaving our Armed Forces each year, this figure is increasing daily. The private security business sector plays host to a significant number of ex-military personnel and current reservists. Estimates suggest that they could represent more than 33% of the total cohort. At Corps Security, 55% of our colleagues have served their country in one area of the military or another. Despite those statistics, the issue of mental ill-health within our business sector receives scant attention while there’s also a general lack of awareness about PTSD (and, indeed, other mental health issues) that may be impacting a high percentage of our workforce. This situation needs to change. In the UK, there are more than 2,000 registered military charities (many of which provide for more than just Armed Forces leavers, including those still serving and their families). All of these organisations are doing a fantastic job in providing support for those who have risked life and limb for their country. The work that these charities do for those veterans with clearly visible signs of their sacrifice is amazing but, unfortunately, many veterans carry invisible scars which impact psychologically and emotionally.
Non-physical trauma support Combat Stress, the leading veteran’s mental health charity, focuses on helping people with the non-physical side of trauma. The charity provides free-of-charge support for nearly 6,000 men and women ranging in ages from 1997. It’s a vital lifeline for these individuals and, just as importantly, their families and aims to diligently assist veterans live a life free from the harmful effects of psychological wounds.
OpinionSecurity'sVERTEXVoice November2015_riskuk_apr15 03/11/2015 14:13 Page 2
Opinion: Security’s VERTEX Voice
Combat Stress was well ahead of its time. Founded in 1919 as the Ex-Servicemen’s Welfare Society, its first ‘recuperative home’ was opened in 1920 on Putney Hill in London. The organisation pioneered a more compassionate and rehabilitation-based approach. Back to the present day, though. While the vital work of Combat Stress continues to make a real difference to many lives, the security sector needs to do far more in terms of supporting its ex-Armed Forces employees. We must learn to understand and recognise the symptoms of PTSD and put mechanisms in place that can help people through it.
Reading the tell-tale signs The symptoms of PTSD vary from person to person and very few people will exhibit the same patterns of behaviour. This can make spotting the tell-tale signs difficult, but sufferers will usually experience severe anxiety, flashbacks, uncontrollable thoughts and nightmares. Feelings of depression, guilt, tension and worry often pervade and make dayto-day activities difficult to perform. It should not be forgotten that PTSD can also have a detrimental effect on physical wellbeing. Higher rates of neurological, respiratory, musculoskeletal and cardiovascular symptoms have been reported, while sweating, nausea or trembling episodes are not uncommon. Avoidance of reminders around the trauma is another symptom of PTSD and this can include people, situations or circumstances resembling – or otherwise associated with – the event. Those with PTSD often try to push memories out of their minds and avoid thinking or talking about the event in detail. Others will spend large amounts of time pondering on questions that prevent them from coming to terms with the episode. They will ask why it happened to them and how it could have been prevented. The main treatments for PTSD are psychotherapy and medication. The good news is that it’s possible for this condition to be successfully treated many years after the traumatic event occurred, which means it’s never too late to seek help. Before having treatment, a detailed assessment of an individual’s symptoms will be carried out to ensure whatever treatment is administered will be tailored to their specific needs. Veterans’ mental health problems may be made worse or caused by post-service factors, such as the difficulty in making the transition to civilian life. People with PTSD may become emotionally numb, aggressive and nervous. When in a working environment such as the security guarding sphere, it can be all-too-easy
to dismiss this type of behaviour as a ‘bad attitude’, or to excuse it by saying that a given person is simply going through a difficult patch. Particularly in male-dominated environments, there can be a reluctance to broach the subject of emotional and mental health issues. It can be easy to simply avoid talking about them. Many men feel that it would be a weakness to acknowledge a mental health issue and either mask their problem or fail to recognise the symptoms. However, any failure to address the issue early on can lead to long-term problems and affect an individual’s ability to work at all. This is part of the reason why, in the past 30 years, three-to-four times more men have taken their own lives than women. This situation simply has to change. A corporate and industry-wide reassessment of how mental health is dealt with is the first and most important step on the journey towards helping those with this type of illness. Therefore, training on the subject should be given to all management such that they can recognise the signs, talk to the people involved with genuine understanding and appreciation and then take appropriate action.
Peter Webster: Chief Executive of Corps Security
Base of understanding must widen Our base of understanding has to widen. We’ve all suffered wide-eyed sleepless nights at some time or another, musing over issues like report deadlines, budget over-spend or target shortfalls that, in the grand scheme of things, are pretty minor. The following day, it’s almost inevitable that our performance will have suffered as a result of grogginess. Imagine then, the horrors endured by those suffering with PTSD, those that have real night sweats and recurring nightmares based around occurrences that they’ve witnessed and undergone which, in truth, are a little more challenging than a photocopier not working properly or a buffet lunch arriving half an hour later than scheduled. If one of our ex-Armed Forces colleagues is late for work, appears groggy and unable to focus on the tasks in hand, do we simply berate them for their ‘poor performance’, or do we do the right thing and dig a little deeper to identify the underlying reasons behind their demeanour? We should absolutely focus on the latter. It’s incumbent upon us to care for them as they have previously cared for us.
*The author of Risk UK’s regular column Security’s VERTEX Voice is Peter Webster, CEO of Corps Security. This is the space where Peter examines current and often key-critical issues directly affecting the security industry. The thoughts and opinions expressed here are intended to generate debate among practitioners within the professional security and risk management sectors. Whether you agree or disagree with the views outlined, or would like to make comment, do let us know (e-mail: pwebster@corpssecurity.co.uk or brian.sims@risk-uk.com)
“Those with Post-Traumatic Stress Disorder often try to push memories out of their minds and avoid thinking or talking about the event in detail” 15
www.risk-uk.com
Project4_Layout 1 07/11/2014 16:05 Page 1
Securitas, a true focus on Security The skills of our people, alongside the best in technology produce total integrated solutions that safeguard your business.
0800 716 586 www.securitas.com
BSIABriefing November2015_riskuk_mar15 03/11/2015 13:51 Page 2
BSIA Briefing
ore than a decade on from the 9/11 atrocities and the 7/7 terrorist attacks, security across transport networks has evolved quite considerably, with the development of new technology and standards of building design helping to ensure the protection of passengers and cargo alike. For many, the images of those attacks in New York on 11 September 2001 and in London on 7 July 2005 have become so familiar, poignant and iconic that it’s difficult to believe more than a whole decade has passed since they occurred. In 2015, we’re perhaps more securityconscious than ever, and rightly so. The official terror threat level for the UK is now rated as ‘Severe’, meaning that a terrorist attack on the mainland is deemed by MI5 as ‘Highly likely’. More recent events have shown that the terrorist threat should indeed be taken seriously. In 2007, Glasgow International Airport was attacked as a Jeep Cherokee loaded with explosives was driven into the main atrium. Luckily, this terror attack was unsuccessful, so too an attempt on Christmas Day 2009 to detonate explosives on a Detroitbound aircraft in an incident worryingly reminiscent of 9/11. This prompted the British Government to launch a public consultation into the use of body scanners at UK airports. Not so fortunate was Moscow’s Domodedovo Airport. Early on in 2011, over 100 people were injured and 35 killed as a bomb was detonated in the Arrivals Hall. In August this year, a gunman was overpowered by three civilians on a French train before the incident could escalate any further. With all of these attacks demonstrating how the open accessibility of transport networks provides would-be terrorists with the opportunity to cause maximum damage and disruption, it’s perhaps no surprise that they’ve also served as a ‘wake-up call’ for many transport network operators and authorities who are increasingly turning towards emerging technologies and improved procedures to provide an added level of security on board aircraft, trains and buses, etc.
M
Have lessons been learned? Reassuringly, despite so many examples demonstrating the current potential vulnerability of the transport network, it’s fair to say that lessons have indeed been learned. Prior to 9/11, only 10% of passenger luggage checked into US airports was screened for bombs and explosives1. Fourteen years later, we’ve all become accustomed to removing our shoes and limiting the amount of liquid we carry as we pass through airport security. More
Transport Security: An Evolution The changing nature of the terrorist threat – coupled with an increase in so-called ‘lone wolf’-style attacks – continues to demonstrate how transport networks around the world remain particularly vulnerable. James Kelly explores a decade of change in the travel security landscape recently, the introduction of full-body scanners has been a controversial yet effective technological development, and one that was fully supported by British Security Industry Association (BSIA) member companies. Security on board aircraft has also taken dramatic leaps forward since 9/11. Many aircraft now carry on-board CCTV technology, which consists of covert and/or overt cameras installed throughout passenger cabins and connected to a Digital Video Recorder (DVR). Thanks in part to such technological developments, passengers remain confident in the safety of air travel. A thorough report highlighted by The Economist illustrates a 30% rise in commercial air traffic since 9/112.
Security on rail networks Examining transport security on a broader scale, how have road and rail networks adapted to evolving security threats? Members of the BSIA are well versed in providing solutions to the transport sector, both in the UK and abroad. The security of railways has always been a vital consideration and it continues to be an important market for the security sector. Many
James Kelly: CEO of the British Security Industry Association
17
www.risk-uk.com
BSIABriefing November2015_riskuk_mar15 03/11/2015 13:51 Page 3
BSIA Briefing
References 1Templeton T and Lumley T, ‘9/11 in numbers’, The Observer Section of The Guardian (August 2002) (http://www.guardian.co.uk/ world/2002/aug/18.usa. terrorism) 2‘Kaplan E, ‘Targets for Terrorists: Post-9/11 Aviation Security’ (September 2006) (http://www.cfr.org/airtransportationsecurity/targets-terroristspost-911-aviationsecurity/p11397)
rail networks have huge numbers of remote stations and facilities which are prone to vandalism and theft (largely because of their geographical isolation). Specific security requirements for large urban stations must also be addressed. Controlling and monitoring access to various areas of the rail network is a key priority, and an area where BSIA member companies have extensive experience. Further afield from the UK, TDSi is helping to secure one of the largest rail and metro networks in the world in The People’s Republic of China. With a mixture of urban and rural lines and facilities, China Rail has a complex set of security requirements. Key locations include the new China Rail headquarters project in Beijing, a new Media Centre, staff accommodation and medical facilities along with the proposed high-speed rail services. Recently signing a five-year Strategic Cooperation Agreement with China Rail Chen Bang Technology (CRCBT), TDSi will see its security systems installed as part of engineering projects throughout the country’s vast rail network. With around 20,000 stations on the China Rail system, the operator has detailed needs. Integrated security from TDSi will give China Rail peace of mind that its assets, passengers and staff can be protected and that security systems may be expanded safely as the network continues to grow. Closer to home, Kaba (UK & Ireland) has developed a range of products and solutions specifically designed for the rail sector. Most recently, the company supplied high security locking solutions to Hitachi Rail Europe, whose new electric and bi-mode trains are currently used to connect central London through St Pancras International while also serving areas of East London and Kent.
Safeguarding vulnerable employees Of course, on the rail and road networks, the safety of crew and employees is as vitally important as the protection of passengers and cargo. Research conducted only recently by the BSIA’s Lone Worker Section showed that the employee group facing the highest level of security risk on the UK’s transport network is drivers, including those working in longdistance HGV road haulage as well as LGV or local delivery drivers.
“Many rail networks have huge numbers of remote stations which are prone to vandalism and theft. Specific security requirements for urban stations must also be addressed” 18
www.risk-uk.com
“Drivers in the UK are required by law to take statutory rest breaks under the Working Time Directive, but often find there’s a lack of suitable and secure haulage parking,” asserted Will Murray of BSIA member company Guardian24. “As a consequence, drivers can find themselves alone in lay-bys or industrial estates, leaving them extremely vulnerable.”
Threat of violence According to a recent survey conducted among BSIA member companies, physical violence is the biggest threat facing lone workers in the transport sector, in addition to armed robbery and verbal assault. Given the high value of some consignments, haulage drivers can be a common target for criminals with frequent reports of assaults and theft within the industry. In fact, a survey conducted by the International Road Transport Union shows that one-in-six HGV drivers experience an attack or assault while in the course of their duties. Understanding the risks faced by their lone working drivers, haulage company Gregory Distribution set about sourcing a BS 8484approved lone worker personal safety service, and eventually chose BSIA member company Skyguard’s MySOS devices, which are easily attached to a set of keys or carried on a belt holster. The MySOS device allows users to raise an alarm at the press of a button should they feel that their safety is compromised. Once an alarm is raised, Skyguard’s trained and experienced Incident Management Centre controllers will listen in, locate the user via GPS, assess the situation and subsequently take the most appropriate action. Jamie Walker, contracts manager at Gregory Distribution, explained: “We needed to ensure that all of our drivers are protected and that everyone is assured they have a back-up in terms of communications and response. Skyguard’s solution provides us with exactly that assurance.”
Looking to the future With the risk from ‘home-grown’ terrorists on the increase, and the greater need for transport security in light of the current migrant and refugee crisis, it’s clear to see that the transport security landscape is set to change and evolve even further in the coming years. That being the case, the private security sector will no doubt continue to play an important role in providing innovative solutions that afford an holistic security regime across all phases of the journey for passengers, cargo and transport sector employees alike.
Project1_Layout 1 02/11/2015 12:20 Page 1
SecurityManagementStrategiesfortheFuture November2015_riskuk_apr15 03/11/2015 14:20 Page 1
The Security Manager of Tomorrow Who manages security? The response to this question is most likely to be: “The security manager, of course.” Maybe this remains the situation in some organisations. However, as Mike Kenny describes, the traditional notion of protection being all about officers, fencing and alarms ‘to create a secure, crimecontrolled environment’ is unlikely to be the most appropriate, holistic or businessorientated management strategy for the modern-day risk professional
or today’s security manager, analysis needs to centre on ‘what is security and how is it perceived?’ Security has various connotations and perceptions, both positive and negative. In the present globalised corporate environment, perception has significant influence. The usual – some might say predictable – application of primarily physical and technical measures restricts mitigation options to the oft-quoted quartet of ‘deterrence, detection, delay or response’ mechanisms when looking at asset protection. In the ‘shape-shifting’ world of the blended threat, such as a combined cyber attack on both physical and logical security systems, the use of the term ‘security’ may be difficult to fully articulate before a sceptical audience, and particularly so if the approach to providing the organisation’s security is silo-based wherein physical asset security has little interaction with those providing logical security elements. This underlines the dilemma of security terminology. Using ‘security’ as a term may not be appropriate in certain organisations. Creative enterprises with globalised, de-layered and/or matrix organisational structures and a youthful entrepreneurial demographic may hold negative perceptions of ‘security’. The security function may struggle to communicate what ‘security’ means within an organisation. In the case where key company assets such as brand, reputation or a proprietary business methodology are intangible, the security manager may be better advised to ‘brand’ their security approach as ‘protection’ and avoid the potentially negative perception of the term ‘security’ altogether.
F
Fitting in with the strategy
Mike Kenny CSyP: Training Manager at ARC Training
20
www.risk-uk.com
The security manager must assess where they fit into the commercial strategy of their enterprise and the value they bring to the organisation. Security often struggles to shed itself of the ingrained perceptions of being a cost centre rather than a profit centre. Return on investment is key for most business units, and the security manager needs to be able to quantify – or qualify – where they add value. For Risk UK’s readers who are scanning this article beware. Your management may well be contemplating that question right now and asking: “Who should we have managing our security?” Potentially, you may be the problem. As security – to use a collective noun that encompasses risk, loss and protection et al – is
a business function, is there a need to employ business people or security people? A longstanding dilemma, and one that’s often argued, is that in the traditional sphere of security it’s the wisdom of ‘hands on’ experience that prevails over business knowledge. However, the old routes to entry – from the police service or the Armed Forces – may be viewed as restrictive in the competencies they purport to bring to the security sector. To add to existing experience, the ‘second career’ security practitioner has to be able to demonstrate business acumen, develop positive working relationships within the organisation and evidence contribution to the bottom line. These are now prerequisites. As one academic commentator puts it: “First, the security industry needs to move away from the ex-policeman’s (and it’s usually men) second career image. The security manager needs to be perceived as a risk professional in their own right” (Borodzicz, 2005). The security sector has evolved since 2005, but the issues of being perceived as a nonprofessional industry sector still persist, albeit for a variety of reasons. Traction being gained through the increasing realisation within the security world that educational, vocational and professional competency is essential if we’re to gain the necessary respect within commercial arenas as ‘business enablers’ is cause for great optimism.
Security or risk? Let’s return to the earlier question: ‘What is security?’ As highlighted, the term ‘security’ can be perceived as having negative connotations and perception is everything. The security manager has a number of tools at their disposal to determine how (traditional) security should be deployed. Methodologies have developed over a number of years, usually by sector. For example, the oil and gas industry has the American Petroleum Institute’s Security Vulnerability Assessment firmly in place. With increasing recognition for international standardisation, the recently-published Risk Assessment Standard RA.1-2015 (developed by ASIS International in partnership with the Risk and Insurance Management Society and accredited by the American National Standards Institute) provides a system for demonstrating a sound and consistent methodology towards evaluating risk-based decisions and developing security mitigation strategies.
SecurityManagementStrategiesfortheFuture November2015_riskuk_apr15 03/11/2015 14:21 Page 2
Security and Risk Management: Strategies for the Future
These methodologies should be used to inform and align thinking on risk, but not be prescriptive or deterministic. If a collaborative risk methodology is used across an organisation then this should enable the security manager to elevate the sphere of influence of the security function and provide a ‘step change’ towards security as a business enabler. This is the catalyst for the security manager to then adopt or promote the methodology of Enterprise Risk Management. As mentioned, the security manager needs to be recognised as a risk professional within his or her own enterprise. Therefore, the question as to who manages security becomes subservient to the requirement for quantifying risk across the organisation. There should be a commonality of purpose and a standard mechanism in order that the enterprise as a whole manages risk. The issue of security, therefore, becomes the implementation of control measures. These are owned by all business functions. The establishment of an Enterprise Risk Committee or Risk Council ensures that the security function demonstrates its overall effectiveness at executive level. The security manager should be collaborating across the enterprise to challenge and shape perceptions in order that the security function is synonymous with risk management. Ergo, as Borodzicz observed, the security manager becomes the risk professional.
Agile and business-focused The agile and business-focused security manager must be able to demonstrate understanding of the threats facing the organisation in both the static (‘pure’) and the business (‘dynamic’) risk landscape in order to convince the C-Suite that the enterprise security function is a business enabler. Notwithstanding that managing risk demands we implement security through appropriate controls, the security manager must be aligned to the business strategy by identifying – and operating in concert – with their business unit peers. They must be able to identify the political, economic, market, brand and potential compliance risks. Unchartered territory for a good majority of ‘second career’ security managers, it must be said. The kinetic threat posed by the exponential rise in cyber crime looms large as recent events at TalkTalk will testify. This is an environment where the security manager must seek to control the narrative and promote effectiveness. Acknowledging the interdependency of physical and logical security is paramount if
we’re to understand the threats and provide a cohesive organisational mitigation strategy. The spectrum of enterprise assets extends beyond the established security manager classifications such as people, property, information, operational continuity and reputation. Brand, environment, communities, supply chain and a host of tangible and intangible assets are now vulnerable across the enterprise portfolio. The challenge for today’s practising security manager is to acknowledge an understanding of the logical vulnerabilities that an enterprise now faces in the flux of a global risk landscape. This demands both a strategic and tactical knowledge of the technologies that secure an organisation’s assets. Collaboration, building key Board-level relationships and contributing to an organisation’s business strategy forms the framework for sound risk management that will ultimately inform the risk and security management mitigation process. Recognising that Enterprise Risk Management and security convergence are now key elements within the risk and security management equation is the important baseline upon which the 21st Century security manager must operate. In time, the ideal scenario would be to elevate the role from security manager to risk professional and enterprise strategist.
“The security manager should be collaborating across the enterprise to challenge and shape perceptions in order that the security function is synonymous with risk management” 21
www.risk-uk.com
Project2_Layout 1 02/10/2015 13:47 Page 1
Tested, Certified, Approved and Preferred. LPS 1175 SR1 to SR5 CERTIFIED
APPROVED FOR UK GOVERNMENT USE
PAS 68 CERTIFIED
Perimeter Intrusion Detection Systems
SBD POLICE PREFERRED SPECIFICATION
Innovative and proven perimeter security solutions from the experts. In the last 10 years, we have done more to respond to the changing landscape of physical perimeter security than any other company in the UK. That’s why today, we can offer the widest selection of LPS1175 and PAS68 certified, approved for UK Government Use and Secure by Design preferred fencing and gate solutions available; including unique designs combining timber with steel.
Timber and steel fencing
Vehicle and pedestrian gates
HVM
Bespoke solutions
Noise barriers
Pedestrian safety
Vehicle access and parking control
Access control
Secure storage
Find out more about how we can help secure your perimeter against a variety of threats by calling an expert on 0800 41 43 43 or visit us at jacksons-security.co.uk
E
MONTH
E
AU
E E
SE
T
E
E
AR NT A
M AT I
ON
YEARS
TO
GU
YEARS
AR NT A
I CE LI
FE
GU
Head Office: 402 Stowting Common, Ashford TN25 6BN.
RV
GU
AT ME N T
RE
AR NT A
www.jacksons-fencing.co.uk
DigitalEvidenceDevelopmentsinTechnology November2015_riskuk_apr15 03/11/2015 13:54 Page 2
Digital Evidence: Developments in Technology
Transformation for Criminal Evidence ccording to one particular quote that you’ll no doubt have read at some point or another, ‘the wheels of justice turn slowly’. When it comes to taking advantage of digital evidence technology in the UK’s criminal justice system, and sharing it between the police service, the Crown Prosecution Service (CPS) and other parties, it’s a sentiment that has felt painfully true in recent years. However, according to some of those most closely involved in pushing for the adoption of a more efficient and unified approach towards evidence handling, those same wheels may be about to speed up. Although there are huge potential savings to be made by storing and sharing files more efficiently, at a time when dramatically shrinking budgets provide a strong motivation to do so there are nevertheless significant hurdles still to be overcome. One of the problems is the localised nature of our legal system, with different police forces using their own individual recording systems and working with the CPS locally in their own preferred ways. Larger police forces such as West Midlands, Greater Manchester, South Yorkshire and the Metropolitan Police Service have the resources to keep up, but for some smaller forces it’s more difficult to do so. A significant hurdle has also been the need for investment and a commitment to spending up-front in order to achieve cost savings through time. Although it would save money if physical copies of recorded evidence didn’t have to be generated and transported between the police, the CPS and lawyers, no-one has yet quantified what those savings would actually look like across the whole country.
A
Justifying the investment Ambitious and centralised IT projects in the public sector have a perceived poor track record of delivery, so it’s hardly surprising if there has been something of a reluctance to push for national change aimed at sweeping away a system which has evolved piecemeal with no massive headline cost, and which has also appeared to be workable. The end result is that, although digital file sharing technology has moved on and there are prime examples of it being used in other countries, the UK hasn’t really moved with it. “We were rightly seen as leading the way in suspect rights and fairness when interview recording was pioneered in the early 1980s,”
commented Andy Griffiths, former technology lead for the National Investigative Interviewing Strategic Steering Group. “In recent years, though, with the move away from tape recording systems to digital recording, we came across the problem that high standards and formality, both of them cornerstones of justice, can also produce inflexible systems that are rule-bound and unable to change.”
Innovation at force level Innovation can happen at the individual force level. On the one hand the introduction of Police and Crime Commissioners (PCCs) may have led to greater fragmentation and made it less likely that forces will walk in step as they did with ACPO (on some issues, at least), but on the other the 41 PCCs presently in situ have every motivation to look for innovation and subsequently demonstrate successes as they seek re-election. One of the upsides of the UK’s current policing model is that new things can be tried by different police forces. Experimentation is possible while good practice might spread organically. Indeed, this is what may now be happening within digital evidence handling. Since 2010, Reliance High-Tech has been working with individual police forces – including Greater Manchester, West Midlands, Staffordshire and several others – to roll-out a new generation of investigations-based technology (the first digital system was introduced in the UK by Sussex Police following on from the example set by Norway Police who
A groundbreaking digital evidence sharing agreement orchestrated between the West Midlands Police and the Crown Prosecution Service goes live this month and could well set the stage for national efficiency savings on a significant scale. Brian Sims reports on an important initiative
23
www.risk-uk.com
DigitalEvidenceDevelopmentsinTechnology November2015_riskuk_apr15 03/11/2015 13:54 Page 3
Digital Evidence: Developments in Technology
“At the heart of the solution is Streaming Server technology. Importantly, this acts as the central hub into which all interviews are directed” adopted it in 2005). “The advantage of this new solution over previous methods is that it ensures consistency,” explained Simon Jones, Reliance High-Tech’s corporate solutions manager. “Our software-based approach ensures that interview recording is managed correctly. Very little training is required to use the system and the recorded evidence is stored centrally on a secure server.” At the heart of the solution is Streaming Server technology. Importantly, this acts as the central hub into which all interviews are directed. These recordings can come from fixed and portable equipment. A wide variety of interview types – including PACE, ABE and Voluntary Attendance – may be covered. The recorders themselves all contain the Indico Recorder Standard software. The system is easier for those conducting interviews to use correctly and for CPS lawyers and relevant agencies to access. This is something of a vital development, then, but only goes so far in terms of taking advantage of what technology now offers. Police forces are already looking towards the next step.
More efficient delivery model At West Midlands Police in particular, a close partnership with the CPS has resulted in an agreement that interviews will be transferred digitally. Inspector Deborah Johnson, the force’s lead officer for the digitalisation programme, confirms that a Service Level Agreement is about to be signed between the force and the CPS which will allow files to be shared. Johnson views this development as a “groundbreaking advance” which all parties are keen to make work because it fits perfectly with the Transforming Summary Justice agenda of cutting down on wasted time. “The CPS will be able to either download or stream interviews from us, depending on whether they want to store them,” stated Johnson. The system is already up-and-running, although not yet tested in a ‘live’ environment. Perhaps the most significant thing about this development is that, if proven successful, it then clears the way for other forces to follow suit in adopting a more efficient model. “The CPS is a national organisation,” continued Johnson, “so what it agrees with one police force is, by default, agreed nationally. The CPS has a national IT system, unlike police
24
www.risk-uk.com
forces which use whatever they’ve gone out to tender with and decided to purchase. Therefore, other police forces will be able to follow in our footsteps so long as their IT set-up is compatible.” The switch from taped interviews which need to be physically transported and stored into digital files is an important step forwards.
Body-worn camera evidence Inspector Johnson is now looking at how bodyworn video recordings may be handled with the same efficiency – both stored and shared. “The groundwork has already been done,” Inspector Johnson told Risk UK, “so my feeling is that it will be a relatively seamless process. The same principles will apply, but rather than just storing digital interviews we’ll also be uploading video evidence.” The use of video evidence in this way is already being trialled in one area and the plan is to extend its scope further. Andy Griffiths agrees that the increased use of body-worn cameras will prove popular. “They are fair and transparent,” asserted Griffiths. “People would like to see them used more widely. What’s still missing is an agreed system for storing the material and moving it to the CPS. Instead of video recordings being burned to a disk and carried between parties, they need to be shared using secure servers.” Looking ahead, many of those most closely involved believe that the ideal solution – in terms of efficiency, transparency and simplicity – will be to have some kind of central repository wherein police forces could place all of their evidence for court cases such that the CPS and other authorised parties might retrieve it. There’s a good chance something like this will happen at the regional level, evolving and developing organically between forces. That’s the firm belief of Terry Sallas, managing director at Reliance High-Tech. “This is the natural and inevitable point that the criminal justice system is heading towards,” outlined Sallas. “Although in the past I would have been cautious about predicting when we might reach that point, the work being carried out by the West Midlands Police and a number of other forces means that we’re now seeing how change can be made at force level with the potential for sharing these developments between regions.” The prospect now is for regions to work together on developing shared digital evidence handling systems which make full use of audio and video technology. The end result will be that this vital area of the criminal justice system works far more efficiently.
Project1_Layout 1 03/11/2015 15:07 Page 1
SecuritySolutionsforBuildingRefurbishmentProjects November2015_riskuk_sep14 03/11/2015 13:42 Page 1
Alterations Under Lock and Key Even when appropriate measures are in place, security risks will often need to be reassessed and expanded as a result of any building refurbishment work. Jeremy Cassady presents some security solutions for risk management professionals
rganisations undergoing refurbishment projects centred on their business premises are under pressure to keep costs low while at the same time still meeting all relevant Health and Safety requirements. Thankfully, there’s now a wide range of low cost safety and security solutions available that are designed to meet any requirement, ensuring refurbishment budgets don’t have to be stretched to ensure that a safe environment is maintained at all times. That said, this welcome breadth of choice goes hand-in-hand with the need for reliable advice such that end users might traverse the array of options. An experienced locksmith, for example, is extremely well placed to offer advice that will ensure the right solution is chosen for each application. Access control is, of course, one of the primary security concerns in many commercial buildings, particularly applications such as student accommodation, hospitals and educational buildings which have a high number and turnover of traffic. Business owners or facilities managers usually want to implement a more streamlined way of maintaining lock security as inconvenient or time-consuming protection measures can lead to them being employed only intermittently by building users or, in the worse case scenario, disregarded altogether. A master key system can provide a very practical and user-friendly solution, as well as
O
26
www.risk-uk.com
being easy to schedule as part of planned building refurbishment works. This type of system allows key holders to access both the main door of a building and other interior doors using the same key, offering maximum convenience by eradicating the need for excessive quantities of keys to be carried around or stored safely. Master key systems are ideal for a wide range of properties, from offices to commercial buildings, retail stores and hotels and on to student accommodation, and can be easily planned for installation where doors or locks are being fitted or replaced, or even on all existing doors (where compatible) to further reduce costs. As long as doors feature the euro profile cylinder key lock, the capability to switch to a master key system is set up even if only required at a later stage. Leading suppliers will be able to expand system potential still further by offering a ‘one key’ option that not only works on doors, but can also be used to access key cabinet ranges, cash safes, high security postboxes and emergency key holding boxes located around the building.
Access without a key For those applications where the allocation of keys or cards isn’t practical due to the sheer volumes of people entering and exiting the building, digital door locks are widely used because they provide a low cost, easy-to-install access control solution. As is the case with the ‘one key’ euro profile cylinder, digital door locks may be installed on new or existing doors as part of an ongoing refurbishment project. Given that they don’t require additional hardware and are completely self-contained, they’re quick and easy to fit as well as being ideally suited for retrofits carried out on a smaller budget. When undergoing building upgrades, building owners want to know that the work being carried out will last in order to justify any expenditure. This longevity extends to the requirement that any products installed should be adaptable to meet changing needs within the building. As digital door locks offer a fairly simple solution when compared with ‘high tech’ electronic access control options like biometric fingerprint readers, for example, there’s little that can go wrong. Indeed, digital door locks
SecuritySolutionsforBuildingRefurbishmentProjects November2015_riskuk_sep14 03/11/2015 13:42 Page 2
Security Solutions for Building Refurbishment Projects
purchased from a reputable supplier can last for many years. In addition, once installed, they can be reprogrammed at any time such that security may be instantly reinstated if compromised or if there’s a changeover in staff. In student accommodation or educational buildings, for example, where the resident turnover is high, digital locks make it an easy process to amend the password and maintain security without the need for changing locks or keys. There are a variety of digital door lock models to choose from depending on the level of security required. Again, consulting with an experienced locksmith will help risk and security managers select the most suitable product for their particular specification.
Electronic upgrades When updating security measures in conjunction with new building works, safes should not be overlooked. Upgrading a safe doesn’t necessarily mean that existing models will need to be replaced with new versions. Few businesses will spare the budget for this unless the existing safe was faulty or a specific requirement arose for additional safe space. An easy and low cost solution for customers with adequate safe space, but who are looking to move towards a ‘no key’ system in order to monitor safe use more closely, is to upgrade existing key locks with an electronic alternative. One of the main advantages offered by many types of electronic lock is that they allow for multiple user codes as well as providing an audit trail. That being so, use of the safe can be carefully monitored. An electronic safe lock also offers flexibility as the safe combination code can be changed at any time. Unauthorised access is very unlikely as many locks enter lockdown mode after a few failed attempts and are disabled for five minutes before allowing anyone to enter another PIN. Security is assured with full accountability for those individuals authorised to access the safe.
Reflecting on safety Depending on the extent of a refurbishment project, areas of a commercial building can change dramatically in terms of space configuration or might be extended to create new communal zones. For buildings with a large amount of foot traffic in corridors, such as hospitals and educational establishments, convex mirrors are a popular and inexpensive safety measure to counteract any risks in these areas. Used extensively in a diverse range of environments,
such mirrors are highly effective in enhancing safety, security and operational efficiencies by dint of improving surveillance and eliminating blind spots as they have wider fields of view than other reflective surfaces (like flat or concave mirrors, for example). Convex mirrors are often used within manufacturing and warehouse facilities where the risk of collision is high due to large numbers of employees and vehicles continually transporting goods and items. Clear visibility and awareness of one’s surroundings are absolute essentials when it comes to preventing many injuries. According to the latest Health and Safety Executive figures issued in 2013-2014, there were 13,595 reported injuries to employees and an estimated 74,000 unreported injuries in the manufacturing industry alone. It’s important, then, to choose the right convex mirror for a particular job as UK and European legislation requires that certain standards are met in any industry. For example, in the food and drink manufacturing sector, UK and European law requires that all equipment be easy to clean, corrosion-resistant and exhibit ‘imperceptible seams’ to avoid the risk of trapped organic substances becoming a breeding ground for bacteria. An established supplier will be able to provide valuable information to ensure that mirrors selected meet all of a given application’s specific needs and comply with the latest regulations.
Jeremy Cassady: Managing Director of Securikey
Knowledge is central During any refurbishment project, it’s important that facilities managers and others responsible for implementing effective security measures are aware of the choices available such that they can minimise any new risks that may arise without adversely affecting their budget. Trusted security equipment manufacturers are well placed to share their expertise at an early design stage. They’re able to recommend solutions that are inexpensive as well as being compliant with all of the relevant legislation and any standards that may be required by insurance companies. Collaboration with experts in the field is always recommended for in-house risk and security professionals as this process can – and does – save time and costs.
“Master key systems are ideal for a wide range of properties and can be easily planned for installation where doors or locks are being fitted or replaced, or even on all existing doors (where compatible) to further reduce costs” 27
www.risk-uk.com
CCTVAnalyticsandCameraPlacement November2015_riskuk_apr15 03/11/2015 13:52 Page 1
CCTV Camera Placement: The Gateway to Successful Video Analytics and the way in which they’re positioned within various settings. Fortunately, there are professionals within the manufacturer and integrator communities that can walk an end user through the process of selecting and installing cameras with a view to maximising the analytics output. It’s also important to know what the potential issues are for the different scenarios such that you can then make informed decisions.
Factors influencing video quality There are many factors that influence video quality, among them illumination, the size of the asset, separating assets from people, obstructions, environmental issues and moving objects. Let’s take a close look at each of these in turn and how correct camera positioning can help optimise the analytics.
‘Location… Location... Location…’ Those words are often associated with the property sector, but the security community can also apply this mantra to the all-important issue of camera placement for optimising analytics. Peter Ainsworth tells us how
28
www.risk-uk.com
o date, the fact that such technology hasn’t always delivered on expectations has arguably been the Achilles heel of video analytics. Understandably, end users want to gather all sorts of data ranging from vehicle number plates through to people counting and on to dwell time analysis, yet it’s absolutely fair to say that the results can be inconsistent. The biggest culprit in creating patchy results has been improper camera selection and positioning. If not handled properly from the onset, the results from the analytics provided by CCTV cameras will never meet expectations. No matter what else you do, if you mount a camera overhead and then decide you want it to read number plates, you will not engender the expected results. Similarly, a CCTV camera that’s installed in the middle of winter near a car park surrounded by trees will likely not be of much use during the summer when the leaves have grown and thus obscure the view, casting shadows and, at certain times, creating ‘interfering’ movement. The process of deriving the most benefit from an analytics system has to begin long before the first images are captured. It starts with knowing what you want the analytics to do and making sure that your expectations are clearly outlined. This will then help determine the types and numbers of cameras used, the mounts on which they’re subsequently installed
T
Illumination Light is essential in creating a good picture. However, too much or too little light entering the camera can have a detrimental effect on any analytics function, causing missed events or creating false alarms. Excessive light can come from a variety of sources such as car headlights or sunlight reflecting from water or glass. To avoid the issue of excessive light, position the camera to the side rather than head on. In this way direct exposure will be avoided. Polarising filters could be fitted to the camera lens in order to deal with this issue, but correct positioning is really the key here. Just as too much light can be a detriment to analytics, so too might insufficient light levels. Shadows from trees, clouds or people can cause analytics to misinterpret activity, triggering alarms when no incident has occurred or, if the activity happens within the shaded area, it may not be visible enough for analytics to see it. If it’s necessary to locate cameras in low-light areas, consider day/night cameras as well as exploring ways in which to use artificial light for helping illuminate the scene. Size of the asset Analytics perform better the larger the object is in proportion to the camera view. With a fixed asset in the retail space, such as a shelf full of merchandise, the best way to render the proper view is to move the camera closer or change
CCTVAnalyticsandCameraPlacement November2015_riskuk_apr15 03/11/2015 13:52 Page 2
CCTV Camera Placement: Focusing on Video Analytics
the focal length of the lens such that the merchandise represents at least 5% of the camera view. Separating assets from people Analytics can distinguish people from objects, of course, but over time if the two occupy the same space within the camera view it becomes that much harder for the software to differentiate between them. Someone standing still in front of a shelf filled with merchandise could be mistaken as part of the display. When they move, it might look as if something has been stolen. Correct camera placement and the proper use of analytics tools – such as drawing a detection region that only includes the assets, but excludes the people – can address this issue.
“The process of deriving the most benefit from an analytics system has to begin long before the first images are captured. It starts with knowing what you want the analytics to do” Having addressed the potential areas that can influence video quality, another factor that must also be considered alongside the camera placement is what you are hoping to achieve with your analytics. An activity such as people counting functions best on a two-dimensional scale, so a camera mounted overhead works better than one positioned at eye level. With a straight on view, people coming into a building – such as those entering the reception areas of a stadium – might block others from the camera view. However, by positioning the camera overhead, each person can then be identified on a separate basis. Dwell and linger is another great analytics tool that can be enhanced by the correct placement of the camera. A retailer who wishes to measure how many people look at a display and for how long would need the camera to have an unobstructed view as well as a field of view large enough to monitor all the space around the display to capture people as they enter and exit the area.
Obstructions There are few scenarios that allow cameras to have unobstructed views from all angles, so it may be necessary to consider multiple cameras positioned for wide angle, overhead or other views to cover a given area appropriately. When positioning CCTV cameras, you want to avoid blocking the view with fixtures, furniture, shrubbery or even people. At a cash register, for instance, it’s better to locate your camera with a sidelong shot that takes in both the employee and the customer without obstruction rather than pointing the camera head-on.
Requirements for the future
Environmental issues Weather most certainly affects how video analytics work, as constant movement from wind, rain or snow can trigger false alarms. It’s better to avoid camera placement where moving branches are likely or where precipitation can directly affect the view. Ultimately, of course, we cannot control the weather or the environment. That being the case, by far the best option is to understand what impact the environment will have on the analytics programme itself.
When planning your surveillance solution, also consider what might be the necessary requirements in the future. If the current plan is for general surveillance but the future goal is number plate recognition, consider sourcing and placing cameras with both needs in mind. This may not always be possible, but a little upfront planning is often extremely helpful. The science of video analytics relies very heavily upon the art of camera placement. Considering them together, from the planning stage through to execution, will help ensure that the outcome is a successful one.
Peter Ainsworth: Director of Product Management (EMEA) at Tyco Security Products
Moving objects Like trees swaying in the wind, all moving objects can cause issues. Therefore, when positioning cameras think about their proximity to anything that provides constant motion: escalators, automatic doors or even vehicles that may be viewed through windows. Where possible, aim the cameras away from any motion that’s not necessary to the system’s operation. If this isn’t possible for any reason, use the ability to regionalise the analytics’ areas of interest and to restrict areas of constant motion.
29
www.risk-uk.com
Project1_Layout 1 03/11/2015 15:10 Page 1
&
W E NE OV I
R P M
D
Waterproof Range of Call Points & Push Buttons
Highly versatile range of attractive Resettable Call Points and Push Buttons combining unique design, quality and value! Specially designed for use within harsh environments, the Waterproof range of Call Points and Push Buttons is ideal for indoor and outdoor applications such as oil rigs, ships, factories, wash down and pool side areas.
EN54 APPROVED Cert. No 0359- CPR-00439 (WRP2-R-01 ONLY)
For further information, contact Sales info@sti-europe.com • 01527 520999 • www.sti-europe.com
MANAGEMENT SYSTEMS
Assessed to ISO 9001 LPCB ref. no. 653
Cert. No 0359CPR-00439
TransportSecuritySolutionsFrontCover November2015_001 03/11/2015 13:33 Page 1
November 2015
Security and Fire Management
Direction of Travel Security Solutions for the Transport Sector Transport Security Expo 2015: Event Preview Situational Awareness: CCTV’s Complete Observations From Station to Station: Network Video Case Study Planes, Trains and Automobiles: 360-Degree Surveillance
Project1_Layout 1 23/07/2015 17:10 Page 1
Track
Keep persons of interest in view, as they move – even at speed.
Locate
Gives you the ability to pinpoint persons of interest fast and accurately.
Zoom
Gives you the detail you need to make informed decisions.
Our focus is helping you to locate, track and zoom in on details. Bosch motion control cameras off er you total control of what you choose to see, and the level of zoom you use to identify objects over large distances, regardless of movement. Learn more at Tel: 01895 878095 | Email: security.systems@uk.bosch.com
TransportSecuritySolutionsTransportSecurityExpo2015 November2015_riskuk_feb15 03/11/2015 13:15 Page 11
Transport Security Solutions: Transport Security Expo 2015
Transport Security Expo 2015 Preview Risk UK: Could you begin by telling us something about your background in relation to Transport Security Expo? Admiral Lord West: During my three years in Government, I led the development of our counter-terrorism strategy CONTEST 2 and produced the first UK national security strategy as well as conducting a great deal of work relating to border security and protection against nuclear, biological and chemical attacks perpetrated by terrorists. I also produced the UK’s first-ever cyber security strategy. Risk UK: How did you become involved with Transport Security Expo and, specifically, the event’s dedicated Advisory Board? Admiral Lord West: I first became involved with Transport Security Expo some three years ago. Armed with a substantial interest in security matters and having been the Government minister responsible for security, I was very keen to help raise awareness of British capabilities in the security field. On that basis, I promoted the show to everyone I felt would be interested in attending and hosted a lunch at the event during which I gave a short speech. When the Advisory Board was first formed, I was asked to join and was very happy to do so having had that prior involvement with the Expo. Risk UK: What can you tell Risk UK’s readers about the specific subject of border security? Admiral Lord West: We’re living in a more and more chaotic and troubled world. There are huge disparities of wealth and opportunity. It became quite clear some years ago that demographic pressures were going to mean there would be vast movements of people. Those pressures have been exacerbated by the trouble in Syria and the collapse of Libya as a nation which has facilitated the trafficking of people across the Mediterranean to Italy. It’s an issue that has to be addressed because there are probably about 100 million people in the world who would rather live in Europe than where they reside now. In addition, as the threat from terrorism waxes and wanes – and it’s waxing at the moment because of the success of ISIL – a large number of countries, particularly in Europe and the Middle East, realise how important it is to have proper control over their borders. These countries are looking for assistance, and this is where the UK – and specifically UK security
Transport Security Expo 2015 – for which Risk UK is an Official Media Partner – runs at London’s Olympia on 2-3 December. In this preview, former security minister Admiral Lord West outlines border, maritime and rail security issues
companies – can do much to help because we have a great deal of expertise in this area. It’s also the case that many refugees, and indeed terrorists, travel by conventional means – ferries and aircraft – and you need to have a very good handle on who exactly is getting on and off and who’s travelling where. First and foremost, there’s a need to control who’s coming into the country and, second, a requirement to make sure that terrorists are not boarding planes or boats with the express intention of detonating explosives on board. Risk UK: At present, are there any specific issues relating to maritime security and security for port areas? Admiral Lord West: Yes. For example, I started to realise some time ago that containers presented a particular security risk and a lot of work has gone on to make sure that we now monitor and control them – where they’re going, where they’ve come from – because, of course, we’re talking about tens of thousands of containers coming into the country every day. We’re also seeing a great stream of drug traffic coming across from the West Indies, some of which is directed towards Europe. We need to monitor our coastal waters very well.
*Transport Security Expo is open to all professionals in the industry and provides an excellent forum for networking, enabling delegates to engage with current and future solutions suppliers, meet with exhibitors (via the Hosted Buyer Programme) and connect with transport security specialists from around the world **For more information and to book your place visit: www.transec.com
33 www.risk-uk.com
TransportSecuritySolutionsTransportSecurityExpo2015 November2015_riskuk_feb15 03/11/2015 13:15 Page 12
Transport Security Solutions: Transport Security Expo 2015
One of the things I did as chairman of the National Security Forum when I was in Government was to set up the National Maritime Intelligence Centre. Made up of a number of partners, including the military, the coastguard service, the UK Border Agency and HMRC, the Centre uses aircraft and ships to monitor and track coastal traffic. There’s also the technology, of course. Within the ports, we now have methods of looking into containers without having to open them all up as well as equipment for detecting radioactive material. We also have the kit for detecting drugs on-board boats which means we no longer need to take the whole vessel. One of the things I’ve been calling for, not just at ports but at airports as well, is a more holistic and joined-up approach. At Transport Security Expo 2015, there will be features that bring technologies and products from a lot of different companies together to show how, when we take a composite view, it’s possible to make transport systems much safer for the travelling public while also rendering the actual assets themselves more secure. Risk UK: Can you tell us what’s happening around security for the rail networks? Admiral Lord West: When you look at railway
systems, particularly commuter services, the sheer number of people makes it a very different problem from, say, airports. When you have six million people coming into and out of London each day, that’s quite an issue. Similarly, after the 7/7 attacks on the London Underground, we looked at ways of making that more secure and a lot has been done such as addressing the problem of communications underground, including the issue of too many people talking on the same frequencies. It’s a fact that, in an open society, it’s very difficult to ensure 100% security over something like a rail network. Having said that, the risks are greater in some other countries than they are here, and I think delegates from overseas will be grateful for the ideas and products on show at Olympia in December. Risk UK: Finally, what would you say to risk and security professionals from the UK or overseas who are thinking of coming to London for the show and the conference programme? Admiral Lord West: Those involved in the transport industry will find Transport Security Expo of great value. They will see the very latest equipment and the most joined-up ways of combating the terrorism that seems to be permeating our world at the present time.
Project2_Layout 1 03/11/2015 16:24 Page 1
, 2015 4 2 r e b Novem l House l e Sopw ns, UK a St. Alb 15 26, 20 r e b Novem , Lund Q Axis H en Swed 37 Axis part
n
ers showca Agent Vi, Aim sed! etis, Avaya, BCD Video, Technology, Buffalo Cathexis EU , Cognimatic Barriers, En s, Digital telec, Everse en, Facit Dat Faltcom, Gen a Systems, etec, Icomer a, Icomply, In Innoware, IP fobric, S, Milestone, Mirasys, Ned Optex, Qogn ap, ify, P3R Lab, Prism, Rayte Technologie c, Razberi s, SeeTec, Se cure Logiq, Intelligence Sound , Thinking Sp ace, Veracity Wavestore, , Vizualize, Western Dig ital, Xtralis, Zenitel
Axis Partner Showcase 2015
Meet the leading experts in network video. Join Axis Communications and 37 of the most innovative companies in the network video industry and find out what solutions, technologies and products are available today to help you grow your business!
Register now! www.axis.com/events/ne-adp-days/registration
Video management software, security applications, business management applications, hardware/technology, physical access control, transmission and storage, and more!
TransportSecuritySolutionsSituationalAwareness November2015_riskuk_apr15 03/11/2015 13:16 Page 1
Transport Security Solutions: Situational Awareness
Video surveillance operators at airports face many challenges when looking to safeguard passengers, airport employees and buildings alike. Considering that even the most diligent and professional security officers might miss significant events on monitor screens after a set time period on duty, Constant Rutten searches for a satisfactory solution
Aware of the Security Situation
he aprons and the security search area are two important zones to be observed. Often large in scale, it’s not always possible to cover them in adequate detail using either a single or several cameras. In truth, many cameras are needed to capture everything that’s happening. It follows, then, that myriad monitors are required to display images from all of the important areas which can make it difficult to maintain an adequate overview. There are also areas in the airport to be observed which are much smaller in size, but due to layout still require multiple cameras if surveillance coverage is going to be adequate. Think of shopping areas and those zones with lowered ceilings, for instance.
T
Optimal situational awareness
Constant Rutten: Marketing Application Design Specialist for Video Systems and Products at Bosch Security Systems
36
www.risk-uk.com
For optimal situational awareness, in an ideal world CCTV operators want a complete overview of the security check or airplane servicing areas while at the same time having the ability to select highly detailed views of critical parts within those zones. For smaller areas, cameras are now available that offer panoramic views, duly capturing a 360-degree or 180-degree panoramic visualisation of a given scene. While the full scene is recorded for forensic search after the fact, the operator can select multiple and interesting ‘cut-outs’ of a scene for a real-time view. The morphing of the warped panoramic image is done either in the camera or within the viewing station. These cut-outs can be viewed and recorded separately. When it comes to forensic investigation, CCTV operators may use the cut-outs or the complete overview where electronic PTZ operations can be performed.
The problem of capturing relevant details in areas such as airport aprons can be improved – at least in part – by the deployment of multiple moving (ie PTZ) cameras. These enable operators to zoom in on a specific point of interest and subsequently capture more detail. However, the downside is that, whenever the cameras are zoomed in, the overview of the entire area is lost. To solve this problem for large areas such as airport aprons and security zones, we’ve partnered with Coherent Synchro to deliver the best of both worlds: overviews and essential details on a simultaneous basis. The solution works like this. Multiple cameras are positioned in such a way that they cover the entire area of interest with a slight overlap between the camera views. Each camera provides a low and high resolution stream to the viewing engine. This engine generates a complete overview by stitching the low resolution streams of all cameras together into one single stream. The stitched image offers the surveillance operator a complete overview of the entire area, in turn providing full situational awareness. Simultaneously, the operator can select multiple regions of interest by simply panning over the stitched image. These regions of interest may be viewed in the highest possible detail by stitching the high resolution streams of the respective cameras. All stitched streams generated by the viewing engine may be processed by any ONVIFcompatible video management software engine. If the camera streams are recorded, both overview and selected high resolution streams of the regions of interest can also be used during playback.
Project1_Layout 1 02/11/2015 12:19 Page 1
RUN Milestone Mobile AND DOCUMENT ANY EVENT WHILE IT HAPPENS
Let your staff stream live video from their smartphones, wherever they are By allowing your staff to stream live video from the device’s camera directly into your Milestone solution, the Milestone Mobile app gives operators in your central monitoring station immediate awareness of incidents no matter where they occur. Compatible with all Milestone XProtect® video management software and the Milestone Husky™ NVR series, the Milestone Mobile app provides extended live visibility and the ability to use video streams in later investigations. Explore more surveillance and security opportunities with Milestone video management solutions at milestonesys.com
Milestone Systems UK Tel: +44 (0) 1332 869380
POSSIBLE STARTS HERE
TransportSecuritySolutionsNetworkVideo November2015_riskuk_apr15 03/11/2015 13:17 Page 1
Transport Security Solutions: Network Video Case Study
From Station to Station
Recently, London Underground management decided that a new CCTV system was needed at Canary Wharf Station to replace the ageing analogue-based solution that had been in residence for the past 17 years. Lucas Young outlines the positive differences realised by the move to network video
ompleted back in 1998, Canary Wharf London Underground Station – designed by celebrated architect Sir Norman Foster – is the largest and arguably most magnificent of the stations which extended the Jubilee Line from Green Park in central London out as far as Stratford in East London. Surveillance specialist Axis Communications’ partner organisation telent Technology Services was recently tasked with upgrading the station’s CCTV system as part of its long-term refurbishment and maintenance contract spanning London Underground’s 100 Jubilee, Northern and Piccadilly Line stations. telent had already implemented its MICA Station Management System (SMS) to support an IP video upgrade of one of the UK’s major Network Rail stations during 2012-2013. As part of that project, Axis Communications’ network cameras had been successfully deployed after Network Rail approved them for use in its stations. Indeed, Axis became the first IP camera manufacturer to achieve such a status. Both telent and London Underground conducted camera performance tests with a number of major systems providers’ IP cameras before selecting Axis Communications’ P1354 model based on its ability to integrate with both legacy and new station management platforms and a propensity towards “strong performance” in low light conditions.
C
Station Management System Lucas Young is Business Development Manager for the Transport Sector at Axis Communications
38
www.risk-uk.com
A total of 164 Axis cameras are now installed as part of the IP video upgrade at Canary Wharf Station. 160 slimline P1354 network cameras are deployed inside existing London
Underground-approved housings, themselves considered an architectural feature, to cover all platforms and concourses. A further four Q6035 PTZ dome network cameras have been installed for additional coverage. The shape of the P1354 units also provided enough space within each housing to fit the ruggedised, London Underground-approved Veracity HIGHWIRE LongStar Ethernet-overCoax adapters such that the cameras are able to transmit high quality video images over up to one kilometre lengths of existing coaxial cabling infrastructure through to telent’s SMS. As part of the upgrade, telent’s MICA SMS has been integrated with London Underground’s existing Station Information Management System. The intention here was to minimise changes to the Control Room operators’ on-screen experiences while offering the added IP CCTV control which MICA already provided. In practice, this has enabled a seamless migration. MICA was first developed by telent over a decade ago and is now deployed in more than 100 railway and London Underground stations. At Canary Wharf, the MICA system manages all communications associated with Help Points, customer information systems, SCADA management systems, CCTV, Public Address and lifts and escalators.
Better image quality Dave Perry, delivery manager for station capital expenditure at London Underground, said: “The new cameras give us a platform for costeffective remote trouble-shooting and maintenance. They were easily integrated within existing station systems ensuring that our operators can quickly find specific cameras on the system and access high quality video on screen in the event of any safety incidents.” telent was able to complete the upgrade to IP video in just eight weeks without any outage whatsoever. For their part, London Underground’s management team members are very happy with the resulting improvements in image quality and their positive implications for both passenger safety and security. “As we move towards 24-hour operation on London Underground stations in a few months’ time,” continued Perry, “reliability and ease of maintenance are going to be key requirements. The newly-installed cameras have met all of these needs and it’s likely they’ll be deployed in other Jubilee Line extension stations as they too are upgraded over the next few years.”
Project1_Layout 1 26/03/2015 21:24 Page 1
<USLHZO [OL M\SS JVUULJ[P]P[` KL[LJ[PVU ]LYPÃ&#x201E;JH[PVU [YHUZTPZZPVU and response capabilities of the award-winning ADPRO 9LTV[LS` 4HUHNLK 4\S[P ZLY]PJL .H[L^H`Z 94.
1 3LHYU TVYL =PZP[ ^^^ _[YHSPZ JVT
TransportSecuritySolutions360Surveillance November2015_riskuk_apr15 03/11/2015 13:36 Page 1
Trains, Planes and Automobiles When it comes to surveillance, transportation sector security managers and risk professionals alike are beginning to realise the inherent value of replacing traditional PTZ fixed cameras with 360degree models that render superior images. Scott Brothers recites the fine detail
ublic transportation systems are no stranger to attack. Look back on 9/11 in the States or 7 July 2005 in London when three separate, co-ordinated suicide bombings took place killing 52 and injuring 700 more. Only recently, three men – a member of the US Air Force, an inactive National Guard specialist and a civilian – thwarted a would-be attack on a train speeding through Belgium. The transportation industry continually strives to seek out ways in which to strengthen the security of hubs and passengers. Across the last five years, there has been an ongoing trawl for new methods and technologies designed to achieve this very goal. When it comes to the use of video surveillance, many transportation officials are realising the value of replacing traditional PTZ fixed cameras with 360-degree variants that offer superior pictures and view quality. With this in mind, let’s take a closer look at the benefits of such technology and how it can deliver new levels of security, reduce up-front capital costs and increase return on investment.
P
The 360-degree advantage 360-degree surveillance cameras are quickly becoming the best way to protect public transport networks due to the wide array of technological benefits on offer. The biggest advantage 360-degree cameras yield is that there are no moving parts so maintenance requirements are reduced. Also, 360-degree cameras are equipped with PTZ capabilities during playback, enabling end users to capture a full panoramic view of the
area without blurred images or mechanical delays. This functionality greatly increases situational awareness. The high-resolution, 360-degree image is dewarped at the viewer’s discretion, and can be processed in real-time or during playback as if the video were live. De-warping is a critical benefit as it enables the end user to gain new levels of insight into a situation and renders the ability to conduct thorough investigations. Within mass transit and public ground transportation, disparities exist between the amount of security protection afforded to these entities and airline security. According to the American Public Transportation Association (APTA), the US Government spends four cents for every transit trip compared to nearly US $9 per trip for aviation. Passengers on both means of transportation rely on the presence of surveillance equipment to help promote public safety initiatives. Studies have shown that the mere presence of cameras significantly deters criminal behaviour and reduces vandalism. In some cases, a single 360-degree camera can replace a number of fixed cameras, resulting in cost savings and increased value for practising security managers tasked with selling technology to their business leaders. Additionally, security specialists can use 360degree surveillance to grasp full situational awareness and thwart potential attacks before they occur, integrating the incoming video with video management systems that can notify security officers of any incidents potentially posing a threat to public safety. 360-degree cameras also offer quick and flexible installation. There’s no need to set the camera angle and lens position for focus, which makes installation more efficient and less costly, in turn enabling financial savings while ensuring the safety of thousands of passengers each and every day.
The Transportation Challenge From airports and ports to buses and trains, 360-degree surveillance technology can help transportation entities better address threats and ensure the safety of passengers. *Platform safety: End users are able to provide an effective and measured response to a given security issue by ensuring that video surveillance works seamlessly alongside video management, alarm and monitoring systems in order to create an integrated solution
40
www.risk-uk.com
TransportSecuritySolutions360Surveillance November2015_riskuk_apr15 03/11/2015 13:37 Page 2
Transport Security Solutions: 360-Degree Surveillance
*Customer satisfaction: 360-degree surveillance can help identify false alarms which often close down stations and ports and cause inconveniences to customers and staff. Unverified alarms can also lead to brand damage and the major loss of income *Training: Security staff at ports and airports can employ captured video data to monitor the effectiveness of employees and processes, observe passenger behaviour and track the journey of a customer’s luggage *Health and Safety: Video surveillance is the best way to capture, track and mitigate threats to the Health and Safety of passengers, affording security officers the ability to oversee a situation and zoom in on a specific incident *Theft and incident reporting: Detection of security breaches and intelligently analysed footage triggers a proportionate and measured response from security personnel in the event of an incident *Terrorism: Increased situational awareness allows security staff to view ‘the bigger picture’ as well as zoom in on specific threats to determine whether those threats are actionable Transportation environments require easily adaptable, scalable and reliable 360-degree camera systems to provide maximum situational awareness. Train and bus stations, whether above ground or below, rely on 360degree cameras to protect platforms by panning or zooming into every corner of the space without the need for extra camera coverage. Rush hours or city events that draw large crowds can be immediately deciphered and managed in minutes. At airports, traffic is greater than ever, with some hubs seeing millions of individuals pass through each year. In metropolitan areas, airports are usually connected by rail or bus to the centre of a city, making situational awareness even more crucial as people transfer from one transport method to the next. Within Houston Airport, 360-degree cameras cover a number of areas. In the baggage claim zone, eight 360-degree cameras track luggage and help thwart luggage thieves while aiding any investigations. End users also have views of holding rooms to ensure the Health and Safety of individuals being screened. The airport’s surveillance solution delivers video that’s used for training purposes and in investigations of any suspected illegal activity. The cameras installed have reduced blind spots and serve as a valuable and efficient forensic tool for critical investigations. Cruise ships are also finding value in 360degree technology. These vessels carry thousands of passengers across international
waters and, in doing so, face significant Coast Guard requirement hurdles when it comes to proper video surveillance. A proactive approach to incident detection is encouraged. 360-degree cameras and video analytics technology are being installed on decks and inside elevators to provide additional insight around activity within high risk areas.
Video analytics in view Though video intelligence solutions are already a staple of many sophisticated surveillance systems, the possibilities for data collection and analysis in the transportation sphere are virtually endless. Video analytics help to optimise security processes through algorithms that allow users to analyse traffic flows, staffing levels, customers and ‘bottleneck’ issues that can affect the safety and security of passengers. Security staff at high risk locations such as ports, airports and critical infrastructure installations can efficiently and securely manage personnel while proactively identifying potential issues by integrating video analytics with surveillance technology. Traffic patterns for those entering and exiting public transportation can also be analysed using 360-degree camera data, helping to create a safer system for passengers and reduce the aforementioned bottlenecks in overcrowded areas or during peak times.
Scott Brothers: Regional Account Director (Europe) at Oncam
“In some cases, a single 360-degree camera can replace a number of fixed cameras, resulting in cost savings and increased value for practising security managers” 41
www.risk-uk.com
Project1_Layout 1 21/09/2015 14:40 Page 1
CERTAINTY is having the essential features you need to get started
WiseNet Lite is a series of entry-level compact cameras that have been designed to give you the professional features you need. Their resolution ranges GSPN B XFMM EFmOFE Megapixel to a precise 2 Megapixel. Thereâ&#x20AC;&#x2122;s hallway view rotating from 90° to 270°. While Lens Distortion Correction, Motion Detection, Tampering and Edge Storage complete the
package. As if this isnâ&#x20AC;&#x2122;t enough, the WiseNet Lite series also has the ability UP TFU UZQFT PG WJEFP streams in a different resolution to different users or devices, with streams being viewed live, mobile, or recorded. So, in an uncertain world, itâ&#x20AC;&#x2122;s good to know you can be sure of at least one thing.
samsungsecurity.co.uk/FreeDemo
EvacuationPlanningBestPractice November2015_riskuk_apr15 03/11/2015 14:01 Page 2
Evacuation Planning: Best Practice
Prepare to Evacuate P icture the scene. An emergency alarm is activated in your workplace. How many employees would recognise the danger signals and duly move safely towards the designated exit points? It’s an important question to ask because an emergency situation isn’t the right time to develop a plan of action that should already be set in stone. Not only that, it’s both a legal and moral obligation for the managers and owners of buildings to have such an emergency evacuation plan in place. They must ask themselves whether, if an emergency arose, they’ve taken reasonable steps to protect the people in the building for whom they are ultimately responsible. As part of a formal risk assessment of the building, there are a number of variables to consider in relation to evacuation, beginning with an attempt to identify the possible nature of the danger. Additionally, are there visitors who are unfamiliar with the building’s layout? Should the occupants of the building use elevators to escape? Are there any disabled people in the building with special requirements? How safe are the agreed exit routes? Would the way out be visible in the event of a power blackout? Are the detection and notification devices dotted around the building in good working order?
Addressing the dangers For decades now, the primary safety risk faced by commercial buildings was fire, but the scope of danger is expanding. While the latest available UK figures show that there were 22,200 fires in non-domestic buildings during 2013-20141, more modern threats such as terrorism, social activism and crime should also be pinpointed as potential ‘evacuation triggers’. For instance, Westfield in Stratford – already one of London’s flagship shopping centres – suffered a bomb scare in September last year, causing all staff and visitors to be evacuated. This incident came just a few days after a similar evacuation that took place at Luton Airport in the heart of Bedfordshire. The world is less secure and we must adapt to this changing landscape. Risks will undoubtedly vary depending on the type and usage of the building(s) in question. This should be a key item to address as part of the risk assessment, the conducting of which is a formal requirement under the Regulatory Reform (Fire Safety) Order 2005.
The growing and increasingly diverse safety considerations faced by those responsible for today’s commercial buildings make it more important than ever to have in place a robust evacuation strategy. John Robb navigates the complicated requirements involved in planning and executing safe exits Here, we’ll focus primarily on fire risk, since this is the area where most hard evidence exists. However, it should be noted that many of the same principles apply in different scenarios that require evacuation even if the precise details of the response will be determined by the threat.
Failing to plan The potential consequences of failing to plan properly are difficult to overestimate. In total, during 2013-2014 there were 17 deaths and 1,083 casualties resulting from fires occurring in non-domestic buildings across the UK. Life preservation has to be the most important motivation, but there are also financial costs to consider in terms of property and assets. 2008 figures suggest that the cost of commercial fire damage in the UK was £865 million2. An additional concern is the reputational damage that can result from neglecting to take all reasonable steps to ensure the safety of the people in the building for whom you’re responsible. Arguably, it’s even more important to protect reputation than to protect property. According to research carried out by ACE, 81% of companies in the EMEA region regard reputation as their most significant asset3.
John Robb: Commercial Buildings Segment Director at Eaton
43
www.risk-uk.com
EvacuationPlanningBestPractice November2015_riskuk_apr15 03/11/2015 14:01 Page 3
Evacuation Planning: Best Practice
References 1Department for Communities and Local Government: ‘Fire Statistics in Great Britain April 2013-March 2014’ 2‘Tackling Fire: A Call for Action’, Association of British Insurers, December 2009 3‘Reputation is the hardest risk to manage says ACE Research’, 23 July 2013
Allied to reputation is the potential risk to business continuity. It’s estimated that over one third of businesses never resume operations after a major fire scenario has taken place. Another set of potential consequences can be found in the legal arena. Enforcement of the aforementioned Regulatory Reform (Fire Safety) Order 2005 is leading to heavy fines and even imprisonment for serious offenders. This legislation requires commercial buildings, nondomestic and multi-occupancy premises in England and Wales to appoint a “responsible person” to undertake a “serious and sufficient fire risk assessment”. According to statistics, some 67,266 fire safety audits were carried out in non-domestic buildings in 2013-2014 leading to 18,733 informal notifications and 2,050 enforcement notices. The most common cause of noncompliance, at 13.7%, was the failure to conduct risk assessments, closely followed by problems relating to emergency routes and exits (at 11.8%). There’s clearly a question mark over the proportion of building owners and managers who are fulfilling their obligations under the Regulatory Reform (Fire Safety) Order, not least with regard to completion of risk assessments. Perhaps an even more worrying threat for executives is embodied in the Corporate Manslaughter Act. While this has yet to be rigorously tested in the UK regarding fire, the Act allows for court proceedings to be brought against senior individuals within a company.
Taking action on evacuation Current guidance in the UK suggests three minutes as the maximum time in which an evacuation should be completed. Doing so within that accepted limit is reliant upon swift and accurate detection of danger, fast and reliable notification for occupants and the orderly use of predetermined exit routes. In the case of fire hazards, the latest fire systems combine detection and notification in a single control panel that, being ‘addressable’, indicates the location where the hazard was detected. This helps the appointed employees to guide occupants in the right direction and towards safety, as well as reducing the time taken by the Fire Brigade to locate and tackle the potential fire.
“The potential consequences of failing to plan properly are difficult to overestimate. In total, during 2013-2014 there were 17 deaths and 1,083 casualties resulting from fires occurring in non-domestic buildings across the UK” 44 www.risk-uk.com
Rather than being ‘fit and forget’ solutions, these systems require regular testing and maintenance, with all actions properly recorded and logged to ensure that fire systems are ready to activate in an emergency. However, it’s a duty that may be overlooked. Another consideration that could be neglected is how any building occupants in areas of high noise or with hearing impairments are notified of a need to evacuate, particularly if there’s nobody nearby who could help. This is a concern that’s driving the increased deployment of visual alarm devices (VADs). Specifiers should be aware that there’s a set of European standards listed under EN54-23 governing the necessary light output from a VAD, as well as the recommended spacing between devices and the site of installation.
Diverse set of requirements Due to the varied nature of disabilities, a diverse set of requirements should be considered. Exit routes, for example, are a vital area of concern. Those who are wheelchairbound will clearly want to avoid stairways, but many buildings have a programme in place that deactivates lifts in the event of an alarm being sounded. This can create additional problems. Other life safety system components that can prove particularly valuable to disabled people, particularly in high-rise buildings, are refuges with two-way communication points installed. These enable individuals who may be stranded on upper levels to have contact with a central communication point on the ground floor. Exit routes should be made apparent by illuminated signage and emergency lighting designed to help the occupants of commercial and industrial buildings find their way out in the event of there being a power cut. Highoutput lighting has also been shown to improve the ability of those with sight impairments to find their way along exit routes. Again, similarly to VADs, there are standards in place that advise on the lux output and positioning of emergency lighting. It’s worth noting here that a basic function test should be carried out on all emergency luminaires in a building on a monthly cycle. In locations that adhere to this requirement, testing is typically carried out on a manual basis, which has major implications in terms of staffing, scheduling and costs. All activity must also be logged for compliance purposes. The scope for human error is not insignificant. At present, there’s an increasing move towards adopting automatic testing technology designed to improve compliance and accuracy, save time and reduce overall costs.
dycon_riskuk_apr15 03/11/2015 16:52 Page 2
Advertorial Feature
Power supplies – the heart of every security system! very security system - intruder alarm, fire alarm, CCTV and access control - has a common component that, if correctly specified, will ensure that the system operates reliably, day in and day out and yet most specifiers and installers fail to understand how this component operates and how it can improve the system’s performance.
E
What is this component? The Power Supply Unit (PSU) – the critical ‘beating heart’ of any system! We expect a security systems to be fully functioning 24/7/365 yet, although we outline a specification for a control panel, detectors or equipment, we rarely give the PSU much consideration, often treating it purely as a ‘commodity’ or listing it in tenders as a ‘PC Sum’. People who just think of PSUs in terms of a metal box that houses a battery and PCB are missing out on recent, innovative technology improvements that enable any system they fit to perform more effectively, reliably and economically. Developments in PSU technology Traditional PSUs have used conventional linear technology to deliver 12/24vDC at 0.5A - 5A. This technology is inefficient - typical efficiency is less than 30% because the circuitry creates a lot of heat when converting the 230vAC down to 12/24vDC. Nowadays, the better option is to use switched-mode technology. Why use switched-mode PSUs? A switched-mode PSU’s circuitry is up to 90% efficient, it doesn’t waste electricity in creating excess heat whilst it converts 230vAC down to 12/24vDC. The resultant electricity cost savings often provide initial capital cost payback periods as low as 4 months, with substantial on-going cost savings in future years. It offers a far more efficient way of charging its standby batteries which puts less strain on them leading to an improved battery life of up to 12 months. This feature alone can reduce the probability of service call expenditure as the battery gets older Switched- Mode Power Supply Technical features? • A typical Dycon switched-mode power supply incorporates a switching regulator, this means:1. Greater efficiency, as the switching transistor dissipates little power in the saturated state and the off state compared to the semiconducting state 2. Smaller size and lighter weight as the high-weight low frequency transformers have been eliminated 3. Stable output to limit of stated capacity – ripple less than 50mV p/p 4. Up to 90% efficiency, which means lower running costs and less energy wasted on heat – these units run cool compared to linear designs Other benefits of Dycon switched-mode technology include:5. Very little heat to dissipate means increased ability to install in consoles, cupboards, ceiling voids and other places that are better for cabling. 6. These units are ideal for use in hot climates as no cooling fans are required 7. Totally integrated PCB “transformerless” design 8. Smaller footprint 9. Built-in AC connector 10. Easy-fit plug-on battery connector leads 11. AC power input surge and transient protection 12. Power supply overheating protection 13. Power supply over-current protection 14. Under and over limit AC power protection 15. Battery reverse connection protection 16. Battery charge over current protection
How can this improve security system operation? For intruder alarm systems, the Dycon EN50131 versions include the following operation features and benefits rarely found in conventional linear units: 17. Powerful and flexible battery-learn feature to automatically configure the number of batteries used to suit different power supply backup requirement 18. Power supply monitoring: a. Battery low voltage monitoring b. Power supply operational status check c. AC power monitoring 19. On board status display for: a. Power supply OK b. Battery OK c. AC power supply OK 20. Normally closed floating alarm outputs for: a. AC Power fault b. Battery fault c. PSU fault 21. All DC power outputs/inputs protected by auto resettable fuses which substantially reduces engineer on-site time and cost Additional features and benefits for access control systems Access control systems will benefit from all the switched-mode features and benefits previously mentioned but specifiers and installers need to remember that, unlike typical intruder alarm systems where power requirements are often quite low, access systems include components that often require considerably more power to operate. Intruder systems frequently specify 1A PSUs and will have spare power left but magnetic and electric door releases often need more so 3A and 5A units are quite common. The Dycon switched-mode 3A and 5A PSUs provide sufficient reliable power to ensure the correct operation of a system. There is a common but often un-recognised problem created by the use of high-power door releases and electric locks. These can cause an electrical interference ‘spike’ when operated which can blow a PSU’s fuses resulting in a locked, or unlocked door, annoyed users and a service call. The Dycon switched-mode PSU anticipates the problem and has circuitry that protects against it, ensuring that door remains operational at all times Additional features and benefits for CCTV/Video systems Dycon offers a full switched-mode range of 1A, 3A and 5A PSUs with multiple outputs and built-in video connectors (when used with the 4-way power splitter with video connections) enabling all CCTV/Video system to benefit from the improved performance that the technology brings. There is a little known problem but quite common video image problem that can easily be remedied by using Dycon switched-mode PSUs. Many CCTV cameras operate on 50KHz as to virtually all commonly used PSUs, the result is that spurious interference patterns can often be seen on the received images. Installers often struggle to locate the source of the problem and resort to changing cameras or shielding the cable. All Dycon switched-mode PSUs operate on 66KHz removing any chance of this problem ever occurring. Some specialist cameras operate within a very tight voltage specification, deviation from this can cause the camera to malfunction. In these situations, Dycon have a special constant-voltage PSU where the output voltage can be varied from 12VDC to 15VDC by an adjustment using its potentiometer and measuring the output using a suitable meter. The voltage will remain constant at the selected value, even when running on battery power only.
DIN-rail PSU solutions for major sites Increasingly property developers are specifying the use of DIN-rail cabinets for power distribution within large buildings or complexes. Security installations need not be left out of this trend, Dycon’s latest range of DIN-rail mounted units, brings a new, easier to install, cheaper switched-mode alternative to the conventional, boxed PSU. These offer a more efficient and economical way of providing 12vDC or 24vDC power to a vast array of different applications. Utilising existing, on-site DIN-rails and cabinets, these switched-mode PSUs need no additional housings thus reducing both equipment costs and expensive onsite time. No fixing screws are required as the units simply clip directly onto either an N32 G-section or an N35.7 Top-Hat section DIN-rail. Additional units can be added at any time by simply clipping them onto the DIN-rail and connecting the cables - no need to find space and time for a conventional housing to be fitted. Dycon DIN-rail power solutions are ideal for most security and industrial applications, electromechanical devices, data communications, IT system, power distribution boxes, building automation, control systems and much, much more. There is even a 110vAC version for use during the construction phase of large sites which can easily be swapped out for a standard 230vAC unit when the building is commissioned. Network Power Solutions Many of today’s security systems are linked to or are part of IT networks, there is an easy-to-install switched-mode solution for such systems, Power-overEthernet (PoE). Dycon’s Mid-Span PoE solution provides a full 35W per channel in 4, 8, 12 or 16 channel 19” rack units, which can power any suitable device. Installation is very simple and just involves plugging a standard ethernet cable from the device into the appropriate output socket and then plugging the input socket into the network. Should the powered device need to be repositioned, it is an easy job just to alter the network cable to suit. Again since the unit is a switched-mode device, very little heat is generated and no noisy cooling fans are required so the unit can easily be fitted in quite areas, inside consoles or even in prestigious residential properties. Quantifying the financial benefits of switched-mode technology Are you aware how much a security system actually costs the end-user simply to have it switched on? A traditional 12vDC 1A linear power supply will use at least 262kWh of electricity which, at the current costs of between 11p and 16p per kWh, means an annual outlay of between £29 and £42 just to have it running 24/7/365! A Dycon 12vDC 1A switched mode PSU will use considerably less electricity, each PSU saving the user at least 131kWh p.a., or in cash terms, between £14 and £21 p.a. and those prices are going to rise even higher in 2014!
For further information on using switchedmode technology or for a simple readyreckoner to enable you to calculate electricity cost savings of switching to Dycon switched-mode units, please contact t: +44(0)1443 471 900 e: sales@dyconpower.com
45
www.risk-uk.com
PerimeterProtection November2015_riskuk_apr15 03/11/2015 14:14 Page 1
What Price Safety and Security? Is the playing of a ‘percentages game’ in terms of cost versus future-proofed effectiveness really appropriate when the security and safety stakes are now clearly so high? Peter Jackson calls for a collective paradigm shift towards a discussion centred on implementing protection and safety regimes underpinned by products and processes wholly appropriate to current and foreseeable risks
46
www.risk-uk.com
ecent events around the world have served to bring into sharp focus the need to constantly revisit existing security measures in the face of what are now everevolving threats. On occasion, bespoke perimeter security products and protocols designed to meet the requirements of risks at the time of their specification have subsequently failed when presented with more determined and repeated attempts to breach them that have employed guile, tools and force. The addition of temporary sharp spikes bolted along the top of sections of the existing fence around the perimeter of The White House this year will, according to a Secret Service and National Park Service statement, ‘satisfy security needs while a long-term solution is designed and implemented’. Elsewhere in the USA, an Associated Press investigation published in April this year reported that, on at least 44 occasions in the past two years, intruders have made it on to runways, taxiways or to the gate area at airports where refuelling and loading takes place. On seven occasions, trespassers even managed to make their way on to jets themselves. What’s perhaps more shocking is that seven international airports in four states accounted for over 50% of the security breaches noted. A little closer to home, the 177 km-long chain link fence supported by razor wire deterrent
R
currently being installed along the border between Hungary and Serbia in an attempt to stem the flow of an estimated 300,000 migrants into the EU through its borders at first glance looks like it could prove to be woefully inadequate. According to The Guardian, some 50,000 individuals have already entered Hungary illegally since January 2015. While Governments and their advisors work in tandem to manage today’s ever-changing and longer term security issues, it’s perhaps worth posing a couple of questions. In this world which is seemingly obsessed with high technology-style security solutions, is there any doubt that a humble, risk-appropriate security fence performs a critical function in providing protection and safety? On top of that, is the playing of a ‘percentages game’ in terms of cost versus future-proofed effectiveness really appropriate when the security and safety stakes in this day and age are so high?
Issues focused on gate safety In much the same vein, but not receiving anywhere near the equivalent degree of media attention, the issues around gate safety have also been brought into very defined view. Pedestrian and vehicle gates and barriers provide controlled access to a given location. They act as a safety and security checkpoint, but we would do well to remember they also have the potential for presenting a high risk to site occupiers and visitors alike. The recent cases of a child losing her fingertips in a park gate accident in Rochdale, the council worker killed when crushed by a gate in Limerick, the father-to-be who died as the result of an unlatched parking barrier and the successful prosecution of the two companies responsible for installing and maintaining the electric gate that killed a child in Bridgend attest to the risk to people and damage to reputation when things go wrong – whether by design, implementation or inadequate maintenance. The Door & Hardware Federation’s Powered Gate Group estimates that there are more than 500,000 automated gates in service in the UK, yet only around 30% of them are believed to be safe to use and compliant with current legislation and Best Practice. Further to that statistic, what percentage of the millions of humble manual swing gates and barriers do you think would comply with legislation if it existed?
PerimeterProtection November2015_riskuk_apr15 03/11/2015 14:14 Page 2
Perimeter Protection
All-too-often, it can appear that security and safety are considered separately, sometimes with disastrous consequences. Equal emphasis must be afforded to surveillance, detection and the prevention of unauthorised access, the control of authorised pedestrian and vehicle access, the provision of access for emergency vehicles and equipment, consideration around safe and rapid evacuation in the event of an incident and visitor and user safety when it comes to fencing, gates and other access control-centric equipment There’s a great deal of talk in the risk management and security sectors just now about the continuing pressure to reduce prices and, in so doing, trim project specifications to the point where, from a design and engineering perspective, the performance of the security product becomes questionable with little or no redundancy built in to take care of evolving or escalating risks (whether that’s to do with fencing, gates, their maintenance, security staffing or Health and Safety requirements). As Risk UK’s Editor Brian Sims rightly stated within his recent Editorial Comment in which he focused on the Incentive FM Group Forum (‘Margin vs Value’, Risk UK, March 2015, p5), it’s very much up to the industry to prove value rather than justify price (in the face of increasing price pressure).
Total price of failure In the case of physical perimeter protection, the difference between a fence, gate or barrier system designed to mitigate risks across a narrow range of constant threats set against one which is capable of safely withstanding broader escalating risk is small when the cost of civils and infrastructure is considered. You can always buy cheaper, but rarely so when you then factor-in the total price of failure. The two companies prosecuted for the tragic and preventable death of the five year-old child in Wales mentioned earlier were fined a total of £110,000 and will likely suffer irreparable damage to their reputations. What would have been the fiscal outlay to prevent the incident occurring by dint of installing the right product and adopting the correct maintenance regime? The answer here has to be significantly less. As a company – like most others – which is in business to make profit, we’ve taken a definitive and very firm stand on the performance and safety of the products we design, manufacture, install and maintain. To this end, we will absolutely not sell a fencing system that we know is inappropriate for its intended and likely extended purpose. Nor will we design and install a gate or barrier
which is unsafe or falls short of the required safety legislation. It’s a simple principle which has won us more business than it has cost the company, and one that will protect our reputation, the reputation of our clients and the integrity of our staff in the years ahead.
Adopting a stronger stance Perhaps if more companies adopted a stronger stance rather than chasing short-term gain, the tide could be turned and greater numbers of clients and consultants made fully aware of the consequences of deferring costs by designing just for today or buying on the lowest price. If we can collectively drive a paradigm shift towards a detailed and frank discussion that’s centred on implementing security and safety regimes with products and processes appropriate to current and foreseeable risks, we will then be better placed to emphasise our real value to clients and their advisors. Going full circle and coming back to the title of this article, what’s the real price of security and safety? Ultimately, it boils down to ‘as little as appropriate’ or ‘as much as you can stand to lose’. Take your pick.
Peter Jackson: CEO at Jacksons Fencing
“Pedestrian and vehicle gates and barriers provide controlled access to a given location, but they also have the potential for presenting a high risk to site occupiers and visitors alike” 47
www.risk-uk.com
VideoSurveillanceintheCloud November2015_riskuk_apr15 03/11/2015 13:09 Page 1
The Cloud: Ready for Surveillance? software, but also integrated client-side applications (among them business analytics that allow for deeper insights and more indepth investigations).
Valuable business applications
Companies across all sectors are taking advantage of cloud technology to reduce IT costs, streamline application management and implement more flexible and scalable infrastructures. It’s no surprise many are considering potential cloud applications for video surveillance. Stefano Torri focuses on several key issues to consider before making that move
48
www.risk-uk.com
ideo surveillance systems harbour requirements that set them apart from other types of enterprise cloud applications. Video – and in particular HD video – demands very high bandwidth. Pushing video to the cloud in real-time requires a high-speed, highly available network. Security and privacy have to be considered, too. Legislation, regulations and corporate policies may all impose restrictions on the transport and storage of video footage. In fact, some organisations explicitly prohibit video data from leaving the corporate network. Keeping these factors in mind helps an organisation make wise, forward-thinking decisions about how best to leverage the cloud for their business-critical surveillance systems. The two most relevant cloud applications for video surveillance are IaaS for video storage and SaaS for management and business analytics. In combination, these are usually termed Video Surveillance as a Service (VSaaS). Instead of just using video surveillance systems to review security incidents after the fact, enterprises now take advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance trends and identify opportunities to strengthen their marketing, operations, compliance and sales strategies. To deliver these expanded functions, video surveillance systems require not only cameras, storage hardware and dedicated management
V
What the cloud has to offer is often already provided for by on-premises video surveillance solutions. This includes centralised system control and management, distribution of software updates and scalability and redundancy for business continuity. Meanwhile, functions like synchronised video playback from multiple cameras and seamless integrations with access control, Electronic Point-of-Sale or ATM transaction systems, which are critical aspects of day-to-day video use, may not be fully supported by a cloudbased solution. The unique strength of the cloud is its ability to support valuable business applications, in particular business analytics which can be applied to locally stored video with selected video ‘excerpts’ sent to the cloud for analysis. It takes significant computing resources to process analytics such as license plates or facial recognition images. As the cloud can make those resources available as a service, it has the potential to help reduce internal infrastructure and management requirements. The cloud can also enable efficient and flexible mobile access to locally stored video data. While some mobile applications already provide access through the local network, they typically limit the video stream to a single device. Cloud technology, however, can provide access to live and recorded video for multiple devices simultaneously, meaning that security professionals can keep an eye on their physical assets while other departments use the same video for reporting and analysis. Relying on the cloud for complete video storage should be approached with caution, though, because it requires technology that may not be available equally in all locations and could even have a detrimental effect on other network-based corporate applications. Determining where and how the cloud best supports the business depends on a set of five primary requirements: bandwidth, storage, cost, security and accessibility. Let’s examine each of them in succession.
Bandwidth requirements The total bandwidth required for a video stream varies depending on the number of frames or
VideoSurveillanceintheCloud November2015_riskuk_apr15 03/11/2015 13:09 Page 2
Video Surveillance in the Cloud
images being captured per second as well as the quality of the images. Given most enterprises are replacing older analogue cameras with megapixel IP variants, bandwidth becomes even more important when looking at a video surveillance system change. Even if they employ buffering, most enterprises don’t have the bandwidth capacity required to upload video to the cloud consistently. This will change as bandwidth speeds and accessibilities improve, although the trend toward 4k and 7k IP cameras may also counteract that advantage. Organisations with high-speed, high-capacity upload connections may not be able to dedicate enough of their network resources to video surveillance. Banks and retailers often restrict the network capacity allocated for video to just 100-200 kb/s of their total bandwidth to ensure their corporate network has the capacity needed to transmit financial transactions or other business-critical data. Service provider caps on broadband services also represent another constraint when it comes to sending and storing video in the cloud. The majority of collected video is never used unless business analytics are in place. Instead, specific events will trigger follow-up action. On that basis, it’s important to determine whether or not it makes sense to transmit video data for storage over expensive network links. Enterprises with bandwidth capacity could benefit from the cloud’s ‘unlimited’ storage which will cost less as technology improves. Nevertheless, companies should determine for how long they need to retain their video and how much redundancy they require. Both factors may add to the total cost of the cloud storage solution. Using metrics such as the number of cameras, video resolution and images captured per second, it’s possible to determine roughly how much bandwidth and storage a business will need for cloud-based video surveillance.
Security and accessibility Video surveillance systems must receive the same level of attention in terms of cyber security risk and vulnerabilities as traditional IT systems. Firewalls, network topology and video encryption can have a significant impact on the security and protection of a cloud-based video surveillance regime. Some companies have internal policies prohibiting video data from leaving the corporate network or having it stored on a third party server. Relying on a third party network to upload or download video means any outage could deny access to video assets. Of course, if
“Organisations with high-speed, high-capacity upload connections may not be able to dedicate enough of their network resources to video surveillance” video is stored ‘on-premise’ then it’s locally accessible and fully controlled. While cloud-based video surveillance storage has potential, it relies on better bandwidth so consequently it doesn’t offer a cost-effective alternative to ‘on-premise’ video surveillance solutions for most mid- and large-sized enterprises with multiple locations and more demanding video requirements. The point of feasibility will be reached over time as new solutions emerge and build on previous technical capabilities. In the long run, advances in video compression and faster, more affordable bandwidth services will help make cloud-based storage solutions a more viable option for many larger, multi-site enterprises. One promising intermediate application may be using the cloud for business continuity and disaster recovery (in the form of cloud-based back-ups). Much like fully-fledged cloud video storage, this will depend on greater bandwidth being available to individual locations. It also comes with potentially less pressure to transport data in real-time. Not all video needs to be uploaded and stored in this way. Some organisations might choose to only send their significant event or alarm-based recordings to the cloud in a bid to reduce in-house infrastructure costs.
Enterprise-scale access Business intelligence applications that integrate selected video, data and analytics also lend themselves towards cloud-based solutions. Some organisations are also taking advantage of cloud services to gain enterprisescale access to their live and locally-archived video via their mobile devices. Such services can support unlimited concurrent connections to any compatible server or recorder, allowing multiple end users to view the same video without increasing bandwidth usage. Given the bandwidth and security challenges, it’s clear that the wholesale storage of surveillance video in the cloud isn’t ready for large-scale implementation, particularly by retail chains, financial institutions and other multi-located enterprises with many IP cameras. Nevertheless, the advantages remain enticing for enterprises actively seeking ways in which to reduce their infrastructure costs and provide improved access to archived video.
Stefano Torri: EMEA Sales Director at March Networks
49
www.risk-uk.com
TheSecurityInstitute'sView November2015_riskuk_apr15 03/11/2015 13:40 Page 1
The Management of Converged Security Threats: Defining Best Practice of 16 leaders who contributed many very valuable ideas to the document was itself truly converged. Few companies and Government agencies actually implement this standard, but this is a situation that doesn’t need to continue.
Running at all times
It’s safe to say that cyber security threats and episodes such as the TalkTalk data breach have received considerable attention in the media of late, and rightly so. We’re even assured that there are defences in place to counter attacks. However, James Willison remains intent on asking the key question: “Are there Best Practices we can all deploy to ensure survival in the aftermath of such security episodes?”
50
www.risk-uk.com
or many years now, leading security associations including The Security Institute, ASIS International, (ISC)2, ISACA, the Information Systems Security Association (ISSA) and the Institute of Information Security Professionals (IISP) have urged their members to work together in teams to identify cyber attacks on physical systems, but in truth it’s pretty rare to witness this kind of collaboration. In parallel, those organisations have also stressed the importance of physical security in the digital field and yet it seems weaknesses continue to abound. News of the hack into the Office of Personnel Management in the United States Government in June 2015, for example, and the millions of data losses that followed was particularly concerning. Here, high-level leaders had their personal information compromised. The episode seemingly highlighted the fact that the Human Resources (HR) Department needed to work more closely with the security function than had perhaps previously been the case. Since the early years of this century, several of us in The Security Institute, ASIS UK, ISSA UK, ISACA London, the IISP and (ISC)2 have urged organisations to bring their security, HR and other functions together to identify cyber attacks on their organisations and their physical systems in a team approach. In 2011, we worked on the ANSI ASIS Physical Asset Protection (PAP) Standard and were delighted to produce a set of Best Practices for a converged security strategy. This was significant because the convergence team
F
For the larger organisations on which we all depend, whether they’re finance, energy, telecoms or utilities-focused, the answer is – as it has always been – a converged teaming strategy operating 24/7. It really is no use having a crisis team in place after the event. You need to have such converged teams running at all times, identifying the attacks with, for example, security incident event management (SIEM)-type technology in realtime and with physical security, HR and others there or on call to respond immediately – as it affects them and vice versa – in a truly multidisciplinary effort. While this may seem like wishful thinking to some commentators in our world, we simply must try and do something before there are no organisations left and we find ourselves in a Die Hard 4.0 situation. Back in June, Information Security Europe ran in London. At this event, a number of leading speakers in the Keynote Theatre emphasised the need for convergence, teaming and to break silos. This train of thought wasn’t confined to the cyber security community, either. Bruce Schneier, the influential thinker and cyber security guru, reported that the reason Sony performed so badly during the attacks on its systems in late 2014 was due to a lack of teaming in the defence and then an individualistic reaction which led to many of the staff considering legal action rather than working together as a team in response. The answer going forward, then, must be convergence and teaming. What will you do in your organisation to start this process, though?
Look at the standard First of all, Risk UK’s readers are urged to review the aforementioned ANSI ASIS Physical Asset Protection (PAP) Standard. As indicated, it was written by leaders from across the security community. Over a third of the convergence team are members of The Security Institute and more than half members of the IISP and/or (ISC)2,
TheSecurityInstitute'sView November2015_riskuk_apr15 03/11/2015 13:40 Page 2
The Security Institute’s View
ISACA and ISSA with ASIS International’s own members in the main Working Group. It’s a common working document which many of us can engage with and seek to develop in our own organisations. Consider whether you’re from a physical or a cyber background because increasingly these worlds are merging and so, whether you drive a new car or access a SMART home, the issue of cyber attack on physical systems is simply not going away. If you’re not an ASIS member, the cost of accessing this document is very low compared to buying-in consultancy of such quality.
Exploitation by attackers In the section on security convergence, one passage reads: “Physical asset protection has become highly dependent on information technology networks, often sharing a common infrastructure and technology platform. Security systems should not be integrated into an enterprise’s computer network unless the enterprise can clearly secure the systems both physically and technically from intentional or unintentional interference. Such computerised systems can become the weak point an attacker may exploit to obtain critical information about an organisation or disable security systems.” The section goes on to state: “Rather than having asset protection and security solutions managed by different business functions applying subjective risk controls to their threatspecific vulnerabilities, convergence provides a common platform where these solutions are assessed and treated from the perspective of a shared risk environment.” As mentioned, we are yet to see many of these key principles taken seriously. Is it partly due to our own attitude and lack of real respect for our colleagues? Some fear those who are not from their background, whether they emanate from a technical or non-technical arena, but unless all of us can overcome these issues, those who seek to perpetrate harm will continue to do so. The fact that our numerous security associations are predominantly filled with people from one area of the security arena or another must be a concern to us. We should all warmly encourage the Security Commonwealth, a partnership initiative launched by The Security Institute early this year, as it considers cyber physical challenges to actively engage with the IISP, (ISC)2, ISACA and ISSA UK. We must all see that it’s those with this high level of expertise with whom we can work together to produce a converged cyber and
physical security solution. One without the other really cannot achieve the desired goal.
Process of teaming Convergence is essentially a teaming process. It’s important that a converged chief security officer or any other person who manages the security arena establishes cross-functional teams (as recommended in the ANSI ASIS PAP Standard) ready to identify cyber attacks – for example, on a building management system (BMS) and the network – and, ultimately, form a common view of risk. In January this year, the US Government Audit Office found that nearly 9,000 federal locations lacked a cyber security strategy for their building and access control systems. One could argue this is because there are very few such cross-functional teams (physical/logical/HR/ legal) in place, and hence that’s why cyber attacks on physical systems can be so effective. If a team finds a weakness in a BMS which leads to the CEO’s e-mail being compromised, the speed of response is much faster. The Internet of Things has also meant that vehicles and devices are converging to such an extent that unless physical and cyber – and HR and legal, for that matter – break the silos (as advocated by the EU) and work in a converged way, the blended risks will compromise a physical system and, worse still, the power grid. “The main focus should be on breaking silos and enabling the creation of proper grounds for the necessary interdisciplinary cooperation” states the 2014 ENISA Threat Landscape document in its ‘Overview of Current and Emerging Cyber Threats’. What’s really important is that, whomever leads the security functions, whether they are separated into different areas or resident in one department, there absolutely needs to be a real-time, cross-functional teaming approach across the business. Recently, Adrian Leppard – the Commissioner of the City of London Police – urged physical security professionals to become involved in cyber security because our skills are needed just as much as those of the cyber professionals. Indeed, it’s our duty to work as closely as possible with our colleagues to help them as much as they can assist us in identifying cyber attacks on our systems. That’s what security convergence is all about.
James Willison BA MA MSyI: Founder of Unified Security
“It’s important that a converged chief security officer or any other person who manages the security arena establishes cross-functional teams ready to identify cyber attacks” 51
www.risk-uk.com
InTheSpotlightASISInternational November2015_riskuk_apr15 03/11/2015 14:09 Page 1
Private Investigations: Potential Pitfalls of Outsourcing Protection Act is one of the most complex pieces of legislation with which we’ve ever been confronted. Its complexity derives from the horizontal effect it has on almost everything we do. In the case of Naomi Campbell versus Mirror Group Newspapers (2002) EWCA Civ No: 1373 Paragraph 72, Lord Phillips described the Act as “a cumbersome and inelegant piece of legislation.” He commented that, in the first instance, the High Court Judge had described the Act as being akin to “weaving his way through a thicket”.
Fog of legal uncertainty
No matter how you package it, an investigation will be an intrusion into a person’s privacy. For this intrusion to take place there has to be a lawful basis upon which it is founded. As Chris Brogan suggests, the investigation conducted must be ‘reasonable and proportionate’ and in accordance with Article 8 of the Human Rights Act 1998
52
www.risk-uk.com
he Human Rights Act isn’t an immediate problem if you’re not a ‘public authority’. However, if the outcome of the investigation ends up in a Court of Law or a tribunal situation then these are very much public authorities and, as such, the Human Rights Act will be considered. In essence, an investigation involves collecting information about a ‘living human being’. Due process will bring this information within the definition of the Data Protection Act 1998. It follows, then, that any investigation should be compliant with the Data Protection Act. Also, the investigator to whom the task is sub-contracted ought to have more than just a passing acquaintance with this Act in addition to knowledge of other privacy laws. Over the years, investigators have complained that the Data Protection Act has prevented many of the enquiries they need to make. Is this really the case? In truth, the Data Protection Act doesn’t stop you doing anything. What it does do is impose certain conditions upon you before the processing of an individual’s personal data can take place. Satisfy these conditions and most of the perceived ‘problems’ disappear. Those conditions are not insurmountable. They’re just very complex. Indeed, the Data
T
In a two-page article it’s not really possible to provide you with a definitive pathway through the fog of legal uncertainty created by this cumbersome Act, but at least let me try to identify some risks you may not have considered before you decide to bring an external investigator into the equation. The investigator is acting for you, the client, and owes you obedience and a legal Duty of Care. This legal Duty of Care is created by the legal contract into which you have entered. As you’ll probably be aware, the common law definition of ‘Contract’ is: ‘Offer, Acceptance, Consideration, Legally Binding’. If any of the clauses are missing it’s not a valid contract. You’ll be asking the investigator to process personal data as defined by Section 1 of the Data Protection Act. The investigator will be your nominated data processor. This is a legal relationship which has to be ‘evidenced in writing’ (Data Protection Act, Section 1, Part 2, Paragraph 12) and raises the question: ‘Does the absence of a clause creating this legal relationship invalidate the contract?’ We must leave that discussion with the contract lawyers, but you might want to pose the question to your in-house lawyer. If the creation of this legal relationship hasn’t been evidenced in writing, is the investigator a data processor? If he/she is not, then is he/she the data controller and, if so, on what part of the Data Protection Act is the client relying to justify the transfer of the subject of enquiry’s personal information to this third party (ie the investigator)? A breach of the Data Protection Act may well have taken place. An individual (ie the investigator) not entitled in law is in possession of a person’s ‘personal
InTheSpotlightASISInternational November2015_riskuk_apr15 03/11/2015 14:09 Page 2
In the Spotlight: ASIS International UK Chapter
data’. This breaches Principle 7 of the Data Protection Act which is focused on the security of personal data. Personal data is being processed on an unauthorised basis, and is therefore an unlawful procedure (representing a breach of Principle 1 on fair and lawful processing). The data subject is not aware of this ‘stranger’ who has unauthorised possession of his or her personal data. That particular scenario is a breach of Principle 6 detailing the rights of data subjects. How many more breaches need to be identified before the defendant’s lawyer raises the argument to the Judge/Magistrate/tribunal that this evidence against his or her client represents a breach of Article 6 of the Human Rights Act? “These are clear breaches of the Data Protection Act 1998”… “How can it be fair if the evidence against my client has been gathered unlawfully?”
The investigator’s contract Let me pose another question to you. How many of you include the Data Protection Act clause creating this legal relationship in your contracts with investigators? It’s the responsibility of the client (ie the data controller) to ensure that his or her data processor (the investigator) complies with Principles 1-8 of the Data Protection Act. In the mainstream media, we constantly witness reference to loss of data and the consequences of that loss. Principle 7 of the Data Protection Act imposes strict criteria for safeguarding personal data that the client must insist is followed at all times by the investigator. The investigator is acting on the client’s behalf. If he or she messes up then the client has messed up. The client’s defence is likely to be that the investigator stepped outside of their Terms of Reference. Did he or she sub-contract any of the enquiries? Did you give him or her permission to do so? Is the sub-contractor knowledgeable about the Data Protection Act and the other privacy laws impacting the investigative process? Are these points clearly addressed in the contract? Could your organisation’s reputation rest in the hands of a sub-contracted investigator whose existence you are not even aware of? That has to be bad business in anyone’s books. Many of you who work for large companies will have an in-house Security Department that provides investigation services to the group companies. At first glance, you might well adopt the viewpoint that what you’ve read so far doesn’t need to concern you, but just consider this argument for a moment.
As part of the security team, you’re employed by ABC plc. You’re often instructed by associate or subsidiary companies. Each of the companies may be ‘profit centres’ and, as such, you operate an internal billing system. You are a separate legal entity from your associate/subsidiary companies. Fact (as referenced by the Companies Act 2006). You are therefore being instructed by a separate legal entity and the relationship of data controller/data processor needs to be addressed. If it isn’t then the above issues could apply.
Government licensing We’re repeatedly informed that, any day now, private investigators will be licensed under the Private Security Industry Act 2001. This would mean that, if the activity of private investigation is provided without there being a licence in place, the investigator and his or her client could be committing a criminal offence. It would seem obvious that an external investigator will need a licence, but if your Security Department is providing an investigations service to your associate/subsidiary companies under contract (possibly with monetary reward as a byproduct) then you and your colleagues may need to be licensed as well. This argument has been raised with the Security Industry Authority by my good self on nine separate occasions over the past eight years – and all the way to the top of that organisation – with regard to all licensable activities under the Private Security Industry Act 2001. On each of those nine occasions, assurances have been given that the matter will be looked into and a response forthcoming. It has yet to arrive in my Inbox. If my submission is correct then this nonlicensing under the Private Security Industry Act 2001 is likely to be a further breach of the Data Protection Act, not to mention Articles 6 and 8 of the Human Rights Act (with not only the consequences of breaches of the privacy laws, but also possible prosecution for a breach of the Private Security Industry Act 2001). At the very least, you could be facing a criminal action if you’ve not ensured that your external investigator is licensed and that he or she doesn’t sub-contract any part of the assignment to a non-licensed investigator.
Chris Brogan MA LLM MIBA FSyI: Partner at B&G Associates
“Could your organisation’s reputation rest in the hands of a sub-contracted investigator whose existence you are not even aware of? That has to be bad business in anyone’s books” 53
www.risk-uk.com
Project5_Layout 1 03/06/2014 11:20 Page 1
FIATechnicalBriefing November2015_riskuk_feb15 03/11/2015 14:03 Page 32
FIA Technical Briefing
Risk UK: What are the most pressing issues to be addressed in the fire sector? Ian Moore: The level of professionalism in the core of the fire sector is higher than most people think. The problem lies in the area on the fringes of this core. There are a number of companies and individuals out there who lack professional knowledge, training and experience, but they’re allowed to operate in what’s basically a crucial area of life safety. We can learn a lesson from the way in which the domestic gas engineering world has been regulated in that all engineers undertaking gas work in the United Kingdom, the Isle of Man and on Guernsey must be registered, by law, with the Gas Safe Register. Businesses can only register if their engineers are competent and hold up-to-date and appropriate qualifications. Importantly, this also includes registered engineers working outside the scope of their qualifications so they must be directly relevant. With a publicly available register, the gas world openly encourages ‘whistleblowing’ should a member of the public believe an engineer is operating outside of this register. I do hear the view of a number of people who argue against professional fire training designed to reach a pre-set level followed by certification as being a waste of money on the basis that “we know what we’re doing and don’t see the need”. In many cases this may be true, but to ensure that all of our fire safety engineers meet this minimum level such that members of the public are protected as proficiently as possible, we do need to move towards a legal basis of competency without which they cannot operate. It’s easy to say: “There’s a long way to go…”, but I don’t believe there is. Already, there’s a general acceptance – and, in some cases, an insistence – among many parties that professional training and the awarding of certificates to successful candidates is a prerequisite for engineers working on risk assessments, installations, commissioning and maintenance. We need the Government to fully understand the implications of a legally enforceable ‘Fire Safe’ Register. Once this happens we can then push to have it ratified. Risk UK: What are your views on the future of the Fire and Rescue Services (and, indeed, the Emergency Services in general)? Ian Moore: This subject has dominated the higher level meetings and industry seminars that I’ve attended. The main topic is the Government’s proposal to merge the blue light services, initially bringing Fire Brigades under the control of Police and Crime Commissioners.
View from the Top The instigation of a ‘Fire Safe’ Register, Government proposals for merging Emergency Services functions and the convergence agenda. These are some of the issues occupying the mind of Ian Moore, the newly-installed CEO at the Fire Industry Association, while in conversation with Risk UK
Potentially, at least, such a move would be the foundation for even greater reform, with police chiefs believing this will lead to police officers and firefighters being trained as paramedics – to exactly what level is, at present, somewhat uncertain – and expected to deal with First Aid duties on the spot rather than wait for ambulance crews. Without having been involved in much debate about the subject, my view is that there can always be ways of making any operation more efficient. Surely there must be a number of areas common among the Emergency Services that could be merged such as shared back office functions, combined buildings or even vehicles which might facilitate joint response to incidents? We should not fight the idea just because it means change. The initial plans have provoked ardent controversy, with some suggesting that any proposal to merge the roles of Emergency Services workers could place lives at risk. Is this a case of over-reaction without benefit of knowing the full details? As is the case with most initiatives, it’s all about efficiency – otherwise known as saving money, in this case for the taxpayer – which is laudable. However, it’s also a policy fraught with danger when you consider the inevitable
Ian Moore: CEO of the Fire Industry Association
55 www.risk-uk.com
FIATechnicalBriefing November2015_riskuk_feb15 03/11/2015 14:04 Page 33
FIA Technical Briefing
concerns over demarcation lines and culpability, etc should we ‘get it wrong’. There will be many more rounds in the ring before this one is sorted out. Risk UK: What are your plans in terms of dialogue with Government on this issue and other pressing matters? Ian Moore: I’m extremely keen to engage with all stakeholders before forming my fullest opinions on the ‘merger’ issue. Only then can I give my detailed thoughts. As for engaging Government on other issues, I’m clear on the professional register and ready to go now. We have a few opportunities coming up soon to champion this initiative, and I fully intend to focus much of my time on presenting it as the next logical step forward. Much time and effort has been directed towards certifying products, the latest outcome of that work being the Construction Products Regulation (CPR). Without going into too much detail here, the CPR states that all products within the scope of a mandated European Norm or EN have to be CE marked. A differentiating and most important feature of the CPR is that life and safety-critical products will have to be third party tested and approved by an independent entity. The new legislation will apply to both domestic and commercial fire products. This puts the products on the right level. Now all we need to do is make sure people are at the same level. Risk UK: Having joined the fire sector from the security industry, what are your opinions on the convergence agenda for fire and security? Is it happening in the real world? Ian Moore: This is full circle for me as I began my working life in the fire industry after serving in the military. I’ve always been an advocate for truly integrated systems with BMS, fire, security, lighting and information broadcast all involved, but there has to be a balance in terms of embracing technology while also ensuring stability and resilience. When I brought video smoke detection to the market many years ago, this emphasised the use of convergence whereby the equipment is historically security (specifically CCTV), but the thought process behind placement, application and flame phenomena is clearly related to fire. Advances in information technology have been huge in the last few decades. The fire industry should be taking advantage of this and not fearing it. Everything about the way in which fire alarms are designed in terms of products, placements and annunciation is all about speed of detection to alerting fast and
56
www.risk-uk.com
with as much accuracy as possible. I fully understand the need to protect the fire alarm system’s integrity from outside influences, and we need to be assured this is the case along every step of the way. Compliance with Codes of Practice, legislation and approvals will keep manufacturers and system integrators “honest”, but the ongoing desire for cost efficiencies, increased performance and the pure drive for technological advances will likely win in the end. You only need witness the push towards mass notification systems to realise the taste of things to come. Risk UK: What are your main hopes and aspirations in terms of your new role as CEO at the FIA? What would you like to achieve in the short and longer terms? Ian Moore: I’m still formulating these thoughts as part of my current fact-finding mode, but there are a few longer term aspirations that are already quite clear. I would like to see all involved with the process of designing, installing, commissioning, maintaining and ‘owning’ fire products or systems – including firefighting equipment, services, appliances and personal protective equipment, etc – reach a professional level that’s measurable. I’m keen on innovation and want to further the work the FIA has done to date. I have a few strong ideas on how to pursue this, but need to discuss with my Board of Directors first before laying those plans out as they’re fairly radical. We need to evolve as an industry and speed up technology advances at the same rate as, say, the electronic security industry. This is far from reflecting any weakness in those involved in R&D, but rather represents a stifling of innovation in the fire industry due to the exorbitant cost of third party approvals – notably if you want to trade on the international stage – while the return on investment is often hard to justify. I want the FIA to be the voice of the fire industry. We have excellent depth in technical support while the knowledge cohort throughout the staff and councils is second to none in nearly every area. The FIA is well respected and very influential in many spheres of engagement to ensure members’ needs are supported. We can raise the bar in our industry. Our strapline which reads: ‘For professionals, by professionals’ really rings true to me. With our brand new website being the portal of upto-date information for our members (and for many non-FIA members as well), I believe that we’re well placed to achieve our aims.
paper ad_Layout 1 04/06/2015 17:59 Page 1
thepaper
Pro-Activ Publications is embarking on a revolutionary launch: a FORTNIGHTLY NEWSPAPER dedicated to the latest financial and business information for professionals operating in the security sector
Business News for Security Professionals
The Paper will bring subscribers (including CEOs, managing directors and finance directors within the UKâ&#x20AC;&#x2122;s major security businesses) all the latest company and sector financials, details of business re-brands, market research and trends and M&A activity
FOR FURTHER INFORMATION ON THE PAPER CONTACT: Brian Sims BA (Hons) Hon FSyI (Editor, The Paper and Risk UK) Telephone: 020 8295 8304 e-mail: brian.sims@risk-uk.com www.thepaper.uk.com
SecurityServicesBestPracticeCasebook November2015_riskuk_mar15 03/11/2015 14:21 Page 1
Body of Evidence
The process of gathering, auditing and testing evidence is crucial to the working of any legal system based on administering justice fairly and equitably. To this end, body-worn video systems can serve to obtain realtime admissions of culpability or responsibility from suspects when they’re presented with visual evidence of their behaviour. Gavin Greenwood investigates
ecuring evidence that can help prove criminality and result in a conviction in a Court of Law is, of course, one of the fundamental tenets of policing work. Unlike a confession, untainted and documented evidence is far more likely to be accepted by a Judge and Jury as it contains within it what may be seen by most as the ‘true’ version of events. While some forms of evidence do lend themselves to this – the bloodstained knife or the badly-forged cheque, for example – many others do not. Instead, they rely on documenting events, statements and observations subject to interpretation, analysis and manipulation. Gathering of evidence in Britain and, indeed, much of the world – given our country’s role in developing modern policing – can be dated from around the 1890s. It was then that police constables were issued with official notebooks for the first time in which they were to record statements and log information that could be used as evidence in a Court of Law. The notebook and its accompanying pencil remained the principal means by which individual police officers recorded their version of events and, to this day, still serve as important tools in the evidence gathering cycle.
S
Near total coverage Dramatic reductions in the cost of optical and digital technologies during this century have led to the wholesale introduction of visual means of recording events in real-time. Millions of CCTV cameras installed by public agencies
58
www.risk-uk.com
and private commercial interests alike – or individuals – now provide a near total visual coverage of urban centres around the world. However, the sheer number of surveillance cameras coupled with their inability to always provide ‘uncontaminated’ evidence means that, while they’ve certainly become an essential solution for aiding investigations, their images are rarely accepted as direct evidence. A technical generation on – now counted in a few years rather than decades – the largely surveillance-focused role of CCTV is being nudged aside by the far more proactive and immediately actionable body-worn video (BWV). Based on small camera systems, this technology is routinely worn by a growing number of public and private law enforcement and other security-related personnel as part of their standard equipment. The most obvious users of such systems include personnel whose work brings them into direct – and often contentious – contact with members of the public or chaotic situations and potentially violent individuals. They include police officers, prison staff and traffic wardens who face the routine threat of abuse or assault as part of their job. In order to serve as robust and credible sources of evidence within a legal context, BWV systems and the images they record must satisfy numerous criteria and be subject to challenge by defence lawyers and Judges. Their real operational value, though, appears to be their ability to both deter and calm confrontational situations simply by their presence, or to obtain a real-time admission of culpability or responsibility from a suspect when that individual is presented with visual evidence of their actions or behaviour.
Metropolitan Police deployment In June this year, the Metropolitan Police Service announced that the force would be deploying 20,000 BWV cameras to cover the majority of its officers in the wake of the largest trial of such a system ever undertaken. At the time, Commissioner Sir Bernard Hogan-Howe was quoted as saying: “Soon, more of our officers will be able to make a record of the very challenging circumstances they are asked to deal with on a daily basis and then demonstrate more effectively the reality of policing our capital. Body-worn video will also improve public scrutiny of how we carry out our role. That’s a vital part of being an accountable police officer. Such video is also an essential tool in gathering evidence of offences.” G4S was an early adopter of BWV technology, notably in the prisons and immigration centres
SecurityServicesBestPracticeCasebook November2015_riskuk_mar15 03/11/2015 14:21 Page 2
Security Services: Best Practice Casebook
which the company runs. Jerry Petherick, managing director for G4S Custodial and Detention Services in the UK, has confirmed the ways in which BWV is employed as part of the company’s prison and immigration removal centre contracts and contributed towards reducing the number and scale of violent incidents involving staff and prisoners. These systems have also calmed confrontations, improved the prisoner adjudication system, assisted with investigations and reviews and led to a better atmosphere in these establishments. “Body-worn video cameras were initially introduced on a relatively small scale,” explained Petherick, “with them being used only by duty orderly officers, but we were soon asked by the staff to increase the number of sets. All first line managers now wear them.” Petherick continued: “We did anticipate resistance to this innovation from staff-focused Trade Unions. While there was indeed some initial suspicion along the lines of: ‘You’re spying on staff’, there was no real resistance and now the national leaders of the Prison Officers Association are pushing the National Offender Management Service to adopt bodyworn video across the estate.” Phil Forder, G4S Central Government Services’ Arts and Community lead at HMP/YOI Parc in Wales, added that dog handlers involved in searching visitors are also equipped with BWV. Front-of-House personnel and those members of staff supervising prison visits will also soon be kitted out with the cameras in response to an increase in incidents of abuse by members of the public.
Disadvantaging the wearer? The issue of whether BWV may disadvantage the wearer is one often talked about among front line police officers. Some have voiced their concerns that evidence gathered through the camera system may be open to misinterpretation by either their superiors or the courts. One response to these concerns is that, as many members of the public have ready access to cameras in their mobile phones and other devices, almost any action undertaken by the police service may be photographed or filmed. BWV, at least, offers an alternative view of a contentious incident seen from the officer’s perspective. As a company, G4S is also pioneering the use of BWV in other areas where friction between members of the public and our employees can occur, or in those industries where a visual record may support and maintain high standards of security and/or compliance.
“In order to serve as robust and credible sources of evidence within a legal context, body-worn video systems and the images they record must satisfy numerous criteria and be subject to challenge by defence lawyers and Judges” This year, the company deployed BWV as part of its security provision for both the Conservative Party and the Labour Party at their Annual Conferences to help de-escalate challenging situations and provide an important record of any incident – a particular concern given the level of protest that can be aimed at major political events. BWV has also been used for incident response at festivals and sporting events, including the British Summer Time music festival that ran in Hyde Park during June. G4S personnel involved in security guarding assignments at sensitive defence establishments – such as the Gurkha Services Division, or those staff involved in protecting the Rosyth naval dockyard where the new Queen Elizabeth-class aircraft carriers are being built – also use BWV technology to record their patrols and any security incidents of note.
Gavin Greenwood: Security and Defence Specialist for G4S International
Across the wider world Other uses of BWV are now being reported. Some bar staff in Britain, for example, have been issued with wearable cameras as a means of protecting their employers from accusations of underage drinkers being served. It’s fair to suggest that the technology behind BWV is only just beginning to make an impact. The endless possibilities it offers, alongside other evidence-recording devices, will surely render the traditional notebook and pencil redundant sooner rather than later.
59
www.risk-uk.com
BringYourOwnDeviceandSecurityManagement November2015_riskuk_mar15 03/11/2015 13:49 Page 1
BYOD Security for Modern and Mobile Staff
Bring Your Own Device (BYOD) strategies are one of the major forces behind a new era of mobile working. As more companies move their IT assets into the cloud, the attractions of BYOD are plain to see for both organisations and individuals alike, but what about the myriad security considerations? John Knopf focuses on the main points involved
hen it comes to embracing Bring Your Own Device (BYOD) within the workplace, the host company need not spend a fortune on hardware and employees are able to work from the comfort of a familiar device, duly consolidating all of their business activities in one place. There’s also the lure of flexible working: companies don’t have to suffer reduced employee productivity during rail strikes or bad weather, while those employees are no longer chained to desks. However, the rise of remote working, the proliferation of devices and the expansion of system borders realise a whole host of security issues. Even the most carefully regulated systems will be exposed to a wide variety of use cases as employees with differing levels of access, user needs and geographies make their demands. In turn, that generates a varied threat landscape: there’s no longer one way into and out of the enterprise network. There’s no ‘drawbridge’ which can be simply pulled up. Now that every mobile device is a potential target for hackers, businesses must be confident in the agility of their cyber security defences no matter what the device or from where in the world the network is accessed.
W
Implications for IT Companies will need to be able to manage not only devices, but also connections, authentication and deployments on a perapplication and per-employee basis. Using dynamic policies for updates, management and security can allow BYOD strategies to mould to employees’ needs
60
www.risk-uk.com
without sacrificing good security procedure. Prioritising and shaping traffic for the right applications and for the right job is critical for keeping employees connected and productive as well as for maintaining visibility over the network. As an added bonus, it will also help to protect organisations from the possible setback of ‘bill shock’ each month as a result of roaming charges. By controlling the connection of BYOD technologies on a per-application basis, organisations can choose what they’re paying for and what they’re not. This means that if you need to ensure employees aren’t burning through company-funded mobile data in nonbusiness hours, or using non-business applications, then you can. One effective method for implementing this kind of per-app control is a comprehensive mobile VPN solution providing secure and reliable communications in addition to all the management and assessment benefits.
Impact on data security It’s becoming clear that the pace of change and the increasing adoption of mobile devices isn’t going to abate. As a result, mobility will continue to cause headaches for companies, opening up a range of dangers not previously experienced by the static office system. Employees working on old devices with outof-date operating systems or applications also present a weak point in company security. OS and app patches frequently include security updates designed to plug existing gaps or react to new threats. If users repeatedly decline to install updates – something we’ve probably all been guilty of at times – then their devices have a much higher chance of being vulnerable. Even if you can guarantee that all the devices connected to your network are up-to-date, there’s still the possibility that employees may attempt to work around mobility controls – by removing application restrictions, for example, or misusing bandwidth to access restricted websites – which can result in network damage or data breaches. Going one step further, jail-broken devices constitute an even more serious potential threat. Jailbreaking – effectively removing the manufacturer’s hardware restrictions – makes it possible for users to install insecure services and leaves gateways open for targeted attacks. In August this year, for example, the KeyRaider malware was found to affect only jail-broken iPhones. It allowed hackers to
BringYourOwnDeviceandSecurityManagement November2015_riskuk_mar15 03/11/2015 13:50 Page 2
Security Management for Bring Your Own Device
access the login information and passwords of 225,000 users. Though it can be hard to spot their presence, jail-broken devices are clearly not a minor concern. Any mobile-orientated enterprise needs to be keenly aware of the dangers they present. With more employees working on the move, the threat of physical loss and theft is something that has also come into consideration. Each mobile employee carries with them an entry point into the company network, and if that point isn’t sufficiently guarded then a burglary or even just a moment of absent-mindedness when on the move could result in a costly data breach. Ensuring that employees have more complex, hard-to-guess passwords on all company-affiliated devices is an important first step towards protecting against unwanted access in this situation. Multi-tiered authentication is better yet and, although it may sound simple, it can be very effective. Although an increase in employee mobility may generate much greater productivity in an accelerating business world, moving system access points outside of the workplace does mean that a robust front-facing security solution is a ‘must’.
Fight fire with fire The flexible workforce faces a host of security risks, but there are answers. The most crucial elements of mobility are the security and connectivity of each individual application, not just the device as a whole. Crucially, it doesn’t – and shouldn’t – matter what kind of device the application is on or who owns it. Per-application management affords enterprises the flexibility and control to manage specific data rather than relying on the security of the end-point device and its user. This makes security, authentication and management of business data simpler and more robust, and allows support and IT admin functions to be conducted more effectively. Managing devices on a per-app basis can also protect companies from ‘Evil Twin’ attacks. When employees connect remotely to an open or public Wi-Fi network, per-app management acts as a secure gateway to the corporate VPN network, safeguarding against attacks from hackers. Hackers typically position themselves between the user and the connection point, intercepting communications and then relaying them on. This is done by setting up a fake network (the ‘Evil Twin’) to mirror the real, freely available one. When users unwittingly connect to this fake network, a hacker can then copy account names and passwords, redirect victims to malware
“Although an increase in employee mobility may generate much greater productivity in an accelerating business world, moving system access points outside of the workplace does mean that a robust front-facing security solution is a ‘must’” sites or intercept files. Many organisations place a strong emphasis on managing device configuration and employee profiles, but this is often at the expense of insufficient attention being paid to strong, multi-factor authentication and security. IT staff should be able to set access policies by department, seniority or device type to serve different needs, workflows and security authorisation requirements. This could include regular re-authentication for employees with specific high-level security clearance. In addition to these technological solutions, it’s also important that enterprises engage in hands-on employee education. Rather than simply treating mobile workers as liabilities, security teams will see greater results if they involve them in the security effort, making them fully aware of the dangers of jailbreaking and open Wi-Fi network use and ensuring they appreciate the role their devices actively play in the realms of the wider corporate network. There’s truth in the well-worn adage that ‘the weakest point in your company’s security is you’, so the positive impact of a well-informed workforce should never be underestimated.
Moving with the times What about the future of these technologies? Even the most agile system will become outmoded given time. In order to future-proof against the security challenges of BYOD and other emerging mobility strategies, companies need to build a dialogue with their employee community. They must invest in solutions that focus on solving real user problems and practice real user enablement, working towards achieving both transparency and app stability. At its heart, mobile working is all about efficiency. The technology we use should make driving efficiency easier to achieve rather than becoming a barrier. More to the point, workers with clearly defined use-case parameters which match their needs are much less likely to rebel against IT controls. That’s a key part of managing change: taking the workforce with you as you grow your systems in order to maintain a healthy relationship between user and technology. Only then can IT teams and employees work together to maintain the security of their borderless networks.
John Knopf: Vice-President of Product Management at NetMotion Wireless
61
www.risk-uk.com
TrainingandCareerDevelopment November2015_riskuk_apr15 03/11/2015 13:38 Page 1
Raising the Bar for Security Education Risk UK: What does the Level 7 Advanced Diploma in Security Management offer over and above other courses? Ken Livingstone: It’s set at Master’s degree level and the fact that it’s accredited as a Level 7 Advanced Diploma signifies that it’s designed to benefit those wishing to take their professional development to the highest levels within both the security profession and The Security Institute.
Risk UK interviews Ken Livingstone, managing director of Perpetuity Training, who offers an overview on the importance of the availability of a Level 7 Advanced Diploma in Security Management for practising professionals. Livingstone also outlines what Perpetuity Training is doing in partnership with organisations like The Security Institute to raise standards within and across the security profession
62
www.risk-uk.com
Risk UK: Looking at the Perpetuity Training prospectus, there appears to be a large number of accredited courses already available to security professionals who wish to enhance their skill sets. Why have you felt it necessary to introduce the Level 7 Advanced Diploma? Ken Livingstone: Simply put, together with The Security Institute, we’re endeavouring to raise the bar. The security sector, in terms of who works within it, has undergone a significant transformation over recent years. Long gone is the situation where someone could sit on the Board of an organisation in the role of security director or hold a senior security management position just because they had spent a number of years – or held a senior rank within – the Armed Forces or the police service. Experience is still important, of course. Indeed it’s essential, but today’s security professional understands the need to acquire accredited career-enhancing qualifications that will not only provide the knowledge and skills to help them become more effective in their current and future roles, but which will also signify their competence to achieve that goal. The Level 7 Advanced Diploma in Security Management has been developed as a result of direct feedback that The Security Institute has gleaned from its members which highlighted the demand for a Level 7 qualification.
Risk UK: Many of those individuals who might be at a stage of their career where this training programme and the resulting Diploma will be of value to them are likely to lead very busy lives. Is there not the potential danger that they’ll be deterred from participating because of a perception that the course will be very timeconsuming to complete? Ken Livingstone: That’s a good question. The Diploma is designed to be completed in nine months. However, with the busy security professional in mind, we’re delivering the training programme by distance learning. Students can therefore schedule studies around their work and family commitments wherever they happen to be in the world. Risk UK: Can you offer Risk UK’s readers a little more detail around the assignments involved? Ken Livingstone: There are three assignments and these are essentially how students will be assessed. The last of the assignments will be focused on a security management topic chosen by the student. This is an opportunity for the student to produce a high level body of work which could be of direct relevance to their job and, subsequently, of considerable value to their employer. Risk UK: Has the course been specifically designed to allow students the flexibility to study a topic that’s of specific and practical interest to them? Ken Livingstone: Yes indeed. The course is based around researching security and crime issues. The first of the three modules seeks to give students new skills in relation to thinking about crime. It covers critical thinking and looks at the ways in which we consider security problems and the potential solutions. There’s always a danger in security management that we rush towards implementing marketplace solutions rather than first looking to design-out the problem. Risk and security professionals should bear this in mind.
TrainingandCareerDevelopment November2015_riskuk_apr15 03/11/2015 13:38 Page 2
Training and Career Development
The next two modules cover a research proposal followed by a piece of research chosen by the student. It gives them the opportunity to apply the skills they will learn on the course by solving a problem relevant to their own role or present working environment. Risk UK: What is Perpetuity Training’s working relationship with The Security Institute? Ken Livingstone: Perpetuity Training has been The Security Institute’s sole Development Partner for Education since 2007 and, through mutual respect, we’re always looking at ways in which to work together to raise the level of professionalism within – and recognition for – the security sector. While admittedly there’s a commercial imperative, it’s fair to say that both organisations share a passion for supporting security professionals in their endeavours to effectively manage the risks around the threats posed by terrorism and criminal activity in all of their various forms in order to create a safer and more secure world.
University of South Wales course Perpetuity Training’s reputation as a leading provider of accredited security management training is further enhanced by news that a Diploma course which it delivers on behalf of The Security Institute has now been incorporated within a BSc degree course run by the University of South Wales. The Security Institute’s Diploma in Security Management has been embedded within three modules which students will encounter during the second year of the BSc (Honours) degree in Risk Management, Security Operations and Investigation. The Diploma provides students with a broad understanding of how security theory works alongside Best Practice to form successful security initiatives. Delivered by distance learning, the training course affords students an understanding about the risks, causes and prevention of crime, as well as the design and implementation of loss prevention and security initiatives. It does so by exploring theoretically-founded concepts and encourages students to introduce their own ideas and experiences to scenarios directly related to the workplace. “The quality of the content of the Diploma course and the way in which Perpetuity Training presents the online content really did make it a very easy decision to embed this as an integral component of our BSc Risk Management degree,” explained Brian Blakemore, associate
“There’s always a danger in security management that we rush towards implementing marketplace solutions rather than first looking to design-out the problem. Risk and security professionals should bear this in mind” head of the School of Health, Sport and Professional Practice (the latter encompassing both policing and security) at the University of South Wales. Blakemore continued: “The ultimate objective of the degree course is to cover a wide range of subjects that will actively assist graduates to both assess and minimise risk. These specific subjects include physical security, customer/passenger security, IT security and financial security, managing security operations and carrying out investigative work. The Diploma course has helped us achieve this aim by dovetailing perfectly with the second year of the degree.”
Working through the modules
Ken Livingstone MSc FSyI: Managing Director of Perpetuity Training
In addition, Blakemore told Risk UK that five students are already studying on the second year stage of the BSc Risk Management degree and are therefore currently working through the Diploma modules. Among them is a student who, following a career in both the police service and the Armed Forces, has been able to directly enter into the second year of the BSc course.
63
www.risk-uk.com
RiskinAction November2015_riskuk_nov15 03/11/2015 14:19 Page 1
Risk in Action Retail therapy proves to be a positive experience for Dante Group and ACT in Manchester’s Arndale Centre Dante Group has installed ACTviquest – an integrated access control and video management solution – at the £100 million Manchester Arndale Centre. Developed by ACT, the ACTviquest solution enables end users to operate cameras and access control from a single platform as part of a unified suite. Playing host to over 200 outlets, the Arndale Centre is the third largest city centre shopping venue in Europe. Security requirements are complex. The overriding requirement was for a scalable solution that would combine VMS with access control as a genuine integration rather than a ‘bolt-on’ solution. ACTviquest offers flexible video recording, retrieval and archiving options with broad access control information such as break-glass, door forced or door ajar scenarios. Users at the Arndale Centre are benefiting from a GUI that shows the site with a ‘3D feel’ which represents all devices and their current status as icons. Fire alarm systems are included in these views. If a member of the public or an intruder attempts to use a restricted door anywhere on the 140,000 m2 site, ACTviquest highlights this to operators and presents them with camera feeds in the relevant zone. The Arndale houses a nine-floor central tower with offices used by its own staff as well as third parties. Employees use MIFARE cards with access privileges appropriate to their job. They present their cards to readers, and door control is then managed via ACTpro 4000 controllers. These units are designed for high traffic volumes where changes to the cardholder database are a regular occurrence. They can manage up to 60,000 users. ACTviquest has a mobile app that not only allows Arndale Centre managers to view the site remotely, but also means they can leave the Control Room during an incident to gain information on the ground as a situation unfolds.
Panomera multifocal sensor technology keeps a watchful eye on the Millennium Square Millennium Square in Bristol sits beside the At-Bristol Science Centre, an interactive science venue. The expansive Millennium Square is always busy and continually plays host to scores of visitors. For that specific reason there was a desire to improve security in this public square. Previously, surveillance had been provided by just a single PTZ camera which was part of
64
www.risk-uk.com
Technology migration enhances fire protection for the English National Opera at the London Coliseum The English National Opera (ENO) is based at the London Coliseum, a Grade II-listed building. The Coliseum is a prestigious landmark and has 2,359 seats accommodating the largest theatre audience in London. Recently, the ENO decided to undertake an extensive fire detection and alarm systems upgrade. Siemens Building Technologies’ Sinteso fire detection system has been deployed and features advanced intelligence which delivers the highest level of protection against all types of fire hazards. Each detector is configured with a set of parameters for each location, enabling the system to differentiate between false fire phenomena and a real indicator of fire. The system’s built-in intelligence means that it can offer fast identification and early warning of fire. The system is constantly alert, evaluating each situation minute-by-minute and taking decisions on complex criteria to ensure a safe environment at all times. the At-Bristol Science Centre’s own CCTV system. “The single PTZ was generally left in a wide angle view to give us an overview of the area,” explained John Whittaker, security team manager for At-Bristol. “This meant that if we had to retrieve any evidence the recorded images needed to be digitally zoomed and would pixelate too much to be of any evidential value.” Bristol City Council found the solution at a CCTV User Group Conference, where managers learned about Dallmeier’s Panomera multifocal sensor technology. A suitable installation site was chosen in consultation with CCTV provider Select Electric. A single Panomera camera with a 90° viewing angle is enough to monitor the Millennium Square space in its entirety. One workstation within the Security Control Room in the At-Bristol Science Centre allows recordings to be searched by security officers.
RiskinAction November2015_riskuk_nov15 03/11/2015 14:20 Page 2
Risk in Action
DirectIP delivers a cost-effective and high performance monitoring upgrade for the Park Grand Hotel IDIS has announced the successful roll-out of a 64-camera DirectIP surveillance solution at the Park Grand Hotel in London’s Paddington, which is part of the Shaftesbury Hotels property group. The implementation by systems integrator Rukey Solutions was completed on time and on budget to provide the newly-refurbished hotel with a cost-effective and high performance monitoring solution. Increasingly cumbersome to operate, the existing analogue CCTV system had become difficult to use and required considerable external support and maintenance to keep it running smoothly, while ageing cameras were not able to provide reliable evidence in the event of an incident. The hotel owners wanted to transition towards a user-friendly solution with proven capacity for high quality HD monitoring. Rukey Solutions has duly delivered a centralised IDIS DirectIP HD surveillance solution with two 32-channel NVRs, 64 Full-HD dome cameras, multiple refuge Call Points, integrated alarms, network equipment and IDIS client software as an integrated package. The DirectIP true plug-and-play functionality and auto-configuration dramatically reduced installation time, ensuring a smooth, fast migration to a surveillance system that offers “vastly improved” coverage, “superior image quality” and “outstanding” reporting capabilities. The user-friendly interface ensures that it’s ultra-simple to operate, with maximum flexibility to dynamically adapt settings to suit day-to-day needs. It also provides long-term storage capacity while enabling the rapid retrieval of high resolution images. There’s minimal maintenance and, in turn, a low total cost of ownership. The surveillance solution is delivering costeffective, high performance monitoring and visual validation of events throughout the hotel.
Advanced constructs fire safety solutions Empire for one of historic Bath’s prestigious Grade II-listed buildings Global intelligent fire systems manufacturer Advanced has been chosen to protect the historic Empire Hotel in Bath. The Grade II-listed building is located close to Bath Abbey and Pulteney Bridge and was used as a Royal Navy postal sorting office from World War II until 1990, when it was converted into retirement apartments and restaurants. The contract for the installation was awarded to the team at Tann Synchronome who specified the latest MxPro 5 panels from Advanced. MxPro 5 fire panels are a leading multiprotocol choice. Will Jones, project manager for Tann Synchronome, commented: “We suggested the MxPro 5 to First Port, the managing agent. The diagnostic mode allows us to demonstrate to ourselves and the client that there are no device communication issues”. Indeed, the MxPro 5 has full diagnostic tools built-in, including an on-board oscilloscope. MxPro 5 panels can be used in single loop, single panel format or easily configured into high speed, 200 panel-strong networks covering huge areas and tens of thousands of field devices. The MxPro 5 panels installed at the Empire are among the best performing fire systems from Advanced and one of the few available solutions approved to the EN54 2, 4 and 13 standards. In total, 340 individual components have been installed in the new system, which is built around a four-loop MxPro 5 panel. The installation covers the main Empire building, the in-house cinema and the fitness centre as well as two restaurants on the building’s ground floor. Emma Nicholas of First Port said: “We must minimise disruption to our residents at all times. This is one of the reasons why the MxPro 5 panels are an ideal solution.”
ADT’s fogging systems at Salou fashion outlet give burglars the boot The independently-owned fashion store Salou was founded in London’s Knightsbridge back in 1987 and, in the intervening period, has been targeted by intruders. One particular incident led to a member of staff being attacked and the theft of merchandise. On that basis, the management team took the decision to upgrade its in-store security solutions. While a CCTV surveillance system from ADT and security grills help to deter burglaries out of hours, Salou also required protection when the store was open. ADT recommended a fogging system, which is designed to rapidly repel intruders from the premises by obscuring their view. Staff at the store have opted to carry panic buttons which, when activated, send a signal to the ADT control panel, in turn triggering the Fog Bandit device. The system works by activating a special liquid formula which is heated and ejected under high pressure. Once released, the liquid vaporises into a thick and dense ‘fog’ which quickly expands to fill the area being protected. Essentially, there are two sides to fogging security measures: the panic system (employed during the working day by staff ) and the intruder system (which activates when more than one detector or door contact is fired).
65
www.risk-uk.com
TechnologyinFocus November2015_riskuk_sep15 03/11/2015 13:41 Page 1
Technology in Focus Evve Surveillance develops specialist LR325K longe-range Full-HD surveillance cameras
Evve Surveillance has released the LR325K, an ultra-long range Full-HD 1080P surveillance camera designed for use in environments requiring exceptional image clarity over long distances. Typical applications will involve ports, borders, Critical National Infrastructure and Safe City projects as well as military bases. The LR325K can detect the presence of objects at 35 km, recognise them in terms of category at 15 km and identify them at 5 km using The Johnson Criteria. The Johnson Criteria were developed by the US Military for evidential surveillance and are now used as a performance benchmark for civilian and military optical surveillance capability. Created in-house by the company’s own R&D team, the LR325K delivers “outstanding” HD-SDI colour image clarity based on a 120x optical zoom lens. In-camera processing exploits corrective modes to optimise performance in adverse weather conditions such as fog and mist. A premium IR cut filter specially developed for the product optimises night-time and lowlight performance. www.evveinternational.com
Charter Global launches “first-ever” SR5 security-rated shutter solution for the UK market
With heightened levels of security across the globe, Charter Global – established manufacturer of the Obexion LPS 1175 range of security shutters – has raised the bar in terms of security by introducing the “first-ever” SR5 security-rated shutter. The Obexion MD SR5 is certified to LPS 1175 Issue 7 SR5 and specifically designed to provide the highest level of security available for high risk locations such as Critical National Infrastructure, military and national security establishments as well as high value public and commercial premises. The SR5 is designed to protect against a sustained and professional attempt to gain entry using a range of handheld performance power tools for extended periods of time. To achieve this exceptional level of security rating, the shutters have to withstand a total attack time of ten minutes using various high performance power tools including an 18 V reciprocating saw and an angle grinder. Obexion’s ‘Lockdown’ technology means that the SR5 requires no auxiliary locking system. The ‘profiles’ lock the shutters in any stop position, fully closed or otherwise. This means the shutters cannot be forced open to gain entry, making them ideal as a first point of entry security for any facility. The SR5 can be installed on re-enforced concrete and structural steelwork, but its lightweight construction also means that it may be deployed on buildings of cultural and historic interest. The new shutters are motorised to specifically allow for both controlled ascent and descent. www.charter-global.com
66 www.risk-uk.com
New and improved ranges of waterproof Call Points and Push Buttons unveiled by Safety Technology International (Europe)
Safety Technology International (Europe) has added new waterproof editions to its already very successful ranges of Call Points and Push Buttons. Highly versatile, this new range combines “first class design quality and value” for the purchasing end user. Quick and easy to install, there are several types available. The Waterproof Re-Set Call Point mimics the feel of breaking glass while offering end users the benefits and safety advantages of a glass-free operating element. For its part, the Waterproof Push Button is available as a momentary push-and-release or a push-key to reset for those applications where repeat activation must be controlled. All of the new models are designed to withstand harsh environments, either indoors or outdoors, and rendered ideal for applications such as oil rigs, on ships, in factories and within food processing plants. www.sti-europe.com
End users urged to “energise” CCTV solutions with Xeno’s Nitro range
Xeno has announced that it can now offer customers Full-HD resolution over standard RG59 coax at ranges of 300 metres thanks to the company’s new Nitro range of cameras and DVRs. The range brings “superb” 1080P image quality to the end user at an “extremely costeffective” price point. Available options include eyeball, bullet and vandal-resistant dome cameras, as well as 4, 8 and 16-channel DVRs. The new DVRs operate in exactly the same way as the XDR960 range with no additional training required. The same Central Management Software can be used to connect to these and also the range of Xeno IP NVRs. www.xeno-cctv.com
TechnologyinFocus November2015_riskuk_sep15 03/11/2015 13:41 Page 2
Technology in Focus
Axis Communications focuses on Guard Suite for enhanced video surveillance efficiencies
Axis Communications has developed Guard Suite, a series of video analytics applications that turn the company’s network cameras into smart security systems, thereby allowing a more proactive approach to video surveillance. This particular solutions offering is well suited to commercial, industrial and public buildings and indoor areas. Available for various monitoring requirements, the applications complement Axis’ range of network camera solutions and are easily integrated with Camera Station, the proven video management system (VMS) specifically optimised for Axis Communications’ network video products. Guard Suite offers a reliable solution for use in low-traffic areas such as the after-hours monitoring of retail outlets and offices, parking zones and other unattended areas. Guard Suite provides robust detection as video analysis is performed directly on a given camera’s uncompressed video stream. www.axis.com
Reduce the risks of a data breach with the Aperio KS100 Server Cabinet Lock ASSA ABLOY Access Control, a UK division of ASSA ABLOY, is helping companies ensure that their sensitive data is protected against unauthorised access with the Aperio KS100 Server Cabinet Lock. The KS100 allows server cabinet doors and racks to be integrated with real-time access control systems in order to determine exactly who can access the servers and when. In addition, the smartcard-operated Aperio access control solution is able to generate audit trails, in turn rendering the KS100 “invaluable” for incident investigations carried out by risk managers. Damian Marsh, managing director at ASSA ABLOY Access Control in the UK, explained: “With the data centre market growing fast, many companies are sharing a data centre location and often even the same rack. The process of managing physical access to servers is critical in ensuring compliance and avoiding costly breaches.” Installation is quick and easy, with power coming via a Power over Ethernet connection. Once installed, KS100 locks integrate with an electronic access control system and communicate wirelessly through an Aperio Communication Hub. With online integration, when a smartcard credential is presented to the lock, access decisions are immediately communicated. www.assaabloy.com/aperio
360 Vision Technology introduces the Centurion ruggedised PTZ camera system for end users 360 Vision Technology has introduced a new mid-level model addition to its ruggedised camera range. The new Centurion PTZ camera system is positioned between 360 Vision’s fully-featured Predator PTZ model and the entry-level Black Hawk dome camera. The Centurion camera offers a level of performance perfectly suited for any mid-level surveillance application, such as town centres, warehousing, retail projects, car parks, transport schemes or commercial premises. Using the same ruggedised housing technology as Predator, Centurion has been designed to resist the harshest of weather conditions. Combined with a robust directdrive gearbox (ie there are no belt-drive derived problems to contend with), Centurion
provides end users with “reliable, smooth and highly accurate” camera control. As well as being available in three analogue (18x, 28x and 40x day/night) and three IP camera options (30x/1080p, 30x/720p and 20x/1080p Night Vision Ultra 0.45 lux colour), Centurion can also be ordered with an optional ‘Hybrid’ upgrade. This upgrade provides both analogue and HD functionality in the same camera head. ‘Hybrid’ technology means that when a traditional surveillance installation moves to HD infrastructure, standard analogue 4:3 images (in HD quality) can be replaced with Full-HD 1080p widescreen images at the ‘flick of a switch’ and with no additional equipment required. www.360visiontechnology.com
67
www.risk-uk.com
Project2_Layout 1 19/10/2015 12:50 Page 1
Ensure security excellence for your company at the leading exhibition for technology, solutions and knowledge The global stage for security innovation and expertise 3 Free education sessions provided for you to learn from the industryâ&#x20AC;&#x2122;s best and brightest 3 Find the right security solution provider for your business amongst the 600 exhibitors 3 Get hands on experience with the latest gadgets in security technology 3 You can save time by pre-booking meetings with your preferred suppliers
SECURE YOUR PLACE AND REGISTER NOW AT IFSEC.CO.UK/PSI-MAGAZINE Supported by
Organised by
Part of
Appointments November2015_riskuk_jul15 03/11/2015 13:48 Page 1
Appointments
Peter Jones
G4S Facilities Management, the FM business of global security company G4S, has appointed Peter Jones as its new regional managing director. Jones will now be directly responsible for G4S FM, a leading facilities management business which currently employs more than 7,200 staff across the UK, Ireland, the Channel Islands and the Isle of Man. G4S FM delivers integrated facilities management, security, Front of House, hard FM, cleaning, catering and service desk solutions in the corporate, healthcare, education and central Government sectors. Jones boasts more than 23 years’ experience in the property, facilities management and engineering sectors at both national and international levels. Most recently, he served as managing director of CBRE’s integrated facilities management business across the EMEA region. Prior to that, Jones held several leadership roles in his eight years at Carillion, with responsibilities including infrastructure services, property services and facilities management. In his earlier career, Jones worked for Barclays where he led the FM strategy, and at Johnson Controls where he was tasked with delivering specilaist FM projects. Jones’ expertise includes business leadership, market growth and acquisition, client relationship management, major outsourcing and facilities change. “We can grow our FM business in the UK and Ireland and help to develop our overall FM offering in other key markets as clients are increasingly looking for us to provide additional integrated solutions,” commented Jones.
Kevin Stearns and Piotr Pogorzelski Kevin Stearns (pictured) joins the Fire Industry Association (FIA) as the organisation’s compliance manager. Since 2003, Stearns has been heavily involved with ISO 9001 and other ISO standards and is an IRCA-certified lead auditor for both ISO 9001 and OHSAS 18001. Following on from 15 years’ military service, Stearns has worked in a range of companies since 1994, focusing on IT training through to the oil industry and deployment in a range of office management and administration management roles. At the FIA, Stearns’ new role involves working directly with member organisations. His background also means that the FIA will be
Appointments Risk UK keeps you up-to-date with all the latest people moves in the security, fire, IT and Government sectors David Mundell
The Axis Group of Companies has promoted David Mundell to managing director of the Axis Security business. Reporting directly to Group CEO Jonathan Levine, Mundell will be responsible for further strengthening the company’s position as a foremost provider of security guarding and support services to a number of high profile regional, national and international clients. The company has grown from a standing start to turn over more than £60 million, and is part of a Group that has doubled in size during the last three years. Having originally pursued a career in architecture with the Property Services Agency, Mundell moved into sales in 1983 with Canon UK before joining the security industry in 1996. He was formerly sales director at First Security, and a central part of the management buy-out of that business in 1998 alongside Jonathan Levine. Again working in tandem with Levine, Mundell was also involved with the management buy-in to Axis Security in 2007. Levine believes Mundell’s elevation to managing director is well deserved. “David is one of the most well-known and well-respected personalities within the security guarding sector,” Levine told Risk UK. “His knowledge of that sector is second-to-none. He has played a key role in our previous success and has exactly the right experience we need to support our future ambitions.” in a position to offer ISO 9001 and OHSAS 18001 audits to those members who might wish to have a second party audit on their management or Health and Safety systems. In parallel, Piotr Pogorzelski becomes the new communications manager at Euralarm in Brussels. Pogorzelski will be responsible for all marketing and communication activities, taking over marketing responsibilities from Dirk Gesenhues in addition to a number of tasks previously carried out by the Technical Committees on Advocacy and Marketing. Pogorzelski will report to Glen Dale, general director of Euralarm, and work closely with the Euralarm Technical Committees diligently focused on numerous projects and initiatives.
69
www.risk-uk.com
Appointments November2015_riskuk_jul15 03/11/2015 13:49 Page 2
Appointments
Richard Lee
Uta Ragnitz
Security systems specialist Vanderbilt International has furthered its commitment towards “unrivalled operational standards” with the appointment of Uta Ragnitz as the business’ new head of quality and process management. An experienced and proven leader, Ragnitz joins Vanderbilt with the aim of building on the company’s current success, differentiating the business from competitors and enabling it to enhance its position within the security sector. Having graduated from Friedrich Schiller Universität in Jena, Germany during 2005 with an MA in Social Sciences, Intercultural Business Communication and Spanish, Ragnitz began her career at ASSA ABLOY as a management assistant, subsequently gaining extensive experience in the electronics and security business sectors with a number of other companies. Ragnitz joins Vanderbilt from HID Global where, as senior operations manager, she gained valuable insight into the importance of quality-related standards implementation and results evaluation. Commenting on her new role, Ragnitz told Risk UK: “Quality management is a vital part of this business. My job is to guarantee that our customers receive the best service and that we ship their orders on the requested dates.”
Ian Young and Gary Mercer
VCA has appointed Ian Young (pictured) to the role of business development manager for the EMEA region. Young assumes responsibility for developing relationships with key market influencers including consultants, specifiers and systems integrators to identify sales opportunities for VCA’s new range of IP network video devices. Prior to joining VCA, Young was commercial manager for SmartCCTV, a value added reseller of video analytics, video incident detection systems and high end surveillance solutions designed for the transport sector. “Ian is a welcome addition to our fastexpanding global sales team,” said Kevin Waterhouse, executive vice-president of global sales at VCA. “His appointment reflects our commitment to recruiting people of the highest calibre such that we provide customers worldwide with the best possible levels of preand post-sales support.” VCA also welcomes highly respected security professional Gary Mercer to its sales team. Mercer, who will be based at VCA’s UK headquarters in Surrey, has been appointed in the crucial role of UK sales manager. His career within the electronic security industry spans almost 40 years and includes spells at Tyco Fire & Security, Norbain and, most recently, VideoIQ (where he was the UK director responsible for promoting the company’s video analytics solutions).
70
www.risk-uk.com
Wavestore, the Video Management Software (VMS) specialist, has boosted its sales team with the appointment of Richard Lee as UK key account manager. Reporting to Glenn Fletcher (head of sales), Lee will be working with Wavestore’s growing client partner base to identify and support new opportunities for the company’s open platform VMS which has been designed to “unlock the full potential” of integrated security solutions. Prior to joining Wavestore, Lee served as regional sales manager for Genetec, while he has also performed sales roles at Dimension Data, UTC Fire & Security, Xtralis and Tyco Fire & Security during a career within the electronic security industry which now spans 34 years. “Richard’s appointment is an important part of our strategy to ensure that new and existing customers are fully aware of how they can capitalise on the capabilities of the Wavestore VMS,” said Glenn Fletcher. “Richard’s professional sales skills and extensive industry knowledge will be extremely valuable to us.”
Jeff Jones and Mike Booth
Law firm Eversheds has announced that Jeff Jones (pictured) has been appointed to run the company’s contract resource offering for inhouse compliance teams. Jones rejoins the business from Blake Morgan LLP where he was head of HR operations. Prior to this he held a senior HR role at Eversheds for over a decade before leaving the company in 2011. At the same time, Eversheds Consulting has appointed Mike Booth from Bovill Limited to further develop its financial services regulatory team. He will focus on asset management, investment advisor and private banking compliance. Booth boasts a strong regulatory background having held senior roles within a ‘Big Four’ consulting practice and a boutique investment management consultancy which have involved advising companies on the FCA regulations and providing consultancy services to investment managers in relation to regulation, fund structuring, corporate governance, risk management procedures and external investigations.
sep15 dir_000_RiskUK_jan14 03/11/2015 16:35 Page 1
Best Value Security Products from Insight Security www.insight-security.com Tel: +44 (0)1273 475500 ...and lots more Computer Security
Anti-Climb Paints & Barriers
Metal Detectors (inc. Walkthru)
Security, Search & Safety Mirrors
ACCESS CONTROL
Security Screws & Padlocks, Hasps Fastenings & Security Chains
Key Safes & Key Control Products
Traffic Flow & Management
see our website
ACCESS CONTROL – BARRIERS GATES & ROAD BLOCKERS
FRONTIER PITTS Crompton House, Crompton Way, Manor Royal Industrial Estate, Crawley, West Sussex RH10 9QZ Tel: 01293 548301 Fax: 01293 560650 Email: sales@frontierpitts.com Web: www.frontierpitts.com
ACCESS CONTROL
ACT ACT – Ireland, Unit C1, South City Business Centre Tallaght, Dublin 24 Tel: +353 (0)1 4662570 ACT - United Kingdom, 2C Beehive Mill Jersey Street, Manchester M4 6JG +44 (0)161 236 3820 sales@act.eu www.act.eu
ACCESS CONTROL – BIOMETRICS, BARRIERS, CCTV, TURNSTILES
UKB INTERNATIONAL LTD ACCESS CONTROL
APT SECURITY SYSTEMS The Power House, Chantry Place, Headstone Lane, Harrow, HA3 6NY Tel: 020 8421 2411 Email: info@aptcontrols.co.uk www.aptcontrols-group.co.uk
Planet Place, Newcastle upon Tyne Tyne and Wear NE12 6RD Tel: 0845 643 2122 Email: sales@ukbinternational.com Web: www.ukbinternational.com
B a r r i e r s , B l o c k e r s , B o l l a r d s , PA S 6 8
ACCESS CONTROL, CCTV & INTRUSION DETECTION SPECIALISTS
SIEMENS SECURITY PRODUCTS ACCESS CONTROL
KERI SYSTEMS UK LTD Tel: + 44 (0) 1763 273 243 Fax: + 44 (0) 1763 274 106 Email: sales@kerisystems.co.uk www.kerisystems.co.uk
Suite 7, Castlegate Business Park Caldicot, South Wales NP26 5AD UK Main: +44 (0) 1291 437920 Fax: +44 (0) 1291 437943 email: securityproducts.sbt.uk@siemens.com web: www.siemens.co.uk/securityproducts
ACCESS CONTROL & DOOR HARDWARE
ALPRO ARCHITECTURAL HARDWARE
ACCESS CONTROL
COVA SECURITY GATES LTD Bi-Folding Speed Gates, Sliding Cantilevered Gates, Road Blockers & Bollards Consultancy, Design, Installation & Maintenance - UK Manufacturer - PAS 68
Tel: 01293 553888 Fax: 01293 611007 Email: sales@covasecuritygates.com Web: www.covasecuritygates.com
Products include Electric Strikes, Deadlocking Bolts, Compact Shearlocks, Waterproof Keypads, Door Closers, Deadlocks plus many more T: 01202 676262 Fax: 01202 680101 E: info@alpro.co.uk Web: www.alpro.co.uk
ACCESS CONTROL – SPEED GATES, BI-FOLD GATES ACCESS CONTROL MANUFACTURER
NORTECH CONTROL SYSTEMS LTD. Nortech House, William Brown Close Llantarnam Park, Cwmbran NP44 3AB Tel: 01633 485533 Email: sales@nortechcontrol.com www.nortechcontrol.com
HTC PARKING AND SECURITY LIMITED 4th Floor, 33 Cavendish Square, London, W1G 0PW T: 0845 8622 080 M: 07969 650 394 F: 0845 8622 090 info@htcparkingandsecurity.co.uk www.htcparkingandsecurity.co.uk
ACCESS CONTROL - BARRIERS, BOLLARDS & ROADBLOCKERS
ACCESS CONTROL
HEALD LTD
INTEGRATED DESIGN LIMITED
HVM High Security Solutions "Raptor" "Viper" "Matador", Shallow & Surface Mount Solutions, Perimeter Security Solutions, Roadblockers, Automatic & Manual Bollards, Security Barriers, Traffic Flow Management, Access Control Systems
Integrated Design Limited, Feltham Point, Air Park Way, Feltham, Middlesex. TW13 7EQ Tel: +44 (0) 208 890 5550 sales@idl.co.uk www.fastlane-turnstiles.com
Tel: 01964 535858 Email: sales@heald.uk.com Web: www.heald.uk.com
www.insight-security.com Tel: +44 (0)1273 475500
sep15 dir_000_RiskUK_jan14 05/10/2015 15:18 Page 2
ACCESS CONTROL
CCTV
SECURE ACCESS TECHNOLOGY LIMITED
G-TEC
Authorised Dealer Tel: 0845 1 300 855 Fax: 0845 1 300 866 Email: info@secure-access.co.uk Website: www.secure-access.co.uk
ACCESS CONTROL â&#x20AC;&#x201C; BARRIERS, GATES, CCTV
ABSOLUTE ACCESS Aberford Road, Leeds, LS15 4EF Tel: 01132 813511 E: richard.samwell@absoluteaccess.co.uk www.absoluteaccess.co.uk Access Control, Automatic Gates, Barriers, Blockers, CCTV
BUSINESS CONTINUITY
Gtec House, 35-37 Whitton Dene Hounslow, Middlesex TW3 2JN Tel: 0208 898 9500 www.gtecsecurity.co.uk sales@gtecsecurity.co.uk
CCTV/IP SOLUTIONS
DALLMEIER UK LTD 3 Beaufort Trade Park, Pucklechurch, Bristol BS16 9QH Tel: +44 (0) 117 303 9 303 Fax: +44 (0) 117 303 9 302 Email: dallmeieruk@dallmeier.com
CCTV & IP SECURITY SOLUTIONS
PANASONIC SYSTEM NETWORKS EUROPE Panasonic House, Willoughby Road Bracknell, Berkshire RG12 8FP Tel: 0844 8443888 Fax: 01344 853221 Email: system.solutions@eu.panasonic.com Web: www.panasonic.co.uk/cctv
BUSINESS CONTINUITY MANAGEMENT
CONTINUITY FORUM Creating Continuity ....... Building Resilience A not-for-profit organisation providing help and support Tel: +44(0)208 993 1599 Fax: +44(0)1886 833845 Email: membership@continuityforum.org Web: www.continuityforum.org
COMMUNICATIONS & TRANSMISSION EQUIPMENT
KBC NETWORKS LTD. Barham Court, Teston, Maidstone, Kent ME18 5BZ www.kbcnetworks.com Phone: 01622 618787 Fax: 020 7100 8147 Email: emeasales@kbcnetworks.com
DIGITAL IP CCTV
TO ADVERTISE HERE CONTACT: Paul Amura Tel: 020 8295 8307 Email: paul.amura@proactivpubs.co.uk
SESYS LTD High resolution ATEX certified cameras, rapid deployment cameras and fixed IP CCTV surveillance solutions available with wired or wireless communications.
1 Rotherbrook Court, Bedford Road, Petersfield, Hampshire, GU32 3QG Tel +44 (0) 1730 230530 Fax +44 (0) 1730 262333 Email: info@sesys.co.uk www.sesys.co.uk
INFRA-RED, WHITE-LIGHT AND NETWORK CCTV LIGHTING
RAYTEC
CCTV
Unit 3 Wansbeck Business Park, Rotary Parkway, Ashington, Northumberland. NE638QW Tel: 01670 520 055 Email: sales@rayteccctv.com Web: www.rayteccctv.com
CCTV POLES, COLUMNS, TOWERS AND MOUNTING PRODUCTS
CCTV SPECIALISTS
ALTRON COMMUNICATIONS EQUIPMENT LTD
PLETTAC SECURITY LTD
Tower House, Parc Hendre, Capel Hendre, Carms. SA18 3SJ Tel: +44 (0) 1269 831431 Email: cctvsales@altron.co.uk Web: www.altron.co.uk
Unit 39 Sir Frank Whittle Business Centre, Great Central Way, Rugby, Warwickshire CV21 3XH Tel: 01788 567811 Fax: 01788 544 549 Email: jackie@plettac.co.uk www.plettac.co.uk
www.insight-security.com Tel: +44 (0)1273 475500
sep15 dir_000_RiskUK_jan14 05/10/2015 15:18 Page 3
WHY MAYFLEX? ALL TOGETHER. PRODUCTS, PARTNERS, PEOPLE, SERVICE – MAYFLEX BRINGS IT ALL TOGETHER.
MAYFLEX Excel House, Junction Six Industrial Park, Electric Avenue, Birmingham B6 7JJ
TO ADVERTISE HERE CONTACT:
Tel: 0800 881 5199 Email: securitysales@mayflex.com Web: www.mayflex.com
Paul Amura Tel: 020 8295 8307 Email: paul.amura@proactivpubs.co.uk
CCTV & IP SOLUTIONS, POS & CASH REGISTER INTERFACE, EPOS FRAUD DETECTION
THE UK’S MOST SUCCESSFUL DISTRIBUTOR OF IP, CCTV, ACCESS CONTROL AND INTRUDER DETECTION SOLUTIONS
AMERICAN VIDEO EQUIPMENT
NORBAIN SD LTD
Endeavour House, Coopers End Road, Stansted, Essex CM24 1SJ Tel : +44 (0)845 600 9323 Fax : +44 (0)845 600 9363 E-mail: avesales@ave-uk.com
CONTROL ROOM & MONITORING SERVICES
ADVANCED MONITORING SERVICES
EUROTECH MONITORING SERVICES LTD.
Specialist in:- Outsourced Control Room Facilities • Lone Worker Monitoring • Vehicle Tracking • Message Handling • Help Desk Facilities • Keyholding/Alarm Response Tel: 0208 889 0475 Fax: 0208 889 6679 E-MAIL eurotech@eurotechmonitoring.net Web: www.eurotechmonitoring.net
DISTRIBUTORS
210 Wharfedale Road, IQ Winnersh, Wokingham, Berkshire, RG41 5TP Tel: 0118 912 5000 Fax: 0118 912 5001 www.norbain.com Email: info@norbain.com
EMPLOYMENT
FIRE AND SECURITY INDUSTRY RECRUITMENT
SECURITY VACANCIES www.securityvacancies.com Telephone: 01420 525260
EMPLOYEE SCREENING SERVICES
THE SECURITY WATCHDOG Cross and Pillory House, Cross and Pillory Lane, Alton, Hampshire, GU34 1HL, United Kingdom www.securitywatchdog.org.uk Telephone: 01420593830
IDENTIFICATION
sales@onlinesecurityproducts.co.uk www.onlinesecurityproducts.co.uk
ADI ARE A LEADING GLOBAL DISTRIBUTOR OF SECURITY PRODUCTS OFFERING COMPLETE SOLUTIONS FOR ANY INSTALLATION.
ADI GLOBAL DISTRIBUTION Chatsworth House, Hollins Brook Park, Roach Bank Road, Bury BL9 8RN Tel: 0161 767 2900 Fax: 0161 767 2909 Email: info@adiglobal.com
COMPLETE SOLUTIONS FOR IDENTIFICATION
DATABAC GROUP LIMITED 1 The Ashway Centre, Elm Crescent, Kingston upon Thames, Surrey KT2 6HH Tel: +44 (0)20 8546 9826 Fax:+44 (0)20 8547 1026 enquiries@databac.com
www.insight-security.com Tel: +44 (0)1273 475500
sep15 dir_000_RiskUK_jan14 05/10/2015 17:32 Page 4
INDUSTRY ORGANISATIONS
PERIMETER PROTECTION
GPS PERIMETER SYSTEMS LTD TRADE ASSOCIATION FOR THE PRIVATE SECURITY INDUSTRY
BRITISH SECURITY INDUSTRY ASSOCIATION
14 Low Farm Place, Moulton Park Northampton, NN3 6HY UK Tel: +44(0)1604 648344 Fax: +44(0)1604 646097 E-mail: info@gpsperimeter.co.uk Web site: www.gpsperimeter.co.uk
Tel: 0845 389 3889 Email: info@bsia.co.uk Website: www.bsia.co.uk
POWER THE LEADING CERTIFICATION BODY FOR THE SECURITY INDUSTRY
SSAIB 7-11 Earsdon Road, West Monkseaton Whitley Bay, Tyne & Wear NE25 9SX Tel: 0191 2963242 Web: www.ssaib.org
POWER SUPPLIES – DC SWITCH MODE AND AC
DYCON LTD Cwm Cynon Business Park, Mountain Ash, CF45 4ER Tel: 01443 471 060 Fax: 01443 479 374 Email: marketing@dyconsecurity.com www.dyconsecurity.com The Power to Control; the Power to Communicate
INTEGRATED SECURITY SOLUTIONS STANDBY POWER SECURITY PRODUCTS AND INTEGRATED SOLUTIONS
HONEYWELL SECURITY GROUP Honeywell Security Group provides innovative intrusion detection, video surveillance and access control products and solutions that monitor and protect millions of facilities, offices and homes worldwide. Honeywell integrates the latest in IP and digital technology with traditional analogue components enabling users to better control operational costs and maximise existing investments in security and surveillance equipment. Honeywell – your partner of choice in security. Tel: +44 (0) 844 8000 235 E-mail: securitysales@honeywell.com Web: www.honeywell.com/security/uk
UPS SYSTEMS PLC Herongate, Hungerford, Berkshire RG17 0YU Tel: 01488 680500 sales@upssystems.co.uk www.upssystems.co.uk
UPS - UNINTERRUPTIBLE POWER SUPPLIES
ADEPT POWER SOLUTIONS LTD Adept House, 65 South Way, Walworth Business Park Andover, Hants SP10 5AF Tel: 01264 351415 Fax: 01264 351217 Web: www.adeptpower.co.uk E-mail: sales@adeptpower.co.uk
INTEGRATED SECURITY SOLUTIONS
INNER RANGE EUROPE LTD Units 10 - 11, Theale Lakes Business Park, Moulden Way, Sulhampstead, Reading, Berkshire RG74GB, United Kingdom Tel: +44(0) 845 470 5000 Fax: +44(0) 845 470 5001 Email: ireurope@innerrange.co.uk www.innerrange.com
UPS - UNINTERRUPTIBLE POWER SUPPLIES
UNINTERRUPTIBLE POWER SUPPLIES LTD Woodgate, Bartley Wood Business Park Hook, Hampshire RG27 9XA Tel: 01256 386700 5152 e-mail: sales@upspower.co.uk www.upspower.co.uk
SECURITY PRODUCTS AND INTEGRATED SOLUTIONS
TYCO SECURITY PRODUCTS Heathrow Boulevard 3, 282 Bath Road, Sipson, West Drayton. UB7 0DQ / UK Tel: +44 (0)20 8750 5660 www.tycosecurityproducts.com
PERIMETER PROTECTION
ADVANCED PRESENCE DETECTION AND SECURITY LIGHTING SYSTEMS
TO ADVERTISE HERE CONTACT: Paul Amura Tel: 020 8295 8307 Email: paul.amura@proactivpubs.co.uk
GJD MANUFACTURING LTD Unit 2 Birch Business Park, Whittle Lane, Heywood, OL10 2SX Tel: + 44 (0) 1706 363998 Fax: + 44 (0) 1706 363991 Email: info@gjd.co.uk www.gjd.co.uk
www.insight-security.com Tel: +44 (0)1273 475500
sep15 dir_000_RiskUK_jan14 05/10/2015 15:18 Page 5
SECURITY
INTRUDER ALARMS – DUAL SIGNALLING
WEBWAYONE LTD CASH & VALUABLES IN TRANSIT
CONTRACT SECURITY SERVICES LTD Challenger House, 125 Gunnersbury Lane, London W3 8LH Tel: 020 8752 0160 Fax: 020 8992 9536 E: info@contractsecurity.co.uk E: sales@contractsecurity.co.uk Web: www.contractsecurity.co.uk
11 Kingfisher Court, Hambridge Road, Newbury Berkshire, RG14 5SJ Tel: 01635 231500 Email: sales@webwayone.co.uk www.webwayone.co.uk www.twitter.com/webwayoneltd www.linkedin.com/company/webwayone
LIFE SAFETY EQUIPMENT
C-TEC QUALITY SECURITY AND SUPPORT SERVICES
CONSTANT SECURITY SERVICES Cliff Street, Rotherham, South Yorkshire S64 9HU Tel: 0845 330 4400 Email: contact@constant-services.com www.constant-services.com
Challenge Way, Martland Park, Wigan WN5 OLD United Kingdom Tel: +44 (0) 1942 322744 Fax: +44 (0) 1942 829867 Website: http://www.c-tec.co.uk
PERIMETER SECURITY
TAKEX EUROPE LTD FENCING SPECIALISTS
J B CORRIE & CO LTD Frenchmans Road Petersfield, Hampshire GU32 3AP Tel: 01730 237100 Fax: 01730 264915 email: fencing@jbcorrie.co.uk
Aviary Court, Wade Road, Basingstoke Hampshire RG24 8PE Tel: +44 (0) 1256 475555 Fax: +44 (0) 1256 466268 Email: sales@takex.com Web: www.takex.com
PHYSICAL CONTROL PRODUCTS, ESP. ANTI-CLIMB INTRUSION DETECTION AND PERIMETER PROTECTION
OPTEX (EUROPE) LTD Redwall® infrared and laser detectors for CCTV applications and Fiber SenSys® fibre optic perimeter security solutions are owned by Optex. Platinum House, Unit 32B Clivemont Road, Cordwallis Industrial Estate, Maidenhead, Berkshire, SL6 7BZ Tel: +44 (0) 1628 631000 Fax: +44 (0) 1628 636311 Email: sales@optex-europe.com www.optex-europe.com
INSIGHT SECURITY Units 1 & 2 Cliffe Industrial Estate Lewes, East Sussex BN8 6JL Tel: 01273 475500 Email:info@insight-security.com www.insight-security.com
SECURITY EQUIPMENT INTRUDER AND FIRE PRODUCTS
CQR SECURITY 125 Pasture road, Moreton, Wirral UK CH46 4 TH Tel: 0151 606 1000 Fax: 0151 606 1122 Email: andyw@cqr.co.uk www.cqr.co.uk
PYRONIX LIMITED Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY. Tel: +44 (0) 1709 700 100 Fax: +44 (0) 1709 701 042 www.facebook.com/Pyronix www.linkedin.com/company/pyronix www.twitter.com/pyronix
SECURITY SYSTEMS INTRUDER ALARMS – DUAL SIGNALLING
BOSCH SECURITY SYSTEMS LTD
CSL DUALCOM LTD
PO Box 750, Uxbridge, Middlesex UB9 5ZJ Tel: 01895 878088 Fax: 01895 878089 E-mail: uk.securitysystems@bosch.com Web: www.boschsecurity.co.uk
Salamander Quay West, Park Lane Harefield , Middlesex UB9 6NZ T: +44 (0)1895 474 474 F: +44 (0)1895 474 440 www.csldual.com
INTRUDER ALARMS AND SECURITY MANAGEMENT SOLUTIONS
RISCO GROUP Commerce House, Whitbrook Way, Stakehill Distribution Park, Middleton, Manchester, M24 2SS Tel: 0161 655 5500 Fax: 0161 655 5501 Email: sales@riscogroup.co.uk Web: www.riscogroup.com/uk
SECURITY EQUIPMENT
CASTLE Secure House, Braithwell Way, Hellaby, Rotherham, South Yorkshire, S66 8QY TEL +44 (0) 1709 700 100 FAX +44 (0) 1709 701 042 www.facebook.com/castlesecurity www.linkedin.com/company/castlesecurity
www.twitter.com/castlesecurity
ONLINE SECURITY SUPERMARKET
SECURITY SYSTEMS
EBUYELECTRICAL.COM
VICON INDUSTRIES LTD.
Lincoln House, Malcolm Street Derby DE23 8LT Tel: 0871 208 1187 www.ebuyelectrical.com
Brunel Way, Fareham Hampshire, PO15 5TX United Kingdom www.vicon.com
www.insight-security.com Tel: +44 (0)1273 475500
Project1_Layout 1 03/11/2015 12:59 Page 1