Counter Terror Business 57

Page 1

www.counterterrorbusiness.com | ISSUE 57

TRANSPORT SECURITY

STADIUM SECURITY

PLANNING AHEAD FOR EURO 2028

With the UK and Ireland recently being announced as hosts, what security considerations should be taken into account?

HVM


30 APRIL – 2 MAY 2024 NEC BIRMINGHAM UK

THE UK’S no.1 AWARD WINNING COMMERCIAL, ENTERPRISE AND DOMESTIC SECURITY EVENT FIND OUT MORE: WWW.THESECURITYEVENT.CO.UK Co-located with:

Lead Media Partner:


COMMENT

EDITOR’S COMMENT

Welcome to

E

with us on Linkedin: LINKEDIN Connect @counter-terror-business

Follow and interact with us on X: @CTBNews

ONLINE // MOBILE // FACE TO FACE To register for your FREE Digital Subscription of Counter Terror Business, go to: www.counterterrorbusiness.com/digital-subscription or contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Web: www.psi-media.co.uk EDITOR Polly Jones PRODUCTION MANAGER & DESIGNER Dan Kanolik PRODUCTION DESIGNER Jo Golding PRODUCTION CONTROL Deimante Gecionyte ADMINISTRATION Enkelejda Lleshaj WEB PRODUCTION Freya Courtney SALES EXECUTIVE Liam Williams PUBLISHER Damian Emmins

Counter Terror Business would like to thank the following organisations for their support:

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

3


PRESENTED BY:

WORLD

ENTER THE GLOBAL NETWORKINGHUB 14-16 MAY 2024

DUBAI WORLD TRADE CENTRE, DUBAI, UNITED ARAB EMIRATES

www.critical-communications-world.com @CritCommsSeries

REGISTER YOUR INTEREST

PLATINUM SPONSOR

TCCA Critical Communications World GOLD SPONSORS


CONTENTS

CONTENTS CTB 57 16

19

MARTYN’S LAW

27

STADIUM SECURITY

30

THE SECURITY EVENT

35

TRANSPORT SECURITY

43

CRITICAL INFRASTRUCTURE

ACCESS CONTROL

24

HVM

33

BAPCO 2024

48

CYBERSECURITY

52

AI

Counter Terror Business magazine // www.counterterrorbusiness.com ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

5


The smart integrated solution to protect people and places.

E

PLACE VIDEO HERE.

Talk to us about how we can help YOU transform spaces and places. Get in touch at sales@urbis-schreder.com


NEWS

LEGISLATION

New law to ban zombiestyle knives and machetes New legislation has been laid in parliament which would ban zombie-style knives and machetes. The new law would make it illegal to possess, sell, manufacture or transport these zombiestyle knives and machetes. It is hoped the laws will take the weapons of the streets and keep young people safe. Those in possession of one of these knives are being urged to hand it in to a knife surrender bin, before the official surrender and compensation scheme is launched in the summer. The full ban will come into force in September, at which point, anyone in possession of one of these knives will face prison time. The government intends to work with police, communities and partners to ensure there is public awareness of the surrender scheme, which have been implemented in the past to accompany knife bans. Home secretary James Cleverly said: “Knife crime continues to take precious lives away, and I am determined to put an end to this senseless violence. “We must stop these dangerous knives ending up on our streets and in the hands of criminals. We cannot let them be sold to children, and we must give young people a way out of violence. “That is why I have expedited the ban on zombie-style machetes and we are increasing the maximum sentence for selling knives to under 18s. We will continue to invest in youth services that have prevented thousands of violent injuries.”

READ MORE

LEGISLATION

New Online Safety Act offences come into force New offences from the Online Safety Act have come into effect, meaning sharing fake news intended to cause non-trivial harm, encouraging others to self harm and other online abuse could now result in a prison sentence. The offences include threatening messages, the non-consensual sharing of intimate images (revenge porn), and sending fake news that aims to cause non-trivial physical or psychological harm. Technology secretary Michelle Donelan said: “From today, online abusers and trolls will be prosecuted and put behind bars for their cowardly and menacing acts – ensuring the public are protected and can have better peace of mind when online. “Our pioneering Online Safety Act is already setting a global standard, and pivotal protections like these will keep sick individuals off our streets and unable to endanger Brits online.” Sending death threats or threatening serious harm online will carry a jail sentence of up to five years under the new ‘threatening communications’ offence that will make threats made online that would be illegal if said in person also illegal. There is also a new false communications offence, which will outlaw the intentional sending of false information that could cause ‘non-trivial psychological’ or physical harm to users online. It is hoped this offence will clamp down on dangerous disinformation and election interference online... CONTINUE READING

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

7


12-14 MARCH 2024

Farnborough International Exhibition & Conference Centre

The Official UK Government Global Security Event C O L L A B O R AT I O N . I N N O VAT I O N . R E S I L I E N C E .

7,000+

350+

HOME OFFICE APPROVED ATTENDEES

WORLD-CLASS SUPPLIERS

Cutting-edge security solutions

Exclusive networking

Industry-leading insight

Enquire to exhibit | Apply for a free visitor pass securityandpolicing.co.uk All attendees are subject to Home Office approval


NEWS

TERRORISM

UK proscribes Hizb ut-Tahrir as terrorist organisation The UK parliament has approved a draft order to proscribe Hizb ut-Tahrir as a terrorist organisation. The order means belonging to Hizb utTahrir or inviting support for the group will be a criminal offence with a potential prison sentence of 14 years which can be handed down alongside or in place of a fine. The group has now been added to the list of proscribed organisations in the UK, bringing the total number to 80. According to the Home Office, Hizb ut-Tahrir is an international political group with a longterm goal of establishing a Caliphate ruled under Islamic law. The group was founded in 1953 and is headquartered in Lebanon, though it is known to operate in other countries as well, including the UK, United States, Canada and Australia. Other countries, including Germany, Egypt, Bangladesh and Pakistan have already banned the group. Home secretary, James Cleverly said: “Hizb ut-Tahrir is an antisemitic organisation that actively promotes and encourages terrorism, including praising and celebrating the appalling 7 October attacks. “Proscribing this terrorist group will ensure that anyone who belongs to and invites supports for them will face consequences. It will curb Hizb ut-Tahrir’s ability to operate as it currently does.” Security minister, Tom Tugendhat said: “Hizb ut-Tahrir clearly encourage and promote terrorism...

CONTINUE READING

BIOMETRICS

Biometrics and Surveillance Camera Commissioner’s annual report laid in Parliament The biometrics and surveillance camera commissioner’s Annual Report for 2022 to 2023 has been laid in Parliament. The report was produced by the previous biometrics and surveillance camera commissioner, Professor Fraser Sampson, who held the role during that period. He left office on 31 October 2023. The report sets out the findings and observations of the commissioner in relation to his responsibilities for overseeing police use of DNA and fingerprints in England, Wales and Northern Ireland, and for encouraging the proper use of public space surveillance cameras. The report covers a few topics such as research on use of surveillance cameras and drones, including police use of surveillance cameras; local authority use of surveillance cameras and police use of unmanned aerial vehicles/drones. It also discusses DNA handling errors, with the number of DNA samples unusable because of handling errors increasing from 953 last year to 1,214 during this reporting period. The report found an increase in use of Section 63g powers (asking the commissioner for permission to keep DNA and/or fingerprints of people who are arrested, but not convicted, of qualifying offences). There was a decrease in the number of occasions when police forces applied for NSDs to allow them to keep the biometrics of unconvicted people who are believed to present a risk to national security. READ MORE

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

9


COVER MORE. MISS LESS. OSINT FOR COUNTER TERROR IN THE UK & EUROPE

SCAN THE QR CODE TO ACCESS OUR INDUSTRY BRIEF TO LEARN TOOLS AND TECHNIQUES TO APPLY TO YOUR INVESTIGATOINS.

SCAN HERE:

FIVECAST.COM


NEWS

SANCTIONS

UK and US sanction Hamas financiers The UK and US have announced sanctions for figures in the financial networks of Hamas and Palestinian Islamic Jihad (PIJ). Those sanctioned include five key figures and an entity involved in the leadership and financial networks of Hamas and Palestinian Islamic Jihad (PIJ). One of those sanctioned is Zuheir Shamlakh, known as Hamas’s ‘main money changer’ since 2019, and a key figure in the group’s shift towards cryptocurrencies. The UK government said that exploited digital currencies and existing systems of informal money transfers to move large sums of money from Iran to Hamas ahead of the 7 October attacks. The others include Ahmed Sharif Abdallah Odeh, a key operator in Hamas’s financial network who previously ran their international portfolio of companies; Ismail Barhoum, a member of Hamas’s Political Bureau in Gaza and the group’s governing Shura Council; Hassan Al-Wardian, a senior leader of Hamas in the Bethlehem/West Bank region; and Jamil Yusuf Ahmad Aliyan, a senior PIJ official and representative based in Gaza. All are also subject to a travel ban and will not be able to enter the UK. The sanctions are intended to cut off the flow of funding that supports these terrorist groups, including from Iran. Foreign secretary David Cameron said: “These sanctions send a clear message to Hamas – the UK and our partners are committed to ensuring there is no hiding place for those financing terrorist activities..

CONTINUE READING

SANCTIONS

UK, US, Australia sanction Russian cyber hacker The UK, US and Australia have put sanctions on a Russia-based cyber hacker. The coordinated action is intended to crack down on international cyber crime. Aleksandr Ermakov has been identified by the Australian Signals Directorate and Australian Federal Police along with international partners as a key actor in the Australia Medibank cyber attack in 2022. The attack is considered one of the worst cyber incidents in Australian history. 9.7 million customers’ records, containing medical and personal data, and data on over 480,000 health claims were leaked on the dark web. Ermakov will be subject to a series of asset freezes and travel bans. Sanctions minister, Anne-Marie Trevelyan said: “We stand with our allies in Australia and the US and will continue to hold cyber hackers to account for damaging cyber attacks designed to undermine global democracies. “These cynical and reckless attacks cause real damage to people’s lives and livelihoods. We must work together to call out and combat these malicious attacks.” CONTINUE READING

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

11


Counterterrorism, Risk Management and Resilience MSc Full-time/part-time We understand that the threat of terror related events not only impacts civilian society, but business infrastructure, economic networks and vital communication routes. This course has been developed to bring together a distinctive mix of subjects, providing you with the knowledge, expertise and evidence-based tools and approaches necessary to understand, analyse, mitigate and aim to prevent terrorism. We also offer a range of related short courses. For further information, please contact: E: studydefenceandsecurity@cranfield.ac.uk T: +44 (0)1234 758540


NEWS

LEGISLATION

Anti-drone no-fly zones for prisons New laws have come into force, which make it a criminal offence to fly drones within 400 metres of prisons and young offender institutions. Previous rules meant police could only act if there was evidence of contraband being smuggled. Those who break the rules will be up to £2,500 and those who do smuggle illicit items could face ten years in prison. The new law comes as stats have revealed that the number of drones captured or sighted within prison grounds has more than doubled between 2019 and 2021. Prisons and probation minister Edward Argar said: “We are working harder than ever to prevent the smuggling of contraband into our prisons and this is the latest step to keep ahead of the tactics exploited by organised criminals. “These new anti-drone measures – along with our advanced airport-style x-ray security and drug detection dogs – will crackdown on those illicit items that fuel violence behind bars.”

READ MORE

PRIVATE SECURITY

6 in 10 adults say they have trust in private security professionals New research from the Security Industry Authority (SIA) has revealed that 6 in 10 people agree that they trust security professionals. The research on public trust and confidence in the private security industry was carried out by BMG Research and is the first of its kind commissioned by the UK’s private security industry regulator. The research was carried out in two waves across two years from 2022 to 2023 to see whether public perceptions changed. The survey of 2,600 UK adults in 2022 and 2023 also revealed that around 6 in 10 people were confident that security professionals do their duties competently and effectively, and act with integrity. 7 in 10 respondents believed that security professionals are necessary to maintain order and improve public safety and most felt safer due to a private security presence in various settings such as music concerts, sporting events, banks, hospitals, night-time economy venues and retail premises. Michelle Russell, Chief Executive of the Security Industry Authority, said: “Public protection through effective regulation is the golden thread at the heart of what the SIA does. That’s why it is important for us to understand public views about individual licence holders, the wider industry and us as a regulator. We are encouraged that the overall survey results demonstrate that most people have trust and confidence in private security operatives and agree they do important work... CONTINUE READING

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

13


BEST INDUSTRIAL QUALITY A system for your success The LISTA standard unit is the base of a system in which multiple components can be combined and matched. A system has grown out of this in which everything can be combined and matched. and protected with access control. All products are available in almost any colour. In short: LISTA provides a system to organise your business successfully. A solution to match your needs Products made by LISTA have set standards by reaching far beyond standard applications. We are committed to fulfilling customer requirements with bespoke solutions regardless of project size or industry. Our universal system and vast planning expertise will turn your expectations into reality – promptly and reliably.

For more information contact: info.uk@lista.com

A sound investment By opting for LISTA you place your trust in durability and continuity. Our unique 10-year product and re-ordering guarantee reflects our corporate philosophy. You can always rely on LISTA quality. Our products are made in Switzerland or Germany and shipped to customers through a broad distribution and service network.

LISTA is the recognised market leader in Europe for workspace and storage solutions


LFR leads to arrests in Croydon The Metropolitan Police has used Live Facial Recognition in Croydon in an attempt to reduce violence on the streets. On the afternoon of Friday 19th January, the use of LFR led to the arrest of five people including a 32-year-old woman for failing to appear at court for burglary, 50-year-old man for failing to comply with his conditions as a Registered Sex Offender and a 34-year-old man wanted by police for robbery. A 36-year-old man wanted by the court for offences in relation to animal cruelty and a 31-year-old woman wanted for failing to appear at court for drink drive related offences were also arrested. Lindsey Chiswick, responsible for LFR for the Met said: “As part of our commitment to building A New Met For London we are using this technology to identify harmful criminals. Trying to identify people who are wanted by the police is not new. LFR does what the police have always done but with much more accuracy, precision and far quicker. If there is no match, all biometric details are immediately destroyed.”

NEWS

FACIAL RECOGNITION

More top news stories from www.counterterrorbusiness.com SIA opens grant applications for charities and community groups: READ MORE London Assembly to discuss designing out crime: READ MORE Airports set to miss scanner deadline: READ MORE PSNI urges public to use online reporting tool: READ MORE CT officers recognised in New Year Honours: READ MORE UK announces funding to improve safety in Somalia: READ MORE Government details global security spending: READ MORE UK and Japan sign cyber partnership: READ MORE RADICALISATION

Increase in exposure to online radicalisation following Hamas attack The BBC has reported a 12-fold increase in hateful social media content being referred to specialist police officers since the Hamas attack on 7 October. Data from the UK’s Counter Terrorism Internet Referral Unit was shared with the BBC. More than 2,700 referrals have been received from the public since the 7 October attack. It has been reported that many of the referrals relate to antisemitic content shared by young people who were previously not on the radar of counter terrorism teams. Speaking to the BBC, Matt Jukes, head of Counter Terror Policing warned that there was a failure by social media companies to deal with the overall climate of hate created by algorithms. He said: “The people who in the past needed to seek this material out are getting it pushed to them.” “[Before] you had to go to a place or sites and forums and now material which certainly might meet a definition of hateful extremism is being driven to them.”

CONTINUE READING

CONTINUE READING

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

15


MARTYN’S LAW

THE TIME IS NOW In recent months, the UK has witnessed a concerning uptick in terrorist activities, particularly accentuated by incidents between October and December 2023

T

his worrying trend emphasises the growing threat posed by potential lone wolf actors, elevating the importance of vigilance and preparedness across the nation. The Perimeter Security Suppliers Association (PSSA) recognises the vital role of CounterTerrorism Policing, which has commendably thwarted numerous plots, often in the nick of time. The Isle of Wight Festival incident and the Liverpool arrest serve as stark reminders of the relentless efforts of our law enforcement agencies. However, these successes also highlight an imperative need for broader engagement, particularly in the areas of public education and awareness. The essence of this engagement lies in the collective responsibility of event organisers,

16 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57

venue managers, and the general public. It is not only about reporting suspicious behaviours or unattended packages but also encompasses a deeper understanding of effective response strategies in crowded spaces. This approach aligns seamlessly with the objectives of Martyn’s Law, a legislative proposal advocating for enhanced security measures in public venues. The UK has seen a 25 per cent surge in intelligence related to terrorism and violent extremism, a testament to the public’s increasing awareness and willingness to report potential threats. This change has been described as extraordinary in both its speed and scale, reflecting a heightened national consciousness post-global events. The threat level remains palpable, with concerns that


MARTYN’S LAW Amidst these developments, another group, just recently, has been added to the UK’s list of proscribed terrorist organisations, marking it as the 80th such designation. This action comes at a critical juncture, as the nation stands on the precipice of a significant legislative moment with the proposed Terrorism (Protection of Premises) Bill, widely known as Martyn’s Law. Inspired by the tragic events at the Manchester Arena in 2017 and championed by Figen Murray OBE, this bill is more than legislation; it symbolises our steadfast determination in the fight against terrorism. Paul Jeffrey, chairman of the PSSA, has been a staunch advocate for Martyn’s Law. His efforts, in collaboration with Figen Murray, have been instrumental in bringing the issue to the forefront of national conversation. Their petitions, delivered to the steps of 10 Downing Street, comprised two significant submissions: Figen’s petition and a separate appeal from the PSSA and its members, each reflecting a distinct yet unified voice. These efforts not only highlighted the urgency of the situation but also demonstrated a powerful commitment to enhancing national security and public safety. The delivery of these petitions serves as a poignant reminder of the collective resolve to prevent future tragedies and to ensure that the lessons learned from past events lead to tangible, lasting change The significance of this bill was echoed in Parliament before the Christmas recess, by Diane Johnson, Labour MP for Hull North and chair of the Home Affairs Select Committee. Johnson’s poignant remarks during a recent session emphasised the bill’s origins in the Manchester tragedy and its potential to prevent similar atrocities in the future. Figen Murray’s unwavering campaign highlights the urgency of this legislation. Her insistence on a robust and uncompromising law reflects a broader sentiment that the safety of the public should be paramount. The Government’s commitment to pass Martyn’s Law was highlighted in the King’s Speech in November 2023, signalling a crucial step towards realising this objective. However, the journey ahead is intricate, with the bill undergoing the rigours of parliamentary scrutiny. This process, essential for ensuring the

MARTYN’S ALL CAPITALS LAWIN TAB

the most likely perpetrator of an attack would be a lone actor, employing methods of low sophistication but potentially high impact

Figen Murray’s unwavering campaign highlights the urgency of this legislation bill’s effectiveness, is a race against a ticking clock. PSSA Under Jeffrey’s leadership, the PSSA has emphasised the need for comprehensive preparedness against terrorism. From conducting risk assessments to staff training, these measures, though straightforward, are crucial in mitigating terror threats. Jeffrey’s meetings with MPs in December 2023 were pivotal, shaping the trajectory of the bill and aligning it with national security standards. The passage of Martyn’s Law represents a crucial step in our nation’s security. It represents the resilience and determination of campaigners like Figen Murray, Paul Jeffrey and the PSSA members, and marks a significant stride in safeguarding the UK against terrorism. The goal of Martyn’s Law is to respectfully commemorate the victims while also advancing our security protocols to help ensure such events are not repeated. The PSSA, alongside campaigners and the public, sends a clear message: the time for Martyn’s Law is now. L FURTHER INFORMATION

https://pssasecurity.org

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

17


HVM HOSTILE VEHICLE MITIGATION LPS1175 - FORCED ENTRY Frontier Pitts, Crompton House, Crompton Way, Manor Royal, Crawley, RH10 9QZ


STADIUM SECURITY

PLANNING AHEAD FOR EURO 2028 David Stewart looks at some of the security considerations for the organisers and decision makers of the UEFA EURO 2028 competition in the UK and Ireland

O

n 16 October 2023, a qualifying match for the Euro 2024 Football championships, between Belgium and Sweden in Brussels, was postponed after the killing of two Swedish supporters by a gunman who was later traced, and shot dead by Belgian Police. Islamic State subsequently claimed responsibility with the suggestion being that the Swedish fans had been targeted in retaliation for perceived anti-Islamic protests that had been held in Sweden. This attack, and the associated postponement of the match, came only three days after UEFA announced that the 2028 Euro Championships would be awarded to a joint bid by the Football Associations of the UK (England, Scotland, Wales, Northern Ireland) and the Republic of Ireland. In much the same way as the 7/7 attacks in London came in the immediate aftermath of the announcement that London would host the 2012 Olympics, the timing of the 16 October attack served to highlight one of the many

challenges involved in delivering a safe and secure event in 2028. Work on the bid commenced as early as 2019 led by UK Sport, in conjunction with the governments of the four UK nations plus the Irish government and the associated Football Associations. In the summer of 2021, UK Sport appointed Intelligent Risks (IR) a company with expertise in major event security, to deliver a high-level tournament security risk analysis, security concept of operations, reviews of 14 prospective stadia, a security master plan and QS analyses to estimate the required tournament wide security resources and budgets. Having worked alongside consultants from Intelligent Risks while acting as Interim Director of Security for the Birmingham Commonwealth Games, I was delighted to be asked, representing Taynuilt Associates Ltd to be part of the team of subject matter experts delivering this work on behalf of UK Sport. E

19


THRE AT DE TEC TION THROUGH ELEC TROMAGNE TIC S

NEW

GROUNDBREAKING WEAPONS DETECTION SYSTEM

GAME DAY AT RECORD SPEED. • QUICKLY AND AUTOMATICALLY SCREEN GUESTS with their backpacks and bags

• EXTREMELY HIGH THROUGHPUT with near-zero nuisance alarms

• DETECTS HANDGUNS AND MASS CASUALTY

THREATS, such as high caliber assault weapons and IEDs

• EASY TO RELOCATE AND QUICK TO INSTALL: Less than 1 minute setup time

• INDOOR AND OUTDOOR OPERATIONS

For more information, contact your CEIA representative at info@ceia.co.uk or call us today at +44 1789 868 840 • +44 7887 421 410

w w w . c e i a . n e t

ENGATE_advert_FC060K0480v1000gUK.indd 1

08/03/2022 08:31:


STADUIM ALL CAPITALS SECURITY IN TAB

:08

 CHALLENGES As with any major event, there will be several challenges that security planners need to be aware of, all of which were taken into consideration during this piece of consultancy. TERRORISM The events in Brussels obviously serve as a sharp reminder of the threat of terrorism. As this article is being typed, the conflict in Gaza is ongoing and the UK involvement in the attacks in targets in Yemen have resulted in threats of retaliation. The UK national threat level currently sits at Substantial but that can obviously change. Obviously, the threat from terrorism will change in the next four years and, in addition to the national threat level, the UK Security Services will work with the police to develop an event-specific threat assessment, and this will determine the overall security approach for the entire event, potentially venue by venue. The threat level from international terrorism has historically been lower in the Republic of Ireland than in the UK and again, this complexity will require to be taken account of in the overall security planning. However, the current Northern Ireland related terrorism threat is at a higher level than both the UK and Ireland (Severe) and this highlights one of the challenges for the organisers of the Euros – the different countries and jurisdictions involved CROSS-BORDER COORDINATION In order to deliver the required assessments, the IR Team engaged widely with representatives of the UK Government, the devolved governments of Scotland, Wales and Northern Ireland and also the government of the Republic of Ireland. There then followed meetings with the five separate football associations, representatives of the proposed venues and the police. The National Police Chief’s Council (NPCC) coordinate the policing of football across England and Wales so, in addition to this, the IR team met with representatives of the Police Service of Scotland, the Police Service of Northern Ireland and An Garda Síochána. Different laws can obviously have different impacts – for example, in Scotland, the consumption of alcohol (outside of corporate hospitality suites) within football stadia is banned. Notwithstanding the decision to ban alcohol within venues for the Qatar World Cup, sponsorship by international drinks companies is usually taken for granted at major football tournaments and therefore a decision on this

The UK national threat level currently sits at Substantial but that can obviously change (from a Scottish perspective) will need to be taken nearer the time. What became clear however was that, despite different laws and jurisdiction, there was a collegiate and common-sense approach being taken between the different governments, police forces and football associations, that is necessary for a complex major event such as this to be delivered safely. FAN DISORDER The final of the last Euros, held at Wembley on 11 July 2021, serves as a stark reminder that fan disorder is still a significant threat to football tournaments. The fact that this was not the result of inter-fan rivalry but was instead a failing of security and policing, as outlined in The Baroness Casey Review, only highlights the critical importance of the role of both the police and the private security providers at the main venues. Events in Europe will also have to be considered. While Russia are presently still banned from competing in UEFA competitions, this could well change and, depending on the teams who qualify, threat and risk assessments will need to be undertaken continually between now and 2028. What is clear across Europe however is the rise of the ‘Ultra’ fans and this has led to scenes of disorder in recent E ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

21


The arena is an environment with its own particular security demands. It is a place with many entrances and exits, many floors and doors; to secure an arena requires expert attention to detail. We regularly partner with sports venues and music concerts, festivals, tournaments, conventions and other similar venues. We team up with our clients to make moments of magic happen again and again. We have become trusted co-workers with so many major players in the industry because our team knows their business. We are experts who put our clients’ needs first. We get to know an environment efficiently, and we provide the security solutions that make that venue safer. Whatever your requirements, you can trust our teams to design and deliver security services that make sense in context. Effective and aware, our arena security professionals make your venue look, feel and be safe.

www.wearestadium.com +44 (0)24 7518 9999


SECURITY PROFILE This then brings us to the question of the security profile of the event. This not only impacts on things such as flow rates for spectators entering stadia but, also important for event organisers, has a budgetary impact. It is now not uncommon to find that the security budget for a major sporting event can be the single biggest cost in the overall budget. The last major Football Tournament, the 2022 FIFA World Cup in Qatar saw every venue equipped

STADIUM ALL CAPITALS SECURITY IN TAB

 months during European club competitions. A great opportunity for learning will come this summer as the Euro’s take place in Germany and representatives of UK (and Irish) policing and governments will be watching events with interest. Also becoming more common now is the threat of disruption to major events by protestors. Such protests could be of a political nature and driven by international events potentially outside of Europe (e.g. Israel/Palestine) or could be environmental. In 2022, numerous English Premier League matches were disrupted when individuals representing Just Stop Oil made their way onto the field of play and attached themselves to goalposts. Similar disruption has also taken place at other major sporting events, including Wimbledon, with the main motivation of the protestors being the massive television audience. However, each disruption owing to field of play incursion represents a significant threat to safety and security and the reputation of the organisers.

What is clear across Europe however is the rise of the ‘Ultra’ fans with ‘mag and bag’ airport-style security (walkthrough metal detectors and x-ray machines). The lessons from Wembley also highlight the need for a suitably trained and experienced security workforce which, immediately postcovid was a challenge but other events, such as the Birmingham Commonwealth Games, suggest that these challenges can be overcome. The 2028 Euros will undoubtedly bring significant security challenges however, with comprehensive planning that started in 2019, and the inclusion of highly experienced subject matter experts, I have great confidence in the overall delivery of a safe and secure tournament for spectators and participants alike. L

About the Author: David Stewart spent 30 years in UK policing, rising to the rank of Chief Superintendent. In 2013 he founded Taynuilt Associates Ltd, providing training in consultancy across a wide spectrum of security and resilience portfolios. He worked in senior security positions at both the Glasgow and Birmingham Commonwealth Games and also spent 2 years in Qatar leading a resilience project related to the 2022 World Cup. FURTHER INFORMATION

www.taynuilt.org.uk

23


HVM

HOSTILE VEHICLE MITIGATION A ‘SPECIALIST’ SHIELD IN COUNTERTERRORISM STRATEGY The PSSA discuss their Hostile Vehicle Mitigation Installers Scheme (HVMIS)

I

n an evolving security landscape where threats are always looming, understanding the pivotal role of Hostile Vehicle Mitigation (HVM) in counter-terrorism (CT) is imperative. It is crucial to debunk a common misconception: HVM is not traffic management (TM) — it is a meticulously designed defence against terrorism. The strategy centres around implementing robust, independently tested, and rated equipment that acts as a formidable barrier against vehicle-led attacks, ensuring the preservation of lives and assets.

LEGISLATION The Perimeter Security Suppliers Association (PSSA) strongly believes that the Hostile Vehicle Mitigation Installers Scheme (HVMIS) — a critical initiative by the PSSA — should be reinforced through formal legislation. Currently operating as an essential, yet non-statutory scheme, HVMIS plays a crucial role in our strategic approach to perimeter security. The PSSA is advocating for the elevation of this scheme to a legislatively mandated initiative. The architecture of this proposed legislation aims to ensure the selection of the precise skills and knowledge necessary for effective HVM installation and operation. MAKING DECISIONS Choosing the right person or company for HVM is like picking the right doctor for a specific medical problem. You need someone with the right skills and knowledge for the job. It’s not a one-size-fits-all situation; the person or company you choose must have specific expertise in HVM. This specificity and specialisation are essential. Imagine entrusting an electrician with plumbing repairs or expecting a tree surgeon to perform a medical operation. Such a mismatch of expertise could yield disastrous outcomes. In the field of HVM, the stakes are immensely high. Entrusting non-specialists, with the supply and installation of HVM equipment, risks the

24


HVM ALL CAPITALS IN TAB

The domain of HVM is varied, extending beyond the mere installation of barriers for road closures integrity of the system, thus compromising the safety it vows to uphold. Paul Jeffrey, PSSA chairman commented: “The PSSA strongly advocates for the implementation of more robust and mandatory legislation surrounding the Hostile Vehicle Mitigation Installers Scheme (HVMIS). We believe that the guidelines and standards proposed within the HVMIS should not just be recommendations, but firmly enforced by law, obligating all installers to uphold these stringent standards rigorously. By instigating this crucial legislative action, we aim to ensure that the deployment of Hostile Vehicle Mitigation systems is executed with the utmost precision and effectiveness, guaranteeing enhanced compliance and the reinforcement of our perimeter security solutions against any potential vehicle-based threats or attacks.” Diligence and due consideration are the bedrock of effective HVM. The end-users and installers must foster a keen understanding of the CT threat landscape, ensuring that the HVM strategies echo the identified vulnerabilities and risks. The domain of HVM is varied, extending beyond the mere installation of barriers for road closures. It needs a great understanding of strategic placement, ensuring maximum delay in the face of threats, and allowing time to put necessary protective measures in place. Paul Jeffrey added: “Due diligence of the end user is crucial in perimeter security. Always ensure that your HVM (Hostile Vehicle Mitigation) provider/installer comprehensively understands your CT (Counter-Terrorism) threat, vulnerability, and risk.” Accreditation stands as a cornerstone in optimising the efficiency of HVM installations. Ensuring that the HVM equipment is installed as per the tested specifications is vital. Incorrect installations cast a shadow not only over the installer and the manufacturer but over the integrity of the entire industry. It fuels misconceptions regarding the effectiveness of HVM measures, thereby undermining public confidence in the protective mechanisms aimed at safeguarding crowded spaces.” The PSSA’s HVMIS emerges as a beacon of a comprehensive approach towards hostile

vehicle security. The scheme, embroidered with stringent guidelines and processes, focuses on aligning installations with physical constraints and the budgetary considerations of clients without compromising on safety and functionality. The emphasis on mandatory maintenance, operational training, and thirdparty verifications such as those through CTSAs, NPSA, NaCTSO, and CT SecCos underscores the commitment to maintaining a consistent standard of quality and compliance across the board. The development of HVMIS is the result of thorough assessment and collaboration among various groups, including government agencies and the PSSA Council. This joint effort shows a strong dedication to improving security strategies with a shared vision. In conclusion, the emphasis should be on recognising HVM as a specialised profession that plays a pivotal role in counterterrorism strategies. It is not just an auxiliary component of traffic management but a crucial line of defence against hostile threats. A collective endeavour towards tighter legislation, diligence, and enhanced professionalisation within the industry is imperative to protect our defences, ensuring that our public spaces remain places of safety in the face of evolving threats. L FURTHER INFORMATION

For further information on the Hostile Vehicle Mitigation Installers Scheme, please click here ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

25


RE CLICK HE ACT TO CONT BY US NOW EMAIL

SAVE TIME AND MONEY WHILST GAINING GREATER EFFICIENCIES AND SECURITY. SUITABLE FOR CRITICAL INFRASTRUCTURE PROTECTION

ONE KEY

FOR ALL YOUR LOCKS DOORS | CABINETS | SENSITIVE EQUIPMENT | IT FACILITIES | MOBILE ASSETS www.sellox.co.uk www.cyberlock.com


THE SECURITY EVENT

THE SECURITY EVENT 2024 The Security Event is coming back to the NEC, Birmingham from 30 April to 2 May

T

he Security Event is returning to the Birmingham NEC from 30 April to 2 May 2024. The event for security manufacturers, distributors, installers, integrators, consultants and end users will have an exhibition, education programme and networking opportunities. INDUSTRY SUPPORT The Security Event has a large network of sponsors which the organisers say emphasises a collaborative approach and builds an inclusive platform that provides outstanding value to manufacturers, distributors, installers, integrators and end users. EXHIBITION The event has been developed to deliver a world-class exhibition for UK security professionals, installers and integrators. More than 350 exhibitors will be offering the latest security products, technologies and

solutions. Visitors will be able to receive inperson product demonstrations and try and buy the products and services on offer, while at the same time, networking and meeting faceto-face with experts and peers from across the industry. Products and solutions on display will include: access control; alarm monitoring; biometrics; CCTV & video surveillance; certification bodies; communications; control rooms; door entry/ intercom; crowd safety; home automation; and IT & cyber security. Other products and services exhibited will include: intruder alarms & detection; mobile patrols; perimeter security; physical security; security personnel (officers, guarding, close protection); training providers; uniforms; vacant property specialists; video analytics; and VMS. EDUCATION PROGRAMME The vast education programme is designed to investigate the evolving challenges and E ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

27


TM

Visual surveillance, scanning & monitoring solutions. We have led the way in providing the latest and most effective technologies to the security industry, Governments and critical infrastructure for over 35 years. Whether you are looking for the latest surveillance technology or need the most effective and easily deployed security scanning devices Inspectahire will have a solution to most effectively support your needs or assignment.

Get in touch

inspectahire.com | T: +44 (0)1224 789692 |

UK Distributor for the world leading:

E: enquiries@inspectahire.com


THE SECURITY EVENT

The Security Leaders Summit will feature leading expert speakers uncovering emerging technologies

 opportunities involved in the delivery of security projects throughout the supply chain. Sessions will be led by top security professionals and explore the latest innovations from suppliers. The free-to-attend accredited CPD seminars will feature the latest developments, case studies and workshops delivered by industry experts. A first for the event, The Security Leaders Summit will feature leading expert speakers uncovering emerging technologies, the latest trends and best practice case studies for security professionals. The Designing Out Crime Zone will be demonstrating the latest police techniques designed to reduce crime and keep communities safe. NETWORKING The Security Event will also deliver opportunities to connect with current and potential contacts, and peers in the industry. Manufacturers, suppliers, installers, integrators, consultants and end users from all over the country will be attending. The event will be offering a new hosted meetings programme with digital and onsite activities. The networking café provides the opportunity to relax and unwind, whilst grabbing a coffee or some lunch. At the end of days one and two, there will be networking drinks at the networking café, with drinks provided.

NEC The NEC, Birmingham is accessible by an international airport, mainline train station, easy access to the UK’s motorway network and over 16,500 car parking spaces. Free parking is available to all visitors and exhibitors. There are also partnerships with local businesses in Birmingham providing exclusive discounts which can be used for post-event networking or hosting. This could be teambuilding activities or networking sessions with clients. Previous attendees have praised the event, with one stating: “This year was my first ever time attending the Security Event at the Birmingham NEC and I will definitely attend again in the future. The conferences held at the Security in Practice theatre were very informative and it was a pleasure to hear both Professor Martin Gill and Rick Mounfield present. I have never been more invested in my own personal development as I am now and have events like this to thank for inspiring me to learn.” CO-LOCATED EVENTS An event ticket gives visitors free access to the rest of the Safety & Security Series, including The Fire Safety Event, The Health & Safety Event, The Workplace Event, National Cyber Security Show and Professional Security Officer Live. L FURTHER INFORMATION

www.thesecurityevent.co.uk

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

29


TRANSPORT SECURITY

HOW TRANSPORT ORGANISATIONS CAN BUILD RESILIENCE AGAINST TERRORIST ATTACKS Tracy Reinhold, chief security officer at Everbridge looks at what transport organisations can do to build resilience against an attack Emergencies can impact any transport operator at any time. Infrastructure failings, disruption caused by extreme weather, or accidents, can have an immediate and disruptive effect. However, it is rare for any critical event to have quite the impact of a terrorist attack on a public transport service. These are the events that make news worldwide with long-term ramifications not just for the transport operator, but for all staff, passengers and emergency services involved, the wider community and even the country in which the attack took place.

30

Most critical incidents involving public transport can be resolved reasonably quickly and are contained within the groups directly affected. A terrorist attack is more likely to see lives lost or threatened. But there are counter measures that transport organisations can put in place to build resilience. These encompass assessing risk factors, anticipating how a terrorist incident might unfold and implementing practices to reduce the impact of an attack on their operations and safeguard employees and passengers. Several factors need to come together to create operational resilience, and corporate culture is at the core. Organisations are only as resilient as their people, so public transport companies should invest in training, mentoring, and resources that promote the well-being and mental health of their employees. Contented employees are better positioned to cope with crises and are more engaged in managing them. Collaboration is also important. This happens when companies recognise their successes, encourage employees to learn from their mistakes, and foster their collaboration. Employees then develop a strong sense of community and stick together in times of crisis. Leaders can set a good example. By implementing clear guidelines, setting realistic expectations and always being available, they create trust and stability among employees, which pays off in critical situations such as a terrorist attack.


Proactive risk management together with continuously updated contingency plans are essential. A priority list of experts, technicians and helpers from within the transport operator needs to be agreed in advance. They will initiate the critical incident plan and begin necessary and informed communications. This is important because control during an emergency can so easily be lost, leading to chaos. Aligning specific actions to specific people ensures that messages are clear, rumours and panic are quickly allayed and employees, passengers and those helping have accurate and timely information. Avoiding misinformation, particularly in the wrong hands, is vital for a quick resolution of the incident. Transport operators need a critical incident communications plan. It should detail responsibilities and processes, who talks to whom and when, and what information they share. In addition to internal contacts, there may be external groups, such as passengers, partners of employees, or the public that will require communications and updates. As public transport companies operate critical infrastructure, there may also need to report to authorities such as the police. When companies prepare templates for messages ahead of time, it helps them communicate efficiently and accurately during an emergency. Different audiences will need different information, but key messages must be consistent and not contradictory to keep everyone on the same page. Transport companies should plan for multimodal communication. The more channels they use, the more likely they are to reach all audiences. Ideally, recipients should receive information through all of today’s channels including SMS texts, push messages, email, and voice messages on both personal and work landlines and mobile phones. Companies should then practice their planned procedures without the pressure of an emergency. This will give them the confidence that everything will work in the event of a terrorist attacks and allow them to identify and address any weaknesses in their plans. BUILDING RESILIENCE WITH TECHNOLOGY

Organisational resilience can be enhanced immeasurably with the use of technology. Transport operators will benefit from an integrated critical event management (CEM) software solution that allows them to connect

TRANSPORT ALL CAPITALSSECURITY IN TAB

ASSESSING THE RISK OF AN ATTACK

Avoiding misinformation, particularly in the wrong hands, is vital for a quick resolution of the incident business continuity, disaster recovery, and risk management tools. By doing this, they can assess the risk of an attack, seamlessly disseminate information across teams, and avoid disruptions that get in the way of responding quickly to a critical event. At the core of a CEM platform is a data hub that collates all the information relevant to an emergency and manages all the necessary processes. Data from a wide variety of sources can flow into such a platform, including information from publicly available sources such as police channels, media reports, and social channels across which discussions are monitored. The platform brings this data together and visualises it clearly. As a result, public transport agencies can be alerted to impending dangers early, understand the impact on their own systems, and respond quickly. Crisis teams can coordinate all response activities, teams, and resources within a single application. Everyone involved, from management to emergency services can work from a common, up-to-date, and consistent view of the situation. The processes that public transport operators have defined in their emergency plans can be implemented and managed in a CEM solution in the form of rules, guidelines, and templates. In the event of a terrorist attack, the software can then automate many processes using a workflow system. This eliminates the time lost to manual activities and the human errors that occur under the pressure of a critical event. In particular, the communication to warn those affected and to inform emergency services on the ground, or at the site, should be automated. Ideally, the CEM platform supports two-way communication. In case of doubt, crisis teams know who is safe or whether they need to initiate the next escalation level through feedback or lack of feedback. In addition, the communication system should be able to scale quickly if needed - for example, if transportation companies need to inform a very large number of employees or passengers at short notice, which is likely in an extreme emergency such as a terrorist attack. L ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

31


When every message counts Multitone delivers swift, dependable, and secure communication technologies to a global clientele. Our comprehensive suite of hardware, software, and apps enables tailored integration, automation, and communication systems. These innovations not only enhance workplace safety and efficiency but also fortify resilience. Explore how Multitone is redefining communication at www.multitone.com info@multitone.com | +44 (0)1256 320 292


BAPCO 2024

BAPCO 2024 The BAPCO Annual Event is back for 2024, at Coventry Building Society Arena from 6 to 7 March

T

he event brings together the entire UK public safety communications sector to source the latest equipment and systems, develop important business relationships, and generate new business opportunities. Launched in June 1993 as the British Association of Public Safety Communications Officials, British APCO, also known as BAPCO, is now acknowledged as the leading UK-based Association for all professionals using or developing public safety technology. With more than 60 exhibitors, the event offers visitors the chance to discover the latest equipment and systems, gain insights and knowledge that directly impact their dayto-day role and network with like-minded individuals. Guided tech tours will be available, offering individually themed, tailored and interactive experiences, exploring the new and innovative products offered by the exhibitors. The tours will cover areas such as Connected Vehicles, Control Rooms, Cybersecurity, Transition to Broadband and Safe and Smart Cities. The two-day conference programme offers the chance to learn from a range of speakers, as the UK’s leading conversation for public safety experts. The free-to-attend learning opportunities across the three different theatres offer keynote addresses, best practice

and technology updates, panel discussions and debates offering a unique educational experience across the entire sector giving practical knowledge and innovative solutions. There will be talks covering AI, data, emergency communication, road safety and training. Other topics include cybersecurity, policing, mental health and risk assessment. Last year, the event was attended by 11 out of 14 UK Ambulance Services and 40 out of 52 UK Fire & Rescue organisations, along with 39 out of 48 UK Police Forces. Previous events have received positive feedback, with 94 per cent of visitors saying that the event is important to their business and a further 98 per cent of visitors said they will return in 2024. The Operational Lead for NicheRMS & Pronto at City of London Police said: “Very useful for meeting with new suppliers and seeing emerging technology. I also used it to engage with existing suppliers with other customers where we could pool resources.” With learning, networking and sales opportunities, The BAPCO Annual Event should be a consideration for any public safety professional. L FURTHER INFORMATION

www.bapco-show.co.uk ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

33


CRITICAL INFRASTRUCTURE

EMERGING THREATS TO CRITICAL INFRASTRUCTURE Michael Kolatchev, principal consultant at Rossnova Solutions and Lina Kolesnikova, consultant at Rossnova Solutions investigate potential threats to critical infrastructure Critical infrastructures are complex, interconnected systems and operations that are subject to a wide range of hazards and threats. Disruptions to critical infrastructure can affect or even jeopardise delivery of essential services. Threats, when realised, may lead to severe social effects, negative economic consequences, and human casualties. The risk to critical infrastructure is increasing as new threats emerge.

34 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57

Threat is more vaguely defined compared to a hazard, and that makes it more suitable for categorisation and analysis. Without attempting a scientific definition here, one can think of a threat as a danger. There are general threats (amount of danger) and specific threats. CATEGORISATION OF THREATS To permit a generalised and consistent analysis of critical infrastructure, it is important to build


CRITICAL INFRASTRUCTURE ALL CAPITALS IN TAB

Many technological products crossed borders and their owners (mainly, private businesses) are now setting rules

a generalised catalogue of threats, which can then be uniformly used. Using the catalogue permits comprehensible analysis. Attempts at creating catalogues often occur within specific industries, and rarely span beyond one or two industries. These attempts often fall short of ambition to go beyond one restrictively defined scope. Among the more advanced, while restricted, one may notice the IT domain, and more broadly, Information Security, which has, among others, catalogues of threats like ISO 27001 or NIST MTC, specific threats (due to vulnerabilities) like CVE as well as catalogues of controls aiming to protect against threats and risks like ISO standard and NIST 800-53. When going about categorisation of threats across various CIs, we should stay at high level, summarising threats into broad categories. Below are some of the more prominent categories, which now demand higher attention.

challenge critical infrastructure. Threats are related to both supply and demand dependences in fossil fuels, particularly raw or processed materials, food, workforce, technologies, data, etc. Meanwhile, in the interconnected world, critical infrastructures are not passive sites to be used in the service anymore but can themselves be used to project someone’s power if getting blocked or challenged in some ways. The term infrastructural geopolitics came into life in 2020. Technological developments in recent decades have brought forward something that did not really exist before - the geopolitics of technology. It is all about the role of Big Tech companies in the modern world, their technological superiority and control over products, and more importantly about their knowledge, expertise and very ability to produce and maintain such products (let alone capability to further develop them). Many technological products crossed borders and their owners (mainly, private businesses) are now setting rules. E

THREAT CATEGORIES GEOPOLITICS Geopolitics plays a crucial role. Tensions between countries and/or regions, strategic competitions, state rivalries - all these might

35


CRITICAL INFRASTRUCTURE

 This brings multiple types of new threats. Associated commercial threats are being gradually addressed, though slowly, by antitrust (anti-monopoly) laws of different countries. However, private control of international technology services and platforms, means private individuals in boards of these businesses make decisions. International payment industry with SWIFT, Visa and Mastercard, and a few key payment backbones, can be an example, where arbitrary decisions apply. Top international social networks represent another obvious example, where so-called rules and policies are often vague and are applied arbitrarily. As well as arbitrarily applying “private” decisions and arbitrary rules, such businesses might also be forced by their national governments to do things which become realised threats to other countries. Growing understanding of this situation, e.g. US control of key payment industries, leads to growing discussions on technological and digital sovereignty. In payments, more countries are now looking at setting payment chains in such way that their intra-national markets are less impacted by eventual foreign decisions. It is

Submarine cables are part of critical infrastructure and depend a lot on geopolitics

36 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57

possible that we will see a return of “national” and, possibly, arrival of new “regional” or “group” infrastructures, or, at least, the arrival of less-dependent alternatives more equally accommodating the needs of their different stakeholders. Electronics, another example, depends on chips. The most powerful modern chips are expensive to design and to produce with quality. This requires years and decades of expertise which is scarce. Very few producers in the world hold leading positions. Among them are ARM (UK) in design and ASML (The Netherlands) in production of advanced manufacturing equipment. ASML is particularly important as it seems to be holding the hand on production of the most advanced EUV (extreme ultraviolet lithography) manufacturing equipment. Other important players are from Japan, South Korea, Taiwan and China. The latter is an example where the threat of geopolitics of technology is being realised – i.e. China is denied access to the latest technology and, it seems, decided to invest massively in their own technology. Geopolitics clearly shaped the set objectives to “re-shore” more components of chip production supply chains – both in the US (CHIPS for America and FABS Acts bring previously missing subsidies, due to threat assessment) and in China (due to sanctions). One thing is clear – geopolitics of technologies is now one of the major considerations. Privately made decisions by technologyholders, and geopolitically funded supply chain changes, are big threats. Transnational deployment of technologies highlights another group of threats; in the “ownership” and “applicable governance” area as well. Submarine cables are part of critical infrastructure and depend a lot on geopolitics. Even though each cable has its owner, most critical inter-continental cables themselves lay on the ocean’s floor, the “no man’s land”. Technically, they are open to anyone’s physical access, even though, very few countries in the world currently have the capability to reach them. Given the growing criticality of the internet and capabilities built upon it, and telecommunication in general, such cables give rise to important threats spanning beyond its immediate critical infrastructure. There are obvious and non-obvious dependencies in supply chains (in both, “physical” and “digital”). Covid has shown some of them, especially, in transportation and healthcare. All of a sudden, previously


CRITICAL INFRASTRUCTURE ALL CAPITALS IN TAB

Critical infrastructures increasingly depend on infrastructure and assets that are partially or completely located outside their jurisdiction healthy supplies of basic healthcare materials (masks, etc.) got strongly disturbed. So much of the material was manufactured abroad (e.g. in China) that world transportation problems had an immediate negative effect, sometimes leading to bitter rivalries for supplies even between otherwise friendly states. Japan’s decision to dump radioactive water into the Pacific Ocean is a more recent example. Fishing and sea product delivery (in the East), almost overnight, got disturbed as some countries banned or introduced stricter controls on Japanese supplies. Outsourcing is another dependency which has grown a lot in past decades. Outsourcing is an approach used in many industries. Foreign companies delivering outsourced services are subject to their own rules and national regulations (and, of course, geopolitics). If significant changes should happen there within short periods of time, companies within critical infrastructure might become lacking in some of their critical capabilities. As a result, regular “third party security” considerations might need to be expanded. NATURAL HAZARDS Natural hazards (earthquakes, flooding, fires, space weather…) and climate change are expected to heavily affect infrastructure through heatwaves, floods and droughts. According to

the EU Joint Research Center, annual damage to Europe’s critical infrastructure could increase ten-fold by the end of the century under business-as-usual scenarios due to climate change alone, from the current EUR 3.4 billion to EUR 34 billion. The transport and energy sectors are expected to suffer the highest losses to climate-induced disruption. OWNERSHIP AND CONTROL Change of control and ownership elements. Most critical infrastrucutres are in private ownership and/or part of big entities. They could have complex structures, affiliation, HQs in other countries. More and more states and critical infrastructure increasingly depend on infrastructure and assets that are partially or completely located outside their jurisdiction and over which they have little or no control. For example, financial institutions often use outsourcing of data processing services and customer services to companies abroad. Those companies may experience change of control, and new owners might event be from yet another country, with another set of policies and geopolitical objectives. How could one continue to ensure threat control? Privatisation and nationalisation add to it. One may rely on certain existent infrastructures but what would happen, and would infrastructures remain reliable if certain state-owned E ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

37


CRITICAL INFRASTRUCTURE

Accessibility of services and systems will see new threats too, in particular, new threat scenarios. Forced delivery failure by globalised infrastructures, brings forward fragmentation. In turn, this may lead to incompatibility, beyond purely technical terms. Rules associated with accessibility and the use of such services and systems might become contradictory, for example, rules associated with certain services versus national regulations. Industries dependent on such services and systems need to re-visit their threat scenarios. If the fragmentation trend is not reversed, and, there are no signs that it can be reversed at this stage, related existing and new threats will grow in importance, due to the spreading lack of interoperability and further path to a failure of standardisation. Fewer global standards could be then reached, again fuelling fragmentation.  infrastructures become privately owned, where owners might decide differently due to their commercial or personal interests, or may impose their own rules? The same comes with nationalisation, where currently “open-to-all” capabilities might become unavailable to some players outside of national borders due to local political or geopolitical decisions.

38

UNPREDICTABLE EVENTS Black Swans, unforeseen events of massive scale which are hard to predict. By definition, such events can be geopolitical, economic or something else by nature. It is not necessarily a totally new category of threats, as such. But, at least, re-assessment of threats and re-visiting assumptions is a critical task to carry out. We all witness “unthinkable” things becoming


ORGANISED CRIME The isk of criminal activities to critical infrastructure used to assume threats come from outside. Nowadays, some critical infrastructures (ports and airports, for example) ARE the places of crime with high infiltration by organised crime groups. Ports have become one of the most valuable parts of complicated

CRITICAL INFRASTRUCTURE ALL CAPITALS IN TAB

perfectly real. Previously respectful and reliable partners might become totally unreliable or unwanted within hours or days. Threats associated with manmade catastrophes are there too. In the past, this would be primarily linked to bugs and faults in systems. Nowadays, new threats need to be considered due to overreliance on automation, proliferation of the AI-powered solutions and approaches, growing issues and maintenance costs. For example, AI is a hot topic. Imagine, AI might be considered as an “algorithm” defining how a system can build and continuously modify its decision algorithms. This might mean that no one would know the decision algorithm of an AI-powered system at any future moment in time. If so, what will you test your system against? Consider a shift from any deterministic logic to measuring acceptability of outcomes and input-fuzzing; a “what” without “how”.

With changes and conflicting agendas at many levels, different international and national decisions, the unthinkable becomes real criminal schemes with billions at stake. The largest ports like Antwerp, Rotterdam, Hamburg or La Havre have become the El Dorado for drugs traffickers and contrabandists and, consequently, contribute to the skyrocketing increase of drugs consumption, drugs-related crimes and urban violence in Europe. ACTIVISM Political and social activism with potential sabotage of activities by trade unions, eco or anti-capitalist movements or others can be both physical and cyber in nature and cause significant service disruptions. Changes of human behaviour, autochthonous and allochthonous - this might be changing working attitudes, especially, in the forthcoming generations, with such things as a no nightshifts attitude, home- and tele-working, or cultural attitudes. Apart from the obvious effects, there might be some less obvious. SKILLS Loss of expertise, skills. Long-term failures in school curriculums, and in general, changing societal attitudes, has led to a decrease of graduates in particular domains. And, often, these are critical domains on which critical infrastructures depend. For example, nuclear energy and some other critical infrastructures with lack of fresh “national” skills and expertise, which might lead to either decline in such industries, or necessity to open such critical infrastructures to external foreign workforce. Without even mentioning “old and evolving” threats such as terrorist and cyber-attacks, the unlawful use of drones, hybrid threats and so on, we are witnessing a growing number of emerging threats. With changes and conflicting agendas at many levels, different international and national decisions, the unthinkable becomes real. Fragmentation, potential failures in interoperability and standardisation, due to global lack of trust; human behaviour, who needs “the job” the most, ultimately, – a company or a worker? One can go on and on. L ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

39


Find suspects in minutes

Reduce search times for suspects in video footage from days, hours . . . to minutes! Cognitec’s face recognition technology imports still images and video material, finds all faces, and clusters the appearances of the same person, even across multiple media files. Investigators can search videos to find unknown persons, persons appearing together, frequently seen persons or groups, and known persons.

Talk to us about your face recognition requirements and projects! Most experienced. Highly trusted. Cognitec is the only company that has worked exclusively on face recognition technology since its inception in 2002.

www.cognitec.com | sales-emea@cognitec.com


ACCESS CONTROL

SMART ACCESS CONTROL IN SMART BUILDINGS While the idea of smart buildings may not have been popular for that long, smart access control has been around for a while – pinpads, keycards, facial recognition etc. and the technology is only getting better

A

smart building utilises advanced technology and automation systems to enhance the efficiency, sustainability, and overall functionality of the building. The systems that are used are designed to optimise certain areas such as energy usage, management, comfort, and security. Access control is an important consideration for any building to protect occupants from physical threats and to protect secure areas and critical infrastructure from unauthorised access. However, it is important that this process is frictionless and efficient, to save time and keep users happy. There are many different options when it comes to smart access control and it is important to consider what is right for your building. Remember the solution should be scalable, as what is right now, may not be in the future.

Access control nowadays incorporates technology such as smart locks, cloud control, biometrics and facial recognition. The technology can be installed at the front door of a building, but also at floor or room level where different levels of access are required. A simple example of this kind of design would be a hospital, where different people (patients, clinicians, cleaners, porters) would need different levels of access to different rooms. Pharmacists need access to medicines, but cleaning personnel should not have this access. On the other hand, access to cleaning supplies should be reserved for cleaning teams only. Smart access control has the ability to grant or deny access to individuals to any area. BENEFITS Smart access control offers many benefits. First and foremost is better security. The E ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

41


Protecting your space. Powering your business. We’ve been security experts since 1864. Providing optimal security solutions and user experiences for our customers. Through our partnerships with the world’s leading manufacturers, no one else offers better-rated, better-tested products: High Security Doors Speed Gates Revolving Doors Full Height & Bar Turnstiles Smart Access Control Systems


TAILGATING Technology is available that can block tailgating attempts in real time. Notifications can also be sent to the security team, so they can take swift action. TIMINGS If you have one-off or sporadic visitors to the building, for example interviewees, maintenance workers or delivery people, you can set an expected period of time for their visit. This means they won’t be able to have unauthorised access to the building after their agreed visit. Access control can also be integrated with other aspects of building control. For example, when the first person enters the building or room, the lights go on and when the last person leaves, the lights go off and the heating goes down. This goes hand-in-hand with sustainability and net zero goals. TOUCHLESS In a post-pandemic world, infection control and people’s health are an important consideration and visitors and building occupants will want to know that this is being addressed by building

ACCESS CONTROL

 technology keeps a record of exactly who is in the building at what times and can track security threats in real time. Smart access control offers the possibility of earlier risk assessment and management, with a better idea of potential risks. Smart systems can assess the likelihood of security issues ahead of time. Smart security systems mean that you don’t always need physical security staff or door teams in the buildings when they are open. While it is still a good idea to have at least some presence should an incident occur, you can consider downsizing or reskilling your team for other tasks. Should an incident occur, whether this be a terror attack or a fire for example, a smart access control system will let you know who was in the building when the incident happened, so you can make sure everyone is accounted for. Data can also be used to gather information about the building, for example how many people are there on which days and what time of day. This means you can consider making changes to other aspects of building management. For example, if Mondays are usually quiet, you can schedule maintenance for that day.

Should an incident occur, a smart access control system will let you know who was in the building management. Eliminating the need to make contact with a touchpoint creates a more hygienic environment. RISKS On the other hand, it is important to consider the negatives of smart access control. Number one being technology failure. Make sure you know what will happen in the event of an internet or power outage. If this renders your system useless, make sure you have a back-up plan. As with any electronic, internet/cloud-based system, there is also the risk of a cyber attack. Make sure that all your cybersecurity processes and systems are up to date and regularly checked to make sure this does not happen. One of the most important benefits of smart access control is making life easier for people, whether this be occupants and visitors or the security staff themselves. Swift and efficient entry is great for those using the building and less time spent on security checks and checkins can free up staff for other tasks. The data gathered from the system can also be utilised by building management. Where it previously may have been time-consuming to gather data on building occupancy rates for example, smart access control systems will do this for you. L ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

43


Advertisement Feature

CYBERLOCK IMPROVES SECURITY AND ACCOUNTABILITY When critical assets are at stake, controlling and tracking access may be challenging. Aged mechanical suites may result in a gradual decline in the accountability and control of keys. Unauthorised access to sites may lead to theft or an unsafe working environment

WHAT MAKES CYBERLOCK UNIQUE? CyberLock provides complete control over who goes where and when. The key determines what locks may be opened and when. WHAT ARE THE MAIN COMPONENTS? CyberKeys contain access permissions, including date and time restrictions. CyberKeys provide all the power to the lock cylinders, removing the need for expensive hardwiring or cables. Over 400 styles of CyberLock are designed to retrofit existing lock hardware without power, each designed to match the mechanical lock

44

they need to replace. Wherever these locks are located, smart access control may be exercised. CyberKeys may be updated by a range of options, including mobile phones. CyberKeys may also be issued as needed from auto-vend vaults that can also handle the secure release of mechanical keys. The powerful features of CyberLock are combined with the intuitive management software, which allows the permissions in CyberKeys to be managed and monitored, as well as mapping of infrastructure and automatic reports and notifications. WHAT ARE THE BENEFITS OF INTELLIGENT ACCESS CONTROL AT REMOTE SITES? When using CyberLock, the benefits of an easy-to-install solution include: ensuring


Advertisement Feature

sensitive sites remain secure, including government-approved locks; providing realtime information about the validity of a key; easy implementation and expansion with no wiring since the key supplies the power and access rights and controlled access while at the same time monitoring activity. The benefits may be compliance or commercial. For some businesses, access control may be mandatory. For others, it may be a commercial imperative, with a payback of less than three weeks recently reported by one large user of padlocks. WHAT SHOULD YOU CONSIDER BEFORE INSTALLING? A successful change in business procedures requires attention to the following: Project communication: What are the drivers for change, who will be impacted, when will the changes take effect, and how will the success of the changes be measured? We have seen many instances when a Project Team deals with these matters, including the logistics, IT, operations and security disciplines. Ultimately, the change is driven by the business. Practical considerations include the ability of users to practice using the key and become familiar with how and when to update it. The Train the Trainer approach works well, allowing change advocates to train many more groups of users, each receiving their new key before any lock changes. Users could practice using locks set up for that purpose and update their keys using their mobile phones. Installation of locks is often based on a priority established by the business. Since users and third parties will have their keys at this stage, the changeover of locks can proceed at a pace determined by local circumstances. Over time, the use of the old mechanical keys will diminish and become irrelevant. WHAT POTENTIAL OBSTACLES COULD YOU COME ACROSS? Here are a few that seem commonplace: If equipment such as key update keypads are to be installed within IT infrastructure, then the IT staff will need to be briefed regarding the nature of the equipment and how it operates. The CyberLock hardware is dependable and secure and presents minimal impact. Since access control involves personnel management, GDPR considerations may require the systems to be fully integrated

Jim Scharff, UK Development Director Sellox Jim Scharff has led CyberLock use within the UK since early 2000, helping many businesses improve access control arrangements. James has pioneered the benefits of improved technology and the migration from physical key control to electronic intelligent keys. For more information regarding how CyberLock may benefit your business, contact jim@sellox.co.uk with in-house ERP systems. CyberLock has the versatility to manage interfaces with existing systems. Personnel computers may be locked down so USB drives are not permitted, or even internet access is highly regulated. These obstacles can be overcome with careful planning in advance. The location of management servers may be determined by company policies, such that they must be on-site and managed locally. This is particularly necessary within government, council and defence organisations. The CyberLock system can be fully managed or self-administered locally. L FURTHER INFORMATION

sellox.co.uk ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

45


CYBERSECURITY

WHAT CYBER DANGERS DO GOVERNMENT OFFICIALS FACE IN 2024? Tom Kidwell, Co-Founder, Ecliptic Dynamics and former British Army and UK Government intelligence specialist and internet infrastructure security professional for the public sector looks at cyber threats for 2024

I

n the last 12 months, the state of the cyber threat landscape has become increasingly tumultuous. The number of attacks is increasing, malicious threat actors are becoming yet more indiscriminate in their approach, and governments and public sector organisations have become key targets. But this threat is not a new one. In 2017, Westminster reported that a sustained cyberattack had impacted the Houses of Parliament, attempting to steal emails of government members. It was claimed by Whitehall officials

46 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57

that the attack was staged by Iran and was later followed up by a separate attack on the Scottish Parliament. And just recently, the UK accused the Russian Secret Service, the FSB, of carrying out hundreds of attacks on politicians, civil servants, journalists, thinktank members, academics and other public sector officials. The reality is that 2024 will hold many of the same dangers. However, there will be some worrying differences, particularly for government officials.


WHAT WILL 2024’S CYBER THREATS LOOK LIKE FOR GOVERNMENT OFFICIALS? INCREASED USE OF AI In 2023, AI transformed from a conceptual technology of the future, to being integrated into almost every walk of life. From healthcare

CYBERSECURITY ALL CAPITALS IN TAB

HOW HAS THE LANDSCAPE CHANGED? Cybercrime has become one of the most difficult issues for governments to get ahold of, and devolving foreign relations are only making it more difficult. Conflicts across Europe, Africa and the Middle East have caused an uptick in malicious cyber activity, as warring states look to gain the upper hand on their enemies. Advancements in technologies such as AI and deepfakes are creating yet more problems for organisations and individuals in the public and private sectors, while the entry bar for cybercriminals is at its lowest ever point, with off-the-shelf products giving complete novices the ability to infiltrate environments, encrypt data, and secure ransom payments. All of these factors are being accentuated by a lack of funding for many areas of the public sector. In the United Kingdom, the economy has stalled, with interest rates stagnating at 5.2 per cent. And although spending on cybersecurity from the UK government is in the billions of pounds, this simply isn’t enough to tackle the problem head on. This leaves government officials in a difficult position, and the need for constant vigilance, watertight processes, and increased understanding from a cyber perspective is critical to avoiding more attacks on our national critical infrastructure.

Advancements in technologies such as AI and deepfakes are creating yet more problems for organisations and schooling, to banking and hospitality, every industry is looking to improve its efficiency using AI. However, the rise of AI has opened up yet more opportunities for cybercriminals to exploit. For attackers, finding the path of least resistance is what they thrive on. This is why phishing and other low-skill attack vectors are the most common. With AI, it allows criminal groups to automate email campaigns, write malicious code, and clone the language of a brand or person in moments using advanced language models. This makes it easier to carry out attacks, again lowering the bar for entry for attackers. DEEPFAKES

For government officials, identity validation is critical to carrying out their jobs, and remaining secure. However, advancements in the deepfake field are making this increasingly difficult. Deepfakes involve manipulating media, using deep generative tech to clone a person’s likeness, usually their face or voice. This means that criminal gangs can copy the likeness of a government official, let’s say a cabinet minister, and send a video message to a junior minister asking them to open an attachment from an email they just sent through. This attachment could contain ransomware or other malware E

47


CYBERSECURITY  which steals and encrypts data or gives the attackers access to harvest and compromise sensitive government information from the network. These types of attacks are likely to become increasingly prevalent in 2024, with more and more malicious groups getting hold of deepfake capabilities.

Deepfakes involve manipulating media, using deep generative tech to clone a person’s likeness

48

INTERFERENCE IN ELECTIONS In 2024, more than 40 countries will be taking part in elections, with these states making up more than half of the global GDP. More than 3.2 billion people will be heading to polling stations to cast their votes, and while change may represent a positive step in many of these nations, there is a critical cyber threat which must be considered. Starting with Taiwan in January, it is almost undoubtable that China will have an impact on the election. And later in the year, it is just as likely that Russia and China alike will attempt to interfere with the American election. Attackers from these states will look to manipulate voters. This will be done using a number of techniques, including targeted social media activity, as well as attempted data breaches on candidates and campaign staff. Attackers will be looking to gain access to potentially damaging material such as personal emails or messages, with the goal of leaking them to the media and swaying public opinion. Deepfakes are also an issue. Malicious groups can use them to create fake media of candidates delivering fabricated speeches or interviews which align them with the wrong side of controversial issues. Due to the quality of video and audio produced by deepfakes, the fakes are almost indistinguishable from reality. This level of interference isn’t new. In fact, the recent UK report which accused the FSB of continuous attacks on the UK public sector, also revealed that one Russian cyber group had stolen data which was linked to the 2019 election and made it public.


CYBERSECURITY ALL CAPITALS IN TAB

STATE FUNDED CYBER ACTIVITY Global relations are becoming increasingly tenuous. There are conflicts going on in continents around the world, from the Russian invasion of Ukraine to the more recent IsraelHamas war. On top of this, tensions between superpowers such as China and the United States are continuing to escalate, despite recent promises that they would move forward as friends. These evolving fronts are giving rise to increased cyber activity funded by certain states. For example, it’s impossible for Russia to consider a physical attack on NATO nations, however, cyber-attacks can be much easier to cover up, and still cause huge amounts of damage and disruption. This anonymity is increased when states use private, criminal cyber groups to carry out attacks. In order to avoid blowback and harsh sanctions, states such as Russia commission cybercriminals to carry out attacks on foreign critical infrastructure for them. In return, they offer them refuge in Russia, allowing them to operate as an everyday business. Recent reports suggest that these groups have high-rise offices, HR departments, holiday allowances and even

flexible working. In 2024 government officials will likely become a target of these groups, funded by foreign governments to cause disruption within the UK government. The next 12 months will be a difficult one for the UK public sector, and remaining vigilant is critical to minimising the impact of malicious cyber activity. It’s the responsibility of government bodies to ensure their staff are prepared and protected, and that appropriate funding is made available to the public sector to protect themselves. Many criminal gangs are now propped up by by nation states, and we can’t allow them to gain the upper hand from an investment, awareness and capability perspective. L

Detect and Mitigate Threats to Communities and Critical Assets

Using Insights from Open-Source Intelligence Open-Source Intelligence (OSINT) provides Intelligence Services, Police, Home Office, Ministry of Defence, Armed Forces, and Border Control deep insights into online activities that could threaten safety and security. Automated Open-Source Intelligence can:

Reveal hidden online connections between people, locations, assets and currency indicative of organized criminal activity.

Provide real-time alerts into threats made against people and places to protect public safety.

www.cobwebs.com

Accelerate investigations forward by unraveling complex online schemes, exposing threat groups and uncovering hidden assets.

info@cobwebs.com

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

49


AI

AI AND MISINFORMATION Professor Harith Alani, director of the Knowledge Management Institute at the Open University looks at how AI can be used for good and bad

S

ocial media still runs on a fuel of controversy. That means people being actively rewarded for sharing engaging content regardless of the facts — contaminating beliefs and attitudes. Work at the Open University during the Covid-19 period, as one example, showed how false information about the disease reached three times more people than the corrected facts. It might be casual, unintentional posting or it might be intentional harm. Either way, when misinformation or disinformation relates to issues of health, politics, the environment, the economy, it’s a kind of pollution which is a threat to the role of governments and societies themselves. A shared belief in the existence of a common good and common truths, after all, has been the basis of democracy and its freedoms. Obvious breaches of law, those posts which involve hate crime or child pornography,

50

now fall under the Online Safety Act. But misinformation can be subjective, subtle and complex. People share what they want to share, what they find eye-catching and alarming, and are rewarded with shares and attention for being controversial, no matter how inaccurate or harmful the claim: an unstoppable flood across networks of information, into people’s homes, conversations and thinking around the world. AI FOR GOOD Here is a hugely important and particular way that AI can be used for social good, taking on the vast job of protecting media content of all kinds from obvious types of pollution and restoring trust. AI is going to be an increasingly important tool for analysing what’s happening around misinformation and experimenting with ways of preventing spread and repairing its damage.


AI ALL CAPITALS IN TAB

There have been many lab studies into the work of misinformation, involving simulations with controlled groups and their responses. The problem is that in the real world, the dynamics are very different, especially when misinformation is being shared deliberately. There is also the need to look at the actual impact of corrections. It can’t be assumed that sharing accurate information will resolve anything in itself. The OU’s Knowledge Management Institute is currently looking into the mechanics and impact of corrections. Research into both Covid-19 and other misinformation spread via Twitter/X found how 5,000 posts were corrected, but of those, only around 10 per cent reacted in any way, the majority appeared to ignore the correction; and only around 10 per cent of those who did react did so positively. Given the nature of digital media and how it’s used, misinformation can’t be eliminated, but AI and machine learning can be used to build a new environment, improving awareness and the responses in a more timely and effective way. In this way, the system can be turned on its head: where truth matters and is recognised positively, creating a new kind of fuel for social media and Internet content generally, pushing engagement in the right direction. AI can work with the mass of historic data to help identify what is likely to constitute misinformation, picking up on previously debunked claims and recurring templates.

Misinformation can be subjective, subtle and complex The technology can automatically assess and monitor the credibility of online accounts, and be used to predict the use of misinformation before it happens based on past events — when and why trends for misinformation occur, like a pandemic or conflict — allowing for more advanced algorithms and counter-strategies to be prepared. AI is also important for tracking the spread and effectiveness of fact-checking and corrections. Timing is critical. Evidence suggests that corrections need to be circulating before a tipping point of false claims has already taken hold. Generic fact-checked responses can be more or less effective depending on the audience. More needs to be done, using AI, to identify the nature of the recipients of corrective messages and personalise material. Are they influencers, conspiracy theorists, extremists or just accidental misinformers? Bot-like programs can be used to trial different approaches and monitor impacts, monitoring audience reactions to corrections, and automatically tuning and personalising interventions to maximise visibility and effects as they learn more about people’s characters and behaviours. SOCIAL MEDIA Certainly the major social media platforms are doing more to verify and report misinformation. During the pandemic, Meta worked with factcheckers from more than 80 organisations, claiming to have removed more than 3,000 E ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

51


AI  accounts, pages and groups and 20 million pieces of content. Twitter/X published policies to highlight its approach to reduce misinformation. But there are still questions

Systems now refuse to generate what they detect to be potentially harmful or misinforming

52

over when policies are actually being enforced and to what extent. Businesses want to protect their operations from criticism and restrictions, while at the same time minimising the costs involved. Twitter/X has been employing ‘curators’ to provide notes on context relating to trending topics which might be controversial, around the war in Ukraine for example (when the curators are believed to have removed 100,000 accounts for breaking rules). There is evidence this has had a positive effect in limiting the spread of false claims. The purchase of Twitter by Elon Musk, however, is understood to mean a reduction in the use of moderation. There can be an element of self-regulation. When generative AI software first came out, such as ChatGPT and BARD, they were ready to generate endless streams of false claims if prompted to do so, but more recent updates have improved the situation. Systems now refuse to generate what they detect to be potentially harmful or misinforming. However, it is unclear what stems have been used and to what extent they span across different topics and claims. Ultimately though, self-regulation by social media platforms needs to be combined with legal frameworks. And that needs to include every social media player, not just the obvious targets, the fringe platforms as they emerge: blocking illegal content, demoting false information, promoting fact-checked and known truths. Monitoring and management of a good global communications space is a mindboggling one, but positive use of AI makes it workable. L


Product Finders

AERIAL INSPECTION INSPECTAHIRE +44 (0) 1224 789692 enquiries@inspectahire.com

www.inspectahire.com

Inspectahire - The Aerial Inspection Specialists Inspectahire are experienced in the sale and application of the latest drone technologies for visual inspection, thermal imaging and surveillance. Our team has supported the security industry, Governments, and critical infrastructure for over 35 years.

CYBER SECRITY FOCLAR +31 85 0290528 info@foclar.com

https://foclar.com/

Do you specialize in multimedia enhancement and authentication? Are you concerned about deepfake images or video? Foclar’s advanced, full featured solutions ensure accurate, robust and reproducible results. Enhance your investigative capabilities with Foclar’s CUDAaccelerated filter technology. Our software delivers sharper video and fast deepfake detection results for actionable insights!

FACIAL RECOGNITION COGNITEC SYSTEMS GMBH +49-351-862-920 sales-emea@cognitec.com

www.cognitec.com

Cognitec is the only company worldwide that has worked exclusively on face recognition technology since its inception in 2002, offering products for facial image database search, recorded video investigation, real-time video screening and people analytics, border control, ISO-compliant photo capturing and facial image quality assessment.

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

53


Product Finderrs

HOSTILE VEHICLE MITIGATION ENVIRONMENTAL STREET FURNITURE 028 9036 4101 sales@worldofesf.com

www.worldofesf.com

From temporary to permanent, we have one of the widest ranges of physical security landscape protection solutions, providing a cutting edge in bollards, road blockers and barriers. Within our HVM (Hostile Vehicle Mitigation) product range we provide a diverse array of options including high level crash tested public and asset security to PAS68 and IWA-14 standards.

PERIMETER SECURITY CEIA 01789 868 840 info@ceia.co.uk

www.ceia.co.uk

CEIA (Company for Electronic Industrial Automation) was founded in 1962 in Italy when it began production of metal detectors for the textile industry, since then our product line has grown covering many sectors from military and security to pharmaceutical and food. CEIA provide a range of sophisticated technologies designed for the detection of threats.

PERIMETER SECURITY FRONTIER-PITTS LTD 01293 422800 sales@frontierpitts.com

www.frontierpitts.com

Frontier Pitts is the British manufacturer of Security Gates, Automatic Barriers, Road blockers, Rising & Static Bollards, Pedestrian Control Gates & Turnstiles. Our Anti-Terra Hostile Vehicle Mitigation (HVM) range has been successfully IWA14 and PAS68 impact tested. Our Platinum Gate and Turnstile range is Intruder Resistant to LPS1175 Security Ratings.

54 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57


Product Finders

SECURITY CAME UK LTD 0115 9210 430 cuk.orders@came.com

came.com/uk

With more than 50 years of experience in the supply of integrated solutions for automating public, administrative and urban environments, CAME have developed a series of high-security products, from rising bollards and road blockers to security turnstiles that resolve the issues that affect the management and security of critical infrastructure.

STORAGE SOLUTIONS LISTA UK 01908 222333 info.uk@lista.com

www.lista.com

Defence & Security are sectors in which work is carried out in confined and harsh conditions. Mobile workstations from LISTA are the ideal solution. This modular system is ideal for a wide range of applications, diverse tasks, and extreme environments. Security and safety features ensure full functionality in any environment.

THE SECURITY EVENT INSPECTAHIRE +44 (0) 1224 789692 enquiries@inspectahire.com

www.inspectahire.com

Inspectahire - the Industrial Security specialists. Inspectahire are proud to partner with the UK’s leading visual surveillance, scanning and monitoring technologies. We have led the way in providing the latest and most effective technologies to the security industry, Governments, and critical infrastructure for over 35 years.

ISSUE 57 | COUNTER TERROR BUSINESS MAGAZINE

55


Product Finderrs

THE SECURITY EVENT URBIS SCHRÉDER 01256 354446 sales@urbis-schreder.com

www.urbis-schreder.com

Building confidence in outdoor areas. Feeling secure is a basic human right. Our SHUFFLE is a connected, modular approach to outdoor hardware with plug-and-play rotatable modules that is designed to create safe and pleasant outdoor areas. It delivers a strategic breakthrough to address security challenges with advanced lighting and security features.

ADVERTISERS INDEX The publishers accept no responsibility for errors or omissions in this free service BAPCO

BC

CAME BPT UK

55

CEIA

20, 54

Cobwebs Technologies

49

Cognitec Systems GmbH

40, 53

CP Cases

IBC

Cranfield University

12

Critical Communications World

4

Environmental Street Furniture

54

FIVECAST

10

Foclar BV

53

Frontier Pitts Inspectahire Instruments Company

18, 54 28, 53, 55

Lista UK

14, 55

Meesons A.I.

42

Multitone Electronics

32

Security and Policing

8

Sellox

26, 44

Stadium Traffic Management

22

The Security Event

IFC

Urbis Schreder

6, 56

© 2024 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533

56 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 57


LOOKING FOR A BESPOKE LOOKING FOR A BESPOKE SOLUTION? LOOKING FOR A BESPOKE SOLUTION? Our approach to ensure that we gain a full understanding of what our clients are SOLUTION? looking to achieve is central design consultation Our approach to ensure that to weour gain a full and understanding ofprocess... what our clients are looking to achieve is central design consultation Our approach to ensure that to weour gain a full and understanding ofprocess... what our clients are looking to achieve is central to our design and consultation process...

FOLLOW US ON FOLLOW US ON FOLLOW US ON

CPCASES.COM CPCASES.COM CPCASES.COM

020 8568 1881 020 8568 1881 020 8568 1881

INFO@CPCASES.COM INFO@CPCASES.COM INFO@CPCASES.COM


REGISTER A FREE PASS

6-7 MARCH 2024 COVENTRY BUILDING SOCIETY ARENA

THE UK’S LEADING PUBLIC SAFETY EVENT

80+ public safety technology companies Gain valuable insights from

world-class speakers 3 captivating theatres NEW product launches BAPCO-SHOW.CO.UK @BAPCOEvent

BAPCO Annual Event


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.