Counter Terror Business 13

Page 1

www.counterterrorbusiness.com | ISSUE 13

INFORMATION SECURITY | PORT SECURITY | FORENSICS | PLUS MORE PERIMETER SECURITY

AIRPORT SECURITY

DEFENCE

NEWS

ON BOSTBING rs BOM stigatoe e v n i c

i h Forens to decode t begin plex crime com ne sce

EXPORTS

BEST OF BRITISH

Celebrating the UK’s success in the global security market SECURITY

PERIMETER PEACE OF MIND

The PSSA’s verification scheme

EVENT PREVIEW

COUNTER TERROR EXPO 2013 The place to tackle the issues concerning the counter-terrorism community



COUNTER TERROR BUSINESS

A TRAGIC TRUTH

www.counterterrorbusiness.com | ISSUE 13

As we go to press, a harrowing and tragic truth about the threat we face from terrorism unfolds. It’s here to stay.

INFORMATION SECURITY | PORT SECURITY | FORENSICS | PLUS MORE PERIMETER SECURITY

AIRPORT SECURITY

DEFENCE

NEWS

ON BOSTBING M

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

rs

BO investigato Forensicto decode the begin lex crime comp ne sce

While the annual Boston Marathon was taking place, three people lost their lives and a further 183 were injured by two blasts which authorities believe were planned to kill and maim as many people as possible. This took place on Patriots’ Day, which commemorates the anniversary of the Battles of Lexington and Concord in 1775.

EXPORTS

BEST OF BRITISH

Celebrating the UK’s success in the global security market SECURITY

PERIMETER PEACE OF MIND

The PSSA’s verification scheme

EVENT PREVIEW

COUNTER TERROR EXPO 2013 The place to tackle the issues concerning the counter-terrorism community

The FBI and the Homeland Security Department identified the use of pressure-cooker explosives back in 2010, suspecting they have been employed in Afghanistan, India, Nepal and Pakistan. The technique has been promoted by al-Qaeda’s branch in Yemen, which gave a detailed description of how to make a pressure cooker bomb in its English-language online publication Inspire. The New York Times’ Tim Rohan points out that the bombings seemed to be timed for when the highest concentration of runners would be passing the finish line. As more details begin to emerge, the work of Forensic teams will prove invaluable in identifying clues from streams of forensic data and digital imagery. Lessons will no doubt be learned. We praise the expeditious efforts of the rescue workers, medical personnel and other emergency services who gave their assistance. Our thoughts are with the families of those affected by this terrible occurrence. In this issue, we preview Counter Terror Expo 2013, which takes place on the 24th & 25th April at London Olympia and is the largest international event to mitigate threats, protect against terrorist attacks & understand current modern day risks. Danny Wright

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding DESIGNER Richard Gooding PRODUCTION DESIGN Jacqueline Lawford PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Hannah Charlotte Casey REPRODUCTION & PRINT Argent Media

© 2013 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

3


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS 07

07 CTB NEWS

87 DATA SECURITY

13 CTX 2013 PREVIEW

91 SDW 2013

The latest on the appalling Boston Marathon Bombing as investigators sift through thousands of pieces of evidence

A spotlight on Counter Terror Expo 2013, the largest international event aimed at mitigating the risks of terrorist attacks

43 FORENSICS EXPO

Debate and discuss the world of forensic investigations at Forensics Europe Expo

13

55 SECURITY EXPORTS

The BSIA’s Amanda Beesley investigates the UK’s presence in the global security marketplace

69 IFSEC 2013

Leading security event IFSEC International, taking place on 13-16 May at the NEC Birmingham, this years celebrates its 40th birthday

43

71 PERIMIETER SECURITY

Security expert Chris Yates investigates airport scanners, following the ban of ‘nude’ image scanners in America, plus Ritchie Bignell details the workings of the PSSA’s verification scheme which ensures that perimeter security products conform to internationally-recognised standards

79 INFOSECURITY EUROPE 55

Get insight into the latest methods employed to fight cybercrime at Infosecurity Europe on 23-25 April at Earls Court

Counter Terror Business

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

You have a data centre as a backup plan for when disaster strikes. But what if a disaster strikes your backup plan, asks Chris Phillips

The next phase of global ePassport interoperability tests will take place alongside SDW 2013 on 21-23 May

95 B-APCO 2013

A preview of British APCO – the Annual Exhibition and Professional Development Workshops for public safety professionals

101 PORT SECURITY

Can a layered approach to security can help secure our ports? The BSIA’s James Kelly discusses investigates

105 AIRPORT SECURITY

Stowaway incursions, high value theft and terrorist attack have prompted a perimeter security re-evaluation, writes Chris Yates

107 BORDER SECURITY

Thomas A Tass, executive director of BORDERPOL, shares his views on border and migration policy

111 COUNTER TERRORISM

Professor Richard Griffin asks if understanding the motivations behind terrorists can enhance counter terrorism strategies

119 DEFENCE NEWS

www.counterterrorbusiness.com Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

5



TERRORISM IN THE US

Boston Marathon bombings highlight NEWS IN BRIEF New Cyber Security arm an increased terror threat on US soil The Government has launched a new

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

partnership between government and industry to share information and intelligence on cyber security threats. The Cyber Security Information Sharing Partnership (CISP) is being supported by the Security Service, GCHQ and the National Crime Agency, who will work with industry analysts to produce and disseminate information on cyber threats facing the UK – tinyurl.com/bq9kuwn

Andrew Parker succeeds Sir Jonathan Evans as head of MI5

Terrorism reared it ugly head again in the US on April 15 when the world’s oldest annual marathon was blighted by the worst attack on US soil since the September 11 terror atrocities. The explosions, which happened almost simultaneously at 2.51 pm local time and some 100 yards apart, occurred at either end of the finishing line on Boylston Street in the heart of Boston and transformed a site of celebration on a public holiday afternoon into a scene of carnage. Three people were killed and as many as 200 were injured by the devices, which were believed to contain ball bearings and other metal pieces and were made from pressure cookers. President Obama addressed the media three hours after the attack and swiftly directed the full resources of the federal government to help state and local authorities protect people and ordered increased security around the country. “Those responsible for the explosions will feel the full weight of justice,” he said. Massachusetts Army National Guard soldiers already on scene joined local authorities in rendering aid. As a precaution, the FAA restricted airspace over Boston, and issued a temporary ground stop for Boston’s Logan International Airport. The FBI and the Homeland Security Department identified the use of pressurecooker explosives back in 2010, suspecting they have been employed in Afghanistan, India, Nepal and Pakistan. The technique has been promoted by al-Qa’ida’s branch in Yemen, which gave a detailed description of how to make a pressure cooker bomb in its English-language online publication Inspire. Boston’s Regional Intelligence Center is one of America’s 77 intelligence-sharing facilities, known as fusion centers, that allow investigators to pool data from local, state and federal sources. As investigators join the dots, Boston’s fusion center allowed the authorities to tap thousands of law

enforcement data sources, along with public data such as information from credit agencies. As the investigation widens, the system can help lead authorities to co-conspirators. According to Computerworld, the attempt by law enforcement authorities in Boston to use crowdsourced video images and still photos to identify those responsible for the fatal bombings could prove challenging. In 2011, the city of Vancouver, British Columbia, used a similar method to identify the main participants in a riot in the city following a loss by the Vancouver Canucks to the Boston Bruins. Vancouver Police Department’s riot investigation team gathered more than 1,600 hours of video images and nearly 1 million digital images in dozens of different formats from the public, the media and closedcircuit TV cameras in the city. This remains one of the largest video forensics efforts involving crowdsourced video and images. The infused metadata allowed investigators to search through the images and to track individual behavior and events between video footage from multiple sources, said Grant Fredericks, a video analysis instructor at the FBI National Academy in Quantico, Va., and the founder of Forensic Video Solutions. The same approach can also be used in the Boston investigations, but the sheer volume of data will make the task harder, according to Fredericks, who told Computerworld’s Jaikumar Vijayan: “When you have an incident like in Boston where you have 150,000 to 200,000 people, a significant percentage of those people have cell phones and they are taking pictures and video. “Every single one of them was potentially collecting evidence for this investigation. There are probably hundreds of people with footage showing the person or persons who left the bomb,” without their knowing it.” Law enforcement authorities investigating the bombings have already called on citizens to turn in any video footage or digital images they might have taken at the event.”

The current Deputy Director of the Security Service (MI5) Andrew Parker has been appointed as successor to Sir Jonathan Evans. Parker has worked for the Security Service for more than 30 years and has been in his current role since 2007. He will take over from Sir Jonathan on Monday 22 April 2013. “It is a great honour to be appointed Director General of MI5. I am extremely proud of the extraordinary work that the men and women of MI5 do to keep the country safe in challenging circumstances. I look forward to leading the Service through its next chapter,” he said. Home Secretary Theresa May paid tribute to the work of Sir Jonathan Evans, who has led the Service through challenging times of change and unrest including in the aftermath of the 7/7 London bombings. His work also helped ensure the delivery of a safe and successful Olympic and Paralympic Games last year READ MORE: www.mi5.gov.uk

NaCTSCO awareness campaign hits CTX 2013 The National Counter Terrorism Security Office (NaCTSO) will be conducting an awareness campaign at Counter Terror Expo on 24 & 25 April at Olympia, London NaCTSO will have a number of advisors, including Counter Terrorism Security Advisors (CTSAs) to engage with industry and provide specialist advice against the evolving terrorist threat. Visitors to Counter Terror Expo will be able to meet CTSAs on stand number D40. E SEE PAGE 15 FOR MORE ON COUNTER TERROR EXPO

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

7


Ready to meet

the world’s most flexible infrared cameras? Thermal imager combined with IP camera electronics

Meerkat-Fix

Raven-640

Imagine the invisible The high resolution Raven-640 is the smallest thermal infrared camera in the world fitted with a 640 x 512 detector. The analog video-out interface makes it an easy plug-and-play system. Thanks to excellent image quality and small configuration the Raven-640 is designed for instant, accurate and cost effective integration into most complex security and night vision applications. The outdoor camera version Meerkat-Fix consists of fixed mounted cameras with a fixed field of view, and even for more situational awareness, with zoom lenses. The Meerkat-Fix features H.264 video compression and optional ONVIF. www.xenics.com - www.stemmer-imaging.co.uk


COUNTER TERRORISM STRATEGY

Report reveals $60m paid out in ransoms since 2008 The first annual report on the UK’s strategy for counterterrorism reveals that numbers kidnapped last year rose to 50, almost double that of 2010. In addition to the rise in kidnaps, the report also warns of the increasing tactic behind them and estimates that at least $60 million paid in ransom payments has been used to finance terrorist groups since 2008. Of the 150 foreign nationals who have been abducted in the last four years, the report states 13 have been Britons. The report also reveals more than 500 would-be terrorists received support designed to prevent them from joining radical terrorist groups, through an initiative called the Channel Project — a £3 million a year UK government scheme designed to protect people at risk from radicalisation. Between January 2011 to December 2012, there were exactly 1,274 referrals, of which 243 people — including a few school children — were offered support through the project. Charles Farr, director general of the Office of Security and Counter-Terrorism, said that while the UK refuses to pay kidnap ransoms, other countries and private companies do. The report also highlighted an increasing threat from Syria where al-Qaeda supporters are attracting hundreds of foreign fighters from Europe, including a number from the UK. Farr added: “As and when UK residents return here, there is a real risk that they may carry out attacks using the skills that they have developed overseas,” although he did add extremist groups mentioned in the report were not just Islamist but also included far-right groups looking to recruit supporters. At the forthcoming G8 conference in Northern Ireland this summer, UK prime minister David Cameron and Home Secretary Teresa May are expected to urge member countries to vote in an international consensus to refuse to pay future ransoms when kidnap demands arise. Farr said he believes the

NEWS IN BRIEF

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Hackney Council revenues officer jailed for distributing al-Qaeda literature A 48 year old man who worked for Hackney Council has pleaded guilty to two offences of disseminating terrorist publications. The Old Bailey heard Khalid Baqa, who worked as a revenue officer for the Council, had one of the discs in his office computer. Baqa admitted to storing 300 discs of terrorist material in his car and home. The court heard the discs included al-Qaeda’s Inspire magazine, 39 Ways to Support and Participate in Jihad and 42 Ways to Support Jihad, by Anwar al-Awlaki.

Greater Manchester focuses Prevent on campuses An anti-terrorism expert is to be appointed to prevent students from being radicalised in Greater Manchester. The successful candidate will work at college and university campuses across the region to spot early signs of extremism as part of the Home Office’s £60m Prevent strategy. Counter-terrorism experts say there are no reports of suspicious activity but want lecturers and student groups ready to raise the alarm over suspicious behaviour. The new Prevent co-ordinator will work with campus bosses, student unions and university societies to tackle radicals. Channel Project is an essential part of counter-terrorism, adding: “If you look at the cost by comparison if those people had to be put through the criminal justice system or an investigation, it’s a fraction of the amount. This is quite apart from the damage it does to families and communities.” Responding to the threat from terrorism remains a top priority. Since 2005 there have been no mass casualty attacks in Great Britain, but a number of serious attempted attacks have been foiled. In the 12 months to September 2012, 45 people were charged with terrorism-related offences. The report suggests the principal terrorist threat to the UK and its overseas continues to come from Al Qa’ida, its affiliates, other groups and lone terrorists. Commenting on the publication on March 26, Home Secretary Theresa May said: “The report makes it clear that the threat from terrorism is changing but remains substantial. We need to continue to detect, prosecute and otherwise disrupt terrorist threats. We must develop our Prevent work to respond to the challenge from domestic radicalisation and home-grown terrorism. We must continue to strengthen our border security. We will work with other countries and multilateral organisations to deal with the new international terrorist threats.” tinyurl.com/7uajubf

Drone use to attack terrorist targets ‘illegal’ Ben Emmerson, the UN special rapporteur on counter terrorism and human rights, has claimed the use of drones to attack terrorist targets was illegal under international law. Leading a United Nations inquiry into CIA drone strikes against al-Qaeda, Emmerson has suggested that their use to risks legitimising the terrorists themselves. In an interview with CNN he said: “If it is lawful for the US to drone al-Qaeda associates wherever they find them, then it is also lawful for al-Qaeda to target US military or infrastructure wherever they (the militants) find them. “There is a real risk that by promulgating the analysis that is currently being developed and relied on by the United States they legitimise, in international law, al‑Qaeda, by turning it in to an armed belligerent involved in a war and that makes the use of force by al-Qaeda and its associates lawful.” Emmerson’s claim sparked an angry response from those directly affected by terrorism. Clifford Tibber, a lawyer representing relatives of the 52 civilians who died in the 7 July terrorist bombings in London in 2005, told The Telegraph: “I am sure all victims of terrorism and any sane person would regard as offensive and irresponsible any suggestion that terrorist attacks can be regarded as lawful. What an extraordinary thing to say.” Emmerson was asked to investigate the use of drones to attack terrorist suspects in Pakistan, Afghanistan and Yemen by the UN Human Rights Council. He is due to report in October. READ BEN EMMERSON’S STATEMENT: tinyurl.com/a53g3br

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

9


What are you looking for? See it — and every detail of it.

All images are conceptual. For product information and actual footage from Axis cameras, visit www.axis.com

Image quality is always important, but the benefits are really determined by how you will use the images. We make your job easier, by focusing on image usability first. Utilize our competence and our comprehensive range of image features such as HDTV, Wide Dynamic Range and Lightfinder.

As the world leader in network video, we ensure you always get video you can use – no matter what the conditions are. Get the Axis picture. Stay one step ahead. Visit www.axis.com/imageusability

Axis network cameras with HDTV performance deliver true color representation and high quality images. An appealing solution when every detail matters.


RUSI REPORT

DO DRONES MAKE THE WEST SAFER?

The public remains divided on whether the use of drone missle strikes prevents terrorism, but a YouGov poll detailed in the latest Royal United Services Institute report reveals a small majority in the UK support their use

55 per cent of the British public would support the UK Government assisting in a drone missile strike to kill a known terrorist overseas, but support drops substantially if innocent casualties are likely, according to a new joint study from University of Surrey’s Centre for International Intervention (cii) and the Royal United Services Institute (RUSI), in collaboration with YouGov. Polling data also established British public support for drone missile strikes rose significantly if an imminent terrorist attack against the UK could be stopped, with many agreeing that drones can help to reduce casualties compared to otherweapons, but feared that drones could make military intervention too easy. DIVIDED OPINION However, Britons were divided on whether drones strikes are ultimately leaving the West more safe by making it easier to target known terrorists, or less safe by turning public opinion against us in other countries. The new findings feature in a joint cii/RUSI Whitehall report Hitting the Target? How New Capabilities are Shaping International

Intervention, which addresses the debate surrounding ‘drones’; how much is known or understood by the public about this new technology and the capability it provides. YOUGOV SUPPORT OR OPPOSE POLL The YouGov poll examines to what extent the British public support or oppose the UK Government assisting in a drone strike and whether this is affected by several independent variables, including the hypothetical context of imminent threat, the targeting of UK citizens, and the likelihood of varying civilian casualties. In each case respondents were first shown the following explanatory text: “It was recently reported that the UK Government might be passing information to US authorities to help them carry out missile strikes from unmanned aircraft called “drones” to kill known terrorists overseas in countries like Pakistan, Yemen, and Somalia”. Overall support for the UK Government assisting in a drone strike against a known terrorist increased slightly to 60 per cent if the person being targeted was a UK citizen. Moreover, if it was guaranteed that no

innocent civilians would be killed by a drone strike, support increased again to 67 per cent. However, support for a drone strike dropped substantially to 43 per cent, with 41 per cent opposed, when it was suggested that 2-3 innocent civilians might be killed. Support for a drone strike dropped further still to 32 per cent if it was ‘likely that 10-15 innocent civilians might be killed’; conversely opposition rose to 46 per cent. When presented with a scenario that a terrorist attack against the UK was imminent and could be stopped by a drone missile strike against a known terrorist in Yemen, overall support remained notably less sensitive to casualty numbers. In this context support for a drone missile strike dropped from 74 per cent to 64 per cent among respondents overall when the scenario was a casualty-rate of 2-3 innocent civilians instead of none, and dropped further to 60 per cent when it included a casualty-rate of 10-15 innocent civilians. But in each case, overall support retained a strong majority. On the broader question of whether drone missile strikes in countries like Pakistan, Yemen and Somalia are helping or hindering Western security, the British public is divided. 32 per cent of respondents said drone strikes had made the West safer overall by making it easier to target known terrorists; 31 per cent said the West was less safe and turning public opinion against us in countries where drones are used; 37 per cent selected neither of these options or didn’t know. Nevertheless, a 57 per cent majority agreed overall that drones help to reduce casualties ‘by removing the need to send people on the ground’. A significant plurality (47 per cent) also agreed that drones help to reduce casualties ‘because of their accuracy compared with other weapons’. Dr Joel Faulkner Rogers, Academic Director of YouGov, whose research is published in Hitting the Target? said: “As public debate now seemingly plays catch-up with a decade of evolving policy on drones, public opinion on the subject has been variously portrayed and oversimplified on a scale between nonchalantly for and hysterically against.” “The British public are clearly divided on whether the current use of drones is ultimately doing more harm or good to Western security. But there’s also a distinction between attitudes to the weapon and the way it’s used, which go beyond binary moral judgements about ‘drones-good’ or ‘drones bad’. The findings show notable public concern that drones could make foreign intervention too easy. But a majority of Brits also support the policy, at least in principle, of targeted drone strikes against known terrorists, with many who support a view that drones can help to reduce, as well as cause, casualties if military action is required.” L

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.rusi.org

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

11


Counter Terror Solutions for an Evolving World

Counter Terror Expo 2013 is the largest international event to mitigate threats, protect against terrorist attacks and understand current modern day risks in a secure environment. Discover solutions to protect against threats for: Police, Emergency Services, Government, Military, Intelligence & Security Services, Private Sector, Large scale sites, Oil & Gas, Cyber, Maritime/Anti-Piracy and Critical National Infrastructure.

A-Z of modern counter terrorism solutions 9000+international attendees 400+ exhibitors 4 conference streams 17 show floor workshops Closed door and secure briefings 200+VIP and International delegations Meet the Buyer Programme Networking Opportunities Brand new show features to protect against current security risks

If you’re involved in security & counter-terrorism then register today to protect against the terrorist threat.

www.counterterrorexpo.com/GBM1 Co-Located with

Lead Media Partner

Supported By

SAMI www.seasecurity.org


COUNTER TERROR EXPO 2013

CONTINUING THE BATTLE AGAINST TERRORISM

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Transnational terrorism remains the most dominant national security threat and constraint to protect today’s borders. The need for good security to secure populations, business and infrastructure against terrorist threats is not reducing but rather emerging, adapting and evolving. Counter Terror Expo, taking place at Olympia on 24-25th April, will shed light on the latest methods, orgainsations and products to counter the threat posed by international terrorism

The recent attack on the US Embassy and murder of the US Ambassador to Libya could mark the beginning of a new terror front in North Africa. If Libya becomes a threat to the West then Egypt falling into the hands of extremists could be catastrophic. Who knows what the end game will be in the current stand-off between Iran, Israel and USA and indeed the rest of the Middle East. Who knows where Syria will be in 12 months’ time or how the rapid expansion of India, Brazil, China and Russia will affect world order. Who knows what will happen in Africa post the Arab Spring? If only the threat was from Al Qaeda

alone. Much closer to home the Irish Dissidents are continuing to carry out attacks in Northern Ireland and continue to threaten a return to more high profile and devastating attacks. Counter Terror Expo, 24 – 25 April 2013, Olympia, London, is more valid than ever. Any security professional will know that the very best way to ensure these questions are evaluated and considered prior to an attack is to sue a holistic approach. CTX brings together disciplines of personal, physical and information security in a way that allows Corporations, SME’s and individuals to develop an appropriate and

proportionate security plan. Great effort has been made to ensure that products on display will show the best and most innovative technologies on the market, to a global audience spanning 68 countries representing the core interests of those most affected. What is certain is that the need to secure assets, people, the brand and profits are always going to near the top of the agenda for Governments and businesses. Despite the highly successful drone strikes and the decapitation of key Al Qaeda (AQ) leaders such as Osama Bin Laden in Pakistan and Anwar Al-Awlaki in the E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

13


HAZARDOUS MATERIALS CONTAINMENT AND PROCESSING SOLUTIONS

STAND No.

O 72 Counter Terror Expo

Hosokawa Micron Ltd offers a range of standard and bespoke containment systems, fume cupboards and gloveboxes for the handling and processing of hazardous materials. Applications include full glovebox integration of forensic analysis systems, lasers, microscopes and CNA fuming chambers. A range of lead shielded gloveboxes offer safe handling and processing of radioactive materials. A recent innovation is a rapid deployment, flexible containment system supplied with a wheeled transit case. This fully mobile unit can be easily transported to the scene of an incident and used to contain hazardous materials for analysis at the scene or for transportation back to the lab.

Rivington Road, Runcorn, WA7 3DS • Tel: +44 (0) 1928 755100 • E.mail: info@hmluk.hosokawa.co.uk

PROCESS TECHNOLOGIES FOR TOMORROW SM


COUNTER TERROR EXPO 2013  Arabian Peninsula. AQ, its affiliates and associated groups will continue to be a penetrating threat throughout the world. The relative weakness of AQ Core does not mean that the threats have necessarily lessened, but they have certainly changed. What we have seen is a widening and flattening of the terrorist threat. Widening because the threat now comes from a larger number of areas and countries and flatter because the hierarchies which previously controlled them have been and are still being, dispersed and in many cases killed. TOO CLOSE TO HOME? For many years the government/police/ security services have been explaining the need to risk assess and vet staff. The realisation that terrorist attacks committed on behalf of Al Shabaab in Somalia were in many cases carried out by UK passport holding terrorists and the rise in numbers of UK citizens linked to terrorist organisations through illicit fundraising and providing resources overseas has reconfirmed why this is an on-going priority for the entire industry and a necessary focus at CTX 2013. REDUCING VULNERABILITIES The protection of high net worth individuals is of growing importance to both the public and private sectors. Whether it is too ensure the staff themselves do not pose an insider threat to the organisations they work for or by ensuring the buildings and external environment remains safe and secure.

Terrorist Target Selection: The case of Anders Behring Breivik Why do terrorists target the way they do? This is a complex question, because the road from the principal decision to turn to terrorism to the actual act itself may be very long. As such, the number of variables inflicting on the target selection process can be very high. Classic targeting literature focuses on how ideology, strategy and tactics lead towards a target in a funnel-like way. However, each of these main boxes consists of many variables that must be taken into account and the main challenge is often how they interact. Furthermore, it is always a question of what kind of compromises the terrorists have to along the way and as such. Also recognising that different factors may vary quite distinctively from one case to another, research on the process of terrorist target selection must include proper qualitative studies, going deep into cases that are selected. Cato Hemmingby, research fellow at the Norwegian Police University College, will be a key speaker at CTX, and will present on one of the worst solo-terrorist attacks ever seen. On

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

22 July 2011 Anders Behring Breivik conducted a two-folded attack, which was initiated with a massive bomb explosion in the Government District in downtown Oslo, killing 8 people. This was followed by an extremely brutal shooting spree at the Labour party youth camp at the island of Utøya, resulting in the deaths of 69 people – including many victims under the age of 18. This case will serve as an example of how a solo terrorist thinks and acts with regard to targeting. As such, the presentation will illuminate how even this ruthless terrorist operated under a number of constraints, and illustrate how plans had to be changed several times due to different circumstances. Knowledge about the terrorist target selection process will be particularly valueable to anyone working on threat assessments and preventive security, i.e. object security. It will also be of interest for others with an interest for radicalisation, terrorism in a general perspective and solo terrorism specifically. For more information visit www. counterterrorexpo.com/conference CTX 2013 brings to the foreground the widest range of security and counter terrorist products aimed at reducing the personal threat to assets in vulnerable areas. Examples of safe rooms, panic rooms as well as live demonstrations of armoured vehicles vital for personal protection will be on display within the Armoured and Support Vehicle Zone. PRIVATE PROPERTY

– DO NOT ENTER What is t the It is easy to think that tha s i a business is not n i , a s t t r e s ce s a e a vulnerable area r u c se due to its lack of need to the brand and proximity to a high , r e a l e peop re always n threat area and a profits of the agenda that security is a secondary issue. the top overnments Unfortunately for g sinesses is rarely the case.that Often large sites and bu

are unaware of their attractiveness to criminals, whether it is because of the value of the nature of the goods store there or the potential disruption caused to supply chains by damage or threat. It is far too late to build good perimeter security when a group of protesters turn up and are incensed by your links to the pharmaceutical industry. Therefore E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

15


CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR EXPO 2013  CTX is pleased to bring together, in one forum, the latest perimeter security equipment and products. World renowned companies such as Frontier Pits and Cova Security Gates will showcase the very best in hostile mitigation. The favoured method of delivery a mass casualty attack is via vehicle bombs, barrier systems which greatly reduce this threat will also be on display from companies such as Avon Barriers and Safetyflex Barriers. It is clear that building and maintaining a defensible space requires a good perimeter. CTX 2013 will once again have the best perimeter security companies in the business on site to demonstrate their products. For example, Betafence and Barkers Engineering as well as many other high quality companies, many of whom have tried and tested products that are already operating in highly sensitive and demanding places. SURVIELLANCE A key part of maintaining this security is CCTV, Covert Surveillance Equipment, Access Control, locks and Intrusion Detection methods. CTX brings together the leading members of the security industry, all of who unanimously placed these aspects of security measures at the forefront of their year’s agenda. Responding to this growing need to monitor and control criminal activity, CTX 2013 exhibitors include Assa Abloy, the world’s largest lock maker, Axis Communications, prominent experts in network video and Kaba Ltd the leading global player for integrated security systems. SECURITY FOR A MODERN WORLD All businesses have a responsibility to understand the threats they faces, whether they be from terrorists or criminals. The threat of property theft today is evolving; it is undoubtedly not as simple to limit security measures to only those addressing the physical site. Rather, a holistic approach to the insider threat will ensure both physical and intellectual property is secure. CTX 2013 is responding to this evolution across the entire expo and conference. The 2013 event offers a Cyber Security Conference & Solutions Zone countering cyber espionage and malware attacks, a Maritime Security / Maritime Counter Terrorism (Anti Piracy) Zone providing solutions for the protection of shipping routes, ports and harbours and once again the highly successfully Critical National Infrastructure Conference. In order for the counter terrorism and security industry to effectively combat the evolving security threat, it is essential to continuously apply lessons learned from past experiences in order to prevent errors or future attacks from taking place especially in light of the increasingly sophisticated attempts by potential terrorists. Counter Terror Expo’s workshop programme will feature 30+ case studies as part of its established Access Control, CCTV &

16

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

It is easy to think that a business is not a vulnerable area due to its lack of proximity to a high threat area and that security is a secondary issue. Unfortunately that is rarely the case

Surveillance, Perimeter Protection and Detection, Building and Facilities Protection, and Screening and Scanning streams. NEW WORKSHOPS In addition, CTX 13 is launching its brand new Maritime & Security, Oil & Gas On/Offshore security and Integrated Security workshops to provide a platform for the industry to respond to the growing need for information sharing within those fields. Visitors can find more information ON THESE by logging onto www.counterterrorexpo.com/workshop Lessons will of course be learned from the London 2012 Olympics throughout the sessions as one of the key events from last year. As part of this, Zaun Ltd, Hardstaff Barriers and Highway Ease will host an exclusive panel session discussion on the planning, collaboration, product research and innovation applied in the lead up to the games from a perimeter protection standpoint. Other case studies include “In the midst of a catastrophic event, how resilient are your communications?” by Emerald Technologies, emphasising the important of unified communications in the event of an emergency, “Advances in Mask Integrity Testing” by Air Techniques International discussing the traditional approaches to mask integrity testing and their effectiveness during operations and “Civil Unrest in Uncertain times” by Streit Group as part of CTX’s brand new Armoured Support Vehicle workshop sponsored by Streit Group to name a few.

PHYSICAL SECURITY Abloy UK will be sharing their insight and expertise in an exclusive case study “Door magnets vs Electric Locks” providing a comprehensive overview of EN179 standards compliance and an analysis of how both methods can heighten security to current and future projects. Leading companies including Cova Security Gates, ATG Access, Kaba Ltd, Trakka and AB Precision will discuss how their technological solutions have been designed to meet client requirements in a cost effective manner, identify the versatility and benefit of surface mounted product installation, detect all significant explosives, extend the use of traditional access control and withstand the harshest conditions and heavy traffic loads. Axis Communications will provide visitors with an insight into how to select the right surveillance solution for the right scenario, taking into account lighting and how to maximise intelligence gathered from the operation. ANALYSING RISK Risk analysis is a key element of planning for counter terrorism operations and experts need the best possible tools. QinetiQ will be on hand to explain the use of risk analysis software in planning mitigation measures and how the output enables risk mitigation. L FURTHER INFORMATION www.counterterrorexpo.com




COUNTER TERROR EXPO 2013

INNOVATIONS ON SHOW

A look at some of the latest counter terror technology to be seen at Olympia A new Unmanned Aerial Vehicle (UAV) created by a British Company that fits in the palm of a hand and can be operated remotely by troops sitting in a control room thousands of miles away is set to be a hit at this year’s Counter Terror Expo. BCB International Ltd, the UK based manufacturers of military survival and protective equipment, have developed the SQ-4 Recon, which is capable of performing a wide range of tasks ideal for military and security teams. BCB International’s Robotics Projects Manager, Barry Davies, said: “The SQ-4 takes surveillance to new heights. Its small size and light weight (290 grams) means that it can be carried and deployed with little additional strain. “The drone can be flown remotely using a tablet, which also displays the video and stills transmitted by its high-resolution camera. Its small size coupled with its 10 ultrasonic sensors make it ideal for penetrating and

searching buildings and narrow spaces. It can hover discreetly over a targeted area or ‘perch and stare’ using day or night vision. “The SQ-4 provides soldiers with instant information about the enemy’s movements, capabilities and any hidden dangers” INNOVATIVE PHYSICS Innovative Physics, a Shanklin based engineering firm, has secured a contract with one of Japan’s largest companies involved in the clean-up of the Fukushima Prefecture, following the devastating explosion at the Daiichi nuclear power plant in March 2011. The initial contract, worth over £100,000, is to provide Hot Spot Locators to key players working on the decontamination of land, forests, and homes around the nuclear power site. The first order of a multi-stage process has been placed, and there is potential of future orders reaching a total of £1million. Innovative Physics has been supplying the

Japanese nuclear industry with handheld radiation detection devices for a number of years. The Hot Spot Locator is specifically designed to be portable, reliable and easy to use in tough conditions. Dr David Prendergast, Innovative Physics’ chief technical officer explained: “The Hot Spot Locator is the next-generation detection device to help emergency response teams react quickly to nuclear accidents. It deploys unique imaging and detector technologies to capture images of radioactivity. Through use of our Hot Spot Locator, our customers will be able to detect and identify the concentrations and type of radiation present accurately and efficiently. This will play an enormous role in helping to speed up the decontamination programme in Fukushima, a project which could otherwise take more than 30 years to complete.” In addition to nuclear power, Innovative Physics’ products are applicable to the homeland security and defence markets. The Hot Spot Locator, as well as other products, will be demonstrated. TOWNSCAPE PRODUCTS Perimeter security specialist Townscape Products has extended its range of hostile vehicle mitigation (HVM) products with the launch of the PerformaCast PAS 68 bollard sleeve. The sleeve is designed to fit over existing or new PAS 68 bollards and is manufactured in Performa-CasT, an engineering grade polyurethane cast. It offers all the aesthetic benefits of cast iron combined with the enhanced performance of steel but with greatly superior durability. Jonathan Goss, managing director, said: “This new product has been created after listening carefully to our customers’ requirements. Many locations and projects have existing bollards which tie into a specific landscape design. We have been asked repeatedly if these designs could be retained but with added security – and that’s where the idea for the PerformaCast PAS 68 bollard sleeve originated. Waterfront retail and leisure destination, Gunwharf Quays in Portsmouth, has already installed 35 Performa-Cast bollard sleeves along its quayside. These were developed in two designs, the Gunwharf Heritage and the sleek Senator, to complement the existing coastal heritage street furniture theme. Townscape will be officially launching the Performa-Cast PAS 68 bollard sleeve.

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RECONROBOTICS ReconRobotics, Inc. has announced that the company will introduce two new robots at the event. The Recon Scout Throwbot LE is the world’s most affordable police robot. Easy to deploy and maneuver, the Throwbot LE protects patrol officers by alerting them to the hidden threats that can change a routine call – an interrupted robbery, a domestic disturbance, a welfare check or a confined space search – into a life-threatening situation. The 490g Throwbot LE helps patrol officers mitigate the risk of such calls by quietly moving through a structure and transmitting the real-time video to a small handheld Operator Control Unit II (OCU II). The Throwbot LE delivers situational awareness by revealing what lies behind a door, down a hallway, or over a wall before they enter a location. The Throwbot LE works flawlessly with all Recon Scout accessories, including the SearchStick pole, a device that converts the Throwbot LE into a pole camera that can be used to see over walls, through windows, and into other confined spaces. The Recon Scout XL is a larger robot platform that is ideally suited to use in cluttered indoor environments or outdoor terrain. With 14cm diameter wheels, the XL is capable of climbing over obstacles up to 10 cm tall. Worldwide, more than 4,000 of the company’s micro-robot systems have been deployed by the US military and international friendly forces, and by more than 650 law enforcement agencies, including several police forces in the UK. Warfighters use the ReconRobotics systems to determine the layout of the enclosed spaces, identify potential IEDs and the fix the location of friendly, indigenous or enemy personnel. Furthermore, the 540g water resistant Throwbot XT provides video and audio reconnaissance and can be thrown up to 36m. ReconRobotics ceo Alan Bignall, will be on hand to answer questions on stand F65. E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

19


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Rescue equipment rescue@holmatro.com | http://tactical.holmatro.com


COUNTER TERROR EXPO 2013  TERROGENCE Terrogence, an open source web intelligence company dedicated to exposing terrorist capabilities and intent, will be exhibiting for the first time in the new dedicated Cyber Security and Electronic Terrorism Zone at the Counter Terror Expo. Cyber security is an area of high interest amongst security professionals, yet one that until recently has not been sufficiently emphasized by governmental organizations and private companies alike. Terrogence closely monitors and produces exclusive alerts regarding massive cyber-attacks against such organisations as financial institutions, corporates, and governments. The Terrogence Cyber Intelligence service goes beyond IT firewalls and anti-virus protection with intelligence-driven cyber threat prevention and containment solutions. According to Mr. Gilad Zahavi, Terrogence Cyber-Intelligence Team Leader “by infiltrating the online cyber networks, where hackers motivate, plan and carry out attacks, and by becoming part of it, we provide unique insight into the activities and capabilities of hackers around the world”. Terrogence will also be holding a workshop called How web intelligence yields a more complete and dynamic defence in Workshop Theatre 1, on Thursday April 25th from 11:30-12:00. Led by sales manager Yotam Gutman, the presentation will address the ‘Virtual HUMINT’ methodology of producing highly actionable intelligence from deepweb sources, its manifestation for cyber intelligence and preemptive alerts during a real cyber-attack event, and the intelligence derivatives of our activities, mainly the identification of Terrorists TTP (XX, techniques and procedures and Facial recognition Database (FaceInt). Register for this workshop online at tinyurl.com/c2ap7ym ZAUN’S AWARD WINNING FENCING An award-winning temporary fencing solution that could save up to 90 per cent of police time in securing major events gets a public airing on stand J50 at Counter Terror Expo. Zaun and Highway Care Security Solutions developed a Rapid Deployable System (RDS) temporary high-security Hostile Vehicle Mitigation (HVM) fence in a unique collaboration especially for the Committee of Ministers of the Council of Europe meeting in Brighton last April. The Home Office was so impressed it added 5.5km of RDS PAS68 fencing to the National Barrier Asset, including vehicular and pedestrian access portals, turnstiles and gates, initially for use at the 2012 autumn conference season for the main political parties in conjunction with the three constabularies of Sussex, Greater Manchester and West Midlands. Its success was confirmed during that whistle-stop tour from Brighton to Birmingham via Manchester, with Sussex Police declaring it saved them up to 90 per cent of police time at the Liberal Democrat Party Annual Conference 2012. Inspector Steve Worth, Specialist Operations Branch, Conference Planning Unit, Greater Manchester Police, said: “The product has numerous advantages over other products deployed previously: its speed of deployment, flexibility of use in differing street scenes and terrains and the ability to fully integrate gates and turnstile options are worthy of note. “Significantly though, the reduction in the numbers of guard force required and potential for enhancements using technical solutions make RDS an attractive proposition when delivering secure events to ever decreasing funding streams. “The RDS is now firmly the preferred product in relation to the delivery of Security Operations for Party Political Party Conferences

delivered by Greater Manchester Police, fully supported by The Home Office.” RDS has been widely praised for offering a fast, effective and adaptable solution for areas which need temporary high security fencing and last month (March) won the Security Innovation Awards 2013. RDS can be supplied with a PAS68 hostile vehicle mitigation (HVM) enhancement which protects against 2.5 and 7.5 tonne vehicles to PAS68 standards. The system has also recently been tested against crowd/mob attack in what is seen to be the first such trials conducted. RDS Fence goes to heights of up to 3m.The innovative configuration of Highway Care’s galvanised steel SecureGuard blocks combined with Zaun’s fence and post systems allows installers to erect and remove the fence panels in a matter of minutes. Flexible added features enable specifiers to incorporate CCTV, PIDS, vehicle gates and pedestrian portals. Even vehicle and pedestrian access points use innovative foundation blocks to negate the need for any below ground foundations. It suits sites with moderate undulations in ground levels and differing standards of ground standings. RDS comes with a 12-year guarantee and carries the Secured by Design accreditation mark, along with being tested to leading industry and government standards. Following feedback from police and other users, the fencing has been designed to prevent protesters chaining themselves to the panels.

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Peli 1780 case

PELI PROTECTION Peli Protector Cases offer watertight, crushproof, dustproof protection for all types of sensitive equipment including weapons and scopes. Their rugged dependability makes them ideal for the most challenging and hostile conditions throughout the world - They have Nato stock numbers and many models are Defstan 81-41 certified. Available with engineered foam solutions for all types of equipment, Peli cases are available in over 60 sizes. The inserts can be configured specifically for any weapons and additional peripheral items. Cases are sealed (to IP67) against moisture ingress reducing the chance of rust and corrosion. The Peli 1780 case is an ideal weapons storage vault. As well as being watertight and dustproof this model has a split 50/50 lid and base design enabling up to eight SA80 rifles to be secured in both sections. The 1780 will hold all three SA80 variants – standard, carbine and LSW. OD Green and Desert Tan colour options are offered for many models along with the standard Black and all these Peli cases are covered by the legendary “You break it we replace it” guarantee.

Counter ys Terror Expo pla0 of host to over 40ding the world’s lea and counter terror ons defence soluti providers annually

ATTACK RESISTANT GLASS German specialty glass manufacturer Schott will be showcasing its wide range of attack resistant glass types on stand M30). A number of multifunctional glass types that meet the highest safety standards will be on display. The highly sophisticated product portfolio ranges from curved Resistan glass laminates serving the civilian market in the area of transparent ballistic vehicle protection to the multi-performance glass, Pyranova Secure, which combines protection against burglary attack, bullet penetration and fire resistance. Due to its high performance properties, Schott’s range of attack resistant glass can be used in public and commercial areasand is ideal for vehicles or buildings such as prisons, embassies, military facilities and E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

21


Rapid deployment for a rapid response.

Counter Terror Expo 2013 Visit us on stand D32

Some decisions need to be made instantly. Information retrieved and actions carried out at the highest speed. Accuracy and the right equipment... prevents and protects.

DS100

SEARCH CAMERA

TELESCOPIC POLE CAMERA SYSTEM

search • evaluate • capture • act The SECA DS100 Telescopic Search Camera is a complete system that provides a quick, secure way to perform inspections and surveys at height and difficult to reach places. Colour images can be viewed in daylight, and in darkness the system switches automatically to infrared. The screen console easily attaches to the telescopic pole enabling excellent mobility and rapid deployment (under 2 minutes). No uneccessary wires or battery pack to carry. The DS100 offers reliability, high quality video and image capture and is robust enough to endure front-line military use.

• • • • •

• • • • •

High Spec – day & night Fast deployment 1.2m-4m telescopic reach Single user, hand held Viewing distance from 10cm-50m daylight, 20m complete darkness 12 hrs video record time Up to 7 hrs continuous use Low discharge battery Robust & Lightweight Waterproof

Call +44 (0) 1761 432 041 for a no obligation demonstration enquiries@dartsystems.co.uk www.dartsystems.co.uk

Dart Systems Ltd, Unit 16/17 Mill Road, Mill Road Industrial Estate, Radstock Nr Bath, BA3 5TX United Kingdom.


COUNTER TERROR EXPO 2013  ministries where protection is at its utmost. Pyranova Secure is a compact multi-pane composite glass that provides effective protection against the highest levels of manual or ballistic attack plus fire, hot gasses and smoke in architectural applications. Novolay Secure is another multi-laminated composite, displaying impressive optical quality while remaining low in specific weight. Both products have been successfully tested in accordance with EN 356 for attack resistance and EN 1063 for bullet resistance achieving up to P8B and BR7 classifications respectively. Additionally, Pyran S is the only borosilicate glass made by the float glass process and combines exceptional resistance to heat and thermal shock along with excellent optical quality. Pyranova is a fire resistant glass that prevents the passage of fire, smoke and heat radiation meeting the EI (integrity & insulation) fire safety requirement for up to 120 minutes. At Counter Terror Expo, Martin Brown, UK sales manager for technical glass solutions at Schott, will be taking part in the workshop Building & Facilities Protection on Thursday 25th April at 15:30. He will be presenting a talk Multiple Risks – One Safe Solution that will enable the visitor to understand the functionality of each product and describe how multi-functional glass constructions can safeguard people & property whilst resisting multiple forms of attack. CONTROL IN THE DARK Thermoteknix launch its Virtual TiCAM software at Counter Terror Expo. The new accessory enables full remote control of the TiCAM 750 Thermal Imaging Binoculars, Military Specification handheld device for counter terror/drug operations, border security, and police surveillance detecting a man at over 2 kilometres. With Virtual TiCAM, users can view a live video stream from the camera and capture single snapshots via USB. The file sync option allows to copy recorded movies and images from the TiCAM camera to the PC. The memory card status automatically shows how much space is used and available on the camera, as well as the total number of captured movies and images. The quality of the Live Stream and captured videos can also be changed. Thermoteknix MIRICLE & MicroCAM based products are not subject to US ITAR control. However they may require UK export licence as provided by BIS regulations depending on the end-user country and specification. TORCH CAMERA NOW SUPPORTS 4G SeSys’s Torch Camera is an IP based camera solution that uses mobile network connectivity to deliver video images to users via an ARC (Alarm Receiving Centre), control room or web browser. With integrated high resolution camera, storage, battery and router the Torch

MKU has recently supplied these kits to coast guards for fast interceptor boats and patrol vessels including frigates and other similar types of vessels.

SeSys’s Torch Camera

Camera is a self-contained camera system. With ten hours autonomy the Torch Camera can be deployed in minutes and uses mobile networks for remote access to live and recorded video. Not only will users be able to download recorded video faster, they will also experience improved frame rates at all image resolutions. 4G is the next generation standard for mobile communica-tions. Improving on existing 3G services, 4G will offer greater data rates. Therefore, the ability to connect via 4G will provide improved connectivity for the Torch Camera. Most notably improvements to frame rate and resolution will be achieved as well as reducing time to download an important video sequence. This will make the Torch Camera more agile to use remotely and improve the experience of the user. 4G networks are already established in the USA and mainland Europe, 4G services are set to be launched in the UK later in the year. Technical director for SeSys, Dan Eames, said: “At SeSys we are committed to delivering the highest quality solutions to our customers and as such we are always developing our products to feature the latest technology. Introducing 4G capability is part of our program to continually develop SeSys’s products” MKU’S LIGHTWEIGHT ARMOUR In its bid to provide protection against sea piracy, MKU has developed Light Weight Armour Solutions for naval vessels in the form of retrofit modular kits. These kits provide protection against small fires and fragments and are extremely easy to install and remove depending on the sailing conditions of the high seas. The modular kits require little or no maintenance, and don’t put heavy demand on engines and payloads for small naval vessels.

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FIRST TIME FOR ELECTROSONIC Electrosonic’s Control Room and Service and Maintenance teams will be exhibiting together for the first time at the Counter Terror Expo in London on 24-25 April, at stand G70. Electrosonic’s control room business provides a complete set of audio-visual services for secure and mission critical environments. Their security cleared teams can provide a range of services including technical design, systems integration and 24x7x365 service and maintenance. During the expo, Electrosonic will be offering visitors the opportunity to book either a free two hour ‘Audio-Visual Service Health Check’ or an ‘Emergency Response Call Out’ for their UK control room. The free ‘Service Health Check’ will provide an assessment of an audio-visual system’s performance. Checks include a functionality check, filter clean, cabling, electrical safety, colour balance and collection of lamp hour usage. If visitors choose the free ‘Emergency Response Call Out,’ one of Electrosonic’s highly experienced, security cleared service E

Electrosonic

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

23


World-class NLJD systems for detection of RCIED’s & concealed electronic devices HAWK XTS-900  IED search (detection of improvised explosive devices)  Defensive building search (venues)

HAWK XTS-2500  Technical Surveillance Countermeasures (TSCM)  Detection of mobile phones and similar devices in prisons

SEARCHER-2500  Mail screening for concealed electronic devices (suspect packages)  Unobtrusive body-search for concealed devices or high value items

To learn more, visit www.winkelmann.co.uk A

M A T T E R

O F

N A T I O N A L

Join us at Counter Terror Expo 24 - 25 April 2013 Olympia, London Stand E36 www.counterterrorexpo.com

S E C U R I T Y


CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER TERROR EXPO 2013

INCIDENT CONTROL VEHICLES At this years Conter Terro Expo, MacNeillie will be dispaying one of the many ICVs manufactured within its Walsall facility. When confronted with loss of power, lighting, communications systems, MacNeillie’s ICVs offer the ability to take control of major incidents, providing provide a control hub for coordination of emergency response and assist in managing the incident. Delivering situational awareness

options through CCTV, maintaining communications with incident personnel & HQ, offering power and lighting solutions. Incident Command and Control vehicle conversions can be configured to meet very exacting requirements. See MacNeillie on Stand R65. VEHICLE ARMOURING Streit Group currently has a range of APCs and LAVs in stock and ready for immediate deployment by governments looking for additional assets in their fight against terrorism and insurgency. Using the latest technology to provide maximum protection against blast and ballistic attack, the vehicles that are currently available include: Typhoon – a multi-purpose mine resistant ambush vehicle which,

with its advanced design combined with simple mechanics, is adaptable to a variety of roles and missions. Spartan – a multifunctional and adaptable LAV with the speed and manoeuvrability to perform a range of functions in both urban and rough terrain environments. Cougar – capable of operating beyond the capabilities of most tactical wheeled vehicles, this all-terrain APC has turret and other weapon station options. L Streit Group Spartan

 engineers will be scheduled to attend the site to look at any faulty room or audio-visual system, and if possible, rectify it within the given time frame. Following each assessment, the client will receive a full report and recommendations for further action if necessary. Anyone who takes up this offer will automatically be entered into a competition to win a new Apple iPad mini. Full details about this offer will be provided at the Electrosonic booth. “We are very excited about attending the Counter Terror Expo and demonstrating our range of mission critical technology solutions,” commented Paul Brooks, Sales Manager of the Control Rooms business for EMEA. “Whether you are looking to install a new control room or are looking for technology to help future proof your existing facility, our security cleared team will be on hand to offer expert advice.”

Fight cyber attacks with Frontier Pitts controls systems Frontier Pitts prides itself on being one of the largest and most dynamic British Manufacturer of PAS 68 Hostile Vehicle Mitigation and perimeter security integrated turnkey solutions. Its large product portfolio includes automatic rising arm barriers, sliding security gates, hinged gates, bi-folding speed gates, road blockers, rising kerbs, hydraulic rising bollards, pedestrian gates and turnstiles, and manual equipment. Currently, the UK is facing an ongoing, persistent threat from other states, terrorists and criminals operating in cyberspace. Frontier Pitts will be introducing an antitamper digital key into its Electronic Control Cabinets for gates, roadblockers and bollards to stop unauthorised bridging of circuits in an attempt to force entry or activate the security products. The device, known simply as KP1, will stop unauthorised attempts to override Frontier Pitts electronic PLCs should access be gained into the security control cabinets. It will stop attempts to gain access to a site by electronic override using a laptop or manually overriding open or close circuits on its PAS 68 impact tested Anti Terra range of products, via the control cabinet. By employing the KP1, Frontier Pitts has ushered in a new era in perimeter security products utilising an in depth approach

adding additional layers of security to your site. The KP1 uses a 256bit encrypted link that switches off all circuits should any attempt to override electronic circuits be detected. The KP1 alongside the company’s enhanced PLCs improves the Terra range’s tamper resilience ensuring the integrity of your mission critical infrastructure is safe from malicious intent by locking out un-authorised or intrusive access. The unit has been tested on the PAS 68 Terra Range, and will be supplied as standard on all Terra equipment from early 2013. Frontier Pitts will be exhibiting at this year’s Counter Terror Expo at Olympia, London on the 24-25 of April. Come and visit the company’s technical advisors on stand number D65, near the main entrance. It will be showcasing its PAS 68 Compact Terra Barrier which joins its portfolio of hostile vehicle mitigation drop arm barriers

after successfully stopping a 3500kg vehicle travelling at 30mph within the barrier aperture. The Compact Terra Barrier is the ideal solution for sites looking for a subtle and aesthetically pleasing HVM defense as the drop arm barrier looks like a standard car park barrier, hydraulically powered for reliability and strength. FURTHER INFORMATION www.frontierpitts.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

25


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Specifications COFDM Receivers

Monitor

Antenna Connection

Screen size

17”

Contrast ratio

1000:1

Power consumption

34.5 W

COFDM Receivers

2 MHz 4x Narrow-band

Temparature range

0 - 50°C

Compression

H264

Brightness

450 MCD

Modulation Type

QPSK, 16 QAM

Sensitivity

-105 dB

Decoding

H264 Low Delay

Frequencies

L Band 1.1 – 1.8 GHz S Band 2.2 – 2.6 GHz C Band 4.9 – 6.0 GHz

PC Processor

Intel Atom 230

Memory

Up to 2 GB RAM

Operating System

Windows XP

Peripheral Interfaces

x6 USB 2.0 ports, x2 Serial ATA x1 IDE, x1 VGA

Operating System

Windows XP

Data Storage

On-board 2 TB hard disk

Video Capture

4 Channel 1.3 Megapixel Standard definition

2x RF Dual Diversity MRC RF ‘N’-Type

Custom bands available upon request

Telemetry Transmitter Frequency

433/458/868 MHz

Bandwidth

25 KHz Digital Modulation

RF Output power

Up to 500 mW

Antenna Connection

BNC

Case Dimensions

1011 mm x 419 mm x 169 mm

Weight

30 kg

The Falcon control case can now deliver 4 channel and 8 channel receivers using our latest digital COFDM transmission it also has the ability to deliver full PTZ control of cameras. With 2, split screens with 4 images in each plus the ability to accept audio. With a large internal hard drive the Falcon case is the complete mobile control centre for military and Police use.

Related Products Domehawk

Periscope Zoom camera

Broadcast-quality camera

High Definition + Thermal Imaging cameras

Cylinder Camera + COFDM Transmitter

Body-worn camera + Transmitter

Middlemarch Business Park, Siskin Drive, Coventry CV3 4FJ Tel 024 763 06606 Fax 024 763 06100 Email sales@melsecuresystems.com Copyright 2009 MEL Secure Systems Ltd

26

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Falcon Control Centre


COUNTER TERROR EXPO 2013 Global Counter Terrorism conference programme DAY ONE - 24th April

DAY TWO - 25th April

0800

Coffee and Registration

0800

Coffee and Registration

0845

Chairman’s Welcome and Opening Remarks Dr Dave Sloggett, Author and Independent Academic

0845

Chairman’s Welcome and Opening Remarks Andrew Erving, Former Head of Counter-Terrorism Intelligence, GCHQ

Countering Terrorism Nationally and Globally

Global Counter Terrorism

0900

Securing the State - National Security for a Modern World Professor Sir David Omand GCB, visiting professor, Department of War Studies, King’s College, London

0900

Syria - the Revolution that Shook the Region Hugh McLeod, COO, Stirling Assynt

0925

The Role of Deterrence in Challenging Terrorism and Asymmetric Threats - Professor John Gearson, professor of National Security Studies and director of the Centre for Defence Studies, Department of War Studies, King’s College London

0925

Counter Terrorism Strategy in the Russian Federation Bruce Cotton, Lecturer, GUtech, OMAN

0950

CONTEST - the UK’s Counter-terrorism Strategy Charles Farr, director general, Office for Security and Counter Terrorism, Home Office

0950

Turkish Perspectives in Countering Terrorism Omer Atabey, Prosecutor & Expert in Foreign Affairs, Undersecretariat of Public Order and Security, Turkey

1015

The Middle East and North Africa: Prospects for Terrorism Dr. Michael Rubin, The American Enterprise Institute

1015

The UK’s Counter Terrorism Laws - a Review David Anderson QC, Independent Reviewer of Terrorism

1040

Coffee, Tea, Networking and Exhibition Visit

1040

Coffee, Tea, Networking and Exhibition Visit

1100

Global Counter Terrorism Zeeshan Amin, Political Affairs Officer, Counter-Terrorism Implementation Task Force Office, United Nations

1100

1125

European Counter Terrorism Cooperation Olivier Luyckx, Head of Unit - Crisis Management and Fight against Terrorism, European Commission

1150

The Impact of Emerging Security Challenges on the Fight Against Terrorism Jamie Shea, Deputy ASG, Emerging Security Challenges Division, NATO

1215

Counter-Proliferation and Export Enforcement: US Strategies Craig C. Healy, director, Export Enforcement Coordination Center (E2C2), Homeland Security Investigations (HSI), Immigration and Customs Enforcement, Department of Homeland Security

1240

Lunch, Networking and Exhibition Visit

Countering the Cyber Threat 1400

Tackling Cyber Threats -the European Cybercrime Centre (EC3 Troels Oerting, Assistant Director and Head of European Cybercrime Centre (EC3), Europol

1425

Cyber Terrorism – Fact or Fiction Neil Fisher, Vice President Global Security Solutions, Unisys and Vice Chair, Information Assurance Advisory Council (IAAC)

1450

Cyber-Warfare on the Rise Eugene Kaspersky, CEO, Kaspersky Lab

1515 Cyber Resilience John Lyons, Chief Executive, International Cyber Security Protection Alliance 1540

Coffee, Tea, Networking and Exhibition Visit

Radicalism and Violent Extremism 1600

The Arab Spring and the Relevance of Al Qa’ida Dr. Peter Neumann, Professor of Security Studies at the Department of War Studies, King’s College London

1625

Best Practice in Disengagement from Al Qa’ida Inspired Terrorism Anaïs Reding, Analyst, RAND Europe

1650

Providing Ways Out of Extremism: Deradicalisation and Disengagement in Practice Daniel Köhler, M.A, M.P.S., Analyst & Research Consultant, EXITGermany

1710

A Case Study - the National Socialist Underground (NSU) Terror Network in Germany Daniel Köhler, M.A, M.P.S., Analyst & Research Consultant, EXIT-Germany

1730

Panel Discussion: Radicalism and Violent Extremism

1745

Chairman’s closing remarks & Close of Day One

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Olympic Review Delivering a Safe and Secure Games Andrew Amery, Head of Security Coordination - London 2012, LOCOG

1125 Policing the Olympics Chris Allison MBE, Assistant Commissioner, Metropolitan Police Service and National Olympic Security Co-ordinator, 2012 Olympic and Paralympic Games 1150

A Review of Security and Facilitation Tony Smith, Interim Director General of Border Force, Home Office and former Senior Director, London 2012 Olympic Programme

1215

The Security Legacy from the Olympics AVM (Ret) Clive Bairsto, former Director Integration and Readiness, Government Olympic Executive

1240

Lunch, Networking and Exhibition Visit

Evolving and Emerging Threats 1400

Measuring the Effectiveness of UK Counter-terrorism Policies Benoît Gomis, Research Analyst, International Security Research Department, Chatham House

1425

Terrorist Target Selection: the Case of Anders Behring Breivik Cato Hemmingby, Research fellow, Norwegian Police University College

1450

NATO’s Role in Countering CBRN Terrorism Lieutenant Colonel Bernd Allert, CBRN Expert, NATO HQ - ISESC(WMDC)

1515

Darwinian Terrorism Dr Dave Sloggett, Author and Independent Academic

1540

Perceived Effects of Media Coverage of Terrorism Dr Khalid Sultan, Assistant Professor in Communication Studies, Ministry of Higher Education, Oman

1605

Panel Discussion: Evolving and Emerging Threats

1630

Chairman’s Closing Remarks & Close of Global Counter Terrorism Conference

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

27



COUNTER TERROR EXPO 2013 Critical National Infrastructure - Protection, Security & Resilience DAY ONE - 24th April

DAY TWO - 25th April

0800

Coffee and Registration

0800

Coffee and Registration

0845

Chairman’s Welcome and Opening Remarks Chris Northy-Baker, Head of Security, The London Clinic

0845

Chairman’s Welcome and Opening Remarks David Rubens MSc FSyI, Managing Director, David Rubens Associates and Visiting Lecturer - Global Security and Policing MSc Programme, Leicester University

Protection and Security for Critical Infrastructure 0900

Critical National Infrastructure Threat and Risk Assessment James Stuart, Managing Director, Alt3

Protecting Critical Networks

0920

Protecting Critical Communications Networks David Lacey, Strategic Adviser, IOActive, Visiting Senior Research Fellow, University of Portsmouth and Honorary Fellow, Jericho Forum

0900

Securing the Energy Supply Infrastructure Barrie Millett, Head of Business Resilience, E.ON

0940

Countering Threats in Aviation Transport Networks Dvir Rubinshtein, Aviation Security Operation Center Manager - Security Department, State of Israel

Ensuring National Infrastructure Resilience

1000

Round Table - All speakers Anna Averkiou, International Media & Communications Consultant, Trainer & Journalist

1100

Human Factors in Critical National Infrastructure Resilience Dr Julia Pearce, Research Associate, Department of War Studies, King’s College London

1030

Coffee, Tea, Networking and Exhibition Visit

1120

Consequence and Probability in the Assessment of National Assets Håvard Walla, Senior Adviser - Departement for Security Assessment, Norwegian National Security Authority (NSM)

1400

NATO’s Role in Countering CBRN Terrorism Lieutenant Colonel Bernd Allert, CBRN Expert, NATO HQ - IS/ESC(WMDC)

1200

Round Table - All speakers

1230

Lunch, Networking and Exhibition Visit

0920 An Integrated Approach to Policing the Protection of National Infrastructure Chief Inspector Colin Walker, Operational Planning Department, Grampian Police 0940

Critical Infrastructure Protection – Securing Transport Networks Centre for the Protection of National Infrastructure (CPNI)

1000

Round Table - All speakers

1030

Coffee, Tea, Networking and Exhibition Visit

Regulating Resilience to Chemical, Biological, Radiological and Explosive Threats 1400

Ensuring Resilience of Building Infrastructures for CBRE incidents - the SPIRIT project Ans van Doormaal, SPIRIT Project Co-ordinator, Netherlands Organisation for Applied Scientific Research (TNO)

1405

The SPIRIT Guidance Tool Jaap Weerheijm, Netherlands Organisation for Applied Scientific Research (TNO)

1415

Guidance Tool Application and Guidelines: CBRE threat categories considered Andreas Bach, Advanced Structural Design, Schußler Plan Consultants

1430

Background & Knowledge Base of the Guidance Tool Alain Rouquand, CEA

1445

Protection Portfolio Christoph Roller, Fraunhofer EMI

1500

Round Table - All speakers

1530

Coffee, Tea, Networking and Exhibition Visit

Emerging Threats 1600

Life – not Death in a Drop of Water David M Love BVMS MRCVS DVA, Veterinary & Public Health Consultant

1520

Interpreting the Signs of an Intentional Hazard for Emergency Personnel David Bailey BVSc., MSc MRCVS, Staffordshire University

1640 1700

Advances in Bio-weapons and Implications for National Security Dr Jill Bellamy van Aalst, Director - Public Health Preparedness Program, European Homeland Security Association Round Table - All speakers

1730

Chairman’s Closing Remarks and Close of Day One

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Role of Resilience 1100

Improving Preparedness for Crisis & Security Incidents Bharat Thakrar, Head of Resilience Services, Security Practice, BT Global Services

1120

Modern Crises Demand a New Approach to CT Crisis Management Training and Exercising Peter Clarke CVO OBE QPM, Partner, Peter Clarke Associates and Former Head of the Counter Terrorism Command, New Scotland Yard, Malcolm Baker, Managing Director, Resilience, Philip Hannah, Director, SevenQuestions

1200

Round Table - All speakers

1230

Lunch, Networking and Exhibition Visit

Exploiting Technology for National Infrastructure and Organisational Protection 1400

Radiation Screening at the London 2012 Olympics Chris Ryden, Physicist, National Nuclear Security, AWE

1420

Maximising the Value of Data & Information in National Infrastructure Protection Professor Adam Ogilvie-Smith, Senior Manager Business Consulting, CGI

1440

The Role of Information Exchange in Counter-terror Command, Control and Communication Michael Fuller MBE MBA MA, Director, SCC Global Ltd

1500

High Fidelity Simulation Exercises: Honing Preparedness for High-risk Terror Attacks Dr Claudia van den Heuvel, Senior Consultant, Steelhenge Consulting

1520

Inside-Out Security: A Human Factors Approach to Understanding External & Internal Security Threats Sally Turner MSc/Julie Wylde MSc, Senior Consultants, User Perspective

1540

Round Table - All speakers

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

29


Protect Stock, Assets and Cash from theft and robbery*

SelectaDNA gives you day and night time protection against robberies, break-ins and theft. Activated by money clips, panic alarms, pressure pads and a variety of other devices the SelectaDNA Spray can be integrated into your existing security system or installed as a standalone system. DNA identification is feared by criminals worldwide as being identified by a unique SelectaDNA code irrefutably places a suspect at the crime scene. The SelectaDNA Spray can be used in conjunction with SelectaDNA Gels and marking compound to make the whole business a no go area for criminals. *In Police trials SelectaDNA has reduced theft and burglaries by up to 83%.

For more information visit

www.selectadna.co.uk SelectaDNA is a registered trademark of:

Selectamarkplc

Advanced Asset Protection * The SelectaDNA Property marking product is a Secured by Design approved product.

or contact

+44 (0)1689 860757 Selectamark Security Systems plc, 1 Locks Court, 429 Crofton Road, Locksbottom, Kent, BR6 8NL. UK. DA0122/1


COUNTER TERROR EXPO 2013 Protecting Crowded Places programme DAY ONE - 24th April

DAY TWO - 25th April

0800

Coffee and Registration

0800

Coffee and Registration

0840

Sponsors welcome

0845

Chairman’s Opening Remarks Professor Chris Kemp, Pro Vice Chancellor & Executive Dean, Bucks New University

0845

Chairman’s Opening Remarks Professor Chris Kemp, Pro Vice Chancellor & Executive Dean, Bucks New University

Protective Security for Crowded Places 0900

Enhancing Resilience in the Built Environment Dr Steven Harre-Young, Consultant and Researcher in Resilience, Security and Counter-Terrorism

0930

Securing Public Spaces and Crowded Places Darius Aibara, Director, Aibara Associates

1000

Buyer Beware - The Pitfalls of Procuring Counter Terrorism Services in Times of Uncertainity Chris Tomlinson, Senior Consultant - Resilience, Security & Risk, Arup

1030

Coffee/Tea/Exhibition Visit

1100

Reducing the Threats of a Terrorist Attack on the UK’s Crowded Places National Counter Terrorism Security Office (NaCTSO)

1130

Protective Security - the Role of the Police in Delivering Safe Events Jonathan Schulten, Chief Inspector, Counter Terrorism Security Co-ordinator, SO20 CT Protective Security Command, Metropolitan Police Service

1200

Panel Discussion: Protective Security for Crowded Places

1230

Lunch/Exhibition Visit

1400

Responding to Crowded Places Incidents Deputy Assistant Commissioner Tim Cutbill, Head of Special Operations Group, London Fire Brigade

1430

Responding to Emergencies and Terrorist Attacks Michael Nolan, Chief, Paramedic Service and Director, Emergency Services, County of Renfrew and President, Paramedic Chiefs of Canada

1500

Dymanics of Suicide Bombings in Crowded Places Group Captain (Rtd) Zulfiqar Ahmad, former Director of Security, Pakistan Air Force

1530

Coffee/Tea/Exhibition Visit

1600

Terrorist Target Selection: The Case of Anders Behring Breivik Cato Hemmingby, Research fellow, Norwegian Police University College

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Securing the London Olympics 0900

The Olympic Security Landscape Dr Dave Sloggett, Author and Independent Academic

0930 1030

Security Case Studies from Olympic Venues outside London Adrian Whiting, Acting Deputy Chief Constable, Dorset Police and John Campbell, joint Assistant Chief Constable for Operations for Thames Valley Police and Hampshire Constabulary

1100

Commonwealth Games Security Michael Kellet, Head of Resilience Division, Scottish Government

1130

Hostile Vehicle Mitigation at London 2012 – Lessons Learnt David Reynolds FRICS FCMI MAPM, Chartered Project Management & Quantity Surveyor

1200

Panel Discussion

Coffee/Tea/Exhibition Visit

1230 Lunch/Exhibition Visit Protecting Buildings and Infrastructure 1400

Protecting Buildings and Infrastructure from CBRE Threats Dr David Hadden, Arup Security Consulting

1430

Building Protection - Assessment and Mitigation of Major Hazard Events Patrick Mann, Director, Patrick Mann & Associates Ltd

1500

Hostile Vehicle Mitigation - Advice and Design Guidance Gary Heward, Director of Protective Design, MFD Interntional Ltd

1530

Safety and Security Glazing in Buildings Giles Willson, Director of Technical Affairs, Glass and Glazing Federation

1600

Panel Discussion

1630 Close

1515 Cyber Resilience John Lyons, Chief Executive, International Cyber Security Protection Alliance 1540

Coffee, Tea, Networking and Exhibition Visit lent Extremism

1600

The Arab Spring and the Relevance of Al Qa’ida Dr. Peter Neumann, Professor of Security Studies at the Department of War Studies, King’s College London

1625

Best Practice in Disengagement from Al Qa’ida Inspired Terrorism Anaïs Reding, Analyst, RAND Europe

1630

Counter Terrorism Security Measures – How to Show the Advantages and Benefits Chris Stevens, Technical Security Director, SIDOS UK

1700

Panel Discussion: Protective Security for Crowded Places

1730

Close of Conference Day One

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

31


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com ssaib ad 125 x 178_Layout 1 17/02/2012 15:20 Page 1

CERTIFYING

SECURITY

The leading certification body for Guarding Services. Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001 and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.

Telephone : 0191 296 3242

32

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

www.ssaib.org

SSAIB


COUNTER TERROR EXPO 2013 Cyber Security & Electronic Terrorism conference programme DAY ONE - 24th April

DAY TWO - 25th April

0800

Coffee and Registration

0800

Coffee and Registration

0845

Chairman’s Opening Remarks Azeem Aleem FSyI, Director, The Security Institute

0845

Chairman’s Opening Remarks Azeem Aleem FSyI, Director, The Security Institute

0900

Cyber Security and Electronic Terrorism into Context Dr Paul Cornish, Professor of Strategic Studies, Strategy and Security Institute, University of Exeter

0900

Mobile Devices - a Threat Vector to Organisational Security Nigel Stanley, Practice Leader - Security, Bloor Research

0930

Cyber Resilience John Lyons, Chief Executive, International Cyber Security Protection Alliance

0930

Cyber and Network Security - A Risky Business Ashley Jelleyman, FBCS CITP, M.Inst.ISP, Head of Information Assurance, BT Security

1000

The UK Cyber Security Strategy Neil Kenward, Deputy Director, Cyber Programme & Intelligence Finance & Capabilities, Office of Cyber Security and Information Assurance (OCSIA), Cabinet Office

1000

Security Implications of Hactivism and Social Media Stephen Bonner, Partner, Information Protection Team, KPMG

1030

Coffee/Tea/ Exhibition Visit

1030

Coffee/Tea/ Exhibition Visit

1100

Tackling Cyber Threats - the European Cybercrime Centre (EC3) Troels Oerting, Assistant Director and Head of European Cybercrime Centre (EC3), Europol

1100

Disruptive Trends and Emerging Technology in ICT Neil Fisher, Vice President Global Security Solutions, Unisys and Vice Chair, Information Assurance Advisory Council (IAAC)

1130

Policing Cyber Crime Charlie McMurdie, Detective Superintendent, Head of Police Central e-Crime Unit, New Scotland Yard

1130

Cyber Threats - Reversing the Trends Mark Brown, Director – Risk (Information Security), UK&I Advisory, Ernst & Young LLP

1200

Panel Discussion

1200

Panel Discussion

1230

Lunch/Exhibition Visit

1230 Lunch/Exhibition Visit

1400

Cyber Warfare - the Real Story Dr Dave Sloggett, Author and Independent Academic

1400

Prosecuting Cyber Crime Esther George, Crown Prosecution Service

1430

The Anatomy of Cyber Attacks Phillip du Toit, CISO, Exsatus

1430

Cybersecurity as a Science Professor M. Angela Sasse, Head of Information Security Research, UCL, Director of the Science of Cyber Security Research Institute and Director of the Academic Centre of Excellence for Cyber Security Research

1500

The Morning After: Recovering from a Cyber Attack Nader Henein, Senior Security Advisor, BlackBerry

1530

Panel Discussion

1500

Cyber Terrorism in the Supply Chain Sian John, UK Security Strategist, Symantec

1530

Coffee/Tea/ Exhibition Visit

1600

Cyber-Warfare on the Rise Eugene Kaspersky, CEO, Kaspersky Lab

1630

The Vulnerability of Communication and Network Devices John Bayliss, Director, Communications Risk Management

1700

Panel Discussion All Speakers, plus Ria David, President, Cybergentics

1740 Close

CTX 2013 Show Preview

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

1600 Close

Venue details and opening times KENSINGTON OLYMPIA

Olympia Grand Hall is famous for its stunning Victorian architecture, magnificent galleries and ornate barrel-vaulted roof, and provides a dramatic setting.

OPENING TIMES 24 April 08:00 - 19:30 25 April 08:00 - 16:30

HOW TO GET THERE BY TRAIN

Kensington Olympia (Mainline trains) Silverlink and South Central Trains run direct services to both these stations from Clapham Junction, Gatwick Airport, Brighton,

Watford Junction, Milton Keynes, Northampton and Rugby. For National Rail enquiries phone +44 (0) 8457 48 49 50.

BY TUBE

Kensington Olympia (District Line) For further information call London Underground Travel Information +44 (0)20 7222 1234

PARKING

If you intend to drive to Olympia, there is only limited parking available, so it is advised to pre-book your space. For further information visit the venue website at www.eco.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

33



CCTV & SURVEILLANCE

RFEL ADDS HALO SYSTEM TO ITS RANGE OF COUNTER TERRORISM PRODUCTS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RFEL launches next generation, low-power, real-time, video processing system Image-based surveillance is a critical capability for counter terrorism. Potential applications include: fixed and mobile installations for covert CCTV monitoring and surveillance, and unmanned aerial vehicles (UAVs) – creating demand for imaging in infrared (IR) – and the use of adaptive contrast enhancement to combat poor imagery in challenging lighting conditions. The emergence of extremely high performance computing platforms with low size, weight and power, coupled with high performance and compact visible and IR sensors, promises to revolutionise video surveillance. RFEL’s new HALO™ system is the latest addition to the company’s range of counter terrorism products. RFEL’s high performance video processing blocks are highly optimised and enable HALO to be compact and low power for portable use. HALO delivers high quality, high frame rate, HD video for human or machine interpretation, even in the most challenging of visual environments. HALO’s modular, flexible design makes it ideal for retrofitting/ upgrading existing infrastructure, as well as for providing a complete, innovative solution for new designs. CAPABILITIES The video processing capabilities provided by HALO are intelligent fusion of multimodal imagery, such as from a visible and IR sensor, and image stabilisation, even when the platform is subject to severe vibration, and when imagery is sparse in features or of low contrast. Contrast enhancement to maintain high performance operation in marginal lighting conditions – visible and IR – is offered by HALO, as well as noise reduction for optimising operation in low ambient light and for ensuring robust image fusion. What’s more, HALO offers digital zoom, lens distortion correction, image overlay and support of various compression standards. HALO uses the latest Field Programmable Gate Array technology to achieve the high processing bandwidths needed while maintaining low power consumption. HALO offers a range of physical interfaces and supports all major video standards from analogue composite PAL through to

digital GigE with full 1080p. The required interfaces can be configured in the factory to tailor the system to bespoke applications. IMAGE FUSION At the heart of HALO is a proprietary image fusion engine. Different imaging wavebands, such as daylight and IR, provide complementary information, especially at certain times of the day and when the atmosphere reduces the quality of daylight images. The purpose of image fusion is not to simply blend the images by crude averaging, or by an overlay technique known as video analytics, but to form a composite image based on selecting the best features from both images. If one of the modalities has no discernible image features in a particular region of the fieldof-view then this image information should not be used, as it would degrade the composite image. If features are present in both modalities, then this information should be combined in an optimum sense. An additional advantage of image fusion is that the key image features of both modalities are retained, whereas poor quality and replicated information is discarded. Consequently, the processing bandwidth, storage requirements and any downlink requirements can be simplified due to the potential halving of the retained image data (with the separate images available if required). Image fusion ensures that maximum available image information is presented to the operator in a single video stream. However, this powerful capability is largely wasted if the viewing platform is subject to random movements making the video unwatchable. For example, this can occur when performing surveillance from a UAV, moving vehicle, or from an installation subject to wind-induced movements. The purpose of image stabilisation is to remove the random movements, while ensuring that any ‘wanted’ movements seen by the sensor are left unchanged. Additionally, stabilisation improves the efficiency of standard compression algorithms significantly. Monitoring of the stabilised video, rather than the raw input stream, will considerably reduce operator fatigue and is likely to improve

Enhanced and fused image with false colour for the IR made from daylight image and IR image

the detection rate of interesting events. The HALO image stabiliser is highly sophisticated as it processes and extracts all useful image information and therefore works in the most challenging of circumstances – unlike the computationally simpler approach of feature tracking that inevitably fails when a scene has poorly defined features or experiences extreme movements. HALO has been stress-tested using imagery that presents the most extreme operating conditions and is robust to frame-to-frame translations as large as 40 pixels (in both x and y) and frame-to-frame rotations of up to 5˚. NEW FEATURES HALO is highly configurable to satisfy the diverse range of customer requirements. This modular design approach minimises market entry costs, while facilitating future upgrades by the addition of new or enhanced firmware or software blocks. All functional IP blocks have been rigorously tested in isolation and therefore technical risk is reduced and down-time for in-service upgrades is minimised. HALO’s integrated software processing capability provides the flexibility for implementing a host of video post processing functionality, such as automated target tracking, feature identification, or change detection. L FURTHER INFORMATION Tel: +44 1983 216600 info@rfel.com www.rfel.com RFEL Limited, Unit B, The Apex, St Cross Business Park, Newport, Isle of Wight, PO30 5XW, UK.

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

35


RAPID PROTOTYPING

Through technical expertise and commitment to customer care our aim is to deliver the best rapid prototyping service in the UK. • Stereolithography • Selective Laser Sintering • Vacuum Casting • CNC Machining • Reaction Injection Moulding • Traditional Model Making • Silicone Moulding • Low Volume Production

Discover the ultimate prototyping experience for your product development requirements.

info@paragon-rt.com

+44 (0)1325 333141

www.paragon-rt.com


DEFENCE MANUFACTURING

RAPID PROTOTYPING AND MODEL MANUFACTURING

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Working across all market sectors, including defence, Paragon Rapid Technologies has built a reputation within the rapid prototyping industry for high quality products and service Paragon Rapid Technologies has built a reputation within the rapid prototyping industry for high quality products and service, assisting inventors, design consultancies, moulding companies and OEMs. Working across all market sectors including defence, automotive, medical, industrial and consumer products, Paragon are relied upon to deliver the highest quality on time. Paragon’s focus is on producing parts which suit their customer’s specific requirements, whether this is just a simple evaluation model, parts for mechanical testing or an assembly to be fully representative of final injection mouldings. Paragon believe in working with their customers and understanding your exacting requirements. CORE SERVICES Stereolithography (SLA) is ideal for quick evaluation models or with extensive finishing applied can be used for marketing models or master patterns for casting processes. Clear resin grades are available and can serve to replicate lenses and screens after full finishing. Selective Laser Sintering (SLS) is robust functional models produced from Nylon, suitable for mechanical testing. Cosmetic finishes can also be applied for aesthetic models. Model making and finishing is the heart of the business where Paragon’s team of expert model makers carry out assembly, modifications and add the finishing touches to every product. Paragon have extensive expertise in vacuum casting where Polyurethane components are produced from silicone tooling, exactly replicating the master pattern. The range of resins used simulates most thermo plastics and rubbers and can be pigmented to match RAL or Pantone references. High temperature, high impact, FDA approved and VO Flame retardant grades are also available. Specific moulding techniques such as over moulding of inserts and 2 shot moulding can also be replicated through the vacuum casting process. Prototype and low volume production components moulding in silicone rubber is also a speciality of Paragon. Parts can be produced in varying hardnesses with much greater durability and elasticity. FDA and medical grades are available. Reaction Injection Moulding (RIM) is also offered by Paragon, including low volume

Paragon’s focus is on producing parts which suit their customer’s specific requirements, whether this is just a simple evaluation model, parts for mechanical testing or an assembly to be fully representative of final injection mouldings. production solution for Polyurethane moulded parts, as is CNC machining – machining of prototypes and components from most metals and plastics. Production tooling and moulding solutions are tailored to meet specific pre-production and final production requirements, managed through our established supply chain. The value of accurate rapid prototyping can sometimes be underestimated, but high quality models with accurate surface finishes can significantly boost the perceived value of a product vs. cheaper less accurate models. Paragon’s expertise in this area means that many of the industry leaders across all market sectors including BAE, Jaguar Land Rover, JCB and Black and Decker have them at the top of their list when they require prototype models In addition this depth of experience is called

upon to create often elaborate and technical display and exhibition models where a combination of RP processes and traditional skills and techniques are brought together. By using Paragon throughout the product development cycle, designers and engineers have been able to optimise their designs by identifying areas of improvement, proving the fit and function of products and presenting working units to their clients. This has resulted in a superior product, a reduced time to market and subsequently savings on the cost of development. L FURTHER INFORMATION www.paragon-rt.com info@paragon-rt.com +44 (0)1325 333141 www.facebook.com/ParagonRT

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

37


LMV

Protection when it counts Mobility where it matters.

Rugged, protected and exceptionally agile, the LMV is designed to support the most demanding military missions. Independent suspension, low ground pressure, and an excellent fording capability contribute to class leading off road mobility, whilst its low proďŹ le, narrow wheel track and powerful driveline give LMV excellent terrain

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

accessibility and utility even in built up areas. LMV is designed to meet the threats posed by ballistic, mine and IED attack, making it particularly well suited to demanding operational conditions. This is borne out by sales to nine European armies, including eight NATO member states, making the LMV the light protected vehicle of choice in Europe.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DEFENCE VEHICLES

REMARKABLE ENGINEERING

Defence Consultant Andrew Simpson is impressed by Iveco Defence Vehicles’ new SUPERAV - an amphibious 8 x 8 which has succeeded in avoiding engineering design compromises In a defence procurement environment as demanding as we are experiencing at present, it is rare indeed to see a new armoured vehicle being rolled out, particularly one whose development has been wholly funded by private venture development money. It was therefore with considerable anticipation that I received a detailed technical introduction to Iveco Defence Vehicles’ SUPERAV last month. The ensuing story was fascinating and provides an interesting lesson in how industry can best respond to the current dearth of orders. EVOLVING REQUIREMENTS SUPERAV as a concept dates back to 2007, when it became apparent that there were a number of evolving requirements, notably in the US Marine Corps and the Italian marines, for an 8 x 8 protected vehicle to support littoral operations. Although there are a number of 8 x 8s which are nominally amphibious, the majority of these required substantial design compromises. Typically, to be amphibious, the vehicle would have to sacrifice either its armour, or its turret or its crew and mission payload, none of which is ideal when making an opposed landing. The brief for the design team was succinct: the vehicle was to maximise use of off the shelf assemblies, it was to be cost effective to manufacture, it was to have sufficient

amphibious payload to commence operations immediately on landing, and it was to have class leading protection and mobility. Incredibly, the engineering team went from design concept in 2007 to a running prototype the next year. Still more surprisingly, it appears that each of the design goals which the team had been set has been met. It is only in discussions with the engineering team that the elegance of the technical solution becomes apparent. The approach begins with the use of the 8 x 8 ‘H’ configuration Centauro chassis. Although this was mandated through the design imperative to maximise use of COTS assemblies, it conferred dramatic benefits over the more commonly adopted single drive shaft configuration. This is particularly evident in SUPERAV’s class leading protection system. Because the differentials sit outside the centre line of the vehicle, it is possible to build a crew cell which requires less ground clearance, and also avoids the danger of under-vehicle masses forming secondary projectiles. At the same time, the transmission configuration also ensures that, even if either the forward or one of the rear two differentials on either side is destroyed, the vehicle retains its mobility. The rest of the driveline also follows the mandated COTS approach, with the Iveco Cursor 13 engine, widely used in the Stralis

range of heavy trucks, being complimented by the proven HP902 transmission. The shape of the H transmission has also played a significant role in the design approach for the crew cell. Because of the need to conserve weight as far as possible, the decision was taken to focus armour protection on the crew compartment. Rather than armouring the whole external surface of the vehicle, protection was brought inboard, saving some 20 per cent of vehicle mass. Innovative approaches, focusing on energy management through the use of absorbent materials, and through suspension of the whole seating structure from the vehicle roof, provide a quite exceptional level of ballistic, mine and IED protection. A similar approach, based on the use of industry standard J1939 multiplex systems provides a robust and flexible open electronic architecture, complimenting a power bus based power distribution and management system. ACHIEVEMENT A brief summary of the final performance levels delivered reveals the extraordinary achievement of the seven-strong core engineering team who appear to have transcended the design compromises normally associated with armoured vehicles in general and amphibious vehicles in particular. SUPERAV combines proven high reliability and mobility, through the use of COTS assemblies, with amphibious mobility beyond Sea State 3. In addition, the vehicle has a mission payload of up to 10 tonnes, allowing it to mount a remote weapon station of up to 30mm calibre, and the ability to deliver this whole package, complete with crew, direct to the shore. It is a truly innovative vehicle and one of which we will see much in the future. L FURTHER INFORMATION For further information contact andrew.bucknall@iveco.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

39


MILITARY BUILDINGS


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

AVIATION

NEW HORIZONS FOR RUBB

A respected UAE flight school has unveiled three new helicopter hangars to support its expanding business Rubb Buildings won an order to provide three 23.4m x 36m steel and aluminium hybrid EFASS structures to Horizon Flight Academy. Hareb Thani Hareb Al Dhaheri, Horizon chief executive officer said: “We chose Rubb for its reputation in design, development and deployment of temporary hangars. The installation of our hangars was speedy and efficient, the project was completed on time and as promised.” BENCHMARK The high flying academy is based at Al Ain International Airport and has been purpose built for flight training. It has set the benchmark for pilot training in the Middle East, offering fixed wing and helicopter pilot courses. Its fleet includes Cessna 172SP, Diamond DA42, Bell 206 and Bell 407 aircraft and flight simulators. The hangars will be used for the storage and maintenance of the fleet helicopters. Horizon first viewed Rubb’s state-ofthe-art hangar system at IDEX 2011 in Abu Dhabi and the relationship grew from there. The Horizon team visited Rubb’s

manufacturing plant in Gateshead, UK, and personnel from Rubb travelled to Al Ain to assist with site assessments and oversee the installation of the structures. The EFASS shelter system, which features hangars, sunshades and warehouses, is uniquely suitable for the storage and maintenance of aviation equipment and operations. The system is designed to be rapidly deployed and quickly erected anywhere in the world. UNIQUE DESIGN The main body of each Horizon hangar was constructed using a number of steel fabricated components together with uniquely designed steel roof and leg sections, that bolt together to form the span trusses. When assembled, high strength robust PVC coated polyester fabric sheets were fitted between the aluminium capping sections of adjacent spans to form the shelter. The gable ends feature the standard aluminium EFASS frame elements complete with PVC membrane and a 21.5m x 7m Heli-Door at the hangar entrance. Each hangar includes two personnel doors in

The EFASS shelter system, which features hangars, sunshades and warehouses, is uniquely suitable for the storage and maintenance of aviation equipment and operations.

the closed gable ends and a porch in each sidewall. One of the aviation buildings has been fitted with an overhead roof-mounted 2000kg gantry crane system to assist with internal maintenance procedures. These shelters are the first Rubb EFAS Systems to feature an internal PVC membrane to provide additional thermal insulation – protecting valuable aircraft and personnel from the soaring temperatures outside. Rubb adapted the EFASS design to include mostly steel framework instead of aluminium to meet with stringent fire regulation codes in the UAE.The company worked with Al Futtaim Carillion during the construction of the aviation facilities and the installation was overseen by Rubb Erection Adviser Dave Cromarty. The buildings were completed in six weeks. NEW TECHNOLOGY Project Manager Andy Knox said: “It has been a challenge to launch the EFASS in the UAE because it was a completely new product and technology in that marketplace. But the team at Horizon really wanted this hangar system and have helped us to introduce this product range to the region. We have already received a number of enquiries and are looking forward to returning to IDEX in 2013 to showcase this project further.” L FURTHER INFORMATION www.rubb.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

41


CASE CLOSED

UFED Series - First choice for mobile forensics in more than 60 countries! Physical extraction and decoding while bypassing pattern lock / PIN / password from Samsung Galaxy SIII family, HTC and Motorola Android devices Physical extraction and decoding from any Apple iOS devices

Physical extraction from 80 Nokia BB5 devices. Password extraction is enabled from selected devices The industry's only TomTom速 trip-log decryption and decoding solution Supporting more than 10,000 device profiles

Exclusive decoding capabilities for more than 40 BlackBerry速 devices running OS 4 - 7

Get the evidence you need to close cases fast! sales@cellebrite.com www.ufedseries.com


EVENT PREVIEW

CONNECTING THE ENTIRE FORENSIC INDUSTRY

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The conference at Forensics Europe Expo brings together over 45 internationally-recognised speakers to debate, discuss and deliver exceptional insight and analysis to the world of forensics The inaugural Forensics Europe Expo Conference will take place on 24-25 April 2013 at Olympia London as the definitive source for forensics products, education, best practice, training and networking for the entire forensics sector and supply chain. The unique conference, divided into two streams – Forensics Innovation and Digital Forensics – brings together over 45 internationally recognised speakers to debate, discuss and deliver exceptional insight and analysis to the world of forensic investigations. If you operate within the police, military or intelligence agencies, or are involved in any type of investigation and court presentation that requires the analysis of evidence, including lawyers, government bodies and agencies – through to private organisations and the labs themselves – the Forensics Europe Conference is the perfect forum for you. It will review what has been learnt in the past 12 months as well as look to the future, emerging techniques, the wider supplier landscape and new legislation and how all these elements will contribute to future forensic investigations. AN OPEN MARKET The closure of the Forensic Science Service in March 2012 has forced the forensic landscape to evolve into an ‘open market. There is now, more than ever, a need to understand new legislation, and the impact and future challenges it will have on the availability, procurement and supply of forensic analysis & products and the future challenges facing the market. Forensics Europe Expo will fill this void and provide many of the answers necessary to enable you to source cost effective forensics products and innovative solutions to reduce costs, and discover cutting edge technology from leading international labs, providers and manufacturers.

cs Forensi xpo E Europe ivided d will be streams – o into tw s Innovation c Forensi ital Forensics and Dig nd bring –a over 45 r e h t e tog rs CONFERENCE speake Celebrating the breadth of achievements in the modern forensics industry, and examining the challenges the future will hold will be the aim of the Forensic Europe Expo Forensic Innovation Conference. E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

43


Forensic Pathways offers unique data analysis solutions in the area of mobile phone forensics, criminal intelligence, due diligence/risk and business intelligence and is internationally recognised for taking a lead in the development of forensic software, products, and services.

FORENSIC EXPO 24TH- 25TH April (Stand G15 / G20)

FREE TRIAL AVAILABLE

Winner of the Orange Best Use of Technology in Business Award

Forensic Image Analyser (FIA) – The Digital DNA of a Camera & Mobile Phone

Going beyond data extraction – Our Patented Forensic Phone Analyser (FPA) provides analysts with the capability to analyse and manage mobile phone data with ease. A key principle to Forensic Phone Analyser (FPA) is data aggregation and advanced automated analytics. FPA automates the attribution of phones to people. The motivation behind Forensic Phone Analyser software is that by treating telecommunications data as a social network it is possible to discover links between people that aren’t immediately obvious FPA supports XRY, Celldeck, and Aceso to name a few.

FIA is a new patented technology that identifies whether an image was created by a particular digital camera, mobile or smart phone or scanner. Also, if you have a group of images and you need to know which of the images in the group were taken by the same device FIA will tell you. FIA is currently available as an easy to use service.

FDX - COMING SOON FDX – Practical Management of the Forensic Extraction Process

FREE TRIAL AVAILABLE

A single mouse click is sufficient to automatically scan an entire hard drive for suspicious and illegal video material. With its speed, Videntifier™ Forensic saves investigators precious time, which they can spend on other more challenging tasks, rather than inspecting thousands of video files manually. At the end of each scan Videntifier™ Forensic returns a summary report, listing which videos have been identified.

FDX is a new Laboratory Information Management system for Mobile Phone Examiners. FDX technology takes the user through the process of receipt of the device and its journey through the many steps of the forensic examination and triage process. FDX is highly scalable and can manage data on thousands of devices at any one time. The system can be searched fully and used as proof of continuity and chain of custody of devices, component parts and the data recovered.

For more information please visit our website or contact us below. UK & Australia |sales@forensic-pathways.com | www.forensic-pathway.com |00 44 (0) 1827 255 170 | @forensicpathway


EVENT PREVIEW  The Forensic Innovation stream addresses the ‘biological’ side of forensics, while the Digital Forensics stream looks at the ever-increasing role of computing, mobile and network investigation. Forensics Europe Expo event director Phillip Hunter said the conference is unique in that it aims to bring together everyone across the forensics industry – providing an overview relevant to all forensics specialties. “The conference programme gives an overview of the full breadth of what forensic science actually means to the job of someone like a police scene of crime officer or an evidence collection team,” Hunter said. “Delegates whose interest has been piqued by one of the conference sessions can then go on to the exhibition floor and talk to some of the people there about those specialties.” Hunter says the conference aims to promote the sharing of best practice – an important goal in the wake of the closure of the Forensic Science Service in March 2012. FORENSIC INNOVATION Innovation in forensic science is a true phenomenon that has been embraced by law enforcers, academics and industry professionals across the world in a way that could not have been predicted even a decade ago. Such advancements have transformed the evidential potential that is now available to investigators that has enabled them to secure successful prosecutions – often years after a crime has been committed. The conference will be a celebration of these advancements, examining them in detail and debating present and future challenges that will occur as a result. The conference will cover the role of forensic science in law enforcement and criminal investigation and the impact this has had on ways of working. It will provide an examination of the importance of preserving vital evidence at the crime scene and the issues/factors that might affect this. Innovative in law enforcement application and academic research will be explored,

The fact that almost all of us conduct our lives in the ‘virtual’ world on mobile phone and computers through social networking sites and the internet in general has presented new challenges for law enforcers. It has also led to an increase in academic courses and research devoted to this exciting new area of science alongside new ways of working in terms of forensic service provision and the challenges/opportunities this presents. Ensuring the reliability and accuracy of evidence and avoiding contamination will be another topic addressed in the conference, as will legal issues/challenges associated with forensic evidence, and new ways of working in DNA and fingerprinting. The Forensics Innovation conference stream is helmed on day one by Dr Ann Priston, chair of the Forensic Science Society, and on day two by Prof Dr Arian C Van Asten, Department Head of the Netherlands Forensic Institute, and Ric Treble, Scientific Advisor at LGC Forensics. Topics to be covered include the changing forensic landscape, crime scene investigation and examination, technology research and innovation, law enforcement application, ensuring the reliability and accuracy of evidence, innovation in forensic provision, DNA, and fingerprinting. Speakers include Martin Bottomley, Head of Greater Manchester Major Crime Review Team, and DS Chris Holt of the Greater Manchester Police Major Incident Team; Professor Allan Jamieson, Director of The Forensic Institute; Dr Itiel Dror of the Institute of Cognitive Neuroscience in the Department of Science, University College London; Andrew Wade, Lead Forensic Scientist at First Forensics; and Chief Constable Chris Sims, Forensic Science lead for the Association of Chief Police Officers and Chief Constable of West Midlands Police.

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DIGITAL FORENSICS The unprecedented proliferation in new technology over the past five years has led to the development of digital forensics as a scientific discipline. The fact that almost all of us conduct our lives in the ‘virtual’ world on mobile phone and computers through social networking sites and the internet in general has presented new challenges for law enforcers. It has also led to an increase in academic courses and research devoted to this exciting new area of science. The conference will address how an increase in mobile phone and computer use presents investigators with new evidential potential as mobile phone and computers are now used in almost all crimes from volume crime to major crime. The conference will then explore the challenges and pitfall that arise as a result of this new evidential potential – retrieval of evidence, analysis, legal challenges and how it has shaped working practices and staff resources. Best practice and the latest thinking from law enforcers, industry experts and academics on mobile and computer forensics will be covered in the conference, as well as how an exciting body of research into digital forensics has emerged and the proliferation of courses and programmes of study that is helping shape current thinking. The growth of open source intelligence as a new form of investigation that enables investigators to glean vital evidence on suspects from legitimate, readily-available sources such as social networking sites without even leaving their desks. Finally, the threat of network forensics on our critical national infrastructure and the impact on the law enforcement response will also be addressed in the conference. Mark Ploszay, global defence and national security specialist in evidence retrieval and analysis; and Deb Leary, OBE, Chief Executive of Forensic Pathways, are Chairmen of the Digital Forensics stream. Speakers include Dr Neil Cohen, of the Home Office Centre for Applied Science and Technology (CAST), Andrew Beckett, Head of Consulting and Professional Services of Cassidian Cyber Security, and Dr Bart Custers, Project Leader Technology in Policing, Department of Security and Justice, The Netherlands. E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

45


Advertisement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Kit, gizmos and gadgets from Tetra can help police teams with their crime scene investigations If your job involves the use of police kit, gizmos and gadgets to assist you in the collection of intelligence, evidence packaging, testing substances, Tetra can help. The company can also supply search lamps, torches, door entry and tactical boots. Tetra is here at the expo and welcomes you to what should be an exciting two day meet and greet. Tetra has over 10 staff inside and walking around the expo building so please feel free to have a chat. Tetra would like you to come to its stand situated next to the Crime Scene House and would love to discuss/demonstrate its products to get a better understanding of what you require. If you have had problems during an investigation or incident where you could see that a specialist piece of kit or product would have been beneficial, then please involve Tetra who is more than happy to help. During the last 19 years Tetra and its staff have had the privilege to assist the UK police and prison service in various investigations such as dog training search teams, prison security and cell searches. It has introduced new search and evidence packaging equipment following the White Moor prison escape which also involved the Woodcock report recommendations.

Tetra has helped on a missing persons case where two of its staff spent two days with Norfolk police assisting them in the search for two young children when they went missing near Kings Lynn. The company also helped in a case involving the recovery and exhumation of two bodies in an Essex graveyard. Tetra assisted a suspect murder and missing person’s investigation using a new luminescent chemical technique at an Essex crime scene. Tetra used a new search technique looking for trace blood evidence in a vehicle for West Midlands police during a case of a fatal stabbing. A case involving a major incident of train derailment murder was helped along by Tetra’s incident and evidential shelter for British Transport Police and Thames valley police. Tetra has also been involved with assisting the Metropolitan and British Transport Police with the preparation of major incident equipment for the 2012 London Olympics. There are many other incidents and occasions where Tetra’s experts have assisted

specialist departments so please don’t just think it is merely a supplies company. FURTHER INFORMATION Tel + 44 (0)1268 525218 Fax +44 (0)1268 523039 www.tetrasoc.com

Since 1994, Tetra has been dedicated to serving and supplying professionals around the world. An expert in the field or laboratory requires first class products that won’t let them down, which is why here at Tetra, all of our products are from quality sources, manufactured to the highest standards and then thoroughly tried and tested before we put them in our Tetra catalogue. We are more then happy to back this up with samples, so you can test our products for your own personal needs and requirements. With our European head office based outside London and our north American distribution centre in NY province, Tetra’s products are recognised around the globe. With international distributors assisting customers with product training and understanding our customer requirements, we are able to develop specialised crime scene and forensic products to their exact specifications. We are proud to be stockists of leading brands such as Dupont, Moldex, Ansel protective PPE products and NIK, MMC and BDH drug identification tests. Additionally, we have developed our own branded products which are now well established in the law enforcement market for their quality and reliability. These include Metra brand PPE products, Mega Sack evidence bags, High Performance fingerprint tape, fingerprint powder and ever popular Bigfoot shoe print range. All these are stocked in significant quantities to support rapid delivery. We look forward to assisting you.

46

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Tel: 01268 525218 www.tetrasoc.com


EVENT PREVIEW  AUTHORIATIVE SPEAKERS Many of the speakers at this year’s conference have consulted and led large‑scale investigations including a number of high profile cold-cases and have gone on to receive recognition for their work including OBEs, accreditor for the National DNA database, commendations from the Criminal Justice System, Crown Court and the Police, and members of a Nobel Prize winning team. One of the most eye catching sessions has been coined ‘Dead men talking’ by the presenter Ray Fysh, Forensic Advisor, Environmental Profiling Unit at University of Reading. His presentation ‘Use of Radio-Nuclides, Radiogenic and Stable Isotopes in the investigation of suspicious deaths’ will look at how methods using the analysis of light and stable isotopes together with elemental analysis, can assist in answering questions about the identity of unknown skeletal remains. Bart Custer of the Department of Security and Justice, the Netherlands, believes that the focus should be on ‘needs, not tools’. His presentation ‘Best Practice in digital forensics in the Netherlands Police’ will explore technology in policing in the Netherlands, offering overviews of forensic tools, police needs, best practices and effectiveness and deal with trends and challenges in computer forensics, focusing on tools like data mining, profiling and network analysis. Jo Ashworth, director of Forensic Services, East Midlands Police Collaboration Unit, will be discussing forensic collaboration in the Midlands. She said: “Police forces are facing considerable financial challenges and must respond by streamlining services, driving out efficiencies and capitalising on technology and innovation. The three forces in the North of the East Midlands region have responded by delivering a collaborative forensic services model; one year on there are a lot of lessons learned which can be shared with the wider community.” FORENSIC SCIENCE SOCIETY Forensic Europe Expo is run in collaboration with the Forensic Science Society. As a professional body for forensic practitioners the Forensic Science Society’s participation includes presentations from a range of its professional members including the President, Dr Ann Priston OBE and Vice President, Callum Sutherland. Dr Ann Priston welcomes this opportunity for practitioners, academics and interested parties to congregate and communicate on the multi-faceted aspects of forensic science. Philip Hunter, Forensics Europe Expo event director commented: “We are delighted the Forensic Science Society are working with

us to deliver this very important event for the entire Forensic sector and thank them for their support and guidance in shaping the conference programme. Forensic Europe Expo is perfectly placed to serve the forensic sector as we evolve from the closure of the Forensic Science Service to an open market.” INTERACTIVE CRIME FEATURE Refresh your investigative skills by learning the latest best practices and technologies from leading academics as they walk you through a mock-up investigation. Cranfield University will lead a session on the use of forensic archaeology in search and forensic strategies. This session will be an opportunity to take the key capabilities of the forensic archaeologist (search, location, excavation, recovery, interpretation), and place them within the context of a complex house search – considering what can be gained through their use and how they might interact with other scene professionals and feed into both search and forensic strategies. Staffordshire University sets up a mock crime scene scenario: The body of Barry Stone has been found in the living room of 270 Leek Road, Stoke-on-Trent. Stone is known to the Police and is a suspect in an ongoing gang-led murder investigation. There is evidence of a struggle in the living room. In this interactive workshop, participants will follow the investigation of this crime from the scene to the courtroom. The mock crime scene scenario, based on Staffordshire University’s Crime Scene House facility, will also be used to demonstrate the latest forensic products used in evidence collection. Following the collection of digital evidence, our experts will highlight the benefits of using EPE in an investigation to showcase scene and supporting evidence types in a courtroom.

cs EXHIBITION Forensie The exhibition floor Europ ting brings together leading s o forensic suppliers for h s i ct Expo u the first time in the UK d o r p e v i s e u to showcase ground l n c e x c e the s t, breaking techniques n i s e h launc e equipmen and technologies. The event is hosting of crim chnologies, exclusive new te sting and launches inproduct the lab, te ital following fields: scene dig of crime equipment, new

technologies, police equipment, lab equipment, testing equipment and digital equipment. Attendance is crucial for anyone seeking to invest in the very latest cutting edge technologies and equipment. Gradko Forensic for example will be displaying its fast and reliable route drug analysis services. Neogen will be presenting ELISA, a unique drug testing kit which can screen over 300 drugs and/or metabolites. MP Biomedicals who provide life science and diagnostic

Reasons to attend Source cost effective forensics products and innovative solutions to reduce costs

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Discover cutting edge technology from leading international labs, providers and manufacturers Understand e-discovery and e-intelligence to prevent digital attacks Network and share best practice with peers View a crime scene in our live interactive demonstration area, showcasing the latest criminal capturing techniques Discuss evidence collection methodologies with key members of industry Gain knowledge and analysis by attending the two day conference Hear successful case studies within the free to attend show floor Workshop Programme products in the field of molecular biology, cell biology, rapid diagnostics and immunology, salient will be launching its new generation dipsticks on the show floor and Hamilton Robotics, a world leader in robotic workstation innovation will be showcasing its unique, custom laboratory automation solutions. TopAir Systems has will announce a new high quality fingerprint development chamber enabling easy, fast and exceptionally clear fingerprint identification. TopAir’s Cyanoacrylate Fuming Chamber is used to develop latent prints from non porous surfaces in safe, controlled environment. For a full list of exhibitors, visit www.forensicseuropeexpo.com. REGISTRATION DETAILS There are limited places available for the conference with ½ day passes starting from £199+VAT so delegates are urged to book the final few places as soon as possible. For the forensic community who are members of the Forensic Science Society a special discount of 20 per cent off the paid to attend conference programme will be made available shortly. Visitor attendance to the exhibition is free by pre-registering at www. forensicseuropeexpo.com L FURTHER INFORMATION www.forensicseuropeexpo.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

47


msab.com

It’s not about the data. It’s about the meanIng. The SMART ANAlYST PhoNe Tool If you think mobile forensics is just about extracting data – think again. Its not only what you get, but what you do with it that really makes the difference. XAMN is the new analytical tool for XRY that allows users to view multiple files in one easy view for timeline, link analysis and geographical mapping.


EVENT PREVIEW

FORENSICS EUROPE EXPO: A FOCAL POINT FOR THE FORENSICS INDUSTRY

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The debut edition of Forensics Europe Expo takes place 24-25 April 2013 at London’s Olympia venue. But what’s the thinking behind the show’s launch, and what can visitors expect to gain from attending? Event director Phillip Hunter provides the details WHAT PROMPTED THE LAUNCH OF FORENSICS EUROPE EXPO? The landscape for the forensics industry has changed considerably in recent times. Up until March 2012, the vast majority of forensic testing in the UK was done by the government’s Forensic Science Service. When the government took the decision to close the service last year, the model for the industry changed for good. It’s now an open and free market, and the challenge is to ensure that the facilities used by people like the police and the legal sector are accredited and up to standard. Forensics is the second highest expense for police forces after manpower, and in an environment where they are facing austerity measures, budget cutbacks and now, with this new, open market, being able to assess what’s available and up to standard is imperative. Not only do they need to be able to look at the different types of cost-effective services they can use, and what they’re getting for those services and how much they cost, they are also looking at ways they can maximise efficiencies in the collection of evidence itself, in terms of both costs and time, without being of detriment to their investigations. There’s also a need for a place where the labs themselves can come and look at new equipment to upgrade their facilities – where they can share best practice through hearing about successful case studies and taking part in an education programme that looks at minimising costs, doing better business and examining the science that underpins it all. So the point of the exhibition and the conference is to link the entire industry, from labs and lab equipment, through to forensic services, equipment and educators – to provide a focal point where everyone in the industry can meet, discuss the most important issues and the latest innovations, and plot out a course for the next 12 months and beyond. WHO SHOULD ATTEND THE EVENT? There are a range of core audience groups who should attend the event. The police is an obvious visitor group because they use forensic services everyday as part of their job. They’re closely followed by the law sector – both defence lawyers and the Crown Prosecution service need to have the facility to challenge evidence, in order to ensure

the criminal justice system is served properly. The military and intelligence sectors are also key audiences, as are government and non‑government agencies such as border agencies, the NHS, the FSA, the IPCC, HMIC, accident investigation bureaus, trading standards, and environment and benefit agencies, which all use forensic services at times. Of course it’s important to bring in the forensics labs themselves, as well as the university laboratories, and all those involved with education around forensics. The other important group that we are targeting is corporate users of digital forensics. These are the people who are responsible for internal investigations into data misuse or intellectual property theft, from sectors such as banking, pharmaceuticals, technology, or critical national infrastructure; they’re all very interested in reducing that kind of risk. WHY SHOULD PEOPLE ATTEND FORENSICS EUROPE EXPO? An important aspect in this evolved forensics market is sourcing the right suppliers – making sure they meet the right standards and have the right accreditation. That’s vital – it’s about making sure you can do your job properly, making sure the criminal justice is balanced and effective, and also means you’re comparing and contrasting prices and managing your budget. So it’s a chance for suppliers to meet the people who use their products and services as part of their day to day roles, and an opportunity for visitors to find out more about the latest innovations and technologies – such as rapid DNA testing, for example.

For our international visitors, there’s a lot of interest in what is happening within the UK. The Forensic Science Service model was seen as something to emulate, and now that’s changed. They want to know what the repercussions will be, what the new model will look like, and how we’re moving towards that. WHY ARE YOU RUNNING TWO CONFERENCE STREAMS – AND WHAT CAN DELEGATES GAIN FROM ATTENDING? The two conference streams are Forensics Innovation – focused on biological forensics – and Digital Forensics. The decision to go that way was based on our analysis of industry trends and the speaker submissions that we received, and those two broad areas stood out as a simple and straightforward means of presenting their content. There are a lot of organisations out there who provide excellent, specialised forensics conferences with very specific and focused content. But we wanted to be broader than that, with the aim of providing an annual event which brings everyone across the industry together. The conference programme gives an overview of the full breadth of what forensic science actually means to the job of someone like a police scene of crime officer or an evidence collection team. The conference is relevant not just to one particular specialty, but to each of them. Delegates whose interest has been piqued by one of the conference sessions can then go on to the exhibition floor and talk to some of the people there about those specialties. The broad conference scope is also a benefit in terms of networking. We’re bringing the entire industry together, so the opportunity to meet and talk with those outside of your regular area of expertise is much higher. The overall aim of the event is to promote the sharing of best practice – and to provide a place where that can happen. L

cs Forensi ond ec is the s xpense e highest ce forces for poli power. The an after m will link the event industry to entire e a focal provid int po

FURTHER INFORMATION www.forensicseuropeexpo.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

49


Advertisement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PERIMETER PROTECTION

THERMAL IMAGING CAMERAS PROTECT SUBSTATION IN NORWAY

FLIR SR-Series thermal imaging cameras have been installed at the Lyse Energy electrical substation at Stavanger, Norway, to enhance the perimeter protection of this critical site In modern society life without electricity is unthinkable. If we are cut off from the grid for an extended period of time this could potentially cost more than just money. With hospitals and other emergency services depending on electricity an extended power failure might cost lives. That is why the Norwegian government and energy companies like Lyse Energy have started enhancing the security at critical points in the electricity network with thermal imaging cameras. One of the locations where thermal imaging cameras were installed to enhance the perimeter protection is the Lyse Energy electrical substation at Stavanger, Norway. The company that installed the thermal cameras is Noralarm AS. This Norwegian security company is also responsible for manning the control room. “We investigated a number of different security solutions and thermal imaging is the only solution that works,” says Torje Knag, CEO of Noralarm AS. NorAlarm is one of Norway’s leading alarm and security companies and the only one in the region with its own police and insuranceapproved (FG) alarm monitoring centre operative 24/7, 365 days per year. Established

on-line thermographic monitoring in the security system. By constantly monitoring several key parts of the electrical substation we ensure that faults are detected as they develop. In that case the energy company can reroute the power through other parts of the infrastructure, to prevent immediate breakdown. This buys the repair teams some time to order parts and plan the repairs.” This combined alarm system, including a perimeter protection intruder alarm and online thermographic temperature alarm ensures a high return on investment, according to Knag. “By combining both security and condition monitoring in one system this system has a great added value. We expect that the thermographic part of the installation can lead to a decrease in the number of breakdowns of 20 per cent, which in turn might lead to savings in excess of 8 million Euros each year.” UNWANTED ALARMS For the perimeter protection system Noralarm AS used FLIR SR-Series thermal imaging cameras. “I have visited several other pilot projects with other intruder detection methods, such as sensor cables and visual light closed

“No matter the weather and lighting conditions, the thermal footage will clearly show intruders in the high contrast thermal images. This gives the security system a much higher consistency in detection performance.” Ronny Hjørnevik, Noralarm in 1998 the company’s primary activities are within the supply of operational services, together with sales, design, installation and maintenance of high-tech security solutions linked to a dedicated alarm centre for the professional and private market. Ensuring continuity of power distribution through the electrical substation security is of utmost importance, to prevent damage due to vandalism or terrorist attacks. But there are other threats as well, explains Knag. “Breakdown caused by wear can be very dangerous as well, not to mention very costly. That is why we decided to include

50

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

circuit television (CCTV) cameras and in my experience these technologies do not work,” adds Noralarm Sales Manager Mikke Ståhl. “Those other technologies simply produce too many unwanted alarms to function properly.” To bring the amount of unwanted alarms down to a more acceptable level at the Lyse Energy electrical substation, Noralarm investigated the use of thermal imaging cameras instead. “Thermal imaging cameras combine really well with video analytics software compared with regular CCTV cameras,” explains Ronny Hjørnevik, installation manager at Noralarm. “Since E

The SR-Series thermal imaging cameras are affordable, easy to install and when combined with good analytics software they provide excellent intruder detection performance.

The crisp, high contrast footage from the FLIR SR-Series thermal imaging cameras allows video analytics software to automatically detect intruders, day and night and in all weather conditions.

The FLIR A310 thermal imaging camera can monitor critical substation components and measure temperature differences


PERIMETER PROTECTION

With the wide variety of optics FLIR offers with SR-Series thermal imaging cameras all of the different angles and ranges in the perimeter are covered. From top, A310 camera, SR-Series and Encoders.

E thermal imaging cameras produce thermal imaging footage based on the infrared radiation emitted by the scene, they provide high contrast thermal images in all conditions. No matter the weather and lighting conditions, the thermal footage will clearly show intruders in the high contrast thermal images. This gives the security system a much higher consistency in detection performance.” ACCURACY This combination of video analytics software with thermal imaging cameras also reduces the unwanted alarm rate, adds Hjørnevik. “The thermal contrast between a person and his surroundings is much bigger than the colour difference in most situations. So for a CCTV camera based intruder detection system to be accurate its sensitivity needs to be very high, but this leads to a large amount of unwanted alarms. Due to the high contract between an intruder and his surroundings in the thermal image the sensitivity of the detection can be set much lower for a thermal imaging based intruder detection system, leading to a much lower unwanted alarm rate.”

“In fact, the unwanted alarm rate at the Lyse Energy electrical substation is next to zero,” adds Ståhl. “We have performed extensive tests and in all our tests the system detected the intruders, regardless of lighting and weather conditions. In my experience other technologies like CCTV video detection, sensor cables and such cannot reach such a low unwanted alarm rate without compromising on intruder detection. For the perimeter protection of the Lyse Energy electrical substation in Stavanger FLIR SR-Series thermal imaging cameras were used. These cameras contain an uncooled Vanadium Oxide (VOx) microbolometer detector, which in the case of the Lyse Energy substation produce thermal images at a resolution of 320x480 pixels, but FLIR also offers models with resolutions of 640x480 pixels or 160x120 pixels. To enable these cameras to cover the entire perimeter without flaw FLIR also offers a wide variety of optics. “Incorporating the cameras in a security network is relatively simple,” says Hjørnevik. “We linked the analog video output of the FLIR SR-Series cameras to video encoders which digitise

the footage. Then it is sent over Ethernet to the local server, which analyses the footage and sends the footage and alarm data to the central Noralarm control room in Stavanger.” Apart from the thermal imaging security cameras the security system also includes thermography cameras for on-line condition monitoring. According to Ståhl, Noralarm included the thermographic temperature alarm system in the installation to increase the installation’s ‘value for money’. “We are always looking for added value in our systems and we heard that periodic maintenance inspections are performed with handheld thermal imaging cameras at the electric substation, so we decided to include on-line thermographic monitoring in our design for the security system.” The thermographic thermal imaging cameras included in the system are FLIR A310 thermal imaging cameras, which are mounted in a waterproof housing. These radiometric thermal imaging cameras produce thermal images at a resolution of 320x240 pixels. Each pixel in the thermal image is non-contact temperature measurement with a thermal sensitivity better than 50 mK (0.05 °C), enabling it to capture the finest image details and temperature differences. The built-in logic, memory, and data communications allow them to compare the temperatures in their images with user-defined settings, and send that data to a central monitoring station for trend analysis and alarm functions. In the case of the Lyse Energy substation in Stavanger the thermography monitoring system will automatically sound the alarm if particular areas within the thermal image reach above the previously determined threshold temperature.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADDED VALUE “The four FLIR A310 thermal imaging cameras that are incorporated in the alarm system continually monitor the critical parts of the substation,” explains Ståhl. “If any part of the monitored equipment rises above the threshold temperature an alarm will go off. The energy company can then reroute the power to prevent breakdowns and given the fact that these breakdowns cost a lot of money I think the added value of this thermographic system is definitely one of the reasons why Lyse Energy chose our security system for this substation and not one of our competitors.” By combining the advantages of FLIR thermal imaging security cameras with thermographic on-line condition monitoring Noralarm has provided the Lyse Energy substation with the best all round security solution currently available. With this security system Lyse Energy can ensure that its end users receive a continuous energy supply, undaunted by vandalism, terrorism or breakdowns caused by failing components. L FURTHER INFORMATION www.flir.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

51


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

High Performance Antennas for Countermeasures, where Security is Critical Directional Planar Spiral Antennas High Power, 0.15 to 15GHz

Phase Matched Cavity-Backed Spiral Antennas

Ultra Wideband Omni Antennas, 0.1 to 18GHz

Multiple Bands in Stacked Omni Array

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture The most important thing we build is trust

High Power Planar Spiral

Ultra Wideband Omni-Directional

• Directional, ultra wideband, high power • Bandwidths up to 30:1 • Ultra slim

• • • • •

Cavity Backed Spiral • High fidelity monotone patterns • Direction finding systems • Phase and amplitude matching available

52

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Biconical omni-directional antennas Fully efficient Vertically polarised Bandwidths from 3:1 to 30:1 Multi-stacked omnis for versatile configurations

Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, United Kingdom T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket


HOSTILE VEHICLE MITIGATION

ROBUST YET TEMPORARY SECURITY DEFENCES FOR VEHICLE SITE ACCESS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Temporary fencing and gates for pedestrian access for events such as concerts and sporting events have been widely available for many years. However, with the increase of the use of vehicles in terrorist attacks, temporary security defences for vehicle access is becoming more necessary With the ever present danger of terrorism in our society, companies and government departments need to be proactive in considering perimeter security for the protection against hostile vehicle attack. Existing solutions can be both expensive and time consuming to install. Complications can arise with underground services as pits need to be dug for deep installed products. Due to this, security companies have seized the opportunity to develop solutions that are easy and quick to install which mitigate problems with underground services. Temporary fencing and gates for pedestrian access for events such as concerts and sporting events have been widely available

pit. Designing a product which does not require excavation and offers comparable strength needs an innovative mind. In an increasing number of locations, it is not possible to excavate to the depth necessary for a deep mounted product. In some cases, structural damage could occur by simply digging the surface up. It is therefore highly desirable to create a solution that is mounted on the surface. The speed of installation and decommissioning is a key factor. Temporary staging for events often requires erecting within a matter of hours, with very tight timescales for individual elements to be installed within the overall planning.

The Matador was installed in two separate locations at the Olympics and proved to be highly effective. They were subsequently removed once the Games were completed. The locations were left virtually unscathed, with a return to normal operations possible within a short time frame. for many years. However, with the increase of the use of vehicles in terrorist attacks, temporary security defences for vehicle access is becoming more necessary. There are a small number of products on the market to protect against high level attacks around the perimeter of a site. However, precious few products are available for secure, automated vehicular access onto a temporary site. One product that does offer temporary HVM access control is the Matador from Heald. Heald recognised the need for a temporary, automated HVM system and designed the product specifically for this market. OVERCOMING DESIGN PROBLEMS There are a number of problems to overcome when designing a robust product that will allow automated access to a site. Some security products derive a proportion of their strength by virtue of being inserted into a deep, concrete

There is necessarily a cost implication when installing deep mounted products. The cost of plant hire and materials such as concrete will be higher for deep mounted products. Labour costs will also be higher due to the increased length of installation. Particularly with the current world economic problems, cost is a major consideration. The overall cost of a surface mounted HVM solution is likely to be lower than a comparable deep mounted solution. When a temporary site is dismantled, it needs to leave the environment unchanged. It is vitally important that any HVM solution does not adversely affect the environment, or require lengthy dismantling. At all times during the product design process, the consideration for public safety needs to be paramount. Products must prevent hostile attack whilst allowing safe passage for both vehicle users and pedestrians. The benefits of temporary HVM products include easy and fast installation; cost

effective, easy to move if necessary, and minimal damage to the environment. IN THE REAL WORLD The 2012 Olympic Games demanded the need for fast deployable, temporary access control system, and Heald were able to offer an innovative range of products. Consideration was given to the shallow mount products the Viper blocker and Raptor bollard/blocker. It was the truly innovative design of the Matador sliding bollard system that won the day. The Matador features a series of bollards fixed onto a steel base. The central bollard slides to one side to allow access. It was the product of choice because it is cost effective, easy to install and would cause minimal damage to the surrounding area upon removal. It also complies with health and safety standards, providing safe access for people, whether pedestrian or in vehicles. With three successful crash tests to PAS68 standard, the Matador is proven to be as robust as other comparable, permanent products. The Matador was installed in two separate locations at the Olympics and proved to be highly effective. They were subsequently removed once the Games were completed. The locations were left virtually unscathed, with a return to normal operations possible within a short time frame. DEMAND The demand for temporary HVM solutions is growing in parallel to the rise in uncertainty of security across the globe. This puts increasing pressure on industries and governments to meet ever increasing security demands. Temporary HVM products allow for flexibility in the face of fast moving terrorist threats. The success of the Matador puts it on a sure footing for inclusion in future projects, being suitable for both temporary and permanent locations. L FURTHER INFORMATION Tel: 01964 53 58 58 sales@heald.uk.com www.heald.uk.com Counter Terror Expo stand B65

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

53



UK SECURITY INDUSTRY

As the economic downturn continues to bite, UK firms are turning increasingly towards overseas markets for increased income and growth, and the UK’s private security industry is no exception. The BSIA’s Amanda Beesley reports on this growing export trend

For the UK’s private security industry, exporting has become significantly more important during the recession, as research conducted at the end of 2012 by the British Security Industry Association (BSIA) – and its dedicated Export Council – revealed. Aimed at gauging its members’ experiences of exporting in 2012 and assessing their When to expectation for 2013, s e m o c it s a the BSIA’s research e s r ove revealed that for targetings, the UK’s r over 85 per cent e m custo ity r u of Export Council c e s e t priva members, exporting ly h is hig had become more industry nt and important during intellige in its the recession. More e r matu than two thirds of respondents also reported approach that the level of overseas business conducted had increased in the previous twelve months, with Western Europe by far the most active export market. Further increases in overseas trade were also predicted for 2013, with 100 per cent of respondents expecting their company’s export business to increase further this year. “The main factor that attracts overseas customers to UK security suppliers is

Written by Amanda Beesley, the British Security Industry Association (BSIA)

BEST OF BRITISH: UK SECURITY ON THE WORLD STAGE

Security Exports

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

their innovation and investment in new technology,” comments John Davies, Chairman of the BSIA’s Export Council. “Experience, quality of service and the ability to demonstrate a proven track record are also important factors which influence buyers’ purchasing decisions and position UK suppliers in a favourable light.” With the world market for fire protection and security valued at around £176.8bn, raising awareness in overseas markets of the quality of UK products and services is a key function of the BSIA, the trade association representing the UK’s private security industry, and in particular its Export Council, a dedicated forum for BSIA member companies who are focused on extending their local business to overseas markets. The Association’s Export Council provides a dedicated forum for BSIA member companies who are focused on extending their local business to overseas markets, facilitating the sharing of useful information, hints and tips and best practice. The Association also organises UK Pavilions at several overseas trade events, thus playing a vital role in forging productive trade links between UK security companies and overseas buyers from around the world. John Davies continues: “Overseas trade E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

55



UK SECURITY INDUSTRY  shows such as IFSEC’s international counterparts, Security Essen, MIPS Russia and Intersec Dubai are essential in helping Export Council members forge links with overseas companies, and BSIA members’ attendance of such events shows no sign of slowing down during 2013.” EXPORTS Despite the financial benefits of exporting and the impact of the economic downturn, export is by no means a new revenue source for the UK’s private security industry, and neither is it wholly recession-driven, as the composition of the BSIA’s Export Council reveals. The majority of the council is made up of companies who have been exporting for a decade or more, with the highest proportion having been active in overseas markets for over 15 years. For the majority of Export Council members, exporting accounts for between 40 and 70 per cent of their business, further highlighting the fundamental role that overseas business plays in driving economic growth for UK companies. When it comes to targeting overseas customers, the UK’s private security industry is highly intelligent and mature in its approach, with sharing best practice and information commonplace among competing companies. Last year, members of the Export Council compiled their top ten tips for getting started, aimed at helping UK security companies

Recently, the UKTI’s Defence and Security Organisation worked with various security industry bodies, including the BSIA, to produce a report on the capabilities and strengths of the UK security industry. This report found that UK companies receive considerable international recognition for their ability to provide reputable, trustworthy services and reliable products. considering the move towards exporting to take the next steps. Among these ‘top tips’, the importance of forward planning and a patient, deliberate approach was a significant theme, with members advising new exporters to exercise caution when entering a new market, claiming that “patience and persistence are essential… successful exporting is about finding the right people on the ground to work with.” Despite the need for caution, the guidance also highlights the many resources that exist to help new exporters gain a foothold in overseas markets. Alongside the BSIA, UK Trade and Investment (UKTI) and British Embassies are also considered

Security Exports

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

essential ports of call for UK security companies looking to expand abroad. SELLING SECURITY OVERSEAS While – according to the BSIA’s research – the most significant vertical markets targeted abroad by BSIA Export Council members include healthcare, local and national government, retail and transport, the UK’s security sector is also recognised on the international stage for its capability in delivering larger-scale security projects. Recently, UK Trade and Investment (UKTI)’s Defence and Security Organisation (UKTI DSO) worked with various security industry bodies, including the BSIA, to produce a report on E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

57


OUR

Complete & Secure Audio-Visual Solutions for Mission Critical Environments 

Technical Design

Systems Integration

Service & Maintenance

Security Cleared Personnel

Around-the-Clock Support

We are exhibiting at

24-25 April 2013 Olympia, London Book a FREE ‘Audio-Visual Service Health Check’ or an ‘Emergency Response Call Out’ for your Control Room. Full details will be provided at the Electrosonic stand during the Expo.

Find us at stand G70

Learn More

+ 4 4 . 1 3 2 2 . 2 8 2 3 1 3 | info@electrosonic.com | electrosonic.com


UK SECURITY INDUSTRY  the capabilities and strengths of the UK security industry. This report found that UK companies receive considerable international recognition for their ability to provide reputable, trustworthy services and reliable products. Among the results of this report, it was noted that the UK provides security support to NATO programmes including maritime protection and defence against mortar attacks, and is also a world leader in chemical, biological, radiological and nuclear (CBRN) defensive equipment. Not only that, UK security companies are also increasingly recognised for their skills in providing security for world sporting events – including the Beijing 2008 Olympic Games and London 2012 Olympic Games – and also has extensive experience in border patrol, utilising the latest biometric and forensic equipment at airports and ports, as well as helping secure cyber activity worldwide through specialist systems developed in the UK.

“The BSIA’s research shows that there is a real appetite out there for the best that British security solutions can offer. It is also encouraging to see that when it comes to making buying decisions ever closer attention is being paid to factors such as compliance with industry standards – a key strength of our members – above and beyond initial purchase price.”

Security Exports

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

John Davies, chairman of the BSIA’s Export Council

GOING GLOBAL All of these positive examples of the UK security industry’s capability contribute towards the industry’s international reputation and enable future growth in emerging markets. In 2013, members of the BSIA’s Export Council are working to increase their business in three core target markets: Western Europe, Eastern Europe and the Middle East, with South Africa and Russia also generating interest. The UK Government states that Britain is ranked sixth in the global security export business behind the US, the People’s Republic of China (PRC), Japan, India and Germany. Supporting small and medium enterprises as they develop export strategies is also becoming an increasingly important item on the Government agenda. Recently, the BSIA welcomed the release of a new report entitled ‘Roads to Success: SME Exports’, published in March 2013 by the House of Lords Select Committee on Small and Medium Enterprises. The report, to which the BSIA submitted its own evidence, summarises the results of the committee’s inquiry into what role the Government can play in helping over 4.8 million UK SMEs to boost their export sales, acknowledging the important role that exporting plays in assisting economic recovery. Recognising the potential of British SMEs, in particular their ‘innovation, enthusiasm, creativity and commitment,’ the report insists that ‘more has to be done to disseminate information about exporting – about how to reap the benefits while minimising the risks, how to take the first step and where to go when difficulties arise.’ BARRIERS FOR SMES The report also investigates the barriers to international trade for SMEs, citing the availability of finance, the impact of international regulation and concerns about the infringement and enforcement of E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

59


Lista’s products are ideally suited for use by Engineers, Manufacturers, Counter Terror Units, Forensics Teams, Emergency Responders / Services and Armed Forces. Capable of storing a diverse range of products such as the following:

.. .

Body Armour

.

. .

Special Tools and Test Equipment

Respirators and Breathing Apparatus Counter Explosives Equipment

.

. .

Personal Protection Equipment (PPE)

Decontamination Equipment

Medical kits/supplies

Communications Equipment

Tactical Equipment

Lista UK Ltd. Phone +44 (0)1908 222 333 · Fax +44 (0)1908 222 443 · info.uk@lista.com · www.lista.co.uk Come and see us at the international Defence and Securities Exhibition (DSEi) Swiss Pavilion, London, September 2013


UK SECURITY INDUSTRY

 intellectual property rights as the key issues inhibiting SMEs’ expansion into export markets. These claims are supported by the BSIA’s own research, which indicates that financial factors, including price and local certification costs, are among the biggest barriers facing UK-based security companies wishing to expand their export trade. However, according to a 2010 market report by research company, Keynote, there are opportunities for the UK’s share of the world security market to significantly increase in the coming years, despite the numerous challenges. Increased construction activity prompted by economic recovery is cited as one of the major drivers of future growth, as is the increased reliance of the public sector on private contract security services. This practice of outsourcing police support functions, including custodial services, crime scene management and forensics, is commonplace in other countries – particularly in Europe and the United States – but is still a growing market in the UK. As the BSIA has learned through its continued engagement with Parliamentarians and Police and Crime Commissioners, there still remain some key barriers to the partnership working approach here in the UK, with trust, accountability and the delivery of true value for money three of the most important factors raised in the Association’s discussions. However, there is also clear recognition across the political spectrum of the need to consider new and innovative resourcing solutions within E

Security Exports

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Roads to success: SME Exports The House of Lords Committee on Small and Medium Sized Enterprises has published a report entitled Roads to Success: SME Exports. The Committee calls on government agencies UK Trade and Investment (UKTI) and UK Export Finance (UKEF) to do more to ensure small and medium sized businesses know where to go for help in exporting. There are nearly 5 million SMEs in the UK. The Committee’s report recognises that they have a crucial role to play if the UK is to achieve export-led recovery. Chairman Lord Cope said: “If we are to pay our way in the world in future decades SMEs will play a crucial role. “The good news is that our committee were greatly encouraged by the innovation and entrepreneurship we saw and heard about from small business right across the UK. It was clear to us however that many potential exporters did not know what help was available to them and that the Government could do more to assist SMEs in their contribution towards export-led recovery. “We are calling on UK Trade and Investments and UK Export Finance to blow their own trumpets and promote their services for SMEs. They must work with business organisations, local chambers of commerce, banks and accountancy firms to ensure SMEs who could export know where to get help both in getting started and in building their turnover and profits overseas. “We also heard that accessing finance to export is a real challenge. We believe banks should allow local managers to make loan decisions to companies they know and work with. The formula based approach where decisions are made by distant executives and computers mean banks have lost important local knowledge. UKTI should also do more to help SMEs find alternatives sources of investment when high street banks fail to lend. “Overall we are optimistic about UK SME exporters. We have the advantages of the English language, of the fact that many of our citizens have links overseas and of a long tradition of trading worldwide. Meanwhile, the Internet is opening up new opportunities all the time. But, despite all that, small businesses need help to export. That help is there but not enough SMEs know where to find it.” For more information www.parliament.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

61



UK SECURITY INDUSTRY  the public sector, giving hope that the UK might soon follow in the footsteps of some of its European counterparts, who have successfully transcended these barriers through transparency, mutual trust and a clear definition of responsibilities and limitations. LOOKING AHEAD The future is bright for UK security exporters, as John Davies concludes: “The BSIA’s research shows that there is a real appetite out there for the best that British security solutions can offer. It is also encouraging to see that when it comes to making buying decisions ever closer attention is being paid to factors such as compliance with industry standards – a key strength of our members – above and beyond initial purchase price. The strong performance of Export Council members, and the prediction of better to come in 2013, is a reflection of the industry-leading nature of the innovations that BSIA companies are able to deliver to customers across a wide range of sectors.” With membership across both electronic and manned guarding sectors, the BSIA represents quality companies eager to promote the professionalism of the industry through the developments of Codes of Practice and British, European and worldwide standards.L FOR MORE INFORMATION www.bsia.co.uk/export-council

Security Exports

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Russia buys British: BSIA Export Council active UK security exports to Russia are growing steadily, according to members of the BSIA’s Export Council in research conducted ahead of the Moscow International Protection, Fire and Safety (MIPS) exhibition. Over two thirds of the BSIA’s Export Council are active in the Russian region, with recent research conducted by the BSIA revealing that for 91 per cent of members, business in Russia has either remained steady or has in fact increased in the year since the last MIPS event. According to the Association’s survey, government organisations in Russia are leading the way in the purchase of UK security products, with two thirds of respondents citing this as the most important vertical market targeted by their business in Russia. For the remaining third of respondents, the hotel and leisure sector is the most important vertical market. John Davies, Chairman of the Export Council, comments: “Interestingly, our research has revealed that the

key driver of purchasing decisions in Russia is the initial purchase price, with less importance being placed on added-value factors such as technical innovation and ease of use. “While price is important to everyone during difficult economic times, UK security solutions can deliver far greater benefits than their ‘budget’ counterparts, and demonstrating the capability of UK solutions to deliver effective, holistic security solutions that offer real return on investment will be a priority for BSIA members at MIPS this year.” However, there is an increased awareness among Russian consumers of the value of UK security solutions. John Davies continues: “The increased demand for UK security solutions from Russian customers is a reflection of the quality of solutions and the industry-leading nature of the innovations that BSIA companies are able to deliver to customers across a wide range of sectors in the region.”

Robust storage suitable for use by counter terror units, forensics teams and emergency responders Storage requirements exist everywhere: from common everyday items such as the cereal you had for breakfast, to equipment and material required for the smooth operation of your business. However, storage is quite often one of the last things to be considered during a project or life of a product. Lista is a world leading manufacturer and supplier of workspace solutions, making areas such as workshops, stores and support solutions more efficient, whilst also complimenting an organisation’s LEAN ethos. Lista offers a comprehensive and versatile range with a virtually limitless number of unique storage applications. Whilst there are no standard formulas for storage solutions, with a product range that includes workstations, workbenches, shelving, lockers, and cabinet systems; Lista’s products find applications ranging from armouries and stores, to deployable equipment support solutions; typically reducing the storage footprint by as much as 50 per cent. Suitable for use by engineers, counter

terror units, forensics teams, emergency responders/services and Armed Forces, Lista products are ideal for storing a diverse range of materials. These include body armour; specialist instruments such as hazardous materials identification equipment; and tools and test equipment. Lista products are also ideal for storing weapons ranging from side arms, to man portable anti tank weapons; Personal Protection Equipment (PPE); breathing apparatus; decontamination equipment; communications equipment; counter explosives equipment; and medical kits/supplies. The aim of many governments is to reduce spend, whilst demanding improved availability of assets. Lista’s products can

be used to help meet these aims. Cost savings are achieved through optimised storage of materiel, and efficient use of available space. In turn, this leads to reduced downtime and subsequently increased availability of assets, and a more efficient workforce. Specialist equipment can be very expensive, and risks of damaging expensive assets through last minute or inappropriate storage methods are high. Certified to ISO 9001 and 14001 standards, quality management is of utmost importance to Lista. In addition to first-class product quality, Lista offers a 10-year guarantee on all its products. Lista is available to work with you to develop a storage solution geared towards your specialist requirements. FURTHER INFORMATION Tel: +44 (0)1908 222333 www.lista.co.uk. Come and see us at the international Defence and Securities Exhibition (DSEi) Swiss Pavilion, London, September 2013

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

63


Advertisement

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CEM Systems has been delivering access control and security management solutions for over 25 years CEM Systems have been developing and delivering access control and security management solutions for over 25 years. Throughout this time CEM have continuously developed the core AC2000 security management system and successfully introduced several industry firsts. These include intelligent card readers with built in memory, Power over Ethernet Plus door control, and Portable handheld card readers. emerald™ is CEM’s latest industry first, opening up a world of possibilities for access control now and in the future. As an Intelligent Access Terminal, emerald provides intelligence at the edge, offering improved flexibility, increased security and a user friendly experience at the door. With emerald users get the same best in class security they have come to expect from CEM readers, but with a range of new and innovative features, such as the Remote Applications, that open up a world of possibilities never before feasible. Remote Applications provide the ability to run key applications at the door that are remotely hosted on the CEM AC2000 Database Server. Remote Applications display AC2000 critical statistics and information important for system maintenance Emerald-Advert-IFSEC-178x125mm_hr.pdf

enabling two way communication; for example, emerald users can communicate directly with security personnel when assistance is required. emerald features a custom 4.3” graphical LCD with hardened glass and anti-glare coating displaying predefined messages to cardholders depending on their privileges e.g. Wrong Zone, Lost/Stolen Card, Card About to Expire, Access Granted etc. emerald supports MiFare and DESFire smart card technologies and also features CEM’s innovative offline reader capabilities, ensuring that up-to-date card information for up to 250,000 cardholder records is stored directly in the terminal, allowing for 24/7 access to critical areas. emerald also features onboard Power over Ethernet (PoE) technology which allows the device to be powered through an Ethernet cable, saving on installation time and costs.

such as top system alarms, most recent alarms and most recent card swipes. emerald also features a fully integrated Voice over IP (VoIP) intercom functionality, 1

05/03/13

5:29 PM

A world of possibilities

C

M

Y

CM

MY

CY

CMY

K

emerald™ is a multi functional intelligent access terminal that is revolutionising the security industry. With its sleek design and state of the art custom LCD touch screen, emerald is a powerful card reader and controller in one, featuring fully integrated Voice over IP (VoIP) intercom and a range of Remote Applications that provide a whole new multifaceted access control experience. emerald uniquely opens up

VoIP Intercom

IP Reader & Controller

CEM access control intelligence directly to the edge.

Visit CEM at IFSEC UK, Tyco Security Products stand E10, hall 5

For more information contact us on: T: +44 (0)28 9045 6767 E: cem.info@tycoint.com or visit us at www.cemsys.com/emerald © 2013 Tyco Security Products and its Respective Companies. All Rights Reserved.

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Intelligent Touch Terminal

Remote Applications

emerald™ – The industry’s most multifunctional intelligent access terminal.

64

FOR MORE INFORMATION Tel: +44 (0)28 9045 6767 www.cemsys.com/emerald cem.info@tycoint.com or Visit CEM at IFSEC UK on Tyco Security Products stand E10, hall 5.


COMMUNICATIONS

DUAL-SIGNALLING FOR BETTER COMMUNICATION

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Just months after the launch of CSL DualCom’s dual signalling technology, the Association of Chief Police Officers (ACPO) stated its officers would only respond to confirmed alarm calls CSL Communications Group is a leading international machine-to-machine (M2M) technology investment group. The CSL Group comprises of CSL DualCom, CSL Communications and CSL Connect AB. The CSL portfolio began in 1996 when CSL DualCom pioneered the move from wired to wireless technology in the electronic security industry. CSL have since extended their services to the healthcare industry via CSL Communications offering managed end-toend connectivity for any telecare application. The final strand of the Group is CSL Connect AB which offers the DualCom range of products and M2M services to the Nordic region. With close to two decades experience of the M2M marketplace, CSL plan to replicate the success of DualCom within these new territories and beyond. INDUSTRY LEADER CSL DualCom is the industry leader in the dual signalling market across the UK & Ireland, providing security solutions for hundreds of thousands of commercial and domestic properties. Since its formation,

EN grades with its groundbreaking GradeShift® technology. The dual path options offer a single piece of hardware for every grade of risk, which are both affordable and favoured by insurers and the emergency services. The single path wireless options offer customers even more savings but without compromising security. Due to CSL’s dedication to providing the most reliable protection possible, they supply the award winning multi-network WorldSIM® with every DualCom at no extra charge, offering access to all mobile networks. The combination of the WorldSIM® and the DualCom GradeShift® range reduces line faults more than any other dual signalling service. This means fewer false alarms for the ARC and fewer unnecessary keyholder call-outs for installers and their customers. BEHIND THE SCENES And there’s even more behind the scenes: CSL DualCom are the only signalling service provider utilising a purpose built Network Operations Centre (NOC) to support the DualCom Gemini Managed Network, the

CSL DualCom launched the first dual signalling systems to have interchangeable EN grades with its groundbreaking GradeShift® technology. The dual path options offer a single piece of hardware for every grade of risk. it has pioneered the use of dual signalling technology which provides two separate communication routes to transform the effectiveness of security systems. Just months after its launch, the Association of Chief Police Officers (ACPO) stated its officers would only respond to confirmed alarm calls. Damage to phone lines caused by thieves or line failures had resulted in a 95 per cent incidence of false alarms, costing the police valuable time, money and resources. CSL’s competition soon realised how important this technology was to be and followed suit, launching other dual signalling products in the wake of the industry’s acceptance of this now widely established technology. Continuing to forge forward with industry developments, CSL launched the first dual signalling systems to have interchangeable

engine that powers DualCom signalling. The NOC houses the dedicated Network Team who monitor real-time network feeds and provide early notification of events to ARCs and installers. More recently, CSL have continued to innovate by offering remote upload/ download options to reduce the need and cost of engineer visits and offer a faster and more cost-effective maintenance service. The latest development at CSL is customer access to DualCom Gemini Insight, a specialist web portal which shows customers detailed information on what’s happening across their entire signalling estate at the click of a mouse. L

INDUSTRY FIRSTS CSL DualCom have been responsible for a number of industry firsts. Below is a quick glance at a few of their most revolutionary innovations: • First service provider to offer dual path signalling to alarm installers. • The award winning DualCom WorldSIM® was the first of its kind in the security industry. By roaming to alternative networks based on performance it has been instrumental in the reduction of false alarms. • DualCom IPSIM® technology offers installers enhanced levels of fault diagnostics and connection speeds. • DualCom GradeShift®. technology revolutionised the way alarm installers worked by offering all grades of signalling in a single product. Prior to its release there was a different product for each grade. • GSM Back Up enables the DualCom to make a call via GSM if GPRS is unavailable offering 3 routes of signalling at no extra cost. • G2r RADIO ONLY signalling completely eliminates call costs and does not require a phone line to operate. • Utilising GPRS for sending and receiving signals made signalling more cost effective. DualCom is sold as fixed tariff and can transmit unlimited amounts of data at no extra charge. • DualCom was the first to offer a product with a variable voltage range which allows installers to use one product for security and fire installations. • All Polling calls on DualCom use a freefone number.

FURTHER INFORMATION www.csldual.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

65



RISK MITIGATION

Terrorists often go to great lengths to study their targets prior to an attack. Predictable patterns in the deployment and allocation of security resources can therefore create vulnerabilities “Know your enemy and know yourself, you will not be imperiled in a hundred battles.” – Sun Tzu It’s well known military axiom that you should study your opponent to determine any patterns and weaknesses. We all know that terrorist and other criminals often go to great lengths to study and observe their targets prior to an attack, as witnessed by the preparations taken by the perpetrators of both the 9/11 and 7/7 attacks in the US and UK respectively. Predictable patterns in the deployment and allocation of security resources – things like patrols, canines and checkpoints – create vulnerabilities that can be exploited. Eliminating predictable patterns, in effect randomising them, would remove many of these vulnerabilities and improve the performance and effectiveness of security forces. But how to effectively randomise things consistently over a prolonged period of time has proved to be a challenge. People are creatures of habit and unless great pains are taken to prevent it, we naturally fall into patterns, oftentimes without even knowing it. Having limited resources to meet an unlimited number of threats is another challenge security organisations face. Deploying available resources as efficiently as possible in order to meet the most probably threats is a critical part of the security equation. We only have so much we can do with what we have available, so anything that can increase the effectiveness of these resources can be a great help. After all, allocating our resources efficiently to protect against a wide variety of threats is a daunting task. SOLUTION The solution is to measure our resources against the threat and then deploy them as effectively as possible to counter the threat while eliminating the predictable patterns that create vulnerabilities and weaknesses. This may sound easy in theory, but it’s hard to put into practice. Human beings have biases and tend to fall into habits and patterns, often without even being aware of it. Because it is difficult to consistently achieve randomisation using human schedulers there

has been an effort to develop technological solutions for the problem, using sophisticated game theory models that can take the available resources to the most probable threats and then produce patrol schedules and resource allocations that maximise the effectiveness of the available resources. ARMOR One such system is ARMOR (Assistant for Randomised Monitoring Over Routes), a security risk mitigation and resource optimisation system that has shown great promise in increasing the effectiveness of security teams. Using algorithms derived from game theory to effectively randomise security schedules and plans, ARMOR gives security forces the ability to improve their coverage and maximise the effectiveness of their limited resources. How effective are these systems? The ARMOR software has been successfully

Written by Steve Chambers, Pentagon Protection

THE SECURITY BENEFITS OF UNPREDICTABILITY

forces. Measurements were taken to compare the predictability of patrol patterns both before and after the ARMOR programme was implemented. Other metrics such as the capture rate of guns, fare evaders and arrest warrants issued were also tracked. The results were conclusive. Every evaluation demonstrated the superior effectiveness of the ARMOR software versus any other resource deployment method. One study which compared ARMOR scheduling of canine patrols versus a uniform random schedule showed that ARMOR scheduling resulted in a doubling of patrol effectiveness, allowing the same results to be achieved with half the resources – three canines scheduled by ARMOR achieved better results than six canines deployed using current measures. Scheduling of US Coast Guard maritime patrols also showed an increase in effectiveness once ARMOR scheduling was implemented. Research done prior to ARMOR implementation showed definite patterns to harbour patrol routines. Upon implementation of ARMOR new patrol areas were formed that contained more targets per patrol and thus fewer patrol areas. Using sophisticated software programmes to schedule security patrols may seem unusual but it promises great results. Complex security environments like the London transportation network and similar could benefit greatly from programmes like ARMOR, which makes everyone safer. COVERING MORE WITH LESS All indications are that available security resources will become more limited for the foreseeable future, while the threats we must

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

One study which compared ARMOR scheduling of canine patrols versus a uniform random schedule showed that ARMOR scheduling resulted in a doubling of patrol effectiveness, allowing the same results to be achieved with half the resources deployed in a variety of security environments ranging from airport security to maritime patrols, including real world deployments at Los Angeles International Airport (LAX), the US Federal Air Marshal Service, the US Coast Guard and the US Transportation Security Agency (TSA). SUPERIOR EFFECTIVENESS ARMOR’s effectiveness has been measured using several comprehensive exercises designed to gauge the change in results versus manually scheduled security operations (the status quo). These exercises included software simulations as well as simulated intrusion attempts by various ‘Red Team’

prepare against will most likely increase. Implementing ARMOR, or similar software scheduling programmes, are a way to cover more with less, maximising the effectiveness of our security forces to protect property and lives. Because we believe there are enormous advantages to be derived by implementing the ARMOR software across the security spectrum in the UK and throughout Europe, the SDS Group has partnered with ARMORWAY to promote the system within Europe. L FURTHER INFORMATION 01580 715038 sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

67


www.acalbfi.co.uk

Experience the high performance of thermal IP cameras Meet the new range of ONVIF™ compliant thermal imagers NEW WatchMaster® IP Elite 3000 Series from DRS Technologies Delivering a level of performance previously unseen for day and night surveillance with affordable thermal IP imaging cameras.

EW s N the Serie f o 00 C n 0 o Call our experts in imaging solutions on 01908 326308 ati lite 3 he NE r t ns IP E at t o or email sales-uk@acalbfi.co.uk for a demonstration em ter® May 104 d C s e Liv chMa 13-16 tand S t Wa FSEC all 4 I H Get in touch:

The system is both an analog and an Internet Protocol (IP) networked solution. It conforms to the Open Network Video Interface Forum (ONVIF™) Profile S standard

Tel : +44 (0)1908 326326

design. consult. integrate.


IFSEC 2013

IFSEC CELEBRATES 40 YEARS As technology develops at a rapid pace, security and fire solutions are becoming more advanced. IFSEC International provides an opportunity to source, compare and test the latest products, as well as debate the key issues in the industry Marking the 40th birthday of IFSEC International, the IFSEC community were invited to nominate 40 of the most influential global security and fire professionals in the industry. IFSEC 40 commended the leading industry faces for their contribution to the global security and fire sectors, recognising the impact they have made. Leaders from global companies including BT, Siemens, G4S and many more were distinguished from the crowd for the overwhelming knowledge and insight they present to the industry. Martin Gren, Axis Communications was voted the most influential professional in the industry, having been at the forefront of the recent IP camera revolution. While no longer CEO of Axis, Gren remains instilled in the company as a senior member on the board. Utilising his knowledge, the video surveillance market has been defined by the network camera, pushing competitors to keep pace. As the IFSEC community recognised, Gren has had significant influence on the industry and has carved a path for others to follow. The top three nominees highlighted that the industry recognise the diverse sectors it covers. Mike Howard, Microsoft chief security officer was placed second, as a key brain behind protection against software piracy, as well as, protecting server and building integrity. Whereas, Per Bjorkdahl, ONVIF chairman was positioned in third place for being at the forefront of continued physical security development through ONVIF. KEEP UP WITH THE PACE As technology develops at a rapid pace, this is impacting the capabilities of security and fire. It is important that the integration across all sectors is recognised to optimise system potential, ultimately providing more advanced solutions. IFSEC International provides an opportunity to source, compare and test the latest products, while finding out how these can work best across a business. Attracting more than 650 leading solution providers, IFSEC is the biggest marketplace of its kind. Demonstrating its commitment to the security industry by providing an insight into the future of security, keynote sessions from the top names in the industry will take place.

Covering every area of security and fire, there will be a host of suppliers, education, advice and experts to suit your needs. The IFSEC show areas include; counter terror, CCTV & video surveillance, access control and biometrics, intelligent buildings, integrated security, IP and networks, lone worker and physical security. NEW FEATURES Brand new for 2013 IFSEC Speed Networking provides is the perfect solution to networking in a busy environment, allowing installers to make the most of their time away from projects, by gaining new business. This presents security managers, heads of security, building managers and project managers with the opportunity to get great advice about the best and most cost effective products to make their business secure. The new IFSEC Academy provides access to seven free education theatres allowing attendees to engage in the biggest issues in security from the industry leading lights. Plus, discover real life case studies of how the latest products and solutions have been successfully applied. With the chance to gain CPE or CPD points towards professional development, IFSEC International helps to enhance knowledge and provide training to best tackle business needs. Keynote speakers will enhance this through the Centre Stage Theatre, where counter terror solutions will be addressed including a seminar on counter‑terrorism strategies delivered by Don Randall MBE, head of security at the Bank of England. With a range of theatres covering issues from counter terror to lone workers, integrated security to IP and networks, intelligent buildings to access control and biometrics, CCTV and video surveillance to physical security IFSEC will cover all areas in its groundbreaking theatres. Addressing leading industry stories, speakers will address current trends and the impact they are having on the wider sector.

IFSEC 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Taking a holistic approach to security, fire, IT, data management and business solutions IFSEC Academy has a dedicated Intelligent Buildings theatre to provide combined fire and security education for both events, focusing on the common area of systems integration and convergence. The education theatres are about solutions that open up opportunities for inter-operability and information sharing between fire, security, IT, data and building management systems. SECURITY THEATRES Each of the four theatres caters for different visitor needs. The Security Management Theatre is aimed at security managers and will allow you to earn CPD points while learning more about the key issues that you face every day. 2012 sessions included; dealing with the insider threat, procuring security services, state of the security nation, sustainable security, demands on today’s security manager and organisational resilience. Supporting the UK’s 8 million lone workers, the Lone Worker Education Theatre will be providing lone workers and the companies who have a duty of care to them with a dedicated education theatre, focusing on case studies and best practice for both channel and end user visitors. Tavcom, the experts in IP will yet again be providing expert insight for our trade market on CCTV, IP, access control and much more. They’ll repeat their sessions on each day of the show, so you don’t need to be concerned about clashes with other areas of our programme ipAssured Education Zone Anixter will host the ipAssured Education Zone, an exclusive area where a team of experts will offer presentations on leading industry trends and discuss the latest in IP infrastructure and technology with the industry’s foremost technical experts. The sessions will be tailored for both channel and end users. In addition to an inclusive Q&A session, attendees will have the opportunity to discuss issues and opportunities with the presenters following each session. Taking place on the 13-16 May 2013 at the NEC Birmingham, IFSEC International 2013 is part of UBM’s Protection and Management Week. Registration for IFSEC International is free and also gives badge holders access to FIREX International (www.firex.co.uk), the Facilities Show (www. facilitiesshow.com) and Safety & Health Expo (www.safety-health-expo.co.uk).

IFSEC e ill b 2013 w rating t demonsitment to m its com rity industry u the sec ing top-name by stag te sessions keyno as future as well ights ins

FURTHER INFORMATION www.ifsec.co.uk/psig

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

69


Innovative Solutions Defending Critical Assets Around the World! - Full range of PAS 68 tested solutions - Continuous development - Innovative - Future Proof - Industry leading experience - configuration, selection, effectiveness - Unique: PSSA verified solutions - Range of Impacts 3.5T - 7.5T at range of velocities - Leading UK Integrator - solutions based on real experience - 38 year credibility you can trust

Broughton Controls are part of CRH FSG (UK) Ltd

The U.K.s leading total solutions provider. Broughton Controls will be exhibiting on stand I40. www.broughton-controls.co.uk

Is a division of


AIRPORT SECURITY

POKED, PRODDED, AND IRRADIATED US media outlets have been awash with stories about the latest Transportation Security Administration (TSA) faux pas over body scanners in recent months. The agency announced in mid January that it would replace the much-derided backscatter x-ray scanners deployed at 174 of the larger airports across the country with reputedly safer millimeter wave devices designed to protect passenger privacy. What it didn’t do was inform the very many smaller airports where the millimeter wave technology is already in use, that it would be ripping out their body scanning kit to enable the replacement programme to go ahead. PRIVACY CONCERNS Congress forced the switch from one scanning technology to another following considerable disquiet over safety and privacy issues. The lawmakers originally specified a 1 June 2012 deadline for the two manufacturers of TSA deployed body-scanning hardware, Rapiscan and L3, to retrofit their equipment with suitable privacy software. This deadline was subsequently extended to June 1 2013, mainly to give Rapiscan more time to comply. It ultimately informed TSA that it wouldn’t be able to do so at the start of the year. The millimeter wave body scanners, some of which having been deployed for only a few months, are installed at 49 airports across the country. Airport managers have complained vociferously about the equipment being hauled away with limited or zero notice. Officials at one Montana airport threatened agency contractors with arrest when they turned up to remove the L3 scanners installed in a terminal expensively remodeled at taxpayer expense to accommodate them.

and decreased overall security of the national aviation system. TSA said in a statement that it would cost about $2.5 million to remove the machines from the 49 smaller airports and reinstall them at bigger facilities. Rapiscan’s parent company added that it will face a one-time charge of $2.7 million to cover the money spent trying to develop software to meet mandated privacy requirements whilst moving body scanning machines between airports. SCANNERS BACKFIRE The agency’s sudden fondness for all things millimeter wave may well be premature since reaction to the hardware on this side of the pond is perhaps best described as mixed. European airport operators cite excessively high false alarm rates as the principal drawback and given that few alternatives are available, have effectively been forced into seeking complimentary personal search hardware solutions, or reverting to manpower that has potentially higher operational cost. One of these complimentary systems utilises Thermo Conductive InfraRed technology to rapidly resolve false positive results. This type of screening is considerably less invasive than a physical pat down, has non of the health or privacy issues that have dogged earlier generation body scanning hardware and readily locates a vast array of contraband concealed under passenger clothing. Defender 921 from hardware systems supplier Broughton Controls has been garnering much interest from United Kingdom airport operators. This mini portal Thermo Conductive Infra-Red device has already undergone a highly successful trial at Bristol Airport, during which it was able to identify the full gamut of items that might be concealed on the body including weapons, powders, tobacco, gems, precious metals and other items while operating in a smaller footprint and at a lower cost.

Thermoive t ConducRed Infra- is less ogy technol than a pat invasiveand readily down a vast array locates oncealed of c and contrab

COSTLY BUSINESS Regional airports say that the decision to transfer their body scanning hardware will result in increased delays, more pat-downs

Written by Chris Yates

Following the annoucement from the TSA in America to remove backscatter x-ray scanners from airports – which produce revealing images of a person’s physique, Chris Yates asks if there is a better way for passengers to get through security check points

The Bristol Airport test was organised by the independent test and evaluation service ICTS VeriSys under the technical guidance of Marian Langford, a science advisor at the service. VeriSys trained five screeners at Bristol Airport to use the technology to scan hundreds of passengers during the trial. She said: “The mini‑portal performed well as a standalone scanner and as an adjunct to the larger existing system. Almost forty percent of passengers said they actively disliked pat-downs, or said that they would prefer to be screened by a portal.” Defender 921 will soon undergo a further operational trial with Manchester Airport Group (MAG) at one of its key facilities. The airports operator is understood to be keen to find a relatively inexpensive but highly accurate means to verify that travelers are not carrying contraband.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CHANGE COMING The International Air Transport Association (IATA) has talked for years about its vision of the checkpoint of the future. It now says that it hopes passengers will be able to breeze through a checkpoint non-stop within the next decade. There’s no doubt that the current architecture employed to keep us safe is well past its sell by date and in need of rapid innovation. The number of passengers screened in an average hour at the average airport has fallen markedly during the past twelve years. With passenger numbers constantly climbing, it’s very evident that gridlock is just around the corner unless new security solutions are found. IATA’s vision is a checkpoint harnessing advanced biometrics to verify identity and standoff screening solutions to make security clearance a much more streamlined and better experience. Many of the technologies required to achieve this once lofty goal are actually available in one guise or another today, but will take time to filter into the aviation environment. The trace explosive detectors of today might be replaced by standoff overt or covert laser scanning. Laser Optical Engineering utilises this method to accurately identify the tiniest particles of explosive material, without anyone having to come into contact with a machine. These are visionary solutions that could ultimately help in deliver the long held desire expressed by the aviation industry to take the hassle out of flying. L FURTHER INFORMATION www.yatesconsulting.co.uk

Issue 13 | COUNTER TERROR BUSINESS

71


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PRODUCT CERTIFICATION

PERIMETER PEACE OF MIND

Written by Ritchie Bignell

The Perimeter Security Suppliers Association (PSSA) has introduced a verification scheme to provide confidence to perimeter systems buyers and users that products conform to internationally recognised quality standards. Ritchie Bignell explains the three elements of the verification process Another year passes and more progress has been made with the PSSA verification schemes. This article will give the reader an update on where we are on the journey to continue to give users of perimeter security products peace of mind. In these times of austerity, careful consideration has to be given for any pound, dollar, or euro spent. Not only in terms of the front end investment but the whole life costs of the scheme, as best value for money has never been so topical than today. From a personal point of view, we have recently had the experience of taking products through the product verification scheme. The process focuses on ensuring the following are in place: An UKAS accredited ISO9001:2008 management scheme; Relevant PAS 68 crash test rating, and Full CE marking. THE THREE ELEMENTS The relevance of having these three elements in place is to ensure the consistent supply of product(s) to clients that fully meet the relevant specifications, but to also give confidence that the product(s) will do ‘as it says on the tin’. Turning to the second scheme, the specifications appertaining to fencing, this group is currently in the process of running a pilot with a live project. In essence, a full specification has been developed with the client and as the project progresses, interim assessments are completed to critique the proposed PSSA fencing scheme. This is expected to be completed shortly, where it will be presented to the board of the PSSA for comment and approval. In regards to the third scheme, which deals with the installation of PAS rated and non PAS rated product(s) into a fully integrated and functioning security system, the PSSA is currently in dialogue with key stakeholders. Arguably this is the most important scheme, as this is where the other two schemes come together to deliver a cohesive system. We are also embracing the whole life cost element into the installation scheme, as PSSA members are interested in relationships with end users built on confidence and cost effectiveness of the product(s) supplied and/or installed.

The ce relevan the g of havinrification ve product is to ensure scheme sistent and the con specification t relevan ly of correct supp ducts pro

72

COUNTER TERROR BUSINESS MAGAZINE | Issue 13


Everyone wants to deliver systems that are not only secure and protect the people and property involved, but are safe, cost effective and reliable. With a supply chain that can be long, involving architects, specifiers, contractors, consultants, suppliers, and FM organisations ELIMINATING POOR PRACTICE Many PSSA members can readily recall stories where an installation will never be able to deliver the level of required security consistently due to poor specification and/or delivery of product(s). Whilst this can make a good anecdote it does have the side effect of reducing the creditability of the entire industry and often leads to accusations or name calling as the issue comes to light. This can then result in legal action or compensation payments, which whilst are painful to the recipient do pale into insignificance if security is actually breeched by a criminal or terrorist attack. Therefore, the rationale for the PSSA to embed into the industry three complimentary schemes to reduce or eliminate poor practice must be

The benefits of PSSA verification Credibility with customers, who now have an independently verified set of criteria on which to judge a product Distinction from suppliers and products not able to meet PSSA’s rigorous standards, including imported products Clear, transparent evidence that suppliers claims of compliance and testing are correct and not misrepresentations Alignment with and support for national security strategy Protection of high margin business

beneficial. Also, whilst the PSSA cannot directly control the way perimeter security products are procured, it must and does take action to influence how they are specified and selected. The reality is that everyone involved wants to deliver systems that are not only secure and protect the people and property involved but that they are safe, cost effective and reliable. With a supply chain that can be long in terms of having architects; specifiers; contractors; consultants; suppliers and FM organisations involved. The supply chain may also be deep in terms of various suppliers being involved; with specialist expertise for differing advice, it is little wonder that the end user may feel short changed at the end. Ultimately, getting all these stakeholders involved to communicate and integrate effectively involves a delicate balance between politickings; commercial awareness; relationship building and technical compatibility can be a mammoth task. The PSSA has designed the three schemes to compliment the CPNI Hostile Vehicle Mitigation operational requirement system. This should enable the front end requirement(s) generated by the end user to filter through to the suppliers of the perimeter security product(s), so that when the system is handed over to the client, it is effective and secure. With the UK being recognised as the global authority on crash tested products, the PSSA is becoming another point of contact for overseas organisations seeking advice. Clearly, having an industry with suppliers with a strong reputation can only bring further benefits. Finally, the PSSA is extremely keen to engage with as many stakeholders as possible during the design of all three

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

What is the PSSA Verification Scheme? High security perimeter systems including Hostile Vehicle Mitigation and high security fencing have an important role to play in an organisation’s perimeter security strategy. The Perimeter Security Suppliers Association (PSSA) has introduced a verification scheme to provide confidence to perimeter systems buyers and others that products supplied by its members conform to internationally recognised quality standards, providing assurance that products are fit for purpose in that they are designed to meet customer, market and regulatory requirements; consistently manufactured and supplied conforming to their agreed specification; when in use produce the intended performance outcomes specified by the customer. Following a rigorous process of evaluation of both a supplier’s management system and verification of the product, authority to use the PSSA Verification Mark is given and the product publically listed. schemes. Also, once a scheme has been implemented, on going dialogue with stakeholders is critical, as situations change with new technologies or threats. The PSSA is committed to evolve the schemes to address these changes, as our rationale is to protect people and property in the safest and most cost effective manner possible. If you are interested in engaging with any of the schemes, especially in helping the PSSA develop them to meet current and new needs, contact the PSSA. L FURTHER INFORMATION www.pssasecurity.org

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

73


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HOSTILE VEHICLE MITIGATION

BRITISH COMPANY ENTERS GLOBAL SECURITY MARKET

Vehicle barrier specialist ATG Access is on track for UK and international expansion after securing significant LDC investment

The management team of ATG Access, the global leader in high security vehicle barrier systems, is making great strides towards its plans to target UK and international growth, after securing a significant minority investment from leading midmarket private equity investor LDC. ATG Access, which is based in Haydock, Merseyside, and employs over 70 people, is a designer, manufacturer and supplier of anti-ram, access control and high security vehicle barrier systems. The company’s products are increasingly being used to secure buildings and venues from vehicle borne attacks and have been installed at locations including Horse Guards Parade in London, Heathrow Airport, Changi Airport in Singapore, Doha International Airport, Shanghai Expo Centre, the Malaysian Prime Minister’s

office and a wide range of government and infrastructure facilities around the world. High security vehicle barrier systems are designed into all new major infrastructure projects, such as airports, stadia, railway stations, office developments and shopping centres. The company, which recorded sales of £16.4 million for the financial year ending April 2012, currently exports to over 40 countries and has secured a number of prominent international contracts. RAPID EXPANSION With the backing of LDC, ATG Access plans to capitalise on the rapid expansion in major infrastructure investment in the Middle and Far East, South America and Africa, as well as demand in the UK and US for both new and retrofit infrastructure projects. The

ATG Access plans to capitalise on the rapid expansion in major infrastructure investment in the Middle and Far East, South America and Africa, as well as demand in the UK and US for both new and retrofit infrastructure projects. 74

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

business will also explore potential bolt-on acquisitions which add to its market-leading product suite, as well as continuing to invest in significant product development. Glenn Cooper, CEO of ATG Access, said: “We are a proud British manufacturer that has developed into the leading player in the global high security vehicle barrier systems sector through strong contractor and distributor relationships, as well as best in class products and expertise. However, there remains significant opportunity in emerging markets where investment in infrastructure is on the rise. “LDC’s investment provides not only the capital to expand, but also additional strategic input and access to its international network, which will lead us into the next stage of our development.” DEVELOPMENT Directors Ged Gould and Carl Wormald led the deal for LDC’s North West office. Ged Gould, who will join the board of ATG Access, commented: “Heightened global security risks have raised awareness and the need for solutions to counter the threat of vehicle-borne attacks. ATG Access holds a dominant position in this high-growth sector and has enormous potential to expand in the UK and in new emerging markets. “We will enable ATG Access and its experienced team to execute its organic growth plan, through strategic and operational advice, as well as supporting selective acquisitions to widen its product portfolio.” The deal follows a successful year for LDC’s North West office, which invested in corporate travel management company TD Travel, business-to-business wireless internet service provider Metronet, legal services company Keoghs and Bifold Group, the leading manufacturer of switching instrument valves and pumps for the oil and gas industry. COMMITMENT Carl Wormald, head of LDC in the North West, concluded: “ATG Access is a strong example of the businesses that we are looking to back, given its status as an advanced manufacturer, buy and build potential and appetite for international expansion. Following a record 2012 in terms of investment, we remain as committed as ever to supporting the North West’s ambitious management teams, despite the challenging trading environment, to expand their businesses and capitalise on growth.” Addleshaw Goddard (Paul Medlicott) provided legal advice to LDC, while KPMG (Jonathan Boyers) and DLA Piper (Jonathan Watkins) advised ATG’s shareholders and management on the deal. L FURTHER INFORMATION Tel: 08456 75 75 74 www.atgaccess.com sales@atgaccess.com


PERIMETER SECURITY

BRISTOL AIRPORT IMPLEMENTS RADAR BASED SURVEILLANCE SOLUTION

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CCTV at Bristol Airport uses Navtech’s AdvanceGuard AGS800-X, which scans a full 360o every second with a range resolution of 30-45cm, detecting vehicles, humans and animals in all weather conditions Track history visualisation allows review of previous incursions based on criteria such as time and location. Complete track history can be displayed, showing exactly where an intrusion took place and where the intruder went. Sentinel supports OpenStreetMap, and displays scaled maps within the scan window.

Passengers expect quick access to Airport terminals; freight shippers want access to warehouses; aircraft, service vehicles and ground crew need movement airside; and other employees must get to work. These unique circumstances render the use of physical barriers difficult if not impossible. Critical infrastructure installations, such as nuclear power stations, have used radar to address the conflict between operational and security criteria for years, and at Bristol Airport, Navtech Radar’s wide-area detection and monitoring is proving extremely effective. Bristol Airport use CCTV to protect its perimeter. The close proximity of a Critical Point (CP) was deemed a security risk and monitored by manned guards. The area is used as an overflow car park, adjacent to the flying club. The Department for Transport directed that security should be upgraded. Thick fog and heavy rain are common and vision-based systems and video analytics failed to detect and track all incursions. Schneider Electric, who led the security upgrade, turned to Navtech Radar. “Schneider Electric recommended AdvanceGuard based on its all-weather capabilities and operational experience at other airports. A further major factor was that the solution demonstrated the lowest false alarm rate as well as offering superior track and trace capability,” says Chris Ware, head of security at Bristol Airport. Navtech specified a compact, high-

performance, 360o scanning radar sensor – AdvanceGuard AGS800-X. Scanning a full 360o every second with a range resolution of 30-45cm, it can detect vehicles, humans and animals in all weather conditions. The AGS800-X is housed in a lightweight, IP67-compliant enclosure and features an industry-standard interface for easy integration and multi-radar solution. THREAT LEVELS The data from the Navtech AGS800-X radar is processed by the witness analytics software, a suite of six integrated modules, witness manages all system functions – from tracking targets and controlling cameras to handling the complex algorithms that analyse target behaviour and assign threat levels. It allows users to define detection zones and rules that dictate when alarms are triggered. Sentinel is an intuitive on-screen interface, that allows for active detection zones, replacing physical barriers with ‘virtual gates’ for unrestricted movement, monitoring and change of status. For example at specific times, a watch needs to be kept on vehicles or people moving in one direction but not another, or, any movement is permitted in one area but a total prohibition zone is safeguarded elsewhere. With virtually no limit to the complexity of the rules, the pseudo-intelligent monitoring mimics a human observer. witness’ classification module evaluates target characteristics; person or vehicle.

CRITICAL POINT PROTECTION Bristol Airport established a warning area around the CP and any encroachment by intruders results in an alert. All potential threats are displayed on Sentinel and updated in real-time. A sophisticated set of direction rules, complete with geo-fenced alarm zones, allows witness to generate alerts only when a threat moves into the CP from the flying club. AdvanceGuard provides comprehensive wide-area detection and tracking, however, visual confirmation of an incident is necessary. At Bristol Airport, AdvanceGuard is integrated with an Esprit thermal imaging camera supplied by Pelco. The Esprit TI can track any identified threat using bearing and range instructions provided by witness. Chris Ware is impressed with its performance: “As tested, market-ready products, AdvanceGuard met the short lead times necessary for our high-priority project and good on-site and remote support from Navtech Radar helped to smooth the installation process,” he says. “The system’s very low false alarm rate, which was proven during testing, and its ability to work in all weather conditions have affirmed the choice. To date, the system has met all of our expectations. Operational benefits have included AdvanceGuard’s automatic tracking capability and the rule and zone setting flexibility within witness.” “The system’s alarm log and operator acknowledgement features also provide an audit trail for both employer and employee. Staff can be seen to have followed procedures because there is now a security system in place that documents that they have done so.” L FURTHER INFORMATION IFSEC 2013, Hall 5, Stand C103 For more information visit www.navtechradar.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

75


Hostile Vehicle Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HOSTILE VEHICLE MITIGATION

SAFETYFLEX STRIKE GOLD AT LONDON 2012 OLYMPICS Fresh from its success in 2012, Safetyflex has recently celebrated securing its first international order of more than 3,000 PAS68 bollards at secure locations across Singapore The world’s number one manufacturer of PAS 68 spring steel barriers and bollards has laid the foundations for a solid 2013 after celebrating a string of UK contract wins in 2012, and becoming a preferred supplier of anti-terrorist bollards to the London 2012 Games. And fresh from securing work on more than 55 sites within the last 12 months, including multiple Olympic venues across the UK, Safetyflex Barriers has also had good reason to be cheerful in early 2013. The firm, which is a division of the GME group with operations in the Midlands, Yorkshire and Scotland, has landed a large export order to Singapore. NEW PAS 68 SINGLE REMOVABLE SUPER LIGHT BOLLARD Unlike standard steel tube bollards, Safetyflex’s superlight, energy absorbing crash rated PAS 68 single removable bollards are manufactured by using a special composition of spring steel allowing them to absorb extreme amounts of energy/impact thanks to its flex technology.

76

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

The bollards have a shallow foundation of 200mm and a base plate weighing only 47kg and has been tested to British Standard PAS68 at 30mph and 40mph. The system is believed to be one of the most economical bollard systems in the world, and no heavy machinery is needed during installation. Director Marcus Gerrard said Safetyflex has enjoyed phenomenal success over the last 12 months.

to the London 2012 Games has strengthened our reputation even further,” he said. NEW PAS 68 SHALLOW MOUNT RISING BOLLARD Gerrard continued: “We’re really proud our new manually operated shallow mount rising bollard was used extensively for multiple Olympic venues, and other UK sites, ranging from sports venues to high security sites.

Safetyflex has designed a PAS68 Security Planter which is believed to be the smallest of its type in the world. Crash tested with 7,500kg at 40mph, and with a weight of only 100kg, it is one of the lightest crash rated PAS68 planters around “Safetyflex is now firmly established as the world’s number one manufacturer of PAS 68 spring steel barriers and bollards and becoming a supplier of anti-terrorist bollards

“Despite this huge success we are not resting on our laurels. Safetyflex is at the pinnacle of Research and Development (R&D) and are continuing to launch new products to market.” E


NEW PAS 68 CRASH RATED PLANTER Among new products designed by Safetyflex is a PAS68 Security Planter which is believed to be the smallest of its type in the world. The planter has been crash tested with 7,500kg at 40mph, and with a weight of only 100kg is one of the lightest crash rated PAS68 planters on the market. NEW PAS 68 BABY ANTI-RAM BOLLARD Safetyflex has also launched a baby PAS68 bollard – the Carstopper 30. The bollard has been tested with a 1,500kg car at 30mph and boasts a shallow foundation of only 200mm which can be removable if needed. The product has been designed for protecting sites such as retail parks and industrial warehouses and can be installed either as a single bollard, a removable bollard, or a long line of static bollards. It also has a shallow foundation of only 200mm. EXPORTING TO NEW MARKETS Fresh from its success in 2012, Safetyflex has recently celebrated securing its first international order. The firm has landed an order for more than 3,000 PAS68 bollards at secure locations across Singapore. Gerrard said Safetyflex is attracting worldwide attention and interest. “We’re delighted to be attracting interest from sites and projects all over the world. We see this as a massive area of growth for Satetyflex and securing the work in Singapore is a landmark for the company we’re are proud of,” he said. “As part of this exciting growth we

Hostile Vehicle Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

are also putting together a new global distributor base to market and sell our products across the globe.” STRONG PAST, SOLID FUTURE Safetyflex Barriers is part of the GME group, which was born when founder Rob Gerrard bought a spring manufacturer based in Sheffield in 1986. The company’s engineering division was established by Rob in 1971. The group has firmly established itself as one of the leading spring makers in the UK and has its headquarters in Coventry and sites in Sheffield and Coatbridge in Lanarkshire. Rob said: “Our expert team has amassed more than 40 years experience in manufacturing suspension systems and have established ourselves as a leading player producing anti-terrorism security measures. “The spring technology in our products is proven to provide the best defence and even in the event of an attack our products not only protect whatever they are guarding but also mean only the damaged pillars will need replacing rather than a whole structure. “The quality and safety of our PAS68 security systems are there for all to be seen which means we are constantly being approached by organisations interested in using our products, from across the UK and now even further afield.” L FOR MORE INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry. Tel: +44 (0)24 76 664911 www.safetyflexbarriers.co.uk

Sites Safetyflex Barriers are installed • The O2 • Excel Centre • Ricoh Arena • Titanic Centre Belfast • St James’ Park • Wimbledon • Key London Sites • Horse Guards Parade • Numerous data and cash centres

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

77



INFOSECURITY EUROPE 2013

IT Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CYBERTERRORISM: COUNTERING ONE OF SOCIETY’S BIGGEST THREATS A visit to Infosecurity Europe 2013, which takes place on 23-25 April at Earls Court, London, will give visitors an insight into the latest methods employed to fight cybercrime Over the last year we have witnessed security attacks against the worlds’ largest organisations, and cyber-terrorism has increasingly been viewed as one of the biggest threats to society. However, does this mean organisations are beginning to take the threat more seriously and are starting to implement cyber strategies into their business? The UK Government certainly seems to have upped its game, with it recently announcing plans to develop a new cybercrime emergency response unit and a cyber reserve forces army. EXECUTIVE ORDER The US is also taking action with the recent Executive Order from the Obama Administration on improving Cybersecurity. These two initiatives will drive businesses to follow suit and take action. At the Infosecurity Europe show - held at London Earls Court Exhibition Centre between the 23rd and 25th of April 2013 – thousands of IT security professionals will be visiting to see the latest technologies and gain insight

from the industry’s leading authorities and their peers in similar industries. The 2013 show is held against the constantlychanging threat landscape of four main types of electronic threats: politically motivated hacktivists; cybercriminals seeking to monetise their frauds; rogue states, and cyber terrorists looking to both promote their cause to the wider majority and, of course, educate their radical colleagues using the Internet. Against this complex background there is a rising tide of malware, spear phishing and an increasing awareness that - this time around - the cybercriminals might just be winning the battle against the security white hats. Celebrating its 18th year, the show provides a thought-provoking programme of features including, a diverse range of new IT security products and services from over 350 exhibitors and an unrivalled education programme. There are over 70 vendors from overseas including France, Israel, USA and Scandinavia and at least 50 new security vendors in the New Exhibitor Zone. The show serves an audience of

more than 12,000 unique visitors, of which 46 per cent are decision-makers and influencers. For most IT security professionals, time is a scarce commodity, which is why Infosecurity Europe has established a reputation for offering the most effective information security education programme in the industry. In just three days you can meet all your educational needs with the keynotes, business and technology seminars, information security exchange, security workshops and the technology showcase. HOT TOPICS Research carried out by the show organisers has found that the topics that are causing most concern for 2013 are risk mitigation, spending levels, growth of cybercrime, what does the future have in store, and how to develop an incident response plan. The education programme with over 100 speakers has been developed following extensive consultation with the information security end-user community and an E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

79


Have greater visibility and control woven into the fabric of your network Traffic Visibility Fabric™ from Gigamon

Is your network reaching a critical tipping point? New technologies such as virtualisation, cloud, mobility and big data are placing ever bigger demands on your network. Soon, you will reach the point where you can no longer increase performance without increasing complexity and cost. Gigamon has the answer…

Visibility increases performance and reduces complexity The Gigamon Visibility Fabric works across physical and virtual network environments to: • Remove congestion by delivering relevant traffic only to network tools • Increase network performance and efficiency

• Lower network complexity and operating costs

• Scale easily and make networks much simpler to manage Many of the world’s most successful enterprises, data centres and service providers now choose Gigamon intelligent traffic visibility networking solutions. Shouldn’t you find out why?

www.gigamon.com To learn more about how Gigamon can improve the efficiency of your network, or to arrange a ‘Gigamon in Action’ demonstration, call 01344 859870


INFOSECURITY EUROPE 2013 î † advisory council of CISOs, to identify the most critical issues, topics and challenges for them in 2013. Key speakers include CISOs from: News International, Santander, The Post Office, Betfair, Unilever, Channel 4, Ministry of Defence, Metropolitan Police, Bank of England, Network Rail, Microsoft, Nottingham City Council, BAA, Bank of America Merrill Lynch, Philips and EasyJet.

Embedding IT security into the organisation has always been an issue, how to make it an integral aspect of the effectiveness and success of an organisation is essential, to gain consumer trust and profiting from new business channels

RELEVANT KEYNOTES The opening keynote will be a question time, on national and international cyber security, looking at what the threat is and what the government are doing to help information security professionals in the battle against cybercrime. A keynote on risk and fostering a risk based approach to information security will look at understanding risk exposure and applying risk management, which will improve organisations security posture and cyber resilience. Effective risk assessment and risk metrics can be used internally to add value business, drive accountability and prioritise investment. The keynote will be panelled by Andrew Rose, Analyst at Forrester. Joining him on the panel will be Amar Singh, CISO for News International, Michael Paisley, Head of Operational Risk at Santander, Serge Baudot, CISO of EasyJet and Bob Mann, CSO at OFGEM.

complex, but how is data secured within the supply chain. As organisations share more information with third parties and there are multiple communication channels, it becomes difficult to control where data is and if it is secure. If a third party suffers a breach, organisations are still liable for their data and can be fined for this compromise. This session will be moderated by Andrew Davis, Analyst at Information Security Forum, who will be holding a panel discussion with Mark Pearce, Head of Information Security at the Post Office, Mark Jones, CISO at BAA, Alistair Wardell, Head of Client and Supply Chain Security, AON and Steven Babb, Head of Information and Technology Risk at Betfair. As security threats are continuously evolving, it is becoming increasingly difficult for organisations to keep on top of current threats and looking to the future. A quick fire Q&A and analyst insight into scanning the threat horizon and predicting future risks will be with Andrew Rose, Analyst at Forrester Research, Wendy Nather Analyst from 451 Research and Bob Tarzey, Analyst from Quocirca. Embedding IT security into the organisation

THE SUPPLY CHAIN Supply chains are integral to how businesses operate, but as they become increasingly

IT Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

has always been an issue, how to make it an integral aspect of the effectiveness and success of an organisation is essential, to gain consumer trust and profiting from new business channels. However it seems in organisations that information security is overlooked in organisations, and there is limited awareness at all levels. A panel discussion with Brain Brackenborough, CISO of Channel 4, Simon Lambe, Head of Global IT Security of Dyson and Phil Cracknell, Head of Information Security at TNT Express, will address how organisations can embed information security in a business and change perceptions. THE CYBER CRIMINAL Who is the cybercriminal? A financially motivated, disgruntled employee? A supplier? A politically motivated hacktivist? A terrorist? A member of organised crime syndicate? With organisations battling against cybercriminals, how can they limit the attack techniques, motivations and threats? The panel discussion with Adrian Price, Head of Information Security at the Ministry of Defence and Arnie E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

81



INFOSECURITY EUROPE 2013

IT Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

2013 Education Programme The Business Strategy Theatre, sponsored by Experian Learn more about the strategic challenges and issues facing management, CEO’s and other senior executives and impacting how effectively an organisation protects itself against the latest security threats.

 Bates, Head of Information Security at Scotia Gas Networks will look at the strategy and architecture an organisations needs to put in place to defend themselves from these threats. With the rise of BYOD and consumerisation of IT, and the arrival of 4G, there has been a cultural change in the way people work. This includes flexibility, the mobile workforce always being connected, having the latest technologies and devices to enable them to do their work and fast connections. BYOD is here to stay and is creating a host of information security challengers, around policy, data and usage. Nigel Stanley, Analyst at Bloor Research will be moderating a panel discussion with Peter Baird, Group Head of IT Compliance and Governance and Interim Group Head of Information Security at Tui Travel, Thom Langford, Director, Global Security Office at Sapient and Phil James, Information Security Director at Hyder Consulting will look at managing mobile devices securely and embracing BYOD and consumerisation. The keynote on securing critical national infrastructure will cover cyber security strategies for SCADA, industrial control systems, real time systems and smart grids. The cyber security and resilience challenges facing critical national infrastructure are growing ever more complex- legacy industrial control systems were not designed with security in mind, and emerging smart technologies are presenting new risks and new challenges. The vulnerabilities of CNI have been dramatically exposed in recent years, most notably by Stuxnet and Flame.

A panel of industry experts will discuss the challenges around security national infrastructure and provide insight into how to implement an effective cyber security strategy. This panel will be moderated by Dave Clemente from Chatham House, John Milne, Head of Business Continuity Management at Financial Services Authority and Peter Gibbons, CISO at Network Rail. A keynote on smarter security spending will look at optimising spend without exposing the business. As security threats are on the upward curve, how can organisations make sure they are evolving rapidly with new technologies and their adoption is not creating new risks? Organisations are aiming to achieve the optimal balance of security to prevent or manage the risk of loss or a breach of the organisation. The panel will hold a discussion on reducing spend without putting an organisation at risk, and how to keep up with the latest trends. Moderating the panel will be Martin Kuppinger, founder of KuppingerCole Analysts, Dragan Pendić CISO at Diageo and Michelle Tolmay, Security officer at ASOS.com. A panel discussion on discovery to recovery will look at developing a robust incident response strategy. The pressure from business to adopt new technologies is increasing cyber risks. And despite many organisations having experienced a security breach, incident response capabilities remain woefully inadequate. Brian Honan, Founder & CEO of BH Consulting, will moderate the session with Vicki Gavin, Head of Business Continuity and Information Security, The Economist Group and Edward Tucker, Head of Cyber Security Response at HMRC. L

A on keynote curity se smarter will look at g spendining spend and optimis g up to date keepin t exposing withou usiness the b

FURTHER INFORMATION To find out more about Infosecurity Europe 2013 and for free registration, visit www.infosec.co.uk

The Technical Theatre, sponsored by SecurEnvoy Discover Information Security related issues and technical advances impacting on how an organisation protects itself from the latest threats. The sessions target information security, IT and R&D/engineering practitioners who are responsible for executing and implementing an IT security strategy. The Security Workshops An interactive and educational forum for both discussion with peers and individual learning, facilitated by an industry-expert. The Information Security Exchange Offering both high-level debate around the latest, cutting-edge technical developments and challenges, as well as insight into the most controversial and difficult business-issues currently faced within the end-user community, this theatre offers a combination of end-user and leading industry developments and experiences, in a host of varying formats. The 2013 Cyber Security Breaches Survey Official Launch Join the official launch of the 2013 security breaches survey results presented by PWC. The Infosecurity Europe Hall of Fame 2013 Where internationally recognised inductees will share their experience of the IT security sector and vote for professionals who are recognised as thought leaders in their field and respected for their long term contribution to information security. The 2013 Hall of Fame inductees are Shlomo Kramer, President and CEO of Imperva and Mykko Hypponen, Chief Research Officer at F-Secure.

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

83


THE BEST

Next Generation Firewall *

THE SECURITY USED BY

100%

Š 2013 Check Point Software Technologies Ltd. All rights reserved.

OF THE FORTUNE 100

according to independent research

*

w w w. c h e c k p o i n t . c o m


IT SECURITY

IT Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IS YOUR ORGANISATION READY TO RESPOND? Rose Jones, technical manager at BSI explores how certification to the information security management system standard ISO 27001 provides the ideal compliance tool to effectively manage risk – and is likely to be the next vehicle for business growth We all know that information is critical to the integrity and survival of a business. However despite this knowledge, a study by BSI and Erasmus University clearly shows that organisations with ISO 27001 adopt more effective information security processes, which can enable them to respond quickly to data threats and protect their assets from cyber-crime. To put this in context, consider today’s ‘terror landscape’ which continues to expand at an alarming rate where governments and organisations alike are facing a growing array of threats associated with emerging technologies. Cyber weapons are on the increase – ultimately a cheaper alternative to traditional ammunition – yet these tools have the power to inflict irreparable damage to both public sector and commercial infrastructures such as power plants, health services, financial institutions and transport systems. FUELLING CRIME While developments like the Cloud and more specifically the Government Cloud Computing initiative aid our access to information, the same advances are fuelling the potential for organised crime and cyber-terrorism risks. For government systems in particular there is an obvious requirement to ensure adequate protection of information assets – from patient records to sensitive national security information. At a commercial level, our reliance on e-commerce and web-based systems further exposes businesses too as the perils of distributed denial-of-service attacks (DDoS), network hacking and the accidental or deliberate leaking of corporate data. The question today is no longer, “Is there a risk management system in place?”, but instead, “How effective is that system and how best can you monitor it?” One way to review the effectiveness of your processes and better address these risks is through the adoption of system certification. ISO 27001 is the internationally recognised standard for information security. It provides a best practice framework for establishing, implementing, monitoring and reviewing how an organisation manages its information security risks. The success of the management system approach is reflected in BSI’s research with Erasmus

University, which demonstrates that those organisations that implement robust information security management systems recover more quickly from incidents and are better placed to capitalise on best practice processes to achieve growth. 63 per cent of respondents in BSI’s survey said they regarded information security as both a compliance requirement and a vehicle for business growth, while another 56 per cent cited an improved ability to respond to tenders as a result of a structured system. A further 31 per cent saw their organisation benefit from an increased speed of recovery following a security incident. BENEFITS Such benefits of standards and certification are equally applicable to the public and commercial sectors although business drivers may differ. For example, the need to demonstrate compliance may be higher up the agenda for a public sector organisation, whereas the ability to be included in tenders and increasing

of ISO 27001 puts that extra spotlight on any potential security loopholes, as well as opportunities for improvement. Gaining certification to a recognised standard by an accredited body such as BSI also provides an external assurance to customers, investors and citizens alike that proactive measures are taken and continually reviewed to ensure the confidentiality, integrity and availability of information. Bill Millar is head of security for Capgemini’s information outsourcing services business in the UK and is an advocate of standards. He said: “Without robust systems in place, we could lose business so that’s why we went down the standards route. We wanted to achieve best practice for our own peace of mind but also needed to demonstrate a robust information security system to both commercial and government clients who are insisting on external validation. If our information security is compromised then we risk heavy fines and severe damage to our reputation. It’s not just about looking after data; it’s about looking after people

63 per cent of respondents in BSI’s survey said they regarded information security as both a compliance requirement and a vehicle for business growth, while another 56 per cent cited an improved ability to respond to tenders as a result of a structured system. sales may top the commercial list. What comes as no surprise however is the influence of senior management buy-in on management system success. One of the key research findings in BSI’s research is that 95 per cent of organisations considered the importance of endorsement by senior management as high or very high. Without senior management buy-in, achieving these steps would be a real challenge. Many organisations will believe they have these processes and procedures in place, but as demonstrated by BSI client Capgemini, adoption and independent assessment to the stringent requirements

and physical security too – and more importantly it’s not just for ‘techies’.” In conclusion, a robust information security management system is a critical business platform for any public sector or commercial business. More importantly it’s not just about protecting what you’ve got, it’s equally about opening your eyes to make sure you can see what is coming next. L FURTHER INFORMATION To find out how standards and certification can help improve resilience and drive business growth visit www.bsigroup.com/infosecurity

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

85


Helping you to Protect your Physical | Personnel | Information

Assets

We offer Consultancy services - Building your security business by helping you to identify new markets and develop your marketing strategy. Security management training courses, including ; • Security culture course • Searching skills course • Specialist security surveying and consultancy course • Security awareness package for high net worth individuals to keep themselves and their family safe. Business continuity, crisis management and emergency planning software solutions

For more information please visit www.ippso.co.uk

Contact us on 0208 941 4842 e-mail cphillips@ippso.co.uk


DATA WAREHOUSING

Data Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IN THE WAREHOUSE, HOW SAFE IS YOUR DATA?

Most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? asks Chris Phillips, of the International Protect and Prepare Security Office (IPPSO)

This year has brought a whole host of natural disasters for us to deal with. From Drought to floods to heavy snow, the United Kingdom is being hit with ever more extreme weather. Sir Michael Pitt’s review of the flooding events of 2007 set out with great clarity what needed to be done to better prepare for all types of flooding, whether from rivers, surface water or the sea. The floods of 2007 almost brought the UK’s infrastructure grinding to a halt. Sir Michael Pitt told us that Society Must Take Flooding More Seriously. I am certain that if your headquarters were perilously close to an area with a high likelihood of flooding you would have some contingency plans. What about your data? How resilient is your data centre? Can they be relied on to keep supplying your Data during an inundation? Businesses, now more than ever before need to ensure that their data

I imagine that most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? It may be a useful addition to your business continuity considerations to ask your data centre supplier a few questions is not only safe but also available 24/7. Overwhelming evidence indicates that Climate change is a reality. Extreme weather and long term climate change threaten all parts of the business world. So why am I writing about this in a magazine aimed at the Counter Terrorism community? Well in my experience many critical buildings have been built on

flood plains and near rivers. Others have been built in areas that can only be described as troubled. The best thing about a business taking care to make itself resilient, is that it also makes the country safer against terrorism. DATA CENTRES So let’s focus on Data centres. Over the years I have visited a number of critical sites E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

87


TM


DATA WAREHOUSING  including Data Centres. It struck me that a number of Data centres have been built perilously close to areas in real danger of flooding. I have always been struck by how innocuous they look, yet how complex they are inside. A great deal of consideration has usually been given to power. Mostly they have redundant power supplies, more than one entry to the national grid and even thousands of car batteries to ensure a constant supply of energy prior to the shiny and new generators kicking in. But, how many centres are liable to flooding and other natural disasters? How many can survive an inundation?

Data Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Taking the concept of a resilient Data Centre a little further I wonder how many businesses actually know where their data is stored. Is it for example being stored overseas? If Data is being warehoused overseas the same questions should be asked as extreme weather is not a UK only phenomenon

ASKING QUESTIONS I imagine that most businesses consider doing due diligence on their supply chain, but does that include suppliers of Data Warehousing? It may be a useful addition to your business continuity considerations to ask your data centre supplier a few questions; How safe their data centre is from natural disasters? Is it on a flood plain? What arrangements are in place to secure it from inundation? Is my data backed up at other centres? In an age where we seem to have natural disasters every month, will your data be available to you if the rains keep coming? Taking the concept of a resilient Data Centre a little further I wonder how many businesses actually know where their data is stored. Is it for example being stored overseas? If Data is being warehoused overseas the same questions should be asked as extreme weather is not a UK only phenomenon. But other questions should be considered such as which country is being used to store the data? Which non-UK legislation applies to your Data? Can for instance the hosting countries Security services get access to your data? Most businesses would ensure that their staff would pay a visit to a site that was holding physical stock. I wonder how many businesses check out their Data Warehouse provider. Should you be one of those who do their checks properly, then the following are indicators of a Centre that takes its security seriously. A LAYERED APPROACH These include the physical security of the site. The centre should provide a layered approach to security with fences, gates, lighting and CCTV linked with access control measures. Perimeters should be demarcated and secured with a fence or other physical measures supported by appropriate surveillance and monitoring systems. Good physical security should be backed up by personnel security and it is right that you ask questions of the service provider about the vetting of their staff on site and whether they have policies on staff training, security guidelines and the such-like. The ‘insider’ may present the greatest single threat to Data Centre operations. Any deficiencies

in these areas mean that you may want to consider using a new service provider. My advice to you is to make sure you do the same due diligence on the storage of your data as you would on those other service providers you use. Don’t take risks with your data. Arguably it’s your most valuable asset. Make sure it is safe. Loss of, corruption to or the lack of availability of data can spell the end for a business. Your reputation may depend on it.

has extensive policing experience in both Public order and community based policing. His specialism is in the field of strategic counter terrorism advice and best practice. As head of the National Counter Terrorism Security Office he had three major responsibilities within the UK. His speaking typically includes 30 plus keynote speeches a year at major conferences in the UK and abroad.

ABOUT THE AUTHOR Chris Philips is the founder and managing director of the International Protect and Prepare Security Office. He

FURTHER INFORMATION Email: cphillips@ippso.co.uk Web: www.ippso.co.uk Twitter : @cphillips_ippso

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

89


Smart Sensors Ltd provides cost-effective iris recognition biometric solutions, which can be used for both Logical and Physical Access Control and Identification. New for 2013 is the IRIS Entra™ system, as well as our

EMX-10 and BMT-20 dual-eye iris cameras

IRIS Entra™ Physical Access Control • • • • • •

Rapid and convenient Hands-free, hygienic operation Up to 20,000 users, 250 doors Entry/exit time/ID logging Full Wiegand compatibility Stand-alone or networked system

IRIS Capture Cameras

Uses modular version of EMX-10 camera on a tamper-switch protected mount

BMT-20 • • • • • • • •

BMT-20 Binocular Iris Camera India UID STQC Certified Self Powered from USB Interface Quick and easy to use

EMX-10 Dual-Eye Camera Automatic Height Adjustment Works behind glass and perspex Hands-free: hygienic/convenient

EMX-10

For more information, please contact info@smartsensors.co.uk, or call +44 (0)1225 388690


EVENT PREVIEW

SAFEGUARDING THE FUTURE OF EPASSPORT SECURITY

Document Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

As well as covering all the major issues surrounding document security, the next phase of global ePassport interoperability tests will take place alongside SDW 2013 on 21-23 May in London The next phase of global ePassport interoperability testing will take place at a special event called SDW InterOp 2013, to be held alongside the SDW show on 21-23 May 2013 in London. The interoperability tests will be focused on the new Supplemental Access Control (SAC) mechanism, which is scheduled to be implemented on travel documents after December 2014 in order to safeguard ePassport security for at least the next 10 to 20 years. Secunet Security Networks AG, a leading German supplier of high-quality IT security, will be performing the technical aspects of the tests. Secunet has been instrumental in supporting and running of earlier ePassport interoperability tests, including acting as the technical lead in the 2006 Berlin ePassport interoperability tests. SUPPLEMENT ACCESS CONTROL The new Supplemental Access Control (SAC) security mechanism was specified in a Technical Report by the International Civil Aviation Organization (ICAO) and most countries within the European Union are mandated to include this capability from the end of December 2014. Whilst the existing Basic Access Control (BAC) specification is still seen as adequate for protecting data held within an ePassport chip, the randomness of the encryption key (which is dependent on the ePassport’s Machine Readable Zone) is not anticipated to be suitably future‑proofed against modern attack threats. HOW THE EVENT WILL UNFOLD The three-day event begins with document registration and set-up on 21 May. Document conformity and cross-over testing will take place on 22 May, to be followed by a private SAC expert workshop. This will be followed on 23 May by a session within the SDW 2013 conference programme, which will include the high-level results of the conformity and crossover tests. Secunet will operate all technical aspects of the InterOp test including evaluating SAC document conformity according to the recently updated test specification – BSI TR-03105 Part 3.2. They will evaluate document behaviour in a typical document verification process, and evaluate crossover behaviour between provided document samples and verification systems.

SDW’s e nc confere e will m programessions on s include rts, national the top show in this fast‑moving business. ePasspord and Visa Designed by the a l l ID c e w editors of the critically s a s, acclaimed Security scheme order Document World news as b l and information portal, o r t n co the conference programme

Mark Lockie, event director of SDW 2013 commented: “We are proud to host the next in the series of ePassport interoperability tests. SAC will bring benefits to citizens and authorities by improving security levels. Before roll out can start, however, a great deal of work needs to be done to ensure a smooth implementation. This testing event will provide a significant opportunity for document producers, verification system providers and governments to benchmark the extent to which their efforts towards conformity and interoperability have been reached.” WHY ATTEND? SDW 2013 is in its seventh year and has cemented its position as the leading annual conference and exhibition in the security document, advanced border control, identity and document anti-counterfeiting industry. Back in 2007, approximately 500 visitors attended the show. This successful start prompted more than 850 attendees at the event in 2008. For 2009 SDW achieved just over 1,000 visitors, and since then more than 1200 visitors have attended, rising beyond 1300 in 2012, placing it as

is packed with an international line-up of quality speakers who will deliver an imaginative programme on issues that are of real consequence. This includes sessions of a highly topical nature, such as the introduction of extended access control in ePassports, or the latest on the world´s national ID card and Visa schemes. In addition, for 2013 the event continues its special sessions looking at Intelligent Border Control and cutting‑edge document anti-counterfeiting – plus issues affecting document examiners. At the heart of the event is the exhibition. With an expected 95 exhibitors in 2013 and a visitorship from across the globe, it will be the perfect meeting place for all attendees to exchange ideas and source solutions that meet their requirements. FURTHER INFORMATION www.sdw2013.com/interop2013 www.sdw2013.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

91


   


EVENT PREVIEW

Communications

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

JOIN THE GLOBAL CRITICAL COMMS COMMUNITY

The 15th annual Critical Communications World 2013 is the global meeting place to debate the evolution of critical communications Critical Communications World 2013 will offer answers to all of your questions on developing and delivering effective mission critical communications. Taking place on 21-24 May, in Villepinte, Paris, this year’s Congress programme will not only showcase the latest TETRA user case studies and innovations but explore critical broadband technologies and solutions. You will hear how mobile broadband technologies (specifically LTE) can be combined with secure radio services to meet the future voice and data requirements of mission critical users. Delegates will learn from over 150 presentations, interviews, discussions and seminars on both public safety and commercial critical communications usage There will be networking opportunities with over 4,000 critical communications professionals, as well access to all of the latest equipment and solutions in the exhibition of over 130 companies. Included in the impressive line-up for keynote speakers will be Mireille Ballestrazzi, President at Interpol, who will discuss critical communications and cooperation, exploring how they are used when identifying crimes and criminals at a global level. Pearse O’Donohue, head of the radio spectrum policy unit at the European Commission will discuss incorporating critical communications into the wider context of competing demands for spectrum and the implementation of the radio spectrum policy programme. AN INTRODUCTION TO TETRA TETRA is an open standard for professional and critical communications and is used

in more than 100 countries worldwide. There will be an introduction seminar for those who are new to TETRA and for those who would like to be up-dated with the current status and future developments. This introductory seminar will focus on the benefits of voice and data applications that TETRA systems can provide to the professional users of mobile radio around the world. It will also provide up-to-date information on its global successes and the position of TETRA technology in the global mobile communication marketplace. The seminar will be chaired by Harald Ludwig, chairman of the TETRA + Critical Communications Association Technical Forum, and the speakers are senior managers from member organisations. Several of the speakers have been intimately involved in the creation of the TETRA standard itself. All delegates will receive a certificate of attendance endorsed by the TETRA and the Critical Communications Association.

updates from the newly formed TCCA SCADA, Smart Grids & Telemetry Group, as well as specific case studies including the use of TETRA for data transmission and control.

TETRA FOR SCADA AND SMART GRIDS Whilst the first TETRA networks were very much focused on secure voice services the last few years has seen growth in the use of TETRA for SCADA/telecontrol and more recently for smart grids. Latest developments such as compact TETRA systems have opened up new possibilities for smaller systems and TEDS promises much faster data rates and powerful new features. But what does this all mean for users of SCADA, smart grid and telemetry systems? This seminar will bring you

DEDICATED NETWORKING To make sure you meet the right people this year, there will be speed networking sessions, taking place in the Dedicated Networking Hub on the exhibition show floor. Hubs will focus on critical communications for transport, mission critical mobile broadband, and the final hub will be about utilities and oil & gas users. L

TRANSPORTATION This seminar will examine how to optimise the use of critical communications technologies in the transportation environment including rail, light rail, metros, mass transit, highways and airports. Discussion will focus on technical implementation issues, future broadband requirements and solutions, market needs, operational considerations and application development. Using key case studies from the transport sector, presentations and discussion will evaluate planning, designing and deploying total coverage solutions to enable communication (voice and data) between drivers, stations, depots, control centres and to passengers, and the future demands on critical communications for public transport.

FURTHER INFORMATION www.criticalcommunicationsworld.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

93


locate dangerous radiation while keeping the world in motion.

rapiscan radiation detection

Detect rogue radiation on moving people, vehicles, cargo, bags and parcels. Radiological threats are real, and they are making worldwide headlines. Rapiscan Radiation Detection provides accurate, reliable and comprehensive monitoring devices for: • Customs and border agencies • Government, military and intelligence • Emergency and law enforcement • Medical institutions and facilities • Transportation authorities

• Mining operations • Nuclear companies and organizations • Radiation control facilities for raw materials, manufactured products and waste materials

To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846-3511 (AsiaPac). Visit us in 2013 at these trade shows: Security and Policing Counter Terror Expo Farnborough, UK London, UK March 12-14 April 24-25 Stand D18 Stand K55

sales@rapiscansystems.com • www.rapiscansystems.com

ONE COMPANY – TOTAL SECURITY


EVENT PREVIEW

PUBLIC SAFETY This year’s British APCO event is free to attend to ensure all can benefit from the comprehensive workshops and exhibition Taking place at Manchester Central on April 29, British APCO is now in its 15th year as the leading European event for public safety communication technologies and services. In this current economy BAPCO appreciates the demands that are placed upon the public sector concerning attendance to any event. With this in mind, BAPCO has made this year free in order to ensure that all public sector, bluelights, transport and utilities heads and their staff can have the benefit of being at some of the best workshops tackling critical areas that are facing all of us at this time. In particular, there is the opportunity to debate how the emergency services and industry suppliers will provide the future communication and mobile needs of the blue light services. Alternatively, you can engage with experts from around the world on the need for our emergency plans to focus on the broader requirements of all parties including manufactures, CAT 1 and 2 responders and the governance agencies such as the Health and Safety Executive. You can learn how the blue light services will need to change

mobile functionality within vehicles whilst in motion so as to adhere to legislation. Put all of these debates with an exhibition featuring leading edge solutions and you will appreciate what a great opportunity this is. A CHANGE IN FOCUS 2012 saw the annual British APCO event move to Manchester Central , which reflected an important change in the refreshed focus of the event. For the first time, the British APCO show took on outsourcing, merging, future technologies and collaborations on a global but also very national level. 2013 will continue to build on this progress and, as the show’s new theme highlights, will do so by focusing on smarter partnerships between forces, its vertical markets of oil, gas, transport and utilities and the suppliers. New for 2013 is the shift from the former conference programme format to free-toattend Professional Development Workshops Key themes include maximising technology for smarter partnerships, command and control, and the new Police Crime Commissioners.

B-APCO 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

WORKSHOPS Jim Hammond and Andy Sigee, ACPO Intelligent Transport Systems will take a session on mobile data in vehicles. Following consultation between the Association of Chief Police Officers and the Department of Transport, it has been agreed that over the next three years emergency vehicles will need to comply with the instruction and use regulations governing the use of equipment whilst the vehicle is in motion. This workshop will bring together representatives from government, users in the emergency services and engineers who will debate how this can be delivered. Chief Inspector Paul Kinsella will chair the session on convergence of emergency plans. This will bring together emergency services, civil contingency responders, industry experts, Cabinet Office representatives and utility suppliers. The debate is focused upon the future potential to align emergency response plans so as to enhance overall management and return to normality. It will involve a presentation on the Buncefield explosion and also the ramifications on the emergency services of the Royal Commission following forest fires in Australia. Commercial solutions will also be discussed. FOR MORE INFORMATION www.bapco.co.uk

Reliable, rugged and guaranteed communications capable of being deployed anywhere, on land or sea Reliable and robust communications continue to be of vital importance for effective response to natural disasters, terrorist incidents or other scenarios where the passage of information is critical. Lack of communications directly contributes to low levels of situational awareness for both incident commanders and emergency service personnel alike, wherever they may be in the world. When all lines of communication are down, effective response to disaster is greatly diminished. Establishing and maintaining lines of direct communication between decision makers, formal and informal responders, government officials, and the public is a primary objective in any emergency planning or response scenario. Utilising advances in technology that allow for higher degrees of mobility for communications systems introduces a new level of flexibility for incident command structures. GRC’s Scytale ‘office in a box’ solution offers a small, rugged flight case weighing less than 20kgs, that can be deployed anywhere in the world. It is designed to be ‘plug and play’ and requires little training.

Capabilities include a local GSM network. Using a femtocell users will be able to use their GSM mobile phones on their own secure private mobile network and not only communicate with each other but to anyone in the world via Scytale’s satellite or internet backhaul. It offers VoIP phones, where users will be able to call via phone, which employs a codec capable of compressing the call to less than 45kbps, via a secure (AES 128) connection to the VoIP SIP server using either satellite or internet as a backhaul. It is also offered to the user is a connection to the PSTN which removes the added cost of international roaming. GRC’s Scytale also provides network ports (ISDN Capable) where users can connect a PC/Laptop giving them access to VOIP, email or normal internet browsing. The backhaul can be a public or private internet connection or satellite e.g.

Thuraya IP, BGAN, VSAT, KA Band etc. If there is a requirement for a reliable, rugged and guaranteed communications solution capable of being deployed anywhere throughout the world, whether on land or sea, Scytale offers delivery of real-time communications, anywhere and at anytime in a cost effective and user-friendly package. FURTHER INFORMATION info@grcltd.net

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

95


55X

ALL NEW FULL HD PAIR MEGAPIXEL ZOOM LENS The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been combined with a HD Full HD resolution 55X zoom lens for even greater quality SD and definition to offer the best possible security.

 PAIR-Technology  Up to 140X ZOOM with build-in 2.5X Extender  Full HD Resolution 1080p  2 Megapixels  High Speed Motors  1/2", C-Mount  Iris Override  Presets  Compact and Robust  Optimised for use in Port Facilities, Border Control, Coastal Oil Fields, Highway Monitoring etc.

PENTAX RICOH IMAGING DEUTSCHLAND GmbH Security Systems Division

PENTAX RICOH IMAGING UK LTD. Security Systems Division

PENTAX RICOH IMAGING FRANCE S.A.S. Security Systems Division

Julius-Vosseler-Str. 104 22527 Hamburg Germany Sales: +49 (0)40 56192109 Email: ssd@pentax.de

Heron Drive, Langley Slough SL3 8PN United Kingdom Sales: +44 (0) 7973 154430 Email: ssd@pentax.co.uk

112 Quai de Bezons, B.P. 204 95106 Argenteuil Cedex France Sales: +33 (0) 680 614348 Email: ssd@pentax.fr

www.pentax-security.com


SECURING ASIA SUMMIT

Securing Asia

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Pathikrit Payne

INDIA’S HOMELAND SECURITY MARKET

While India’s Defence Ministry has always hogged the limelight in terms of global procurement of weapons and surveillance systems, India’s Homeland Security market will not be behind for long, writes Pathikrit Payne, in advance of the Securing Asia Summit in London on 24-25 June 2013 Modernising a police force of nearly 2.8 million personnel, inclusive of central and state police forces, is a daunting challenge by any standard. While India spends around $1718 billion annually on internal security, it is expected to go up significantly in the coming years as the possibility of sub-conventional or asymmetric warfare rises vis-à-vis the reducing possibility of conventional warfare. Even though India’s defence sector has always hogged the limelight with its whopping acquisition spree, in the coming years, India’s homeland security market would not be far behind in terms of its acquisition of modern weapon systems to make India more secure as much internally as it is externally. A GROWING MARKET With the contours of global economic theatre gradually moving towards Asia, the importance of peace and tranquility in the Asian arena is more important now than ever before. As per the latest estimates by Standard Chartered published in 2011, by 2030, China’s GDP is expected to be a whopping $73.5 trillion followed by US at $38.2 trillion with India would be occupying the third place with a GDP of $30.3 trillion. Similar reports by Goldman Sachs and PricewaterhouseCoopers also predict more or less the same proposition. The common thread among all such reports is that in the next few decades, two of the world’s top three economies would be from Asia. Yet on the flip side, what remains a

pertinently critical issue is that Asia is far from being a zone of tranquility. Be it civilizational hostilities that exist in West Asia or be it the rivalries between India and Pakistan in South Asia in addition to the rampage and growing prowess of Islamist radical elements, the probability of a conflict always hangs like a dagger on the destiny of Asia and can wreak major havoc on the economic possibilities of the continent. In between West Asia and South Asia only, these two regions together have been witness to more than ten major conflicts and innumerable terror attacks since the end of Second World War.

the same when it comes to non-state actors. Therefore, rhetoric notwithstanding, India faces more grave threats from an LeT than the Pakistani state even though the case of plausible deniability wherein a state uses not state actors to farther its objectives through nefarious means cannot be underestimated. But today, things as they stand, such non-state actors have actually outgrown their mentors and have become more dangerous than the state which groomed it.

People’s n Liberatio and A) Army (PL ing a t are get ply of p steady sued assault at sophistic om across rifles fr rder the bo

GLOBILISATION While globalisation has been extremely successful in reducing the possibilities of full-fledged conflicts between nation states due to issues of economic interdependence and shared future, when it comes to non-state actors like terror groups, they do not have any inhibitions or shared responsibilities as such. India might have differences and major points of contention with both China and Pakistan but they would still have channels of backdoor diplomacy to reduce the tensions instead of sorting it out through war. The case though, would not be

DEFENDING INDIA For India, geopolitical imperatives compel it to have a substantial military budget of around $40 billion. But simultaneously, a new realisation is also precipitating that homeland security can no longer be taken for granted and that in the coming days it would be a very critical element of the overall security of the nation. There are an estimated 178 banned terror and insurgent organisations which are out there to destroy India’s pluralism and paradigm. Some of them, such as the Maoists, are no more rag tag militia but highly organised and ruthless terror groups, which are gradually preparing themselves for almost a full-fledged war against the state. Recent revelations by India’s E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

97


Bringing security to your world

Delivering security solutions that fit your needs Government Identity and Access Management solutions from HID Global. The right interoperable products, the right field-proven brands like LaserCard® Optical Security Media (OSM), ActivID Credential Management System and FARGO® ID card printers and encoders. Tailored processes backed by years of the right design and integration expertise. We power the world’s most secure Identity programs. We’re HID Global. Learn more at hidglobal.com/main/government-solutions


SECURING ASIA SUMMIT  National Investigation Agency (NIA) vindicate that the Indian Maoists have perhaps amassed a whopping 6000 low cost rocket launchers. This is in addition to the similar revelations that the Indian Maoists are now being trained by Manipur based insurgent group People’s Liberation Army (PLA) and are getting a steady supply of sophisticated assault rifles from across the border. As per India’s Union Home Ministry, the total strength of hardcore and heavily armed Maoists stand at 8600 while the militia strength is of another 38,000 cadres who are armed with some or the other kind of country made rudimentary guns. While this situation is alarming, the gravity of India’s internal security scenario gets compounded by the volatility of situation in Pakistan and the possibility of a spillover effect of the same in India. Already the Indian Army and BSF have started ringing the alarm bells regarding the situation over there and the possibility of it breaching the international border into India through a renewed wave of terrorism orchestrated by the radical extremist groups like Laskar-e- Taiba and Tehrik-e- Taliban. WAKING UP TO REALITY While the situation is extremely alarming, since the incident of the 26/11 terror attack in India, the Indian Government has woken up to the reality and one can witness a structural shift happening in India’s internal security architecture. Firstly, it has started the process of integrating the networks of all police stations through a project like CCTNS (Crime and Criminal Tracking Network & Systems) followed by the development of a seamless access system to all major databases for terror tracking through NatGrid (National Intelligence Grid). Secondly, India’s Home Ministry has been augmenting the strength of its CAPFs (Central Armed Police Forces) as well as that of state level police forces on a war footing. In the last three years alone, for its Central Police Forces, India’s Union Home Ministry bought 89,641 light weight BP jackets, 67,965 AK-47 rifles, 16,430 Assault rifles, 2537 X-95 assault rifles for CRPF, 34377 Carbine Machine for BSF, 1,805 Automatic Grenade Launchers; 2,608 Glock Pistols, 1,164 handheld Thermal Imagers 1,576 MP5 submachine guns, 8,109 PNS Weapons sights, 105 Mine protected vehicles, 8 ALH Helicopters, 118 Light Armored Troop Carriers, 3,174 Deep Search Metal Detectors, 9,792 Passive Night Vision Binoculars and 25 Remote Controlled Improvised Explosive Devices, RCIED Jammers for CRPF Road Opening parties. This is in addition to recently given sanctions for the procurement of more than 16,000 VHF/UHF hand held radio sets for India’s BSF and plans for procurement of an estimated 3000 Belgian shepherds to assist CRPF in counterinsurgency operations. Thirdly, in the last three years considerable efforts have been made for augmenting

Securing Asia

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Anti Terrorist Schools are being raised spread across India to train state level special forces. In the coming years, as the security of India’s critical infrastructure in the public and private sector becomes a vital issue of concern the strength of coastal policing through the operationalisation of 73 coastal police stations and induction of 204 interceptor boats under phase 1 while under the ongoing phase 2 programme another 131 coastal police stations are being operationalized along with the induction of 110 interceptor boats and 10 large patrol vessels. Add to this, the present set of proposals being given by CRPF, which is at the helm of fighting insurgency in India, for acquisitions to further fine-tune its fighting capabilities include 226 Mine protection vehicles, 1,98,576 Tactical Vests, 480 numbers of Hand-Held Satellite Phones, 1134 medium velocity Rocket Launchers, 808 numbers of Personnel Tracking Systems among others. Likewise, an additional amount of more than $2 billion has been kept aside by Union Home Ministry for Modernization of State Police Forces for the period from 2012-2017. MODERNISING BORDERS Yet all these are merely the tip of the iceberg so to say as India’s gigantic and manpower intensive police force would be undergoing massive modernisation with more offensive as well as surveillance capabilities in the coming years to take on the twin menace of cross border terrorism, and Maoist extremism. Much akin to the Indo-Pakistan border, which has been fully fenced along with deployment of sensors, similar work is being done on the Indo-Bangladesh border too. For the current financial year Indian Government has also put aside $2.5 billion for modernisation of border outposts and it is highly likely that in the coming years Indo-Nepal and Indo-Myanmar borders would also witness deployment of sensors and fencing. In the last three years, the Union Home Ministry has sanctioned an additional 116 CAPF battalions, which are gradually being raised. Likewise, state governments are also doing their bit in terms of raising their own special counter terror

units on the line of NSG (National Security Guard). Most Indian states now have their own special units to execute major antiterror operations. Units like Force One, C-60, Special Action Group of Maharashtra Police, Delhi Police SWAT, Kolkata Police STF and Combat Battalion, Andhra Pradesh Police’s Greyhound and Octopus, West Bengal Police’s STRACO and CIF, Jharkhand Jaguar and STF of Jharkhand Police, STF, Tamil Nadu Commando Force of Tamil Nadu Police, Special Commado Units of Punjab Police and Haryana Police as well as the Special Operations Group of J&K Police and Orissa Police have become household names in the respective states and each of them is undergoing massive modernis ation. Moreover 21 Counter Insurgency and ANTI TERRORIST SCHOOLS Anti Terrorist Schools are being raised spread across India to train state level special forces. In the coming years, as the security of India’s critical infrastructure both in the public sector as well as in the private sector becomes a vital issue of concern, it is expected that Indian Government would grant the permission of bulk licensing for small arm procurement by private security companies. This would be a key step in creating a comprehensive security architecture for India and would also create a major market for small arms manufacturers. Indian Homeland Security market is about to unleash its true potential. The Securing Asia Summit to be held in London in June 2013 would highlight the massive potential of not Just India’s Homeland Security Market but also that of the whole of Asia, where along with the gradual shift of the global economic theatre towards it, the incidences of security threats and possibilities of terror strikes on critical assets have also been increasing at an alarming pace. L FOR MORE INFORMATION www.securingasia.com

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

99



OUT

KEEP

KEEP

PORT SECURITY

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

OUT

KEEP

OUT

KEEP

OUT

OUT LAYER UPON LAYER OF SECURITY FOR UK PORTS KEEP

Port Security

OUT

KEEP

COVERT SECURITY MEASURES While an obvious physical presence can be an extremely effective deterrent, covert perimeter protection can also be favourable as sometimes, intruders can find ways to overcome overt protection over time. However,

Theoretically, any action that can be seen and accurately defined on a video image can then be automatically identified by a VCA system. The wide scope of this kind of technology has consequently led to its employment in a range of applications including intruder detection, people counting, smoke and fire detection and camera failure or sabotage detection. Due to the fact that the expanse of a port is so wide, security personnel could sometimes feel that they are of better use patrolling different areas, rather than closely watching a CCTV monitor. VCA can help with this, enabling staff to move to other areas while keeping a close eye on unmanned areas. The technology also has the ability to flag

OU EP

KE

T

FURTHER INFORMATION www.bsia.co.uk

OU

AROUND THE CLOCK PROTECTION Video Content Analysis (VCA) is one particular element of CCTV that is rapidly developing and has found its place in the transport sector. VCA systems have the ability to automatically analyse CCTV footage in order to generate useful information about the images that have been captured. Alerts can then be subsequently sent to security personnel if there appears to be an incident.

up incidents as soon as they have occurred, allowing for an increased response time for security personnel to reach the incident before it escalates. Some may be concerned that this type of technology could replace the valued CCTV operator, however this is not the case. VCA significantly reduces the multiple live camera viewing requirements of the operator, leaving them free to concentrate on managing real incidents one-to-one, while being safe in the knowledge that the VCA system will pick up any threats elsewhere. VCA can be utilised in order to create virtual tripwires along existing fences or areas of a perimeter where other forms of physical security would be impossible or impractical. If a person is simply walking near a site, they are not necessarily considered a threat and a great amount of attention does not need to be paid to them. However, if that person then crosses the tripwire into a secure area, an alert can be raised. The VCA draws attention to the cause of the alarm, often by highlighting it in a red box, and an operator can quickly assess the nature of the alarm. VCA tends to be more resistant to false alarms.

EP

covert perimeter protection means that intruders will not be aware of the security challenges that lie under the surface and will not be aware that they have raised an alarm after crossing a virtual line. Particularly effective forms of covert security are heat and motion sensors that are hidden and connected to alarm systems. Known as Unattended Ground Systems (UGS) they enable an early warning system, giving personnel ample time to respond effectively. In terms of CCTV, some may opt for hidden surveillance cameras, like Internet Protocol (IP) cameras, which are easily concealed and relatively flexible in terms of their placement. Operators will be able to make judgments as to the more vulnerable areas of the premises and place these cameras appropriately.

T

VCA can be utilised in order to create virtual tripwires along existing fences or areas of a perimeter where other forms of physical security would be impossible or impractical

KE

THE BENEFITS OF A HUMAN PRESENCE Similarly, having a human presence can also be very effective. With well-trained security guards patrolling the perimeter, intruders can be discouraged immediately. The presence of security officers can also give passengers and visitors an increased sense of security; this can be further enhanced by the placement of officers manning access points and carrying out random checks both on site and on the perimeter whilst on patrol. Generally, security officers are also the first port of call for any passengers requiring assistance or information. They are also responsible for managing technological aspects of a site’s security – such as CCTV or access control systems – and their immediate responses to an intruder detection following an alarm is fundamental. Due to the amount of passengers passing through a port, much like an airport, passenger protection and luggage security checks are also a key part of any port security strategy.

This also includes security checks conducted on all passengers before boarding boats and ships. Often, many of the staff involved in these processes, including on-board customer service crew, are contractedout security personnel. This allows for a seamless, discreet presence and enables these checks to be carried out with limited disruption to passengers’ journey, but at the same time giving them full protection.

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

UT

Ports tend to be complex both in size and in nature, with multiple areas handling different tasks requiring robust security measures to ensure all areas are monitored. Therefore, in such widespread premises, just one security solution is not enough to guarantee effective protection for the whole area. A layered approach, implementing an array of integrated security features, is therefore the best way to provide comprehensive protection. One of the most important areas to implement security measures is considered to be the perimeter – the furthest point from the area that could potentially be in danger. An early detection of a threat out at a perimeter means that there is more time and space available for personnel to formulate the necessary responses, which could potentially prevent an intrusion all together. Additional time to react is imperative in any situation, meaning that correct measures can be taken, or in the event of a terrorist attack, for an area to be cleared completely, which, in some extreme situations, could save lives. A physical presence of security is sometimes enough to deter an intruder from putting a property at risk. Overt obstructions like security fences, gates, or wire obtrusions can discourage a criminal from even attempting to breach the security, eliminating the risk immediately from the outset.

Written by James Kelly, Chief Executive of the British Security Industry Association (BSIA)

Handling around 560 million tonnes a year, having 30 million people pass through them each year, and employing an estimated 130,000 people, the UK ports industry is vast and influential. The BSIA’s James Kelly discusses how a layered approach to security can help keep threats at bay

OUT

101


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CCTV & SURVEILLANCE

A NEW APPROACH TO MONITORING LARGE AREAS

These days, video technology has become an indispensable element of the security arrangements at ports. With its introduction of the Panomera® multifocal sensor system, German developer and manufacturer Dallmeier has unveiled an entirely new approach to video surveillance of large areas. Roland Meier, team leader Panomera® Multifocal Sensor Systems at Dallmeier, explains the benefits What is so innovative about the Panomera® system? With the Panomera® multifocal sensor system, a huge area can be monitored from a single location extremely efficiently. The most impressive aspect of the product is that it combines the overall view with simultaneous top detail resolution: even more distant objects are displayed with the same resolution as objects in the foreground of the picture. That really sounds very simple... In principle it is exactly what the user wants from a video surveillance camera. The entire area observed by the camera should be displayed in uniformly high quality. But anyone who has ever zoomed in on an image will notice a marked difference; the farther you move to the back of the scene, meaning, zoom into the picture, the greater the loss of detail, causing the picture to become blurry. While objects in the foreground are certainly displayed with sufficient resolution, when

102

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

the user attempts to enlarge objects from the background, they appear as so many ill-defined blocks. Let’s consider an example taken from real life. Look at the image of a large port area. The number plates of the vehicles or the labels of the containers in the front of the picture are still legible, but in the back the image loses definition when it is enlarged and it is no longer possible to make out the letters. This is why when we developed the Panomera® one of our objectives was to ensure that the resolution never fell below the specified parameters, not even in the most distant areas of the image. How is this high resolution possible? We are using a completely new lens and sensor concept. In conventional cameras, the pixels are used uniformly within the sensor, that is to say, the available megapixels are distributed evenly throughout the entire image. But the actual scene is not two-dimensional like the sensor, it is three-

dimensional – and the expanse of the lateral and depth perspectives becomes progressively larger the farther back you go. Now if the pixels are distributed evenly on the camera sensor, this means that the same number of pixels is available for capturing a much larger area than in the foreground of the image. And logically, as a result more distant objects cannot be resolved any more when you zoom in. With Panomera® on the other hand, we can guarantee uniform resolution over the entire object space. We do not use just a single optical device, but a multifocal sensor system, meaning several lenses with different focal lengths. In this way, we ‘slice up’ the scene so that each area has the optimum focal length assigned to it. What advantages does this have for monitoring ports? Panomera® works well both for very wide panoramas and for areas involving great E


CCTV & SURVEILLANCE E distances. In effect, it is as if you were to combine the advantages of an overview camera and a high optical zoom PTZ camera: Panomera® records the entire area continuously, like an overview camera – unlike a PTZ camera for example, with which only the currently active zoom area is recorded. But at the same time you can move and zoom anywhere in the entire coverage area – and individuals are clearly recognisable even at distances of more than 160 m!.

dynamic range. Panomera® works with several sensors, each of which selects its own exposure strategy in order to achieve ideal saturation. While with other cameras an average value is determined, Panomera® can make distinctions more effectively; light areas are exposed for a shorter time and dark areas for a longer time. As a result, situations with a large dynamic range can also be recorded with good quality, without overexposure or ‘drowned’ black areas.

So continuous recording of the entire surveillance area is not standard practice? Until now, no. Of course, fixed dome or box cameras always record the whole of the area they are monitoring. But these cameras are not equipped with an optical zoom, so they are not suitable for monitoring expansive areas, or at least only as overview cameras. This is why a lot of PTZ cameras are being used at the moment. These can be used to zoom and move within the scenes. But at the same time PTZ cameras have a definite

If the entire scene is monitored by just one camera, is it only possible for one security operator to work with the camera or can several operators access it? In contrast to PTZ cameras, with which only one operator can control the camera, with Panomera®, an unlimited number of operators can navigate across the entire scene independently of each other. Although all operators are connected with the same camera, each of the individual users can select his view individually and zoom

Fixed dome or box cameras always record the whole of the area they are monitoring. But these cameras are not equipped with an optical zoom, so they are not suitable for monitoring expansive areas, or at least only as overview cameras disadvantage; they can only ever record the area that the operator is currently watching live. If the operator is currently zooming in on the front left portion of the image, only this area is being recorded. So if an incident were to take place at a different location at the same time, it would not be possible to review it afterwards. With Panomera®, on the other hand, the entire scene is recorded continuously and in maximum detail resolution – regardless of which area the operator is viewing live. This makes it possible to analyse incidents after they have occurred. Couldn’t you also achieve this effect by using several HD cameras in conjunction with each other? An operator can work much more efficiently with a single, synchronised system than he ever could with just multiple HD cameras strung together in line. The operator would have to concentrate on lots of individual images simultaneously. Moreover, the field viewing angles could never be synchronised with one another as well as is possible with a single, integrated multifocal sensor system. Quite apart from the fact that the operator would be engaged in a constant battle for resources in order to obtain comparable resolution. Another advantage of the Panomera® sensor concept is a substantially higher

or pan as he desires. Or he can perform evaluations of the recordings at the same time. So analyses can be carried out by any number of employees at various workstations simultaneously, for example one may be watching the overview image live, another may zoom in on a suspicious vehicle in the port area, while yet another is looking at the recording from an hour ago to see how some containers have been loaded onto a ship. Do you not need enormous bandwidth for this? Owing to the so-called multicast capability several users can view the images from Panomera® without requiring repeated transmission of the data via network. This reduces the necessary bandwidth significantly. How fluidly is movement represented in the images? Panomera® provides image material in real time and at high frame rates of up to 30 fps, which translates to completely fluid representation. And with Panomera® you can step back one image at a time through the recording until you can see exactly what has happened. That all sounds very plausible, but at the same time extremely complex… Quite frankly, it is difficult to describe

Panomera® in words and explain all of its features. You simply have to see it in action for real. I have had that experience very often when making presentations to customers: Everyone who sees the system with his own eyes very soon has that “Aha” moment. We call it the “Panomera® effect”: Panomera® far surpasses the limits of conventional cameras. That is why we are constantly stressing that Panomera® is not just another camera that purports to offer more megapixels than the products of our competitors. That is not the point – Panomera® represents an entirely new technology and a fundamentally different approach to the issue of video security.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

What is the situation regarding price? A system like this must surely be very expensive. Not at all: Panomera® is the most costeffective system on the market today. Of course, a Panomera® is more expensive than a single conventional HD camera. But then you only need one Panomera® system to cover the same area that previously required several cameras. Even so, the greatest savings are realised in expenses for the infrastructure. This really cannot be overemphasised. The most expensive factor in installing a camera is not the camera itself, but the infrastructure it needs, that is to say: camera masts, wiring, electricity supply and so on. If you only need a single camera installation site, you save an enormous amount of money. For this reason alone, it would pay immense dividends to thoroughly calculate the cost of a Panomera®-based project. Would an existing video system have to be replaced completely if a port opts for a new Panomera® solution? No, existing cameras can be incorporated in the Panomera® concept. Even so, the entire video system can be monitored and controlled using a single management system. And while we are on the subject of integration, a mobile solution can be created without difficulty via our iPhone server. The images from Panomera® can be displayed on an iPhone or iPad, for example. This results in faster response times and greater flexibility. What plans do you have for Panomera® in the future? We are in the process of completing project studies for a large number of customer enquiries. Because Panomera® is not a mass-produced, off-the-rack solution for all requirements. We perform the necessary project studies in advance to ensure that the multifocal sensor system is customised and the resolution required by the customer is achieved. Our first projects have already been put into operation, because many customers have realised how cost-efficient the system is compared with conventional equipment. I’m sure that we will be E

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

103


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CCTV & SURVEILLANCE E putting many more such projects into operation in the near future. But Panomera® is not Dallmeier’s only product… We offer complete solutions from a single supplier, from cameras to recording and storage systems all the way through to video management and analysis. To round off the security concept, we offer a wide range of various cameras. Depending on the area of application either high-speed PTZ dome cameras, box cameras or vandal-resistant dome cameras are used. The latter provide for safety and security in sensitive areas, too. All cameras are equipped with the tried and trusted Cam_inPIX® technology, an image processing technology developed by Dallmeier to deliver detailed image material with high contrast and colour fidelity. What recording systems do you offer? For recording the image data Dallmeier offers different recorders and servers, depending on the individual requirements of each port. All devices have one thing in common though: high reliability and failure safety. All components are manufactured according to the highest quality standards and extensively tested prior to being shipped. Dallmeier uses the operating system Linux on all its recorders. It is regarded as being extremely stable in professional circles as it practically never fails. In order to further enhance stability, the operating system was separated from the hard disks and saved on a Flash memory. Depending on the application the failure safety can be increased as needed. This can be done for instance through a redundant recording or the use of external storage systems. How difficult is it to operate one of these video systems? These systems are managed and controlled via professional management software, which makes operation very simple and intuitive. For example with the aid of our SeMSy® Security Management System. Operational procedures and complex controls can be stored within the system, allowing staff a highly convenient and intuitive operation. The graphical user interface, into which site plans of the port can be integrated, provides every operator a quick overview of the cameras and corresponding monitors through a graphic complete overview. In order to make the operation even more convenient, the system can be expanded by an ergonomic video management centre, the VMC-1 Eagle. Clearly arranged across its three components (joystick, jog-shuttle and keyboard with monitor) it combines all the functionalities that can be expected from a modern video management system.

104

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Using the jog-shuttle it is easy to find specific images within video sequences. By turning the jog-dial security operators can conveniently navigate through individual frames. The joystick of the VMC-1 Eagle also allows for the easy control of PTZ cameras. Pan, tilt and zoom movements can thus be carried out intuitively. What distinguishes the VMC-1 Eagle is the possibility to display both recorded image material as well as live pictures on the integrated monitor. Site plans and search functions can also be displayed. Dallmeier already has many references all over the world… That is true. Video over IP products and solutions from Dallmeier are used worldwide in all kinds of projects – from small systems with only a few cameras right up to largescale projects with several thousand channels. We do not mass produce products, we manufacture individually planned solutions that are tailored precisely to meet the needs of the respective customer and his specific requirements, for example with regard to resolution quality, storage capacity, or budget. What is the situation regarding investment security? After all, development cycles for new technologies are becoming shorter and shorter. Owing to the open system architecture of the Dallmeier solutions the video system remains flexible and scalable. Future expansions or modifications are easily possible, even hybrid operation with devices from different generations presents no problems. Hence the IP video solutions by Dallmeier offer long-term investment protection. L FOR MORE INFORMATION www.dallmeier.com www.panomera.com

About Dallmeier Dallmeier has at its disposal more than 25 years of experience in transmission, recording as well as picture processing technology and is an outstanding pioneer of CCTV/IP solutions worldwide. This profound knowledge is used in the development of intelligent software and high quality recorder and camera technologies enabling Dallmeier to not only offer stand-alone systems, but complete network solutions up to largescale projects with perfectly integrated components. Right from the beginning the company always focused on own innovative developments and highest quality and reliability. Dallmeier is the only manufacturer in Germany that develops and manufactures all components on its own. This includes the entire product range, from cameras to picture storage and transmission to intelligent video analysis and even individually adjusted management systems. Quality made by Dallmeier, made in Germany! Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DVR for example, which introduced digital recording to the entire CCTV industry, came from Dallmeier. The multifocal sensor system Panomera® will have a similarly groundbreaking effect: This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry. This and the extensive experience in the CCTV and IP field have lead to a top position in the international market for digital video surveillance systems.


PERIMETER SECURITY

A BREACH OF DEFENCES

Airport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Stowaway incursions, high value theft and terrorist attack have prompted a perimeter security re-evaluation, writes security expert Chris Yates

PERIMETER SHORTCOMINGS Airport perimeters have been breached multiple times globally during the past twelve months. These breaches have ranged from accidental to purposeful and include briefly reported cases of stowaways seeking a better life elsewhere. The diamond heist represents the latest in this long line of perimeter security breaches, but it may become the catalyst for more robust defences to be deployed at our major airports. The diamond heist prompted Norman Y. Mineta, former US Transportation Secretary during the Bush presidency, to put pen to paper with comment for the Washington Post. “The ease with which anyone can penetrate an airport perimeter may shock those familiar with

today’s elaborate security inside terminals. But such breaches are common in the United States and abroad. In Philadelphia last year, a driver crashed through a gate and onto a busy runway. “If a pickup truck plows through a chain-link fence and onto a runway, the driver could be a teenager acting on a dare, an unemployed worker with a vendetta or a disturbed soul who hears voices. Or he might be a terrorist. Security officials would not immediately know, nor would it be clear whether the incident was isolated or part of a coordinated attack. Burglars aren’t the only dangerous elements with cutting tools or easy access to uniforms and forged IDs,” he wrote. THE HUMBLE FENCE LINE Mineta’s comment reiterates the blindingly obvious point that in the post 9/11 race to stuff terminals with expensive and devilishly complicated kit, few people have taken much notice of the humble fence line around the extended perimeter of an airport. The ease with which this extended fence line can be breached is perhaps best exemplified by two incidents with tragic consequence that occurred last year. In the first, the body of man was discovered in the landing gear of a British Airways Boeing 747 after it had touched down at London Heathrow. The man had last been seen scaling an airport fence in Cape Town and whilst being chased disappeared beneath the departing jet. In the second, the body of man fell into a London street from another British Airways jet inbound from Luanda. These two tragic incidents have largely been dismissed by an aviation industry keen to gloss over shortcomings in the realms of security, but there is no escaping the fact that the two desperate souls could just as easily have been people with an altogether different motive.

and security procedures, not to mention reconsideration of drilling plans. More than half of global oil reserves lay beneath the Middle East and North Africa, but these regions have become increasingly unstable as the Arab Spring has brought about regime change and plunged some parts into civil war. With oil and gas companies still attempting to navigate the Arab Spring fallout, unrest and domestic terrorism in Nigeria and continued acts of piracy off both African coastlines, the rise in al Qaeda linked activity in Mali and Algeria has significantly complicated matters. The spread of instability to Algeria was something of a surprise, given that the protection afforded to oil and gas installations say industry analysts. It is understood that Norwegian oil company Statoil voiced its desire to build an airstrip near the In Amenas plant five years ago, to avoid the need to have expatriate staff bused in and out. In the event it wasn’t built and the recent siege began when militants attacked one of these very bus convoys.

Written by Chris Yates, Yates Consultants

A series of serious breaches during the past twelve months have prompted searching questions about the state of perimeter security in the transportation and energy sectors. The incidents have occurred in supposedly high security locations worldwide with the issue of lax perimeter controls finally coming to a head with a spectacular diamond heist in Belgium. The heist occurred within the supposedly secure airside of Brussels Zaventem airport and took the heavily armed robbers a mere 11 minutes from entry to exit to execute. The speed with which this audacious robbery took place has prompted many aviation analysts to conclude that it must have been conceived with insider knowledge as to how the airport and various high value logistics operations work. An unnamed source at the Antwerp World Diamond Center (AWDC) said the robbery was one of the biggest ever, adding that the global diamond business is worth more than $60 billion annually, with around $200 million worth of stones moving in and out of the city daily. Precious gemstones are generally transported by air since this is perceived as the most secure and least risk method by insurers of such cargo. Belgian police have been focusing their attention on leaked information from either airport, airline, handling agent or logistics personnel, as they carry out a thorough investigation. The heavily armed gang knew that an access gate was not locked and construction work meant that they could easily cut through a second security perimeter fence. They also displayed a working knowledge of how to open the Fokker 100 cargo hatch and seemingly had knowledge of which packets of diamonds to steal. Brussels Zaventem is also facing up to the wider question as to why its evidently poor perimeter security arrangements and lack of prompt response aided the thieves.

The d heist diamon Norman ed prompt ta, former Y. Mine sportation US Tran ary under Secret put pen Bush, to aper to p

ENERGY SPOTLIGHT Meanwhile, the security of oil and gas installations has been called into question following the recent hostage crisis at the In Amenas gas plant in Algeria. The assault claimed the lives of at least 37 foreign workers, is said to be worst terrorist attack on an oil and gas installation in the 150-year history of the industry and has prompted an urgent review of safety

ALGERIA CONCERNS Some analysts now fear that if Algeria is not a safe place to operate in, then nowhere within the region is. Partly as a consequence of the In Amenas siege and subsequent hostage crisis, European market analyst Visiongain has reported that the global oil & gas infrastructure security market will reach a value of $28.44 billion in 2013. It’s lead analyst comments that: “Ever increasing global energy demand, coupled with high energy prices, is compelling the industry to operate with greater frequency in regions where civil unrest, terrorism, and criminal activities are common threats.” Within this context, the market for security products and services, including those used to protect critical assets in the upstream, midstream and downstream sectors of the industry, is experiencing rapid growth. Should the rise in militant activity in Algeria be indicative of a wider security breakdown across the Sahel, a volatile region stretching across the African continent from Senegal to Eritrea, the energy sector will have to move fast to better protect personnel and physical infrastructure. L FURTHER INFORMATION www.yatesconsulting.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

105


Lincoln Security are experts in providing physical and electronic security solutions Lincoln Security are a major supplier and reliable infrastructure partner to a significant number of high profile critical national infrastructure companies across the UK. Our product independence enables us to offer bespoke and innovative physical and electronic security solutions in areas of sensitivity, CNI, Government and Transport. • LPCB Steel Doors • LPCB Timber Doors • Mechanical Locking Solutions • Electromechanical Locking Solutions • Intelligent Intruder Detection Systems

For more information, please contact us at: Lincoln Security, 79-83 High Street, Lincoln, Lincolnshire LN5 8AA T: 01522 532038 F: 01522 536060 www.lincolnsecurity.co.uk info@lincolnsecurity.co.uk

BRITISH ACPO 2013

29th & 30th April 2013 Manchester Central, Manchester

British ACPO brings you FREE Exhibition and Workshops which impact upon the Emergency Services and Partner Agencies. See:

Register now and join:

The exhibition full of the leading IT and Communications

• Chiefs from Blue lights, • Leaders in the Health Service,

companies with the latest technologies and services

• Cabinet Office, • Home Office, • Health and Safety

Learn:

Executive, • Chief Information Officers,

In the workshops that focus on the latest and most pressing topics for

• Head of IT and Communications, • Oil, Nuclear, National

multi-agencies including: Future Communications, Mobile Data, Cloud and

Grid and Transport and be part of the pressing issues that will shape

Interoperability.

your future operations.

Why Pay To Go Elsewhere? Book your FREE place now: www.bapco.co.uk


MIGRATION MANAGEMENT

THE EFFECT OF POLICY TINKERING I have been involved in border and migration management professionally since 1971 when I joined the no longer existent Canada Customs and Excise service. And as the years passed by and I went through various stages of my career within what I today call the global homeland protection and migration management industry – and make no mistake it is an industry. I have come to believe that Shakespeare was correct when he wrote: ‘The road to hell is paved with good intentions.’ Or that Sir Jonathan Sacks, chief rabbi of Great Britain, was on the mark in his writings discussing ‘the tragedy of good intentions.’ Homeland protection and migration management is the proverbial Gordian knot for all western democracies that actively recruit migrants and pursue open trade and commerce policies.

or ‘there is no link between terrorism and illegal immigration,’ and one of my all-time favorites, ‘we have the technology to manage the issue.’ The fact of the matter is homeland protection and migration management is an imperfect industry which has many dirty little secrets. The lure of the so called I-5 Group of the most favored nations of destination for migrants [that is Canada, United States, Australia, United Kingdom and New Zealand] is not dissimilar. They possess what the vast majority of the inhabitants of other nations don’t; freedom, opportunity and the rule of law. These countries have benefited handsomely from those blessings. The most egregious of these my view is the way in which governments and the associated migration industry have benefited financially by levying outrageous fees for services of questionable value assessed against migrants and travelers alike. The current debate on border security and migration management in the United States is shedding a great deal of light on the crux of the problem faced by all members of the I-5. Some politicians in these countries from time to time do an important public service every number of years by exposing the immigration policy quackery evident in one way or another in all of the I-5 countries. At the same time we can also observe that these same folks approve of various forms of administrative amnesty which is a de facto permission to remain for otherwise law abiding migrants who overstay their initial welcome. Wisely, the mass deportations of millions of persons ‘sans papiers’ from these countries is never even remotely considered because it is not only impractical but also financially crippling for the host state. For the I-5 the homeland protection business costs billions annually while achieving questionable or contrary results to those intended.

What is act ex the the for the formulas of the succes protection nd homela migration and ment managetry? indus

IMMIGRATION FOR THE MASSES If we speak of migration, gone are the halcyon days of the last century when it was politically fashionable to quote from Emma Lazarus’ sonnet, New Colossus ‘Give me your tired, your poor, your huddled masses yearning to breathe free.’ Policy makers on the left and the right have over the past three decades decreed that integration; diversity, demographics, family reunification, border security and economic wellbeing are the real cornerstones of immigration policy for the masses. If we speak of open trade and commerce its becoming apparent that while globalisation through the exchange of information, goods, services, capital, technology, ideas and people has fostered a rise in standards of living throughout many parts of the world the jury is still out with regard to its universal merits. As Jorge Heine & Ramesh Thakur, two political science professors from the University of Waterloo, Ontario, wrote in ‘The Dark Side of Globalization,’ in 2011: “The notion that endless liberalization, deregulation and relaxation of capital and all border controls (except labor) will assure perpetual selfsustaining growth and prosperity has proven to be delusional.” The uncomfortable truth is over the past three decades an unrestrained migration industry populated by well-heeled lawyers and various idealist groups – has continually and successfully shown the home community that they can suck and blow at the same time. Remarkably while everyone knows that this is physically impossible it’s been the political essence of their success since the modern era of global migration began with the introduction of international mass transit in the form of Boeing 747s in late 1960s. Unlike other industries that grow or decline with changing times the migration industry has been remarkably resilient and has thrived through wars, recessions, and social and political upheavals.

AN IMPERFECT INDUSTRY What is the the exact formula for the success of the homeland protection and migration management industry? These can be found by reviewing oft stated policy clichés made by policy academics from the hundreds of meetings, conferences and workshops I have attending over the years. These include such notable concepts as ‘borders can be open and secure at the same time,’ or ‘illegal immigration can be stopped at the border,’

Written by Thomas A Tass, executive director of BORDERPOL

With over 40 years experience Thomas A Tass, executive director of BORDERPOL, shares his views on border and migration policy and asks if innovative, new thinking will ever replace old, imperfect policies

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HANDLING THE TRUTH To quote Friedrich Nietzsche “Sometimes people don’t want to hear the truth because they don’t want their illusions destroyed.” Human trafficking, drugs and weapons smuggling, transnational criminality continues to menace the world. The past four years has seen the world in the grip of a severe economic crisis which has overshadowed the aforementioned issues. The current architects of homeland protection and migration management programmes appear to be too busy shoring up the old policies to ask themselves the obvious question: can we work together to improve border security and migration management? There have been many opportunities available for policy makers to come together and create really new and innovative solutions. These opportunities have not always been well attended because of a lack of will or leadership. I sense that this is changing after having meet a new generation of border management managers last October in London. I recognise that there is no one-size-fits-all programme that will be universally accepted. On the other hand I also sense that the border protection and migration management programmes of the 21st century will be spectacular failures if no new efforts are made to challenge the underlying problems associated with it. If new homeland protection and migration management ideas could be made into paving stones then we may well be able to build new roads towards safer and more effective borders. L FURTHER INFORMATION www.borderpol.org

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

107





TERRORIST PSYCHOLOGY

KNOW THINE EMEMY

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

How can a seemingly ordinary person turn into a terrorist? Author and professor Roger Griffin argues that studying the motivations behind a terrorist could be what’s needed to stop an attack

CONFLICT ANALYSIS CT has a built-in tendency to take on an operational logic and momentum of its own which leads its decision‑makers to lose touch with core realities of the very social and political issues it has been set up to deal with. It is a story familiar from the histories of studies of civil services, hospitals, educational systems, big government, and the military. Disturbing case studies in the flawed logic of official policies which ‘lose the plot’ are provided by the escalation of the commitment to material and human resources by the combatant states in WW1 (which claimed 57,470 Anglo-French casualties on the first day alone of the Battle of the Somme), the Vietnamese War, just one episode in which, the ‘secret’ bombing of Cambodia, meant over 500,000 Cambodians were killed by 2.7 million tons of bombs. Indeed the whole of the Cold War was arguably fought on the basis of the impaired reality principle and institutionalised paranoia prevalent on both sides and unforgettably parodied in Stanley Kubrick’s Dr. Strangelove. In each case, had a more realistic appraisal of the situation been made which did not involve demonising the enemy and underestimating ‘his’ own ideological or existential stake in the conflict, enormous material losses would have been avoided, not to mention the shocking loss of lives. Similar considerations arise from a study of Suez Crisis and the Second Gulf War. By contrast, in the case of the UK’s Appeasement policy before WWII, greater methodological empathy with Hitler and Nazism might have led to political decisions to keep the evil genie in his bottle.

UNDERSTANDING THE ENEMY Such reflections have major implications for the ‘war on terror’. Greater ME would have prevented the dirty wars waged with the ‘liberation forces’ of the Mau Mau in Kenya, the FNL in Algeria, and the IRA during the ‘Troubles’ in Northern Ireland and might have led to peaceful settlements. Failure to stop 9/11 contributed to by failure to understand the nature of Global Salafi Jihad and the significance of the first WTT attack. There is also every likelihood that the UK’s military intervention in Suez Crisis, the Second Iraq War, and the ‘counter-insurgency’ war in Afghanistan would not have been launched had more been known about the terrorist ‘enemy’ (or ‘his’ absence), saving innumerable lives, acts of barbarity by both sides, and billions of pounds. Hard evidence exists suggesting that had ME been applied to understanding Jihadist terrorism and the Islamist world view underpinning it, CT agencies would have been able to foil the 9/11 and 7/7 plots. To take just one example, ME profiling may well have picked up more acutely the deeper significance of the first attack on WTC in 1993, and barred young men of Middle-Eastern origin with dubious credentials, means of payment, and behaviour from being allowed to train as pilots in the US with no questions asked. Even when ‘lone-wolves’ are concerned better resourced ME could still be a vital tool. The FBI were at a loss for years to unmask the Unabomber as Ted Kaczynski (finally identified by his brother); McVeigh wrote a revealing letter to the local newspaper and was known to the FBI before the Oklahoma bombing; David Copeland went off surveillance radar when he left the BNP because this was not interpreted as a possible sign of radicalisation; Breivik was a familiar figure on Norway’s virtual far right and bought six tons of fertilizer two months before his attacks, but it seems that naïve assumptions prevailed about ‘home grown’ radicalisation as they had in the UK in relation to 7/7.

t’s Terroris lores xp Creed e sights the in w from o which flising the recogn al for the potenti l embrace fanaticaligion, or of a re logy ideo

TERRORISTIC ‘HEROIC DOUBLING’ My own research has focused on one aspect of ME in a CT environment, namely the radicalisation process. In Terrorist’s Creed I explore at length the insights which flow from recognising the potential for the fanatical embrace of a religion, ideology, or cause as integral to what it is to be human. Some

individuals whose sense of a legitimate place in the world whether socially or existentially is under extreme stress, are susceptible to a psychological syndrome known as ‘splitting’ without displaying overt socio-pathological symptoms. By dividing the world into ‘good’ and ‘bad’ (Manicheanisation) they can become warriors in their own (though possibly collectively shaped and sustained) cosmic drama. ‘Heroic doubling’ can make previously impotent, marginalised, atomised victims of personal or historical forces beyond their control into the avatars in a covert war against ‘evil’ in one of its many guises (Western materialism, abortion, multiculturalism, the desecration of womankind, the Homeland or the True Faith). In the next stage the commitment to act on this fantasy is focused and finds its target. It is a process brilliantly illuminated in the films Tax Driver and Fight Club, and ironically in Four Lions, and documented in excruciating detail by Breivik’s 1,500 page manifesto giving the background to his symbolic strike against those who he alleged were responsible for the erosion of ‘Norwegianness’.

Written by Pofessor Richard Griffin, Professor in Modern History at Oxford Brookes University

Counter terrorism (CT) is big business. What follows is a rationale for more of its resources to be devoted to refining the sociological, cultural, and psychological understanding of terrorism. This is not the ingenuous demand from a cossetted ivory-tower academic for abstruse moral concerns to be injected into the ‘real world’ of professional engagement with terrorists. Rather it is proposal for responsible, efficient minds to recognise the pragmatic need for ‘methodological empathy’ (ME) when pitted against the human embodiments of the terrorist threat. By enhancing and complementing other sources of intelligence concerning terrorist motivations, mindsets, and actions ME could make CT more operationally effective and cost-effective.

ENHANCING COUNTER TERRORISM Were this line of analysis to be integrated into the common sense of CT expertise it would become clear that there is much method in terrorist ‘madness’. It often represents a mischannelling of all-too‑human quest for a sacred cause worth killing and even dying for. Such a working hypothesis could be invaluable both in profiling potential terrorist suspects and in the deradicalisation process. At the very least it would help if CT practitioners see themselves engaged in an ideological and existential conflict to preserve a certain idea of pluralism, individuals and tolerance against the fanatical upholders of social, moral, racial, or religious truths of a deadly simplicity. This in turn may help stop the agents and front-line soldiers in the counter-terrorist struggle from engaging in their own form of splitting and heroic doubling which depersonalises and demonises them, and sanctions acts of inhumanity in the cause of defending our vision of humanity. L BUY A COPY OF TERRORIST’S CREED http://tinyurl.com/bvgnc99

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

111



Intelligent face recognition technology supports advanced video screening and analytics applications With increasing accuracy and speed, face recognition technology has established its effectiveness in preventing ID fraud and supporting criminal investigations. In recent years, use cases have broadened to include real-time video screening for security measures, and the analysis of faces in images/ videos for commercial applications. The latest version of Cognitec Systems’ video screening and analysis product FaceVACSVideoScan performs real-time identity checks against image databases while computing the count, flow, demographics and behavior of people visible in video streams. Surpassing traditional video surveillance systems, FaceVACS-VideoScan detects people’s faces in live video streams or video footage and stores lossless video of each appearance of a person in front of a camera. The technology then compares all the appearances of one person against each other for continuous face recognition and uses anonymous facial analysis to count individuals, generate demographical information, track people movement in time and space, detect frequent visitors and crowds, and much more. For example, FaceVACS-VideoScan can achieve a highly accurate person count, since

a person seen once will be re-recognised and therefore not counted again. Operators can also receive an alarm if too many people gather in a specific area and measure waiting times to direct traffic. The analysis of traffic patterns and demographical statistics can provide businesses with precise visitor data to make interior design, advertising placement, staffing and other operational decisions. The product also applies Cognitec’s premier face recognition technology to compare faces to image databases and instantly find known individuals. Businesses and organisations can detect and prevent unwanted behavior in much faster and more efficient ways, as operators can track individuals online, or receive alerts on mobile devices to act within the immediate vicinity of a suspect. On the other hand, FaceVACS-VideoScan can identify authorised individuals or high-ranking customers in real time. Positive authentication can prompt access to restricted areas or alert personnel to provide special treatment.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The introduction of this advanced video screening and analysis technology continues a long list of revolutionary products the company has brought to market. Cognitec’s database search technology has successfully assisted law enforcement agencies worldwide to quickly find offenders and solve crimes and to prevent fraud during ID document issuance. Around the globe, other companies have developed and continue to create new solutions using Congitec’s technology – testament to the company’s continuing dedication to deliver the best face recognition performance available on the market. FOR MORE INFORMATION www.cognitec.com

Townscape’s Counter Terror Blocks designed to stop vehicle-based attacks supplied to Titanic Belfast Townscape Products is helping to safeguard one of the UK’s highest profile new visitor attractions against the threat of terrorism. Townscape supplied 47 Counter Terror (CT) Blocks, designed to stop vehicle-based attacks, to Titanic Belfast, one of Northern Ireland’s signature tourism projects in a deal worth more than £100,000. Titanic Belfast enables visitors to re-live the Titanic story, from her birth in Belfast to the fateful maiden voyage and eventual discovery on the seabed. The museum is expected to attract 425,000 visitors annually. Townscape’s CT Blocks, which it manufactures at its Sutton-in-Ashfield Townscape CT Blocks protecting the Belfast Titanic Centre factory, each weigh in at 2.2 tonnes and are made using a special mix of aggregates designed for ultimate strength. The CT Blocks only require minimal of Townscape Products, said: “Visitor groundwork due to their low profile safety is of utmost importance and foundation, making them cost effective to we worked closely with the architects install without compromising on security. and Harcourt Construction, who built CT Blocks are positioned where a Titanic Belfast, to supply Counter Terror building is vulnerable to vehicular blocks that are a proven, tested defence incursion and meet the PAS 68 against vehicle based terror attacks. Standard for vehicle immobilisation. “The CT Blocks we have supplied to Titanic Jonathan Goss, managing director Belfast are made from charcoal coloured

aggregate which is sympathetic to the fabric of the building itself and contributes aesthetically to the destination overall. We were also able to incorporate visitor seating in a nautical theme into each block, giving them a practical use for visitors on top of enhanced security.” Townscape Products has supplied CT Blocks to many of the UK’s major airports, including Manchester and Cardiff, and they also protect The Tower of London and numerous other visitor destinations nationwide. Jonathan added: “The owners of any venue where there will be a volume of people have a duty of care to protect their visitors. CT Blocks provide a solid, secure perimeter barrier which vehicular based terrorists would be unable to penetrate. “Vehicle defence is definitely a growing market for us and we have a number of other high profile leisure, destination and retail projects in the pipeline.” FURTHER INFORMATION www.concretebarriersHQ.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

113


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DATA SECURITY

WHY PUSH FOR PRINT SECURITY? OKI’s Graham Lowes discusses how both industry and government can protect sensitive data before and during print Last year proved exactly how hard it can be to protect internal data, with a whole host of government and corporate data leaked on WikiLeaks and the sale of customer bank records to tax authorities. In fact, the Identity Theft Resource Center had logged 46 data breaches in government and military sectors by December 2012, while more than 7.6 million sensitive records were exposed. The time has come to improve all aspects of data security, print included. The challenge is that every day employees of almost all businesses and organisations, both small and large, print, fax, copy, scan and send electronically a range of sensitive information. Before this data reaches print it often has to pass a range of security firewalls and barriers but the question is – how safe is the data once it is at the printer? For many, the idea of secure yet cost effective printing many seem out of reach but expert print vendors such as OKI – a global business-to-business brand, dedicated to creating, affordable, professional, in-house printing solutions – have recognised the need to deliver solutions that are just that. Today, with OKI’s innovative security solutions, it becomes possible to achieve these goals. WHY PUSH FOR PRINT SECURITY? It goes without saying that the days when printed documents were left discarded at the printer should be long gone by now; leaving confidential information for anyone to pick up and read is careless in today’s office environment and a completely unnecessary risk. Today, the challenge is that the type of risks a business or organisation face have evolved and security breaches take many different forms, it’s not just a printer that needs enhanced security but the network the data is sent across. In fact, the issue of print security has become even more important with the increase in remote working supported by wireless and follow-me printing, which allows users to print to any supported network printer within an office space. It becomes much harder to control printer usage and who has access to specific devices unless the correct security features are in place. However, it is critical that data is secure as a security breach can be extremely damaging, particularly for a public sector body as national secrets could fall into the wrong hands. The Security Policy

114

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Framework (SPF) is continually reviewed to ensure it sets out new responsibilities regarding the protective security and risk management required within government departments and agencies, in addition to organisations which handle government assets such as the NHS or police force. Today, the SPF details the minimum mandatory requirements relating to the handling of personal data and managing information risk. For example, organisations must ensure that access to personal data is only granted on a need to know basis. In order to meet these requirements, both

industry and government need to ensure they are working with a print vendor that not only understands the various impact levels but one that can provide the solutions needed to achieve SPF compliance. WORKING WITH AN EXPERT In order to ensure print is managed as securely as possible, it can be a wise move to work with a print vendor that has established experience in this sector. With detailed knowledge and involvement across the complex print landscape, OKI can help guide any business or organisation through its print environment in order to improve security, drive efficiency and meet SPF compliance. OKI has a dedicated team of 25,000 specialists across 120 countries and prides itself on product innovation. All its devices now have built-in encryption and secure printing capabilities. By working with OKI you can secure printing processes and lean on and learn from the teams’ expert knowledge and innovative resources. Looking beyond the security of a printer, it is vital that the network in which the E


E data is sent is secure. To meet this industry need, OKI offers secure network settings such as Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) on devices such as the MC562. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering as data is encrypted. OKI also help to secure a network by supporting the use of internet protocol (IP) security such as IPsec, a framework of open standards from the Internet Engineering Task Force that define policies for secure communication in a network. With the use of IPV6, the latest revision of the IP, organisations

and businesses ensure they are working to the highest level of network security standards. OKI Network IP Security (IP Address Filtering) Support also enables restricted access to a printer (for changing configurations and for printing) to be limited to a specific PC or range of PCs. This reduces the chance of unauthorised users either printing any unnecessary documents or changing a printer’s settings. All solutions support the disablement of unused protocols and network ports, which prevents unauthorised access to printer and print servers and in turn, reduces the likelihood of external hacking attacks. Access is only granted to the device by

With detailed knowledge and involvement across the complex print landscape, OKI can help guide any business or organisation through its print environment in order to improve security, drive efficiency and meet SPF compliance

pin code or user name and password, while rules can be set up to determine the functions each user is allowed to use.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TO PRINT OR NOT TO PRINT? In addition to securing the network, it is also vital that print jobs are protected at the printer. To meet this need, OKI offers Secure Print, which enables the user to store documents prior to printing on the printer’s Hard Disk Drive (HDD) or Secure Data (SD) card. This solution helps to ensure that sensitive data is protected as it only becomes possible to access content once a four digit, user-defined pin or secure password is entered on the printer’s front panel and once printed the document is automatically deleted from the system. In fact, OKI Secure Erase can be used to set up the length of time data is kept on a device, which can be predetermined by the sender. It can also be set up to automatically delete all data once printed. Many OKI multifunction printers also feature ‘Scan to Email’, which converts a scanned image to a PDF to be sent to email recipients. This is a convenient way to send hard copy documents directly to a person’s email inbox. However, to tighten security further, devices such as the OKI MB491 and MC562 multifunction printers feature encrypted scan to PDF. Encrypted PDF files are more secure than standard PDF files as they require the recipient to have a password in order to open the folder. Passwords can be either globally set or designated for one user when the email is sent. Reassessing the use of technology such as a fax machine can also help to ensure that the tightest security levels are maintained. Using the latest solutions it becomes possible to forward incoming faxes by emailing them directly to a designated recipient instead of printing, which eliminates the need for a hardcopy altogether. In addition, a device such as the OKI MC562 archives incoming faxes in a separate folder so that a complete record of all documents is received; this makes it a lot easier to keep a track of documents. TIME TO TAKE CONTROL Given the increasing amount of data security breaches which have taken place, it is vital that both industry and government learn from the past. Working with the right print vendor, devices and print practices it doesn’t have to be hard to improve print security, it’s just vital to look at the bigger picture. Network security is just as important as securing the data when it reaches the printer. Don’t get caught out, be one step ahead and deploy the latest security solutions today in order to improve print security and minimise the risk of a data breach – it can be done with the right knowledge and resource and OKI is here to help. L FURTHER INFORMATION www.oki.co.uk

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

115


Does your endpoint security have a wait problem? Traditional endpoint security solutions—with fat clients and huge update downloads—leave your users waiting to use their machines and the network. Why wait to move to nextgeneration endpoint security technology.

Webroot® SecureAnywhere™

Fast

eliminates waiting for long scans

Less than 6 seconds to install Extremely fast scans —average of 4X faster

and signature updates. Trial Webroot today, and see how it puts more time and computing power back in your users’ hands—and hours back in your day.

Painless No conflicts with other security products Eliminates the need for a dedicated server

Secure 100% Effective against zero day threats 99.8% Effective against malware

To download a free 30 day-trial today, visit www.webroot.com/CTbusinesstrial To speak to our Sales team, call + 44 (0) 8701417070 © 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, and the globe design are trademarks of Webroot Inc. in the United States and/or other courntries.


TRANSPORT

CASES & STORAGE

PROTECTING VITAL EQUIPMENT

CP Cases has vast experience in providing ruggedised cases, racks and textiles for the transportation, operation and storage of essential equipment for military and other security activities CP Cases offers a worldwide design and manufacturing service for high-performance, ruggedised cases, racks and textiles used in transportation, operation and storage of essential equipment for military and security activities, including communications systems, satellite communications equipment and weapons cases. Many products carry NATO stock numbers and are accredited to MIL-STD-810F and rated to IP65. SPECIAL PROJECTS Here we highlight some of the special projects CP Cases have worked on, across the whole spectrum of security for a variety of international clients. At the top end of the security ladder is national security where the UK’s first line of defence is its navy, and in the near future,

compatibility or electromagnetic interference (EMC/EMI) screening used as part of the ERack® series of portable, anti-vibration rack-mount containers, which are performance certified to provide a high level of electromagnetic shielding. This solution for providing electromagnetic compatibility throughout all sizes of enclosures also manages interference that could potentially emanate where the data transfers cables enter and exit the enclosures. TECHNICAL KNOWLEDGE This level of technical knowledge and experience can be applied to other forms of data and server protection as CP Cases showed by creating TEMPEST protective rack systems for a UK government department, to help reduce the chance

CP Cases works with systems integrators and equipment manufacturers to provide solutions for entrance protection and boundary operations. this responsibility will fall on the shoulders of the new Queen Elizabeth (QE) Class Aircraft Carriers currently under construction. CP Cases has designed and is building and supplying more than 1200 custom-designed rack-mount data communications enclosures and more than 4000 adaptors and brackets, for installation on-board the two new vessels. The smallest enclosure accommodates 2 units of 19” rack-mounted network switches; the largest cabinet stands almost 5 feet tall and can accommodate 29 units. Each enclosure protects the 19” rack mounted switches from vibration, impact, particle and moisture ingress, and also provides screening from any electromagnetic interference (EMC/EMI) that could disrupt the mission communication systems from radar energy and other strong electromagnetic signals which emanate from various positions on board, ensuring the ship’s sensors do their job without adversely affecting each other. The first shipment of 400 enclosures have been delivered to Rosyth where the first carrier, HMS Queen Elizabeth is being assembled. CP Cases have introduced and utilised novel designs embracing the same materials developed specifically for electromagnetic

of “compromising emanations” being intercepted by non-friendly agencies. Compromising emanations consist of electrical, mechanical or acoustic energy emitted by any number of sources within equipment or systems which process security information. This energy may relate to pre- or non-encrypted information in such a way that it can lead to recovery of the data. Laboratory and field tests have established that such emanations can be propagated through space and along nearby conductors and could be intercepted by third parties. The interception and propagation ranges and analysis of emanations are affected by a variety of factors, including the design of the information processing equipment, the system installation and environmental conditions related to physical security and ambient noise. The term “compromising emanations” rather than “radiation” is used because the compromising signals exist in several forms such as magnetic- and/or electric-field radiation, line conduction, or acoustic emissions.

By designing EMC shielded rack systems, for the data servers, that inhibit the emanation of such signals, CP Cases is able to safeguard vital information from interception by undesirable parties and help protect the lives of civilians and government personnel. The ability to deploy scanning and photographic systems designed to image hard-to-reach locations within vehicles is an obvious boon to protecting assets and borders. CP Cases works with systems integrators and equipment manufacturers to provide convenient solutions for entrance protection and boundary operations. Portable x-ray machines at border crossings are used to detect contraband being smuggled in inaccessible positions within a vehicle, for example, in fuel tanks and tyres. CP Cases developed an aluminium rack system for a Belgian vehicle security company to contain its x-ray scanning and sensing equipment and allow it to be easily transported and deployed by border control personnel, simply and quickly. In a similar vein, portable under-vehicle inspection systems, using leading-edge imaging technology to display the entire underside of a vehicle, are used to search vehicles and identify suspect objects. ROBUST SOLUTIONS These systems are often lightweight and deployable by one person and are supported by a ruggedised laptop, so a simple, tough storage and carrying solution is preferred. CP Cases have created robust textile bags that allow users to transport and store the scanner and any ancillary equipment safely and is secure enough to ensure the system is complete and available when it is needed. Defence and security professionals trust CP Cases’ experience and expertise in designing and integrating systems into their cases, racks and rugged textiles, meaning that whatever the job is, CP Cases can provide the best solution. L

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.cpcases.com

117


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Reliability under even the harshest conditions! ODU AMC – Advanced Military Connectors: The next connector generation for the soldier of the future – you can count on it.

– – – – –

Push-Pull or Break-Away function Excellent 360° shielding properties More than 5,000 mating cycles Easy-Clean version available Light, robust and reliable

– Operating temperature from –55° C to +125° C (–65° F to + 255° F) – Watertight (IP 68) – Individual contact configurations available

ODU-UK Ltd Phone: 01509/26 64 33 sales@odu-uk.co.uk

www.odu.de

Round-the-clock access to Uber Intelligence’s knowledge and expertise Uber Intelligence is a global intelligence agency. Through its extensive tailored solutions it provides strategic and operational services for a range of commercial, security, investigative and financial organisations. Based in central London, Uber Intelligence is at the heart of the business and financial world, with a widespread global intelligence network to deliver a comprehensive international perspective to its clients. The company has brought together people with a range of backgrounds, experiences and skills. Combined, they equip Uber Intelligence with the superlative knowledge and expertise to provide the very best services to the financial, security, business and personal service fields. Its operatives have assisted clients in industrial and commercial sectors worldwide, gleaning over 15 years’ experience in their respective fields.

118

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Whatever your requirements, Uber Intelligence’s objective is always to deliver the very best service to you. It tailors a custom solution that is designed specifically to meet your requirements. With a global presence that is available to you 24/7, you can rely on Uber Intelligence’s knowledge and expertise wherever you are, at any time. FOR MORE INFORMATION Tel: +44 (0)844 848 0448 Tel: +44 (0)203 131 0051 (Outside UK) www.uberintelligencegroup.com


DEFENCE SPENDING

NEWS IN BRIEF

Global defence spend drops despite big Russian and Chinese increases According to recent statistics, the total worldwide defence spend fell in 2012 for the first time in 15 years. World military expenditure totalled $1.75 trillion in 2012, a fall of half a percent compared to the previous year, according to statistics unveiled by the Stockholm International Peace Research Institute (SIPRI). The drop is the first since 1998 and is largely caused by the amount of worldwide spending cuts seen in areas such as the United States, Central Europe, Australia, Canada and Japan. However, spend actually increased in Asia, Eastern Europe, the Middle East, North Africa and Latin America. In 2012, the United States’ share of world military spending went below 40 percent for the first time since the collapse of the Soviet Union. A declining trend that began in 2011 accelerated in 2012, with a drop in US military spending of six percent in real terms to $682 billion. The decline is mostly the result of reduced war spending, which fell from $159 billion in the 2011 financial year to $115 billion in 2012 and is set to continue its downward course, with only $87 billion requested for 2013. US military spending in 2012 was also projected to be $15 billion lower than previously planned as a result of cuts to the Department of Defence linked to the 2011 Budget Control Act. The bulk of cuts under this legislation will begin this year. According to research carried out by Public

AIR DEFENCE New F-35B lands at night The F-35B fighter, currenbtly under procurement, has completed its first vertical landing at night. From 2018 the F-35B will operate off the Royal Navy’s new aircraft carrier HMS Queen Elizabeth. It will also be based at RAF Marham, which Defence Secretary Philip Hammond confirmed would become the main operating base for the aircraft, known as the Joint Strike Fighter Lightning II. The latest night landing test mission was one of a series of events that will prepare the aircraft for the second of three scheduled at-sea test periods during the development program. “The completion of this test event demonstrates the F-35B is one step closer to delivering a critical capability to the US Marine Corps and F-35B partners in the UK and Italy,” said US Lieutenant General Chris Bogdan, F-35 Program Executive Officer.” tinyurl.com/c457lcq

General Wall warns against further Army cuts

Defence News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Making further manpower cuts to the Army would be stepping over the line, General Sir Peter Wall, the Chief of the General Staff, has warned. He told reporters that reducing the size of the regular army from 102,000 to 82,000 had already been challenging, although it will be achieved: “We are going to get there. At that point we will be able to draw an affordability line” he said.

Expenditure Statistical Analyses 2012 and Tracker Spend Analysis, total defence spend in the UK for the period 2011/12 was £39.003 billion. As in previous years, military defence was the main area of expenditure, with total spend reaching £33.606 billion in the period, accounting for 86 per cent of total expenditure. China was the second largest spender in 2012, increasing expenditure by 7.8 per cent. Russia, the third largest, increased by 16 percent ($12.3 billion). The global total was still higher in real terms than the peak near the end of the cold war. Dr Sam Perlo-Freeman, director of SIPRI’s military expenditure and arms production programme, said: “We are seeing what may be the beginning of a shift in the balance of world military spending from rich Western countries to emerging regions, as austerity policies and the drawdown in Afghanistan reduce spending in the former, while economic growth funds continuing increases elsewhere.” “However, the US and its allies are still responsible for the great majority of world military spending.”

Out in force for Thatcher funeral As many as 700 armed forces personnel were involved in the funeral of former Prime Minister Margaret Thatcher, which took place on April 17. A pall bearer party was made up of all three services, including those from ships, units and stations notable for their service during the Falklands conflict. A flypast did not take place in accordance with Baroness Thatcher’s wishes.

New Chief of Defence Staff approved by Queen

Times reports on Syria’s chemical weapon evidence The Times has reported that a soil sample provides the first forensic evidence of the use of chemical weapons in Syria Government scientists working at the Ministry of Defence’s research facility at Porton Down, Wiltshere, found traces of “some kind of chemical weapon” after performing tests, according to The Times. .The tests at Porton Down reportedly concluded that the chemical traces were from a weapon rather than gas sometimes used by the Syrian security forces to put down protests. “There have been some reports that it was just a strong riot-control agent but that is not the case - it’s something else although it can’t definitively be said to be sarin nerve agent,” one source told the newspaper. The sample was reportedly smuggled out of Syria in a mission involving MI6 in March. It was not clear whether the sample was from Aleppo, Syria’s largest city, where more than 20 people were alleged to have been killed in a chemical attack. tinyurl.com/cmk39b2

Her Majesty The Queen has approved the appointment of General Sir Nicholas Houghton to take over from General Sir David Richards as the next Chief of the Defence Staff. Philip Hammond, Secretary of State for Defence, said: “General Sir Nicholas Houghton will assume this role in July 2013. I look forward to working with Sir Nicholas as we continue radical reforms.”

Royal Marines leave Afghanistan after ten years Years of successive operational deployments in Afghanistan have come to an end for the Royal Marines as the last commando group to serve in the country returns to the UK. Their role is to be taken on by Afghan forces, which the Defence Secretary said would ensure Afghanistan would never again be a safe haven for terrorists. Since 2001 the equivalent of over 14,000 Royal Marines have served in areas including Sangin, Nahr-e Saraj and Musa Qala. TO READ MORE VISIT

tinyurl.com/bvmrlq5

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

119



MARITIME

QinetiQ awarded MOD research contract to counter the threat from small, fast and agile pirate boats The Ministry of Defence has awarded QinetiQ Maritime a contract to carry out research into the co-ordinated defence of the Royal Navy fleet against the emerging threat of attacks from small, fast and agile boats that might be used by pirates, terrorists or other hostile forces. The contract has been awarded by the Defence Science and Technology Laboratory (Dstl), a trading fund of the MoD. The research brings together two innovative concepts from QinetiQ with the potential to deliver an integrated solution for the Royal Navy to counter the small boat threat. Previous work delivered by QinetiQ was funded through the MOD’s Centre for Defence Enterprise (CDE). It provided clear evidence of the potential benefit of the technology concept for improved situational awareness that more effectively combines the use of existing sensors with coordination of a ship’s close weapon systems. CDE, operated by Dstl, provided an opportunity to assess disruptive technologies and engage directly with front line operators to maximise the impact of the work. The research could provide new technology to enable Naval commanders to operate more effectively in highly dynamic littoral environments, react to challenging threats

and reduce the exposure of their personnel to danger from agile aggressors. Dr Philip Smith, Maritime Above Water Programme Leader, Programme Office, Dstl, said: “The project, awarded to QinetiQ, is particularly innovative in nature in that it is looking at an integrated approach to responding to the small boat threat, combining detection, weapon firing and decision making. QinetiQ was selected not only because of its previously proposed solution but also because of its extensive capabilities, knowledge and track record in the area of maritime command information systems coupled with the quality of their proposal.” Stuart Hider, Programme Director, Maritime Systems at QinetiQ said: “We are very pleased

MARITIME INDUSTRY

to have been awarded this research contract by Dstl. One of our primary areas of expertise is the concept development and design of integrated command information systems. This area of expertise is further enhanced by the fact that we have a high level of experience and knowledge of the entire lifecycle of a command information system. The work also brings in QinetiQ’s Survivability Practice which is focused on the protection of people, places and platforms. The investment in this particular research into the enhanced defence of the Royal Navy further demonstrates our commitment to the front line operator.” TO READ MORE VISIT

tinyurl.com/bvmrlq5

NAVY FLEET

Global Marines Trends report predicts growth

HMS Portland gets Thales Sonar system makeover

Despite an uncertain short term future for the maritime industry, the Global Marine Trends 2030 (GMT 2030) report launched today predicts that long term growth will return. Written and researched jointly by Lloyd’s Register, QinetiQ and Strathclyde University, the report looks at the future shape of the marine industry and specifically how naval power will increase. Recent reports from UNCTAD and the Rogliano review conclude that the industry is currently going through one of its worst crises for decades. According to these reports, as ship owners continue to increase tonnage from pre-recession orders for ships, seaborne trade growth is failing to grow apace, leading to an excess in supply over demand. This has led to predictions that the financial future of the industry could lead to some significant casualties with established names being at

Following an extensive refit, HMS Portland has become the final Royal Navy Type 23 frigate to be fitted with Thales UK’s Sonar 2087, a towed array sonar system that enables warships to hunt submarines at considerable distances and locate them beyond the range from which they can launch an attack. Portland has now returned to service, with a re-dedication ceremony on 21st March. The 12-month multi-million pound refit in Rosyth Royal Dockyard of Portland’s sensors, weapons and systems completes a successful joint programme between industry and the UK’s Ministry of Defence (MOD) to ensure the upgraded ships are now the most advanced of their kind in service. The Royal Navy has described how the combination of a Type 23 frigate fitted with Thales’s Sonar 2087 and a Merlin helicopter equipped with the

risk.This is compounded at a time when many advanced navies are suffering from short term Government budget cuts, affecting their ability to invest in capital acquisitions, or maintain fleets at sea. However, the GMT 2030 report suggests that ‘the marine world in 2030 will be almost unrecognisable owing to the rise of emerging countries, new consumer classes and resource demand’. The report predicts that as trade increases, the size of fleets for advanced navies (US, Russia, Japan, China, UK, India) will continue to fall from 585 major platforms in 2010 to 500 in 2030. However, the naval power exercised by these navies through technology, will almost double from 3,911 in 2010 to 8,526 in 2030, based upon QinetiQ’s Naval Power Index. DOWNLOAD THE REPORT

tinyurl.com/bvdzdaf

Defence News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Thales FLASH dipping sonar makes the class the “most potent anti-submarine warfare platform of any navy at sea today”. Eight of the Royal Navy’s fleet of Type 23 frigates have now been upgraded for use as submarine hunters. The other seven upgraded ships are Westminster, Northumberland, Richmond, Somerset, Sutherland, Kent and St Albans.

Issue 13 | COUNTER TERROR BUSINESS MAGAZINE

121


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com ssaib ad 125 x 178_Layout 1 17/02/2012 15:20 Page 1

CERTIFYING

SECURITY

The leading certification body for Guarding Services. Appointed Security Industry Authority (SIA) Approved Contractor Scheme (ACS) Assessing Body. ISO 9001 and Product Certification for Key Holding and Response Services, Door Supervisors, Static Site Guarding and Mobile Patrol Services, Event Stewarding, Crowd Safety, Security Wardens, Cash and Valuables in Transit, Close Protection Services and Security Dogs. Contact us for a free no obligation quote.

Telephone : 0191 296 3242

SSAIB

www.ssaib.org

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Acal BFI UK 68 Arinc OBC, 108, 109 ATG Access 74 Axis 10 B.S.I Group 85 B.S.I.A 112 BAPCO 106 Barrier Components 18 Broughton Controls 70 Cellebrite 42 Cem Systems 64 Check Point Software 84 Cobham Antenna Systems 48 Cognitec Systems 113 Counter Terror Expo 12 CP Cases 117 CSL Dualcom 65 Dallmeier 100 Dart Systems 22 Deben Group Industries 17 E2V 56 Electrosonic 58 EVITO 80 Flir Commercial Systems 50, 51, 110,

122

COUNTER TERROR BUSINESS MAGAZINE | Issue 13

Forensic Pathways UK 44 Frontier Pitts 33 G6 – Global 6 GCC 95 GPS Perimeter Systems IBC Hasokawa 14 Heald IFC, 52, 53 Holmatro Rescue Equipment 20 Identity Assurance 98 IFSEC 69 Internation Protect and Prepare 86 Iveco 38, 39 Lesar 54 Lincoln Security 106 Lista UK 60 LS Telcom AG 4 Lumension 82 Mel Secure Systems 26 Micro Systemation 48 Navtech Radar 75 ODU UK 118 OKI Systems UK Limited 115 Pace Systems 62 Paragon Rapid Technologies 36

Pentagon Protection 66, 67 Pentax Ricoh 96 Phoenix Datacom 78 Proengin 28 Rapiscan 94 RFEL 26 RMS 113 Rubb Buildings 40,41 Safety Flex Barriers 76,77 Security Watch UK 99 Selectamark 30 Smart Sensors 90 SSAIB 32 Stemmer Imaging x Xenics 8 Stoof International 34 Tetra Scene of Crime 46 The Bunker Secure Hosting 88 The Mercian Labels Group 4 Trizo Electronics Assembly 32 Uber Intelligence 118 Webroot 116 Winkelmann 24


Suitable for protecting: Cable Ducts Pipelines Fences

The MILES is an innovative fiber optic detection system that has a number of different configurations to detect attacks in many different applications.

It can be used as a fence mounted detection system, a pipeline protection system and for detection of interference or removal of cables in ducts or troughs.

There is even a buried system, which has particular applications rail and tunnel safety and security applications.

It has: 

Very high detection capabilities

Attack point identification to within a few metres

Variable range capabilities from 1km up to 25km

No power required in the field

No requirement for new fibers, using existing spare fibers if available Contact us now at

WWW.GPSPerimeter.co.uk

GPS Perimeter Systems

Sales@GPSPerimeter.co.uk

for more detailed information

+44 ( 0 ) 1604 648344



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.