www.counterterrorbusiness.com | ISSUE 18
NEWS: COUNTER TERROR UNITS DEPLOYED IN BEIJING | ANTI-TERROR BOOST FOR LONDON HOSTILE VEHICLE MITIGATION
CROWD PROTECTION
COUNTER TERROR EXPO
CYBER SECURITY
ELECTRONIC TERRORISM 2014 Horizon Scan reveals IT threats are the greatest concern for organisations
FALSE IDENTITIES
CONQUERING COUNTERFEITS Stopping the production of forged identity documents which fuel terrorist activity
TRANSPORT SECURITY
PROTECTING ASSETS IN TRANSIT
Threat detection technology to stop the theft of high value goods News: se ha Final p ence in s pre of UK nistan p65 a h g Af NCE
ZINE
AGA ESS M
EFE FOR D
USIN THE B
014 tory 2 Eurosa view pre p67
COUNTER TERROR BUSINESS
Political spat clouds counter terror strategy
www.counterterrorbusiness.com | ISSUE 18
NEWS: COUNTER TERROR UNITS DEPLOYED IN BEIJING | ANTI-TERROR BOOST FOR LONDON HOSTILE VEHICLE MITIGATION
CROWD PROTECTION
COUNTER TERROR EXPO
CYBER SECURITY
ELECTRONIC TERRORISM 2014 Horizon Scan reveals IT threats are the greatest concern for organisations
FALSE IDENTITIES
CONQUERING COUNTERFEITS Stopping the production of forged identity documents which fuel terrorist activity
Comment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
TRANSPORT SECURITY
PROTECTING ASSETS IN TRANSIT
Worrying evidence has surfaced about certain schools in Birmingham not doing enough to protect their pupils from Muslim extremism. Earlier this month, Schools inspectorate Ofsted released reports into 21 Birmingham schools following claims in an anonymous letter that hardline Muslims were trying to impose their view. Ofsted’s chief inspector, Sir Michael Wilshaw, concluded that head teachers were being ‘undermined’ and the curriculum was being narrowed to reflect the ‘personal views of a few governors’.
Threat detection technology to stop the theft of high value goods News: ase Final ph ce in presen of UK nistan p65 Afgha CE
ZINE
FOR DEFEN
ESS MAGA
THE BUSIN
4
ry 201 Eurosato w previe p67
Sir Michael said: “A culture of fear and intimidation has taken grip. Governors are exerting far more influence than is appropriate or acceptable.” The blame game sparked a political row between Home Secretary Theresa May and Education Secretary Michael Gove. The latter blamed the school governors’ ‘influence’ on a reluctance within Whitehall, especially in the Home Office, to ‘confront extremism unless it develops into terrorism’. It then became highly embarrassing for the government when an angrily-worded response letter from Home Secretary Theresa May was ‘released’: “Why is the DfE wanting to blame other people for information they had in 2010? Lord knows what more they have overlooked on the subject of the protection of kids in state schools? It scares me.” May insists she did not authorise the release of the statement, but her special adviser, Fiona Cunningham, who just happens to be the girlfriend of Home Office counter terror chief Charles Farr (a man not to be trifled with) subsequently resigned. Gove appears to be of the belief that the Home Office should be more aggressive in confronting radical Islam. May’s robust defence of Charles Farr would suggest that the Home Office fully supports his strategy. Efforts to highlight extremism in education have clearly been overshadowed by a political spat, perhaps even related to personal ambitions, which is worrying and clouds the issue.
Danny Wright
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Arthur Walsh PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Cassar REPRODUCTION & PRINT Argent Media
© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
3
! EW T S N PA CT -T U C D O PR
Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags
CONTENTS
07 CTB NEWS
Obama asks for $5bn counter-terror top-up; Taliban attack Jinnah International Airport
11 TRANSPORT SECURITY
Maria Andersson from Swedish Defence Research Agency, FOI, and technical co‑ordinator for the ARENA project discusses the need for effective threat detection to protect high value assets in transit
07
19 CYBER SECURITY: DIGITAL SECURITY
Whatever the size or location of the firm, processes must be in place to be able to deal with a cyber attack, urges Andrew Scott at the Business Continuity Institute
19
25 CYBER SECURITY: CYBER CRIME
CTB examines the international collaborative curb on the latest GameOver Botnet, plus a look at Trustwave’s latest Global Security Report
29 PERIMETER SECURITY
29 43
43 CROWD PROTECTION
James Kelly, Chief Executive of the British Security Industry Association, looks at measures you can put in place to protect crowded places and facilities during a terror attack
49 IFSEC 2014 PREVIEW
On 17-19 June at the ExCeL London, IFSEC International will bring together the entire security buying chain in one place
51 COUNTERFEIT DOCUMENTS Project Genesius manager Gary McManus explains an initiative that brings together Metropolitan Police Services and the printing industry to tackle the creation of false identity documents which can facilitate terrorist activity
59 EMERGENCY SERVICES SHOW
The PSSA’s Stephen Munden comments on the emergence of IWA 14, a new international standard for impact testing vehicle security barriers
September’s Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from unpredictable acts of terrorism
35 SECURITY EXPORTS
63 INTELLIGENCE
Recent research suggests there is real appetite from the global marketplace for British security solutions, writes Siân Evans from the BSIA
Intelligence analyst Craig Shrive explores how focused thinking can help counter terror professionals anticipate and thwart terrorist attacks
THE
BUS
INES
SM AGA Z
INE
51
67 65 DEFENCE NEWS
Final phase of UK presence in Afghanistan; NATO mission focuses on Al-Qaida
67 EUROSATORY 2014
Eurosatory 2014, taking place on 16‑20 June in Paris, will help visitors to keep a finger on the pulse of the ever‑evolving defence industry, with cutting-edge technologies on display
Counter Terror Business
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR
DEF
ENC
IS Turn t SUE 8 for th o page 6 e la 5 businetest defenc e and fess news atures
75 FARNBOROUGH INTERNATIONAL AIRSHOW
Farnborough International Airshow 2014, which takes place on 14-19 July, provides an opportunity to keep up to date with market trends and new technologies
www.counterterrorbusiness.com Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
5
E
New! Ultra-lightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance)
Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com
COUNTER-TERROR FUNDING
OPERATION GRIFFIN
Obama asks congress for $5bn to bolster counter-terror effort
Police step up anti-terror drive in London
President Obama has proposed setting up a $5billion fund to expand the Pentagon’s counter-terrorism efforts, as he flagged more US support for moderate Syrian rebels. He made the announcement in a speech at West Point military academy in New York, identifying terrorism as the biggest national security threat to the country. President Obama will be asking US Congress to back the fund so that the US can equip and train allies on the front lines. “For the foreseeable future, the most direct threat to America at home and abroad remains terrorism. But a strategy that involves invading every country that harbours terrorist networks is naive and unsustainable,” Obama said. “I believe we must shift our counter‑terrorism strategy – drawing on the successes and shortcomings of our experience in Iraq and Afghanistan – to more effectively partner with countries where terrorist networks seek a foothold.”
Police in London have launched an initiative to raise awareness of security and counter-terror issues among the general public. Operation Griffin, coordinated by the Metropolitan Police Service, City of London Police and British Transport Police, will see a number of events being held across the capital. Commander Simon Bray, from Specialist Operations, said: “Everyone has a role to play in keeping London safe from terrorism. This operation sees specialist officers working closely with neighbourhood officers and communities raising awareness of security in London. “The threat to London from terrorism remains real and serious, so we encourage the public to remain vigilant and alert and to report anything READ MORE: suspicious tinyurl.com/mevlshd to police.”
RAND REPORT
US under increasing threat, report finds A new report from the RAND Corporation, a global policy think tank, claims that the threat posed by terrorism to the United States is on the increase, with a 58 per cent rise in the number of jihadist groups since 2010. The report concludes that the most significant threat comes from Yemen, Syria, Afghanistan and Pakistan, with a medium level threat emerging in countries like Somalia, Iraq and Algeria. Study author Seth Jones said: “Based on these threats, the United States cannot afford to withdraw or remain disengaged from key parts of North Africa, the Middle East and South Asia. “After more than a decade of war in Afghanistan and Iraq, it may be tempting for the US to turn its attention elsewhere and scale back on counter terrorism efforts. But this research indicates READ MORE: that the struggle tinyurl.com/pxtkmsm is far from over.”
A White House fact circular said the fund would be used for three tasks: expanding the training and equipping of foreign militaries, bolstering the counterterrorism capabilities of allies, and supporting efforts to counter violent extremism READ MORE: and terrorism tinyurl.com/pwk9l25 ideology.
CHINA
CTB News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Counter-terror units deployed in Beijing
150 anti-terror teams have been deployed in Beijing following a number of attacks made by extremists from the Xinjiang region in northwest China. Explosives were detonated at a train station in Urumqi in April, while in March a similar strike left 33 people dead and 140 injured. Authorities believe that the attacks were carried out by the Muslim Uyghur minority who claim they are persecuted by the government. According to the Washington Post, “the government has long denied oppressing Uyghurs or any other ethnic group and has blamed separatist Muslims who want to make Xinjiang an independent state.” The new counter-terror squads are a response to criticisms that the government has been slow in dealing with the issue.
Each unit will have nine armed officers and four assistants, with close to 2,000 personnel providing 24 hour protection. It is claimed that they will be able to reach incidents anywhere in the city within three minutes. However, an article in the South China Morning Post has raised concerns over the level of support the units will be able to provide. The paper says: “The units will cover less than 500km of streets in total, only a fraction of Beijing’s over 21,000km long road network. The units will therefore be placed at ‘critical areas’, although the authorities would not give details on where they were or what READ MORE: qualified as a tinyurl.com/neppzbu critical area.”
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
7
FROM SCENE TO SCREEN
Vislink provides a comprehensive range of airborne and ground based microwave and satcom solutions, enabling the transmission of high quality video and data communications in any situation, from anywhere in the world.
www.VISLINK.com
EUROPE
PAKISTAN
Greater cooperation with Gulf countries needed, EU official says EU counter-terrorism coordinator Gilles De Kerchove has said that European countries should work more with countries in the Gulf region to combat terrorism, with the issue of foreign militia in Syria posing an especially urgent concern. De Kerchove told the television station EBS: “We have to engage more with Gulf countries because they themselves are facing the same problem.” “A lot of their citizens are going to Syria and they want to stem this flow. If you look at measures Saudi Arabia took recently it is pretty impressive. But they had a role also to curb the flow of money. A lot of private donations are sent to Syria and sometimes to some extremist groups. So this is a dialogue we have with the Gulf countries on terrorist financing and propaganda.” “They have satellite channel which play a role, a positive role or less positive role. This is why it is important for the European Union to engage more with these countries,” he said. De Kerchove said he was unsure whether the recent shooting at the Jewish Museum in Brussels was executed by an individual or orchestrated by a larger group. He said: “We have more than 2,000 Europeans who have been in Syria, or in the process of going to Syria. There they will get military training, undertake indoctrination and become much more radical. They will have a network all over the Muslim world. That does not mean that all the returnees will mount an attack in Europe. Very few will.”
Taliban attack major Pakistan airport The Pakistani Taliban has claimed responsibility for an attack on the country’s busiest airport. The assault at Jinnah International Airport began on the evening of Sunday 8 June and continued until dawn, killing at least 28 people, including all 10 attackers. The attack was in revenge for the killing of the organisation’s leader, Hakimullah Mehsud, in a US drone strike last winter. The attackers, who have been described as Uzbeks, were equipped with suicide vests, grenades and rocket launchers. It is believed that they were attempting to hijack aircraft when they were intercepted by security staff. Chief minister of Sindh province, Qaim Ali Shah, said that they were “well trained” and that “their plan was very well thought out.” The attack came as talks between the Pakistani government and the terrorist group were faltering, and raises concerns that the country is unable to offer sensitive targets protection from terrorist strikes. A Pakistani Taliban (TTP) spokesman,
CTB News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
READ MORE:
tinyurl.com/ohnltkc
Shahidullah Shahid, said: “Pakistan used peace talks as a tool of war, it killed hundreds of innocent tribal women and children. This is our first attack to avenge the death of Hakimullah Mehsud.” “We have yet to take revenge for the deaths of hundreds of innocent tribal women and children in Pakistani air strikes. It’s just the beginning, we have taken revenge for one, we have to take revenge for hundreds.”
AL-QAIDA
Norway cracks down on Syrian insurgents Norwegian police have arrested three individuals, one originally from Somalia and two from Yugoslavia, on charges of involvement with ISIL, an Al Qaida division based in Syria, and of planning to join the conflict in that country. Authorities in the country believe that up to 50 Norwegian Muslims have gone or are planning to go to Syria, and that those
returning from Syria could radicalise the local Muslim population, around three per cent of the country’s total population. The Police Security Service said: “The group (ISIL) has conducted systematic torture and massacres of the civil population and these attacks may be characterised READ MORE: as crimes against tinyurl.com/p5fwx5x humanity.”
READ MORE:
tinyurl.com/ozazjwp
COUNTER-TERROR
Counter-terror officer jailed for newspaper tip-offs
A sentence of two years in prison has been handed down to a former counter-terrorism police officer who worked at Heathrow Airport. Timothy Edwards was convicted of selling stories to a newspaper between March 2008 and July 2011 for sums amounting to £22,340. Edwards pleaded guilty to one count of misconduct in public office. The trial at the Old Bailey heard that Edwards had supplied about 30 stories, many concerning Heathrow, including articles about pilots arrested for being over the alcohol limit and a terrorism scare that occurred while a plane was in the air. The newspaper paid Edwards sums ranging from
£250 to £1,200. Another former officer, Sam Azuelos, pleaded guilty at the same hearing and will be sentenced at a later date. Judge Marks QC described the case as a “particular serious one of its type” but said that on the “plus side” Edwards expressed sincere remorse and gave a guilty plea at the earliest opportunity to do so. Marks said: “As a result of acting in the manner in which you did whilst employed as a police officer, you effectively had two paymasters. Conduct of this sort inevitably resulted in a betrayal of trust that’s READ MORE: reposed in tinyurl.com/kqfqk34 the police.”
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
9
ASSET PROTECTION
Trucks, trains, ships and oil rigs are all potential targets for criminal organisations due to their high value assets and often remote or isolated locations. Threat detection technology offers the chance to evade, deter or repel an intruder, explains Maria Andersson from Swedish Defence Research Agency, FOI Organisations that own, use or transport high value assets recognise the need to protect their goods and employees, especially when they are at their most vulnerable – when in remote or isolated situations, at night and when operating alone. By their very nature, trucks, trains, ships and oil rigs are all potential targets for criminal organisations. Furthermore, monitoring systems, early warning and deterrent technology have not been available to address this need at a remotely affordable cost. As a result, there has been an uneasy acceptance that in certain parts of the world, piracy, hijacking or theft are facts of commercial life. However, a refusal to accept this situation has helped to push this issue to the top of the EU agenda. Pirates, highwaymen and train robbers may all sound faintly quaint and old fashioned, but anyone involved in the transport industry will
tell you that their modern counterparts are as big a threat as they ever were. There is every sign that they will remain so, as long as goods and vehicles remain vulnerable when on the move and isolated. While the threat looms large, the technology installed on vehicles to detect potential security breaches remains crude in comparison to that now becoming available for static deployment.
Written by Maria Andersson, FOI & technical co-ordinator for ARENA
PROTECTING HIGH VALUE ASSETS ON LAND AND AT SEA
Transport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
a relatively soft target for bands of organised and often dangerous criminals. The theft of high value, high risk products in transit cost businesses over €8.2 billion a year, according to recent European Union figures. Since the terrorist attacks on New York on September 11th 2001 the threat of terrorism has also loomed large over the transport sector. Oil rigs’ isolation means they face similar threats. Terror organisations may engage in theft to fund their operations or they may see it as an end in itself, potentially disrupting, destroying or capturing vehicles containing hazardous or dangerous materials such as chemical liquids, gas, or radioactive material. After the September 11th attacks the United Nations agreed proposals to enhance the security of dangerous goods in transport. Terror organisations have demonstrated their willingness to target mass transportation networks along with other areas of critical infrastructure. Over 70 per cent of all goods transported in the EU are transported using road haulage, a transport method which carries one of the highest risks of being victim of criminal activity. Truck thieves generally steal the whole vehicle or break into trailers to take the contents, sometimes cutting panels and causing other costly damage to gain access. Drivers too are vulnerable to attack and theft. The most common place for a truck to be attacked is at an E
The theft of high lue, high va ducts in risk pro businesses ost r, transit c.2 billion a yea over €8ding to recent accor ean Union Europ ures fig
THE THREAT A ship, a lorry or a train is often highly secure while in a port or depot, being physically protected and under close surveillance, but once outside they are
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
11
PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures and Blast/ Ballistic Protective Construction. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.
Tata Steel Projects For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com
Our Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation in most cases. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats
ASSET PROTECTION unguarded parking lot while the driver is asleep. Large cities, like London and Madrid are the biggest hot spots, but countries like Belgium also have a problem. In the UK alone, 324,000 crimes were recorded against the transport and storage sector in 2012. The threat is equally pressing at sea as it is on land. Modern day piracy has presented a significant challenge since civil war broke out in Somalia in the early 1990s with an upsurge in recent years posing a threat to critical maritime infrastructure. There were no fewer than 49 piracy incidents in the first quarter of 2014 according to the International Maritime Bureau (IMB), an offshoot of the International Chamber of Commerce focussed on fighting maritime crime. Two of these vessels were hijacked, 37 boarded and five fired on board. Five more attempted attacks were reported. There were 12 reports off the Africa’s west coast, including the hijacking of two vessels with 39 crew taken hostage and two kidnapped. SECURITY ON THE MOVE The impossibility of securing all main roads, rivers and open seas means the ships, trucks and trains they convey need to be equipped to detect threats themselves. Advance warning offers the chance to evade, deter or repel an intruder. A European Commission-backed research project called ARENA, short for Architecture for Recognition of thrEats to mobile assets using Networks of Affordable sensors, has attempted to deliver a solution which could work in a wide range of transport scenarios. There are currently no affordable early warning or deterrent technologies to address the threat. FOI, the Swedish Defence Research Agency, co-ordinated the seven-strong research partnership drawn from five EU countries. FOI’s partners were: international maritime design and engineering company, BMT Group; ITTI, an IT company from Poland; hi-tech firm SAFRAN Sagem Défense Sécurité of France; electronic security company SAFRAN MORPHO, the Netherlands Organisation
for Applied Scientific Research (TNO); and the University of Reading, in the UK. The project is coming to the end of its three-year lifespan. Over that time the project sought to investigate a system applicable to a range of different deployments: stationary platforms relative to the land, such as a truck or train stop; stationary platforms relative to the sea, such as ships in port or oil rigs; mobile platforms relative to land, such as trucks or trains in transit; and mobile platforms relative to the sea, such as ships at sea or oil rig support vessels. Its research built on existing work on the surveillance of public spaces. No new sensor development was done. Instead, the team focussed on exploiting existing, low-cost sensor technologies like visual and infra-red video, acoustic sensors, seismic sensors and radar. It also built on other work, such as the Integrated Mobile Security Kit where a multi-sensor surveillance system is installed in a van which can be brought to public space when needed. Another contributing technology, known as ADABTS (Automatic Detection of Abnormal Behaviour and Threats in crowded Spaces), addresses automatic detection of abnormal human behaviour that might signal crime is afoot. And another, called SECTRONIC, is a 24-hour small area surveillance system for maritime application. ARENA also aimed to minimise nuisance the system might cause if it were to go off for no reason. Humans are naturally good at putting together lots of fragmentary information and signals and spotting what is a threat and what is not. Machines on the other hand are not. The ARENA system combined complementary sensors to reduce false alarm rates. The threat‑detection task was also broken down
About ARENA
Transport Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ARENA (Architecture for Recognition of thrEats to mobile assets using Networks of Affordable sensors) is a research & development project which is part-funded by the European Commission’s FP7 Security Research Programme. Its purpose is to deliver affordable early warning or deterrent technologies which could work in a wide range of transport scenarios. into four interconnected steps: object detection, object tracking; event recognition; and threat recognition. The fewer the bystanders to the vehicle, the easier the system could interpret what is going on, meaning that it would be easier to detect a threat in a quiet railway siding than when standing by a busy platform. For the same reason, trains may, on the whole, prove easier to protect than trucks, which often park in places where there is innocent foot traffic. The project also tackled the sensitive legal and ethical issues involved in surveillance and electronic security, particularly those revolving around privacy. It will be crucial to have the consent of the driver for any camera system which secures a vehicle on the basis of facial recognition. Facial recognition cameras were only used in the cab of a vehicle, so presented no challenge in respect of the privacy of passers-by. FILLING THE SECURITY GAP ARENA’s innovative combination of existing
Trains may, on the whole, prove easier to protect than trucks, which often park in places where there is innocent foot traffic surveillance technology provides autonomous monitoring and situational awareness of the environment surrounding critical mobile assets, alerting personnel to threats. In achieving this goal it has the potential to fill the yawning security gap between harbours, depots and garages, currently a cash cow for criminals and potentially a loophole exploited by terrorists. There has been an uneasy acceptance that piracy, hijacking and thefts are facts of commercial life, particularly when trading in some parts of the world. But a growing refusal to accept this situation has helped to put the issue to the top of the EU agenda. ARENA may signal the beginning of a fundamental shift in the balance of power away from criminals, improving the safety of transport personnel and ultimately, cutting costs for everyone. L FURTHER INFORMATION tinyurl.com/p5bgu2p
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
13
Counter Terror Expo 2014
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT REVIEW
HOME SECRETARY VISITS COUNTER TERROR EXPO
Theresa May, the Home Secretary, was one of the 8,691 visitors to Counter Terror Expo 2014, which closed its doors on 30 April after two very successful days. We report on the event highlights
Now in its sixth edition, Counter Terror Expo has become the premier international event of its kind, bringing manufacturers and service providers together with buyers and specifiers from across the world. Counter Terror Expo 2014, held on 29 and 30 April at Olympia London, proved to be as successful as ever, attended by some 8,691 industry leaders and delegations from across the world. This year saw a 10 per cent rise in pre-registrations compared to 2013. As one visitor commented: “Counter Terror is an essential day for me. It prepares my business for the year ahead by allowing me to research new products and services as well as getting updated on new legislation. It’s also vital for me to be able to meet up and network to gain new ideas and debate the issues.” HOME SECRETARY VISITS CTX Home Secretary Theresa May paid a visit to Counter Terror Expo 2014 on Tuesday 29 April. She was shown around the event by Lord West, former Chief of the Naval Staff and Minister for Security and Counter-Terrorism (from 2007 to 2010), and by Stephen Phipson, the Home Office’s Director of Security Industry Engagement. During her visit, the Home Secretary was introduced to a number of exhibiting companies, including members of the Industry Partnership Programme. Tim Porter, Managing Director, Clarion Defence & Security, commented: “We were delighted that the Home Secretary was able to join us at Counter Terror Expo 2014. Her decision to visit highlights the fact that the event really has become one of the world’s most important arenas for everyone concerned with counter-terrorism and security.” In addition to the exhibition, Counter Terror Expo featured a high level conference programme, structured this year to reflect the four workstreams of CONTEST, the UK Government’s strategy for countering terrorism – Pursue, Prevent, Protect and Prepare.
The est very latogy, technolnt and e equipmom leading fr services uppliers were global sisplay at the on d ibition exh
Home Secretary Theresa May was shown around the event by Lord West, former Chief of the Naval Staff and Minister for Security and Counter-Terrorism (from 2007 to 2010), and by Stephen Phipson, the Home Office’s Director of Security Industry Engagement
14
COUNTER TERROR BUSINESS MAGAZINE | Issue 18
EXHIBITION The very latest technology, equipment and services were on display at the exhibition, with hundreds of leading suppliers from across the world conducting demonstrations and holding workshops. Within the exhibition, there were also three dedicated feature areas: the Armoured and Support Vehicles Zone, the C-IED Demonstration Zone and the Integrated Security in Action Zone. The Security Solutions Theatre featured many interactive product launches, from Schott UK who demonstrated their PYRANOVA® Secure Glass, Adani who E
ON-GROUND TEMPORARY SECURITY FENCING
POLMIL STANDARD FENCE
POLMIL PAS 68 RATED
POLMIL MOB ATTACK TESTED
MODULAR FLEXIBLE DESIGN
POLMIL AIRPORT APPROVED
NATIONWIDE INSTALLATION
®
®
(Test Reports on Request)
®
®
See us on Stand Number F1950
POLMIL ON-GROUND HOARDING ®
POLMIL IS A DIVISION OF ®
BLOK
MESH
UK LIMITED
Specialists in the Design, Manufacture, Hire and Sale of On-Ground Temporary Security Fencing
Tel: 01376 332591 www.polmilfence.com
Counter Terror Expo 2014
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT REVIEW revealed the latest enhancements to their Conpass range of body scanners, and Locken UK Ltd who showcased their cable‑free access solutions for remote sites. GLOBAL COUNTER TERRORISM Multilateral counter terrorism is an ever evolving field influenced in no small part by the tectonic changes of the Arab Spring revolutions and the profound regional consequences from the ongoing conflict in Syria. The global security situation continues to unfold and evolve which forces nations to constantly reconsider and adjust their counter terrorism strategies in line with the evolving threat horizon. The two-day conference on global counter terrorism at Counter Terror Expo considered the global and European counter terrorism strategies and influences, including the UK’s counter-terrorism strategy, and reviewed the key emerging security challenges facing the globe. The conference provided a focused review of the threats posed by radicalisation, home grown terror and violent extremism. The conference also debated the diversified threat from al-Qaida within the global terrorism context and considers the key influences on the future of terrorism. CRITICAL INFRASTRUCTURE Over the two days of Counter Terror Expo, there was a conference stream on protecting critical national infrastructure, examining the key areas of protection and security for critical infrastructure and identifying how resilience should be shaped for critical infrastructure and national assets. There are a wide range of risks to national infrastructure and the CNI conference provided the arena in which to understand how best to mitigate risk to guarantee the security and resilience of critical assets and networks. The conference also delivered insight into human factors and their influence on security and resilience, and discussed CBRN threats and advances in bio-weapons and the implications for national security. The debate then focused on crisis management and securing buildings, infrastructure and transport systems, as well as considering the implications of cyber exploitation on the national infrastructure. SECURING PUBLIC PLACES Crowded public spaces remain an immense security focus as sporting and entertainment venues and transport hubs are some of the most vulnerable spaces to possible terrorist attack and at the same time the most difficult to secure. On 29 April, there was a one day conference looking at using design excellence to counter the terrorist threat and innovative methods to overcome inadequacies in the design of structures.
16
COUNTER TERROR BUSINESS MAGAZINE | Issue 18
This year, for the first time, Counter Terror Expo was co-hosted with two other shows, Ambition and Forensics Europe Expo. Between them, the three events covered the entire counter-terrorism industry and spectrum It considered blast mitigation techniques in protecting buildings and infrastructure and the policing procedures used to secure crowded places and protect the public. It provided a review of design-led crime prevention in the built environment and discussed key aspects of securing the UK’s crowded places from terrorist attack. There was also a one day conference stream looking at emergency preparedness, resilience and response. Blue light services are the first responders to terrorism incidents and their role demands that the highest levels of coordination and interoperability exist between the individual services tasked with a first response. Achieving this in an operationally dynamic and demanding environment requires that meticulous planning is undertaken to ensure effective event mitigation strategies are delivered on the ground. The emergency services conference addressed the complex questions facing first responders. It looked at the key aspects of managing common consequences of terrorism and the challenges terrorism presents for the emergency services. The conference provided an in-depth review of resilience for major emergencies including challenges for rural communities, urban fire prevention, and preparedness and resilience in the face of marauding firearms attack. CYBER SECURITY The cyber threat is a increasingly malevolent and thorny issue for governments and businesses worldwide. While increasing global interconnectivity delivers enormous benefits to society, the cyber threat represents a very real and tangible danger to all. Cyberspace presents a vast opportunity for state-sponsored actors, terrorists, criminals, gangs, ethnic extremists and civil‑society activists to do harm and so national infrastructures and commerce must be clear in what they must do to protect themselves. The one day conference on cyber security and electronic terrorism discussed how the world is changing and whether cyber
terrorism is a real or imagined threat. It looked at the government’s cyber security strategy and new ways to make nations and business more resilient to cyber-attack. It examined the threat to governments and commerce from cybercrime and what the police service and other agencies are doing to combat e-crime. The conference also discussed how to build a defence strategy that works and how big data is a useful weapon in the defence of the cyber threat. The conference also debated information security in the age of social media, security on social network sites, and provided an update on new and emerging threats to mobile devices. PRACTICAL COUNTER TERRORISM Few opportunities exist to discuss the detail of practical counter terrorism from the addressing the threat of solo terrorists to the use of surveillance in counter terror activities. This year there was a one day conference reviewing a multitude of solutions in fighting terrorism in hostile and non‑hostile environments, including the key skills required in counterinsurgency operations. It discussed private vs public sector protective security and how to protect soft targets from hard-line terror. The conference also reviewed the benefits of deploying IED search personnel for VIP visits and significant events, and discussed new solutions for counter terrorism surveillance. To provide a balance to direct action, the conference considered the use of positive engagement with host communities to mitigate hostile security threats and the increasing adoption of ‘soft security’ in numerous theatres. CO-LOCATED EVENTS This year for the first time, Counter Terror Expo was co-hosted with two other shows, Ambition and Forensics Europe Expo. Between them, they covered the entire counter-terrorism picture – from the prevention of terrorist attacks, to the emergency services response if an attack does occur, to the forensic examination of the scene after the event. Complementary to the success of the show there was a rebooking rush on the final day with over 50 per cent of the exhibiting companies booking space one year in advance for CTX 2015. Tim Porter, Managing Director, Clarion Defence & Security, commented: “Counter Terror Expo 2014 was a great success and the feedback we have had from visitors and exhibitors has been outstanding. With so much interest already being shown in the 2015 show, it seems clear that Counter Terror Expo really is the ‘must attend’ event for anyone working in the world of counter terrorism and security.” L FURTHER INFORMATION www.counterterrorexpo.com
X-Ray Security Screening www.totalpost.com Tel: 0845 4900360
Suppliers to the Home Office / UK Border Force Totalpost Services Plc is the exclusive supplier of X-Ray security screening machines to the Home Office/ UK Border Force. Totalpost was awarded the four year contract to supply all baggage, mail, parcel and freight pallet X-Ray security screening machines at the end, of 2013.
X-Ray Security Screening with up to 80mm steel penetration Totalpost Services Plc is the exclusive distributor of industry leading Astrophysics Inc X-Ray security screening equipment
Totalpost supplies and maintains a variety of equipment across the security spectrum including metal detection, security screening and trace detection.
www.totalpost.com Tel: 0845 4900360 Totalpost Services Plc 1 Skelgillside Alston Cumbria CA9 3TR
CUMBRIA | WARRINGTON | SWINDON UK | USA | FRANCE | GERMANY | SOUTH AFRICA
Cyber Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Written by Andrew Scott at BCI (Business Continuity Institute)
DIGITAL SECURITY
PLANNING FOR THE FALL OUT
A new report has revealed that IT-related threats are continuing to provide the greatest concern for organisations. Whatever the size or location of the firm, processes must be in place to be able to deal with a cyber attack, should one occur, urges Andrew Scott at the Business Continuity Institute Global terrorism and extremism have been high on the agenda since the start of the century and as the threats grow, so do the cyber elements. A new report published by the Business Continuity Institute (BCI), in association with BSI (British Standards Institution), revealed that it is IT-related threats that are continuing to cause the greatest concern for organisations, ranking above other threats such as natural disasters, security incidents and industrial disputes. The 2014 Horizon Scan, an annual survey of business continuity professional from across the globe, showed that 36 per cent of practitioners were concerned or extremely concerned about the possibility of a disruption caused by an act of terror – up from 33 per cent in 2013. THE CHANGING NATURE OF THE THREAT Of course the world of terrorism has changed over the years. Bombings and physical attacks still happen but as the world has moved into the digital age, so has the art of terrorism. We have seen terrorist groups using the internet
to recruit, disseminate propaganda and assist in the radicalisation process. Therefore it’s no surprise that cyber attacks are becoming a popular tool for terrorists, or those who have a feeling of disenfranchisement or hold a grudge against an organisation. In fact the Horizon Scan report showed that 73 per cent of practitioners expressed either concern or extreme concern about the possibility of a disruption caused by a cyber attack – up from 65 per cent in 2013. Furthermore, the report showed that the same percentage of business continuity practitioners (73 per cent) were concerned
or extremely concerned about the possibility of a disruption caused by a data breach – up from 66 per cent in 2013. With data being such a valuable commodity, the prospect of leaving it vulnerable to attack is a big risk for any organisation to take. HIGH PROFILE EXAMPLE A high profile example of an organisation using a cyber-campaign for political reasons is that of the Syrian Electronic Army who, for several years, has used dedicated denial of service (DDoS) attacks against the websites belonging to opponents of
The 2014 Horizon Scan, an annual survey of business continuity professional from across the globe, showed that 36 per cent of practitioners were concerned or extremely concerned about the possibility of a disruption caused by an act of terror – up from 33 per cent in 2013 Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
19
No other company can offer you more ways to create, use and manage secure identities in a trusted environment than HID Global. From smart cards and printers to smart phones to managing identities in the cloud, we provide solutions spanning the entire lifecycle of your secure identities. Learn more about how HID Global can help you to create, use and manage your secure identities visit: hidglobal.com. Visit us at IFSEC International, Stand 4/C40, ExCel London, 17-19 June 2014 Š 2014 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design, iCLASS SE, Secure Identity Object, SIO and Seos are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks of their respective owners.
Cyber Terrorism
DIGITAL SECURITY Syrian President Bashar al-Assad and various western organisations. These sorts of attacks can cause maximum disruption to all sorts of organisations by stopping websites from functioning properly; they can prevent e-commerce transactions or just as importantly prevent access to information. Other tactics used by cyber criminals include hacking into websites and defacing them in order to cause embarrassment and reputational damage. NO BUSINESS IS FREE FROM RISK Loss of business and loss of reputation are two major issues for any organisations so attacks like these are a big issue as they have the potential to put organisations out of business. Therefore no organisation should consider itself exempt from cyber threats – so whatever the size or location, processes must be in place to be able to deal with them. When Malaysian Airways Flight MH370 went missing, stories soon emerged of how technology could be used to hijack a plane remotely and these stories weren’t new. The fate of that particular flight is still unknown and these claims unfounded, however the threat of cyber hijacking remains real and should not be ruled out by organiSations in the security sector. In 2011, the International Air Transport Association warned airlines to “remain on their guard” against cyber terrorism which is now described as “a distinct threat to the aviation industry.” In demonstrating the threat, Pascal Andrei, director of aircraft security at Airbus, described a scene from the film Die Hard 2 where the aircraft’s on‑board computer system was deceived into thinking it was 200 metres higher than it actually was, causing the plane to crash. Andrei‘s statement highlights the importance of safeguarding against cyber terrorism as scenes like this may no longer merely be fictional scenarios. Historically we have always thought of cyber terrorism as being politically motivated, but this is just one of many reasons. In 2013, a group of men were arrested in London for attempting to steal £1.3 million from Barclays Bank by installing a piece of equipment that allowed them to take control over some of the bank’s computers. Although the men were caught, the incident demonstrates that the technology exists to do this and it will no doubt get more sophisticated over time.
ally Historic lways ea we hav ght of thou rism as rro with 70 million cyber tepolitically other records being d, but this containing customer e t motiva st one of information such as addresses and is ju asons telephone e r numbers. Two y n a m years earlier, a data
THE VALUE OF DATA It is not just money that people attempt to steal but data too is an increasingly valuable commodity. Recently, Target suffered a major data breach that resulted in 40 million credit and debit card records being stolen, along
breach at Sony resulted in the theft of personal details of up to 77 million customers which cost Sony an estimated $171 million, not to mention the significant reputational damage. Aside from political and financial motives, personal vendettas are also popular reasons to attack an organisation’s computer network. ‘Hacktivist’ groups such as Anonymous are repeatedly conducting DDoS attacks in the same way that SEA do and these are not restricted to political bodies. MasterCard, PayPal and other financial institutions have also been the victims of their displeasure and more recently a children’s hospital in Boston was targeted due to the way it handled a reported case of child abuse. Preventative measures can be put in place to protect an organisation from such attacks.
Some of these can be controlled, for example making sure there is an effective firewall and anti-virus software in place, and ensuring that sensitive data is encrypted and not part of the public facing side of their network. It is also important to make sure that hardware is secure and cannot be tampered with. EDUCATION Of course some things are less easy to control and the human factor is often the weak point where security is concerned. This can be minimised by introducing an employee education campaign to ensure users don’t download inappropriate material, or open suspicious attachments; or by enforcing security controls and managing user privileges to stop people accidently downloading malicious content. With business continuity however, there is always the assumption that eventually the threat will materialise. Whatever measures are in place, nothing will ever be 100 per cent secure. Malicious software is constantly evolving so it is a possibility, or even a strong likelihood, that eventually
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
21
You’ve protected your building, you’ve protected your IT, but what about your Phone System? Internet Phone hacking is a real threat.
Voip.co.uk +44 (0)1869 222500 infosec@voip.co.uk
DIGITAL SECURITY
The recommendation for all organisations is that they conduct their own horizon scan to assess what the threats are to their organisation. Using this data they must assess what the impact would be should these threats materialise
will never truly know if the plan works unless it has been put through the same rigours that any ill-intentioned person could. Business continuity is about ensuring that disruptions don’t prevent you from operating effectively. Disasters do happen, but they don’t need to be a disaster for you. If you have an effective business continuity plan then your business should still be able to do business.
you will be caught out. Organisations must therefore have an effective business continuity plan in place to deal with it.
FURTHER INFORMATION Visit www.thebci.org, where you can download the Horizon Scan Report
THE FALL OUT So what could the impacts be of a cyber attack? An organisation forced to take down their website as a result of an attack would immediately be impacted by the loss of business. They would need to consider what they could do if they were unable to make any sales or deal with customer enquiries through existing methods. One solution would be to set up a back-up system or persuade customers to return once the issue has been resolved. This latter issue may be slightly more problematic when you consider that another major impact, one that could have long term implications, is loss of reputation. If customers don’t feel safe providing you with their personal information, they may be less inclined to deal with you in the future. Businesses need to make sure they have ways of protecting their reputation or rebuilding confidence in their brand. Another impact that could have long term implications, possibly the main reason for
cyber espionage in the first place, is loss of competitive advantage. Whether you’re a government having military secrets stolen by another, or a business having the designs to your latest product stolen, both will result in the loss of your competitive advantage. Potentially the investment you have put in will be wasted. As part of the business continuity planning process, organisations should identify what their most valuable assets are, which ones are most at risk from attack and what the impact would be if these assets were stolen. LESSEN THE IMPACT The recommendation for all organisations is that they conduct their own horizon scan to assess what the threats are to their organisation. Using this data they must assess what the impact would be should these threats materialise and then develop a strategy that could help prevent them from happening or lessen the impact should it happen. Testing your plan is just as important as developing a system for securing your computer network, and as important as producing a business continuity plan. You
Cyber Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Top ten threats This year’s top ten threats to business continuity according to the 2014 Horizon Scan are: Unplanned IT and telecom outages Cyber attack Data breach Adverse weather Interruption to utility supply Fire Security incident Health & Safety incident Act of terrorism New laws or regulations
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
23
WE SET THE STANDARDS WHEN IT’S MISSION CRITICAL BCS CESG Certified Professional Scheme. Independent assessment and verification for information assurance professionals. Now available for the private sector.
BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no no. 292786) 2013
BC509/LD/AD/1212
bcs.org/ia
GAMEOVER BOTNET
Cyber Crime
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ZEUS – GAME OVER OR JUST THE BEGINNING?
If only temporarily, an unprecedented international collaboration was able to thwart the latest cyber threat from the GameOver Zeus botnet. CTB looks at the scale of the problem, further highlighted in Trustwave’s latest Global Security Report, which reveals the top cybercrime, data breach and security threat trends from last year At the end of May, the FBI announced that it believes Russian citizen Evgeniy Mikhaylovich Bogachev is the leader of the gang behind the Gameover Zeus botnet, and has issued a warrant for his arrest. Bogachev, also said to be known as “lucky12345” and “slavik” joins the Agency’s Cyber Most Wanted list. In a press conference, the FBI said that Russian authorities have been ‘productive’, although it is believed that Bogachev may have escaped the country by boat. Gameover Zeus has already resulted in the illegal transfer of millions of pounds around the world and the National Crime Agency (NCA) claims that its appearance in the UK could cost computer users losses running to millions more. The NCA issued a botnet warning about the latest threat set to attack thousands of unprotected machines. It is estimated that 15,000 machines in the UK have already been infected out of the one million worldwide, and internet service providers have said that they will be writing to customers that they believe have been affected. NO NEW THREAT However, this particular threat has been around for some time. Gameover Zeus (GOZ), sometimes known as P2P Zeus or GO Zeus, is a relative of the ransomware known as Cryptolocker which has seen a resurgence in recent months with an Android variant attacking porn users. But unlike earlier Zeus variants, GameOver has a decentralised, peer‑to-peer command and control infrastructure rather than centralised points of origin, which means that instructions to the infected computers can come from any of the infected computers, making a takedown of the botnet more difficult - but not impossible. Officials announced that in addition to the criminal charges in the case, the US obtained civil and criminal court orders in federal court in Pittsburgh authorising measures to sever communications between the infected computers, re-directing these computers away from criminal servers to substitute servers under the government’s control. The orders authorise the FBI to identity the IP addresses of the victim computers reaching out to the substitute servers and to provide that information to Computer Emergency
Readiness Teams (CERTs) around the world, as well as to Internet service providers and other private sector parties who are able to assist victims in removing GameOver Zeus from their computers.
rs The orde the FBI Executive Assistant e s i Director Robert Anderson. r o h aut y t “The efforts re a direct i t n e d i FBI to esses of result of the effective r d d relationships we have a P I e s th ter u p with our partners m o c in the private sector, the victimng out to i h international law c a e r te u t i enforcement, and within t s b u s the the US government.” servers Steve Rawlinson,
CUTTING EDGE COLLABORATION The GameOver Zeus investigation, according to US Deputy Attorney General James Cole, combined “traditional law enforcement techniques and cutting edge technical measures necessary to combat highly sophisticated cyber schemes targeting our citizens and businesses.” The actions to take down GameOver Zeus were truly collaborative: “GameOver Zeus is the most sophisticated botnet the FBI and our allies have ever attempted to disrupt,” said
managing director of web hosting specialists Tagadab, was keen to emphasise that this is more than just another virus. He said: “The scale of this operation is unprecedented. This is the first time we’ve seen a coordinated, international approach of this magnitude, demonstrating how seriously the FBI takes this current threat. “Botnets enable malicious activity which costs the global economy billions of pounds. Because of the way these particular botnets work it is very difficult to find the people E
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
25
GAMEOVER BOTNET behind the crime or to stop the botnet from spreading. This joint operation from law enforcement agencies, ISPs, and IT security vendors is a carefully coordinated strike designed to disable the botnet for a few days. “The operation relies on public awareness and ultimately this is the key to its success or failure. If users fail to update their security in the window of opportunity then there’s little the FBI or anyone else can do for them. Consumer education is hugely important because it prevents criminals from gaining the advantage, but we need a coordinated, long-term awareness campaign backed by businesses and governments across the world if we want messages about the dangers of Trojans and malware to really hit home.” GLOBAL SECURITY REPORT Trustwave has released the 2014 Trustwave Global Security Report which reveals the top cybercrime, data breach and security threat trends from 2013. The report includes the type of information most targeted, industries most compromised, how criminals typically got inside, when victims identified an attack, notable malware trends and other critical components of breaches that matter to businesses. It also reveals how cybercrime is impacting different regions of the world and offers recommendations for businesses to help them fight cybercrime, protect their data and reduce security risks. Trustwave experts gathered the data from 691 breach investigations (a 54 per cent increase from 2012) across 24 countries in addition to proprietary threat intelligence gleaned from the company’s five global Security Operations Centers, telemetry from security technologies and ongoing threat research. While payment card data continued to top the list of the types of data compromised, the report notes that 45 per cent of data thefts in 2013 involved confidential, non-payment card data—a 33 per cent increase from 2012. Non-payment card data includes other sensitive and confidential information such as financial credentials, internal communications, personally identifiable information and various types of customer records. E-commerce breaches were the most rampant making up 54 per cent of assets targeted. Point-of-sale (POS) breaches accounted for 33 per cent of our 2013 investigations and data centers made up 10 per cent. Trustwave experts expect POS and e-commerce compromises to dominate into 2014 and beyond. VICTIMS OF COMPROMISE When ranking the top ten victim locations, the report reveals the United States overwhelmingly house the most victims at 59 per cent, which was more than four times as many as the next closest victim location, the United Kingdom, at 14 per cent. Australia was ranked third, at 11 per cent followed by Hong
Cyber Crime
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
“The operation relies on public awareness and ultimately this is the key to its success or failure. If users fail to update their security in the window of opportunity then there’s little the FBI or anyone else can do for them”
Kong and India, both at two per cent. Canada was ranked sixth at 1 per cent, tied with New Zealand, Ireland, Belgium and Mauritius. Similar to 2012, retail once again was the top industry compromised making up 35 per cent of the breaches Trustwave investigated in 2013. Food and beverage ranked second at 18 per cent and hospitality ranked third at 11 per cent. MALWARE EVERYWHERE Criminals continued to use malware as one of the top methods for getting inside and extracting data. The top three malware-hosting countries in 2013 were the United States (42 per cent), Russia (13 per cent) and Germany (9 per cent). Criminals relied mostly on Java applets as a malware delivery method — 78 per cent of exploits Trustwave detected took advantage of Java vulnerabilities. Eighty-five per cent of the exploits detected in 2013 were of third party plug-ins, including Java, Adobe Flash and Acrobat Reader. Overall spam made up 70 per cent of inbound mail. However malicious spam dropped five per cent in 2013. Fifty-nine per cent of malicious spam included malicious attachments and 41 per cent included malicious links. Unbeknownst to them, employees and individual users often open the door to criminals by using easily-guessable passwords. In December 2013, security researchers discovered a Pony botnet instance that compromised approximately two million accounts for popular websites. When analysing those compromised credentials, Trustwave found that “123456”
topped the list of the most commonly used password followed by “123456789,” “1234” and then “password.” Nearly 25 per cent of the usernames had passwords stored for multiple sites. DON’T BE A VICTIM “Security is a process that involves foresight, manpower, advanced skillsets, threat intelligence and technologies. If businesses are not fully equipped with all of these components, they are only increasing their chances of being the next data breach victim,” said Robert J. McCullen, chairman and chief executive officer at Trustwave. “As we have seen in our investigations, breaches are going to happen. However, the more information businesses can arm themselves with regarding who are their potential attackers, what those criminals are after and how their team will identify, react and remediate a breach if it does occur, is key to protecting their data, users and overall business.” Andy Archibald, deputy director of the NCA’s National Cyber Crime Unit, said: “Those committing cybercrime impacting the UK are often highly-skilled and operating from abroad. The NCA and its partners are alive to the threat, and pursuing new and collaborative ways to tackle and disrupt the perpetrators.” L FURTHER INFORMATION To download the full 2014 Trustwave Global Security Report, visit tinyurl.com/nf3hgjl
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
27
Engineering confidence in an uncertain world
From Bosnia to Afghanistan, HESCO速 force-protection products saved countless lives. We now develop integrated security solutions, flood defenses, rapid-deployment barrier systems, surface-mounted security fences, hostile-vehicle barriers and more. Call us now on +44 113 248 6633
HESCO速 is a registered trademark of Hesco Bastion Ltd
HOSTILE VEHICLE MITIGATION
STRONG RESISTANCE TO HIGH IMPACT ATTACKS
“Counter terrorism work by the UK has got more challenging and harder in the last year,” said Charles Farr, Director for Security and Counter Terrorism quoted in the FT on 10 April 2014. “The security services dealt with more threats from more groups in more countries than ever before. Alongside potential bombings and hijacking, several plots have been disrupted by security services in recent months, but our coverage of terrorist-related activity is not as good
as it might otherwise have been.” The national and international media are full of stories of acts of terrorism, threats and the impact that these have on lives across the world. The leaks of national security agency activity by US security contractor Edward Snowden had ‘unambiguously’ put British lives at greater risk. The government’s annual review of its counter terror policies stated that 257 people had been arrested last year in connection with alleged terrorist
CPNI led the development of the UK document, BSI PAS 68, which was originally published to offer a level of assurance to the UK customer for how a VSB may perform under vehicle impact
activities, but so far only 25 have been convicted in connection with terrorism. The report also noted that the threat of terrorist attack remained ‘substantial’ – meaning that an attack is a strong possibility. Those responsible for ensuring that critical national infrastructure, ‘crowded places’ and business organisations have proportionate countermeasures in place, are facing a tough challenge. INTERNATIONAL TERRORIST THREATS Terrorist threats are becoming increasingly international and more fragmented. The FT recently reported that dealing with threats from Syria-related terrorism now accounts for more than half of all casework undertaken by MI5. With the threat being international in nature, the response from the security
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
Written by Stephen Munden, manager, PSSA Verification Scheme
The Perimeter Security Suppliers Association’s (PSSA) Stephen Munden comments on the emergence of IWA 14, a new international standard for impact testing vehicle security barriers, and the role it will play in safeguarding people and places from hostile vehicle intrusions
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
29
HOSTILE VEHICLE MITIGATION International Standards
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PAS 68: 2013. Impact test specifications for vehicle security barriers; guidance on impact test methods, tolerances, test vehicle type and vehicle performance criteria. The standard provides assurance to organisations that a vehicle security barrier will provide a specific level of hostile vehicle impact resistance. PAS 69: 2013. Guidance for the selection, installation and use of vehicle security barrier systems. Detailed guidance aimed at designers, planners, architects and security managers to ensure that hostile vehicle mitigation solutions are deployed effectively. CWA 16221: 2010. Vehicle security barriers. Performance requirements, test methods and guidance on application. A European CEN workshop agreement that combines the detail from BSI PAS 68 and PAS 69. It provides guidance on test methods for determining vehicle security barrier performance classification and also includes a series of informative annexes that advise on appropriate product selection, installation and use.
The development of the two part IWA 14 was led by the UK Government’s Centre for the Protection of National Infrastructure (CPNI) with the British Standards Institution (BSi) industry must also be international. Various British parliamentary reports have been published this year which deal with matters relating to Britain’s role in the world, its national security and how much money should be spent on defence and why. The joint Commons and Lords committee on the National Security Strategy published a report on 30 April which highlighted a key problem; that those responsible for the nation’s security are preoccupied with short‑term problems, seemingly oblivious of the need to draw
up contingency plans for future potential crises. The committee also stated that: “The UK’s future relationship with the EU is vital to the UK’s national security,” and they castigated Whitehall for a ‘head‑in‑the‑sand’ attitude for claiming that there would be shrinkage in the UK’s influence. EU STRATEGY The EU itself has been addressing the risks of attacks on infrastructure, transport systems and crowded places (rated as high in the
IWA 14-1:2013. Vehicle security barriers part 1: Performance requirement, vehicle impact test method and performance rating. A new international ISO International Workshop Agreement that combines and updates elements from PAS 68, PAS 69, ASTM F 2656 and CWA 16221, as well as new content. It specifies the essential impact performance requirement for a vehicle security barrier (VSB) and a test method for rating its performance when subjected to a single impact by a test vehicle not driven by a human being. IWA 14-2:2013. Vehicle security barriers part 2: Application. A new international ISO document providing guidance for the selection, installation and use of vehicle security barriers (VSBs) and describes the process of producing operational requirements (ORs). It also gives guidance on a design method for assessing the performance of a VSB.
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
31
Perimeter Security
32
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Heald’s Mantis bollard is one of the first in the country to receive new IWA 14-1:2013 classification Always a company at the forefront of innovation, Heald Ltd were recently one of the first companies in the UK to test a product to the new IWA 141:2013 standard. IWA 14-1:2013 is in fact essentially an amalgamation of the previous PAS68 classification and the American ASTM standard, intended to create a single universally agreed standard to apply across the industry. IWA 14-1 is not intended to replace the previous PAS68 and ASTM classifications, rather to combine the two with a view to standardising future international impact testing. Previously attained PAS68 and ASTM certificates will remain valid. Heald’s shallow mount static bollard, the Mantis 80, received the classification IWA 14-1 - V/7200(N3C)/80/90:7:5. This means that it is tested to arrest a class V vehicle from a speed of 80kph. It was IWA-14 tested as a standalone unit, which means that it can be used individually where required, or as part of an array to secure a larger aperture. This makes the Mantis 80 extremely flexible in use. The Heald Mantis 80 is an evolution of the firm’s earlier model, the Mantis 64, offering increased security in a similarly
COUNTER TERROR BUSINESS MAGAZINE | Issue 18
Mantis 80 shallow mount static bollards
simple to install package. It requires a true excavation depth of just 300mm, with no precasting or extra rebar necessary. Not only does this make it ideal for installations
where deep excavation is impossible or undesirable, it also means that it is one of the most efficient, cost saving products of its type currently available. Heald’s fitters can usually excavate a pit, lower in the unit and infill with concrete in less than an hour. Whilst security is always Heald’s top priority, the Mantis series has also been designed with aesthetics in mind. It is available with a range of stylish covers, allowing it to be easily integrated into any environment or design. As standard these are supplied as sophisticated stainless steel, but can be finished in a range of colours as required. Heald are known as world class innovators in the field of roadblocker and bollard security and the new Mantis 80 bollard does not disappoint. It presents an imposing profile whilst offering architects and designers the opportunity to move away from traditional bollard shapes and utilise a range of different options to suit most modern architecture. It also offers a high level of security in a very efficient installation package. FURTHER INFORMATION www.heald.uk.com
HOSTILE VEHICLE MITIGATION UK). The European Commission working document published in April 2014 stated that since 9/11 events, the cooperation within the EU in the fight against terrorism has intensified, although the threat of terrorism remains strong and the number of attacks has increased. According to EU reports, a serious terrorist attack has the potential to have severe impacts resulting in high levels of mortality, economic losses and public disorder. The Europol ‘EU Terrorism Situation and Trend Report 2013’ noted that the ‘unstable situation in the Mediterranean and Middle Eastern region has a direct relationship to the threat to European countries’ security’. Critical infrastructures are complex interconnected systems that are subject to a wide range of risks and hazards, but they are interdependent and can extend well beyond the geographical and jurisdictional limits of one Member State. Achieving a harmonised risk assessment and risk management approach is important, and efforts are underway to work towards common risk assessments and further EU-wide collaboration, but the report says much remains to be done. WORKSHOP AGREEMENT 14 Against this background it makes sense for suppliers of equipment and services designed to provide the highest levels of physical protection for sites and their perimeters from terrorist or criminal attack to adopt the highest international practices. One example of the security industry adapting its practices to address the changing threats in the international context is Vehicle Security Barriers (VSB), used as part of Hostile Vehicle Mitigation in high security perimeters. The development of the two part ISO International Workshop Agreement, IWA 14, was led by the UK Government’s Centre for the Protection of National Infrastructure (CPNI) in collaboration with the British Standards Institution (BSi). It is the result of international collaboration between national governments and the global perimeter security industry. IWA 14-1 provides a harmonised method for full-scale vehicle impact testing a VSB, using a fleet of vehicle types that cover all continents. This means a VSB can be tested against the appropriate vehicle, depending on the geographical location and perceived threat. IWA 14-2 provides unified guidance, specifically on selecting, installing and operating VSBs. BSI PAS 68 Prior to IWA 14 being published, CPNI also led the development of the UK document, BSI PAS 68, which was originally published to offer a level of assurance to the UK customer for how a VSB may perform under vehicle impact. There was good uptake of the document and it is still used internationally. However, its UK oriented vehicle fleet limited its acceptance when used overseas, leading to the development of ISO IWA 14.
Whilst the impact test performance assurance is represented by IWA 14-1 and PAS 68, installation, the subject of PAS 69 and IWA 14-2, is playing catch up, although the Perimeter Security Suppliers Association (PSSA) is doing much to raise the bar in this sphere. The PSSA Verification Scheme gives suppliers of high security perimeter products and installation, a rigorous system for ensuring that they consistently meet legal requirements and internationally recognised standards and demonstrating this to clients. Lucy Foster of ATG Access, an international manufacturer of security bollards and vehicle barrier systems commented: “The IWA 14 standard will unite global impact test standards and provide the industry with an internationally recognised certification
protecting both the EU Presidency and the US President. The Presidency of the Council of the European Union is responsible for the functioning of the Council of the European Union, the upper house of the EU legislature and is a position held by a national government. This presidency’s building in Cyprus houses the meetings of the Council. The Compact Terra Barrier was the specified Hostile Vehicle Mitigation (HVM) solution as it met the threat level requirement – a hostile vehicle could not reach a higher speed of 30mph/48kph on approach as the landscape had been designed to combat this. The Compact Terra Barrier, which has been successfully impact tested to BSi PAS 68:2010 specification, is also a subtle, aesthetically pleasing HVM solution that would not highlight
Perimeter Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Against this background it makes sense for suppliers of equipment and services designed to provide the highest levels of physical protection for sites and their perimeters from terrorist or criminal attack to adopt the highest international practices to evaluate high security vehicle barriers. All security manufacturers can now work to one standard and international tenders requesting alternative and niche certification for products can be succeeded with the IWA 14 accreditation.” SUPPLIER BEST PRACTICE One of the early adopters of IWA 14 was ATG Access with their Stealth Bollard which was one of the first products to be successfully tested using a 7,200 kg truck travelling at 80kph (50mph), achieving less than 1m penetration. The Stealth Bollard has been designed to be installed as a completely new product or to be retrofitted into many existing foundation systems. The replacement of automatic bollard systems would traditionally have required the removal of an excessive, reinforced concrete foundation and rebar which would not only cost an extortionate amount of money but the site disruption would leave an access point unsecured for months at a time. ATG Access’s retrofit option has been engineered to be fully serviceable and the physical conversion takes less than one day per bollard. This product has been designed at the request of a customer who had a set of unserviceable automatic bollards at a critical security entrance. Since the request, they have replaced all of their automatic bollards, successfully upgraded and replaced with the new Stealth Bollard. Two examples where international standard equipment was specified resulted in Frontier Pitts installing their Compact Terra Barriers,
the security issue to the local community. The PAS 68 Hostile Vehicle Mitigation Drop Arm Barrier also secures the entrance of the Hyatt Regency Dar Es Salaam, The Kilimanjaro, Tanzania which was visited by President Obama on his first state visit to Tanzania. IMPACT OF STANDARDS PAS 68 has become widely known and used, but buyers and specifiers have also widely misused it as the specification for VSBs, ignoring selection criteria for safety, operation and environmental protection. It has also been used by suppliers as a ‘badge’ to convey to potential clients that their product has been impact tested – a requirement for most critical national infrastructure incorporating VSBs. So what will be the impact on the marketing of VSBs in the UK, the EU and internationally? PAS 68 is recognised overseas, but it is possible that the new IWA will better facilitate access to export markets as it becomes more highly regarded in the international security industry. It will certainly help to reduce some of the market confusion and help to coordinate international security efforts. But the IWA can play a key part in helping to inform buying decisions which in turn will play a crucial role in the protecting our critical national infrastructure, crowded places, and business organisations from the threat of international terrorism. The new IWA has enabled PAS 68 to go international. FURTHER INFORMATION www.pssaverification.com
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
33
▲
seCurity GAtes
▲
risinG bArriers
JB Corrie & Co Ltd Frenchmans Road Petersfield Hampshire GU32 3AP 01730 237100 info@jbcorrie.co.uk www.jbcorrie.co.uk
▲
JB Corrie & Co Ltd Signal Box Road Blairgowrie Scotland PH10 6ER 01250 873989 jbcscotland@jbcorrie.co.uk www.jbcorrie.co.uk
prison mesh
Perimeter Protection Security Fencing, Gates and Barriers JB Corrie is a specialist Fencing Company dealing with the installation and Manufacture of High Security Fencing Systems. Offering fully integrated perimeter protection, access control, CCTV intruder detection, security management and anti-terrorist solutions. JB Corrie have been manufacturing and installing Security fencing since the company was established well over eighty years ago. During this time the Company has gained a vast amount of experience and expertise within the Security sector and is one of the leading Fencing Contractors and Manufacturers in the UK.
JB Corrie operate with an experienced and multi-disciplined Management team with all the relevant skills required to meet client needs. The Company is fully committed in ensuring that all the work is of a consistent high standard, meeting all of the relevant safety standards in terms of health and safety and quality of workmanship. JB Corrie are able to offer its clients high security installations of fencing, gates, barriers, civils work and special fabrications etc. JB Corrie offer a specialist service at project concept, specification, planning, site survey, manufacture, installation, commissioning and beyond. We also have our own in-house CAD team offering detailed drawings.
JB Corrie Specialist Services include: • High Security Fencing and Gates • Power fencing to BS 1722 Pt 17 • Perimeter Fencing to Government level • Access Control • CCTV • *Perimeter Intrusion Detection Systems (PIDS)
• Sliding gates and swing gates • Blockers • Bollards • Raising Arm Barriers • Security Barriers • Turnstiles • Site Surveys
• Existing Security Installation Reviews • In House CAD Team offering detailed drawings and proposals • Manufacture and Installation of Special Metal fabrications
SECURITY TECHNOLOGY
THE BEST OF BRITISH: UK EXPORTS IN 2014
Recent research suggests there is real appetite from the global marketplace for British security solutions. Siân Evans from the British Security Industry Association examines the UK’s presence in the international security sector UK firms are continuing to turn towards overseas markets for increased income generation and growth following the lingering impact of the economic downturn. The UK’s private security industry is no exception, as research conducted at the end of 2013 by the British Security Industry Association (BSIA) – and its dedicated Export Council – revealed. Aimed at gauging its
members’ experiences of exporting in 2013 and assessing their expectations for 2014, the BSIA’s research revealed that for over 80 per cent of respondents, exporting became more important to them during the recession. This figure is slightly less compared to the 85 per cent of respondents who answered the same in the previous year. “The main factor that attracts overseas
Written by Sian Evans, BSIA
customers to UK security suppliers is their innovation and investment in new technology,” comments John Davies, former Chairman of the BSIA’s Export Council. “Experience, quality of service and the ability to demonstrate a proven track record are also important factors which influence buyers’ purchasing decisions and position UK suppliers in a favourable light.” With the world market for fire protection and security valued at around £176.8 billion, raising awareness in overseas markets of the quality of UK products and services is a key function of the BSIA, the trade association representing the UK’s private security industry, and in particular its Export Council, a dedicated forum for BSIA member companies who are focused on extending their local business to overseas markets. Overseas events are now becoming a platform for UK businesses to showcase their products and services to overseas buyers. In the past 12 months, BSIA members have attended Intersec Dubai, Security Essen and IFSEC Istanbul. Only ten per cent of respondents to the BSIA’s survey did not attend any overseas trade shows in 2013. Helping its members to capitalise on this trend, the Association also organises UK Pavilions at several overseas trade events, thus playing a vital role in forging productive trade links between UK security companies and overseas buyers from around the world.
Security Exports
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
TARGETING CUSTOMERS Despite the financial benefits of exporting and the impact of the economic downturn, export is by no means a new revenue source for the UK’s private security industry, and neither is it wholly recession-driven, as the composition of the BSIA’s Export Council reveals. 80 per cent of the council is made up of companies who have been exporting for a decade or more, with the highest proportion having been active in overseas markets for over 15 years. For the majority of Export Council members, exporting accounts for between 40 and 70 per cent of their business, further highlighting the fundamental role that overseas business plays in driving economic growth for UK companies. When it comes to targeting overseas customers, the UK’s private security industry is highly intelligent and mature in its approach, with sharing best practice and information commonplace among competing companies. Members of the Export Council recently compiled their ‘top ten tips for getting started’, aimed at helping other UK security companies considering the move towards exporting to take the next steps. Among these ‘top tips’, the importance of forward planning and a patient, deliberate approach was a significant theme, with members advising new exporters to exercise caution when entering a new market, claiming that “patience and persistence are essential… successful exporting is about finding the right people on the ground to work with.”
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
35
The ultimate power of real-time 360° AV, captured in your hands
Vemotion gives you the ultimate Common Operational Picture State-of-the-art Vemotion technology records audio visual content from any number of agencies using fixed and mobile cameras, then transmits it real-time to existing command centres, deployable HQs and mobile devices. When you need a clearer picture of what’s happening as it happens, stay in control with Vemotion. secure to AES256 standards easily provide a Common Operational Picture to multiple devices and locations high quality AV over low-bandwidth including GPRS, 3G, 4G and wireless an instant 360° view of major incidents, emergencies and events
To arrange a demonstration, call
01845 521 112 or 08444 906 906 or visit www.vemotion.com
Linking Vision & Intelligence
SECURITY TECHNOLOGY GAINING A FOOTHOLD Despite the need for caution, the guidance also highlights the many resources that exist to help new exporters gain a foothold in overseas markets. Alongside the BSIA, UK Trade and Investment (UKTI) and British Embassies are also considered essential ports of call for UK security companies looking to expand abroad. While – according to the BSIA’s research – the most important vertical market targeted overseas by BSIA members is utilities / critical national infrastructure, with 57.1 per cent of respondents rating this the most important. In addition, hotels and leisure and local / national government were rated as important. Healthcare, retail and transport, which were all rated as equally important by respondents in 2012, were not rated as important at all in 2013. Recently, UK Trade and Investment (UKTI)’s Defence and Security Organisation (UKTI DSO) worked with various security industry bodies, including the BSIA, to produce a report on the capabilities and strengths of the UK security industry. This report found that UK companies receive considerable international recognition for their ability to provide reputable, trustworthy services and reliable products. EVENT SECURITY Among the results of this report, it was noted that the UK provides security support to NATO programmes including maritime protection and defence against mortar attacks, and is also a world leader in chemical, biological, radiological and nuclear (CBRN) defensive equipment. Not only that, UK security companies are also increasingly recognised for their skills in providing security for world sporting events – including the Beijing 2008 Olympic Games and London 2012 Olympic Games – and also has extensive experience in border patrol, utilising the latest biometric and forensic equipment at airports and ports, as well as helping secure cyber activity worldwide through specialist systems developed in the UK. This will be utilised again at the upcoming 2014 World Cup games in Brazil. All of these positive examples of the UK security industry’s capability contribute towards the industry’s international reputation and enable future growth in emerging markets. Reflecting this positive trend, 90 per cent of export council members expect their company’s export business to increase in the next 12 months. The UK Government states that Britain is ranked sixth in the global security export business behind the US, the People’s Republic of China (PRC), Japan, India and Germany. Supporting small and medium enterprises as they develop export strategies is also becoming an increasingly important item on the Government agenda. Recently, the BSIA welcomed the release of a new report entitled ‘Roads to Success: SME Exports’, published in March 2013 by the House of Lords Select
Security Exports
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Case Study 1: Transnet Freight Rail One BSIA member works with South Africa’s biggest rail and logistic network, Transnet Freight, to supply an integrated security management system. This project is a prestigious contract which connects Johannesburg, Cape Town and Richard’s Bay, as well as multiple remote sites, over a Wide Area Network, with a state of the art security system protecting the public, employees and rail property. The system involves distributed database servers, and remote intelligence access control units deployed at the remote sites. Kay Nayager, National Manager of Security Technology for Transnet Freight Rail, says: “This project demands significant international co-operation between the various overseas manufacturers and the local systems integrators to ensure the integrity of the system across the multiple sites involved. The system is one of the most ambitious deployments undertaken in the country, with a degree of integration that probably would be difficult to find anywhere else.” The BSIA member company, commented: “This is a complex project involving many aspects such as total systems integration of CCTV, Access Control and PIDS by our local partners over a country-wide network, in close co-operation with the end-users design team. We are really pleased to be involved and look forward to ensuring a successful and timely implementation.”
Case Study 2: Portuguese Home Office Lisbon based NEC Portugal, who supply integrated ICT systems, was invited by UKTI – British Embassy Lisbon to be part of the Portuguese delegation to IFSEC 2008 at Birmingham’s NEC (National Exhibition Centre) in May 2008, an inward mission organised in collaboration with BSIA. Paulo Coimbra, Trade & Investment Officer at the British Embassy in Lisbon, led the delegation visiting IFSEC and having a series of bilateral meetings with British companies with an interest in the Portuguese security market. Contact with a BSIA export member who distributes CCTV, access control and intruder detection equipment was then established at IFSEC and has been further developed through the member’s subsidiary in Portugal. Following a public call for tender, the BSIA member was awarded a contract by the Portuguese Home Office equivalent, MAI - Ministério da Administração Interna - for the supply of an IP video surveillance (CCTV) system, with a specific set of hi-spec requirements, from image capturing to visualisation and recording capabilities. This project is classified and no further details may be revealed, but the BSIA member reports that “one of the best IP systems has been provided and is now fully operational in Portugal”. The BSIA member was involved in all the technical support and programming of the system having now established an on-going partnership with NEC Portugal allowing for further opportunities into the Portuguese security market. Paulo Coimbra, Trade & Investment Officer in Lisbon, commented: “It is really rewarding to learn about relationships which have been established as a result of the work of UKTI Lisbon and the BSIA”.
Case Study 3: United Arab Emirates The prestigious Downtown Jebel Ali project in the United Arab Emirates (UAE) have installed a BSIA member’s access control technology. The area stretches for 11km with 326 buildings in the 200-hectare urban centre, which is already home to international household names such as Ericsson and L’Oreal. Four of the towers within this area required a high-level entrance control solution to secure pedestrian access at each of the premises. The speedgate technology was also integrated with the fire alarm system so that in an emergency the glass barriers automatically open in the exit direction. The BSIA member manufactured 24 speedgate lanes with six securing each of the four building’s reception areas thus creating a secure perimeter around the lift area. This restricts the upper floors to authorised users only, consequently further securing the building.
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
37
SECURITY TECHNOLOGY the availability of finance, the impact of international regulation and concerns about the infringement and enforcement of intellectual property rights as the key issues inhibiting SMEs’ expansion into export markets. These claims are supported by the BSIA’s own research, which indicates that financial factors, including price and local certification costs, are among the biggest barriers facing UK-based security companies wishing to expand their export trade. Increased construction activity prompted by economic recovery is cited as one of the major drivers of future growth, as is the increased reliance of the public sector on private contract security services. This practice of outsourcing police support functions, including custodial services, crime scene management and forensics, is commonplace in other countries – particularly in Europe and the United States – but is still a growing market in the UK.
The BSIA’s research shows that there is a real appetite out there for the best that British security solutions can offer. It is also encouraging to see that when it comes to making buying decisions ever closer attention is being paid to factors such as compliance with industry standards Committee on Small and Medium Enterprises. The report, to which the BSIA submitted its own evidence, summarises the results of the committee’s inquiry into what role the Government can play in helping over 4.8 million UK SMEs to boost their export sales, acknowledging the important role that exporting plays in assisting economic recovery. Recognising the potential of British SMEs,
in particular their “innovation, enthusiasm, creativity and commitment,” the report insists that “more has to be done to disseminate information about exporting – about how to reap the benefits while minimising the risks, how to take the first step and where to go when difficulties arise.” The report also investigates the barriers to international trade for SMEs, citing
Security Exports
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NEW SOLUTIONS As the BSIA has learned through its continued engagement with parliamentarians and police and crime commissioners, there still remain some key barriers to the partnership working approach here in the UK, with trust, accountability and the delivery of true value for money three of the most important factors raised in the Association’s discussions. However, there is also clear recognition across the political spectrum of the need to consider new and innovative resourcing solutions within the public sector, giving hope that the UK might soon follow in the footsteps of some of its European counterparts, who have successfully transcended these barriers through transparency, mutual trust and a clear definition of responsibilities and limitations. The future is bright for UK security exporters, as John Davies concludes: “The BSIA’s research shows that there is a real appetite out there for the best that British security solutions can offer. It is also encouraging to see that when it comes to making buying decisions ever closer attention is being paid to factors such as compliance with industry standards – a key strength of our members – above and beyond initial purchase price. The strong performance of Export Council members, and the prediction of better to come in the future is a reflection of the quality of solutions and the industry‑leading nature of the innovations that BSIA companies are able to deliver to customers across a wide range of sectors.” Representing 20 sections of membership across both electronic and ‘manned guarding’ sectors, the BSIA represents quality, reputable companies eager to promote the professionalism of the industry through the developments of Codes of Practice and British, European and worldwide standards. FURTHER INFORMATION www.bsia.co.uk/export-council
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
39
Register now >>
Cobham Antenna Systems, Microwave Antennas High performance antennas for security and military applications The most important thing we build is trust
Cobham designs and manufactures the best antennas for both ends of your link. Don’t allow inadequate antennas to let your system down. Cobham Antenna Systems, Microwave Antennas, is a leading UK-based manufacturer of antennas with over 20 years experience providing security and military customers with the most effective specialist solutions. Cobham has a range of over 1500 standard antennas and regularly undertakes development projects for specific customer requirements. Body-worn • Body-worn sector antennas for front-line and tactical communications • Narrow and wide-band patch antennas for covert operations • Directional antennas for front-line video surveillance • Omni-directional antennas for telemetry Security and military applications • Control station antennas • Rugged and aerodynamic antennas for Unmanned Systems • Border monitoring and surveillance • Compact MIMO antennas for greater coverage • PMR and TETRA antennas • Rugged vehicle and spring-mounted antennas
Cobham Antenna Systems, Microwave Antennas T: +44 (0)1638 732177 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/ microwaveantennas
Crowd Protection Written by James Kelly, chief executive of the British Security Industry Association
SECURITY
PROTECTING A CROWDED PLACE
Given the continued heightened threat level in place in the UK, when it comes to providing protection against a potential terrorist attack, the ability to effectively secure a crowded place or facility is of great concern and utmost importance, writes James Kelly, Chief Executive of the British Security Industry Association Crowded places are more often than not busy due to a one-off event taking place, encouraging more people to the area. This calls for the requirement for both manned and electronic security measures. CCTV Electronic security such as CCTV and access control have a range of applications, and play a crucial part in the maintenance of order and safety at events, as do the practical application and involvement of security personnel. Officers’ duties can range from crowd management, operation of electronic security systems such as CCTV and access control, car park attendance and general monitoring duties. They also provide that all-important physical presence on the day, becoming a useful port of call for members of the public requiring assistance or information. With ticketed as well as non-ticketed events expected to draw in considerable
crowds, effective crowd management planning in particular is a paramount concern for organisers of both the main events or the many parallel events which often take place alongside them. With large gatherings, in fact, the risk of incidents occurring such as theft, violence and
vandalism increases, as do health and safety breaches such as irreparable damage to infrastructure or overcrowding. Personnel who have been trained as crowd safety officers with an NVQ Level 2 in Spectator Safety cover the important role of securing against these threats, by controlling î …
As was the case for the London 2012 Olympic and Paralympic Games, a large concentration of high-profile individuals were in attendance, including national and international politicians, celebrities, members of the Royal family and well-known sport personalities. Close protection detail therefore needed to be in place Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
43
LIVE FIREARMS TRAINING TARGETRY
THREAT ASSESSMENT TARGETS Various hostile/non hostile situations can be created by using the overlay solutions. All targets are designed to fit onto standard NATO backing boards – 458mm x 1143mm (18” x 45”).
LlFESIZED 3D FOAM TARGETS
STANDARD POLICE AND MILITARY TARGETS
Manufactured in separate parts with repairable foam to withstand 3-4000 rounds. Create your own realistic shoot/no shoot scenario’s. Full range of replica accessories available. Police
Military
McQUEEN TARGETS, Nether Road, Galashiels, Scotland, UK, TDl 3HE Tel: +44 (0) 1896 664269 Email: targets.ukgal@sykes.com W: www.mcqueentargets.com
SECURITY the crowd and, assisted by security operatives, deterring criminals from their intent. As well as the presence of security equipment and personnel, CCTV can be a valuable asset in helping to control crowds and deter bad behaviour. By using CCTV, police and event stewards are able to have a third eye, as it enables the best possible situational awareness so those in the control room, command vehicle or on the ground, can see the bigger picture of what is happening. This wider view, with CCTV footage linked to a digital map of the vicinity, ensures that officers and event stewards can be marshaled effectively. At a tactical level, operators can drill down to obtain more detail on a specific incident as it develops so that extra resources can be brought to bear and, if necessary, potential troublemakers identified and dealt with. An additional trend is to provide officers with smart phone and tablet technology so they can access and feedback situational-critical information. Looking in more detail at the type of solutions now being employed around major events, one capability that stands out are command vehicles which offer a high visibility presence. Being mobile and typically
featuring multiple CCTV cameras, including a mast-mounted unit, they provide a good all round view and can be moved to specific hotspots. Examples of this are at large scale events such as football games. Rival fans tend to cross or adjacent to public houses in the vicinity of a stadium. Experience has shown that careful positioning of a vehicle, in conjunction with a small number of officers, can effectively maintain a large crowd’s dynamics by moving or splitting sections of fans so preventing dangerous bottlenecks and clashes from developing. TEMPORARY AND MOBILE SOLUTIONS Alongside vehicles, other rapidly deployable forms of CCTV are also becoming a frequent sight at events, especially those which are temporary in nature such as music festivals. Self-contained mobile CCTV towers can be towed to site and set up on the perimeter and at key areas to monitor and control access. Another approach to surveillance is the use of ANPR (Automatic Number Plate Recognition) cameras at the entrance to events to flag up the vehicles of individuals who have a history of anti-social or criminal behaviour. More recently, BSIA member companies have been focusing
as As well ce of sen the pre quipment, e security can be a CCTV asset in e valuabl to control helping and deter crowds ehaviour bad b
their efforts on how the police can utilise smart phone and tablet technology to further enhance the operational capabilities of video surveillance solutions where crowd management and control is a pivotal requirement. In one solution that is being rolled out the police can use their Blackberry phones and tablets to both view and record video footage while they are in the midst of the action. Crucially, should an incident suddenly kick off they can call up what is happening on their phone so they are not necessarily always relying on someone in the control room verbally relaying what is going on, which can take time. In addition, from a recording perspective, by using the in-built camera on their device they can take a snapshot or record an incident as it happens. A major step forward here is the ability to ensure that this evidence can be given sufficient weight in court. Being connected back to the security management platform means there is a time and date stamp associated with the video so it can be logged as an incident in the same way as footage caught on a CCTV camera would be. BODY WORN CAMERAS Another development which is gaining traction is the adoption of body worn cameras. Whilst historically having the right infrastructure and bandwidth has been an issue for the widespread adoption of
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
Crowd Protection
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
45
, n o i t a u t i t s h s g i u r o r e e h t g n e a v d a In a re you h ....... d u s e t t e i b f T A L F N U lat Ltd f R n u R Tyron e d a saf HD n i f d n AND ne a kill zo RON MULTIB t u o t o ge e TY need t e wheel...th u o y y When change th securit o d t e e e t c pla ran e. ct. he gua R4 can giv e t f r d e e p e is ON ll n ers wi NLY the TYR m o t s u O hat VIP C bility t o m d an
HD - m D N A TIB flat syste n N MUL
TYRO
r ru
the m
pula ost po
ne or with o
t runfla 20km o t p lace to . give u safe p a It will res deflated d n i f y e and more t ill zon k e h t t of Get ou the wheel st... e Low co . . . chang e c n a erform High p
on.com
yr www.t
ritical 4 c R s i N e nd TYRO rmanc erfo
ility a in mob s Finabel. e t a m 150km he ulti o R4 is t gives up to N ith tw O R ively w MUM s The TY ance which a v e m drive MINI perfor ility to d to drive a b a D E n NTE ut a GUARA tyres shot o lat. r Runf e e r b o h b / m u m r R o 0k errain m at 5 h All T t i of 50K w k loc e Bead Doubl
p where
SECURITY these systems, the good news is that this is now being overcome as models are being brought to market that are able to stream video and audio content over advanced next generation IP radio networks. CLOSE PROTECTION REQUIREMENTS It is not just crowds that require particular security attention. As was the case for the London 2012 Olympic and Paralympic Games, a large concentration of high-profile individuals were in attendance, including national and international politicians, celebrities, members of the Royal family and well‑known sport personalities. Close protection detail therefore needed to be in place. Mike O’Neill, Chairman of the BSIA’s Specialist Services Section, comments: “There was a commonly-held perception that the Metropolitan Police were to provide Close Protection services to visiting dignitaries at the Games, but police close protection resources were already allocated early on, meaning that many visitors needed to appoint a private company to provide Close Protection during the Olympic celebrations. “A good working knowledge of the area’s geography, its culture and the impact of the events taking place are all essential requirements for effective close protection,” Mike continues. “Equally important is a close protection officer’s ability to adapt their approach depending on the individuals under protection; for example, an individual travelling with young children or family will have much more complex requirements than a person travelling alone.” The close protection officer’s work starts before an event, with the in depth scrutiny of the venue to ensure all angles are covered. In most scenarios, officers must ensure that high profile attendees are able to go about their daily business with almost an invisible bubble around them, reacting only when required. COMMON WEALTH GAMES Police Scotland will be working with a number of security suppliers to deliver a safe and secure Commonwealth Games in Glasgow this summer. The private security suppliers will work as part of what Glasgow 2014 terms an ‘integrated, multi-agency approach’ under the leadership of Police Scotland and working alongside military personnel, British Transport Police and officers from the Scottish Prison Service. David Leather, Chief Operating Officer at Glasgow 2014, comments: “Glasgow 2014 has been working positively and collaboratively with Police Scotland and the private security industry to develop security and stewarding solutions which will play a key role in delivering a safe and secure Commonwealth Games in less than two months’ time. “We recognise and value the important role private security suppliers have to play
Crowd Protection
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
A good working knowledge of the area’s geography, its culture and the impact of the events taking place are all essential requirements for effective close protection and we are delighted to have created the opportunity for a wide range of security providers to contribute to delivering a safe and enjoyable Games experience for athletes, officials and spectators under the guidance of Police Scotland. “Glasgow 2014 is the biggest multi‑sport event Scotland has ever hosted, it will be a special time and we want people to enjoy their experience as much as possible. We are confident that the approach being taken regarding both security and safety stewarding will play a positive role in the delivery of a safe and secure Games we can all be proud of.” GUARDING Security officers and patrols by foot or by vehicle cover a range of crucial functions in securing crowded areas at all times: during busy periods such as events, rush hour, shopping centres, it is crucial guards are constantly patrolling the area and are present at all times. When deployed, officers deal with many issues that enable police or community support officers to free up their time to deal with more serious crimes. From manning access points, escorting trespassers off sites and dealing with substance abuse to traffic and parking management for functions and events, the presence of security officers is crucial in securing a crowded environment.
They also can often responsible for managing technological aspects of a site’s security solutions, such as CCTV or access control. Feedback from end-users reveals that security staff are not only employing security systems effectively but doing so in a way that exceeds their remit. So-called ‘added-value’ services are regularly featured in customer reports of this kind and appears to be driven by the high levels of team spirit and ‘ownership’ of the site’s interests arising from the close working relationships that develop between security teams and the site’s everyday users. In one sense, added value could be described simply as an inevitable element of a security team working conscientiously to discharge its responsibilities but it often goes far beyond that. The willingness of security officers to voluntarily put themselves forward for work that would normally be done by in‑house employees is a recurring theme. Bearing in mind that security often assumes duties that other employees would otherwise have to be employed to carry out – reception staff for example – they are a highly cost-effective way of making the best use of technology and filling the gaps left by police budget cuts. It is important that when securing crowded areas, all elements of security should be taken into consideration. FURTHER INFORMATION www.bsia.co.uk
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
47
Taking your Security Seriously
Complete End-to-End HD Video Surveillance Solution TeleEye offers total video surveillance solutions, from analogue to a full range of HD cameras, IP cameras, monitoring software, standalone servers and DVRs, to suit every application. Our solutions guarantee optimised performance and seamless compatibility, backed up by excellent pre and post-sales support services. SMAC-M Multi-Stream Video Technology – bandwidth usage reduction Banks use private networks: financial transactions take priority regarding network usage. TeleEye products have been engineered to intelligently support a ‘low-cost’ solution delivering excellent performance in low & variable bandwidth environments. Our solutions deliver advanced video streaming performance greatly improving performance for our banking customers, when compared to most H.264 surveillance systems available today, providing functionality and effectiveness. Hacker Resistant – FIVE LAYERS of security protection Providing a ‘Secure Network Architecture’: AES 256 bit encryption, IP Filtering, Secured Protocol, Registration checking and Proprietary Video Coder. sureREC HD Video Recorder… ..is a Windows-based HD Recorder designed for projects requiring video data which run through either existing network infrastructures or dedicated network topologies. It supports recording of 32 TeleEye MX and ONVIF IP cameras and ensures the best environment for professional recording applications. Versatile Video Management Solutions Remote Monitoring and Alarm Verification specialists deliver real-time and professional video alarm verification solutions and also comply with British Quality Standard - BS 8418. Mobile Video Monitoring on the go… TeleEye makes use of telecommunication media to allow users to visually monitor and manage their remote business anywhere, anytime through broadband Internet, LAN, phone line & mobile network applications. As a result you can obtain high quality video on your iPhone and Android Phones. Features include remote arm & disarm, remote playback and remote switching amongst many others. TeleEye Applications TeleEye provides a wide range of CCTV and DVR solutions in different industries for various applications including retail management, banking security, property management, logistics management, alarm centres, public utilities and construction site security.
www.TeleEye.com
EVENT PREVIEW
THE EVENT AT THE HEART OF THE SECURITY MARKET
Taking place on the 17-19 June at the ExCeL London, IFSEC International is the largest event for the security industry, bringing together the entire security buying chain in one place
For more than 40 years, IFSEC International has been at the centre of the security industry. Over its four days, it attracts more than 24,000 visitors, over 650 leading manufacturers, suppliers and distributors from 100 countries. Covering more than just traditional security and fire solutions, this event covers access control and biometrics, counter terror, CCTV and video surveillance, intruder alarms, IP security, intelligent buildings, physical security and lone workers, with many leading manufacturers using the event to launch the latest technologies and solutions. IFSEC ACADEMY IFSEC International covers every area of security, including safe cities, intelligent buildings, IT & cyber security, video surveillance & intruder alarms, integrated security solutions, access control, perimeter protection & physical security. Each area has dedicated exhibitors waiting to show you the latest solutions and products, dedicated education session from the leading lights in the industry and the opportunity to network with key industry players. Working closely with the Security Institute and ASIS, CPD and CPE points are also available for attending the IFSEC Academy sessions. INTELLIGENT BUILDINGS This area will create a combined fire and security area for both events, focusing on
the common area of systems integration and convergence. Unlike other features, it is not a showcase of new products, it’s about holistic solutions. In a nutshell, Intelligent Buildings – Fire & Security opens up opportunities for inter-operability and information sharing between fire, security, IT, data and building management systems. IT & CYBER SECURITY Threats from cyber and IT crime are increasingly important for businesses. When companies, governments and individuals rely on the internet for their day-to-day business, it’s key to protect your business and its assets. With dedicated providers helping businesses and governments to build their IT and cyber security strategy with the latest solutions and technology, and with dedicated education session, you’ll find everything you need to know about IT and cyber security at IFSEC International. VIDEO SURVEILLANCE & ALARMS Covering all aspects of video surveillance and intruder alarms, this dedicated product area will feature the very latest products and services in the industry, including video surveillance, central control rooms, and the innovations with high definition technology. Other products on display include ANPR, IP cameras, remote surveillance, thermal imaging, video analytics, intruder alarm systems, detectors, keypads and control panels to protect your perimeters from outside threats.
INTEGRATED SECURITY To have an efficient and effective security system, you’ll want to ensure your systems are integrated. IFSEC will be focusing on how to ensure systems are integrated, so that each product doesn’t work in isolation. This purpose built area will provide you with access to providers whose job it is to ensure that each area of security is integrated and managed effectively.
IFSEC International
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
ACCESS CONTROL Securing assets is a major focus for international businesses and collaborative efforts between security and IT managers are more and more commonplace when it comes to protecting both buildings and the equipment within them. Key to this is access control. Driven by rising concerns over public and private sector safety, the access control market is set to be worth a substantial $8.6 billion by 2018. PERIMETER PROTECTION Due to the heightened threat in today’s world, the importance of protecting property and assets is paramount to all security strategies. The physical security area allows our visitors to see a range of products in physical security, such as perimeter protection, locking systems, safes and more. With increased security threats from terrorism, the need to protect your business from external threats is never greater. SAFE CITIES The need for global city hubs to future proof, upgrade and plan has never been greater with collaboration from global business leaders, mayor’s office, first responders and local and central government. Safe Cities utilise a multi‑agency approach, led by the government to protect the population, the infrastructure and a city’s economy against the threat of terrorism, criminal activity and natural disasters. City authorities are under enormous pressure to cope with common, expected and unexpected security threats. The disaster management plans and business continuity initiatives are increasingly making local authorities important stakeholders in promoting national security, a role that historically has been limited to the central government. With a focus on four key areas – the city’s infrastructure; cyber security; counter terrorism and public order, the Safe Cities Conference and Exhibition will provide education, solution and technology providers for global governments, public sector officials and companies to secure their cities from threats and attack. L FURTHER INFORMATION www.ifsec.co.uk
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
49
PROJECT GENESIUS
Criminal and terrorist organisations pay top money for quality counterfeits, which they commonly use to facilitate illicit activities. Project Genesius manager Gary McManus explains an initiative that brings together Metropolitan Police Services and the printing industry to tackle the creation of false identity documents We all have identity documents – or at least we think we do. Did you know that, in the UK, there are only two documents that are legally recognised as identity documents? One of these you will never personally use. The first is your birth certificate, and the one you’ll never see is your death certificate. For this reason, along with the fact that we do not have a national identity card, we have, over time, come to accept other documents issued to us as identity documents. The two most obvious examples of this are the UK passport and driving licence. But they were never designed to be used by people to prove their
identity; the driving licence is a document that evidences the individual’s authority to drive a motor vehicle on a road, whilst the passport was designed to allow an individual to cross foreign borders. Criminals are aware of this anomaly and keen to exploit it. A counterfeit document (one that has been wholly created from new) such as a driving licence can be used by a fraudster to assert his identity to gain employment, to open a bank account and to receive his wages. The counterfeit licence can be used to obtain genuine documents that can be used in conjunction or in place of the original counterfeit document.
Reportshat t indicatea and Al Qaid ers made ack 9/11 hijf fraudulent use o rts, visas, passpo y and exit r and ent amps st
PARTNERSHIP Project Genesius is an initiative that has been running since 2007. It is a partnership between the Metropolitan Police Service and the secure printing industry. It exists to prevent organised criminal gangs from obtaining the equipment required to create counterfeit or forged identity documents. It was initiated in response to an emerging trend that was seeing organised criminal groups from abroad arriving in the UK and setting up document ‘factories’ to provide identity documents, enabling illegal travel and economic crime to take place within the UK. The most popular type of document to make is the identity card, be it a driving licence or a national ID card issued by many governments in Europe. As previously mentioned, we have come to accept the driving licence as an E
Written by Gary McManus, researcher, Metropolitan Police
ACTION AGAINST FORGED IDENTITY DOCUMENTS
Organised gangs are costing UK PLC millions of pounds every year, as they use this and other forms of fraud to target the economy. AIDING TERRORIST ACTIVITY The manufacture and subsequent use of false identities pave the way for a wide range of organised crime, including identity theft; human smuggling and trafficking; economic fraud; illegal immigration; terrorism, and other national security threats. Criminal and terrorist organisations pay top money for quality counterfeits, which they commonly use to facilitate their illicit activities. For example, reports indicate that the Al Qaida terrorist organisation and 9/11 hijackers made use of fraudulent passports, use of fraudulent passports, visas, and entry and exit stamps in their international travels.
Counterfeit Documents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
51
PROJECT GENESIUS False identity manufacturing
Counterfeit Documents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The Metropolitan Police Specialist Crime and Operations Directorate has identified a growing trend where illegal document factories are acquiring professional quality printing equipment and supplies to support their criminal activities, allowing them to produce high quality counterfeits of official documents and identities.
The manufacture and use of false identities pave the way for a wide range of organised crime, including identity theft; human smuggling and trafficking; economic fraud; illegal immigration; terrorism and other national security threats identity card and now not just the UK driving licence but all driving licences and national identity cards. This is in spite of the fact that the large majority of people requesting them have no idea how to differentiate between a genuine licence and a counterfeit one. Genesius started by identifying the main manufacturers of identity cards available in the UK and sitting them around a table where they were informed their products were being used to create counterfeit documents. As competitors in business they were asked to unite with law enforcement to take on these organised criminal groups. They all agreed and provided police with a list of their UK resellers, who make up the bulk of the Genesius membership. CODE OF CONDUCT All Genesius members are asked to follow a voluntary code of conduct which involves ensuring strong ‘know your customer’ (KYC) procedures are in place and keeping accurate records of sales made. We also provide advice on what would constitute a suspect order, and
ask that we be informed of any such requests. Genesius membership has grown to accommodate all industries which can be exploited during the creation of identity documents. This includes hologram manufacturers, security paper merchants, rubber stamp manufacturers, plastic card suppliers, used equipment dealers, hot foil press suppliers and many more. All information received from Genesius members is fully researched and stored under strict compliance with existing data protection regulations. Genesius, named after the patron saint of printers, is the first part of a three-tier strategy the MPS uses to combat identity crime. The second is Operation Maxim, a pro-active unit whose remit is to enforce activity against ‘identity document factories.’ They will carry out surveillance, disruption and prosecution of the individuals running these ‘factories.’ The final tier is Amberhill, a unit designed to hinder the use of counterfeit documents. Amberhill collate all counterfeit documents – including those identified by seizing the hard drives from the document factories
The types of items in demand include plastic card printers, embossers and laser engravers; specialist cards and consumables for this equipment; hot foil printers; rubber stamps; security holograms, ultra-violet, and other specialist inks. In 2007, the MPS launched Project Genesius as a voluntary partnership with the specialist printing industry to share information and develop investigative leads regarding the practices of organised document fraud rings. Project Genesius is an opportunity for the specialist printing industry to work together with the MPS to identify and disrupt identity document fraud.
– extracts the relevant information and places it onto a dedicated database which currently holds over 90,000 counterfeit identity documents. The documents include most well known UK documents (licences, passports SIA cards, CSCS, bank statements, immigration permits, etc) as well as driving licences, passports and national ID cards from Europe, Asia, Australia, Africa and the USA. The hard drives are the customer database for the criminal gangs concerned and contain details of all identities that the gang has created. The gangs keep accurate records in case of repeat business from regular customers. Genesius can also help to identify when and where the printers were purchased, which provides further evidence of offending. L FURTHER INFORMATION www.projectgenesius.org.uk
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
53
ngham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.em
“If you're looking for the latest bluelight products this is the Show to attend.� With over 450 key suppliers of kit and services, along with free workshops and demonstrations, The Emergency Services Show covers the entire spectrum and is the only show you need to attend this year. Register for FREE visitor entry at www.emergencyuk.com
Free visitor entry at www.emergencyuk.com
The Emergency Services Show - Covering the entire spectrum of the Emergency Services
Event Supporters
Follow us on twitter @emergencyukshow #ESS2014
FREE PARKING for all visitors thanks to
MOBILE TECHNOLOGY
GETAC POWERS UP ITS X500 RUGGED MOBILE SERVER
Advertisement Feature
merge
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Getac, a leading designer and manufacturer of rugged mobile technology introduces an updated version of its rugged mobile server solution, the most advanced device of its class on the market Monitoring and successfully foiling terrorist attacks requires several elements: Knowledge/ intel – and the ability to share it – with frontline personnel is critical; tools and equipment need to be rugged enough to cope with extreme physical demands; and with terrorists continuing to become more adept at electronic disruption and hacking, information security is vital. The Getac X500-G2 Rugged Mobile Server offers users the ability to deploy a mobile rugged server to the field giving instant server capability in the frontline. LATEST TECHNOLOGY The updated solution offers the latest Intel® Core™ i7 vPro™ processor, which provides high-speed performance and inbuilt protection against hackers, worms and viruses. Its 32GB of RAM and 500GB storage mean that multiple applications can be run simultaneously without
SiRFstarIVTM GPS Gobi™ mobile broadband functionality can also be specified. MIL-STD-810G certified and IP65 rated, the X500-G2 Rugged Mobile Server offers as standard a large 15.6” QuadraClear® sunlight readable display (800nits) with NVIDIA® GeForce® GT 745M for superior performance, enhanced screen readability under sunlight and graphic capability in outdoor environments. While the X500-G2 rugged mobile server provides the perfect central command server solution, operatives in the field can also benefit from a more mobile device. The Getac Z710 Titan 7” Android 4.1 rugged tablet, built with Becrypt’s Titan II encryption platform, provides a fully secure system that can support a range of applications that government and defence markets can use with confidence. Aimed at sectors that require a fully rugged mobile device, the Z710 weighs just 800g, with
Getac X500-G2 Rugged Mobile Server
Getac Z710 Titan
In an emergency situation, it is vital that you can deploy full capability quickly and efficiently at point of incidence for the team compromising on performance. With the expansion chassis, RAID expansion is possible, holding up to five shock-protected disk drives, offering up to five terabytes of storage. Secure encryption solutions are available from Becrypt and Viasat. In an emergency situation, it is vital that you can deploy full capability quickly and efficiently at point of incidence for the team. Vehicle-based rack mount server solutions are not always possible and they take time to arrive and setup. Commercial technology is a lesser option in such a situation as it is simply not designed to cope with harsh and demanding environments. The X500-G2 Rugged Mobile Server has been designed to survive critical working environments without any compromise on performance. It offers fast, effective data consolidation with seamless connectivity to ensure teams work with optimum efficiency and effectiveness wherever they are needed. Communication is handled seamlessly through best-in-class networking interfaces, including standard Ethernet, Intel® Dual Band Wireless-AC 726 and Bluetooth (WiFi Combo BT4.0). Optional
a battery that gives more than 10 hours of operational time. It is a fully integrated device, which includes a 1D/2D barcode reader and an advanced GPS technology (SiRFstarIVTM) accurate to 1.5 metres. Engineered for extreme conditions, the ultra-sensitive touchscreen can be operated even whilst wearing gloves. The new device is also certified to MIL-STD810G and IP65, protecting against shocks, drops, vibration and water/dust ingress. SECURITY The fully-rugged hardware is supported by Becrypt’s secure software, which ensures that all device application and user data is protected with FIPS 140-2 compliant encryption. Administrators also have complete control, so they can create separate encrypted user accounts or personas, enforce strong authentication, and manage different application and device policies - all of which reduce support and maintenance overheads. The Z710 Titan is now shipping and currently undergoing trials with a number of organisations operating at the frontline
Getac X500-G2
of counter-terror activities, including global security company Northrop Grumman. NO COMPROMISE When dealing with high-risk situations where there is serious danger to the public, you cannot afford the risk of equipment failure – it could be the difference between life and death. There is no room for compromise, and with the latest devices from Getac, there is no need to. By bringing together the very latest technology and combining it with the most rugged chassis and the most secure software, Getac’s X500-G2 Rugged Mobile Server and Z710 Titan are essential weapons for security services. Contact Getac if you would like to discuss any aspect of your rugged computing requirements. L FURTHER INFORMATION Tel: 01952 207 221 sales-getac-uk@getac.com www.getac.co.uk
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
55
Our performace is In the modern world, ensuring the security of your people and your building is increasingly challenging – especially with the rise not only in crime but in the ubiquity of more powerful and sophisticated weaponry. At Vetrotech, we’re not just rising to meet this challenge; we’ve already pre-empted it. We’ve developed PROTECT – your essential shield for assured security. 30 years of experience Vetrotech has 30 years’ experience in providing the best high-performance safety glass in the world. Originally supplying fire-resistant glass solutions, we’ve built upon this pedigree to develop the toughest security glass to counteract attacks of all kinds: attacks from bullets, blasts and heavy-duty tools. We’ve developed PROTECT. What does PROTECT protect? Above all, it protects people. At the same time, it protects property and material assets. But not just obvious targets such as embassies, government buildings or banks. We supply PROTECT for all kinds of buildings: schools, hospitals, airports, stations, data centres, museums, hotels and shops. Whatever the requirements – be it blast-resistant glass for a government building, bullet-resistant glass for a bank, or anti-vandalism glazing for a shop window – we have an extensive portfolio of glass solutions in our PROTECT range that covers the full spectrum of security glass requirements. Attack-resistant glass: complete property and asset protection – inside and out When you have valuable assets such as money, jewellery, data and documents – or even historic artefacts and art collections – you want to be sure that they’re protected from attacks of vandalism. Our PROTECT range offers this reassurance and protection, and allows the security services time to reach the scene of the crime. PROTECT doesn’t just stop intruders getting in; it also stops people getting out. So for prisons, penal institutions and forensic psychiatric clinics, it is a shrewd choice – not only because it is escape-resistant, but because it protects both inmates and wardens against injury should an attempt be made. Bullet-resistant glass: security andconfidence in the face of firearms Unfortunately, some buildings are prone to attacks from firearms: banks, ministries, embassies, consulates, police stations, prisons and military organisations... Where the risk of attack from firearms is a very real threat, occupants need to feel confident in the security measures that are in place.
your security The bullet-resistant security glass in our PROTECT range offers supreme protection even from powerful weaponry, in the form of VETROGARD and POLYGARD BULLET. These ultra-tough glass solutions include non-spall (NS) attributes, so even in the event of an attack, there is minimal risk to those in the vicinity if the glass is broken: it does not splinter into sharp fragments but remains bonded to the interlayer. Blast-resistant glass: ultimate safety protection against explosive attacks Barely a week goes by without an act of terrorism being reported. The targets of explosive attacks usually take place in very public areas: airports, railway stations, public buildings, offices and laboratories. Naturally, the biggest concern is for loss of life. But this can also be minimised by protecting the building too, should there be an explosion. Our PROTECT range offers a trustworthy preventative solution in such situations. VETROGARD and the thinner variant, POLYGARD BLAST, provide ultimate blast protection. The non-spall products counteract the effects of explosive attack – offering the best protection for everyone in the vicinity, minimising the risk of injury from flying fragments. Security paired with beauty and functionality First and foremost, PROTECT glass lives up to its name: it protects people, buildings and assets. But apart from this vital functional aspect, we’ve made sure that our security glass products blend seamlessly with modern architecture. We’ve achieved this by providing many aesthetic and functional features – as well as enhancing the building’s energy efficiency. For instance, PROTECT can be combined with our solar control options. This allows tinting of the windows, reducing thermal radiation which in turn saves money on expensive air conditioning systems and provides comfort to habitants or workers. Or we can combine PROTECT with our thermal insulation options, saving money on heating; or even acoustic control options – a useful facility for public terminals.
Certification All the variants in our PROTECT range are CE marked to the highest production standard (AoC Level 1) to ensure life safety, and are delivered with a “Declaration of Performance” (DoP). All glazing that achieves AoC1 rating must be checked regularly by an independent test establishment to make sure it conforms to international production guidelines. When you choose PROTECT, you can be sure that you are choosing the highest-performance security glass on the market. Attack-resistant data Certified to European standard EN 356, PROTECT products can withstand entry attempts from tools ranging from category A1 to A6. They also meet the regulations for specific resistance classes compliant with European standard EN 1627 – and the entire system must conform to resistance classes ranging from RC1 to RC6. Bullet-resistant data Our bullet-resistant PROTECT glass will withstand the impact from specific ammunition with the classifications BR1-BR7, as well as SG1/SG2. It conforms to EN 1063 and AoC level 1. A system test in accordance with EN 1522 confirms the resistance for the complete system. Blast-resistant data With classifications ranging from ER1-ER4, and conforming to the most stringent European standards, the products are non-spall, so there is no danger of injury from flying fragments.
Ultra-strong, ultra-lightweight – ultra-protection PROTECT security glass is made from two or more sheets of glass bonded together with an interlayer of polyvinyl butyral (PVB). This provides the necessary strength and protection even in ultra-lightweight variants that is often only found in thicker toughened glass options.
VETROTECH SAINT-GOBAIN UK Herald Way Binley CV3 2ZG Coventry Tel: 024 7654 7620 www.vetrotech.com/uk
Employees and property successfully protected during riot
C S A ES EH I HS IT SO TR OY R Y C A
Petrojet benefit from 3M Safety and Security technology hours after installation
T H E
3 M
D I F F E R E N C E
“We selected a 3M Safety Film due to its superior shear strength and cost effectiveness versus alternatives” added Mohammed Wael Galal. The Ultra Series has a unique multilayer polyester construction that is significantly more resistant against tearing than other safety films of the same thickness.
C H A L L E N G E
In May 2013, Petrojet Petroleum Co’s management felt their premises were at risk from rioting in Cairo as civil unrest was increasing and spreading in the city. Petrojet needed to quickly secure the company’s glazing in order to minimise the damage and protect the employees inside the building. S O L U T I O N
3M worked closely with Petrojet’s Occupational Health and Safety Department advising that 3MTM Safety and Security Window Film installed on the glass facades would increase the level of protection minimising injuries and damage caused by flying or broken glass as well as reducing the risk of entry into the building through the windows. T H E
P R O J E C T
S U M M A R Y
Installation Date: May 2013 Area Covered: 100 square metres Installation Time: 12 hours Type of Film: 3M™ Safety & Security Ultra Series Project Notes: Petrojet knew the threat of civil unrest in the surrounding area was imminent so they had to act quickly. Although advised curing times are longer, the Ultra Safety Film successfully protected the glazing as well as the building contents and employees against the civil unrest within 12 hours of installation.
R E S U L T S
3M™ Safety and Security Window Film Ultra Series was installed and sooner than anyone believed it would be tested for real. “We would like to thank 3M for supplying the solution. As a result the glass facades were protected in a real situation after only 12 hours of installation.” said Mohammed Wael Galal, Health & Safety Manager. Petrojet’s concerns were proved well founded as the premises fell victim to rioting the same evening. However the 3M technology protected the building, its contents and employees, with not a single injury recorded.
Renewable Energy Division 3M Center, Bracknell, Berkshire, RG12 8HT www.3M.eu/WindowFilm
3M is a trademark of 3M. Please recycle. Printed in UK. © 3M 2014. All rights reserved.
Emergency Services Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT PREVIEW
A CO-ORDINATED RESPONSE TO TERROR THREATS
Now in its ninth year, the Emergency Services Show, taking place on 24-25 September at Birmingham’s NEC, is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism From armed attacks through to chemical, biological, radiological and nuclear (CBRN) threats, the Emergency Services Show is particularly relevant to those involved in helping the UK to respond to, prevent, and recover from of terrorism. Protecting the public calls for a high degree of multi‑agency working, as well as access to highly sophisticated equipment and training; all of which will be showcased at the free‑to‑attend event taking place at the NEC, Birmingham on 24 and 25 September. The Emergency Services Show offers visitors an indoor and outdoor exhibition showcasing
the latest vehicles, equipment and technology, with opportunities to network with blue light services to share best practice. There will be live rescue demonstrations and over 80 support responders, voluntary sector partners and NGOs, as well as specialists who can assist in the recovery phase following a major incident and free College of Paramedic workshops. Exhibiting organisations of particular interest to counter-terror professionals are profiled below. EXHIBITORS UK Government Decontamination Service is provided by the Food and Environment
Research Agency. The service helps the UK prepare for the recovery following a deliberate act involving chemical, biological, radiological and nuclear (CBRN) materials, or an accidental release of hazardous materials (HAZMAT) in excess of local capability and/or knowledge. It does this by providing advice, guidance, management support and access to a Framework specialist suppliers able to carry out decontamination operations, and ensures that responsible authorities have ready access to these services should the need arise. Also exhibiting is the Tactical Training Centre, a nationally approved (College of Policing), modern multi-functional firearms training facility, as will the National Ballistics Intelligence Service, which delivers fast-time forensic intelligence, as well as tactical and strategic intelligence to tackle all aspects of firearms related criminality within the UK. BLUECHER The Bluecher Group is a world market leader for CBRN protection. Over 12 million of Bluecher’s SARATOGA® brand protective suits and systems are in-service in over 40 countries. For even the most demanding tasks, users – including such groups as OPCW inspectors, who are confronted with real CBRN hazards every single day – rely on Bluecher SARATOGA® technologies. SARATOGA® is the only system that fulfils E
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
59
Advertising Profiles
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
New Number Plate Recognition camera system integrates to give multi-layer defence Knighthood International is a leading edge provider of integrated fire and security solutions. Some eight years ago a novel integrated and hosted system under the BearBox brand was rolled out that provided the integration of a number of disparate security devices and offered the security management of, and access to, customers’ sites. BearBox’s main advantage was that there were no elaborate PC or server systems to be installed and that by hosting the data and accessing it via browser, there were no software-related issues on site. In its latest development, Knighthood has added the integration of a specialised ANPR camera with the BearBox system to give real time management of perimeter threats. The ANPR camera carries out real time processing of images at up to 25 fps to provide instant details of vehicles that are approaching. Proscribed vehicles can be instantly matched against watch lists and warnings sent out using a number of communication technologies. Bearbox can also use this knowledge to inform or allow perimeter access or look for further verification as to the driver’s identity or intentions. The inputs from devices and systems such
as biometrics can enable two-stage access control on an ‘expectation and verification’ basis. Finger or palm readers, facial recognition etc can be used with video analytics to harness tracking protocols and monitor suspicious or anomalous behaviour. Knighthood also sees the system integrating with much of the existing site hardware including gates, barriers and access control to provide a user-friendly framework to both properly manage the risk and keep the manpower to economic levels.
Within the scope there are already alarm functions, which monitor not only the physical equipment but also the systems that control them, which can also be vulnerable to attack. BearBox allows management interaction via browser-based tools which can look across a number of facilities to enable management via computers, tablets etc. All external communications are encrypted to reduce the risk of attack via cyber or other remote means and an audit trail ensures that the history of events is available. Many private sector industries with facility security concerns are beginning to implement ANPR based solutions. These include utilities, casinos, hospitals, museums, parking facilities and resorts. The integration of automated camera systems with other parameters and the advent of intuitive, versatile technology is already superseding costly and repetitive manual systems. FURTHER INFORMATION Tel: +44 (0) 1932 780010 sales@knighthoodinternational.co.uk www.knighthoodinternational.co.uk
Specialists in Geospatial Information Management and Exploitation
Managing and exploiting information are essential components in any decision making process. We enable our Clients to make better use of their location based data in order to make better decisions and reveal new patterns, trends and relationships. Helyx provide Clients with specialist support through every stage of delivering operational geospatial systems and capability.
60
COUNTER TERROR BUSINESS MAGAZINE | Issue 18
www.helyx.co.uk
EVENT PREVIEW
The Emergency Services Show offers visitors an indoor and outdoor exhibition showcasing the latest vehicles, equipment and technology, with opportunities to network with blue light services to share best practice all of the essential requirements for practical integrated individual CBRN protection. HOME OFFICE ESMCP The ESMCP will replace the communication service delivered by Airwave with a new national mobile communication service for all three emergency services and other organisations that use the Airwave service. This will be called the Emergency Services Network. ESN will take advantage of the latest mobile technologies to provide a national critical voice and broadband data services. EMERGENCY PLANNING SOCIETY Since its creation in 1993, the Emergency Planning Society has become the driving force in the world of resilience. Through regular consultation with the Government it provides a voice for its members to influence change at the highest level. Members come from all areas of the resilience profession and the Society provides a forum through its extensive network of regional branches to share experiences and disseminate good practice.
As well as exhibiting at the Emergency Services Show, the Emergency Planning Society will be co-locating its AGM at the NEC on 24 September and its annual conference (featuring national and international speakers) at the NEC on 25 September. It will be hosting an awards ceremony and dinner at the nearby Hilton Metropole hotel in the evening of 24 September. CFOA NATIONAL RESILIENCE The UK’s Fire and Rescue sector remains at the forefront in terms of emergency planning, response and recovery, and its National Resilience programme is designed to strengthen the nation’s ability to handle emergencies and crises through the delivery of a co-ordinated response to a range of serious, significant or catastrophic incidents that have wide spread impacts or are of national significance. Over the course of the Emergency Services Show, there will be a team of experienced cross-capability officers representing CBRN(E) including Detection, Identification and Monitoring (DIM), available to discuss aspects of CFOA National Resilience with visitors.
Emergency Services Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
BAPCO Launched in June 1993, the British Association of Public Safety Communications Officials (BAPCO), now known as British APCO, is acknowledged as the leading UK based Association in Britain for all professionals in public safety and civil contingencies communications and information systems. The association will be providing updates on public safety communications including the future of 999, apps for public safety, multi agency information transfer, future use of spectrum and body worn video. OTHER MUST-VISIT STANDS The Institute of Civil Protection & Emergency Management; the National Ambulance Resilience Unit (NARU), Public Health England; Fire Service College; Babcock Critical Services; Training4Resilience, and the Joint Emergency Services Operability Programme (JESIP). Surveillance equipment suppliers of interest include Edesix, Excelerate Technology, Pinnacle Response and Reveal Media. GETTING THERE The NEC is physically linked to Birmingham International Station and Birmingham Airport and is directly accessible from the UK motorway network. Parking for visitors and exhibitors will remain free of charge. Coaches will run from Birmingham International Station to the exhibition halls. L FURTHER INFORMATION www.emergencyuk.com
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
61
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Harquebus – consultants for risk management, crisis management, intelligence and security training Harquebus is an intelligence and security consultancy founded in 2010. It comprises ex-military and civilian intelligence officers with experience in counter-terrorism, counterinsurgency and counter-intelligence operations. Harquebus also has commercial experience with a number of large multi-nationals. To reduce risk and develop competitive advantage for its clients, Harquebus is able to map complex business environments and highlight threats and opportunities. The follow-up includes implementing tailored intelligence and security measures to both influence and control its clients’ operating environments. Harquebus personnel have risk-managed operations in the UK and overseas for military, government and corporate clients. Risk-management activities can be undertaken as part of risk management (before an incident occurs) or crisis management (during or after an incident). Harquebus’s specialist personnel have proven skill sets and a record of successful design and delivery of effective training in civilian and military settings. All personnel are former instructors of Defence School of Intelligence, Chicksands Harquebus178x125-02.pdf
1
US Defense Intelligence Agency and specialist police training cadres. Harquebus recognises that acquiring publicly funded training from specialist government organisations remains difficult due to capacity and time constraints. In such circumstances, clients have confidence that Harquebus can meet their timelines and specific requirements. The company has supplied training solutions to European military and civilian intelligence services and has experience implementing successful training programmes across the Middle East and Africa. Harquebus provides training solutions based on current british military and civilian intelligence and security practices and specialises in intelligence processes and products, counter-intelligence processes
30/05/2014
and products, intelligence collection, analysis techniques, critical thinking, threat assessments (national to tactical) and scenario generation and risk management. The company has brought the lessons learnt on operations to the classroom to deliver interesting and relevant training and its senior trainers are published authors in this field. Additionally, many of Harquebus’s staff have experience in programme-support or projectmanager roles. Examples include restructuring the UK’s Defence School of Intelligence, identifying and managing process improvements across the intelligence cycle for UK MOD as well as writing UK intelligence doctrine. Harquebus’s training and programme support will bridge the gap between a strategic vision and the delivery of intelligence and security capability. It focuses on the human component to ensure that the man is trained to make best use of the machine within the wider context. This can be in support of an equipment procurement programme or as part of a wider government or defence capability enhancement. FURTHER INFORMATION Tel: +44 (0) 20 7692 4207 www.harquebus.co.uk
10:19
INTELLIGENCE AND SECURITY TRAINING
C
M
Y
CM
MY
CY
CMY
Bridging the gap between requirement and effect
K
Human Factors in Intelligence and Security Operations Intelligence and Security Training Analysis Human Intelligence Collection Open Source Collection Intelligence Management Counter Intelligence
www.harquebus.co.uk 62
COUNTER TERROR BUSINESS MAGAZINE | Issue 18
INTELLIGENCE
Intelligence analyst Craig Shrive explores how focused thinking can help counter terror professionals anticipate and thwart terrorist attacks, ranging from insurgent groups to lone cells This morning, you woke up with an idea for a campaign-winning widget, and you cannot wait to present the idea to your team. Your new device is going to put a lot of insurgents behind bars, and you are certain the Government procurement staff will soon be stood at the end of your conveyor belt, pocketing them as they fall off the end. The beauty of your device is its simplicity. It will be easy to produce, and your company will be able to start churning them out within weeks of getting the green light from Government. Unfortunately though, even if such a desirable product were so simple, life is not – as those who work in the new-capability arena will testify. To introduce a new capability effectively, there is far more to think about than merely producing equipment. In fact, equipment is just one of the considerations. What about user training? What about needing more personnel to deploy it? What about new infrastructure to house it? Do you need a new organisation to manage it? Can you integrate its use into current doctrine, or pass its data around and keep that information safe? What about logistics support, for example spares or batteries? How do you ensure its interoperability with existing systems and those of allies? LINES OF DEFENCE For the military these considerations are known as the Defence Lines of Development (or DLoDs), and they all must be addressed before your device can start putting those insurgents behind bars. With so many stakeholders (e.g. trainers, communications specialists, logisticians, doctrine staff) now involved with introducing your new capability, the challenge to get that green light from Government now seems a thousand meetings away. But, in my view, this is not bureaucratic red tape. It is a set
of necessary hoops to jump through. Generally speaking, terrorists don’t follow the DLoD model, and, as a result, the array of technical weapons they can deploy against us is relatively small and piecemeal. When describing the terrorists’ capability, we must be careful not to credit them with possessing a capability just because we’ve seen them deploy it a few times in isolated pockets. That’s not a capability. Often, that’s just the work of a lone cell or a sharp individual, and, given these individuals’ low survivability and inability to promulgate their skills effectively pan organisation, such ‘capabilities’ often fade quickly or are beaten to the punch (from a holistic perspective). For example, when an insurgent group learned to overcome our electronic counter measures by initiating its remote-controlled improvised explosive devices with radio-controlled garage‑door key fobs, they scored a few hits. However, in relatively short order, their innovative attack method was shut down forever soon after the DLoD stakeholders had been aligned to develop a pan-organisation defensive, enduring capability. CAT AND MOUSE Our ability to snuff out the terrorists’ technological innovations within months of their first use has kept the terrorists flitting from one innovation to the next, and, as a result, terrorists have had limited success in deploying a new technology across their organisation before it was countered. Had they succeeded in developing an organisational ‘capability’ (as a professional fighting force understands that term), the result could have been widespread devastation. As this ‘cat and mouse’ game has matured, it seems the terrorists have steadily been squeezed out of all technical areas, and their return to Kenya Mall and Mumbai style attacks using conventional firearms suggests they are running out of ideas to deliver their
ts Terroris rally ne don’t gehe DLoD follow t as a result and model, ay of technical the arr ons they can weap against us deploy latively is re ll sma
Written by Craig Shrives, analyst, Harquebus
UNDERSTANDING TERRORIST CAPABILITIES
technologically innovative ‘wasp stings’. In short, the technology war is being won. This could be cause for celebration but, unfortunately, those close-quarter, conventional-arms attacks as seen in Africa and India are deadly, and, worse still, they look exceptionally difficult to counter. The question now facing the intelligence community is: “How do you stop a terrorist shooting a casual bystander in a public area?” When the terrorists were trying to compete in the technological field, life was relatively easy because weapons based on modern technology tend to come with some kind of detectable signature or they present defenders with some kind of ‘in’ to defuse them. But, what is the signature to detect or the ‘in’ to prevent a coup de grace by pistol against anyone, anywhere in the world? In the intelligence field, there are well-established intelligencemanagement processes, and I am confident these processes hold the key to ‘hearing’ whatever signatures a close-quarter assassin gives off and to interdicting the attack. IDENTIFYING RADICALS I’ve just dreamed up the idea that the time to spot someone who is so radicalised that he would commit a face-to-face murder is likely to be years before he reaches that stage. So, if that’s true, what collection assets exist to spot the radicalisation process? Experience tells us that a formally organised, focused brainstorming session has a good chance of identifying some meaningful indicators and warnings for anything, including a coup de grace. And, thereafter, it’s a matter of routine: create a collection plan and ask the right questions of the right collectors. Who are the right collectors and what are the right questions? To paraphrase Voltaire, no problem can withstand the assault of focused thinking, and it’s our well-established processes that will provide that focus. EFFECTIVE CAPABILITY As an intelligence analysis instructor, I have presented countless students with seemingly impossible tasks, but, armed with the right techniques to generate ideas and the processes with which to apply them, the students routinely create intelligence‑management products which would snatch the advantage from seemingly impregnable foes. So, did all our students leave the classroom to create war-winning capabilities after our training? I certainly hope so, but I suspect those who did still had to manage the inputs of dozens of busy cats. But, that staff process is what makes a capability enduring and all-encompassing. And, that is what makes a ‘capability’ a real capability.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FURTHER INFORMATION www.harquebus.co.uk
Issue 18 | COUNTER TERROR BUSINESS MAGAZINE
63
MILITARY LOGISTICS
FIGHTER JET
Final phase of UK presence in Afghanistan
First F-16 arrives in Iraq
The Ministry of Defence has announced that the UK military logistics headquarters in Afghanistan has changed command for the final time. The new command team at Joint Force Support (Afghanistan) (JFSp(A)) is to oversee the return of UK troops and equipments still deployed in the country, while sustaining force numbers of around 5,000 personnel. Once the mission is complete, approximately 5,000 standard 20-foot shipping containers worth of materiel, including 400 tonnes of ammunition, plus 3,400 vehicles and major equipment, including 50 aircraft, will have been redeployed. This process began in October 2012. Brigadier Martin Moore, the outgoing commander of JFSp(A), said: “The figures stand for themselves, and I am exceptionally
proud of the way that all personnel have contributed to the redeployment effort. “However, it has not solely been about redeployment. There are a lot of people that we are responsible for supporting, and it has been the mission of JFSp(A) to ensure that these people are adequately resourced, from food to gymnasium equipment, ammunition to internet booths; all are vital to sustain a military force on operations.” The new commander, Brigadier Darrell Amison, said: “We will continue to make sure that the force remains supported, as well as being able to conduct their jobs safely and to the usual high standard READ MORE: of UK armed tinyurl.com/kst4m92 forces.”
DEFENCE CONTRACTS
BAE signs six design contracts for Type 26 ship The defence and security specialist BAE systems has announced design contracts for the Type 26 Global Combat Ship, a next generation surface warship which will join the Royal Navy fleet. The six contracts cover: the ship’s air weapons handling system; propulsion shaftlines; an electric propulsion motor and drive system; heating, ventilation and low voltage electrical equipment; integrated navigation and bridge systems; and fixed firefighting systems. BAE System’s Geoff Searle said: “By the 2030s, the Type 26 will be the backbone of UK’s surface fleet and a strong industrial base is essential to sustaining this naval capability. Our partners and suppliers play a key role in this, as we work together to further develop the detailed design of the ship’s systems and equipment to enable us to deliver 13 highly capable, affordable and
READ MORE:
tinyurl.com/oyurggw
The Iraqi Air Force has taken delivery of the first of 36 F-16 fighter jets being built by Lockheed Martin. The company plans to produce one Iraqi F-16 a month, with the first two scheduled to be flown to Iraq later this year. Another three or four will be ferried to the country before the end of 2014. Lukman Faily, Iraq’s ambassador to the United States, said that the delivery sends “a clear sign to the world and the region that a stable and strong Iraq in a partnership of choice with the United States is what we are after.” Iraq’s national security adviser, Falih Al‑Fayyadh, said the F-16 will be “a weapon in the hands of all the people” that would help to defend the new republic. “To have the Iraqi people and the U.S stand side by side to fight this terrorism, there are no words to describe it,” he said.
AL-QAIDA
supportable Type 26 ships for the Royal Navy. With UK suppliers expected to account for around 80 per cent of this significant programme, Type 26 will support thousands of skilled UK jobs in BAE Systems and across the whole supply chain. We look forward to welcoming more suppliers into the Type 26 team in the coming months.”
WARSHIP DEPLOYMENT
Royal Navy warship deployed to Baltic Sea A recent military exercise has seen a Royal Navy warship sent to the Baltic Sea in an effort to reassure the UK’s Eastern European allies. The deployment follows escalations in the tension between Russia and Ukraine. HMS Montrose, a Type 23 frigate, was sent as part of a two-week long security exercise. Exercise Baltops will test the maritime capabilities of Baltic countries and allied nations. Defence Secretary Philip Hammond said: “The situation in Ukraine continues to be of great concern to the international community and it is right that Nato members
Defence News
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
and partners publicly demonstrate our commitment to the collective security of our Nato allies. Military personnel from the US, Denmark, Finland, Estonia, Lithuania, Latvia and Norway will participate. “The UK continues to play a central role in providing reassurance to our allies in Eastern Europe and the Baltic states. Our contribution to these exercises builds on other action we have taken, including the deployment of RAF Typhoons to the Nato air policing mission in the READ MORE: Baltic tinyurl.com/nd84jzt states.”
NATO mission focuses on Al-Qaida NATO is to lead a training mission in Afghanistan in 2015 which will involve around 12,000 soldiers in total, roughly two thirds of whom will be American, a senior United States military official has said. The official also said that 1,800 Americans are to stage counter‑terror operations in the country. He said that the US would like nations with well-trained special forces like Britain or Australia to co-operate. Discussing the counter-terror mission, the official said that the goal is to maintain pressure on Al-Qaida and its affiliates to prevent attacks in the West. This follows an announcement by President Obama that the US military present in the country would be cut to 9,800 from the beginning of 2015. The continued presence of NATO and US forces in Afghanistan after the end of 2014 depends on the country signing a security agreement with America that would set a legal basis.
Issue 8 | DEFENCE BUSINESS MAGAZINE
65
EVENT PREVIEW
Eurosatory 2014
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
THE DEFENCE INDUSTRY LANDS IN PARIS Eurosatory 2014, taking place on 16-20 June in Paris, will help visitors to keep a finger on the pulse of the ever-evolving defence industry, with cutting-edge technologies on display Founded in 1967 on the Satory plateau in Versailles, Eurosatory is currently the largest international land and air-land defence and security exhibition. Held once every two years, in 2012 the exhibition welcomed over 53,480 professional visitors, from 130 countries who came to meet the 1,432 exhibitors from 53 countries, under the keen eye of 684 accredited journalists, from all five continents. Initially dedicated to defence issues, Eurosatory has gradually opened up to the realm of security as most exhibitors produce systems for both sectors. While the contexts of use differ greatly between defence and security, there is real technological continuum between the products. This can clearly be seen from a review of the techniques used in the two fields: unmanned vehicles, surveillance cameras, all-terrain vehicles, communication means, flak jackets, emergency medicine in crisis situations, etc. SECURITY SOLUTIONS Eurosatory strives to present the entire international offering and the whole Land Defence & Security industry and supply chain,
from raw materials to finished products. The exhibition will endeavour again to cover the full spectrum of Defence and Security equipment in all price groups,from new, complex and high-ticket advanced technology systems, to more affordable and tried-and-tested solutions, that particular countries prefer. Eurosatory aims to maintain and develop the exhibition’s security section, which is actually linked to the defence domain through technology. This growing focus on security also brings new visitors either from Government departments seeking to equip emergency response forces, or from the private sector, scouting for solutions for people and assets security. For new exhibitors, a “Discovery Village”
will be set up for very small businesses taking part for the first time in Eurosatory. Featuring 6m² fully-fitted stands, it is an opportunity to discover and benefit from all exhibition’s features and audience at the lowest cost. STAYING UP TO SPEED The defence and security sectors are changing rapidly worldwide. While some countries are reducing their defence expenditure, others are increasing it considerably. Security overall is gaining in importance everywhere, with consistent development in homeland security and growing investments by companies operating in industry, transport, leisure, etc. Eurosatory closely monitors these changes and invites new categories of defence and security buyers to each exhibition. South-East Asia and Latin America are the markets of the future, without a doubt. And new industrial players have also joined the community. Industrial manufacturers make a point of unveiling their latest products at the event. E
ory Eurosat to strives entire the present nal offering tio interna e whole Land and th e & Security Defenc stry and Indu chain supply
Issue 8 | DEFENCE BUSINESS MAGAZINE
67
Eurosatory 2014
EVENT PREVIEW
The six Land Operations Forum conferences will address very concrete technical topics of interest to ground force deployment The future equipment and technologies of the world’s armed and security forces can thus be discovered. At Eurosatory 2012, 400 new products yet to be presented at an exhibition were on display. It is also the venue for meetings with engineers, manufacturers, political decision-makers and specialist journalists from all over the world. Such dialogue is possible at Eurosatory only. The authorities are convinced too, since 152 official delegations from all over the globe, i.e. 672 top-level VIPs including 12 Ministers, 10 Secretaries of State, 20 Chiefs of Staff and 18 national armaments directors attended the last event. AIR-LAND Air-land has long been a key focus at the exhibition. In 2012, there were over 70 tactical UAVs, almost all air-defence systems, several helicopter manufacturers and all the equipment used by airborne troops and security forces. In 2014, the ALAT (French Army Air Corps) has selected Eurosatory to celebrate its 60th anniversary. International Army Aviation delegations from numerous countries will be invited for the occasion and will spend several days at the event. Being a land and air-land exhibition, Eurosatory presents both complete systems available from prime manufacturers and their component sub-assemblies – such as weapon systems, engines,
gearboxes and C4ISR systems – provided by equipment manufacturers. Simulation, including every dimension of armed forces training, preparation and evaluation, is also greatly represented with more than 200 exhibitors in 2012. DISCUSSING KEY TOPICS On the discussion side, Eurosatory is developing its conferences. In particular it will be holding the SIMDEF seminar on “Simulation, a means to preserve operational potential” organized by ADIS, the European Club for Countertrade & Offset (ECCO) symposium on trade with Turkey and the Land Operations Forum. Eurosatory 2014 will also feature an extensive cycle of short specific conferences, focusing on visitor and exhibitor concerns. These highly international conferences last less than two hours and punctuate the five-day exhibition programme. Given by operational, industrial, media and expert speakers, as well as high authority representatives, they are classified into three categories: Eurosatory conferences, Exhibitor conferences and “Do business with” conferences. Among the Eurosatory conferences, we can already highlight the SIMDEF 2014 simulation seminar on “Simulation – a means of safeguarding operational potential” organised by ADIS Group. This theme will be addressed both through a cycle of conferences involving exhibitors from the sector, and
live demonstrations at various stands. 2014 will the introduction of Eurosatory TV, broadcast on a network of 18 digital indoor screens which will ensure a dynamic and flexible means of broadcasting information throughout the exhibition. The network will comprise four giant state‑of-the-art indoor LED screens, two of which will be in excess of 20 square metres in size and 14 branded LCD POD screens which will be strategically placed in all of the key restaurant, cafe and dwell points throughout the exhibition halls. Serving the show as the core medium for the broadcast of up-to-the-minute information, Eurosatory TV will display a select and focused mixture of breaking show news, results from the conference and seminar timetable, interviews of company leaders, live demonstrations teaser and all major events on the show. In addition to the organiser and generic show content produced by Aero3A, there will be limited availability for a select number of exhibitors to enhance their presence at the show by utilising the bespoke airtime packages provided by Limited Space Events. All commercial airtime packages will operate on a first-come, first-served basis. SHARING STRATEGIES The eighth ECCO symposium (European Club for Countertrade & Offset) will also be held at Eurosatory. This international E
Issue 8 | DEFENCE BUSINESS MAGAZINE
69
Eurosatory 2014
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
Unique cooking system for survival situations The award winning Zip Military Cooking Fuel is a safe, non-toxic fuel that militaries around the world can use for boiling water to cook food, wash and purify water for drinking. The fuel is made using a unique biofuel formulation which is a highly efficient alternative to more traditional options such as hexamine, gas and alcohol gels. In conjunction with the fuel, a new range of cooking systems has been developed. Together, the fuel and stoves create a unique set of high performance, lightweight cooking systems that target individual soldiers, group units and those cooking in survival situations. There are three stoves in the range: Boilex ‘hinged’ stove: A hinged, flat packed stove which is lightweight and ideal for personal cooking; Boilex ‘Group’ stove: A larger, more robust stove, lightweight and ideal for group cooking and
70
DEFENCE BUSINESS MAGAZINE | Issue 8
Boilex ‘All in One’ stove: A unique, flat packed design that folds out into a stove and cup cooking system, ideal for survival situations or simply as a replacement for other heavier, more costly systems. For more information on these innovative cooking systems, visit us at: Hall 5, Stand KJ558 within the UK Pavilion at Eurosatory, Paris, 16-20th June 2014. FURTHER INFORMATION Contact: Keiron Francis, Zip Military Specialist Tel: +44 (0)1372 360833; Mobile: +44 (0)780876114 www.zipmilitaryfuel.com
EVENT PREVIEW on simulation and training and the key issues in this area. The nature of conflicts and situations confronting the armed forces has changed, and simulation is an economical solution in line with budget reductions. Today simulation technologies offer training conditions identical to reality, at lower cost. Another cluster will look at civil security and emergency response. In the face of an increasingly broad spectrum of threats, providers of partial or integrated solutions are gathered in a single location, to present specific or global responses to the security forces, governments, non‑governmental bodies and industry, as well as the transportation sector and organisers of leisure activities. Visitors to Eurosatory will be able to meet key players in this domain, networking with high-level decision makers from governemtns and NGOs. Other technology niches will look at: CBRNe; UAVs and UGBs; critical infrastructures and sensitive facilities protection; embedded electronics; and measurements, tests and testing centres.
Eurosatory 2014
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
ion, Simulat every g includinsion of dimen s training force armed greatly is ed with t n e s e r rep an 200 h t e r o m rs exhibito
organisation boasting 70 members of 16 different nationalities works to promote the knowledge and experience of firms involved in offsets and countertrade. At Eurosatory 2014, the emphasis will be placed on trade with Turkey. As usual, the six Land Operations Forum conferences will address very concrete technical topics of interest to ground force deployment. The Exhibitor conferences provide a dedicated arena for exhibitors to present their products or systems. And the “Do Business With” conferences, also organised by the exhibitors, allow them to highlight their industrial strategy and their purchasing policies and standards to attract subcontractors. In addition to the conferences, Eurosatory offers a range of business-development services. “Strategy consulting” and
“One‑to‑One Business Meetings” (organised this year by the Paris Chambre de Commerce et d’Industrie) are major levers. The aim is to help very small, small and medium‑sized firms develop their business abroad, wherever they are based, either by obtaining geopolitical information via the Think Thanks village, or by meeting with experts from their target countries. Pre-scheduled appointments with international prime contractors are also highly productive. TECHNOLOGIES Exhibitors positioned on particular technology niches can gather into clusters to improve their visibility and be more easily identified by visitors (highlighted signs), with dedicated conference area set aside. These technology clusters prove highly useful for visitors. Among the clusters will be one focusing
THE RUN UP TO THE EVENT To briefly review the exhibition preparations, the marketing is going very well. Over 95 per cent of space is already sold and more than 1,286 exhibitors were registered as of 20 March 2014. However, it is still early days to draw conclusions. The forthcoming event looks set to be highly international with two thirds of exhibitors coming from abroad and representatives of new countries like Japan and Argentina. With three months still to go, 54 countries are already registered. As for visitors, the registration rate is very promising and much higher than in previous years, but we must remain cautious. The number of official delegations should nonetheless increase significantly and include a high proportion of authorities interested in security. Talking of figures, it has to be said that with 70 per cent of international exhibitors, over 53,000 professional visitors and 68,000 square metres of net stand surface area (figures certified in 2012 by OJS, a recognised independent organisation in Europe), Eurosatory is by far “The World Leading Defence & Security Event”. We look forward to seeking you at Paris Nord Villepinte Exhibition Centre from 16 to 20 June 2014. L FURTHER INFORMATION www.eurosatory.com
Issue 8 | DEFENCE BUSINESS MAGAZINE
71
Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.
Your Global Partner for Servo Technology & Design.
info.uk@infranor.com www.infranor.com +44(0)208 144 2152
SLOTLESS MOTORS
ZERO COGGING SERVO MOTORS
Advertisement Feature
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if they significantly improve machine performance. In this article, Infranor looks at the benefits of slotted motors and their applications Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counter parts. Following is a closer look at the technology, plus realistic tips on evaluating whether or not your application could benefit from slotless motor. SLOTTED SERVOMOTOR CONSTRUCTION A traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these; when current flows in the wire, an electromagnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits. BENEFITS OF SLOTLESS MOTORS Higher Torque: A slotless motor’s redesigned stator allows the rotor to be significantly larger, because torque increases proportionally to rotor diameter. Torque from a given slotless motor is significantly higher than that from a similarly sized traditional slotted motor. Due to the absence of teeth, the area available for windings is also greater – which
further increases torque. More specifically torque at a given speed can be increased by up to 25 per cent compared to a slotted motor. Higher Speed: As the magnets pass by the teeth in a slotted motor, a change or modulation in the magnetic flux is created. Which in turn induces voltage in the surface of magnets (e=dø/dt) these magnets are conductive so a current flows in them. These Eddy currents increase exponentially with speed and create heat in the magnets, which in turn diminishes their strength. As slotless motors have no teeth they can achieve speeds in excess of 32.000 rpm. Higher Power: Power is calculated by multiplying torque by speed. Because a slottless motor outputs both higher speeds and torques, it can produce more than twice the power of a slotted motor of the same size. Smoother motion: As the magnets on a slotted motor’s rotor move past the stators iron teeth, they are magnetically attracted. This creates a torque disturbance known as cogging. As there are no teeth in a slottless motor, cogging is eliminated – yielding a smoother motion. Easier Tuning: Motors with larger rotor inertias can be easier and simpler to tune. If the load becomes momentarily decoupled from the motor (a common phenomenon,) the servo loop is less likely to become unstable if motor inertia is high relative
Applications using a mixture of motor technologies available from Infranor Frameless
- Land & Sea Based Gun Systems - Surveillance Radar & Masts - Under Water Cranes
AC Brushless
- Positioning Turrets/Towers - Motion Platforms/ Bases - Aircraft Pilot Controls
DC Brushed
- Vehicle Ventilation, ELLS - Missile system Platforms - Ordinance Storage
DC Brushed
- All Munitions Feeds - Aircraft Pay Load Management Systems
Encoders
- Guidance Systems
to the load. In fact, precise servo tuning and filtering, which can be difficult to achieve, may not be required with a slottless motor. Better Stiffness: A rotor with a larger diameter has greater stiffness because torque increases with rotor diameter and a higher torque motor responds faster to any displacement from the commanded position. The torque displacement curve is steeper. Higher efficiency: All of the above traits boost the efficiency by up to 25 per cent over slotted motors. APPLICATION BENEFITS FOR SLOTLESS MOTORS Higher torque is beneficial for most applications and is often the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money (if the motor is part of a moving component, a smaller motor also weighs less and requires less energy to move.) A motor that can run fast may be the obvious choice for high speed applications such as centrifuges. But faster speeds can also help reduce overall machine cost and help increase machine output. If the machine’s mechanics can handle higher speeds a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and Engineering teams. L FURTHER INFORMATION E-mail: info.uk@infranor.com www.infranor.com
Issue 8 | DEFENCE BUSINESS MAGAZINE
73
QUALITY DESIGN • QUALITY MATERIALS • cast standard (UK government endorsed)
Blunt Trauma Protection Tested and certified to uk government (CAST) standard
Solo Shields Bespoke specification available
Scorpion Interlock Shields Public Order Batons
003
FM 56364 BS.EN.ISO 9001:2000
DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: enquiries@dmsplastics.co.uk www.scorpionppe.co.uk
Farnborough Airshow
EVENT REVIEW
THE EVENT OF CHOICE FOR THE AEROSPACE INDUSTRY Farnborough International Airshow 2014, which takes place on 14-19 July in Farnborough, provides an opportunity to keep up to date with market trends and new technologies By the close of the Farnborough International Airshow in 2012, the event saw US$72 billion of confirmed orders and commitments covering a total 758 of aircraft. Over the course of the five trade days, over 109,000 visitors attended the show’s 1,500 exhibitors. From main frame manufacturers to specialist products the Farnborough International Airshow still remains the leading trade event on the aerospace calendar. Once again, the 2012 show saw a catalogue of high-profile firsts. Most significantly, there was the announcement of £120 million investment in the aerospace industry by the British Government. Announced at the show by Secretary of State of Business, Innovation and Skills, Vince Cable, MP, and further endorsed by Prime Minister, David Cameron who opened the show, the investment, is a significant step to maintaining the UK’s market position as number one in Europe and second only the US globally. Virgin Galactic, Richard Branson’s brainchild for commercial space travel also chose FIA2012 to make its European debut of
Spaceship 2 and announce ‘LauncherOne’, its new air-launched rocket specifically designed to deliver small satellites into orbit. And, for the first time in Airshow history, Boeing Commercial Airplanes participated in the flying display, showcasing its Boeing 787 Dreamliner at the show.
80 per cent of those surveyed considered FIA essential to their businesses. In planning for 2014, FIA organisers Farnborough International Ltd (FIL) continue to improve and develop features that allow visitors and exhibitors alike even better networking opportunities. This has seen the development of dedicated zones in Space, Intelligent Systems (previously the unmanned systems showcase) and innovation, a targeted conference programme, a Meet-the-Buyer event, and Civil and Military Delegations programmes. The show is now 95 per cent sold with confirmed participation from all the major commercial and defence manufacturers including Airbus, Boeing, Bombardier, Embraer, Finmeccanica, GKN, Lockheed Martin and Rolls-Royce. E
Over t en 80 per ctors of visi er consid ough bor the Farn ational Intern ssential e Airshowtheir to ses busines
INNOVATION So why does the industry choose the Farnborough International Airshow? Quite simply, it’s the meeting place for the aerospace industry. No other event allows visitors and exhibitors the opportunity to meet new and potential business partners, colleagues and existing business customers. Furthermore it allows the industry to keep up to date with market trends, new products and innovations. In a survey of visitors to the 2012 show, over
Issue 8 | DEFENCE BUSINESS MAGAZINE
75
TM
More Than Just A Monitor
TM
The Only Field – Upgradable Transport Monitor
That You Can Change as Needs & Technologies Evolve
Ultrasound, video laryngoscope & new algorithms are the first of many new capabilities to be introduced*
Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care & the newly adopted joint TCCC card* Tempus Pro:
• Has the longest battery life (over 10 3/4 hours monitoring all parameters)**; • Is the most compact; • Is the most durable & rugged vital signs monitor available.
Call us now for more information: Tel: +44 (0) 1256 362400 or e-mail: info@rdtltd.com TP A 0214 www.rdtltd.com Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014. * Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.
EVENT PREVIEW EXHIBITORS Key highlights over the last few months include new international pavilion participation from Tunisia, Norway and Malaysia; Gulfstream returning to the show after a two show absence; and a number of exhibitors increasing their exhibition space including GE and Irkut. Additionally, the Space Zone has further expanded to accommodate additional exhibitors and FIL has negotiated a number of multi-show deals with exhibitors including Thales, Martin Baker and Boeing further reflecting the strength of the international showcase. The flying display is naturally another fundamental reason why FIA remains so popular. Located at the Farnborough Aerodrome in Hampshire, the site is long steeped in aviation history from the first powered flight by Samuel Cody in 1908 to the testing site for the Hawker Hurricane. Home to the show since 1948, the airfield sits on a natural amphitheatre and the hospitality chalets are built on its terraces
along the run-way allowing perfect viewing of the air display. It’s the perfect venue for mainframe manufactures to display their latest in military and commercial hardware. PROMOTING THE INDUSTRY So while the Farnborough International Airshow continues to be highly regarded and every effort is made to facilitate business for exhibitors and visitors at the show, airshow organisers, FIL are aware of new competitors in its wings. As champions for the UK aerospace industry and central to showcasing British expertise to an international audience, FIL understands the importance of maintaining FIA’s leading position. As such, the event specialists have embarked on an ambitious site development programme that will see the construction of permanent A Row chalets and a purpose built exhibition hall – delivering a much awaited departure from temporary structures familiar to the show. The permanent chalet buildings on A Row will be fit
No vent other e isitors v allows itors the b i and exhrtunity to oppo ew and meet n business al potenti ners and part ers custom
for purpose, offering greater benefits to customers including reduced fit-out costs, on-site parking and permanent mains power, water and waste facilities. FIL has already been awarded £2.5 million in funding from Enterprise M3 Local Enterprise Partnership allowing FIL to push forward with the A Row Chalet project. Groundwork, started in August and construction is due to be completed by May 2014 allowing plenty of contingency and fit‑out time for the impending 2014 Farnborough International Airshow. FIL are currently bidding for funding which on top of its own capital expenditure will see the construction of the permanent exhibition facility.
Farnborough Airshow
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
REGISTERING The Farnborough International Airshow will take place from 14-19 July 2014. Exhibition space is still available if organisations are still interested in participating at the show and trade visitor passes are on sale with an opportunity to win a Breitling Watch. L FURTHER INFORMATION www.farnborough.com
Issue 8 | DEFENCE BUSINESS MAGAZINE
77
Advertisers Index
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
A truly portable under vehicle inspection and surveillance system VISOR is an under vehicle inspection and surveillance system that does not compromise on performance. VISOR’s high quality digital colour cameras ensure that the composite underside image is clear and detailed. Because the cameras are angled operators can ‘see around’ objects to find threat items. Portable VISOR models can be transported in the trunk of a car and deployed in a few minutes by one person Permanent VISOR systems do not require excavations or drains as the camera unit is fixed to the road surface. All VISOR systems are strong enough to be driven-over by trucks. VISOR’s proprietary software stitches the images from each camera into a single composite of the underside in about one second, keeping all of the image data. The intuitive interface allows operators to
review each underside in detail, zoom into any part of the image without loss of image quality, compare two images of the same vehicle as well as check vehicle registrations. VISOR systems are available in standard P and S models for mixed vehicle types, C compact model for light vehicles and R model for rail vehicles. FURTHER INFORMATION Tel: +44 (0)125 746 4000 enquiries@visor-systems.com www.visor-systems.com
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service 3M UK 58 Arinc 50 Basistech 38 BCS, The Chartered Institute 24 Belcom Cables IBC Blockn Mesh UK 15 Broden Media 54 Cobham Antenna 42 Coges 64 Cognitec Systems BC Cross Match Technologies IFC DMS Protective Equipment 74 E92 Plus 26 Frontier Pitts 32 Getac 55 Guava International IFC Guidance Software 18 Harquebus 60, 62 Heald 30, 32 Helyx Sis 60 Hesco 28 HID Global 20
78
DEFENCE BUSINESS MAGAZINE | Issue 8
Holmatro – Special Tactics 6 Infranor 72, 73 IQPC International 40, 41 JB Corrie & Co 34 Knighthood International 60 Remote Diagnostic 76 Security Labels 4 Security Processes 78 Standard Brands (UK) 70 Sykes Global 44 Tata Steel 12 Teleeye Europe 48 Teleware 36 Thermacore Europe 66 TMD Technologies 68 Totalpost Services 17 Tyron Developments 46 Verotech 57 Visionbase 52 Vislink 8 Voip.co.uk 22
Cable excellence engineered through quality Professionalism in providing cables for demanding environments and applications is Belcoms business. Our experience extends across many industries and we are adept at migrating the best cable solutions to apply to specific demands ranging from production processes to asset protection systems. As applications for recognised data transmission protocols migrate into more demanding areas of industry, so the demands on the performance of the cables increases. Belcom have over 21 years of trading experience designing, producing, stocking and distributing electronic cables for use in challenging areas. Within the Belcom team there is over a 100 years combined experience in this field and we are still dealing with new applications every week, they can range from concept to solution and production or simply selecting from our stock an appropriate cable to do the job. For further information contact us on 01279 871150 or visit us at www.belcom.co.uk
0013
01279 871150
www.belcom.co.uk
Recognize and Analyze Is he a known suspect?
How old is she?
How often was he here this month?
Are they authorized staff?
When, where did she enter?
Is this VIP Mia Clark?
How many people are here? Is it too crowded in this area? FaceVACS-VideoScan uses premier face recognition technology to detect and identify persons of interest in real time while computing demographic and behavioral data, supporting security staff and operations management.
www.cognitec.com info@cognitec.com Cognitec develops market-leading face recognition technology and applications for facial image database search, real-time video screening and analytics, border control, and biometric photo capturing.