www.counterterrorbusiness.com | ISSUE 19
NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS
BORDER SECURITY
DEFENCE
EMERGENCY SERVICES
CYBER SECURITY
PROTECTING CRITICAL SERVICES How a cyber criminal can bring a nation to its knees EVENT PREVIEW
TRANSPORT SECURITY EXPO
The security challenges for aviation, maritime, rail and commercial transportation explored
CARGO SECURITY
SECURING AIR FREIGHT How rigorous are the security checks of air cargo?
News: s ign MoD s oured r a m £3.5bn e deal p63 vehicl NCE
ZINE
AGA ESS M
EFE FOR D
USIN THE B
014 tory 2 Eurosa view pre p67
Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags
COUNTER TERROR BUSINESS
An increasing threat
www.counterterrorbusiness.com | ISSUE 19
Following mounting concerns over the dangers posed by Islamic State (IS) terrorists, the UK’s threat level now stands at ’severe’ for the first time since 2007, when extremists were suspected of an attempt to bomb Glasgow Airport and London’s West End.
NEWS: GLOBAL TERRORISM DATABASE REVEALS 10 MOST LETHAL TERRORIST ORGANISATIONS
BORDER SECURITY
DEFENCE
Comment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EMERGENCY SERVICES
Counter terrorism officials have so far said they are not aware of any specific or imminent plot to attack Britain, but the brutal and barbaric execution of US journalists James Foley and Steven Sotloff by ‘Jihadi John’, who appears to speak with a London or South East accent, sent a sickly message to the world that the UK is a fertile breeding ground for religious extremism. Clearly, much more needs to be done at home to understand and counter this.
CYBER SECURITY
PROTECTING CRITICAL SERVICES How a cyber criminal can bring a nation to its knees EVENT PREVIEW
TRANSPORT SECURITY EXPO
The security challenges for aviation, maritime, rail and commercial transportation explored
CARGO SECURITY
SECURING AIR FREIGHT How rigorous are the security checks of air cargo?
News: ns MoD sig oured arm £3.5bn deal p63 vehicle CE
ZINE
FOR DEFEN
ESS MAGA
THE BUSIN
4 ry 201 Eurosato w previe p67
As we go to press, Prime Minister David Cameron is attending the NATO Summit in Wales, where he ruled out paying a ransom for a British hostage, threatened in the latest horrifying video to be aired chillingly through social media. It is worrying that while efforts to restrict the finances of terrorist organisations have seen some success in the past, IS appears to have developed an economy in Syria and Iraq, with reports suggesting that the extremist group is making up to £600,000 a day from oil sales and ransoms. Addressing Parliament, Cameron spoke of a ‘forensic focus’ needed to prevent people from travelling abroad. New anti-terror measures are expected to be agreed by all parties shortly (see page 7). As with Iraq and Syria, the situation in the Ukraine has led to calls being made for certain NATO member countries to increase their defence spending. Only four countries (US, UK, Estonia and Greece) meet NATO’s defence spending target of two per cent of GDP. NATO’s outgoing secretary general, Anders Fogh Rasmussen, issued a financial rallying call: “We have lived in a relatively quiet security environment, but the crisis in Ukraine as well as what we’re now seeing in Syria Iraq and North Africa is a wake-up call. You can compare it with insurance. Now the premium has gone up because of this unstable security environment and that’s why we need more defence investments in the coming years.”
Danny Wright
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Arthur Walsh PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media
© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
3
Join the World’s Premier Armoured Vehicles Conference Series
15% discount for Counter Terror Business subscribers. Please enquire for more information
The longest running global conference series dedicated to the armoured vehicles community Benefit from unique networking, information-sharing and benchmarking opportunities, as well as potential business exchanges.
Eastern Europe
XV 26-29 January 2015, London, UK
30 September – 1 October 2014, Warsaw, Poland
• Featuring keynote presentations from the Defence Secretary - the Rt Hon Michael Fallon - and Minister for Defence Equipment, Support & Technology - Mr Philip Dunne MP • Bringing together the international community to debate and share knowledge of the key globalprogrammes
• Supported by the Polish MoD • Bringing together the Ukrainian, Hungarian, Lithuanian, Estonian and Moldovan MoDs to discuss ongoing modernisation projects and how best to adapt to the current threat environment armouredvehicleseasterneurope.com/CTB
internationalarmouredvehicles.com/CTB
INTERNATIONAL ARMOURED RESERVISTS SYMPOSIUM
Africa
17 - 19 October 2014, Bovington, Dorset, UK
19 - 20 November 2014, Addis Ababa, Ethiopia
• Managed by the Royal Wessex Yeomanry (RWxY) • Supports the development of thinking behind Reservist use of global ground manoeuvre platforms, focusing on both theoretical and applied aspects of capability
• Considered the African mechanised community’s Annual General Meeting • Share lessons learned and best practice in current mechanised requirements, capabilities and programmes from Tanzania, Kenya, Zambia and the African Union armouredvehiclesafrica.com/CTB
armouredreservists.com/CTB
“A very good, well organized meeting place for military and non-military people to exchange ideas. It’s the place to go for up to date trends in the defence business.” Director, Polish MoD
“A very informative event giving visibility into a changing market space.” VP of Business Development, Land Systems, Alcoa Defense
“The perfect opportunity to get a clear idea about the future development of vehicles. The conference was well balanced with operational environment approach and technical solutions for operational demands.” Land Forces Development Branch, Czech Republic MoD
Sponsors include:
www.armouredvehiclesevents.com | Tel: +44 (0)20 7368 9737 | Email: enquire@defenceiq.com
CONTENTS 13
07 CTB NEWS
New counter terror law plans outlined by David Cameron; ISIL controlling area the size of Britain, says US counter terror director
13 TERRORISM TRENDS
Former CIA intelligence analyst Mat Burrows examines the wider issues shaping unrest in the Middle East
17 BORDER SECURITY
The 3rd World BORDERPOL Congress takes place 9-11 December 2014 in Budapest, Hungary and brings together leaders of the world’s border security
17
37 TRANSPORT SECURITY EXPO
Visitors to this December’s Transport Security Expo will discuss the challenges transport operators face in maintaining high security levels
43 CARGO SECURITY
23 IP EXPO
49 EMERGENCY SERVICES SHOW
25 CYBER SECURITY EXPO
Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues
37
Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the supply chain
With 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance, writes the BSIA
IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event
27
33 CYBER SECURITY: CRITICAL NATIONAL INFRASTRUCTURE
20 COUNTER TERRORISM
Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East
27 CYBER SECURITY: DoS ATTACKS
Amar Singh of ISACA reports on the damage denial of service (DoS) attacks can do and offers advice on how to protect your organisation
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will be relevant to those involved in counter terrorism
55 COMMERCIAL UAV SHOW The Commercial UAV Show on 21-22 October at London’s Olympia will allow visitors to exchange key insights on the unmanned aerial vehicle market
59 COUNTER TERRORISM
To counter the threat of ISIS, the UK must help to create a new, legitimate order
THE
BUS
INES
SM AG
AZIN
E FO RD EF
ENC
IS Turn t SUE 9 for th o page 6 e la 3 businetest defenc e s and fe s news atures
67 65 DEFENCE NEWS
43
MoD signs £3.5bn armoured vehicle deal with General Dynamics; Defence Sectretary condemns Russian role as Ukraine calls to be made a member of NATO
Counter Terror Business
67 EUROSATORY 2014
June’s Eurosatory event in Paris showcased the newest developments in defence and security
www.counterterrorbusiness.com Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
5
E
COUNTER TERROR LEGISLATION
New counter terror law plans outlined by Cameron following increasing threat from IS extemists Addressing parliament before the NATO Summit in Wales, Prime Minister David Cameron announced a range of measures to combat the growing threat of Islamic State extremism. The plans, which will be drawn up on a cross-party basis, will discuss the changes including the introduction of new powers to seize the passports of suspected terrorists at UK borders. Following the release of despicable videos which depict the two brutal executions of journalists James Foley and Steven Sotloff, the latest threat to execute a British national appears to come from a terrorist with an English accent, dubbed ‘Jihadi John’ (pictured in the story below) by the media. Foreign Secretary Phillip Hammond said analysis of the footage of both murders has concluded it is genuine and features the same masked militant, who speaks with a distinctive London or south-east accent. IS militants have seized large areas of Syria and Iraq and have been condemned for the mass slaughter of religious minorities in the region, including Iraqi Christians and the Yazidi community. Cameron told MPs he thought it was “abhorrent” British citizens had “declared their allegiance” to groups like Islamic State. He restated the UK’s backing for US airstrikes against Islamic State militants in Iraq and said he would not rule out participation in similar action in the future. The UK’s terror threat level was raised to ‘severe’ from “substantial” at the
PROPOSED CHANGES
Legislation will be drawn up to give the police statutory powers to confiscate the passports of suspect terrorists at UK borders
CTB News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The UK will challenge any attempt by the courts to water down these powers Plans to block suspected British terrorists from returning to the UK will be drawn up on a “cross‑party basis” Terrorism prevention and investigation measures (Tpims) will be extended, to include the power to relocate suspects
end of August. The new alert level rates the risk of an attack on the UK “highly likely”, although Home Secretary Theresa May said there was no evidence to suggest one was “imminent”. This level of threat has been used twice before – in 2006 after the discovery of liquid bombs aimed at airliners, and then the following year when extremists attempted to bomb Glasgow Airport and London’s West End. Developments in the Middle East over recent months had major implications for the UK’s security, with 500 British nationals estimated to have travelled to Iraq and Syria to fight on behalf of Islamic State and other militant groups. Cameron mentioned a “forensic focus” was needed in order to deal with British jihadists returning to the UK from conflict zones. “We have also stepped up our operational response, with a fivefold increase in Syria-related arrests and the removal of
Terrorists will be required to undergo de-radicalisation programmes Airlines will be forced to hand over more information about passengers travelling to and from conflict zones 28,000 pieces of extremist material from the internet this year alone, including 46 ISIL-related videos,” he said. Elsewhere in Europe, a French law to seize passports is being fast-tracked through parliament, and the government is ramping up arrests of increasingly young teenagers making plans for jihad. Over the past week, US Secretary of State John Kerry and other administration officials have reached out to leaders from Australia, the UAE, Jordan, Qatar, Saudi Arabia, Italy and Israel to discuss how READ MORE: to combat the tinyurl.com/pu9m2e4 Islamic State.
SOCIAL MEDIA
Social networks start clampdown on ‘terror posts’ Following the posting of the beheading of American journalists James Foley and Steven Sotloff, and by the Islamic State of Iraq and the Levant (ISIL), analysts are pointing to the emerging role of social media in the tactics and response to terrorism. The Los Angeles Times reports that as social media platforms such as Facebook, YouTube, Twitter, and Instagram have all become a staple of everyday Western lifestyles, these avenues have also become more interesting for terrorists to exploit to advance their goals. “Social media is at the heart of their jihad,” said Steve Stalinsky, the executive director of the Middle East Media Research Institute. As was the case with the Foley execution video, the use of posting on these platforms is meant to instill fear, attract the eyes of those who might be recruited, and raise money through awareness. Three of those large social media companies – YouTube, Twitter, and Facebook – are choosing to remove extreme examples of violence and terror. Users are also
incorporating campaigns to filter and not give terrorists the upper hand with digital coverage. Once the shocking James Foley video began to circulate, YouTube blocked it, arguing the company prevents the posting of videos on many subjects, such as weapons construction and violence. “YouTube has clear policies that prohibit content like gratuitous violence, hate speech and incitement to commit violent acts,” said a company spokesperson. “We also terminate any account registered by a member of a designated Foreign Terrorist Organisation and used in an official capacity to further its interests.” Twitter and Facebook users also aimed to curb the sharing of the video out of respect for the victims and prevent ISIS from gaining notoriety. The hashtag “#ISISMediaBlackout quickly began to trend on both services. Facebook reports that it has “teams around the world” that are reviewing content related to the Foley beheading, and in certain cases
leading to the company is removing the posts. These companies admit, however, that curbing free speech and screening violent and hateful content does involve walking a fine line. “The problem is that the boundary is hard to define,” said Marvin Ammori, a First Amendment scholar and a fellow at the New READ MORE: America tinyurl.com/q5tckew Foundation.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
7
New! Ultralightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance) Watch the video:
Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com
ISLAMIC STATE THREAT
ISIL controlling area the size of Britain, says US counter terror director According to the latest intelligence from the United States, the Islamic State of Iraq and the Levant (Isil) controls an area the size of Britain. Matthew Olsen, the director of the national counter terrorism centre, put forward a detailed public assessment of the terrorist organsation, adding that Isil commands some 10,000 armed fighters and is taking in approximately £600,000 million a day from oil sales and ransoms. “IS views itself as the new leader of the global Jihadist movement,” said Olsen, who went on to describe the British problem of foreign fighters as “substantially more
significant in terms of numbers” than the American one, noting that around 500 Britons are believed to have gone to Syria. Olsen explained what the US believes to be the three factors which explain Isil’s rapid growth: the weakness of the Iraqi and Syrian governments; its “complex and adaptive” battlefield strategy; and its ambition to be a world leader in jihad. He added: “IS threatens to outpace al-Qaeda as the dominant voice of influence in the global READ MORE: extremist tinyurl.com/mdrmso2 movement.”
COUNTER TERROR POLICING
Police take up scheme to reduce Stop and Search instances All 43 police forces in England and Wales have signed up to the ‘Best Use of Stop and Search’ scheme, which is designed to contribute to a significant reduction in the overall use of stop and search. 24 police forces will implement two key elements immediately, which are: Increase transparency by recording all outcomes of stop and search and whether there is a connection between the grounds for the search and the outcome, and; Restrict the use of Section 60 ‘no suspicion’ powers. Already used only when necessary, under this scheme a chief officer must make the decision whether to authorise the use of such powers. That officer must reasonably believe that violence ‘will’ rather than ‘may’ take place, as it stands now. By November, all 43 forces will have implemented all aspects of the scheme,
including: Giving members of the public the opportunity to observe stop and search in practice, and; A community complaints trigger, so the police must explain to the public how stop and search powers are being used after a large READ MORE: volume of tinyurl.com/no4qzrg complaints.
COUNTER TERROR CONTRACTS
Dstl seeking new counter terrorism and security supplier base Following the successful pilot of a new commercial framework for research contracts known as R-Cloud (Research Cloud), the Defence Science and Technology Laboratory (Dstl) is now seeking suppliers within the area of Counter Terrorism and Security (CT&S). This is the second of nine capability areas to offer research opportunities through R-Cloud, which provides easy-to-use, direct access to current and future research requirements. Further roll out, across Dstl’s other capability areas, is expected over the coming months. Suppliers working in the area of Counter Terrorism and Security can apply to be part of R-Cloud via the Defence Contracts Online (DCO) pre-qualification portal from
3 September until 1 October 2014. If successful, suppliers will then be considered for future R-Cloud CT&S research contract opportunities with mini-competitions being run where suppliers will be invited to express interest and tender for different tasks. Dstl’s R-Cloud Project Manager, Neil Higson, said: “R-Cloud will eventually provide a commercial marketplace for research opportunities across the spectrum of Dstl’s capability areas, with a contracting mechanism that will significantly help expedite the placement of research contracts and broaden READ MORE: the supplier tinyurl.com/l7qtryr base.”.
NEWS IN BRIEF
CTB News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Public appeal to identify potential terror suspects Assistant Commissioner Mark Rowley, the UK’s head of counter terrorism, has appealed to the public to help identify people who have travelled to Syria or are showing signs of being radicalised. Rowley made his appeal after the murder of US journalist James Foley in Syria. London and the West Midlands have seen the biggest growth in Syria-related investigations. READ MORE: tinyurl.com/nacdnur
Prevent not working says Muslim Council The Muslim Council of Britain’s deputy secretary general Harun Khan has said that Prevent, part of the Government’s anti-terrorism strategy, has failed. Prevent seeks to lessen the influence of extremism, but Khan told BBC Radio 5 live that the strategy was having a “negative impact”. Work carried out as part of Prevent includes stopping “apologists for terrorism” coming to the UK, supporting community campaigns which oppose extremism and mentoring for individuals who are “at risk of being drawn into terrorist activity”. Khan said: “Most young people are seeing this as a target on them and the institutions they associate with,” adding that many felt they would be viewed by authorities as potential terrorists if they went to mosques or joined other organised Muslim groups. READ MORE: tinyurl.com/no4qzrg
MI5 unearths IRA leaks The Irish Herald has revealed that a major security alert was sparked when a rogue officer passed on key information from a garda station to a senior IRA figure via text message. It is understood that no further action will be taken in the case as the officer is the subject of investigations into separate serious offences. According to the Herald, he joined the force within the last decade at a time when background checks were not as scrupulous as they are now. The Herald understands that the information passed on involved the names of the detained suspects and how long they were being questioned for by detectives. Justice Minister Frances Fitzgerald has described the incident as ‘disturbing’.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
9
QUALITY DESIGN • QUALITY MATERIALS • cast standard (UK government endorsed)
Blunt Trauma Protection Tested and certified to uk government (CAST) standard
Solo Shields Bespoke specification available
Scorpion Interlock Shields Public Order Batons
003
FM 56364 BS.EN.ISO 9001:2000
DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: enquiries@dmsplastics.co.uk www.scorpionppe.co.uk
10 MOST LETHAL TERRORIST ORGANISATIONS, 2013 Group
GLOBAL TERRORISM
Global Terrorism Database suggests 2013 terrorist attacks ‘isolated to just a few countries’ The majority of terrorist attacks occurring in 2013 remained isolated in just a few countries, according to the Global Terrorism Database, which is generated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START) based at the University of Maryland. In 2013, 11,952 terrorist attacks resulted in 22,178 fatalities (including perpetrator deaths) and 37,529 injuries across 91 countries. More than half of all attacks (54 per cent), fatalities (61 per cent) and injuries (69 per cent) occurred in just three countries: Iraq, Pakistan and Afghanistan. ATTACK LETHALITY By wide margins, the highest number of fatalities (7,046), attacks (2,852) and injuries (15,736) took place in Iraq. The average lethality of attacks in Iraq was 34 percent higher than the global average and 30 percent higher than the 2012 average in Iraq. “It is important to note that increases in terrorism in 2013 were geographically concentrated in many of the same places which saw high levels of political violence in 2012,” said Gary LaFree, START Director and professor of Criminology and Criminal Justice. “The list of countries that experienced the most attacks remained virtually unchanged over the past two years-terrorism is generally getting worse in the places where it has been bad for several years.” While terrorism remained heavily concentrated in the same parts of the world, the countries within those regions experienced some notable changes. In 2013, total attacks increased for Iraq, Pakistan, the Philippines, Syria, Egypt, Libya and
Lebanon; and decreased for Nigeria and Turkey. The most lethal single attack in 2013 took place in September in Nigeria when members of Boko Haram set up illegal checkpoints and killed 142 civilians. Despite the devastating attack at the Boston Marathon on April 15, 2013, which killed three and wounded more than 200, U.S. citizens remained comparatively safe from terrorism. Worldwide, 17 US civilians were killed by terrorist attacks in 2013 (including contractors), which is .07 per cent of all terrorism fatalities in 2013. According to LaFree: “These results confirm long-term regional trends that show rising numbers of attacks in the Middle East, North Africa and South Asia and diminishing numbers of attacks in North America and Western Europe.”
, In 2013 orist terr 11,952 resulted PERPETRATOR GROUPS attacks fatalities 8 7 Information about r 1 , o 2 t in 2 g perpetra the perpetrator group n (includi s) and 37,529 responsible was reported for 33 percent of terrorist death ies across attacks in 2013. r inju s e i Although al-Qaida central r t n u 91 co has only been responsible for
two known attacks since 2008 (both in 2011), seven of the 10 deadliest terrorist groups in the world are affiliated to some extent with the organization. These include the Taliban, Islamic State of Iraq and the Levant/al-Qaida in Iraq, Boko Haram, al‑Shabaab, Tehrik-e Taliban Pakistan, al-Nusrah Front, and al-Qaida in the Arabian Peninsula. With the addition of nearly 12,000 terrorist attacks in 2013, the database now includes more than 125,000 events dating back to 1970 and remains the most comprehensive unclassified database of terrorist attacks around the world. DOWNLOAD THE FULL GTD DATASET tinyurl.com/pka9pwh
CTB News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Fatalities
Taliban*
2718
Islamic State of Iraq and the Levant/ Al-Qaida in Iraq*
1868
Boko Haram*
1731
Al-Shabaab*
735
Tehrik-i-Taliban Pakistan (TTP)*
710
Al-Nusrah Front*
707
Lashkar-e-Jhangvi
404
Al-Qaida in the Arabian Peninsula (AQAP)*
368
David Yau Yau Militia
194
New People’s Army (NPA)
156 *al-Qaida affiliated
10 COUNTRIES WITH THE MOST TERRORIST ATTACKS, 2013 Country
Attacks
Fatalities
Iraq
2852
7046
Pakistan
2212
2891
Afghanistan
1443
3697
India
690
464
Philippines
652
432
Thailand
477
253
Yemen
424
622
Nigeria
341
2003
Somalia
331
641
Egypt
315
243
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
11
GLOBAL TRENDS
Written by Matthew J. Burrows
BACK TO THE FUTURE ON TERRORISM
Former CIA intelligence analyst Mat Burrows looks at global terrorism trends in his new book The Future Declassified. Here he examines the wider issues shaping unrest in the Middle East It’s hard not to be panicky about the terrorist threat these days. We’ve seen a terrorist group take over a large chunk of Iraq and impose a brutal regime. There’s no end in sight to the Syrian civil war and little hope of reuniting the country. Extremist forces are increasingly taking over the opposition to the Bashar al-Assad regime. In Afghanistan, as the deadline approaches for NATO’s withdrawal, Taliban forces are staging a comeback. Europe is particularly threatened by the return of EU citizens who have been fighting with radical al-Qaida-lined groups in Syria, according to Gilles de Kerchove, the EU counterterrorism coordinator. The US head of National Counterterrorism Center, Matthew G. Olsen, also warned about “wider array of
ideology both inside and outside the Middle East, including Western Europe, Southeast Asia and Central Asia.” The press played up the fact that while the administration contended “Iraq was an integral part of US efforts to combat terrorism,” the report I authored warned that Iraq was providing terrorists with “a training ground, a recruitment ground, the opportunity for enhancing technical skills.” One of my global scenarios in the work was of a caliphate, which got right many of features of ISIS, including its breakaway from al-Qa’ida. In the 2008 edition I talked about al-Qa’ida breaking up – almost three years before
The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism threats in a greater variety of locations across the Middle East and around the world.” What happened to the global war on terrorism (GWT) and Western determination after 9/11 to put an end to terrorism once and for all? A SHIFTING THREAT Until August 2013, I was employed by the CIA, authoring the National Intelligence Council’s long range analysis – what is called ‘global trends’ – which is briefed to the US President at the start of his administration. In compiling my book I’ve gone back to evaluate those forecasts. The first global trends report I did was for the Bush Administration three years after 9/11, when the global war on terror was in full swing. Hopes were high in and out of government that terrorism could be defeated. I was far less sanguine: “The key factors show no signs of abating over the next 15 years. The revival of Muslim identity will create a framework for the spread of radical Islamic
Osama bin Laden’s takedown. Past terrorist waves usually saw the group originating it – in this case core al-Qa’ida – breaking up midway through the cycle. The violence does not cease and could actually increase, but the splintered survivors are more locally focused. The threat is now from the splinter groups, some of which are more capable than I or others originally anticipated as shown by the rapid ISIS gains in Iraq. In the recent words of General Clapper, director of National Intelligence, “the terrorist threat is not diminishing. It is spreading globally and it is morphing more and more into so-called franchises.” Oddly, in the wake of the Western failures in Iraq and Afghanistan, the pendulum is now swinging away from any intervention. If, God forbid, another 9/11-like attack occurred today, I think the US could well turn its back on the Middle East, albeit after lobbing a few missiles into the group held
Terrorism Trends
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
responsible. The attempt this time would be to harden borders, restricting inflows into the US homeland. No war on terrorism, but instead Fortress America. Clapper’s worries that US intelligence capabilities have been hurt by a “perfect storm” of “lost intelligence sources” because of Snowden and “significant budget cuts” could also favour a posture of more defence than offence. WIDER ISSUES IN THE REGION Both extremist reactions – sins of commission and those of omission – ignore the broader context and tend to treat terrorism as a standalone. It’s no accident that the Middle East – where the terrorist threat is the greatest – has lagged most other regions (except Africa) in exploiting globalisation’s opportunities. In many Middle East and North Africa countries, higher educational attainment correlates with rising joblessness. The social contract that held states together has frayed. It’s been some time since Arab governments could “co-opt the educated youth into what used to be a relatively well paid civil service,” according to the UN’s Arab development reports. Governments everywhere have to be smarter to succeed. In the Middle East, the challenges are even greater because of the many religious and ethnic splits that were never overcome by Arab nationalism. From the beginning of my work on global trends, I strove to weave terrorism into a wider tapestry. That’s also the reason why I focus on the multiple factors that are coming together to produce revolutionary change. Back after 9/11 when terrorism was everything in foreign policy, the global trends reports drew policymaker attention to other challenges facing the US, such as the rise of China and the downsides of rapid globalization. Even before the E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
13
Advertisement Feature
flights and crucial airport operations. Here, as in most territories, Scanna equipment is supported by local in-country distribution agents with military and EOD backgrounds who understand the specific needs of their user groups to provide operational advice, expertise and service support.
ESSENTIAL TOOLS FOR INSIDE INVESTIGATION
Scanna, a leading manufacturer of portable x-ray systems for IED identification showcases its capabilities at the TRANSEC show Scanna has an extensive reputation for the design of robust defence and security x-ray products and is a contractor for x-ray equipment for National and International EOD agencies in the UK, USA and many other NATO countries. Scanna’s high resolution x-ray systems are designed to be as rugged, compact and lightweight as possible and provide a fast, safe and highly effective method of investigating suspect packages, IEDs, vehicles and cargo as well as for special operations and countersurveillance. STRAIGHTFORWARD AND FLEXIBLE X-ray investigations need to be set up and completed within a very short timeframe and multiple operators may often share a system, but in different scenarios. Scanna x-ray systems are straightforward and intuitive for anyone to use with both direct (DR) and indirect (CR) x-ray imaging technologies. This multiple x-ray technology capability gives operators a wide range of choice across the board of speed, size, image quality and cost. The latest lightweight cable free x-ray image plates weigh just a few grams and are completely flat and flexible, letting you get an x-ray almost anywhere you need to. At the same time, these thin plates are available in multiple sizes and have the ability to be used in wide ranging combinations and configurations to cover larger areas. Small A4 size plates are ideal for use in confined areas such as wall or ceiling cavities or to check an item placed very close to a wall,
14
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
whilst using multiple longer length plates would be more suited for looking into vehicle panels and for pinpoint cargo scanning. FAST DEPLOYMENT For users who require more speed, Scanna offers rapid direct-to-laptop x-ray systems where the x-ray can be placed, fired and viewed in just a few seconds. The big advantage of the Scanna solution is that all systems come in a single case, operate on battery, and utilise safe pulsed x-ray generators that are interchangeable between direct and indirect imaging systems. The same powerful SCANVIEW software features are common across all systems to reduce operatortraining requirements. X-RAY FOR EVENT SECURITY One sector of the security community that has already seen the benefits of utilising portable x-ray equipment is event security where Scanna x-ray solutions were acquired and used by the Brazilian government and police for security search and investigation in support of the recent 2014 FIFA World Cup. These will continue to be used to secure future large events including the Brazil olympics in 2016. X-RAY FOR AVIATION SECURITY Within the transport security sector aviation security support teams in Australasia rely on Scanna x-ray equipment as a backup to the normal police response to ensure that incidents involving suspicious baggage can be cleared as quickly and efficiently as possible in order to minimise any disruption to passengers,
X-RAY FOR VEHICLE SCREENING One innovative application for portable x-ray is where large vehicles are prescreened by fixed vehicle screening x-ray systems. In some cases the larger vehicle screening systems are not set up to x-ray the bottom portion of the vehicle and in these situations a portable system can be invaluable for checking blindspots around the chassis, wheels and wheel arches. For customs applications small flexible x-ray plates can be used for close up detailed checks of dashboards and seats for concealed drugs and other contraband. X-RAY FOR COUNTERSURVEILLANCE Governments have traditionally been at the forefront of protecting themselves against the loss of important confidential and private information through espionage techniques. With the emergence of global markets and global competition, businesses are now a prime target of espionage as criminal efforts to obtain trade secrets and intellectual property proliferate. Intelligence agencies and TSCM teams are increasingly making use of portable x-ray technology as part of their standard counter surveillance toolkit to ensure that facilities are free from listening/recording devices and to analyse any finds. PRISONS Mobile phones, drugs, sim cards, batteries and weapons are all prohibited items in prisons but they continue to find their way into these facilities and into the hands of inmates. Portable x-ray equipment is deployed within the prison sector for cell searches so that any prohibited items concealed within furniture, electronic gaming devices, toiletries, clothing and shoes can quickly be detected and confiscated. POSTAL X-RAY SYSTEMS Scanna is also the manufacturer of the world leading SCANMAX brand of postal security x-ray cabinets. As well as being a known, reliable and safe detection technique for finding postal bombs, cutting devices and white powder letters, Scanmax x-ray chambers are also used in forensic laboratories for component analysis and within the prison sector for detecting drugs concealed in inmate mail. FURTHER INFORMATION Contact: Kirstine Wilson +44 (0)207 355 3555 info@scanna-msc.com www.scanna-msc.com
GLOBAL TRENDS to the point of threatening, for example, the caliphate’s hold in Sunni areas in Iraq. Combatting potential attacks in US and Europe must be priority, counteracting just the symptoms won’t get at the root causes. Don’t get me wrong. I don’t see the US or Europe militarily intervening on a big scale. But, we need to be more active than we are, especially in stopping the regional conflagration from growing. Getting Iran and Saudi Arabia to sit down and start mending ties would be a start if we are to stem the escalation of current tensions into all-out war in the Middle East. Ramping up the pressure on the Shia government in Baghdad to draw the Sunnis back in is essential to combatting ISIS. Although naïve perhaps about chances for a near term settlement, Secretary Kerry is right about trying to keep a peace process alive between Israel and the Palestinians. Most importantly, the US and Europe need to work together on a global plan for economic development of the Middle East. The Chinese recently offered to go in on some joint infrastructure projects in Africa with the US, why not a global effort in the Middle East. I have no illusions the terrorist threat will decrease immediately even if we managed all these things, but it could put them on the back foot.
2008 financial crisis, economic insecurity was growing in Middle America, for example, which the reports highlighted. Some of those broad trends favored terrorism and we stressed them in the analysis. Increasing individual empowerment meant individuals and small groups would have greater access to lethal weaponry. The use of bio or nuclear weapons someday by terrorists is not far-fetched. Cybercrime is a lot more common today than cyberterrorism, but it’s probably just a matter of time. I saw it as equally wrong to hype the terrorist threat then as it is to downplay it now. A broader perspective helps policymakers gauge terrorism’s relative importance in the vast panoply of US global interests. HOW SHOULD THE WEST RESPOND? What particularly worries me now is the rapid collapse of the nation-state in Iraq and Syria, essentially leaving a huge safe haven at the core of the Middle East. The operating space for terrorists has increased immensely. We are back to pre-9/11 when al-Qa’ida had free reign in Afghanistan, but the area
Terrorism Trends
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PREPARING TO ADAPT Scenarios are a big part of plotting out the future. They can be good or bad, but the point is that we need to get used to the future being radically different from the present, not just a linear projection. I can see areas where there may be a qualitative leap forward unimaginable to most today. For instance, we could see the elimination of most extreme poverty in our lifetime. But I can also see where things could go seriously wrong, and the Middle East and terrorism are in that category. The drift toward a region-wide conflict pitting Saudi Arabia against Iran and its allies is a recipe for more widespread violence and chaos, so creating the breeding grounds for terrorism. In my book, I play out the logical conclusion of such continued Sunni-Shia conflict and it is predictably disastrous for all of us. The US and Europe have more than enough to occupy ourselves; publics are more than apathetic – they want to stay out. However, this is no time for leaders to put their heads in the sand. L
Europe rly ula is particd by the ne threate f EU citizens return ohave been l who h radica t i w g n i fight aida-lined al-Q ps in grou Syria
is much larger. Just how rapid was the collapse of Arab Spring hopes and resurgence in authoritarianism in Egypt, Turkey and the Gulf was also a bit of a surprise. The growing suppression of opposition in those countries makes for fertile ground for extremism and even terrorism. It’s clear the terrorist threat is rising, but we should take care, too, to learn from past mistakes. First, we need to avoid the panic. In rereading some of the writings by US terrorist experts in the aftermath of 9/11, there was a sense of terrorism as an unstoppable tsunami: “now that the World Trade Center is gone, Grand Central Station at rush hour would be an obvious target for Manhattan. Coordinated attacks on shopping malls, tourist attractions, casinos, schools, churches and synagogues, and sports events also are possible.” If there is a consoling factor, it is that terrorists tend to be too harsh and brutal, which eventually alienates their own supporters. But it will take time for the disaffection to grow
The Future Declassified: Megatrends That Will Undo the World Unless We Take Action by Mathew Burrows is published by Palgrave Mamcillan FURTHER INFORMATION tinyurl.com/qefeujk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
15
B st oo an k d yo to ur da y 21-22 APRIL 2015 | OLYMPIA LONDON
ORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTER
The leading international event dedicated to mitigating the threat of terrorism • • • •
Meet 8,500+ attendees from Europe and globally Showcase your products and services to visitors with real purchasing power Meet new customers and further establish relationships with existing ones Launch new products and services on a global platform
Contact us to discuss becoming an exhibitor at Counter Terror Expo: T: +44 (0) 20 7384 7942 E: jay.clements@clarionevents.com T: +44 (0) 20 7384 7837 E: jenna.peaty@clarionevents.com
WWW.COUNTERTERROREXPO.COM/CTB1 Co-located with
Strategic Media Partner
Follow us on
Organised by
EVENT PREVIEW
KEEPING BORDERS SAFE
Borderpol Congress
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together leaders of the world’s border security establishments to discuss some of the latest challenges facing our borders and the agencies tasked with protecting and managing them The operation of today’s, border security, traveller and migration management community is being stressed by geopolitical, social and economic events. Our world is fully interdependent, and it is becoming ever more challenging to find solutions which include the utilisation of border services and agencies to protect nations. As the crisis in Eastern Europe escalates, economic sanctions and travel bans are increasing, being employed by both the EU and Russia, as well as their allies. Border services are front-line responders for monitoring these sanctions and bans. As the Ebola virus spreads within and beyond West Africa, travel bans and possible quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected. As the post-World War 1 borders of Iraq evaporate and a new entity known as Islamic State of Iraq and the Levant emerges, hundreds of thousands of persons are being displaced and are fleeing the region. Border services are now front‑line responders for monitoring, recording and directing the movement of these people, most of whom will be refugees.
RNATIONAL SECURITY FOR AN EVOLVING WORLD
TRACKING AND MONITORING As the United States deals with an unprecedented and clearly well-orchestrated movement of tens of thousands of people – mostly children and adolescents from Central America – arriving at its border with Mexico, its border services are monitoring, detaining and caring for these people in unprecedented numbers. As China, the world’s most populous nation, develops a formidable navy and air force and is posed to succeed the United States as the world’s number one economy, it is flexing its economic and political muscle in Asia and beyond. Border services everywhere are now being pressed to be front-line responders monitoring the import and export of strategic goods and services to and from China. Since the end of the Cold War, there has been a deeply-held belief within the developed world that political and economic integration is the best way to improve global security and avoid potential conflict everywhere. This has created a paradox: the interdependent the world is supposed to make it less likely that extreme conflict between nations or groups of nations will occur. This very interdependence makes it imperative E
As the Ebola virus spreads within and beyond West Africa, travel bans and quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travellers who may be infected Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
17
Borderpol Congress
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT PREVIEW Latest confirmed speakers Clarence Yeo, Commissioner, Immigration & Checkpoints Authority, Singapore Ralph Markert, Assistant Director, International Partnerships & Development, INTERPOL Dr Ahmed Alzahrani, Project Manager, Ministry Of Interior, Kingdom of Saudi Arabia David Alania, Chief officer. Police captain. Border Patrol, Ministry of Internal Affair, Georgia Cephas Makunike, Zimbabwe Revenue Authority Ioan Buda, Director General, Romanian Border Police
that nations cooperate, communicate and consult with one another in a multi‑jurisdictional and inter-disciplinary manner. BORDER SECURITY LEADERS The 3rd World BORDERPOL Congress, taking place 9-11 December 2014 in Budapest, Hungary, brings together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place and discuss some of the latest issues and challenges facing our borders and agencies tasked with protecting and managing them. The opening keynote presentation will be taken by Col dr Gizella Vas, Head of Hungarian Border Policing Unit, Hungarian National Police. This high level, high profile senior border official present will deliver an opening keynote presentation, setting the scene and tone of discussion at this years gathering of border agencies and agencies at the border. The Congress programme includes situational overviews in the opening plenary ‘Migration Movement Challenges from Human Trafficking to Illegal Migration – A global overview’ that will see a series of presentations including the new Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia and David Alania, Chief Officer. Police Captain. Border Patrol, Ministry of Internal Affairs, Georgia This years Congress will see panel discussions on ‘Adopting to the changing environment: what border security administrations must do to remain effective’ and ‘In the e-age of documents what is the life expectancy of the passport booklet?’, with senior officials
18
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
from organisations including the Singapore Immigration & Checkpoints Authority, International Organisation for Migration, Royal Netherlands Marechaussee and INTERPOL. Other interesting discussions include ‘Should exit controls be reintroduced universally? If so, how do we best share the necessary information across multiple agencies and stakeholders?’ and ‘Setting International Standards in IBM’. The full Congress programme can be found at www.world-borderpol-congress.com, with the latest line up of speakers and participating agencies and organisations. HOSTED BY HUNGARIAN MINISTRY OF INTERIOR AND NATIONAL POLICE The World BORDERPOL Congress is being hosted by the Hungarian Ministry of Interior and Hungarian National Police, confirming their official support for this year’s Congress being held in Hungary on the 9th to the 11th of December at the Kempinski Corvinus Hotel Budapest. The World BORDERPOL Congress brings together like minded leaders of the worlds border security establishments to contribute to making the world a safer place, through the continual development and maintenance of the three Cs , that is cooperation, communication and consultation. In our totally interdependent world finding solutions to protect national interests are becoming more and more challenging. The Ministry of Interior and Hungarian National Police are supporting and will be actively participating in the 3rd World BORDERPOL Congress, encouraging nations to cooperate, communicate
Director General of Immigration, Ministry of Law and Human Rights, Republic of Indonesia Mr. Muhamad Anil Shah Abdullah, Director for Police Services, Assistant Commissioner of Police, ASEANAPOL Ms Angiolelli-Mayer, Project Manager Passenger Facilitation, IATA, Switzerland Andrus Oovel, Head of the Border Security Programme and Chairman of International Advisory Board for Border Security, Democratic Control of Armed Forces (DCAF), Switzerland Commodore Vasan Seshadri (ret’d), Head Strategy and Security Studies, Center for Asia Studies, India Ricardo Bn Baretzky, President, European Centre for Information Policy & Security, Belgium and consult with one another, in these challenging times for border security. BORDERPOL has enjoyed a long and fruitful relationship with the Hungarian border management community and Budapest is the home of the BORDERPOL European Secretariat. BORDERPOL is inviting the industry to Budapest, Hungary to join the largest gathering of border agencies and agencies at the border to discuss and debate how working and collaborating with international partners can improve border security for us all. L FURTHER INFORMATION www.world-borderpol-congress.com
ON-GROUND TEMPORARY SECURITY FENCING
POLMIL STANDARD FENCE
POLMIL PAS 68 RATED
POLMIL MOB ATTACK TESTED
MODULAR FLEXIBLE DESIGN
POLMIL AIRPORT APPROVED
NATIONWIDE INSTALLATION
®
®
(Test Reports on Request)
®
®
See us on Stand Number C46 at Olympia December 2-3 POLMIL ON-GROUND HOARDING ®
POLMIL IS A DIVISION OF ®
BLOK
MESH
UK LIMITED
Specialists in the Design, Manufacture, Hire and Sale of On-Ground Temporary Security Fencing
Tel: 01376 332591 www.polmilfence.com
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WESTERN INTERVENTION
TRACKING THE RISE OF THE ISLAMIC STATE
Security consultant Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East, and calls for strategic thinking The current rise of Islamic extremism is neither a new phenomenon nor a surprising one. A thousand years ago, the Nazari Isma’ili sect (later known as the ‘Assassins’) spread terror during a 200-year campaign, murdering Crusaders and Muslims to further their political ends. Their first leader established a stronghold in north-west Iran where he recruited, radicalised and trained operatives to murder and terrorise according to his political requirement. There are clear parallels with the rise of the Sunni Islamic group
al‑Qaida from its strongholds in Afghanistan and its campaigns against both secular and Islamic targets. Thirteen years later, the ‘fellow travellers’ of the Islamic State (IS) dominate a broad swathe of Syria and Iraq with their bastardised version of Wahhabism. In the modern era, operations by the US and its allies have cost trillions (the US estimates its Global War on Terror (GWOT) cost $3.7 trillion in the decade after 9/11) and have resulted in the deaths in combat zones of over 600,000 civilians and combatants.
Despiteears yy the manmbat of co in Iraq ons operatighanistan, and Af er state neith escribed d can be table or as s ratic democ
20
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
However, the various theatres of the GWOT are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility. Despite the many years of combat operations in Iraq and Afghanistan, neither state can be described as stable or democratic, and both interventions are being described, not least by RUSI, as strategic failures. They have been beset by a number of mistakes. NO CLEAR END-STATE As a consequence of the West having no objectives following Saddam’s removal, ill‑conceived policies such as Deba’athification occurred. Its goal was to remove the Ba’ath Party influence in Iraq’s new political framework. By sacking any public servant with Ba’ath Party membership, the policy dismantled the extant security structure. It moved the former elite to the bottom of the social ladder and removed those competent to provide public services such as electricity, sanitation and governance. As a consequence, Deba’athification: catalysed the initial insurgency; increased disaffection amongst the general population at the lack of basic services and governance; and hamstrung any indigenous capability to treat either problem.
The various theatres of the Global War on Terror are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility Similarly, the West’s intervention in Libya allowed militarily weak anti-Gaddifi forces to overthrow a 42-year despotic regime. Once again, no real effort was applied after the intervention to secure an effective security apparatus or to lay locally acceptable foundations for future political institutions. Now, militias have the balance of power, and the democratic government resides in Tobruk due to Tripoli being held by extremists. As neither side is being militarily decisive, Libya is slipping further into instability. In Syria, the civil war has killed over 200,000. Again, Western intervention did not decisively tip the balance of military power and has only prolonged the conflict. It has also allowed the rise of IS in the spaces not governed by the Syrian state. SHORT-TERMISM Eleven and thirteen years (Iraq and Afghanistan respectively) are very short periods to expect countries with no generational history of democracy to field successful democratic institutions. Previous interventions such as colonial rule in India
took generations to achieve a change that can be regarded as long lasting. Iraqi and Afghan democracies remain as elusive as ever. Despite enormous investments in equipment and training, the Iraqi Army has shown little robustness to deal with internal or external threats, proving wholly incapable to defeat the poorly trained insurgents from IS. This bodes badly for the similarly trained Afghan troops in their expected conflict with the Taliban post US drawdown. MIRROR–IMAGING We all view the world through ‘us’-coloured lenses, believing others will behave as we would in their shoes. Western governments are particularly guilty of this bias, expecting those previously ruled by non-democratic models to embrace democracy like a Western audience. As a result, the recent efforts to impose democracies have largely been failures. While in the West dictatorships and other autocratic regimes are viewed with suspicion, they remain a valid model for some parts of the world. Strong autocratic regimes have held otherwise volatile states together for decades.
Counter Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Yugoslavia, Iraq, and Libya are all examples. Indeed, the oft-heard cry that Iraq is better off without Saddam is difficult to argue persuasively. For example, it is estimated 800,000 have died in Iraq since 2003, and this figure exceeds the estimates for the whole of Saddam’s 24-year grip on power. ‘Our’ democracy has patently not brought stability to Iraq and Afghanistan, and, without a strong external unifying stimulus in Libya, it is likely to fail there too. IN CONCLUSION To conclude, Western interventions in the last twenty years have been categorised by: a lack of clear end-state objectives or a viable means to achieve them; a lack of real politick for state structures and government; and a wholly unrealistic timeframe. As a consequence, most states that have been subject to Western interventions are now ‘anocracies’, the disastrous halfway house between dictatorship and democracy. This chaotic void is when a state is at its most lawless and when groups such as IS flourish. It is ironic that despite one of the principal aims of the GWOT being to remove such groups, it has in fact made them stronger than ever. These are not smug observations with the benefit of hindsight. These are largely repeated observations from recent and earlier history. There is still much thinking to be done at the grand strategic level.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
21
YOUR HIGH-TECHNOLOGY CYBER-SECURITY PARTNER WITH SECURITY-CLEARED TECHNICAL STAFF
EXPERIENCE OUR VIRTUAL
CyberLab
FOR DEMOS ON-DEMAND AT IPEXPO
phoenixdatacom.com/GOV-MOD phone: +44(0)1296 397711
IP Expo
it will also bring into play insight from the Government. In particular, Government’s chief technology officer (CTO) Liam Maxwell who is well known for his commitment to IT reform within the public sector and most notably the driving force behind ‘digital by default’ will be speaking at IP EXPO Europe.
EVENT PREVIEW
SHOWCASING ADVANCES IN IT INFRASTRUCTURE
IP EXPO Europe 2014 on 8-9 October at London’s ExCel brings together some of the leading minds in cloud and IT. Counter Terror Business takes a look at some of this year’s main attractions IP EXPO Europe, held on 8-9 October 2014, is Europe’s leading cloud and IT infrastructure event. Designed for professionals across the whole spectrum of IT roles, it is the definitive event to view brand new technologies, and through exclusive keynote presentations, gain fresh insights from the leading thinkers in IT. With cloud, mobility, security, analytics, infrastructure and datacentre technologies all under one roof, IP EXPO Europe covers everything needed to run IT for a successful enterprise. Each year, IP EXPO Europe has seen an increase in attendees, with a large percentage of 2013 attendees coming from Government and public sector, a figure that is expected to rise dramatically for 2014. The show provides an opportunity to join visionary thinkers from Government and the public sector to identify key issues and trends in the market. Located at the ExCel centre, London, for 2014, IP EXPO Europe will this year feature two brand new co-located events, Cyber Security EXPO and Data Centre EXPO, designed to address the new developments and trends in these critical areas. With over 300 exhibitors from the likes of Microsoft, VMware, IBM and Schneider Electric, the show will feature demonstrations and presentations which cover every facet of IT infrastructure, including the cloud, data
centres and the latest solutions to combat cyber-crime. IP EXPO Europe is this year’s must visit event for all IT specialists. The opening keynote speech will be delivered by Sir Tim Berners-Lee, inventor of the World Wide Web, who TIME magazine included in its ‘Top 100 Most Important People of the 20th Century’. Sir Tim will outline his vision for the 2050 Web and how organisations will use it to gain competitive advantage in future. Berners-Lee will also offer his insight into business strategies for innovation and the creation of markets through digital channels. CLOUD PROOF INFRASTRUCTURE Cloud provision for the public sector, particularly ‘digital by default’, has become a central theme for discussion. Since the G-Cloud framework was deployed, there has been a commitment from the Government to build competitive digital services which fit public sector business needs. In a time of expanding cloud service options and growing citizen expectations of instant mobile access to information and services, it has never been more important for the public sector to ensure all public sector services are available online. Not only will IP EXPO Europe provide the latest information from leading thinkers, system integrator and service providers,
GOING ELECTRONIC The benefits of back-office efficiencies have been recognised and increasingly promoted since the Gershon Efficiency Review. Major efficiencies could be achieved as a result of electronic procurement and specifically electronic invoicing. It is not surprising then that the UK government has been aligned with the deadlines set up by the European Commission which make e-invoicing in procurement mandatory from 2016 with the aim of making it the predominant method by 2020. Compared to the rest of Europe, the UK is slightly behind with the Nordics leading the way. Since 1 February 2005, for example, all government institutions in Denmark can only accept invoices in electronic format. Ultimately, e-invoicing could save taxpayers billions of pounds, enable the government to tap into new markets and help secure payments more quickly. If we take Denmark alone, each minute saved in invoice processing of the public sector’s 15 million invoices equals to €12 million in savings. If 10 minutes are saved for each invoice, Denmark could attain savings in the region of €120 million per year. Advocates of e-invoicing point at clear examples of best practice and have estimated that the complete roll out by the UK government could result in economic benefits of £22-£28 billion a year in comparison with modest levels of investment. With such solid figures and bad debt losses incurred by European companies at an unprecedented high of €350 billion, it is no surprise that the UK public sector is under mounting pressure to embrace e-invoicing. With late payment of bills remaining a serious concern for SMEs despite the improving economy, governments in Europe are enlisting the adoption of e-invoicing as one of the solutions. This is in conjunction with major and widespread legislative changes. As demonstrated by earlier adoption, e-invoicing leads to faster payments as it reduces the amount of time wasted whilst the invoice is in the post, it shrinks the likelihood of customers claiming they have not received the invoice or that it must be lost in the post while speeding up potential complaints. The programme at IP EXPO Europe 2014 will explore the issues surrounding ‘digital by default’ in the public and private sector, giving insight into the options available to public sector organisations, in addition to examining the benefits and barriers of G-Cloud. FURTHER INFORMATION www.ipexpo.co.uk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
23
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Recognize AND Analyze Premier face recognition technology for real-time video screening and anonymous people analytics Is she a known suspect? How often was she here this month? When, where did she enter? Is she an authorized employee? How old is she? Has she been here before with another suspect?
www.cognitec.com • info@cognitec.com
A SINGLE PLATFORM WITH ONE INTERFACE FOR EVERY TYPE OF CRITICAL COMMUNICATION NEED
SITUATIONAL INTELLIGENCE & SOCIAL MEDIA www.everbridge.co.uk/transportation vocal.indd 1
24
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
EMERGENCY NOTIFICATION
MOBILE STAFF MANAGEMENT 0800 0350081 8/29/2014 7:11:13 AM
EVENT PREVIEW
CYBER SECURITY IN A NON-STOP ECONOMY
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The effective safeguarding of public sector data is more vital than ever. Cyber Security EXPO 2014 on 8-9 October at London’s ExCel offers visitors the chance to learn about the key issues In a world where everything to everyone is connected through hundreds of thousands of access points, it is becoming incredibly difficult for us to protect sensitive information from falling into the hands of cyber criminals. It is crucial that companies and the government alike have the right safeguards in place to protect their data from cyber criminals who may wish to access this type of information to cause serious harm to the UK’s critical infrastructure. In order to properly safeguard this information, we need to understand the huge scale of enterprises that make up the government’s supply chain. From small From e businesses to huge conglomerates, larg all of the UK government’s mall to ses, s supply chain is sending highly busines rnment’s sensitive information via many ve channels. In particular, the e UK go y chain h t complex supply chain that links suppl highly the UK government’s critical ng infrastructure. The danger here is sendi nformation and cause ei is that if hackers can access major damage sensitivia many information anywhere in the supply to society. v chain, there is potential for our critical Enterprises, s l e n n cha infrastructure such as power grids and particularly hospitals to be vulnerable to attack. This those within the could then have a catastrophic effect on vital government’s critical services, from interfering with a patient’s infrastructure supply chain must be clear on surgery to gaining control of nuclear facilities. their security protocol and understand how to best protect themselves from potential attack. THE THREAT OF CYBER TERRORISM Therefore, unsurprisingly, cyber threats have PROTECTING THE SUPPLY CHAIN shot to the top of the UK government and This July saw the publication of a plan international agenda. In particular, in recent for 2014-15 by the Government Digital years due to high profile leaks cyber security Service (GDS), to commit to open standards has become a thorny issue for governments to better connect suppliers with the and businesses worldwide. There is no government and achieve the goal of ‘digital doubting that all this connectivity delivers by default’ – driving service delivery to overwhelming benefits to society, yet the digital platforms across government and cyber threat represents a very real and public sector. Government initiatives such tangible danger to all of us on a daily basis. as this are opening the communication Unfortunately, there is no quick fix and we channel between government and suppliers, cannot eliminate the threat completely as wherever that business may be in the chain. cyber criminals will always be keen to exploit This is a huge step in the right direction and the system for their own gain – whether will allow government and businesses alike that be politically, economically or personally to better collaborate and ensure that all motivated. However, the most worrying of access points within the system are secure. these concerns, from both a government and As a series of keynotes, high profile citizen perspective which often receives much individuals such as Mikko Hypponen, media speculation, is that of state or privately Chief Research Officer at F-Secure, Andrey sponsored terrorism. From criminal gangs to Nikishin, Head of Future Technologies ethnic extremists many believe these groups Projects at Kaspersky Lab, Bruce Schneier, with the right technical knowledge could Chief Technology Officer, CO3 and Edward pose a huge risk to our critical infrastructure Lucas, senior editor at The Economist will
be sharing their knowledge and expertise in this area at Cyber Security EXPO in October. At the event they will be discussing how the world is changing, whether cyber terrorism is a real or over-exaggerated threat and how best to protect the enterprise from attack. The discussions will include how to build a defence strategy that works and how big data is a useful weapon in the defence of the cyber threat. Furthermore, the conference will debate information security in the age of social media, discussing the security implications of social media when manipulated by hackers and cyber criminals for personal or political gain. A MAJOR EVENT Cyber Security EXPO will be co-located with IP EXPO Europe at London’s ExCeL in October. Over 300 exhibitors will cover every facet of IT infrastructure, including the cloud, data centres and the latest solutions to combat growing cyber crime. With a massive 16,000 square metres of exhibition space – a 15 per cent increase on last year’s event – this year’s exhibition is a must visit for all IT specialists. Under one roof, this year’s brand new integrated events mean that every professional can gain the insight and advice they seek. This year, the exhibition will include IP EXPO Europe, Data Centre EXPO and Cyber Security EXPO. FURTHER INFORMATION www.ipexpo.co.uk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
25
Cyber Security
DoS ATTACKS
Written by Amar Singh, chair, ISACA Security Advisory Group
MOUNTING A RESPONSE TO THE DIGITAL HIJACK THREAT
Amar Singh of international IT governance association ISACA reports on the damage denial of service (DoS) attacks can do and shares advice on how organisations can protect themselves A denial of service attack can have a major impact on services offered internally like the email or file directories and external services including government information and payment portals. A worrying trend flagged up in research by RAND Corporation is that anyone can rent a 24hr DoS attack for a meagre sum of US$50. Mimicking the capitalist economies, the service is sometimes offered with a money back guarantee if it does not work. CYBER RETALIATION 2013 saw the world’s first known instance of a commercial cyber retaliation, more commonly called a CTT or Cyber Tit for Tat, that resulted in a tangible impact on the global internet. Spamhaus, an international non-profit organisation that tracks the Internet’s spam operators, had recently blacklisted an internet hosting organisation based in Netherlands, called Cyberbunker. Their reasons included the allegations that Cyberbunker was openly hosting known spammers amongst other cyber vandals. As a result, there was a gradual loss of internet traffic to Cyberbunker, to which, it is alleged, the Netherlands based company retaliated. In short, Spamhaus was
targeted by a Denial of Service attack of a magnitude that had never before been seen. During that period significant portions of the Internet were affected, emails were delayed (in some cases severely), major websites were very slow or not loading at all, and internet banking was unavailable to many. Luckily for everyone, the internet did not grind to a complete halt.
Internal DoS attacks can sometimes have a greater impact but these attacks don’t often make it to the headlines. For example, the simple act of users unable to login and use their computers for a prolonged period of time is a Denial of Service in action, deliberate or not.
DoS & DDoS: THE The DIFFERENCE y r a DoS stands for Denial m i r p a f of Service and DDoS o e v i stands for Distributed object is to deny k c Denial of Service. The a t t a l a c i t DoS i r impact of a distributed c o attack is often far access tces such r u greater than a regular o t s n re ayme p DoS attack. It must , s e t i s as web ls or internal be noted that in many instances both terms are porta ources used interchangeably. s re For an analogy of a DoS
THE BASICS The primary objective of a denial of service attack is to deny access to critical resources. These resources can be external as in websites, payment portals or internal resources including directory services like active directory, email systems and corporate networks. It is important to point out that DoS attacks can be both internal and external. External DoS attacks make it to the media headlines primarily because they are external as in, the unavailability of a public facing website or email service.
attack, imagine an attacker taking a single hammer and attempting to break a tempered glass. The attacker would have to spend a great deal of time and effort to break it. It would be like one single computer attempting to attack E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
27
21-22 October 2014 Level 2, Olympia, London, UK
THE UNMANNED HERO Unmanned Aerial Vehicles (UAVs) have been recruited by the emergency services as an additional and advanced tool in a variety of operations such as; search and rescue missions, crowd control, border patrol and accident investigations. The Commercial UAV show brings together current and future UAV end users with manufacturers and service providers and drive innovation in the commercial UAV universe. Key sessions for emergency services to attend: The unmanned hero: UAVs role in protecting the public
Andy Cashmore Station Commander West Midlands Fire Service
Chris Rainford Watch Commander Greater Manchester Fire and Rescue Service
Examining demand for future payload technology: End user Case studies
Sergeant Simon Luck Gatwick Airport Community Safety Team Sussex Police
Dawn Huckson Police Search Advisor Sussex Police
What can you learn from global UAV use across the world? An insight into UAV achievements from a variety of countries
Cpl. Byron Charbonneau UAS Coordinator: D-Division Royal Canadian Mounted Police
Sergeant John Overend Tactical Planning Unit Staffordshire Police
With a conference, exhibition and evening entertainment there is plenty to choose from. Visit the website and download the full programme today. www.terrapinn.com//uavctb www.terrapinn.com/uavctb
DoS ATTACKS your website with an electronic hammer denying your legitimate users access For an analogy of a DDoS attack, imagine the attacker paying 10 friends to take the same hammer and attack the glass at the same time. Not only will the glass break faster but the impact of the damage may be greater than a single hammer attack. The attacker hijacks 10 thousand computers scattered around the internet and uses the same hammer, this time multiplied by 10 thousand, to attack your website denying your legitimate users access. THE THREAT OF INTERNET OF THINGS Until recently an attacker would hijack thousands of vulnerable computers on the internet to launch a DDoS attack. These vulnerable computers include all types of computers including laptops, desktops or office email servers. Now imagine the same attacker being able to hijack your fridge, smartphone, tablet and a million other of these devices and commandeer an even more catastrophic attack to your website. This is possible and we are already starting to see these Internet of Things (IoT) devices being used as accessories to DDoS attacks. UNDERSTANDING THE ATTACKERS Understanding the attacker and the motivation that drives these attacks is crucial to building the appropriate protection and detection mechanisms. ISACA describes four main types of attackers: unsophisticated opportunists; sophisticated individuals who attack specific targets; those engaged in criminal or corporate espionage; state sponsored advanced attackers. A fifth category could be referred to as insiders, or ‘privileged attackers’. Although technically, this type of attacker can be slotted into any one of the above four categories, it deserves its own classification as very often it is the employee or groups of them that end up causing the biggest disruption and damage to the business. Reasons range from bribery, job dissatisfaction or loss of employment. The privileged attacker is a special kind of attacker as he/she is well versed with the culture, the technology, the technical architecture and most importantly has the explicit trust of his/her employers. In addition, in almost all instances this privileged user has the administrative user details including passwords to all the critical systems and that is why this type of user is also sometimes called the ‘god user’ or ‘superuser’. The motivation of an attacker can be divided into five categories: grievance; crime; hacktivism; espionage and warfare. THE LOGIC BEHIND CHOOSING A TARGET In a realm that has no boundaries and no governance framework there can be several reasons that an organisation falls victim to a DoS attack, ranging from the insider, equipped with sufficient knowledge and awareness of the technical landscape, who has an axe to
grind with the management, to the malicious criminal or nation sponsored element that have significant funding, highly skilled and able manpower and the luxury of time to launch targeted or opportunistic attacks. Consider this example. In the past, a denial of service for a business would normally mean having its windows smashed by a bored teenager. That same teenager could muster his friends and break multiple shop windows via a distributed denial of service. Importantly there was and still is physical effort involved in breaking glass and the resulting chaos and loss of business is localised. Today, that same teenager, in many cases working alone, can cause global mayhem, affect the livelihoods of millions of people, deny critical services to hundreds of thousands of people – all from the comfort of their bedroom. If he or she is clever they could develop or produce the program (the equivalent of a stone) themselves. If they have spare change, say a few hundred dollars, the teen could procure a ready made program that guarantees mass destruction. HOW TO DoS A DoS, in comparison to other more sophisticated attacks, is relatively easy to carry out. Worryingly, DoS and DDoS tools are readily available in what is a thriving underground market for cyber attack tools. In an insider DoS attack, the IT System administrator literally pulls the plug on your email servers and deletes all the files and the backups, meaning all your data is inaccessible or gone. Alternatively, the system administrators permanently delete the authentication infrastructure in your organisation so that no one can log in. A website is the window into the world of commerce, services and information. An outsider DoS attack can deny access to
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
enough to ask why I bring up DoS before the other more sophisticated attacks like advanced malware attacks (also wrongly called APTs). My answer is that DoS attacks are a nuisance, a waste of effort and skill and in most cases not something that any organisation’s IT teams should have to spend their time dealing with. BUILDING THE CASE Surprising as it sounds, there can be a positive angle to DoS attacks. You see, most people understand the concept and have at some point in their career seen and felt the impact of either an internal or external denial of service. That makes it easy to obtain finance and project board approval, at least in my experience. The case is, in most cases, very straightforward, especially when it comes to building a case for external protection. Not having DoS protection means that your payment or service portal could be inaccessible for several hours, if not days, affecting bottom line, reputation and brand image. In some cases, someone may lose their job for not including this attack vector in their protection strategy. STOP THEM FROM REACHING YOU I have a very strong opinion when it comes to outsourcing security. However, when it comes to protecting against external DoS and more importantly a DDoS I strongly recommend utilising the services of an established outsourcer. The established firms have the wherewithal to absorb these large scale attacks, and can stop attacks at source. A DoS attack is one of the few tangible forms of attacks that visibly affects employee and customer facing assets like authentication and websites. This material impact often leads organizations to spend
If you are a government body that is involved in an international or local conflict, the likelihood of an attack is high legitimate users of the site. Some examples of the impact of a DoS attack include: an NHS or surgery website not being able to accept doctors appointments; the site to renew car tax becomes inaccessible resulting in thousands of drivers with expired tax discs; and a council site accepting payments for parking charges is very slow causing many customers who are trying to pay for their fines to try again and again. This further slows the site and more customers cannot pay their fines. PROTECTION MECHANISMS When I visit my clients the first thing I ask is, “How are you protecting against a DoS attack?” There is confusion on most faces and sometimes, the techie amongst them is bold
unnecessary financial, human and technical resources in mitigation strategies. The regular recommendations of carrying out a risk assessment and threat modelling apply but consider DoS attacks as a nuisance and annoyance more than an advanced threat. Your assets will be DoS(ed) as they say and if you are a government body that is involved in an international or local conflict the likelihood of an attack is even greater. It is my recommendation that, unless there are specific reasons, organisations consider offloading the protection from this threat by a strategically outsourced agreement. L FURTHER INFORMATION www.isaca.org.uk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
29
Advertisement Feature
AWARD WINNING SLOTTED AND SLOTLESS MOTORS
Infranor recognised for its dedication to supplying the latest in cutting edge solutions in the slotted and slotless motor sector The Senior Management team of the Security Industry E Magazine have announced the deserving recipients of the annually presented, Supplier to Industry Award for 2014 as global company, Infranor. The Award recognises the Infranor’s dedication to supplying an evolving industry with the latest in cutting edge product solutions within the slotted and slotless motor sector. On receiving the Award, Infranor’s managing director Adrian Hazelwood commented: “It is rewarding for our company to be recognised by our customers and the market place in general. For us the result of our hard work must always be a happy customer, however it is very special to be recognised by an industry journal as our effort, time and the financial
30
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
investment we make to improve motor reliability, performance and flexibility that a continuously changing market needs is often un-noticed. This award is a result of pure teamwork, our customers trust us to find a solution and we use our expertise within our Motor and Drive factories to not only meet but in most instances surpass the customers’ needs and desires. For me to receive the award on behalf of a dedicated team that stretches across the globe is very satisfying, it confirms that our business model, work ethic and skill sets are correct.” Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance. In many
cases, they can. Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counter parts. A closer look at the technology follows, plus realistic tips on evaluating whether or not your application could benefit from slotless motor. SLOTTED SERVOMOTOR CONSTRUCTION A traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these teeth; when current flows in the wire, an electric magnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However, a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits. APPLICATION BENEFITS FOR SLOTLESS MOTORS Higher torque is beneficial for most applications. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money. A motor that can run fast may be the obvious choice for high speed applications such as centrifuges. But faster speeds can also help reduce overall machine cost and help
Advertisement Feature
increase machine output. If the machine’s mechanics can handle higher speeds a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. These motors have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size. DRAWBACKS OF SLOTLESS MOTORS Despite their benefits slotless motors have their drawbacks and are therefore not suited to every application. For any given
been strengthened by the successful launch of the Xtrafors Prime series of zero cogging servomotors. These motors offer the latest technology in slotless design. These have been used in Ordinance in feed systems as well as Linear and Rotational positioning systems, giving the product high torque and speed with modular construction and zero cogging all within a compact size. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and engineering teams. When asked about Infranor’s future developments, Adrian Hazelwood went on to say: “We must be very conscious that the steps we take forwards with technology is also plug and play with our current offering and
Slotless benefits Grinding: Smooth motor motion (generated by slotless motors) is imperative as the cogging affected, can produce an undesirable finish on final parts. Battery Powered Designs: The higher efficiency and potentially smaller size of slotless motors extends operation.
Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors signifcantly improve machine performance size, slotless motors generally have larger diameter rotors, and because rotor inertia increases with the rotors diameter, inertia can increase significantly. Consider an application where load inertia is very low compared to motor inertia and high acceleration is required. In this instance, a slotted motor may be able to accelerate faster than a slotless one. If the slotless motor’s additional torque cannot compensate for the higher torque required to accelerate the system. A slotless motor may also be difficult to manufacture. The motor manufacturer may need to develop customer winding equipment because standard equipment does not do the job. If the choice is made to encapsulate the motor windings in resin to enhance performance and create a more rugged motor, the motor manufacturer must have significant experience with resin materials and the potting process itself. These manufacturing challenges could increase the cost for both manufacturer and end user. Infranor’s success in precision markets has
solutions we provide, or at least be a minimum of application disturbance for our customers. We hate the word obsolescence and work hard to avoid it. We must also be aware of the world’s weakening material resources as we continue to develop, and as such new magnet, housing and winding technologies are at the forefront of our R&D. Ongoing developments are many and also in varying fields which is incredibly exciting as they all have their own exacting demands and challenges. We should remain customer focused and market driven. We can only ask our customers to watch this space as there are new core products close to release. As a manufacturer of bespoke solutions in servo motors and servo drives each day is amazing as another customer product is designed, developed, prototyped or shipped.” FURTHER INFORMATION For further information about this award winning company, email enquiries to info.uk@infranor. com or call 0208 144 2152.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
31
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
IP TELEPHONY
SECURE INTERNET TELEPHONY SIMPLIFIED
Online attacks and phone hacking have dominated recent headlines, from sophisticated high level attacks to small-time opportunists looking for quick financial gain. Adam Crisp, chief technology officer at VOIP.co.uk explains the risks to the telephony industry and looks at possible solutions Once considered an alternative telephony solution, VOIP technology – in particular SIP Trunking (a common method used to connect IP-PBX systems to service providers) and SIP based unified communications is now becoming mainstream technology. It is used by a number of businesses due to its superior calling features, next generation messaging and competitive pricing. However, businesses are often unaware that calls made over the public internet are vulnerable to remote listening-in unless they are strongly encrypted. Many business leaders do not fully appreciate that VOIP phone calls can be a high risk interception, having been sold a telephone communication system that is ostensibly cheaper and superior, but is not protected by call encryption. THE BOTTOM LINE Unless your telephony provider can confirm call encryption, any calls made over the internet must be considered insecure. This makes eavesdropping a very real business threat. During the course of a telephone call, sensitive information may be divulged either in spoken voice or in the DTMF tones to signal key presses. Your conversations
about business operations, research and development processes and findings, mergers and acquisitions activity, staff and customer data and financial status may be at risk. “At VOIP.co.uk we identified that security had been overlooked in the world of internet telephony. Business leaders and managers do not want to spend valuable time managing their telephone system and worrying about call encryption. Our Customers rely on our SIP Encrypt Service to protect their confidential phone calls, giving them the peace of mind to focus on their core business.“ says Adam Crisp, CTO at VOIP.co.uk. COMPLIANCE The Payment Card Industry is concerned with IP telephony hacking for obvious reasons and has issued industry standards to ensure that merchants do not put cardholders at risk. If cardholder payments are made via the phone, businesses are mandated by law to adhere to the Payment Card Industry Data Security Standards (PCI DSS). PCI DSS protects against the loss of cardholder data and covers the storage (call recordings), transmission (voice calls or DMTF digits) and processing of card information. If the connection is provided over the internet or
even a private circuit where your service provider can’t warrant against leakage of data, it is crucial that this connection is strongly encrypted to protect cardholder data. SIP Encrypt by VOIP.co.uk has been fully audited and the company has been accredited as a PCI DSS Level 1 service provider. VOIP. co.uk’s SAFEGateway is a simple solution for merchants and contact centres who are required by the banks to prove that their telephony complies with industry standards. CALL SECURITY FOR EVERY ORGANISATION Irrespective of business size or sector, whether card payments are accepted or not, chief information security officers and IT managers must take steps to ensure that their customers, employees, products, patients, research and financial status remain fully protected from remote access wiretapping. Visit Voip.co.uk’s stand at the Cyber Security Expo on 8th and 9th October 2014 at ExCeL London. FURTHER INFORMATION Tel: +44 (0)1869 222500 infosec@voip.co.uk www.voip.co.uk
SAFEGateway from VOIP.co.uk Fully penetration tested, this device is included as part of the service and is easily deployed at your site and encrypts all calls to our network. The SAFEgateway protects your business against eavesdropping or unsolicited call recording allowing you to: Protect critical business information Reduce risk and protect your confidential data Comply with Payment Card Industry standards Ensure data privacy and protect intellectual property
32
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
Cyber Security
CRITICAL NATIONAL INFRASTRUCTURE
The Security Institute’s Mike Gillespie highlights why those that protect the UK’s critical national infrastructure need to anticipate threats and monitor the technological supply chain Our world, including our critical national infrastructure (CNI), faces rapidly evolving threats and a constantly shifting threat landscape. We have a level of maturity in handling some of the threat and risk from the physical world, but our ability to handle the threat from cyberspace is still developing and nations are becoming increasingly aware of the attraction of these critical services as targets. The threat to CNI has to be treated holistically as the threat itself is holistic. Bringing a region or nation to its knees from the other side of the world is no longer the stuff of spy movies or fiction novels. It is possible to disable critical national functions without any physical interaction with the site, plant or system you are attacking. The use of malware means that it can evolve and spread, this is what we saw with Stuxnet; originally designed to attack centrifuges in Iranian nuclear reactors, it evolved and ended up going wild, affecting many more networks and systems than it was initially
designed to do. Technology is increasingly networked and this greater connectivity means an increased array of threat sources coming through the cyber vector. INCREASINGLY VULNERABLE This trend toward the interconnectedness of everything looks set to grow rather than decline, and therefore our attitude to threat needs to become more holistic in nature as that is how the threat landscape is evolving. There are relatively high levels of legacy technology still in use and this is a contributory factor to the threat – not all technology was built with the ‘Internet Of Things’ in mind and this can make it very challenging to secure and maintain securely. For instance anything running on Windows XP will be unsupported, so if it has been used as a platform for any CNI systems this constitutes a major vulnerability. The problem is that
It is e to possibl ritical c disable functions l nationany interaction a withoutthe site, plant with em you are or syst cking atta
systems can take a very long time to develop and by the time they reach implementation they could actually be obsolete. So really, it is a perfect threat storm for CNI. Let’s look at SCADA systems. The term ‘Supervisory Control and Data Acquisition Systems’ usually refers to centralised systems that monitor and control entire sites, or complexes of systems spread out over large areas that could mean a plant like a nuclear reactor plant or a satellite or an entire country. These are in common use throughout CNI as they are integral to the efficient running of these sites but they are also vulnerable if not properly secured and if you have a determined insider the threat increases dramatically.
Written by Mike Gillespie, director for cyber strategy and research, the Security Institute
PROTECTING SERVICES FROM CYBER ATTACKS
HIDDEN TARGETS It isn’t just the direct threat that needs to be considered; the eventual compromise of the system could actually come from somewhere in the supply chain. Smaller organisations frequently become initial targets but with the criminal’s gaze actually directed toward the larger organisation or more valuable data elsewhere in the chain. Targeting a smaller supplier may offer a much softer target as a launch point. When you think about the UK, more than 95 per cent of our businesses are SMEs and the Government actively courts SMEs to be Government suppliers through frameworks like G-Cloud. If these are suppliers into our CNI and have less than robust security strategies in E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
33
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CRITICAL NATIONAL INFRASTRUCTURE place they could be exploited and become an attack vector. Also manufacturers in the supply chain may pose an unintended threat as in general, manufacturers of technology increasingly they are distancing and absolving themselves of responsibility toward creating a secure product in the first place. Add to that the compartmentalisation of modern manufacturing techniques, whereby components of an item could have come from several different suppliers and be
INSIDER THREATS So, the supply chain is increasingly complex and strangulated. Before any piece of technology gets anywhere near any particular area of our CNI, it could have been compromised. All of this is without the human threat, or ‘insider threat’. Insider threat doesn’t have to be malicious, it can come from someone forgetting or avoiding a piece of essential protocol, either through sloppiness and poor training or through genuine mistake.
If suppliers into our CNI have less than robust security strategies in place they could be exploited and become an attack vector assembled in a totally different region or country and you begin to see the issue more clearly. A good example of this could be the iPhone – some components of the iPhone are actually manufactured by Samsung, presumably in between lawsuits with Apple. So, another key question to be factored into the cyber resilience strategy would have to be, where are you actually buying your tech from? Consider a recent incident in which some Microsoft motherboards were factory issued with built in malware.
Obviously there are the malicious insiders who are very determined, potentially knowledgeable and highly motivated. This might be ideological, financial or political motivation. Stuxnet for instance, which was introduced to the Iranian nuclear centrifuges by a USB drive, has been variously attributed to different state sponsored cyber-attack programs. L FURTHER INFORMATION www.security-institute.org
Protecting your organisation from security breaches is not simply a matter of building high fences and implementing the latest firewall and virus checker. Effective security means protecting the businesses’ critical assets in a way that doesn’t inhibit doing business. Understanding what is critical requires a link to be created between security and your business objectives.
Atkins helps clients to secure their strategic advantage by:
• • •
Identifying what is critical to your business Striking the right balance between security and accessibility of the key business functions Creating a safe environment to do business Reducing risk and vulnerability Balancing spend on security to get best value from the investment you make in protecting your business.
Plan Design Enable
34
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
The UK’s national infrastructure is defined by the Government as: “those facilities, systems, sites and networks necessary for the functioning of the country and the delivery of the essential services upon which daily life in the UK depends.” The national infrastructure is categorised into nine sectors: communications; emergency services; energy; financial services; food; government; health; transport; and water. Infrastructure is categorised according to its value or “criticality” and the impact of its loss. This categorisation is done using the Government “Criticality Scale”, which assigns categories for different degrees of severity of impact. The Criticality Scale includes three impact dimensions: impact on delivery of the nation’s essential services; economic impact (arising from loss of essential service) and impact on life (arising from loss of essential service).
Securing strategic advantage
By doing this and considering security from an holistic perspective joining physical, personnel and systems security allows you to focus spend on what is most important and brings your business competitive advantage by implementing the most cost effective approach to deliver on your objectives.
• •
The UK’s national infrastructure
www.atkinsglobal.com/security
SECURITY
LOOKING INTO THE FUTURE
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Threats, design and predicting the future: “Designing-in” security for critical infrastructure
WIDER CONTEXT The first guideline is that the design needs to take place against a wider context, for example a national security strategy or plan that is set by a higher authority (normally the national government). The planning for all types of infrastructure should consider a wide range of potential risks. Underpinning this should be a comprehensive set of relationships between the infrastructure owners and the relevant government agencies that are responsible for assessing security threats and disseminating advice about how to mitigate them. Infrastructure owners must work with these agencies to address any relevant threats; they cannot do this by themselves. IMPACT DRIVEN The second guideline is that the focus of the design should be on minimising the impact of a hostile event. There is a considerable body of knowledge about how to protect against a terrorist attack or hostile cyber incident. It is essential that designers and architects engage early with security practitioners to understand the impact that a catastrophic event might have on the infrastructure. All too often designers focus on the likelihood of an attack, rather than on what impact it would have and this approach is less likely to produce a design that is capable of withstanding changes to the threat landscape.
improve business productivity; and support domestic and leisure activities. Like all computers, Control Systems can be vulnerable to cyber attack. They can’t just be turned off or rebooted – the focus is on continuous availability rather than confidentiality. The increasingly complex interdependency between the physical and logical elements can be seen in many other areas, including ones with a security function such as access control and CCTV systems. These are now controlled across communications that themselves may
Effective security starts at the top of the organisation and should be embedded throughout it by a culture in which the day to day activities of everyone contribute effortlessly towards shared protective security objectives. The approach proposed here also makes easier the identification of new threats as they emerge. This is particularly important in the cyber environment where change is a constant factor. Building defences based only on a consideration of a threat that
A country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. How do designers build-in protection against threats that they cannot predict? be vulnerable to cyber attack. This could result in sound physical protection measures being compromised in some way. Any holistic approach must also include the people who use the physical and cyber measures in an organisation – that means the whole workforce, not just security practitioners. STRUCTURE Security functions that are organised in silos are inefficient and obstruct the identification and mitigation of risk. The governance of all security functions should be structured to support an holistic approach. Having different reporting or line management chains for different security functions will stretch channels of communication and introduce potential gaps from which greater risk will emerge.
Written by Roger Cumming, technical director, Atkins Security
Modern society relies on complex infrastructures, both physical and cyber, for all aspects of daily life. Designers can rely upon a wealth of advice about how to make them resilient to known types of attacks. However, a country’s infrastructure can last for many years and it is impossible to know with accuracy what kind of threats it may need to withstand over its lifetime. Furthermore, the threat can change far more quickly than any defensive postures and adding these retrospectively is invariably expensive. How do those designing the infrastructure build-in protection against threats that they cannot accurately predict? Here are three strategic guidelines that should shape the design process.
can change more rapidly than they can be reconfigured will not lead to a secure cyber infrastructure. Only by understanding what is critical to their operations can infrastructure designers and owners start to build physical and cyber systems that can remain resilient in the face of diverse threats. GETTING THERE The three guiding principles of considering a wider context; being impact driven; and taking an holistic approach may be easy to say yet much more difficult to achieve. It is vital to get things right from the start and have security considered at the beginning of the design stage, not as a post-build ‘add-on’. Designing-in security must be the philosophy of the future. L FURTHER INFORMATION www.atkinsglobal.com/security
HOLISTIC APPROACH The third of the strategic guidelines is taking an holistic approach. Modern infrastructures rely upon complex technologies that are the interface between the physical and cyber worlds and are known by the collective term Industrial Control Systems. They enable water, gas and electricity to flow; make trains run safely;
35
EVENT PREVIEW
SECURE MOVEMENT OF PEOPLE AND GOODS
Transport Security Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Through an extensive programme of workshops, an in-depth conference, and a world-class exhibition, visitors to Transport Security Expo will immerse themselves in the challenges transport operators face in maintaining high levels of security
Transport Security Expo is the major global exhibition and conference where security manufacturers, systems integrators and distributors connect in a uniquely focused environment with security buyers and policy makers for aviation, maritime, rail and commercial transportation. Last year’s event was the most impressive Transport Security Expo to date, breaking all previous records with 3,866 total attendees, from 88 countries. Transport Security Expo 2014 at London’s Olympia now ups the ante enormously. With an expected 4,500 visitors and 150 exhibitors the event unveils a major suite of initiatives for this market; a package of information and inspiration that make it the go-to destination this 2-3 December. ADS, the trade organisation representing the UK aerospace, defence, security and space industries is the event’s strategic partner. Bob Rose from ADS said “We are pleased to confirm our partnership with Transport Security Expo 2014. The transport security sector has seen considerable growth, both domestically and internationally and ADS members have been at the forefront of this success. Transport Security Expo provides the perfect opportunity
for the sector to come together and share the latest innovations and expertise and the inclusion this year of Major Events Security will only reinforce the expo as a must‑attend for the security industry in the UK.”
ure The Sec ation rt Transpoce is new n Confere and covers 4 for 201 ryday secure the eve ortation of across the entire supply chain. transp goods and The 2014 programme shows an , impressive line-up of worldwide people h-value opinion leaders such as: g i h s Gary Skjoldmose-Porter from t e s s a the United Nations Office on Drugs
MARITIME SECURITY Last year’s Maritime Security Conference was a sell-out success and this year will be bigger and even better. The conference will start by honing in on the Port and all of the issues Port operators, owners and security officers face including a focus on physical security, cyber security, information security, supply chain, business continuity, human factors, sabotage and serious crime. Next on the agenda is the issue of protecting vessels and crew against acts of piracy on the seas and also keeping cargo safe end-to-end
and Crime (UNODC); Commodore Arian Minderhoud from the Allied Maritime Command; and Dimitrios Souxes at INTERPOL. AVIATION SECURITY CONFERENCE The two-day conference on aviation security brings over 300 aviation security practitioners together to share and debate latest thinking on keeping our airports, planes, people and freight secure. It attracts authorities, owners/ management as well as heads, managers and directors of security from the aviation arena. Topics include the risks and threats to aviation, improving the passenger experience, and the technology supporting innovation. E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
37
Rapiscan Systems - the Leading Provider of Security Screening Solutions Security. Performance. Value. When it comes to your security needs, Rapiscan Systems understands the environment in which you operate — and knows how to protect it. With the broadest range of products for aviation security, border protection, perimeter security and personnel screening, we provide comprehensive, fully-integrated security solutions. And with over 15 years experience, global expertise and a world class service and support network, we have the proven capability to meet your most demanding requirements – on time and on budget. To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846 3511 (AsiaPac).
sales@rapiscansystems.com • www.rapiscansystems.com
ONE COMPANY – TOTAL SECURITY
EVENT PREVIEW The 2014 programme shows an impressive line-up of worldwide opinion leaders such as David Trembaczowski-Ryder from the Airports Council International Europe (ACI EUROPE); Ron Louwerse from Schiphol Group; and Johnnie Müller at Copenhagen International Airport. RAIL SECURITY CONFERENCE The attendees to this conference include transport police, government authorities, owners, operators and heads of security, who face an enormous challenge in securing mass transit systems. With millions of passengers in transit, implementing enhanced security whilst not reducing throughput is a critical balance. On top of this the threat posed not only from terrorism but also serious organised crime, cyber, sabotage, cable theft and also the challenge of suicide is a vast task. The Rail Security Conference is the annual gathering place for opinion leaders cross networks and also across the globe to gather and share insight, best practice and practical know-how. Leading speakers to headline this conference include Mark Babington of the PTEG Safety and Security Group;
and Superintendent David Roney, Counter Terrorism Lead at British Transport Police.
new conference aims to help professionals charged with devising and implementing security plans for major events for transport SECURE TRANSPORTATION CONFERENCE security find the solutions, ideas and know-how The Secure Transportation Conference is required to deliver robust security strategies. new for 2014 and covers the everyday The interlinked and complementary worlds of secure transportation of people, goods and transport and major events are now reflected high-value assets across the commercial at this high-level conference delivering, for the world. It will cover the protection of high first time, a platform for expertise and shared value assets, hazardous materials transport, insight into this globally significant sector. protection and security for high-net-worth From mega events such as Royal Weddings, individuals, and VIPS, and vulnerability the Olympics and World Summits to major mitigation in secure transportation. music festivals, sporting events and political The programme is packed full of top-level rallies, somewhere in the world there are speakers focusing on key issues, including teams of specialists planning the investment Phil Wright from Brink’s Global Services and and management of those events’ security Chairman of the Cash and Valuables in Transit requirements, specifically in transportation. Section, BSI; and William Brown, National This conference will be relevant for operational, Security Adviser at Arts Council England. strategic tactical and strategic management and includes speakers such as: MAJOR EVENTS TRANSPORT Shuna Mayes, Head of the SECURITY CONFERENCE Commonwealth Games Safety e Rail h T Following 2012’s successful and Security Unit from the y t Securi is the Olympics, London is a Scottish Government; e c n global centre of expertise and Tim Cutbill from the e r e Conf g place for major event security. This London Fire Brigade. n
Transport Security Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
gatheri eaders across l opinion obe to gather the gl d share an t and bes t h g i s n i practice
TECHNOLOGY WORKSHOPS The free to attend technology workshops provide the low-down on the latest equipment, approaches and capabilities to pre-empt and manage security risks across aviation, maritime, public transport and secure transportation. Presented by companies with expertise in developing and delivering security products and solutions, the workshops aim to offer insight as well as practical information to help attendees keep up to date with the latest tech on the market, and new releases, that will help ensure our transportation networks, and major events, remain safe & secure. Day one will cover perimeter security; CCTV & video analytics; screening, scanning & detection. Day two will cover surveillance, comms & tracking; secure transportation; and integrated security. LIVE DEMONSTRATION AREA The Live Demo Theatre will allow visitors to see real-life incidents unfold on stage and see how expert teams manage a range of scenarios. Be prepared for the mob that tries to spoil the show as they descend on the Live Demo Theatre. Observe the team who manages the situation safely and securely capturing the evidence as they go on body worn cameras beamed to the main screen. Come and see how the experts carry out the critical search of a venue to ensure it is made safe prior to the opening of a major event or in the situation of a suspect package being alerted to security. Ever wondered how our heroic bomb disposal teams inspect and remove potential E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
39
Transport Security Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
EVENT PREVIEW IEDs, including the use of high-tech ROVs (Remote Operated Vehicles)? Take a close up look in The Live Demo Theatre. We all recognise the serious threat and potentially devastating consequences of a cyber-attack, especially concerning a passenger aircraft, train or a ship, but what does a cyber‑attack actually look like? A hacker and a laptop will come on to the stage to demonstrate how to bypass the most secure of firewalls. INNOVATIONS HUB The introduction of the Innovations Hub reflects the requirement for government, industry and academia to look to the future at what next generation security will look like both in terms of transportation and major Events. The Innovations Hub will showcase tomorrow’s world technologies being developed to address future challenges for security including major events around the world such as Tokyo 2020 Olympics and beyond. The Centre for Applied Science and Technology (CAST) within the Home Office is the government’s lead department for research and development in security and together with industry and academia are inspirational in major innovation. The innovation hub offers visitors a unique
Transport Security Expo 2014 showcases a magnificent line-up of the world’s leading armoured vehicle manufacturers opportunity to see a range of next generation equipment and software in its R&D phase. SECURITY VEHICLE ZONE Transport Security Expo 2014 showcases a magnificent line up of the world’s leading manufacturers for armoured vehicles to protect high net worth people, celebrities, diplomats and cash in transit. With the vehicles live on display, visitors will be able to climb in and compare the best of class from some of the leading manufacturers. The Armoured Vehicle Zone will also feature in the live demonstration programme, so watch out for the critical role they’ll play in protecting President Obama, following an attempted hijack inside the show. HOSTED BUYER PROGRAMME The Hosted Buyer Programme is a very important component of the show. It provides top-level buyers an opportunity to meet with leading exhibitors of their choice through a series of pre-arranged, face-to-face meetings. Qualified buyers will
attend the show as guests. They will receive a number of privileges including a free conference pass, complimentary travel and/or accommodation and many other VIP benefits. Participation is free of charge – subject to our qualifying criteria. If you buy, specify or recommend transport security related products or services, either in the UK or overseas; you could be eligible to attend as a Hosted Buyer. Buyers are typically individuals that are charged with reviewing the best security solutions within the aviation, maritime, public transport and supply chain markets. GAIN CPD Once again the 2014 event promises a truly compelling and comprehensive itinerary of CPD accredited content, making a visit to Transport Security Expo not just a valuable learning experience but also an extremely rewarding contribution to your Continuing Professional Development. L FURTHER INFORMATION www.transec.com
Recognize AND Analyze Premier face recognition technology for real-time video screening and anonymous people analytics Is she a known suspect? How often was she here this month? When, where did she enter? Is she an authorized employee? How old is she? Has she been here before with another suspect?
www.cognitec.com • info@cognitec.com
40
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
AIR FREIGHT
Written by James Kelly, chief executive of the British Security Industry Association
A HOLISTIC APPROACH TO AIR CARGO SECURITY
Cargo Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
With 26 million tonnes of goods transported by air every year, the security of airborne cargo is of paramount importance against a backdrop of international terrorism. James Kelly, Chief Executive of the British Security Industry Association investigates how the aviation sector is responding to ever-evolving security challenges Surprisingly, prior to 9/11, only ten per cent of passenger luggage checked into US airports was screened for bombs and explosives. Ten years later, we’ve all become accustomed to removing our shoes and limiting the amount of liquid we carry as we pass through airport security. But what of the cargo that often accompanies us on our journeys? Is this, too, subject to the same rigorous security checks? PASSENGER AND CARGO PLANES In the UK, around 60 per cent of air freight is carried in passenger planes, with the rest transported on specialist cargo planes. Whilst passenger baggage is subject to inspection by x-ray, only a small amount of air cargo is checked in the same way. In addition, the variation of cargo security rules from country to country can create significant variation in the checks that have been carried out on cargo originating from outside the UK. Airlines themselves are obliged to meet their own government’s regulations, but some airlines go beyond these, including
British Airways, which screens all air cargo travelling on its passenger planes. Courier firm, TNT, also claims to x-ray all packages that pass through its UK depots. Despite this thorough approach, the fast‑moving nature of air cargo, as well as its diversity (the majority of air cargo is made up of an eclectic mix of high-value electronics, engineering and machine parts, pharmaceuticals, fruit and vegetables, but can also include scrap metal and cars) means that thorough scanning of every item simply isn’t possible. With that in mind, the security of the airport as a whole must be a primary consideration to avoid compromising the security of the cargo often stored within large airport compounds in preparation for dispatch. British
Security Industry Association (BSIA) members have a growing portfolio of implementing high‑security solutions at airports around the world, including Heathrow, Gatwick and Cork as well as transport hubs further afield, such as Vancouver and Hong Kong.
Whilst r e passengsubject AN EYE e is ON PERSONNEL baggagpection by s Monitoring the passage n i l l to sma a of personnel in and y l n o x-ray, of air cargo around an airport site is a critical element in amountcked in the ensuring the security of is che e way freight and cargo, when sam it is stored in compounds
awaiting loading. During the development of Heathrow’s newest Terminal 5, it was immediately recognised that the site required a proven, fully integrated IP solution that would not only provide 24/7 critical security but would also aid in the efficient flow of 30 million passengers a year. E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
43
Cargo Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Combat the rising threat of cargo crime with Maple’s unique IQ range of vehicle security products Picture the scene; You’ve collected your cargo, signed the manifest and hit the road. After four hours continuous driving you arrive at a truck-stop, only to find the seal is broken on your load area doors and half your cargo is missing… but how could that have happened if you never stopped? This is no hypothetical situation, it’s a scenario playing out with all too common regularity across Europe. What started as seemingly tall tales about cargo mysteriously disappearing during transit is now recognised as a very serious and quickly emerging threat. It’s difficult to pinpoint the exact dates, but it’s thought the first reports originate from Romania in 2008. What is certain however, is that incidents are now on the rise. Despite sounding like a scene straight from the latest Hollywood Blockbuster, attacks, dubbed the ‘Romanian MO’, feature a criminal gang closely following a truck, whilst an individual climbs onto the back and passes cargo back to the pursuing vehicle. Perhaps unsurprisingly, reports suggest that thieves willing to take such high-risks are far from opportunistic. Attacks are invariably centred around lucrative cargo such as
tobacco, pharmaceuticals and electronics. The problem is also spreading – the isolated and sporadic cases dating back to 2008 have now been replaced by more widespread activity; German police in North-Rhine Westphalia have recorded more than 50+ incidents in the 12-month period between March 2012-13. It’s no coincidence that demand in more sophisticated commercial vehicle security systems has risen over the past 2-3 years. Maple has been quick to respond, developing their unique IQ range of products to aid operators in their bid to combat the rising threat of cargo crime. The Maple IQ range of products allows operators to tailor systems around their own requirements. The heavy-duty slamlock ensures
that when doors are closed they’re always locked and sealed, while equipment is installed internally for optimum security. Further reassurance and functionality is provided via the powerful access control platform, enabling operators to remotely lockdown vehicles from anywhere in the world, temporarily preventing access even to authorised persons. In the unlikely event that a would-bethief manages to overcome the robust physical security, automatic door open notifications are sent to pre-selected personnel. Criminal gangs are methodical and targeted exploiting any vulnerability in the supply chain they can identify. As this latest threat proves it’s more important than ever that operators protect themselves and their business. Contact Maple to discuss your requirements and review the security of your fleet. FURTHER INFORMATION Contact Paul Nunn +44 (0)161 429 1580 paul.nunn@maplefleetservices.co.uk www.maplefleetservices.co.uk
Commercial Vehicle Security Solutions & Protection of Goods in Transit
Maple have been providing innovative and practical security solutions for the protection of commercial vehicles and goods in transit for 40 years. Our sophisticated security solutions are designed specifically to combat existing and emerging trends in cargo crime, with a commitment to stay one step ahead of organised, commercial vehicle crime. From high specification pneumatic locking systems to remote access control functionality, with Maple, no one comes close.
44
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
Call Visit
+44 (0)161 429 1580 www.maplefleetservices.co.uk @MapleSecurity
AIR FREIGHT In this example, the BSIA member company’s powerful and fully-integrated system is the industry’s only airport specific access control system and can be customised to meet the unique and ever changing needs of airports over time. The flexibility and high quality offered by the BSIA member was a key factor in its suitability for T5, in particular the facility for integration of the access control system with other security elements, including CCTV. A HOLISTIC APPROACH A holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best possible passenger experience. In 2011, the Government consulted on its proposals to achieve such modernisation through what it terms as an outcome‑focused, risk-based approach (OFRB). This approach enables each responsible organisation to develop its own security management system, building on international risk management best practice. Responses to the consultation – published in the Government’s consultation response in 2012 – revealed that aviation industry stakeholders
Cargo Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
A holistic approach to airport security, based on risk profiles and international best practice, is also at the heart of the UK Government’s plans to modernise the regulatory regime for airport security to bring it into line with better regulation principles, promote innovation and efficiency, while ensuring the best passenger experience and interested organisations agreed that the proposed solution was appropriate for aviation security, with respondents particularly welcoming the flexibility it enables for each responsible organisation to develop its own security management system building on international risk management best practice. On publication of the results of this consultation, the Government set out its plan to roll out the security management system approach over the next three to five years, starting with a pilot programme beginning at London City Airport. PILOT SCHEMES Recognising that the full benefits of OFRB – in particular a high degree of flexibility for
operators in the design of security processes – will require changes to European legislation, the UK Government has recognised the need to use the pilot schemes to build the evidence base necessary to engage with European legislators to make the case for change. In the meantime, with security remaining at the top of the agenda for airport operators and freight companies around the world, the sharing of best practice and continued technological innovation are at the heart of ensuring that this fast-moving, challenging area of the global transport network remains as safe and secure as possible. L FURTHER INFORMATION www.bsia.co.uk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
45
ADVERTISEMENT FEATURE
REAL-TIME WIRELESS GAS AND RADIATION DETECTION
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Military services around the world rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown
for Radiation and Chemical Detection is just one example of the numerous RAE Systems by Honeywell detectors that can seamlessly integrate into the ProRAE Guardian Wireless Safety System.
For military personnel and emergency responders, every second counts when dealing with chemical/biological attacks or incidents. First responders and military organisations typically are the first to arrive to remediate challenges and ensure public safety at both natural and man-made disasters. These teams never know the kind of situation they will find, from areas with high concentrations of radiation to poisonous gas which is why military services around the world already rely on RAE Systems by Honeywell’s highly sensitive PID, multi-gas and radiation sensors to provide greater confidence in their decision making process when encountering the unknown. RAPIDLY DEPLOYABLE THREAT DETECTION RAE Systems by Honeywell’s recently introduced ProRAE Guardian Real-time Wireless Safety System allows first responders to set up a rapidly deployable, secure wireless threat detection system that
encompasses a broad range of RAE Systems by Honeywell and approved third-party monitors to detect and track:Toxic Industrial Chemicals (TICs/ TIMs); flammable gases and vapours; Chemical Warfare Agents (CWA); radiation; meteorological conditions; GPS-based location information; MultiRAE PRO Multi-Threat Monitor. Response teams are then able to share data over the internet in order to facilitate better assessment, mutual response and potential evacuation. Data collected at a site where nerve gas or toxic industrial chemicals are released can also be accessed securely in real-time by any authorised user located anywhere in the world, such as global experts in incident remediation. COMPLETE SYSTEM RAE Systems by Honeywell’s MultiRAE PRO Wireless Portable Multi-Threat Monitor
INDUSTRY FIRST The MultiRAE Pro is the industry’s first wireless multi-threat detection tool that combines continuous monitoring capabilities for gamma radiation, volatile organic compounds (VOCs) down to parts-per-billion level, toxic combustible gases and oxygen, with Man Down Alarm functionality in one highly portable instrument. Certified to meet the military performance standard MIL-STD-810F, the MultiRAE Pro can be configured with 30 intelligent sensors (including ppb and ppm PID, NDIR, and exotics such as ammonia, chlorine, formaldehyde, and phosgene) to fully meet the monitoring needs of applications such as HazMat response, CBRN / TIC / TIM detection, EOD, homeland security and civil defence. Organisations are looking for systems and solutions to enhance safety in hazardous situations and enable faster response times. RAE Systems by Honeywell’s ProRAE Guardian Real Time Wireless Safety System and wireless detection products answer this demand and fulfil a critical need for real-time data access and the sharing of life critical information. ABOUT RAE SYSTEMS BY HONEYWELL RAE Systems by Honeywell is a leading global provider of rapidly deployable, multi‑sensor chemical and radiation detection networks for national security and industrial applications. The company delivers the most advanced wireless gas and radiation detection solutions for anytime, anywhere access to toxic and combustible gases, and radiation detection information to increase safety of national defence teams, emergency responders and the public. FURTHER INFORMATION Contact: Peter Barratt Tel: +44 [0] 1202 645780 peter.barratt@honeywell.com www.raesystems.com
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
47
CQC’s Fibrelight Safety Products
Dimensions: • Length - 1.65m • Diameter - 175mm • Weight - 6 kgs
Fibrelight Rod Stretcher:
The Fibrelight Rod Stretcher is lightweight and can be swiftly deployed from the compact carrying bag. The Rod Stretcher offers a rigid support for the casualty that can be easily carried between a team. The stretcher is fully adjustable to accommodate a wide range of sizes and will securely contain a casualty for a vertical or horizontal lift. The Stretcher can be fitted with floats enabling it to be used for water rescues. The stretchers compact nature enables it to be easily stowed in anemergency vehicle or cabinet and carried to the scene of the emergency.
Fibrelight Recovery Cradle: The SOLAS approved Fibrelight Cradle is a maritime recovery system that can be operated by a single crewmember. The Cradle can also serve as a boarding ladder, scramble net and stretcher. The Fibrelight Cradle is lighter, more compact, and more versatile than any comparable devices. The cradle requires only regular inspections and minimal maintenance every three years. The cradle can be easily rolled and stowed. The Fibrelight Recovery Cradle is primarily designed for use by rescue craft, rigid inflatables and ship lifeboats and marinas, however it can have multiple other uses. It forms both a robust scramble net as well as a temporary stretcher for immediate casualty evacuation. Fibrelight Cradles are available in lengths of 2, 3, 4 and 5 metres and are 1.3 metres wide. The Cradles are amazingly lightweight, a 3 metre cradle weights as little as 5 kilograms.
Fibrelight Structure All the Fibrelight products are manufactured using re-enforcing rods of Carbon Fibre that are enclosed within tubular webbing with flanges. When fitted and sewn at right angles between the double thickness pockets of a second webbing an incredibly strong structure is created.
Patent Numbers: GB - 2451127, Patent Application no:- US 12/669084. Europe - EP2178743 SOLAS APPROVAL CRADLE - SAS S100150/M1
If you are interested in CQC’s Fibrelight products please either scan this QR code or contact us on the detail below.
t: +44 (0)1271 345678 e: sales@cqc.co.uk w: www.cqc.co.uk
EVENT PREVIEW
ADVANCED DEFENCE KIT AT EMERGENCY SERVICES SHOW
Emergency Services Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Now in its ninth year, the Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear threats Visitors to this year’s Emergency Services Show will not only be able to see and handle the latest PPE and equipment in the exhibition, but also hear user feedback from police colleagues and CBRN specialists in the new free-to-attend seminars. Taking place at the NEC Birmingham on 24-25 September, the Emergency Services Show will feature two seminar theatres: Innovation & Technology and Interoperability & Collaboration. The Innovation and Technology programme includes sessions of relevance to counter terror professionals and will cover the latest developments in PPE, Body Worn Video (BWV) and mobile communications. SPEAKERS Speakers include Inspector Tony Price of Leicestershire Constabulary and Malcolm Peattie, specialist advisor at the Police CBRN Centre. The Interoperability & Collaboration seminars, developed in partnership with the Joint Emergency Services Interoperability Programme (JESIP), will include case studies presented by category 1 and 2 responders and examine the future role of Local Resilience
representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available to speak to visitors. RADIATION PROTECTION The military, emergency services and civil defence agencies have unique requirements for radiation protection of personnel and the public. James Fisher Nuclear (JFN) products for these markets cover a wide range of requirements. These vary from personal electronic dosimetry to allow for the monitoring of personnel doses in live time, to portal monitors for both vehicles and persons to enhance the surveillance capabilities at entrances and exits of key facilities, transport hubs or events. The range also covers hand held search and frisk probes which can be used to locate, detect, identify and classify radioactive material. MASS CASUALTY TRAINING Exhibitor, Amputees in Action, is an agency which provides amputee actors and special effects. It took part in London Fire Brigade’s largest and most comprehensive exercises in its history this May: a three-day exercise based
Over the course of the show, a team of experienced cross-capability officers representing CBRN(E) including Detection, Identification and Monitoring (DIM), will be available Forums. The full seminar programmes will be published on the event website. Now in its ninth year, the annual Emergency Services Show is particularly relevant to those involved in helping the UK to combat, respond to and recover from increasingly unpredictable acts of terrorism, from armed attacks through to chemical, biological, radiological and nuclear (CBRN) threats. It comprises an indoor and outdoor exhibition showcasing the latest vehicles, equipment and technology, as well as an Emergency Response Zone featuring over 80 support responders, voluntary sector partners and NGOs. Here is a look at some stands that will be of particular interest to visitors. Over the course of the show, a team of experienced cross-capability officers
around a plane crash in the capital. It was a unique opportunity for the blue light services to work together effectively to practice the life-saving skills that would be used should a major incident ever occur in the capital. Over 100 volunteers from a university paramedic course and actors from Amputees in Action played the part of ‘casualties’ to provide a realistic mass casualty environment for the emergency service personnel taking part. SURVEILLANCE EQUIPMENT SUPPLIERS Surveillance equipment suppliers include Edesix, Excelerate Technology, Pinnacle Response and Reveal Media. Body Worn Video (BWV) and other wearable technology remains high on the agenda and visitors will be able to see the latest cameras and discuss E
The Emergency Planning Society As well as exhibiting at the Emergency Services Show, the Emergency Planning Society will be co-locating its AGM at the NEC on 24 September and its annual conference (featuring national and international speakers) at the NEC on 25 September.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
49
EVENT PREVIEW MPS have been using Reveal’s body cameras for a number of years.
experiences with end-users in the exhibition. Pinnacle Response will be showcasing the PR5 Body Worn Video Camera, launched in October last year and recently supplied to Avon and Somerset Constabulary along with Sussex, Northamptonshire and Surrey Police. Meanwhile on the Reveal Media stand visitors will be able to find out more about the London Metropolitan Police Service (MPS) year-long, 500 camera BWV pilot. Despite the MPS initiative being hailed as the biggest pilot in the world, a number Blue light advert CT
14/10/13
WHAT ELSE IS ON? Other exhibiting organisations of particular interest to counter-terror professionals include: Babcock Critical Services; Bluecher; British Association of Public Safety Communications Officials; Fire Service College; Home Office ESMCP; Institute of Civil Protection & Emergency Management; National Ambulance Resilience Unit (NARU); National Ballistics Intelligence Service; National Chemical Emergency Centre; Joint Emergency Services Operability Programme (JESIP); Public Health England; Training 4 Resilience; UK Government Decontamination Services, and the Tactical Training Centre. The NEC is physically linked to Birmingham International Station and Birmingham Airport and is directly accessible from the UK motorway network. Parking for visitors and exhibitors will remain free of charge. Coaches will run from Birmingham International Station to the exhibition halls. L
Emergency Services Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The ann Emerge ual Service ncy particu s Show is to thos larly relevant e helping involved in t combat he UK to ac terroris ts of m
of UK Police forces have already trialled and rolled out hundreds of Reveal’s body worn cameras across their force and now operate with BWV as “business as usual”. In addition, 11 boroughs in the
10:14
FURTHER INFORMATION www.emergencyuk.com
Page 1
Blue lights lift barriers. Who are YOU selling to?
Don’t let a terrorist’s dream become your worst nightmare Disposing of ex blue light and security vehicles? Be sure they are properly de-commissioned and only offered to verified motor trade professionals.
Call The Fleet Auction Group now on 01530 833535. The Fleet Auction Group Ltd, Brindley Road, Stephenson Industrial Estate, Coalville, Leicestershire, LE67 3HG Tel. 01530 833535 Fax. 01530 813425 Email: chris.jager@fleetauctiongroup.com www.fleetauctiongroup.com
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
51
ngham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.emergencyuk.com | NEC | Birmingham | 24-25 September 2014 | www.eme
“If you're looking for the latest bluelight knowledge this is the Show to attend.� With over 400 key suppliers of kit and services waiting to meet you, along with free seminars, workshops and demonstrations, The Emergency Services Show is the only event you need to attend this year. Register for FREE visitor entry at www.emergencyuk.com. See you in September!
Free visitor entry at www.emergencyuk.com
The Emergency Services Show - Covering the entire spectrum of the Emergency Services
Event Supporters
Follow us on twitter @emergencyukshow #ESS2014
FREE PARKING
for all visitors thanks to
ADVERTISEMENT FEATURE
RUGGED AT EVERY LEVEL
Advertisement Feature
erge
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Getac provides rugged computing solutions for demanding professionals in extreme environments While it is possible to purchase consumergrade equipment and place it in a ruggedised case, do you really want to rely on a compromised solution when life and death could be in the balance? Military and counter terror operations are, quite literally, the front line, where equipment failure is not an option. In such situations, relying on the same hardware that a civilian would use for emails, photos and web browsing could put missions – and lives – at risk. LATEST TECHNOLOGY Getac has total ownership of the design and manufacture of its rugged mobile computing solutions. Its products use the latest technology, materials and manufacturing processes, ensuring every component is fully ruggedised. Getac’s hardware is designed to perform in critical working environments reliably at the highest performance. Placing consumer
Getac’s new 3D aerial technology (enabling fast download/upload speeds), dedicated SiRFstarIV™ GPS (offering faster positioning and improved accuracy) and dual hot-swap battery (providing 8-10 hours’ operating time). It is one of the world’s thinnest and lightest devices of its type in the world, yet is also MIL-STD-810G and IP65 rated, meaning it incorporates military-grade ruggedisation without compromise on performance. For more demanding applications where server capability is required, the X500-G2 Rugged Mobile Server offers users the ability to deploy a mobile rugged server to the field giving instant server capability at the start of operations. MIL-STD-810G certified and IP65 rated, the X500-G2 offers as standard a large 15.6” QuadraClear® display (800nits) which provides enhanced screen readability under sunlight and graphic capability in outdoor environments. Powered by the Intel® Core™ i7 vPro™ processor with 32GB RAM and 500GB storage, multiple applications can be
Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously hardware in a rugged case may be a seemingly cost-effective alternative, but by definition, that case is designed to be opened – which means it comes with an inherent vulnerability creating a high risk of failure. Getac rugged computers are designed with separate GPS and 3G/4G modems with separate antennas to ensure independent performance in applications requiring both functions simultaneously. Most consumer technology offer a single modem for both functions, resulting in reduced performance under the same conditions. It’s also important to have access to a range of form factors to meet the field challenge – be that a fully rugged server for a Forward Operating Base, or a secure tablet for defence scenarios. MARKET LEADING FEATURES For a balance of portability and power, the Getac V110 convertible notebook tablet offers an 11.6” high-definition screen, the latest Intel® 4th generation Haswell processing technology and LTE compatibility. Additional market-leading features include
run simultaneously without compromising on performance. RAID expansion is possible, holding up to five shock-protected disk drives, offering up to five terabytes of storage. Secure encryption solutions are available from Becrypt and Viasat. PORTABILITY For those applications where portability is crucial, Getac’s Z710 7” Android rugged tablet, built with Becrypt’s Titan II encryption platform, provides a fully secure system that can support a range of applications that defence markets can use with confidence. Aimed at sectors that require a fully rugged mobile device, the Z710 weighs just 800g, with a battery that gives more than 10 hours of operational time. It is a fully integrated device, which includes a 1D/2D barcode reader and an advanced GPS technology (SiRFstarIV™) accurate to 1.5 metres. The hardware is supported by Becrypt’s secure software Titan, which ensures that all device application and user data is protected with FIPS 140-2 compliant encryption. Administrators also have complete control,
so they can create separate encrypted user accounts or personas, enforce strong authentication, and manage different application and device policies - all of which reduce support and maintenance overheads. The Z710 Titan is currently undergoing trials with Northrop Grumman, indicating the serious potential of the device to revolutionise field operations. FURTHER INFORMATION If you would like to discuss any aspect of your rugged computing requirements, call 01952 207 221, e-mail: sales-getac-uk@ getac.com or visit www.getac.co.uk
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
53
when image matters
Professional Unmanned Aerial Vehicle Operators
MRL Eye Limited Alfred House Ropewalk Knottingley West Yorkshire WF11 9AL United Kingdom +44 (0) 1977 622000
www.mrleye.com Corporate Member
Surveys ď Ź Assessments ď Ź Inspections
EVENT PREVIEW
FLYING THE FLAG FOR THE GLOBAL UAV MARKET
Commercial UAV Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The Commercial UAV Show 2014 on 21-22 October at London’s Olympia represents a unique opportunity for industry leaders to exchange key insights on the unmanned aerial vehicle market
The Commercial UAV Show 2014 will be the largest global gathering of the commercial and civil UAV (unmanned aerial vehicle) universe. With 1,500 attendees, more than 70 exhibitors and over 80 speakers, this free event will provide its audiences with crucial insights into this emerging market and enable them to hear first-hand from both industry and end user organisations who are leading the way in this exciting space. They will come to learn from a range of case studies presented in five theatres about how people in many sectors are saving money and achieving vast increases in productivity and reliability through careful application of UAV systems and technology. They will learn how almost anyone with significant scale or expanse of facilities or infrastructure can benefit from a UAV system. Visitors to the show will benefit from a number of key features. Key speakers at the show include: Cpl. Byron Charbonneau, RCMP forensic collision
Case s will shotudies people w how money a are saving future plans for regulation n and a sneak peak at some vast inc d achieving of the high quality data product reases in captured by a variety of ivity thr oug the use unmanned platforms. of UAV h With speaker participation system from a mix of industry s innovators and service
reconstructionist, Royal Canadian Mounted Police; Nicolas Pollet, head of UAS Project, SNCF; Barnaby Wiegland, marine specialist, project development directorate, EDF Energy Plc; and Professor Simon Blackmore, head of engineering, Harper Adams University. ON-FLOOR SEMINARS Those attending the Commercial UAV Show’s Technical seminar will experience two jam-packed days of UAV manufacturer and end user presentations, case studies, displays and audience Q&As. The seminar programme is comprised of 20 minute speaking sessions carefully sculpted to provide attendees with a direct insight into current and future successful commercial UAV operations, the latest UAV technologies,
providers as well as content from successful UAV end users, visitors will be able to make new contacts and access pioneering projects that will help benefit your own organisation.
END USER ZONE The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths. Allowing those attendees with ‘exhibition only’ passes to still be able E
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
55
EVENT PREVIEW
The end user zone allows attendees not only to meet with UAV manufacturers on the exhibition floor but crucially, to learn about successful cross-sector UAV projects that are happening right now from UAV end users at their individual exhibition booths
NEW
RIEGL VUX -1 Ultra high performing, extremely compact UAS LiDAR sensor 330°
KEYNOTE SPEECH The opening keynote address on commercial UAV application will be taken by Mike Rickett, Deputy Senior Vice-President of Selex ES. This session will analyse the current development of a commercial market for UAVs and critically analyse the future short-term potential for the commercial UAV market. It will give a manufacturer perspective on the promising roles of UAVs in the commercial universe, and compare and contrast commercial end user requirements across different market verticals. Following the keynote, there will be an end user showcase, looking at which market across the industry sectors has the most potential need for UAV use and which markets are currently using commercial UAVs successfully. Speakers include Prof Simon Blackmore, Head of Engineering at Harper Adams University; Thomas Hannen, Senior Innovations Producer at the BBC; and David Edem, Head of Business Technology at Tullow Oil. AFTERNOON SESSION The afternoon session looks at the myth of the danger drone: Overcoming misconceptions about UAV use. It will examine how safe certified platforms and pilots are and demonstrate the full range of critical considerations that are addressed when commencing UAV flights. It will also discuss the importance of separating professional UAV use and capabilities from the hobbyist community and finding answers to platform durability across differing contexts and operational tasks. Following the presentation, there will be mini showcases from Jonathan Ledgard, Director at The Swiss Federal Institute of Technology; Dr Peter Enderlein, Senior Marine Science Engineer at the British Antarctic Survey; and Serge Wich, Co-founder of ConservationDrones. L FURTHER INFORMATION www.terrapinn.com/uav
FOV
field of view (FOV) up to 330°
Meet us at
to learn about current commercial UAV operations and how this emerging technology is helping a multitude of companies to reach their various industry-specific organisational goals. The end user zone will be especially educational for those attendees who are still in the exploration stage of understanding the various cost-benefit and operational efficiencies that UAVs can offer. Current end-user exhibitors include SNCF and BBC World Service.
3.6 kg
0 cm
10 cm
20 cm
October 21-22, 2014 London | UK Booth #37
30 cm
ing-C
am
compact and lightweight
© Fly
CHARITY ZONE The Commercial UAV Show 2014 attendees can now meet with attending global charities in the exhibition Charity Zone. Part of The Commercial UAV Show’s message is to help raise awareness and further promote how UAVs are making a positive difference to charity missions across the world. UAVs are being increasingly utilised in environmental, animal welfare and humanitarian missions and the Charity Zone has been created to support the cause of several international Charities who have adopted UAV technology to aid their missions and make a positive impact to the world we live in. Join organisations like Wildlife Air Service, Open relief, Conservationdrones.org and Medair at the Charity Zone to find out more.
ULS
®
Commercial UAV Show
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
VUX®-1 mounted on UAS, e.g. Flying-Cam 3.0 SARAH
Introducing the World´s first survey-grade UAS laser scanner! The VUX®-1 is a compact and lightweight laser scanner for unmanned aerial missions. | weight approx. 3.6 kg | accuracy 10 mm | up to 550 kHz PRR | long measurement range | up to 200 scans/sec | 330° field of view | echo digitization & online waveform processing | multiple target capability | multiple time around processing | parallel scan lines | various IMU integration options | internal data storage 240 GByte | data storage on external USB devices | integrated LAN-TCP/IP interface | flexible, easy system installation
RIEGL offers a whole family of proven Airborne Laser Scanner Systems & Engines for every purpose: LMS-Q1560 Dual Channel, High Performance, Fully Integrated Airborne LiDAR Scanning System LMS-Q780 & LMS-Q680i High Altitude, High Speed Airborne Scanner Engines VQ-820-G Topo-Hydrographic Airborne Scanner Engine VQ-480i & VQ-480-U Compact & Lightweight Airborne Scanner Engines, for helicopters & UAS other types on request
www.riegl.com RIEGL LMS GmbH, Austria
|
RIEGL USA Inc.
|
RIEGL Japan Ltd.
|
RIEGL China Ltd.
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
57
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
access systems Manual and Automatic Shop Front Systems Access Systems Commercial Residential
Bi-Folding Door Systems Fire Exits Curtain Walling Louvre Systems Service Contracts Panic Bars fitted
With a team of people made up of experienced design and service people we can offer a complete package when it comes to access systems. We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business, please call or email us today.
CALL US NOW ON: 01274 876178 AMP Access Systems, Unit 5-6, West End Mills, Brick Street, Cleckheaton, BD19 5EH www.ampaccesssystems.co.uk info@ampaccesssystems.co.uk
EB304N
EDM
S A L E S , S E R V I C E AN D S U P P O R T S e r vi c e C o nt r a c t s A v ai l a bl e Br e a k d o w n S e r vi c e A v a il a bl e S p a r e P a r t s A v a il a b l e C al ib r a ti o n a n d T e s t i ng A v ai l a bl e
Here at Advanced Machining Products we have got over 100 years combined experience in the sale, service and support of EDM and wire EDM machines. Most types of machines can be supported including bespoke equipment from aged manufacturers. Specialising in the following machine types: JSEDM Joemars Mecrode Agie FANUC Wire EDM Vectstar Eroda Transtec Amchem Sparcatron
58
COUNTER TERROR BUSINESS MAGAZINE | Issue 19
We also offer the following new machines: Fast Hole EDM Drilling Machines STEM Drilling Machines ECM Machines PECM Machines Laser Drilling Machines Advanced Monitoring Systems with Profile Logging
CALL US NOW ON:
With a team of people made up of experienced design and service engineers we can offer a complete package when it comes to EDM and ECM technology. We are happy to discuss any bespoke requirements that you may have. If you think that we can be of service to your business please call or email us today.
01274 876178
Advanced Machining Products Limited, Unit 7, West End Mills, Brick Street, Cleckheaton, BD19 5EH www.advancedmachiningproducts.com sales@advancedmachiningproducts.com
Counter Terrorism
COUNTER TERROR STRATEGY
To counter the threat of ISIS, the UK must help regional partners to create a new, legitimate order, says Richard Barrett CMG OBE, Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI) ISIS threatens long-term disorder across the Middle East. The UK does not need draconian legislation at home, but strong diplomacy and co-operation with its partners in the region to help them achieve long-term stability. Within the space of a week in August, both Prime Minister David Cameron and Home Secretary Theresa May commented on the threat posed to British national security by the self-styled Islamic State, and in particular by its British members. The home secretary estimated the number of British citizens who had travelled to join ISIS or other terrorist organisations in Iraq and Syria as ‘at least 500’. PREVENTING RADICALISATION The recent beheading of US journalist Jim Foley, apparently by a British male, and the comments of former ISIS hostages that they were guarded by three violent British members of the group, certainly suggest that more should be done to prevent extremist radicalisation in Britain and its possible consequences both here or overseas. But as Raffaello Pantucci pointed out here on 21 August, the direct
threat from ISIS to the United Kingdom is currently more assumed than proven. The prime minister described ISIS as ‘an exceptionally dangerous terrorist movement’ that would ‘target us on the streets of Britain’ as soon as it was strong enough to do so. In similar vein, the home secretary wrote of the ‘very deadly threat we face from terrorism at home and abroad’, and their headline policy prescriptions largely reflected the premise that if ISIS had yet to attack us, it was only a matter of time before it did. Beneath the flurry of interrupted holidays and calls for immediate action, amplified subsequently by London Mayor Boris Johnson’s proposal to upend the presumption of innocence in legal proceedings against anyone travelling to Syria, both the prime minister and the home secretary show a more
measured approach than their dramatic language might suggest. David Cameron rightly points out that in order to deal with ISIS, one needs to understand the true nature of the threat it poses. This is a threat not to the United Kingdom, but rather to the established order – or disorder – in the Middle East.
Written by Richard Barrett CMG OBE, associate fellow, Counter Terrorism, The Royal United Services Institute
A LEGITIMATE NEW ORDER TO COMBAT ISIS THREAT PENETRATING SOCIETY ISIS is an insurgent group that uses terrorist tactics to soften up its targets and intimidate its opponents prior to mounting a more conventional armed assault. Its car bombs and suicide bombers are more effective and easier to aim than long-range artillery fire. These tactics not only spread fear but also suggest that ISIS has secretly penetrated deep into local society. Assassinations achieve the same effect, as well as removing key opposition figures. These terrorist tactics are of course exportable, but for now, ISIS deploys them to conquer territory, not to avenge or stimulate attacks from outside. Its objectives are local and the ‘poisonous ideology’ that worries the prime minister merely cloaks a desire for power. As the Prime Minister points out, the new Iraqi government will therefore be the most critical element in the effort to defeat ISIS, and E
e “..Thes ctics t ta terroris course are of , but for ble exporta IS deploys now, IS o conquer them t tory..” terri
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
59
Copper & Optic Terminations Ltd
Copper & Optic Terminations Ltd specialise in sub contract Electronic wiring, cable and fibre optic assembly and test for the military, defence, aerospace, medical, mining and professional electronics industries. We aim to provide a world class customer service by offering our customers on time deliveries of products to the highest possible quality standards, in-line with our BS EN ISO9001:2008/AS9100 REV C accreditation.
Quality Policy
It is the Company policy to provide all customers products that are fit for their intended purpose and conform to customer and relevant regulatory requirements. Our policy is to exceed all customers’ expectations for:
QUALITY OF PRODUCTS • CUSTOMER SERVICE • DELIVERY Management Commitment
To acheive these goals Copper & Optic shall adhere to these principles:
• Understanding the customer’s requirements in full • Communicate with the customer at all times • Communicate the goals to all Copper & Optic employees • Implementation of a continuous improvement philosophy • Implementation of a quality system that helps the business
Services
• Cable assemblies and cable harnesses • Copper and fibre optics • Rack, panel or cubicle assembly • Turnkey product management for complex assemblies • PCA and PCB assemblies • ESD Area • Electronic modules • Testing using Dit-mco circuit analyser, Dynalab ATE, ATE Cirris
• Attention to detail • Build standard control • High quality standards • Own developed integrated computer database • Quality customer service • Rapid response
Copper & Optic Terminations Ltd Unit 1, Stone Road Business Park, 55 stone Road, Stoke on Trent, Staffordshire ST4 6SR t: +44(0)1782 275810 e: sales@copperandoptic.com
www.copperandoptic.com
Counter Terrorism
COUNTER TERROR STRATEGY
In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies apart from encouraging it to take action that reduces crucial Sunni tribal support for ISIS, the UK must help persuade other countries in the region, which he lists as Saudi Arabia, Qatar, the UAE, Egypt, Turkey and ‘perhaps’ Iran to take action as well. I would strongly urge him to remove the ‘perhaps’ before Iran, because it is only this group of countries as a whole that can plot a path for the future of the Middle East. FEEDING OFF LACK OF GOVERNANCE ISIS feeds off the growing sectarianism in the region; the widespread mismanagement of government; the lack of governance; the education systems that do nothing to foster tolerance or even a reasoned approach to learning; the primitive understanding of the value and role of women in society; the crimping of freedoms of expression and assembly, and the widespread failure to encourage political debate. It is a region in need of serious change, and if change only comes on the back of the horrors perpetrated by ISIS, at least its actions will have led to something more than mere death and destruction.
The UK may now be a middling power, but it still has some influence in the Middle East. The Prime Minister writes of the tools at his disposal as ‘aid, diplomacy, [and] our military prowess’, and while he might like to tone down the emphasis on military means, which have produced rather mixed results, aid in the form of capacity building and diplomacy are both sorely needed, especially the latter. But one of the reasons that the UK still has influence is the perception that it operates according to a sensible mix of pragmatism and idealism. Its system of government, imperfect as it is in so many ways, takes as given many of the attributes that seem so unattainable for all but the ruling cliques of Middle Eastern states. UNNECESSARY LEGISLATION This is why we will do ourselves no favours, either at home or abroad, if we allow the graphic image of ‘a terrorist state on the shores of the Mediterranean’, to use the prime minister’s words, to take us still further down the road towards harsh and unnecessary legislation aimed at an as yet ill-defined threat. Confiscating passports and stripping
people of their citizenship may be necessary in some cases, as may arresting returnees from Iraq and Syria, but these measures are not going to stop people going or wanting to go. In her article, the Home Secretary makes a robust appeal for ‘the legal powers we need to prevail’ against terrorism, but she also emphasises the effort her department is making to understand and address the reasons why people raised in Britain should want to join groups in Syria and Iraq that make no secret of their brutality and intolerance. This is where the real work lies, and just by making a genuine effort in this direction, the government will do more to counter the appeal of ISIS than any amount of arrests and exclusions. It will also increase the UK’s ability and legitimacy to make suggestions to its overseas partners in the Middle East as to how they might promote longer‑term stability in their troubled region. L FURTHER INFORMATION www.rusi.org
About the author Richard Barrett CMG OBE is an Associate Fellow, Counter Terrorism at the The Royal United Services Institute (RUSI) is an independent think tank engaged in cutting edge defence and security research. Founded in 1831 by the Duke of Wellington, RUSI embodies nearly two centuries of forward thinking, free discussion and careful reflection on defence and security matters. This article was first published on the RUSI website at www.rusi.org
Issue 19 | COUNTER TERROR BUSINESS MAGAZINE
61
Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.
Your Global Partner for Servo Technology & Design.
info.uk@infranor.com www.infranor.com +44(0)208 144 2152
DEFENCE SPENDING
MoD signs £3.5bn armoured vehicle deal with General Dynamics The Ministry of Defence (MoD) has awarded General Dynamics a contract to deliver 589 SCOUT Specialist Vehicle (SV) platforms to the British Army to provide essential capability to the Armoured Cavalry. The platforms, consisting of six variants, will be delivered to the British Army between 2017 and 2024, alongside the provision of initial in-service support and training, and will serve at the heart of the Armoured Infantry Brigade structure. This contract safeguards or creates up to 1,300 jobs across the programme’s UK supply chain, with 300 of these at General Dynamics UK’s Oakdale site. SCOUT SV represents the future of Armoured Fighting Vehicles (AFV) for the British Army, providing best-in-class protection and survivability, reliability and mobility and all-weather intelligence, surveillance, target acquisition and recognition (ISTAR) capabilities. Its range of variants will allow the British Army to conduct sustained, expeditionary, full‑spectrum and network-enabled operations with a reduced logistics footprint. SCOUT SV can operate in combined-arms and multinational situations across a wide-range of future operating environments. Prime Minister David Cameron said: “I’m delighted that on the eve of the NATO Summit, we can announce the biggest single contract for AFVs for the British Army since the 1980s. These new vehicles are testament to the world class engineering skills in South Wales and across the UK, helping to create the Army’s first fully digitalised armoured vehicles. Not
only will they be crucial in helping to keep Britain safe, they will also underpin nearly 1,300 jobs across the UK and showcase the strength of the UK’s highly skilled defence sector. With the second largest defence budget in NATO, meeting NATO’s two per cent of GDP spending target and investing in new capabilities to deal with the emerging threats we are ensuring Britain’s national security, staying at the forefront of the global race and providing leadership within NATO.” Secretary of State for Defence, the Rt Hon Michael Fallon MP said: “This multi-billion pound contract is fantastic news for our soldiers in providing them with the most technologically advanced and versatile AFVs to overcome future threats. This is the biggest single order placed by the MoD for armoured vehicles for around 30 years and is an important part of the investment we are making to keep Britain safe. It is also excellent news for the supply chain of this state-of-the-art vehicle and will sustain 1,300 engineering jobs across the UK in key defence industries.” Kevin Connell, Vice President General Dynamics UK – Land Systems, said: “We are delighted that the UK MoD has awarded us this important contract. SCOUT SV provides essential capability to the British Army to allow it to dominate the battle space for years to come and it secures thousands of jobs right across the UK for at least the next decade. General Dynamics UK and our partners have worked hard over the last four years to develop a world-leading vehicle, and we will maintain that same work ethic to deliver 589 SCOUT SV platforms to the British Army on-time and on-budget.” SCOUT SV has been developed at General Dynamics UK’s AFV design and engineering centre in Oakdale, South Wales, maintaining the UK’s sovereign expertise in this important capability. SCOUT SV provides best‑in-class protection and survivability, reliability and mobility and all-weather intelligence, surveillance, target acquisition and recognition (ISTAR) capabilities
NEWS IN BRIEF Australia to become ‘enhanced’ NATO partner
Defence News
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
Australian foreign minister Julie Bishop says the country will accept a formal invitation to become an enhanced partner in NATO, but will maintain autonomy in deciding the extent and character of involvement in future Nato-led operations. Australia’s relationship with Nato strengthened substantially over the past decade due to participation in the International Security Assistance Force in Afghanistan.
Martitime dispute leads Japan to increase defence spend Japan’s defence ministry has made its biggest ever budget request, amid severe tensions with China over a maritime dispute in the East China Sea. The ministry is seeking 5.05 trillion yen (£29.4bn; $48.7bn) for the year – a 3.5 per cent rise. If approved, it would mark the third year the defence budget had been increased.
A400M makes maiden flight The first Airbus A400M new generation airlifter has made its maiden flight. The aircraft is the first of 22 ordered by the UK and will be available for delivery by end September. Edward “Ed” Strongman, who captained the flight, said: “Its combination of true tactical capability with strategic range will be an enormous contributor to future air mobility in the RAF.”
SNP’s proposed defence policy criticised Former deputy supreme allied commander in Europe General Sir Richard Shirreff has criticised the defence policies in the Scottish government’s White Paper, calling them “amateurish” and “dangerous”. Sir Richard said: “Nothing I have seen or heard persuades me that Scotland’s safety or security would be enhanced one iota if it became a separate country.”
Issue 9 | DEFENCE BUSINESS MAGAZINE
63
UKRAINE CONFLICT
Defence Sectretary condemns Russian role as Ukraine calls to be made a member of NATO Foreign Secretary Philip Hammond has condemned Russia for its role in the Ukraine crisis, claiming the country had “chosen the role of pariah, rather than partner.” In a September speech Hammond called on the international community to demonstrate a political will to prevent future attacks on Nato member nations and their allies. A recent Washington Post leader criticised the organisation for its failure to act in the region, saying it “still shrinks from scrapping a 17-year-old agreement with Russia not to establish permanent bases in Central and Eastern Europe even though Moscow is flagrantly violating its own European commitments.” While Ukraine is not currently one of the 28 countries in Nato, Hammond spoke of anxieties felt in Eastern members such as Poland and the Baltic states that they could face being the target of Moscow’s expansionist strategies. The Ukrainian government has called to be made a member of the alliance, a move which would require it to move a clause in the constitution which forbids the country from joining any military bloc. Hammond said: “If we lack, or are perceived to lack, the political will to respond – and to do so quickly – the credibility of that
commitment to collective defence will be undermined, and the very fabric of this, most successful of alliances, will unravel.” “So we have to be clear with Russia, in particular, that while we support a political resolution to the situation in Eastern Ukraine, there is a red line around Nato member states themselves that cannot be crossed.” His speech came as the Ministry of Defence announced plans for a military exercise in the city of Lviv in western
Defence News
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
Ukraine involving around 30 British troops. An MoD spokesperson said: “A small troop of Light Dragoons are expected to participate in Exercise Rapid Trident, a routine and small-scale international exercise, in Ukraine [this September].” Emphasising that the exercise would be a peaceful one, Julian Brazier, defence minister for Reserves, said: “These exercises are reminding people that these are our allies within Nato.”
RADAR SYSTEMS NAVY plans refresh of navigation radar portfolio The Ministry of Defence (MoD) has set out plans for the fleet-wide recapitalisation of the navigation radar systems fitted to Royal Navy ships and submarines. The project is intended to replace the current RN and RFA navigation radar inventory. Existing in-service systems comprise the Kelvin Hughes Radar Type 1007 I-band radar, the Northrop Grumman Sperry Marine Radar Type 1008 E/F-band radar, and the Raytheon Radar Type 1047 I-band and Radar Type 1048 E/F-band radars. In a 27 August contract notice, the MoD’s Defence Equipment and Support (DE&S) arm’s Communications and Situational Awareness team said that the scope of the NRP would include primary navigation radars (I-band), secondary navigation radars (E/F-band), and compact I-band radars.
EDUCATION
AIRCRAFT TECHNOLOGY
MoD launches new armed forces learning resource
Aircraft ‘Smart Skin’ concept detects injury
A resource for key stages 1 to 4 has been launched to educate children about the work of the UK armed forces. The new initiative aims to inform and educate both schoolchildren and teachers about the work of the British armed forces. The resource, hosted from its own website, covers students from the ages of 5 to 16 and is designed to be used as part of teaching in English, history and citizenship lessons. The project explores key questions that students might have about the armed forces. These range from why we have the armed forces, their history and their work in the present day, to first-hand accounts of what it is like to work in the Royal Navy, British Army and Royal Air Force. A diverse range of people have contributed to bringing the learning resource to life. Imam Asim Hafiz, Islamic religious advisor to the armed forces, drew
Work is underway at BAE Systems to give aircraft human-like ‘skin’, enabling the detection of injury or damage and the ability to ‘feel’ the world around them. Engineers at BAE’s Advanced Technology Centre are investigating a ‘smart skin’ concept which could be embedded with tens of thousands of micro-sensors. When applied to an aircraft, this will enable it to sense wind speed, temperature, physical strain and movement, far more accurately than current sensor technology allows. The concept will enable aircraft to continually monitor their health, reporting back on potential problems before they become significant. This would reduce
on his experience of ‘building bridges across communities and working to bring peace’ whilst serving in Afghanistan. Historian Dan Snow wrote the introduction to ‘The Armed Forces in our History’ section, focusing on the wars that have ‘shaped our world’. The Minister of State for Defence Personnel, Welfare and Veterans, Anna Soubry, said: “The role our armed forces play in the security of our country is as vital as ever, supported by peacekeeping and humanitarian work carried out right across the world. With the centenary of the start of the First World War this year, the teaching pack offers an excellent opportunity for people to learn more about the breadth of our armed forces past, present and future.” The teaching pack contains interactive links, video and audio. READ MORE: tinyurl.com/q73nfam
the need for regular check-ups on the ground and parts could be replaced in a timely manner, increasing the efficiency of aircraft maintenance, the availability of the plane and improving safety. tTny sensors or ‘motes’ can be less than 1mm squared. Collectively, the sensors would have their own power source and when paired with the appropriate software, be able to communicate in much the same way that human skin sends signals to the brain. READ MORE: tinyurl.com/lowah2x
Issue 9 | DEFENCE BUSINESS MAGAZINE
65
EVENT REVIEW
MISSION ACCOMPLISHED AT EUROSATORY 2014
June’s Eurosatory event in Paris showcased the newest developments in defence and security, spanning a range of technological and operational solutions. Here are some highlights
number of exhibitors and the widest exhibition area, Eurosatory maintains its position as the international leader and appears as the major event for new products and innovations. Year on year, Eurosatory builds on its comprehensive coverage of the Land and Air-Land Defence and Security industries, continuing to position itself as the event of reference within the industry. This year’s Defence and Security exhibitions saw the first unveiling of a number of vehicles (over 250, around two thirds of which were armoured vehicles), armed systems and anti-aircraft warfare systems of all categories, as well as featuring a number of additional product categories.
Eurosatory 2014, the Land and Air-land Defence and Security Exhibition was held in Paris from 16-20 June this summer. The international scale of this event was underlined by the presence of six new countries as exhibitors – Argentina, Colombia, Hong Kong, Iraq, Japan and Panama. This year’s event met the expectations of many professionals and governmental players. Over the course of this year’s show, the exhibition confirmed its well‑established
ROBOTICS AND DRONE TECHNOLOGY Among more than sixty ground robots exhibited this year, Eurosatory previewed two heavy robotics systems of between eight and 20 tonnes in a demonstration of their operational capabilities. In addition, no fewer than 75 drone systems were featured at the show, from the smallest models weighing only a few grammes to next-generation HALE unmanned aerial vehicles (UAVs). In the area of personal protection equipment, a majority of major manufacturers from around the world were present, exhibiting products like bulletproof and stab‑resistant vests, E
pre‑eminence in the areas of homeland security, civil security and company safety, with the presence of many visitors and delegations involved in those sectors. Several interior ministry entities were also in attendance, as well as a high proportion of exhibitors (over 50 per cent) offering various security solutions. EXHIBITORS Presenting a wide selection of materials and systems on show, an unrivalled
The on exhibiti d its e confirmence in preemineas of the ar security, nd homela curity and civil se pany com safety
Issue 9 | DEFENCE BUSINESS MAGAZINE
Eurosatory
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
67
TM
More Than Just A Monitor
TM
The Only Field – Upgradable Transport Monitor
That You Can Change as Needs & Technologies Evolve
Ultrasound, video laryngoscope & new algorithms are the first of many new capabilities to be introduced*
Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care & the newly adopted joint TCCC card* Tempus Pro:
• Has the longest battery life (over 10 3/4 hours monitoring all parameters)**; • Is the most compact; • Is the most durable & rugged vital signs monitor available.
Call us now for more information: Tel: +44 (0) 1256 362400 or e-mail: info@rdtltd.com TP A 0214 www.rdtltd.com Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014. * Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.
EVENT REVIEW
Eurosatory
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
Eurosatory 2014 in numbers 1,507 exhibitors from 59 countries 70 per cent international exhibitors 4 International organizations: NATO, NAMFI, NAMSA, EUMS 175, 964m² of indoor and outdoor exhibiting space 55,786 professional visitors from 143 countries 172 official delegations from 87 countries 176 Eurosatory Guests from 36 countries 707 journalists from the 5 continents CBRND (Chemical, biological, radiological and nuclear defense) equipment and an exhaustive range of innovative solutions suitable for use in extreme situations. AERONAUTIC SURVEILLANCE The domain of ground surveillance by all types of aircraft (drones, aerostats, helicopters) is growing in importance to match satellite surveillance. A huge number of new industrial solutions revealed at the show represents a growing trend. Eurosatory has become the point of reference for the optics industry, showing everything from complete systems to constituent materials and highly developed new technologies suitable for all budgets. Satellite and terrestrial communications systems featured heavily at the event, with a large choice for technology deployable in military and civilian situations. The show provided a comprehensive array of logistics equipment suitable for deployment, with polyvalent solutions for civilian and military installations (tents, shelters, food preparation, sanitation and energy). These products are applicable in a number of services, for example transport and security. What’s more, Eurosatory has become the leading exhibition for energy products that are sustainable, renewable and durable, increasingly important in the world of alternative fuel vehicles. This year the show offered the greatest variety in terms of equipment that can be used in crowd control while bringing down the risk of fatality. With more than 450 new products revealed, in 2014 Eurosatory proved once more that its unrivalled reputation for showcasing the greatest offering in Land/ Air defence and security is well deserved. L FURTHER INFORMATION www.eurosatory.com
Issue 9 | DEFENCE BUSINESS MAGAZINE
69
Advertisers Index
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
ADVERTISERS INDEX
The publishers accept no responsibility for errors or omissions in this free service Advanced Machining Products 58 Arinc 42 Atkins 34, 35 Blokn Mesh UK 19 Broden Media 49, 51 Clarion Events 16 CMO 28 Cognitec Systems 40 Copper and Optic Termination 60 CQC 48 Cross Match Technologies 6 DMS Protective Equipment 10 Fleet Auction Group 51 Frontier Pitts 45 Garnett Keeler Public 53 Guava International 41 Hesco Bastion IBC Holmatro – Special Tactics 8 Honeywell Analytics 46 Imago Techmedia 23 Infranor 20, 31, 62
70
DEFENCE BUSINESS MAGAZINE | Issue 9
Intelligence-Sec 26 IQPC International 4 Maple 44 MRL Eye 54 Phoenix Datacom 22 Rapiscan Systems 38 Remote Diagnostic 68 Reveal Media 12 Riegl Laser 57 Scanna Msc 14 South Midland 66 Tata Steel OBC The Mercian Labels Group IFC Thermacore Europe 64 Trizo Electonics Assembly 70 Vector Command 50 Vocal 24 Voip.co.uk 32 Vulcan UAV 56 Zaun 36
PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.
For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com
Ideal for major events or changing sites Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats