Counter Terror Business 20

Page 1

www.counterterrorbusiness.com | ISSUE 20

IN THE NEWS: HUMAN RIGHTS AND DATA PROTECTION ISSUES WITH NEW COUNTER TERROR BILL

DRONES

DEFENCE

EVENT REVIEW

TRANSPORT SECURITY EXPO The latest thinking in maritime, aviation and rail security debated at the 2014 event

FREIGHT SECURITY

CRITICAL INFRASTRUCTURE

GLOBAL TERRORISM INDEX

CARGO CRIME Protect assets in transit from violent, organised and sophisticated attacks

TERRORIST TRENDS

Measuring the impact of terrorism across the globe

News: ms n ar Russia witness s maker th p71 grow NCE

ZINE

AGA ESS M

EFE FOR D

USIN THE B

IDEX w revie 2015 p 5 p7



COUNTER TERROR BUSINESS

A despicable attack on children

www.counterterrorbusiness.com | ISSUE 20

IN THE NEWS: HUMAN RIGHTS AND DATA PROTECTION ISSUES WITH NEW COUNTER TERROR BILL

DRONES

DEFENCE

EVENT REVIEW

TRANSPORT SECURITY EXPO The latest thinking in maritime, aviation and rail security debated at the 2014 event

FREIGHT SECURITY

CRITICAL INFRASTRUCTURE

Protect assets in transit from violent, organised and sophisticated attacks

TERRORIST TRENDS

GLOBAL TERRORISM INDEX

CARGO CRIME

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Measuring the impact of terrorism across the globe

News: s arm Russianwitness s maker h p71 growt

As we go to press, the world is in shock at the attack on a military school in Peshawar, which killed at least 132 children and nine staff. Immediately after the attack, the Taliban claimed responsibility. Pakistan’s Prime Minister Nawaz Sharif has said that the anti-terrorism campaign in Pakistan will “continue until terrorism is rooted out from this land”. Afghan president Ashraf Ghani said the two countries should “jointly take effective actions” following a surprise meeting with Pakistan’s army chief in Kabul to discuss much needed security co-ordination.

CE

ZINE

FOR DEFEN

ESS MAGA

THE BUSIN

IDEX w vie 2015 pre p75

In other news, a bill that would extend a programme meant to help insurance companies cover Americans in the event of terrorist attacks was blocked in the final hours of the Senate session. While the US senate approved a next years’ huge defence spend, the Terrorism Risk Insurance Act has been the subject of considerable debate with some advocates warning of dire consequences if Congress fails to act. Others argue the free market would step in and take care of any problems. The bill now will expire on 31 December and can only be renewed after the 114th Congress is sworn in next year. On page 59, The Institute for Economics and Peace’s last Global Terrorism Index (GTI) makes interesting reading. The GTI uses four indicators to measure the impact of terrorism – the number of terrorist incidents, the number of deaths, the number of casualties and the level of property damage. These are used to create a weighted five-year average for each country.

CTB would like to wish all readers a prosperous 2015. Danny Wright

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media

© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

3


PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures and Blast/ Ballistic Protective Construction. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.

Tata Steel Projects For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com

Our Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation in most cases. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats


CONTENTS

11

07 CTB NEWS

47 COUNTER TERROR EXPO

11 CRITICAL NATIONAL INFRASTRUCTURE

53 FORENSICS EUROPE EXPO

Human rights and data protection issues with new Counter Terror Bill; partnerships target terror funding; Over 120 killed as Taliban claims responsibility for Peshawar attack

An attack against a critical asset and the knock-on effect this could have on other sectors, has the potential to be catastrophic for the security and wellbeing of the nation, writes Security Institute member Charles Swanson, and the British Security Industry Association’s director of technical services Alex Carmichael explains why it is essential to secure our country’s valuable network of crucial supplies

21 CARGO CRIME

27

Terrorism and theft don’t always go hand-in-hand but in the supply chain, any infiltration of goods in transit by road, air, sea or rail could just as easily be exploited by people with either intent, writes Laurence Brown, executive director of the Transported Asset Protection Association

53

27 BUILDING SECURITY

Richard Flint of BRE Global discusses the benefits of building security products certification to manufacturers and users

55

35 CYBER SECURITY

Three years after the National Cyber Security Strategy was launched, the government has published a report on its progress and its future plans to thwart cyber crime

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Understanding and combating terror threats is a critical priority for civil, military and private sector stakeholders. Counter Terror Expo 2015 leads the way in mitigating the threat of terrorism

Forensics Europe Expo, taking place in London’s Olympia from 21-22 April 2015, will connect senior buyers, suppliers and specifiers within all forensic sectors

55 DRONE TECHNOLOGY

Can drone technology, under proper legal regulation, deliver significant benefits for the UK’s national security policy and economy? A report from the University of Birmingham Policy Commission examines the issue

59 GLOBAL TERRORISM INDEX

The report that analyses the impact of terrorism in 162 countries

61 BORDER CONTROL

The 2014 BORDERPOL Congress in Hungary gathered the world’s leading border security professionals to discuss some the latest issues facing our borders

63 TRANSPORT SECURITY EXPO

4,037 visitors from all corners of the globe gathered at this year’s Transport Security Expo for the latest thinking in maritime, aviation and rail security

THE

BUS

INES

SM AG

AZIN

E FO RD EF

ENC

ISS Turn t UE 10 for th o page 7 e la 1 businetest defenc e s and fe s news atures

75 63

71 DEFENCE NEWS

Russian arms manufacturers witness growth despite global downturn; RAF Reaper continues to support Iraqi forces against ISIL; Defence Support Group sold to Babcock for £140m

Counter Terror Business

75 IDEX 2015

Defence professionals from across the world will gather at IDEX 2015 to view the latest security technology for land, sea and air, as well as debating the latest defence issues

www.counterterrorbusiness.com Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

5

E



COUNTER TERRORISM BILL

Summary of the Bill

Human rights and data protection issues with new Counter Terror Bill In unveiling the new Counter-Terrorism Bill on November 26, Home Secretary Theresa May said the UK faces a continuing security struggle “on many fronts”. In an attempt to spell out the scale of the threat, May revealed that 40 planned terror attacks had been foiled since the 7 July bombings in London in 2005. Under the new proposals, the Home Secretary would be able to sign a Temporary Exclusion Order (TEO) to ban a suspected extremist from returning home to the UK for up to two years at a time. May said: “We are in the middle of a generational struggle against a deadly terrorist ideology. These powers are essential to keep up with the very serious and rapidly changing threats we face. “In an open and free society, we can never entirely eliminate the threat from terrorism. But we must do everything possible in line with our shared values to reduce the risks posed by our enemies. “This Bill includes a considered, targeted set of proposals that will help to keep us safe at a time of very significant danger by ensuring we have the powers we need to defend ourselves. Unusually, the UK’s reviewer of terror laws David Anderson QC was criticising the process before the new Counter-Terror and Security Bill was even published. Anderson revealed that his ‘central concern’ about the proposals, first unveiled by David Cameron in early September, was: “Where are the courts?”. He argued there could be “a more sensible” way of dealing with

Counter-radicalisation measures – requirements that schools, colleges and probation providers help prevent people being radicalised.

some people suspected of being involved in terrorist activities: “One could look at it in terms of young, possibly vulnerable people caught up with the wrong crowd in Syria - didn’t really know exactly what they were doing. Do you want to throw the book at them straight away in terms of arrest and charge? Or is there something to be said of keeping them under a very light regime where they might have to report daily to a police station? Part 3 of the Bill attempts to further extend powers introduced by the highly criticised Data Retention and Investigatory Powers (DRIP) Act that was fast tracked through parliament earlier this year as emergency legislation. The Bill proposes that public telecommunications operators will be required to retain “relevant internet data”, which includes IP addresses - personal data which can be used to identify users. Christopher Coughlan, Solicitor at technology law firm Ashfords, said: “Many view this Bill as an attempt by the government to resurrect the previously scrapped Communication Data Bill, more commonly known as the ‘Snooper’s Charter’. The UK’s terror threat level remains “severe” after it was upped from “substantial” earlier this year in response to conflicts in Iraq and Syria – the READ MORE: highest it’s been tinyurl.com/nn34ywg since 2011.

Changes to Terrorism Prevention and Investigation Measures – to allow the authorities to force suspects to move to other parts of the country. Raising the burden of proof for imposing TPIMs from “reasonable belief” to “balance of probabilities”. Greater powers to disrupt people heading abroad to fight – including cancelling passports at the border for up to 30 days. Statutory temporary exclusion orders to control return to the UK of British citizens suspected of terrorist activity. Tighter aviation security – requiring airlines to provide passenger data more quickly and effectively Banning insurance companies from covering ransoms. Forcing firms to hand details to police identifying who was using a computer or mobile phone at a given time.

Failed London bombers lose European Court appeal Four men jailed over a failed plot to bomb the London transport network on 21 July 2005 have lost an appeal at the European Court of Human Rights (ECHR). Three of the men claimed their human rights had been breached because statements they made to police without lawyers present had been used as evidence.

TERRORISM FUNDING

Partnerships target terror funding During counter terrorism awareness week, which ran from 24th-30th November, police officers across the UK took part in operations with the aim of preventing the flow of money to terrorist groups and criminal networks. In the last 18 months, officers in London have seized £2.5 million destined for terrorist and criminal groups, with an average weekly seizure of £30k-£50k. Working in partnership at ports with the UK Border Force, the Security Services and other agencies has led to successful prosecutions, seizures and forfeitures. Counter terrorism officers are working in partnership with local boroughs to target those who use Money Service Bureaux and transmission agents to move money out of the country to fund terrorist activity, and bogus charity collectors whose criminal activities harm the efforts of legitimate charities. Acting Commander Terri Nicholson, Counter Terrorism Command said: “It is increasingly difficult for terrorists and those who support them to covertly move money for their cause. We need to stay one step ahead of them. By working closely with partners we

Counter Terror News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

can ensure that it does not get any easier. Officers across the UK are working to identify and target known routes for cash couriers and to detect any new ways of moving funds and those supporting them. “Those who possess cash legitimately have nothing to fear. Our targets are those who exploit free movement and we aim to make this more difficult. Our success rate is improving all the time. By working in partnership with other agencies to common goals we will be more effective in securing our borders against abuse by terrorists and criminals alike.”

NaCTSO ports website over to .GOV.UK domain

READ MORE: tinyurl.com/lsfp6pe

In line with the government’s digital strategy the National Counter Terrorism Security Office (NaCTSO) website has now moved to GOV.UK website. The Vulnerability Self Assessment Tool (VSAT), which has been developed by NaCTSO in partnership with leading businesses across the UK, will not be available on the new website, and ‘needs to be refreshed’, says NaCTSO.

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

7


New! Ultralightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance) Watch the video:

Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com


PESHAWAR ATTACK

Over 120 killed as Taliban claims responsibility for Peshawar attack At least 126 people, most of them children, were killed on when Taliban gunmen stormed a school in the Pakistani city of Peshawar on December 16, taking hundreds of students hostage in the bloodiest insurgent attack in the country in years. Bahramand Khan, director of information for the regional Chief Minister’s Secretariat, said at least 126 people were killed and 122 wounded. “It may rise,” he said, adding that more than 100 of the dead were school children. A local hospital said the dead and wounded it had seen were aged between 10 and 20 years old. The Taliban immediately claimed responsibility. Spokesman Muhammad Umar Khorasani said: “We selected the army’s school for the attack because the government is targeting our families and females. We want them to feel the pain.” It was not clear whether some or all of the children were killed by gunmen, suicide bombs or in the ensuing battle with Pakistani security forces trying to gain control of the building. The Pakistani Taliban have vowed to step up attacks in response to a major army operation against the insurgents in the tribal areas. Security forces, checkpoints, military

bases and airports have so far been targeted. Attacks on civilian targets are relatively rare, but in September, 2013, dozens of people, including children, were killed in an attack on a church, also in Peshawar. Pakistan’s Prime Minister Nawaz Sharif said “those behind the heinous act will not be spared,” and described the attack as a “national tragedy,”. Opposition politician Imran Khan said it was “utter barbarism.” India’s Prime Minister Narendra Modi and Rajnath Singh, India’s minister of home affairs, also condemned the attack. “This dastardly & inhuman attack exposes the real face of terrorism,” Singh tweeted. Peshawar-based journalist, author and terrorism expert Aqeel Yousafzai, says the attack is a big blow for Pakistan’s counter‑terrorism strategy and policies. “The Army public school was not only for Army kids. Most of the kids are civilians kids, and what is worse is that the media reached the school before the rapid response force, the police or military.” The Taliban’s retaliation for the recent offensive against it was “rapid and huge,” said Yousafzai, and all the more of a shock because “the school is located in very sensitive

INTERNATIONAL TERRORISM

Counter Terror News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

place surrounded by army check points.” Counter-terrorism expert Ajay Sahni said that while carrying out attacks, Islamic extremists do not distinguish between children and adults, adding that incidents of terror are on the rise in Pakistan. “The TTP and the Islamist extremists make no distinction. They do not discriminate in favour of women and children,” he said. Sahni also stated that acts of terror are steadily on the rise in Pakistan, adding that over 5,000 people have already lost their lives through terrorism in 2014. “More than 5,000 people have already died in terrorist-related incidents in this year alone. In 2010 more than 11,500 people died in a single year. This is not an exceptional incident,” he added. Other Islamic militant groups have condemned the attack. “This was carried out by the enemies of Islam. It is open terrorism,” said Hafiz Saeed, the leader of Jamaat ud Dawa, the group blamed for the 2008 attack on Mumbai that left 166 people dead. “These are barbarians operating under READ MORE: the name tinyurl.com/nn34ywg of jihad.”

CLIMATE CHANGE

Sydney Siege: Gunman well Climate change could fuel known to Police, but didn’t terrorism, warns GMACC Major General Munir retired military leaders concerned feature on watchlists Muniruzzaman, a former about the security implications Security across the Australian city of Sydney has been increased dramatically after an apparent terrorist siege ended with the death of two hostages and the hostage-taker – identified by Police as Man Haron Monis, a known Islamist extremist and violent criminal. Reports are emerging that the gunman has made attempts to reach out to media through the hostages to voice his demands. One hostage was made to call local radio station 2GB, which refused to broadcast the requests. Kuranda Seyit, the director of the Forum on Australian Islamic Relations, told BBC Five Live Breakfast that Monis appeared to be ‘a bit of a loner’ who was ‘isolated from the [Muslim] community’. Monis was also facing more than 40 sexual and indecent assault charges. These relate to time allegedly spent as a

self-proclaimed ‘spiritual healer’ in western Sydney, according to the Sydney Morning Herald (SMH). Monis denied the charges against him, which he described as politically motivated. He compared the accusations of sexual assault to the case of Julian Assange, founder of the whistle-blowing website Wikileaks. Prime Minister Tony Abbott told reporters that Monis wasn’t on any police or intelligence watchlists. “That is the question that we were asking ourselves around the National Security Committee of Cabinet today: how can someone who has had such a long and chequered history not be on the appropriate watchlists and how can someone like that be entirely at large and in the community,” he said.

military adviser to the president of Bangladesh, has claimed in the Telegraph that climate change will foster terrorism and fuel immigration to the UK as millions of people are displaced by rising sea levels. Muniruzzaman, who is head of the Global Military Advisory Council on Climate Change (GMACC), a group of serving and

of climate change. He said his country simply did not have enough space to cope with the rising numbers of people who would be forced to leave their homes due to global warming. A large displaced and marginalised climate refugee population would become “a breeding ground for recruitment for extremists and radicals”, Muniruzzaman warned.

READ MORE: tinyurl.com/oudhdfm

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

9


Stay cool with us

OUTSIDE 35 C HUMIDITY 90%

22

ยบC

Inside

PROVIDED BY HEINEN & HOPMAN

As an international leader in our own field of air conditioning and heating, Heinen & Hopman is used to working with yards around the world. At the same time, our global network of local subsidiaries and aftersales centres make us an ideal partner for navy vessels that criss-cross the oceans.

www.heinenhopman.com Visit us at NAVDEX: A-024 Follow us on:

We also understand the stringent operational requirements of such vessels and the need for innovative design. The result is a suberb interior environment and optimum support wherever the corvettes may sail. www.greenmanifest.info


INFRASTRUCTURE

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Charles Swanson, independent security and risk consultant

A THREAT AGAINST WHAT WE DEPEND ON An attack against a critical asset, such as a power station, and the knock-on effect this could have on other sectors, has the potential to be catastrophic for the security and wellbeing of the nation, writes Security Institute member Charles Swanson The security, economic prosperity and social wellbeing of the nation depend on the reliable functioning of increasingly complex and interdependent infrastructures. These include energy systems (electric power, oil, and natural gas), telecommunications, water supply systems, transportation (road, rail, air, and water), banking and finance, and emergency and government services. In the new economy, these interconnected infrastructures have become increasingly fragile and subject to disruptions that can have broad regional, national and global consequences. The potential for a terrorist organisation to target, for example, a power station, either by means of a physical attack, or through the use of cyber weaponry, is critical. However, the interdependency of the power station, the water treatment plant that it powers and the hospital reliant upon clean water makes the same attack catastrophic. In order to address this situation, there has to be a robust means of assessing the risk, realising

the impact and then arriving with appropriate prevention and mitigation strategies.

they may identify critical infrastructure as the most effective means of attacking an enemy. The United Kingdom is globally influential in terms of political persuasion, economic strength and military capability. It is also a very sophisticated and advanced nation state reliant on telecommunications superiority, and the interdependency of its critical infrastructures. For a variety of reasons, it is very attractive to disparate global terrorist organisations.

NEW BREED OF TERRORIST The attacks against targets in New York and London on 11 September 2001 and WHAT WE DEPEND ON 7 July 2005 re-focused the way The UK’s national infrastructure the world views terrorism, in T is defined by the Government as much as there is now attacks he as: “Those facilities, recognition of a new a g a inst targets systems, sites and breed of terrorist who i n New York an networks necessary for is quite prepared to carry out operations the functioning of the 11 Sept d London on ember 2 of mass murder, and country and the delivery and 7 J 0 0 kill themselves in the of the essential services 1 process. There is fear upon which daily life re‑focu uly 2005 se of, and potential for, in the UK depends.” the wor d the way battle hardened Jihadists The national infrastructure ld view returning from Syria and is categorised into nine s t e rrorism Iraq, with the intention of sectors: communications; attacking a country they see as emergency services; energy; being a natural enemy of Islam. It is financial services; food; government; not beyond the bounds of logical thinking that health; transport; and water. 

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

11


solutions for a safer world


INFRASTRUCTURE  There are some cross-sector themes such as technology wherein there may be infrastructure which supports the delivery of essential services across a number of sectors. Infrastructure is categorised according to its value or ‘criticality’ and the impact of its loss. This categorisation is achieved by using the Government’s ‘criticality scale’, which assigns categories for different degrees of severity of impact. However, not everything within a national infrastructure sector is ‘critical’. Within the sectors there are certain critical elements of infrastructure, the loss or compromise of which would have a major detrimental impact on the availability or integrity of essential services, leading to severe economic or social consequences or to loss of life. These critical assets make up the nation’s critical national infrastructure (CNI) and are referred to individually as ‘infrastructure assets’. Infrastructure assets may be physical (sites, installations, pieces of equipment) or logical (information networks, systems). THE GRAVEST THREAT The Government of the United Kingdom relies on the Centre for the Protection of National Infrastructure (CPNI) to offer effective advice in relation to a number of threats that, if carried out successfully, will impact critical national infrastructures, with terrorism being accepted as one of the gravest threats facing the UK today. Of course, not all sectors of

a terrorist attack, and water replenishment can be gained from other areas of the UK, or perhaps from the EU and further afield. However, the greatest concern the government of the United Kingdom must have relates to a successful terrorist attack against the country’s information communications and technology (ICT) infrastructure. Cyber crime is a concern, but a successful cyber terrorist attack would have the potential to be catastrophic. CYBER TERRORISM Writing about cyber-attacks in Professional Security Magazine (Oct 2014), Richard Horne, Cyber Partner at PwC argues: “In our connected world, it’s not just big banks and traditional elements of critical national infrastructure that need to take this seriously – all organisations need to manage the risk.” In the UK Government’s national security strategy ‘A Strong Britain in an Age of Uncertainty’ hostile attack upon UK cyber space is classified as a tier one attack (being the highest level of threat on a scale of one to four), accompanying threats such as international terrorism, a major accident or natural hazard requiring a national response and an international military crisis between states. The thought of a terrorist organisation carrying out a successful cyber-attack against the UK’s internet and telecommunications capability, now referred to as the fourth

The potential for a terrorist organisation to target a power station, either by means of a physical attack, or through the use of cyber weaponry, is critical. However, the interdependency of the power station, the water treatment plant that it powers and the hospital reliant upon clean water makes the same attack catastrophic the national infrastructures, such as the government and the emergency services, are potentially easy targets, but communications, energy, food and water may be very vulnerable to a terrorist attack if not protected effectively. There are proven physical means of defending against the terrorist who intends to attack the power station, the food supply chain and the UK’s water supply. In the main, this line of defence and deterrence will be supported by such strategies as defence in depth and integrated physical and electronic security systems, the idea being to deter, detect, delay and respond. Equally, an attack against a power station may be mitigated by ensuring that there is an immediate pick up of power supply from other power stations in the National Grid. There are probably adequate food supplies in the UK to supplement any areas that are subject to

utility, is of major concern; but could it occur, and what would the impact be? Likelihood of a successful cyber attack It is declared in the national security strategy that the Government, the private sector and citizens are under sustained cyber attack today, from both hostile states and criminals. On 14 July 2014, Prime Minister David Cameron pledged £1.1 billion to fight cyber terrorists, stating: “The Armed Forces must adapt to deal with ‘unseen enemies’, and that... terrorist plots hatched thousands of miles away threaten to cause harm on our streets.” History is littered with examples of successful cyber attacks; emanating from aggressors ranging from high school student hackers to nation states attempting to complete a ‘denial of service’ against another country. There is no reason to believe that the Prime

Minister of a technically-advanced country such as the United Kingdom would make a significant financial pledge without evidence of the capability of the today’s terrorist. The planning command of Al Qaeda did not calculate their 9/11 ‘martyrdom operation’on a wing and a prayer. They must have been in possession of sufficient internet generated intelligence to give them the confidence to carry out the attack. Therefore, it may be argued that the likelihood of a terrorist cyber attack is very high indeed.

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

POTENTIAL IMPACT If, through the due process of risk assessment, it is believed that the likelihood of an attack is high, the next step in the procedure is to ascertain what the impact of such an attack would be. As discussed earlier in this article, an attack against a critical asset and the interdependent consequential impact on other sectors has the potential to be catastrophic. Cyber terrorism is not science fiction; it is likely to be within the capabilities of a number of organisations to carry out this form of attack against the UK’s CNI. Published results of the National Risk Assessment in 2010 discussed the likelihood and impact of a cyber-attack against the UK CNI, with the authors stating: “Attacks in cyberspace can have a potentially devastating real-world effect. Government, military, industrial and economic targets, including critical services, could feasibly be disrupted by a capable adversary. ‘Stuxnet’, a computer worm discovered in June 2010, was seemingly designed to target industrial control equipment. Although no damage to the UK has been done as a result, it is an example of the realities of the dangers of our inter-connected world.” Islamic State influence is growing at an alarming rate since the group took control of the Iraqi central city of Falluja in 2013, and then in June 2014, overran the northern city of Mosul, before advancing southwards towards Baghdad. The terrorist group has proven time and again that it has no moral principles, and is quite prepared to take the offensive to its enemies. By far, one of the most frightening scenarios imaginable would be for Islamic State or its sympathisers to be in a position to attack one of the United Kingdom’s CNI. Using the internet to attack the UK’s energy distribution and support systems, or perhaps the National Air Traffic Services (NATS), with the ensuing chaos and potential loss of life does not bear thinking about. To arrogantly ignore this form of threat to the Critical National Infrastructures of the United Kingdom would not only be foolish, it could be a catastrophe that may be impossible to recover from.  FURTHER INFORMATION www.security-institute.org

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

13


Emergency Management

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADVERTISEMENT FEATURE

MANAGING EVACUATIONS Providing an efficient, priority driven and auditable solution, Helyx has worked alongside North Wales Police to develop an Evacuation Planning and Management Tool that underpins the planning and co-ordination of multi-agency resources to major events or incidents.

The public and other emergency responders expect that the police will have the means to efficiently and quickly coordinate the evacuation of areas at risk. Historically, the manual solution has been an inefficient, poorly co-ordinated and highly time-consuming process for identifying, searching and checking properties within an area either at risk or affected by an event. The challenge has been to develop and implement a radical new approach that significantly reduces the overheads and inherent risks associated with the manual approach. IMPLEMENTING A PROVEN METHODOLOGY Concerns regarding the identification and prioritisation of the vulnerable together with a prevalence of river and coastal flooding, led North Wales Police to develop an evacuation methodology. The manual application of this methodology proved to be both labour and time intensive, which together, made it unsuitable during spontaneous and short-notice events. Working together with North Wales Police, Helyx’s Evacuation Planning and Management Tool takes this methodology and combines it with world-leading spatial analysis techniques to deliver a platform that provides more accurate results in minutes, not weeks. MULTI-AGENCY CO-ORDINATION AND PROTECTING THE VULNERABLE Major events and incidents will invariably require a multi-agency response. The Evacuation Planning and Management Tool has been further developed to support a multi-agency operating environment. The tool is able to generate outputs which are specifically designed to allow partner agencies to more efficiently plan and manage their response. The Evacuation Planning and Management Tool is focused primarily on mass evacuation planning. This is complemented by a parallel process aimed at identifying and prioritising the most vulnerable. The software includes the ability to notify partners of the areas at risk allowing them to highlight specific properties of concern.

14

COUNTER TERROR BUSINESS MAGAZINE | Issue 20

EFFICIENT DEPLOYMENT OF RESOURCES Incorporated within the Evacuation Planning and Management Tool is additional functionality that allows Commanders to more efficiently determine the required resources to evacuate an area when faced with constraints on the number of responders, the time available and the number of properties in the affected area. It is recognised that incidents or events rarely occur in isolation. The ability to plan and monitor multiple concurrent incidents or events has been included as a core capability of the Evacuation Planning and Management Tool. The ability to provide a Commander’s overview to understand and assess each of the developing situations is also an innate capability. FLEXIBILITY OF DEPLOYMENT Helyx is able to offer a variety of deployment options that include installation on mobile IT infrastructures, fixed on-premise systems as well as via a Pan-Government Assured (PGA IL2/3) cloud-based service. Access should be guaranteed in any circumstance. The solution provides an auditable and risk based priority order for evacuation and is suitable for spontaneous events taking minutes rather than days or weeks to generate and develop a response plan. It doesn’t require in-depth understanding of the underlying process required by the operator and provides an easy to use web-based

interface with a minimal training requirement. The solution provides ‘multi-event’ capability with a command overview and a real-time visual assessment suitable for use within strategic and tactical briefings and for spontaneously deploying individuals. It incorporates a simple property marking scheme suitable for adoption and use by other partner agencies and ddresses the most significant debrief recommendations from several recent major events. The Evacuation and Management Tool also allows for efficient resource planning and deployment, copes to support the recovery phase of a major event and provides support to multiagency response planning. “Helyx SIS have greatly improved upon my original concept creating a tool that is now truly suitable for use with any major event where evacuation would be a consideration, and in so doing, has mitigated the majority of risks associated with an uncoordinated response.” – PC David Abernethy-Clark, Operational Planning, North Wales Police. L FURTHER INFORMATION enquiries@helyx.co.uk +44 (0)1684 273 725 www.helyx.co.uk


Critical National Infrastructure

INFRASTRUCTURE

Securing our country’s valuable network of crucial supplies – including those which originate abroad – is essential, particularly in the face of the continued threats of terrorism and natural disaster. The British Security Industry Association’s director of technical services Alex Carmichael, explains There is a growing awareness across Europe of the need to ramp up protection of our critical national infrastructure sites and associated resilience planning against the threat of terrorism, criminal activity – like metal theft – and environmental threats, not just on a state-by-state basis but also, crucially, at a wider – big picture – trans-national level. In today’s ‘global village’ there are a wide array of critical infrastructure elements, so-called ‘choke points’, whose footprints stretch well beyond the neat confines of a single country’s border, whether we are talking about telecoms, energy plants, banking, water or transport hubs/connections. To put this into perspective, you could very well have a power station in France which also supplies Belgium or, in the case of the UK, gas pipelines coming in from as far afield as Norway. So although the gas pipeline could, conceivably, be defined as being part of the UK’s critical national infrastructure it is not fully under our jurisdiction. CROSSING BORDERS This reality on the ground means that there is a pressing case for stronger international cooperation and the sharing of best practice. A concrete illustration of this imperative is the European Council Directive 2008/114/ EC, which relates to the identification and designation of European Critical Infrastructure (ECI), and is currently going

through a wide ranging revision process. While Europe now recognises that there is a great deal of interdependency between countries in terms of critical national infrastructure, ultimately, how this is looked after still relies very much on the right things happening at the national level. As a starting point a country’s government has to identify and make arrangements to protect infrastructure within its borders. In the UK we have the CPNI (Centre for the Protection of National Infrastructure), established in 2007, to take the lead on this. Other countries also have equivalent bodies, although the format may, necessarily, differ from territory to territory to reflect local conditions.

is definitely the way forward here. In practice, the relevant body like the UK’s CPNI will provide confidential advice to a site’s owner on what needs to be done. It is then up to the operator to buy in the appropriate security package. This security package should have, at its foundation, a risk‑based analysis of the threats that the site is likely to face, any specific vulnerabilities that require extra attention and, crucially, the potential impacts. By fully appreciating the risks it is then possible to make informed decisions to identify, select and prioritise, the appropriate counter measures for a graduated response. You may have something like a nuclear power station so there will, necessarily, be strict rules as a minimum, with layers of protection built on top of that to reflect the current threat level which can of course change significantly over time. As mentioned, it is the remit of each country to determine its own critical national infrastructure and the information about this is necessarily confidential and should remain confidential. Only the government concerned and the owners/operators of such E

Written by Alex Carmichael, director of Technical Services at the British Security Industry Association (BSIA)

CNI: LOOKING AT THE BIGGER PICTURE

There g win is a gros across es awarenof the need Europe up protection l to ramp ritical nationa of our c ucture sites on infrastr ns-national a tra vel le

RISK MANAGEMENT Looking more closely at what happens when a site or infrastructure is singled out as ‘critical’, it is for each country to decide what to do about it, although the same basic principles will apply whether we are taking about Spain, Germany, Serbia or even the UK. Typically, most critical infrastructure is now privately owned or privately operated so public and private co-operation and co‑ordination

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

15


hesco.com

DEFEND PROTECT SECURE

Designed to protect against conflict and environmental disasters

• Accommodation bunkers

• Elevated structures

• Body armor (NEW for 2014)

• Security fences

• Defensive barriers

• Security barriers

• Flood barriers

• Architectural walls

• Storm barriers

• Consultancy services

• Erosion barriers

• Support and training

• Protective structures

• Bespoke designs

• Rapid deployment

• Recoverable units


INFRASTRUCTURE  sites really need to know that they have been designated as such. The stark reality is that broadcasting these details more widely would only serve to bring these sites to the attention of terrorist elements who may view them as an attractive target. SPECIFYING SECURITY When discussing critical national infrastructure protection I would suggest that a good starting point is to step back and think about it as being built on three interrelated pillars. A weakness in any one of these pillars will, potentially, bring the others tumbling down. These are, in turn, prevention, preparedness and response/recovery (resilience). Protecting the electricity grid and power stations and other critical elements is of course no easy task, in light of the geographically extensive nature of this infrastructure. Given this it is perhaps not surprising that we are seeing a diverse array of ever more sophisticated security techniques being employed in the field. The most visible are physical asset protection measures like ditches, perimeter fencing, bollards and lighting. On the electronic security front, techniques like video analytics, high definition CCTV, rapidly deployable CCTV towers – which can be moved to key hotspots for added security, thermal imaging, fence-line sensors and biometrics-based access control, are all coming to the fore. Given the imperative to keep the lights on, now more than ever, security solutions in this area need to actively detect and deter attacks. Cyber security is also high on the agenda thanks to the rise in virtual targeting of national critical infrastructure by state and individual operators. In addition, throughout Europe, there is a strong recognition that private security services have a pivotal role to play in detecting and preventing attacks through the use of manned guarding and mobile patrols. This is alongside public security services like the military and the police. TRUSTED PARTNERS Considering the specific role of private security services here, it is important that where manned guarding is undertaken for critical national infrastructure this is placed, firmly, within the context of a public-private partnership, based around high levels of quality and service. Experience suggests that the optimum solution is one where the private security service provider is working as a ‘trusted partner’ with the public authority and, crucially, the critical infrastructure site owner. The Spanish National Police have a good term – ’do ut des’ – which I like to quote when I am presenting on this topic, encapsulating as it does the need for respect between public and private. For the Spanish it is all about having the right level of trust, a culture of cooperation and working within the right legal framework. Of course a wider question in the context

of critical infrastructure is how effective are public and private security partnerships? Well in response I would point to an example of best practice here in London in the form of Project Griffin. Griffin was initiated back in 2004 to assist in the security of the financial district which is so vital to the UK’s national interest. A key part of Project Griffin was setting-up a training package for the private security industry and the right communications systems so they could support the police. Implementing regular communications between the police and private security officers ensured that intelligence and incident reports could be communicated in a timely manner, whether by conference calls, SMS messages or email. Private security officers also underwent Griffin training for deployment in emergencies to support the police, for example, to help establish cordons. Elsewhere, on mainland Europe, there have been a series of extremely successful security partnership programmes in Germany where the police have asked private security companies, operating mobile patrols around critical infrastructure, to pass on information related to suspect persons and vehicles or unlawful activities. In the case of Düsseldorf alone this has resulted in over 500 reports. DRIVING BEST PRACTICE Returning to the subject of trust, it is essential, wherever you are in Europe, that individuals are security cleared/ screened and trained to the right level. The private security service provider also needs appropriate security clearance, transparent corporate governance and should work to high standards. While there is not, as

umbrella organisation for 26 national private security employers’ associations – whose Critical Infrastructure Committee I chair. At CoESS we have developed an essential check-list that can help infrastructure owners and operators to ascertain whether a private guarding company has the potential to be a trusted partner in this mission-critical area. The aspects highlighted by the check-list range from personnel security vetting to whether the guarding company is able to carry out a site risk and threat assessment, has the resources to fulfil their contract and has put in place escalation plans and resilience measures. At a broader level through CoESS we are heavily involved in lobbying the European Commission on the whole gamut of critical infrastructure issues as well as commenting on the proposed revisions to the European Critical Infrastructure Directive and providing on-going, best practice, advice to public authorities Europe-wide. Added to this, when there is a human element involved in security, it is imperative that personnel are fully motivated and understand what they are actually there to do. This becomes even more of an issue where critical infrastructure is concerned given the implications if anything is allowed to undermine the heightened security. Consequently, at the BSIA, we were pleased to welcome the publication, last June, of updated guidance on guard force motivation by the UK’s Centre for the Protection of National Infrastructure (CPNI). This is an initiative that we have been actively supporting since the first edition was produced back in 2011.

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

There is little doubt that in today’s connected world, if things go wrong, there are serious ramifications not just for individual countries, but potentially a Europe-wide domino effect yet, a generic guarding standard for critical infrastructure, the good news is that there are a range of existing sector-specific guarding standards which have a role to play. These include: EN 6502:2007 – security service providers – terminology; EN 16082:2011 – airport and aviation security services; PD ISO/PAS 28007:2012 – ships and maritime guideline for armed security personnel, and ISO 9001 – quality management systems. Moving forward, the European security sector recognises the pressing requirement to produce a framework that can help governments and critical infrastructure owners, across the continent, to ensure that they have the right quality of guards to provide the right level of protection. For its part the BSIA (British Security Industry Association) is a member of the Confederation of European Security Services (CoESS) – the

INTERCONNECTED INFRASTRUCTURE So, to conclude, on the subject of critical national infrastructure there is little doubt that in today’s interconnected world, if things go wrong, there are serious ramifications not just for individual countries where an incident takes place but, potentially, a domino effect leading to Europe-wide disruption. This means that, in future, we are likely to witness an even greater drive for public and private cooperation, and best practice, to build in resilience to ensure the wheels are turning where strategically important European Critical Infrastructure (ECI) is concerned. L FURTHER INFORMATION www.bsia.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

17


www.marshalls.co.uk/commercial/street-furniture


PERIMETER SECURITY

PROTECTING IN STYLE Damage to Critical National Infrastructure can have severe economic impacts and can lead to significant loss of life which makes transport hubs attractive targets for terrorist groups. Airport security is nothing new, but with the current UK terrorism threat level at severe, airports are constantly thinking of new ways to further heighten perimeter security to protect terminal buildings from the threat posed by international terrorist groups. This means there is a real responsibility for both specifiers and end clients to provide public spaces which fulfil the triple protection plan of protecting people, places and infrastructure, whilst also being aesthetically pleasing and functional. As the terrorist threat is constantly evolving, and as groups continue to seek new methods of attack, it is vital that those in charge of developing counter-terrorism design stay one step ahead by continuing to plan and design products which deter terrorists and detect or delay an intrusion. STREET FURNITURE OPTIONS There are a number of counter-terrorism street furniture options to help designers create safe and functional public spaces however, some of the more traditional methods of hostile vehicle mitigation, such as large diameter bollards, can often have a negative visual impact on an environment when incorporated into landscape design. For this reason, the concept of counter-terrorism design has received resistance from those involved in designing the built environment, with architects feeling restricted to designing bland, standardised areas, which create no real sense of character or individual identity. In fact, often these products can detract from otherwise well designed and aesthetically pleasing spaces. There are products available, including bollards, planters, seating and litter bins, which protect buildings from vehicle-borne terror attacks, whilst also creating welcoming, useable, functional and attractive surroundings. Marshalls RhinoGuard™ counter-terror street furniture products possess both inner strength and outer beauty. The products are crash tested in accordance with the BSI PAS68 Standard for Vehicle Security Barriers and are available in a range of materials including steel, stainless steel, Ferrocast™ Polyurethane, concrete and Precious Stone, giving designers options to create safe

public spaces using high-quality design. The British standard Public Available Specification (PAS) has been prepared to address the needs of organisations which require assurance that vehicle security barriers will provide the required level of impact resistance. To accompany BSI PAS68, the PAS69 document provides guidance on the selection, installation, foundations and use of PAS68 tested security products, taking into account site specific conditions. A new standard, PAS170 aimed at developing a range of low energy impact test methods, will be published in the coming months. The Bellitalia Giove large planter provides an elegant solution for introducing planting to the public realm. Fitted with innovative RhinoGuard™ technology, the Giove features a large 1,224litre capacity and is designed to accommodate the root ball of a tree. The planter is cast from a mix of concrete and fine Italian marble aggregates sourced from specific regions of Italy. The use of high quality natural marble ensures long term colour consistency, meaning that the colour of the planter will not fade over time. Marshalls RhinoGuard™ planter technology can also be incorporated into a range of styles from its European partner Sineu Graff, whose timber planters provide attractive planting solutions for urban landscapes.

Written by Violeta Diamanti

Airports must now have appropriate provision for protection of buildings, passengers and employees from hostile vehicle attack, but this does not mean designers must compromise on aesthetics, says Marshalls’ counter-terror product expert Violeta Diamanti.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

MODULAR SEATING Igneo is a modular seating system that offers unique styling, combined with functionality and exceptional impact performance. The Igneo seat has been successfully crash tested in accordance with PAS68 using a 7.5 tonne vehicle travelling at 40mph. It can be specified in any length, using any number of modules. It is manufactured from Marshalls’ fibre reinforced precast concrete and further strengthened by RhinoGuard™ technology, which is cast into the individual modules. PERIMETER SECURITY Bollards tend to be the preferred method of securing the perimeter of public buildings against vehicle-borne attacks as they create a passive barrier, typically maintaining maximum pedestrian permeability. But often they can interfere with the look of the exterior and can contribute to an unattractive landscape. RhinoGuard™ product cores have been developed and tested to be specified with cosmetic sleeves in various

materials to create a bespoke style which will complement any surrounding environment, as well as being designed to fulfil the security needs of locations which require varying levels of perimeter protection. L FURTHER INFORMATION www.marshalls.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

19


DISCREET, QUICK, RELIABLE TRACKING!

! ! ! ! ! ! !

ATTACHED IN SECONDS

IDEAL FOR COVERT WORK

DOES THE JOB!


TRANSPORTED ASSETS

PROTECTING THE SUPPLY CHAIN Protecting supply chains is about deterring any form of criminal activity and it is now uppermost in the thinking of global manufacturers, the transport and logistics industry, law enforcement agencies, and government officials. The Transported Asset Protection Association (TAPA) was formed in 1997 and is active in the Europe, Middle East and Africa (EMEA), Americas and Asia Pacific regions. Its remit is simple; to help manufacturers and their logistics service providers moving high value, theft-targeted (HVTT) products to achieve supply chain resilience. TAPA is a not-for-profit association that has over 800 members, including supply chain security leaders from leading global manufacturing brands such as Microsoft, Intel, HP, Amazon, Dell, Nestle, Pfizer, British American Tobacco and AstraZeneca. They are joined by major transport and logistics providers, including DHL, CEVA, TNT, FedEx,

UPS and Expeditors as well as insurers such as Aon, Axa, Zurich and Allianz. THE VALUE OF CARGO CRIME It is easy to understand why major businesses take the issue of cargo crime so seriously. In Europe, a study by the European Parliament on organised theft of commercial vehicles and their loads in the European Union estimated the value of annual cargo crime is €8.2 billion. Whilst the true cost impact remains difficult to calculate, analysis suggests that total losses from these crimes are twice the value of the stolen goods.

THE BENEFIT OF SHARED INTELLIGENCE TAPA was founded because supply chain security professionals in some of the world’s fastest-growing manufacturing companies recognised that if they were incurring incidents of crime, their competitors were almost certainly doing so too. The association now provides answers to the main questions facing all manufacturers and movers of high value, theft targeted (HVTT) cargo, such as how do I make my goods secure and what security standards should I adopt? TAPA members already have their own € comprehensive security processes and procedures and these are closely adhered to by their logistics service providers. What TAPA provides in addition to these is industry standards for facilities, trucking and air cargo security that set the minimum benchmark for supply 

by A studypean o the Eurment Parlia he value ted t estima al cargo crime of annu e European in th is 8.2 Union on billi

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

Written by Laurence Brown, executive director, Transported Asset Protection Association (TAPA) EMEA

Terrorism and theft don’t always go hand-in-hand but in the supply chain, any infiltration of goods in transit by road, air, sea or rail could just as easily be exploited by people with either intent, writes Laurence Brown, executive director of the Transported Asset Protection Association

The impact on business, however, extends far beyond the financial cost of recovery. Loss of goods from the supply chain means companies are unable to fulfil customers’ orders, their reputations are damaged, production schedules are disrupted and, ultimately, insurance premiums are increased. Take that full circle and eventually the added costs either result in a reduction in a company’s competitiveness if they absorb these additional costs or higher prices for the end user.

Cargo Crime

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

21



TRANSPORTED ASSETS  chain security and cargo crime prevention. These are independently audited and help buyers to identify the ‘best in class’ providers of secure transport and logistics services. TAPA is also a source of cargo crime intelligence for its members. The association’s Incident Information Service (IIS) is a database of ‘real-time’ and historical information on cargo crimes using data provided by law enforcement agencies, sourced from credible media reports, and reported by TAPA members. IIS is a valuable planning tool for supply chain security, helping companies to understand the modus operandi of cargo criminals and to avoid known geographic ‘hotspots’ where thieves are most active. This also includes fast ‘alerts’ to members to notify them of incidents as soon as information becomes available. THEFT-ATTRACTIVE PRODUCTS Whilst high tech products such as smartphones, tablets, televisions and software are still among the most obvious targets for cargo thieves, the list of goods stolen from supply chains is becoming increasingly diverse and includes, for example, cigarettes, pharmaceuticals, watches and other luxury goods, metal, clothing & footwear, cosmetics, and food & beverage. Technology advancements mean traditionally bulky and heavy products such as PCs and televisions are becoming smaller, lighter and, effectively, easier to steal and sell through the black market. Whereas industry focus was once based on protecting ‘high value’ products, the term ‘theft attractive’ is now far more appropriate because it also encompasses products with a lower unit value that are easy to ‘sell on’. A good example is the theft of a truckload of parmesan cheese with a value of nearly €800,000. ORGANISED CRIME TAPA is growing because it gets results. Adopting TAPA security standards as part of their supply chain security programmes means losses incurred by TAPA members are three times lower than the industry average, according to research. That’s an encouraging fact for its members but the broader industry picture in relation to cargo crime gives cause for increasing alarm. Cargo crime is no longer about petty, opportunist theft. Cargo crime involves violent, armed and organised attacks on vehicles, facilities and employees. It can involve hijackings, fraudulent pick-ups, fake transport companies, bogus ‘police’ stops and even attacks on moving vehicles as they travel at speeds of up to 80kms an hour along European highways. At a recent TAPA conference, one speaker showed a CCTV film of an attack on a commercial vehicle that took place in broad daylight on a busy highway. It involved thieves using several vehicles to stop the truck, overpowering and removing the driver from

the vehicle and driving off with the truck and its load. The timer on the CCTV clocked the total event as lasting just 32 seconds. AVERAGE LOSSES IN 2013 OF €235,000 The TAPA EMEA IIS Annual Report for 2013 recorded 1,145 separate crimes in the EMEA region, a year-on-year increase of 66 per cent. The average loss attached to these crimes, based on incidents reporting a loss value, was €235,000. During the 12 months, 165 crimes were recorded with a loss value in excess of €100,000. To put this into context, in 2008, the average loss was €58,000. The 10 biggest thefts during the course of last year featured combined losses in excess of €55 million as thieves targeted diamonds, gold, silver, smartphones and tablets, currency, electronics, cigarettes and bicycle parts.

Cargo Crime

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

are facing, particularly in terms of funding. In some countries, the level of cargo crime remains misunderstood, however, because crimes of this nature are not clearly identified and are often lumped together under the far bigger category of ‘vehicle crime’. In other countries, authorities simply refuse to accept they have a cargo crime problem to address, despite intelligence proving otherwise. THIEVES ARE MORE SOPHISTICATED Cyber-crime is far from a new phenomena but there is no doubt that, aided by advancements in technology, criminals are becoming increasingly sophisticated in their ability to target businesses and individuals, and the supply chain is a growing focus. As highlighted by an insurance industry representative at a

Cargo crime is no longer about petty, opportunist theft. Cargo crime involves violent, armed and organised attacks on vehicles, facilities and employees. It can involve hijackings, fraudulent pick-ups, fake transport companies, bogus ‘police’ stops and even attacks on moving vehicles Pharmaceuticals were another prime target for criminal gangs as well as metal, clothing, cosmetics and food & beverage products. More than 50 per cent of crimes recorded by TAPA’s IIS in 2013 involved goods being stolen from vehicles that had stopped in unsecured parking or rest areas. The latest EMEA figures for Q2 2014 continue to highlight the scale of the problem, with average losses rising to €284,766. The 250 recorded cargo crimes included 43 thefts each with losses of over €100,000. The biggest single crime in the first six months of the year was the theft of cigarettes worth €2 million in a violent truck hijacking in Italy, south of Bari. POLICE TARGETING CRIMINAL GANGS Across Europe, police forces are working with differing levels of success to break-up and prosecute cargo criminals. On a positive note, in the last year this has seen arrests across the continent, including one operation to break up an organised gang that led to the arrest of 72 people in Spain, Italy, Romania, France and Germany. In a separate police investigation, 31 gang members responsible for stealing 70 trucks and goods worth €3 million were sentenced to prison terms of between three‑six years, while an Eastern European gang responsible for laptop and tablet thefts in the UK has started a 15-year prison sentence. TAPA EMEA is very supportive of the proactive work being undertaken by law enforcement agencies across the region and is well aware of the challenges police

recent transport conference in London, even petty business burglaries where nothing appears to have been stolen are, in fact, cyber-criminals going into companies to plant spyware into IT systems. In the media we have also recently seen reports of how malware-poisoned handheld inventory scanners from China are stealing information from transport and logistics companies. These scanners are used to track shipments in the supply chain and criminals can use this technology to extract stolen information to their own database. Not surprisingly, criminals are primarily focused on freight manifests to identify what each shipment contains and its value. HACKERS We also know of the threat of ‘hackers’ accessing the administrative and control systems networks at shipping ports, which are reported to be not only vulnerable but also a high priority for malicious activity. Clearly the biggest fear is the threat of terrorism but we can fairly assume that the theft of goods is an equally big incentive for technically-advanced organised crime gangs. This is just another reminder that the threat to supply chain resilience is becoming more diverse and the wider issues related to cargo crime must be given even greater focus in the face of more frequent, violent and sophisticated attacks.  FURTHER INFORMATION www.tapaemea.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

23



FREIGHT TRANSPORT

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

MOVING FREIGHT SECURELY An in-depth understanding of the global freight network means KG Logistics’ clients can remain confident amidst the rise of strategic organised crime targeting global freight, writes Adam Bowden Within an increasingly more connected global society where businesses and people are trading in more frequency to all corners of the globe, lies an underbelly of organised crime that strategically exploits weaknesses in the freight network that moves cargo by air, road and sea. According to Europol’s Cargo Theft Report, 8.2 billion Euros worth of freight in Europe was recorded to be lost in just one year. FreightWatch, in their 2013 Global Cargo Theft Threat Assessment, highlights a number of vulnerabilities. The scarcity of secure parking areas and truck stops in the UK has led to tonnes of hoisted cargo. Lack of security can also tempt thieves, a band of which reported to have entered a warehouse in Slough, assaulted and tied up staff, then pillaged five pallets of smartphones valued at 1 million Euros. EXTREME INCIDENTS Less overt tactics are commonly used in China where gangs infiltrate storage facilities or intercept export freight during transit from manufacturers to its intended transport, be it via plane, ship, rail or truck. More extreme incidents also occur. For example, in the continent of Africa, trucks moving freight from Zambia have been intermittently hijacked at gunpoint, forcing the country to redirect their exports through the ports of Namibia instead of Tanzania. With these growing trends, businesses and families may naturally feel concerned about ordering expensive stock from overseas suppliers or arranging to move their treasured personal possessions across the world. However, there are experienced companies that are not afflicted with these potential losses, due to an in-depth understanding of the global freight network while using professional and reliable methods to counter criminal activities.

KG Logistics, an organisation that successfully transports a vast and varied amount of cargo all around the globe through air, road and sea, is a company that demonstrates this reliability. Be it break-bulk or out-of-gauge materials or equipment, containers for commercial goods or household moves, vehicles, or even smaller carton or pallet loads, KG Logistics can ensure all their clients’ goods arrive safely and securely in the most cost effective way. EXPERTS IN THE FIELD KG Logistics staff are experts in the field with over a decade’s worth of experience in the business. Ensuring cargo is efficiently delivered in a full and untampered state is just an expected outcome, safeguarded by a series of standard procedures that are routinely made for all freight movements that are dealt with each day. This has been achieved through the vastly interconnected network of professionals that KG Logistics work in partnership with worldwide. KG Logistics is proud to be a WCA member - the world’s largest and most powerful network of independent freight forwarders that span 190 countries, together being larger and more versatile than any multinational freight forwarder. WCA companies can guarantee exceptional service since only elite, highly-qualified and proven independent freight forwarders are invited to join the network. WCA membership allows KG Logistics to collaborate with other experts with ease and confidence. SAFE GLOBAL NETWORK It is evident that being part of such a vast and quality network is how KG Logistics remains strong against the increasingly strategic tactics of criminal organisations. FreightWatch conclude that “organizations must diligently gather intelligence and adapt

their anti-theft programs to address local threats.” This is due to the unique situations that challenge each country. KG Logistics can extend their intelligence across all continents through their network, so not only can they offer freight specialist services to cater for any unconventional packing, loading or transporting needs, they can offer these services safely and securely all over the world due to the local experts understanding of the region. Experienced freight companies will also use modern technology to counter crime, with a number of cargo and carrier tracking systems that allow KG Logistics to monitor each stage of any freight movement. DOUSING FEARS KG Logistics understand that family members wanting to send their possessions to friends and family who moved abroad or for forward thinking businesses needing to supply or source their stock to or from foreign countries, needs not only affordability, but trust, especially in the era of increasing terror threats and strategic criminal activity. KG Logistics pride themselves in offering a business that services people, not merely customers, which is why they are carefully selective when choosing reliable professionals to build their increasing global network. This is how KG Logistics can douse any fears that may arise from such stories mentioned earlier, confident in both the modern technology and the people who use it, to move freight safely, securely and efficiently, offering an outstanding service and customer satisfaction by building strong and positive connections worldwide, founded on professionalism, experience and trust. L FURTHER INFORMATION Tel: 01634 818344 info@kg-logistics.co.uk www.kg-logistics.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

25


TECHNOCOVER An Ensor Group Company

Protecting Critical National Infrastructure

Technocover’s prime activity is the provision of Total Service Solutions for Physical Protection of Assets within the Critical National Infrastructure (CNI) sectors. The company is an approved Loss Prevention Certification Board (LPCB) ISO 9001:2008 Quality and ISO 14001:2004 Environmental accredited company.

Assessed to ISO 9001 Certificate number 450

Assessed to ISO 14001:2004 Certificate number EMS 450

Technocover work for almost every type of industry in the public and private sectors and clients include water companies, energy providers and distributors, gas, oil and petrochemical companies, telecommunications, transport, military and Government establishments with a number of products approved for Government use.

Technocover Total Service: UltraSecure DV Access Products Certified to LPS 1175 Security Rating 2, 3, 4 & 5

• Consultancy • Site Surveying and Risk Assessment • Design • Manufacturing, Finishing

SECURITY & FIRE DOORS

• Supply • Installation • Maintenance

Technocover Limited Henfaes Lane, Welshpool, Powys, SY21 7BE, United Kingdom. Telephone: +44 (0)1938 555511 Fax: +44 (0)1938 555527 www.technocover.co.uk


PRODUCT CERTIFICATION

PROTECTING PEOPLE AND PROPERTY

In her recent speech unveiling the new counter-terrorism bill, Home Secretary Theresa May referred to the IRA’s chilling warning after the Brighton bombing: “Today we were unlucky, but remember we only have to be lucky once – you will have to be lucky always.” This was a timely reminder of the need for constant vigilance, but it is possible to greatly reduce the element of luck when protecting against terrorism and other crimes, using well proven mechanisms to help specify and implement effective security protection.

These include the use of security products and systems that have been independently assessed and certificated using recognised standards such as LPS 1175. SECURITY AGAINST FORCED ENTRY There is a rule of thumb that says a security system for preventing forced entry to premises should provide four ‘D’s – three of which are delay, detect and detain. When these work together effectively they deliver the fourth ‘D’ which is deter. The delay, which is provided by physical security measures, must at least match

A securityor f system forced ing prevento premises entry t rovide four p should elay, detect, ‘D’s: d ain and det deter

the time required to detect the attempted intrusion and respond to that detection in order to detain the intruder. It is important to remember that thwarting an attack from a terrorist intent simply on destruction, will require a greater delay than that of a burglar wishing to escape with stolen goods. To counter a terrorist attack a far greater reliance must therefore be placed on the physical security measures implemented. BRE Global Ltd is an independent third party certification body offering certification of fire and security products under its LPCB brand. BRE Global has developed a broad range of Loss Prevention Standards (LPSs) to address risks not otherwise covered by existing national and international standards and codes. It developed LPS 1175 to cover

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

Written by Richard Flint, physical security certification scheme manager, BRE Global

At a time of heightened terrorist threat, those responsible for the security of premises are turning to security products that are independently certificated to give them the assurance that they are fit for purpose. Richard Flint of BRE Global discusses the benefits of product certification to both manufacturers and users, focusing on the security protection standard LPS 1175

Building Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

27



PRODUCT CERTIFICATION What can be certified to LPS 1175? Access covers and hatches Cladding systems Commercial vehicles Conservatories Containers Display cases and cabinets Hinged and pivot doorsets Fences and gates Folding doorsets Garage doorsets Partitioning systems Roofing systems Roof lights and skylights Secondary glazing systems Security grilles Security screens Sheds and tool stores Shutters Sliding doorsets Strongpoints Temporary buildings Tool containers Turnstiles Void protection screens Windows Walls

 entry of any barrier or enclosure designed to prevent unauthorised human access. These measures include fences and other perimeter barriers, containers, walls, screens, windows, doors and roofs, a wide range of which can be certificated to LPS 1175. LPS 1175 considers a product’s resistance to forced entry in terms of the size of tools – their concealability and power – used to attack it, plus the availability of the tools likely to be used and the time the intruders may be prepared to spend on the attack. To take account of these varying factors, physical security products and systems are rated to LPS 1175 in terms of the resistance to forced entry – the length of delay – they provide against different levels of attack. SECURITY RATING TO LPS 1175 ISSUE 7 The standard assumes that the intruders have full knowledge of the security product and are willing to make proportionate efforts in attacking it – the lower the risk of failure in breeching the physical security and the greater the value of the prize, the more likely they are to invest in the act. That investment could be in time and effort gathering intelligence about the target, planning the attack, obtaining the tools required and preparing their fitness and skills. LPS 1175 also considers the threat posed by criminals or terrorists willing to conduct their attacks using the most effective methods available to them irrespective of noise – such as that from breaking glass. These considerations differentiate LPS 1175 from the lower end of the spectrum of the European standard for physical security, EN 1627, which assumes criminals will use stealth and have little knowledge of the products they are targeting. As a result many products approved to EN 1627 may fail to provide very much delay to attacks in which the intruder is willing, for example, to make noise.

offer a warning to specifiers that many products and services on the market – which have not been independently tested and approved – could potentially fail to provide the security expected.

Building Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

GROWING USE BY MANUFACTURERS Despite the challenges of LPS 1175, an increasing number of security product manufacturers now submit their products for testing to this burglary resistance standard. “In adopting LPCB as our secure design marque,” said Terry Batten, marketing manager at Technocover, which produces a range of steel physical access protection products, “Technocover has aligned with a longstanding and respected authority in third party approval of physical security products. The testing and certification of security products to LPS 1175 assures specifiers of the consistent levels of quality and durability wherever physical protection is needed. “Another widely recognised strength of LPCB is that products are subject to on-going appraisal,” said Batten. “Approval is not just based on a one-off test of a sample design. Through regular audits, LPCB certification ensures that the product continues to comply with standards and revisions.” Certification of products to LPS 1175 can provide a route into the building security markets. Sheet metal and fabrication company, PSF (Wales), for example, had its range of security buildings and doors tested to Levels 2, 3 and 4 of LPS 1175. This opened new markets for PSF, providing the diversity that can help the company to position itself in the best place to protect its future in the current trying market conditions. Oldham based locking system manufacturer, Tindall Engineering, makes regular use of LPS 1175 for its security locks. “We became involved with LPS 1175 to help us move into the security side of the business,” said David Milne, operations manager at MICO-Tindall. “We now make extensive use of the standard and it plays a key role in driving our business.” “Testing our door locks to LPS 1175 helps us greatly with their development,” said Milne, “and produces a lot of information that we are able to pass on to our clients – doorset manufacturers for example – providing them with the confidence that the locking systems will work very effectively, and will not fail when their products are, in turn, tested to LPS 1175.” While LPCB’s testing to LPS 1175 is often carried out at BRE Global’s laboratories in Watford, the tests can be performed at manufacturers’ own facilities. As a high proportion of the products tested fail to deliver the performance that E

The ing demand ents m require 1175 of LPS testing at mean th roducts can p securityamatic, with be dr ermined a det ult assa

A ROBUST TESTING REGIME The demanding requirements of LPS 1175 mean that testing security products to the standard can be quite dramatic. A determined assault is launched on the door, window, panel, lock or other security product being tested by an operative armed with a wide range of tools – hammers, crowbars, chisels, drills, etc – and knowledge of likely weak points. Not surprisingly, only a small proportion of new products pass this severe test the first time they are put through it. But these initial failures provide valuable, practical information on how the products can be made more effective. They also

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

29


www.sensurity.com

Precision Microwave PIDS

Sensurity is dedicated to raising the standards for perimeter intrusion detection systems (PIDS) globally. HALO is a pioneering & patented intelligent security system with unparalleled durability. Reducing the cost of installation and ownership.

Intelligence Adaptive & dynamic signal processing monitors the environment for ture alarm events

Sense One-box dual technology, lower installation costs with fewer nuisense alarms

Integrity Easy integration with market leading control room suites

Durability IP65, vandal and tamper resistant

+44 (0) 2895600708 info@sensurity.com


PRODUCT CERTIFICATION  companies were hoping to achieve, being able to test the products at their own sites rather than sending them to BRE Global’s Watford test facility helps them to more quickly and efficiently overcome those failures, and develop more effective security products. Conducting tests at their sites also allows manufacturers to avoid the costs of transporting samples to Watford. Then, if the products fail during testing, they can modify them using their manufacturing facilities and have the modified samples retested later in the programme. This avoids delays that can occur if manufacturers test at BRE Global and have to send away for modified samples or components, and can therefore speed up the certification process. A number of manufacturers are already taking advantage of this. “Increasingly the process of attack testing of our products by LPCB is being undertaken on site at our Welshpool factory,” said Terry Batten of Technocover. This is not restricted to the UK, the test equipment is portable and the team has already conducted tests in mainland Europe, and is in discussion with American, Middle Eastern and African companies interested in having tests conducted at their own facilities.

been adopted across many sectors in the UK and now increasingly in other countries, particularly the Middle East. In fact, specification of physical security equipment that is certificated to LPS 1175 and included in the freely accessible list of approved products known as the Red Book (www.redbooklive.com), is spreading right around the globe. The value of certification requirement to

specifiers is emphasised by the fact that LPCB fails 95 per cent of new products submitted for test, a reflection of the number of products on the market that could potentially fail to provide the security expected when needed. L

Building Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.bre.co.uk www.redbooklive.com

LPS 1175 standard certifications HIGH RISK

WIDE UPTAKE BY SPECIFIERS Use of LPS 1175 certificated products has

LPS 1175 SR8

Products certified to this standard provide 20 minutes of resistance to extreme means of attempting forced entry into higher value storage areas.

LPS 1175 SR7 LPS 1175 SR6

Products certified to this standard provide 10 minutes of resistance to extreme means of attempting forced entry into higher value storage areas using a wide range of tools including mains-powered tools.

LPS 1175 SR5 LPS 1175 SR4 LPS 1175 SR3

Products certified to these standards resist experienced attempts at forced entry using a wide range of tools including battery-powered tools lasting up to 10 minutes (SR4 and SR5) or 5 minutes (SR3).

LPS 1175 SR2

Products certified to this standard provide 3 minutes of resistance to determined attack by an opportunist burglar using a range of techniques including those that involve creation of noise.

LPS 1175 SR1

Products certified to this standard provide 1 minute of opportunist attempts at entry using a range of techniques including those that create noise such as those involving breaking glass.

LOW RISK

Sunray: putting engineering first Sunray are leading UK designers, manufacturers and installers of steel commercial doors, fire doors, certified security doors, industrial doors and steel louvre systems. Sunray’s Security doors and accessories are rated to LPCB: LPS1175 in ranges SR1 through to SR6.

Bespoke design services

Sunray installation service

Complementing our standard door ranges we also offer a complete, bespoke design service to suit specific client needs or to overcome site and building constraints.

We offer an installation service covering our steel door, louvre systems and ExcluDoor® security door ranges. Work is carried out by our own qualified factory-skilled operatives, not sub-contractors. Sunray Engineering Ltd Kingsnorth Industrial Estate Wotton Road, Ashford, Kent TN23 6LL

T 01233 639039 E sales@sunraydoors.co.uk www.sunraydoors.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

31


Identity-Powered Security The Power of Identity to deliver actionable and timely security intelligence. NetIQ Identity-Powered Security Solutions help you reduce risk to sensitive information assets by giving you the security intelligence you need to detect and respond to threats faster. NetIQ solutions work by integrating identity information with security monitoring, enabling rapid detection of “abnormal” activity that could signal a data breach or compliance gap. NetIQ solutions operate simply and seamlessly, improving visibility and control of your environment so that you can quickly address evolving threats across your complex and mixed computing environments.

Put the Power of Identity to Work. www.netiq.com

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved. NetIQ and the NetIQ logo are registered trademarks of NetIQ Corporation in the USA. All other company and product names may be trademarks of their respective companies.


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CYBERSECURITY

IMPACT OF THE INTERNET OF THINGS ON CRITICAL INFRASTRUCTURE PROTECTION

Massive retail and financial breaches have become an almost-weekly occurrence, driven by the potential financial gains for hackers who profit handsomely from the theft of account information. Yet, thankfully, we have not seen similar successful attacks on critical infrastructure, such as power generation, public health or telecommunication facilities, with such regular occurrence. Perhaps the risk is higher today for retail and financial organisations because there are greater numbers of better trained attackers who are motivated by monetary gain. The good news for critical infrastructure providers is that relatively few hackers are driven by ideology or nationalistic endeavours that would compel them to attack critical infrastructure. But that’s not to say it doesn’t happen (think of the cyberattacks on Estonia in 2007) and the severity of the possible consequences mean that protecting critical infrastructure is of paramount importance. It is the responsibility of critical infrastructure protection (CIP) practitioners to assess new vulnerabilities and risks and provide protection and mitigation plans in response. Risk analysis often focuses on evaluating threats - the capabilities of attackers and their willingness to attack, and there are growing CIP threats from state-sponsored and terrorist organisations. But estimating risk includes an evaluation of vulnerabilities as well; vulnerabilities which evolve as technologies advance, and there is a coming wave of technology that will present a significantly expanded attack surface due to its ubiquity. That technology is the Internet of Things (IoT). NEW VULNERABILITIES EXPOSED BY THE INTERNET OF THINGS Gartner defines the Internet of Things as “the network of physical objects that contain embedded technology to communicate and sense or interact with their internal state or the external environment”. Gartner estimates that between 25 billion and one trillion devices will be connected to the Internet by the end of this decade. Those ‘things’ will include connected LED lamps, smart meters, smoke alarms, wearables (such as watches or fitness-measuring bands), security cameras, smart appliances, locks,

vending machines, self-driving cars and medical devices. We are entering an age where the environment around us will be constantly measured, in support of improvements and to enable automated reaction to changes. This is generally going to be a positive development for humans, but with all this interconnectedness comes the potential for abuse. According to PwC’s 2014 State of Cybercrime Survey: “Another evolving area of risk lies in physical objects—industrial components, automobiles, home automation products, and consumer devices, to name a few—that are being integrated into the information network, a trend typically referred to as the ‘Internet of Things.’ The interconnection of billions of devices with IT and operational systems will introduce a new world of security risks for businesses, consumers, and governments.” PROTECTING CRITICAL INFRASTRUCTURE Technology trends have led us to this point where consumer technologies intersect with traditional information technology and operational technology. The rise of the mobile device is just the beginning of this trend, though, with IoT devices poised to constantly communicate around us. We can no longer rely on perimeter defenses to keep attackers out, due to the chaos that IoT devices will introduce. We must assume that attackers will get in, even if we don’t know how. We must be able to spot them when they do and react swiftly to reduce the potential for damage. In this perimeter-less world, we must incorporate preventative, detective and corrective identity and access management (IAM) controls into security protocols. Traditional IAM focuses on controlling who has access to what, and is a critical part of preventing unauthorised access. The insider threat, though, means that this is not a complete solution to protecting access to critical infrastructure. And even if we could trust all of our insiders, the information they expose about themselves via social networks and in the future, via IoT technologies, makes their access vulnerable to hackers looking to hijack the identity of a privileged employee. So,

Travis Greene, NetIQ

Travis Greene, Identity Solutions Strategist, NetIQ, highlights the fact that with interconnectedness comes the potential for abuse

we must also have detective IAM controls that monitor what users are doing with their access. The key here is identifying abnormal patterns, because it is impossible to contemplate every potential scenario and write a rule to detect it. When attacks are detected, the reaction must be swift and effective for critical infrastructure, because the scale of damage can be massive. The first step in this corrective IAM control is to shut off access for a user who is demonstrating abnormal behaviour, which leverages the preventative IAM controls already in place. Additionally, forensic work should be performed to determine what other activity the user has performed with malicious intent. BEGIN WITH A FOUNDATION OF IDENTITY AND ACCESS MANAGEMENT Terrorists, hacktivists and rogue states realise the film script has already been written for them by Hollywood. IoT provides new vectors for them to pursue that have the potential to bypass existing security measures. There is a window now to address those vulnerabilities with a sound foundation in IAM that starts with preventative controls. Critical infrastructure protection must be prioritised now, because in 2020 when the IoT is truly upon us, it will be too late. L FURTHER INFORMATION If you would like more information on how NetIQ solutions can help protect your organisation, please contact +44 (0)1344326410 or e-mail contact-uk@netiq.com (quoting ref CTB1). Alternatively, please visit www.netiq.com to learn more.

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

33



CYBER SECURITY STRATEGY

FIGHTING CRIME IN THE DIGITAL AGE

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Three years after the National Cyber Security Strategy was launched, the government has published a report on its progress and its future plans to thwart cyber crime In November 2011, the government published the UK Cyber Security Strategy which set out the government’s vision of ‘a vibrant, resilient and secure cyberspace’. The objectives were to make the UK one of the most secure places in the world to do business in cyberspace and make the UK more resilient to cyber attack and better able to protect its interests in cyberspace. The strategy also aims to help shape an open, vibrant and stable cyberspace that supports open societies, followed by building the UK’s cyber security knowledge, skills and capability. Every year since the launch of the strategy, the government produces an annual report on the progress against the strategy’s objectives. The 2014 report was presented to Parliament on 11 December. CYBER SECURITY PROGRAMME To support the Strategy, the government put in place a National Cyber Security Programme backed by £860 million of investment to 2016. Through the programme the government is working to further deepen the UK’s national sovereign capability to detect and defeat high‑end threats, and to ensure law enforcement has the skills and capabilities needed to tackle cyber crime and maintain the confidence needed to do business on the Internet. The programme also works to ensure critical UK systems and networks are robust and resilient and improve cyber awareness and risk management amongst UK business. It also aims to bolster cyber security research and education, so the UK has the knowledge and expertise to keep pace with this fast‑moving issue into the medium-term. The government also works with The international partners to bear s e down on havens for cybercrime, objectiv 11 0 2 and to help shape international e h of t ty i r dialogue to promote an open, u c e S er b y e C secure and vibrant cyberspace. k a K U re to m e What’s more, the government w y g is working to ensure members Strate K one of the the U ure places of the public know what they c can do to protect themselves, most se o online and are demanding good to d cyber security in the products s and services they consume. busines PROGRESS The 2014 progress report on the strategy shows that the government has made E

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

35


SECURITY REIMAGINED

THE BLINK OF AN EYE That’s how long it takes cybercriminals to bypass most security defenses. Why do the top retail, financial services, energy, and government organizations trust us to protect them from cyber attacks?

We don’t blink.

www.FireEye.com © 2014 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.


CYBER SECURITY STRATEGY  significant strides towards these goals. Notable progress from this year include the inauguration of the new CERT-UK (Computer Emergency Response Team) which coordinates the UK’s national response to significant cyber incidents. CERT-UK has played a significant role already in protecting the Commonwealth Games and the NATO Summit in Wales from cyber threats. The National Cyber Crime Unit has led global law enforcement operations in conjunction with the FBI and other counterparts to target cyber criminals. The government has also introduced a new scheme, Cyber Essentials, which sets a basic standard for cyber security for all organisations in the UK. Much of this work is done in partnership with business and the academic community. NATIONAL CYBER CRIME UNIT The National Cyber Crime Unit NCCU), part of the National Crime Agency (NCA), leads operations on serious cyber crime whether it originates in the UK or internationally. Programme funding is being used to enhance the broader digital investigation skills of NCA officers. 3,519 NCA Officers have completed the e-learning digital awareness e-learning course (called the Internet and You). The GCHQ is supporting the NCCU in helping it develop the skills and technology required to combat the most sophisticated cyber crime threats to the UK. At the regional level the NCSP has funded the police to establish dedicated cyber units in each of the nine Regional Organised Crime Units (ROCUs) across England and Wales. There are currently over 85 operations being progressed with regional and national impact. In London, Operation FALCON (Fraud and Linked Crime Online) has brought together the Metropolitan Police’s fraud squad and the cyber crime unit to disrupt and arrest cyber criminals attacking London businesses. FALCON made 117 arrests from its inception in August through to October 2014. Training in tackling cyber crime has also been delivered to mainstream police forces. The College of Policing has designed four e-learning modules on cyber crime aimed at police officers and staff, which give an introduction to cyber, digital and social media. Since they were rolled out in 2013, over 120,000 of these modules have been completed. The College and police forces have also been delivering a

classroom-based course to police investigators which gives them understanding of how to exploit intelligence and evidential opportunities offered by technology, social networking and communications data. Together these initiatives are helping train up frontline police to be able to fight crime effectively in a digital age. THE ROLE OF CERT-UK The government is working with industry to ensure that critical services are resilient should a serious incident occur and that public authorities and infrastructure providers are ready to respond. CERT-UK was launched in March 2014 and works with industry, academia and the public sector to enhance the UK’s cyber resilience. CERT-UK oversees a programme of exercises to support critical sectors in preparing for the

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

the Department for Business, Innovation & Skills (BIS) and the Cabinet Office launched Cyber Essentials, a new government‑backed and industry supported scheme to incentivise widespread adoption of basic security controls that will help to protect organisations against the commonest kind of internet attacks. The scheme is constructed to be affordable and practical for all firms, small as well as large. Certification comes with a badge which firms can use to help demonstrate their security credentials to customers and investors, and which insurers can take into account when considering firms for relevant insurance policies. The scheme has generated significant interest, with over 30,000 views of the summary and associated documents. Since the launch 124 companies have

The government has continued to strengthen the cyber security of the armed forces and the military supply chain. The Defence Cyber Protection Partnership (DCPP) was formed to improve cyber security within the defence supply chain, and continues to focus on best practice, awareness, and proportionate standards potential impact of a destructive cyber attack. It also works with other CERTs internationally to ensure the response to transborder incidents is prompt and co-ordinated and that the UK can benefit from international sharing of information on cyber security threats. CERT-UK made an immediate impact providing information and advice on mitigation on the recently discovered Heartbleed and Shellshock vulnerabilities. CERT-UK provided information to Cyber security Information Sharing Partnership (CISP) members and issued alerts and advisories on its public website. Working with partners in industry, the police and the Scottish and Welsh Governments, CERT-UK successfully oversaw the safety of the digital infrastructure that supported the Commonwealth Games in Glasgow and the Wales NATO Summit. CYBER ESSENTIALS In June 2014, the Government Communications Headquarters (GCHQ),

been awarded the Cyber Essentials badge including high-profile organisations such as Barclays, Vodafone and the CBI, and more are going through the process. Many more are expressing support and the desire to encourage companies in their supply chains to use it. From October 2014, possession of Cyber Essentials accreditation has been mandatory for suppliers to government in certain categories of procurement. This, along with the 50 certification bodies now in operation, will further drive adoption and contribute to increasing take-up during 2015. John Cridland, director general of the Confederation of British Industry said: “Increasing awareness of the cyber security threat to business is an important issue to the CBI, so we are pleased to be one of the first organisations to take part in the Cyber Essentials scheme. Business leaders will benefit from the access to helpful and authoritative cyber security guidance. Encouraging firms to adopt this scheme is a positive step towards greater awareness of cyber security and more widespread action to manage the risks” GOVERNMENT SYSTEMS At the strategic level all government department boards and the boards of key government agencies have incorporated cyber risk into their risk management regimes. The National Archives’ successful ‘Responsible for Information’ e-learning E

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

37


LIMITED VISIBILITY IS AS GOOD AS NO VISIBILITY If you can’t see everything that’s happening on your network, you can never be completely confident you’re not already under attack. To truly protect your network, the ability to see into even its darkest corners is vital – Gigamon’s Unified Visibility Fabric™ delivers 100% visibility and security solutions that scale to handle any threats to your critical data, now and into the future.

Gigamon’s network security solutions put the power back in your hands.

TEL: 01344 859 870

www.gigamon.com/campaign/security

LOOK CLOSER. GO FURTHER.


CYBER SECURITY STRATEGY  course for staff in the public sector has been completed by around 500,000 public servants and face-to-face training for more than 3,600 staff has been delivered for those in critical roles. The Government Digital Service completed the move this year of every local authority and council to the Public Services Network (PSN), the high-performance government IT network enabling secure collaboration between local authorities. The majority of central government departments and suppliers will also be moved to the PSN before the end of the financial year. A new PSN compliance process is currently being piloted and will be rolled out in 2015. It validates adherence to appropriate technical and security standards, ensuring that the PSN community can do business together safely, securely and efficiently. Supported by National Cyber Security Programme funding, the Government Digital Service are working on GOV.UK Verify, which will be the way for members of the public to prove who they are when using digital government services. It will replace face‑to-face and postal methods of verifying people’s identity, so the process can be done securely online. During 2014, GOV. UK Verify has been testing the service with invited users of the HMRC’s PAYE for employees service, DVLA’s View Driving 14 Licence service and Defra’s CAP Information Service. Five identity verifiers have been appointed – Experian, Digidentity, Post Office, Verizon, and Mydex. DWP has developed a comprehensive intelligence led cyber security capability to ensure its digital service programmes are secure. DWP and GCHQ experts continue to work together to ensure programmes are robust against interference or attempted fraud. To ensure government finances are secure against cyber threats HMRC established a dedicated cyber security team in 2012. The team has been educating HMRC staff to identify suspicious behaviour, and deploying new technologies to enhance HMRC’s ability to identify and tackle cyber crime. The team has assisted in the prevention of fraud totalling more than £100 million this financial year. HMRC has also deployed proactive technical measures to secure web domains that may otherwise be used by criminals to send fraudulent e-mails to customers for the purposes of delivering malware or stealing personal information. This is now in the process of being rolled out across all identified web domains. As a result, more than 94 per cent of all fraudulent e-mails spoofing HMRC web domains are now being deleted by ISPs, preventing delivery to customers’ mailboxes. The department also takes down illegitimate phishing websites looking to steal data from taxpayers. To date this financial year, HMRC has responded to more than 75,000 phishing reports and taken down more than 4,000 illegal websites.

Meanwhile HMRC provides cyber security advice to its customers on a daily basis via online guidance and Twitter – for example by raising awareness of phishing attacks using fake HMRC emails. Its cyber security pages have been viewed more than 400,000 times.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

is difficult, or where prosecutions are not possible for other reasons, criminal activity can still be disrupted. Working with the FBI, GCHQ and other law enforcement partners as well as private industry the National Crime Agency has led for the UK on several major international operations on cyber crime. Backed by public messaging these can be highly effective in reducing UK firms – and citizens – exposure to cyber crime. For example in May 2014, the National Crime Agency (NCA) launched a major operation with international law enforcement and industry partners against two significant pieces of malware: Game Over Zeus (GOZeuS) and CryptoLocker. This resulted in over 3 million visits to HMG channels for advice on combating malware. The period from June to November 2014 showed a 70% reduction in GOZeus-infected UK computers.

CYBER SECURITY AND DEFENCE The government has continued to strengthen the cyber security of the armed forces and the military supply chain. The Defence Cyber Protection Partnership (DCPP) was formed to improve cyber security within the defence supply chain, and continues to focus on best practice, awareness, and proportionate standards. The DCPP, which includes thirteen prime defence contractors and, representing smaller businesses, the trade associations ADS and techUK, has developed a framework that clearly identifies expected cyber standards. The Cyber Security Model for Defence will be PUBLIC AWARENESS as officially implemented in The government’s strategy also HMRC h yed o l 2015. Cyber Essentials is involves preventing crime p e d l also a c i a basic building block through helping citizens n h c te for good cyber security and businesses get better roactive to secure p s practice across protected. The government e r measu ains that may all organisations is working to ensure that m y o b d and as such will consumers are better d b e e s w e be u nd s i be an essential informed of the potential w r e h ot component of the risks and what they can ls to se crimina nt emails new model. Suppliers do to reduce them, and are asked to achieve demand better cyber security fraudule tomers Cyber Essentials in in the products and services o cus t preparation for this process. they buy. Law enforcement has International coplayed its part in this wider effort operation on cyber crime; by following up its operations with media disruption of criminal networks. campaigns aimed at highlighting the risks Many cyber criminals operate from outside and signposting advice on responses. UK jurisdiction. With NCSP funding the Following the publication of the Internet NCCU has been able to increase its overseas Service Providers (ISPs) Guiding Principles footprint in order to understand the in December 2013, the signatories formed 10 global cyber crime threats, coordinate a working group to co-ordinate and activity against priority threats, and monitor progress made in these areas. BIS develop relationships with international and law enforcement continue to work partners that can support transborder in partnership with ISPs to minimise and co-operation on prosecutions, including mitigate the internet cyber threats facing additional posts in Europol and Interpol. ISP customers. The ISPs have improved The UK Government is working more their security advice and support for generally to build international capacity to customers and promoted the government’s fight cyber crime. It has worked with the cyber security awareness campaigns. Organisation of American States to develop Cyber Streetwise launched in January 2014 national cyber strategies in the Caribbean with the goal of measurably improving cyber which will help those countries protect security amongst the public and small and themselves as well as reducing threats to medium sized businesses. A second phase the UK. The UK Government also worked of the campaign launched in October 2014 with the Council of Europe (CoE) to help with a greater focus on. Since its launch it establish a National Cyber Crime Centre has driven over 600,000 unique visitors to in Romania, which acts as a co-ordinating the Cyber Streetwise website and the online body for all CoE capacity building activity films have attracted over 5 million views. relating to cyber crime and has also led The first phase improved take-up among cyber crime investigations. The Centre has more than 2 million adults of recognised enabled the CoE to manage the growing cyber security activities such as using number of assistance requests and is now stronger passwords and checking signs for able to support countries worldwide in a secure website when shopping online. L their efforts to tackle cyber crime, recently including Sri Lanka and South Africa. FURTHER INFORMATION Where co-operation with other jurisdictions tinyurl.com/lddc29x

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

39


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com 14102129_UK-Counter-Terror-4th-gen-TSx53-NVR-half_Print-.pdf 1 2014/10/27 上午 11:10:44

Comprehensive Video Surveillance Storage Solutions Safeguard your assets and property with QNAP Turbo NAS & VioStor NVR M

Y

CM

MY

CY

Scheduled recording Intelligent Video Analytics (IVA) Centralised Management System Recording & live monitoring with mobile devices

CMY

K

TS-853 Pro

NAS + NVR

C

VMobile

Vcam

VS-12164U-RP Pro+

The revolutionary 4th generation NAS from QNAP allows you to manage and monitor video surveillance with the intuitive web-based Surveillance Station

Intelligence Services. and support up to 128* IP cameras, making it ideal for home and SOHO users.

Reliable & Scalable NAS Surveillance Solution

QNAP NVR, Make Surveillance Safe and Secure

QNAP also provide a full range of advanced NVR systems for enterprises and SMBs. The VS-12100U-RP Pro+ series supports failover, load balancing and multi-IP settings, improving stability and bandwidth allocation to provide high performance and smooth recording. * 2 or 4 free recording channels are only for Surveillance Station 5.0 with QTS 4.1 firmware (or higher versions).

TS-253 Pro

Copyright © 2014 QNAP Systems, Inc. All rights reserved.

TS-453 Pro

TS-653 Pro

VS-12156U-RP Pro+/ VS-12148U-RP Pro+/ VS-12140U-RP Pro+

www.qnap.com

Recognize AND Analyze Is he a known suspect? How old is he? When, where did she enter? Is she an employee?

Premier face recognition technology for real-time video screening and anonymous people analytics www.cognitec.com • info@cognitec.com

40

COUNTER TERROR BUSINESS MAGAZINE | Issue 20

Is this valued customer Sarah Jones? How often was she here this month? Is it too crowded in this area?


ADVERTISEMENT FEATURE

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INFORMATION ASSURANCE

Good information assurance: What separates a target from a target corp? The battle to protect our data from hackers is only getting harder. The battlefield is comparable with the densest jungle – when in the jungle, it is impossible to see every tree, it is also impossible to see, let alone identify, categorise and track, all of the beasties wandering around. To know for sure what is there, you might map the trees but will still have the endless task of tracking new life, not easy where growth comes so readily. Technology helps but experienced feet and eyeballs should be deployed to confirm what is out there to assess whether it is good, bad, or neutral. Consumers believe that they are protected, and that confidence can be misplaced. Businesses will seek to mitigate their risk and can be brutal about how they do it

defenders and it is starting to feel like some custodians and their regulators are losing the will to fight hackers. In response to the deluge of threats, it appears that we are becoming fixated by technical solutions. The rapidly expanding concatenation of our lives is, by the moment, making our information jungle better yet less safe. New threats, breaches and frequent data losses have become an inevitable consequence of simply existing in the digital age. LEVEL OF BREACHES The published level of breaches is horrendous, in the US alone, reported breaches are up 30 per cent year-on-year and January – September saw more than 75 million records compromised in 568 unique

Criminal hackers are ingenious, dogged and patient and often several steps ahead of defenders and it is starting to feel like some custodians and their regulators are losing the will to fight hackers. In response to the deluge of threats, it appears that we are becoming fixated by technical solutions – Bronzeye recently identified an exploit for 2-Factor authentication which would enable criminals to circumvent security measures, this exploit requires a socially engineered victim’s unwitting participation. The exploit begins on the victim’s computer and involves the victim accessing an account normally before the hacker steps around to hijack the transaction, it may take some time for the victim and the bank to realise what has happened, so don’t be surprised if banks try to lay this off on the customer because it was something he/she did which opened the door to the hacker. CONSTANT PROCESS Governments and businesses are giant repositories of our data, vast quantities are accumulated, collated, crunched and used to predict, control and sell. That very same data is the bedrock for criminal hackers, so the task of protecting data should be a constant process for everyone, all of the time. The job starts before the data becomes digital and needs to factor in every facet of its genesis, storage, use, transit and destruction. Criminal hackers are ingenious, dogged and patient and often several steps ahead of

breaches. The true level simply cannot be known as many breaches aren’t reported. Faced with the binary decision of, ‘take a reputational hit or keep quiet and hope no-one notices’, even where disclosure is obligatory, pleading ignorance can be compelling. If the event occurs at/through a third party, an enterprise may not even know it is a victim. Some regulators now advise gatekeepers to concentrate on preventing movement within systems, this might seem logical but successful breaches can be mightily difficult to identify, quarantine and eradicate, as the ‘Cloud’ has exponentially increasing opportunity pathways for criminals to explore. Enterprises increasingly seek to mitigate risk by laying it off with third parties (vendors and cyber insurance) and sometime soon, there is going to be a monster breach which will test this increasingly tangled web – it might break. So, we have an arms race, an unbalanced arms race at that. Government agencies guard the ramparts, committees form, edicts are peppered upon us. This often feels like cosmetic sleight of hand; appearance over substance. Worryingly complacency lurks, some companies still seem to live by two rules:

About Bronzeye The Bronzeye Group is a team of professionals with a comprehensive and eclectic range of government agency, military and financial backgrounds. The team brings together individual skills that, collectively, enables the company to neutralise or mitigate the multitude of threats its partners face every day – whether physical or digital. Bronzeye’s holistic approach in dealing with these threats gives the company a unique efficacy for its clients, saving them money and time. We’ve got it covered; if we haven’t, Rule 1 applies. As the digital labyrinthe grows our response must be intelligent; it does not need to be more complex, nor more expensive, but defences must be holistic, coordinated, interconnected and encompass all aspects of our risk – not just our digital footprint. You might think that this is stating the blindingly obvious; most executives believe that holistic is exactly what they are doing. Frequently, they are misinformed and we prove this to clients with a simple half-day exercise (amongst the many other information assurance services Bronzeye provides). HIGH RISK The risk is high and rising and of those UK companies which suffered a breach in 2013, 10 per cent were so badly effected that they had to change the nature of their business. All of this does not mean we cannot be safe; most breaches still begin with a good old human contribution (error or malicious). Good processes and procedures should provide our defensive skeleton; well trained and motivated workforce and effective risk management will remove much vulnerability. Direction must come from the top and executives must be actively engaged. If you don’t do all of that, you should disconnect everything from the internet re-learn how to use a vufoil and overhead projectors, and open a superstore that sells nothing but crayons, pencils and paper.... lots and lots of paper. L FURTHER INFORMATION www.bronzeye.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

41


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURITY

THE CRITICAL 3CS OF SECURING MAJOR EVENTS

As Britain basks in the success of September’s NATO Conference, Chris Plimley of Zaun shares lessons learned on securing some of the most high profile events of the past two years and says collaboration, communication and consistency are the key I was in Cardiff on the eve of the NATO Conference so expertly hosted by the UK this autumn. Whether it was the impending first ever visit to Wales by a serving US President – or the lockdown barriers of ours that had popped up all over the city, along the M4 and around the Celtic Manor Resort at Newport, which was staging the conference itself – the sense of excitement was palpable. It mirrored the mood in Glasgow back in the summer as the city, the Scots and the wider British Isles embraced the arrival of the 20th Commonwealth Games with athletes from 71 nations competing in 17 sports over 11 days.

London 2012 did so many things right. The crucial engagement of everyone involved in planning and delivery was started early. It was comprehensive and embraced all parties. And they maintained that collaboration right through the project. Good collaborative planning ensures all security equipment can be manufactured in plenty of time, meaning there is perfect availability of product when the build for the event starts. It also allows for the development of completely new products to meet previously unforeseen security needs, as we ourselves witnessed with the London 2012 Olympics.

Security contractors need to work closely with governments, the police, local councils, residents and the media to ensure potential clash points are known about well in advance, mitigation plans are well understood and the overall greater good is wherever possible an aspiration shared by all Reportedly, the Opening Ceremony at Celtic Park football ground telling the story of the ‘real and extraordinary’ people of Glasgow on Europe’s largest LED screen covering the whole of the South Stand – stretching to 100 metres in length and 38 tonnes in weight – was watched by more than one billion Commonwealth citizens. That’s a pretty big global audience, so you’re never going to live down any mistake, especially in the full glare of the notoriously predatory UK media. Just ask G4S about the fall-out from their role at the London Olympics. LESSONS LEARNED Which got me thinking about the lessons we at Zaun have learned on securing some of the most high profile sporting and political events over the two years since we worked on the 2012 Games. It strikes me that it all comes down to collaboration, communication and consistency.

42

COUNTER TERROR BUSINESS MAGAZINE | Issue 20

It means new technologies can be considered and applied to provide new solutions. A good example that we trialled at this autumn’s Tory party conference for the first time was to incorporate the latest Video Content Analysis cameras and monitoring. Gone are the days when PIDs were simply mounted on a fence. Now threats can be monitored, analysed and recorded in real time so that, for instance, the same person approaching the perimeter at three different points on three separate occasions can be identified, marked as a threat and potentially apprehended without ever even touching the fence line. Early collaboration ensures logistics and planning can be co-ordinated to maximum effect and efficiency. It allows for the identification of the right personnel in the right numbers (think G4S again) and gives time for them to be properly vetted, accredited and trained.

With fore-planning, installers can devise detailed build schedules to ensure the safest working practices can be maintained even under the most exacting timelines, with work often having to be carried out in the tightest window in the small hours of morning darkness when public transport isn’t running and roads can be briefly closed and diverted. And it means a fair share of risk (and appropriate penalties or liquidated damages (LDs) for failure) can be agreed between the teams, all with differing political, social, commercial and cultural mandates who come together to pull off a major event. Our LDs if we had failed to deliver the security cordon for the G8 Summit last year would have run to many tens of thousands per day of delay, aside from any consequential losses businesses or organisers may have claimed in addition. Because you can rest assured that people will complain given any excuse – and that’s where the importance of good communication from the earliest opportunity comes in. LOCOG and the ODA built and maintained excellent communication throughout with all of the stakeholders – from athletes to volunteers, spectators to taxpayers, and contractors to media. Major events, both while they are taking place and in the build-up to them, are always going to disrupt life for some. Whether it’s diversions and road closures, potentially affecting trade and workers’ commute, or the cost of staging an event – just look at the riots in Brazil before the Football World Cup at the ‘misuse’ of public funds as the protesters saw it – some will feel they’ve been negatively affected, abused or their rights have been infringed. WORKING TOGETHER So security contractors need to work closely with governments, the police, local councils, residents and the media to ensure potential clash points are known about well in advance, mitigation plans are well understood and the overall greater good is wherever possible an aspiration shared by all. Then, if you’ve got your collaboration and communication right, the third C you’ve got to ensure is consistency – and that’s where the London organisers could have done better. Late and significant changes in plans cause rework, waste, extra cost and delay and introduce friction between a tight-knit team that is under collective pressure to deliver to an immovable deadline in the full beam of both media and political headlights. You’re working as a team and have together devised a sound security strategy, agreed personnel numbers and a definitive layout for overlay. So don’t go changing this unilaterally late in the day without expecting painful consequences. Stick to your plans – and if you have to change them, do it early, with comprehensive collaboration and complete communication. 


SECURITY

ZAUN’S ‘RING OF STEEL’ TAKES CENTRE STAGE AT NATO SUMMIT

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The UK’s largest ever police operation passed off without major incident after parts of South Wales were locked down inside a ‘ring of steel’, reportedly the world’s biggest ever installation of temporary high security fencing Up to 9,000 police from 29 of the UK’s 43 police forces were deployed for the two-day NATO Conference at Newport’s Celtic Manor and key sites in Cardiff, surrounded by miles of steel fencing. UK security expert Zaun manufactured and installed the 13 kilometres of high security fencing around the hotel and conference centre, Cardiff Castle, Bute Park, Cardiff Bay and the Millennium Stadium to ensure the safety of delegates. More than 60 world leaders attended the summit, including Prime Minister David Cameron, German Chancellor Angela Merkel and Barack Obama, the first ever serving US President to visit Wales. Two roads in Newport were closed for more than five days, while all footpaths crossing the Celtic Manor Resort were shut. A team of 30 from Zaun, including project managers, site managers and installers, with 35 articulated lorries of fencing, barriers and accessories put up the ‘ring of steel’, part of which ran alongside the M4 motorway at junction 24 and the A449. ULTIMATE PROTECTION Zaun designed special sections of steel panels that were fixed to existing fencing horizontally then flipped upright and dropped into the Roath Basin at Cardiff Bay and next to the Millennium Bridge on the River Taff beneath the walls of Cardiff Castle. Twelve-feet high fencing designed to resist mob attack and, in places, hostile vehicle attack, also went in the village of Caerleon in the north of Newport and at a string of sites across Cardiff used by the world leaders. And minutes after they left Cardiff Castle, Zaun’s team moved in and worked 24/7 to dismantle all the traffic management measures by 6.30am two mornings later for the 10k Cardiff road race and fun run. They then removed the remains of what had become a part of life in central Cardiff for weeks – and had been dubbed as Cardiff’s Berlin Wall and The Great Wall of Wales – to allow traffic and businesses to get back to normal. The summit generated its share of protests, but news channels including the BBC, ITV and

Cardiff Castle

Zaun fencing around the Celtic Manor Resort, installed during night closures on the M4

Sky News reported that ‘people are trying unsuccessfully to tear down the fence’ and that ‘paper planes and pieces of wood are occasionally being thrown over the cordon’. Mr Cameron, Mr Obama and Mrs Merkel first experienced Zaun’s RDS and SecureGuard fencing last year at the G8 summit in Enniskillen, which was previously the largest UK security operation with 8,300 officers and a cost of £60m. OTHER PROJECTS Zaun also provided the security fencing in March 2014 at the Nuclear Security Summit in The Hague and last year at

Protecting the main bridge into Bute Park, Cardiff

the influential meeting of world leaders and the world’s commercial, political and financial powers at the Bilderberg conference at The Grove in Watford. And in 2012 across the UK, Zaun installed 20 miles of permanent and temporary fencing to secure the London 2012 Olympics including VIP emergency gates at the Olympic Stadium which were dubbed the Obama Gates, in case of attack during the highest-profile and most sought-after events, such as Usain Bolt’s historic 100m gold medal triumph.  FURTHER INFORMATION www.zaun.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

43


PORT SECURITY

incorporating Critical Information Infrastructure Protection

Hosted by:

4th-5th March 2015

The Hague, Netherlands www.cipre-expo.com

Convene; Converse; Collaborate Opening Keynote Presenters: - Mr Opstelten, Minister of Security & Justice, The Netherlands - Mr Fernando Sánchez, Director General, National Centre for Critical Infrastructure Protection (CNPIC), Spain

The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands. The European Union is developing its policy on critical infrastructures in relation to the European Programme for Critical Infrastructure Protection (“EPCIP”) which considers measures that will enhance, where necessary, the level of protection of certain infrastructures against external threats. Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure.

REGISTER TODAY AND SAVE WITH EARLY BIRD

Save up to 20% on delegate fees when you register online and save with the Early Bird discount rate. (Early bird discount deadline - 4th February 2015)

For further details and to register visit www.cipre-expo.com

Speakers include: - Wilma van Dijk, Director of Cyber Security, NCTV, Ministry of Security & Justice, Netherlands - Benny Jansson, Deputy Head Strategic Analysis Section, Swedish Civil Contingencies - Evangelos Ouzounis, Head of Unit – Secure Infrastructure and Services, European Union Agency for Network and Information Security – ENISA - Jakub Boratyński, Head of Unit, Trust & Security, DG CONNECT, European Commission - Mauro Facchini, Head of Copernicus Services Unit, DG Enterprise and Industry, European Commission - Andrew Wright, Head of Industrial Resources and Communications Services Group (IRCSG), NATO Operations Division - Michele Minichino, Coordinator of Critical Infrastructure Protection Program, ENEA

Leading the debate for securing Europe’s critical infrastructure Owned & Organised by:

Hosted by:

Supporting Organisations:

Media Partners:


DEEPER COUNTER TERROR TRAINING WITH ISSEE

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Terrorism has become the systematic weapon of war that knows no borders or seldom has a face. The requirement for any nation must be to deliver highly trained responders who are capable of dealing with the full terrorist arsenal, without excessive disruption to daily activity or damage to property. Terrorism, from whatever religious, political or ideological goal, is designed to strike fear into the hearts and minds of the population. The responsibility for countering terrorism and the threat of terrorism lies in the main with Governments and their various departments of state such as Police, intelligence services, military and special forces. As terrorists become more expert in the use of technology and with greater access to funds, training and equipping those responsible for the deterrent becomes more and more expensive and time consuming. Maintaining the skills acquired during training can also be a challenge, especially during long periods of inactivity. The balance is to acquire and sustain the best training and equipment for the most economical outlay. EQUIPMENT FOR AN EFFECTIVE RESPONSE Throughout the world, governments are looking to reduce their expenditure on public services and yet maintain the very highest capabilities required to deliver world class Homeland Security. They are increasingly looking to the commercial sector to deliver training and to develop and supply the equipment needed to provide the most effective response. Following the reduction in the levels of operations in Iraq and Afghanistan, there is now no shortage of commercial companies who purport to be able to deliver these services. However, the standards of training can vary significantly and of course this will affect the standards, quality and effectiveness of the response teams deployed to meet the terrorists’ actions. The responsibility of any Government is to protect its citizens, its property and infrastructure. The delivery of counter terrorism effects in Iraq, Afghanistan and other ‘warzones’, where collateral damage caused by an explosion may be considered as a ‘consequence of war’, is not acceptable in a modern, urban environment. The requirement for any nation must be to deliver highly trained responders who are capable of dealing with the full terrorist arsenal, without excessive disruption to daily activity or damage to property. At ISSEE, the consultants and trainers have extensive experience of operations in urban

and rural areas, cities and transport infrastructure, which covers decades of UK involvement through the troubles in Northern Ireland to current operations overseas. Predominantly drawn from the UK MOD and the UK Metropolitan Police Counter Terrorism arena, the ISSEE pool of expertise is rightly considered to be second to none. DEEPER THAN TRADITIONAL TRAINING A sound counter terrorism development philosophy is based on the overarching strategic aim of building long-term sustainable capability within an organisation or nation. Underpinning this is a need to take the current indigenous capability through a transformational process to a new and effective higher plane; this requires much deeper activity than just traditional training. The task encompasses training all levels from the strategic, through to the front line operational and tactical levels of activity. Developing integrated standard operational procedures and systems, understood and recognised by all, forms only part of the desired outcome. Periodic review and monitoring subsequent progress ensures that a complete, effective and evolving capability endures. Opportunities to develop world-class counter terrorist responses should be seized early. By involving ISSEE in the initial stages of planning, organisations will be guided through a review of existing capabilities and then matched to the needs of the intent envisaged. Services and solutions will be designed and agreed throughout the process and so reduce lead time and cost. ISSEE believes in working with customers to generate a full capability – not just a single event. A full capability solution will consider the selection of personnel and equipment, initial and advanced training, identification of suitable indigenous instructors, development of operating procedures, design of training exercises, integration of other

teams and commanders, mentoring and development and periodic assessment. Response teams alone will not defeat terrorism. Intelligence and information management are critical, as are post event investigation and forensic management. A fully capable counter terrorism training and services provider must be able to deliver all these disciplines with confidence and credibility. ISSEE’s experience of designing and operating intelligence-led databases, investigating explosives and ammunition incidents and its partnerships with Portsmouth University’s forensics department and several valued equipment providers, make it an ideal choice. BACKING UP THE CLAIM In sum, many commercial organisations will claim to provide world-class, contemporary training and services to aid Government Departments of State prepare for and tackle terrorism. ISSEE will make the claim too: but uniquely its claim is backed up by external verification and accreditation of its training through Homeland Security Qualifications (HSQ) and measured against the UK National Occupational Standards (NOS) for Explosives and Search Occupations. As a member of the UK Standards Setting Board for the NOS and a member of the Institute of Explosives Engineers, ISSEE can be trusted to provide the solution or service to meet the most demanding threat or issue. L FURTHER INFORMATION www.issee.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

45



EVENT PREVIEW

MITIGATING THE THREAT OF TERRORISM

Counter Terror Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Understanding and combating terror threats is a critical priority for civil, military and private sector stakeholders. Counter Terror Expo 2015 leads the way in mitigating the threat of terrorism Counter Terror Exhibition and Conference (CTX) is the leading international event dedicated to mitigating the threat of terrorism. CTX 2015 is expected to welcome over 8.500 international visitors from across the globe involved in the protection and security of private and public interests, working in government, military, law enforcement, emergency services, Critical National Infrastructure, private sector and the security services. The threat of terrorism is evolving and remains at a significantly high level. Those with the desire, intent and means to do harm are proving to be adept, inventive and extremely dangerous adversaries. Senior MI5 and Scotland Yard anti-terrorism officers have recently said that the scale of extremist activity is so great that a terrorist attack is ‘almost inevitable’. The ability of the security services to detect and monitor the increasing amount of plots is becoming severely strained as extremists are increasingly aware of their own visibility and ‘operational security’. CTX 2015 serves a vital role in delivering a uniquely creative and constructive environment in which the issues of today may be debated and the counter‑measures of tomorrow developed. COUNTER TERROR TECHNOLOGY The myriad of threats to global security has created a necessity for the vigilant protection of civilians as well as critical facilities, systems and networks on which we all depend. Visitors to the exhibition floor will see first-hand the latest technologies and practices for monitoring, identifying and countering these threats. Around 400 exhibiting companies, from leading UK and international primes to specialist SME’s will be exhibiting their latest technology and equipment for law enforcement and security personnel. NEW FEATURE ZONES ANNOUNCED During the last 6 months the organisers of Counter Terror Expo have been exploring the most pressing issues and trends within national and international security. As a result of this, CTX is pleased to announce four new feature zones, all of which reflect the most pressing security threats under one roof. The feature zones are the perfect space for exhibitors who either specialise in a particular sector or have a new product

The myriad of threats to global security has created a necessity for the vigilant protection of civilians as well as critical facilities, systems and networks. Visitors to the exhibition floor will see the latest technologies for monitoring, identifying and countering these threats launch that they would like to promote to a range of senior private & public sector buyers and industry VIPs. The new zones at CTX 2015 include a Policing and Special Ops zone, connecting you with the top special operations procurement heads internationally. The Advanced Technologies zone will provide the perfect location for all SME security companies to showcase their latest technologies and products in front of the Home Office as well as senior buyers and specifiers within counter terrorism and security. Transport Security Live is the zone which represents one of the biggest threats from terrorism and will present the most innovative techniques to ensure that all transport systems, public and private are best protected from a potential terrorist attack. The Cyber Threat Intelligence

zone will reflect the fastest growing threat worldwide where leaders within the industry will present their thoughts on tactics and solutions to counter cyber terrorism. POLICING & SPECIAL OPERATIONS ZONE There are a high number of Police & Special Operations units within the UK who have much knowledge to pass onto private and public sector organisations and the Home Office about the latest advancements and tactics to help avoid an attack on national security. Their presence will be of immediate benefit to all visitors who want to learn more about protecting themselves, their assets and their country. The zone will also see Police & Special Operations units come together to share the latest security concerns that they are working 

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

47


FO R R EG FR IS EE TE TO R DA Y

WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERN

The event for those in the public and private sectors tasked with sourcing and delivering protection against terrorist threats •

Attend live demonstrations and workshops

Network with over 9,500+ public and private sector attendees

Meet 300+ exhibitors showcasing the latest counter terrorism products and solutions

Discover practical solutions on mitigating the threat of terrorism

Hear from thought leaders on the future of global security

Save £50 by registering for your free exhibition pass at

WWW.COUNTERTERROREXPO.COM/CTB2 Co-located with

Follow us on

Supporting associations


EVENT PREVIEW and nations to a halt and cost millions of pounds not only in resolving the situation but to the economy as well. Transport Security Live explores how transport infrastructure is as best protected and as prepared as possible. Transport Security Live at Counter Terror Expo will bring together all aspects of the transportation network, from Aviation, Maritime, Rail Transport, Secure Transportation, Supply Chain and Major Events sectors. The zone will host a high profile conference with key figures within transport giving talks about current capabilities and segments which must be improved on in order to bypass a terrorist attack.

 on and tactics used to counter the threats. It will provide an ideal opportunity for special operations units to review and benchmark their operations against industry standards and explore potential development areas to raise the standard of national security. This zone is an exclusive opportunity for private security companies and suppliers to build relationships with hard to reach Police & Special Operations units. The Policing & Special Operations Zone will be a must attend feature for all senior procurement personnel within the units. It will be their opportunity to make educated procurement and investment decisions. ADVANCED TECHNOLOGIES ZONE The Advanced Technologies Zone represents the future of security and counter terrorism. It will enable SMEs to work closely with the Home Office and present their latest innovative products to senior officials. Counter Terror Expo and the Advanced Technologies Zone will support the Home Office’s mission to provide smaller enterprises with the opportunity to showcase themselves and gain additional market share internationally to help grow the UK export strategy. The zone will also host the only seminar theatre at the show allowing a limited number of suppliers to present in front of a large senior audience. For visitors, this will be a rare opportunity to see cutting edge technology up close and to fully understand how it can be integrated effectively and cost effectively. Because of this, many Governments, CNI and Special Operations procurement officials from across the world will be attending to explore how the latest technology can be matched to their current and future needs. As digital technology advances so do the terrorists and criminals that use it – it is therefore vital that Government, businesses

and the Critical National Infrastructure are as prepared as possible in countering the threat. Cyber security is the fastest growing threat worldwide and the UK is fast becoming the leader in producing innovative intelligence technologies and strategies, exported internationally. The zone will help cyber security companies to be positioned in front of senior procurement teams within the Government and the Police to help them learn about the company’s capabilities and generate a window for high profile sales leads to take away from the show. The Cyber Threat Intelligence Zone will host a conference theatre which will be open for everyone to visit. The theatre will welcome a number of high profile speakers who will discuss and debate current needs in the cyber security market as well as ways to mitigate threats. The conference will not only benefit visitors but will become the ideal place for all UK and international suppliers to explore gaps in the current market to help with their company objectives and strategy going forward. TRANSPORT SECURITY LIVE With the threat level within the world rising, terrorism is very much a real threat that all individuals involved in protecting people, places and countries must be aware of. Transport is the most vulnerable area for a terrorist attack. Transport is at the heart of national infrastructure and the safety and resilience of transport networks are crucial to the effective running of nations. Current security methods used in transport vary from high to practically non-existent. The zone will highlight the importance of increasing and levelling out security methods used in public transport and ways of doing so. Transport Networks have long been a target for terrorism. The disruption and panic a threat causes can bring cities

Counter Terror Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HIGH LEVEL CONFERENCES As well as the free-to-attend conferences in the zones, there will be two paid for high level conferences running alongside CTX. These conferences will provide a leading forum for the discussion of new and emerging risks posed by terrorism and delivery of insightful analysis on the range of threats faced today. Eminent experts across the field of counter terrorism will use this two day centrepiece to focus on two key themes. WORLD COUNTER TERROR CONGRESS 2015 Nearly 200 internationally recognised experts in counter terrorism will gather at the World Counter Terror Congress to debate the threats we face, define operational strategies and to help shape future policy. The Congress offers an excellent opportunity to government, the emergency services, academics, technology providers and vendors to unveil new developments in counter terror. CRITICAL NATIONAL INFRASTRUCTURE 2015 The Critical National Infrastructure conference will showcase how best to mitigate risk to and guarantee the safety and resilience of critical physical and information assets and networks. Internationally-recognised experts in infrastructure protection will gather at the conference to focus on how to strengthen our threat awareness, emergency preparedness and response capabilities. The CNI conference brings together owners and operators, policy makers, practitioners and key supply chains to deliver insights into infrastructure protection and offers an excellent opportunity to unveil new developments in security and resilience.  FURTHER INFORMATION Online registration for Counter Terror Expo is now open. Registering in advance is free and gives you access to the exhibition, free-to-attend conferences and networking drinks reception. You can register as a visitor at www.counterterrorexpo.com/register

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

49


Infranor Mavilor SA have the engineering capability and specialist technology to make you a bespoke motor that matches your requirements, using a wide range of 12 different motors families. Offering Radiation hardened options, Military Spec Options, Vacuum, Environment Options, Wash-Down Series Available, Explosion Proof Series, Wind Generation Options, Linear Motors, Generators and much more!

Specialists in Servo Design & Bespoke Engineering

Infranor DRIVES offer a wide range of compact and flexible AC servo-controllers with outstanding capabilities. With different power ranges available and numerous interfaces, they are well suited for the use in various types of machines and installations.

They provide functions to cover a wide range of single and multi axes systems. Making the XtraPulsPac and XtraPulsCD1 servo drives can be seamlessly adapted to your application.

info.uk@infranor.com www.infranor.com +44 (0)208 144 2152


MECHANICAL PROCESSES

XTRAPULSPAC: THE SMALL DEVICE FOR THE TOUGHEST OF REQUIREMENTS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The most recent addition to INFRANOR’s product range is XtrapulsPac, a compact and flexible low-power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications XtrapulsPac can be configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion-controller via the fieldbus and uses well-known standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications, and is available in a small device at an affordable price, which meets the most demanding of requirements. Control loop: digital drive for AC synchronous motors – current loop 62.5 μs – speed and position loop 500 μs – closed loop control of position, speed or torque – maximum speed up to 25,000 rpm. Feedbacks: resolver – incremental encoder – hall sensor – SinCos encoder – single and multi-turn HIPERFACE® encoder. Communication interfaces: RS-232 up to 115.2 kbit/s baud rate – CANopen or EtherCAT® fieldbus – DIP switches for node address. Safety features: safe torque off SIL 2. I/O interfaces: user-configurable digital I/Os – all-digital inputs opto-isolated – analog inputs ±10 V/12-bit resolution – analog output 0-5 V/8-bit resolution – ‘amplifier OK’ output – motor brake control – two-channel STO function. MODES OF OPERATION DS402 standard mode: interpolated position mode – profile position mode – profile velocity mode – profile torque mode – homing mode. DS402 extended modes: analog speed mode – stepper emulation mode – sequence mode – master/slave mode stand-alone operation – analog speed drive – positioner – stepper emulation – electronic gearing. Stand-alone operation: analog speed drive – positioner – stepper emulation – electronic gearing. Configuration tools: motor and drive configuration – application configuration – interface configuration – auto-tuning, auto-phasing – sequencer programming. Project tools: project creation – project management – file-handling services – motor libraries – multilingual software. Diagnostic tools: device control – device monitoring – object dialog window – multi-axis oscilloscope.

FREELY CONFIGURABLE DRIVE The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive’s non-volatile memory. The XtrapulsPac drive can be controlled: via the fieldbus (CANopen or EtherCAT); via the analog input (analog speed drive); via the PULSE and DIR inputs (stepper emulation); or via the digital I/Os (stand-alone positioner) according to the selected operation mode. To allow Infranor an even more flexible approach to servo-controller, servo-amplifier solutions, the company also has the XtraPulsCD1 servo-drive. XtrapulsCD1-a alldigital servo-modules are PWM servo-drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block, including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a’s drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. With a resolver sensor feedback, the motor’s absolute position value over one revolution is available and the

servomotor can immediately be enabled after the drive power up. With a ‘SinCos tracks’ sensor that provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and of a period equal to the motor pole pitch, the servomotor can be immediately enabled after the powering of the drive. Having an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servomotor can also be immediately enabled after the drive power-up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power-up before the motor enabling. As it has an incremental encoder + Hall Effect Sensors (HES) feedback, the motor-phasing procedure is no more necessary and the servomotor can immediately be enabled after the drive power-up. With an absolute single-turn, multi-turn or linear encoder using the EnDat® or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servomotor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution (ppr) and 16,384 pulses per revolution can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The auto-phasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L

FURTHER INFORMATION info.uk@infranor.com www.infranor.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

51


foster+freeman IMPROVING THE QUALITY OF FORENSIC EVIDENCE

Forensic level inspection systems to counter the serious terrorist threat caused by the rampant use of counterfeit & stolen travel documents. During recent years a number of high profile terrorist attacks have involved the use of fake and/or stolen passports. Foster + Freeman systems provide a comprehensive solution for the verification of passports and ID cards, the detection of alterations and counterfeits, and the inspection of standard and advanced security features. Existing customers include airports, security forces, immigration controls, banks, police & government forensic laboratories worldwide.

fosterfreeman.com

Visit fosterfreeman.com To find out more about our complete range of document examination solutions, from frontline scanners to forensic inspection systems

Foster + Freeman Ltd | Tel: +44 (0)1386 768 050 | email: sales@fosterfreeman.com


EVENT PREVIEW

A GATHERING OF FORENSICS PROFESSIONALS

Forensics Europe Expo, taking place in London’s Olympia from 21-22 April 2015, will connect senior buyers, suppliers and specifiers within all forensic sectors including forensic innovations, digital forensics, lab forensics and crime scene forensics Since the closure of the Forensic Science Service in 2012, which dealt with over 60 per cent of overall forensic cases, the forensic landscape has evolved into an ‘open market.’ There is now, more than ever, a need to understand new legislation, and the impact and future challenges it will have on the availability, procurement and supply of forensic analysis & products. Forensics Europe Expo, which will be held in London’s Olympia from 21-22 April 2015, will help regulate the supply chain by connecting market leaders with direct buyers and hosting a top level educational programme to bring the latest regulations and tactics to the entire sector. Visitors will be drawn from all aspects of forensics activity from across Europe: from evidence collection by the police, military and intelligence agencies; to those involved

Save 0 up to 2 th the t wi per cen ly Bird Ear t: visit discounsicseurope ren www.focom/register expo. ‘CTB’ as a and use otional prom e cod

in any type of investigation and court presentation that requires the analysis of evidence, including lawyers, government bodies and agencies; through to private organisations and the labs themselves. Forensics is the second highest expense for police forces and a major cost for lawyers, government agencies, military and corporate companies. CONFERENCE Forensics Europe Expo will once again host their world leading two day conference programme which this year will be running in collaboration with the Chartered Society of Forensic Sciences. The partnership between the only dedicated international forensics exhibition and conference and the only International Forensic Professional body, currently attracting members from more

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

than 60 countries makes the conference a must attend for any professional who’s role involves working with aspects of forensics. The conference promises to provide professionals within police/law enforcement and the military training to demonstrate the entire forensic process, taking them from the crime scene and all the way to giving evidence in the court room and beyond. Registration is now live. To take advantage of the Early Bird discount and save up to 20 per cent please visit www.forensicseuropeexpo.com/register and use CTB as your promotional code. BUILDING ON SUCCESS In 2014, the event connected over 65 leading international exhibitors with over 3,000 senior forensic professionals. Going forward, Forensics Europe Expo will carry on building on its success through market leading content based on and off the show floor. Apart from the world leading conference, visitors will be able to register for a free exhibition pass which will allow entry into the seminar theatre featuring live products launches, sharing best forensic practice and live crime scene demonstrations. For 2015, Forensics Europe Expo will place an emphasis on the world of Digital Investigations, looking at elements of mobile phone, computer and general system forensics to help solve serious crime. With the rise of crime carried out with the use of the internet, visitors will be able to learn about best available systems to stop hackers, ways to monitor all activity and how they can use the devices to provide evidence in the court room. All professionals working to help prevent and solve digital crime must attend the event to learn the best available techniques. CO-LOCATED SHOWS Forensics Europe Expo will once again be co‑locate alongside the counter terrorism and security event, Counter Terror Expo where visitors will be able to see a live forensic analysis of a post IED scenario. It will also co-locate alongside Ambition, connecting visitors to senior professionals within all emergency services sectors. To register for either a free exhibition pass or a conference delegate pass, please visit www.forensicseuropeexpo.com/ register. All entry is by pre-registration only and registrations on-site will cost £50. L FURTHER INFORMATION www.forensicseuropeexpo.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

53


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RUGGED TECHNOLOGY

IT HARDWARE AS TOUGH AS A SECURITY OPERATIVE, INSIDE AND OUT Operatives in the security services increasingly need more equipment to effectively carry out their roles. This demands technology that offers greater convergence – as well as meeting the ongoing demand for lighter weight, thinner size and longer battery life That demand is recognised by global designer and manufacturer of rugged mobile computing solutions, Getac, which offers the highest level of convergence in its rugged mobile devices. The need for live information at the point of incident means the ability to communicate and display data is critical. Expectation and capability will both grow when the Emergency Services Mobile Communication Platform (ESMCP) launches in 2016. Essentially it is a dedicated, nationwide 4G mobile broadband network for the use of emergency services personnel. It should be immediately clear what this means for the security sector: in addition to significantly improved connectivity for voice communications this network can be used for the transmission of vital data across the country, including documents, pictures and video. MEETING DEMAND To meet that forthcoming demand, Getac’s T800 8” Windows tablet incorporates a variety of leading communication technologies to maximise connectivity. It can be configured with 4G LTE cellular data with an auto tunable 8-band antenna capable of quickly switching between bands. It also includes the latest 802.11ac Wi-Fi for data transfer speeds up to 3 times faster than 802.11n products. In common with all of Getac’s fully rugged devices, the T800 is MIL-STD 810G and IP65 rated, meaning it can handle shock, drops and vibration while also being sealed against dust and water. It also operates at temperatures of -21°C to +50°C, making it the right device when working in this critical environment. At just 24mm thick and weighing 880g, with the latest Intel quad-core N3530 2.16 GHz processor and leading edge communication capabilities, the T800 combines portability with power for the individual working in security services. With GIS applications growing in importance, operatives can benefit from deployment on a device with a larger screen size, able to display detailed data clearly. The 11.6” F110 Windows tablet offers fully rugged performance and

incorporates a sunlight-readable large HD (1366x768) display, ideally suited for operations where planning and mapping is essential. SERVER PERFORMANCE For situations where server performance and features are needed, the X500-G2 Rugged Mobile Server offers users the ability to deploy server capability at the start of operations. MIL-STD-810G certified and IP65 rated, the X500-G2 offers as standard a large 15.6” HD (1920x1080) QuadraClear® display (800nits) which provides enhanced screen readability under sunlight and graphic capability in outdoor environments. Powered by the Intel® Core™ i7 vPro™ processor with 32GB RAM and 500GB storage as standard, the X500-G2 offers the power required in the field. Further configurations include RAID holding up to five shock-protected disk drives, offering up to six terabytes of storage. Getac also has established strategic relationships with the software and hardware security developers, Becrypt and Viasat, to create devices which feature the latest and most secure functionality. For instance, the Getac Z710 7” Android rugged tablet, is built with Becrypt’s Titan II security and device management platform, which provides a fully secure system that can support a range of applications that security operatives can use with confidence. Operational success requires the right equipment, which will survive in some of the most hostile conditions. With a full range of rugged mobile computer solutions, Getac can offer advice, support and the right tools to help security operatives provide the most effective service to the public. 

Getac’s dows Win T800 8”corporates tablet iny of leading a variet unication comm logies techno imise to max tivity connec

54

COUNTER TERROR BUSINESS MAGAZINE | Issue 20

FURTHER INFORMATION If you would like to discuss any aspect of your rugged computing requirements, call 01952 207 221, e-mail: sales-getac-uk@ getac.com or visit www.getac.co.uk


REMOTELY PILOTED AIRCRAFT

MAKING THE CASE FOR DRONES Can drone technology, under proper legal regulation, deliver significant benefits for the UK’s national security policy and economy? A report from the University of Birmingham Policy Commission examines the issue Drone technology, both civil and military, under proper legal regulation, can continue to deliver ‘significant benefits’ for the UK’s national security policy and economy in the coming decades. That is the conclusion of a new University of Birmingham Policy Commission Report. But the Government, and especially the Ministry of Defence (MoD), should do more to reach out to the public over what the Commission sees as the globally inevitable use of drones in armed conflict and in domestic surveillance. The Report, titled The Security Impact of Drones: Challenges and Opportunities for the UK, finds that over the next 20 years, drones – or what the Commission and the RAF prefer to call Remotely Piloted Aircraft (RPA) – will become an integral part of Britain’s aerospace capability, providing both advanced surveillance and precision weapons delivery. They can support UK forces deployed overseas, as in Afghanistan, or help prevent mass atrocities, as with the British Government’s decision to deploy the RAF Reaper fleet against the Islamic State (ISIS). This decision was announced after the Report was completed but is entirely consistent with its conclusions. DECISIONS TO BE MADE The Report examines the distinctive and unavoidable choices for the United Kingdom over a crucial emerging technology

and sets out the under-appreciated distinction between legally constrained British practice and the US Government’s cross‑border counter-terrorism strikes which dominate and distort UK public debate. The Commission considers various moral arguments and concludes that the current and emerging generation of RPA pose no greater ethical challenges than those already involved in decisions to use any other type of UK military asset. The Report shows clearly that the UK has operated its armed Reapers in Afghanistan according to the same exceptionally strict Rules of Engagement (no weapon should be discharged unless there is ‘zero expectation of civilian casualties’) that it applies to manned aircraft. But the Commission adds its voice to the wider coalition of international opinion that warns against the development of ‘killer robots’ – or what the Commission terms Lethal Autonomous Weapons Systems (LAWS) in accordance with the emerging international legal terminology. The Commission believes that it will not be possible to develop

autonomous weapons that can meet the core legal obligation under international humanitarian law to distinguish between combatants and civilians. As a result, the Commission recommends that the UK Government take a leading role in the arms control negotiations that are due to resume next month in Geneva. But it recognises that some nations may ignore such restraint. The Commission therefore urges the UK to lead efforts to build a new international consensus around an effective ban.

Drone Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

BRINGING TOGETHER EXPERTISE Launched on 22 October in Whitehall at the Royal United Services Institute, the Report brings together the expertise of leading academics at the University of Birmingham and senior figures with backgrounds in the military, aerospace industries, the UK’s intelligence and policing communities, and international law. Policy Commission Chair Sir David Omand, the first UK Security and Intelligence Coordinator and a former Director of GCHQ, said: “For too long drone technology has carried a burden of ethical suspicion given its controversial use for counter-terrorist strikes by the US. The recent decision to deploy RAF Reaper to Iraq is a welcome sign in line with our findings of the growing acceptance of RPA technology as an essential component of modern military capability – provided it is used strictly in accordance with international law, in the same way as for other UK weapons systems. RPA add precision targeting capabilities and long loiter times that can minimise civilian losses and protect friendly troops. We need not fear that their use by the UK Armed Forces represents a shift in the ethical framework of modern warfare. RPA will also have an important role in future in civil security and commercial use. This Commission has highlighted E

Drone y og technolnue to ti can con ignificant ‘s deliver for the UK’s s’ benefit nal security natio d economy n policy a e coming in th des deca

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

55


TransporT securiTy expo Booth D20

www.rapiscansystems.com

ONE COMPANY - TOTAL SECURITY


Drone Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The University of Birmingham Policy Commission Report, The Security Impact of Drones: Challenges and Opportunities for the UK

 the need for more work on the policies for such applications, and we hope that our findings will help clarify the issues that will need more attention, as well as providing a vision for how the UK can exploit this innovative technology.” Academic lead Professor Nicholas Wheeler, Director of the Institute for Conflict, Cooperation and Security at the University of Birmingham, said: “The University of Birmingham has a fine tradition, going back to the beginning of the 20th century, of public policy engagement on matters of emerging national concern, and I am delighted that this Policy Commission, like its five predecessors, has built on this distinguished record. It has been a pleasure to work with the chair, Sir David Omand, and to bring together the diverse expertise of the other Commissioners.” KEY FINDINGS There are three main obstacles affecting the UK Government’s use of drones that must be overcome: gaining public understanding and acceptance of the legal and ethical soundness of the practice; allaying fears over the potential development of LAWS; and safeguarding British airspace and the privacy of British

citizens if drones are to be increasingly used for domestic surveillance and security. The Report states: “With the right policy choices to overcome these challenges, the Commission believes that significant benefits can be reaped – military and civil – from RPA capabilities. We have, in our report, ventured a description of a position of which the UK could be proud over the next 20 years.” Specifically, the Commission assesses that future RPA, both ISR [intelligence, surveillance and reconnaissance] and armed, based upon a legally sound mandate,

military personnel to avoidable risk. The Ministry of Defence must do more to reassure the public that RPA will continue to be subject to the same strict rules as other weapons systems and to overcome pervasive confusion between RAF practice and the US use of armed drones beyond legally accepted theatres. Whatever decisions are taken by the British Government, the threat to deployed UK forces and UK interests from RPA operated by hostile groups and states must be expected to increase.

New integrated policies are required to regulate Remotely Piloted Aircraft in civil airspace in the UK and on the rules that should apply to their use by police and security authorities for surveillance purposes should continue to make a positive contribution to UK national security. Careful decisions on the deployment and specific use of drones need to be made on a case-by-case basis at a senior level of command. There is no convincing ethical objection to acquiring RPA, while the ethical acceptability of their armed use is dependent on context and control. Indeed, it may be positively ethically desirable to use them rather than other kinds of firepower which are less capable of avoiding civilian casualties and which expose UK

The Commission supports the UK Government’s decision not to develop LAWS and urges it to take a leading role in securing an international framework for their control. New integrated policies are required to regulate RPA in civil airspace in the UK and on the rules that should apply to their use by police and security authorities for surveillance purposes. The Home Office should lead on drawing up a code of practice and addressing public privacy issues. L FURTHER INFORMATION www.birmingham.ac.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

57


tVolution Mini

proactive cyber defence at an unbeatable price

Secure, ultra low cost thin client and remote access solution. Smaller than a mobile phone but with the power of a PC, tVolution Mini is an innovative security solution that leverages new generation ‘system on chip’ technology to transform any monitor or TV into a secure work terminal. tVolution Mini provides organisations with a highly cost effective, secure and centrally managed thin client and remote access device for handling ‘OFFICIAL’ data, supporting compliance for government systems, and meeting Public Services Network (PSN) requirements for managed devices.

To find out more about this unique security solution please contact us on 0845

838 2050 or go to marketing.becrypt.com/tvmini

Assured cyber security products for all your mobile devices


IMPACT OF TERRORISM

CHARTING THE RISE IN GLOBAL TERRORISM

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The number of lives lost to terrorist attacks increased by 61 per cent in a single year, according to the second edition of the Global Terrorism Index (GTI), which measures the impact of terrorism across the globe The index also recorded a 44 per cent increase in the number of terrorist incidents, rising from 6,825 in 2012 to 9,814 in 2013. Explosives accounted for the majority of these attacks, while suicide bombings accounted for less than 5 per cent. First launched by the Institute for Economics & Peace (IEP) in 2012, the GTI ranks countries by the impact of terrorist activities as well as analysing the economic and social dimensions associated with terrorism. The index scores 162 countries, covering 99.6 per cent of the world’s population, and examines trends from 2000 to 2013. The indicators used include the number of terrorist incidents, fatalities, injuries and property damage. Over 80 per cent of the deaths from terrorist attacks in 2013 were in just five countries: Iraq, Afghanistan, Pakistan, Nigeria and Syria. Iraq continues to be the country most impacted by terrorism with 2,492 attacks killing 6,362 people, which represents a 164 per cent increase from 2012. ISIL was responsible for most of the deaths in the country. THE REST OF THE WORLD Terrorism has also grown significantly in intensity and breadth outside of these five countries. In 2013 there were 3,721 attacks recorded in the rest of the world killing 3,236 people, an increase of over 50 per cent YOY. A total of 60 countries recorded deaths from terrorist attacks in 2013. Steve Killelea, executive chairman of IEP, said, “Terrorism doesn’t arise on its own; by identifying the factors associated with it, policies can be implemented to improve the underlying environment that nurtures terrorism. The most significant actions that can be taken are to reduce state-sponsored violence such as extra-judicial killings, reduce group grievances and hostilities, and improve effective and community-supported policing.” There are three statistically significant factors associated with terrorism: state sponsored violence, group grievances and high levels of criminality. Interestingly, poverty rates, levels of school attendance and most economic factors have no association with terrorism. The strong relationship between terrorism and other forms of violence underlines how

the persistent targeting of police forces and the instability generated by terrorist activity can undermine the rule of law. Steve Killelea commented:“Since we first launched the GTI in 2012, we’ve seen a significant and worrying increase in worldwide incidences of terrorism. Over the last decade the increase in terrorism has been linked to radical Islamic groups whose violent theologies have been broadly taught. To counter-act these influences, moderate forms of Sunnis theologies need to be championed by Sunni Muslim nations. Given the theological nature of the problem it is difficult for outside actors to be influential.” The report also sources both high and low estimates of foreign fighters who are actively fighting in Syria, utilizing the best available data. The low estimations for number of fighters from Europe are

substantial increases in terrorism have been identified. At least 13 countries are facing a greater risk of substantial terrorist activity: Angola, Bangladesh, Burundi, Central African Republic, Cote d’Ivoire, Ethiopia, Iran, Israel, Mali, Mexico,

Iraq continues to be the country most impacted by terrorism with 2,492 attacks killing 6,362 people. This represents a 164 per cent increase from 2012, with ISIL was responsible for most of the deaths in the country 396, with the high estimates at 1,846, while the low estimate for the MENA is 1,930 and the high estimate is 6,664. POLICING AND POLITICAL PROCESS The two most successful strategies for ending terrorist groups since the late 1960s have been either policing or the initiation of a political process; 80 per cent of organisations that ceased operations ended this way. Only 10 per cent of terrorist organisations ended due to having achieved their goals while 7 per cent were eliminated by full military engagement. The GTI also provides guidance for assessing the risk of the potential of future attacks in countries where there are currently low levels of activity. Based on measuring various political, violence and group relationship indicators, countries at risk of

Myanmar, Sri Lanka and Uganda. Since 2000, around 7 per cent of all terrorist incidents and 5 per cent of all fatalities have occurred in OECD countries resulting in 4,861 deaths from 3,151 attacks. OECD‑based terrorism in 2013 was slightly down from 130 deaths and 333 incidents in 2012 to 113 deaths and 311 incidents in 2013. Many more people die in homicides than in terrorist attacks, with an individual being 40 times more likely to be a victim of homicide than be killed by terrorism. In the UK an individual is 188 times more likely to be victim of a homicide, and in US 64 times more likely. L FURTHER INFORMATION The full Global Terrorism Index report and interactive map are available at: www.visionofhumanity.org

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

59


4

World BORDERPOL Congress

th

8th-10th December 2015 The Hague, Netherlands

Enhancing collaboration in global border protection and management challenges.

Save The Dates The World BORDERPOL Congress is the only multi-jurisdictional transnational platform where the border protection, management and security industry policy-makers and practitioners convene annually to discuss the international challenges faced in protecting not only one’s own country’s borders, but those of neighbours and friends. Join us for developing co-operation and collaboration through high level discussions and presentations on the future for border protection and management. We look forward to welcoming you to The Hague, Netherlands on 8th-10th December 2015 for the next gathering of border and migration management professionals.

www.world-borderpol-congress.com

Owned & Organised by:

Supported by:

Media Partners:


EVENT REVIEW

PROTECTING THE WORLD’S BORDERS The 2014 BORDERPOL Congress in Hungary gathered the world’s leading border security professionals to discuss some of the latest issues and challenges facing our borders and the agencies tasked with protecting and managing them The operation of today’s border security, traveller and migration management community is being stressed by geopolitical, social and economic events. Our world is fully interdependent, and it is becoming ever more challenging to find solutions which include the utilisation of border services and agencies to protect national. As the crisis in Eastern Europe escalates, economic sanctions and travel bans are increasing, being employed by the USA, EU, and Russia, as well as their allies. Border services are front-line responders for monitoring these sanctions and bans. With the Ebola virus spreading within and beyond West Africa, travel bans and possible quarantine measures are being put into place. Border services are now front-line responders for monitoring these bans and for detecting travelers who may be infected. DIRECTING PEOPLE MOVEMENT As the post-World War One borders of Iraq evaporate and a new entity known as Islamic State of Iraq and the Levant emerges, hundreds of thousands of persons are being displaced and are fleeing the region. Border services are now front-line responders for monitoring, recording and directing the movement of these people, most of whom will be refugees. The United States is having to deal with an unprecedented and clearly well‑orchestrated movement of tens of thousands of people – mostly children and adolescents from Central America – arriving at its border with Mexico, its border services are monitoring, detaining and caring for these people in unprecedented numbers. As China, the world’s most populous nation, develops a formidable navy and air force and is posed to succeed the United States as the world’s number one economy, it is flexing its economic and political muscle in Asia and beyond. Border services everywhere are now being pressed to be front-line responders monitoring the import and export of strategic

goods and services to and from China. Since the end of the Cold War, there has been a deeply-held belief within the developed world that political and economic integration is the best way to improve global security and avoid potential conflict everywhere. This has created a paradox: the interdependent the world is supposed to make it less likely that extreme conflict between nations or groups of nations will occur. This very interdependence makes it imperative that nations cooperate, communicate and consult with one another in a multi‑jurisdictional and inter-disciplinary manner. The third World BORDERPOL Congress took place on 9-11 December 2014 in Budapest, Hungary. It brought together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place and discuss some of the latest issues and challenges facing our borders and agencies tasked with protecting and managing them. Some of the most interesting discussions revolved around the sharing of information, the effects of cyber crime across borders and UAV technology and how to exploit it. Col dr Gizella Vas, Head of Hungarian Border Policing Unit, Hungarian National Police delivered an opening keynote presentation, setting the scene and tone of discussion. Mr Vladimir Goshin Minister in charge of Customs Cooperation of the Eurasian Economic Commission (EEC) discussed aspects of ECC work connected with the unification of corpus delicti and sanctions for customs crimes, such as smuggling, illegal import and export of pieces of art, drugs, and so on. He also discussed the coordination of all border agencies in the Union, such as customs, border services and immigration, and the simplification of customs codes and processes.

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DISCUSSING THE CHALLENGES The Congress programme included an opening session on migration movement challenges, from human trafficking to illegal migration. There were panel discussions on what border security administrations must do to remain effective and as well as the life expectancy of the passport booklet. There were speakers from organisations including the Singapore Immigration & Checkpoints Authority, International Organisation for Migration, Royal Netherlands Marechaussee and INTERPOL. Other interesting discussions included exit controls, whether they should be reintroduced universally, and if so, how to best share the necessary information across multiple agencies and stakeholders and setting international standards in IBM. In the field of counter-terrorism, James Douglass and George Trebess of the National Counter Terrorism Policing HQ in the UK talked about UAV technology, how to exploit the opportunities they present, and at the same time manage the threat they pose. James discusses the strategic perspective and george gave a detailed operational and tactical review. EVENT HIGHLIGHTS Minister Abba Moro, Minister of Interior, Nigerian, signed an agreement to make Nigerian Immigration Service the first African agency to become a full member of BORDERPOL. Commissioner Clarence Yeo was the recipient of the first BORDERPOL ‘Excellence in Border Management’ award on behalf of Immigration & Checkpoints Authority of Singapore. There was an award of a special citation for the Hungarian Border Police to recognise their sustained support for BORDERPOL and its aims since its inception. Thomas Tass, Executive Director of BORDERPOL, received a ‘Recognition Award’ from Mr. Muhamad Anil Shah Abdullah, Director for Police Services, Assistant Commissioner of Police, ASEANAPOL for his work in promoting IBM worldwide. Mr. Abdullah also stated the intention of ASEANAPOL to work more closely with BORDERPOL in the coming years. BORDERPOL also announced that the next World BORDERPOL Congress is to be held in The Hague from the 8-10 December 2015. L

Border re a services t‑line n now froders for respon , recording ring monito irecting the and d ment of move cluding in people,ugees ref

FURTHER INFORMATION www.world-borderpolcongress.com

61



EVENT REVIEW

Transport Security Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DEBATING TRANSPORT SECURITY ISSUES

4,037 visitors from all corners of the globe gathered at this year’s Transport Security Expo and immersed themselves in the latest thinking in maritime, aviation and rail security The 12th annual Transport Security Expo proved to be a breakthrough year for the show with increased foreign engagement, new programming and free conferences raising the bar for the event and the industry as a whole. A total of 4,037 visitors from all corners of the globe gathered at London’s Olympia for two days of networking and education from 2-3 December while exhibitor rebookings on site rose to 81 per cent as the decision to open up conference sessions as free for

SECURE TRANSPORTATION New for 2014, the Secure Transportation Conference covered the everyday secure transportation of people, goods and high‑value assets across the commercial world. It covered the protection of high value assets, hazardous materials transport, protection and security for high-net-worth individuals, and VIPS, and covert intelligence gathering. Presenters included Brink’s Global Services Director Phil Wright, Arts Council England

The rail security conference addressed all areas of rail security from terrorism and cyber attacks to crime prevention and metal theft with speakers including British Transport Police’s counter terrorism lead Superintendent David Roney and Dr Herve Borrion from the UCL Department of Security and Crime Science all paid dividends and drew widespread approval from the companies present. The maritime, aviation, rail, major events and secure transportation conferences were standing room only for most of the two days while the innovative Live Demonstration Theatre, ran in conjunction with CrisisCast, proved a fine visual centrepiece for the show’s visitors.

National Security Advisor William Brown and Counter Terrorism Security advisor for Cleveland Police John Bickerstaff. From mega events such as Royal Weddings, the Olympics and World Summits to major music festivals, sporting events and political rallies, somewhere in the world there are teams of specialists planning the investment

and management of those events’ security requirements, specifically in transportation. The major events transport security conference, the second of two new conferences with Secure Transportation, looked at lessons from the past, actions for the present and what the future of major events transport security holds. Speakers included Stephen Phipson from the Office for Security and Counter Terrorism, Shuna Mayes, Head of the Commonwealth Games Safety and Tim Cutbill, Head of Operational Resilience for London Fire Brigade. Attendees of the rail security conference included transport police, government authorities, owners, operators and heads of security, who face an enormous challenge in securing mass transit systems. With millions of passengers in transit, implementing enhanced security whilst not reducing throughput is a critical balance. On top of this the threat posed not only from terrorism but also serious organised crime, cyber, sabotage, cable theft and also the challenge of suicide is a vast task. The rail security conference addressed all areas of rail security from terrorism and cyber attacks to crime prevention and metal theft with speakers including British Transport Police’s counter terrorism lead Superintendent David Roney and Dr Herve Borrion from the UCL Department of Security and Crime Science. E

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

63



EVENT REVIEW  MARITIME SECURITY The current state of play in maritime security including implications for the global supply chain, piracy and the cyber threat were covered in the maritime conference courtesy of UK National Maritime Security Committee Chairman Gavin Simmonds, INTERPOL Maritime Security Head Dimitrios Souxes and former Royal Navy Commander-in-Chief Fleet Sir James Burnell-Nugent among others. The conference covered port issues, focusing on physical security, cyber security, information security, supply chain, business continuity, human factors, sabotage and serious crime. Next on the agenda was the issue of protecting vessels and crew against acts of piracy on the seas and also keeping cargo safe end-to-end across the entire supply chain. The two-day conference on aviation security brought together over 300 aviation security practitioners to share and debate latest thinking on keeping our airports, planes, people and freight secure. The conference saw presentations on the evolving terrorist threat, dealing with increased passenger numbers and technology innovation in aviation security. Speakers included Heathrow Airport

Security Director Francis Morgan, Airport Operators Association policy director Rebecca Roberts-Hughes and IBM Head of National security, Middle East and Africa, Paul Burke. It was a truly international show with 89 countries of which 23 were hosted by the Government’s UKTI DSO. The Operational Manager at Rotterdam The Hague Airport, Netherlands, praised the event for its “perfect preparations” during and prior to the show while the General Manager of EFACEC, Portugal, was impressed by the “full support of all needs” provided to all foreign delegations. From Saudi Arabia, the delegation from the National Integrated Project for Airport Security also congratulated organisers on the success of the event and added that it represented a tremendous opportunity to “participate in such a great event” while the Romanian delegation commented on their success in “discovering new business partners and the overall professionalism.” Turkey was a particularly popular country at the event and met with the Home Office on-site. The delegation said: “It was a fantastic event. I commend the organisers for all

rt Transpoty Securi truly as a Expo wional show t interna9 countries with 8 hich 23 of w d by the ste were ho rnment’s Gove DSO UKTI

their hard work with the Turkish delegation in what was a very beneficial event.” As a whole foreign delegations were delighted to see they were given full support to maximise their time at the event and increase business contacts and seal deals. On the exhibitor side more than 140 global blue chip security manufacturers supported the show including Bosch Security Systems, L-3, Excelerate, Stoof International, SELEX ES and Brinks Global Services. Ray Cooke, Vice President, Global Business Development, Samsung Techwin added: “The event had a very good quality of exhibitors and of presenter content. The organisers really achieved a great forum for our industry’s established and newly emerging innovators, and for the customers they serve. A lot of work, well executed – for a most worthy event indeed.” Peter Jones, ceo of organiser Nineteen Events, added: “This year’s event really took TRS to a whole new level in terms of innovation, execution and foreign engagement. Our game‑changing decision to make conferences free for all and spread the knowledge of our world class line-up of speakers and the phenomenal turn out of country delegations really confirmed the event as the de facto meeting place for the industry to learn, network and do business.” L

Transport Security Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.transec.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

65


Man and Machine Training Academy

Man and Machine offer an extensive range of Autodesk 2015 training courses

Man and Machine specialise in Autodesk training for Manufacturers, Engineers, Architects & Product Designers. All courses are taught with the official Autodesk courseware and includes one month’s free post training support. Autodesk AutoCAD courses include: • • • • •

AutoCAD Essentials AutoCAD Electrical Fundamentals AutoCAD Advanced AutoCAD 3D Drawing & Modelling AutoCAD Mechanical Essentials

E: marketing@manandmachine.co.uk W: www.manandmachine.co.uk T: 01844 263 700

Connect with us


COMPUTER AIDED DESIGN

EXPERTISE IN DIGITAL DESIGN SYSTEMS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Man and Machine specialises in the supply of CAD solutions to manufacturers, plant designers, engineers, architects and product designers Established in 1989, Man and Machine is part of a pan-European group, operating in 11 countries, with over 750 staff and over 500,000 installed CAD seats. We provide expertise in digital design and data management with over 60 years of combined technical experience and extensive industry. Our specialist knowledge has allowed us to develop a wide variety of services that address the needs of our customers’ across multiple industries to enable them to design, visualise, and simulate to the highest standard. Our goal is to help you optimise your design process. Whether you are in the manufacturing, engineering, architecture, plant or construction industries, we have the experience to understand your business and what you are trying to achieve, and we have the expertise to enable you to do it better. PROFESSIONAL TRAINING CENTRE Man and Machine’s professional training centre is a fantastic environment where customers can learn from industry experts, gain authorised qualifications and ensure that any CAD investment is utilised to its full potential. If you are looking to improve design efficiency, reduce costs and bring products or infrastructure to market faster, Man and Machine’s consultative approach will help you to gain a competitive advantage and leverage your own expertise

to increase productivity and innovation. Being an educationally-rich environment, the training academy allows you to select an appropriate learning track to help you derive the most from your software investment. Man and Machine offer a range of Autodesk Accredited 2D and 3D CAD Training courses ranging from the basic essentials training through to advanced concepts and modelling for designers, as well as courses in data management solutions such as Autodesk Vault for engineers and IT professionals. We also have a wide range of training courses in the Manufacturing space covering mechanical and electrical design, simulation, visualisation and computer aided manufacturing (CAM),

as well as specialist courses in areas like sheet metal design and visualisation in the automotive industry. Scheduled and bespoke classroom based training is available in our training centres, as well as bespoke training being available at customer sites. AUTOCAD COURSES AutoCAD is one of the industry’s leading 2D design tools with additional functionality provided for mechanical and 3D design. We offer courses that comprehensively cover the AutoCAD workspace and toolset covering areas such as basic editing tools, organising objects, using symbols and adding, using and generating geometry.

transportation amongst others. There is a wide selection of courses to choose from in the Man and Machine Training Academy. We have a variety of standard scheduled training courses as well as specialist and tailor made courses to meet your specific requirements, these can be carried out in one of the Man and Machine offices in Oxfordshire, Birmingham, Newcastle, Bristol or Manchester. There is also the option to have one of the highly skilled technical consultants visit your own premises and have the training on site. This allows you to put your training skills to the test in your own working environment. To ensure learning outcomes are met, all of our CAD training solutions come with post training

“Man and Machine were able to drop straight in as our new reseller and provide a seamless transfer from our previous supplier. They have been able to give us all we need on the software side and have also provided a flexible training program for a couple of our new starters” Nick Slater – ITAB Shop Concept

Autodesk® AutoCAD Electrical is optimised for electrical automation and control design. This course covers areas such as designing electrical schematics and single line diagrams as well as generating control panel assemblies, specifically looking at developing skills to assist common design tasks and facilitate drafting productivity using project files, symbol libraries and circuit templates. Autodesk® Inventor is one of the most widely used 3D design tools in manufacturing design. The product has extensive capabilities and is widely adopted across industry for mechanical design projects in many different industries including sheet metal, industrial machinery, fabrication, automotive and

support for one month. Students also receive an Autodesk or Man and Machine certificate on completion and all Autodesk CAD courses are taught using the official Autodesk courseware. Man and Machine are an authorised Autodesk Training Centre (ATC) and an approved Certification Centre, allowing students to receive an industry recognised Accreditation. L FURTHER INFORMATION For more information on all of the CAD services Man and Machine provide including our latest training schedule and upcoming webinars please visit www.manandmachine.co.uk, call 01844 263700 or email marketing@manandmachine.co.uk

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

67


An Excelitas Technologies Company

Global Presence... ...Far Reaching Capabilities Image intensified sights Thermal sights Fused sights Defence modules Avionic optical displays Tactical infra red Space applications Integrated logistic support

Qioptiq phone: +44 (0)1745 588000 www.qioptiq.com FOR THE LATEST INFORMATION VISIT:

www.qioptiq.com


PHOTONIC SOLUTIONS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

OPTICAL EXPERTISE ENABLES MISSION SUCCESS Qioptiq, an Excelitas Technologies company, designs and manufactures photonic products and solutions that serve a wide range of markets and applications in the areas of medical and life sciences, industrial manufacturing, defence and aerospace, and R&D. Innovation has long been recognised to be a key attribute of the success of Qioptiq along with highly skilled and motivated engineers and designers who are customer focused. With world class capability in design, coupled with international award winning technical achievement, Qioptiq has demonstrated repeatedly an ability to convert technical innovation into producible cost-effective designs. Where the war-fighter is concerned Qioptiq has long recognised that new product development is crucial in maintaining the capability of a decisive fighting force. For the Special Operations element of that force ensuring mission success through innovative technology applications is vital especially as operations shift from Afghanistan and previously Iraq to new territory and an adaptive evolving enemy. THE CHALLENGES OF TOMORROW To stay ahead constant innovation, research and technology is important, allowing engineers to consider the challenges of tomorrow and respond through an innovative approach. With a number of potentially revolutionary capabilities emerging as key enabling technologies the roadmap for Surveillance, Target Acquisition and Engagement is becoming increasingly interesting - with significant enhancements in sighting system capability through technology evolution and deeper integration. Craig Taylor, Marketing Communications, Defence and Aerospace, Qioptiq, commented: “Capturing new technological developments and successfully exploiting them is not a new concept. However, what is important is constantly considering new opportunities and adapting our approach. In a changing market, what’s important for our customers is our ability to deliver world-leading products that are effective, efficient and adaptable. In an environment of constrained defence spending,

cost effectiveness is also a key consideration.” Financial constraints in any industry mean time and money allocated for product design and development come under pressure. However the Special Forces community still need to procure new and specialised equipment as they seek to source gamechanging technology. Qioptiq therefore has an important role to play in continuing to push the boundaries of Weapon Sights & Surveillance Equipment for End-Users with some significant product and technology development activity coming to fruition. SIGHTING SYSTEMS It’s widely recognised that modern small arms weapon systems are incredibly accurate and reliable, and that the challenge is being able to DRI the target 24 hours a day, through all weathers and battlefield conditions, with users under physical and cognitive pressure. Sighting Systems need to be easy to use, effective through all weathers and provide the ability to detect targets at the maximum range possible in order to prepare the user for the next course of action. The challenge for Qioptiq is to provide all of this capability to the user in a package (or suite) that is easy to use and easily configurable for role / mission requirements, whilst remaining affordable and having the potential to endure a service life of 10-15 years. Steve Rickard, Qioptiq Business & Product Development Manager: “Qioptiq are totally committed to reducing the size weight and power burden placed on the end User – developing the battle winning equipment, while maintaining affordability. We will continue to develop, push forward and challenge the boundaries to ensure we always stay one step ahead” When considering soldier and vehicle systems, one is likely to find high performance optics from Qioptiq enabling thermal weapon sights (TWS), observation & targeting sights,

night vision goggles (NVG), remote weapon stations (RWS), driver’s vision enhancement (DVE), situational awareness (SA), laser designators, eyepieces, helmet mounted displays (HMD’s), fire control, and laser range finders (LRF). In tactical missile systems one finds advanced domes from Qioptiq in a wide range of materials including ALON, Spinel, Sapphire, MgF2, ZnS, Cleartran, Silicon, and Germanium with complex geometries. Missile warning and targeting systems are enabled by Qioptiq High performance optical systems for IR and ultraviolet missile warners (MWS), IR countermeasures (IRCM), IRST, targeting pods - along with precision long-range zoom modules for border-surveillance, UAV and maritime applications in surveillance systems. Qioptiq provides solutions to meet the individual requirements of its customers. Outstanding expertise has earned the company a worldwide reputation for innovation and excellence. Qioptiq has a complete inhouse capability to process the full range of optical materials and to design, fabricate, polish, coat, and mount optical elements. A flexible approach during design is matched with the capability across the visible to IR wavebands, providing integrated optical solutions with any sensor technology currently available. With a combination of dynamic engineering, manufacturing expertise, motivation and reputation, Qioptiq has the total capability to provide some of the most innovative and focused optical solutions to today’s technological challenges. This strategic approach has made Qioptiq the preferred choice for a wide variety of prime contractors and military establishments around the world. From boots on the ground to eyes in the sky Qioptiq capabilities are enabling mission critical systems and platforms in some of the harshest environments on the planet. L FURTHER INFORMATION www.qioptiq.com

Issue 20 | COUNTER TERROR BUSINESS MAGAZINE

69


Westcombe Engineering Part of the Bigger Picture Westcombe Engineering – an established sheltered engineering business that is owned and operated by Peterborough City Council, employing disabled workers. Westcombe Engineering – offers high quality precision machined parts and assemblies at competitive prices for small, medium and large batch sizes. Westcombe Engineering – areas of expertise include:  CNC milling, machining and turning to specification.  Small, medium and large batch runs.  Prototype manufacture and assembly.  Prototype design and development.  Working in aluminium, steel, iron, copper, plastics and exotic metals.  Assembly work.  Reverse engineering.  General precision engineering. For further details, please contact Westcombe Engineering: Tel: 01733 452575 Email: westcombe@peterborough.gov.uk or jeff.bellamy@peterborough.gov.uk Jeff Bellamy (MD) – 07908 644946 www.westcombeengineering.com


DEFENCE MARKETS

Russian arms manufacturers witness growth despite global downturn Despite a downturn in global defence spending, sales by Russian arms manufacturers continue to expand, a Stockholm-based think-tank has revealed. Sales by Russian-based arms firms grew by 20 percent in 2013, according to the Stockholm International Peace Research Institute (SIPRI). “The remarkable increases in Russian companies’ arms sales in both 2012 and 2013 are in large part due to uninterrupted investments in military procurement by the Russian Government during the 2000s. These investments are explicitly intended to modernize national production capabilities and weapons in order to bring them on par with major US and Western European arms producers’ capabilities and technologies,” said Siemon Wezeman, senior researcher at SIPRI. Sales of arms and military services by the largest arms-producing companies — the SIPRI Top 100 — totalled $402 billion in 2013. This is the third consecutive year of decline in the total arms sales of the 100 largest arms producers and military services providers. With a decrease in sales of two per cent in real terms compared to 3.9 per cent in 2012, the pace of the decline has slowed slightly. This is partly attributable to significant increases in arms sales by Russian companies and other emerging suppliers. “The share of global arms sales for companies outside North America and Western Europe has been increasing since 2005,” says Dr Aude Fleurant, Director of SIPRI’s Arms and Military Expenditure Programme. “For 2013, at

15.5 per cent of Top 100 arms sales, this share is at its highest point in the history of the SIPRI Top 100, which does not include China-based companies due to a lack of reliable data.” For 2013, SIPRI has created a new category for emerging suppliers ranked in the SIPRI Top 100 in order to better track their evolution. This covers arms-producing companies located in the Global South, including Brazil, India, the Republic of Korea (ROK, South Korea), Singapore and Turkey. Collectively, emerging suppliers’ arms sales represent a modest share of the Top 100 global sales (around 3.6 per cent). However, the growth in 2013 of some suppliers has been impressive. For example, sales by South Korea’s Korean Aerospace Industries grew by 31 per cent in 2013, while Brazil’s Embraer and Turkey’s Aselsan continue to increase their respective positions in the Top 100 following their first appearance READ MORE: in the 2011 tinyurl.com/oyqpjkj rankings.

WAR AGAINST ISIL

RAF Reaper continues to support Iraqi forces against ISIL Royal Air Force aircraft operating in support of Iraqi ground forces have seen further action against the ISIL terrorist network. A RAF Reaper conducted armed reconnaissance in northern Iraq, where ISIL are facing increasing pressure from the Kurdish peshmerga. The Reaper’s mission focused on engineering equipment being used by the terrorists to construct defensive positions to hold up peshmerga advances. The remotely piloted aircraft was able to locate two of these

engineer vehicles, and attacked them with Hellfire missiles. Further south, another Reaper identified an ISIL armed pick-up truck and engaged it with a Hellfire missile. RAF Tornado GR4s were also providing surveillance for the Iraqi army in Anbar province, and were able to assist Iraqi soldiers engaged in a firefight with terrorists near Ramadi. Paveway precision guided bombs and Brimstone missiles were used to deal with ISIL fighting positions and 3 vehicles, including 2 armoured personnel carriers.

READ MORE: tinyurl.com/nd9el55

NEWS IN BRIEF US Congress approves huge defence spending bill The US Congress has approved a sizeable US defence spending bill for 2015 which includes emergency funding for military operations in Iraq and Syria, as requested by President Obama. It outlines $584.2 billion in federal military spending for the fiscal year 2015, which began on October 1. The National Defense Authorization Act (NDAA) was a culmination of months of negotiations. It extends training and equipping for moderate Syrian rebels, a program that had been authorised to last only until December 11, using existing Pentagon money. It also includes Obama’s $5 billion request for funds to battle the Islamic State extremist group, including $3.4 billion for deployment of US forces as part of operation “Inherent Resolve,” and $1.6 billion for a program to equip and train Iraqi Kurdish forces for two years. A one per cent pay raise for members of the Armed Services is also included, plus protection of the fleet of A-10 close-air support aircraft, a measure for which Senator John McCain lobbied hard. tinyurl.com/kcsnkhe

Defence Business News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

US looks towards lighter, faster land vehicles The US Army is exploring concepts for future vehicles that would be lighter and faster, according to Lt. Gen. H.R. McMaster of the Army Capabilities Integration Center. In recent months, the US Army has made public three concepts for light vehicles The formal requirements of all three are still in development. tinyurl.com/nhary9f

2014 Armed Forces Covenant report published The Armed Forces Covenant annual report 2014 has been presented to Parliament, detailing the progress and successes of the past year. In 2014, over £100 million has been awarded through the Armed Forces Covenant to projects and schemes that benefit personnel, veterans and armed forces families. tinyurl.com/ods3r34

Issue 10 | DEFENCE BUSINESS MAGAZINE

71


THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

The Merlin PCB Group is one of Europe’s leading manufacturers of high reliability printed circuit boards for the Defence, Aerospace and Security sectors. Merlin PCB Group facilities have a long history of manufacturing in the UK and offer a range of PCB technologies including complex high technology multilayers together with Flex and Flex Rigid product. Merlin Group technical and service support specialists, some of the most experienced and committed people in the PCB industry, work with customers from design to shipping offering comprehensive technical advice and solutions including DFM, and commercial cost down support. “Consistently meeting our customer’s needs technically and logistically is the key to the group’s success” says Merlin’s Robert Baillie. “We have a proven record of understanding and supporting the needs and expectations of the defence and aerospace industries”. The Merlin PCB Group is a privately owned UK based company with sustained growth based on continual investment in the very best people, manufacturing technology, systems and value adding services. A trusted company supplying discerning technology companies globally.

For further information contact Robert Baillie, Defence and Aerospace Account Manager, Merlin PCB Group E: robert.baillie@merlinpcb.com M: +44 (0)7876 591 660 W: www.merlinpcbgroup.com

72

DEFENCE BUSINESS MAGAZINE | Issue 10


PESHAWAR ATTACK

Defence Support Group sold to Babcock for £140m The Ministry of Defence has signed a contract worth £140 million with Babcock International for the sale of Defence Support Group (DSG), which maintains and repairs key military equipment and manages the storage of the land vehicle fleet. The contract award follows the announcement of the preferred bidder in November, and will see Babcock continue the services DSG currently provides. Minister for Defence Equipment, Support and Technology Philip Dunne MP said: “Signing this deal with Babcock will put the Defence Support Group on a sustainable long‑term footing and will transform the equipment maintenance and repair support that the Army relies on both at home and overseas. “The £140 million income from the sale and the significant savings over the life of the contract represent outstanding value for money for the tax payer and will allow us to continue to focus our resources on the front line.” Contract completion is planned for 31 March 2015 and the service provision contract will start on 1 April 2015. In association with Raytheon, Babcock is also set to deliver four Phalanx 1B kits and

convert four land Phalanx Weapons Systems to their original marinised configuration to provide naval Close-In Weapon Systems (CIWS) capability. Three of the four Phalanx kits will add to the defensive capability of the Queen Elizabeth aircraft carrier, the MoD has said. The systems are to be delivered by March 2015. Phalanx CIWS is a rapid-fire, computer‑controlled radar and 20mm Gatling gun system. The Phalanx 1B upgrade incorporates a side-mounted Forward Looking Infra-Red Camera (FLIR) enabling the CIWS to defend the ship against surface targets and slow air targets in addition READ MORE: to anti-ship tinyurl.com/o94xvoa​ missiles.

INTERNATIONAL TERRORISM

Navy Spearfish torpedo upgrade announced

The MOD has confirmed a £270 million contract to upgrade the Royal Navy’s Spearfish heavyweight torpedoes. The deal with BAE Systems sustains the UK’s torpedo manufacturing capability in Portsmouth for another 10 years, where the Spearfish programme supports 60 jobs. An additional 40 new skilled engineering vacancies are being recruited by BAE Systems. The Spearfish, carried by the Royal Navy’s Astute, Vanguard and Trafalgar Class submarines, can target both underwater and surface threats. The upgrade includes a new warhead, a change to the fuel system to improve safety, full

digitisation of the weapon and a new fibre optic guidance link to improve performance. Once the torpedo has been fired Spearfish homes in on its target using sonar and will be controlled by the submarine after launch via the new fibre optic link. This year the MOD has already awarded BAE Systems a £600 million contract to run Portsmouth Naval Base and a £70 million Type 45 destroyer support contract that combined sustains more than 2,000 jobs in the Portsmouth region.

DIO puts regional frameworks on hold The Defence Infrastructure Organisation has shelved plans for two regional frameworks due to a lack of projects, Construction News has reported. The DIO this week appointed five contractors to its design-and-build framework for Ministry of Defence projects across Scotland, worth up to £250m in total. But plans for regional capital works frameworks in the West Midlands & Wales and the North-east, North-west and Yorkshire & Humber have been put on hold. A DIO spokeswoman said: “Currently, identified spend within these two framework areas is not sufficient to justify us pursuing this at present. “A decision on how to proceed will be made early in the new year. It is understood the MoD will consider procuring projects through the current national framework, for which Balfour Beatty, Carillion Construction, Kier Graham Defence, Miller Construction and Wates Construction qualified a year ago. Alternatively it may decide to procure schemes via one-off contracts, with a decision to be made in the new year. tinyurl.com/omwpcyz

Defence Business News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

SUPPORT CONTRACTS

UK and France join to maintain A400M Fleet The first common in-service support (ISS) contract has been awarded for the initial maintenance and support of the A400M Atlas military aircraft. The contract has been awarded to Airbus Defence and Space (ADS) by the British MOD’s procurement agency, DE&S, and the French Direction générale de l’armement (DGA) through OCCAR. The contract covers all lines of maintenance and includes the implementation of spare parts pooling, as well as the establishment of maintenance engineering services to the benefit of both

Air Forces. Defence Minister Philip Dunne said: “The signature of this joint contract is the achievement of successful British-French discussions over a number of years, and is an important milestone of increasing mutual collaboration at the heart of agreements made under the Lancaster House Treaty for defence and security cooperation. “The joint support contract is another example of cooperation across a truly multinational programme that will see 170 A400M aircraft delivered to seven partner nations over the coming years.”

READ MORE: tinyurl.com/pm8jpjg

Issue 10 | DEFENCE BUSINESS MAGAZINE

73


YOUR FOCUS. OUR RING SIGHT. BOTH PERFECT.

Ring Sights has been in the business of design and manufacture of the finest quality optical equipment since 1976. Nearly forty years on and with highly skilled leadership, dedicated teams of

expert staff and a massive amount of investment, the company now offers state of the art production facilities and are the world leaders in research, design and manufacture of unit power sights for the military.

Ring Sights Defence Group Ltd +44 (0)8700 422260 info@ringsights.com www.ringsights.com


EVENT PREVIEW

LAND, SEA AND AIR DEFENCE

Defence professionals from across the world will gather at IDEX 2015 to view the latest security technology for land, sea and air, as well as take part in a high level conference debating the latest defence issues IDEX is the only international defence exhibition and conference in the MENA region demonstrating the latest technology across land, sea and air sectors of defence. It is a unique platform to establish and strengthen relationships with government departments, businesses and armed forces throughout the region. IDEX is held under the patronage of His Highness Sheikh Khalifa Bin Zayed Al Nahyan, President of the UAE and Supreme Commander of the UAE Armed Forces and is organised by the IDEX LLC in association and with the full support of the UAE Armed Forces. IDEX takes place biennially at the Abu Dhabi National Exhibition Centre (ADNEC), which is centrally located in Abu Dhabi, the capital of the United Arab Emirates. The next event takes place on 22-26 February 2015.

EXHIBITION All the major local and international defence manufacturers and contractors will fill over 35,000sqm of exhibition space running through the 12 exhibition halls, the concourse and the atrium. The outside Capital Plaza also features exhibition stands and outside displays. The Maritime Security Area called NAVDEX is located on the dock edge and features local and international exhibitors who specialise in naval, maritime and coastal security technology, equipment and crafts. There will also be on-water exhibits, daily demonstrations and visiting navy vessels. For the first time there will also be an unmanned systems exhibition called UMEX 2015.

IDEX 2015

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

DEFENCE CONFERENCES The IDEX Defence Conferences will give delegates the opportunity to discuss the biggest challenges the industry is facing and indentify the potential solutions. The opening session will talk about using modern technologies to meet with rising international challenges and changing geopolitical balances. In this keynote presentation the speaker will discuss what defence technology for the future means in practice. There is no doubt that technology will change how the armed services operate both during peace time and on the battlefield, but it also changes the nature of the threats that nations face. There will be a panel discussion on modern military interoperability and how to meet the challenges of operating in a global and interconnected world. Joint War Fighting is frequently associated with using common systems but there is more to it than that. With multinational, cross service operations now more usual than standalone operations, it cannot stop here. In this session heads of services from land, naval and air from three different nations will discuss how operations, training and force technologies need to enhance for effective war fighting. Each speaker will be interviewed by the moderator for ten minutes before joint questions and discussion. E

IDEX nly is the o onal ti interna xhibition e defence ENA region in the Mstrating the demon land, sea latest air and ogies technol

Issue 10 | DEFENCE BUSINESS MAGAZINE

75


T.REACT CIP Intelligent Perimeter and Wide Area Detection Solution

INTELLIGENT PERIMETER AND WIDE AREA DETECTION SOLUTION T.react CIP is the fastest and most precise way of detecting, identifying and tracking both internal and external perimeter threats in areas where business continuation is a matter of national importance.

KEY BENEFITS Automatic wide area threat detection, tracking, and identification Simultaneous handling of both internal and external threats Easy third party sensor integration

LOOK FOR TERMA AT IDEX STAND 03-C14, 22-26 FEBRUARY 2015

www.terma.com


IDEX 2015

EVENT PREVIEW  MILITARY COOPERATION There will be a panel discussion on military industry cooperation. Traditionally the military has prepared itself to meet a threat that is similar to itself – another army, navy and air force. However with the growing threat of non-state actors, the importance of national IT infrastructure and the very different threat that this faces from cyber-attack, the modern military needs to be more nimble. Additionally many technologies for the military of the future, from additive manufacturing, through to nanotechnology and intelligent systems, are already seeing significant investment by private sector companies including those outside of the defence sphere. In this panel a defence manufacturer, a senior officer and a private sector company will discuss how the military can spot the next important new technologies, invest in them and work with the private sector to make this cost effective. There will be another panel discussion on recruiting and training the modern armed forces. A more high tech military with increased use of unmanned systems won’t necessarily lead to a reduction in military personnel, but it will need to a change in skillset for tomorrow’s military. How can the military prepare for this? How can existing troops and officers be taught new skills? What must governments do to assist the military in this transformation?

There will be a panel on military cooperation. Traditionally the military has only prepared itself to meet a similar threat This panel will bring together officers and government officials to discuss workforce issues for the modern military. NAVAL POWER The Naval Defence Conference will feature a keynote session on naval power and the global economy. In an increasingly interdependent world, our oldest long range trade routes via the sea are, if anything, more important than ever. In this opening keynote the presenter will look at how the modern navy is using new technologies to provide security for international trade. There will be a panel discussion on combining naval forces for joint operations and for fighting a unified war. With an increasing need for joint operations, including the wish for the GCC to establish a joint naval

force, this session will look at the human and technological issues that need to be considered for establishing joint operations, not least communication considerations. The challenging areas for the services are well known – harmonising command and control, communications and computers being the most prominent among them. This session will look at the full range of considerations for establishing joint operations. There will be another panel session on unmanned systems for naval operations. Modern navies are adapting to use a variety of autonomous systems, airborne, on the surface and undersea. Use of this technology has the possibility to dramatically increase the effectiveness of naval vessels and the Navy as a whole. The session will as the question, what sort of missions can be used E

18m long Trumpf laser, with two 6m x 2.5m Beds installed at AAE Dubai

New Middle East Armour Specialist Transforming Armoured Vehicle Market Leading armour processing specialists AAE are making a difference in the Armoured Vehicle market. Utilising many years of experience and unique processing equipment we are supporting clients by assisting in design optimisation of vehicle armour kits. Our bespoke simulation software system and unique bending capabilities allows us to produce armour kits in fewer pieces than before. AAE is one of only a few companies in the world that can cold form Armour at 600HB and above, thus allowing customers to offer improved protection levels, but with significant weight savings compared to conventional armour. ADVANCED ARMOUR ENGINEERING FZCO Jebel Ali Techno Park, Dubai, UAE Tel: +971 488 18330 Fax: +971 488 18443 Visit: www.armoureng.com Contact us: sales@armoureng.com

“Taking Armour to a new Level”

Issue 10 | DEFENCE BUSINESS MAGAZINE

77


Advertisers Index

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

EVENT PREVIEW  for these technologies and what should the navy be doing to prepare for the future? The next panel discussion will be on the trends and developments of maritime situational awareness. The modern threat to naval warships and commerce is more likely to come from low tech small craft than from warships or submarines. This means tools that help maritime surveillance analysts identify suspicious activity are extremely valuable. Modern technology allows for a more expansive and effective maritime domain awareness. With unmanned, broad area surveillance systems, naval forces can deliver more information than ever and quicker than before. This panel will explore the issues. The last panel session will be on expeditionary and irregular warfare and preparing marine units for future missions. The role of the marine forces is changing. In this panel senior marine commanders will discuss how they are adapting their forces to deal with future threats. UNMANNED SYSTEMS CONFERENCE This conference will kick off with a keynote session on the evolving role of unmanned systems in modern defence forces. Unmanned Systems are not a new defence technology but their full potential has yet to be fulfilled. In

this keynote session the speaker will defence companies and the military learn explore new uses for unmanned systems from their successes and how do all parties and what industry and the military cooperate to ensure national security. need to do to make this happen. There will then be a panel discussion on There will be a panel discussion on training standards, certification and other understanding trends in unmanned relevant human factors. Human factors technologies and how it impacts future are critical to accelerate the adoption of warfare. The panel will bring together unmanned technologies. Unmanned industry executives of unmanned systems require a different set d e systems to discuss how of skills to operate than n n a Unm they are developing new conventional aircraft. e ar applications for unmanned And until operators are ystems efence S d systems and to present certified like pilots w e date and results from and the technology not a n ogy but their l t o their recent use. is proven unmanned e n y h tec al has i The Potential for UAS systems will be highly t n e t o – d in the GCC will then restricted in civilian full p e l l lfi be discussed. The UAE to be fu te session airspace limiting their as a nation is investing role. This panel will look no the key l explore in unmanned systems at the challenges. The wil both from a military and final session will be es a commercial perspective. on the potential role for new us This pattern will explore how the unmanned systems as fighter nation is developing the technology and aircraft. It has been speculated partnership opportunities that are available. that the sixth generation of fighters The next topic to be discussed will be will be unmanned or at the least a mix civil cooperation in developing UASs for of manned and unmanned aircraft. The the defence community. Much of the recent session will examine if this is realistic. L development for unmanned systems is no longer carried out by the traditional FURTHER INFORMATION defence and aerospace industry. What can www.idexuae.ae

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Advanced Armour Engineering 77 Arinc 6 Becrypt 58 Bronzeye 41 CEA 46 Clarion Events 47, 48, 49 Cognitec Systems 40 Dosarrest 34 Fire Eye 36 Foster + Freeman 52 Frontier Pitts 65 Garnett Keeler 54 Gigamon 38 Heald 12 Heinan Hopman 10 Helyx Sis 14 Hesco Bastion 16 Holmatro – Special Tactics 8 Honeywell Analytics 64 Hunter Global Tracking 20 Infranor 50, 51 IQPC International BC ISSEE 45 KG Logistics 24, 25

78

DEFENCE BUSINESS MAGAZINE | Issue 10

Man and Machine 66, 67 Marshalls 18, 19 Merlin PCD 72 Mico – Tindall 28 NetIQ 32, 33 Qioptiq 68, 69 Qnap Systems 40 Rapiscan Systems 56 Ring Sights 74 Selectamark 22 Sensurity 30 Standard Brands (UK) 72 Sunray Doors 31 Sysco Technical IBC Tata Steel 4 Technocover 26 Terma A/S 76 The Mercian Labels Group IFC Torch Marketing 44 Vulcan UAV 62 Westcombe Engineering 70 World Border Organization 60 Zaun 42, 43


Sysco Technical Solutions Ltd, a new UK based Integrated Security Company, created to provide the most appropriate solutions for high security applications. Sysco Technical Solutions Ltd offer Consultancy, Installation and Service. We believe that the best results are achieved by taking a collaborative approach and working with clients to deliver on time and budget and most importantly, to their satisfaction. Sysco Technical Solutions Ltd is able to carry out all aspects of the security design and installation. Sysco Technical Solutions Ltd works in partnership with many leading manufacturers and suppliers to deliver a tailored solution to each client. For more information regarding Sysco Technical Solutions please contact: Phil Mann Sysco Technical Solutions Ltd Trafford Building, East St Leyland PR25 3NJ 01772 782572 phil.mann@syscotechnicalsolutions.co.uk www.syscotechnicalsolutions.co.uk


20%

discount for readers - quote IAVCTB

Dates: 26th - 29th January 2015 Venue: Twickenham Stadium, London, UK THE WORLD’S PREMIER ARMOURED VEHICLES FORUM KEYNOTE SPEAKERS INCLUDE

Sponsors Include: Brigadier General Charles Beaudouin, Director Technical Section, French Army

Major General Robert Talbot-Rice, Head of Armoured Vehicle Programmes, DE&S, UK MoD

The Rt Hon Michael Fallon MP, Secretary of State for Defence, UK MoD

T: +44 (0)20 7368 9737 E: Armouredvehicles@iqpc.co.uk W: www.iavevent.com

THE EAST AFRICAN MARITIME SECURITY SUMMIT

17th - 19th February 2015, Djibouti

Focussing on the 20 signatory nations of the Djibouti Code of Conduct, AFSEC 15 will seek to promote an expansion in scope of regional cooperation to encompass broader maritime security. With the withdrawal of international maritime forces foreseen over the next few years, this is an important transition time for the nations of East Africa. Regional cooperation efforts are essential to ensure the gains made against piracy are maintained, and the conference will provide a forum to develop strategies for this.

www.afsecevent.com/more

THE CARIBBEAN BASIN COASTAL SURVEILLANCE & MARITIME SECURITY SUMMIT

24th - 26th March 2015, Bahamas

The third annual gathering of Caribbean Security chiefs, CABSEC 15 aims to deliver strategic notice of future threats to the security leadership throughout the region, while providing a forum to discuss the challenges associated with confronting existing concerns. Narcotics coming out of Latin America and heading for the United States constitute a transnational threat which requires a coordinated regional response. New radar systems and efforts to share intelligence between nations can result in the efficient deployment of air and surface assets. Therefore, the conference will seek to promote this collaboration while advocating for additional resources.

www.cabsecevent.com/more

AFSEC

15

“AFSEC is a key event to drive a change towards the security of the West Africa Coast line” Johan Obdala, Director, International Organization for Security and Intelligence

5 “The conference was very informative, as it exposed the people dealing with regional security problems to the people who can provide the equipment required to get the job done properly. It exposed all to the security issues confronting the region” Lt. Col. Patrick Wallace, Commander, St. Kitts Nevis Defence Force


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.