www.counterterrorbusiness.com | ISSUE 21
IN THE NEWS: PRISON RADICALISATION PROBLEM INCREASING SAYS FORMER COUNTER-TERROR CHIEF
DSEI 2015
CYBER SECURITY
AVIATION SECURITY
GLOBAL RISKS
NEW WORLD DISORDER
The latest ‘risk map’ pinpointing the significant trends in risk and security around the world explored CROWD MANAGEMENT
STADIUM SECURITY
Getting the balance of stadium-based event crowd management right
EVENT PREVIEW
COUNTER TERROR EXPO
The whole spectrum of the counter terror community gathers to discuss industry updates and share best practice
News: mes t beco Triden election a pre‑ ato p99 ot hot p NCE
ZINE
AGA ESS M
EFE FOR D
USIN THE B
DSEI review 2015 p 05 p1
COUNTER TERROR BUSINESS
An anti-extremist strategy
www.counterterrorbusiness.com | ISSUE 21
IN THE NEWS: PRISON RADICALISATION PROBLEM INCREASING SAYS FORMER COUNTER-TERROR CHIEF
DSEI 2015
CYBER SECURITY
AVIATION SECURITY
GLOBAL RISKS
NEW WORLD DISORDER
The latest ‘risk map’ pinpointing the significant trends in risk and security around the world explored CROWD MANAGEMENT
STADIUM SECURITY
Getting the balance of stadium-based event crowd management right
EVENT PREVIEW
COUNTER TERROR EXPO
The whole spectrum of the counter terror community gathers to discuss industry updates and share best practice
News: es becom Trident ection a pre‑el o p99 tat hot po CE
ZINE
Comment
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
FOR DEFEN
ESS MAGA
THE BUSIN
DSEI view 2015 pre5 p10
Home secretary Theresa May recently spoke out on Conservative post-election plans to address religious extremism. Precise details were thin on the ground, but should the Tories form a majority government, it plans to introduce ‘banning orders’ on extremist groups as well as an independent examination of Shari’a law in England and Wales. Read more on page 9. Counter Terror Expo returns this year for another jam packed event at London Olympia on the 21-22 April. As the leading event dedicated to mitigating the threat of terrorism, Counter Terror Expo will once again stream and showcase the latest counter-terror technology and solutions to thousands of attendees. Our extensive preview of the Expo begins on page 47, highlighting the seminar programme and examining the latest innovators from the exhibition floor. In particular, look out for the newly launched feature zones, featuring demonstrations of the industries latest products. Back in March, Prime Minister David Cameron indicated the budgets for security services, MI5, MI6 and GCHQ could be merged with military defense spending to ensure Britain continues to meet a key NATO spending target. But this won’t wash with the US, or with two of Labour’s former defence secretaries, Lord Hutton and Lord George Robertson (a former secretary general of NATO itself). The pair insist that the military must be equipped to the level suggested by the up and coming Strategic Defence and Security Review, which should take place after the election later this year. In fact, the only political party to blindly commit to the two per cent GDP spend is, unsurprisingly, UKIP. But UKIP are not a realistic proposition. As for Trident being used as a political hot potato, all parties have voiced their support apart from the Scottish National Party and, of course, the Greens. Some are suggesting the 2016 deadline to start building could be pushed back further. See page 99 for Defence Business news.
P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:
www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED
226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Michael Lyons PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media
© 2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
3
PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures and Blast/ Ballistic Protective Construction. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.
Tata Steel Projects For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com
Our Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation in most cases. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats
CONTENTS 19
07 CTB NEWS
Prison radicalisation problem increase; Conservatives announce anti-extremist plans; Malaysian detention without trial
11 GLOBAL RISKS
Counter Terror Business examines a ‘risk map’ pinpointing the significant trends in risk and security around the world – such as transational terrorism, cyber security, and maritime piracy
19 AIRPORT SECURITY 27
The British Security Industry Association’s James Kelly discusses the importance of civil aviation security and how airports ensure the safety of staff and passengers
27 PERIMETER SECURITY
How do events maintain a balance between safety management and a positive crowd atmosphere? The BSIA analyse the key aspects of stadium security
47
31 CYBER SECURITY
Nigel Jones from the newly-formed Global Institute of Cyber, Intelligence and Security examines why skills and knowledge need to be developed to ensure continued progression in the field
35 INFOSECURITY
Infosecurity Europe on 2-4 June is the annual event for information security professionals looking to protect their information assets and sensitive data wherever it resides
Contents
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
39 CRITICAL INFRASTRUCTURE
Tony Berning of OPSWAT outlines a secure data workflow which organisations can implement in order to balance their security needs against their operational requirements
47 COUNTER TERROR EXPO
The annual Counter Terror Expo event showcases the latest counter-terror technologies and solutions. At a time when terrorism is at heightened levels, this event is the launch platform for some of the most innovative products on the market
81 FORENSICS
Forensics Europe Expo on 21-22 April will host a conference programme in collaboration with the Chartered Society of Forensic Sciences, showcasing over 100 global exhibitors and their latest innovations to an audience of buyers and specifiers
91 TERRORIST PROFILING
Dr Paul Gill’s new book Lone Actor Terrorists: A behavioural analysis seeks to build upon a strand of research examining lone-actor terrorism and a scientific approach to terrorist behaviour
95 WESTERN INTERVENTION Following the growing threat posed by Islamic State, security consultant Paul Easter outlines the difficulties associated with attempting to build democratic nations in the Middle East, and calls for strategic thinking
91 Kurdistan Region Erbil
SYRIA Damascus
THE
Trident gains political importance; Warnings given over military spending; and F35 Lightning gets Splunked
I R A Q Basra
102 DEFENCE SPENDING
A new RUSI paper highlights the real possibility of further reductions in defence spending and personnel
Counter Terror Business
BUS
INES
SM AGA Z
INE
99 DEFENCE NEWS
Baghdad
11
102 105 DSEI 2015
FOR
DEF
ENC
E
ISS Turn t UE 11 for th o page 9 e la 9 businetest defenc e and fess news atures
The world’s largest land, sea and air defence and security exhibition for trade professionals and military experts from around the world
www.counterterrorbusiness.com Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
5
R BEAUTY. TE U O . TH G N RE ST ER N IN mean
ong, it doesn’t furniture needs to be str Just because a piece of planters and seating ds, llar . Our specialist bo too l ifu aut be be ’t can it ces. And because ate stunning outdoor spa integrate perfectly to cre gy and crash-tested olo r RhinoGuard™ techn ou by ed en gth en str they’re tec tion as well. y provide excellent pro to PAS 68 standard, the or spaces, choose enjoyable and safe outdo ate cre to nt wa you if So ure from Marshalls. Protec tive Street Furnit VISIT LL 0870 990 7504 OR TO FIND OUT MORE , CA TREET-FURNITURE L/S CIA ER MM /CO .UK WW W. MARSHALLS.CO
RADICALISATION
Prison radicalisation problem increasing says former counter-terror chief Former head of the National Counter Terrorism Security Office Chris Phillips warned that staff shortages are making it harder to tackle Islamic radicalisation in England’s prisons, and that extremists were not properly monitored, enabling them to conduct recruitment drives among fellow prisoners. Phillips said: “What we have actually is a prison population that’s growing. We have less officers generally in prisons than ever before and we also have less police officers to deal with them, so what we have is a growing haystack of extremists where we still have to find the single needle that’s going to go off and do something really nasty. “But of course we’ve got less people to go and look for them as well so it’s a really difficult thing for the police service and prison service to deal with.” Justice secretary Chris Grayling rejected the claim and said a ‘very careful watch’ was kept on the issue. He said: “Prison overcrowding is at virtually its lowest level for a decade, and we have increased spending on measures to prevent radicalisation.” The latest official data shows that more than 100 Muslims are in jail for terrorism offences in Great Britain. The worry particularly concerns converts to Islam. Research by former chief inspector of prisons Dame Anne Owers suggests they are more vulnerable, but also said suspicion of Muslim prisoners could be both unfair and counter-productive, fuelling resentment. Home secretary Theresa May rejected the claim that staff shortages were hindering efforts to stop Islamic radicalisation in prisons, adding that the government was looking at ‘and continue to look at’ preventative measures. May has already said she wants new ‘extremism officer’ roles in prisons to deal with radicalisation, and the government has said all high-security jails have units who work with the security services to root out extremism. It also said there were faith-based interventions,
led by a team of expert Islamic leaders. Phillips said: “The answer is to get into the prisons and to make sure the most susceptible people are kept away from those that might turn those into extremists and, at this moment, we cannot even keep drugs out of prison, we can’t keep mobile phones out of prison, so clearly there is not enough staff to do that.” Stephen O’Connell, president of the Prison Governors Association, told the BBC that the threat from radicalisation in prisons was ‘real’ but he said he was not aware that it had got any worse over the last year because of staffing changes. He said: “I understand the correlation between staff numbers and prisoner numbers but when it comes to dealing with extremists, we are talking about a small number of prisoners with some very dedicated resources to actually managing those.” The Justice Select Committee recently criticised the government for cutting the number of prison officers by 12,530 staff between 31 March 2010 and 30 June 2014. The committee’s report also said the prisoner‑to‑staff ratio rose from 3.8 in September 2010 to 4.9 in September 2014. It claims that this has led to a significant deterioration in safety – with fewer staff READ MORE: to monitor tinyurl.com/no3k6v3 inmates.
SOUTHEAST ASIA
Malaysia reintroduces detention without trial Malaysia has passed a controversial anti-terrorism bill which reintroduces indefinite detention without trial, repealed by Prime Minister Najib Razak ion 2012. Under the legislation, suspects can be held without trial for up to two years, with multiple extensions allowed after that. Decisions on their detention will be made by a terrorism board, rather than the judiciary. The bill was passed hours after the police announced the detention of 17
suspected militants believed to be planning attacks in the capital, Kuala Lumpur. Home Minister Zahid Hamidi said those arrested, the youngest just 14, were planning to attack police stations and army bases to gather weapons. Two of the suspects had just returned from Syria, police said. READ MORE: tinyurl.com/lrcf9py
NEWS IN BRIEF EU Council plans for Internet Referral Unit The European Council has proposed the creation of a new Europol counter‑terrorism unit that will pool member states’ resources to address the increase in online content glorifying terrorism. The Financial Times (FT) reports that the proposals ‘are part of efforts by security officials to contain the profusion of extremist content online’ following the ‘attacks on the Charlie Hebdo magazine offices and a Jewish supermarket in Paris’. Based on the UK’s Counter Terrorism Internet Referral Unit (CITRU), the EU Internet Referral Unit (EU IRU) will monitor “terrorist and extremist online content”, especially on social media, and support investigations
Counter Terror News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
READ MORE: tinyurl.com/qd5ymlm
EU chief notes increasing number of women travelling to Syria Gilles de Kerchove, the EU’s counter‑terrorism coordinator, says an increasing number of women make up the estimated 5,000 Europeans going to Syria to join jihadi groups. He argues that without the work done by the intelligence agencies and police the number of Europeans travelling to Syria could be as high as 10,000. A high-profile case in February saw three schoolgirls from London become some of the latest teenagers to go to Syria. Senior police officers previously stated that around 60 British women and girls have travelled to the conflict. READ MORE: tinyurl.com/qc5cu9g
Pakistan orders mobile phone users to register sims As part of new counter terrorism measures in Pakistan, mobile phone users are now required to register their sim cards in a national database. The re-verification will involve some 130 million mobile phone users in Pakistan. The huge task is made easier by a system of Computerised National Identity Cards (CNICs) which has been in place since 2005. READ MORE: tinyurl.com/qaasbyx
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
7
solutions for a safer world
Automated Shallow Mount Bollard Heald’s Raptor offers PAS68 and ASTM security combined with one of the easiest installations in the industry with banks remotely controlled and monitored by our innovative new Hydra system.
Heald’s Hydra is a revolutionary new remote control and monitoring system seen here operating a bank of HT1-Raptor bollards. The Hydra is designed to simplify and streamline interaction with automated roadblockers and bollards whilst adding more remote functionality. It is available as an option with any Heald automated product. As well as facilitating push-button control of roadblockers and automatic bollards, the Hydra offers a range of other functions. Users can control and monitor the status of roadblockers via a tablet app, SMS or PC; the Hydra can securely transmit data via Ethernet, Data Bus or mobile network. It can control multiple units in an
Northfield, Atwick Road, Hornsea East Yorkshire HU18 1EL
array and can intelligently continue to operate working units in an array if one is damaged. The Heald Hydra is available as an option with any automated Heald product. It is particularly useful for large or complex installs where multiple units are operating in tandem, allowing for more streamlined operation than any other system currently available. It is also compatible with all existing Heald installations. All Heald products are available with a range of options and configurations; for more information on the Heald Hydra, you can visit www.heald. uk.com or give our friendly, knowledgeable sales team a call on +44 (0)1964 535858.
Heald design, manufacture and
Tel: 01964 53 58 58 | sales@heald.uk.com install award winning, world leading, www.heald.uk.com
solutions for a safer world
Heald Hydra shortlisted for
perimeter security products.
www.heald.uk.com sales@heald.uk.com +44 (0)1964 535858
RELIGIOUS EXTREMISM
Home secretary Theresa May outlines Conservative anti-extremist plans Home secretary Theresa May has outlined plans to address religious extremism in the next parliament should the Conservatives gain a majority in the upcoming election. Among the proposals, May said that authorities should be allowed to issue banning orders on extremist groups to stop them spreading ‘messages of hate’. In a highly anticipated speech at the Royal Institution of Chartered Surveyors in London on 23 March, May outlined a package which she said: “only a Conservative majority could guarantee would be implemented.” She added: “We will introduce extremism disruption orders, which are civil powers to be used against individual extremists who incite hatred. And we will introduce closure orders, for premises that are owned or occupied by extremists or are used to host extremist meetings or speakers.” Should the Conservatives gain a majority, May also said that an independent investigation into the use of Shari’a law in England and Wales should be commissioned to assess how it is being applied and its potential implications. The home secretary also proposed a review of supplementary schools to “protect children from extremists” and a “full review of citizenship law” to make sure
Theresa May
successful applicants respect British values. May said: “This strategy aims to tackle the whole spectrum of extremism, violent and non-violent, ideological and non-ideological, Islamist and neo-Nazi – hate and fear in all their forms.” “The government’s new Extremism Analysis Unit is already up and running and helping to inform not just this strategy but government decision making on matters such as visa applications. As the Unit grows and develops it will inform more and more of what government and the wider public sector does.” Responding to the speech, Yvette Cooper, the shadow home secretary, said: “Everyone other than the extremists agree that we
LOCAL COUNTER-TERRORISM
Bucks campaign targets mother and daughter relationships A counter-terrorism campaign targeting mother and daughter relationships is being launched in Buckinghamshire. The South East Counter Terrorism Unit (SECTU), part of the National Police Counter Terrorism Network, is pushing ahead with the next phase of its campaign designed to reach out to families. Buckinghamshire has seen a number of terror-related arrests and activity in the past year. SECTU’s campaign, which is being promoted by Thames Valley Police, involves radio and press adverts appearing in minority ethnic media to highlight the strong bond between mother and daughter and how the relationship can have a powerful influence on a young woman and her decisions. In the last year, 22 females have been reported missing to police by families who feared
they have travelled to Syria. Helen Ball, senior national coordinator for counter-terrorism policing, said: “We are increasingly concerned about the numbers of young women who have travelled or are intending to travel to Syria. It is an extremely dangerous place and the reality of the lifestyle they are greeted with when they arrive is far from that promoted online by terrorist groups.” Kalsoom Bashir, from Inspire, said: “Having seen the devastation facing families where a loved one has travelled to Syria I would advise families to keep their children close.” Families are also encouraged to reach specially trained officers for help and advice by calling 101 or visiting www.preventtragedies.co.uk READ MORE: tinyurl.com/mv99jh3
Counter Terror News
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
should robustly defend and actively promote the pluralistic values our society rightly holds in esteem. But it isn’t enough for the home secretary to say it, she needs to act. “We need to work in as many communities as possible, throughout the UK, to support civil society and defeat extremism. “And we should never tie the hands of our agencies and the police in confronting dangerous, violent extremists. The government’s record is one of making that harder, not easier.” The Muslim Council of Britain said: “We have consistently argued that the best counter‑terrorism strategy involves upholding our own values of freedom, civil liberties and ensuring that we do not single out any specific community. When this government came to power, there was a sense of optimism within communities that it would uphold and champion these values. “However, whilst Mrs May rightly speaks for values promoting the rule of law, participation in and acceptance of democracy, equality, free speech and respect for minorities, it is disappointing to see that her proposals seem to be at variance with the very qualities she FULL SPEECH: wants us tinyurl.com/lx8eo3g to aspire to.”
EDUCATION
Schools need counter terror help, says Hobby Head teachers can’t be expected to be ‘counter-terrorism experts’ or ‘conduct surveillance’ on young people, according to Russell Hobby, general secretary of the National Association of Head Teachers. Hobby was responding to warnings that more young people from the UK could travel to the conflict in Syria during the school holidays, and said schools would alert parents and ‘appropriate authorities’ if they found evidence of extremism. He said: “We cannot reasonably expect schools to perform police functions,” and added that schools would respond to any information they received, but would need the support of other agencies, if young people vulnerable to extremism were to be identified and intercepted. Nazir Afzal, who stepped down as chief prosecutor for North-West England, said two London head teachers had raised such concerns with him: “They are worried that
some of their children and some of the people they have care over will not be there when they return from the Easter break – and that must worry us all.” In February, three schoolgirls from Bethnal Green Academy in East London disappeared from their homes and flew to Turkey. They are believed to have crossed into Syria. Hobby said that where there was evidence of extremism or plans to travel to Syria heads would act, but there were limits to what could be expected of schools. He said: “Schools’ duty of protection involves educating people well and sharing what information they do have with other agencies. “Beyond that, they need clear guidance and somewhere to turn to for help. We cannot reasonably expect schools to perform police functions.” READ MORE: tinyurl.com/mqmd3ae
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
9
ENTERPRISE
THE NEW WORLD DISORDER
A ‘risk map’ pinpointing the significant trends in risk and security around the world – such as transational terrorism, cyber security, and maritime piracy – will allow companies to make business decisions accordingly. Counter Terror Business examines the report The most significant trends in global risk and security are revealed in the annual RiskMap from consultancy firm Control Risks. It provides a detailed view from the markets that will matter most in 2015, and forecasts the major challenges and opportunities of doing business in the world’s most complex environments this year. CEO Richard Fenning said: “The coming year will see the news dominated by turmoil, from Iraq to Ukraine to the South China Sea and beyond. RiskMap 2015 explores many of these issues, looking past the immediate political theatre to examine the forces that are reshaping international relations and the global economy.” KEY TRENDS The report highlights a number of key risk trends for 2015. It describes how transnational terrorism continues to be a threat, spurred on by competition for leadership of the global jihadist movement between al‑Qaida and Islamic State (IS).
Maritime piracy remains a threat, but onshore threats of crime, corruption, labour unrest and conflict are more risky to shipping companies. Piracy in East Africa will continue to decline but West Africa will become a piracy hotspot. The RiskMap report also highlights how technology is changing the face of kidnapping and extortion, through ‘virtual kidnapping’, social media reconnaissance and cyber extortion, and how cyber threats will continue to grow. GLOBAL TERRORISM OUTLOOK Competition for leadership of the global jihadist movement
Damascus
IRAQ
POLITICAL RISK FORECAST
MEDIUM
Baghdad
EXTREME
will drive further fragmentation and reward high‑profile attacks, Jonathan Wood explains in this section of the report: ‘On the strength of its military exploits and effective propaganda, IS in 2014 emerged as the first credible challenger to al-Qaida for leadership of the global jihadist movement. Its declaration of a caliphate and demands of allegiance directly peeled some groups away from al-Qaida. Others, including key al-Qaida franchises, were convinced to at least hedge their bets by making statements supportive of IS’s project. Even if al-Qaida and IS reach some kind of tactical armistice in Syria, they are likely to remain global strategic competitors. In the year ahead, this competition is likely to fragment the global jihadist movement and increase the likelihood of high-profile attacks.’ The report gives two reasons for this. Firstly is the likelihood for IS to use its influence abroad, stating that if it can consolidate territorial control in Iraq and Syria, it may seek to expand by funding and training foreign militant groups. Alternatively, local and international military pressure in the Middle East might force IS to diversify and pursue asymmetric retaliation abroad. ‘Either way, expansion would aggravate the schisms within the jihadist movement over leadership and legitimacy,’ the report states. The second reason given is the fact that IS has damaged al-Qaida’s credibility and legitimacy: ‘Some jihadist groups and sympathisers still respect al-Qaida’s theological credentials and historic pedigree, but many prefer IS’s tangible accomplishments and want to replicate its successes. The jihadist movement has always been a fluid constellation of local groups; inspired by IS, more of these might strike out on their own as independents.’ Both of these factors could increase the threat of high-profile attacks, the report says, with local commanders and al-Qaida franchises possibly wanting to announce and assert themselves with demonstrative violence.
If IS dates consoli control ial territor nd Syria, it a in Iraq k to expand may seending and by fu ning trai t militan n g i e r fo groups
Kurdistan Region Erbil
SYRIA
Global Risks
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
HOMEGROWN ATTACKS The report explains how increased incitement of homegrown attacks is likely in response to expanded global counter-terrorism efforts and jihadist propaganda. Returning foreign fighters are a concern, the report says, and equally, counter-terrorism activities in Iraq and Syria could provoke attempts at retaliation in Western countries. The report says the rise of IS may result in more ‘lone wolf’ style attacks. It states: E
Basra
COUNTER TERROR BUSINESS MAGAZINE
11
Global Risks
ENTERPRISE NIGER Dakar
SENEGAL GAMBIA
WEST AFRICA The report says that Nigeria is likely BURKINA FASO GUINEA-BISSAU to remain the global hotspot for GUINEA piracy in the year ahead, stating BENIN N I G E R I A Conakry GHANA Abuja that the February 2015 general Freetown CÔTE TOGO elections may influence SIERRA LEONE D'IVOIRE Cotonou Yamoussoukro longer-term trends. The CENTRAL AFRICAN Lagos Monrovia Lomé Abidjan Accra REPUBLIC report says: ‘The fate LIBERIA Port Harcourt CAMEROON of the government Bangui Douala Malabo Yaoundé POLITICAL amnesty programme RISK FORECAST for Niger delta EQUATORIAL GUINEA militants after the SÃO TOMÉ AND PRINCIPE Libreville CONGO polls will be perhaps CONGO (DEMOCRATIC REPUBLIC OF) more important to GABON RWANDA determining the trajectory of Nigerian BURUNDI Brazzaville MEDIUM HIGH EXTREME piracy. The continuity Kinshasa Cabinda of stipend payments (ANGOLA) Mbuji-Mayi to rank-and-file members – and Luanda of business opportunities for influential former Lubumbashi militant leaders – will be key.’ ANGOLA The report goes on to predict that ‘The absolute number of incidents registered off Nigeria will rise marginally in 2015, following a relative decline in 2014, with periodic small peaks in attacks largely driven by ‘IS has crafted its image around intimate, attacks. Otherwise, the main terrorism the activities of certain key pirate groups. explicit videos of attacks distributed by trends affect intent, implying that in 2015 Kidnapping is likely to remain concentrated off social media. Sophisticated production and ambitions will continue to exceed capability, the southern Niger delta. However, as recent searing imagery send a message that – for particularly in Western countries.’ trends have shown, the increasing range of maximum impact – the style of an attack such groups threatens personnel operating is as important, if not more important, MARITIME RISK OUTLOOK across a wider area encompassing the waters than its scale. IS has learned from groups Piracy is likely to remain the primary security off Cameroon, Gabon and Equatorial Guinea.’ such as al-Qaida in the Arabian Peninsula concern for the maritime industry in 2015, The report also pinpoints South-East Asia (AQAP), and appeals specifically to Western though the outlook differs for two of the as an are of concern for piracy, as the region sympathisers using targeted media outlets.’ world’s hotspots – East and West Africa. continues to register high levels of activity. Tom Patterson, who authored this section But in most cases the severity of incidents is GOVERNMENT INTERVENTION of the report, explains how levels of pirate low, as it will opportunistic theft in nature. Government intervention will be an activity are likely to remain low off East important driver of the terrorism threat in Africa over the next year, reflecting a decline CYBER THREATS 2015, the report says. Airstrikes and other in hijacking-for-ransom by Somali pirate Another security issue identified by the report military operations in Iraq, Syria, Yemen, groups since mid-2011. The report explains: is the growing risk of cyber attack, claiming Libya, Somalia and elsewhere will increase ‘The reduction in successful attacks – no that it will continue to evolve rapidly in 2015. the intent of jihadists – not just – IS to large merchant vessel has been hijacked John Nugent, senior analyst for cyber target Western and allied interests. since May 2012 – can be attributed to security, explains that the cyber threat Sponsorship of foreign militant groups is three external factors that are by now can be broken down into three principal also likely to become a bigger concern in well-known: a better educated maritime categories: cyber espionage, cybercrime and 2015. This is partly because powerful militias industry, a more robust naval strategy and cyber activism (or ‘hacktivism’) – with each will remain the most influential political a better protected merchant fleet.’ meaning different threats to business. and security players in fragile states from But despite this success, piracy in East The report says that despite the contrasting Libya to Afghanistan. The report states: Africa could re-emerge because Somalia’s goals of the attackers, one of this year’s ‘In several contexts, mainly in the Middle pirate networks remain largely intact. What’s main threats will be the continued spread of East and South Asia, they are already the more, the security measures that have capability among different types of assailants. shock troops of national and sectarian proven so effective in combating piracy are It states: ‘What happens, for example, if competition. As the global power vacuum already showing signs of being dismantled: cyber jihadist factions start to use the continues to expand geopolitical space to ‘Understandably, cost-squeezed operators relatively advanced hacking capabilities of play, more states will seek to strengthen are seeking to dispense with expensive cybercriminals? The technology is available for ties with – and pursue strategic objectives guards, hardening measures and re-routing. purchase online in criminal forums on the dark through – non-state armed groups. Meanwhile, politicians ponder redeploying web (a subsection of the unindexed areas of State sponsorship – funding, training, naval assets elsewhere,’ the report says. So the internet collectively known as the deep supply, strategic guidance – will increase could 2015 see the risk-reward ratio swing web). These outlets provide particularly fertile the capabilities of some groups to conduct back in the favour of Somali pirate groups? ground for the development and distribution E Bissau
Niamey
Ouagadougou
Kano
Ndjamena
Kidnapping is likely to remain concentrated off the southern Niger delta. However, recent trends show that the increasing range of groups threatens personnel across a wider area, including the waters off Equatorial Guinea
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
13
THE GAME CHANGERS IN TRACKING!
WINNER
SECURITY INDUSTRY E MAGAZINE
Tracker Solutions Award for 2014/15
-NO CABLES - NO NONSENSE-
A NEW BREED OF TRACKING
www.hunterglobaltracking.com
FIND US
info@hunterglobaltracking.com CALL: CH+41792555042 / UK+447791324551
ENTERPRISE of increasingly advanced malicious software (malware) and may also have facilitated the repurposing for criminal use of malware used initially in state‑sponsored espionage campaigns.’ The increasingly routine recruitment of skilled elements from cyber activist communities and ‘hackers-for-hire’ offering espionage as a service is a trend that will continue. The role of geopolitics in shaping the cyber threat environment will be another core trend to monitor in the year ahead, the report reveals. During 2014, cyber espionage, cyber activist and seemingly cybercriminal campaigns were initiated in response to developments in Ukraine, Hong Kong, Israel and the Palestinian Territories, Iraq and Syria, and the South China Sea. In 2015, sustained geopolitical tension is expected to spur on further targeting of the industrial control systems at the heart of critical national infrastructure. What’s more, the report predicts the emergence of new, seemingly independent, cyber activist groups created by nation states to further their foreign policy objectives. This section of the report concludes with two final developments to watch out for: ‘First is the increased focus of attacks on multinational companies’ supply chains.
As companies’ security becomes more robust, complex supply chains can be a point of vulnerability, allowing attackers to ultimately seize data belonging to the company. Second is the creation of malware able to operate across a range of operating systems, taking advantage of consumers’ reliance on an expanding array of different devices.’ KIDNAPPING AND EXTORTION Technology is changing the face of kidnapping and extortion, the report reveals. In this section, analyst Tom Newell explains how criminals are extorting ransoms from families without even kidnapping a victim. ‘A fast‑growing extortion technique known as ‘virtual kidnapping’ is one of the clearest examples of how the communications revolution has fostered innovation in criminal activity. Virtual kidnaps – most common in Latin America – typically involve criminals contacting a family by phone and claiming to have abducted a loved one. The criminals often purport to be members of an organised crime group, and threaten to harm or kill the victim if a ransom is not immediately paid by wire transfer. In reality, no abduction has occurred, and the ‘victim’ is usually going about their business safely in another location, temporarily out of reach in a place such as
During 2014, al imin cybercr ns were g campai in Ukraine, d initiate Kong, Israel Hong Palestinian and the ories, Iraq Territ Syria and
Kyiv
Global Risks
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
a cinema, airplane or hotel. Virtual ‘kidnappers’ are simple extortionists, hoping that the person on the other end of the line will fall for the scam without verifying that a kidnap has actually taken place.’ The report goes on to explain how kidnappers and extortionists have benefited from social networking websites, using them as a way of obtaining personal information that can be leveraged for financial gain. But kidnappers can use social media for more than just research. They can also exploit it to make demands, intimidate families of their victims or propagate their ideology. For example, prominent Islamist militant groups in Africa and the Middle East have tweeted details of attacks in real time and uploaded footage of foreign victims on YouTube. These online media strategies have enabled militants to put pressure on foreign governments and attract new supporters on a global scale. What’s more, according to the report, the ‘borderless’ nature of the internet gives criminals a vast amount of opportunities to extort individuals and businesses remotely. The report explains: ‘A burgeoning form of cyber extortion uses ransomware, a type of malware that blocks access to an infected computer system and demands a ransom for the restriction to be lifted. CryptoLocker was among the best known and most lucrative ransomware applications, generating millions of dollars in illicit funds before it was taken offline in June 2014. Expect newer versions to emerge in 2015 as increased competition between developers results in the production of new forms of malware that are harder to detect and disrupt.’ POLITICAL VIOLENCE Changes in how groups involved in political violence operate and raise funds are E
UKRAINE POLITICAL RISK FORECAST
COUNTER TERROR BUSINESS MAGAZINE
15
Today, a simple Passport is never enough... That is why we at Rockwell Collins continue to develop and implement a range of security products to help you protect your border. From biographic and biometric capture to automated gates we can ensure your country’s physical border stays secure. The ARINC security suite of border management solutions, incorporating API, iAPI and PNR, are trusted globally to help strengthen security around the world. Learn more at:
www.electronicborders.com
Š 2014 Rockwell Collins. All rights reserved.
rockwellcollins.com
ENTERPRISE Somalia-based extremist group al-Shabab, which has consciously abandoned its ideological opposition to crime and instead embraced it as a practical means of solving its financial difficulties.’ The report goes on to say that the process also works in reverse, where criminal groups use terrorist‑style tactics. ‘Criminal groups in northern Kenya use grenade attacks on food storage facilities to deter humanitarian aid,’ says the report. ‘Bacrim (paramilitary successor) groups in Colombia deploy small explosive devices in retaliation for unanswered extortion demands. For businesses in regions marked by this brand of conflict, the overlap between political violence and organised crime means that examining tactics alone won’t help identify who is behind an individual attack.’
MYANMAR
Yangon POLITICAL RISK FORECAST
HIGH complicating the risks for business, the report says. This section of the report, by Zachary Rothstein, explains that: ‘Over the last decade, the international clampdown on terrorist financing, coupled with a decrease in state sponsorship and private financing, has taught political violence groups an important lesson: crime pays. More and more, criminal activity has become the primary means of funding political violence.’ And the trend is sharply gaining momentum, even in areas where criminal financing of political violence is well established. The report explains: ‘For the Afghan Taliban, which arguably would not exist in its current form without the cash from its smuggling and drug trafficking networks, organised criminal activity has become even more widespread. Other organisations have gone the route of
Global Risks
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
About Control Risks Control Risks is a global risk consultancy specialising in political, security and integrity risk. The company enables its clients to understand and manage the risks of operating in complex or hostile environments. Through a unique combination of services, wide geographical reach and by adopting a close partnership approach with clients, Control Risks helps organisations effectively solve their problems and realise new opportunities across the world. Working across five continents and with 36 offices worldwide, Control Risks provides a broad range of services to help its clients manage political, integrity and security risk. blur. Opportunities will continue to abound for ambitious international companies. But uncertain economics and volatile politics will make 2015 more than usually challenging.” “The US and Europe will exercise waning international influence and leaders will continue to focus on national issues and politics. Business culture and practices of multinational companies will meet resistance from the emerging powers and their powerful supply chains. National governments will find it more difficult to protect their companies from this. “Increasing technological sophistication and weak state power will combine to render the threat from cyber-attack, kidnap and terrorism more severe. How one deals with the inevitable attack, as opposed to how one stops it, will become the key question. “Global governance’s failure to deal with the above issues will continue in 2015, leaving business to navigate these pitfalls against a backdrop of continuing conflict and fragmentation of global political consensus.” RiskMap’s assessment of political and security risk encompasses the potential negative impact on business operations through political instability and intervention; the influence of societal and structural factors; as well as actions that harm the financial, physical and human assets of a company. L
ar’s Myanm State a United Wpposes Army o , but only rule central e that stance becaus s its (legal and protect l) business illega rests inte
CHANGING MOTIVES The RiskMap report suggests that the growing links between political violence and organised crime have altered the motives of terrorist organisations. Sometimes, crime and ideology fuse. ‘In Somalia, for example, warlords seeking economic and political power temporarily align themselves with terrorist groups when it is in their interest to do so. Prolonged blending of ideology and crime, though, tends to transform the identity of a group and dilute its political motives. Myanmar’s United Wa State Army opposes central rule, but only because that stance protects its (legal and illegal) business interests, rather than because it genuinely believes in local government,’ the report states. THE RISK TO BUSINESS Introducing RiskMap 2015, Richard Fenning, ceo of Control Risks, commented: “2015 will be a difficult year for business as the lines between what have always been considered ‘safe’ and ‘risky’ opportunities
FURTHER INFORMATION Download the report at www.controlrisks.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
17
ADANI
from ideas to solutions
CONPASS
速
FULL-BODY SECURITY SCREENING SYSTEM Detection capability:
Objects hidden internally and externally on the body; within prosthetic devices, artificial limbs, shoes etc.
Items detected:
Explosives, weapons, drugs, electronics etc.
Tested and proven effective:
Swallowed drugs
Ceramic knife in rectum
info@adanisystems.com
Prosthesis
Installed in 24 countries and satisfied customers for 15 years.
Breast implants
www.adanisystems.com
AIRPORT CONTROL
James Kelly, Chief Executive of the British Security Industry Association discusses the various layers of civil aviation security that are necessary to ensuring safety for staff and passengers In a post-9/11 society, civil aviation security is, and will always be, a key priority across the globe. Since 2001, the landscape of security has changed dramatically, particularly within the aviation sector. However, despite an increased focus on the security of aviation staff and passengers alike, the industry is not without security related incidents. Even as recently as March 2015, a machete-wielding man attempted to breach a checkpoint in New Orleans international airport. BIOMETRICS Since 9/11, despite
Threats le b to valuacan cargo m vary fro alism, and theft, v attacks, arson rism terro nimal n a and eve cking traffi
advances in counter-terror measures, airports have remained vulnerable. In 2007, Glasgow airport was attacked as a Jeep Cherokee loaded with explosives was driven into the main atrium. Luckily, this attempt was unsuccessful, as was an attempt on Christmas Day 2009 to detonate explosives on a Detroit‑bound aeroplane in an incident worryingly reminiscent of 9/11. Not so fortunate was Moscow’s Domodedovo Airport in early 2011, as over 100 people were injured and 35 killed as a bomb was detonated in the arrival hall of one of Russia’s busiest airports just days after the UK’s terrorist threat was raised from ‘substantial’ to ‘severe’.
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
Written by James Kelly, Chief Executive of the British Security Industry Association
SECURITY IN LIGHT OF INCREASED AVIATION THREATS
As a result, one of the most important factors of aviation security is ensuring that passengers feel safe in their surrounding environments, whether it be in the terminal or up in the air. Naturally, airports of all sizes experience high volumes of luggage and footfall on a daily basis. Consequently, security personnel have come to rely increasingly on technology to help ensure the safety of passengers, crews, equipment and staff. Biometric technology is one way that this can be achieved. Biometric airport technology is not a new concept, with the first commercial application of a fingerprint reader being launched in 1984. However, due to the increased risk of terrorism over the past decade or so, its popularity has understandably soared. Biometric technology uses the unique human characteristics of a person in order to provide irrefutable proof of identity and has become commonplace throughout the traveller experience. Heathrow airport rolled out upgraded biometric technology after 18 months of trials towards the end of 2011, meaning that passengers in all five terminals are scanned twice between arriving at the airport and boarding their planes. Fingerprints and digital images stored on e-passports are also used regularly across Europe. The information supplied by biometric data is checked against immigration and security watch-lists of terrorists and criminals E
Aviation Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
19
AIRPORT CONTROL stored on a database, allowing for any potential threats to be quickly identified. Such measures not only allow for a more streamlined experience through the airport, allowing for faster passenger processes, but also deliver a sense of increased safety. A PHYSICAL PRESENCE While biometric technology is quickly advancing and making a positive impact on airports, the steadfast support of a physical security presence will no doubt remain to be irreplaceable. While technology – such a CCTV and access control systems – can gather essential intelligence to identify a threat, it still requires a physical presence to act upon them. Uniformed officers not only act upon these threats, but their general presence can allow passengers to feel more secure. Regularly patrolling the building and perimeter areas, these officers are trained to provide an essential first response to emergency situations. ADVANCES OF CCTV TECHNOLOGY While these officers can keep a watchful eye on the ground, CCTV cameras allow for 24-hour protection and can be placed effectively around an airport in order to monitor the entire facility. Naturally, CCTV images can be extremely useful in identifying criminals and watching back recordings in order to piece together incidents. The effectiveness of video surveillance technology is continuously improving, and it has already established itself as a vital security tool for the police, private companies and many public sector organisations. An effective CCTV system contributes to the detection and prevention of crime, as well as protecting towns, cities and transport networks from the threat of terrorism. A key area where CCTV is rapidly developing is that of video analytics. This impressive technology is already contributing to the security of a range of high-level facilities such as city centres, transport facilities, and utilities. VCA is essentially the automatic analysis of CCTV images in camera or centrally, utilising advanced algorithms to create useful information about the content. Generally, these systems need a static background and consequently tend to operate with fixed cameras or Pan Tilt Zoom (PTZ) cameras at set positions, as they are looking to identify changes or movement at a particular scene. The scope of video analytics is considerable and can be used in the detection of intruders, abandoned packages, wrongly parked vehicles or people counting, all of which are extremely important within and around an airport. One particular area that VCA can be especially effective is around the perimeter of an airport, such as around the airfield where an intruder would not only be risking their own lives, but could be posing a potential threat on aircrafts. Securing a perimeter can
be seen as one of the most crucial steps in any security plan. An early detection of a threat also means that there is more time and space available to formulate the necessary response, potentially preventing a threat all together. Perimeter-specific applications of VCA, such as the tripwire function, can be especially useful in this kind of protection. VCA can be utilised in order to create virtual tripwires along existing fences or areas of a perimeter where other forms of physical security would be impossible or impractical. If a person is simply walking near a site, they are not necessarily considered a threat and a great amount of attention does not need to be paid to them. However, if that person then crosses the tripwire into a secure area, an alert can be raised. The VCA draws attention to the cause of the alarm, often by highlighting it in a red box, and an operator can quickly assess the nature of the alarm. VCA is more resistant to false alarms caused by vegetation or animals and lower false alarm rates improve security. The operational response might be to issue a verbal warning over the system, which scares off intruders and prevents them from entering the premises further. Depending on the threat of the attempt, operators can also decide to covertly alert the authorities without the intruder realising they have been detected.
SECURING CARGO While the safety of people at airports is extremely important, securing cargo should also take priority. Cargo securities primary concern is the handling of the goods at cargo depots, ensuring only authorised personnel are able to access them, and mitigating against the risks of tampering. Threats to valuable cargo can vary from theft, vandalism, arson attacks, terrorism and even animal trafficking, as well as general health and safety issues such as accidental fires. An effective risk analysis, security policy, strategy and most importantly procedures and auditing, addresses and provides solutions to all of these risks. The challenge, however, lies in putting this in to practice, with extensive premises, disparate sub-contracted companies involved in the cargo handling process, large numbers of vehicles and people potentially entering and leaving restricted areas requires a holistic approach to security. Given these multi faceted threats, undertaking a comprehensive risk assessment is the first and most important step towards overcoming them. Risk assessments carried out by reliable, accredited and professional security providers such as consultancies will highlight the nature of the potential threats faced by depots, identifying the most vulnerable areas of the sites or any weak links in procedures. E
Aviation Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CCTV cameras allow for 24-hour protection and can be placed effectively around an airport in order to monitor the entire facility. CCTV images can be extremely useful in identifying criminals and watching back recordings in order to piece together incidents Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
21
UK gets access to vital data
Aviation Security
AIRPORT CONTROL
More foreign terrorists, murderers and paedophiles will be kept out of the country after the UK successfully negotiated access to vital European data.
If a person is simply walking near a site, they are not necessarily considered a threat and a great amount of attention does not need to be paid to them. However, if that person then crosses the tripwire into a secure area, an alert can be raised From the risk assessments, vulnerabilities will be highlighted and recommendations report produced detailing the most appropriate security measures to employ. In an environment where the flow of people entering and exiting the site must be monitored, it is important to ensure the perimeter provides meaningful physical barriers that will deter any sort of unauthorised access. Physical security measures represent a key starting point when securing cargo, preventing access to where the goods are placed. These systems include locks, barriers and fences, and are often combined with electronic security systems as well as manned guarding services. Creating barriers to access demands attention to a variety of design considerations such as sufficient height and strength, the use of climbing impediments, secure ground fixing as well as the provision of clear areas to facilitate surveillance and maintenance. Physical security measures are essential not only for the protection of perimeters, but also for the buildings themselves, externally and internally. Locks are the most basic of measures, and provide a fundamental layer of security, which will prevent crime by deterring criminals and slowing them down when trying to break in. A good quality lock can last for years; however, the popularity of this security product means that people often buy one that is inferior in quality under the misunderstanding that it will provide them with financial savings.
ACCESS CONTROL MEASURES High standards are essential when selecting and installing physical security. A quality lock, for example, should comply with BS 3621: 2007 and be specified to meet the requirements of the door or window that it is securing. This challenge also goes beyond the lock, since it is the management of keys that is fundamental. Suited locks will provide a reduction in the number of keys and Electronic Key Management Systems (EKMS) will ensure an audit trail of who had what key at what time. This has the added advantage of being able to restrict individual’s access to keys and therefore areas to specific times, and to remove an individual’s access rights when they leave the business. Smart keys are also a useful addition in terms of key management, these keys, containing tiny processors can be dynamically enabled or programmed to only open a specific door at a specific time, remotely from an alarm monitoring centre. Another popular and hugely effective way of keeping unauthorised people out of cargo depots, or away from areas where cargo is stored at airports, is the use of access control systems. Depending on the location and sensitivity of the building or area involved, access control measures can range from paper-based logging systems for temporary contractors’ permits through to access control cards using radio frequency identification (RFID) chips for more convenient proximity reading of card details and
The Second Generation Schengen Information System (SISII) will provide law enforcement alerts on wanted criminals, suspected terrorists, missing people, and stolen or missing property. The UK will join the system on 13 April 2015. The system, currently used by 28 European countries, will provide real-time alerts to speed up the exchange of information on wanted foreign criminals. Warnings from other countries will automatically appear on the Police National Computer and on border watch lists, helping to stop offenders slipping unnoticed into the UK. And alerts can be issued by the UK to help find and bring to justice criminals who offend here and flee abroad. SISII will also help tackle the terror threat from foreign fighters returning from Syria and Iraq, tracking them as they travel around Europe. The system already contains 1,500 discreet warnings on people believed to pose a serious national security risk, with numbers continuing to rise in the wake of the Paris terror attacks. For more information visit: tinyurl.com/kewho3w activation of gates, turnstiles and vehicle barriers. To ensure the effective application of access control technology or more traditional locking strategies, it is important to have clear policies, procedures and auditing in place that will ensure that only authorised personnel are in possession of access cards, codes or keys. Duress codes should also be considered, so that should an employee be forced to access an area, a secret code can be generated to the alarm monitoring centre, alerting them to the duress situation. The most important aspect of aviation security is that the security measures in place have been purchased from quality, reputable suppliers. Such suppliers must meet the relevant European and British standards for their product, ensuring that they are the best of the best. BSIA members are inspected to these standards and offer a reputable service. L FURTHER INFORMATION www.bsia.co.uk
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
23
The most effective border agency.
Perimeter Protection Systems
Zaun is one of the largest and most dynamic manufacturers of high security perimeter protection systems. our comprehensive range is at the forefront of design and uses leading production technologies to ensure our solutions combat the rapidly changing security threat. Tested by independent organisations and governments to the most stringent criteria, our systems protect sites of critical and national importance on a global scale.
(t): +44 (0)1902 796699 | security@zaun.co.uk | www.zaun.co.uk
PERIMETER SECURITY
ZAUN HELPS SECURE GLASGOW GAMES
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Glasgow Games procurers choose Zaun’s high-security fencing systems, vehicle and pedestrian gates and bespoke above ground and system-mounted CCTV columns Commonwealth Games delivery partners looked to the largest supplier of perimeter fencing protection to the London 2012 Olympics to secure Glasgow 2014. They handed almost £4 million of contracts to integrated high-security perimeter event overlay specialist Zaun to design, manufacture, install and decommission a broad range of temporary high-security fencing systems across the Glasgow 2014 sites, including Tier One venues. Glasgow Games procurers ordered several thousand metres of two of Zaun’s principal temporary high-security fencing systems, hundreds of vehicle and pedestrian gates to suit each system and bespoke above ground and system-mounted CCTV columns incorporated into the fencing lines. Zaun’s first involvement came in 2008, shortly after Glasgow was announced as the winning city. After many months of informal discussions with the games interested partners, Chris Plimley, Zaun’s High Security Systems Sales manager, worked together with the bid teams of the potential delivery partners who answered the ITT. Selex ES, the Finmeccanica subsidiary, was awarded the prestigious contract in 2013 as the Protective Perimeter Security provider for the Glasgow 2014 Games and shortly thereafter appointed Zaun. PHYSICAL SECURITY MEASURES Selex ES provided a wide range of physical security measures to secure over 20 Games venues at Glasgow 2014, including the Commonwealth Games Village for athletes. The Commonwealth Games are international, multi-sport events held every four years for athletes from Commonwealth nations. The Commonwealth is an association of independent sovereign states spread over every continent and ocean. The Commonwealth’s two billion people make up 30 per cent of the world’s population and come from many faiths, races, languages, cultures and traditions. The Glasgow 2014 Commonwealth Games brought together thousands of elite athletes, friendly volunteers and excited spectators to join an incredible festival of sport and culture. Zaun supplied several thousand metres of its MultiFence and award winning RDS systems at heights of 3m and 2.4m, with sections fitted with Hostile Vehicle Mitigation (HVM) enhancements. Zaun developed its PAS 68 MultiFence
“The Glasgow 2014 Commonwealth Games brought together thousands of elite athletes, friendly volunteers and excited spectators to join an incredible festival of sport and culture” especially to resist hostile vehicle and mob attacks at the London 2012 Olympics. MultiFence has been granted a patent by the UK Intellectual Property Office. Plimley said: “MultiFence was chosen because of the very cramped footprint around most Games venues and the ultra tight timescales for installation and postGames removal. Also, we have gathered vast amounts of experience in delivering time critical projects, and MultiFence can be upgraded with a temporary HVM measure without the need for foundations.” FENCING Zaun delivered almost 5km of HVM fencing to secure temporary Olympics venues including the beach volleyball at Horse Guards Parade, Wembley Stadium and Arena, Greenwich Park, the O2 Arena, the Royal Artillery Barracks, St James’s Park Newcastle, Coventry’s Ricoh Arena and the Weymouth sailing village. Zaun also worked with Olympic Park
contractor Skanska and stadium contractor BAM Nuttall to secure the 20km boundary of the main Olympic Park, with a further 1.5km of Zaun fencing providing a ‘ringwithin-a-ring’ around the Olympic Stadium. The Glasgow 2014 Commonwealth Games was the latest global event to entrust the security of its stakeholders to Zaun. As well as the extensive use of its systems at London 2012, the UK manufacturer has supplied The English Football Association’s training centre at St George’s Park, Meydan Racecourse in Dubai and the 2013 G8 Summit in Northern Ireland. Zaun installed 13km of fencing for the UK’s largest ever police operation involving 9,000 officers from 29 of the UK’s 43 police forces for the two-day NATO Conference at Newport’s Celtic Manor and key sites in Cardiff last September. L FURTHER INFORMATION www.zaun.co.uk
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
25
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
PERIMETER SECURITY
PERIMETER PROTECTION
Romy Rawlings, Architecture & Design Director for Woodhouse™ Bespoke Product Solutions Services by Marshalls, explains the fine line specifiers must tread in meeting safety standards, without compromising the aesthetics of the building Perimeter safety has never been higher on the agenda. With the threat of terrorism and the incredibly emotive subject of protecting people, places and infrastructure at an all time high there is a real responsibility for both the specifier and end client to fulfil their duty of care towards all using the building and ensure that its environs are protected against potential threat. BUILDINGS PROTECTION All buildings where large public crowds may gather are under threat; from banks and financial institutions where high volumes of people work, to leisure parks, transport hubs and airports, hotels, stadia and public squares, there is a need to protect those using and congregating in these places from the threat of attack. In the past, building protection has tended towards concrete, iron and barbed wire systems. It is widely recognised today that these have an extremely brutalising effect on the urban environment and in recent years good design practice has stood firm on the use of perimeter bollards: they should be kept to a minimum. With the statutory requirement to mitigate vehicular damage to buildings, and the raised awareness among the general public of the risks to safety, there is however a need to incorporate protective street furniture into many specifications, without compromising on aesthetics or exacerbating the sense of fear and unrest that goes hand in hand with this emotive issue. UTILISING STREET FURNITURE When specified thoughtfully, street furniture ranging from bollards to post and rail, planters, seating and litter bins provide an effective method of protecting a space without compromising on aesthetics, whether this is the pedestrian access to a building, a public walkway or a vehicle-free urban area. With careful planning, protective street furniture will act both as a deterrent and prevention against access by vehicles at high-speed with the intention of causing large-scale damage, without blocking pedestrian access. BSI PAS 68:2010 is the standard in place to address the needs of those who specify bollards for this purpose. This Publicly Available Specification (PAS) has been prepared to address the needs of organisations that require assurance that the vehicle security barriers they specify will provide the required level of impact resistance. BSI PAS 68 specifies a performance classification for vehicle security barriers and their foundations, when subjected to a
26
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
horizontal impact. Through specifying products successfully tested to BSI PAS 68, informed and proportionate security decisions can be made, in line with individual site requirements. CHOOSING THE RIGHT SYSTEM Many systems are considered suitable for use as vehicle security barriers. As their characteristics differ in both function and form, a comparative means of assessing their performance is required. PAS 68 identifies impact test methods, tolerances, vehicle type and vehicle performance: all criteria that need to be met in order to conform to the requirements. Meanwhile the associated design guidance for installation is provided in PAS 69:2006. Selecting a bollard for example that features a steel core will go some way to ensuring the product meets the specification criteria for perimeter protection. For instance, products with a RhinoGuard™ core have been independently tested by MIRA, proving they fulfil the demands of PAS 68. Differing levels of performance are available and the specifier needs to consider what level of impact the bollards must resist; for instance a 1.5 tonne vehicle travelling at 30 mph, or a 2.5 tonne vehicle travelling at 40 mph. These criteria will be based on a number of factors such as the location of the building, the type of vehicle access and the surrounding road layout. It could be argued that, while functionality is of prime importance, the installation of large cumbersome street furniture on the periphery of a carefully designed building might devalue the architectural aesthetic. Combined with this, the overall issue of security and public safety is a highly contentious one with CCTV in particular often being viewed in a negative light. However, with all these
systems it is the careful balance between the subtle and the overt, the seen and the unseen, that ensures the desired level of public awareness is achieved, without raising alarm or causing undue public anxiety. There are a number of factors at play: from the message an organisation wishes to send to its staff and visitors - that it cares about their safety and is doing the right thing - to the legal duty of care and the regulatory pressures under which it operates. Selecting a PAS 68 successfully tested street furniture range that has inner strength, outer beauty will ensure that both the security and the aesthetic requirements are met without exacerbating street clutter. GEO from Marshalls, for example, is a popular specification choice for urban realm projects that marries contemporary design with high quality materials to achieve a design that blends with both modern and traditional settings. DUTY OF CARE Security, public safety and a duty of care cannot always be fulfilled through the selection of stock specification products. PAS 68 is a highly regulated standard and ensuring that relevant products are tested in line with this benchmark will provide peace of mind. In addition, it is vital to consider the effect of the security measures on the building and those using it – opting for a product where design and cohesion with other elements of the urban realm have been addressed will help to ensure that perimeter security is provided in a subtle, yet effective way protecting people, places and infrastructure. FURTHER INFORMATION www.marshalls.co.uk
SECURITY
Crowd management is a key aspect of ensuring the smooth running of any stadium-based event. After all, maintaining a positive atmosphere is paramount to retaining fans again and again over time. But how do you get the balance?
Those ng managi must wd the cro ware be a ity and ivers of the dplexity of com viduals i the ind n that i with d crow
In 2012 the BBC’s investigative journalism programme, Panorama, aired a documentary highlighting pervasive violence, racism and anti‑semitism in football stadiums prior to the UEFA European Football Championship. While this programme focused on Eastern Europe, violent and racist hooliganism is unfortunately not a new phenomenon within football. Despite British football stadiums having a past dotted with unfortunate and traumatic events, the UK’s response to football‑related violence has become internationally recognised as a ‘success story’. The following measures have been cited as particularly relevant to this success; Travel bans and banning orders for fans convicted of football‑related criminal offenses; Strict speech restrictions to criminalise hate speech
and speech that incites violence; and modern policing tactics to lessen tensions between law enforcement and football supporters and better control large crowds. In order to cement the UK’s reputation of dealing effectively with crowd issues at large-scale events there are certain steps stadiums can take in tandem with the British legal framework to decrease anti-social crowd behaviour. ASSESSING THE RISKS In order to assess whether there are any weak points in current security strategies, it is often advisable to run a security survey to avoid the risk of complications occurring. For example, what control measures does your stadium use to control people entering and exiting? Could measures be improved to increase effectiveness? Are there spots within
ACCESS CONTROL Access control provides the ability to control, monitor and restrict the movement of people in, out and around a stadium. It is the ‘first step’ in your crowd management system. Most stadiums already make use of tools such as gates and turnstiles to monitor numbers and limit access. Indeed, many stadiums now employ full height electronic turnstiles, combined with smart cards, to help identify individuals entering the stadium. Amongst the many uses of these systems, they allow organisers to calculate flow rates in and out of the premises, monitor how many seats are left and estimate fill times. In addition, access control systems carry out an important health and safety function, by producing an accurate register of the amount of people within a building or area in case an evacuation needs to take place. Once visitors have been admitted to the premises in a controlled manner, it is important to monitor their behaviour and identify issues at the earliest possible opportunity. After all, as history has shown, crowd mentality can shift at an alarmingly fast rate. Indeed within the academia of crowd psychology going as far back as Gustave Le Bon (1897) great emphasis has been given to the speed at which negative or threatening behaviour can spread within large crowds.
Written by James Kelly, chief executive of the British Security Industry Association
STRIKING SECURITY BALANCE WITH STADIUM CROWDS
your system where individuals can gain access other than the designated entry points? Do staff members have the necessary training to manage the crowd if something goes wrong? It is only once you ask the difficult hypothetical questions relating to your stadium security systems that you will be able to improve effectiveness successfully. Sections within the British Security Industry Association (BSIA) such as Crowd Management, Police and Public Services, Security Guarding, Access Control, Close Protection and CCTV all have extensive experience in carrying out security functions during events of all kinds.
Crowd Management
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
THE TECHNOLOGY-PERSONNEL BALANCE CCTV provides unrivaled situational awareness and is useful in several ways. Firstly, effective CCTV surveillance reduces the number of security personnel needed ‘on the ground’ which, in turn, reduces costs over time. Secondly, it has been shown that crowds can respond negatively if there is a perception that the level of security is disproportionately high – CCTV is a less palpable and invasive tool. Finally, CCTV has been shown to have a strong deterrent effect given that footage is often utilised to ensure convictions of trouble makers. CCTV has seen vast technological innovation in recent years making it useful in a range of business settings including football stadiums. For example, Video Content Analysis (VCA) uses complex algorithms to automatically detect incidents of threat or violence, facilitating quick response E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
27
Safetyflex Barriers, are the next generation of Anti-terrorist and Anti Ram bollards, barriers and crash fences Designed to protect key infrastructure around the world, from vehicle terrorist attack, and criminal ram raid activities. We secure the most key sites in the UK including: n n n n n
London Olympic games Financial centres Data centres Shopping centres Military & Nuclear Facilities
Safetyflex Barriers Boston Place Foleshill, Coventry CV6 5NN t: +44 (0)24 76 664911 f: +44 (0)24 76 663020 w: www.safetyflexbarriers.com e: info@safetyflexbarriers.com e: us@safetyflexbarriers.com
SECURITY times. While CCTV provides effective surveillance, it is by no means a replacement for security personnel on the ground. Personnel who have been trained as crowd safety officers with an NVQ Level 2 in Spectator Safety cover the important role of securing against various threats, by controlling the crowd and, assisted by security operatives, deterring criminals from their intent. According to Kingshott (2014): “Those managing the crowd must be aware of the diversity and complexity of the individuals within that crowd.” CCTV allows personnel to focus their efforts more effectively; indeed footage can be linked to a digital map of the vicinity, ensuring that officers and event stewards can be marshalled effectively. SMART TECHNOLOGY Some stadiums now provide officers with smart phone and tablet technology so they can access and feedback situational-critical information. Crucially, should an incident suddenly kick off they can call up what is happening on their phone so they are not necessarily always relying on someone in the control room verbally relaying what is going on, which can take time. In addition, from a recording perspective, by using the in-built camera on their device they can take a snapshot or record an incident
Some stadiums now provide officers with smart phone and tablet technology so they can access and feedback situational-critical information as it happens. A major step forward here is the ability to ensure that this evidence can be given sufficient weight in court. Being connected back to the security management platform means there is a time and date stamp associated with the video so it can be logged as an incident in the same way as footage caught on a CCTV camera would be. Similarly, body worn cameras are becoming increasingly popular. Whilst historically having the right infrastructure and bandwidth has been an issue for the widespread adoption of these systems, the good news is that this is now being overcome as models are being brought to market that are able to stream video and audio content over advanced next generation IP radio networks. SURVEILLANCE Another current trend at large scale events such as football matches, is the use of Command Vehicles which offer a high visibility presence. Being mobile and typically featuring multiple CCTV cameras, including a mast-mounted unit, they provide a good all round view and can be moved
Crowd Management
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
to specific hotspots. For example, rival fans tend to cross or adjacent to public houses in the vicinity of a stadium. Experience has shown that careful positioning of a vehicle, in conjunction with a small number of officers, can effectively maintain a large crowd’s dynamics by moving or splitting sections of fans so preventing dangerous bottlenecks and clashes from developing. Another approach to surveillance is the use of ANPR (Automatic Number Plate Recognition) cameras at the entrance to stadiums to flag up the vehicles of individuals who have a history of anti-social or criminal behaviour. It is this ‘integrated approach’ to security that produces the best outcomes – stadiums should not be over reliant on either CCTV or personnel – it is important to strike a security balance. Similarly, in order for stadiums to operate in a highly effective and secure way it is necessary that they ‘stay on top’ of technology and innovation within the security sector. L FURTHER INFORMATION www.bsia.co.uk
Powersafe
Design, supply, install and service Perimeter Intrusion Detection
Systems (PIDS)
Automatic gates, barriers and
turnstiles
Rising bollards and road blockers Traffic and parking
management systems CCTV and thermal imaging Access control ANPR
Providing turnkey solutions for the specialist high security industry. Prioritising safety and attention to detail. Operating to the Supply of Machinery (Safety) Regulations 2008 www.powersafe.co.uk enquiries@powersafe.co.uk Freephone 0800 028 0712
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
29
DIGITAL FORENSIC INVESTIGATION TOOLS S ECUR I NG DATA THAT MATTERS
REMOTE I MAGERS
For efficient digital forensics and investigation, law enforcement,
WRITE BLOCKERS
military, and corporate security personnel around the world turn to
DATA STORAGE
CRU and its well-known line of WiebeTech devices. These dependable evidence-gathering tools
ENCRYPTION
are trusted for rugged high quality and fast performance. Learn more about the innovative Ditto Forensic FieldStation imager, sturdy WriteBlockers, reliable data storage, and CRU’s personal customer service at www.cru-inc.com/forensics.
www.cru-inc.com
sales@cru-inc.com
+1 360-816-1800
TRAINING
CLOSING THE CYBER SECURITY SKILLS GAP
It’s easy to get swamped by unending definitional debates when trying to grapple with cyber-terrorism. This short article is going to avoid being prescriptive. Rather, it places the emphasis on countering cyber-terror, to offer a more productive, problem-based view and practical set of considerations. Here are some problems one might consider in scope: the rapid and sustained spread of ideas that both inspire and cause anxiety and distress; and malicious attacks on hardware, software, data and people that cause harm. We can plan to counter these without having to define cyber-terror. For example, whether someone is necessarily terrorised or killed is a limiting view, as real day-to-day problems still remain to be
addressed. What is required are skills and knowledge, ways of operating and leadership. SKILLS SHORTAGE There is a well-documented shortage of individuals with sufficient technical skills in the cyber area. It suggests that supply from colleges and work-based learning is not meeting demand. Many colleges are working to design and build courses, supported by government initiatives that seek to shape efforts around common bodies of knowledge or industry standards. For example, the UK Centres of Excellence initiatives, championed by GCHQ, have sought to endorse courses that align with the Institute of Information Security Professionals (IISP)
There ge rta is a sho iduals of indivfficient with suskills in the al technic rea. It suggests cyber a t supply is tha eting not me nd dema
skills framework. Of course these initiatives are only in part driven by responses to terror. Motivations are diverse such as intellectual property theft, growing a digital economy, e-crime and hostile activities by states. There is also a question of who needs to be educated. For example, if we accept the view that cyber security is everybody’s responsibility, can it not be argued that counter-terrorism is also everybody’s responsibility? Take the radicalisation of young people through social media, inspired to leave Britain to join terrorists in other parts of the world. This brings ethics, religion, values and education into scope, nurturing the cooperation of whole families and communities. It calls for the up-skilling of teachers, police officers, community figures and many others in culture, communications, online safety advice, recognising warning signs and other matters associated with ‘Prevent’. E
Written by Nigel Jones, Global Institute of Cyber, Intelligence and Security
At a time when international cyber-security is being continuously tested, do we have the skills and knowledge to counter such threats? Nigel Jones from the newly-formed Global Institute of Cyber, Intelligence and Security, examines the issue
Cyber Security
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
About the GICIS The Global Institute of Cyber, Intelligence & Security (GICIS) launched on 21 January 2015, at a time when the threat to national and international security is higher than ever. Unlike other courses on offer in the UK, GICIS is a dedicated institute, offering courses in Resilience, Policing, Cyber Security, Counter Terrorism, Financial Crimes, Security & Military. These short courses are aimed at professionals, seeking to update or expand their knowledge and expertise in key areas, as well as individuals from other backgrounds who are looking to benefit from such knowledge and practice. The GICIS, in partnership with a range of subject matter experts and awarding bodies aims to provide the required training and education to meet these knowledge and skills requirements. For more information and details of short courses and faculty, please see www.gicis.co.uk.
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
31
SECURITY REIMAGINED
THE BLINK OF AN EYE That’s how long it takes cybercriminals to bypass most security defenses. Why do the top retail, financial services, energy, and government organizations trust us to protect them from cyber attacks?
We don’t blink.
www.FireEye.com © 2014 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
About the author Nigel Jones is a freelance consultant, researcher and faculty at the Global Institute of Cyber, Intelligence and Security (GICIS) and has just started up his new company, ‘Right Objective Limited’.
It is in g nin our traiments, h establis ls and o scho s, where itie univers us thought rigoro applied to can be problems future
REDEFINITION OF SKILLS The capacity problem in skills and knowledge is exacerbated by the redefinition of core skills for law enforcement and military personnel. Now nearly every crime (and terror investigation) has a digital element, crucial to intelligence and evidence. To not include social media or technical factors in an investigation or operational factor is almost inconceivable. On one hand the highly technical skills and knowledge mentioned before are in short supply, on the other, leaders will not give appropriate direction to the intelligence cycle, if they are unaware of technological and social changes to everyday lives. Moreover, there is an ongoing, highly controversial, public debate about what are appropriate ways of working for intelligence and other agencies. Indeed, if one can argue that counter-terrorism is everybody’s responsibility, how do we define the scope of surveillance? DEFENCE OF INFORMATION SYSTEMS The problem of ways of working also extends to how active we wish to be in our defence of information systems. One view holds that we cannot ‘patch’ our way to security, as patches for system vulnerabilities are only deployed post their discovery. One therefore needs to be ‘forward’ of the network in
hacker communities and other forums trying to get wind of what might be coming. This also applies to exploiting information systems to assess the future generic capability and intention of threat actors. The challenges of ways of working are not only technical but also legal and ethical. This is because the techniques used for cyber intelligence may look exactly the same as those for cyber attack. International consensus on this is currently hindered by low levels of trust in relationships, coupled with competing interests. Leadership is therefore required for a number of key reasons. First is to pursue the confidence in measures required in building international consensus on addressing the problems (even when we can’t agree on precise definitions). Second is that whilst counter-terrorism is everyone’s responsibility, it is critical that there is senior sponsorship, or we are left with the futile activity of no one driving change, and maintaining momentum. Finally, it is only senior leadership that can bring the diverse elements required to address the problem spaces above – a strategy with ends, ways and means. New ways of working need to be instituted and supply and demand shaped to meet the skills and knowledge gaps, both specialist and core.
Cyber Security
TRAINING
Prior to this he was at Cranfield University at the Defence Academy of the United Kingdom for six years as a Senior Research Fellow and Senior Lecturer in cyber security and information operations. He set up the Cyber Masters Programme for UK Defence as well as the UK FCO Chevening-TCS International Cyber Policy programme for Indian Fellows. He co-developed the operational culture educational programme for deploying cultural advisers. Researching and teaching across the socio-technical domain, he has particular interest in operations planning, communication and behaviour in the physical and online worlds. Before Cranfield, Nigel was Director of the Technology Strategy Boards’s (now Innovate UK) Cyber Security Knowledge Transfer Network, bringing academic, public and private stakeholders together to work on innovation in contemporary cyber security challenges. This he did whilst at QinetiQ PLC where he ran a cyber-security and information operations research and consultancy team, working across sectors in the critical infrastructure and the Ministry of Defence Research Programme. His interest in communications in security and conflict stems from his 16 years in the Army, that saw deployments in which he ran communications campaigns or provided training in audience analysis and communications planning. So much of this short article has dealt with training and education. It is essential that leaders in government and industry have a close two-way relationship with education providers. It is in our training establishments, schools and universities, where rigorous thought can be applied to future problems, and our counter-terrorism practitioners and citizens educated. Trust and a shared purpose are essential. L
Nigel Jones and Ian Tunnicliffe will be speaking at CTExpo on Tuesday 21 April in the Cyber Threat Intelligence stream. FURTHER INFORMATION www.gicis.co.uk
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
33
Infosecurity Europe
EVENT PREVIEW
THE INFORMATION SECURITY DEBATE Infosecurity Europe on 2-4 June is the annual event for information security professionals looking to protect their information assets and sensitive data wherever it resides
Information security is no longer just about protecting the network against attacks. It is about building resilience within an organisation to ensure measures are in place to respond and recover rapidly to minimise business impact in the event of a breach. Infosecurity Europe, now in its 20th year, is the annual business and education platform for information security professionals. The event features strategies, tactics and techniques that organisations need to adopt to bolster their security posture, ensuring that they can protect their information assets and sensitive data wherever it resides. During 2-4 June in London, the event gives visitors access to over 345 vendors from 24 countries, offering new products and solutions to address industry challenges. It also provides a unique opportunity to network with 15,253 unique international peers covering 72 nationalities and develop your career by attending the world’s largest free seminar programme. WHERE EUROPE TALKS SECURITY Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. Attendees reflect all key sectors of the information security industry, including finance, government, telecommunications, manufacturing and technology, media and broadcasting, retail and wholesale
distribution, healthcare and many more. Whether you are a junior or senior information security professional, the event features world-class opportunities to grow your professional network, share best practices, and network with the greatest minds in security. Infosecurity Europe presents pivotal opportunities for buyers to meet, source and compare industryleading vendors and service suppliers – 99 per cent of visitors fulfil their aim to see the top industry players all in one place. Discover the latest products, services and solutions by visiting new brands in the New Exhibitor Zone, or checkout the Country Pavilions that feature country-specific pavilions including the USA, France, Northern Ireland and Israel. This is your best opportunity to receive expert advice and to discuss your bespoke needs and challenges with key industry experts on all information security topics, from mobile security and malware, to user management and APT. The exhibition floor features the world’s top-tier IT and information security vendors, manufacturers, service suppliers, distributors and value added resellers. Come and find the
information security and IT solutions you need, such as application, cloud or mobile security – and discover new emerging technologies. SEMINAR PROGRAMME The event features the world’s most comprehensive free information security specialist seminar programme, with over 120 hours on offer. Six specialist content streams showcase current and emerging technologies and deliver practical expertise in benefit-led technical, strategy and technology sessions. Shaped by the industry for the industry, the seminar programme addresses the latest information security challenges in information security. Over 200 influential global expert speakers stimulate debate and share experiences in a multitude of formats to service all educational needs and preferences. THEME The theme for this year’s Infosecurity Europe conference is ‘Intelligent Security: Protect. Detect. Respond. Recover.’ As organisations accept that it is no longer a case of ‘if’, but ‘when’ they will be breached, information security practices are evolving with greater emphasis on building cyber resilience. As information security professionals face a multitude of conflicting risks and priorities, their challenge is to develop an ‘Intelligent Security’ strategy, tailored to the organisation’s risk profile, and balancing protection and detection with the ability to respond and recover.
urity Infosec pe Euro st o is the mdate in nt importalendar for the ca on security ti informafessionals p ro urope across E
KEYNOTE STAGE This year’s Keynote Stage agenda will address the theme of ‘securing the connected enterprise’. As hyper-connected organisations evolve, expanding the network E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
35
LIMITED VISIBILITY IS AS GOOD AS NO VISIBILITY If you can’t see everything that’s happening on your network, you can never be completely confident you’re not already under attack. To truly protect your network, the ability to see into even its darkest corners is vital – Gigamon’s Unified Visibility Fabric™ delivers 100% visibility and security solutions that scale to handle any threats to your critical data, now and into the future.
Gigamon’s network security solutions put the power back in your hands.
TEL: 01344 859 870
www.gigamon.com/campaign/security
LOOK CLOSER. GO FURTHER.
EVENT PREVIEW
As information security professionals face a multitude of conflicting risks and priorities, their challenge is to develop an ‘Intelligent Security’ strategy, tailored to the organisation’s risk profile, and balancing protection and detection with the ability to respond and recover
National Crime Agency, DWP, PT Portugal, Europol, Kentucky Health, BBC, Richemont International, John Lewis, Bank of England, The Noble Group, FCC Group and NATS. What’s more, the seminar sessions at Infosecurity Europe are accredited by leading industry associations (ISC)² and ISACA. Attending sessions enables attendees to collect CPE/CPD credits to further develop their career and share their skillset and insight at all levels.
perimeter, adopting new technologies and working practices are facing an increasingly complex threat landscape, information security strategies need to evolve too. During the three days of Infosecurity Europe 2015, the Keynote Stage, vibrant hub of the seminar programme, will provide attendees with direct access to unrivalled information. Security knowledge and expertise from some of the industry’s leading end-user practitioners, policy-makers, analysts and thought-leaders will be shared. Delegates will gain new ideas, insight and actionable intelligence to enable them to secure the connected enterprise. They will, in addition, leave with strategic insight and practical tips that will enable them to streamline their information security strategy, accelerate the effectiveness of their security tactics and enhance their professional skills.
NEW FOR 2015 Infosecurity Europe attendees have requested more in-depth, technical research presentations that discuss new and emerging risks and threats and share tools, techniques and strategies to address them. In order to meet this need, we are delighted to announce the launch of Infosecurity Intelligent Defence in 2015, a two-day paid-for technical research conference, focusing on the latest research, including insight into new vulnerabilities and exploits and how to defend against them. Taking place alongside Infosecurity Europe on 2-3 June 2015, the conference will provide a new and exciting platform for the latest technical research and defensive tools and techniques to be shared with the wider information security community. Attendees will dive into the latest risks, trends, cyber-attack methodologies, and intelligence-based defence strategies to detect, contain and respond. Infosecurity Intelligent Defence is proud to introduce its advisory council of industry luminaries supporting the event. They will be curating the content and vouch for the high quality and expertise of the speakers and content presented. These include Dr. Eric Cole, Chief Scientist, Secure Anchor Consulting; Fellow, SANS Institute and Infosecurity Europe 2014 Hall of Fame Inductee; Jack Daniel, Strategist at Tenable Network Security; Rik Ferguson, Global VP Security Research at Trend Micro, Infosecurity Europe 2011 Hall of Fame Inductee; Trey Ford, Global Security Strategist at Rapid7 and James Lyne, Director of Technology Strategy, Sophos.
KEY DISCUSSIONS There are several areas that will be discussed on the Keynote Stage, with the first being establishing an enterprise-wide cyber-security culture. Security has often been an after-thought in business, with a perceived conflict between security, and agility and flexibility. Increasingly however, as cyber security and resilience move up the board agenda, organisations are realising that for information security to be truly effective, all sectors of the business need to be engaged. But what are the key steps to creating an information security culture within an organisation to ensures that the user is the front line of defence? What approaches can be adopted to motivate the workforce and change the culture? How can organisations encourage a holistic security culture that goes beyond simply raising awareness? Infosecurity Europe 2015 delegates will gain practical insight into how to build a cybersecurity culture within their organisation. Secondly, the Keynote Stage will discuss understanding the cyber adversary. The Sony breach has made headlines around the world. Whilst the finger has been pointed firmly in the direction of North Korea by US law enforcement, dissenters have suggested other factors may be responsible including an ex Sony employee and hacktivists. Others suggest North Korea may have hired hackers from outside its borders. Whatever the truth, the diversity of the cyber-crime landscape
has been thrown into stark relief and raises the questions: Who is the cybercriminal? What motivates them? And who is targeting you and your organisation? Attendees will delve into the ‘who’, ‘what’ and ‘why’ of the cyber-criminal, and gain intelligence to get into the mind of the attacker, to drive strategies to protect your organisation. Building resilience and an effective incident response capability is a crucial message that will be presented on the Keynote Stage. Regardless of the measures an organisation adopts to protect itself, it will likely be breached. As a result, incident response and business continuity are gaining attention as organisations focus on building cyber-resilience to mitigate the risk and ensure that they are able to withstand the impact of a breach. But what are the critical measures that an organisation should take to ensure that they respond and recover from an attack as rapidly and efficiently as possible, limiting the financial, operational and business impact? Delegates will gain insight into best practice incident response and business continuity. INFORMATION SECURITY PRACTICES Finally, building a next-generation cyber‑security roadmap remains an integral issue. The rapid pace of change and transformation within organisations often puts information security functions on the back foot as they attempt to keep up with evolution of new technologies and business practices, and employee and customer behaviour. As organisations move from a legacy environment with clear perimeters and controls, to a connected and collaborative structure, information security practices need to develop to balance security with business mobility and agility. At the same time, information security functions need to protect the expanding enterprise as mergers and acquisitions confound an already complex business landscape. And all this is against a background of increased sensitivity to privacy and the ‘Internet of Things’. Delegates will discover how to keep pace with the business to optimise security whilst enabling innovation and agility. Speakers already confirmed to speak on the Keynote Stage at Infosecurity Europe include senior representatives from GCHQ,
Infosecurity Europe
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
CELEBRATING 20 YEARS For 19 years Infosecurity Europe has been growing and going from strength to strength, constantly evolving to ensure that the education programme and show floor continue to reflect this fast‑paced, innovative industry. Infosecurity Europe 2015 will be the show’s 20th anniversary, and we have a host of new features planned, including new training courses, exclusive VIP roundtables, and many exciting on-site features. L FURTHER INFORMATION www.infosecurityeurope.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
37
DOSarrest’s fully managed, cloud-based DDoS protection service guarantees website availability and keeps attackers out!
DDoS attacks are larger and more sophisticated than ever before. It can paralyze your website, leaving you unable to process transactions, accept payments, and disseminate information. A combination of attack methods can lead to data loss, ID theft, and fraud.
Traffic scrubbing centers in London, NYC, LA and Singapore. DOSarrest has been protecting websites against DDoS attacks since 2007
US/CAN Toll Free: 1 • 888 • 818 • 1344 UK Free Phone: 0800 • 016 • 3099 Singapore Toll Free: 1 • 800 • 101 • 1796 Email: sales@DOSarrest.com
INFRASTRUCTURE
Tony Berning of OPSWAT outlines a secure data workflow which organisations can implement in order to balance their security needs against their operational requirements
According to research performed by Lloyd’s of London insurer, Aegis London, “in the first half of the 2013 fiscal year, the US Department of Homeland Security’s Industrial Control Systems–Computer Emergency Readiness Team responded to more than 200 incidents, 53 per cent of which were in the energy and utility sector, and many of them sponsored by states such as China”. Efforts to improve the security of critical infrastructure systems like nuclear power plants and water treatment facilities have accelerated at a rapid rate since the issuance of US Executive Order 13636 Improving Critical Infrastructure Cybersecurity, on February 12, 2013. PORTABLE MEDIA As attacks become more sophisticated and digital control systems increase in complexity and levels of automation, it is increasingly difficult to prevent threats from impacting
Written by Tony Berning, OPSWAT
PROTECTING CRITICAL INFRASTRUCTURE FROM PORTABLE MEDIA THREATS
Protecting Utilities
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
cure The se rkflow o data wwithin a policy frastructure l in critica ility should est may require unique fac the high security policies. t n p attem of precautio This article outlines a secure data workflow level hievable which organisations ac
the operation of critical infrastructure. As a security measure, most critical infrastructure systems are air-gapped, or isolated from external networks. Because of this, portable media is a primary vector for cyber-attack; it is often the only way to transport files to and from secure areas. As key attack vectors for malware, it is extremely important that extra attention is placed on securing the portable media devices that are brought in and out of a secure facility. While imperative to the protection of critical infrastructure, securing portable media devices is not easily done, and there are many requirements that can impact the portable media security policies for operators of critical infrastructure. In many cases, there is no single source for an organisation’s portable media security policy, and individual facilities
can implement in order to balance their security needs against their operational requirements, as well as how best to approach the crafting of security policies that address the inclusion of portable media while ensuring adherence to EO 13636.
SECURITY BALANCING ACT When making decisions about security policies for a critical infrastructure facility, the costs of implementing a stricter policy need to be weighed against the potential costs that could result from the failure of a weaker policy. The solution for each organisation will vary based on the requirements necessary to E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
39
New! Ultralightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance) Watch the video:
Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com
INFRASTRUCTURE meet their security and business objectives. Increases in digital security rarely come without a corresponding increase in operating costs. These costs include purchasing a security solution, implementing this security solution, and finally managing and maintaining the solution. Initial costs often include the physical infrastructure necessary to deploy the solution, such as servers, kiosks and networks, as well as the consulting services that are often required to implement the solution correctly. Following the solution deployment there will be ongoing costs, which include the monitoring and management of the solution, keeping the solution up-to-date, and educating employees. Employees must be trained on the new security policy and associated procedures, which often results in a temporary reduction in productivity as employees acclimate to the new security processes and procedures. That said, these expenditures must be weighed against the costs of a potential security breach, which can be enormous. Facilities may be forced to suspend operations if the breach is serious enough; the monetary impact of even a temporary shutdown is difficult to calculate given the nature of the industry. There are also the remediation costs, the forensics to assess the damage as well as the removal of any malware that has found its way into the secure network. Coupled with this is the significant productivity loss, as employees’ usual workflow is hampered during the investigation and cleanup effort. Monetary damages aside, there are other costs that may result from a security breach. The impact to an operator’s reputation can be serious, criminal liability and class-action lawsuits may follow if others are negatively impacted. Depending on the breach, the loss of classified or sensitive information is also a possibility, the financial impact of which may be hard to quantify. Finally, by definition, any operator of critical infrastructure provides services to the public, which, if disrupted, will have significant negative impacts (such as power outages) on many individuals and groups outside of the operator itself. DEFINING ACCEPTABLE MEDIA AND CONTENT Defining a portable media and content strategy is key to a secure data workflow policy. As with all security programs, development of a program and policy should consider the business and technology requirements and limitations of an organisation. When developing a secure data workflow policy, organisations should first define what types of portable media are acceptable and how they can be used. In secure facilities, the standard policy is to restrict the types of media and files to only those necessary for employees to perform their jobs successfully. For example, if there is no business reason for USB drives in a facility, these should be prohibited to eliminate the risk they introduce.
While imperative to the protection of critical infrastructure, securing portable media devices is not easily done, and there are many requirements that can impact the portable media security policies for operators of critical infrastructure Another facility may decide to only allow USBs and CD/DVDs and ban other types of portable media like external hard drives. For example, if an external storage device has multiple partitions or is not a read-only device it could be classified as a high security risk and therefore not adhere to the secure data policy. The same is true for limiting the files that are permitted by an organisation’s security policy. Administrators may choose to limit the file types that are allowed; for example, banning executable file, but allowing document files. Administrators could also filter files based on their properties; for example, limiting files to a specific size or blocking any encrypted files where a password has not been provided. DESIGNING SECURE DATA WORKFLOWS The secure data workflow policy within a critical infrastructure facility, especially pertaining to physical media being brought from an insecure environment into a secure network, should attempt the highest level of precaution achievable. The best security policies have multiple layers of protection, to guard against many types of threats, both known and unknown. This defence-in-depth strategy will minimise the risk of any one threat getting past all of the security layers. A secure data workflow should leverage threat protection methods including: User authentication and source verification: Prevent unauthorised users or sources from bringing in data and facilitate logging for future auditing; File type analysis and filtering: Prevent risky file types from entering the facility, including files that have spoofed extensions; Multiple anti-malware engine scanning: Detect threats that are known by any of the many commercial anti-malware engines, and leverage many varying heuristic algorithms to detect zero-day attacks; Document sanitisation: Further protect against unknown threats by using sanitisation methods to strip potential threats out of documents and images. KIOSKS A common implementation of the above referenced data workflow are kiosks stationed as check points at the entrance to secure facilities. Kiosks provide the bridge for any data entering a secure facility, so that the workflow can be controlled and known and unknown threats can be kept out of the facility. Anyone entering a secure area would be required to use the kiosks to scan
Protecting Utilities
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
all portable media drives before the devices are allowed entry. The kiosks would confirm the user, the source, the file type, look for any malicious partitions and malware, and determine whether the device is secure or if it requires further inspection. An administrator can then also add enforcement of the specific media devices that are allowed into the facility. For example, allowed media devices could be restricted to known, pre-screened portable media that are trusted to be “clean”. Any files allowed through the secure data policy above would need to be copied to the trusted drives before entering the secure facility. This workflow ensures that no portable media enters a secure area without first passing through a full data security analysis. Common architectures for a kiosk-based secure data workflow can include: standalone kiosks, kiosks networked together, and kiosks connected to a centralised scanning server. These solutions can be connected or disconnected from the Internet depending on the facility’s level of security, and the desire for ease of management. WEIGHTED AND QUANTIFIED The most efficient method of protecting a facility against the threats potentially found on portable media is a difficult one to establish for operators of critical infrastructure. There are many aspects that impact how a secure data workflow is defined and implemented, including the types of portable media expected to be brought into a facility by employees, outside contractors, and visitors. Each should be weighted and quantified to define a strong and robust secure data workflow policy that allows an organisation to operate in the most secure and productive way possible. CAUTION A critical infrastructure facility should err on the side of caution and develop secure data policies that are as restrictive as possible, but flexible enough to evolve with an organisation’s shifting security and business needs. An administrator should evaluate various data security policies, measure the benefits and costs of each one, and determine how to successfully implement the security solution. The best policy will be one that takes a facility’s specific business and technology needs into account and is designed accordingly. L FURTHER INFORMATION www.opswat.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
41
An Excelitas Technologies Company
Global Presence... ...Far Reaching Capabilities Image intensified sights Thermal sights Fused sights Defence modules Avionic optical displays Tactical infra red Space applications Integrated logistic support
Qioptiq phone: +44 (0)1745 588000 www.qioptiq.com FOR THE LATEST INFORMATION VISIT:
www.qioptiq.com
PHOTONIC PRODUCTS
OPTICAL EXPERTISE ENABLES MISSION SUCCESS TIME AFTER TIME
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Qioptiq designs and manufactures photonic products and solutions that serve a wide range of markets and applications including defense and aerospace, and research and development Qioptiq, an Excelitas Technologies company, designs and manufactures photonic products and solutions that serve a wide range of markets and applications in the areas of medical and life sciences, industrial manufacturing, defence and aerospace, and RandD. Innovation has long been recognised to be a key attribute of the success of Qioptiq along with highly skilled and motivated engineers and designers who are customer focused. With world-class capability in design, coupled with international award winning technical achievement, Qioptiq has demonstrated repeatedly an ability to convert technical innovation into producible cost-effective designs. NEW PRODUCT DEVELOPMENT Where the war-fighter is concerned Qioptiq has long recognised that new product development is crucial in maintaining the capability of a decisive fighting force. For the Special Operations element of that force ensuring mission success through innovative technology applications is vital especially as operations shift from Afghanistan and previously Iraq to new territory and an adaptive evolving enemy. To stay ahead constant innovation, research and technology is important, allowing engineers to consider the challenges of tomorrow and respond through an innovative approach. With a number of potentially revolutionary capabilities emerging as key enabling technologies the roadmap for Surveillance, Target Acquisition and Engagement is becoming increasingly interesting - with significant enhancements in sighting system capability through technology evolution and deeper integration. Craig Taylor, Marketing Communications, Defence and Aerospace, Qioptiq, commented: “Capturing new technological developments and successfully exploiting them is not a new concept. However, what is important is constantly considering new opportunities and adapting our approach. In a changing market, what’s important for our customers is our ability to deliver world-leading products that are effective, efficient and adaptable. In an environment of constrained defence spending, cost effectiveness is also a key consideration.”
Financial constraints in any industry mean time and money allocated for product design and development come under pressure. However the Special Forces community still need to procure new and specialised equipment as they seek to source gamechanging technology. Qioptiq therefore has an important role to play in continuing to push the boundaries of Weapon Sights and Surveillance Equipment for end-users with some significant product and technology development activity coming to fruition. It’s widely recognised that modern small arms weapon systems are incredibly accurate and reliable, and that the challenge is being able to DRI the target 24 hours a day, through all weathers and battlefield conditions, with users under physical and cognitive pressure. Sighting Systems need to be easy to use, effective through all weathers and provide the ability to detect targets at the maximum range possible in order to prepare the User for the next course of action. The challenge for Qioptiq is to provide all of this capability to the User in a package (or suite) that is easy to use and easily configurable for role / mission requirements, whilst remaining affordable and having the potential to endure a service life of 10-15 years. Steve Rickard, Qioptiq Business and Product Development manager “Qioptiq are totally committed to reducing the size weight and power burden placed on the end user – developing the battle winning equipment, while maintaining affordability. We will continue to develop, push forward and challenge the boundaries to ensure we always stay one step ahead” When considering soldier and vehicle systems, one is likely to find high performance optics from Qioptiq enabling thermal weapon sights (TWS), observation and targeting sights, night vision goggles (NVG), remote weapon stations (RWS), driver’s vision enhancement (DVE), situational awareness (SA), laser designators, eyepieces, helmet mounted displays (HMD’s), fire control, and laser range finders (LRF). In tactical missile systems one finds advanced domes from Qioptiq in a wide range of materials including ALON, Spinel, Sapphire, MgF2, ZnS, Cleartran, Silicon, and Germanium with complex geometries. missile
warning and targeting systems are enabled by Qioptiq High performance optical systems for IR and ultraviolet missile warners (MWS), IR countermeasures (IRCM), IRST, targeting pods -along with precision long-range zoom modules for border-surveillance, UAV and maritime applications in surveillance systems. Qioptiq provides solutions to meet the individual requirements of its customers. Outstanding expertise has earned the company a worldwide reputation for innovation and excellence. Qioptiq has a complete inhouse capability to process the full range of optical materials and to design, fabricate, polish, coat, and mount optical elements. A FLEXIBLE APPROACH A flexible approach during design is matched with the capability across the visible to IR wavebands, providing integrated optical solutions with any sensor technology currently available. With a combination of dynamic engineering, manufacturing expertise, motivation and reputation, Qioptiq has the total capability to provide some of the most innovative and focused optical solutions to today’s technological challenges. This strategic approach has made Qioptiq the preferred choice for a wide variety of prime contractors and military establishments around the world. From boots on the ground to eyes in the sky Qioptiq capabilities are enabling mission critical systems and platforms in some of the harshest environments on the planet. L FURTHER INFORMATION www.qioptiq.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
43
INFRANOR Drive & Motor Repairs Specialists in Old and Obsolete Drives
Our Engineers will provide a comprehensive service -finding the solutions to your Infranor equipment breakdowns.
An easy to use service—That could save you new equipment! Infranor Uk offers their customers excellent support services to find the best practical solution available to suit their requirements.
Why Use Infranor Repairs?
Fully equipped repair lab to Identify faults and component failures Manufacturer of Specific Test Rigs Diagnostic Tools Fast turnaround service Repairs are given function tests with dynamically loaded motors On-Site Service and Support
With more than 35 years accumulated experience incorporating all stages of design and production enabling us to offer a broad range of knowledge to repair your motor/drive restoring it to its original high performance.
+44 (0) 208 144 2152
info.uk@infranor.com
Infranor UK, Building 555, Bentwaters Business Park, Rendlesham, Suffolk, IP12 2TW
MECHANICAL PROCESSES
XTRAPULSPAC: THE SMALL DEVICE FOR THE TOUGHEST OF REQUIREMENTS
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The most recent addition to INFRANOR’s product range is XtrapulsPac, a compact and flexible low-power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications XtrapulsPac can be configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion-controller via the fieldbus and uses well-known standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications, and is available in a small device at an affordable price, which meets the most demanding of requirements. Control loop: digital drive for AC synchronous motors – current loop 62.5 μs – speed and position loop 500 μs – closed loop control of position, speed or torque – maximum speed up to 25,000 rpm. Feedbacks: resolver – incremental encoder – hall sensor – SinCos encoder – single and multi-turn HIPERFACE® encoder. Communication interfaces: RS-232 up to 115.2 kbit/s baud rate – CANopen or EtherCAT® fieldbus – DIP switches for node address. Safety features: safe torque off SIL 2. I/O interfaces: user-configurable digital I/Os – all-digital inputs opto-isolated – analog inputs ±10 V/12-bit resolution – analog output 0-5 V/8-bit resolution – ‘amplifier OK’ output – motor brake control – two-channel STO function. MODES OF OPERATION DS402 standard mode: interpolated position mode – profile position mode – profile velocity mode – profile torque mode – homing mode. DS402 extended modes: analog speed mode – stepper emulation mode – sequence mode – master/slave mode stand-alone operation – analog speed drive – positioner – stepper emulation – electronic gearing. Stand-alone operation: analog speed drive – positioner – stepper emulation – electronic gearing. Configuration tools: motor and drive configuration – application configuration – interface configuration – auto-tuning, auto-phasing – sequencer programming. Project tools: project creation – project management – file-handling services – motor libraries – multilingual software. Diagnostic tools: device control – device monitoring – object dialog window – multi-axis oscilloscope.
FREELY CONFIGURABLE DRIVE The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive’s non-volatile memory. The XtrapulsPac drive can be controlled: via the fieldbus (CANopen or EtherCAT); via the analog input (analog speed drive); via the PULSE and DIR inputs (stepper emulation); or via the digital I/Os (stand-alone positioner) according to the selected operation mode. To allow Infranor an even more flexible approach to servo-controller, servo-amplifier solutions, the company also has the XtraPulsCD1 servo-drive. XtrapulsCD1-a alldigital servo-modules are PWM servo-drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block, including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a’s drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. With a resolver sensor feedback, the motor’s absolute position value over one revolution is available and the
servomotor can immediately be enabled after the drive power up. With a ‘SinCos tracks’ sensor that provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and of a period equal to the motor pole pitch, the servomotor can be immediately enabled after the powering of the drive. Having an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servomotor can also be immediately enabled after the drive power-up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power-up before the motor enabling. As it has an incremental encoder + Hall Effect Sensors (HES) feedback, the motor-phasing procedure is no more necessary and the servomotor can immediately be enabled after the drive power-up. With an absolute single-turn, multi-turn or linear encoder using the EnDat® or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servomotor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution (ppr) and 16,384 pulses per revolution can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The auto-phasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L
FURTHER INFORMATION info.uk@infranor.com www.infranor.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
45
Don’t become a casualty of terrorism...
o LPCB SR4 and SR5 products o Discreet up-armouring of homes and offices o Panic rooms o Full service from site assessment to installation
STAND A26
ISO 9001 Registered
Quality Management
Bastion Security Products Limited 5A New York Way, New York Industrial Park, Shiremoor, Newcastle upon Tyne NE27 0QF T: 0191 257 3100
www.bastionprotects.com
EVENT PREVIEW
INTERNATIONAL SECURITY FOR AN EVOLVING WORLD
Counter Terror Expo – the international event for those tasked with mitigating terrorist threats – comes at a time when terrorism and unconventional threat levels are at heightened levels
Recent events in France and Nigeria, to pick just two, have accentuated the myriad of different threats that have proliferated since the 1990s. As the threats have increased and mutated, the responses of countries, government agencies, and non-government actors have had to change almost beyond all recognition. Counter Terror Expo 2015 on 21-22 April at London’s Olympia, covers these key terror threat areas under one roof, and uses the underlying principles that form the ‘UK’s Strategy for Countering International Terrorism’ to link everything together. The four principles that make up what is also known as the ‘Contest Strategy’ are: Pursue, Prevent, Protect, and Prepare. The Pursue principle aims to stop terrorist attacks; the Prevent principle to stop people becoming terrorists or supporting terrorism; the Protect principle to strengthen protection against a terrorist attack; and the Prepare principle to mitigate the impact of a terrorist attack.
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
WORLD COUNTER TERROR CONGRESS At Counter Terror Expo 2015, the overall scene is set by the World Counter-Terror Congress. Presentations on topics as diverse as communications security in a post‑Snowden Age, use of digital media by radical groups, and the impact of new terror tactics are joined together under the four ‘Contest Strategy’ headings. More detailed intelligence updates on Al Qaeda, ISIS, Boko Haram, to name just some of the terror groups that are most frequently reported on in the media. Supporting briefings and presentations are provided by the Quillam Foundation, RUSI, University College London, the Metropolitan Police and the Home Office. Nearly 200 internationally‑recognised experts in counter terrorism will gather at the World Counter Terror Congress to debate the threats we face, define operational strategies and to help shape future policy. Confirmed speakers include Charles Farr, Director of the Office for Security and Counter‑Terrorism (OSCT) at the Home Office, who will lead debate on the extent to which the UK security services can protect the country from terrorism. Farr will provide current estimates on UK and European fighters in Iraq and Syria as well as estimates of returnees and strategies for tracking their activities. Dr Jamie Shea, of NATO’s Emerging Security Challenges Division analyses where future threats to our security may be coming from. Shea also provides updates and latest working strategies from Syria, Iraq, Ukraine and Turkey. Conversely, Dr Brooke Rogers, a reader in Risk & Terror at King’s College London, E
r Counte r Terro on 15 Expo 20 pril at 21-22 AOlympia, ’s London ll key terror a covers eat areas thr ne under o roof
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
47
Phone: +44 1789 868 840 ď Ź Email: infouk@ceia.net
EVENT PREVIEW presents a talk on the psychology of violent radicalisation – focusing on the pathways into violent radicalisation and the motives for European’s to join terrorist organisations. With a specific attention on Islamic State, George Readings of Stirling Assynt UK approaches how the emergence of IS is affecting other jihadists, and how the prominence of IS proposes further threats to the West, Syria and North Africa. Mark Rowley, Head of Specialist Operations and Assistant Commissioner, Metropolitan Police examines terrorism, extremism and the home-grown threat to the UK, including assessing the current threat and our range of responses. Rowley said: “I am very pleased to be invited to speak at the World Counter Terrorism Congress. Recent terrorist attacks in a number of different countries have reinforced the need to raise and maintain public awareness levels. “As well as needing to remain alert, it is imperative that law enforcement organisations, business and the public understand the nature of the threat and what they should be doing about it. Good preparation is a way of reducing the impact
From the 9/11 aircraft hijackings, through the 2004 Madrid Atocha train bombings to the similar attack on the London Underground in 2005, transport presents ideal targets for terror groups of terrorist incidents – and helps prevent them from happening in the first place.” CYBER CRIME The cyber terror threat is covered extensively in the exhibition’s Cyber Threat Intelligence strand. The past few months have given much to consider here. From the hacking of Sony Pictures, through to the hacking of the US Defense Department’s Central Command, which had its Twitter and YouTube feeds taken over by a group claiming to be aligned with ISIS, this threat has seen massive changes of late. And it isn’t just the state-on-state threats, also seen in hostile Russian cyber attacks on neighbours, that present severe challenges. The use of cyber techniques by criminal groups is an equal challenge to law enforcement agencies as well as commerce. The Cyber Threat Intelligence strand sees key updates
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
from UK Government Communications HQ, Europol, and the UK’s National Cyber Crime Unit, backed up by ‘coal face’ presentations from key industry leaders in the area. Cyber Threat Intelligence brings together all those who must prevent or prepare for cyber terrorism or cyber-crime. This includes the UK and international governments, policing and security organisations, academic experts, businesses and professional associations. The conference will also unveil new developments in cyber security. The Cyber Threat Intelligence conference will include keynote presentations from David Raw, of the Office of Cyber Security & Information Assurance and Andy Archibald of the National Crime Agency. Archibald reviews the National Cyber Crime Unit’s achievements and challenges in regards to investigations and prevention, before assessing the E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
49
Seminar programme: Critical National Infrastructure DAY ONE: 21 APRIL 2015 09:00-09:20 Coffee and Registration
Counter Terror Expo 2015
EVENT PREVIEW
09:20-09:30 Chairman’s Welcome and Introduction Jerry Smith, Organisation for the Prohibition of Chemical Weapons Session 1: Assessing the threats facing our critical national infrastructure 09:30-10:00 Working in partnership to ensure security for key national infrastructure Stephen Phipson, Head, Defence & Security Organisation, UKTI
ing Mitigat reats h terror t national ter is an in nd Counter NATIONAL issue a po will be a CRITICAL INFRASTRUCTURE x E Terror athering with The threat to infrastructure from global grs from over terror groups has been visito ountries a constant, but growing 100 c one. From threats to oil
UK’s capacity to prevent cyber crime. Furthermore, Terry Pattar, Senior Consultant of IHS Aerospace and Defence, deliberates the role that the political upheaval in the Middle East had on the frequency of cyber attacks, and why understanding the changing dynamics of cyber threats in the Middle East should be of increasing importance. Laurent Olmedo, Programme Director of Global Security at CEA, discusses the significance of scientific innovation in the management of cyber threats. Olmedo offers examples of innovative technologies and products and the best methods of integrating these into complex systems. On the second day of the conference Nader Henein, of the Blackberry Advisory Division, delves into the root causes behind certain public breaches and offers the opinion that they hinder preparedness. Adopting a damage limitation approach, Heinein advises on identification, development planning and tabletop exercises as essential steps in limiting the aftermath of cyber threats. The conference will also feature Amanda Finch considering specialist skills, John Palfreyman on the dangers of mobile technology and social media, Gabe Chomic on preventing compromise, and Simon Saunders on deciphering means, motive and opportunity within cyber profiling.
facilities, such as seen in Algeria in 2012 as well as in Nigeria and Iraq, to potential attacks on nuclear power stations, the sector presents a range of opportunities to terror groups, and thus risks to governments. So taking the Four P’s (Pursue, Prevent, Protect, and Prepare) as a guideline, the Critical National Infrastructure (CNI) seminar ranges across the options for identifying threats as well as solutions. Vital concept updates are given by the UK Home Office’s Security and Counter Terrorism department, GCHQ, NATO, and the Organisation for Security and Cooperation in Europe. To provide pin-point clarity about exactly what this can mean on the ground, the seminar also has feature presentations on the challenges of security at sporting facilities. Wembley Stadium is used as an example of the mass of such facilities that can seat close to 100,000 spectators, and the re-built New York World Trade Center will also be discussed. The CNI conference will bring together owners and operators, policy makers, practitioners and key supply chains to deliver insights into infrastructure protection and will unveil new developments in security and resilience. Participants will include Francis Morgan, Security Director, Heathrow Airport; E
10:00-10:30 International efforts in protecting critical energy infrastructure from terrorist attacks – a regional organisation perspective Thomas Wuchte, Head on Anti‑Terrorism Issues, OSCE 10:30-11:00 Understanding the potential threats to European CNI from CBRN material acquired in MENA Jerry Smith, Organisation for the Prohibition of Chemical Weapons 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 An update on the latest advances in protective security Government Security Adviser, Centre for the Protection of National Infrastructure 12:00-12:30 An update on the UK’s cyber critical national infrastructure 12:30-13:30 Lunch, networking, exhibition visit 13:30-14:00 Using social media, open source intelligence and red teaming to detect and mitigate threats to infrastructure Nigel Somerville, Head of Risk Management, Source 8 Session 2: Protecting major events and crowded places 14:00-14:30 The latest thinking and best practice on counter-terrorism physical protective measures for crowded places Alex Eytan, Enspire Solutions Limited E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
51
Where's Where's the best the place best place to check to check you've you've bought bought the right the right armoured armoured SUV?SUV?
>
>
Here? Here?
Or here?Or > here? Stand >N55, Stand Counter N55, Counter Terror Expo. Terror Expo. IntroducingIntroducing the Millbrook theLand Millbrook Cruiser Land L200, Cruiser L200, the most mission-suitable the most mission-suitable civilian armoured civilianvehicle. armoured vehicle.
It offers ballistic It offers protection ballistic to VR7 protection standards. to VR7 Exceptional standards.blast Exceptional protection blast protection including floor,including roof andfloor, side roof blast.and Plus side a class blast.leading Plus a class 750kgleading payload 750kg and payload and the most enhanced the most reliability, enhanced durability, reliability, comfort durability, and ride comfort quality and you ride can quality find. you can fin Special Projects Special team,Projects team, The L200 hasThe been L200 developed has been by developed Millbrook’sby Millbrook’s world-leadersworld-leaders in the modification, in thevalidation modification, andvalidation integrationand of vehicles integration with of vehicles with communications, communications, situational awareness situational and awareness mission specific and mission equipment specific - equipment and with extensive, and with proven extensive, counter-terror proven counter-terror expertise. expertise. Don’t enter a Don’t hostile enter environment a hostile environment in any other armoured in any other SUV. armoured SUV. Find out moreFind about outthe more L200 about at Stand the L200 N55,at Counter Stand N55, Terror Counter Expo, Terror Expo, nd Olympia, AprilOlympia, 21st & 22April . 21st & 22nd.
Millbrook, Bedford, Millbrook, MK45Bedford, 2JQ, UKMK45 2JQ, U Contact: DylanContact: Llewellyn Dylan Llewell Enquiries: +44Enquiries: 1525 404 +44 202 1525 404 2 Email: info@millbrook.co.uk Email: info@millbrook.co.
www.millbrook.co.uk www.millbrook.co.u
VEHICLE MODIFICATION
FULLY ENGINEERED SOLUTIONS FOR SPECIALIST VEHICLE MODIFICATION
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Millbrook provides fully engineered solutions for specialist vehicle modifications Millbrook is one of Europe’s leading design, test and engineering solution providers for the automotive, public transport, energy and defence markets. With more than 45 years’ experience the independent test and technology centre has extensive knowledge and expertise in the development and manufacture of specialist vehicles. The site has MOD accreditation for security and operates 24 hours a day, seven days a week and guarantees 100 per cent security and confidentiality. Millbrook’s special projects team are experts in the modification of production vehicles for government organisations and security agencies, drawing on extensive automotive capabilities, laboratories and 70km of ‘real world’ tracks to fully engineer conversions to OEM standards. Programmes range from extensive modifications with significant impact upon the OEM platform to simple one-off systems. Millbrook’s work includes vehicle development for up-rating, redesign of safety critical systems for increased payload and enhancing engine performance. Millbrook also installs discrete or covert communication and other specialist electronic equipment requiring thorough test, validation and verification, in order to deliver a fully integrated C4ISTAR (Command, Control, Communications, Computers, Intelligence, Surveillance, Targeting, Acquisition and Reconnaissance) system. In addition, Millbrook’s CAD capabilities include the design of optimally packaged ballistic and blast protection. PROTECTION IS PARAMOUNT Millbrook’s Armoured Vauxhall Insignia offers exceptional levels of protection without compromise to its profile, handling and ride comfort. Available as a SportsTourer or Hatchback, in left-hand and right-hand drive, manual or auto, front wheel drive or 4x4, the model range covers the ES through to the high performance VXR. Features of this discreet armoured vehicle include full 360 degree ballistic and floor blast protections. As well as this, the vehicle can be modified to include upgraded suspension, brakes and safety systems, and installations such as black-out function, run-flat capability and explo-safe fuel tank can be added. The Armoured Toyota Land Cruiser L200,
discreetly modified by Millbrook, has undertaken a punishing and extensive testing regime to ensure it is the most reliable and durable vehicle of its kind on the market. Fully certified under the current standards to VPAM BRV2009 VR7 level, the L200 is designed to respond to the increasing threat of Improvised Explosive Devices (IEDs) in hostile environments, and offers exceptional ballistic and blast protection. Currently available as a GX Turbo Diesel Auto, the Land Cruiser offers a class leading 750kg payload, which is substantially higher than other equivalent armoured Sports Utility Vehicles (SUVs). UNRIVALLED RELIABILITY AND DURABILITY The durability testing of both armoured vehicles includes ride and handling validation on Millbrook’s extensive terrains and road surfaces, in addition to off-road evaluation specifically for the L200. The vehicles’ suspension systems have been fully optimised including springs, dampers and anti-roll bars, selected to ensure excellent ride quality and to exceed design and mission specifications. The Armoured Vauxhall Insignia and Toyota Land Cruiser L200 are tested and validated to European automotive standards, brake tested to Home Office standards and the vehicles’ ride, handling and performance developed to VSAG standards. EXHIBITING AT THE COUNTER TERROR EXPO Millbrook will be exhibiting at the Counter Terror Expo, from 21 – 22 April at Olympia, London on stand N55. Jim Clarke, director of special projects at Millbrook, explains: “This is the third time we will have exhibited at the Counter Terror Expo and we’ve always found it to be a very successful event, with lots of valuable connections made. “Millbrook has extensive experience in the design, test, development and manufacture of discreet and covert OEM platforms. We are therefore able to provide quality, impartial and open advice to our customers, which enables us to engineer the most capable, reliable and durable vehicles that can be adapted to reflect the changing demands of the security industry.” L
Fast facts Armoured Vauxhall Insignia Armoured specification currently available: · Ballistic protection available up to VSAG VS6 (equivalent to VPAM BRV2009 VR7) · Full 360 degree protection provided · Floor blast protection to VS-UB-1a · Independently tested to European ballistic standards Armoured Toyota Land Cruiser L200 Armour specification currently available: · Ballistic protection fully certified to VPAM BRV2009 VR7 (equivalent to VSAG VS6) · Full 360 degree protection provided · Blast protection under floor up to HG85 · Blast protection on roof up to HG85 · Side blast testing up to 12.5kg PETN @ 4m · Under floor mine testing up to DM31 AP Fully Engineered Solutions & Integrated Systems Millbrook’s vehicle modifications include, but are not limited to: · Police fit (blue light and siren) · Black-out (all or brake lights only) function · Power management to support all on board systems in isolation, including split charge facility · Switchable SRS system (including air bag) allowing disablement and re-enablement · Run-flat capability · Tyre Pressure Monitoring system · Explo-safe fuel tank · Suspension for improved ride and handling characteristics · Oversized brakes from OEM for increased braking performance FURTHER INFORMATION Dylan Llewellyn Tel: 01525 404 242 info@millbrook.co.uk www.millbrook.co.uk
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
53
Visit Axis at Counter Terror Expo: Olympia , London 21-22 April Stand E45
Anything. Anywhere. Anytime.
We’ve got you covered. With threats possible from any angle, the unexpected is pretty much a guarantee for critical infrastructure. That’s why Axis focuses on securing you from perimeter to core. Our network video surveillance products help you secure your site in even the harshest conditions. Yet beyond that, we constantly work together with our partner network to bring you solutions that ensure safe, uninterrupted production that’s also more efficient.
www.axis.com/critical_infrastructure
EVENT PREVIEW Mark Prouse, Head of Security & Resilience Policy & Response, Department of Energy & Climate Change; Graham Wright, CISO & Head of Digital, National Grid; and Thomas Wuchte, Head of Anti-Terrorism Issues, Action Against Terrorism Unit, Organisation for Security Co-operation in Europe. Thomas Wuchte, Head of Anti-Terrorism Issues for the Organisation for Security & Cooperation in Europe (OSCE), holds a talk on protecting critical energy infrastructure from terrorist attacks on an international level. Wuchte outlines the OSCE’s inclusive approach of shared responsibility towards security matters, and the OSCE’s efforts to protect critical infrastructure. Alex Eytan, of Enspire Solutions, addresses counter terrorism measures for crowded places. He discusses what architects, designers and planners must consider in order to create safer crowded places and how it is essential to integrate this at concept stages. What’s more, Nigel Somerville, Head of Risk Management at Source 8, will highlight how social media monitoring combined with red‑teaming can highlight vulnerabilities, reinforce strengths and expose likely vectors of attack to ultimately mitigate or even deter the threat.
developments in transport security. Key addresses will be given from the UK’s Civil Aviation Authority, the Department for Transport, and industry players such as Boeing. The first session from the Transport Security Live stage will review current strategies that are in place to minimise risks to transport networks from terrorism and crime. Headed by Martin Jones, Head of Aviation Security for the Department for Transport, the opening seminar will analyse the impact that transport terrorism has on travel providers as well as travel systems. Following the opening talk, Andrzej Czapiewski, co-founder and Head of Research and Development at Cytora, dives into the issue of vulnerability within transport terrorism. Questioning where we are most vulnerable – air, rail, ports – Czapiewski discusses home grown terror and the complicated but very relevant issue of returnees from Syria. The second session of Transport Security Live focusses solely on aviation. Carolina Ramirex-Taborda, Director of Aviation Security & Facilitation, IATA, analyses the need for international cooperation and intelligence sharing in aviation security. This includes agreements on the sharing of flight
The threat to infrastructure from terror groups has been a constant, but growing one. From threats to oil facilities to potential attacks on nuclear power stations, the sector presents a range of opportunities to terror groups, and thus risks to governments TARGETING TRANSPORT The myriad of threats aren’t just focused against fixed infrastructure facilities: transport networks are a regular target for plans and attacks by terror groups. From the 9/11 aircraft hijackings, through the 2004 Madrid Atocha train bombings to the similar attack on the London Underground in 2005, transport presents ideal targets for terror groups. Although aircrafts are the highest profile targets, it is often transports means such as buses that see the most attacks – Boko Haram and Al Shabab have both carried out shocking fatal attacks on buses in Nigeria and Kenya recently. But the Transport Security Live Strand at Counter Terror 2015 will cover all these areas, with key addresses from the UK’s Civil Aviation Authority, the Department for Transport, and industry players such as Boeing. Transport Security Live brings together the key stakeholders from UK and international governments and security organisations, aviation, rail, secure transport, supply chain and major events sectors to provide a guide to best practice in transport security. It also offers an opportunity to unveil new
lists and updating pre board screening. Peter Drissell, Director of Aviation Security at the UK Civil Aviation Authority, continues the aviation session by approaching assurance and accountability, a topic he describes as the future of UK aviation security. Discussing the security management system (SeMS) approach to quality assurance and how SeMS offer regulatory evolution in aviation security. At the close of day one of Counter Terror Expo, Transport Security Live looks at secure transport for major events. With a discussion from Zeina Nazer, an ITS Arab and Senior Transport Expert, the seminar will precede the Chairman’s closing remarks of the day. The second day of the event considers video surveillance, rail security and maritime security. Discussing threats to the rail network, Dr John Easton and Dr Rhianne Evans from the University of Birmingham’s School of Electronic, Electrical & Computer Engineering, assess the implications of increased connectivity between terrorists and what protective measures are available. The importance of rail security is enhanced by Michael McGowan, Key E
Seminar programme: Critical National Infrastructure DAY ONE: 21 APRIL 2015 14:30-15:30 Panel discussion: Designing in security at major sporting grounds
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
15:30-16:00 Coffee, tea, networking and exhibition break Jerry Smith, Organisation for the Prohibition of Chemical Weapons 16:00-16:30 The Metropolitan Police perspective on ensuring the security of people and infrastructure in the capital’s most crowded airports Martin Hendy, Aviation Security, Metropolitan Police Service 16:30-17:00 Westgate Shopping Centre, Nairobi, Kenya attack and what we have learned about designing and protecting shopping centres against the threat of terrorism Garth Thompson and Tom Everard, Source 8 17:00-17:15 Chairman’s closing remarks and close of day one DAY TWO: 22 APRIL 2015 09:00-09:20 Coffee and Registration 09:20-09:30 Chairman’s Welcome and Introduction Session 3: Protecting critical energy infrastructure 09:30-10:00 Ensuring resilience for the UK’s energy infrastructure Mark Prouse, Department of Energy & Climate Change 10:00-10:30 Case study: Protecting UK electricity generation from terrorist attack Graham Wright, CISO & Head of Digital, National Grid 10:30-11:00 Terrorist threat intelligence for and gas infrastructure Andrzej Czapiewski, Cytora 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 The Ukraine/Russia conflict: Anticipating the potential impact on energy supply and security in Europe Sarah Lain, Research Fellow, RUSI E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
55
Rangemaster Precision Arms Limited and RPA Systems Limited are two British companies dedicated to providing the best Small Arms products in the world. We have recently introduced the new ULTRA series of 7.62mm x 51 and .338. Both these chassis systems incorporate our prize winning Quadlock action and utilises the optimum technology to ensure supreme accuracy and durability. Rangemaster has also recently redesigned its well-respected 50Â cal Heavy Sniper Rifle. We have successfully maintained the accuracy and low level of recoil, whilst achieving a general redesign to save weight and incorporate Cheek and Butt adjustment. RPA Systems Limited has recently introduced a new range of lightweight tripods for both Small Arms and Laser Targeting, incorporating RolaTube. We have additionally secured funding from the European Community Grant Scheme to enable our company to commence manufacturing precision rifle and gun barrels.
British precision hunting and target rifles at their best. Website: www.rangemasterprecisionarms.com Email: info@rangemasterprecisionarms.com NCAGE KB612
EVENT PREVIEW
Seminar programme: Critical National Infrastructure DAY TWO: 22 APRIL 2015 Session 4: Protecting transport, banking and communications infrastructure 12:00-12:30 Redefining protection for critical national infrastructure: the Internet of Things and critical networks and the risks posed to transport, financial services and communications infrastructure Nicolas Reys, Cyber-Threat Intelligence Analyst, Control
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
12:30-13:30 Lunch, networking and exhibition break Account Manager at Southwest What’s more, Nick Gillett of Astrophysics Microwave, who enforces the necessity of Inc (On behalf of Total Post) looks at vehicle perimeter intrusion detection systems (PIDS) scanning. He will say that the quickest and detection performance measures for way to inspect the inside of cars and ensuring safety into the rail environment. trucks is to X-ray them while they are still Nearing the close of the second day, the occupied which means that they can be Transport Security Live conference operates driven through the scanner. But is it safe a session on maritime security and how and what kind of dose is necessary? assessing threats to onshore and offshore maritime threats is essential to adopting INNOVATION ON THE EXHIBITION FLOOR safety. Amongst others, Gavin Simmonds, The Counter Terror Expo is expected to attract Policy Director at the UK Chamber of thousands of buyers and specifiers from Shipping, addresses emerging piracy models government, military, policing, emergency and the latest developments in on-board services and private security. Mitigating security, while offering advice on the latest terror threats is an international issue and developments in port security. the Counter Terror Expo exhibition The conference completes will be a global gathering r e t n with a case study on with visitors expected from u o C is o supply chain security. over 100 countries. p x E r Terro o attract Over 300 suppliers, t d e ADVANCED from leading UK and t s c r e o p t i s ex i v f TECHNOLOGIES international primes o s d The Advanced to specialist SMEs, thousan overnment, g , Technology Stage is a will be exhibiting m g o n r f polici es , free-to-attend two‑day their latest technology y r a t i l c i mi v r e seminar programme and equipment for s y nc where visitors can hear law enforcement and emerge private from forward thinking security personnel. and ity speakers, on capability Some of the leading and ecur s challenges and current and innovative exhibitors will emerging technologies used in include Winkelmann UK, Tactical countering terrorism. Consisting of industry Electronics LLC, Alford Technologies, Digital case studies and product launches, as well RF and Chemring EOD which manufactures as presentations from a variety of functions Explosive Ordnance Disposal and Counter-IED including government and associations on equipment. Other exhibitors will be Geoquip the security market landscape, the seminar Worldwide, Terrafix Ltd and Neosoft, producers is aimed at end users, decision makers, of secure communications equipment; purchasers, influencers and specifiers. Counter Measure Systems which specialises Among those conducting seminars, Dr in police and special forces equipment Ray Livingstone of Thermoteknix Systems and training; ICM X-Ray which produces discusses the advantages of fused night groundbreaking miniaturised portable X-ray vision and thermal imaging monocular and equipment; and RFA Security, providers of binoculars for counter terror operations, explosive detection and sniffer dogs. and Bernie Alphonso of Geoquip Worldwide Unmanned vehicles are playing an analyses ways of maximising audio increasingly important role today and Counter verification technologies as a way of Terror Expo exhibitors include ICOR Technology achieving cost effective perimeter security. which manufactures the CALIBER E
13:30-14:00 Benefits of big data analytics in security for critical financial and data facilities Dr Vibhor Gupta, Technology Lead for the ASIS UK Chapter 14:00-14:30 Case study: Securing Heathrow Airport against terror threat Francis Morgan, Security Director, Heathrow Airport 14:30-15:00 CBEST vulnerability testing: improving and testing the UK’s financial services infrastructure resilience to cyber-attack Russ Spooner, Senior Security Consultant, Portcullis Security 15:00-15:30 Coffee, tea and networking break 15:30-16:00 Case study: Ensuring the security of data and data centres Karen Gadd, WorldPay 16:00-16:15 Chairman’s remarks and close of Critical National Infrastructure conference
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
57
TECHNOCOVER An Ensor Group Company
Protecting Critical National Infrastructure
Technocover’s prime activity is the provision of Total Service Solutions for Physical Protection of Assets within the Critical National Infrastructure (CNI) sectors. The company is an approved Loss Prevention Certification Board (LPCB) ISO 9001:2008 Quality and ISO 14001:2004 Environmental accredited company.
Assessed to ISO 9001 Certificate number 450
Assessed to ISO 14001:2004 Certificate number EMS 450
Technocover work for almost every type of industry in the public and private sectors and clients include water companies, energy providers and distributors, gas, oil and petrochemical companies, telecommunications, transport, military and Government establishments with a number of products approved for Government use.
Technocover Total Service: UltraSecure DV Access Products Certified to LPS 1175 Security Rating 2, 3, 4 & 5
• Consultancy • Site Surveying and Risk Assessment • Design • Manufacturing, Finishing
SECURITY & FIRE DOORS
• Supply • Installation • Maintenance
Technocover Limited Henfaes Lane, Welshpool, Powys, SY21 7BE, United Kingdom. Telephone: +44 (0)1938 555511 Fax: +44 (0)1938 555527 www.technocover.co.uk
EVENT PREVIEW family of robots, offers five different sized platforms providing remote capabilities for SWAT, EOD and Hazmat teams. iRobot’s unmanned ground vehicles are designed to reduce the risk to personnel, operate downrange, report data and deliver predictive intelligence. Unmanned ground vehicles are also a speciality of NIC Instruments, which develops the lightweight First Responder that can be configured to the needs of specific missions. The unit can easily be repaired in the field. TRAINING EXHIBITORS Visitors to the Policing & Special Ops Zone will have an opportunity to see the latest in counter terror training from Caliber-3. Based in Jerusalem, Israel, the company is fully certified by the Israeli Defence Forces, Prime Minister’s Office, Ministry of Defence, Police Forces, Ministry of Homeland Security, Ministry of Commerce and Industry and Ministry of Foreign Affairs. Among Caliber‑3’s list of clients are SWAT teams from all over the world and large private and public companies, law enforcement agencies, global security agencies and private companies. Col Sharon Gat CEO and Founder of Caliber-3 said: “We have very motivated enemies who attack civilians in cities. We cannot wait for them to come and we have to be prepared. We take our job very seriously as people’s lives are at risk. The values behind Caliber-3 lie behind the human factor of the
Seminar programme: Cyber Threat soldier or security guard as they consider people to be the most important factor when it comes to professionalism. The reason why Caliber-3 cadre were all soldiers in Special Operations units and continue to serve actively in their respective IDF reserve units, making the training that Caliber-3 instructors provide combat tested and cutting-edge.” Making its CTX debut is Green Light Ltd, a London-based aviation security training and consultancy company which offers training courses and seminars on behavioural analysis. Green Light also conducts full scale training exercises for airline staff to prepare for hijackings and unruly passenger management. “Green Light has attended CTX as visitors for many years,” said Philip Baum, the company’s Managing Director, “and we realised that our services may have been traditionally targeted at the aviation industry, but the application of common-sense should be embraced by all those who genuinely want a risk-based, outcomes-focussed approach to security”. While technology undoubtedly plays a crucial role in the detection of terrorist threats, the equipment alone cannot provide a comprehensive solution. As Baum illustrates, “consider the terrorist with an internally concealed device. No archway metal detector is going to identify the threat; it’s down to the security professional to recognise a deviation from baseline behaviour. Green Light training provides these vital skill sets for upholding national security.” E
Unmanned vehicles are playing an increasingly important role today, reducing the risk to personnel, reporting data and delivering predictive intelligence
DAY ONE: 21 APRIL 2015 09:00-09:20 Coffee and Registration
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
09:20-09:30 Chairman’s Welcome and Introduction Dr Allison Wylde, ASIS International 09:30-10:00 Keynote presentation: The UK’s Cyber Security Strategy – the challenge ahead David Raw, Office of Cyber Security & Information Assurance 10:00-10:30 Keynote presentation: Ensuring UK cyber security and resilience Andy Archibald, National Cyber Crime Unit, National Crime Agency 10:30-11:00 How CERT-UK is helping the UK to ensure cyber security and resilience Chris Gibson, Director, Cyber Security Information Sharing Partnership 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 The cyber security threat horizon 2017– how can business improve resilience to meet these threats? Steve Durbin, Information Security Forum 12:00-12:30 Emerging cyber threats: the Middle East Terry Pattar, IHS Aerospace and Defence 12:30-13:30 Emerging threats in the threat actor landscape Stewart Bertram, Cyber Intelligence, Control Risks 13:30-14:00 Lunch, networking and exhibition break 14:00-14:30 Protecting industrial control systems from cyber-attack Dr Richard Piggin, Capability Manager, Atkins 14:30-15:00 Ensuring your employees are not the gateway to cyber-crime or cyber terror Mark Brown, Executive Director, Cyber Security & Resilience, EY 14:30-15:00 The dark net: assessing the escalating threat to government and business John Lyons, CEO, International Cyber Security Protection Alliance E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
59
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Recognize AND Analyze Is he a known suspect? How old is he?
Is she authorized to enter this zone?
When, where did she enter?
How often was she here this month?
Is she an employee?
Is it too crowded in this area?
See it live at CTX, stand H61! Premier face recognition technology for real-time video screening and anonymous people analytics www.cognitec.com • info@cognitec.com
GLOBAL TRAFFIC MONITORING
MEET US ON
STAND J73
Evo8 fully integrated intelligent ANPR camera. Over 1000 units successfully supplied in the UK alone.
CA Traffic have re-written the ANPR rulebook with the launch of EvoX fully integrated ANPR/CCTV camera.
Independently verified to achieve in excess of 98.5% detection and 99% correct reads across multiple lanes.
Go to www.ca-traffic.com for product literature @CA_traffic
+44(0) 1296 333499 enquiries@c-a.co.uk www.ca-traffic.com Conter Terror Half Page.indd 1
60
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
18/02/2015 13:03:21
EVENT PREVIEW
Seminar programme: Cyber Threat DAY ONE: 21 APRIL 2015 15:30-16:00 Coffee, networking and exhibition break
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
16:00-16:30 The game-changer: digital social networks as disruptive strategic innovation for counter-terrorism Nigel Jones, Centre for Cyber Security & Information Security, and Ian Tunnicliffe, Independent Consultant 16:30-17:00 Scientific innovation in the prevention and management of CBRN-E and cyber threats Laurent Olmedo, Global Security, CEA 17:00 Chairman’s closing remarks and close of day one DAY TWO: 22 APRIL 2015 09:00-09:20 Coffee and Registration 09:20-09:30 Chairman’s Welcome and Introduction Tim Holman, Director, Information Systems Security Association UK SITUATIONAL AWARENESS detector on the market that can scan to less Advanced Laser Imaging (ALI) produces than 3mm from the ground. 3DX-Ray’s newest 3D Situational Awareness equipment and product, the K-120 will also be on show. software. An understanding of a physical Internal Sales Account Manager, Kim Walker location is key to the preparedness, planning said: “As a UK manufacturer we are delighted and the ability to respond effectively in to be able to announce the release of our Counter Terror (CT) operations. ALI’s 3D new portable products at Counter Terror. laser scanning equipment and the software We will be showcasing the complete range generate detailed, accurate, fully immersive of our portable equipment which covers and navigable real life 3D versions of towns, all user requirements in this market space. cities, shopping centres, offices, stadiums, Counter Terror Expo is the ideal venue to airports, or other key locations – enable our global client base to come interiors and exteriors – for and view the entire range in personal computers. one place and evaluate the r e t Coun po Paul Snudden, CEO at latest released products. ALI, said: “This has got Hidden Technology rror Ex ture e T a to be the norm for Systems International e f l il any resilience and CT (HTSI) is a specialist 2015 w f interactive o programme – it had developer and e g r a ran re Zones fo proven to dramatically manufacturer of u Feat time which improve preparedness covert tracking and response capability he first lore crucial systems, surveillance t in live and test devices and related will exps of counter security products. The operations - we look forward to contributing to company’s products range aspect rorism ter the resilience of the cities and from in-vehicle tracking countries around the world.” hardware for monitoring of 3DX-Ray Ltd is a British designer vehicle activity, quick deployment and manufacturer of x-ray inspection magnetic devices for law enforcement systems for the security market whose usage, personal units for VIP protection, range includes portable, conveyor and and discreet devices for covert tracking. vehicle scanning equipment. At CTX the British company Thermoteknix Systems company will be releasing the lightweight Ltd are launching a new and comprehensive ThreatScan-LS1 panel which is the only range of Mil-Spec non‑ITAR handheld E
09:30-10:00 Intrusions into Sony Entertainment Pictures: lessons and implications Professor Tom Chen, The Cyberterrorism Project, City University 10:00-10:30 Latest advances in cyber penetration testing and what these tell us about vulnerability and protection Peter Wood, CEO, First Base Technologies 10:30-11:00 Before the breach – it’s not when, it’s how “breach fit” are you? Nader Henein, Advanced Security Solutions, Advisory Division, Blackberry 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 Developing the skills capability to deal with ever-changing cyber threats Amanda Finch, Institute of Information Security Professionals 12:00-12:30 How cyber security & e-crime is impacted by the meteoric rise in the usage of smartphones and social media John Palfreyman, Digital Policy Alliance and Defence, Intelligence & Public Safety, IBM E Continued on page 65
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
61
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Avon Barrier Avon AvonBarrier Barrier Avon Barrier Avon Barrier Hostile Vehicle Mitigation Solutions: Avon Barrier Hostile Vehicle Mitigation Solutions:
Hostile Vehicle Mitigation Solutions: Barriers Hostile Vehicle Mitigation Solutions: Bollard Barriers Barriers Hostile Vehicle Mitigation Solutions: Road Blockers Bollard Barriers Hostile Vehicle Mitigation Solutions: Bollard . Barriers Gates Road Bollard Barriers RoadBlockers Blockers . Bollard Gates Road Blockers Bollards Gates . Gates Road RoadBlockers Blockers .Impact Gates Gates Test Standards: UK - BSI PAS68 Impact ImpactTest TestStandards: Standards: US ASTM F2656-07 UK BSI PAS68 UK - BSI PAS68 Impact Test Standards: Impact Test Standards: Global -PAS68 IWA 14.1 & 14.2 UK BSI US --–ASTM F2656-07 US ASTM F2656-07 UK BSI PAS68 Impact Test Standards: US – ASTM F2656-07 Global - IWA 14.1 14.2 Global - IWA 14.2 US -- ASTM F2656-07 Global – IWA 14.1 &14.1 14.2&& UK BSI PAS68 Global - IWA 14.1 & 14.2 US - ASTM F2656-07 Global - IWA 14.1 & 14.2
62
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
www.avon-barrier.co.uk
www.avon-barrier.co.uk + 44 117 953 5252 www.avon-barrier.co.uk www.avon-barrier.co.uk +44 9535252 5252 + 44 117 117 953 + 44 117 953 5252 www.avon-barrier.co.uk + 44 117 953 5252 www.avon-barrier.co.uk + 44 117 953 5252
EVENT PREVIEW thermal imagers for variety of applications at CTX 2015. The TiCAM Thermal Night Vision series is based on the award-winning Thermoteknix MicroCAMTM thermal imaging core technology. TiCAM monoculars and binoculars offer solutions for reconnaissance, border security, VIP protection, counter drug operations, police surveillance, force protection, hunting, search & rescue and border surveillance. David Thompson, CTX Event Manager said: “The role of training, equipment and technology are inevitably increasing in importance as the global terror threat perseveres. The work done by our domestic security services is admirable and it is vital that we continue to support them with the most effective, efficient and innovative tools from companies around the world. CTX is at the forefront of the effort, showcasing the latest technology, equipment, and training services which will strongly assist our anti-terror services both here in the UK and abroad.” FEATURE ZONES Counter Terror Expo 2015 will see the launch of a range of interactive Feature Zones for the first time. The zones will provide the perfect opportunity to explore crucial aspects of counter terrorism in detail and will host informative seminar sessions, demonstrations and the latest products and services. There are four Feature Zones – Policing & Special Ops, Cyber Threat Intelligence, Advanced Technologies and Transport Security Live.
The Cyber Threat Intelligence Zone will provide a unique platform to discuss, debate and learn how to mitigate against these threats. Leading suppliers, speakers and solution providers will be participating to create a programme that not only addresses the situation but provides implementable solutions The Policing and Special Ops Zone will showcase the latest products, strategies and thinking for Law Enforcement and Special Operations teams across the world. It will provide an ideal opportunity for special operations units to review and benchmark their operations against industry standards and explore development areas. The Zone will see significant involvement from UK Police forces and Special Operations units – with many taking the opportunity to make educated procurement and investment decisions. The Zone will also attract the world’s police forces as they look to align their tactics with the UK’s and also source new thinking and services. The Cyber Threat Intelligence Zone will provide a unique platform to discuss, debate and learn how to mitigate against these threats. Leading suppliers, speakers and solution providers will be participating to create a programme that not only addresses the situation but provides real implementable solutions. The UK is seen as a world leader in this area and many countries look to it as a blue print for best practice. The zone will also be a platform for the UK government to present how it has become a world leader in combatting cyber threats. As an exhibitor you are invited to take part in the zone’s workshops and case studies to share your expertise, knowledge and solutions to an audience of senior professionals looking to implement a robust digital infrastructure defence. The Advanced Technologies Zone represents the future of counter terrorism - It will play host to the latest technology and forward thinking speakers and case studies. It will be a rare opportunity to see cutting edge technology up close and fully understand how it can be integrated effectively. The Zone will also be the perfect opportunity for SME’s to E
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
• Blast Doors • Ballistic Secondary Glazing • Siphon Doors • Panic Room Doors & Walling
Stand P50 at
COUNTER TERROR EXPO 21 April - 22 April 2015
T: 01322 42 10 00 W: www.csi-safetell.co.uk
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
63
Adcam Fabrications Ltd have been heavily involved in the manufacture of some key internal components for the QE class Aircraft carrier. Sub-contracting primarily for Rolls-Royce Marine Portsmouth, Adcam have produced Low Voltage switchboards (including ‘shock rated boards), Electrical Distribution centres, ACOs units and Individual motor starters.
PAINT AND FINISHING Fully enclosed 2400 sq ft in-house painting facility Water backed environmentally friendly spray booth supports a wet paint system and powder coating system Strong relationships with suppliers to purchase at competitive rates and offer quick delivery Wet Paint - Stoving enamel, Epoxy, Two pack epoxy, Low smoke (Primarily used on M. O. D. Contracts) Powder Coating - Polyester powders, Polyurethane powders, Epoxy polyester powders, Epoxy powders, Anti‑graffiti, Anti-condensation.
SHEET METAL WORK We manufacture high quality close tolerance products in a wide range of materials Fully equipped to produce specialised (1 off) systems as well as mass produced items Work from .5mm to16mm thick materials in both mild steel, aluminium and copper sheet, as well as 0.8mm stainless steel. Facilities: Amada 2.5KW Laser, Range of 25 tonne CNC turret shape machine (multi-tool), guillotine, range of Amada press brakes 100 tonne, Serta-bush machinery, Amada single shot punch, various bandsaws, pedestal drilling and tapping machines.
Adcam Fabrications Ltd has over forty years of experience in the production of high quality metalwork and finishing for a wide variety of markets. These include defence ministries throughout the world, various rail networks, renewable energy companies, marine and the shop-fitting/retail industry. We operate from a 15.000sq ft facility in Rugeley, Staffordshire. This includes our punching, laser cutting and forming section, specialised welding and fabrication unit and in-house painting facility. Adcam has a highly skilled workforce and have a policy of recruiting and training apprentices to maintain our very high standards. We hold IS0 9002 accreditation and are fully compliant with the latest environmental regulations. We specialise in manufacturing to our client’s specific needs. We offer a ‘build to print’ service including a willingness to build prototypes. Adcam can also provide assistance with ‘design for manufacture allowing the customer to develop a product in the most cost-effective way. Adcam Fabrications has a proven performance as a recognised centre of excellence.
WELDING AND FABRICATION 4000 sq ft welding section Fully equipped to produce high quality fine tolerance welded assemblies Punched and formed sheet, round or square tube, angle or channel section in mild steel, stainless steel, and aluminium All welders are fully coded and undertake yearly certification to BS EN287‑1 and BS ISO 9606‑2.
To whom it may concern, My first contact with personnel from Adcam was prior to the management buyout by their eventual directors, of the Ultra Electronics Limited fabrication facility at Rugeley, whilst investigating potential sources for Marine close tolerance sheet metal work. Subsequently my business, Rolls-Royce Marine Electrical Systems based in Portsmouth, carried out a full evaluation of the company, Adcam Fabrication Limited culminating in the first of many orders placed with the business. In 2008 Rolls-Royce Marine Electrical Systems down selected Adcam to provide the fabricated steelwork for the Low Voltage Distribution System for the two Queen Elizabeth Class Aircraft Carriers. In addition they were also awarded the fabricated steelwork for the switchboards on Astute Class Submarine vessels 5, 6 & 7. I would have no hesitation in recommending this business to supply close tolerance sheet metal work. Regards, Terry Andrews Prodcurement Lead / LTPA Section, BAE Systems Maritime Services Building 2/261 D-Lock Offices (PP106) HM Naval Base, Portsmouth, Hampshire, United Kingdom, P01 3NJ T: +44 (0) 2392-720158, E-Mail:terry.andrews@baesystems.com BAE Systems Surface Ships Limited Registered Office: Warwick House, P.O Box 87, Farnborough Aerospace Centre, Farnborough, Hampshire GU14-6YU Registered in England & Wales, Registration Number: 06160534
Units 2-5, Kimberley Business Park, Redbrook Lane, Brereton, Rugeley, Staffordshire, WS15 1RE Tel +44 (0) 1889 57169 Contact Tony Taylor Email ataylor@adcam-fabs.co.uk Web www.adcamfabrications.co.uk
EVENT PREVIEW
Seminar programme: Cyber Threat
present their solutions to a wider audience and showcase some innovative technology for the first time to a large audience. Because of this many government officials from across the world will be attending to explore how the latest technology can be matched to their current and future needs. Transport Networks have long been a target for terrorism. The disruption and panic a threat causes can bring cities and nations to a halt and cost millions of pounds not only in resolving the situation but to the economy as well. Ensuring that transport infrastructure is as best protected and prepared as possible is vital in producing a resilient national infrastructure. The zone will host highly relevant case studies, speakers and display the latest technology and solutions available. For visitors in the transport sector it will be the must attend feature at Counter Terror Expo – senior visitors from not only the UK but from across the globe will be in attendance to see how they can integrate the solutions on show into their own operations.
covered by speakers from leading UK and European First Responder organisations. Bringing together all those who must prepare for and respond to terrorist attacks or mass casualty emergencies and building resilience by working together, Ambition is the key conference and exhibition in the UK calendar dedicated to the worldwide emergency preparedness, resilience & response (EPRR) community. Ambition 2015 will give the growing professional community – from government departments, the NHS, councils, local resilience forums, ambulance trusts, fire and police organisations and specialist agencies – an opportunity to develop together with a range of networking, conference and exhibition features designed specifically around their needs. A high quality CPD accredited conference stream, chaired by Luana Avagliano, Head of Resilience Direct, the conference will be available to attend for free by all visitors to the show, packed with presentations and discussions based around the current issues AMBITION 2015 facing the EPRR community and featuring Counter Terror Expo 2015 covers that area high level speakers who are genuine experts whose importance springs into life when in their field. The conference stream is not terrorists strike or “things go wrong”: the Blue just aimed at the traditional emergency Light Services, the fire and ambulance/medical services and resilience forums but also at services. The Ambition event, co-located with a range of other providers such as NHS Counter Terror Expo, hosts seminar acute Trusts, councils, specialist covering preparing Blue Light rescue and voluntary agencies Services for the scale and and a broad range of n o i t i Amb range of terror attacks, and government departments. y the ke s the building of resilience The Ambition 2015 i 5 1 0 2 d n a in the services. On top conference will showcase e c n confere in the UK of this, the manner of best practice in n o i t response of responders emergency services o i t b i exh icated y preparedness, resilience d to high scale terror e d r a attacks – whether a and response. Leading calend ide emergenc “Mumbai-style” gun representatives from the orldw aredness, w attack, or a chemical/ NHS, the ambulance and prep ce and biological attack is also fire services, hospitals E lien
resi e respons
DAY TWO: 22 APRIL 2015 12:30-13:00 Defending corporate networks against cyber-attack using next generation statistical analysis tools Professor Niall Adams, Heilbronn Institute for Mathematical Research
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
13:00-14:00 Lunch, networking and exhibition break Afternoon session chaired by: John Palfreyman, Digital Policy Alliance and Defence, Intelligence & Public Safety, IBM 14:00-14:30 Cyber profiling: understanding who is attacking you Simon Saunders, Risk & Compliance, Portcullis 14:30-15:00 Update on advances in detecting terror threats over the internet via big data, social media Nichola Bates, Business Development Director, RepKnight 15:00-15:30 Coffee, tea, networking and exhibition break 15:30-16:00 Alternative ingress: preventing compromise from those you trust most Gabe Chomic, Information Systems Security Association UK 16:00-16:15 Chairman’s closing remarks and close of Cyber Threat Intelligence 2015
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
65
Seminar programme: Transport DAY ONE: 21 APRIL 2015 09:00-09:20 Coffee and Registration
Counter Terror Expo 2015
EVENT PREVIEW
09:20-09:30 Chairman’s Welcome and Introduction Session 1 09:30-10:00 Pursue Keynote address: UK transport security strategy – our ongoing work to minimise risks to transport networks from terrorism and crime Martin Jones, Head of Aviation Security, Department for Transport 10:00-10:30 Protect Assessing the global terror threat to transport systems Andrzej Czapiewski, Head of Research and Development, Cytora 10:30-11:00 Protect Towards cyber-resilience in transport systems Dr Siraj Ahmed Shaikh, Reader in Cyber Security, University of Coventry 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 Protect Building security into transport infrastructure design Scott Wiener, Managing Consultant – Security, Atkins
Ambition 2015 has been re-designed and moved further into the main hall alongside Counter Terror Expo to accommodate the growing nature of the show. This also allows for the conference area to remain within the hall, enhancing visitors’ networking opportunities and experience and the police will present updates and case studies on how best to handle extremely challenging, mass casualty events. ACCOMMODATING PROGRESS Ambition 2015 has been re-designed and moved further into the main hall alongside Counter Terror Expo to accommodate the growing nature of the show. This also allows for the conference area to remain within the hall, enhancing visitors’ networking opportunities and experience at the show. This new floor plan has already attracted a host of leading industry suppliers, including Excelerate Technology Ltd, School
of Resilience, Amputees in Action, BCAS Biomedical Services, Magnum Services, Respirex and Tytek Medical to name just a few. Dr Anthony Marsh, one of the country’s leading senior NHS ambulance Chief Executives has called for the ambulance service and the wider healthcare emergency preparedness, resilience and response (EPRR) community to attend and support Ambition 2015. Among other roles, Dr Marsh is the national ambulance strategic lead for the Joint Emergency Services Interoperability Programme (JESIP) and the ambulance Chief Executive with the lead for the national ambulance EPRR portfolio. E
12:00-12:30 Protect Latest developments in passenger surveillance and screening for transport security Andrew Jones, Security Consultant, Kinetic Security Solutions Session 2: Aviation 12:30-13:30 Protect Planes, trains and automobiles – minimising the damage when transport vehicles are terrorist targets Ian Graham, Business Development Manager - Research & Testing, DNV GL 13:30-14:00 Lunch, networking and exhibition break 14:00-14:30 Protect Update on international cooperation and intelligence sharing in aviation security Carolina Ramirez-Taborda, Director of Aviation Security & Facilitation, IATA 14:30-15:00 Protect Assurance and Accountability: the future of UK Aviation Security Peter Drissell, Director of Aviation Security, UK Civil Aviation Authority E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
67
RIGHT QUALITY RIGHT PRICE FIRST TIME ON TIME From design & prototyping through to full production volume, every cable assembly goes through robust IPC620 manufacturing procedures and processes. All assemblies are fully traceable with certificates of conformance (COC).
Cable & Harness Assembly Design & Prototyping IP67/68 Waterproof Connectors Custom Over-moulding Potting & Encapsulation Ruggedized Cables Box Build
hcal Hunter Cable Assembly Ltd manufacturer & distributor of cable assemblies, harnesses & looms
An Arcum Group Company
www.hcal.co.uk
sales@hcal.co.uk
0118 9325 120
EVENT PREVIEW Dr Marsh said: “Conferences and exhibitions can be an excellent way to meet colleagues old and new, swap ideas and learn lessons from the experiences of others from across the globe. However, this will be the first time that so many healthcare EPRR professionals have ever been invited together under one roof and we want them to use Ambition 2015 to challenge the status quo, pitch new ideas, share best practice and help find new solutions and answers
Seminar programme: Transport to some of the key issues facing the urgent and emergency care sector today. I would recommend that colleagues register now and be part of a potentially invaluable event.” Clarion Events welcomed the Home Secretary, Theresa May, to Ambition 2014 on Tuesday 29th April. She was shown around the event by Lord West, former Chief of the Naval Staff and Minister for Security and Counter-Terrorism from 2007 to 2010 and by Stephen Phipson, E
Ideally, governments and companies wouldn’t have to plan for such events. But the past decades have shown that – unfortunately – the risks and range of terror threats have grown ever higher
DAY ONE: 21 APRIL 2015 15:00-15:30 Coffee, networking and exhibition break
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Session 3: Secure transport for major events 16:00-16:30 Protect Ensuring transport security to and from major events Zeina Nazer, ITS Arab and Senior Transport Expert, Innova Consulting Ltd 16:30-17:00 Protect Case study: Transport security lessons learned from the 2014 Commonwealth Games 17:00-17:15 Chairman’s Closing remarks close of day one DAY TWO: 22 APRIL 2015 09:00-09:20 Coffee and Registration 09:20-09:30 Chairman’s Welcome and Introduction Malcolm Warr, OBE, FCIPS, Chairman, SKEO Solutions 09:30-10:00 Protect How advances in network video surveillance are driving the shift from forensic to real time to protect passengers, staff and assets on the transport network Derek van der Vorst & Doug Adams, Axis Communications 10:00-10:30 Transport threat detection: using social media and open sources to track and understand threats to transport systems Mohanad Hasim, Expert Media Analyst, BBC Monitoring Session 4: Rail 10:30-11:00 Protect Assessing and mitigating the cyber security threat to rail networks Dr John Easton, School of Electronic, Electrical & Computer Engineering, University of Birmingham and Dr Rhianne Evans, School of Electronic, Electrical & Computer Engineering, University of Birmingham 11:00-11:30 Coffee, tea, networking and exhibition break 11:30-12:00 Protect Incorporating perimeter protection into the rail environment Michael McGowan, Key Account Manager – Southwest Microwave Ltd E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
69
EVENT PREVIEW
Seminar programme: Transport
Charlie Hebdo magazine shows that the risks to non-government bodies can be as high as those for state entities. This is why Counter Terror Expo 2015 aims to provide analysis and answers to the topic of counter-terror the Home Office’s Director of Security Industry Engagement. During her visit, May was introduced to a number of exhibiting companies, including members of the Industry Partnership Programme. Ambition is fully supported by the Association of Ambulance Chief Executives (AACE) and the UK Home Office, and Excelerate Technology, the global market-leading provider of data, video, voice and Internet via satellite and wireless solutions. PLANNING FOR THE WORST Ideally, governments and companies wouldn’t have to plan for such events. But the past decades have shown that – unfortunately – the risks and range of terror threats have grown ever higher. Nobody can ignore contingency plans for terror/terror-style attacks, and the recent attack on the Charlie Hebdo magazine shows that the risks to non‑government bodies can be as high as those for state entities. This is why Counter Terror Expo 2015 aims to provide context, analysis and answers to the vast topic of counter-terror. L FURTHER INFORMATION www.counterterrorexpo.com
DAY TWO: 22 APRIL 2015 12:00-12:30 Protect Building security into urban rail stations and networks Chris Stevens, Technical Security Director, SIDOS UK Session 5: Maritime security 12:30-13:00 Protect Assessing the terror threats to global maritime operations – onshore and offshore Gavin Simmonds, Security & Commercial, UK Chamber of Shipping
Counter Terror Expo 2015
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
13:00-14:00 Lunch, networking and exhibition break 14:00-14:30 Protect Cyber terror and the risk to maritime activities Mate J Csorba, Principal Engineer, Marine Cybernetics, DNV GL 14:30-15:00 Protect Vulnerabilities in the maritime supply chain Tim Hart, Senior Analyst, Maritime Risk Analysis, Control Risks 15:00-15:30 Coffee, tea, networking and exhibition break Session 6: Supply chain/secure transport 15:30-16:00 Protect Case study: Best practice in global pharmaceutical supply chain security Tom Cochrane, Mundipharma International Services 16:00-16:15 Chairman’s closing remarks and close of Transport Security Live
The specialists in the design and production of metal detectors and electromagnetic inspection devices CEIA is pleased to announce the opening of the newly formed Company for Electronic Industrial Automation (CEIA) Limited, which will act as the main distributor branch located in Warwickshire. The CEIA UK Managing Director, Jeff Cook, ensures the continual strengthening of the brand, the developing of the distribution network and the quality of service and technical support given within security detection and underground search applications. As the main UK distributor, CEIA is looking forward to working very closely with new and existing CEIA customers and wants to reassure customers of their total support and assistance. Its aim is to continue to promote new and upcoming products across England and Ireland. CEIA has a wide range of the latest CEIA security screening and ground search products on display in their Warwickshire showroom. Should any CEIA dealers wish to visit with their clients for demonstrations and product discussions, CEIA would welcome the opportunity. CEIA is a leading manufacturer of Security and Ground Search Metal Detectors with more than 40 years of experience. CEIA Metal
Detectors for airport security comply with the requirements specified by the competent authorities providing automatic detection of metal targets over the entire body. In order to increase the security and throughput of an airport security checkpoint, additional equipment provided by CEIA are the PD140/PD240 series HandHeld Metal Detectors, the SAMD Shoe Analyzer and the EMA type A and type B
Liquid Explosive Detection Systems. The variety of the services required from police forces in their work requires versatile, practical equipment that can be adapted to their various needs without slowing down their operations. For these applications CEIA has developed various types of walk-through and hand-held metal detectors, including models that are, light, easy to transport and suitable for use when exposed to the elements. The availability of this equipment means that police forces are equipped even in the most complex situations. The quality and reliability levels of CEIA equipment is recognised throughout the world by private companies and governmental institutions, who have chosen it following stringent comparative testing. CEIA creates breakthrough value for its customers by combining state of the art materials, advanced components and extensive manufacturing automation. This provides superior quality, reliability and consistent performance to CEIA products. FURTHER INFORMATION Tel: +44 1789 868 840 infouk@ceia.net www.ceia.net
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
71
Infranor Mavilor SA have the engineering capability and specialist technology to make you a bespoke motor that matches your requirements, using a wide range of 12 different motors families. Offering Radiation hardened options, Military Spec Options, Vacuum, Environment Options, Wash-Down Series Available, Explosion Proof Series, Wind Generation Options, Linear Motors, Generators and much more!
Specialists in Servo Design & Bespoke Engineering
Infranor DRIVES offer a wide range of compact and flexible AC servo-controllers with outstanding capabilities. With different power ranges available and numerous interfaces, they are well suited for the use in various types of machines and installations.
They provide functions to cover a wide range of single and multi axes systems. Making the XtraPulsPac and XtraPulsCD1 servo drives can be seamlessly adapted to your application.
info.uk@infranor.com www.infranor.com +44 (0)208 144 2152
MECHANICAL PROCESSES
XTRAPULSPAC: THE SMALL DEVICE FOR THE TOUGHEST OF REQUIREMENTS
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
The most recent addition to INFRANOR’s product range is XtrapulsPac, a compact and flexible low-power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications XtrapulsPac can be configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion-controller via the fieldbus and uses well-known standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications, and is available in a small device at an affordable price, which meets the most demanding of requirements. Control loop: digital drive for AC synchronous motors – current loop 62.5 μs – speed and position loop 500 μs – closed loop control of position, speed or torque – maximum speed up to 25,000 rpm. Feedbacks: resolver – incremental encoder – hall sensor – SinCos encoder – single and multi-turn HIPERFACE® encoder. Communication interfaces: RS-232 up to 115.2 kbit/s baud rate – CANopen or EtherCAT® fieldbus – DIP switches for node address. Safety features: safe torque off SIL 2. I/O interfaces: user-configurable digital I/Os – all-digital inputs opto-isolated – analog inputs ±10 V/12-bit resolution – analog output 0-5 V/8-bit resolution – ‘amplifier OK’ output – motor brake control – two-channel STO function. MODES OF OPERATION DS402 standard mode: interpolated position mode – profile position mode – profile velocity mode – profile torque mode – homing mode. DS402 extended modes: analog speed mode – stepper emulation mode – sequence mode – master/slave mode stand-alone operation – analog speed drive – positioner – stepper emulation – electronic gearing. Stand-alone operation: analog speed drive – positioner – stepper emulation – electronic gearing. Configuration tools: motor and drive configuration – application configuration – interface configuration – auto-tuning, auto-phasing – sequencer programming. Project tools: project creation – project management – file-handling services – motor libraries – multilingual software. Diagnostic tools: device control – device monitoring – object dialog window – multi-axis oscilloscope.
FREELY CONFIGURABLE DRIVE The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive’s non-volatile memory. The XtrapulsPac drive can be controlled: via the fieldbus (CANopen or EtherCAT); via the analog input (analog speed drive); via the PULSE and DIR inputs (stepper emulation); or via the digital I/Os (stand-alone positioner) according to the selected operation mode. To allow Infranor an even more flexible approach to servo-controller, servo-amplifier solutions, the company also has the XtraPulsCD1 servo-drive. XtrapulsCD1-a alldigital servo-modules are PWM servo-drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block, including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a’s drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. With a resolver sensor feedback, the motor’s absolute position value over one revolution is available and the
servomotor can immediately be enabled after the drive power up. With a ‘SinCos tracks’ sensor that provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and of a period equal to the motor pole pitch, the servomotor can be immediately enabled after the powering of the drive. Having an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servomotor can also be immediately enabled after the drive power-up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power-up before the motor enabling. As it has an incremental encoder + Hall Effect Sensors (HES) feedback, the motor-phasing procedure is no more necessary and the servomotor can immediately be enabled after the drive power-up. With an absolute single-turn, multi-turn or linear encoder using the EnDat® or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servomotor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution (ppr) and 16,384 pulses per revolution can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The auto-phasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L
FURTHER INFORMATION info.uk@infranor.com www.infranor.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
73
FO R R EG F R IS EE TE TO R DA Y
WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERN
The event for those in the public and private sectors tasked with sourcing and delivering protection against terrorist threats • Attend live demonstrations and workshops • Network with over 9,500+ public and private sector attendees • Meet 300+ exhibitors showcasing the latest counter terrorism products and solutions • Discover practical solutions on mitigating the threat of terrorism • Hear from thought leaders on the future of global security
Save £50 by registering for your free exhibition pass at
WWW.COUNTERTERROREXPO.COM/CTBREG Your unique registration code is CTBreg
Co-located with
Follow us on
Supporting associations
X-RAY SYSTEMS
DEALING WITH SUSPICIOUS PACKAGES QUICKLY AND EFFECTIVELY NATIONAL SECURITY FOR AN EVOLVING WORLD
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
Scanna, a leading manufacturer of of x-ray and mail screening equipment for the defence, security and industrial sectors looks at how to reduce the disruption caused by the increase in suspect packages alerts following Paris terrorist attacks After 12 people were murdered and 11 others injured when masked gunmen stormed the offices of the French magazine, Charlie Hebdo in Paris, the immediate response of many countries was to heighten their threat levels warning that a terrorist threat is “highly likely” and that the public should remain vigilant. The UK immediately increased security at ports and border controls, with ‘intensified checks on passengers, vehicles and goods coming from France’. The security warnings distributed across the TV news, radio and websites, put the public on high alert resulting in a heightened number of suspect package incidents and evacuations. DISRUPTION In Madrid, two hours after the Paris attacks, 300 staff at the offices of the El Pais daily were evacuated after a man delivered a suspect package. Security guards became suspicious because the man refused to take the package to a rear entrance and insisted on leaving it at the main entrance. The police later determined the package was not dangerous. Gare de l’Est in Paris was evacuated and a main train station in Madrid had service suspended while explosives experts examined packages later found to be a hoaxes. Meanwhile in the UK, a shopping centre was evacuated and a controlled explosion carried out when a briefcase was found on top of a nearby bin. So, when suspect package alerts start to increase, what can be done to reduce disruption and evacuation times? Initiating a controlled explosion using an RoV is a frequent response deployed by response teams on an abandoned bag or suspicious package as it ensures maximum safety. However, such procedures can involve lengthy evacuation and shutdown of services whilst the response team is contacted, arrives on site, assesses the situation and carries
out the explosion. This amount of disruption is costly in terms of company or service uptime, monetary losses and an increased feeling of insecurity by the general public. USING AN X-RAY SYSTEM In contrast, employing a small backpackable x-ray system to the scene of a suspect package can be carried out by an ordinary trained security personnel. Provided radiation safety distances are invoked there is often no need for mass evacuation or major business disruption. The event can be contained whilst the offending package or bag is examined. In 99.9 per cent of cases the package will turn out to be harmless so using x-ray identification means that ordinary service can get very quickly be resumed. Scanna has an extensive portfolio of x-ray tools to assist with suspicious package clearance and confirmation. SCANWEDGE SYSTEM Its Scanwedge system is popular due to its lightweight format and operational simplicity. The system can be pre-configured prior to deployment ready for rapid despatch to the investigation point in its backpack. This kind of system is invaluable in situations where multiple bags may be needed to be checked, ie where people abandon their bags following
a bomb alert at a public event. INTELLIGENT RESPONSE Where detailed resolution of components is required or where investigators want to check for the presence of organic material, the flat screen Scansilc systems provide for extremely detailed analysis and can identify soft organic compounds and recognise hard metallic components in separate colours. This enables operators to formulate an intelligent response to the situation. For example a controlled explosion on a ‘dirty bomb’ would not be an appropriate response. For checking vehicles left for a suspiciously long time or parked outside an iconic building or for customs spot checks in situations of high alert, CR multi-size flexible x-ray plates can be used to check tyres, boots, panelling and fuel tanks for threats. INFORMED RESPONSE Portable x-ray systems can also be used to check unusual postal packages (although a postal x-ray cabinet is more suited for routine day to day mailscreening), unattended bags at airport forecourts, bus and railway stations and shopping malls. The value of an x-ray system is that they require very little set up and training and when a further military or police is required, the visual x-ray image provides really valuable information on the package construction and component location which again speeds up clearance times. Suspect packages are now a part of everybody’s standard vocabulary. We all know what they mean, we all know the disruption they can cause. What we require is an informed response to them and a good x-ray image can go a long way in revealing the necessary information. L FURTHER INFORMATION For more details on Scanna’s x-ray solutions please visit www.scanna-msc.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
75
Westcombe Engineering Part of the Bigger Picture Founded in the early 1970’s, Westcombe Engineering is an established engineering business that delivers precision engineered components together with a highly responsive and fully focused service to all its customers. Unlike many of our competitors our depth of experience allows us to provide high quality machined components in variable volumes – while remaining competitive. We pride ourselves on being able to offer practical and cost-effective engineering solutions to meet our customers’ needs. However, we are not just an engineering business. We also employ and train disabled workers that operate CNC machines, and produce most of the products that we sell. These workers are our greatest asset and their contribution to the business has, over the years, been immense. Westcombe Engineering offers a diverse range of engineering solutions including CNC precision milling and CNC turning; working with a range of materials including aluminium, iron, brass, stainless steels, exotic metals and plastics. For further details, please contact Westcombe Engineering: Tel: 01733 452575 Jeff Bellamy (MD) – 07908 644946
Our skilled staff can assist with engineering design issues and material selection, so that the best results are always achieved. In addition to the manufacturing and production of machined parts and components, we are also able to be involved in the design and prototyping process. We have led on several projects of this kind by providing bespoke prototypes from very simple sketches to machined castings and assembly of the prototype component for a variety of clients around the world. We choose to embrace a firm commitment to quality and have attained ISO 9001:2008 and Investors in People accreditations. Along with these quality assurance accreditations, our internal procedures are centred on the identification and rapid solution of any issue relating to quality and delivery. Westcombe Engineering strives to maintain competitive prices, and our clients and customers can attest to our quality and reliability. This business is committed to excellence, and the breadth of our services and quality of our products speak for themselves. Hence a strong and loyal customer base has been established. Westcombe Engineering – areas of expertise include: CNC milling, machining and turning to specification. Small, medium and large batch runs. Prototype manufacture and assembly. Prototype design and development. Working in aluminium, steel, iron, copper, plastics and exotic metals. Assembly work. Reverse engineering. General precision engineering. Email: westcombe@peterborough.gov.uk or jeff.bellamy@peterborough.gov.uk www.westcombeengineering.com
VISIT PELCO AT COUNTER TERROR EXPO ON STAND E40
Visit stand E40 at Counter Terror Expo London Olympia to see our NEW VMS, VideoXpert and the full range of dedicated IP solutions from Pelco
NEW VideoXpert™ video management system
HD cameras and Positioning Systems
RAL 1000
RAL 1019
RAL 2008
RAL 3014
RAL 4008
RAL 5014
RAL 6006
RAL 6022
RAL 7006
RAL 7030
RAL 7045
RAL 8019
RAL 1001
RAL 1020
RAL 2009
RAL 3015
RAL 4009
RAL 5015
RAL 6007
RAL 6024
RAL 7008
RAL 7031
RAL 7046
RAL 8022
RAL 1002
RAL 1021
RAL 2010
RAL 3016
RAL 4010
RAL 5017
RAL 6008
RAL 6025
RAL 7009
RAL 7032
RAL 7047
RAL 8023
RAL 1003
RAL 1023
RAL 2011
RAL 3017
RAL 5000
RAL 5018
RAL 6009
RAL 6026
RAL 7010
RAL 7033
RAL 8000
RAL 8024
RAL 1004
RAL 1024
RAL 2012
RAL 3018
RAL 5001
RAL 5019
RAL 6010
RAL 6027
RAL 7011
RAL 7034
RAL 8001
RAL 8025
RAL 1005
RAL 1027
RAL 3000
RAL 3020
RAL 5002
RAL 5020
RAL 6011
RAL 6028
RAL 7012
RAL 7035
RAL 8002
RAL 8028
RAL 1006
RAL 1028
RAL 3001
RAL 3022
RAL 5003
RAL 5021
RAL 6012
RAL 6029
RAL 7013
RAL 7036
RAL 8003
RAL 9001
RAL 1007
RAL 1032
RAL 3002
RAL 3027
RAL 5004
RAL 5022
RAL 6013
RAL 6032
RAL 7015
RAL 7037
RAL 8004
RAL 9002
RAL 1011
RAL 1033
RAL 3003
RAL 3031
RAL 5005
RAL 5023
RAL 6014
RAL 6033
RAL 7016
RAL 7038
RAL 8007
RAL 9003
RAL 1012
RAL 1034
RAL 3004
RAL 4001
RAL 5007
RAL 5024
RAL 6015
RAL 6034
RAL 7021
RAL 7039
RAL 8008
RAL 9004
RAL 1013
RAL 1037
RAL 3005
RAL 4002
RAL 5008
RAL 6000
RAL 6016
RAL 7000
RAL 7022
RAL 7040
RAL 8011
RAL 9005
RAL 1014
RAL 2000
RAL 3007
RAL 4003
RAL 5009
RAL 6001
RAL 6017
RAL 7001
RAL 7023
RAL 7042
RAL 8012
RAL 1015
RAL 2001
RAL 3009
RAL 4004
RAL 5010
RAL 6002
RAL 6018
RAL 7002
RAL 7024
RAL 7043
RAL 8014
RAL 1016
RAL 2002
RAL 3011
RAL 4005
RAL 5011
RAL 6003
RAL 6019
RAL 7003
RAL 7026
RAL 7044
RAL 8015
RAL 1017
RAL 2003
RAL 3012
RAL 4006
RAL 5012
RAL 6004
RAL 6020
RAL 7004
RAL 8016
RAL 9017
RAL 1018
RAL 2004
RAL 3013
RAL 4007
RAL 5013
RAL 6005
RAL 6021
RAL 7005
RAL 8017
RAL 9018
RAL 9010
RAL 9011
RAL 9016
Custom product for unique applications colour, mount, shape
Explosion Proof IP camera systems
Thermal Imaging and Thermography
By choosing Pelco by Schneider Electric, you’ll have access to an array of services, tools, and programmes designed to ensure your success and the confidence that comes from having a broad range of high-quality IP video surveillance products and systems For more than 20 years, Pelco™ by Schneider Electric™ has been respected as a leading provider of video surveillance products and has now emerged as a leader in the IP market. This evolution has given us the in-depth knowledge to understand what our network-based surveillance end users and resellers require in their products and the important role that service and support systems play in helping them succeed. From guaranteed ship dates and satisfaction assurance to around-the-clock support and flexible service plans, we are committed to adding value to your video surveillance investment.
Choose with confidence. Learn how to benefit from our IP products and services! Email: info_uk@pelco.com for more product information
gateway Security to performance VideoXpert™, the the Intelligent Solution – a powerful platform for the capture, management and display of video data – empowering solutions for threat mitigation and protection of personnel and assets 1. Easy expansion and installation - new scalable platform for applications from the mainstream to mission critical sites, provides ability to upgrade according to risk and to expedite a timely installation 2. Actionable and clear evidence - intuitively designed user interface for ease of operation and swift decision making 3. Customisable solutions: Seamless integration with 3rd party providers Scalable among multiple platforms, across multiple locations Designed with an open architecture for a unified experience and optimal flexibility Complete and intuitive end-to-end video solution
Telephone: 01189 789276 Web: www.pelco.com
©2014 Schneider Electric. All Rights Reserved. Schneider Electric and Pelco are trademarks owned by Schneider Electric Industries SAS or its affiliated companies. All other trademarks are property of their respective owners. • www.schneider-electric.com • 998-1207774_UK
THERMAL TECHNOLOGY
THERMAL IMAGING TECHNOLOGY FOR PORT SECURITY Unlike traditional retail, commercial, and many industrial applications, ports present unique security issues that must be anticipated and addressed
Millions of tons of cargo. Billions of dollars in goods. The activity of a small city with miles of perimeter fencing, uneven infrastructure, blind spots, and ever-changing weather conditions. Port security is no small task, yet increasingly, security operators are asked to assume more responsibilities with static, if not shrinking, budgets. As drivers of a global economy, the demands placed on port security continue to grow and with them, the challenges and complexity increase exponentially. Typically, high-security installations rely on a variety of solutions, including video security and surveillance. The combination of legacy analog and more modern IP-based video cameras, recording and video management systems, PSIM, analytics, and more provide a digital extension of security personnel. Port security, however, is anything but typical. From miles of unguarded, unlit perimeters to ever-changing lighting and weather conditions, traditional video security has a difficult time providing the comprehensive intelligence demanded by such a high-security facility. THE THERMAL ADVANTAGE Once restricted to the military due to prohibitive cost, thermal imaging is an increasingly relied upon technology for an ever growing array of security, process and operations management applications. As price points have dropped, integration of thermal technology into today’s video security and surveillance camera systems has become more prevalent, providing a wealth of information and functionality previously unavailable. As David Dorn, applied technology engineer manager at Pelco by Schneider Electric said: “In the last 18 months, we have seen
a 2x cost factor reduction in the image sensors themselves. This means that thermal technology is no longer confined to high-end military and government applications.” HOW IT WORKS Whereas a visible-light camera uses light reflected off objects to build an image, thermal imaging cameras capture an object’s emitted heat to provide a high-contrast image, thus eliminating the need for any light source. Using special materials like Germanium which transmit thermal energy, lenses focus a thermal image onto a thermal image sensor. Microbolometers, the sensors used to create a thermal image, feature either Vanadium Oxide or Amorphous Silicon coatings on a silicon wafer. Dorn commented: “The microbolometer has an array of pixels with each pixel receiving heat energy proportional to the heat energy present in the scene at that point. Because today’s advanced thermal cameras can detect even minute differences in temperature, visual information that was never before available is now at a security operator’s fingertips.” The thermal contrast among objects in low-light and no-light conditions provides the information necessary to quickly make informed decisions. Thanks to this technology, thermal imaging is also a powerful tool for applications beyond security, providing the capabilities to spot
leaks, ruptures, or hot spots across bridges, dams, refineries, and power plants. For many security applications, the ability to detect if a person or vehicle has entered the scene is critical. Thermal excels in this regard since the temperature of a person or vehicle is typically quite different than the background temperature of the scene. This makes people and vehicles easy to detect in thermal images, even from very long ranges. The ability to accurately and reliably detect people and vehicles is also very useful for video analytics. Interestingly, although thermal cameras still typically cost more per unit than a traditional visible camera, deployment of a thermal imaging solution in a port environment can be much more cost effective than traditional video. Thermal cameras have longer detection ranges, necessitating the use of fewer units, overall. Additionally, because thermal cameras do not need lighting, their use can eliminate the need for installation of light poles and their associated infrastructure.
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
VIDEO ANALYTICS A major advantage of thermal imaging is the ability to deliver high-contrast images in the most challenging lighting conditions, as no illumination source is needed. Importantly, thermal cameras provide an optimal platform for the use of video analytics. Since visible-light cameras are dependent upon reflected light, image quality and accuracy can degrade throughout a 24-hour period due to lighting effects over which neither security operators nor technology have control. But since thermal cameras capture an object’s thermal emission, it ignores common light conditions, which challenge traditional video analytics. The high-contrast image enables the predictable use of analytics with extremely low false-alarm rates at all hours of the day. A popular example of such a deployment is virtual fencing and automated perimeter security, taking advantage of ‘trip wire’ and other behavioural analytics. A thermal camera looking down a fence line with a virtual trip wire, people-detection analytic employed, will give a very accurate alarm if someone crosses the fence line over a long distance, day or night, under any lighting conditions. This ‘thermal fence’ solution is far more accurate and cost effective than existing visible camera solutions, traditional deployments of microwave detectors, and is even more accurate and cost effective than existing motion and perimeter proximity sensors.L
l Thermahas imagingity to the abil -contrast high deliver s in the most image llenging cha lightingns conditio
FURTHER INFORMATION www.pelco.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
79
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
COLLABORATION
CROSS-BORDER COLLABORATION IN THE FIGHT AGAINST TERRORISM
In the fight against organised crime, terrorism and threats to national security, defence forces, law enforcement agencies, companies and governments can work with universities to find practical solutions to real problems and upskill their staff. University College Dublin (UCD) is one university which has been working in this arena Criminals operating from outside your jurisdiction are hard to bring to justice, when legal systems and investigation resources lag behind. This is why international law enforcement collaboration focuses on disrupting criminal operations. The recent Ramnit Botnet targeted 100 banks in 30 countries with losses of $1 billion globally, and experienced criminals used sophisticated malware to infiltrate and monitor employee actions, transfer money and control ATM machines. The successful takedown of the network was co-ordinated by Europol’s new Joint Cybercrime Action Task Force (J-CAT) working with police across Europe. Some 36 law enforcement graduates of UCD’s MSc in Forensic Computing & Cybercrime Investigation now work in Europol in its EC3 and J-CAT units. UCD CENTRE FOR CYBERSECURITY & CYBERCRIME INVESTIGATION For 15 years UCD has worked in collaboration with governments, law enforcement, industry and academia on education and training, research and projects in support of the fight against cybercrime. This started in the 1990s with projects with An Garda Siochana (Ireland’s police force) and the Centre has won EU-funded projects worth circa €6m to date. Working in the Centre are former Irish and UK law enforcement and defence forces staff alongside UCD academics, researchers and instructors. UPSKILLING AND CAPACITY BUILDING UCD and its partners have delivered capacity-building projects across Europe for law enforcement (LE) including First Responder Cyber Crime Courses, Trainer Development Programmes, Build your own Forensics Lab, Python Programming and Linux for Investigators, Databases & Database Forensics, Open Source IT Forensics as well as cybercrime / Basic Digital Forensics courses. Courses developed with help from UCD are available free of charge to law enforcement through the European Cybercrime Training & Education Group
80
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
(ECTEG). New ECTEG courses now being developed by UCD are on Forensic Scripting, Live Data Forensics, Malware Investigations and include e-learning / blended delivery. APPLIED RESEARCH AND TOOLS UCD has led a project to develop free Open Source reliable forensic tools for investigating cybercrime. This is a collaborative project funded by the EC’s DG HOME for 2 years and project managed by UCD. In it a community of 25 volunteer LE developers from cybercrime units in 12 countries in Europe contribute their expertise and knowledge for the benefit of all. Initial projects addressed four themes: Forensic Process Management; Artifact Analysis; Live Data Forensics; Enhanced Previewing. Other applied research UCD has worked on include automated tool using AI that throws up links between people and vehicle forensics. UCD was Lead Centre in developing a network of European Cybercrime Centres of Excellence in a 3-year / €3.9 million project (2CENTRE). The project included over 30 activities – training, software development, research, conferences and publications. CYBER TERRORISM AND THREATS TO CRITICAL NATIONAL INFRASTRUCTURE ARE A GROWING CONCERN UCD has provided expert advice to banks, the Irish Government, Prison Service and the Data Protection Commissioner. UCD has assisted with risk assessments, collaboration and information sharing, Incident Response, “Table Top” cyber exercises, digital forensics and secure network design as well as research and threat advisory briefings, design and the set-up of the Computer Security Incident Response Teams (CSIRT), in the National Cyber Security Centre. MASTERS DEGREE PROGRAMMES Over 650 UCD students and graduates from 52 countries are now working in computer forensics or cybercrime investigation worldwide in defence, government, law enforcement, digital forensics consultancy and information security roles in industry.
185 LE officers are currently on UCD’s law enforcement only MSc in Forensic Computing & Cybercrime Investigation which has a flexible distance-learning format, a wide choice of modules and exam centres in Dublin, Netherlands and USA. The MSc in Digital Investigation & Forensic Computing is for Computer Science graduates and the needs of non-LE infosec and forensics specialists. INTERNATIONAL NETWORK UCD’s work with industry, defence, government and law enforcement agencies in Ireland, Britain, Europe and further afield on information-sharing, upskilling and collaborative projects has built a network of 2000+ students, graduates, conference delegates, partners, friends in 50+ countries. Graduates of UCD’s LE-only MSc work in policing, government, regulatory enforcement units, Intelligence or defence communications roles and counter terrorism. Graduates of the MSc in Digital Investigation & Forensic Computing are digital forensics experts in government and law enforcement, but also in IT, Finance, Consultancy, Media, Industry and Utilities. They are responding to and investigating network intrusions, fraud, theft of IP, spam, malware, viruses, gathering and presenting evidence in court and defending organisations from cyber threats. THE LEARNING CONTINUES New ‘threat vectors’ and ‘attack surfaces’ appear all the time. In the connected world of the ‘Internet of Things’ and ‘Big Data’, new risks and possibilities for cybercrime proliferate. Cyber crime is now a global business with highly skilled, organised and experienced specialists, service-providers, managers and ‘bosses’ working collaboratively across borders. Continuing professional education, international networking and collaboration have never been more important for us to rise to the challenge of the new threats. L FURTHER INFORMATION rupert.bowen@ucd.ie www.ucd.ie/cci
EVENT PREVIEW
FROM THE CRIME SCENE TO THE COURT ROOM
Forensics Europe Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
As well as a comprehensive exhibition and education programme, Forensics Europe Expo on 21-22 April will host a two day conference programme in collaboration with the Chartered Society of Forensic Sciences
In 2014, Forensics Europe Expo connected over 65 leading international exhibitors with over 3,000 senior forensic professionals within law enforcement, legal sector, laboratories, digital forensics, private sector, government, public sector, military, armed forces, the intelligence sector and academia. Since the closure of the Forensic Science Service in 2012, which dealt with over 60 per cent of forensic cases, Forensics Europe Expo has undertaken the vital role to help and regulate the supply chain by connecting market leaders with direct buyers and hosting a top level educational programme to bring the latest regulations and tactics to the entire sector. Aside from the comprehensive exhibition
As well as ion ibit the exh mme, conference progra ope Expo The promises to provide r s Eu training to Forensicn host Europe’s military professionals within i will aga ing two‑day the police, military and lead law enforcement fields nce demonstrating the entire confere me forensic process, taking program
and education programme, Forensics Europe Expo will once again host Europe’s leading two‑day conference programme which this year will be running in collaboration with the Chartered Society of Forensic Sciences. The partnership between the only dedicated international forensics exhibition and conference and the only International Forensic Professional body, currently attracting members from more than 60 countries, makes the conference a must-attend for any professional whose role involves working with aspects of forensics.
them from the scene of crime and all the way to giving evidence in the court room and beyond. Conference passes start at just £175. THE CONFERENCE PROGRAMME For law enforcement and security professionals, the conference programme will focus on two key areas, Forensic Investigations E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
81
Complete Digital Forensics We’ve got you covered!
From Computers to Mobile Phones and everything inbetween, IntaForensics are a trusted supplier of ISO accreddited ad-hoc and volume digital forensics services. With labs in London, Leeds, Warrington and Warwickshire, IntaForensics is a trusted partner to Law Enforcement, Government agencies, legal and commercial companies nationwide. As well as providing national coverage and economic service delivery, our customers are guaranteed the largest UK capacity in Digital Forensics with service levels from 28 days to immediate deployment. Whether ad-hoc forensic cases or full insourcing support, the team are at hand to tackle every digital forensic challenge.
Remote Forensic Solutions, developed by IntaForensics. Capable of being deployed into any organisation. The IF:Remote solutions provides the most effective covert forensics investigation solution, removing the delay of assembling a dedicated digital forensics team to your site. This enables quick access to your data, in accordance to ACPO and NIST guidelines and dispenses the need to fund internal forensic capabilities.
IF:Remote
The entire Lima family has enabled forensic practices, regardless of size - to operate effectively through its comprehensive End-to-End Case Management systems. Lima achieves full continuity of evidence during case work through contemporaneous notes, exhibit tracking and automatic full disclosure. Managing backlogs and providing full visibility. Every Lima solution is ideal for meeting or working towards international quality and process standards.
0247 771 7780 www.intaforensics.com info@intaforensics.com
Visit Us at Forensics Europe Expo
Stand 1-G33
Forensics Europe Expo
EVENT PREVIEW and Innovations and Digital Forensics. Forensic Investigations and Innovations will emphasise the fact that criminal investigations are at the heart of forensics and are almost always the starting point of the journey. These sessions will look at all sides of how forensics is used once a major crime is committed. Of course, in the modern day, major crime may also be committed in a digital manner and has even wider implications and devastating effects. The programme represents the full scope, from physical crime scene investigations and innovations used by law enforcement, to investigations in a corporate environment. The session will conclude by discussing the role investigations play and how evidence is best collected and presented in court. One of the highlights of the Forensic Investigations and Innovations conference is Jan Garvin and John Kennedy’s ‘Seeing is Believing’ talk. Garvin, the Executive Director of the Law Enforcement & Emergency Services Video Association, and Kennedy, Head of Digital Forensics at Key Forensic Services, provide an insight into some of the most challenging cases where forensic video analysis enables valuable leads early on in investigations. This allows for early arrests and powerful evidence in court, urging guests to discover why what they might first view on a video may not be what they believe they’re seeing. Alternatively, barrister Kristiina Reed describes the nature of the adversarial legal system in her discussion ‘The Expert Witness in Court’. Kristiina will describe recent changes in the law governing expert witnesses, including the case of Jones v Kaney and the loss of witness immunity, the impact of the Jackson reforms and concurrent witness evidence and the 2014 guidance from the Ministry of Justice. What’s more, Brian Rankin from Innovate UK’s Special Interest Group for Forensic Science, takes a session on the importance of Innovation in Forensic Investigation. Since the introduction of the commercial market place about 20 years ago the R&D arena for forensic science practice has been severely impacted. The market has been driving costs down, austerity means severe financial cuts resulting in less staff and stifled innovation. Rankin asks who should carry out innovation and how should it be funded. FORENSIC LABORATORIES AND ANALYSIS In the afternoon, the conference will tackle forensic laboratories and analysis. Rob Dalby from the Food & Environment Research Agency (FERA), will talk about proficiency testing for fingerprint bureaus. Proficiency Testing is an important tool to test the procedures of your fingerprint laboratory. FERA, Home Office CAST and the College of Policing have formed a partnership to offer a fit for purpose, whole process, Proficiency Test for fingerprint laboratories. The test offers a real life scenario with all the exhibits you would expect to
Forensic Investigations are at the beginning of a forensic journey and will be explored to see how forensic science is used by law enforcement professionals and forensic military professionals when a serious crime scene unveils receive from the Scenes of Crime Officer. Angela Shaw, Director of Forensic Firearms Consultancy, analyses gunshot residue evidence in homicide investigations. Her presentation, on the afternoon of the first day, will introduce how gunshot residue is produced and deposited following the discharge of a firearm and its subsequent recovery and detection. Angela’s presentation will look deep at the issues and challenges that are met by experts from the field both prior to and during a criminal trial and the ongoing need for research and development within the commercial forensic marketplace. INVESTIGATING DIGITAL The second conference session which is a must-attend for all security and law enforcement professionals is Digital Forensic Investigations. Over the last couple of years digital investigations have become the hottest
topic for a number of industries. With mass attacks such as hackings of commercial private files, learning how to counter these attacks is becoming critical. The session will use the power of sector cross sharing to help delegates leave with real knowledge to feed into their existing protection plans. Talks will include senior digital professionals within law enforcement, teachings on protecting assets in the financial sector, tracking of paedophiles exploiting social media sites, mobile phone and data storage forensics and ways to counter piracy and hacking instances within the entertainment industry. In an investigation into ‘Facial Identification and Forensic Use of Imagery’, Reuben Moreton, Senior Digital Forensic Practitioner at the Metropolitan Police Audio Visual Lab, explores advice and guidance for prosecutors and investigators in the effective use of image comparison and interpretation as expert E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
83
GArdiner ASSociAteS
training & research www.gardinerassociates.com 0845 8399 838 GATR FIRE/ARSON INVESTIGATION TRAINING Since 1996 we have pioneered inter-agency and collaborative training courses. Over 5000 delegates, representing the majority of UK Fire & Rescue Services, Police Services, private sector and overseas organisations have attended our fire/arson and (non-terrorist) explosion training events. TRAINING and SUPPORT SERVICES Drawing on the combined experience of a team of over thirty associates and consultants with backgrounds in the Police Service, Fire & Rescue Services, Forensic Science Providers and other disciplines, GATR and Gardiner Fire Investigation (GFI) and our other business groups are able to provide a range of bespoke training programmes and support services in the fields of:
I Fire/Arson Investigation I Response to Major Incidents I Communication Skills I Interview Techniques I Handling Conflict Situations
I I I I I
Forensic Awareness Risk Assessment Information Gathering Information Presentation Personal Safety
GARDINER FIRE INVESTIGATION (GFI) GFI network of highly experienced practitioners and consultants provides fire/arson investigation support services to the public and legal sectors.
the uk’s major provider of inter-agency investigation GArdinerfireASSociAteS t r a i n ito nthe g &Police r e sand earch training fire Authorities.
RESEARCH PROJECTS Since 1999 our team of fire/crime scene experts has set and filmed hundreds of fires ‘in the name of science’. This has given GATR/GFI the unique opportunity to carry out fire/arson related research projects in real fire compartments e.g:
I Identification of Fingerprint, DNA, Blood and Other Body Fluids I Retrieval of data from computer hard drives and mobile phones I Electrical Arc Mapping I Retrieval of ignitable liquids I Damage to glass by impact, flame impingement, heat and smoke
SKILLS FOR JUSTICE AWARDS - ‘Level 5 Certificate in Fire Investigation’ The GATR Assessment centre offers experienced practitioners a two-day streamlined accreditation and qualification process whereby they investigate and document real fire scenes, in furnished compartments in structures subject to climatic conditions. The process also includes written examinations testing knowledge & understanding and an inquisitorial process scrutinising the conclusions in the investigation report.
Based at wethersfield in essex, www.gatr.co.uk www.gardinerassociates.com our courses include:
0845 838 0845 8399 8399 838
Basic fire investigation
EVENT PREVIEW forensic evidence. Moreton will provide background information on the different types of comparison and interpretation evidence, factors that affect the reliability of this type of analysis, the requirements of the Forensic Science Regulator and the Criminal Justice System regarding expert evidence and points to consider when commissioning experts. Additionally Mark Stokes, Head of Metropolitan Police Digital & Electronics Forensic Service, presents the convergence, growth in use and rapid changes in technology that are presenting huge challenges to Digital Forensics, policing and investigators. In this talk he will present a new operating model for digital forensics within the Metropolitan police and discuss some of the challenges in sustaining operational capability with the back drop of growing volumes of
data, increased security and the need to shorten the time evidence is produced for and presented to the criminal justice system. Prof John Walker from Nottingham Trent University School of Science and Technology will examine the unconventional threats posed by the associated Dark, and Deep Web environments..There is a perception that Cyber Crime and Cyber Criminals and Paedophiles may be discovered with ease. However, the sway of skill sets is biased toward the criminal fraternity, and without doubt there is a need for more understanding of the associated dark, and deep web environments. There is also a greater need for the Investigative Agencies to harness a wider understanding of the modern day conventions of this sub world busied on the Internet – ranging from P2P, Dynamic Web, Encryption,
With the rise of crime carried out with the use of the internet, visitors will be able to learn about best available systems to stop hackers, ways to monitor all activity and how they can use the devices to provide evidence in the court room
Steganography, and even Second Life – new age risks demand new age thinking. SPEAKING FROM EXPERIENCE James Campbell from PriceWaterhouseCoopers LLP is speaking at the Digital Forensics Investigation conference and will recount his personal experience in responding to and mitigating targeted network intrusions. James will reveal how in just a short period of time an attacker can make their mark on a network. During the presentation James will discuss the challenges of traditional forensic investigations and will highlight why there is a need to develop a more rapid and responsive approach to keep pace with cyber adversaries. James will also talk through the implications of not building the right defences, along with impacts on wider business operations including reputational damage. Other confirmed speakers include Dr Richard Shepherd of the Royal Liverpool Hospital discussing the changing role of the Forensic Pathologist, Professor David Osselton of the Centre for Forensic Sciences and Neil Denison, Head of Identification at West Yorkshire Police addressing identification bureau and its role in policing. E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
Forensics Europe Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
85
foster+freeman IMPROVING THE QUALITY OF FORENSIC EVIDENCE
Forensic level inspection systems to counter the serious terrorist threat caused by the rampant use of counterfeit & stolen travel documents. During recent years a number of high profile terrorist attacks have involved the use of fake and/or stolen passports. Foster + Freeman systems provide a comprehensive solution for the verification of passports and ID cards, the detection of alterations and counterfeits, and the inspection of standard and advanced security features. Existing customers include airports, security forces, immigration controls, banks, police & government forensic laboratories worldwide.
fosterfreeman.com
Visit fosterfreeman.com to find out more about our complete range of document examination solutions, from frontline scanners to forensic inspection systems
Foster + Freeman Ltd | Tel: +44 (0)1386 768 050 | email: sales@fosterfreeman.com
Forensics Europe Expo
EVENT PREVIEW
s Forensic po Ex Europe osting will be h ‑attend o legal highs and other a free-t e seminar drugs of abuse, whilst t e l comp rogramme in the afternoon Mick p Gardiner, of Gardiner theatre throughout Associates Training & running o days of Research, sheds light on fire investigation the tw show training and accreditation. the
FORENSIC SEMINARS Forensics Europe Expo will be hosting a free-to‑attend complete seminar theatre programme running throughout the two days of the show. The programme has been carefully constructed to take visitors on a complete forensic journey, from crime scene to the court room and demonstrate the latest case studies and showcase the latest products and services available to the market. As a visitor, this is a must attend free opportunity to help you compare and contrast top international suppliers and to cross share knowledge between sectors that may not normally meet under one roof. The seminar content is varied and runs over the duration of the two days. Day one opens with a seminar by Steve Graham on digital imaging capture processing and outputs. Graham, Investigations Manager at the Health and Safety Laboratory, will explain how laser scanning can uncover how events leading to an accident may have unfolded, and comments on the development of remote aerial video and toxicological monitoring. Alternatively, Dr Sabine Altermann, from LECO Europe, addresses the detection of
The second day consists of Microsystemation’s Paul Baxter speaking on the future of mobile forensics, Amped Software’s Martino Jerian discussing image and video tampering detection and Gary Howard, Managing Director at Complete Forensics C.I.C, presenting on forensic science. Forensic Science is all over the TV, from Sherlock through to CSI Miami. The world is flooded with flashy marketing from the best drama writers in the word. The people who watch these programs want to work in the sector and are being pushed into courses that are not accepted by employers. Those roles that traditionally did not require a degree to start are now attracting graduates pushing non graduates out of the marketplace. What’s the answer? Vocational training or more graduates? In Howard’s session, guests will explore the options. THE FORENSIC JOURNEY Going forward, Forensics Europe Expo will carry on building on its success through
market leading content based on and off the show floor. Apart from the world leading conference, visitors will be able to register for a free exhibition pass which will allow entry into the seminar theatre featuring live products launches, sharing best forensic practice and live crime scene demonstrations. Forensic Investigations are at the beginning of a forensic journey and will be explored to see how forensic science is used by law enforcement professionals and forensic military professionals when a serious crime scene unveils. Understanding how a crime scene is looked at and how evidence is collected and taken in is crucial for professionals within law enforcement, laboratory specialists and criminal lawyers working within the next stage of the process. Forensics Europe Expo will host a free to attend session featuring a Live Crime Scene to help you learn in an interactive way. Following on from when evidence is collected and transported to the appropriate place, the event will focus on exploring latest innovations available to analyse evidence, including lab analysis. Prior to the evidence being used in a criminal matter, all evidence is analysed to the highest degree. Forensics Europe Expo will bring together senior experts within forensic analysis to share their latest findings and recommend best available techniques. Understanding how the E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
87
EVENT PREVIEW evidence is collected and analysed is crucial to professionals working within the law sector to help build a much more solid case in court. For 2015, additional emphasis will be placed on the world of digital forensics, looking at elements of mobile phone, computer and general system forensics to help solve serious crime. With the rise of crime carried out with the use of the internet, visitors will be able to learn about best available systems to stop hackers, ways to monitor all activity and how they can use the devices to provide evidence in the court room. This makes Forensics Europe Expo a must-attend for all professionals working to help prevent and solve digital crime. FORENSICS EUROPE EXPO Forensics Europe Expo allows exhibiting companies to launch their latest products and services on the show floor through workshops and live product demonstrations located in feature zones. Speaking about the event, Stuart Wiseman, Sales Director at WA Products said: “The Forensics Europe Expo is a unique event dedicated to the promotion of forensic products and for our company it is a fundamental part of our annual marketing strategy. Over the course of the event we converse with forensic practitioners,
Forensics Europe Expo allows exhibiting companies to launch their latest products and services on the show floor through workshops and live product demonstrations located in feature zones new distributors and suppliers from all over the world and work to build long lasting relationships for the future.” AccessData, for example, will be launching a free 20-Day Trial Program. The new ‘test drive’ program provides digital forensics investigators the opportunity to evaluate products through real hands-on testing. VEHICLE FORENSICS Berla are exhibiting and will explain the complicated scenario of vehicle forensics, which is a process that yields a myriad of data potentially helpful to all kinds of investigations, from law enforcement cases, to insurance fraud, to accident reconstruction. Many newer vehicles (generally 2008 and newer) are equipped with an infotainment system. Drivers will often sync their smartphone to that infotainment system to charge the phone, to make Bluetooth
Forensics Europe Expo
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
calls, or to have access to their music. In the background, these systems are sucking in all types of personal user data. Depending on the system, this recoverable data can include device IDs, call logs, text messages, contacts, emails, and even photos. A very important note should be made that if a phone has accepted the trusted certificate from the vehicle, any phone data transferred to the infotainment system can be recovered, even if the phone itself has a passcode. This is helpful to investigators who do not have access to the passcode, but do have access to the vehicle. The system records the serial number of any device connected to it (phones, media players, USB drives, SD Cards, etc), providing another link between a suspect and their property. If an infotainment system has navigation, GPS data can be acquired as well. The examiner will be able to view trackpoints, tracklogs, saved locations, previous destinations, and active/inactive routes. Events are another critical piece of information. Some of the events that are recoverable include doors opening/closing, lights turning on/off, Bluetooth connections, Wi-Fi connections, USB connections, odometer readings, GPS time syncs and more. All of this evidence is accompanied by geolocation data and timestamps, which is an incredibly helpful feature. It allows investigators to paint a detailed picture that shows exactly what happened in an accident or crime. CO-LOCATED SHOWS Forensics Europe Expo will once again co-locate alongside the counter terrorism and security event, Counter Terror Expo where visitors will be able to meet and network with 8,500 senior professionals within law enforcement and security as well as access over 300 suppliers. It will also co-locate alongside Ambition, connecting visitors to senior professionals within all emergency services sectors. To register for either a free exhibition pass please visit www.forensicseuropeexpo.com/ register. All entry is by pre-registration only and registrations on-site will cost £50 + VAT. To register as a conference delegate and receive access to all aspects of the event, please visit www.forensicseuropeexpo.com/ conferencereg L FURTHER INFORMATION www.forensicseuropeexpo.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
89
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
TECHNOLOGY
IS THE FUTURE OF COUNTER TERROR TECHNOLOGY IN WEARABLE COMPUTING? Google’s decision to halt the production of its well-publicised Google Glass has re-opened the debate on the future of wearable computing. With the technology now effectively taken back to the drawing board for refinement, there is now a real question as to whether wearable technology is viable Therefore, operatives need to be confident in the ruggedisation behind their equipment but also require that equipment to be thin and light to reduce their overall burden. The benefit of having an eye-mounted or wrist-mounted wearable display will be completely negated if the main processing unit is cumbersome and heavy. However, that does not necessarily mean adopting consumer equipment is the more effective option. Consumer equipment does not address some of the fundamental requirements of the counter-terror sector, such as security and electromagnetic capability. Commercial equipment provides a starting point for equipment in terms of trends, and not every piece of equipment will need to be fully ruggedised - but there is always going to be a need for equipment that is designed to be rugged from the chassis up, and that design is likely to take some of its cues from commercial equipment.
While Glass was a consumer product, the debate still applies to those in law enforcement and the military who use rugged technology to assist in protecting the public against terrorism. Counter-terror forces now take many of their technology cues from the consumer sphere – the days of decadelong development pipelines for bespoke equipment are long gone. Terrorist forces are well-known for making use of consumer hardware and can theoretically refresh their equipment as frequently as consumers, so unless law enforcement and the military keep up, they could be placed at a disadvantage. HANDHELD DEVICES The nature of counter-terror operations means that wearables will play a greater prominence in the future – although not necessarily just yet. While civilian counter-terror operatives
90
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
may not need to carry the 60kg of equipment a soldier typically carries, they will still have a need for equipment that is light and practical. This is particularly the case in an armed operation, because it is unlikely to be practical to put down a weapon to use a piece of equipment to check data – a clear case a wearable will have the advantage over a handheld device. And for now, the available wearables are neither robust nor secure enough for use in counter-terror operations. That means that handheld devices will continue to remain important. Wearable technology fits in to the picture as an extension rather than a replacement, of main processing units delivering specific snapshots of information. In that respect, the relationship is similar to that being seen in some consumer devices – it is about sharing data from one source into a wearable device such as a watch or visor.
THE GETAC TABLET The process can be seen in Getac’s tablet range. Our 7” Android tablet, the Z710, is fully rugged in a compact form factor, and is available with customised encryption software from Becrypt, which points the way forward for wearable devices too - any wearable device is likely to be developed with bespoke applications. In addition, the Getac T800 8” Windows tablet is designed to be thin and light, like a consumer device, but it still features military-grade ruggedisation, which means it actually provides the best of both worlds. The T800 is a strong platform for counterterror operations and is easily customised via Getac’s SnapBack add-on system, which makes it easy to expand capability through an additional battery, or hardware encryption. The platform has been well received by military and civilian law enforcement alike, and has huge potential for further development. L FURTHER INFORMATION If you would like to discuss any aspect of your rugged computing requirements, call 01952 207 221, e-mail: Sales-Getac-UK@ getac.com or visit www.getac.co.uk
LONE-ACTOR TERRORISM
UNDERSTANDING THOSE WHO ACT ALONE
Terrorist Profiling
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
High profile examples such as Anders Breivik pushed the threat of lone-actor terrorism to the forefront of national security across the world. Dr Paul Gill’s new book Lone Actor Terrorists: A Behavioural Analysis seeks to build upon this strand of research and bring the field closer towards a scientific approach to terrorist behaviour.
2.45pm: Anders Breivik uploads a self‑produced film to YouTube and writes the last message in his 1,500-page compendium. At 3:05pm, Breivik emails the compendium to over 8,000 people. He leaves his mother’s apartment and walks to a rented Volkswagen Crafter parked nearby. He drives to Grubbegaten Street, central Oslo, and arrives at 3.13pm. He stops the van 200 metres from the ‘H-Block’, a government building housing the Office of the Prime Minister, the Ministry of Justice and the Police. He waits for two minutes and puts on a bulletproof vest and a visored helmet. At 3:15pm he drives the remaining 200 metres and parks again. He lights the fuse of the bomb he developed in the month’s prior, leaves the van, and whilst carrying a Glock pistol in his hand, walks away quickly. By 3:20pm, he reaches Hammersborg Square where he had previously parked another rental car. He drives toward the ferry MS Thorbjørn
The
at Utøkaia in Tyrifijorden, 25 tragedy’, ‘unfair’, opts miles north‑west of Oslo. ‘incomprehensible’, and book adlogies o d o At 3:25pm, the bomb an ‘evil act of horror’. h t , e m science sic The European Union, explodes, killing eight e m i r c from y and foren and injuring 209. At NATO, the United log de i o v 4:55pm, Breivik arrives Nations and over n i o r m p i r c to y g o at the ferry and boards. 75 states expressed l o s i h psyc istic analys He travels to Utøya similar sentiments. l o ah Island, a venue hosting Condemnation -actor of lone rism a Workers’ Youth League of Breivik was not terro summer camp. He arrives at universal however. 5:18pm. and begins shooting Three far- right elected at 5:22pm. In total, 67 were shot members of parliament (one in and killed at Utøya, two more died in their Italy, one in the European Parliament attempted getaway and a further 110 were and one in Austria) expressed sympathy injured, 33 by gunfire. 50 of those killed at for Breivik’s anti‑Islamic stance. Within a Utøya were 18 years of age or younger. month of the attacks Norwegian far-right Outrage, condemnation, and shock at groups, Norwegian Defence League and the Breivik’s actions quickly followed. The Stop Islamisation of Norway movement, Norwegian Prime Minister, Jens Stoltenberg, reported membership growths of over 300 called it Norway’s ‘worst atrocity since and 100 respectively. Within a couple of years, the Second World War’, a ‘national authorities disrupted two apparent copycat E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
91
Stay cool with us
OUTSIDE 35 C HUMIDITY 90%
22
ยบC
Inside
PROVIDED BY HEINEN & HOPMAN
As an international leader in our own field of air conditioning and heating, Heinen & Hopman is used to working with yards around the world. At the same time, our global network of local subsidiaries and aftersales centres make us an ideal partner for navy vessels that criss-cross the oceans.
www.heinenhopman.com Follow us on:
We also understand the stringent operational requirements of such vessels and the need for innovative design. The result is a suberb interior environment and optimum support wherever the corvettes may sail. www.greenmanifest.info
LONE-ACTOR TERRORISM plots in Poland and the Czech Republic while a third disrupted plot’s perpetrator labelled Breivik his ‘hero’ in a series of Facebook posts. The independent parliamentary report on the attacks acknowledged that the threat from lone- actor terrorism was underestimated in terms of the devastation it can cause. Under interrogation, Breivik distinguishes between the combat and media success of the attacks. In the early interviews, Breivik doubts his media success. He concedes that few of his co- ideologues would defend his ‘bestial actions’ (Husby & Sorheim, 2011: 16), and that the day of the actions was ‘the worst day of his life’. He acknowledges further that the events were ‘completely awful’ and that he was ‘not proud’ of what he ‘was forced to do’ in response to Labour Party policies. Much of this early antipathy towards his own actions was due to the fact that he defined these victims as relatively low value compared to the political elites of the country. On the other hand, however, he saw the attacks as a combat success, and stated that the fight will continue via ‘the pen from jail’. On the whole, Breivik states that the success of the violent actions could only be ‘measured by the spreading of the compendium’) that he wrote in the years prior which elaborated upon his ideological motivations. QUESTIONS The short illustration above provides a number of questions, including: Is there a lone-actor terrorist profile?; Is there a common behavioural trajectory into lone-actor terrorism? How ‘lone’ do lone-actor terrorists tend to be?; What role, if any, does the internet play?; What role, if any, does mental illness play?; How rational are they?; What risk do they pose?; How do lone-actors learn and prepare for a violent attack absent of group membership?; How do lone-actor terrorists differ?; How can we minimise the threat of lone-actor terrorism?; Can lone-actor terrorists be detected, prevented, or disrupted prior to engaging in a violent attack? Until recently, existing research on the topic of lone-actor terrorists was incapable of answering such questions. The literature remained methodologically, conceptually, and theoretically weak. At best, it was certainly underdeveloped, and there was relatively little that the counter-terrorism community could fully glean from what analysis had been conducted on what most still refer to as ‘lone wolf ’ terrorism (a description avoided here). This book provides the first empirical analysis of lone actor terrorism that focuses upon a range of factors including who lone‑actor terrorists are, how they differ from each other (and from other kinds of terrorists), their developmental pathways into terrorism, their pre- attack behaviours and aspects concerning their offence - commission. It therefore marks a departure from previous
Rather than treating all terrorists homogeneously, recent improvement in our understanding of terrorist behaviour has come through disaggregated analyses that focus upon types of terrorist behaviours, roles, and functions. This book seeks to build upon this strand of research
Terrorist Profiling
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
research on lone‑actor terrorism because it largely focuses upon behavioural aspects of each offender. The book adopts insights and methodologies from crime science, criminology and forensic psychology to provide a holistic analysis of the behavioural underpinnings of lone-actor terrorism. Based on an extensive analysis of open-source material, this book contains important insights into what an analysis of their behaviours might imply for practical interventions aimed at disrupting or even preventing attacks. LONE ACTOR DATASET The analyses in this book are based on a unique dataset of 111 lone actors. The dataset includes over 180 variables spanning socio‑demographic characteristics to ancillary and antecedent behaviours to terrorist event‑related behaviours. The variables cover the life span of the individual’s development, later radicalisation and right through to the execution of the terrorist event. As such, this book encompasses what LaFree refers to as the third major development in the empirical study of terrorism; the expansion of our knowledge of terrorism based on ‘specialised data sets on specific subsets of terrorism cases’. Rather than treating all terrorists homogeneously, recent improvement in our understanding of terrorist behaviour has come through disaggregated analyses that focus upon types of terrorist behaviours, roles, and functions. This book seeks to build upon this strand of research and bring the field closer towards a scientific approach to terrorist behaviour. NATIONAL SECURITY High profile examples such as Anders Breivik pushed the threat of lone-actor terrorism to the forefront of national security across the world. This book focuses upon lone-actor terrorism from 1990 to mid-2014, because during this period movement leaders of different ideological shades explicitly called for an uptake in lone-actor operations. Each chapter focuses upon a different aspect of lone-actor terrorist behaviour, and how to potentially counter the threat. It also takes stock of a few factors including the strategy of lone-actor terrorism (and how it differs across ideologies), the drivers behind its diffusion across ideologies, the dynamics that make lone-actor terrorism a threat, definitional issues (it would not be a terrorism book
without such an endeavour) and what the existing literature has to say on the topic. L ABOUT THE AUTHOR Dr Paul Gill is a lecturer at UCL’s Department of Security and Crime Science. His research applies behavioural science approaches to the study of criminals, crime patterns, and criminal behaviour. His research has been funded by the US. Department of Homeland Security, the US Office of Naval Research, the US National Institute of Justice, the UK Home Office, the Defence Science and Technology Laboratory, the European Union and the UK North-West Counter Terrorism Unit. He has published in several leading criminology, psychology, and political science journals. The European Consortium for Political Research awarded his PhD the best political science dissertation in Europe in 2010.
Lone Actor Terrorists: A behavioural analysis is published by Routledge – a world leading academic publisher in Humanities and Social Sciences. www.routledge.com
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
93
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
SURVEILLANCE
A RESOLUTION TO SOLVE THE FRAME RATE DILEMMA
Following the UK launch of the new 360°, ultra high 4K resolution surveillance camera, Panosonic UK discuss how increased resolution cameras can create a challenge to the industry
Aimed at applications such as banking, retail and logistics, the new Panasonic WV-SFV481 camera captures an increased level of detail over a much wider area than is achievable with traditional security cameras, meaning greater coverage with fewer cameras. 4K adds the extra detail that makes facial recognition servers that extra bit more accurate, and opens the door to more sophisticated, reliable analytics. OUTDATED BLACK AND WHITE Steve Proctor, Head of Security Solutions for Panasonic UK said:“Security is pretty late to the table in 4K terms, with many security professionals apprehensive of making the move to ultra-high resolution because of the size of video files and network capability needed. Gone are the days of grainy, black and white CCTV images, next to useless for crime detection.” Panasonic’s Ultra 360 camera features heat mapping which allows the user to identify where people move and stay through heat signatures captured on either a counting map, which visualises traffic, or a staying map, which visualises where people gather. A
94
COUNTER TERROR BUSINESS MAGAZINE | Issue 21
staying map is important for identifying high-risk areas. The Motion Object Remover captures people as a translucent silhouette, so the background is still visible, enabling behaviour analysis while keeping privacy. This feature can also help security manager’s spot suspicious items in areas, for example left baggage at airports and train stations. Such improvements create a challenge for the industry, as Steve Proctor addresses: “The development of an all-seeing ‘eye in the sky’ with 20/20, means we now have much higher quantities of data to process, transmit, store and download. The question of how this is managed is one of budget and necessity. A good supplier should be tailoring your needs to the right solution and advising properly of the additional network requirements and costs. “For most applications, 20 frames per second will be sufficient, but increase this to 60 frames per second and bandwidth
infrastructure and storage costs can become prohibitive. The result means that security managers should be doing a different calculation when appraising the return on investment for a new system.” SMART TECHNOLOGY It’s now essential to look in to network capability. A network of 15 HD cameras with a 10 megapixel resolution at 30 frames per second would require in the region of 730Mbps. This could prove to be detrimental to business broadband speeds and cost several hundred pounds a month. Proctor continued: “All of a sudden saving £100 on the cost of a camera becomes irrelevant, if you can save that in a month by halving your network costs.” Utilising H.264 compression, like Panasonic’s latest 360° camera, can decrease bandwidth by 50 - 80 per cent depending on the camera and scene in view. The new camera also utilises smart technology such as Variable Image Quality on Specified area (VIQS), which will reduce the bandwidth even further. VIQS can cut bandwidth use by streaming different sections of the camera view at different image qualities. This suits applications such as car park entry or exits, where number plate capture is crucial but the general scene does not need to be recorded in such high detail. THE ADVANTAGES One of the traditional advantages of IP cameras is the ability to have numerous cameras monitored and stored remotely, say across a multi-site estate. Proctor described: “A good supplier should start by identifying the weakest link in the chain – the site with the slowest network connection across those multiple sites. Furthermore, they should also be advising you on the right mix of resolution, frame rate and image quality and should be honest enough to advise against turning everything up to 11. “A good supplier will also ensure you have the right kit for the job. The image quality on many cameras in good light conditions can be comparable, but will you be able to detect faces in low light conditions? And, how many times will you be unable to use your footage due to poor image quality?” Another bonus of the new Ultra 360 is that unlike competing 360° cameras, it features very high light sensitivity, and can operate down to 0.05lx in black and white mode. “As I said earlier, gone are the days of grainy CCTV images, next to useless for crime detection, but I’d like to add a caveat … you need to get the network right too.” Steve Proctor concluded. L FURTHER INFORMATION business.panasonic.co.uk
WESTERN INTERVENTION
TRACKING THE RISE OF THE ISLAMIC STATE
Security consultant Paul Easter MBE outlines the difficulties Western powers have faced in attempting to build democratic nations in the Middle East, and calls for strategic thinking The current rise of Islamic extremism is neither a new phenomenon nor a surprising one. A thousand years ago, the Nazari Isma’ili sect (later known as the ‘Assassins’) spread terror during a 200-year campaign, murdering Crusaders and Muslims to further their political ends. Their first leader established a stronghold in north-west Iran Despiteears yy where he the manmbat recruited, o
of c q ns in Iran, o i t a r e op hanista and Afger state neith escribed d can be table or as s ratic democ
radicalised and trained operatives to murder and terrorise according to his political requirement. There are clear parallels with the rise of the Sunni Islamic group al‑Qaida from its strongholds in Afghanistan and its campaigns against both secular and Islamic targets. Thirteen years later, the ‘fellow travellers’ of the Islamic State (IS) dominate a broad swathe of Syria and Iraq with their bastardised version of Wahhabism. In the modern era, operations by the US and its allies have cost trillions (the
US estimates its Global War on Terror (GWOT) cost $3.7 trillion in the decade after 9/11) and have resulted in the deaths in combat zones of over 600,000 civilians and combatants. However, the various theatres of the GWOT are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility. Despite the many years of combat operations in Iraq and Afghanistan, neither state can be described as stable or democratic, and both interventions are being described, not least by RUSI, as strategic failures. They have been beset by a number of mistakes.
Counter-Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
NO CLEAR END-STATE As a consequence of the West having no objectives following Saddam’s removal, ill‑conceived policies such as Deba’athification occurred. Its goal was to remove the Ba’ath Party influence in Iraq’s new political framework. By sacking any public servant with Ba’ath Party membership, the policy dismantled the extant security structure. It moved the former elite to the bottom of the social ladder and removed those competent to provide public services such as electricity, sanitation and governance. As a consequence, Deba’athification: E
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
95
Advertisement Feature
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
INTELLIGENT SOLUTIONS
DEPLOYING INTELLIGENCE CAPABILITY – IT DOESN’T NEED TO BE DIFFICULT…
Meeting user demand for high-performance, content rich mapping capabilities in mobile or deployed headquarters is often extremely challenging. Helyx is able to help you meet these challenges through a range of intelligence platform solutions designed to satisfy even the most demanding of users
DETACHMENTS THROUGH TO DEPLOYED COMMANDS The needs of a small intelligence detachment is significantly different to those of a deployed Silver or Gold command where the number of users and agencies being supported rapidly increase. As a result a one-size-fits all solution is neither appropriate nor cost effective. Helyx work with ruggedised hardware specialists Getac, in providing a complete range of technology platforms and solutions that
96
provide the necessary processing and storage capabilities to support small scale deployments through to major incident or event commands. Solutions can be either self-contained in rugged cases ready to deploy or can be integrated into command vehicles to provide a more permanent and readily available capability. INDUSTRY LEADING GIS SOFTWARE & SERVICES Helyx’s GI Servers are built using industry leading software from Microsoft and Esri to provide a best-of-bread solution as well as providing a familiar technology base to integrate into existing mobile commands and headquarters; minimising the impact on support teams. The use of industry standard technologies ensures that integration with existing capabilities in the fixed or static headquarters is significantly eased. Where deployed commands need to be augmented with deployed analysis capabilities Helyx is able to provide
Helyx Officer Briefing Tool (BeatMaps) running on a Helyx Portable Geo-Server
User expectations are increasingly being based on the services provided by the likes of Google or Bing which are difficult to meet in secure or disconnected environments. Helyx’s experience from over a decade of supporting defence and security organisations develop and deliver deployable intelligence solutions has resulted in a range of capabilities that are able to address these demands and significantly enhance the effectiveness of staff when deploying to major events or incidents. The use of intelligence capabilities, operational decision support platforms and tools within a fixed environment are relied upon every day. The degree to which these same capabilities are made available to deployed teams and commands varies significantly – despite the benefits being broadly considered to be magnified when they are deployed to directly support decision making and operation management teams. Helyx provides deployed intelligence capabilities that are designed to support operational teams in a range of environments and settings. Deployed geographic intelligence platforms are designed to help by providing a consistent geographic view of an operation. Additionally, a deployed intelligence platform is able to support deployed command and control platforms and operation planning systems. This simplifies deployments, reduces reliance on expensive reach-back communications links whilst improving the ability and efficiency of a mobile command to operate.
protectively cased analysis workstations that are designed to meet the processing and storage of a deployed intelligence cell capable of operating at a variety of security classifications. A large-format printer (A3+) or plotter (A1 / A0) can also be included with analysis workstations ensuring that larger format hard-copy briefing products and documents are able to be easily and conveniently produced. L FURTHER INFORMATION Come and visit us on Stand E14 at this year’s Counter Terrorism Expo. Contact Helyx SIS: Tel: 01684 273 725 enquiries@helyx.co.uk www.helyx.co.uk Contact Getac: Tel: 01952 207 221 sales-getac-uk@getac.com www.getac.com
WESTERN INTERVENTION
The various theatres of the Global War on Terror are now characterised by failing states and a rise of Islamic extremism, for which the West must bear much of the responsibility catalysed the initial insurgency; increased disaffection amongst the general population at the lack of basic services and governance; and hamstrung any indigenous capability to treat either problem. Similarly, the West’s intervention in Libya allowed militarily weak anti-Gaddifi forces to overthrow a 42-year despotic regime. Once again, no real effort was applied after the intervention to secure an effective security apparatus or to lay locally acceptable foundations for future political institutions. Now, militias have the balance of power, and the democratic government resides in Tobruk due to Tripoli being held by extremists. As neither side is being militarily decisive, Libya is slipping further into instability. In Syria, the civil war has killed over 200,000. Again, Western intervention did not decisively tip the balance of military power and has only prolonged the conflict. It has also allowed the rise of IS in the spaces not governed by the Syrian state. SHORT-TERMISM Eleven and thirteen years (Iraq and Afghanistan respectively) are very short periods to expect countries with no
generational history of democracy to field successful democratic institutions. Previous interventions such as colonial rule in India took generations to achieve a change that can be regarded as long lasting. Iraqi and Afghan democracies remain as elusive as ever. Despite enormous investments in equipment and training, the Iraqi Army has shown little robustness to deal with internal or external threats, proving wholly incapable to defeat the poorly trained insurgents from IS. This bodes badly for the similarly trained Afghan troops in their expected conflict with the Taliban post US drawdown. MIRROR–IMAGING We all view the world through ‘us’-coloured lenses, believing others will behave as we would in their shoes. Western governments are particularly guilty of this bias, expecting those previously ruled by non-democratic models to embrace democracy like a Western audience. As a result, the recent efforts to impose democracies have largely been failures. While in the West dictatorships and other autocratic regimes are viewed with suspicion, they remain a valid model for some parts of the world. Strong autocratic regimes have held
otherwise volatile states together for decades. Yugoslavia, Iraq, and Libya are all examples. Indeed, the oft-heard cry that Iraq is better off without Saddam is difficult to argue persuasively. For example, it is estimated 800,000 have died in Iraq since 2003, and this figure exceeds the estimates for the whole of Saddam’s 24-year grip on power. ‘Our’ democracy has patently not brought stability to Iraq and Afghanistan, and, without a strong external unifying stimulus in Libya, it is likely to fail there too. IN CONCLUSION To conclude, Western interventions in the last twenty years have been categorised by: a lack of clear end-state objectives or a viable means to achieve them; a lack of real politick for state structures and government; and a wholly unrealistic timeframe. As a consequence, most states that have been subject to Western interventions are now ‘anocracies’, the disastrous halfway house between dictatorship and democracy. This chaotic void is when a state is at its most lawless and when groups such as IS flourish. It is ironic that despite one of the principal aims of the GWOT being to remove such groups, it has in fact made them stronger than ever. These are not smug observations with the benefit of hindsight. These are largely repeated observations from recent and earlier history. There is still much thinking to be done at the grand strategic level.
Issue 21 | COUNTER TERROR BUSINESS MAGAZINE
Counter-Terrorism
THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com
97
YOUR FOCUS. OUR RING SIGHT. BOTH PERFECT.
Ring Sights has been in the business of design and manufacture of the finest quality optical equipment since 1976. Nearly forty years on and with highly skilled leadership, dedicated teams of
expert staff and a massive amount of investment, the company now offers state of the art production facilities and are the world leaders in research, design and manufacture of unit power sights for the military.
Ring Sights Defence Group Ltd +44 (0)8700 422260 info@ringsights.com www.ringsights.com
NUCLEAR DETERRENT
NEWS IN BRIEF Oil pipeline sold for £82m
Trident re-emerges as pre‑election political hot potato The renewal of Trident, Britain’s nuclear deterrent, has been a major issue in the run-up to this years’ election. Both Conservative and Labour remain committed to the replacement programme, but as defence secretary Michael Fallon reiterated the Conservative party’s commitment, the speech was used to attack opposition leader Ed Milliband’s position. “In an increasingly dangerous world in which we cannot know what nuclear threats may emerge in the 2030s, 2040s and 2050s, the only responsible choice is to recommit to our continuous at sea deterrent now so that we can cope with any direct nuclear threat to the UK, or our NATO allies.” “The Conservative manifesto will guarantee that we will build a new fleet of four Successor Ballistic Missile Submarines, replacing the four Vanguard boats. We will retain the Trident continuous at sea nuclear deterrent to provide the ultimate guarantee of our safety.” “RED LINE” ISSUE The Conservatives appear to be worried about Labour agreeing to a coalition with the Scottish National Party (SNP), which has the scrapping of Trident at the heart of its election manifesto. So far, SNP leader Nicola Sturgeon has said that Trident would be a “red line” issue in any talks with Labour. Meanwhile, shadow foreign secretary Douglas Alexander has said the Labour party was committed to renewing Trident and retaining continuous at-sea deterrence: ““I can’t be clearer than that,” he told the Financial Times. Vernon Coaker, Labour’s shadow defence secretary, said: “As Ed Miliband has already made crystal clear, national security is not a matter for negotiation. We support renewal of Trident along with a renewed focus on multilateral disarmament. Labour has suggested the possibility of reducing the number of Trident submarines from four to three if a continuous deterrent
could be maintained with technological advancements, although Ed Miliband said their position at the moment was to stick with four. The Liberal Democrats seem keen to investigate the possibility of reducing the submarine fleet to three, possibly two. The UK’s current fleet of four Vanguard submarines, based at Faslane, Scotland, is due to retire in the late 2020s. Construction on the first of the replacements is due to begin in Barrow-in-Furness in autumn 2016 in order to be operational by 2028. The four Vanguards are scheduled to be phased out by 2032. DELAY However, former Labour defence secretary Des Browne believes this deadline could be pushed back. He told the Guardian: “In 2006, I was told by the experts that we had to start building replacement submarines for Trident then. Some of the same experts advised the coalition government that this could be delayed to 2016. This delay suited the politics of coalition and has destroyed my faith in the expert advice.” This was echoed by Sir Menzies Campbell, former Liberal Democrat leader and head of the British delegation to the Nato parliamentary assembly: “I have no doubt that both the Conservative and Labour parties will maintain throughout the course of the election campaign their determination to build four submarines and 160 warheads. But I am equally sure that within a week of the election being over, whoever is secretary of state for defence will instigate a further review of Trident and its impact upon the overall budget.” More than £2bn has already been invested in the Trident replacement, which it is estimated will cost in excess of £25bn. A minority Labour government could still win a vote to renew Trident with the backing of Tory MPs. READ MORE: tinyurl.com/pm5zfq9
Defence Minister Philip Dunne has announced the sale of 2,000km of pipelines with associated storage depots and pumping stations to the Spanish pipeline operator Compañía Logística de Hidrocarburos. Known collectively as the Government Pipeline and Storage System (GPSS), this key piece of national infrastructure was established in 1939 to provide the UK with secure oil distribution as it stared into the abyss of total war. Today, it primarily serves civil airports, with only 10 per cent of its fuel supplying military airfields. The sale has generated £82m. Warsaw University of Technology has also been contracted to co‑operate with Thales on UAV radar technologies, flight simulations, drive technologies, applications in civil services and man-machine interface.
Defence Business News
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
READ MORE: tinyurl.com/o69zvf7
RAF air strikes on ISIL Royal Air Force aircraft have mounted further strikes on ISIL terrorists in Iraq. Two Tornado GR4s flew an armed reconnaissance patrol on Thursday 2 April. As well as conducting surveillance with the advanced Raptor pod fitted to the aircraft, the GR4s were able to provide support to Kurdish peshmerga near Sinjar, whose advance had brought them into contact with an ISIL heavy machine‑gun position in a building. Working in coordination with the ground forces, the GR4s were able to demolish the position with a pair of Paveway IV precision guided bombs. READ MORE: tinyurl.com/nd9el55
Britain to help train Syrian opposition forces Britain is to provide around 75 personnel to help train to Syrian moderate opposition forces, Defence Secretary Michael Fallon has said. British military staff will provide instruction in the use of small arms, infantry tactics and medical skills. The training, which forms part of a US-led programme to support the moderate Syrian opposition, will take place in Turkey. READ MORE: tinyurl.com/ojx2kol
Issue 11 | DEFENCE BUSINESS MAGAZINE
99
T.REACT CIP Intelligent Perimeter and Wide Area Detection Solution
INTELLIGENT PERIMETER AND WIDE AREA DETECTION SOLUTION T.react CIP is the fastest and most precise way of detecting, identifying and tracking both internal and external perimeter threats in areas where business continuation is a matter of national importance.
KEY BENEFITS Automatic wide area threat detection, tracking, and identification Simultaneous handling of both internal and external threats Easy third party sensor integration
LOOK FOR TERMA AT BORDER SECURITY EXPO
STAND #610, 21-22 APRIL 2015, PHOENIX, AZ
www.terma.com
‑MILITARY SPENDING
Former Labour defence chiefs say military spending must rise In a letter to the Telegraph, former Labour defence secretaries Lord Hutton and Lord Robertson, have voiced concerns about damaging cuts to the armed forces and have insisted that spending must rise following the next Strategic Defence and Security Review (SDSR), which the pair say should be ‘threat based’ and not ’resource based’. The review, last held in 2010, is planned to take place later this year and will analyse threats to UK national security. In the letter, Lords Robertson and Hutton state: “It is time now for all of our national political parties to reflect on the growing consensus that we will need to do more in order to maintain efficient and effective armed forces. How can we best make sense of the competing demands for scarce public resources? “There are three steps to a rational process of policy making in the defence space. “First, we should recognise that the next Strategic Defence and Security Review (SDSR) is the right place to decide these priorities. It is here that we can conduct a rigorous analysis of the defence threats we face and where we can piece together the necessary force structure to meet them.
“The SDSR must be a threat based and not a resource led review. It will not be easy to do this against a continuing backdrop of austerity. Public spending will be necessarily constrained by the need to reduce the current deficit – itself a threat to national security. “Second, and most importantly, credibility of the SDSR will be fatally compromised if the necessary resources to implement its recommendations are not provided by the next Government. “The promised increase of one per cent in the equipment budget for the MOD over the next Parliament made by the present Government is to be welcomed. But it won’t be enough to avoid further
de‑stabilising and damaging cuts to the armed forces. And in the short term there must be no irreversible changes in UK defence capacity – like further troop reductions.” The letter from Lord Hutton (Defence Secretary from 2008 to 2009) and Lord Robertson (Defence Secretary from 1997 to 1999, and Nato Secretary General from 1999 to 2004) follows a series of calls from leaders on both sides of the Atlantic that Britain must hit the Nato target of spending two per cent of GDP on defence. David Cameron and Ed Miliband have both refused to commit to the target until after the May 7 election. John Bolton, the former US ambassador to the UN and a leading Republican spokesman on foreign affairs, said any further cuts in defence spending would make Britain “far more vulnerable militarily” and send a signal to potential enemies that “there is a diminished will in the West to defend itself”. Bolton also warned that further cuts could seriously affect future coalition operations with the US.
Defence Business News
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
READ MORE: tinyurl.com/kqxbtvp
NATO
AIRCRAFT
NATO’s new ‘spearhead force’, known as the Very High Readiness Joint Task Force (VJTF), has started test operations. The VJTF is a brigade that will be able to deploy within 48 hours and will eventually include 5,000 troops. It is part of the NATO Response Forces (NRF), NATO’s highreadiness force comprising land, air, sea and Special Forces units capable of rapid deployment wherever needed. Both the NRF and its new VJTF are a key component of what has been called the “Readiness Action Plan” agreed by NATO leaders at the Wales Summit in September 2014. The VJTF has now reached interim capability and has started to go through a series of exercises, trials and evaluations, which will run throughout 2015.
Arms manufacturer Lockheed Martin is putting data analytics software Splunk to work monitoring the IT systems and network that support its F-35 Lightning II fighter jet. The jet, which is in final stages of development, uses an Autonomic Logistics Information System (ALIS) as its IT backbone, monitoring the fleets in the US and in international military branches like the UK, which along with several other countries, is working with Lockheed Martin to develop
NATO’s new ‘spearhead Lockheed Martin puts force’ starts test operations Splunk in F-35 Lightning
The first of these took place in Germany on 4-5 March, involving the 1st German-Netherlands Corps. Spokesperson, Lt Col Paul Kolken stated: “We pride ourselves specifically for being quickly deployable, for the attitude to try out new concepts and to interact in peacetime and before deployments with the civil partners that we most likely will work with when in a mission area.”
the state-of-the-art jet fighter. The F-35 Lightning II boasts “the most powerful and comprehensive integrated sensor package of any fighter aircraft in history”. The contract with Splunk Enterprise will allow Lockheed Martin to analyse and predict operational maintenance and provide greater visibility into system performance. READ MORE: tinyurl.com/kydnzr8
READ MORE: tinyurl.com/l5nwmlz
Issue 11 | DEFENCE BUSINESS MAGAZINE
101
Defence Spending
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
STRATEGIC DEFENCE & SECURITY REVIEW
RUSI DEFENCE SPENDING PREDICTION GIVES PRE-ELECTION FOOD FOR THOUGHT A paper published by the Royal United Services Institiute highlights the danger of further reductions in defence spending and personnel numbers in the forthcoming Strategic Defence and Security Review, due to take place before the end of the year The briefing, by Royal United Services Institiute (RUSI) research director Professor Malcolm Chalmers, projects that the UK will spend 1.95 per cent of its GDP on defence in 2015/16, excluding spending on operations. This equates to £37.3 billion, which falls just short of the NATO two per cent target to which it agreed at the Wales summit. Entitled Mind the Gap: The MoD’s Emerging Budgetary Challenge, the briefing provides the most up-to-date assessment of UK defence spending and projections. It is the latest in a series of briefings from RUSI ahead of the next Strategic Defence and Security Review, which is to take place after the General Election. REAL-TERM CUTS The paper highlights recent analysis of the spending plans of all three of the major political parties. It suggests that, on a pessimistic scenario based on this analysis, ‘the MoD would face a 10 per cent real‑terms cut over the next four years’. The paper further comments how: “Neither of the two largest parties appears to be willing to exempt defence from wider austerity. None of the smaller political parties (with the possible exception of UKIP) favour more generous treatment for defence.” Professor Chalmers writes: “The final budgetary settlement will be one of the most strongly contested elements of this year’s Spending Review. In contrast to the health, schools and international development budgets, none of the major parties has committed to protect the defence budget. Yet the MoD could face a substantial funding gap even on its own planning assumptions of one per cent real annual growth in equipment spending and the protection of non‑equipment spending at baseline levels.” On the current MoD planning assumption of modest real growth, and with the removal of one-off 2015/16 allocations, ‘spending for 2016/17 is due to fall to £36.0 billion, equivalent to 1.85 per cent of GDP’. In order to meet the 2 per cent commitment in 2016/17, therefore, the ‘MoD would need an additional £3 billion’. Further increases would be
102
DEFENCE BUSINESS MAGAZINE | Issue 11
Sector
Cost
% of total allocated
Submarines Ships Combat Air Information Systems and Services Land Equipment Air Support Weapons Helicopters ISTAR Naval Bases
40.0 18.2 17.9 16.9 15.4 13.8 12.6 11.1 4.9 3.1
25.5% 11.6% 11.4% 10.8% 9.8% 8.8% 8.0% 7.1% 3.1% 2.0%
Joint Supply Chain and other Total allocated to sector Contingency Centrally held provision
3.2 157.1 4.6 1.2
2.0% 100%
required in subsequent years in order to keep pace with GDP growth. The briefing says: “By 2019/20, an extension of the commitment to the NATO target would require the MoD to be provided with an additional £5.9 billion in annual spending.”
From the RUSI Report: The NATO Target
Defence Spending
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
At the Wales NATO summit of September 2014, member states signed up to a statement that committed those who POSSIBLE SCENARIOS currently spend less than 2 per In a context of wider austerity in public cent of their GDP on defence spending, ‘such an increase is not plausible’. to ‘halt any decline in defence Instead, the RUSI paper suggests two more expenditure’, as well as ‘aim to feasible scenarios. Firstly, on a pessimistic increase defence expenditure scenario, based on analysis of the overall in real terms as GDP grows’, spending plans of all three of the major and ‘aim to move towards the political parties, the MoD would face a 10 per 2 per cent guideline within a cent real-terms cut over the next four years. decade with a view to meeting Conversely, In its optimistic scenario, defence their NATO capability targets’. is given the same level of funding protection Those currently meeting the as health and schools., sending a powerful 2 per cent guideline, it was also signal of increased priority for defence. The agreed, ‘will aim to continue to do so.’ Only four states fell within the latter extra funds – around £4 billion per annum category in 2013, the latest year for which figures were available at the time by 2019/20, compared with the pessimistic of the summit: the US (4.4 per cent), the UK (2.4 per cent), Greece (2.3 per cent) scenario - would probably have to be found and Estonia (2.0 per cent). Since the summit, UK ministers have made clear from increased taxation and/or borrowing. that the UK is committed to meet the target for 2015/16. They have not been Since 2010, the bulk of real-terms cuts in prepared to commit to spending 2 per cent of GDP on defence beyond 2015/16. spending have been felt in the personnel A previous RUSI briefing estimated that UK defence spending in 2015/16 would budget, with numbers of service and civilian be equivalent to only 1.88 per cent of GDP, short of the 2 per cent target. Since personnel being cut by 17 per cent and 28 that estimate was made, the author has been informed that the MoD plans, for per cent respectively. This concentration the first time, to include War Pensions (due to total £820 million in 2015/16) in of cuts on the personnel budget will be NATO-declared defence spending. War Pensions are paid for disablement as a harder to achieve in a further round of result of service prior to 2005, together with payment to war widow(er)s. Most cuts. Planned increases in pension and of these payments relate to service in the Second World War. This is a legitimate national insurance contributions, together item to include under NATO counting rules. It is unclear why this item has not been with growing salary costs, will increase included in the past, but it may be because such payments are not related to the the pressure on personnel numbers. generation of current defence capability. As a result of this change in counting Even on the optimistic scenario, numbers rules, the UK is now on course to spend 1.95 per cent of its GDP on defence of service personnel could fall from in 2015/16, even if there is no net additional spending on military operations. If 145,000 to 130,000 by the end of the spending on operations totals £500 million (the amount provisionally earmarked decade. Under the pessimistic scenario, for this purpose in the 2014 Autumn Statement), UK defence spending on they could fall to 115,000. NATO’s definition would be equivalent to 1.98 per cent of GDP. Since NATO only Plans for equipment spending are also reports national defence spending as a proportion of GDP to a single decimal likely to be affected, especially on the point, it would therefore continue to show the UK as meeting the target. pessimistic scenario. Planned spending NATO is not due to publish its initial estimates for UK defence spending on a successor submarine, designed in 2016/17 until early 2017. The UK is unlikely to meet the 2 per to carry the Trident nuclear cent target in that year, at least without a large and expensive Since lk missile, is due to take the u b new military operation. In order to maintain core spending e h t largest share of the forward 2010, erm cuts at 1.95 per cent of GDP in 2016/17, the MoD would have to procurement programme, t ‑ l a e replace £1.5 billion of one-off allocations for 2015/16 and, in e h r t f o and will be hard to felt in ith addition, find a further £700 million to allow for projected n e e b change. If economies have have l budget, w real GDP growth. In total, this would be equivalent to a real to be made, air, maritime e increase in defence spending of around 7 per cent in the first personnry and civilian and land systems year of the new Spending Review. This does not seem likely. 7 a t 1 i il y could all be affected.
m el cut b nt n n o s r e p per ce and 28 ctively respe
FORECASTING REDUCTIONS In either scenario, the result will be a remarkably sharp reduction in the footprint of defence in UK society over a decade. Even in the optimistic scenario, the defence’s share of GDP will have fallen by a third: from 2.6 per cent of GDP in 2010 to around 1.75 per cent by 2019. Additionally, the MoD workforce, both service and civilian, will have fallen by around 30 per cent, from 265,740 to 184,000 by 2019. Professor Chalmers concluded that while the trend to reduce defence spending
‘has been accelerated by the ending of the Afghanistan commitment, its primary driver has been the sharp reduction in the share of national income spent on government services. Once the process of deficit reduction is completed, therefore, the MoD can reasonably hope that it will be able to share in the fruits of increasing public spending’. Chambers added: “Admittedly, this was also the expectation in 2010, when it had been anticipated that spending
could rise again after 2015. In reality, the prospects for the defence budget remain closely tied to wider economic growth. The government is not yet convinced that strategic security risks are high enough to justify an exemption for defence from austerity.” FURTHER INFORMATION To download the full report Mind the Gap – The MoD’s Emerging Budgetary Challenge by Malcolm Chalmers, visit the royal United Services’ Institutes website at www.rusi.org
Issue 11 | DEFENCE BUSINESS MAGAZINE
103
DSEI 2015
EVENT PREVIEW General Dynamics Land Systems, Iveco, Jankel, Lockheed Martin, Nexter, Oshkosh, Patria, Raytheon, Streit and Supacat. DSEI Event Director, Duncan Reid, said: “DSEI 2015 will attract more than 30,000 quality visitors to ExCeL London and there is no doubt that the expanded Land Zone will be a significant focal point for the many delegations and military personnel from around the world. The range of new technologies and innovation that will be on display in the Land Zone clearly emphasises that DSEI is the global hub of defence and land-based expertise for all Armed Forces’ requirements.” DSEI 2015 will also feature its strongest aerospace offering, with exhibitors including Airbus Defence and Space, Boeing, BAE Systems, General Dynamics, L3, MBDA, Rafael, Rolls-Royce, SAAB and Thales. Platforms expected to be displayed include Apache, Chinook, Merlin, Sea King and Wildcat helicopters. Unmanned systems will also be prominent, with a broad spectrum of exhibitors including: Boeing Insitu, Northrop Grumman – who will feature the Global Hawk - iRobot and QinetiQ. The ability to host visiting warships adjacent Defence & Security Equipment International (DSEI) is the world’s to the exhibition halls is a major contributor to largest land, sea and air defence and security exhibition, bringing DSEI’s unique role as an integrated showcase of defence and security capabilities. DSEI together international trade professionals and military experts 2013 played host to an impressive flotilla of visiting warships and waterborne The defence of sovereign rights is a major WORKING TOGETHER demonstrations, as well as The challenge for a significant number of nations ‘Defence and security showcasing a wide spectrum of o t y t as regional tensions flare up and new through partnership and technology and equipment i l i ab g n threats appear. The need for military and co-operation’ will be providers. A similar display i t i s i v t host security forces around the world to procure an over arching theme of maritime power and n e c s adja halls innovation is being p the platforms, systems and equipment of DSEI 2015. i h s r a w that meet operational and budgetary DSEI has become hibition butor developed for DSEI 2015. x e e h t imperatives is highlighted by the continued a high‑profile platform to contri role SECURITY r o j a growth of Defence & Security Equipment for senior military m e is a International (DSEI), the world’s largest commanders and Security has become ’s uniqu ted I E S D o a t r land, sea and air defence and security leading specialists in firmly established as g e t exhibition. The event, which takes place operations, doctrine and the fourth pillar of DSEI. as an in case of at ExCeL London from 15-18 September procurement to address The 2015 event will see show ce 2015, will feature a record 1,500 exhibitors important audiences. Many focus on critical areas of efen d providing a global showcase of innovation. delegates use their attendance at security, such as biometrics, cyber Reflecting DSEI’s status as a forum for DSEI to hold bilateral and multi‑lateral warfare, CBRN and counter terrorism. international co-operation and thought talks and some choose to share their views There will also be a Security and Special Forces leadership, senior military commanders will more widely, providing valuable insights zone with briefings by leading experts and be sharing their views on how doctrine and into matters of global concern. The 2015 capability demonstrations. Major suppliers capabilities must be shaped to meet the event is being planned as a forum where who will be exhibiting include BAE Systems demands of an uncertain future. The British Army top figures from established and emerging Applied Intelligence, CISCO, Cobham, Fujitsu, will have a prominent presence at the show. nations in the defence community will Lockheed Martin and Smiths Detection. Lt Gen Mark Poffley, Commander Force be invited TO describe how co-operation Rear Admiral Simon Williams, Chairman of Development and Capability said: “Recent ranging from joint operations to strategic DSEI organisers, Clarion Defence and Security, events have highlighted the need for an alliances is transforming the ability to said: “The threats to world order today are integrated and persistent security response counter threats to peace and security. diverse and range from high tech cyber-attack across a wide spectrum of operations. to that posed by the ‘lone wolf’. There has The British Army is reconfiguring to meet LAND, AIR AND SEA never been a greater need for an integrated the challenges of the contemporary security The land systems display at DSEI 2015 will approach to the acquisition and deployment of environment. An important part of this be of record size, with some 700 prime defence and security assets in the land, air and adjustment is establishing a close relationship contractors and small and medium-sized maritime environments - and to the rationale with its industrial partners, seeking out enterprises representing the majority of that guides them. DSEI 2015 will provide a innovative and relevant solutions as part nations with defence and security industries. platform that meets all these imperatives.” L of the Defence Growth Partnership and Exhibiting companies, who will be sited in exploiting mutually beneficial agendas to the expanded Land Zone and around the FURTHER INFORMATION defeat those who threaten our security.” exhibition halls, include BAE Systems, Denel, www.dsei.co.uk
DEFENDING LAND, SEA AND AIR
Issue 11 | DEFENCE BUSINESS MAGAZINE
105
Advertisers Index
THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net
GLOBAL TRAFFIC MONITORING
MEET US ON
STAND J73
Evo8 fully integrated intelligent ANPR camera. Over 1000 units successfully supplied in the UK alone.
CA Traffic have re-written the ANPR rulebook with the launch of EvoX fully integrated ANPR/CCTV camera.
Independently verified to achieve in excess of 98.5% detection and 99% correct reads across multiple lanes.
Go to www.ca-traffic.com for product literature @CA_traffic
+44(0) 1296 333499 enquiries@c-a.co.uk www.ca-traffic.com Conter Terror Half Page.indd 1
ADVERTISERS INDEX
18/02/2015 13:03:21
The publishers accept no responsibility for errors or omissions in this free service Adani 18 Adcam Fabrications 64 APM Group 34 Arinc 16 Avon Barriers Corp 62 Axis Communications UK 54 Bastion Security Products 46 Berla Corporation 88 CA Traffic 60 CEA 10 CEIA 71 Clarion Events 74 Cognitec Systems 60 Cross Match Technologies 22 CRU 30 Dosarrest Internet Security 38 Fibre Technologies 50 Fire Eye 32 Foster + Freeman 86 Frontier Pitts 62 Gardiner Associates Training 84 Garnett Keeler Public 90 Gigamon 36 Green Light 20 Heald 8 Heinan Hopman 92 Helyx SIS 96 Hitek Electronics Materials 66
106
DEFENCE BUSINESS MAGAZINE | Issue 11
Holmatro Rescue Equipment 40 Honeywell Analytics 12 Hunter Cable Assembley 68 Hunter Global Tracking 14 Infranor 44, 45, 72, 73 Intaforensics 82 Marshalls 6 MDL Technologies 70 Millbrook Proving Ground 52, 53 Pacific Scientific 104 Panasonic 94 Powersafe 29 Qioptiq 42, 43 Rangemaster Precision Arms 56 Reed Exhibition 34, 37 Ring Sights Defence 98 Safetell 63 Safety Flex Barriers 28 Scanna MSC 75 Schneider Electric 78, 79 Sensurity IBC Tata Steel 4 Technocover 58 Terma A/S 100 The Mercian Labels Group IFC University College Dublin 80 Westcombe Engineering 76, 77 Zaun 24, 25
www.sensurity.com
Precision Microwave PIDS
Sensurity is dedicated to raising the standards for perimeter intrusion detection systems (PIDS). HALO is a pioneering & patented intelligent security system that offers unparalleled durability. Reducing the cost of installation and ownership. Now also available as a rapid deployment kit for temporary perimeter protection Intelligence Adaptive & dynamic signal processing monitors the environment for true alarm events
Sense One-box dual technology, lower installation costs with fewer nuisense alarms
Integrity Easy integration with market leading control room suites
Durability IP65, vandal and tamper resistant
+44 (0) 2895600708 info@sensurity.com
An Excelitas Technologies Company
Global Presence... ...Far Reaching Capabilities Image intensified sights Thermal sights Fused sights Defence modules Avionic optical displays Tactical infra red Space applications Integrated logistic support
Qioptiq phone: +44 (0)1745 588000 www.qioptiq.com FOR THE LATEST INFORMATION VISIT:
www.qioptiq.com