Counter Terror Business 22

Page 1

www.counterterrorbusiness.com | ISSUE 22

IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

DSEI 2015

SAFE CITIES

SECURITY

TERRORIST RECRUITMENT

CONTROLLING THE INTERNET

Will the Extremism Bill help tackle online enrolment? COUNTER TERRORISM

COUNTERING RADICALISATION With traditional approaches for preventing terrorism failing, is it time to take a new approach?

UK News: antee r ua must g defence m u m mini ding p73 n e p s NCE

ZINE

AGA ESS M

EFE FOR D

USIN THE B

DSEI review 2015 p 7 p7



COUNTER TERROR BUSINESS

Should we reverse the current strategies to counter radicalisation?

www.counterterrorbusiness.com | ISSUE 22

IN THE NEWS: UNITED STATES FREEDOM ACT TO REFORM GOVERNMENT SURVEILLANCE POWERS

DSEI 2015

SAFE CITIES

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURITY

Unfortunately, violent extremism can no longer be considered a rarity. It affects an increasing number of the global population. TERRORIST RECRUITMENT

CONTROLLING THE INTERNET

Will the Extremism Bill help tackle online enrolment? COUNTER TERRORISM

COUNTERING RADICALISATION With traditional approaches for preventing terrorism failing, is it time to take a new approach?

UK News: ntee ara must gu defence um minim ing p73 spend CE

ZINE

FOR DEFEN

ESS MAGA

THE BUSIN

Some would suggest that current approaches to prevent terrorism remain somewhat unsuccessful. University professor and author Hamed El-Said takes the issue back to its roots and argues that reversing current strategies may be a more successful method to countering radicalisation. Read more on page 11.

DSEI view 2015 pre p77

The surge in recruitment to radical groups is a serious concern for the UK which has been emphasised by events earlier this year, where young British citizens travelled to Syria to fight next to and support Islamic State. This particular problem needs action in the fifth domain – the internet. On page 15 Paul Stokes highlights how data analytics can help assist in countering online recruitment. Following January’s terrorist attacks in Paris, the French Capital has witnessed a steep rise in the Global Alerts Dashboard, an online mapping and data portal which categorises locations at extreme risk of terrorist threat. On page 19, Jason McGeown of Verisk Maplecroft analyses global urban centres that are deemed risky and how organisations can enhance risk management capabilities through digital platforms. Will the current Government commit to spend two per cent of GDP on the military? As well as US defence secretary Ashton Carter, the question is being asked by various Tory MPs and former heads of NATO. See Defence News on page 73. Also, the UK’s biggest display of military exhibition takes place at London’s ExCeL Centre on 15-18 September. Check out a sneak preview to the DSEI show on page 77. More to come in our next issue.

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANTS Michael Lyons, Sian Nagle, Tommy Newell PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media

© 2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

3



CONTENTS 11

07 CTB NEWS

New Investigatory Powers Bill, Swedish terror suspect trial collapses, and the Safe Schools Declaration

11 COUNTER TERRORISM

University professor Hamed El-Said shares his thoughts on the issue that traditional approaches to fighting terrorism are not working, and instead argues that countering radicalisation in the first place is a better approach to the problem

15

15 TERRORIST RECRUITMENT Paul Stokes reviews the impact of the Extremism Bill revealed in the Queen’s speech and explains how data analytics can tackle the online recruitment of foreign fighters

19 TERRORIST MAPS

Jason McGeon of global risk analytics Verisk Maplecroft examines the new Global Alerts Dashboard (GAD), in which 64 cities are categorised as in extreme risk

23 INTERNATIONAL AFFAIRS

33

33 SAFE CITIES

Geoff Zeidler, past chair of the British Security Industry Association, discusses the topic of ‘Safe Cities’ and the work that’s currently underway to develop best practice in London

37 PERIMETER SECURITY

Criminals are not afraid of using extreme force or explosives when entering a building or site. Security products that protect such perimeters must meet strict standards urges Stephen Munden

45 IFSEC PREVIEW

The global security industry will gather at the ExCeL in London this June for three days of innovation, expertise and inspiration at IFSEC International 2015

55 EMERGENCY SERVICES

With over 400 exhibitors and over 5,500 visitors attending this event, the Emergency Services Show is one of the key events for anyone involved in emergency planning, response or recovery

With oil and gas prospects in East Africa flourishing, the region’s potential security risks can be seen as a barrier to international business. Tony Stead argues that with the appropriate risk scoping and planning, conducting business in East Africa can be viable and profitable

59 SECURITY THREATS

27 CYBER SECURITY

65 FORENSICS

Professor Mike Jackson, IT and cyber security expert at Birmingham City University’s Business School, examines the proposed ‘Investigatory Powers Bill’ and asks what this means for public privacy

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Security Institute’s David Thorp examines the modern day’s evolving security threats and how the security profession’s relationship with the public can be affected Forensics Europe Expo on 21-22 April hosted a conference programme in collaboration with the Chartered Society of Forensic Sciences, showcasing for all those involved in the forensic sector

37 59

75

THE

INES

SM AGA Z

INE

73 DEFENCE NEWS

MOD invests £80 million in helicopter training equipment; UK involvement in Allied Shield Baltic exercises

77 DSEI 2015

‘Defence and security through partnership and co-operation’ is the theme for the world’s largest land, sea and air

Counter Terror Business

BUS

FOR

DEF

ENC

defence ISS Turn t UE 12 and security for th o page 7 exhibition e la 3 for trade businetest defenc professionals e and fess news and military a t ures experts from around the world, which takes place at ExCeL London from 15-18 September 2015

www.counterterrorbusiness.com Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

5

E


Control your comfort

OUTSIDE 35 C HUMIDITY 90%

22

ยบC

Inside

PROVIDED BY HEINEN & HOPMAN

As an international leader in our own field of air conditioning and heating, Heinen & Hopman is used to working with yards around the world. At the same time, our global network of local subsidiaries and aftersales centres make us an ideal partner for navy vessels that criss-cross the oceans.

www.heinenhopman.com Follow us on:

We also understand the stringent operational requirements of such vessels and the need for innovative design. The result is a suberb interior environment and optimum support wherever the corvettes may sail. www.greenmanifest.info


ANTI-TERROR LEGISLATION

Investigatory Powers Bill under scrutiny as Liberty goes to High Court The Investigatory Powers Bill was announced in the Queen’s Speech on 27 May, which plans to modernise the law on tracking communications data. Under the proposed bill, police and intelligence agencies will have more wide ranging capabilities to monitor online and social media use, as well as more powers for the bulk interception of communications. Security and intelligence agencies are concerned that encryption facilities around many online communications are now so advanced that they cannot intercept messages. Under the new bill, messaging services such as WhatsApp and Snapchat will be required to release information relating to suspects under investigation. The Home Office says the Investigatory Powers Bill will “better equip law enforcement and intelligence agencies to meet their key operational requirements, and address the gap in these agencies’ ability to build intelligence and evidence where subjects of interest, suspects and vulnerable people have communicated online.” A similar bill, named the “snooper’s charter” by critics, was previously blocked by former coalition partners the Liberal Democrats. The new legislation faces the same criticism, with former Deputy Prime Minister Nick Clegg speaking out against it. Clegg has warned British Citizens that their fundamental rights will be threatened by the bill, which he describes as “a turbo-charged snooper’s charter”. Ministers promise to provide for “appropriate oversight arrangements and safeguards”, but there is no immediate detail on how the complex web of intelligence and surveillance commissioners and parliamentary oversight might be strengthened. Meanwhile, human rights movement Liberty, along with Conservative MP David Davis and Labour’s Tom Watson, are using the Human Rights Act to challenge the Data

Retention and Investigatory Powers Act (DRIPA) 2014, which allows the Home Secretary to order communications companies to retain all communications data for 12 months. No link with the prevention or detection of serious crime is required. It catches the communications of everyone in the UK including the emails, calls, texts and web activity of MPs, journalists, lawyers, doctors and other communications that may be confidential or privileged. Liberty is arguing that DRIPA is incompatible with the Human Rights Act – in particular Article 8 of the European Convention on Human Rights, the right to respect for private and family life – as well as with Articles 7 and 8 of the EU Charter of Fundamental Rights, respect for private and family life and protection of personal data. Tom Watson, MP for West Bromwich East, said: “The government’s decision to use emergency powers to enable it to spy on citizens shows the rights of the individual need to be strengthened to ensure the state can’t act with impunity. Even MPs are powerless to prevent such powers being enacted. “The Human Rights Act allows us to challenge those powers in the courts but the Tory government is intent on tearing up the Act and doing away with the limited legal protection it affords. It is vital that we fight for it to be retained.” Liberty says it does not dispute the role of communications data in solving and preventing crime, but does not believe that justifies the costly and lengthy mass retention of records of those who are not involved in such investigations. Liberty is calling for prior judicial authorisation and a requirement that data is only retained as part of investigations into serious crime and to prevent death and injury. The powers within Section 1 of DRIP are described as READ MORE: ‘extraordinarily tinyurl.com/nrwagtl wide.’

DIPLOMACY

Blairs gives up on Middle East role Former PM Tony Blair has resigned his position as Middle East peace envoy - a position he took almost immediately after leaving Downing Street in 2007 and has held for nearly eight years. Blair’s role was as a special representative for the UN, US, EU and Russia in Middle East peace talks. His performance in the role had been criticised and his resignation comes at a time when hopes of negotiations between Israel and the Palestinians are at an all time low. Blair, 64, is now set to become the chairman of an organisation that will attempt to combat anti-semitism and racism in Europe.

The former Prime Minister will join the European Council on Tolerance and Reconciliation, which has campaigned for tougher laws on extremism. Chris Doyle, director of the Council for Arab-British Understanding described Blair’s resignation READ MORE: as “long tinyurl.com/q97zemu overdue”.

USA Freedom Act to reform government surveillance powers

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

After a lapse in US surveillance powers on Monday 1 June, US congress have passed the USA Freedom Act, reinstating surveillance powers for US intelligence agencies, but with reforms limiting the government’s bulk collection of data. The USA Freedom Act will replace the USA Patriot Act, a national security policy that was put in place following the events of 11 September, 2001, and is the first major overhaul of government surveillance policy since the widespread collection of data was exposed by whistleblower Edward Snowden in 2013. The bill passed on a 67-32 vote, and will bring an end to the bulk collection of American’s phone records. Now records must be held by telecommunications companies, not on government servers, and can only be released with a court order for specific information. There will be a six month transition period where data storage will be moved from government servers to those of private companies. Some key parts of the USA Patriot Act have been retained in the new bill, including the monitoring of ‘lone wolf’ suspects not linked to known terror groups and the ability to monitor travel and business records of individuals. The passing of the bill comes after the USA Patriot Act expired at 12:01 on 1 June, when senate failed to reach a majority vote on an extension, effectively stopping all government surveillance powers. Republican presidential candidate Rand Paul vocally condemned the bulk collection of data and threw up procedural road blocks to prevent an extension of the USA Patriot Act before it expired on 1 June. He said: ”We are not collecting the information of spies. We are not collecting the information of terrorists. We are collecting all American citizens’ records all of the time… This is what we fought the revolution over.” Republican Senate Leader Mitch Connell, who has backed Paul’s presidential campaign, led the opposition to the Freedom Act, not wanting to place any restrictions on US surveillance powers. President Obama signed the bill into law shortly after the majority vote on Tuesday 2 June. In statement he said he was “gratified that Congress has finally moved forward with this sensible reform legislation’. READ MORE: tinyurl.com/nef5n95

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

7


New! Ultralightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance) Watch the video:

Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com


CYBER SECURITY

Cyber security breaches for businesses on the increase The Information Security Breaches Survey 2015, published by Digital Economy Minister Ed Vaizey on 2 June, shows the scale and cost of security breaches for business has nearly doubled. The average cost for big business now starts at £1.45 million, up from £600,000 in 2014, while an online security breach for a small or medium sized business can now reach as high as £310,800, up from £115,000 in 2014. The research also found that nearly nine out of ten large organisations surveyed suffered some form of security breach and despite an increase in staff awareness training, people are still just as likely to cause a security breach as a virus or malicious software. Additionally, the survey showed a drop in organisations who increased their information security spending, with fewer expecting to increase spending in the future. These findings have prompted the government to urge businesses to take action against the cost of cyber security breaches. Ed Vaizey said: “The UK’s digital economy is strong and growing, which is why British businesses remain an attractive target for cyber-attack and the cost is

rising dramatically. Businesses that take this threat seriously are not only protecting themselves and their customers’ data but securing a competitive advantage. “I would urge businesses of all sizes to make use of the help and guidance available from government and take up the Cyber READ MORE: Essentials tinyurl.com/prcjxbw Scheme.”

Safe Schools Declaration aims to stop terror attack on schools

More than 30 countries have signed up for the Safe Schools Declaration, which aims to stop war and terror attacks deliberately targeting schools and educational facilities. The Global Coalition to Protect Eduction from Attack (GCPEA) held a conference on 29 May in Oslo, Norway, during which over 30 countries signed up to the declaration, which pledges to adopt “The Guidelines for Protecting Schools and Universities from Military Use during Armed Conflict”. Countries who have signed the declaration want to protect both students and teachers from deliberate attacks and establish protected status for school buildings, so they cannot be used as barracks or for any other military purposes. The declaration comes after attacks on a school in Peshawar Pakistan last December, where 132 students and nine teachers died. The GCPEA also report that schools in at least 70 countries have been attacked between 2009 and 2014. READ MORE: tinyurl.com/of6nqp7

COUNTER-TERRORISM

Terror-related arrests at all time high In 2014, terror-related arrests in England, Wales and Scotland reached record levels with 338 people recorded as having been held, Scotland Yard has reported. Metropolitan Police assistant commissioner Mark Rowley has said that more than half of those arrests held connections with terrorism in Syria, with police estimating that over 700 potential terror suspects are thought to have travelled to Syria. Rowley also suggested that nearly half of those are now back in the UK. The number of terror-related arrests was up from 2013/2014 where there was 254 arrests, which equates to an increase of about a third. It is believed that more than 100 people are awaiting trial for terrorism-related charges. Police have stated concerns of ‘an emerging trend’, as from last years arrests, 56 were related to suspects under the age 20.

These arrests were the results of offences ranging from fundraising for extremist causes to plotting terrorist attacks. Rowley said: “There is no doubt of the horrific nature of the offences being committed overseas. The influence of those who wish to bring similar violence to the streets of the UK has been an increasing threat here.” Prime Minister David Cameron recently said that he planned new legislation to tackle the spread of extremist views, saying it was designed mainly to confront “head-on the poisonous Islamist extremist ideology”. The United Nations estimates that more than 25,000 foreign fighters, from 100 different nations, have READ MORE: joined militant tinyurl.com/ljkugoc groups in Syria.

LEGAL

Gildo cleared after government refuses to disclose operational details

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Swedish terror suspect Bherlin Gildo, 37, has been formerly cleared after his lawyers argued British intelligence agencies were supporting the same Syrian opposition groups he was. Gildo was accused of attending a terrorist training camp and receiving weapons training in 2012 and 2013, as well as possessing information likely to be useful to a terrorist. He was arrested at Heathrow airport under Schedule 7 of the 2000 Terrorism Act when was travelling from Copenhagen to Manilla to meet his wife. The trial collapsed at the Old Bailey after the government refused to disclose sensitive information. Gildo’s lawyers argued that British intelligence agencies were supporting the same Syrian opposition as Gildo from 2012-13. They also claimed the agencies were party to a secret operation providing weapons to Syrian groups, including the Free Syrian Army. After the collapse of the case, Gildo’s solicitor Gareth Pierce said:“There is a fair amount of documentation that arms were being taken out of Libya via Qatar and Turkey and trucked through into Syria to the resistance and the same from Croatia and taken through Jordan. “Given that there is a reasonable basis for believing that the British were themselves involved in the supply of arms, it would be an utter hypocrisy to prosecute someone who has been involved in the armed resistance.” The prosecutor said the decision to drop charges in the case had no bearing on other READ MORE: Syria‑related tinyurl.com/qyo3g8g trials in the UK.

China counter terror laws cause international alarm

Chinese draft laws on security, counter‑terrorism and non-governmental organisations have moved implementation this week constituted a further and more serious threat to freedom of religion and expression and deepens repression in an already restrictive political climate, International Campaign For Tibet has said. The new measures, which have caused alarm in the international community, broaden the reach of the Party state still further, contracting the space for civil society, according to the pro-Tibet campaign group. Together with the National Security Law that is expected to be implemented this year, the proposed counter-terror law outlines a counter-terrorism structure with vast discretionary powers. READ MORE: tinyurl.com/nehcsp7

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

9



FROM COUNTERING TO PREVENTING TERRORISM

Written by Hamed El-Said

DE-RADICALISATION

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

University professor and author Hamed El-Said shares his thoughts on why traditional approaches to fighting terrorism are not working, arguing that countering radicalisation in the first place is a better approach to the problem Violent extremism, otherwise known as terrorism, is no longer a rarity. According to a recent report by the Institute for Peace and Economics, the number of countries that have not suffered from a terrorist attack has declined from 111 countries in 2004 to only 75 in 2014. While the severity, extent and motivations behind such attacks often vary, there is no question that terrorism has become ‘a global phenomenon’ affecting most of the world’s societies. Not only societies, but also businesses are, and have been affected directly and indirectly by terrorism. The 9/11 attacks, for example, have cost more than $5 billion in terms of losses related to direct physical damages, supply chain disruptions, and interruptions to the international airline industry and tourism. A new study of 18 Western European countries reveals that each additional transnational terrorist attack has reduced their economic growth by 0.4

per cent point a year. The World Bank in its 2011 World Development Report went further to acknowledge that terrorist “attacks in one region can impose costs all through global markets.” The disruption of Libyan oil supply following the beginning of the uprising in that country in 2011, when international oil prices jumped by 15 per cent overnight, is a good example. The same World Bank Report adds that today’s businesses regard terrorism as a major challenge to their operations in the areas where they function, and that attempts to contain it have become more unpredictable, ‘extremely costly’ though necessary for the profitability and survival of the firm.

The ‘war on s a terror’ hnt on lia been re military a hard‑ hat focuses ht approace symptoms on th nores the and ig e itself diseas

FAILED EFFORTS TO COUNTER TERRORISM These facts and statistics are alarming, given that we spent more than 15 years of relentless efforts to counter terrorism. There is a consensus across the board that

policies and approaches have not only failed to prevent or even undermine terrorism, but they have instead aggravated the phenomenon and made the problem worse. This consensus has recently been summed-up by the United Nations Secretary General, Ban Ki-Moon, while addressing the Institute of D’E’tudes Politiques DE Paris on April 29, 2015, when he stated that today, “violent extremism is a growing and global threat.” WAR ON TERROR The failure lies in our misconceived strategy employed after and since the 9/11 attacks. Known as the ‘war on terror’, this strategy has been overwhelmingly reliant on a hard‑military approach that focuses on the symptoms and ignores the disease itself. As the anthropologist Scott Atran recently told the UN Security Council’s Ministerial Debate on ‘The Role of Youth in Countering Violent Extremism and Promoting Peace’: “Unless we understand these powerful cultural forces that radicalise the youth into violent extremism, we will fail to address the threat. When, as now, the focus is on military solutions and police interdiction, matters have already gone way too far. If that focus remains, we lose the coming generation.” E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

11



DE-RADICALISATION  The ‘war on terror’ approach has had another indirect but not less damaging implications. Sweeping definitions of terrorism have invariably justified violations of long established international norms, human rights, and freedom of expression in the name of security. As Mr. Ban Ki-moon warned during a summit hosted by the United States on countering violent extremism last February in Washington D.C: “Governments should not use the fight against terrorism and extremism as a pretext to attack one’s critics.” In many parts of the world, legitimate actions of opposition groups, including civil society organisations and human rights defenders have been criminalised in the name of ‘countering terrorism.’ Through such actions we have provided violent extremists seeking to recruit youth into their violent organisations with the very ammunition they need. This goes along way towards explaining the migration of more than 25,000 foreign fighters from more than 100 countries around the world to join the Islamic State or ISIL since the beginning of the upheavals in the Arab World war in early 2011. At least 6,000 of those foreign fighters come from Western Europe, where the motivation for joining such a terrorist group remains little understood. REVERSING CURRENT STRATEGIES There is a need to reverse our current strategies if we are to win the fight against terrorism. First and for most, there is a need to restore trust, legitimacy, respect for international law and human rights, freedom of expression, and, above all, the promotion

About the author Individuals do not join violent extremism because they are nihilists: lack of opportunities, decent jobs, high quality education, combined with the presence of oppression, corruption, injustices and little regard for human dignity breed radicalisation and extremism that lead to terrorism. Turkey provides important lessons here. In addition to billions of dollars, the pursuit of a purely military approach to the Kurdish problem cost Turkey more than 35,000 innocent lives in the 1990s alone. That is an average of 3,500 fatalities every year. The realisation that terrorism was a ‘Turkish problem’ not simply a Kurdish one, led to the introduction of a comprehensive and successful economic reform programme that reduced poverty and inequalities, created decent jobs, and improved the living standards of all Turkish citizens in all regions. This was accompanied by a ‘democratisation process’ that protected civil society, prevented torture inside and outside prison walls, and made human rights integrity a constitutional right, not a privilege. The upshot has been the diminishing of a terrorism threat to levels that no longer occupies the daily lives of the average citizen. UNDERSTANDING YOUTH 45 per cent of the world population is youth, the very same group most targeted by violent organisations. In some Muslim majority states, this ratio exceeds 65 per cent. Youth need not be seen as a threat. They possess energy and ideas, they are increasingly networked,

Only United Nations Member States can ensure the implementation of the Secretary General’s new Action Plan to ‘prevent violet extremism’, which will send a clear message that not only is terrorism unacceptable in all its manifestation; but that they are also genuinely taking practical steps to prevent and combat it of good governance. Mr. Ban Ki-moon was right when he stated: “Military operations are crucial to confront real threats. But bullets are not the ‘silver bullet.’ Missiles may kill terrorists, but good governance kills terrorism. We must remember that.” We need to understand better the conditions that conduce individuals to radicalise to a point of committing or attempting to commit terrorism. Continuing to ramp up security measures in response to terror threats misses the point. It might prevent an attack or two. It might also stop and detain an individual from joining a terrorist organisation abroad. However, this does little to explain why individuals radicalise in the first place.

and are a source of important solutions. They are the future engine of change. As Professor Atran advised the Security Council last month, there is a need to provide the youth with programmes that offer them something that makes them dream of a life of significance, a positive and achievable personal dream, and the chance to create their own local initiatives. Engagement with community and its key members is a powerful instrument in building a society that is resilient to violent extremist ideologies, aware of its dangers and risks, and capable of building and maintaining bonds and trustful relationships. Programmes that promote community engagement and

Hamed El-Said is a Chair and Professor of International Business and International Political Economy at the Manchester Metropolitan University.

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

He is the author of New Approaches to Countering Terrorism. He is also an advisor to the United Nations Counter Terrorism Implementation Task Force (UNCTITF). All opinions however expressed in this article reflect those of the author’s alone.

participation, debates and discussion of all sorts of problems must be encouraged. Communities must also be empowered to find solutions for their problems, including problems related to violent extremism. THE PRIVATE SECTOR’S ROLE Finally, there is an important role for the private sector in reducing violent extremism and risks associated with it. This can take the shape of direct action (lobbying governments to improve human rights and reduce corruption) or indirectly (through creating jobs and supporting domestic small‑size firms). They can also operate alone or with other stakeholders to achieve these objectives. In short, what is needed is a move away from our current reactionary approach that relies on countering to preventing violent extremism. These elements of this “new” prevention strategy are already being debated seriously inside the United Nations. Mr Ban Ki-moon himself publicly declared that he is in the process of developing “a comprehensive Plan of Action to Prevent Violent Extremism that will seek to engage and empower youth.” Some of the elements of this plan have already been discussed here. They include the protection of human rights and civil liberties, reducing corruption, promoting good governance and fostering a culture of peace by deploying “weapons of mass instruction instead of weapons of mass destruction.” Only Member States however can ensure the implementation of the Secretary General’s new Action Plan, which will send a clear message that not only is terrorism unacceptable in all its manifestation; but that they are also genuinely taking practical steps to prevent and combat it. L

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

13


INNOVATION WITHOUT COMPROMISE

T800

Fully Rugged Tablet

Where’s your office? ©MOD/Cpl David Rose

Contact us:

Visit us @ STAND

Getac UK Ltd Mitac House, Nedge Hill, Telford, TF3 3AH, UK E: Sales-Getac-UK@getac.com T: +44 (0)1952 207200

S9 207

www.getac.com


DATA ANALYTICS

FIGHTING CRIME IN THE ‘FIFTH DOMAIN’

New powers to control ‘the fifth domain’ – the internet – and its associated online communities, are being proposed in the UK. The other core domains – air, sea, land and space – are all closely regulated because of the impact they have on our lives. The internet has no such controls and has become a hunting ground for extremists as they seek to exploit the vulnerable and entice them to train in terrorist activities. Now, the government is exercising its newly elected unilateral power and pushing ahead with the Extremism Bill, which would give heightened strength to the police in criminal

Written by Paul Stokes

Paul Stokes reviews the impact of the Extremism Bill revealed in the Queen’s speech and explains how data analytics can tackle the online recruitment of foreign fighters

Terrorist Recruitment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The s wer new po ow the ll would a examine o police t onversions online cforms such on plat itter and as Tw book Face

investigations and oblige social networks to supply detailed, traceable activity logs for anyone suspected of acting outside the law. TACKLING RADICALISATION The Bill was outlined in the Queen’s Speech to Parliament on 27 May and reintroduced plans to tackle radicalisation and the rapid spread of terrorist recruitment. The purpose, the government says, is to “unite our country and keep you and your family safe by tackling all forms of extremism and to

combat groups and individuals who reject our values and promote messages of hate.” If the proposals become law, the police will be able to obtain court orders for public telecommunications providers to release internet search records and other communications data on demand. These powers would allow the police to examine the online conversations of suspected extremists on platforms such as Twitter and Facebook. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

15


w.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 23-24 September 2015 | www.emergencyuk.com | NEC | Birmingham | 2

Where collaboration meets innovation

A unique event for anyone who works in the emergency services Come along to the Show on 23rd and 24th September at the NEC, Birmingham to: • See and handle the latest equipment, kit, vehicles and technology • Receive training in the latest rescue and lifesaving techniques • Network with other blue light services and rescue organisations • Gain a deeper understanding of the support available from voluntary sector partners Register for free entry today at www.emergencyuk.com

IF YOU HELP OTHERS IN AN EMERGENCY YOU SHOULD BE AT THE EMERGENCY SERVICES SHOW Thanks to our Show supporters


DATA ANALYTICS  REACHING OUT The government has been rightly concerned about the increasing radicalisation of young people and the ease and speed at which terrorists are infiltrating ordinary communities to exploit vulnerable people. Alarmingly, those choosing to become foreign fighters are not part of organised criminal gangs; thanks to social media, terrorist groups now reach ordinary individuals everywhere. Social networks have created a multi‑billion‑dollar industry and allowed us to share experiences much more widely than previous generations. But they can have a dark side. The platforms have long been misused by bullies and child abusers but they are also now being employed very successfully by media savvy extremists. Potential recruits are aggressively targeted, particularly people with “violent backgrounds, the very young and those with mental health issues,” the Metropolitan Police Service has said. Jihadis are thought to be sending up to 100,000 Twitter messages a day to plot terrorism. With no single controlling authority and no rule book, social media is the new Wild West. The reach and radicalisation by ISIS is growing not just in the UK but across the globe – in fact, the total number of foreign fighters inside Syria and Iraq has now exceeded 20,000. The Islamic States is employing expert use of social media to recruit and radicalise youth from around the world creating a new generation of digital native extremists. A CHANGE IN MINDSET Modern, cyber warfare requires a change in mindset and legal toolkit as we see a swing from traditional, ground-based crime to the online environment. It’s been a rapid shift and needs an equally rapid reaction from governments. Fortunately, an increasing number are starting to recognise that the internet has become that ‘fifth domain’ and that, while clearly doing much good, it needs boundaries. The Extremism Bill offers a controlled approach and not a universal “right to know” for the police, which should provide some reassurance of its limitations in terms of surveillance while allowing police greater access to the data that will illuminate genuinely at-risk areas. THE LAW Law enforcement agencies need to be able to access online communications to prevent those exploiting social media to recruit and radicalise youth. Monitoring suspicious behaviour does of course itself need to be done with clear guidance and strict legal oversight but it does still need to be possible. The new law would require internet service providers to keep a detailed, traceable log of individual activity in case it is requested in an investigation. However, without the resources to analyse such vast amounts of data,

Terrorist Recruitment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The government is exercising its newly-elected unilateral power and pushing ahead with the Extremism Bill, which would give heightened strength to the police in criminal investigations and oblige social networks to supply detailed, traceable activity logs for anyone suspected of acting outside the law investigators could struggle to see a change. The volume and variety of data long ago reached such complexity and scale that only technology can truly handle it and maximise its value. In fact, law enforcement and intelligence operations are, increasingly, a data analytics challenge. There is so much data from so many sources that it takes some seriously clever algorithms to spot the links between seemingly unconnected pieces of data or detect anomalous relationships. New advances in crime analytics can connect different data types and uncover people, entities, patterns, locations and relationships of interest. In addition, it can scrutinise unstructured data like text documents and social media posts, recognising words and phrases as ‘entities’ that can be analysed and linked automatically.

that target the vulnerable but moreover, assists in discounting individuals who are not persons of interest. Working from known extremists out to a wider network, agencies can ensure they do not breach the privacy or civil liberties of citizens who are connected but not a threat or at risk. Extremist groups use increasingly sophisticated technology means to support their activities. Governments and law enforcement agencies must constantly upgrade their own technical capability to meet this challenge. With the right technological support, the new legislation will enable law enforcement agencies to access the right information at the right time with reliable results. Information that could protect a child, save lives or defend a border. L

CRIME ANALYTICS The latest crime analytics techniques such as link analysis, social network analysis and anomaly detection can help focus investigators’ attention on the right persons early on. This is critical in identifying at-risk young people before they leave home to train to fight. Analytics software helps law enforcement agents disrupt recruitment networks

Paul Stokes is COO of Wynyard Group, a market leader in serious crime fighting software used globally by intelligence, investigations and information security operations in justice and law enforcement, national security, financial services and critical national infrastructure. FURTHER INFORMATION tinyurl.com/otovdgl

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

17


LIMITED VISIBILITY IS AS GOOD AS NO VISIBILITY If you can’t see everything that’s happening on your network, you can never be completely confident you’re not already under attack. To truly protect your network, the ability to see into even its darkest corners is vital – Gigamon’s Unified Visibility Fabric™ delivers 100% visibility and security solutions that scale to handle any threats to your critical data, now and into the future.

Gigamon’s network security solutions put the power back in your hands.

TEL: 01344 859 870

www.gigamon.com/security

LOOK CLOSER. GO FURTHER.


RISK ANALYTICS

Written by Jason McGeon, Head of Communications, Verisk Maplecroft

The new Global Alerts Dashboard categorises 64 cities at ‘extreme risk’ to terrorist attacks

Terrorist Maps

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RISK ANALYTICS

A MECHANISM FOR MONITORING GLOBAL TERROR

the ranking. Over this period, the country’s capital, Baghdad, suffered 380 terrorist attacks resulting in 1,141 deaths and 3,654 wounded, making it the world’s highest risk urban centre, followed by Mosul, Al Ramadi, Ba’qubah, Kirkuk and Al Hillah. Outside of Iraq, other capital cities rated extreme risk include Kabul, Afghanistan (13th in the most at risk ranking), Mogadishu, Somalia (14th), Sana’a, Yemen (19th) and Tripoli, Libya (48th). However, with investment limited in conflict and post-conflict locations, it is the risk posed by terrorism in the primary cities of strategic economies, such as Egypt, Israel, Kenya, Nigeria and Pakistan that has the potential to threaten business and supply chain continuity. Principal Analyst at Verisk Maplecroft, Charlotte Ingham, said: “An estimated 80 per cent of global GDP is generated from cities. Visibility of the sub‑national differences in terrorism levels should be an imperative for multinational organisations looking to E

New research assesses 1,300 of the world’s commercial hubs and urban centres and reveals that terrorist attacks pose an ‘extreme risk’ to businesses in the capital cities of 12 countries. Jason McGeon of global risk analytics Verisk Maplecroft examines the new Global Alerts Dashboard (GAD), in which 64 cities are Paris categorised as in extreme risk

According to new research released by Verisk Maplecroft, which assesses 1,300 of the world’s most important commercial hubs and urban centres, terrorist attacks pose an ‘extreme risk’ to populations and businesses in the capital cities of 12 countries, including the strategic markets of Egypt, Israel, Kenya, Nigeria and Pakistan. In Verisk Maplecroft’s new Global Alerts Dashboard (GAD), 64 cities are categorised as in extreme risk. GAD is an online mapping

and data portal that logs and analyses every reported terrorism incident down to levels of 100m² worldwide. Based on the intensity and frequency of attacks in the 12 months following February 2014, combined with the number and severity of incidents in the previous five years, six cities in Iraq top

has nced experie steepest the one of the ranking, rises in g the severity n reflecti he terrorist ry of t n Janua i k c a t t a 2015

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

19


ONE UNIFIED DEFENSE AGAINST CYBER ATTACKERS Today’s cyber attacks are targeted, sophisticated and focused on acquiring your most sensitive information. They also go undetected by traditional security technology. Organizations need to reimagine security and adopt a Continuous Threat Protection model. This means having the ability to detect threats in real-time and reduce time to respond, thereby preventing or minimizing business impact. The FireEye Platform provides a multi-faceted approach to security – detect, prevent, analyze, respond. DETECT Signature-less and multi-flow virtual machine based approach that leverages superior threat intelligence

PREVENT Multi-vector inline known and unknown threat prevention

ANALYZE Containment, forensics investigation and kill chain reconstruction

RESPOND Remediation support and threat intelligence to recover and improve risk posture

www.FireEye.com © 2015 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names may be trademarks or service marks of their respective owners.


RISK ANALYTICS  understand and price the risks to assets, employees and supply chains.”

latter of which has moved from ‘medium’ to ‘high risk’ over the last quarter.

ISLAMIC INSURGENCIES IN AFRICA As Africa’s largest economy, Nigeria’s role as a commercial hub is central to economic growth across the region. However, due to the activities of Islamist group Boko Haram and a surge in violence in the lead up to the March election, 13 out of the 24 Nigerian cities included in the assessment experienced a significant increase in the intensity and frequency of terrorist attacks compared to the previous quarter. The risk level in Abuja (18th), Nigeria’s capital, has remained consistent, but it is rated among the top two per cent of GAD’s most at risk cities. Over the reporting period, Abuja suffered four attacks which resulted in 117 deaths. While Boko Haram will remain the dominant terrorist threat in Nigeria, Verisk Maplecroft believes there is a possibility of hostilities resuming in the Niger Delta following the election of Mohammed Buhari. The amnesty protecting members of the militant group Movement for the Emancipation of the Niger Delta (MEND) is due to lapse and without successful negotiations this could mean disruption to the country’s vital oil industry, in addition to attacks on key cities in the south east of the country. The only other sub-Saharan capital to appear in the ‘extreme risk’ category is Nairobi (57th), East Africa’s prime commercial centre, which has witnessed an upsurge in attacks by Islamist militant group al Shabaab. Over the reporting period 184 people have been killed or wounded in Nairobi in six separate attacks. The impact of terrorism on the country’s main commercial hubs of Nairobi and Mombasa (82nd) has been particularly harmful to investor confidence. In addition, the tourist trade has declined by 7.4 per cent costing the country an estimated US $73m. PARIS ATTACK REFLECTS RISK According to Verisk Maplecroft, Paris (97th and ‘high risk’) has experienced one of the steepest rises in the ranking, reflecting the severity of the terrorist attack in January 2015 that left 17 people dead. The risk level in Paris is representative of a wider trend for Western countries, including Belgium, Canada and Australia, where the level of risk in key urban centres is substantially higher than elsewhere in the country, in part due to the significant PR value attached to such high profile targets by militant Islamist groups. This contrasts sharply with a number of developing economies, including Nigeria, Thailand, Philippines, Colombia and India, where the risk of terrorist attacks is highest in rural areas. This also remains the case in Egypt where large-scale attacks remain focused in the Sinai Peninsula. However, the data reflects increased risks in the country’s two main commercial centres, Cairo (45th and ‘extreme risk’) and Alexandria (76th and ‘high risk’), the

ALEXANDRIA CASE STUDY An increase in the frequency and intensity of terrorism incidents in Alexandria has seen the city’s score plunge from ‘medium risk’ in Q1 2015, to ‘high risk’ in Q2 2015. This sudden and sharp increase in risk creates a significant challenge for international investors in Egypt’s second city and major trade hub. Understanding the drivers of this acute increase in risk is critical for businesses to make informed decisions about protecting their people, assets and supply chains. Analysis of the risk at both the country and individual city level can help businesses make strategic investment decisions, while more granular event based data can give greater clarity when making operational decisions. Using the interactive GAD, clients can find information about the risks facing their operations down to street level and create powerful analytics and visualisations to facilitate risk mitigation. A geo-spatial investigation of the 12 month 2015 Q1 time frame and the 12 month 2015 Q2 time frame for Alexandria shows a significant increase in the number of attacks from two - 30 respectively and an increase in the number of casualties from nine – 40.

Terrorist Maps

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Muslim Brotherhood affiliated groups which have historically targeted police forces in isolation are branching out and targeting commercial interests to put more pressure on the government. The acceptance of civilian casualties is a by-product of this shift in modus operandi and could signal the start of a more turbulent period for Alexandria. The sharp rise in terrorism risk in Alexandria between the Q1 and Q2 city scores is driven by an increase in incidents and casualties across the city. What this simple assessment masks however is the apparent change in tactics for terrorist groups. For businesses operating in the city, historically keeping away from areas of protest would likely have limited their exposure to physical risk as much of the terrorist violence was directed against tools of the state. The shift now to targeting commercial enterprises and civilian infrastructure makes managing terrorism risks more complex. AN INTEGRATED SECURITY SOLUTION Powered by eight years of data, the web based platform provides organisations with an instant, cost effective solution that will aid strategic decision making over current investments, supply chain continuity, market entry or risk pricing. The dashboard is an

The dashboard enables multinational companies to pinpoint current threats, identify emerging trends and monitor risks, giving them the insight they need to make risk-adjusted decisions across the entire operational and supply chain universe A more detailed analysis of the data reveals a sharp rise in the number of terrorist incidents from January 2015. The rise in attacks follows a national trend in attacks around the anniversary of the January uprising against Hosni Mubarak. Investigating past this point reveals an upward trend in the number of casualties in the Q2 reporting period which continues to a spike in March 2015. The fact the spike in casualties does not correspond to the peak in attacks indicates a change in terror tactics during the time frame. Nearly two thirds of all attacks in January targeted police forces, however, this fell to 40 per cent in March 2015, while the proportion of attacks on civilians rose to 60 per cent. The shift towards ‘softer’ civilian targets in March included an IED attack on a supermarket, three banks, a telecoms business and a fire station. The data therefore reveals two separate attack patterns: one cluster of attacks against police forces around the anniversary of the 2011 uprising, and a separate group of attacks against commercial enterprises with civilian casualties from February to March. There is the potential that

operational solution that pinpoints, tracks and alerts disruptions, such as natural hazards, corporate security threats, terrorism and piracy, as well as pressures to corporate reputation from complicity in human rights abuses. It features up-to-date analytics on emerging security developments and historic trends at the global, national and sub-national level. These trends shape the security of businesses’ day-to-day operating environment. Activate filters within the tool to define the type of data or analysis needed per site and the frequency you would like to receive qualified alerts. It also enhances risk management capabilities by integrating corporate information with global security data, which is collated, verified and categorised by a team of experts. Risk outputs can be viewed by live data feeds, email alerts, spreadsheet, online scorecards, risk matrices for issues and individual incidents. It is augmented by high performance mapping technology, which offers compelling visualisations down to street level. L FURTHER INFORMATION www.maplecroft.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

21


YOUR FOCUS. OUR RING SIGHT. BOTH PERFECT.

Ring Sights has been in the business of design and manufacture of the finest quality optical equipment since 1976. Nearly forty years on and with highly skilled leadership, dedicated teams of

expert staff and a massive amount of investment, the company now offers state of the art production facilities and are the world leaders in research, design and manufacture of unit power sights for the military.

Ring Sights Defence Group Ltd +44 (0)8700 422260 info@ringsights.com www.ringsights.com


GLOBAL SECURITY

EAST AFRICA: KNOWING THE RISKS AND OPPORTUNITIES

The development of 3D seismic exploration capability combined with ever advancing engineering technology brings gas finds and oil prospects in the East Africa footprint of Uganda, Kenya, Tanzania and Mozambique, in excess of those found in Qatar. Key players from the world’s energy sector are positioning to assist respective nations to realise, refine and market their natural resource, bringing global experience gained from the challenging technical and physical environments of the North Sea, Brazil and Kazakhstan, where such challenges have proven to be fertile learning platforms for the engineering community. POTENTIAL RISKS Africa is a large, diverse and formidable continent consisting of 54 countries. The region is often considered volatile due to a range of factors including tribal, political, health, geographic, migration and environmental.

Discoveries of mineral wealth – oil, diamonds and water – have been sighted burdens rather than assets, are often identified as the root cause of historical conflicts. There are many risks to operational security. Recent events in Africa highlight loss of life and hostility by ongoing Boko Harem activity in Nigeria, the In Amenas terrorist attack in Algeria (2013) by Al Qaeda (AQ) linked terrorists and the Westgate attack in Kenya (2013) by Al Shabaab. 2015 has seen further Al Shabaab atrocities, one killing over 140 students in Kenya. Stability and security across Africa is often presented as unsafe or as a reason which prohibits international operations. But

to put this in context, the UK has had its fair share of terrorism since the late 1960s – the Lockerbie bombing in 1988 killed 259 and the London bombings in 2005 killed 56. Regional dynamics in Africa are fluid and have changed significantly over the past decade. More recently in the North, the Arab Spring had a dramatic impact which toppled governments. The previous safe regions of the 1990s of Libya, Egypt and Tunisia are, in the eyes of many insurance companies, no-go areas today. The Central African Republic (CAR) is yet another hostile zone, as is Syria. Noting such events, one can begin to realise the challenges faced within the continent 

Key p from th layers energy e world’s position sector are respect ing to assist iv realisea e nations to nd their na market tu resourc ral e

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

Written by Tony Stead, Africa Risk & Security Specialist

While oil and gas prospects in East Africa are flourishing, the area’s potential security risks can be seen as a barrier to international business. But with the appropriate risk scoping and planning, conducting business in East Africa can be viable and profitable, argues Tony Stead

International Affairs

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

23


THE GAME CHANGERS IN TRACKING!

WINNER

SECURITY INDUSTRY E MAGAZINE

Tracker Solutions Award for 2014/15

-NO CABLES - NO NONSENSE-

A NEW BREED OF TRACKING

www.hunterglobaltracking.com

FIND US

info@hunterglobaltracking.com CALL: CH+41792555042 / UK+447791324551


GLOBAL SECURITY  where porous borders, inconsistent police or military forces and poor communications add further challenges for governments who may lack transparency or legitimacy in the eyes of the international community. TERROR INCIDENTS The In Amenas and Westgate incidents highlighted inadequate government responses to terror attacks, which arguably caused greater damage and loss of life than they saved. Responses seemed ill conceived, ill prepared and ill advised. Military gunships were used to attack the Algerian base, with media footage showing uncoordinated firing at seemingly any person that moved. In Kenya, media showed soldiers cowering outside the shopping centre, latterly there

can be challenging and a common oversight within the energy sector is the oft-seen defaulting to Health and Safety (H&S) leaders to scope and manage in hostile environments. The flaw in this model is that H&S models may only scope risks within the parameter of any given site on a compliance basis, meaning the likes of Westgate, In Amanas or the Arab Spring would be unlikely to be considered in any risk scoping exercise. There are other incidences where I have witnessed engineering project managers leading the preparation for an Africa operation, with absolutely no regional insight or input other than technical engineering knowledge. The consequences of such oversight can be fatal. I would recommend employing the services

The region is often considered volatile due to a range of factors including tribal, political, geographic and environmental. Discoveries of mineral wealth have been sighted burdens rather than assets, are often identified as the root cause of historical conflicts was footage of government forces carrying bags of looted goods and stepping over dead civilian bodies inside the shopping centre. Libya, Tunisia and Nigeria government forces have also responded poorly to hostile events in respective countries. The common thread forms that Forces being poorly trained, equipped and paid are unlikely to provide appropriate emergency response. A 2015 snapshot finds evidence that Al Shabaab are actively recruiting in Kenya. In Libya, the militia numbers continue to grow as the country grows deeper and deeper in to lawlessness, with AQ or Islamic State (IS) affiliated groups now deeply rooted in the North East. South West Libya is believed to be active training grounds for collaborating banditry, including Hamas, IS and AQ as the military tourism model previously witnessed across Afghanistan, Chechnya and the Balkans reappears. PLANNING & PREVENTION This is the context from which operational planning begins. With the appropriate risk scoping and planning, Africa operations can not only be a viable business option, but brings the added bonus of assisting developing nations. Training opportunities, supporting international partners and developing local skills through determined, committed and courageous learning programmes, provide learning and engagement forums for all stakeholders to grow and benefit. Morally, Africa offers wonderful opportunities where all stakeholders can win. Planning for operations in such environments

of an experienced Africa hand for the scoping of any operation, as well as an academically qualified individual who considers action to be taken if the worst possible ‘what if’ should ever occur. Risk scoping may include bordering regions where, due to porous and unpoliced borders, local conflicts can quickly escalate to be international. Examples of cross border incursions include recent Somali attacks in Kenya. Poorly paid government forces are unlikely to risk their lives in the face of armed conflict. Companies should avoid overloading H&S professionals who may be unfamiliar or unsighted with African cultures and trends and instead utilise experienced risk and security professionals who have operational experience in Africa. CONTINGENCY PLANNING An excellent example of contingency planning in action was Tullow’s ability to extract trapped employees and their family from within the Westgate shopping centre as the terror siege was ongoing. Private security teams (ex UK military) extracted employees and other shoppers quietly and efficiently days before government forces entered the building. Police incidents of expat harassment on fabricated charges can bring significant financial reward to corrupt officers. Yet, if one pays, it endorses a successful business model for the culprit. I encountered this in many countries and, in Angola, started recording all such incidents and providing monthly reports to the British Ambassador who in turn passed

to the Angolan government with the message that such harassment was preventing the international community from helping Angola. After a few months, the incidences decreased. Physical threat scoping should consider the ease of access to weaponry in Africa and the unpredictability factor where, 9 times out of 10, a road or junction may be safe, yet on the 10th visit an aggrieved local (or police) with an AK47 may be attracted to your shiny expat 4x4 vehicle. How does one handle the situation? A swift move for the handbrake or to remove seatbelt may be perceived as reaching for a weapon. Nervousness may stall the vehicle, giving the perception of attempted escape. Such scenarios should be considered and drivers trained accordingly including with anti-hijack and first aid skills. One should be prepared for the significant cultural differences between working in the West and working in Africa. Locally, the day may start when the sun rises and ends when it sets. Additionally, priorities may differ and tribal hierarchies are incredibly significant. Hotels and support services also differ in quality and ability and a number of questions need to be considered, such as Does your travel company check on food hygiene practices? Are fire exits padlocked closed for security, or is there a clear route for escape? How capable is the local fire service, can their hose or ladder reach above the 3rd floor?

International Affairs

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

MOVING FORWARD The points I have detailed above are not show-stoppers, far from it, they are platforms from which contingency and operational plans can evolve. We now have a baseline to develop corporate and training plans which can grow and engage within local communities. Consider within plans that, unlike the West, it is not viable to rely upon local national government forces for support, therefore organisations must develop individual robust and workable plans. Where new-build complexes are being developed, safe rooms, fire-fighting and escapes along with practical security and protection methods should be considered and information relating to building infrastructure should be protected; both In Amenas and Westgate attacks benefited from insider knowledge. Engage local communities with security, fire-fighting and medical training and extend corporate facilities to support the community should a local emergency arise. Local engagement is key to success. Having worked across perhaps a quarter of Africa on and off for roughly 15 years, I encourage organisations to overcome their fears and seek to develop business opportunities. Companies that scope well and understand the challenges will undoubtedly reap business reward. Bringing organisations to Africa can lead to growth, developments and benefits at all levels from community to government. 

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

25


Reduce your online security risk. Protecting online identities must be a priority. With Sedicii, personal information is never revealed.

Secure authentication is vital, but it must also be convenient. Don’t fall victim to identity theft! Sedicii ensures total control. With Sedicii it is easy to be safe. With Sedicii, personal information never leaves the browser. Never sent. Never stored. Anywhere. Ever. Sedicii authentication works with all forms of user credentials. In fact, with Sedicii, an organisation no longer holds user passwords at all, therefore reducing risk. The service can be used for logging in to networks and websites, authenticating securely to contact centres, authorising payments and all of this is done using a single, consistent interface. The system can also support biometrics. Mutli-factor authentication includes: hand / fingerprint recognition; ASCII via keyboard; smartphone / tablet log-ins; credit / debit card authentication; face / retina scanning; hardware tokens; and voiceprint. With Sedicii multi-factor authentication, the user doesn’t have to share their password with anyone.

Make Sedicii Authentication your Single Sign-On. Sedicii Limited 2F Techhub, 207 Old St, London EC1V 9NR Phone: +44 20 8144 8279 Email: contactus@sedicii.com Online: www.sedicii.com Twitter: @GBRSedicii


IS EVERYONE A SUSPECT?

Written by Professor Mike Jackson, IT and Cyber Security expert at Birmingham City University’s Business School

MONITORING POWERS

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Professor Mike Jackson, IT and cyber security expert at Birmingham City University’s Business School, examines the proposed ‘Investigatory Powers Bill’ and asks what this means for public privacy The Queen’s Speech announced new monitoring powers “to tackle terrorism”. This proposed bill entitled the ‘Investigatory Powers Bill’ has its roots in the ‘Communication Data Bill’ (nicknamed ‘the Snooper’s Charter’) which the government intended to introduce in the 2012-13 Parliamentary session. The Snooper’s Charter was eventually dropped due to opposition from the Liberal Democrats. The details of the new bill are not fully known as yet but it is believed that it will give the police and security forces even greater powers than those set out in the 2012 draft. What will almost certainly appear in the new bill is the requirement for Internet Service Providers (ISPs) and mobile phone operators to record the activities of subscribers. A record of texts, emails and phone call will be held for at least a year. This rule will apply to all

subscribers and not just those who might be under suspicion of terrorist activity. The advantage of this is obvious because it will ensure that when the security forces have identified one suspect they can also check out other people who have had contact with that individual. Mobile phone operators and ISPs will need to invest in the infrastructure to support this requirement and will inevitably pass these costs on to consumers.

to encrypt messages so that

third parties (who may The f potentially be criminals) o s l i a det cannot intercept e r a bill w and read them. The e n t e u h t b n w problem for the o n k government is that not yet lieved that e this also makes b e c s i it i e pol h t the content of the e v i g it will curity forces messages unavailable to the security forces. and se greater A possible solution n eve is to legislate against s r e w po the use of encryption

ENCRYPTION Another area the bill is likely to address is encryption. A number of apps allow users

which is so complex that it prevents government bodies breaking it. The problem with this approach is that if the security forces can break the encryption then hackers will as well. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

27



MONITORING POWERS

 PREVENTING TERRORISM The government will justify the imposition of these powers as a means of preventing terrorism and ensuring the security of the country. There will be opposition from a number of groups who are concerned that UK citizens will be losing their right to privacy. In the past this has always come from left leaning organisations. Recently, however is clear that right of centre figures such as Rand Paul are seeing laws like this as evidence that the nanny state is interfering too much in people’s lives. Senator Paul successfully blocked the extension of the Patriot Act which was regarded as the US’s equivalent of the Snooper’s Charter. Subsequently, an act known as the Freedom Act which grants the government more limited powers than those set out in the Patriot Act has been passed by the US congress. Unless the Conservative Party contains a significant number of MPs who have views which coincide with Senator Paul’s, the Home Secretary should not experience any problems in steering the Investigatory Powers Bill through the House of Commons. Although the Liberal Democrats have indicated they might oppose it, it is not clear that Labour would. The proverbial man or woman on the Clapham omnibus would tend to side with the assertion that the proposals are necessary for the protection of the country and do not cause too great a threat to the privacy of the individual. The general assumption would be that people “who have nothing to hide” have nothing to fear from this bill.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The public may accept the bill not understanding what the associated loss of privacy may mean. However, the UK may have to follow the US in ditching a bill which grants the administration overarching powers in favour of one which takes more account of the individual’s rights to privacy A QUESTION OF PRIVACY And yet there is evidence that the general public can be greatly exercised about privacy under certain circumstances. Nobody would dispute the fact that the number of people harmed on our roads in a year greatly exceeds the number subjected to terrorist activity. It might therefore be supposed that a device which could significantly reduce the number of road casualties would be enthusiastically welcomed. Such a device would be fitted into a car and the vehicle owner’s expense and its purpose would be to inform the police every time the vehicle driver exceeded the speed limit. Could such a device be constructed? Yes, almost certainly. Would it contribute to the reduction of accidents on the road? Yes, almost certainly. Would it be accepted by the general public? No, almost certainly not. The British have shown that they have no concerns about breaches of privacy which might occur due to the use of CCTV surveillance cameras. The Daily Telegraph reported in 2013 that there was a CCTV camera for each eleven people in the population. Surveys have shown that UK

citizens, in contrast to those in other European countries, think that this is a good thing. So the camera is highly regarded. Except when it’s a speed camera. Speed cameras are widely reviled and cited as examples of the nanny state in action. They are seen as invaders of privacy. This is despite the fact that everyone acknowledges that these cameras only catch individuals that break the law. The point is that privacy does matter to citizens but only in certain contexts. The protests about the way the Investigatory Powers Bill invades privacy which come from organisations such as Liberty and the Open Rights Group need to be taken seriously. The public may initially accept the bill not understanding what the associated loss of privacy may mean. In the future, however, the UK may have to follow the path taken in the United States of ditching a bill which grants the administration overarching powers in favour of one which takes more account of the individual’s rights to privacy. L FURTHER INFORMATION www.bcu.ac.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

29


ARE YOU CYBER RESILIENT? 95% of organisations are being routinely compromised, don’t become another statistic. cybX is a unique cyber training, exercising and validation capability that enables a full spectrum of cyber attacks to be technically replicated and for business consequence management to be rapidly developed and tested in a safe and secure environment. cybX enables organisations to take a ‘board room’ to ‘server room’ approach, to: • Integrating cyber resilience into wider enterprise risk management and governance • Objective assessments of business risks resulting from different cyber attacks • Developing and delivering a roadmap for a business driven cyber resilience capability • Investing in the development of high value cyber security teams

For more information visit: www.cybx.org or Call: +44 (0) 1347 825196

Cyber Security; cybX @cybx_org


CYBER SECURITY

DEVELOPING ORGANISATIONAL CYBER RESILIENCE

Organisations are under virtually constant online attack. Theft of customer data, intellectual property and sensitive information is increasingly common. How quickly can you respond? Digital transformation is one of the key agendas for government, CNI and for enterprises in general. However as individual enterprises, government, the economy and society become increasingly hyper-connected and data dependent the risks from cyber attack and not just technical failure rise. These risks arise from many different potential actors, but the consistent theme is the difficulty with attribution and therefore the low risk to the attackers. The insidious effects of the combined criminal, espionage, sabotage and subversive cyber activities undermine trust, making traditional security approaches less effective. An alternative way is to integrate essential physical and IT security disciplines into a more holistic organisational cyber resilience approach, based upon the recent British Standard Guidance on Organisational Resilience (BS 65000) and sponsored by the Cabinet Office. It provides a framework based upon three foundations of: vision and goals; leadership and culture; and governance and accountability, with an iterative six stage process. To understand how developing organisational cyber resilience into a core process is both achievable and essential it is first important to understand what digital transformation, organisational resilience (OR) and agility mean. Second, how when these are combined effectively together under a framework such as BS 65000 they become the means to driving the economic growth and delivery of better services. DIGITISATION Digitisation has many aspects, but in simple terms it is the combined networking effects of increasing amounts of connectivity linking data, devices and people. This creates a value chain that enables people and enterprises to be more agile in their information exploitation through developing shared understanding and collaboration to continually improve and innovate. We are currently in an era of exponential increases in digitisation due to combined effects of various technologies which are all maturing and becoming hyperconnected. To provide an insight into the increasing hyper-connectivity scale of this some global figures will help.

By the end of 2014 there were nearly seven billion mobile subscriptions, nearly one for every person on earth. The world’s stock of data is forecast to double every two years, after increasing 2,000 per cent between 20002012; and the number of internet-connected devices reached over eight billion in 2012 and forecasted to reach between one - ten trillion by 2025, at least 140 sensors for every person on the planet. This makes data and the ability to be able to exploit it to drive innovation the new ‘currency’ in an increasingly complex and dynamic global economy and societies. BS 65000 describes OR as ‘the ability of an organisation to anticipate, prepare for, respond and adapt to incremental change

and sudden disruptions in order to survive and prosper’. It therefore follows from an understanding of digital transformation that this brings both incremental, but increasingly disruptive change, hence the digital agenda as part of almost all government and CNI strategies. The good news is this is that the digital transformation required to ‘prosper’ from digitisation are also those required to ‘survive.’ It ultimately is developing a more agile enterprise, which has the ‘DNA’ to be responsive, robust, flexible and adaptable. DIGITAL TRANSFORMATION Digital transformation means cutting across traditional internal and external stovepipes, to develop mutual trust, shared understanding, communications and collaboration, to enable better decision making and actions. This means putting people, with the right skills, enabled by the data and the right channels of communication and communities of interest

at the centre of both digital transformation and cyber resilience. By implication ‘flattening and widening’ the connections between senior decision makers, managers and staff in all functions, to cyber security and IT specialists. Arguably improving engagement of employees, often another aspect of transformation agendas. The exponential increases in complexity and dynamic nature of digitisation, inevitably leads to rapidly changing technology and ways of working, based upon data sharing and collaboration. This inevitably constantly creates new vulnerabilities and exploits for cyber-attacks. The assumption must therefore be that some attacks will be successful and so the organisation must be resilient enough to withstand the shock and surprise of an attack as the effects manifest themselves in different ways. This can be achieved by using an agile approach based upon structured the situation based experiential learning for individuals and organisational development, which BS 65000 includes. By investing in this ‘board room to server room’ approach developing different skills, processes and structures dynamically, whilst being underpinned by essential information assurance, organisations can develop a more agile cyber resilience capability. In this way boards, senior executives and whole enterprises will elevate and integrate cyber resilience, including security into a core business process.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

In conclusion, a highly digital enterprise that is cyber resilient is more agile than a less resilient one, therefore better able to exploit the opportunities of an increasingly hyper-connected environment. This agility, or the ‘DNA’ of organisation’s to be responsive, robust and flexible is enabled through digitisation, or the fusion of digital technologies, data and new structures exploited by people with additional skills and changed culture. There is an interdependent relationship between digital transformation and organisational cyber resilience, without recognising the two and driving the skills and culture to support them, then both digitisation initiatives and cyber security will be less effective an exponentially increasingly complex and dynamic hyper-connected world. L FURTHER INFORMATION www.cybx.org

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

31



CITY CENTRES

COLLABORATION KEY TO ENSURING SAFER CITIES

Geoff Zeidler, immediate past chair of the British Security Industry Association, who leads the Police and Security (PaS) Initiative, discusses the topic of ‘Safe Cities’ and the work that’s currently underway to develop best practice in London As venues for large-scale events, and often the target for protests, riots and terrorist attacks, modern cities face changing security threats. In today’s increasingly interconnected world, cloud-based services and the ‘Internet of Things’ are increasing cities’ reliance on technology, often leaving them increasingly vulnerable to security threats and breaches. Leading the way in utilising ‘smart city’ technology in the UK is Glasgow, which has spent £24m over the past two years on transforming the city into a world-leading ‘city of the future.’ Now, the city benefits from self-adjusting street lights, wireless

high-definition CCTV, automatically-adjusting traffic lights to reduce traffic and bottlenecks and dedicated apps to highlight walking tours, cycle routes and points of interest. A DEVELOPING THREAT For these smart cities, where the local infrastructure – from traffic lights to utilities – is largely automated and networked, security vulnerability is especially apparent, and is a problem not just in the UK but on a global scale. In an interview with the New York Times, the United States’ security expert Cesar Cerrudo revealed

A FRESH APPROACH Collaboration and joined-up thinking between police and the private security industry is key to ensuring the long-term safety and security of British cities, and building a closer relationship between the two is the focus of a new project being developed across London. The Police and Security (PaS) Group Initiative was launched at London’s City Hall in December 2014, with the aim of becoming a ‘critical friend’ to the Met Police in developing mutually effective collaboration with the private sector. The key ‘pillars’ to this activity include building effective collaboration, overcoming barriers and sharing best practice between the Metropolitan Police, private security suppliers, existing crime reduction partnerships and local businesses. Partners involved in the project include the Metropolitan Police, the British Security Industry Association, London First, the Security Industry Authority and the City Security and Resilience Networks (CSARN). So what is PaS and what can it achieve? The list of attendees and presentations at its launch on 1 December at City Hall gave an indication. It was attended by the MPS regional borough Senior Points of Contact (SPOC)s for business crime, and a wide range of both private security providers and security managers who together represent the Private Security ‘capability’ in London, all of which have potential to collaborate closely with the police. There were statements of intent and 

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

Written by Geoff Zeidler, Immediate Past Chair, the British Security Industry Association

that through weaknesses such as software bugs and lack of encryption, he has found ways to control traffic lights, tweak speedlimit signs and alter traffic sensors. Closer to home, Network Rail has acknowledged the threat to its new hightech signalling system, following a warning by Government advisor, Professor David Stupples, who claims that the new system – which dictates critical safety information and will eventually control all of Britain’s trains – could leave the rail network exposed to cyber-attacks and potentially allow hackers to cause a serious crash. Commenting on the increasing risk to cities from cyber-attack, Mike O’Neill, Chairman of the British Security Industry Association’s Specialist Services Section, said: “The key challenge that strikes me is that with the drive for connectivity – and interconnectivity – comes a lot more vulnerability. [Threats could come from] hackers… terrorist groups or government actors and their proxies, who may be seeking to cause asymmetric confusion. If you think about a city that has interconnectivity, the vulnerability is huge, so that is one of the things I think we need to be much more aware of going forward.” So, with modern cities facing a growing number of threats, what can those responsible for safety and security do to prepare and protect our urban centres?

City Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

33


CASE STUDY

ANIXTER PARTNERS WITH MULTINATIONAL TECH CONSULTANT TO HELP SECURE A LARGE CITY

S U M M A R Y Customer Multinational technology and consulting corporation

Challenge Citywide-surveillance solution

Solution READY!SM Deployment READY!SM Camera

Results tight implementation timeline ° Met of waste at the job site ° Reduction Improved adaptability for future upgrades ° READY!SM Deployment Services by Anixter map our distribution and Supply Chain Solutions to the construction or deployment process of any technology project. We combine sourcing, inventory management, kitting, labeling, packaging and deployment services to simplify and address the material management challenges at the job site(s). READY! Deployment Services by Anixter will help you improve the speed to deployment, lower your total cost of deployment and deliver your product This project called for: READY!SM Camera is a kit that includes CAMERA the camera, lens, housing and ancillary products to complete the installation.

About Anixter: anixter.com/aboutus Legal Statement: anixter.com/legalstatement 12S0057X00 © 2013 Anixter Inc. • 11/13

Customer Challenge

In light of security challenges around the globe, cities are under increased pressure to provide a safe environment for their businesses and residents. Forward-thinking municipalities are proactively taking steps to assure they are doing everything possible to maintain the security of their citizens while not encroaching on the aspects that make city life appealing to residents and corporations alike. Leveraging its strength in public sector technology solutions, a multination technology and consulting company secured an assignment to develop and implement a security system for a major metropolitan city. The challenge: not just deploy surveillance cameras throughout the city’s business district—one of the largest in the U.S.—but also seamlessly integrate them into the recent beautification efforts without sacrificing security. The company turned to an alliance partner, Anixter, for assistance with the complex infrastructure required.

Program Scope

The city’s goals for the program were to increase security, increase visibility with their 9-1-1 call center, make its businesses and citizens safer, provide surveillance to prevent problems before they occurred and help with its disaster readiness program. Given their expertise in the communications and security field, Anixter provided the technology proof of concept required for the project. After reviewing Anixter’s proposal, the city’s participating divisions, including the Mayor’s Office, eagerly gave the green light to move forward, but with an important caveat. Since the work was being done in the city’s business district, the actual installation of the cameras and necessary infrastructure could only take place between 7 p.m. and 5 a.m. to minimize the impact on business.

Anixter Solution

Anixter and the company worked together to specify the products necessary to meet the security project requirements. To fulfill the products specified, the company developed customized housings that contained the necessary infrastructure to make the cameras work and included key components such as Ethernet ports and wireless access points. The company chose Anixter not only for its technical expertise, but also for its ability to serve as a single source for all the required infrastructure products.

Program Results

Within a few days of installation, the cameras went “online.” Despite being operational for just under a year, the security system is already paying big dividends. Recently, the city held a disaster readiness drill that demonstrated the system’s ability to provide more “eyes on the street” than if it was relying on the police force alone. To date, the city is pleased with how the system is working. In fact, Anixter has already assisted in deploying additional cameras in other high traffic areas throughout the city including sports stadiums, museums, parks and other popular city attractions. In all, some 1,500 cameras are planned to be installed as additional Homeland Security funds, which are the city’s primary source of funding for the program, become available. This highly visible video surveillance project combined Anixter’s breadth of technical expertise in infrastructure and security products and Anixter’s READY!SM Deployment Services with the company’s design expertise. At the end of the day, Anixter was able to deliver a unique, customized solution to the city and its customer on time and on budget. “Working on such a high profile project requires the expertise and professionalism that we have come to count on from Anixter,” said a Technology Solutions Architect at the company. “More than just a partner, in many ways they operate as an extension of our technology adoption area by anticipating our needs and providing sensible, cost-effective solution.”

Anixter Inc. World Headquarters 2301 Patriot Boulevard Glenview, Illinois 60026 224.521.8000

Anixter, EMEA Headquarters Inspired, Easthampstead Road, Bracknell, Berkshire, RG12 1YQ UK

www.anixter.com/solutions/security | anixteremea@anixter.com

Products. Technology. Services. Delivered Globally.


CITY CENTRES

 commitment from the Deputy Mayor and Commander Simon Letchford, who leads on Business Crime for the MPS, speaking on behalf of Deputy Commissioner Craig Mackey. Commander Letchford said: “The Metropolitan Police Service has a strong track record for delivering policing and security at major events in London, which is one of the safest capital cities in the world. Effective partnership working is key and we are committed to further improving the way we work with the private security industry to build upon this success. “This initiative provides practical measures aimed at improving the working relationship between the police and private security, while sharing good practice across London to reduce crime and keep London safe for all those who live, visit and work in the capital.” This project builds upon the growing trend for police and industry partnerships that has developed in the past few years. With a focus on training, Project Griffin was the first significant engagement between the police and the private security sector, whilst more recently, the London 2012 Olympic and Paralympic Games prompted further demand for collaboration. The Games were the catalyst for the Cross‑Sector Safety and Security Communications Project (CSSC), which was developed to cascade vital security and safety

City Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

in 2012 between the Metropolitan Police Service and the private security sector. The PaS Project will provide a focal point for engagement for building on what works.” Having established itself as a business-led initiative designed to simplify and improve collaboration, coordination, communication, trust and feedback between the police and private sector, the PaS Group Initiative launched an initial consultation in January 2015 to gauge the perceptions of all organisations involved in operational collaboration, to ensure that PaS focused on the most important issues. The consultation received 197 responses, which came from a broad set of participants, and both the results and the next steps that PaS will take are due to be launched within the coming weeks. Another initial step taken by the Group was to map existing local and national collaboration projects to improve coordination and identify best practice. Although currently focused on the London area, there is scope for the PaS Initiative to expand to other cities across the UK, facilitating a nationwide network of communication and best practice, essential in empowering cities to prepare and protect themselves against the growing security risks they fact. Following the initial consultation, PaS has now established three key workstreams, focused on Effective Collaboration, Information & Communications and Standards & Training, which are seeking to provide better clarity and simple guidance in these areas. The project has also benefited from fantastic support from the Met Police Business Hub, who are starting to publish a regular newsletter to subscribers. It is the PaS Initiative’s core aim that building effective collaboration will contribute significantly towards creating a safer and more secure London, and that the blueprint created in the nation’s capital might subsequently be rolled out across the UK.

Joined g kin up thin lice and n po betweevate security the pri ry is key to indust the safety g ensurin ecurity of and s cities British

information across the capital in real time. The CSSC project has become a lasting legacy of the Games and is still in operation today, whilst its format was successfully replicated for the Glasgow 2014 Commonwealth Games.

BUILDING ON OLYMPIC SUCCESS Following the Olympics, consideration was given by the BSIA and the Met Police to coordinating a longer-term programme for collaboration, however this received added impetus following the publication in summer 2014 of the Mayor of London’s Office for Policing and Crime (MOPAC)’s Business Crime Strategy, which calls for police, businesses, local authorities and others to work together to build confidence to prevent and cut business crime. Setting out clear, deliverable plans to achieve this is a key requirement of the Business Crime Strategy, an objective that is mirrored by the PaS Initiative itself. The Business Crime Strategy is based around requirements from all parties, known within the strategy as the key ‘asks’. London’s Deputy Mayor for Policing and Crime, Stephen Greenhalgh, said: “My ask of businesses under the MOPAC Business Crime Strategy is to build on the legacy of the excellent relationships built

GETTING INVOLVED Any interested parties can find out more or register to participate in the Police & Security Group, or receive regular updates, by going to: www.bsia.co.uk Visitors to IFSEC International 2015 (ExCeL, London, 16 – 18 June 2015) can visit the Safe Cities Academy to hear Geoff Zeidler speak on The Police and Security Initiative: Collaboration to Increase Public Safety and Reduce Crime (Wednesday 17 June, 11:00). Mike O’Neill will also be speaking on 17th June from 15:00 on Security Risk Management Strategies for Safer Cities.  FURTHER INFORMATION www.bsia.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

35


Safetyflex Barriers, are the next generation of Anti-terrorist and Anti Ram bollards, barriers and crash fences Designed to protect key infrastructure around the world, from vehicle terrorist attack, and criminal ram raid activities. We secure the most key sites in the UK including: n n n n n

London Olympic games Financial centres Data centres Shopping centres Military & Nuclear Facilities

Safetyflex Barriers Boston Place Foleshill, Coventry CV6 5NN t: +44 (0)24 76 664911 f: +44 (0)24 76 663020 w: www.safetyflexbarriers.com e: info@safetyflexbarriers.com e: us@safetyflexbarriers.com


PRODUCT STANDARDS

PERIMETER SECURITY ASSURANCE

With the number of PSSA Verified products steadily increasing, the PSSA Verification Scheme has been extended to include the installation of perimeter security products. When the Perimeter Security Suppliers Association was founded, with a key objective of raising industry standards, the founder members allocated much of the Association’s resources to the development of a Product Verification Scheme. Such is the commitment of PSSA members to the Association’s objectives that participation in the Verification Scheme has now become a mandatory condition for continuing PSSA membership. Leading suppliers, including Cova Security Gates, Frontier Pitts, Geoquip Worldwide, Marshalls Street Furniture and Zaun, have submitted a growing number of their products for Verification. Since these companies already possess accredited ISO 9001 certification and their products have been successfully tested to vehicle impact test standards or other standards, often with the oversight of CPNI, an obvious question is ‘why the additional

Written by Stephen Munden, PSSA Verification Scheme manager

Criminals are not afraid of using extreme force or explosives when entering a building or site, which is why the security products that protect such perimeters must meet strict standards – and be installed correctly, urges Stephen Munden

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

With r be the numerified V of PSSAincreasing, s productA Verification the PSS now includes Scheme stallation of voluntarily. Not only the in ter security does this mean that they must keep their products perime ducts in line with the latest pro

Verification?’ Part of the answer lies in differentiation and the desire of these companies to demonstrate a higher level of achievement, which in turn of course engenders greater trust and confidence in their products, compared with those who make unsubstantiated claims. However, another part of the answer is the need to continually improve and adapt their businesses and their products and services to meet the requirements of the markets that they serve. RAISING INDUSTRY STANDARDS The PSSA Verification Scheme, unlike conventional compliance audits to specific management system or product standards, takes a more forward looking approach. A key requirement of the scheme is that participants maintain a register of all external regulations and standards with which they must comply or have adopted

national and international standards but they are also well placed to adopt new standards or additional criteria as they become available. The scheme also verifies not only that the products being provided are of the same performance as those originally tested but also that suppliers claims in marketing literature are backed up with evidence of their products having been tested to confirm compliance. By reference to PSSA certificates specifiers, buyers and users are assured that the products have been independently assessed and can see exactly what standards and regulations the product meets. INSTALLATION As those familiar with CPNI guidance on Operational Requirements for Hostile Vehicle Mitigation will know, the product E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

37


Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Xtralis - Innovative and reliable pioneers in life safety and security for early threat detection Xtralis is the leading global provider of powerful solutions for very early and reliable detection, remote video verification, and rapid, effective response to smoke, gas and security threats. The company’s technologies prevent disasters by giving users time to respond before life, critical infrastructure or business continuity is compromised. Xtralis protect high-value and irreplaceable assets belonging to the world’s top governments and businesses. Xtralis has been a pioneer in life safety and security for more than 30 years. The company is the world’s largest manufacturer of very early warning aspirating smoke detection (ASD) systems, including VESDA, the world’s No. 1 ASD brand, and developed the industry’s first video motion detection technologies. With more than 230 patents (granted or pending) and numerous firsts and innovations in its technology portfolio, Xtralis leads the market in very early warning fire detection (VEWFD) and integrated security solutions, including perimeter, intrusion detection, multi-site and enterprise security and traffic detection. Xtralis solutions protect; 90 per cent

of multi-national fire and security OEMs distribute Xtralis solutions, 80 per cent of semiconductor manufacturing facilities are protected by Xtralis and 80 per cent of the global top 10 telecom providers prevent downtime with Xtralis. Over 70 per cent of the top 30 data centres and 50 per cent of data centres globally and 60 per cent of new airport construction uses Xtralis. Xtralis solutions protect approximately 50 per cent of new metro and subway construction, and more than 50,000 Xtralis traffic detectors reduce vehicle congestion & accidents. Headquartered in Dublin, Ireland, Xtralis serves more than 60,000 customer sites in 100 countries through a worldwide network of more than 400 certified partners. Xtralis manufactures life safety and security solutions using targeted Six Sigma techniques

and design reliability analysis, and it has been certified by more than 35 regulatory agencies worldwide. Because of its expertise in fire science and security, Xtralis works closely with these organisations to continually enhance or develop new international standards. The award-winning Xtralis portfolio includes: VESDA-E VEWFD Aspirating Smoke Detection (ASD), VESDA Aspirating Smoke Detection (ASD), Industrial VESDA VLI ASD for Industrial Applications, VESDA ECO Gas Detection & Environmental Monitoring and ICAM Flexible Aspirating Smoke Detection. The portfolio also includes OSID Open-area Smoke Detection, ADPRO Perimeter and Intrusion Detection Solutions and HeiTel Remote Monitoring and CMS Solutions. Xtralis technology is available through distribution partners such as Norbain, Fire Suppression, ICS, Haes, ADI Gardner, G4S & Pro Vision. To see how Xtralis could help you with a preventative approach, call Amanda on the details below. FURTHER INFORMATION Tel: 01442 206 408 www.xtralis.com

Award Winning Intelligent Perimeter Protection The most secure PIR solution on the market...in every way possible!

Reliable perimeter protection anywhere. Fully wireless solution for remote locations delivers drastic installation & labor cost savings. • Complete wireless installation available – communication & power • NO TRENCHING! • NO CONDUIT! • NO CABLING! • Alarm and fault reports are transmitted wirelessly • Intelligent power management with battery & solar power options:

Installations have never been this easy. iCommission. One-man commissioning and maintenance. • One person can commission and maintain the detectors • Quickest, easiest, most accurate solution to set-up on the market • Perform a simple walk-test in the detection zone • iCommission is a vertical axis alignment tool • ADPRO iCommission application is available on tablets and smartphones

• 2 years battery life with Alkaline and 5 years with Lithium • Battery life time extension via solar panel

Eliminate creep zone with 360PROtect™. • Provide maximum tamper protection with 360PROtect - eliminate all creep zones • 360PROtect is an additional sensor built into ALL PRO E-detectors to cover the area from up to 3.2 feet around the pole/wall up to 26.2 feet in front of it • All zones alarm separately into Video Central Platinum via a RS485 bus, operators can quickly identify which zone is alarming and visually verify w ith a camera • Detection for attempted surface mount removal, masking, & twisting • Universal cable managed bracket with tamper switch for added vandal protection • Advanced 3D-tamper detection signals an alarm if detector alignment is altered • Up to 4 meters (13 feet) mounting height to minimize the risk of vandalism

www.xtra www www.xtralis.com w.xtralis com

38

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

• Solution simplifies installation design, no need for overlapping corners

Detect more with less! Extend your perimeter protection to 220 meters with one detector and save up to 65% in installation & operating costs. • World’s first 220 meter curtain PIR • Reduces the number of poles, detectors, and cabling required for an installation • Superior detection performance and accurate zones (up to 7 with two detectors pointed towards each other) to precisely enable cameras to provide visual verification • Achieve double-knock protection • Up to 40% cost savings in comparison to other Outdoor PIR systems


PRODUCT STANDARDS

As those familiar with CPNI guidance on Operational Requirements for Hostile Vehicle Mitigation will know, the product system itself is only one component of ensuring that the desired security capability has been achieved. Another critical element is the installation

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

solutions for a safer world

 system itself is only one component of ensuring that the desired security capability has been achieved. Another critical element is the installation of the product system at the site for which it is intended. This key operation often goes without independent assurance and is therefore at risk from contractors without the necessary security skills to install the products as intended by their suppliers. For this reason, the PSSA has introduced an installation module to its scheme. The first company to achieve certification for installation under the Scheme was Binns Fencing Limited. Adam Binns, managing director, explains why he made the decision to participate in the PSSA Verification Scheme. “Being involved in the industry for over 75 years, we have been looking for the right scheme to give the end user peace of mind that the installation they receive has been installed correctly. Whilst there are other schemes around, they do not focus on the installation as a package. The PSSA Verification Scheme ensures that systems are in place and processes are carried out throughout the company to the installation itself. Both the head office assessment and the on-site installation assessment concentrate on the important details, where other schemes which are not fencing focussed can miss out.” INTEGRATED APPROACH As Adam points out the scheme treats installation assessment as a package. This starts with thinking contextually, defining and understanding the legal, industry and customer requirements against which a performance specification can be developed. The scheme insists on evidence of application of operational requirements, as advocated by CPNI, and now incorporated in several standards and associated guidance. It is only after the security capability has been fully understood that product and service components can be specified. This is where the knowledge and skills of companies comes to bear by working with clients to obtain the best fencing system and ensuring that it is installed so that it can deliver the intended security capability. NEXT STEPS New standards are being developed all the time, both in response to changing threats and technological changes. For example, PSSA participated in the recently published BS 65000 – Guidance on Organizational Resilience and is monitoring development of ISO 34001 – Security Management System. It is also taking part in more product-related standards development, such as the revision of BS 1722 – Fences and BSI PAS 170 – Vehicle security barriers – Non-vehicle low energy impact testing. Procurers of PSSA verified products and services can therefore be assured that because of the adaptive assessment methodology, products and services bearing the PSSA Verification Mark will be informed by the latest standards and legal requirements, whilst ensuring that they are fit for purpose. L FURTHER INFORMATION www.pssasecurity.org

Remote Control and Monitoring Heald’s Hydra is a revolutionary new intelligent remote control and monitoring system, designed to simplify and streamline interaction with automated roadblockers and bollards whilst adding more remote functionality and advanced security. The Hydra is available as an option with any Heald automated product and allows access via tablet app, mobile phone or PC. All connections are via existing cutting edge secure protocols with the Hydra system developed in house at Heald.

Northfield, Atwick Road, Hornsea East Yorkshire HU18 1EL Tel: 01964 53 58 58 | sales@heald.uk.com www.heald.uk.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

39


R BEAUTY. INNER STRENGTH. OUTE mean

ong, it doesn’t furniture needs to be str of ce pie a se cau be t Jus planters and seating . Our specialist bollards, it can’t be beautiful too ces. And because ate stunning outdoor spa integrate perfectly to cre gy and crash-tested to olo hn tec our RhinoGuard™ by ed en gth en str y’re the n as well. vide excellent protectio PAS 68 standard, they pro or spaces, choose enjoyable and safe outdo So if you want to create ure from Marshalls. Protective Street Furnit IT LL 0870 990 7504 OR VIS TO FIND OUT MORE , CA EET-FURNITURE TR L/S CIA ER MM /CO .UK WW W.MARSHALLS.CO


PERIMETER SAFETY

PROTECTING PEOPLE, PLACES AND INFRASTRUCTURE Marshalls is a complete external landscaping, interior design, paving and flooring products business – from planning and engineering to guidance and delivery

Perimeter safety has never been higher on the agenda. With the threat of terrorism and the incredibly emotive subject of protecting people, places and infrastructure at an all time high there is a real responsibility for both the specifier and end client to fulfil their duty of care towards all using the building and ensure that its environs are protected against potential threat. Here Marshalls explains the fine line specifiers must tread in meeting safety standards, without compromising the aesthetics of the building. All buildings where large public crowds may gather are under threat; from banks and financial institutions where high volumes of people work, to leisure parks, transport hubs and airports, hotels, stadia and public squares, there is a need to protect those using and congregating in these places from the threat of attack. In the past, building protection has tended towards concrete, iron and barbed wire systems. It is widely recognised today that these have an extremely brutalising effect on the urban environment and in recent years good design practice has stood firm on the use of perimeter bollards: they should be kept to a minimum. With the statutory requirement to mitigate vehicular damage to buildings, and the raised awareness among the general public of the risks to safety, there is however a need to incorporate protective street furniture into many specifications, without compromising on aesthetics or exacerbating the sense of fear and unrest that goes hand in hand with this emotive issue. When specified thoughtfully, street furniture ranging from bollards to post & rail, planters, seating and litter bins provide an effective

method of protecting a space without compromising on aesthetics, whether this is the pedestrian access to a building, a public walkway or a vehicle-free urban area. With careful planning, protective street furniture will act both as a deterrent and prevention against access by vehicles at high-speed with the intention of causing large-scale damage, without blocking pedestrian access. BSI PAS 68 is the standard in place to address the needs of those who specify protective street furniture for this purpose. This Publicly Available Specification (PAS) has been prepared to address the needs of organisations that require assurance that the vehicle security barriers they specify will provide the required level of impact resistance. BSI PAS 68 specifies a performance classification for vehicle security barriers and their foundations, when subjected to a horizontal impact. Through specifying products successfully tested to BSI PAS 68, informed and proportionate security decisions can be made, in line with individual site requirements. VEHICLE SECURITY BARRIERS Many systems are considered suitable for use as vehicle security barriers. As their characteristics differ in both function and form, a comparative means of assessing their performance is required. PAS 68 identifies impact test methods, tolerances, vehicle type and vehicle performance: all criteria that need to be met in order to conform to the requirements. Selecting a bollard for example that features a steel core will go some way to ensuring the product meets the specification criteria for perimeter protection. For instance,

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

products with a RhinoGuard core have been independently tested by MIRA, proving they fulfil the demands of PAS 68. Differing levels of performance are available and the specifier needs to consider what level of impact the bollards must resist; for instance a 1.5 tonne vehicle travelling at 30 mph, or a 2.5 tonne vehicle travelling at 40 mph. These criteria will be based on a number of factors such as the location of the building, the type of vehicle access and the surrounding road layout. PUBLIC AWARENESS It could be argued that, while functionality is of prime importance, the installation of large cumbersome street furniture on the periphery of a carefully designed building might devalue the architectural aesthetic. Combined with this, the overall issue of security and public safety is a highly contentious one with CCTV in particular often being viewed in a negative light. However, with all these systems it is the careful balance between the subtle and the overt, the seen and the unseen, that ensures the desired level of public awareness is achieved, without raising alarm or causing undue public anxiety. There are a number of factors at play: from the message an organisation wishes to send to its staff and visitors - that it cares about their safety and is doing the right thing - to the legal duty of care and the regulatory pressures under which it operates. Selecting a PAS 68 successfully tested street furniture range that has inner strength, outer beauty will ensure that both the security and the aesthetic requirements are met without exacerbating street clutter. GEO from Marshalls, for example, is a popular specification choice for urban realm projects that marries contemporary design with high quality materials to achieve a design that blends with both modern and traditional settings. Security, public safety and a duty of care cannot always be fulfilled through the selection of stock specification products. PAS 68 is a highly regulated standard and ensuring that relevant products are tested in line with this benchmark will provide peace of mind. In addition, it is vital to consider the effect of the security measures on the building and those using it – opting for a product where design and cohesion with other elements of the urban realm have been addressed will help to ensure that perimeter security is provided in a subtle, yet effective way protecting people, places and infrastructure. L FURTHER INFORMATION www.marshalls.co.uk/pas68

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

41


Advertisement Feature Written by Chris Primley, Zaun

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURITY INTEGRATION

SECURITY INTEGRATION BECOMES VIRAL

The ever increasing integration of human, physical and electronic security measures is gathering pace on the crest of a technological tidal wave, an ever-evolving terror threat, government demands and the day-to-day expectations of consumers, argues Chris Primley of Zaun I watched my wife doing our weekly food shop on her phone from the comfort of a coffee shop the other day and perversely thought how far security integration had come – and how far it may yet go in the next year or two. Her expectations, and those of consumers in general, that we should all be able to run our lives from a single personal electronic interface is one of the drivers of progress, as is the advancement of technology and the everevolving terrorist threat and government and legislators’ expectations flowing from that. Many advances in the areas of sensors, encryption and intelligent video tied to access control have been made as a direct result of requirements published by the US Department of Homeland Security. Meanwhile the UK’s Centre for the Protection of National Infrastructure (CPNI) held its first manufacturers’ training day a few months ago on a new Cyber Assurance of Physical Security Systems standard. CPNI’s advice covers physical, personnel and cyber security and information assurance and how best to integrate these physical, human and electronic elements to maximum effect. Rapid technological development and the increased adoption of internet-based services throughout business and society as a whole have also led to an increased expectation of, and ability in, unifying systems. PHYSICAL SECURITY TECHNOLOGY So the security market now demands more joined-up physical security technology, with integration of security fencing and lighting, access control, PIDs and intruder alarms, CCTV and video analytics and guard patrols and security control rooms now commonplace. In the search for greater security control, enhanced employee safety and operational cost savings, some businesses have taken it further by integrating fire-fighting systems, building services controls such as lighting, air conditioning and lifts, and even business information systems and human resource records. In such cases, the various facets work directly together to improve the overall management of a facility and make it considerably simpler and more efficient. This has been facilitated through the development of systems and software that are capable of administering and simplifying the operator’s task of running multiple functions

42

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

from a single portal, and with the advent of more standardised and open protocols. But, for all of the fantastic fancy stuff that is now possible, we need to get back to basics and do only what is necessary and cost-effective. Which involves asking the time-honoured basic security questions: what asset base are we trying to protect – physical, human, intellectual and even reputational; what risks do or might

they face of damage, theft or sabotage; and who or what might pose these risks and how might they carry out their threats? Only when we match the particular threat on the particular asset with the particular risk can we design the most effective mitigation solution – and then integrate pre-existing security measures with the new to make it all work in tandem.


GREATER INTEGRATION If an alarm is triggered, video can automatically be sent to mobile phones, PDAs, laptops or other devices so that security can decide how best to respond. Integrated video and alarms systems can help immediately target security breaches so that any 24-hour onsite patrol can react quickly and prevent property loss, or worse. Access control systems can be programmed to lock certain areas of the facility to confine any search for the perpetrator. Often a fire alarm is the first system to activate. In a modern integrated system this can alert a control room and if necessary escalate the warning automatically to the emergency services, letting them know who is on site before they arrive and even any special medical needs. CCTV can also be used to see if people are trapped or areas are potentially dangerous before emergency services arrive and without putting their lives at risk. In short, the greater the integration, the better able everyone is to build more effective security plans and architectures, respond more quickly and appropriately to security threats and breaches and ultimately protect people and property better than ever. L

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.zaun.co.uk

NBA integrated with electronics for Tory conference The National Barrier Asset (NBA) was established in 2004 to give UK police forces the capability to deploy temporary security barriers to protect high profile locations or temporary events, such as political conferences, from vehicle borne attacks. The size of the NBA was tripled in 2008 and expanded again four years later to meet growing demand. The Home Office owns the NBA while Sussex Police acts as the lead force for a framework agreement involving all police forces and all government departments, agencies and public bodies. It includes a stock of TATA Bi-Steel products and Zaun security fencing which has been deployed at the G8 Summit in Northern Ireland in 2012, the NATO Conference in South Wales last September, and for the first time overseas at the Nuclear Security Summit in The Hague in March 2013. It is also rolled out each year for the major party political conference season. In the autumn of 2014 Zaun used the Conservative Party Conference as an opportunity to demonstrate the possibilities offered by integrating CCTV with the fencing. Electronic security developer and manufacturer EyeLynx, which is now part of the Zaun group, used its SharpView solution and integrated i-LIDS approved video analytics with Pharos Rapid Deployment CCTV on the fencing. They created a rapid deployment CCTV tower with embedded cabling and an integrated power cabinet in the post base to enable quick and easy on-site deployment without the need for heavy machinery. The whole set-up was completely wire free with no external connections required. With Harper Chalice PIDs now integrated too, it means Zaun has a total perimeter security solution specifically designed for temporary events.

They deployed two such towers – each with a full HD1080p PTZ camera and adjoining wide-view slave cameras – throughout the four days of the Tory conference at the International Convention Centre in Birmingham last September, helping to demonstrate how to reduce further the number of officers needed to police events of this nature. Only the master unit needs a SIM card, which provides remote connectivity over wireless 3G or 4G to beam video intelligence to a workstation or mobile device into which anyone authorised can dial to view live footage, or rewind and replay from any of the cameras. Pharos records HD1080p video 24/7 and whenever a PID is activated or a potential intruder approaches too close to the fence, the system sends a snapshot alert to the control centre for visual verification – or even to assigned personal mobile devices, such as the police chief or nearest constable to the breach. West Midlands Police hailed the integration of the most advanced electronics and top end CCTV as an add-on to the existing physical perimeter security provided by the NBA as a great success. They said not only did it enable them to reduce the number of police needed to secure the event, and therefore the cost, but also it helped better cover specific strategic positions on the perimeter.

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

43


PANASONIC TRUE 4K VIDEO SURVEILLANCE CAMERAS THE EVIDENCE IS CLEAR WV-SFV781L ULTRA HIGH DEFINITION CAMERA IS THE PERFECT COMBINATION OF POWERFUL 4K IMAGING TECHNOLOGY AND RESILIENT CRAFTSMANSHIP POWERFUL -

4K ultra high definition for crystal clear monitoring and surveillance 12mp high sensitivity sensor for 4K camera Ultrawide optical 6x zoom lens for perfect distance shots Smart depth of field, VIQS (variable image quality on specified area) technology and motion detection - Smart infrared led equipped to take pictures at 0 LX - Low sensitivity with 0.3lux at colour mode - 30fps at 4K resolution (3,840 x 2,160)

RESILIENT -

Vandal-resistant mechanism (IK10) HLC (high light compensation) technology reduces strong light Fog compensation function Dehumidification device IP66 rated water and dust resistant (compatible with IEC60529)

COME AND SEE OUR 4K CAMERAS ALONGSIDE PANASONIC’S TOTAL SECURITY SOLUTIONS AT IFSEC, BOOTH G1000 TO FIND OUT MORE, VISIT: business.panasonic.co.uk/security-solutions OR CALL: +44 (0) 2070226530


EVENT PREVIEW

THE EVENT THAT LETS INNOVATION LEAD THE WAY

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The global security industry will gather at the ExCeL in London this June for three days of innovation, expertise and inspiration at IFSEC International 2015

2015 has already seen major incidences that have tested the security industry across the globe and as threats continue to evolve IFSEC International has a crucial part to play in keeping the industry abreast of the latest technologies, developments and best practices. Taking place at ExCeL London IFSEC International 2015 will run from 16-18 June. IFSEC International has been at the heart of the security industry for over 40 years and this year it will continue to showcase the future of the industry alongside truly groundbreaking content. HIGHLIGHTING INNOVATION A core theme running across IFSEC International this year is innovation.

IFSEC t na has bee of the rt the heandustry for i security0 years and over 4 ontinue confirmed to participate, will c ase the the Innovation Arena c will showcase back to show of the to back innovation e futur try from across the industry s indu throughout the three days.

Having conducted a significant amount of research following the 2014 edition of the show, a key topic that both exhibitors and visitors kept coming back to was the opportunity to see genuine innovation across the show floor. With this in mind IFSEC International will launch a brand new zone within the show this June, the Innovation Arena in association with leading industry title, Benchmark Magazine. The new theatre will host a series of 10 minute pitches from the Benchmark Innovation Awards finalists. With nearly 40 different companies already

Organisations such as Panasonic, Bosch Security, Vidicore, UTC Fire & Security and Secure Logiq, to name a few will give a short presentation about their shortlisted product and then open the floor to questions. This exciting new format provides visitors to IFSEC International a detailed look at those products that are delivering a real benefit to end users, integrators and installers. Gerry Dunphy, Event Director for IFSEC International, said: “This year we really E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

45



EVENT PREVIEW  wanted to put new products, the latest technology and most importantly innovation at the very core of IFSEC International, the introduction of the Innovation Arena and the expansion of the Innovation Trail really highlights this. We are really excited to be shining a light on all the great advances that are currently being made within this industry and look forward to celebrating and showcasing these in June.” THE INNOVATION TRAIL Running alongside the Innovation Arena is the IFSEC International Innovation Trail which will help visitors easily access the new technologies that have come to market that will be featured at the show this year. Highlights of the Innovation Trail include the NICE Suspect Search, a patent-pending video analytics tool that quickly locates and retraces the movements of a suspect, lost child, or other person of interest within a video surveillance network. Video footage from different cameras and time frames can be reviewed in just minutes, as the system automatically filters out 95 per cent of irrelevant images. In addition to achieving faster response times, organisations

1 chainsaw protective textile, Avertic Pro+. This warp-knitted textile uses the world´s strongest fibre designed to withstand break-in attempts when heavy duty tools are used. Finally, Smanos launch K1, the ultimate home automation and security centre combining butler and guard functions into a stack of aesthetically pleasing round discs. The discs come with aluminium frames and texturized plastic surfaces, suitable for everyday use. This smart home technology uses intuitive operation, gesture-based password protection and self-learning capability to ensure the connected home is both affordable and easy to use. Gerry Dunphy said: “Following our move in 2014 to London’s ExCeL we conducted a significant amount of research and one of the key themes that kept coming up is everyone wanted to see genuine innovation on the show floor. We are delighted to incorporate the Innovation Trail once again and we have some really exciting products and technology to showcase this year. With so many new products within the Innovation Trail, IFSEC International really will provide a one-stop shop for our installer community to get their

The Inspirational Speaker Series will host leading businesswoman Baroness Karren Brady CBE, the world’s greatest explorer Sir Ranulph Fiennes OBE and international cycling superstar Sir Chris Hoy MBE across the three days are able to restore normal operations quicker following a security breach. The RISCO HandyApp is the first smartphone application dedicated to supporting the sales and installation activities of professional security installers. The app allows installers working with RISCO products to increase their efficiency and sales potential by providing access to everything they need for a smooth installation. Through the app, installers can gain access to manuals, use power consumption calculators and even share user guides or sales materials with customers or colleagues. Installers can also extend product warranties and seamlessly open a service request by phone or email through the dedicated support area. IFSEC International will also be displaying the latest in camera systems including Arecont Vision next generation panoramic cameras, the 5MP SurroundVideo with Arecont Vision’s proprietary STELLAR Low Light Technology, and the 12MP SurroundVideo with Wide Dynamic Range (WDR). Both panoramic cameras also feature motorized lenses for easy set-up, and over a 50 per cent increase in frame rate versus current SurroundVideo cameras. Engtex AB will showcase its highly advanced textile Avertic Armour, developed from the No.

hands on the latest technology.” All these new products, plus many more, will make up this year’s Innovation Trail at IFSEC International 2015, helping visitors to easily access the new technologies that have come to market. Visitors will also be able to speak to leading suppliers that are shaking up the industry with new services, experts will be on hand to answer any questions and demo all the latest products on their stands. SAFE CITIES A popular education platform that will return in 2015 is Safe Cities, a stream at IFSEC International which will focus on the protection of larger urban areas, critical national infrastructure and business continuity. Suited for senior and strategic personnel responsible for the protection of major assets within a city, Safe Cities will provide high level thought leadership sessions to provide more insight into this fast growing concept. Safe Cities utilises a multi-agency approach, led by the government to protect the population, the infrastructure and a city’s economy against the threat of terrorism, criminal activity and natural disasters. City authorities are under enormous pressure to cope with common, expected

and unexpected security threats. The planning to counteract or to minimise such threats, such as disaster management plans and business continuity initiatives, are increasingly making local authorities important stakeholders in promoting national security, a role that historically has been limited to the central government. With a focus on four key areas - the city’s infrastructure, cyber security, counter terrorism, and public order – the Safe Cities conference and exhibition will provide education, solution and technology providers for global governments, public sector officials and companies to secure their cities from threats and attack. Safe Cities is an integral part of IFSEC International 2015. Driven by education from leading experts in the field and leading technology and solution providers showcasing the latest innovations, Safe Cities is dedicated to the security requirements of a city rather than the individual component parts that make up the city. Discovering how to protect vital international cities and hubs from attack, with a key focus on business continuity and resilience, this area will showcase companies and industry pioneers who have the expertise, experience and knowledge to guide governments and industry to plan for the protection of their cities. Networked technologies and current trends all feature heavily in the Safe Cities Seminar Theatre, exclusively sponsored by Eaton.

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EXCLUSIVE PARTNERSHIPS This year IFSEC International will also incorporate two new partnerships into Safe Cities, the first is with HyperCat, a leading consortium of major technology developers who are driving the standards of interoperability and they will be discussing their HyperCatCity Initiative at Safe Cities. The second exclusive partnership for Safe Cities is with Euralarm, the association that represents the electronic fire and security industry, who will run their own dedicated half-day conference called Smart Cities: Digital Solutions to Keeping Citizens Safe and Secure. The education programme at IFSEC International also incorporates the Keynote and Convergence Theatre; here leading players from across the security industry will debate the latest issues in cyber security or access control along with case studies and panel discussions around the state of the nation. Sessions within this theatre include Jim McHale, Managing Director, Owner and Founder of Memoori Business Intelligence Ltd who will present on the Internet of Things in Buildings (BIoT) and the part security will play in this. Additionally, a Crossrail case study from Tony Pearson, Senior Consultant at Exova Warrington Fire Consulting and Chris Stevens a Director from SIDOS UK will highlight the fire safety, engineering and security elements on the project. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

47


Today, a simple passport is never enough... That is why we at Rockwell Collins continue to develop and implement a range of security products to help you protect your border. From biographics and biometric capture to automated gates we can ensure your country’s physical border stays secure. Our ARINC security suite of border management solutions, incorporating API, iAPI and PNR, are trusted globally to help strengthen security around the world.

Learn more at: rockwellcollins.com/arinc/ airports

Š 2015 Rockwell Collins. All rights reserved.

rockwellcollins.com


IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW

IT & CYBER SECURITY The IT & Cyber Security area represents the ever changing landscape of the security industry’s primary sectors – physical security, video surveillance, access control, and intruder alarms. These areas have either moved from analogue to digital transmission and control, or are in the process of doing so. Online crime costs the UK economy between £18 billion and £27 billion a year according to the National Audit Office (NAO). A secure cyberspace is of immense importance for the UK. In 2010, UK’s Internet‑based economy stood at £121 billion, the biggest proportion recorded for a G20 country. The UK was also ranked first based on its ability to resist cyber attacks. Despite this cyber attacks featured among the top four threats to the UK economy in 2010, while, in 2011, the number of online assaults globally reached one billion. The Internet presents great opportunities for economic growth and improvement in public services but its potential is also being increasingly exploited by malicious agents. In the Convergence Theatre, Dan Solomon of Optimal Risk Management and Mike O’Neill, Chairman of BSIA’s Specialist Services Section, will take a session on the current and emerging cyber threats. They will discuss the need for robust countermeasures and the importance of upskilling IT professionals to meet evolving cyber threats. Jim McHale, founder of Memoori Business Intelligence, will present on the Internet of Things in Buildings (BIoT) and the part security will play in this. He will look at the current status of the Internet of Things in Buildings and how it contrasts with our vision for a future BIoT. There will also be a cyber security master class from David Emm from Kaspersky Lab UK, who will review the threat landscape in 2015, assess the malware evolution and give predictions for the future.

Lucas Hirschegger

 Another highlight in the theatre will be a cyber security master class from David Emm from Kaspersky Lab UK, in this session he will review the threat landscape in 2015, assess the malware evolution and give predictions for the future. The third education theatre within IFSEC International is the Security Solutions Theatre will run seminars around best-practice for the installation, compliance, testing and future proofing of security systems. Key sessions not to miss include a seminar on intelligent surveillance led by Will Lloyd from BRE Global, tips on how to save money with smart tools by Jim Swift from BB7, and Roland Muller from Siemens Building Technologies will be sharing his knowledge on installing wireless applications. Additionally, the Tavcom Training Theatre will provide bespoke training from the leading training provider Tavcom, on CCTV, IP, access control, intruder alarms and much more.

Recent events like the diamond heist at Brussels International Airport have illustrated the importance of strong perimeter protection and other physical security solutions VIDEO SURVEILLANCE Covering all aspects of video surveillance and intruder alarms, this dedicated product area will feature the very latest products and services in the industry, including video surveillance, central control rooms, and the innovations with high definition technology. Other products on display include ANPR, IP cameras, remote surveillance, thermal imaging, video analytics, intruder alarm systems, detectors, keypads and control panels to protect your perimeters from outside threats. INTEGRATED SECURITY To have an efficient and effective security system, you’ll want to ensure your systems are integrated. At IFSEC we’ll be focusing on how to ensure systems are integrated, so that each product doesn’t work in isolation. This purpose built area will provide you with access to providers whose job it is to ensure that each area of security is integrated and managed effectively. Securing assets is a major focus for international businesses and collaborative efforts between security and IT managers are more and more commonplace when it comes to protecting both buildings and the equipment within them. Key to this is access control. Driven by rising concerns over public and private sector safety, the

access control market is set to be worth a substantial $8.6 billion by 2018. At IFSEC International, visitors can discover the key trends in this security market sector and learn about the latest techniques that will help ensure your organisation develops a fully integrated access control solution. Leading international companies will be showcasing their products including: door entry systems, smartcard technology, time and attendance software, biometrics and intelligent building management systems. PERIMETER PROTECTION & PHYSICAL SECURITY Recent events like the diamond heist at Brussels International Airport have illustrated the importance of strong perimeter protection and other physical security solutions. Due to the heightened threat in today’s world, the importance of protecting property and assets is paramount to all security strategies. The Physical Security & Perimeter Protection area allows visitors to see a range of products in physical security, such as perimeter protection, locking systems, safes and more, while the education programme will enable visitors to learn case studies and best practice to ensure success. E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

49


Meet Q ua at IFSE ntum C 2015 , stand B 700

info.uk@quantum.com | +44 (0)1344 353500


EVENT PREVIEW

Suited for senior and strategic personnel responsible for the protection of major assets within a city, Safe Cities will provide high level thought leadership sessions to provide more insight into this fast growing concept  NEW ADDITIONS FOR 2015 In 2015, IFSEC International will also introduce some great new additions to some old favourites; the Gadget Zone will join the Security & Fire Installer Live feature. Research highlighted that visitors want to get hands on with the products before they buy and this will provide the perfect opportunity to try out the biggest and latest range of products in one place. Along with the new Gadget Zone, Security & Fire Installer Live will also incorporate the Toolshed in partnership with Anglia Tools, the Fire & Security Jobs Bar, the NSI Expertise Hub and Engineers of Tomorrow, amongst other activities. Finally, in 2015 IFSEC International launches its Inspirational Speaker Series with three high-profile personalities covering the sports, business and extreme adventure Abloy_Security_Ad_Feb2015-2.pdf 1 16/02/2015 09:14:21 worlds, each of the keynote speakers have reached the pinnacle of their careers

and will share their expertise and unique experiences with the IFSEC audience. In its inaugural year the Inspirational Speaker Series will host leading businesswoman Baroness Karren Brady CBE, the world’s greatest explorer Sir Ranulph Fiennes OBE and international cycling superstar Sir Chris Hoy MBE across the three days. Karren Brady is widely known as Lord Alan Sugar’s aide on The Apprentice and is also known as the ‘first lady of football.’ Karren became Managing Director of Birmingham City at the age of 23, is now Vice Chairman of West Ham and is one of the UK’s best known business personalities. Karren will be using her phenomenal experience in leadership in a session at IFSEC designed to help you drive your strategic performance forward. Often described as the ‘World’s Greatest Living Explorer,’ Ranulph Fiennes was the first person to reach both North and South Poles

by foot. He has broken records by completing seven marathons on seven continents in seven days and has climbed the North Face of the Eiger. He has extensive experience in large scale fund raising, team building and performing under pressure. Be inspired and motivated by his story at IFSEC in June. Eleven time World Champion and winner of six Olympic golds, Sir Chris Hoy will be joining Brady and Fiennes at IFSEC in June. Find out how, through the pain of training and the euphoria winning, Chris maintains focus and keeps the team moving forward.

IFSEC International

Y

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PROTECTION & MANAGEMENT SERIES IFSEC International will once again be presented as part of UBM EMEA’s Protection & Management Series. The Protection & Management Series encompasses five major shows in related marketplaces covering safety, service management, facilities, security and fire, the overall ethos of the series is about protecting and managing buildings and places of work, along with the people and information within those places of work. L

Tuesday 16 June – 10:00 hrs - 17:00 hrs Wednesday 17 June – 10:00 hrs - 17:00 hrs Thursday 18 June – 10:00 hrs - 16:00 hrs FURTHER INFORMATION www.ifsec.co.uk

When door security has to work For a more secure world

www.abloy.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

51


40,000 BUYERS AND BUSINESS PARTNERS

@IFSEC #IFSEC2015

Access to leading global technology, solutions and knowledge to enable security excellence

Photo courtesy of: Crossrail

16-18 June 2015, ExCeL London

3 Hear from industry leaders on how we are securing our cities at the Safe Cities Theatre 3 Meet international thought leaders at the Euralarm conference 3 Pre-book meetings with your preferred suppliers through the Global Meetings Programme 3 Get all your security solutions, education and training in one place

REGISTER FOR YOUR 2015 BADGE TODAY at www.ifsec.co.uk/ad1 Supported by

The global stage for security innovation and expertise at ExCeL London, 16-18 June 2015 Organised by

SSAIB


INTRUSION DETECTION

INTELLIGENT MICROWAVE PERIMETER SECURITY

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Based in Northern Ireland, Sensurity are specialists in Digital Microwave Intrusion Detection, aiming to deliver government level Intrusion Detection to commercial and industrial sectors Sensurity, founded in 2012, was established to commercialise unique research carried out by Queen University Belfast. This has culminated in Sensurity’s Flagship product HALO, which is the company’s first product to market. Historically, microwave based PID systems were heavily restricted in their application. The analogue based systems require sterile sites, wide and flat installation areas, with no standing water or vegetation within the detection area. The technical advances pioneered at Queens University Belfast and refined by Sensurity allow the HALO system to be uniquely flexible in its application, circumventing these restrictions and ensuring its reliable operation in very challenging environments. The requirement for Perimeter Intrusion Detection Systems (PIDS) are expected to grow at a steady pace. This increase will be driven by the escalating spend in developing countries, growing security risks, improvements in technology and infrastructure investment from emerging economies. The significance of perimeter security has increased, as the world is not becoming any safer to live. Any attack or mishap at critical infrastructures, or any other building or public place can lead to great economic and human losses. THE HALO Sensurity challenges the preconceptions of Microwave PIDS set within the industry. Firstly, the HALO system uses a planar patch array antenna, which generates a non-symmetrical beam delivering three times the vertical detection coverage than competing systems using parabolic dishes. Secondly, the radio frequency used by HALO is C-Band 5.8 GHz, which is a lower frequency than that used in other systems. This ensures that the system will operate in all weather conditions without the typical interference from precipitation. This combined approach produces a much wider and taller beam, which would be problematic for traditional analogue microwave systems. However, due to HALO’s ground up digital design it proves

advantageous. The taller, wider beam and lower frequency results in the complete cross section of the intrusion target being visible to the system for a longer period of time. This extra time allows additional information to be captured and allows HALO’s on-board analytics processor to look for known signature types and react accordingly. For instance, the cross-sectional signature of a small animal is substantially different from a human, therefore the HALO system can choose not to alarm on intrusions by small animals while still alarming on human breaches. This level of intelligence ensures that Sensurity systems have the highest possible probability

microwave systems have an area of weakness immediately above and below each node caused by the attenuation pattern of the microwave beam. This means that for complete installation coverage they need to be overlapped. With HALO this issue has been solved by incorporating active IR sensors top and bottom. A pair of HALO nodes ensures 100 per cent detection across a volumetric area, up to 200m long, 4m high and between 1m and 6m in width. Due to a recent increase in business activity, Sensurity’s head office has relocated to larger premises, giving extra capacity to help drive the innovation, technology and research. The

Due to a recent increase in business activity, Sensurity’s head office has relocated to larger premises, giving extra capacity to help drive the innovation, technology and research of detection (PD) at 99 per cent while reducing the false and nuisance alarm rate. Using its on-board analytics, a HALO system self-calibrates and learns its environment on installation, and no laborious set up is required. The system will account for height difference in the terrain, fence lines or hedges in close proximity, overhanging vegetation and other environmental factors. The analytics engine will filter out repeated noise interference caused by tree branches moving in the wind, or the vibration of a fence line. It also continually learns of slow change to the environment. For example grass or vegetation growing or pooling floodwater within the detection zone will not cause false alarms. DRIVING THE INNOVATION Another unique benefit of HALO is that it can be installed back to back in a tight linear configuration which allows it to be close to fences or hedge lines requiring much less installation space. Traditional

business has gone from strength to strength in recent times, allowing Sensurity to take a product that once had a limited market and open up new, and versatile markets for this technology. Noel McKenna, CEO, said: “Understanding the requirements of governments and critical infrastructure sites, we see the need for the same exacting, selective and genuine alert performance to be available to the wider market. The emergence of the new band of ‘soft targets’ that, if disrupted, would have severe impact on daily lives of everyone in the UK and Europe including distribution, retail, food production to name but a few, it’s a sensitive time to be in any industry. I am delighted to have the opportunity to be part of Sensurity at this early stage and support this user community with our current intelligent security product HALO.” L FURTHER INFORMATION www.sensurity.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

53



Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW

THE EMERGENCY SERVICES SHOW

With over 400 exhibitors and over 5,500 visitors attending this event, the Emergency Services Show is one of the key events for anyone involved in emergency planning, response or recovery As the nature of terrorist threats continues to evolve, often taking unpredictable turns, so does the role of the counter terror professional. Innovative ways of working, new skills and increasingly sophisticated equipment are required to effectively protect the public. Keeping abreast of all the developments and support available can be a real challenge, but one very efficient way to update your knowledge is to attend this year’s Emergency Services Show. The Emergency Services Show provides an interactive showcase for key resilience organisations and training providers. Organisers of The Emergency Services Show have confirmed that the two-day event held at the NEC in Birmingham last year attracted a record number of 5,680 visitors. That represented the eighth consecutive year-on-year increase in visitor growth

and a six per cent increase since the event relocated to the NEC in Birmingham. SEMINAR CONTENT A new seminar theatre dedicated to training will feature at The Emergency Services Show 2015. Free to attend, the new seminars will be led by experts who run specialist courses for emergency services personnel, and will expand the offering of free learning opportunities already available to visitors. The growing exhibition for emergency

responders has already attracted many of the most respected training providers in the industry including the Tactical Training Centre, NHS Ambulance Service First Aid Training consortia (NASFAT), Fire Training Group, PGI Training, Ferno, University of St Andrews, Coventry University and London Metropolitan University. Organisers will also be running seminar programmes on multi-agency working and innovation (successfully launched at the 2014 event), as well as the popular College of 

From strategic planners and first responders to the manufacturers and suppliers of equipment used by leading professionals, the show brings together everyone involved in an emergency Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

55


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

56

COUNTER TERROR BUSINESS MAGAZINE | Issue 22


EVENT PREVIEW  Paramedic CPD Workshops. Meanwhile the indoor and outdoor exhibition will feature over 400 companies and organisations*, some of whom will run workshops and live demonstrations on their own stands. John Halfpenny, policing skills trainer, West Mercia and Warwickshire Police described last year’s show as “an invaluable and enjoyable chance to network and appreciate the challenges, strengths and capabilities of partner agencies in the emergency services and support organisations or responders” while Mark Atton, ERA head of defence called it “a great one stop shop for emergency services capability, intelligence and expertise.” With something new around every corner, The Emergency Services Show provides a unique opportunity for emergency responders to learn, network and progress their careers. It is also a showcase for the best examples of industry collaboration and innovation. Event director David Brown said: “The exhibition halls will be buzzing with knowledge and expertise and we urge

Resilience programme of Chief Fire Officers Association (CFOA) is designed to strengthen the nation’s ability to handle emergencies and crises through the delivery of a co-ordinated response to a range of serious, significant or catastrophic incidents that have wide spread impacts or are of national significance. The National Ambulance Resilience Unit (NARU) works with ambulance trusts to support the development of properly trained, equipped and prepared ambulance responders to deal with hazardous or difficult situations, particularly mass casualty incidents that represent a significant risk to public health. NARU, working with the Department of Health, also assists with the effective national coordination and implementation of the prehospital health response to government policies that are designed to improve civil contingencies and national resilience across England. The Emergency Planning Society has become the driving force in the world of resilience since its creation in 1993. Through regular consultation with the government it provides

The Tactical Training Centre is a unique firearms and multifunctional training facility, working for and with the community, protecting people. It provides UK curriculum compliant training to the police, other law enforcement agencies, blue light services and the military. It delivers firearms, training, coaching as well as advanced medical training officers of all ranks, across all emergency services, to take full advantage.” THE EMERGENCY RESPONSE ZONE Aimed at developing relationships and partnerships between voluntary organisations and the blue light services, the Emergency Response Zone is a networking focus of the exhibition and will feature many new exhibitors this year including Fire Brigades Union, Arson Prevention Forum, CFB Risk Management, South Western Ambulance Service NHS Foundation Trust and Road Safety GB Academy. There will be around 70 companies, charities and other organisations exhibiting in this area alone ensuring a wealth of opportunities to share and catch up with new developments. Companies within the Emergency Response Zone all have stand numbers prefixed with ‘Z’ for easy identification, and are all located together within Hall 18. RESILIENCE ORGANISATIONS The UK’s Fire and Rescue sector remains at the forefront in terms of emergency planning, response and recovery, and the National

a voice for its members to influence change at the highest level. Members come from all areas of the resilience profession and the society provides a forum through its extensive network of regional branches to share experiences and disseminate good practice. The Institute of Civil Protection & Emergency Management (ICPEM) brings together emergency professionals and academics in order to provide an informed and influential voice on all aspects of civil protection and emergency management. It gives members the opportunity to network with practitioners and academics in the fields of civil protection, emergency management, resilience and associated disciplines. The National Inter-Agency Liaison Officers (NILO) was originally initiated within the Fire & Rescue Services and it has now been extended to all responding agencies. The aim of the NILO role is to provide a cadre of officers especially trained to ensure cooperation between agencies responding to a terrorist related or public order event. The qualification is partially gained by way of an eight-day course delivered at the Fire Service College. This then is combined

with extensive periods of in-house training and working alongside partner agencies to ensure familiarity of partner requirements. The resultant qualified officer has now been adopted as a standard by Ambulance Trusts, as well as some other contributing agencies, to provide a fully multi-functional adviser to Gold & Silver Commanders. Personnel from the Joint Emergency Services Interoperability Programme (JESIP) and Emergency Services Collaboration Working Group will also be available to talk to visitors about co-operation across the emergency services.

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TRAINING PROVIDERS The Tactical Training Centre is a unique firearms and multifunctional training facility, working for and with the community, protecting people. It provides UK curriculum compliant training to the police, other law enforcement agencies, blue light services and the military. It delivers firearms, training, coaching as well as advanced medical training. Training4Resilience acknowledges that the first step to becoming resilient is through training and preparation. A recent project of interest to counter terror professionals is the School of Resilience and Emergency Response: a collaboration between the Fire Service College and Training 4 Resilience to create an establishment for the delivery of true wide spectrum multi-agency training; as well as providing the capability to undertake vertical training within individual agencies and organisations to improve the overall skills‑base and civil contingencies arrangements. Mabway offers realistic training scenarios, managed role-play services, security protection and reality-based training. The Emergency Planning College delivers Cabinet Office-approved emergency planning and crisis management training including real-time simulation exercises. It also provides a central forum for knowledge sharing and focuses on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack. WHERE AND WHEN? The Emergency Services Show takes place at the NEC in Halls 17 and 18 and outdoor event area on the 23 and 24 September. It is physically linked to Birmingham International Airport and Birmingham International Station with direct access to UK motorway network and free visitor and exhibitor parking. Suppliers of equipment of interest to counter terror professionals including PPE, surveillance, communications, first aid, IT and clean-up and recovery services will be covered in the August issue of Counter Terror Business together with details of the free seminar programmes.  FURTHER INFORMATION www.emergencyuk.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

57


Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ISSEE - Consulting services in national security and counter-terrorism to sovereign and commercial clients Terrorism is designed to strike fear into the hearts and minds of the population. As terrorist organisations look to increase an attack impact they are turning to all means of mass transport to deliver that terror. There have been noteworthy examples in the past using planes, trains and buses to target large numbers of the public. This will continue and attacks will vary from the simple to the very complex. Governments responsible for protecting their nation find that the requirement to provide highly trained responders, capable of dealing with the full terrorist arsenal without excessive disruption to daily activity or damage to property, becomes more and more expensive and time consuming. Maintaining skills acquired during training is equally as important and a challenge, particularly during periods of inactivity. A sound counter terrorism development philosophy is based on the overarching strategic aim of building long-term sustainable capability within an organisation or nation. Underpinning this, the current indigenous capability often requires a transformational process to deliver a revised, increasingly effective response.

A fully capable counter terrorism training and services provider must be able to deliver all these disciplines with confidence and credibility. ISSEE is a world class capability development provider. Its experience of designing and operating intelligence-led databases, investigating explosives and ammunition incidents and its partnerships with Portsmouth University’s forensics department, and several valued equipment providers, add significantly to its training capability. ISSEE continues to grow exponentially at its new

TRAINING

QUALIFICATIONS

DISPOSALS

Oxfordshire location. It delivers an expanded portfolio of training courses, seminars and conferences using staff predominantly drawn from the UK MOD and the UK Metropolitan Police Counter Terrorism arena. All have extensive experience of operations in urban and rural areas, cities and transport infrastructure. The ISSEE pool of expertise is rightly considered to be second to none. Many commercial organisations claim world-class status delivering training and services to governments. ISSEE makes that claim and will back it up through external verification and accreditation of its training by respected third party qualification awarding bodies. Its training is measured against the UK National Occupational Standards (NOS) for Explosives and Search Occupations. As a member of the both the UK Standards Setting Board for the NOS and the Institute of Explosives Engineers, ISSEE is an ideal choice of a Capability Development partner who can be trusted to provide the solution or service to meet the most demanding threat. FURTHER INFORMATION Tel: + 44 (0) 1608 678382 www.issee.co.uk

CONSULTANCY

MENTORING

CONNECT WITH US:

/ISSEEUK @ISSEEUK

PROFESSIONAL TRAINING AND QUALIFICATIONS IN ALL ASPECTS OF COUNTER-TERRORISM, EXPLOSIVES & SECURITY TRAINING Centre for Homeland Security Talbot Hall Tel: +44 (0) 1608 678382 Heythrop Park, Enstone Email: admin@issee.co.uk Oxfordshire, OX7 5UE Web: www.issee.co.uk United Kingdom

58

COUNTER TERROR BUSINESS MAGAZINE | Issue 22


SECURITY THREATS

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by David Thorp, managing director, the Security Institute

TIME TO ESTABLISH A DIALOGUE WITH THE PUBLIC?

The Security Institute’s David Thorp examines today’s evolving security threats and how they affect the security profession’s relationship with the public Most members of the public have formed robust opinions about security and the impact it has on the micro level of their day-to-day lives and on the macro level of national and global threats. For a profession that seeks, above all else, to serve the public and keep them safe we should therefore enjoy a robust and questioning relationship with the general public, our ultimate end-users. Yet there is little systematic research into public

on a par with respected disciplines like medicine, the law or architecture. We miss the opportunity to encourage young people into the profession by failing to create awareness of the intellectual challenges presented by delivering security, or giving them a clear insight into how it works. Furthermore, much of what we within the profession claim as an understanding of public attitudes is based on assumption rather than rigorous interrogation and analysis.

ed Increas hreat ft levels o rrorism from te e have MEDIA AND and crimin greater THE PUBLIC d One of the key conduits e l t l a resu hysic p to the general public n o g n of course is through the spendi curity by media. In certain cases se s t en it might be claimed that governm the media plays a large part

attitudes in areas such as counter-terrorism, cyber security, critical infrastructure, invasive technologies, organised crime, ideologies, privatisation of services, and so on. As such we run the risk of failing to garner public support for security; of failing to present security as a professional discipline

in leading public opinion and in shaping the policy responses that ensue. From the profession’s point of view then, a greater level of E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

59


Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Radar technology meets operational needs with Kelvin Hughes’ security and surveillance solutions The security threats that governments and other organisations face across the world are evolving all the time – both in terms of targets and tactics. Whether controlling borders, protecting CNI perimeters or undertaking mobile surveillance, one thing is certain. To meet the threats, you need to maintain the very best situational awareness. In order to meet changing security challenges, technological development has to be at the service of changing operational requirements and budgetary pressures. For example, the applications of conventional radar technology had for many years been either limited in their effectiveness or far too expensive for anything other than multi-million dollar projects. As the nature of the security threat changed, however, it became increasingly clear there was a need for a radar system that was both highly effective and demonstrably affordable. The approach taken by Kelvin Hughes in responding to that need led to the development of the company’s SharpEye radar deployed on their single mast solution, which integrates advanced electro-optical technology. With its pioneering, solid state technology, SharpEye does not require maintenance

and provides low through life costs. The SxV variant is a lightweight and compact security radar system rendering it easily deployable. Moreover, with its capacity to operate in user-selectable X-Band frequencies and its pulse compression and Doppler processing of radar returns, SharpEye provides far better suppression of clutter (caused, for example, by adverse weather conditions) and resistance to interference and jamming, than other radars, ensuring the detection and identification of the real threats. The single mast solution is compact

and lightweight, enabling deployment in multiple situations with a SharpEye SxV radar, through mast pan tilt drive and an electro-optical camera capability. A critical infrastructure location surrounded by a fence line can be protected with 360 degree radar and camera coverage either from a central single mast or at optimum positions on the fence line. For border patrols, radar and camera can be mounted on a retractable single mast fitted to a vehicle, enabling surveillance to be conducted over a very wide area. The key point here is the application of technology to operational need. When combined with the company’s intuitive CxEye control and display software, it is possible to integrate the information from multiple sensors into a single display and also feed into C2 or C4I systems ensuring complete interoperability. In other words, when the technology is placed at the service of operational need, a truly mobile situational awareness capability can be made available, affordably. FURTHER INFORMATION Tel: +44 19 9280 5200 www.kelvinhughes.com

RADAR BASED SECURITY EXTEND YOUR VISION  SxV X-Band Radar  Integrated Electro-Optical Sensors  CxEye™ Display & Interface  Single Mast Solution

surveillance@kelvinhughes.com www.kelvinhughes.com kelvinhughes

Kelvin Hughes Advert.indd 1

60

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

SITUATIONAL INTELLIGENCE, THE WORLD OVER

5/11/2015 2:55:58 PM


SECURITY THREATS  engagement with the media and through them the public would provide concrete evidence of how the public perceives and understands threats which will enable the profession to develop effective communication strategies for its dealings with the public. And the security profession certainly does have a strong basis for establishing a meaningful dialogue with the public. One of the words we use within the profession is convergence, yet this means nothing to the man or woman in the street. What they do understand are specific threats that impact on them and it should be possible to use any of the risk areas below as the basis for the kind of conversations that will transform our relationships with the public at large. CYBER SECURITY Cyber security is something constantly encountered by everyone and represents the epitome of a target-rich environment; individuals, organisations and government institutions must negotiate a daily obstacle course to avoid damaging attacks on the integrity of their data, their businesses and their lives. Increasingly threats will be targeted and customised. Cyber security will be engaged in a perpetual battle where it is either one step ahead or one step behind the latest threats. Cyber security brings risk into every home. PHYSICAL WORLD THREATS Physical world threats that have emerged within the 21st Century are the proliferation of affordable advanced technology, the increasing diversity of threats and the globalisation of security threats. These three have combined to make the world a much smaller place than it was, with those seeking to harm us often capable of doing so hidden from our eyes and acting from great distances. This represents a permanent change to the nature of risk and requires responses that the public must buy into. Increased levels of threat from terrorism and crime have resulted in greater spending on

physical security by governments. Alongside this, governments are enacting legislation and regulations which demand increased security levels which further drive the adoption of physical security across public, industrial and business organisations. Some of this can be intrusive in its application. We need the public to appreciate what needs to be done and why. The pressure on security professionals operating in this environment of enhanced and continuous risk will be enormous. The bureaucratic constraints of their roles will become increasingly challenging. There will be new security frameworks to operate within, an increasing burden of legislation and regulation to be assimilated, which will inevitably increase reporting and compliance requirements rather than lead directly to physical improvements in security delivery. Effective support structures will need to be built to enable security professionals to continue to function effectively. Put simply, we need all the help and understanding we can get. Managing the inevitable convergence of these threats is a complex challenge for the security professional and the support they will need from professional bodies like the Security Institute and from education providers is likely to increase in equal proportion. But above all, the profession will need the understanding and support of the public. A successful business always listens and responds to its customers. Security cannot afford to be seen negatively by the public as a necessary evil imposed upon them and must instead be welcomed as a positive enabler in their lives. A process that allows them and their loved ones peaceable enjoyment of all that our societies have to offer. L

Security Institute Annual Conference & Exhibition

Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Security Institute will be hosting its annual conference and exhibition, called the Security Century, on 22 September at the Thistle Hotel in Marble Arch, London. This year the conference will focus on how the practice of security has been transformed in the first fifteen years of the 21st Century. It will look at how technology is enabling us to monitor and modify behaviours and how the accumulation of vast amounts of personal data is allowing us to drill down and identify trends that enable effective security interventions. It will look at how the willingness of people to allow their personal privacy to erode is giving us behavioural insights that are of immense practical value and how the interconnected nature of society helps us to spot security threats and address them effectively. The legislative framework is arguably more favourable to security interventions now than it has ever been; regulation has taken a number of steps forward and the professionalisation of the industry continues at a steady pace. The outsourcing of security from the public to the private sector seems to be gathering speed, with all the opportunities and challenges this entails. Education is becoming an increasingly important element within the profession and we are starting to see young people attracted to a career in security in greater numbers than ever. The conference this year will examine the changes that have taken place to get us to where we are today and critically review them. Cyber security and digital threats will be amongst the many key challenges over the next five years, as will the diversity of threats and the need for integrated approaches for dealing with them. Visit www.security-institute.org for further information on the conference and exhibition.

l Physica world have s that menace in the 21st d emergey include the Centur ng diversity i increas obalisation and gl ecurity of s threats

FURTHER INFORMATION www.security-institute.org

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

61


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Abloy_Security_Ad_Feb2015-2.pdf 1 16/02/2015 09:14:21

Alert C

M

Y

CM

MY

CY

CMY

When door security has to work

K

For a more secure world

62

COUNTER TERROR BUSINESS MAGAZINE | Issue 22

www.abloy.co.uk


SECURITY SYSTEMS

CREATING ALERTS THROUGH INNOVATION

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Whether it’s protecting vital utilities such as water networks or providing high-tech but easy to use security for large shopping centres, Alert Innovation is a recognised industry leader in UK counter-terrorism security systems

record activity and analyse the data collected which is relayed to South Staffs’ control centre. The software is designed to manage out false alarms which again save considerable operative and management time, and ultimately costs.

Alert Innovation is a UK-based company with decades of experience in software innovation, hardware design, manufacturing, installation and maintenance. And it’s proud of its strong track record of providing quality, high-tech security solutions for a wide range of clients. In particular its First Alert and Shop Alert systems offer unrivalled peace of mind for utility companies and large retail outlets. FIRST ALERT The need to protect the UK’s water supply has never been greater. First Alert is a Home Office (CPNI) approved system which provides unique intruder-detection way above the standard commercial application. It delivers dependable, fast-acting response to security breaches, even in the most challenging of environments. Importantly, it also meets Association of Chief Police Officers (ACPO) guidelines to achieve a guaranteed police response. Providing a false-alarm free system capable of ‘Sequential Confirmation’ on an average commercial building is reasonably straightforward - on a reservoir it’s far more challenging. However, the First Alert system is a respected, proven, robust and effective solution that has been installed across many of the UK’s most inhospitable and environmentally challenging utility sites. Most recently First Alert successfully completed the installation of CPNI-approved and EN50131

compliant electronic hatch protection systems at 14 underground drinking water reservoir sites across the Midlands for South Staffs Water. First Alert won the 27 month contract following competitive tender, and in addition to the installation, provides ongoing maintenance and proactive false alarm management support. Kate Wilkes, Resilience and Security Manager at South Staffs Water, said: “First Alert’s approach to our project was very refreshing, from being awarded the tender right through to the system going live and beyond. There were a number of unforeseen challenges that could have potentially incurred additional costs but this was factored in by First Alert so we haven’t had any nasty surprises.” Established twenty-years ago, the First Alert product, developed and manufactured by Alert Innovation, has drawn on its extensive experience from the retail and manufacturing sectors to create cutting-edge water facility protection solutions. When the company first entered the water facilities sector it initially partnered with Cambridge Water to develop intelligent security systems that could be fitted to existing telemetry infrastructure. In addition to providing more exacting data First Alert’s systems are extremely reliable and achieve considerable cost savings as new and expensive cabling is not necessary. The systems use sophisticated sensors supported by a bespoke software package to

SHOP ALERT Shop Alert provides the ability to communicate instantly with retail units and has become the tool of choice for the management of many shopping centres throughout the UK. It offers speedy, secure and robust majorincident management – but most importantly it’s easy to use. There are huge challenges facing owners and managers of crowded places in co-ordinating their resources in the event of a major incident such as a terrorist attack. The dreadful scenes in the Nairobi shopping centre in Kenya heightened awareness of the possibility of a firearms terrorist-attack in a UK shopping centre. So the ability to provide bespoke and detailed instructions instantly to the till point of each individual retailer greatly improves the flow of information for managing safe and effective evacuation. The increased use of IP networks in shopping centres, and the introduction of the all-new ‘Shop Alert 20 20’ touch screen keypad, has also enabled the system to evolve with a new suite of apps with real operational, marketing and enhanced-security benefits. Whilst not compromising the proven operational simplicity that has been the cornerstone of its success, Shop Alert 20 20 provides a platform for the provision of tailored solutions to a whole new range of security, operational, marketing and commercial requirements. Unlike most of the cellular, smartphonebased communication systems, Shop Alert cannot be turned off, run out of charge, be left at home, lost, stolen, leave with an exemployee, affected by poor coverage or turned off in a bomb-threat situation. It also can’t forward sensitive communication to social media sites via the same device. When an emergency communication system is susceptible to all these scenarios, then can it really be classed as smart? Shop Alert is a simple, speedy, secure and robust major-incident management system. L FURTHER INFORMATION www.alertinnovation.co.uk

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

63


foster+freeman IMPROVING THE QUALITY OF FORENSIC EVIDENCE

Forensic level inspection systems to counter the serious terrorist threat caused by the rampant use of counterfeit & stolen travel documents. During recent years a number of high profile terrorist attacks have involved the use of fake and/or stolen passports. Foster + Freeman systems provide a comprehensive solution for the verification of passports and ID cards, the detection of alterations and counterfeits, and the inspection of standard and advanced security features. Existing customers include airports, security forces, immigration controls, banks, police & government forensic laboratories worldwide.

fosterfreeman.com

Visit fosterfreeman.com to find out more about our complete range of document examination solutions, from frontline scanners to forensic inspection systems

Foster + Freeman Ltd | Tel: +44 (0)1386 768 050 | email: sales@fosterfreeman.com


EVENT REVIEW

A FIELD DAY FOR FORENSIC PROFESSIONALS

Forensics Europe Expo 2015 at Olympia, London further cemented its position as the premier international exhibition and conference for the entire forensic sector and supply chain This years show ran alongside Counter Terror Expo and Ambition – the EPRR show. Nearly 2,000 attendees from the public and private sectors made the visit to see the latest in forensics solutions and investigative techniques. There was a significant increase in private sector representation, with fraud and digital forensics professionals from the likes of Yahoo, Deloitte, JP Morgan, BT, IBM, RBS and Blackberry to name just a few of those who made the visit. There was also significant representation from Police forces from across the UK as well as overseas. The exhibition featured over 80 exhibiting companies showcasing some of the latest technology available for labs, digital and crime scene investigations. Highlights

included Cellebrite’s UFED Touch Ultimate a mobile phone data extraction tool, made famous for its use on the BBC drama The Fall – the kit is widely used by law enforcement authorities throughout the world to extract data from mobile phones during criminal investigations. There were several product launches, including Amped Software’s launch of Authenticate, a software package for forensic image authentication and tamper detection on digital photos. The software can determine whether the image is unaltered or has been manipulated with photo‑editing software which means it may not be accepted as evidence. In addition, the camera ballistics in Authenticate can determine which specific device – not just a make or model – was used to generate the image.

nal Additio was is emphasn digital o placed , looking at s forensic ts of mobile elemen , computer phone cs to help forensi serious solve e crim

CRIME SCENE TO COURT ROOM Running alongside the exhibition was the high-level conference, run in partnership with the Chartered Society of Forensics Sciences. The conference promised to take delegates on a forensic Journey, from Crime Scene to the Court Room. The conference programme ran as a single stream, split into key areas of forensics including Forensic Investigations and Innovations, Forensic Labs and Analysis and Digital Forensic Investigations. Several leading industry thought leaders spoke at the conference. Jan Garvin, Executive Director, Law Enforcement & Emergency Services Video Association (LEVA) and John Kennedy, Head of Digital Forensics, Key Forensic Services looked at Digital Video evidence in their session. They provided insights to some challenging cases where forensic video analysis provided investigators with valuable leads in the early part of the investigation, culminating in early arrests and the presentation of powerful evidence before the Jury. Kristiina Reed, Barrister, 6 Pump Court Chambers, explored the role of the expert witness in the court room. One of the areas covered were the changes in the law governing expert witnesses, which included expert witnesses involved in legal proceedings no longer enjoying protection from liability for negligence.

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DIGITAL FORENSICS With increasing concerns about Cyber Terrorism and crime, digital forensics was one of the cornerstones of the conference. Large multi-national organisations are finding themselves increasingly in the E

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

65


FPA Fire and Forensic Investigation Services The Fire Protection Association offers a range of specialised Fire and Forensic Investigation Services.

Post-loss investigation, fire reconstruction & investigation Our new fire testing facilities, combined with our experienced technical

staff makes the FPA one of the UK’s leading fire testing establishments,

incorporating post loss investigation, fire reconstruction and fire investigation, utilising our extensive range of measurement and data capture instruments.

We are also able to support our investigations and experiments with thermal imaging, video and photographic evidence.

For more information, email technical@thefpa.co.uk

Fire Expert Witness Our expert fire witnesses can provide a variety of services should a dispute arise in relation to events surrounding a fire or the design of fire safety

measures. We are able to assess evidence and provide expert opinion in

either civil or criminal court. Acting independently or as part of a specialist team we can assist in determining the origin and cause of a fire.

For more information, email technical@thefpa.co.uk

Level 5 Certificate in Fire Investigation This in-depth course identifies the roles within fire investigation, the legal powers and responsibilities involved, the importance of audit trails and

exhibits. Using our purpose built facility the FPA is able to offer a realistic environment to set up a variety of fire scenarios. Expert fire investigators

and barristers-at-law provide an extensive range of fire investigation training capabilities and expertise to complement the world class practical facilities.

For more information, email training@thefpa.co.uk

If you’d like to discuss in detail the options open to you, call us on 01608 812 500 or visit our website www.thefpa.co.uk THE UK’s NATIONAL FIRE SAFETY ORGANISATION Protecting people, property, business and the environment


EVENT REVIEW  cross-hairs of criminals. James Campbell, Cyber Threat & Detection Response at PriceWaterhouseCoopers, discussed how multinational companies should best prepare themselves. He highlighted what an intrusion looks like, how to identify cyber-attacks and how quickly an attack can escalate. Forensics Europe Expo also ran alongside two co-located events, Counter Terror Expo and Ambition – the emergency preparedness response and resilience event. The decision to co-locate the events reflects the growing importance of multi-discipline forums, whereby professionals involved in law enforcement, security and emergency planning come together to explore the wider issues faced. Counter Terror Expo’s Cyber Threat Intelligence theatre served to provide a 360 degree view of the threat faced, whilst many topics in the Forensics Conference explored how to investigate such incidents should they occur. Rob Lozowski, event manager said of FEE 2015: “The event exceeded all expectations, we saw a record amount of visitors come through the doors and crucially exhibitors met the right people meaning real business was being done on their stands. We’ve got lots of exciting developments lined up for the 2016 edition of the show which we will be announcing over the coming months.” FORENSIC SEMINARS The expo hosted a free-to‑attend complete seminar theatre programme running throughout the two days of the show. The programme was carefully constructed to demonstrate the latest case studies and showcase the latest products and services available to the market. As a visitor, this proved to be a must attend opportunity to help compare and contrast top international suppliers and to cross share knowledge between sectors that may not normally meet under one roof. Day one opened with a seminar by Steve Graham on digital imaging capture processing and outputs. Graham, Investigations Manager at the Health and Safety Laboratory, explained how laser scanning can uncover how events leading to an accident may have unfolded, and commented on the development of remote aerial video and toxicological monitoring. Following this, Dr Sabine Altermann, from LECO Europe, addressed the detection of legal highs and other drugs of abuse, whilst in the afternoon Mick Gardiner, of Gardiner Associates Training & Research, shed some light on fire investigation training and accreditation. The second day consisted of Microsystemation’s Paul Baxter speaking on the future of mobile forensics, Amped Software’s Martino Jerian discussing image and video tampering detection and Gary Howard, Managing Director at Complete Forensics C.I.C, presenting on forensic science. Forensic science is all over the TV, from Sherlock through to CSI Miami. The world

is flooded with flashy marketing from the best drama writers in the word. The people who watch these programs want to work in the sector and are being pushed into courses that are not accepted by employers. Those roles that traditionally did not require a degree to start are now attracting graduates pushing non graduates out of the marketplace. What’s the answer? Vocational training or more graduates? Gary Howard’s session explored the options available and informed delegates on how forensic science is an attractive choice. THE FORENSIC JOURNEY Forensic Investigations are at the beginning of a forensic journey and were explored to see how forensic science is used by law enforcement professionals and forensic military professionals when a serious crime scene unveils. Understanding how a crime scene is looked at and how evidence is collected and taken in is crucial for professionals within law enforcement, laboratory specialists and criminal lawyers working within the next stage of the process.

the complicated scenario of vehicle forensics, which is a process that yields a myriad of data potentially helpful to all kinds of investigations, from law enforcement cases, to insurance fraud, to accident reconstruction. Many newer vehicles (generally 2008 and newer) are equipped with an infotainment system. Drivers will often sync their smartphone to that infotainment system to charge the phone, to make Bluetooth calls, or to have access to their music. In the background, these systems are sucking in all types of personal user data. Depending on the system, this recoverable data can include device IDs, call logs, text messages, contacts, emails, and even photos. Berla highlighted that a very important note should be made that if a phone has accepted the trusted certificate from the vehicle, any phone data transferred to the infotainment system can be recovered, even if the phone itself has a passcode. This is helpful to investigators who do not have access to the passcode, but do have access to the vehicle. The system records the serial number of any device connected to it (phones, media players,

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

James Campbell, Cyber Threat & Detection Response at PriceWaterhouseCoopers, highlighted what an intrusion looks like, how to identify cyber-attacks and how quickly an attack can escalate Forensics Europe Expo will host a free to attend session featuring a Live Crime Scene to help you learn in an interactive way. Following on from when evidence is collected and transported to the appropriate place, the event targeted exploring the latest innovations available to analyse evidence, including lab analysis. Prior to the evidence being used in a criminal matter, all evidence is analysed to the highest degree. Forensics Europe Expo staged senior experts within forensic analysis and allowed them to share their latest findings and recommend best available techniques. Understanding how the evidence is collected and analysed is crucial to professionals working within the law sector to help build a much more solid case in court. For 2015, additional emphasis was placed on the world of digital forensics, looking at elements of mobile phone, computer and general system forensics to help solve serious crime. With the rise of crime carried out with the use of the internet, visitors learned about the best available systems to stop hackers, ways to monitor all activity and how they can use the devices to provide evidence in the court room. VEHICLE FORENSICS Berla were one of the most prominent exhibitors at this years show and explained

USB drives, SD Cards, etc), providing another link between a suspect and their property. If an infotainment system has navigation, GPS data can be acquired as well. The examiner will be able to view trackpoints, tracklogs, saved locations, previous destinations, and active/inactive routes. Events are another critical piece of information. Some of the events that are recoverable include doors opening/closing, lights turning on/off, Bluetooth connections, Wi-Fi connections, USB connections, odometer readings, GPS time syncs and more. Berla then explained how this evidence is accompanied by geolocation data and timestamps, which is an incredibly helpful feature. It allows investigators to paint a detailed picture that shows exactly what happened in an accident or crime. LOOKING TO NEXT YEAR Forensics Europe Expo 2016 will take place between 19-20 April 2016 in Olympia, London. The 2016 event promises to be bigger and better with over 100 global exhibitors showcasing their latest innovations to an audience of senior buyers and specifiers. L FURTHER INFORMATION www.forensicseuropeexpo.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

67


An Excelitas Technologies Company

Global Presence... ...Far Reaching Capabilities Image intensified sights Thermal sights Fused sights Defence modules Avionic optical displays Tactical infra red Space applications Integrated logistic support

Qioptiq phone: +44 (0)1745 588000 www.qioptiq.com FOR THE LATEST INFORMATION VISIT:

www.qioptiq.com


PHOTONIC PRODUCTS

OPTICAL EXPERTISE ENABLES MISSION SUCCESS TIME AFTER TIME

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Qioptiq designs and manufactures photonic products and solutions that serve a wide range of markets and applications including defense and aerospace, and research and development Qioptiq, an Excelitas Technologies company, designs and manufactures photonic products and solutions that serve a wide range of markets and applications in the areas of medical and life sciences, industrial manufacturing, defence and aerospace, and RandD. Innovation has long been recognised to be a key attribute of the success of Qioptiq along with highly skilled and motivated engineers and designers who are customer focused. With world-class capability in design, coupled with international award winning technical achievement, Qioptiq has demonstrated repeatedly an ability to convert technical innovation into producible cost-effective designs. NEW PRODUCT DEVELOPMENT Where the war-fighter is concerned Qioptiq has long recognised that new product development is crucial in maintaining the capability of a decisive fighting force. For the Special Operations element of that force ensuring mission success through innovative technology applications is vital especially as operations shift from Afghanistan and previously Iraq to new territory and an adaptive evolving enemy. To stay ahead constant innovation, research and technology is important, allowing engineers to consider the challenges of tomorrow and respond through an innovative approach. With a number of potentially revolutionary capabilities emerging as key enabling technologies the roadmap for Surveillance, Target Acquisition and Engagement is becoming increasingly interesting - with significant enhancements in sighting system capability through technology evolution and deeper integration. Craig Taylor, Marketing Communications, Defence and Aerospace, Qioptiq, commented: “Capturing new technological developments and successfully exploiting them is not a new concept. However, what is important is constantly considering new opportunities and adapting our approach. In a changing market, what’s important for our customers is our ability to deliver world-leading products that are effective, efficient and adaptable. In an environment of constrained defence spending, cost effectiveness is also a key consideration.”

Financial constraints in any industry mean time and money allocated for product design and development come under pressure. However the Special Forces community still need to procure new and specialised equipment as they seek to source gamechanging technology. Qioptiq therefore has an important role to play in continuing to push the boundaries of Weapon Sights and Surveillance Equipment for end-users with some significant product and technology development activity coming to fruition. It’s widely recognised that modern small arms weapon systems are incredibly accurate and reliable, and that the challenge is being able to DRI the target 24 hours a day, through all weathers and battlefield conditions, with users under physical and cognitive pressure. Sighting Systems need to be easy to use, effective through all weathers and provide the ability to detect targets at the maximum range possible in order to prepare the User for the next course of action. The challenge for Qioptiq is to provide all of this capability to the User in a package (or suite) that is easy to use and easily configurable for role / mission requirements, whilst remaining affordable and having the potential to endure a service life of 10-15 years. Steve Rickard, Qioptiq Business and Product Development manager “Qioptiq are totally committed to reducing the size weight and power burden placed on the end user – developing the battle winning equipment, while maintaining affordability. We will continue to develop, push forward and challenge the boundaries to ensure we always stay one step ahead” When considering soldier and vehicle systems, one is likely to find high performance optics from Qioptiq enabling thermal weapon sights (TWS), observation and targeting sights, night vision goggles (NVG), remote weapon stations (RWS), driver’s vision enhancement (DVE), situational awareness (SA), laser designators, eyepieces, helmet mounted displays (HMD’s), fire control, and laser range finders (LRF). In tactical missile systems one finds advanced domes from Qioptiq in a wide range of materials including ALON, Spinel, Sapphire, MgF2, ZnS, Cleartran, Silicon, and Germanium with complex geometries. missile

warning and targeting systems are enabled by Qioptiq High performance optical systems for IR and ultraviolet missile warners (MWS), IR countermeasures (IRCM), IRST, targeting pods -along with precision long-range zoom modules for border-surveillance, UAV and maritime applications in surveillance systems. Qioptiq provides solutions to meet the individual requirements of its customers. Outstanding expertise has earned the company a worldwide reputation for innovation and excellence. Qioptiq has a complete inhouse capability to process the full range of optical materials and to design, fabricate, polish, coat, and mount optical elements. A FLEXIBLE APPROACH A flexible approach during design is matched with the capability across the visible to IR wavebands, providing integrated optical solutions with any sensor technology currently available. With a combination of dynamic engineering, manufacturing expertise, motivation and reputation, Qioptiq has the total capability to provide some of the most innovative and focused optical solutions to today’s technological challenges. This strategic approach has made Qioptiq the preferred choice for a wide variety of prime contractors and military establishments around the world. From boots on the ground to eyes in the sky Qioptiq capabilities are enabling mission critical systems and platforms in some of the harshest environments on the planet. L FURTHER INFORMATION www.qioptiq.com

Issue 22 | COUNTER TERROR BUSINESS MAGAZINE

69


DEFEND PROTECT SECURE

Copyright © HESCO® 2015

hesco.com

RAPIDLY DEPLOYABLE AND READILY AVAILABLE

UTILISING MILITARY EXPERTISE TO DEFEND BORDERS AND PROTECT PEOPLE AND ASSETS

When selecting the appropriate solutions for defending border lines and creating managed access points, there are many uncontrollable variables to contend with; from location and time constraints to the safety of personnel.

GROUNDWORK

Add to this the complexity and diversity of threats; the continuous risk to national security and array of unpredictable challenges; it’s imperative you have the confidence that your chosen solutions are up to the demand.

For perimeter protection, HESCO® TERRABLOCKTM is a rapidly deployable, ground mounted security barrier. Available at three and four meter heights, this hostile vehicle mitigation solution doesn’t require foundations and can stop a 6,800kg vehicle attack travelling at 40mph. With no digging and no concrete, TERRABLOCK is as easy to remove as it is to install.

With Hesco, you can stand strong in the knowledge that your country’s borders are protected by the best.

Rapid perimeter protection can often require extensive groundwork, relying on embedded foundations to absorb impact of an attack. These systems can become costly and time consuming, especially when covering vast areas of harsh ground or desert.

Groundwork can also be an issue when creating sentry observation points. Combining extruded alloy components and renowned HESCO Defensive units, our Elevated Sangars extend platforms to over three meters above the ground and provide observation decks for security personnel. LOGISTICS When faced with creating miles of ballistic protection, HESCO RAIDTM is able to deploy over 1,000 feet of 2.2 meter tall blast mitigation barrier in under 60 seconds. RAID utilizes a specially designed and engineered ISO container, with purposely designed release


GROUND MOUNTED BORDER CONTROL AND STRUCTURES mechanism to allow rapid deployment of pre-joined standard or recoverable units, able to cover undulating ground and create curves and corners. Unused barrier can be secured in the container and stored for later use, and an empty ISO container can be transformed into storage shelters using a combination of HESCO MIL units and our Light Weight Bunker Roof. PERSONNEL PROTECTION Hesco Accommodation Bunkers (HAB) have been developed to offer a safe haven to those located in remote and austere locations. HABs provide enhanced

ballistic protection from indirect fire and side walls are made of specifically engineered Concertainer units, offering proven protection from weapons systems up to and including large mortar rounds. A specifically engineered roof structure is provided to combat the effects of indirect fire weapons and using specially engineered lining kits HABs can be transformed into a hygienic base for medical use, all without compromising on security and protection. CHECKPOINTS HESCO Guard Post Kit is delivered on a single pallet for ease of storage and transport, and enabling the quick construction of checkpoints. For

personal protection against ballistic threats, HESCO Ballistic Inserts provide low visibility, ballistic resistant body plates, engineered to be lighter and thinner without compromise on protection and designed for active shooter situations.

Find out more about our solutions and services. Email: info@hesco.com Call: 0113 248 6633 Online: www.hesco.com


INNOVATION WITHOUT COMPROMISE

T800

Fully Rugged Tablet

Where’s your office? ©MOD/Cpl David Rose

Contact us:

Visit us @ STAND

Getac UK Ltd Mitac House, Nedge Hill, Telford, TF3 3AH, UK E: Sales-Getac-UK@getac.com T: +44 (0)1952 207200

S9 207

www.getac.com


STRATEGIC DEFENCE REVIEW

Britain warned it must commit to two per cent GDP defence spend Britain has been warned by a number of defence experts, senior Tory MPs and the US that it must commit to the NATO target for minimum defence spending of two per cent of GDP. The Conservative party manifesto did not include a pledge to meet the two per cent target, instead opting to postpone the decision until a spending review later in the year. In a foreword to the latest UK National Defence Association report, former RAF head Sir Michael Graydon addressed David Cameron, saying that the Prime Minister must commit to the minimum spending target. He wrote: “The Prime Minister has now an opportunity to do what he and the other major party leaders felt unable to do in this election campaign, namely to repair the damage done to our defence and security in recent years and to our reputation as a serious contributor to world security. “He can start immediately, by endorsing the House of Commons defence committee report of 17 March this year – ‘Rethinking defence to meet new threats’, and in a simple statement make good his commitment to the NATO minimum of two per cent of GDP. It is an opportunity which any prime minister who aspires to be remembered as a statesman should take.” Julian Lewis, a senior Conservative MP and candidate to be the chairman of the defence select committee, shared Graydon’s concerns regarding defence spending. Lewis described the current spending as a “scandal”, condemning the fact that the UK is struggling to reach the two per cent minimum when it should be “exceeding it”. Colonel Richard Benyon and Bob Stewart, two Tory MPs also running for the position of chairman, have also voiced concerns over the government’s failure to commit to a minimum spending target. Benyon claims that Britain will not be prepared to address the threats it faces without meeting the target, he said: “I think that we have to look at one of the most dangerous scenarios our country and its interests have been in for a very long time. “There is a crescent of instability from North Africa, through the Middle East and up to Eastern Europe and its border with Russia. “We have made a virtue of the fact we are currently spending the Nato minimum threshold of two per cent of GDP. I do not see how we can address the threats we face without sticking to that figure.” Stewart has warned that not meeting the target could damage Britain’s ‘special relationship’ with the US. His concerns stem from the head of the US Army and US President Barack Obama urging Cameron to commit to the spending target, fearing that by not committing the UK are setting a damaging example to other European countries. Additionally, US defence secretary Ashton Carter has said Britain will be diminished if it fails to commit to the target and risks becoming “disengaged” from the World.

UK forces take part in NATO Allied Shield Baltic exercises

Prime Minister David Cameron

DB News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

UK Royal Navy and Army units will join thousands of personnel from NATO member and partner nations, collectively named Allied Shield, to participate in four joint military exercises in June 2015. The Allied Shield exercises will take place in Eastern Europe and the Baltic states, with the UK taking part in two of the four exercises, Baltops and Saber Strike. Baltops is a US led maritime and amphibious warfare exercise taking place in the Baltic sea around Poland. It will begin on 5 June and involve 4500 personnel, 47 ships, and 49 aircraft from 17 nations. The Royal Navy will deploy HMS Ocean, a helicopter carrier, and HMS Iron Duke, a Type 23 frigate. The exercise is designed to practice a range of capabilities, including antisurface, anti-air and anti-submarine warfare, mine countermeasures, and amphibious landings. Exercise Saber Strike will be conducted on land in Poland and the Baltic states of Lithuania, Latvia and Estonia. The exercise is also US led and will see 3000 personnel conduct joint infantry and close air support exercises. The British Army will supply around 170 soldiers for the exercise, due to take place on 8 June. The participation of British forces in the Allied Shield exercises is part of the UK’s contribution to NATO’s Assurance Measures, established May 2014 as a part of the NATO Readiness Action Plan. READ MORE:

tinyurl.com/mw744zy

US Defence Secretary Ashton Carter

Carter told BBC Britain: ”My message to my colleagues in London like to all the other capitals of the Nato countries is to stick to the pledge they all made, which was if they were below two per cent to achieve three per cent. “Britain has always had an independent ability to express itself and basically punch above its weight. I’d hate to see that go away because I think it’s a great loss to the world when a country of that much history and standing… takes actions which seem to indicate disengagement. We need an engaged United Kingdom.” Former NATO general secretary Anders Fogh Rasmussen has also spoken out, telling BBC Radio 4 that he is “confident” Britain will not drop below the NATO minimum, after Cameron showed support for the target READ MORE: tinyurl.com/mw744zy in the past.

Medical advances save over 500 troops from ‘life‑threatening’ injuries New research suggests improvements to care have saved an estimated 572 British troops from injuries in the Iraq and Afghanistan conflicts which the NHS would deem as ‘life threatening’. 38 actually survived injuries which the NHS would consider ‘un-survivable’. It is believed that advancements in the speed of helicopter evacuations, field-hospital equipment and the skill of British surgeons and nurses have greatly improved survival rates in the military across the two campaigns. Conducted by Navy Surgeons and academics at the University of Birmingham, it is the first study to examine survival in UK troops during the sustained period of combat over the last decade. READ MORE:

tinyurl.com/oukvz2y

Issue 12 | DEFENCE BUSINESS MAGAZINE

73


Rangemaster Precision Arms Limited and RPA Systems Limited are two British companies dedicated to providing the best Small Arms products in the world. We have recently introduced the new ULTRA series of 7.62mm x 51 and .338. Both these chassis systems incorporate our prize winning Quadlock action and utilises the optimum technology to ensure supreme accuracy and durability. Rangemaster has also recently redesigned its well-respected 50 cal Heavy Sniper Rifle. We have successfully maintained the accuracy and low level of recoil, whilst achieving a general redesign to save weight. We have successfully introduced a 12.7x108 Soviet Ammunition version of our rifle. RPA Systems Limited has recently introduced a new range of lightweight tripods for both Small Arms and Laser Targeting, incorporating RolaTube. We have additionally secured funding from the European Community Grant Scheme to enable our company to commence manufacturing precision rifle and gun barrels.

See you at DSEI 2015 Stand N6-376 Website: www.rangemasterprecisionarms.com Email: info@rangemasterprecisionarms.com NCAGE KB612


SATELLITE COMMUNICATIONS

MILITARY SPENDING

USAF approves SpaceX for US military launches

Poland increases spending to meet NATO target

The US Air Force has certified the private company SpaceX, founded by entrepreneur Elon Musk, to launch military and spy satellites, after two years of intensive reviews. This move opens up the market which has been a monopoly for a joint venture between Boeing and Lockheed Martin until now. Musk said the decision was “an important step toward bringing competition to national security space launch”. The US military has been relying on Russian built engines for space launches, which US lawmakers have outlawed from 2019 for launches. The certification of the SpaceX Falcon 9 rocket will provide a viable alternative ahead of the ban. Air Force Secretary Deborah Lee James said: “This is a very important milestone for the air force and the Department of Defense… SpaceX’s emergence as a viable commercial launch provider provides the opportunity to compete launch services for the first time in almost a decade.” Space X could have a chance to

Poland will increase its defence budget by 18 per cent, achieving the NATO minimum spending target of two per cent of GDP. The Polish Parliament agreed to meet NATO’s target from 2016 onwards, with a large majority vote of 402-2. Currently only America, Britain, Estonia and Greece meet the two per cent of GDP target, with Britain not yet committing to meet the target until 2016. The decision has been influenced by Russia’s actions in Ukraine and a lack of US military presence in the country. Defence consultant Marek Matraszek said: “Other countries in Nato benefit from the presence of US troops, so feel less of a need to increase their budgets, Poland doesn’t have the security of a permanent US presence.” He added: “Fundamentally what the government is trying to do is give Poland the assets to – in the worst case scenario – hold off Russia until READ MORE: Nato forces can tinyurl.com/qz9hewa be deployed.”

bid for the militaries’ new GPS satellite READ MORE: launches as early tinyurl.com/puqv8rb as July 2015.

AIRCRAFT

DB News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

IRAQ

British forces continue air strikes in Iraq

MOD invests £80 million in helicopter training equipment The Ministry of Defence (MOD) is investing £80 million in new helicopter simulator equipment to help train the Royal Air Force (RAF) and Royal Navy pilots and rear crews. The equipment will allow personnel to train in a realistic operating environment, enabling them to repeatedly practice manoeuvres and procedures safely. As a part of the £80 million investment, a £51 million contract was signed with Lockheed Martin to support Chinook Mk 6 training. The Chinook 6 simulator will be based at RAF Odiham in Hampshire and housed in a purpose built facility. It will include two flight deck simulators as well as a rear deck training device and a suite of computer based training facilities. A further £29 million has been awarded to AgustaWestland to provide Merlin Mk

4/4a aircrew Synthetic Training Devices, which will be located at the RNAS Yeovilton in Somerset, the main operating base for the Merlin Mk 4/4a helicopters. Air Vice-Marshal Julian Young, Director Helicopters at the MOD’s Defence Equipment and Support organisation, said: “Simulation is a solution that, when blended with live flying events, provides the optimum individual and team-level training. “Although it can never replace live training fully, being able to create a wide variety of training scenarios and operating settings can provide a more challenging, safer and controllable environment to help our forces practice in a way that is essential to effective READ MORE: mission tinyurl.com/puqv8rb preparation.”

British military forces have continued to play a significant role supporting the Iraqi forces fighting ISIL terrorists, providing extensive training programmes and launching air strikes. On 24 May, a Reaper destroyed an ISIL armoured vehicle that was in close combat with Iraqi forces in the west of the country. Reapers then provided surveillance support to four successful strikes by coalition aircraft on ISIL buildings and a bulldozer packed with explosives. In the same area, on 22 May, a Reaper successfully engaged terrorists, preventing the burying of improvised explosive devices next to a road and supported a strike on an building held by ISIL. In addition to air strikes, a team of British military instructors are making progress training Iraqi and Kurdish troops to meet the threat of improvised explosive devices. These devices have become a common weapon used by ISIL, which are left as booby-traps and impact the day-to-day lives of Iraqi civilians.

READ MORE:

tinyurl.com/mdz9b6v

Issue 12 | DEFENCE BUSINESS MAGAZINE

75


PERSONAL RECONNAISSANCE SYSTEM

PD-100 Black Hornet PRS is the smallest operational unmanned system in the world and has been used extensively in combat operations by NATO forces over the past few years. The system is described by its users as a “Game Changer” and a “Life Saver”, and has created a new standard and class for the smallest UAS.


DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

to that posed by the ‘lone wolf’. There has never been a greater need for an integrated approach to the acquisition and deployment of defence and security assets in the land, air and maritime environments – and to the rationale that guides them. DSEI 2015 will provide a platform that meets all these imperatives.”

EVENT PREVIEW

THE EVENT FOR DEFENCE PROFESSIONALS

Whil major ne market ew emerge s have is still a d, Europe player i significant n procuredefence m and sup ent ply

‘Defence and security through partnership and co-operation’ will be an over arching theme of DSEI 2015, the flagship event for the defence and security community taking place this September Defence and Security Equipment International (DSEI) is the world’s largest land, sea and air defence and security exhibition. The event, which takes place at ExCeL London from 15-18 September 2015, will feature a record 1,500 exhibitors providing a global showcase of innovation, seminar theatres offering free educations sessions and over 40 international pavilions. There will also be an impressive display of waterborne and unmanned system demonstrations, as well

COMMUNITY DSEI attracts the largest international community from defence and security sectors. The last event, which was held in 2013, attracted over 32,000 visitors, 156 programmed delegations from 56 countries and over 2,800 global VIPs who met with 1,489 exhibitors from 54 countries. The 2015 event is being planned as a forum where top figures from established and emerging nations in the defence community will be invited to describe how co-operation, ranging from joint operations to strategic alliances, is transforming the ability to counter threats to peace and security. Many delegates use their attendance at DSEI to hold bilateral and multi-lateral talks and some choose to share their views more widely, providing valuable insights into matters of global concern. DSEI’s truly international scope enables companies and individuals to build relationships, forge partnerships and access new markets by bringing key countries and entire geographical regions as well as specialist sectors all in one place. The event is expected to host over 40 dedicated pavilions which will host international exhibitions with 39 countries being represented. This year Latvia, Lithuania, Poland, Malaysia and Greece will be making their debut with others returning to do business in a global market. DSEI event director Duncan Reid explained why, at a time when Asia, the Middle East and South America are expanding their defence and security capabilities, a European based show will be the appropriate venue for this important debate. He said: “While major new markets have emerged, Europe is still a significant player in defence and security procurement and supply. It is also a highly important engine for the development of the key technologies that are increasingly being adopted by emerging markets via technology transfer and licensing agreements.” He continued: “The effectiveness of combined operations is demonstrated by the complementary nature of DSEI and Eurosatory, mirroring the Franco-British drive towards a Combined Joint Task Force. Both events cover land systems and security, however, DSEI also includes the air and maritime dimensions. Both events are truly 

as land, air and naval vehicle displays. The theme ‘Defence and security through partnership and co-operation’ has been chosen as it brings together the entire defence and security industry to source the latest equipment and systems and develop international relationships. Rear Admiral Simon Williams, Chairman of DSEI organisers, Clarion Defence and Security, said: “The threats to world order today are diverse and range from high tech cyber-attack

Issue 12 | DEFENCE BUSINESS MAGAZINE

77


Highlights Police & Military 3-27x56 PM II High Power Winner of the “extreme long range” competition of the US Special Operations Command. Since 2012 in use with the US SOCOM.

US SOCOM

Visit us booth #N6/373

3-20x50 PM II Ultra Short The ultimate short new DMR solution for optimal use with a backpacked red dot sight.

5-20x50 PM II Ultra Short With a length of less than 30 cm, the shortest sniper scope ever built.

1-8x24 PM II ShortDot DMR

The perfect solution for urban application. Currently in testing on the G28 by the German Armed Forces.

1.5-8x26 PM II ShortDot

The revolutionary new ShortDot scope with a 34 mm tube for longer range targeting without limitations.

5-25x56 PM II PSR Winner of the Precision Sniper Rifle Program of the US SOCOM. Since 2011, Schmidt & Bender has supplied the Special Operations Forces of the Army, Navy, Air Force & Marines.

3-12x50 PM II USMC Winner of the 2-year quality and endurance test by the U.S. Marine Corps. In use with the U.S. Marine Corps since 2005.

3-20x50 PM II DMR

The 3-20x50 PM II DMR has been in use with the German Armed Forces since 2011.

Precision makes the difference! For more product or dealer information visit: www.schmidt-bender.com or simply scan the QR-code Schmidt & Bender GmbH & Co. KG | Am Großacker 42 | D – 35444 Biebertal, Germany | Phone: +49 (0) 6409 - 8115 - 0 | info@schmidt-bender.de | www.schmidt-bender.com


EVENT PREVIEW  international, taking place in alternate years and each attracting attendees from well over 100 countries. Visitors from 121 nations attended DSEI 2013. They included representatives of key Asian economies such as India, Japan and Korea, big spending Middle Eastern nations, such as Qatar, Saudi Arabia and UAE, and Latin American countries with major defence and security commitments – Brazil, Chile and Colombia.” He concluded: “DSEI and Eurosatory are a very powerful combination, often reaching those parts of the world where regional tensions can inhibit attendance at local defence and security events.” SECURITY The global defence and security sectors needs are in continuous evolution as new threats to national security have to be countered, new markets are emerging and new capabilities are being developed. This need for military and

security forces around the world to procure platforms, systems and equipment that meet operational and budgetary imperatives is highlighted by the continued growth of DSEI. Security has become firmly established as the fourth pillar of DSEI. The 2015 event will see focus on critical areas of security, such as biometrics, cyber warfare, CBRN and counter terrorism. There will also be a Security and Special Forces zone with briefings by leading experts and capability demonstrations. Major suppliers who will be exhibiting include BAE Systems Applied Intelligence, CISCO, Cobham, Fujitsu, Lockheed Martin and Smiths Detection. Lt Gen Mark Poffley, Commander Force Development and Capability said: “Recent events have highlighted the need for an integrated and persistent security response across a wide spectrum of operations. The British Army is reconfiguring to meet the challenges of the contemporary security environment. An important part of this

The global defence and security sectors needs are in continuous evolution as new threats to national security have to be countered, new markets are emerging and new capabilities are being developed

DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

adjustment is establishing a close relationship with its industrial partners, seeking out innovative and relevant solutions as part of the Defence Growth Partnership and exploiting mutually beneficial agendas to defeat those who threaten our security.” ZONES DSEI will have a layout which will be dominated by themed zones, making the event easier to navigate and facilitate specified networking opportunities. The zones include: Land Zone, Air Zone, Naval Zone, Security & Special Forces Zone, Unmanned Zone, Medical Innovation Zone, Cyber, Communications, Tri-Service, and the Electronic Warfare zone, hosted by the AOC. The Land Zone is the largest zone at DSEI and features the land theatre for insight into the future of the international land sector. With prime contractors to niche specialist suppliers, the Land Zone demonstrates the latest platforms from major vehicle manufacturers and suppliers in the defence industry. Suppliers included Iveco, MBDA, Nexter, Pearson Engineering, Renault Defence, Selex ES and Streit group. The Air Zone offers a dedicated air theatre and an increased static vehicle display. DSEI’s air component is expanding to address the frontline operational requirements and support functions available to the aerospace sector. The 

Issue 12 | DEFENCE BUSINESS MAGAZINE

79


For fur ther information contact: Tablet Technologies Ltd 0844 5678 789 info@tablettechnologies.com


EVENT PREVIEW

DSEI 2015

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

 Zone includes a capability area dedicated to the aerospace supply chain; a comprehensive seminar programme reinforcing the show’s broader themes of procurement, training, export maximisation and SME support; and an outdoor static display area to provide the aerospace industry with a forum in which to showcase the latest innovations to existing and prospective international customers. Air Vice-Marshal Malcolm Brecht, Chief of Staff Air Capability, said: “DSEI 2015 enables us to highlight themes that will influence future UK air capability, and we will continue to pursue the excellent opportunity that DSEI 2015 provides to engage in high‑level industry briefings and bilaterals.” NAVEL ZONE The proximity of the Royal Victoria Dock enables DSEI to assign a Navel Zone which will play host to a range of vessels, from warships to high speed craft. It also includes an expanded marina and in depth scenarios to showcase related products, technologies and services. This zone will provided a valuable platform for the demonstration of new systems and equipment from the UK’s innovative maritime sector. 2015 is set to welcome more visiting warships than ever before at DSEI, showcasing a greater range of capabilities. The dock provides a valuable platform for demostrations of new systems and equipment from the UK’s innovative maritime sector. Visiting Naval Ships at DSEI 2013 included German Braunschweig Class corvette FGS Magdeburg; Dutch Holland Class corvette HNLMS Groningen; and Swedish Mine Counter Measure Vesels HSwMS Vinga and Ulvo. SECURITY & SPECIAL FORCES The dedicated Security & Special Forces Zone showcases security equipment and systems to counter priority threats, such as cyber attacks and terrorism, as well as an enlarged special forces and tactical equipment area. The new Security & Special Forces Zone centralises the security sector’s expertise with a bespoke community in order to increase networking opportunities for both exhibitors and visitors. Within the Security & Special Forces Zone, products and services ranging from security & special forces training, tactical equipment, perimeter security covert & overt surveillance & camera equipment and PPE, with exhibitors including EXPO, Henriksen, Kershaw, KNK Limited, Safe Tactics, SphereVision and Taskmasters. The Unmanned Zone will offer demonstrations from Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles. The Zone was successfully launched in 2011 and since then a series of stakeholders have increased their support, including the Association for Unmanned Vehicle Systems International (AUVSI). The result is a vastly augmented Unmanned Zone.

The Medical Innovation Zone will demonstrate the latest advances in clinical care from point of injury or illness through the entire treatment pathway to rehabilitation. Today the UK’s Armed Forces have to be equipped and trained to deal with a broad spectrum of operations, including humanitarian work, disaster relief and reconstruction. The Medical Innovation Zone features an original medical seminar programme, addressing the very latest topics, from NATO co-operation, adopting best practices from Afghanistan, to keeping the military fit, successful rehabilitation, pre-hospital care, developments in Platinum 5 trauma care and key innovations which have stemmed from recent military research. CONFERENCES AND SEMINARS DSEI is staging four conferences focused on the future of maritime, medical, and motorcraft technology. These DSEI Strategic Conferences will take place on Monday 14 September 2015, the day before the exhibition opens. The conferences will be open to the entire international defence and security community. Throughout the four days of the event, DSEI 2015 will offer seven seminar and briefing programmes dedicated to global partnerships, land, naval, air, unmanned, security and medical innovation. Through a series of panel debates, keynote sessions and live demonstrations, top level speakers from senior domestic/international military and leading industry stakeholders will share their thoughts on the latest future capabilities, technologies and innovations and procurement updates. For 2015, DSEI is introducing a seventh theatre to its seminar programme. The Global Partnerships theatre is dedicated to exploring key growth markets, export opportunities and global supply chain best practice, making it an internationally focused platform.

DSEI event director, Duncan Reid said: “DSEI attracts a top quality audience of more than 30,000 visitors to ExCeL London. We are focused on growing this number for DSEI 2015 and are targeting 100 official delegations, reinforcing the event’s position as the global hub of defence and security expertise. The expanded scope of the pre‑DSEI conferences will provide a valuable additional opportunity for visitors to learn about and discuss developments within three crucial areas of technology.” REGISTRATION Registration for DSEI 2015 is now live, and until 30 June, it is possible to register at the lowest rate available of £30 + VAT. From 1 July, the rate will increase, and then continue to rise towards the start of the event, so it really pays to book your ticket early. Registering in advance will aid the verification process. DSEI is a secure event, so all registrations must be verified and this procedure will be thorough. The new DSEI Community, due to go live soon, enables registered visitors to book in meetings with exhibitors; early registration means that you will have a wider selection of exhibitor and a better choice of time. As well as registering early, you can arrange your travel plans ahead of time by taking advantage of the preferential rates offered by DSEI’s Concierge Service, Zibrant. To make your DSEI 2015 experience run smoothly, Zibrant have selected different facilities that you may need during your stay in London. These recommendations range from accommodation to theatre bookings, Oyster cards and mobile phone rental.  FURTHER INFORMATION www.dsei.co.uk

Issue 12 | DEFENCE BUSINESS MAGAZINE

81


Advertisers Index

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

Award Winning Intelligent Perimeter Protection The most secure PIR solution on the market...in every way possible!

Reliable perimeter protection anywhere. Fully wireless solution for remote locations delivers drastic installation & labor cost savings. • Complete wireless installation available – communication & power • NO TRENCHING! • NO CONDUIT! • NO CABLING! • Alarm and fault reports are transmitted wirelessly • Intelligent power management with battery & solar power options:

Installations have never been this easy. iCommission. One-man commissioning and maintenance. • One person can commission and maintain the detectors • Quickest, easiest, most accurate solution to set-up on the market • Perform a simple walk-test in the detection zone • iCommission is a vertical axis alignment tool • ADPRO iCommission application is available on tablets and smartphones

• 2 years battery life with Alkaline and 5 years with Lithium • Battery life time extension via solar panel

Eliminate creep zone with 360PROtect™. • Provide maximum tamper protection with 360PROtect - eliminate all creep zones • 360PROtect is an additional sensor built into ALL PRO E-detectors to cover the area from up to 3.2 feet around the pole/wall up to 26.2 feet in front of it • All zones alarm separately into Video Central Platinum via a RS485 bus, operators can quickly identify which zone is alarming and visually verify w ith a camera • Detection for attempted surface mount removal, masking, & twisting • Universal cable managed bracket with tamper switch for added vandal protection • Advanced 3D-tamper detection signals an alarm if detector alignment is altered • Up to 4 meters (13 feet) mounting height to minimize the risk of vandalism

www.xtra www www.xtralis.com w.xtralis com

• Solution simplifies installation design, no need for overlapping corners

Detect more with less! Extend your perimeter protection to 220 meters with one detector and save up to 65% in installation & operating costs. • World’s first 220 meter curtain PIR • Reduces the number of poles, detectors, and cabling required for an installation • Superior detection performance and accurate zones (up to 7 with two detectors pointed towards each other) to precisely enable cameras to provide visual verification • Achieve double-knock protection • Up to 40% cost savings in comparison to other Outdoor PIR systems

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Air & Ground 56 Alert Innovation 63 Anixter International 34 APM Group 32 Arinc 48 Assa Abloy 51 Blue Zulu Marketing IBC Broden Media 16 BSIA 12 CEA 4 Cop Security 46 Cybx (Serco) 30, 31 Dosarrest Internet Security 28 Fire Eye 20 Foster + Freeman 64 Frontier Pitts 56 Garnett Keeler Public Relations 14 Gigamon 18 Heald 39 Heinan Hopman 6 Hesco Bastion 70, 71 Holmatro Rescue 8

82

DEFENCE BUSINESS MAGAZINE | Issue 12

Honeywell 10 Hunter Global 24 ISSEE 58 Iveco BC Kelvin Hughes 60 Marshalls 40, 41 Panasonic 44 Prox Dynamics 76 Qioptiq 68, 69 Quantum Corporation 50 Rangemaster Precision Arms 74 Ring Sights Defence 22 Safety Flex Barriers 36 Schmidt & Bender GmbH 78 Sedicii Innovations 26 Sensurity 53 Tablet Technologies 80 Terrafix 54 The FPA 66 The Mercian Labels Group IFC UBM Information 52 Xtralis UK 38 Zaun 42, 43


ONLINE DELEGATE AND VISITOR REGISTRATION NOW OPEN Book by 31 July 2015 to save on delegate fees. Reduced rates for public sector attendees 3-DAY CONFERENCE Hear from more than 75 international speakers in a topical and interactive programme covering current and future use of biometric technology in government and commercial applications Presentations and panel sessions cover: • Identity management in the digital world • Data protection, privacy and mobility • Law enforcement, forensic and military applications • Data retention in law enforcement • ID at the borders and the future of travel • Biometrics in developing economies • Customer authentication • Mobility, payments and secure authentication • Liveness detection discussion • Research, innovation and technology developments

#biometrics2015 #biometricslive

FREE EXHIBITION AND SEMINARS

Biometrics Live 14-15 October 2015

View the technologies and meet with the suppliers and integrators of biometric solutions for identity management, authentication and security.

Wednesday 14 October: 09.00-17.00 Thursday 15 October: 09.00-16.00

Organised by:

www.biometricsandidentity.com

In partnership with:


MPV

A protected environment for every mission.

Iveco DV’s range of Multirole Vehicles, Tactical and Logistic Trucks and Armoured Fighting Vehicles covers the full spectrum of on- and off-road military requirements and represents a well thought through, comprehensive and effective response to the needs of the military customer. Iveco recognises that this needs change in response to the evolving operational environment, developing doctrine and changing threat. As a part of the company’s commitment to our custo-

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

mers’ needs, we aim to identify or anticipate at an early stage how requirements are likely to develop. As a result, the whole product range is subjected to a continuous development process. Evolving needs are fed back to Engineering, who in turn develop a steady stream of enhancements in terms of payload, mobility and protection. Where necessary, complete new vehicle families are developed.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.