Counter Terror Business 23

Page 1

www.counterterrorbusiness.com | ISSUE 23

NEWS: CAMERON OUTLINES NEW MEASURES TO TACKLE EXTREMISM TRANSPORT SECURITY

PERIMETER SECURITY

DSEI 2015

CARGO THEFT

A NEVER-ENDING RACE What can be done to halt the theft risk to cargo in the supply chain? EVENT PREVIEW

MILIPOL PARIS 2015

The event for key players in state security

BORDER SECURITY

SECURING EUROPEAN BORDERS The ways of exploring British and French borders at a commercial level

UK News: centre ench and Fr p people t s to o lers p53 smugg NCE

ZINE

AGA ESS M

EFE FOR D

USIN THE B

DSEI review 2015 p 5 p5



COUNTER TERROR BUSINESS

How should we protect our borders? And how do we respond to those hoping to cross them?

www.counterterrorbusiness.com | ISSUE 23

NEWS: CAMERON OUTLINES NEW MEASURES TO TACKLE EXTREMISM TRANSPORT SECURITY

PERIMETER SECURITY

DSEI 2015

European governments are coming under increasing pressure to deal with the constant flow of migrants onto the continent.

CARGO THEFT

A NEVER-ENDING RACE What can be done to halt the theft risk to cargo in the supply chain? EVENT PREVIEW

MILIPOL PARIS 2015

The event for key players in state security

BORDER SECURITY

SECURING EUROPEAN BORDERS The ways of exploring British and French borders at a commercial level

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UK News: centre nch and Fre p people to sto rs p53 smuggle CE

ESS MAGA

ZINE

FOR DEFEN

THE BUSIN

DSEI view 2015 pre p55

Home Secretary Theresa May has signed an agreement with French Interior Minister Bernard Cazeneuve to implement a ‘control and command centre’ to help alleviate the crisis in Calais. After admitting to a ‘difficult summer’ with high levels of migrant activity on the border, May is confident that the joint efforts of the UK and French will prove fruitful. Defence Secretary Michael Fallon has called for a ‘comprehensive approach’ to tackle the mass migration across the Mediterranean, deeming the issue ‘a European problem’. Fallon has been a very busy man lately, stating on a visit to Kiev that the situation in Ukraine was ‘still red-hot’, before announcing that the government will enhance military training in the Eastern European country. How Fallon will respond to the latest news that reports Russian troops on Ukrainian borders has risen to over 50,000 remains to be seen. Perhaps the increase in counter terrorism expenditure from the latest European Budget will help alleviate some of the pressures on border control in France and Ukraine. The European Parliamentary Research Service has published the data, and Counter Terror Business covers the story on page 10. Elsewhere, next month welcomes the return of DSEI, the much anticipated defence and security event. Taking place on 15-18 September at London’s ExCel, the event contains leading exhibitors from the land, naval, air and security sectors, as well as a Ministerial Keynote speech from the jet setting Michael Fallon. Read more about what not to miss at DSEI on page 55.

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu ASSISTANT EDITOR Michael Lyons EDITORIAL ASSISTANT Tommy Newell PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Vickie Hopkins, Charlotte Cassar REPRODUCTION & PRINT Argent Media

© 2015 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

3


Avon Barrier


CONTENTS 10

07 CTB NEWS

New measures to tackle extremism; ISIL‑linked group claims responsibility for Cairo attack; and Counter-Terrorism and Security Act comes into force

10 EUROPEAN FUNDING

Following the latest EU Budget announcement, Counter Terror Business analyses the figures and what it means for counter terrorism spend

13 MILIPOL PARIS 13

The World Borderpol Congress is the only platform where the border protection, management and security industry policy-makers discuss the international challenges faced in protecting borders

37 PERIMETER SECURITY

The Perimeter Security Suppliers Association’s questions what PAS 68 actually means, and what it can say about the procurement of security solutions

40 TRANSPORT

21 CYBER SECURITY

43 TRANSPORT SECURITY EXPO

25 CYBER SECURITY

The Global Cybersecurity Index measures each nation’s level of commitment to the ITU’s Global Cybersecurity Agenda, with the aim of highlighting potential areas for improvement

30

33 WORLD BORDERPOL

Milipol Paris brings together public and private organisations in the security field. Taking place on 17-20 November at Paris Nord Villepinte, Counter Terror Business previews the leading show

With cyber security threats and data breaches increasing, the importance of IA15, the government’s cyber security event, has never been more important. Taking place on 9-10 November, IA15 is an event not to be missed

30 BORDER SECURITY

Following the extensive news concerning migrants in Calais attempting to gain access to the UK, James Kelly of the British Security Industry Association analyses the best practice concerning border security

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Thorsten Neumann, of the Transported Asset Protection Association comments on why the theft risk to cargo in the supply chain has never been greater

Transport Security Expo has become the main platform for the government, industry and academia to gather and discuss the threat against transportation

47 COMMERCIAL UAV SHOW The world’s largest gathering of the commercial and civilian UAV community will gather on 20-21 October at the ExCel

49 EMERGENCY SERVICES

The Emergency Services Show is one of the key events for anyone involved in emergency planning, response or recovery

50 IFSEC INTERNATIONAL

IFSEC International took place on 16-18 June at the London ExCel. Counter Terror Business reviews the show highlights

40 43

55

THE

53 DEFENCE NEWS

UK and France to form command centre to stop people smugglers

55 DSEI 2015

‘Defence and security through partnership and co-operation’ is the theme for the world’s largest land, sea and air defence and security exhibition

Counter Terror Business

for trade professionals and military experts from around the world, which takes place at ExCeL London from 15-18 September 2015

BUS

INES

SM AG

AZIN

E FO R

DEF

ENC

Tur for th n to page 5 e la 3 businetest defenc e and fess news atures

www.counterterrorbusiness.com Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

5

E


PANASONIC TRUE 4K VIDEO SURVEILLANCE CAMERAS THE EVIDENCE IS CLEAR WV-SFV781L ULTRA HIGH DEFINITION CAMERA IS THE PERFECT COMBINATION OF POWERFUL 4K IMAGING TECHNOLOGY AND RESILIENT CRAFTSMANSHIP POWERFUL -

4K ultra high definition for crystal clear monitoring and surveillance 12mp high sensitivity sensor for 4K camera Ultrawide optical 6x zoom lens for perfect distance shots Smart depth of field, VIQS (variable image quality on specified area) technology and motion detection - Smart infrared led equipped to take pictures at 0 LX - Low sensitivity with 0.3lux at colour mode - 30fps at 4K resolution (3,840 x 2,160)

RESILIENT -

Vandal-resistant mechanism (IK10) HLC (high light compensation) technology reduces strong light Fog compensation function Dehumidification device IP66 rated water and dust resistant (compatible with IEC60529)

TO FIND OUT MORE, VISIT: business.panasonic.co.uk/security-solutions OR CALL: +44 (0) 2070226530


ANTI-TERROR LEGISLATION

Cameron outlines new measures to tackle extremism Prime Minister David Cameron outlined new measures to tackle home grown extremism in a keynote speech on 20 July. Opening his speech, Cameron claimed that to tackle extremism, first we must understand why it is happening. He outlined what he calls the ‘grievance justification’, which places the blame for extremism on historic injustices, recent wars, poverty or hardship. Cameron said that this view point must be challenged, and that while these factors are important, people would still be drawn to extremism. Instead, Cameron posited that ‘the root cause of the threat we face is the extremist ideology itself’, which draws young people in. He said: “Like any extreme doctrine it [extremist ideology] can seem energising, especially to young people. “You don’t have to believe in barbaric violence to be drawn to the ideology. No one becomes a terrorist from a standing start, it starts with a process of radicalisation.” Cameron explained further: “The adherents of this ideology are overpowering other voices within Muslim debate, especially those trying to challenge it. There is also the question of identity. We have to confront a tragic truth that there are people born and raised in this country who don’t really identify with Britain. “Indeed, there is a danger in some of our communities that you can go your whole life and have little to do with people from other faiths and backgrounds.” Cameron claimed that the UK must ‘de-glamorise’ the extremist cause by taking ‘its component parts to pieces’. He concluded: “We should expose their extremism for what it is – a belief system that glorifies violence and subjugates its people, not least Muslim people. We should contrast their bigotry, aggression and theocracy with our values.” The Prime Minister then went on to outline

a summary of new measures that will be implemented to help tackle extremism within the UK. The government will look to set up a new scheme that will allow parents to cancel the passports of their children if they fear they are trying to leave for Syria. Additionally, Cameron said that the government will look at social housing to try and prevent segregated communities. Schools will be incentivised to become more integrated, introducing new measures such as shared school sites and the creation of new free schools in the most segregated areas. There will be an overhaul of the way extremism is tackled in prisons, and new powers will be given to prevent hate speech through public forums and foreign television channels. READ MORE: tinyurl.com/panx7ck

ISIL

ISIL has lost over 7,000 fighters in the past year, claims Australian defence chief Australia’s Chief of Joint Operations David Johnson has claimed that the terrorist organisation ISIL has lost more than 7,000 fighters over the past year. Speaking to reporters in Canberra, Johnson said that progress was being made in the fight against ISIL and that the group was now more centralised in Iraq. He claimed that the group was now ensuring more effort in holding ground,

instead of taking control of new areas, with freedom of movement now more limited in areas such as Ramadi. Johnson said: “What we are seeing is that instead of moving forward or going on the offensive, they are often forced to be defensive and to try and slow down and delay Iraqi forces.” READ MORE: tinyurl.com/qx5zxam

NEWS IN BRIEF

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ISIL-linked group claims responsibility for attack in Cairo Militants affiliated with terrorist organisation ISIL have claimed responsibility for an explosion in Northern Cairo, Egypt. The blast emanated from a car near the national security building in Shubra al-Khaima, blowing off part of the buildings facade, damaging near by apartments and injuring six police officers. The assailant is reported to have fled the scene on a motorcycle. The group claimed responsibility for the attack on social media, with a logo that read ‘Islamic State, Egypt’. The message claimed the attack was in retribution for the ‘martyrs of Arab Sharkas’, referring to six men who were hanged in May after a military trial, which was criticised by multiple human rights groups. The attack follows the recent increase in insurgent attacks in Egypt, including the assassination of the chief prosecutor, Hisham Barakat, in a daylight bombing in June. READ MORE:

tinyurl.com/nuzhxcd

UK and Singapore sign cyber security pact Prime Minister David Cameron has announced that the UK and Singapore will double the amount of its joint spend to protect businesses and infrastructure from cyber attacks. Speaking at a joint press conference with Lee Hsien Loong, Prime Minister of Singapore, Cameron said that funding will increase from £1.2 million to £2.4 million over the next three years. Emergency Response teams will work together and online competitions and learning programmes will be developed to train ‘the cyber professionals of the future’. The UK will also provide assistance to the Singaporean navy to improve maritime security. Cameron said: “With 15 per cent of all UK shipping passing through the Malacca and Singapore Straits, it is in our national interest to work with Singapore on this.” The UK has also urged the EU and the Association of Southeast Asian nations to ‘jump start’ talks on a free trade area that could be worth £3 billion the UK economy. READ MORE: tinyurl.com/p4prur7

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

7


www.apmg-cyber.com


PREVENTION

Counter-Terrorism and Security Act comes into force Key public bodies across the country are now legally required to take steps to prevent people from being radicalised under new counter-terror measures. The Prevent duty is a part of the Counter-Terrorism and Security Act 2015 and came into effect on 1 July 2015. Schools, universities, prisons, councils, police and NHS trusts are now expected to have ‘due regard to preventing people from being drawn into terrorism’. These responsibilities include recognising the signs that someone may be in danger of being radicalised and understanding the proper measures to access help and support. Schools have been placed under a new duty of care to their pupils and staff, which includes safeguarding them from the risk of being drawn into extremism. According to the guidance, schools and universities should be safe places, where children and young people can discuss sensitive topics to better understand how to challenge extremist ideas. Local authorities are now required to perform regular checks on how public buildings are used and also monitor informal school trips, supplementary learning facilities and after school groups. Security Minister John Hayes said: “We have seen all too starkly and tragically the dangers of radicalisation

and the devastating impact it can have on individuals, families and communities. “The new Prevent duty is about protecting people from the poisonous and pernicious influence of extremist ideas that are used to legitimise terrorism. “Protecting those who are vulnerable and at risk of radicalisation needs to be a job for all of us. The new duty will make sure key bodies across the country play their part and work in partnership.”

CYBER CRIME

ISIL suspected of Foreign Office hack

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The names, email addresses and passwords of staff at the Foreign Office and a number of local authorities are believed to have been leaked onto the internet by terrorist organisation ISIL. The majority of hacked data is believed to be related to over 1,000 American military personnel, which was posted online by Australian ISIL member Neil Prakash, also known as Abu Khaled al-Cambodi. In addition to the American military personnel, information relating to workers at Croydon and Stockport councils, as well as the Foreign Office, are also thought to be included. The credibility of the leak has not yet been confirmed, but a spokesman for the US Department of Defense said: “We are aware of the report. Cannot confirm credibility at this time. The safety of our service members is always a primary concern. We encourage our personnel to exercise appropriate OPSEC (operation security) and force protection procedures.”

READ MORE:

tinyurl.com/q2y5kp7

Anjem Choudary faces terrorism charges Anjem Choudary, 48, is one of two men to have been charged with inviting support for the terrorist organisation ISIL. The other man facing charges is Mohammed Mizanur Rahman, 32. The two men were arrested on 25 September 2014 on suspicion of being members of ISIL and are now being charged with one offence under section 12 of the Terrorism Act, 2000. Sue Hemming, of the Crown Prosecution Service, said: “It is alleged that Anjem Choudary and Mohammed Rahman invited support for ISIL in individual lectures which were subsequently published online.” READ MORE: tinyurl.com/pgv5z6s

RADICALISATION

Pupil ‘at risk of joining ISIL’ has passport seized A high court official has seized the passport of a schoolgirl in Bethnal Green thought to be at risk of travelling to join ISIL. The 16 year old girl’s identity has been ordered to remain a secret by High Court family division judge Mr Justice Hayden, but she is believed to be close friends with four other pupil’s from her school, the Bethnal Green Academy, who have already travelled to Syria. The girl’s two sisters have also had their passports confiscated, and they must be held by an officer of the court and only returned for approved trips abroad. In response to opposition that argued

against the confiscation of the girl’s sisters passports, Judge Hayden said: “Where that is a measure taken to secure the safety of their sister, it seems to me to be one relatively minor consequence. We are seeking to protect from a risk of very great magnitude, for we know that those who travel to ISIS [ISIL] to participate in READ MORE: jihad risk their tinyurl.com/nobx5vj own lives.”

READ MORE:

tinyurl.com/qyx3qpw

East London family of five arrested in counter terror raid Five members of the same family were detained by counter terror police in a raid in East London. A man aged 51, a woman aged 53 and three teenage girls, aged 16, 17 and 19, were all taken into police custody on suspicion of possessing information likely to be useful to a person committing or preparing an act of terrorism. The man was also arrested on suspicion of possessing a false passport. The 16 year old girl is believed to have been arrested before on 2 July on suspicion of the preparation of terrorism, and on bail until September.The 15 year old girl is thought to be the youngest female in Britain arrested in suspicion of terrorism. READ MORE:

tinyurl.com/p9ytkr2

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

9


Counter Terror Funding

Counter Terrorism funding in the EU Budget As the focus on counter terrorism has progressively centred itself in the global spotlight, the spending on counter terrorism has dramatically increased. Counter Terror Business analyses the latest European Union budget and what it means for counter terrorism spend It would seem perfectly feasible that there be a direct correlation between terrorist threats and spending on counter terror, almost in the form of a cause and effect relationship. It is now a regularity to pick up a newspaper or turn on the six o’clock news and see a report on the terrorist activities of Islamic State of Iraq and Syria (known predominantly as ISIL, or more recently Da’esh). The most attention-grabbing news of this year has focussed upon the flow of jihadists in and out of the Middle East, and the topic of counter terrorism has flowed wider afield, noticeably into the education sector. It was no surprise therefore that following election victory in May, much of the Tory fall out centred upon a reform of the European Human Rights Act and the introduction of a British Bill of rights, somewhat overshadowing similar calls in Europe for a common European Union (EU) foreign and security policy and a notion towards cooperation with non-EU bodies on counter terror related issues. Earlier this year, following the terrorist attacks

10

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

in Paris, the French Council of the Muslim Faith recorded a 110 per cent surge in reported ‘Islamophobic’ incidents. Far-right nationalist groups operating in the United Kingdom have started campaigns such as ‘Christian Patrols’, while in Germany the group Patriotic Europeans against the Islamisation of the West, or ‘Pegida’, was created in 2014, to oppose the alleged ‘Islamisation’ of the Western world. It makes sense therefore that with a heightened political awareness, a greater public desire, and a undeniable need to find a solution, EU counter terror funding has grown.

spending has increased by an annual average of $360 billion. Although it remains impossible to gain exact figures on EU and member state counter terror spend, it is estimated to have increased from €5.7 million in 2002 to €93.5 million in 2009. The same study estimated that EU spending in the areas of freedom, security and justice had witnessed an 163 per cent funding boost between 2006 and 2011. In the latest figures, funding for Security and Citizenship – as it was renamed under the 2014‑20 Multiannual Financial Framework (MFF) – was slightly reduced from the 2014 to 2015 budget from €2,172 million to €2,146.73 million. However, spending on counter terrorism increased. The 2007-13 MFF included a €140 million programme for the ‘Prevention, Preparedness and Consequence Management of Terrorism and other Security-related Risks’ (CIPS), which was designed to protect citizens and infrastructure from terrorist attacks. Under the more recent 2014-20 MFF, the Internal Security Fund (ISF) was promoted. The ISF is the financial instrument

Created, in 2005 nter cou the EU strategy m terroris es several includ s to tackle e measur m, including terroris omotion of the pr ocracy dem

INCREASING SPEND According to the European Parliamentary Research Service, the USA’s homeland security


designed to support security‑enhancing initiatives in the EU, and is divided between borders and visas, and police issues. The ISF has a €3.8 billion budget, of which counter terrorism is only a small part. More accurately, the ‘ISF-Police’ component of the ISF is aimed at ensuring security in the EU, including counter terrorism as one of its prominent components. This instrument has a budget of €1,004 million (€662 million through shared management, where actions are carried out by the Member States, and €342 million through direct management by the Commission). However, it is not solely through the ISF that the EU is spending on counter terror. Elsewhere, the Commission made €1.4 billion available for security research under the Seventh Framework Programme for Research (FP7) between 2007-13. The aims of the projects funding included the development of technologies and knowledge to enhance security against terrorist threats. COUNTERING BUDGETARY CRITICISM Over the years, the EU has set up new budget lines to promote studies and measures to enhance security. During the budgetary procedure for the 2015 budget, for instance, Parliament proposed, and secured, a €10 million increase for activities aimed at combating cross-border crime; an additional €20 million in reserve for Frontex; as well as additional posts for Europol. Nonetheless, the EU’s handling of recent counter terror activities has not been without ardent criticism. There remains continuous debate as how to best improve the EU response to terrorism. Proposals for amendments to EU counter terrorism legislation includes a call to

renew the Terrorist Finance Tracking Programme and the implementation of a new Directive on Money Laundering. A number of further proposals to amend the EU counter terrorism strategy are listed in the resolution on counter terrorism adopted by the Parliament on 11 February 2015. The resolution emphasises three points, the first of which revolves sround a review of existing law enforcement measures. A case in point is the finalisation of the EU Passenger Name Record Directive, while another is the revision of the European Arrest Warrant. A 2013 assessment found that between 2005 and 2009, almost three quarters of the incoming warrants were not executed, resulting in an estimated cost of €215 million. Secondly, the resolution calls for the strengthening of the network of information shared about terrorism. One popular suggestion put forward in practice would be by creating a European counter-terrorism platform within Europol, to guarantee that all relevant data are shared within the EU, and not simply held by the Member State. Lastly, the resolution encourages the adoption of an external EU strategy to combat international terrorism, forged through dialogue between experts in security and development. THE FOUR PILLAR STRATEGY Created in 2005, the EU counter terrorism strategy includes several measures to tackle terrorism, including the promotion of democracy, dialogue and good governance. This strategy is based on four pillars –

Under the first pillar, the EU not only coordinates national policies, but also helps to disseminate best practice and knowledge across Member States. Among the measures included under the prevention pillar is the promotion of democracy and education through assistance programmes, explaining European policies to the wider world, and the fostering of inter-cultural dialogue. The protection pillar aims to reduce the vulnerability of targets of terrorist attack and to limit the resulting impact of attack. This includes critical infrastructure protection, cyber security and the Passenger Name Record system currently being negotiated between the Commission, Council, and Parliament.

Counter Terror Funding

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THE PURSUIT OF COOPERATION The first goal of the pursuit pillar is to counter terrorism across borders, while the second is to eliminate sources of terrorist financing by carrying out inquiries, freezing assets and impeding money transfers. The European Arrest Warrant, designed to bring perpetrators to justice, also falls within this pillar. Additionally, the fourth pillar, response, aims to enhance response management mechanisms to be used in the event of a terrorist attack in a Member State. In this case, the Commission’s contribution consists of facilitating the coordination of Member States’ operations. While counter terrorism remains predominantly the responsibility of national policy dictatorship, its relevance on a European level has developed. The first platform for European cooperation on

According to the European Parliamentary Research Service, the USA’s homeland security spending has increased by an annual average of $360 billion prevention, protection, pursuit and response. The first and third pillars deal with external measures, while the second and the fourth focus on internal measures. Most work has been done under the protection pillar, where most of the activities are led by the European Commission. There have also been successful actions under the prevention pillar, owing to the increased relevance of Europol and Eurojust. The pursuit and response pillars have seen less activity. The prevention pillar’s main goal is to prevent terrorism by identifying and countering methods from recruiting new terrorists, seen most recently in European conversion to Islam. An investigative study by the Nixon Centre revealed that, of the 373 Muslim terrorists arrested in Europe and the US between 1993 and 2004, 41 per cent were Western nationals. Since 2013, the ‘foreign fighters’ issue, those individuals who convert for ideological reasons, is a top priority for EU action under the prevention pillar.

counter‑terrorism, known as ‘TREVI’ (Terrorisme, Radicalisme, Extrémisme et Violence internationale), was created in 1976. Further steps towards cooperation in tackling terrorism at EU level include: the Schengen Agreement of 1985, which abolished all internal borders between participating Member States and enhanced judicial and border cooperation; the 1992 Maastricht Treaty, which reorganised justice and home affairs cooperation, including anti-terrorism efforts within a ‘third pillar’ and created the law enforcement agency Europol; the first EU Action Plan to fight terrorism, which in 2001 established a European Arrest Warrant and provided for a common definition of terrorist offences; the appointment of the EU’s first Counter-Terrorism Coordinator (Gijs De Vries in 2004); and, finally, the adoption of the first overall counter-terrorism strategy in 2005. L FURTHER INFORMATION www.europarl.europa.eu/portal/en

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

11


PERSONAL RECONNAISSANCE SYSTEM

PD-100 Black Hornet PRS is the smallest operational unmanned system in the world and has been used extensively in combat operations by NATO forces over the past few years. The system is described by its users as a “Game Changer” and a “Life Saver”, and has created a new standard and class for the smallest UAS.


EVENT PREVIEW

Milipol Paris

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The exhibition for internal state security Milipol Paris, the international event for key players in the internal State security sector, will open its doors from 17-20 November 2015 for four days of exhibitions, meetings and debates about public and industrial security Milipol Paris, following in the footsteps of the 18 previous exhibitions, will once again confirm its place as the world’s leading security exhibition in 2015. In 2013 the exhibition continued to extend its influence, with a notable increase in exhibitor and international visitor numbers. Milipol Paris 2015 will build on this, welcoming all of the industry’s key players. Purchasers, suppliers and experts will all be there to discuss new security issues and discover new technologies. Governmental concerns will also be addressed: combating terrorism, protecting citizens, ensuring safe cities, providing local security and protecting against major risks will be at the heart of the debate. The industry’s top performing companies will present their products and innovations. Among the products presented, a special focus will be on new information, observation, surveillance, prevention and warning systems.

THE HISTORY OF MILIPOL From 1970 to 2013, international economies and security have been evolving very rapidly. The creation of Milipol replied to a growing demand for information and matchmaking in the field of internal security, before developing into the areas of civil defence and major risks. At the end of the 1970s, various French manufacturers supplying police equipment were worried that they had limited commercial contacts at an international level. Contrary to the Aeronautics and Defence sectors, the Interior Security sector did not have a promotion and communications platform that matched its importance in France. As a result, the idea of organising

a specific international exhibition took hold. EXPOL (Exposition Police), the first private initiative, showed the way. In 1984, the International Milipol Committee came into existence as an association whose goal was the promotion of security technology and equipment. That same year, the first international Milipol Show was organised in Paris as the principal information and public‑relations tool, open to professionals in the field of security, including manufacturers, end-users, buyers and exhibitors of all nationalities. The quasi‑confidential field of police, civil and military security equipment, virtually unknown to the general public until that time, was thus brought to light. E

After s iou 18 previons, exhibit ris will Pa Milipol n confirm its ai once agas the world’s place ng security leadi ition in exhib 5 201

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

13


Milipol Paris

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW  While the subsiding cold war still held centre stage, security services were already at work in the wings, fighting against such growing menaces as criminality, drugs, organised crime, terrorism, industrial and economic espionage. They expressed their latest requirements and needs for equipment, while investigating all the technologies available. The Milipol Show evolved within this climate of expectation and demand. It broadened out to include the field of security which encompasses private and public communities, that of industry and business, the protection of populations, and internal State security. Held annually during the 1980s as a leading security event, the Milipol Paris Show found its current rhythm as of 1991, the year in which the biennial scheduling was adopted. In 1995, it acquired new dimensions of considerable importance. As it was now held under the patronage of the French Ministry of the Interior, the Milipol Paris Show became an official event, along the same lines as the international Eurosatory exhibitions for land armament, Euronaval for naval equipment and the Paris-Le Bourget Aeronautics-Aerospace Exhibition. Today, the international Milipol Trade Show is recognised as a result of its professionalism and the quality of its exhibitors and visitors attending from around the world, all from the various security sectors. FIVE THREAT THEMES The strategic and technical innovations for tomorrow’s international security issues are being showcased by exhibitors and presented in round tables and in expert debates; all of which brand this exhibition as the world reference in the internal State security segment. Five major issues have been clearly defined for the 2015 edition. These include: Anti-terrorism and more specifically issues such as biometrics as a means to manage identification for immigration and border control systems as well as crisis control, intelligence and special forces; Drones, civil or military, intelligent and connected (Internet of things) and the laws that regulate their use; Cyber security and what it implies for general IT systems, data protection, Big Data, banking and fiduciary security or for the war against organised trafficking; Safe cities involving crowd control, law enforcement, urban security and local public safety, industrial and high security site protection, video protection and data analysis; and major risks involving victim assistance, emergency management, logistics back-up, command hubs, analysis and risk management, fire brigade interventions, the protection of civilians, first aid and the specificities of CBRN risks. The Milipol Paris show covers an extensive range of technologies and services made to anticipate, prevent and manage the threats and risks to the internal security of all states

14

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

and their most sensitive infrastructures. For a better understanding of the states that these five major topics represent, a committee of international experts will deliver their input in terms of analysis and opinion. A first this year, the committee is composed of eminent personalities, researchers and high ranking consultants, as well as many other opinion leaders on all subjects linked to internal State security. CONFERENCES Milipol Paris presents a high quality programme of conferences, workshops and round tables. This year’s showcased topics are Anti-terrorism, Cyber Security, Safe Cities, Major Risks, and New Threats/New Technologies. Milipol Paris has invited high level academics, trade journalists, members of prestigious institutions and participants from the Ministry of Interior as well as French and International personalities to constitute its advisory board. With conference sessions in both French and English there is plenty of opportunity to learn, meet with field experts and witness debate on the most topical state security topics. On Wednesday 18 November, Armand Nachef will be conducting the first keynote speech for the Counter Terrorism strand of the conference, entitled ‘Horizon 2020 Security’.

Opening with a keynote by Guillaume Poupard of Anssi (National Security Agency Information Systems), the first panel debate will be on ‘Cyber Warfare, Cyber Defence and Corporate Interests. The panelists include Jean-Yves Latournerie of the French Ministry of Interior, Alain Julliet, President of CDSE (Corporate Club Safety Managers) and Kevin Limonier, Researcher at the French Institut of Geopolitics. This is immediately followed by an English panel debate chaired by Frederick Douzet, Chairwoman of the Castex Chair of Cyber Strategy, Professor at the French Institute of Geopolitics at Paris 8 University. The Cyber Security section will conclude with a conference, hosted by Nicolas Arpagian of INHESJ (National Institute of Advanced Studies for Security and Justice), entitled ‘GAFAM or State, Who Do You Trust Most to Determine Your Identity?’. The Equipment and Innovation conference, delivered entirely in French, consists of three panel debates on ‘The evolution of materials and equipment used in policing and crowd control’, ‘Textile and Innovation’ and ‘Research and development: standards, testing, quality control’. The last conference, ‘Major Risks - Emergency Management’, is delivered in English. The panel debate will be moderated by Emily Hough, editor in chief of Crisis Response. The conference will be delivered by Carole Dautun, Risk and

In a single dedicated area, each exhibitor will be able to promote its own innovations and solutions in terms of products and services, to targeted professional visitors from around the world Nachef is if the coordinator of the French Security NCP Consortium, CEA. Following on from that will be Professor Richard English’s keynote on ‘Assessing the Global Terror Threat’. Professor English is the Director of the Handa Centre for the Study of Terrorism and Political Violence at the University of Saint Andrews. The Counter Terrorism conference will also include a panel debate on ‘Understanding the Global Terrorism: Lessons Learnt’ which will be moderated by Strategy Consultant and Writer Guy-Phillipe Goldstein. The Safe Cities conference begins with a keynote by Steven Webb of Frost & Sullivan. This precedes a panel debate on ‘Safe and Smart Cities’, moderated by Thierry Vincon of the Ministerial Delegation for Security Industries, French Ministry of Interior, and a case study on ‘Euro 2016 – Challenges and Responses’ by Patrick Aujogue of Keolis. Both of these will be addressed in French. CYBER SECURITY The Cyber Security conference will also be delivered in a mixture of French and English.

Crisis Department Manager at INHESJ, and will examine the shift ’Towards a Shared Culture of Risk and Crisis Management’. EXHIBITORS AT THE MAJOR RISKS AREA Milipol Paris 2009 created a Major Risks area at the heart of the show, enabling exhibitors to present for the first time their solutions in the fields of natural, technological, industrial and CBRN emergencies. Based on this initial success, the dedicated area continues to grow in 2015 with a primary focus on technological and industrial risks, natural risks, health related risks and what is deemed as a major threat risk. Major international players, both public and private, will present their innovations in this constantly evolving field at Milipol Paris 2015. The major risks covered include prevention, protection, monitoring, detection, identification, analysis and intervention. In a single dedicated area, each exhibitor will be able to promote its own innovations and solutions in terms E



Milipol Paris

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW

The Milipol Paris show covers an extensive range of technologies and services made to anticipate, prevent and manage the threats and risks to the internal security of all States and their most sensitive infrastructures  of products and services, to targeted professional visitors. Companies and organisations from around the world, including manufacturers, distributors and service providers, will be exhibiting at this years event. The wide range of exhibitors cover the themes of the event, with those involved in prevention and protection, ensuring security, surveillance, identification, the fight against crime, and managing immigration and human trafficking all present. INTERNATIONAL BUSINESS MEETINGS As in 2011 and 2013, Milipol Paris will once again be holding International Business Meetings, with the aim to encourage business opportunities between visitors and exhibitors. Whether it be to initiate a commercial relationship, check the development potential of a new product on a targeted market or identify a relevant technical partnership; these particular exchanges become perfect occasions for successful meetings. Organised from 17-19 November in conjunction with the one-to-one meetings of Cartes Secure Connexions, they are open to visitors of both exhibitions. Opportunities for new contacts will thus be intensified, notably on sensitive topics such as cyber security and the smart cities/safe cities themes which are common concerns to both trade fairs. In order to save time on site and to optimise the trip, appointments can be organised ahead of the event thanks to a match-making platform. The International Business Meetings allow delegates to publish their cooperation offers on the online matchmaking platform, match them with the other participants cooperation profiles, and maximise the time spent on

16

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

the show thanks to a tailored schedule. Michael Weatherseed, Director, Security Business Unit, Comexposium, said: “At Milipol Paris 2013, nearly 300 meetings were organised and more than 20 countries were represented. This year, and because it is set up in common with both exhibitions, the business meetings will certainly have an even greater impact.” Rémi Thuau, Prefect and Chairman of Milipol exhibitions, concludes: “Milipol Paris, following in the footsteps of the 18 previous exhibitions, will once again confirm its place as the world’s leading security exhibition in 2015. In 2013 the exhibition continued to extend its influence, with a notable increase in exhibitor and international visitor numbers. Milipol Paris 2015 will build on this, welcoming all of the industry’s key players. “Purchasers, suppliers and experts will all be there to discuss new security issues and discover new technologies. Governmental concerns will also be addressed: combating terrorism, protecting citizens, ensuring safe cities, providing local security and protecting against major risks will be at the heart of the debate. The industry’s top performing companies will present their products and innovations.” Milipol is organised by Comexposium. Comexposium, is a leading event organiser world-wide, involved in 114 events for the general public and professionals, covering 17 different sectors. The group welcomes 38,000 exhibitors every year, 40 per cent of whom are non-‑rench, as well as 3.5 million visitors, 350,000 of whom come from abroad. Comexposium organises five of the ten biggest events held in France: SIAL, Foire de Paris, Intermat, SIMA and Paris International Agricultural Show. Customer satisfaction, innovation, growth

Milipol Paris 2015: useful information Dates: Tuesday 17 to Friday 20 November 2015. Opening hours: Tuesday to Thursday, 9.30am-6.00pm, Friday 9.30am -5.00pm. Where: Paris Nord Villepinte – Exhibition Centre, France. The exhibition is reserved for security industry professionals. Access is only available with an official invitation card or an electronic badge. Proof of identity will be requested together with the badge. Minors under the age of 16 are not allowed to visit Milipol Paris. TRANSPORT From Roissy Charles de Gaulle airport: take the RER B line (direction: Robinson–Saint-Rémy-lèsChevreuse). Get off at the first stop, Parc des Expositions. Trains leave every seven minutes, from 7.00 to 20.00. From Paris: take the RER B line (direction: Aéroport Roissy Charles de Gaulle), and get off at the Parc des Expositions. The journey takes 25 minutes from the centre of Paris. The Parc des Expositions de Villepinte station is situated on the RER B line in zone 4 (outside inner Paris), which is the Ile de France price bracket for tickets.

and development and commitment to an eco‑friendly approach are the key commitments of the Comexposium Group’s products. Each event is a market leader, facilitating development, highlighting the sector and pre-empting market trends. L FURTHER INFORMATION www.en.milipol.com



Feature rich devices Built to order in the UK

Highly customisable Bespoke projects

For fur ther information contact: Tablet Technologies Ltd 01279 757 467 info@tablettechnologies.com


TECHNOLOGY

Rugged tablets and customised touch screen devices built to order

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Tablet Technologies, a specialist manufacturer and developer of rugged touch screen devices showcases its range of rugged tablets, PDAs, mobile phones and panel PCs Although tablet computers began transforming the way we use computers some years ago, never has there been more growth in the use of touch screen devices than today. Tablets are continuing to offer a new tool that can enhance existing processes as well as inspire new opportunities possible with the technology. Traditionally the evolution of computers has been fuelled by Moore’s law - the observation that transistor density doubles every two years. In most use cases this has caused an over-supply of computing power as, typically, most organisations using mobile devices, unlike consumers, use those devices for one or only a very small number of tasks. Tablet Technologies has long observed that while most computer technology is superfluous in transistors it is frequently lacking in features. This is backed up by the company’s latest market survey which asked people to rank the most important criteria in choosing a rugged tablet solution. Performance was ranked fourth behind features which was ranked second (you can read the full results on Tablet Technologies blog).

wireless radios but to create truly useful tools of technology requires a more flexible approach. To meet the market demand for features, Tablet Technologies welcomes custom projects based around the established foundations of its CONKERTAB rugged tablets. An excellent case study for this has been a recent surge in interest in multi-ID devices - hardware that can read a variety of identification formats including 2D barcodes on ID cards, the MRZ (Machine Readable Zone) on passports and also take biometric finger prints. As a result of this customer requirement, Tablet Technologies rapidly developed a solution around its popular CONKERTAB NX8 rugged Windows Tablet that achieves all of these requirements. TRULY SUNLIGHT READABLE SCREENS Sunlight readable tablets are in high demand the world over for effective outdoor work. Unfortunately much of the technology available is not truly sunlight readable, rather it uses a few flawed techniques to achieve the best result with the wrong tools, for example high brightness. In 2013 the company was asked to provide a sunlight readable tablet for use in a five year field trial spread across South Africa and Zambia. The company were told upfront of the market leading devices that had been tested and ruled out due to their sunlight readable screens proving ‘unreadable in direct bright sunlight’. It was a conundrum Tablet Technologies were already aware of, that the industry parlance of ‘sunlight readable’ was untrue. At the time the company were working on a unique solution that combined traditional light emitting display technology with a purely reflective layer akin to e-ink. This means that in bright sunlight you can turn off the backlight, saving an enormous amount of battery power. Light-emitting displays are responsible for as much as 90 per cent of battery drain on mobile devices so not only

ts Tableinuing l ont ew too c e r a n er a enhance f f o to t can cesses tha ing pro s exist as well a w re ne inspi rtunities oppo

MADE TO ORDER This need for features is why the company created the CONKERTAB range of rugged tablets, to be able to offer devices that focus on function. The CONKERTAB devices are built on a foundation of features that are fast becoming absent in mobile devices, simplicities such as multiple full-size USB ports, 9-pin serial ports and RJ45 wired LAN connectors. Critically, Tablet Technologies offers these features in unison, not as a mutually exclusive option group. The company has also constructed its devices to be modular and created service operations around a UK based final build service that allows it to rapidly configure devices to an exact specification. FROM IDEAS TO REALITY ‘Made to order’ has worked well for varying components such as memory, storage and

is true sunlight-readability game-changing in its own right, the added benefit of greatly extended battery life is a massive win-win. Tablet Technologies won the confidence of the customer for the five year field trial in Africa by providing a proof of its concept in under four weeks using its CONKERTAB NX10 rugged Windows Tablet and delivered the first 100 units just a few months later. The company is now developing further devices based on this technology in an array of device types including windows tablets, android tablets, panel PCs and also mobile industrial monitors that are capable of superb visibility in direct sunlight as well as offering ultra‑low light emittance for night time viewing. ABOUT TABLET TECHNOLOGIES Tablet Technologies is a specialist manufacturer and developer of rugged touch screen devices including rugged tablets, PDAs, mobile phones and panel PCs. The company’s core range of devices are rugged windows tablet PCs and rugged android tablets. Tablet Technologies also designs custom panel PC solutions based on its own Industrial Embedded platforms for Windows and Android. Tablet Technologies values the uniqueness of each project and will work closely with you to deliver solutions tailored to match your individual needs. The company offers expert advice combined with a custom design and build service, focusing on delivering tailored solutions, flexibility and the highest quality service level. L FURTHER INFORMATION www.tablettechnologies.com

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

19


WE SET THE STANDARDS WHEN IT’S MISSION CRITICAL CESG Certified Professional Scheme. Independent assessment and verification for information assurance professionals. Now available for the private sector.

BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no no. 292786) 2014

BC988/LD/AD/1114

bcs.org/ia


EVENT PREVIEW

The government’s cyber security event takes shape With cyber security threats and data breaches increasingly becoming the norm, the importance of IA15, the government’s cyber security event, has never been more important IA15, the government’s cyber security event, is being held on 9-10 November at the Westminster Park Plaza hotel, and will be hosted by the Government Communications Headquarters (GCHQ). It is being held as the government embarks on the next big leap in digital transformation. It is expected to bring together government ministers, drivers for the digital transformation programme and the nation’s cyber security and information assurance (IA) leaders. Robert Hannigan, Director of GCHQ, is placing great importance on this years IA15 event. He said: “My personal objective is to use IA15 to emphasise our crucial role in supporting the digital revolution in and across government and public services. “We must support the drive to increase the speed of digital inclusion, creating an environment of trust, giving the whole country the confidence to make the most of the internet. IA15 is our vital forum this year

and the central platform for our engagement with government, the Critical National Infrastructure, industry and academia.” INFORMATION ASSURANCE IA15 will be characterised by authoritative debate that will involve over 700 information security leaders, including SIROs, Departmental Security Officers and Chief Technical Officers from Whitehall and across wider government. GCHQ is delivering IA15 in close collaboration with the Cabinet Office, the Centre for the Protection of National Infrastructure (CPNI) and Government Digital Service (GDS). There

Cyber Security IA15

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

will be policy shaping speeches from new ministers and insights from directors from GCHQ, the Office of Cyber Security and Information Assurance (OCSIA), CPNI and GDS. Leading commentators from industry and academia will also provide their perspective. IA15 will be the main platform for GCHQ to share its strategy for supporting UK IA and cyber security. Delegates will hear how CESG, the information security arm of GCHQ, is fundamentally changing to meet the challenges of the digital transformation programme. There will be excellent Streams, featuring compelling case studies, demonstrating how departments and their industry partners are dealing with common challenges faced across government and the Critical National Infrastructure (CNI). STREAM ONE: INNOVATION IN INFORMATION SECURITY The huge digitalisation change agenda means the UK is about to take on significantly increased risk at a time of heightened threat. Good security is a key enabler for this transformation. But the sheer pace of change means this cannot be achieved by simply doing things the way we have always done them. We need to respond with insight and inspiration. Above all we need collaborative partnership that brings together the best thinking and solutions from 

IA15 will be chara authori cterised by that wi tative debate ll i 700 inf nvolve over orm securityation leaders

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

21


Intrusion Analysis & Digital Forensics Essentials This is the first cross discipline training course of its' kind that covers the essential knowledge and skills needed for intrusion detection, incident handling, computer/network forensics and malware reverse engineering. This 5 day course raises the bar and sets a new security baseline for aspiring Intrusion Analysis and Digital Forensics professionals. Every team member should take this course before embarking upon their very own, more specialised, career path. Following this course a student may challenge the CREST core skills exam resulting in the CREST Registered Intrusion Analyst (CRIA) qualification. Overview THE STORY OF AN ATTACK FROM START TO FINISH ..... How to detect an attack, how to handle it, how to trace and acquire the evidence, investigate, analyse and re-construct the incident. We then lay the groundwork for malware analysis by presenting the key tools and techniques malware analysts use to examine malicious programs. Practical exercises throughout ensure that the skills learned can be put to work immediately. Modules Module 1 - Soft Skills and Incident Handling Module 2 - Core Technical Skills Module 3 - Background Information Gathering & Open Source Module 4 - Network Intrusion Analysis Module 5 - Analysing Host Intrusions Module 6 - Reverse Engineering Malware Module 7 - CRIA Exam Preparation & Mock Exam Who should attend? • Aspiring information security personnel who wish to be part of an incident response team • System administrators who are responding to attacks • Incident handlers who wish to expand their knowledge into Digital Forensics • Government departments who wish to raise and baseline skills across all security teams • Law enforcement officers or detectives who want to expand their investigative skills • Information security managers who would like to brush up on the latest techniques and processes in order to understand information security implications • Anyone meeting the pre-requisites who is considering a career in Intrusion Analysis or Digital Forensics Pre-requisites? Experience with Windows and Unix basic command language plus some knowledge of hacker techniques and computer forensics is recommended. Total Length of Course The total time specified in this syllabus is a minimum of 43 hours of lecturing and practical work. Course Materials On attending this course students are provided with:  Full colour, perfect bound course book containing all course slides and notes  Exercise Files  IADFE Toolkit

£1,950 +VAT

For a full IADFE course description and CRIA exam syllabus, please visit: www.infosecskills.com or call +44 (0)208 144 2303. InfoSec Skills Credentials:

ACCREDITED TRAINING

e-Learning

Live Public Classes

Private Onsite Classes

InfoSec Skills Limited, Atlantic House, Imperial Way, Reading RG2 0TD. Email: info@infosecskills.com


Cyber Security IA15

EVENT PREVIEW  government, academia and industry. We need to learn from information security innovations within the Critical National Infrastructure. Working with Roke, the Stream sponsor, we will consider how technology can help solve difficult problems experienced across government. We will examine the real, tangible contribution delivered by the Academic Centres of Excellence in Cyber Security Research. We will showcase cutting edge security solutions created by high tech start-ups and the SME community. We will identify great case studies that demonstrate new solutions to shared problems across government. We will see how CESG is evolving to fundamentally change the way it works to provide trusted, expert, independent and intelligencebased services on information security. STREAM TWO: DELIVERING A WORLD‑CLASS CYBER SKILLS BASE To achieve a step change in resilience, the UK needs cyber security experts with technical skills and an aptitude for problem solving and investigation. This Stream reviews skills initiatives funded by the National Cyber Security Programme, debating what has been learnt and future priorities. A session will examine how the foundations for cyber skills are laid during the school years. There will be a review of the range of schools initiatives, with young people sharing their experiences. Delegates will meet a young winner of the Cyber Security Challenge and school children involved in the Royal Holloway, Smallpeice Trust Cyber Competition. The debate turns to skills development and research opportunities in tertiary education. There will be a review of the achievements of the Academic Centres of Excellence in Cyber Security Research and the CESG Certified Training and Certified Professional Schemes. The panel will discuss Cyber Apprenticeships Scheme and the Centre for Doctoral Training in Cyber Security. Bringing together information security leaders from Government and industry, this Stream will review the best ways to improve cyber education at all levels so people are better equipped to increase the resilience of cyberspace. STREAM THREE: THE EVOLVING THREAT ENVIRONMENT GCHQ experts will brief delegates on how the threat landscape is evolving for central and wider government. Then in collaboration with CPNI there will be a focus on the real and growing threat facing the Critical National Infrastructure. Drawing on GCHQ’s intelligence capability, this Stream will give you an understanding of where threats to the Critical National Infrastructure are coming from and where they are aimed. There will be a focus on how the private sector Critical National Infrastructure must respond. This Stream

We need collaborative partnership that brings together the best thinking and solutions from government, academia and industry. We need to learn from information security innovations within the Critical National Infrastructure will have important messages for the government lead departments for the CNI, including BIS (Communications), DECC (Energy), DfT (Transport), HMT (Finance), DEFRA (Food, Water), DH (Health). Shaped through collaboration between GCHQ, CPNI and the sponsor, Fortinet, this Stream will be compelling and instructive for information risk owners and information security professionals. The threat insights gained and response required will be transferable to situations across government and industry. STREAM FOUR: REAL WORLD CHALLENGES – BUILDING RESILIENCE Delegate feedback reveals considerable interest in hearing real life examples of the threats faced and how they can be tackled. There is scope to dedicate a Stream to case studies that present important insights for significant elements of the audience This Stream might cover the tackling of cyber crime. This would include input from the NCA and National Fraud Intelligence Bureau; exploring the scale and drivers of attrition in reported fraud and cyber crime. It would be interesting to have an update on the CERT, reviewing insights since its launch in March 2014. Case studies must identify issues and challenges that will resonate with a range of delegates and provide clear, sound solutions. Threats emanating from social media sites have received high profile media coverage in recent months. This is an area that might be examined through case studies.

THE CYBER CONVERSATION Workshops will enable subject specialists to share insights and debate with experts from the public sector and industry. Delegate engagement will be the hallmark of IA15. A highpoint for the event will be the Cyber Conversation, a plenary leadership debate chaired by a senior journalist. The IA15 Delegate Pulse will put voting pads into the hands of all delegates, capturing views and feedback. This flagship event is at the heart of government and has been hugely influential for almost a decade. Since IA14, every facet of the format has been reviewed and refreshed, from the provision of a powerful ministerial platform at the outset to the inspiring and very popular networking dinner. Matthew Hancock, Minister for the Cabinet Office and Paymaster General, said of the event: “Cyber Security is a priority for this government. IA15 is a great opportunity to work closely with partners across government, industry, academia and the critical national infrastructure. It is a focal point in the government’s cyber security calendar.” The IA15 speaker line-up will be announced shortly on the IA15. The Park Plaza Westminster Bridge Hotel is situated on London’s South Bank, within walking distance of Whitehall and the Houses of Parliament. It is a contemporary and state-of-the-art property and is perfectly suited to accommodate the IA and cyber security flagship event.  FURTHER INFORMATION www.cesg.gov.uk/IA15

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

23


Our customers are security sensitive decision makers who know what is important to them. Through education and experience they have learnt to work within and manage their appetite for risk. Their preferred way of working is through establishing a partnership with their security service provider. This relationship relies on trust and mutual confidence. Together we tackle challenges for which technology alone is not the answer. Solutions are tailored by team members with the knowledge, skills and experience to signpost the best route to take together.

Benefit Assured, Security Assured, Value Assured C3IA Solutions is the partner of choice for the delivery of accredited security and technical services. Please get in touch in order to hear how we take a holistic approach to the delivery of managed security services.


REPORT ANALYSIS

Measuring the approach to cyber security

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Global Cybersecurity Index measures each nation’s level of commitment to the ITU’s Global Cybersecurity Agenda, with the aim of highlighting potential areas for improvement and driving cyber security to the forefront of national agendas. Counter Terror Business examines the latest report The Global Cybersecurity Index (GCI) is an ITU-ABI Research joint project that measures the commitment of countries to cyber security and provide the motivation for countries to increase their cyber security efforts. Cyber security has a wide field of application that cuts across many industries and sectors. Each country’s level of development is analysed within five categories: Legal measures, technical measures, organisational measures, capacity building and cooperation. The result is a country-level index and a global ranking on cyber security readiness. Explaining the need for such a resource, Tim Archdeacon, CEO of ABI Research, said: “The cost of cyber crime and the growing threat of increasingly sophisticated cyber attacks perpetrated by highly resourceful and competent threat agents continue to plague the development of safe ICTs globally. Safeguarding ICTs ensures the economic stability of cyber space and provides for a reliable environment critical for

organisations and individuals to conduct business and freely communicate.” KEY FINDINGS Many countries within the Index share the same ranking, indicating that there is the same level of readiness. The Index has a low level of granularity since it aims at capturing the cyber security commitment of a country, and therefore it’s state of readiness and not its detailed capabilities or possible vulnerabilities. Toping the Index is the United States of America (0.824) with Canada (0.794) ranked in second. Joint third in the ranking is Australia, Malaysia and Oman (0.765) with New Zealand and Norway fourth (0.735). The United Kingdom ranks joint fifth on the list (0.706) alongside Brazil, Estonia, Germany, India, Japan and the Republic of Korea. Ranked at joint 29th in the list,

the lowest ranking with a 0.000 Index is the Central African Republic, Democratic People’s Republic of Korea, Equatorial Guinea, Honduras, Lesotho, Marshall Islands, Namibia, Saint Vincent and the Grenadines and Timor-Leste. Monaco and Andorra are the lowest ranked European nations on the Index (0.0882 and 0.0588). Additional analysis reveals that Europe (0.45) is the region with the highest Index, followed by Asia Pacific (0.29), Commonwealth of Independent States and Arab (0.27), the Americas (0.26) and lastly Africa (0.16). The Global average is 0.45. UK PREPARATION The UK was noted especially for its recognition of Capacity Building. The Global Cybersecurity Index noted how the UK has established a set of Academic Centres of Excellence in Cybersecurity Research and complementary Research Institutes, one of which is the Oxford Internet Institute that includes a capacity building centre. There is a government‑run IA certification scheme for IA professionals, known as CCP and the UK government strongly supports the IISP certification and encourages membership of IISP and CCP.

The g growin yber fc threat o rpetrated pe attacksly resourceful by high at agents thre ue to plag t e u n i t n con elopme the dev fe ICTs of sa

PERFORMANCE INDICATORS The GCI will be a benchmark ranking measuring the cyber security development capabilities of sovereign nation states. The index is essentially a composite indicator, aggregating a number of individual indicators. The process of cyber security development can be analysed within five important broad categories. The following indicators and sub-groups have been identified, and nations will be ranked against the benchmark provided in each indicator. LEGAL MEASURES Legislation is a critical measure for providing a harmonised framework for entities to align themselves to a common regulatory basis, whether on the matter of prohibition E

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

25


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

VIRTUAL TERRORISM

Terrorism obscured by Cybercrime Bournemouth University Cyber Security Unit has embarked on a three‑year fusion programme in cyber security and effective policing Terror organisations have been utilising the virtual domains within cyberspace to promote their ideological messages across social media platforms and have been particularly successful in extending their propaganda, resentment and attractions to an ever increasing audience and social circles. This has been particularly noticed with the increased cyber penetration of ISIS ideological propaganda and social recruitment outside of their geographical reach. In the last few years we have seen an increasing social engineering capability of these terrorist organisations and in their use of open source intelligence, acquisition and cyber based operations which enhance their influence and power beyond what would be achievable through physical networking. Can terrorism applied to the phenomenon of virtual communities have the same impact as it does in the real world where ideological terror and outrage is exploited by online content and sensory perception? DISTURBING DEVELOPMENT A disturbing development of these terrorist organisations is their deployment and expansion of cyber socio-technical systems and the apparatus of structured cells to form virtual underground crime syndicates that provide “Anytime, anywhere” anonymity and obscurity of their cyber operations and individual behaviour manipulation. The probability of these activities being presented as legitimate commercial propositions has evolved, creating fronting enterprises that overlay existing supply chains and ecommerce platforms. This follows the mantra that risk is proportional to price and where trading in the cyber domain has become the most effective commercial proposition today. It is less risk adverse for criminal activity as current national legislation tends to fail to prosecute global crime. Criminal socio-technical systems are often deployed as crime-as-a-service (offering propositions that most people find difficult to refuse) where the service level agreements (SLAs) could be delivering products, a particular skillset or new exploitive toolsets. These commercial prospects supplied by the criminals often come with add-ons like training service support, step-by-step

26

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

instructions on how to commit a cyber-crime, a shopping-list of vulnerable victims and their personal identification information and even insurance policies that offer full re‑imbursements if the SLAs were not satisfied. Armed with these services, prospective criminals and terrorists alike can exploit financial services or commit commercial vandalism, media exploitation, modern slavery and child pornography with minimal risk of being detected. NEW FUNDING The terrorists have readily identified the wealth creation that cyber offers and the ability to tap new funding through organised crime to such an extent that it is now difficult for law enforcement agencies to distinguish whether it is criminal activity sponsored by organised gangs, state actors or terrorist cells. Typically a cyber-terrorist cell could be established with its runners and enforcers

today. The symbolic systems of trust be it religion, myth, science, law or culture has been obscured in this relationship. The osmosis of obscurity within the virtual underground economic has become far more viral across the global communities as terrorism may have become a new paymaster for organised cybercrime. Moreover, has the prospect of lucrative crime without prosecution attracted these terrorist cells? This question needs to be examined to understand the motivation and potential catastrophe of terrorist cells operating within the underground economy. ASSURED ENVIRONMENT Cyberspace provides an assured environment which is inherently attractive to curious minds and should be effectively exploited for humanity’s benefit. However, crime, be it state sponsored, masterminded by criminals or controlled by a terrorist cell has become cancerous to the cyberspace

Crime, be it state sponsored, masterminded by criminals or controlled by a terrorist cell has become cancerous to the cyberspace so much so that there is an obscurity with an expanding cybercrime wave and the intent of terrorism as well as creating a number of lieutenants that provide pinch-points within the virtual underground economy; the boundary-less architecture of cyber-space. The cell can distribute tasks over many commercial servers thereby avoiding detection or interception. The trust circles within terrorist and organised crime cells is defined and kept by fear, resentment, distrust and societal stereotyping which is further compounded by the cyberspace contagion of fear, uncertainty and doubt. However, the underground economy and particularly crime-as-a-service has developed a paradox around the doctrine of assured systems, where the trust quotient of “doveryai, no proveryai” (trust, but verify) has built trusted relationships between them. This bonding of trusted individuals (criminals trusting terrorists) is ironic giving the social context of what is described as terrorism

so much so that there is an obscurity with an expanding cybercrime wave and the ideological intent of terrorism. Therefore, current legislative inabilities need to be reformed to prepare, prevent, protect and prosecute both cyber criminals and cyber-enabled terrorists. Furthermore, although policing priorities are already moving from the real world to cyberspace, their activities need to be more engaged with the numerous layers of social circles and the networks that bond them together.  FURTHER INFORMATION For more information on this topic or to speak to a Business Consultant about its fusion activities, contact the Bournemouth University Cyber Security Unit on 01202 962 557 or email bucsu@bournemouth.ac.uk.


REPORT ANALYSIS  of specified criminal conduct or minimum regulatory requirements. Legal measures also allow a nation state to set down the basic response mechanisms to breach: through investigation and prosecution of crimes and the imposition of sanctions for non-compliance or breach of law. A legislative framework sets the minimum standards of behaviour across the board, applicable to all, and on which further cyber security capabilities can be built. Ultimately, the goal is to enable all nation states to have adequate legislation in place in order to harmonise practices supranationally and offer a setting for interoperable measures, facilitating international combat against cyber crime. The legal environment can be measured based on the existence and number of legal institutions and frameworks dealing with cyber security and cyber crime. The sub-group is composed of criminal legislation and regulation and compliance performance indicators. TECHNICAL MEASURES Technology is the first line of defence against cyber threats and malicious online agents. Without adequate technical measures and the capabilities to detect and respond to cyber attacks, nation states and their respective entities remain vulnerable to cyber threats. The emergence and success of ICTs can only truly prosper in a climate of trust and security. Nation states therefore need to be capable of developing strategies for the establishment of accepted minimum security criteria and accreditation schemes for software applications and systems. These efforts need to be accompanied by the creation of a national entity focused on dealing with cyber incidents at a national level, at the very least with a responsible government agency and with an accompanying national framework for watch, warning and incident response. Technical measures can be measured based on the existence and number of technical institutions and frameworks dealing with cyber security endorsed or created by the nation state. The sub-group is composed of CERT/CIRT/CSIRT, Standards and Certification performance indicators. ORGANISATIONAL MEASURES Organisation and procedural measures are necessary for the proper implementation of any type of national initiative. A broad strategic objective needs to be set by the nation state, with a comprehensive plan in implementation, delivery and measurement. Structures such as national agencies need to be put into place in order to put the strategy into effect and evaluate the success or failure of the plan. Without a national strategy, governance model and supervisory body, efforts in different sectors and industries become disparate and unconnected, thwarting efforts to reach national harmonisation in terms of

cyber security capability development. The organisational structures can be measured based on the existence and number of institutions and strategies organising cyber security development at the national level. The creation of effective organisational structures is necessary for promoting cyber security, combating cyber crime and promoting the role of watch, warning and incident response to ensure intra-agency, cross-sector and cross-border coordination between new and existing initiatives. The sub-group is composed of policy, roadmap for governance, responsible agency and national benchmarking performance indicators. CAPACITY BUILDING Capacity building is intrinsic to the first three measures (legal, technical and organisational). Understanding the technology, the risk and the implications can help to develop better legislation, better policies and strategies, and better organisation as to the various roles and responsibilities. Cyber security is a relatively new area, not much older than the internet itself. This area of study is most often tackled from a technological perspective, yet there are numerous socioeconomic and political implications that have applicability in this area. Human and institutional capacity building is necessary to enhance knowledge and know-how across sectors, to apply the most appropriate solutions, and promote the development of the most competent professionals. A capacity building framework for promoting cyber security should include awarenessraising and the availability of resources. Capacity building can be measured based

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

at best between different disciplines and within private sector operators. It becomes increasingly so at the international level. However, the cyber crime problem is one of a global nature and is blind to national borders or sectorial distinctions. Cooperation enables sharing of threat information, attack scenarios and best practices in response and defence. Greater cooperative initiatives can enable the development of much stronger cyber security capabilities, helping to deter repeated and persistent online threats, and enable better investigation, apprehension and prosecution of malicious agents. National and international cooperation can be measured based on the existence and number of partnerships, cooperative frameworks and information sharing networks. The sub-group is composed of the following performance indicators: Intra-state cooperation, intra-agency cooperation, public-private partnerships, and international cooperation. FOCUSING LONG TERM The long-term aim is to drive further efforts in the adoption and integration of cyber security on a global scale. A comparison of national cyber security strategies will reveal those states with high rankings in specific areas, and consequently expose lesser-known yet successful cyber security strategies. This can prompt increased information sharing on deploying cyber security for those states at different levels of development as well. By measuring the level of cyber security preparedness in various areas, the index will allow states to assess where they are on a scale of development, where they need to make further improvements

Malicious online agents are numerous, organised and of diverse persuasions: political, criminal, terrorist, hacktivist. The tools at their disposal become more sophisticated and complex over time and with experience on the existence and number of research and development, education and training programs, and certified professionals and public sector agencies. The sub-group is composed of the following performance indicators: Standardisation development, manpower development, professional certification and agency certification. COOPERATION Cyber security requires input from all sectors and disciplines and for this reason needs to be tackled from a multi-stakeholder approach. Cooperation enhances dialogue and coordination, enabling the creation of a more comprehensive cyber security field of application. Information sharing is difficult

and how far they are from implementing an acceptable level of cyber security. All states are moving towards a more digitised and connected environment, and adopting cyber security early on can enable the deployment of more secure and resilient infrastructure in the long term. Further information on the cyber readiness can be viewed on ITU website, with Cyberwellness country profiles available for each country on the Index. These show the legal, technical, organisations and cooperative procedures for cyber security in each country. L FURTHER INFORMATION www.itu.int/en

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

27



FIRE SAFETY

MANGO selects Xtralis’ Vesda-E smoke detector

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Mango, a major international fashion brand of women’s and men’s clothing and accessories, has selected Xtralis’ VESDA-E smoke detectors to protect its massive new logistics center, located north of Barcelona, Spain. Mango attributes its success to three core elements – concept, team, and logistics. To ensure business continuity and logistics excellence, Mango selected VESDA-E for fire protection in its flagship logistics centre THE CHALLENGE Mango began building the logistics park in 2014 at Lliçà d’Amunt to serve its rapidly growing global operations. The center, which represents an investment of 360 million euros, will be completed in the summer of 2015, with the platform to come into full service in January 2016. The new logistics centre will occupy an area of 395,000 square meters, and incorporate the latest technological logistics tools, robotics, and fire prevention with over 200 VESDA-E detectors. Mango has selected Cotein Fire for the installation. THE SOLUTION Oscar Arias, Construction Managing Director with Mango, said: “The ultra-sensitivity of VESDA-E combined with very long pipe runs to provide wide areas of protection is the right choice for the Mango logistics centre. VESDA-E is able to provide the very best in protection for our world-class facility. “This project uses fewer detectors to cover a very wide area packed with valuable assets. The high ceilings and airflow also provided challenges that VESDA-E was able to solve. Mango logistics are best-inclass and when it came time to select fire protection, VESDA-E was the natural choice.” The new logistics center employs state‑of‑the‑art technologies to efficiently inventory and ship the world-class brand. However, with a large area to protect, ceiling heights of 46 metres, and high airflow, smoke detection and fire prevention to protect the valuable commodities posed a unique challenge. Zettler, a leading European safety system integrator, worked closely with Xtralis to deliver the VESDA-E VEU solution, which exceeded all requirements. THE OUTCOME The VESDA-E series of aspirating smoke detectors is the new generation of VESDA ASD. With sensitivity up to 15 times greater than VESDA VLP, the world’s leading aspirating smoke detector, and provisioning for considerably longer linear and branched pipe networks to protect wider areas whilst allowing convenient mounting for ease of access and maintenance,

VESDA-E is the ideal solution for maximum protection in a wide range of applications. A single VESDA-E detector can protect up to 2,000m2 with much greater sensitivity and reliability than any detector on the market. HOW IT WORKS Air is continually drawn from the protected area through the air sampling pipe network and into the detector by a high efficiency aspirator. The air sampling pipe network can contain up to four pipes. The air from each sampling pipe passes through an airflow sensor and then a sample of the air is drawn into the smoke detection chamber via the sampling module, after first passing through the filter. An additional filter provides clean air to protect the optical surfaces inside the detection chamber from contamination. The Flair detection chamber uses the equivalent of 330,000 sensors and sophisticated algorithms for detection and particle classification. If the detected smoke is higher than the set alarm threshold, it is reported as an Alert, Action, Fire1 or Fire2 alarm condition. Air is exhausted from the detector

and may be vented back into the protected area. Alarms can be signalled via Relays and VESDAnet. Ethernet and WiFi can be used for configuration and secondary monitoring, and a USB interface is provided for initial setup. A series of LEDs display Alarm, Trouble, Disable and detector power on status. A button allows the user to Reset or Disable the detector. In addition, an optional 3.5” LCD displays detector status including smoke level and a smoke level bar graph, alarm thresholds, trouble status, percentage airflow level, normalisation status and filter life used. The model is also suitable for the following appications: accommodation (apartments, hotels, shops and offices) correctional facilities, clean rooms, cold storage, cultural andheritage, data and telecom, education, hospitals and healthcare, insurance, marine, nuclear facilities, offices, oil and gas, portable switch rooms, power generation, records storage, retail, transportation, wind power generation, and warehousing. L FURTHER INFORMATION www.xtralis.com or email emea-sales@xtralis.com

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

29


Border Security Written by James Kelly, chief executive, British Security Industry Association

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SECURITY SERVICES

Securing the UK border at a commercial level

With Britain’s borders a regular feature on national news, James Kelly, of the British Security Industry Association, explores the ways of securing the UK border at a commercial level With thousands of migrants currently residing in Calais while making attempts to cross the English Channel, the government has begun to reassess its security strategy in order to better police the areas they are responsible for. At the time of writing the number of migrants waiting in the encampments in Calais exceeds 3,000. Every night hundreds of them attempt to breach perimeter security and stowaway in order to gain entry into the United Kingdom. There has been significant loss of life in their fight to get across the border. A strong strategy should be employed by the border force and contracted security firms in order to combat the influx of migrants trying to cling to heavy goods vehicles (HGVs) and trains, to also prevent human trafficking and other illegal activities that currently threaten the United Kingdom. Currently, the UK border is secured by a variety of security measures taken to address these issues. However, the most difficult areas to police are the busiest. As Theresa May recently outlined, perimeters to staging areas in ports should be secured with two hardened fence lines to create a sterile catchment zone. All persons found within the catchment area should be treated as suspicious. Advanced access control points should be placed at limited intervals throughout the fence line to allow access to security services. BEFORE THE BORDER Security does not only start at the border itself, with security services now utilising CCTV systems in around the perimeter of the port at Calais. Although these systems are primarily used to detect direct breaches, this will provide security against potential contraband items being smuggled into the country either for criminal or terrorist reasons. With advances in technology, CCTV can now provide evidence in ultra-HD; ensuring prosecutions can be carried out. Furthermore, to better secure the sterile area, the deployment of thermal imaging cameras at regular intervals along the fence line would provide a superior system to legacy CCTV to alert security personnel to potential threats. Thermal imaging is also an effective method used to spot intruders in darkness

30

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

and adverse weather conditions, and can also be used at ports to detect stowaways and other unauthorised personnel. At the Port of Calais, this technology has historically been used to detect people swimming in the water who may be intent on attacking a moored vessel, but it can also be used on land to detect night-time intruders. Detector-activated CCTV can also prove useful in providing 24-hour alerts to site managers responsible for large-scale sites. Looking in more detail at remotely monitored, detector‑activated, CCTV which complies with the revised BS8418 standard, this is finding favour with businesses across the UK wishing to keep a watchful eye on vulnerable properties, out of hours, by linking in CCTV cameras and detectors, strategically positioned on the perimeter, to a privately-run RVRC (Remote Video Response Centre). In this case, should someone attempt to scale a fence, for example, they are liable to be picked up by a detector with images from the associated CCTV camera sent to an operator at the RVRC for review. If required, the operator can even issue a verbal warning through on-site speakers to stop the intruder in their tracks. Experience shows that this is a sufficient deterrent in over 90 per cent of cases. Of course sometimes an audio challenge may not be advisable due to the location of a site; however, in this case, an operator can covertly direct police to the scene to catch the unsuspecting intruder. WEAKNESS When discussing border protection it would greatly benefit the ranking security officer to step back and assess it as being built on three interrelated pillars. A weakness in any one of these pillars will, potentially, bring the others tumbling down. These are, in turn, prevention, preparedness and resilience. The large expanses of unmanned perimeter at ports and airports often pose a major security challenge, and in such cases fence detection systems, UGS (unattended ground sensors),

Securityt does no t the rt a only sta lf. Security itse border are now using radar or passive servicesystems around infrared detectors (PIRs), etc. are CCTV s perimeter often deployed the ort at along such a of the p is perimeter, reducing Cala the number of active recording CCTV cameras required to monitor the area.

THE IRON RING APPROACH Protecting the UK border is of course no easy task, in light of the geographically extensive nature of it. Given this it is perhaps not surprising that we are seeing a diverse array of ever more sophisticated security techniques being employed in the field. The most visible are physical asset protection measures like perimeter fencing, security checkpoints and lighting. A so-called ‘onion ring’ approach is often recommended for sensitive areas, which could be implemented in areas near to the Channel Tunnel. This approach involves the most at‑risk area being strategically positioned at the core of a layered defence system, whereby several layers of security are used starting from the site’s perimeter all the way back to individual building security or main asset security in order to deter would-be intruders. The outer perimeter layer represents a key starting point in terms of physical protection combined with electronic and/or security patrols. Patrols with dogs can also be used. This approach is commonly deployed on large,


Border Security James Kelly

sprawling sites with many separate buildings and elements, including ports and airports. Integrating physical security measures with electronic systems provides an early warning and speedy response to potential breaches, especially for sites that do not have the resources and manpower to ensure that the whole site is being monitored 24 hours a day. The security industry is working to enhance the performance of technology for screening heavy goods vehicles (HGVs) and for monitoring the safe movement of goods from the beginning to the end of the vehicle’s border crossing. Threat assessment reports should be conducted for all potential penetration points in order to have an overall awareness of where the perimeter around important facilities is weak. Gates should be opened and closed rapidly and under‑vehicle scanning can also be conducted as HGVs pass through security checkpoints. VIDEO CONTENT ANALYSIS With the increased threat level that terrorism presents to the UK, security is paramount at every border crossing to be secured. Video Content Analysis (VCA), also known as Video Analytics and Smart CCTV, is the technology within video surveillance that analyses and detects temporal and spatial events. This can and should be deployed at ports or other border crossings to recognise repeat offenders and those on ‘wanted lists’. VCA has many beneficial functions that can help security services to raise an alarm faster

and more efficiently. Through the creation of ‘virtual tripwires’, perimeter security can be increased. VCA can be especially effective around the perimeter of an easily breached secure area. Securing a perimeter can be seen as one of the most crucial steps in any security plan; an early detection of a threat at a perimeter means there is more time and space available to formulate the necessary response, potentially preventing an intrusion all together. COUNTER TERRORIST ACTIVITY With increased alert levels in most of the western world, a robust physical security presence should be deployed in order to reassure the public that all is being done to counter illegal and terrorist activity. The private security officers that have recently been deployed to Calais should never allow themselves to lose focus or relax a vigilant attitude from the task at hand of protecting a nation. It is not easy to plan security for borders, where open and multifaceted spaces characterise the area in question, but the key is to have in place a number of security measures that can complement each other. Combining CCTV with advanced access control and physical security measures such as fencing, bollards, doors and locks, backed up with security patrols can provide an overall security solution that is effective and intimidating to would-be criminals. Whether a border crossing to be secured is part of a larger publicly available site

such as an airport or port, or whether it concerns the perimeter of these areas, careful planning and consideration is a must to ensure no unauthorised access occurs. The deployment of advanced security measures should not only be implemented to stop criminals and terrorists, but also for the sake of commercial efficiency. Personal injury claims can have a large detriment to a business or organisation if individuals continue to attempt to gain access by high risk means. Employees, especially HGV drivers in Calais, are also being affected. The stress could impact their work but worse, their health or judgement while they are driving. Increased and advanced security protocols will give peace of mind to the transport industry. The European security sector recognises the pressing requirement to produce a framework that can help governments and the UK border force, across the continent, to ensure that they have the right measures in place to provide the right level of protection to British citizens. 

The British Security Industry Association is the trade association covering all aspects of the professional security industry in the UK. Its members provide over 70 per cent of UK security products and services and adhere to strict quality standards. For more information see www.bsia.co.uk, email info@bsia.co.uk or telephone 0845 389 3889. FURTHER INFORMATION www.bsia.co.uk

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

31


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SPECIALIST DOG SERVICES

A nose for trouble Following 24 years of service as a Royal Air Force Police dog handler, Collin Singer, managing director of Wagtail UK, recognised the need for his wealth of experience in a world weighted with organised crime and the threat of terrorism

Explosives sniffer dog Bryn on security duty

Established in 2003, Wagtail UK Ltd had its fair share of successes in the early years, gaining contracts firstly with local businesses then moving on to air shows and eventually supplying dogs to the Middle East. But it wasn’t without its struggles. “The first few years were very difficult, particularly financially,” says Collin. “The company lacked investment and I had to re-mortgage my house. That, coupled with the unfamiliar territory of actually setting up and starting a business, has been a steep learning curve. “I had the dog training skills, but knew nothing about accounts, public relations and the business world in general, so I had to learn fast. I never contemplated giving up. I believed in myself and my company.” 2012 OLYMPICS This tenacity ensured that they were recognised for a prestigious contract at the Olympic stadium in Stratford, London, the biggest construction site in Europe at the time, Wagtail helped protect over 5,000 of its site staff. All Wagtail dogs are trained to the standards and principles set by the British Military and the Police, so when, in 2008, newly-formed Border Force (previously Immigration Service and Customs) required live body detection dogs for Northern France, Wagtail were the strongest contenders. The rest is history. The company has been the sole private supplier of live body

32

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

detection dogs to the UK Border Force at their ports in Northern France since 2008, seeing its contract renewed in March 2015 for another five years. During their time with the Border Force, the teams have detected illegal immigrants in numerous unusual hiding places including car parts, machinery, foodstuffs, in refrigerated vehicles, car transporters and in tankers. The service has so far saved the UK taxpayer hundreds of millions of pounds in cost avoidance. “The Border Force contract was such a massive opportunity for us, but also very challenging, both logistically and commercially, and the hard work really began with its delivery. “Each day provides its own set of challenges as Border Force requirements increase but we thrive on that. I’m very proud to be working on such a high profile Government contract, helping protect our borders 24/7,” said Collin. HANDLERS The handlers selected by Wagtail are mainly ex-British military personnel with experience of working in hostile environments all over the world, including Iraq, Afghanistan, The Balkans and Northern Ireland. Collin appreciates their work ethic and ‘can-do’ attitude. “Ironically, being a dog handler means you’ve got to be a ‘people person’ to do the job. There are elements of conflict management to the work and you need to be able to communicate in a calm and respectful way,” said Mike, a Wagtail handler.

The dog selection process is just as strict. Working breeds like springer spaniels, cocker spaniels, Labradors, pointers and border collies are all selected for their natural drive, confidence and determination, with the specialist training methods working to convert the dog’s natural instinct to hunt into a game. The dogs are procured from gun dog breeders, rescue centres and private owners. Wagtail’s work doesn’t just stop at the borders. In addition to its UK work with HMRC, Trading Standards, the Police and the private security industry, it supplies dogs and related services to the Irish Customs, The Middle East, Mainland Europe, Africa and the Far East. DETECTION SERVICES It provides dogs to detect explosives, firearms, drugs, cash, tobacco, live bodies and human remains, as well as providing search and rescue dogs. Wagtail’s award-winning sister company Conservation Dogs trains dogs to detect ivory, pangolin and other products of animal origin, assisting conservation groups in their activities and to aid the fight against wildlife crime and live animal smuggling. Twelve years on, Wagtail UK has built a solid reputation as one of Europe’s leading detection dog providers. Described by high profile clients as ‘world class’ and with over 70 trained detection dogs at its disposal, what’s next? The much-anticipated training school (the Wagtail International School of Excellence – or ‘WISE’) is nearing completion and will be up and running in the autumn. Here, bespoke specialist dog handler training will be delivered near their base in North Wales. “The thinking behind it was that we could pass on our combined vast wealth of experience and train people based on our successes with both Government and private agencies, with a view to providing jobs and career opportunities,” said Collin. Now seen by many as the go-to sniffer dog suppliers, what is it about Wagtail UK that sets them apart? Collin’s response is unequivocal. “We don’t compromise on our standards, principles or professionalism, ever. “There’s always pressure but I have a fantastic team. We have the best handlers, the best dogs and the best clients and only the best is good enough.”  FURTHER INFORMATION Tel: +44(0)1745 561166 info@wagtailuk.com www.wagtailuk.com


EVENT PREVIEW

Connecting and protecting at World Borderpol

World Borderpol Congress

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The World Borderpol Congress, taking place on 8-10 December in the Hague, Netherlands, is the only platform where the border protection, management and security industry policy-makers discuss the international challenges faced in protecting borders The operation of today’s border security, traveller and migration management community is being stressed by geopolitical, social and economic events. Our world is fully interdependent, and it is becoming ever more challenging to find solutions which include the utilisation of border services and agencies to protect national interests. As a number of regional crises continue to escalate, economic sanctions and travel bans are increasing, being employed by the USA, EU, and Russia, as well as their allies. Border services are front-line responders for monitoring these sanctions and bans. As the challenges of mass illegal migration across the Mediterranean Sea peaks during the summer period, Italy and Greece have seen tens of thousands of refugees seeking sanction in Europe. Many more come via the Balkans or Eastern European countries to seek the ‘sanctuary’ of the European Community. BORDER SERVICES Whether asylum seekers or economic migrants, the numbers are proving a challenge for the European Community and its border and law enforcement agencies, as well as the problems of identifying those genuine asylum seekers arriving without any form of documentation. As the post-World War One borders of Iraq evaporate and a new entity known as the Islamic State of Iraq and the Levant (ISIL) emerges, hundreds of thousands of persons are being displaced and are fleeing the region. Border services are now front-line responders for monitoring, recording and directing the movement of these people, most of whom will be refugees. ISIL will continue to look for soft western targets wherever it can and, in doing so, de-stabilise vulnerable states like Tunisia and Algeria, dependent on Western tourism or oil for their economy. It will continue to attract foreign youth who can one day return home as trained terrorists and the growing challenge for agencies is identifying and restricting the movement of such people. While the United States deals with an unprecedented and clearly well-orchestrated movement of tens of thousands of people

l ISIL wil look e to continu western for soft d, in doing an targets e-stabilise so, d le states b vulnera nisia and like Tu eria Alg

– mostly children and adolescents from Central America – arriving at its border with Mexico, its border services are monitoring, detaining and caring for these people in unprecedented numbers. As China, the world’s most populous nation, develops a formidable navy and air force, posed to succeed the United States as the world’s number one economy, it is flexing its economic and political muscle in Asia and beyond. Border services everywhere are now being pressed to be front-line responders

monitoring the import and export of strategic goods and services to and from China. Since the end of the Cold War, there has been a deeply-held belief within the developed world that political and economic integration is the best way to improve global security and avoid potential conflict everywhere. This has created a paradox: the interdependent world is supposed to make it less likely that extreme conflict between nations or groups of nations will occur. This very interdependence makes it imperative that nations cooperate, communicate and consult with one another in a multi‑jurisdictional and inter-disciplinary manner. 

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

33


Case Study

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Millbrook – Providing fully engineered solutions for specialist vehicle modifications Millbrook, one of Europe’s leading independent developers of specialist vehicles, has more than 45 years’ experience and operates with MOD accreditation for security 24 hours a day, seven days per week, guaranteeing the highest levels of confidentiality. As experts in the modification of production vehicles for government organisations and security agencies, Millbrook draws on its extensive automotive capabilities, laboratories and 70km of ‘real world’ tracks to fully engineer conversions to OEM standards. Programmes range from extensive modifications with significant impact upon the OEM platform to simple one-off systems. Millbrook develops, tests and validates vehicles, redesigning the vehicle systems to provide increased payload capability and performance. Millbrook also installs discrete or covert communication and other specialist electronic equipment, in order to deliver a fully integrated C4ISTAR (Command, Control, Communications, Computers, Information/ Intelligence, Surveillance, Targeting Acquisition and Reconnaissance) system. Millbrook also provides the capability to design and build an optimally packaged

ballistic and blast protected solution, providing threat protection to the vehicle occupants. Armoured Vauxhall Insignia – this specialist vehicle offers exceptional levels of protection without compromise to its profile, handling and ride comfort. Available as a SportsTourer or Hatchback, in left-hand and righthand drive, manual or auto, front wheel drive or 4x4, the model range covers the ES through to the high performance VXR. Features of this discreet armoured vehicle include full 360 degree ballistic and floor blast

protections. The vehicle is modified to include upgraded suspension, brakes and safety systems, and installations such as black-out function, run-flat capability and an explo-safe fuel tank can be added. The durability testing of armoured vehicles includes ride and handling validation on Millbrook’s extensive terrains and road surfaces, including off-road evaluations where this application is required. The ultimate aim of which is to produce reliable vehicles, resulting in assets that are available for use in service. The vehicles’ suspension systems have been fully optimised including springs, dampers and anti-roll bars, developed to ensure excellent ride quality and to meet design and mission specifications. The Armoured Vauxhall Insignia is tested and validated to European automotive standards, brake tested to Home Office standards and the vehicles’ ride, handling and performance developed to VSAG standards. FURTHER INFORMATION Tel: +44 (0) 1525 404242 info@millbrook.co.uk www.millbrook.co.uk

DSEI 2015 ExCel. London 15 - 18 September 2015 Stand number N9-472

Millbrook Armoured Vehicles Protection is Paramount. Millbrook Armoured Vehicles offer exceptional protection without compromise to vehicle handling or ride comfort.

Vauxhall Insignia

34

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

All Enquiries info@millbrook.co.uk 01525 404242 www.millbrook.co.uk


EVENT PREVIEW  WORLD BORDERPOL CONGRESS The 4th World Borderpol Congress brings together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place and discuss some of the latest issues and challenges facing our borders and agencies tasked with protecting and managing them. The Congress programme includes situational overviews in the opening plenary ‘Trafficking: Human, Drug, Contraband and CBRNe’ and explores how trafficking remains one of the major issues for border security and management agencies. Whether humans, drugs, contraband or CBRNe proliferation, trafficking provides major challenges that affects peoples lives and national economies, whilst proving hugely profitable for organised criminal gangs. Different regional issues provide global challenges. From where do these activities transpire and what can be put in place to mitigate the problems? This years Congress will see discussions on ‘Big Data and Cross Border Cyber Crime’. How will our borders of tomorrow be protected when the borders of today failed to serve as protection against illegal immigration and cross-border organised crime? With more of the world becoming interconnected, our data and personal information held on individuals becomes increasingly vulnerable to cyber criminals. 80 per cent of all big crime is now conducted on internet and organised crime has now become immune to prosecution. How can agencies share information and manage big data without being compromised by cyber policy, law or security issues? TOPICAL DISCUSSIONS There will also be a discussion on ‘Land Borders: The Challenges and Solutions’. Land borders provide great challenges for border agencies to monitor and protect lengthy borders with limited resources. For extended land borders, this challenge is enhanced, giving greater opportunities to the organised criminal gangs. What are the latest challenges facing our agencies and is it possible to enhance the protection and management of land borders? What are the solutions? Additionally, ‘Maritime, Port and Coastal Border Security’ will be explored. Coastal border security has become an increasing challenge coast guards and border agencies, with long sea borders and busy ports proving difficult terrain for surveillance and monitoring. What are the latest challenges facing our maritime border agencies and how can we best guard the coast and major ports from international organised criminal activities, including human trafficking and drug smuggling? Another interesting discussion is ‘Curtailing the Movement of International Terrorists and Criminals’. Spotting a terrorist or criminal and how to stop them travelling is a challenge. Often the intelligence on such persons is discovered after they have boarded or

World Borderpol Congress

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The 4th World Borderpol Congress brings together the like-minded leaders of the world’s border security establishments, to contribute to making the world a safer place crossed the border. The use of intelligence analysis and national security information sharing can greatly assist border agencies upstream intelligence to prepare for such events prior to their movement. What are the current challenges in identification and tracking of terrorists and criminals and solutions for curtailing their movement? Elsewhere, ‘Speeding Up the Screening Process: Trusted Travelling, Profiling, Programs and Solutions’ explores what the current challenges are in identification and tracking of terrorists and criminals and solutions for curtailing their movement, whilst trying to promote a smoother and speedier experience for the genuine trusted travellers. PROTECTING NATIONAL INTERESTS The World Borderpol Congress, supported by the Municipality of The Hague, is being held in The Hague, Netherlands, city of security, peace and justice on the 8-10 December at the Crowne Plaza Den Haag Promenade. The Congress brings together like minded leaders

of the worlds border security establishments to contribute to making the world a safer place, through the continual development and maintenance of the 3C’s that is cooperation, communication and consultation. In our totally interdependent world finding solutions to protect national interestsis becoming more and more challenging. Whilst World Borderpol Congress has now established itself as the forum for the global border community,Borderpol continues to seek new initiatives to foster global cooperation. As such Borderpol will make some important announcements at this year’s event that will help take the next step. Borderpol is inviting the industry to The Hague, Netherlands to join the largest gathering of border agencies and agencies at the border to discuss and debate how working and collaborating with international partners can improve border security for us all.  FURTHER INFORMATION www.world-borderpol-congress.com

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

35


Today, a simple passport is never enough... That is why we at Rockwell Collins continue to develop and implement a range of security products to help you protect your border. From biographics and biometric capture to automated gates we can ensure your country’s physical border stays secure. Our ARINC security suite of border management solutions, incorporating API, iAPI and PNR, are trusted globally to help strengthen security around the world.

Learn more at: rockwellcollins.com/arinc/ airports

Š 2015 Rockwell Collins. All rights reserved.

rockwellcollins.com


IMPACT TESTING

Perimeter security: why PAS 68 is not enough

It is not uncommon to see perimeter security products advertised as a ‘PAS 68’ barrier, bollard, blocker or gate. This descriptor also seems to have permeated into procurement, where ‘PAS 68’ products have been ordered from manufacturers, without much further specification. BSI PAS 68, and its European and international counterparts, CEN WA 16221 and ISO IWA 14-1 respectively, essentially contain only one performance requirement, that when tested in accordance with the test method specified in the standards the vehicle security barrier (VSB) shall – (a) Resist/ restrain/ deflect the test vehicle from advancing beyond the VSB; and/ or (b) Immobilise the test vehicle by trapping it; and/ or (c) Immobilise the test vehicle by preventing it progressing using its own engine power after impact. Where the requirements are met, the VSB is rated in accordance with the performance rating classification code specified in IWA 14-1: 2013/BSI PAS 68: 2013. So, in fact, where a claim is made by or on behalf of a manufacturer that a VSB meets PAS 68 requirements, they are solely relating to a single horizontal impact test. OPERATIONAL REQUIREMENTS Further guidance on selection, installation and use of VSBs is provided in IWA 14-2 (PAS 69). Part 2 of IWA 14 describes the process of producing Operational Requirements (OR) and also gives guidance on a design

Cyber s i security a lot g receivinion these t of attenand cyber days, re equally a threats vant to technical specification. rele meter Health and i r e p l a safety – what are the physic curity se mandated regulations

method for assessing the performance of a VSB. This considerably expands on the requirements, particularly for hostile vehicle mitigation, but which can apply to other threat mitigation. There are five stages of planning. Level 1 OR – a statement of security needs and security systems definition, based on threats (although these might not always be known). These may include VSBs, fencing, pedestrian access control, intruder detection systems, etc. Level 2 OR – providing more detail about the specific Hostile Vehicle Mitigation (HVM) measure, including site vulnerabilities, HVM measures performance requirements, physical and environmental constraints, rules, regulations and management, integration and success criteria. Level 3 is the technical specification – the detailed requirements for the security solution. Level 4 involves system commissioning, validation, training and handover, which includes assessing deliverables against the requirements, while Level 5 analyses lifetime operation – the maintenance and servicing that ensures reliable, safe and secure operation of the equipment. PERFORMANCE STANDARDS In addition to vehicle impact performance requirements, performance standards for the following form an essential part of the

Written by Stephen Munden, Perimeter Security Suppliers Association

What does PAS 68 actually mean, and what does it say about the procurement of security solutions? The Perimeter Security Suppliers Association’s Stephen Munden answers these questions

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

and supporting standards to ensure compliance and safe operation of the equipment? These could include electrical safety, electromagnetic compatibility (EMC), machinery safety and pressure equipment safety. CE Marking by the manufacturer/ installer will be required in many cases. The supplier’s Declaration of Conformity (a legal requirement) will include details of the regulations and supporting standards with which the equipment has been shown to comply. Environmental impacts – consideration here should include not only the significant environmental conditions that may affect the deployment or performance of the equipment but also the potential for adverse impact on the environment, for example hydraulic fluid loss getting into drains or soil. Organisational requirements – these may relate to the equipment in use under normal, abnormal and emergency conditions. They may also include quality criteria to which the equipment is expected to conform, for example finish, aesthetics, durability, longevity, etc. Security – as detailed in the PAS/IWA specifications and including integration with other security measures, traffic control measures and, if applicable, the public realm. E

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

37


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UTILISING MILITARY EXPERTISE TO DEFEND BORDERS AND PROTECT PEOPLE AND ASSETS Introducing HESCO® FRONTLINETM Security Barriers Rapidly deployable | Anti-climb | Surface-mounted Hostile vehicle mitigation | Intrusion deterrent

STOP EVERYTHING. hesco.com

38

COUNTER TERROR BUSINESS MAGAZINE | Issue 23


IMPACT TESTING

It seems highly likely that perimeter security technology will need to become even more integrated and a lot more sophisticated to cope with a wider variety of attack methodologies, which in themselves may be multi-layered

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

solutions for a safer world

 From what has been covered so far it can be seen that, in addition to functional performance requirements such as impact testing, further requirements, which may be common to all applications or specific to an application or site, must also be specified. These include physical specifications, procedural requirements, and non-functional requirements such as safety and EMC. The latter may also be Essential Safety Requirements, as defined under European legislation. NEW THREATS – NEW REQUIREMENTS Cyber security is, deservedly, receiving a lot of attention these days, particularly in respect of information security. However, cyber threats are equally relevant to physical perimeter security. There are several aspects to this, including the control of perimeter security equipment by electronic devices, the remote diagnostics of equipment, the integration of multiple devices and the so-called ‘Internet of Things’. Software is a particular source of concern, with many well‑known faults apparently not being rectified and widespread re‑use of chunks of uncontrolled code. There are now several relevant specifications relating to cyber security of physical security systems, including BSI PAS 754: 2014 ‘Software Trustworthiness. Governance and management. Specification’ and guidance from the Trustworthy Software Initiative. Hostile vehicles are not only confined to the ground. Another emerging threat is from the increasing use of Unmanned Aviation Vehicles (UAVs) or drones. Consideration now has to be given to how to detect and protect against UAVs, in addition to countermeasures against ground attack. It seems highly likely that perimeter security technology will need to become even more integrated and a lot more sophisticated to cope with a wider variety of attack methodologies, which in themselves may be multi-layered. ORGANISATIONAL RESILIENCE Given the complex and systemic nature of perimeter security solutions today, it seems unlikely that producing Operational Requirements and subsequent specification‑based on determined threats will by itself be sufficient. This is because by their very nature risks are uncertainties and cannot all be known. Instead of focussing only on physical threats, it also seems prudent to identify and modify organisational vulnerabilities which, if exploited, could impact the organisation’s mission or function. In other words, instead of asking ‘how do I protect this asset from multiple and unknown threats?’, ask ‘what essential capabilities must be maintained and what losses are unacceptable?’. This presents the need for a different type of specification which, while including ‘point solutions’, also includes a more holistic and systemic perspective. Some emerging standards in this area include BS 65000: 2014 and ISO 22316 Guidelines for Organizational Resilience and ISO 34001 on Security Management Systems. L FURTHER INFORMATION www.pssasecurity.org

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

39


Transport

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CARGO THEFT

Written by Thorsten Neumann, the Transported Asset Protection Association

Staying ahead in a never-ending race

40

The theft risk to cargo in the supply chain has never been greater and the threat of cargo crime is increasing, says Thorsten Neumann, chairman of the Transported Asset Protection Association in the Europe, Middle East and Africa region In its Global Supply Chain Intelligence Report, BSI Supply Chain Solutions put the cost of global cargo theft in 2014 at $23 billion having measured 20 risk factors in 203 countries. The Transported Asset Protection Association (TAPA) EMEA’s own Incident Information Service (IIS) Report for Q1 2015 shows an average loss value for cargo crime of €210,365, while in the Americas one report shows a 25 per cent year‑on‑year increase with an average Q1 loss of $256,966. It’s not a new phenomenon. Cargo crime has been around for as long as people have traded goods. 20 or so years ago, it was regarded

as petty, small‑time opportunist crime by individuals most likely working in a warehouse packed with desirable products. Today it is a very different story. Cargo crime involves gangs of organised criminals using increasingly violent, daring and sophisticated tactics. In some parts of the world, truck drivers have even been killed by criminal gangs intent on stealing their cargoes.

CRIME ON THE INCREASE Cargo In the Europe, Middle East a s i and Africa (EMEA) region, e m i r c r e the majority of cargo v e un crime is in Europe race yo ause the and South Africa. The c e win b ver ends. problem for industry race ne n do is stay is that we just don’t know the full scale of ca All you ont of the in fr chasing people ou y

the problem. We still quote the European Parliament study from 2007 that estimated the annual cost of organised theft of commercial vehicles and their loads in the EU to be €8.2 billion a year. In the eight years since that report, all the anecdotal evidence would suggest cargo crime has increased still further. If you go online and search, nearly every day there is a new report on a cargo crime from somewhere in the world. In the past few days, for example, one media report quoted one of the world’s major tobacco companies as saying it had suffered over 1,400 truck hijackings in South Africa in the space of 12 months. That’s just one company in one country. The challenge for industry is to get governments and law enforcement agencies to allocate sufficient focus and resources to the problem when they believe they have far greater public safety and other issues to address. I think most of us would be sympathetic to that view, but cargo crime isn’t a ‘victimless’ crime as it is sometimes described, and neither is it just about losing boxes of products that are insured and deemed easy to replace.


Earlier this year in a report looking at serious organised crime in Europe, Europol estimated that there are now 3,600 organised crime groups active in the EU. It is highly likely that many of the groups involved in gun and drug crime and people trafficking are also involved in cargo crime. One crime tends to fund another and organised criminals don’t tend to be too fussy about how they generate their income. THEFT ATTRACTIVE I want to also correct two other misconceptions about cargo crime. It is not just about the theft of high value goods, certainly not anymore. A more appropriate term is ‘theft attractive’ because often high volumes of low value goods are often quicker and easier to dispose of, and cargo criminals tend to know the ‘market’ to go to. We are seeing more incidents involving thefts of food and beverage, clothing and footwear, and cosmetics and hygiene products alongside what might be classed as the once more obvious targets of high‑tech consumer products and luxury goods. Another trade association recently likened hijacking a truckload of tobacco products to cargo thieves ‘striking gold’ while another often-quoted incident in Europe involved the theft of a vehicle carrying over €700,000 of cheese. These are just examples of a growing trend. One of the industry sectors most concerned about the threat of cargo crime is the pharmaceutical

industry, as the theft or contamination of pharma products could put lives at stake. This leads me on to the other misconception about cargo crime: that the cost impact is based solely on the value of the stolen goods. TAPA EMEA supported a recent study conducted by the University of Texas’ College of Pharmacy to identify the true cost of loss when cargo is stolen. It found the actual cost can be up to five times the value of the stolen product, taking into account all of the events that follow a theft. Notably, this includes: Replacement product costs; Loss of sales; Public relations costs; Investigational costs; Drug inspection and testing; Product disposal; Communication with providers; Added security costs; Outreach to client Costs; Quarantine costs; Added transportation costs; Increase in insurance cost; and recall process costs. Despite all of this intelligence, however, many companies only start to take the issue of cargo crime seriously once they become a victim. For some, by then it’s already too late, such as in the case of a transport or logistics provider that loses a contract with a major customer because the client just cannot trust them to keep their goods secure anymore. THE RACE YOU NEVER WIN Globally, TAPA has over 800 member companies that are the exception to this rule. Our membership includes leading global manufacturers across a wide range of industry sectors as well as logistics service providers and transport companies whose job it is to physically move products. These companies all share one aim: to manage risk to achieve supply chain resilience. TAPA members already have their own advanced, in-house security systems and processes but as part of the Association they gain the additional benefits of being able to adopt our industry-leading security standards. They also have access to our Incident Intelligence Service (IIS) that captures information on cargo crimes and the chance to network with like-minded professionals at our regional events. These companies recognise that cargo crime is a race you never win, because the race never ends. All you can do is stay in front of the people chasing you. Intelligence is vital in this to understand where cargo thieves are operating and the tactics they are using to target goods in the supply chain. In the latest issue of our monthly magazine Vigilant, we include an interview with a police officer who gives his views on cargo crime. His concluding comment, advice to businesses, perfectly sums up why TAPA members are three times less likely to be victims of cargo crime. He stated: “If you make yourself less vulnerable, you are a less likely target. In a target-rich environment, there is no sense chasing the fastest. You chase the slowest. The cheetah always goes for the one at the back of the pack. That’s no different here.

Transport

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

It’s easier to steal your money from a bank than to go to Fort Knox to get it.” When TAPA was first created by high-tech companies in the United States in 1997, cargo crime was predominantly about thefts from facilities. We helped companies to safeguard against this with our Facility Security Requirements (FSR). Later, it was obvious that it wasn’t only high-tech goods that were at risk and, as facilities became more secure, criminals turned their attention to products being carried on-board trucks. TAPA’s Trucking Security Requirements (TSR) now help our certified members to make their transport operations more resilient but for the industry as a whole, this is now the greatest threat. HIGH DEMAND In Europe, the lack of secured parking locations means trucks are regularly targeted when drivers take rest breaks on industrial estates and at service stations. We are seeing the increased used of ‘jamming’ devices that interrupt GPS systems and impair the ability for security monitoring centres to locate vehicles, as well as cases of ‘Theft from a Moving Vehicle’ where some gangs have perfected the ability to steal large quantities of products from trucks that can be travelling at 70-80kms an hour. We have evidence of fake ‘police’ stops and, in the last year or so, we have also seen a growing number of thefts of vehicles and loads from companies that have contracted with what turn out to be fake or fraudulent companies using online freight exchange portals. One of the initiatives we have launched to encourage more companies to reduce the risk of cargo crime is to launch entry level self-certification for our FSR and TSR security standards. Having earlier recognised the high demands on government budgets and police resources, I am pleased to say that we are seeing a very positive shift in the approach being taken by some countries and their law enforcement agencies. There is a growing realisation in countries such as the Netherlands, UK and Germany that cargo crime is a serious and growing problem with potentially heavy economic consequences. Moreover, there is an understanding that the best way forward is to embrace public-private partnerships, and TAPA is totally supportive of this approach. We are working increasingly closely at the EU level and with government ministries. We liaise with INTERPOL, Europol and TISPOL and are exchanging more information with law enforcement agencies at a national level. This is very encouraging and it is something TAPA is keep to promote globally because amidst all of the uncertainty and under-reporting of cargo crime around the world, the one thing we all seem to agree on is that the threat is going to increase. L FURTHER INFORMATION www.tapaonline.org

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

41


’s S o… W h a t o r f your plan d the secon 15? half of 20

COUNTERING THE THREAT

THE GLOBAL EVENT FOR TRANSPORT SECURITY LEADERS Secure movement of people and goods in: ■ Aviation Security ■ Maritime Security ■ Rail Security ■ Secure Transportation ■ Major Events Transport Security ■ Border Security

200 EXHIBITORS | FREE CONFERENCES SECURITY INNOVATION SEMINARS | NETWORKING www.transec.com

#TRS_expo

REGISTER FOR YOUR

FREE TICKET TODAY

OFFICIAL SHOW PARTNER


EVENT PREVIEW

Taking the right turn to counter the transport threat Returning for its 13th edition, the Transport Security Expo is taking place on the 2-3 December at London’s Olympia, bringing professionals together to counter the threat against the world’s transportation networks In order to keep up to speed with an increasingly developing industry, the Expo is introducing several new features for 2015. In collaboration with the Home Office, Transport Security Expo will be showcasing the new ‘Future Borders experience: The Art Of The Possible’, which aims to detail the next generation of border security. In addition there will also be a new Security Vehicles Zone and the World of Perimeter Security Feature. The Future Borders experience will accommodate a simulated airport security process and demonstrations of the most advanced solutions set to hit the market – including facial recognition, iris capturing, imaging systems and authentication. The Future Borders Theatre will also be the scene to hear the latest thinking from the government on where our borders could be in the years to come, and a wide range of conference presentations and live debates. THE WORLD OF PERIMETER SECURITY The World of Perimeter Security is not just a brand new feature for Transport Security

Expo 2015, it represents a first for the security industry internationally. In association with Allens Total Perimeter Security, the feature will offer visitors a complete end-to-end integrated solution to protecting the perimeter of any critical national installation. In addition to an interactive tour combining a video-briefing and a narrated introduction to such high-end products as specialist fencing, vehicle barriers and blockers, bollards, high security gates, CCTV and intrusion detection, the tours will culminate in a Q&A session with the experts. Tours are on the hour every hour on a first come first served basis. Peter Jones, CEO of Transport Security Expo’s organisers, Nineteen Events, commented: “We have some 30 + international delegations booked to attend Transport Security Expo this

Transport Security Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

year and by creating the World of Perimeter Security, we’re giving these high level decision makers a unique opportunity to view complete perimeter security solutions in one dedicated area.” Sean Salmon, operations director at Allens Total Perimeter Security, added: “In the past, visitors to security exhibitions had to walk around the hall looking at different technologies on different stands trying to piece the widgets together to make a complete solution. What we’re doing, and this is the big benefit for the visitor, is bringing everything together in one area and providing an escorted tour that will encompass the complete perimeter security picture. “Take the example of a visitor who may be responsible for security at a new petroleum plant – they don’t come along to a show asking “what’s the best bollard?” or “what’s the best camera?” – they’re looking for a total solution for protecting the installation. World of Perimeter Security will show them exactly what they need and save them a lot of time.”

n Aviatio the f is one oriorities p highest security on the th airports wi agenda airlines a PROTECTING and t for e g r THE SKIES a t key ts Aviation is one of the terroris highest priorities on the

security agenda with airports and airlines a key target for terrorists. But the tactics adopted by those with malicious intent are constantly changing. As Francis Morgan, Director of Policy, Heathrow Airport, has said: “Devising security strategies for aviation businesses becomes ever more complex. Every business involved in this industry needs to consider the numerous threats in the round and develop E

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

43



EVENT PREVIEW  a strategy that covers not only their aviation activities, but their systems, their commercial information, their intellectual property and their people.” One of the new developments changing the landscape, for example, is the use of social media. In the words of Andy Blackwell, Head of Corporate Security, Virgin Atlantic: “Within aviation, it’s not just the genuine threats to people and planes that you have to worry about but all the hoaxes, many of which are designed to cause economic damage. Social media, because of the speed of communication, has changed how we receive threats and in many respects how we manage them. These are new areas and you have to develop ways to differentiate between the hoax and the real thing.” Through its exhibition, conferences and security innovation seminars, Transport Security Expo will be covering the full range of aviation security issues – from the very latest technological developments to the application of human skills such as behavioural detection, from the coordination of international regulatory standards to bio-hazards to the screening of passengers and cargo. Aviation is Transport Security Expo’s longest‑established sector, attracting the world’s leading airports and airlines as well as freight and cargo handlers. In 2014 over £8.6m of procurement was brought to the Expo from the following visitors alone: Research and Development Manager, Heathrow Airport; Operational Manager Airport Security, Rotterdam The Hague Airport; Director of Safety and Security, British Airways; Emirates Group Security Divisional Vice President; UK Border Force National Scanner Manager; and CityJet’s Head of Security. AVIATION PROGRAMME The first part of this years Aviation Security stream is focused around Security and Facilitation. This programme opens with a session on ‘The Evolving Threat’, ‘Current Threats to Civil Aviation - The UK Response’, ‘The Threat Horizon’, and ’Security Management Systems’. The second part of the Aviation Security programme concentrates on Smart Security and Capacity Building. Taking part in the afternoon of Day One, this session includes ‘The Role of the European Civil Aviation Conference in Supporting Aviation Security’, ‘New Initiatives in Smart Security’, ‘The Promise of New Screening Concepts & Pre‑Airport Passenger Risk Assessment’ and a live debate on ‘How Effective is our Aviation Security Regime?’ Part three of the Day One aviation discussion addresses ‘The Security Technology Dilemma’. This involves sessions on ‘Security as a Service for Future Proof Airports’, ‘A Multi-layered Integrated Approach to Security’, ‘Passenger Remote Screening at Gatwick Airport’, ‘The Role of Technology in Countering Security Threats and Risks’, and a second live debate

on ‘Do Technology Developments Lag or Lead Operational Enhancements?’. The Aviation Security trail continues on Day Two of the Expo with part four and part five of the aviation series. Part four, entitled Flight Deck Security & Management, begins with a session on ‘Too Great an Influence on Flight Deck Security?’ This is followed by ‘Lessons from the 4U 9525 Tragedy’, ‘Mental Health Impacts in Aviation’ and a live debate on ‘Securing the ‘Skies’. In the afternoon, the final Aviation Security programme takes place, addressing Security Developments and Advances. This opens with ‘Preparedness for Insider Threat’, and is followed by ‘Detecting Persons of Interest Following an Insider Attack’, ‘Is it Time for a New Security Culture that Exploits Technology?’, before closing with a final live debate on ‘Can Technology, Research and Development Ensure Future Security?’ MARITIME SECURITY Running alongside the Aviation Security session programme is the Maritime Security section of the Expo. Part One of the three‑part programme is on the morning of Day One and is entitled ‘Global Maritime Security – Evolving Threats. It begins with an EU Commission Update, before exploring ‘Global Maritime Security – NATO’s Approach’, ‘Phenomenon of Migration in the Mediterranean Sea – Implications for Merchant Shipping’, ‘Migrant Smuggling: Tackling Transnational Organised Crime’, ‘Lessons from the Migrant Rescue Crisis’, before closing the morning with a live debate on ‘Can Inter-agency Collaboration Really Ensure Maritime Security and Effectively Tackle the Latest Crises?’ Part Two of Maritime Security looks at ‘Security Threats – Beyond Piracy’. Opening with a session on ‘Maritime Security Policy as an Enabler’, the programme evolves to

study ‘The UK National Strategy – Ensuring the Safety and Security of Ports, Offshore Installations and Ships’ and ‘Global Maritime Risks: Key Threats to Maritime Supply Chains in 2016’. The afternoon section of this session analyses ‘Maritime Cyber Security – Risks and Mitigation Strategies’, ‘The Stealthy Maritime Security Crime where Occurrence has turned from ‘if’ to ‘when’: an African Maritime Cyber Security Perspective’ and closes with a live debate questioning ‘Is the Next Hacker Playground the Open Seas? How should National and International Partners Respond?’. The final section, Ship & Port Security, initially examines ‘The Security Conundrum for Every Port – Balancing Security and Facilitation’. This is succeeded by ‘Port Security Regulations and Policies: A Critical Review of the Risk Based Security Assessment Model’ and ‘Ship Safety and Security – Exploiting Best Practices and Cutting-Edge Technologies’. At 14.45 – 15.10 the ‘Threat Intelligence & Assessment – Principles for the Maritime Industry’ session will take place, before ‘ISIS Export Gateway to Global Crude Oil – Implications for the Maritime Supply Chain’ is heavily discussed. Closing off the entire Maritime programme is a final live debate on ‘What are the Most Pressing Security Threats Now and for the Future? How has the Threat Landscape Changed? And can Security Technology and Best Practice Keep Pace?’ L

Transport Security Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Wednesday 2 December – 09:00 – 17:00 – Exhibition & Seminars Drinks Reception from 17:30 – 19:30. Thursday 3 December – 09:00 – 16:30. FURTHER INFORMATION www.transec.com

Running alongside the Aviation Security session programme, is the Maritime Security section of the Expo, with a comprehensive three-part programme addressing port security, potential threat as well as supply chain issues

COUNTERING THE THREAT

45



EVENT PREVIEW

The safety and cost benefits of UAVs

Commercial UAV Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Unmanned aerial vehicles (UAVs) are having a significant impact in blue light activities across Europe, specifically fire and police services. So why are UAVs becoming so widespread across the UK’s blue-light services? Gaining a quick and cost effective aerial advantage in a blue-light incidents can save lives, and greatly increase the chance of success in blue-light operations. Current applications identified include fire detection and extinguishing, poisonous gas detection, fire source and intensity detection, police surveillance, crowd management, border patrol, HazMat and mountain/sea search and rescue. Compared to previous methods of costly, inflexible helicopter use, UAVs will continue to streamline blue-light activities for the benefit of employees and the wider population across Europe.

Blue-light services across the UK are leading the way in proactively coordinating a nationwide collaboration with regards to UAV adoption. In addition to cross-regional collaborations, strong ties have been forged with commercial partners, leading in the longer-term to a better understanding of what is required from the blue-light community with regards to platform design and function. Brigades and forces across Europe continue to use the Commercial UAV Show as a vital meeting place in which to re-affirm those ties, and share new ideas and experiences with the wider blue-light community.

COST OF PLATFORMS The cost of multi-rotor platforms continues to fall, increasing their attraction compared to traditional costly methods of obtaining an aerial perspective on an emergency incident. The increasing variety and capability of ‘hotswappable’ sensors alongside weight reductions has facilitated widespread sensor use in blue-light services across Europe. Sensor applications range from detecting the source and intensity of a fire, victim location and poisonous gas detection. This data can greatly reduce the safety risk to the emergency services, whilst saving precious time identifying the most dangerous zones within a fire and the most efficient means of extinguishing it.

COMMERCIAL UAV SHOW The most active brigades and forces from across the globe will be attending the Commercial UAV Show in London this October to present the results from their recent projects, and update new potential adopters to the time, safety and cost benefits of using UAVs. The key topics to be covered during the conference and seminar sessions include: How to integrate UAVs into your current bluelight activities, and the benefits of doing so; What are the biggest obstacles to UAV adoption for blue light organisations?; What impact is current regulation having on UAV blue light activities?; What innovations in UAV equipment could allow for new applications in the blue-light sector. Early confirmed attendees include the Dutch Fire Service, Copenhagen Fire Department, Sussex Police, Metropolitan Police, Danish Police Department, Danish Security & Intelligence Service, Dorset Police, Greater Manchester Fire & Rescue Service and Hampshire Fire & Rescue. L

ts The cos otor i-r of mult continues s platformcreasing their to fall inn compared to o attracti ional methods tradit ing an aerial of gett spective per

DATA ANALYSIS Improvements in data analysis is fuelling the uptake of UAVs across Europe. Due to the improved sophistication in sensors capabilities, the process of turning this data into useful and actionable information becomes vital in justifying the costs and operational changes required to maximise the value of UAV adoption. Blue-light forces across the UK and Europe continue to capitalise as a leading industry in the UAV sector, showing a flexibility to new technologies that has reduced costs and increased efficiencies that are passed directly onto the general public.

FURTHER INFORMATION Readers of Counter Terror Business can save 15 per cent off the cost of attending the keynote conference by using booking code EZPW on the online registration page. Full details can be seen at www.terrapinn.com/uav-ctb

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

47


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TECHNOLOGY

Getac unveils rugged and secure mobile hardware – inside and out Whether you need better display readability for outdoor productivity or dual-batteries and advanced power management to cope with a longer working day, Getac has you covered Counter-terror often requires end users to battle harsh environments while needing access to extremely sensitive data. That is why Getac is launching its latest secure tablet at DSEI, which combines Getac’s unparalleled physical ruggedisation with hardware security from an industry-leading encryption partner. TRUE MOBILITY Getac’s market-leading 11.6” F110 Windows tablet, certified to MIL-STD-810G, has been modified to integrate a CESG-certified secure 2.5”, 7mm Solid State Disk (SSD). The modification allows the tablet to hold, process and protect classified data up to and including Top Secret. The small form factor, coupled with the secure SSD, means true mobility for end users working with highly classified data, while in precarious physical and security environments. The new F110 means that users who previously had to carry a laptop now have access to a fully rugged yet low-profile secure tablet solution. The device’s high-definition screen incorporates Lumibond® 2.0, the latest version of Getac’s proprietary technology for visibility in bright sunlight with a unique screen-bonding process. This allows touchscreen usage in the rain, or with gloves, or with a stylus – making the device perfect for outdoor operations. In addition to the F110 with secure SSD, Getac will be joined on the stand by a range of industry partners. Getac collaborates closely with experts in both the hardware and software solution space, resulting in truly unique products and solutions that fit exactly with customer requirements. FULLY RUGGED COMPUTING DEVICES Getac’s partners at DSEI are Centerprise International (end-to-end supply chain IT management service in secure data environments); Serbus (experts in commercial and defence communication solutions with Cryptify, providing secure voice calls and secure messaging, worldwide); Helyx (geospatial information systems and their management, information exploitation and capability management support); Becrypt (Windows and Android software encryption solutions, up to and including

48

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

Top Secret); and Phoenix (Electronic Flight Bag platform integration). Since the firm was founded as a joint venture between GE Aerospace and MiTAC in 1989, Getac has supplied militaries worldwide with fully rugged computing devices to supply electronic products to the defence industry. These include the new T800 thin and light fully rugged 8” Windows tablet, the X500 fully rugged mobile server, and the 7” Z710 Android tablet – all of which will be available at DSEI for evaluation.

Today, Getac is a subsidiary of the $30bn MiTAX-Synnex Group and supports military and defence agencies across the globe, including the US Army and the UK Ministry of Defence. L FURTHER INFORMATION All partners and products are available to view at Stand S9-207 +44 (0) 1952 207 222 Defence_UK@getac.com www.getac.co.uk

X500 Fully Rugged Mobile Server The X500-G2 Fully Rugged Mobile Server combines the highest level of mobile performance without compromise. Designed for military use with MIL-STD-810G certification and rated to IP65, the X500 has been designed to survive critical working environments without any compromise on performance and offers users the ability to deploy a mobile rugged server to the field giving instant server capability at the start of operations. Communication is handled seamlessly through best-in-class networking interfaces, including standard Dual Ethernet, Intel® Dual Band Wireless-AC 7260 and Bluetooth (WiFi Combo BT4.0). Optional SiRFstarIVTM GPS Gobi™ mobile broadband functionality can also be specified. A large 15.6” QuadraClear® display (800nits) provides enhanced screen readability under sunlight and graphic capability in outdoor environments. With up to 16GB of RAM (or 32GB for the X500-G2 Rugged Mobile Server) and 500GB storage, multiple applications can be run simultaneously without compromising on performance. With the X500-G2 Rugged Mobile Server expansion chassis, RAID expansion

is possible, holding up to five shockprotected disk drives, offering up to five terabytes of storage. Secure encryption solutions are available from Becrypt and Viasat. The X500 also operates on Windows Server 2012, which allows server clustering to protect against failure and deliver continuous high-performance operational uptime. This includes load balancing by distributing workloads across connected units which maximises performance levels while enhancing availability, and fault tolerance, which prevents downtime and allows continuous device operation.


EVENT PREVIEW

Emergency Services Show offers showcase for resilience

Emergency Services Show

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Taking place at the NEC in Birmingham on 23 and 24 September, the Emergency Services Show provides an interactive showcase for key resilience organisations and equipment and training providers As the nature of terrorist threats continues to evolve – often taking unpredictable turns - so does the role of the counter terror professional. Innovative ways of working, new skills and increasingly sophisticated equipment are required to effectively protect the public. Keeping abreast of all the developments and support available can be a real challenge, but one very efficient way to update your knowledge is to attend this year’s Emergency Services Show. FREE SEMINARS A programme of free-to-attend seminars at the event will cover innovation, collaboration/interoperability and training. Seminars of particular interest to counter-terror professionals include: Building Foundations for a Resilient Future and Keeping the UK Crisis Resilient: Luana Avagliano, Head of ResilienceDirect. Tunisia – a humanitarian response: An overview of the British Red Cross response to the terrorist attack in Tunisia: Simon Lewis, Head of Emergency Planning and Response, British Red Cross. Understanding and Integrating Emergency Drones Successfully : Justin Pringle, Drone Developer, Drone Ops. Digital technology in emergency response ‘from the ground up’ – discussing Unmanned Aerial Vehicles (UAV) (Drones) and Body Worn Video (BWV) in Emergency response: Matt Wroughton, West Midlands Fire Service. RESILIENCE ORGANISATIONS Resilience organisations exhibiting at the show include The Emergency Planning Society, the Institute of Civil Protection & Emergency Management (ICPEM), the Kent Resilience Team (KRT), The School of Resilience, the National Inter-Agency Liaison Officers (NILO) and The Civil Contingencies Secretariat. Personnel from the Joint Emergency Services Interoperability Programme (JESIP), the Emergency Services Collaboration Working Group and the Home Office Emergency Services Mobile Communications Programme will also be available to talk to visitors about co-operation across the emergency services. Suppliers of equipment of interest to counter terror professionals including PPE, surveillance,

communications, first aid, IT and clean-up and recovery services will all be on hand at the show. They include the following: Reveal’s body-worn cameras are compact, simple to use, robust and waterproof. They record high quality audio and video, which gives an immediate and exact record. Excelerate Technology has been selected as the provider of satellite communications solutions and IT integration on board four new mobile police stations now in development for Dyfed-Powys Police. This investment will support the Force in their operations of safeguarding people living, working and visiting the area. WCCTV, manufacturer and developer of redeployable, portable CCTV and surveillance systems, specialises in the transmission of live and recorded video, audio and alerts via mobile phone networks (4G, 3G, GPRS and Wi-Fi) to provide security and surveillance on a temporary, semi-permanent and longterm basis. The Company’s key products include redeployable dome cameras, bodyworn CCTV, remote site security systems and vehicle-based CCTVsolutions. TRAINING PROVIDERS Training 4 Resilience acknowledges that the first step to becoming resilient is through training and preparation. A recent project of interest to counter terror professionals is The School of Resilience and Emergency Response: a collaboration between the Fire Service College and Training 4 Resilience to create an establishment for the delivery of true wide spectrum multi-agency training; as well as providing the capability to undertake vertical training within individual agencies and organisations to improve the overall skillsbase and civil contingencies arrangements. The Emergency Planning College delivers Cabinet Office-approved emergency planning and crisis management training including real-time simulation exercises. It also provides a central forum for knowledge sharing and focuses on multi-agency working, disseminating best practice nationally and internationally to enhance worldwide resilience against natural disasters, major incidents and malicious attack. Xact Consultancy and Training Limited

Registration The Emergency Services Show takes place on 23 and 24 September at the NEC in Birmingham. To register for free entry visit www.emergencyuk.com offers courses for the police and other investigative agencies in interviewing, investigation and intelligence. Key areas include: PACE, CPIA, PIDA (whistle blower), RIPA, Witness statement-taking, Interviewing, Safeguarding children (Tiers 1-3), Child abuse awareness, NIM, Intelligence, internet/open source and Document/identity verification. The Tactical Training Centre is a unique firearms and multifunctional training facility, working for and with the community, protecting people. It provides UK curriculum compliant training to the police, other law enforcement agencies, blue light services and the military. It delivers firearms training as well as advanced medical training. Emergency Response Driver Training Ltd provides RoSPA accredited Emergency Response Driver & Instructor Training and Support & Resilience Services to over 37 Emergency Services across the UK and Worldwide. Other exhibiting organisations of particular interest to counter-terror professionals include: The Institute of Civil Protection & Emergency Management; London Metropolitan University; Mabway; National Ballistics Intelligence Service; National Chemical Emergency Centre; Joint Emergency Services Operability Programme (JESIP); Public Health England; Quiss Technology; Securitas; Train 2 Protect and UK Government Decontamination Services. GETTING THERE The NEC is linked to Birmingham International Station and Birmingham Airport and is directly accessible from the UK motorway network. Entry and parking at The Emergency Services Show is free. L FURTHER INFORMATION www.emergencyuk.com

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

49


IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT REVIEW

Celebrating innovation and inspiration at IFSEC 2015 Following an increase in visitors and the popular co-located events, IFSEC International 201 enjoyed another hugely successful year at Europe’s largest security event Running from 16-18 June at London’s ExCeL, IFSEC International welcomed 23,079 visitors through its doors, witnessing an increase in attendance by two per cent from 2014, driven by UK attendees. IFSEC International benefitted from the co-located events within the Protection & Management Series, attracting an additional 4,536 visitors from across the venue. This highlights the power of these shows being located alongside each other, demonstrating that it is the go-to place for sourcing the latest products and innovations, as well as discovering expertise across security, fire, facilities and safety. The show continued to attract the senior decision makers from across the industry with a 14 per cent increase in end-users and a 42 per cent increase in directors and company holders, demonstrating the quality of visitors remains at an all time high. Video Surveillance, Access Control and Integrated Security remain

50

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

significant areas of interest, while the ever increasing topic of Safe Cities, which was reflected by the education available on the show floor, and IT & Cyber Security received more attention than ever before. EXCEEDING EXPECTATIONS As the industry becomes increasingly globalised, IFSEC International remains a truly global event as represented by 33 per cent of the total attendees from 112 countries, along with exhibitors coming from 45 countries. For the second year, the UKTI Events Alliance worked with the British Security Industry Association (BSIA) to bring inward missions of commercial officers and relevant buyers from target countries to meet with UK based organisations at IFSEC International.

Gerry Dunphy, event director for IFSEC & FIREX International, said: “IFSEC International once again exceeded all expectations for 2015. The atmosphere on the show floor was fantastic with plenty of innovation and industry expertise on display across the three days. We have had a great response from both our visitors and exhibitors and we look forward to returning to London in 2016 to continue to be the industry leading event showcasing the latest security technologies from across the globe.” Exhibitors to the show were equally enthusiastic about IFSEC International. TDSi, one of the UK’s leading suppliers of integrated access control systems, reported a 25 per cent year-on-year rise in export market visitors to its stand this year. John Davies, managing

IFSEC al tion Interna ed all exceed ions for t expectaatmosphere he 2015. T antastic with was f ation and innov expertise y industr display on


director of TDSi, said: “IFSEC International is a great barometer of the state of the security industry and it was obvious that the market has become truly globalised, with a sizeable increase in visitors travelling from other regions to see the latest and best the security industry has to offer.” Mark Tibbenham, managing director at GJD, added: “IFSEC 2015 has been a great success. We launched an unprecedented number of product innovations and in turn we received a high number of quality leads.” SAFE CITIES Safe Cities focuses on the protection of larger urban areas, critical national infrastructure and business continuity. Safe Cities provided visitors with high level thought leadership sessions to provide more insight into this fast growing concept. Safe Cities utilises a multi-agency approach, led by the government to protect the population, the infrastructure and a city’s economy against the threat of terrorism, criminal activity and natural disasters. With a focus on four key areas – the city’s infrastructure, cyber security, counter terrorism, and public order – the Safe Cities conference and exhibition provided delegates with the chance to learn from education, solution and technology providers for global governments, public sector officials and companies, on how to secure their cities from threats and attack. Discovering how to protect vital international cities and hubs from attack, with a key focus on business continuity and resilience, this area showcased the companies and industry pioneers who have the expertise, experience and knowledge to guide governments and industry to plan for the protection of their cities. INSPIRATIONAL SPEAKER SERIES An additional highlight at IFSEC International this year included the launch of the Inspirational Speaker Series which attracted large crowds from across the security, safety, fire, facilities management and service management industries to the 400 capacity theatre each day. Kicking off with Baroness Karren Brady on the first day, followed by Sir Ranulph Fiennes on the second day and finishing with Sir Chris Hoy on the final day, each speaker took to the stage to share anecdotes from their own illustrious careers and offer some invaluable advice on leadership and achieving success in any field. Another new launch for IFSEC International in 2015 was the Benchmark Innovation Arena which welcomed over 40 finalists for the annual industry awards, a series of 10 minute pitches and short Q&A sessions were hosted by leading companies including Bosch Security, Vidicore, UTC Fire & Security and Secure Logiq, to name a few. This exciting new format provided visitors to IFSEC International with a detailed look at these new products that are delivering a real benefit to end users, integrators and installers.

IFSEC International

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

About IFSEC International IFSEC International is the leading event that caters for the entire security buying chain. Attracting manufacturers, distributors, consultants, specifiers, installers, integrators and end users, IFSEC International is the only event to bring the whole community together under one roof. Providing education, networking, and the latest products, next years

IFSEC International takes place from 21-23 June 2016 at ExCeL London. IFSEC International is part of the Protection & Management Series which is made up of FIREX International, Facilities Show, Safety & Health Expo and Service Management Expo.

Each speaker took to the stage to share anecdotes from their own illustrious careers and offer some invaluable advice on leadership and achieving success in any field THE VISITOR EXPERIENCE Visitors were equally enthusiastic about IFSEC International this year. Peter Woollord, a senior IT engineer from Norland Managed Services, said: “I have enjoyed the event very much. I found that the completely right exhibitors were there and it opened my eyes to everything out there. The event is a great place to network and there was a very good crowd there. It was the first time I attended and I would definitely return.”

Peter Allsopp, security consultant for astile Kilo Management, also stated: “I enjoyed the event and attended for buying and networking reasons. I did a lot of networking with companies from China as its easier to speak with them face to face and a lot cheaper. I definitely think the event is a must attend and will recommend to colleagues. – I am extremely happy with the event and happy to have attended.” L FURTHER INFORMATION www.ifsec.co.uk

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

51


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INTELLIGENT SOLUTIONS

Deploying Intelligence Capability – it doesn’t need to be difficult…

Meeting user demand for high-performance, content rich mapping capabilities in mobile or deployed headquarters is often extremely challenging. Helyx is able to help you meet these challenges through a range of intelligence platform solutions designed to satisfy even the most demanding of users

DETACHMENTS THROUGH TO DEPLOYED COMMANDS The needs of a small intelligence detachment is significantly different to those of a deployed Silver or Gold command where the number of users and agencies being supported rapidly increase. As a result a onesize-fits all solution is neither appropriate nor cost effective. Helyx work with ruggedised hardware

52

specialists Getac, in providing a complete range of technology platforms and solutions that provide the necessary processing and storage capabilities to support small scale deployments through to major incident or event commands. Solutions can be either self-contained in rugged cases ready to deploy or can be integrated into command vehicles to provide a more permanent and readily available capability. INDUSTRY LEADING GIS SOFTWARE & SERVICES Helyx’s GI Servers are built using industry leading software from Microsoft and Esri to provide a best-of-breed solution as well as providing a familiar technology base to integrate into existing mobile commands and headquarters; minimising the impact on support teams. The use of industry standard technologies ensures that integration with

Helyx Officer Briefing Tool (BeatMaps) running on a Helyx Portable Geo-Server

User expectations are increasingly being based on the services provided by the likes of Google or Bing which are difficult to meet in secure or disconnected environments. Helyx’s experience from over a decade of supporting defence and security organisations develop and deliver deployable intelligence solutions has resulted in a range of capabilities that are able to address these demands and significantly enhance the effectiveness of staff when deploying to major events or incidents. The use of intelligence capabilities, operational decision support platforms and tools within a fixed environment are relied upon every day. The degree to which these same capabilities are made available to deployed teams and commands varies significantly – despite the benefits being broadly considered to be magnified when they are deployed to directly support decision making and operation management teams. Helyx provides deployed intelligence capabilities that are designed to support operational teams in a range of environments and settings. Deployed geographic intelligence platforms are designed to help by providing a consistent geographic view of an operation. Additionally, a deployed intelligence platform is able to support deployed command and control platforms and operation planning systems. This simplifies deployments, reduces reliance on expensive reach-back communications links whilst improving the ability and efficiency of a mobile command to operate.

existing capabilities in the fixed or static headquarters is significantly eased. Where deployed commands need to be augmented with deployed analysis capabilities Helyx is able to provide protectively cased analysis workstations that are designed to meet the processing and storage of a deployed intelligence cell capable of operating at a variety of security classifications. A large-format printer (A3+) or plotter (A1 / A0) can also be included with analysis workstations ensuring that larger format hard-copy briefing products and documents are able to be easily and conveniently produced. L FURTHER INFORMATION Contact Helyx SIS: Tel: 01684 273 725 enquiries@helyx.co.uk www.helyx.co.uk


MIGRANT CRISIS

NEWS IN BRIEF

UK and France to form command centre to stop people smugglers British police will be deployed to Calais to form a command and control centre to prevent people smugglers. Home Secretary Theresa May made the announcement along with the French Minister of the Interior, Bernard Cazeneuve, on 20 August when she travelled to the French town. The deal will see UK officers work alongside French law enforcement, as well as Border Force personnel, to help alleviate the current migrant crisis. The move aims to disrupt organised criminals attempting to illegally smuggle

DB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

New Type-26 Global Combat Ship designed to protect against cyber warfare The new Type-26 Global Combat Ship has been designed to protect it’s weapons, engines and systems from the growing threat of cyber warfare. The Type-26 is being developed by BAE Systems and is intended to be the workhorse of the Royal Navy when it is built. The focus on protecting the ship from cyber attacks comes after warnings earlier this year from academics at Lancaster University that naval warships could be rendered useless if enemy forces employed skilled hackers. The report, entitled ‘The Future of Maritime Cyber Security’, highlighted that capital spend was not enough to ensure maritime power, as cyber attacks offer a low cost option to cripple maritime operations. Geoff Searle, head of the Type-26 programme at BAE Systems, said that the threat of cyber attack had been taken ‘very seriously’ in the development of the Type-26. Searle explained that BAE Systems has taken special considerations for cyber warfare, especially in areas of the combat system, communications systems and power and propulsion systems.

migrants into Northern France and across the channel, ensuring a collaborative approach between both countries. Additional measures in the new agreement will include: additional UK resources to secure the Eurotunnel, including fencing, CCTV, flood lighting and infrared detection; the deployment of extra French policing units; and a security audit to be carried out by specialist French and British police teams. READ MORE: tinyurl.com/q9v6ptj

READ MORE: tinyurl.com/pa73l78

ICT

HMS Artful arrives at Clyde Naval Base Britain’s latest Astute Class attack submarine will soon be in operation after arriving at Her Majesty’s Naval Base (HMNB) Clyde. The 7,400-tonne Artful submarine was constructed by BAE Systems in Cumbria and features nuclear powered technology. The Astute Class are Britain’s most powerful attack submarines, with the ability to strike targets up to 1,200 miles from the coast. The Artful can manufacture oxygen from seawater and features advanced stealth technology, allowing it to remain undetected despite being 50 per cent larger than the current Trafalgar Class. The HMS Artful will carry out sea trials from her Scottish base port on the Clyde until entering service later this year. Defence Minister, Philip Dunne, said: “The arrival of Artful to HMNB Clyde clearly shows that the UK government is firmly committed to the future of defence in Scotland. This is the latest addition to what will be the home of all Royal Navy submarines by 2020.

“The Astute submarine programme is a key part of our £163 billion equipment plan which has been bolstered by the commitment to increase defence spending and meets the NATO pledge of two per cent of our national income for the rest of this decade. “The Astute Class are amongst the most advanced submarines operating in the world today and provides the Royal Navy with the capability it needs to defend UK interests at home and overseas.” Chief of Materiel Fleet, Vice Admiral Simon Lister, said: “I am delighted that Artful has arrived at her home port to prepare for operations as this marks a key milestone in the Astute class submarine programme. “The build of the first two Astute Class submarines has taught us many lessons. Artful can soon begin operations as the newest submarine in the Royal Navy.” READ MORE: tinyurl.com/pn2qna4

Poor NHS treatment for amputee veterans A report, written by former Royal Marines Captain Jon White, has claimed that poor NHS care for amputee servicemen can be “tantamount to physical abuse”. White, who lost both legs above the knee and his right arm at the elbow, recorded the experiences of 160 servicemen who had a leg amputated above the knee after being wounded in the Iraq and Afghanistan conflicts. His report calls for changes to the care offered for veterans including the option for them to continue receiving treatment from the military or from a specialist clinic instead of the NHS. A lack of expertise in the UK means that ‘some of the patients will find themselves in a state of perpetual interventions as clinicians experiment unsuccessfully, again and again, in order to try and deliver the patients’ needs’. READ MORE: tinyurl.com/ntly5t5

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

53


T.REACT CIP Wide Area Protection

INTELLIGENT WIDE AREA PERIMETER DETECTION SOLUTION T.react CIP is the fastest and most precise way of detecting, identifying and tracking both internal and external perimeter threats in areas where business continuation is a matter of national importance.

KEY BENEFITS Automatic wide area threat detection, tracking, and identification Simultaneous handling of both internal and external threats Scalable from smaller installations to border size solutions Easy third party sensor integration.

LOOK FOR TERMA AT DSEI, 15 - 18 SEPTEMBER 2015

Follow us on Twitter & LinkedIn

www.terma.com


Exploring defence on the international stage

DSEI 2015

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

‘Defence and security through partnership and co-operation’ will be the theme of DSEI 2015, the flagship event for the defence and security community, taking place from 15-18 September Defence and Security Equipment International (DSEI) is the world’s largest land, sea and air defence and security exhibition. The event, which takes place at ExCeL London will feature a record 1,500 exhibitors providing a global showcase of innovation, seminar theatres offering free educational sessions and over 40 international pavilions. The theme ‘Defence and security through partnership and co-operation’ has been chosen as it brings together the entire defence and security industry to source the latest equipment and systems and develop international relationships. The last DSEI event, which was held in 2013, attracted over 32,000 visitors, 156 programmed delegations from 56 countries and over 2,800 global VIPs who met with 1,489 exhibitors from 54 countries. The 2015 event is being planned as a forum where top figures from established and emerging nations in the defence community will be invited to describe how co-operation, ranging from joint operations to strategic alliances, is transforming the ability to counter threats to peace and security. DSEI’s truly international scope enables companies and individuals to build relationships, forge partnerships and access new markets by bringing key countries and entire geographical regions as well as specialist sectors all in one place. The event is expected to hold over 40 dedicated pavilions which will host international exhibitions with 39 countries represented. This year Latvia, Lithuania, Poland, Malaysia and Greece will be making their debut with others returning to do business in a global market.

CRITICAL SECURITY The global defence and security sectors needs are in continuous evolution as new threats to national security have to be countered, new markets are emerging and new capabilities are being developed. This need for military and security forces around the world to procure platforms, systems and equipment that meet operational and budgetary imperatives is highlighted by the continued growth of DSEI. Security has become firmly established as the fourth pillar of DSEI. The 2015 event will see focus on critical areas of security, such as biometrics, cyber warfare, CBRN and counter terrorism. There will also be a Security and Special Forces Zone with briefings by leading experts and capability demonstrations.

have its own dedicated theatre plus there will be an additional theatre covering Global Partnerships. DSEI will also stage four new high-level conferences focused on the future strategy of maritime defence, rotorcraft technology, front line medical services, and lessons learnt from the recent Ebola epidemic. Admiral Zambellas will be giving the keynote address at ‘The First Sea Lord/RUSI International Sea Power Conference’, which will provide an excellent conceptual component to the already strong maritime element of DSEI 2015. Brigadier Tim Hodgetts, medical director at Defence Medical Services (DMS) will be the keynote speaker of the ‘Trauma Innovation’ strategic conference. Designed in partnership with DMS, the agenda has three themes: Legacy of Conflict; Future Conflict; and Conflict Research. The ‘Future of Military Rotorcraft: 2030 and Beyond’ conference will examine the drive to develop military rotorcraft beyond their current traditionally limited operational capabilities. It will involve an in-depth discussion of the US’ Future Vertical Lift (FVL) Programme. Major General Richard Felton, Commander, Joint Helicopter Command, will provide the keynote speech here. Air Marshal Paul Evans, Surgeon General of DMS will chair the ‘Ebola Learning Exploitation’ strategic conference. It will E

DSEI t will hos ns o exhibiti untries co with 39 ted. Latvia, n represe nia, Poland, Lithua and Greece ia Malays be making will but their de

CONFERENCES AND SEMINARS Reflecting the increased level of content for 2015, DSEI will host around 300 seminar sessions and keynotes across seven theatres and four strategic conferences facilitating knowledge sharing and networking around key topics and technical areas. DSEI’s seminars will address the challenges, developments and future of the Defence and Security sector’s ever-changing landscape providing the global platform of choice for key government figures and influential policy makers within the sector. Each zone will

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

55


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COMMUNICATION

Counter Terrorism? We’ve got apps for that Shop Alert from Alert Innovation provides the ability to communicate instantly with retail units and has become a tool of choice for the management of many shopping centres throughout the UK Shop Alert, today widely recognised as a generic term within the UK shopping centre sector, continues to evolve and cement its reputation as the most complete and up-to-date security management system for centres nationwide. The newest bespoke version, Shop Alert 20 20, a web-based system with tabletlike touch screen tenant keypads, is now equipped with an enhanced suite of apps, among them major incident apps that are key to Shop Alert’s mission to assist centres to become Stay Safe environments. The latest Firearms & Weapons Attack Response App was specifically developed and introduced to meet concerns highlighted in NaCTSO guidelines issued in the wake of the horrific events in Kenya when terrorists attacked a Nairobi shopping mall, killing more than 60 people. The massacre acted as a wake-up call to UK shopping centres to review their Stay Safe procedures and Shop Alert reacted both promptly and swiftly by adding the Firearms and Weapons Attack Response App to its ever-evolving portfolio. The ground-breaking app keeps Shop Alert, part of the Alert Innovation Group, at the cutting edge of modern-day technology in its specialist sector. KEY FEATURES The Firearms and Weapons Attack Response App is an extremely powerful and innovative tool that equips shopping centre security control rooms with a facility that provides a speedy, strategic and planned response to zonal evacuation. Vitally, it is a non-action response facility, providing key information to centre management about where suspects are operating and where people are moving about, without requiring any deliberate response from the unit occupant. All security personnel aware of a gun or knife attack are required to do is activate the app, which simultaneously notifies every individual retail unit and simply and clearly explains the procedures that shop staff should follow. In turn, security control centre monitoring stations are able to see which tenants have – or haven’t – responded to alerts. The app detects movement within retail units to determine who might be endangered and in need of urgent assistance. Staff then take

56

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

appropriate actions to guide both shoppers and staff to safe evacuation zones. STAY SAFE-EQUIPPED Alert Innovation UK sales director David Lalor explains: “We developed the new Firearms and Weapons Attack Response App to combat the challenges facing the shopping centre market since the atrocities in Kenya. “It adds another key level of security to Shop Alert’s fast-developing arsenal of modern-day apps, providing a planned and effective response to attacks involving firearms and weapons. “It equips both shopping centre management and security personnel with the wherewithal to not only evacuate people from areas under threat, but also to identify when it is actually safe to get them out. It’s fast, it’s reliable – and we are convinced it’s what the shopping centre world has been waiting for. “The Firearms and Weapons Attack Response App been extremely well received by shopping centres in allowing them to more effectively respond to threats of terrorism. It forms an integral part of our continuing mission to assist centres to become Stay Safe environments.” There is also a Bomb Warning App. This enables detailed evacuation instructions, specific to the nature and location of the risk, to be sent instantly to retailers’ till positions within preset zones, or centre-wide. It provides a fully interactive search and clear facility, enabling security management to quickly initiate and co-ordinate a search of the centre, so greatly reducing

the potential for false evacuations. In addition, Shop Alert offers an Evacuate App. In certain circumstances - a terrorist attack is a prime example - the correct course of action might be to invacuate. This app allows security personnel to use their resources in a targeted approach, so delivering optimum efficiency via speedy, bespoke communication. The benefits are wide-ranging. For example, in the event of an evacuation drill, the system will show if all retail premises have been safely evacuated or, conversely, whether people remain in a particular unit. The system delivers fast, bespoke communication, at the same time giving security personnel a visual representation of an evacuation as it happens. More than 40 UK centres, among them some of the biggest names in the business, are using and continue to benefit from Shop Alert’s award-winning security management systems. Shop Alert 20 20 is now regarded by many as the most up to date web-based IP touch screen system in the land. David Lalor adds: “We are supremely confident that Shop Alert 20 20 is the complete package for shopping centres. It also has major advantages over most cellular smartphone-based communication systems, which can be jammed in emergency situations such as a bomb threats or terrorist attack. Shop Alert cannot be turned off.”  FURTHER INFORMATION Contact David Lalor on 01535 691 897 davidlalor@alertinnovation.co.uk www.alertinnovation.co.uk


EVENT PREVIEW

Themed zones at DSEI 2015 include the Naval Zone

 review the DSM’s role in the UK response to the 2014-15 Ebola outbreak in West Africa, particularly Sierra Leone. Jennifer Cole, Senior Research Fellow, Resilience & Emergency Management, Royal United Services Institute (RUSI) will give the keynote speech. ZONAL DEFENCE DSEI will have a layout which will be dominated by themed zones, making the event easier to navigate and facilitate specified networking opportunities. The zones include: Land Zone, Air Zone, Naval Zone, Security & Special Forces Zone, Unmanned Zone, Medical Innovation Zone, Cyber, Communications, Tri-Service, and the Electronic Warfare zone, hosted by the AOC. The Land Zone is the largest zone at DSEI and features the land theatre for insight into the future of the international land sector. With prime contractors to niche specialist suppliers, the Land Zone demonstrates the latest platforms from major vehicle manufacturers and suppliers in the defence industry. The Air Zone offers a dedicated air theatre and an increased static vehicle display. DSEI’s air component is expanding to address the frontline operational requirements and support functions available to the aerospace sector. The Zone includes a capability area dedicated Abloy_Security_Ad_Feb2015-2.pdf 1 16/02/2015 09:14:21to the aerospace supply chain; a comprehensive seminar programme reinforcing the show’s

broader themes of procurement, training, export maximisation and SME support; and an outdoor static display area to provide the aerospace industry with a forum in which to showcase the latest innovations to existing and prospective international customers. The proximity of the Royal Victoria Dock enables DSEI to assign a Navel Zone which will play host to a range of vessels, from warships to high speed craft. It also includes an expanded marina and in depth scenarios to showcase related products, technologies and services. This zone will provided a valuable platform for the demonstration of new systems and equipment from the UK’s innovative maritime sector. The dedicated Security & Special Forces Zone showcases security equipment and systems to counter priority threats, such as cyber attacks and terrorism, as well as an enlarged special forces and tactical equipment area. The new Security & Special Forces Zone centralises the security sector’s

DSEI 2015

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

expertise with a bespoke community in order to increase networking opportunities for both exhibitors and visitors. Within the Security & Special Forces Zone, products and services ranging from security and special forces training, tactical equipment, perimeter security covert & overt surveillance & camera equipment and PPE, with exhibitors including EXPO, Henriksen, Kershaw, KNK Limited, Safe Tactics, SphereVision and Taskmasters. The Unmanned Zone will offer demonstrations from Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles. The Zone was successfully launched in 2011 and since then a series of stakeholders have increased their support, including the Association for Unmanned Vehicle Systems International (AUVSI). The result is a vastly augmented Unmanned Zone. The Medical Innovation Zone will demonstrate the latest advances in clinical care from point of injury or illness through the entire treatment pathway to rehabilitation. Today the UK’s Armed Forces have to be equipped and trained to deal with a broad spectrum of operations, including humanitarian work, disaster relief and reconstruction. L FURTHER INFORMATION www.dsei.co.uk

When door security has to work For a more secure world

www.abloy.co.uk

Issue 23 | COUNTER TERROR BUSINESS MAGAZINE

57


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADVERTISERS INDEX

Alert

The publishers accept no responsibility for errors or omissions in this free service

Adani 17 Alert Innovation 56 APM Group 8 Arinc 36 Assa Abloy 57 ATG Access OBC Avon Barriers Corp 4 BCS, The Chartered Institute of IT 20 Bournemouth University 26 Broden Media 49 C3IA Solutions 24 CMO 47 Coges 46 Fibre Technologies 44 First Tactical 15

58

COUNTER TERROR BUSINESS MAGAZINE | Issue 23

Frontier Pitts 38 Garnett Keeler 48 Heald 39 Helyx Sis 52 Hesco Bastion 38 Holmatrol Rescue IBC Infosec Skills 22 Millbrook Proving Ground 34 Panasonic 6 Prox Dynamics 12 Tablet Technologies 18, 19 Terma 54 The Mercian Labels Group IFC UBM Information 50, 51 Wagtail UK 32 Xtralis UK 28, 29


New! Ultralightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Ready for use with integrated hydraulic hand pump • Suited for tactical operations • Choice between models HCT 5111 ST (highest spreading force) and HCT 5117 ST (highest spreading distance) Watch the video:

Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com


British Innovations lead the Singaporean Security Market as Business Relations go from Strength to Strength. British and Singaporean business relations go from strength to strength prior to this month’s government trade mission to Singapore. Vehicle Barrier specialists ATG Access h have historically innovated bollards, road blockers and gates to protect critical national infrastructure against targeted terrorist attacks. Working with international partners across the world ATG have recently identified the need to utilise strong and heavy duty barriers able to withstand vehicle impact to protect infrastructure from accidental damage as well as intentional attack which at this high security level is a pretty new concept. Ahead of this month’s trade mission to Singapore, ATG Access’s President Glenn Cooper informed that one of the most commonly identified accidental impacts is the collision of push back tugs and airside columns supporting passenger walk way tunnels within international airports. “These 70 tonne vehicles have the potential to cause serious damage should a collision occur with substantial consequences to passengers po and disruption.” “Having identified this gap in the market, ATG have designed and successfully tested a column protector compromising of a series of composites and steel that successfully absorbs impact shock. This product has passed a stringent international impact test and is the world’s first impact tested column protector; the Herculean Column Guard.” Now working closely with their Singaporean partner Lai Yew Seng (LYS), a joint-venture enterprise delivering British engineered and tested security to the Singaporean market, the exclusive column deli protector will be installed first in Singapore. Having already established themselves as the world’s leading supplier of high security bollards, ATG have installations at multiple prestigious sites worldwide including Adelaide and Changi international airports, The Shard London, Canary Wharf and multiple railway stations in the UK and further afield. ATG have seen how security and safety requirements at both national and international sites have evolved. “Modern bollards bolla are aesthetically pleasing. Using a core of steel, we can cover this with a sleeve enabling the high security tested core to fit in with any existing site aesthetics or colours,” says Cooper. This latest product innovation not only highlights the importance of utilising impact tested products to mitigate damage from accidential impact but also solidifies the emergence of the International Workshop Agreement (2014) which has aimed to unify international impact test standards to encourage universal standards for international physical security specifications. A great example of British engineering leading the way in international markets through the support of an g innovative partner and internationally recognised test standards. www.atgaccess.com

“Intelligent Security”


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.