For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence
April 2015
Subscribe Here Social Media Internet Threat World Travel Risk Management Security success depends on level of situational awareness EXODUS Alert How to catch terrorists and criminals Industry News
www.cip-asia.com
www.world-borderpol-congress.com
www.cipre-expo.com
EDITORIAL
www.worldsecurity-index.com Editorial: Tony Kingham E: tony.kingham@worldsecurityindex.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Advertising Sales: Tony Kingham T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurityindex.com Paul Gloc (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Denne Johnson (Americas) T: +1 918 863 9792 E: dennej@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@worldsecurityindex.com World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to 38,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.
Copyright of KNM Media and Torch Marketing.
2 - World Security Report
For those in peril on the sea
A
s we put this issue together, there are two main stories that have captured the attention of the world. The first is the devastating earthquake in Nepal which will be covered elsewhere in this issue, and the ongoing situation in the Mediterranean.
As the humanitarian crisis in the Mediterranean continues to shock TV viewers across Europe and the world, European governments find themselves in one of those ‘rock and a hard place’ dilemmas. As public and international pressure for immediate action to save lives grows, they know there is an equal and opposite pressure from the same public to stop the flow of immigrants into Europe from North Africa and elsewhere. This is particularly true of countries like the UK where immigration has become a key issue in the recent election. The moral imperative has forced leaders to act but quite how they deal with those two contradictory aims is still a long way from being resolved. At the moment they have promised to commit more resources but at the time of writing, that does not mean that there is any plan for increased search and rescue operations. Operation Triton as it is called under the control of Frontex, has less patrol resources than the Italian ‘Mare Nostrum’ operation it replaces. Frontex has also made it clear that Triton will focus on “border control and surveillance”. Most of those additional EU resources seem to be earmarked for processing immigrants as they arrive in Europe. This is hardly surprising as Italy has been accused of letting immigrants ’disappear’ to find their way to other parts of Europe once they have been rescued. But again, this is understandable when Italy and the other frontline states have been more or less left to cope with this crisis by themselves. Despite the huge cost and political fall-out at home, the Italians have rescued over 140,000 people at a cost of approximately 10 million Euro’s per month. This crisis is a European one, not an Italian, Greek or Maltese one, after all, those countries aren’t usually the intended destination. It is the draw of a safe and more prosperous future in the wealthier European nations that leads people to risk everything to make these desperate journeys. The Australian Prime Minister Tony Abbott called on European leaders to stop the “terrible problem” and adopt the Australian approach of turning back the
www.worldsecurity-index.com
EDITORIAL
immigrant boats. This has already been rejected by some and seems unlikely to be adopted by Europe. There is also much discussion about an operation to stop the smugglers and destroy boats before they put to sea. But in lawless war torn states like Libya and Syria, that would require the sort of military operation for which the EU frankly lacks the collective will, the material and the competence. It would also involve co-ordinating efforts with the legitimately recognised government of Libya and risk possible conflict with a whole load nasty extremists and warlords on the North African coast. Countries like the UK and France do have the experience and the equipment to do the job but France is already involved in military operations in Mali and British politicians still like to characterise this as an Italian problem. The reality is that people will keep coming as long as there are poor people in failed nations and criminals willing to exploit them, living next door to rich nations. Europe needs to find the will and the means to act together in a properly coordinated way to bring the problems in North Africa under control. Whether that is by fully supporting the legitimate government in Libya to win its war or by setting up some sort of safe zone possibly in Libyan government held territory where people can be processed before reaching Europe. Tony Kingham Editor World Security Report
www.worldsecurity-index.com
World Security Report - 3
including Critical Information Infrastructure Protection
24th-25th June 2015
Co-Hosted By:
Bangkok, Thailand www.cip-asia.com Electronic Transactions Development Agency
Department of Disaster Prevention & Mitigation
Invitation to Participate Register online today at www.cip-asia.com Opening Keynote
• Mr.Pornchai Rujiprapa, Minister of Information and Communication Technology, Thailand • Lt General Datuk Dr. William Stevenson, MiDAS Chief Executive, Malaysia Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. • Learn about the latest issues, threats and risk management challenges. • Share information, case studies and ideas with international colleagues and peers that you need to work with and may rely on in an unforeseen emergency. • Discover the latest in technologies and techniques for better securing your infrastructure and how to incorporate these into continuity plans. Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia.
Topics of Discussion
Critical Infrastructure Protection and Resilience Asia delivers a unique two-track conference programme and a leading line up of international experts to discuss securing ASEAN’s critical infrastructure, from both physical and cyber perspectives. Critical Infrastructure Protection • Emerging & Future Threats Identification & Management • Security & Resilience in Design • Modelling, Simulation, Convergence and Standardisation for Improving CIP Solutions • Innovations and Technologies to Detect and Protect Critical Information Infrastructure Protection (Cyber Security) • Cybersecurity Threats and Trends • Concerned About CIIP - Policy, Preparedness and Response • Technology Developments and Network Analysis • Improving Cybersecurity Competence and Readiness Joint Plenary Sessions • CIP and CIIP and Assessing Risk on Your Assets • International & National Agency and Operator Co-operation • Transport, Energy & Telecomms Infrastructure Security • Emergency Preparedness and Response Coordination Further details on the conference programme is available at www.cip-asia.com.
Leading the discussion on securing critical infrastructure across ASEAN Platinum Sponsor:
Supporting Organisations:
Speakers include • Suwat Chiochanchai, Deputy Governor, Planning and System Development, Provincial Electricity Authority, Thailand • Ms. Lina Kolesnikova, Fellow of Institute of Civil Protection and Emergency Management (ICPEM) • Mr. Yuji Homma, Counselor for Critical Information Infrastructure Protection, National Center of Incident Readiness and Strategy for Cybersecurity (NISC), Cabinet Secretariat, Japan • Police Major General Apichat Suriboonya, Head of Interpol NCB Thailand, Commander of Foreign Affairs Division, Royal Thai Police • John Donlon, Security Adviser and former Director of ACPO Prepare & Protect, UK • Ms. Lina Kolesnikova, Fellow of Institute of Civil Protection and Emergency Management (ICPEM), Belgium • Pornpoth Penpas, Deputy Director General, Department for Disaster Prevention & Mitigation (DDPM), Ministry of Interior, Thailand • Mr Mohd Zabri Adil Talib, Head of Digital Forensics, Cyber Security Responsive Services, Cybersecurity Malaysia • Ricardo Bn. Baretzky, President, European Centre for Information Policy and Security (ECIPS), CYBERPOL Program • Dr. Sak Segkhoonthod, CEO and President, Electronic Government Agency and Cloud Security Alliance, Thailand • Prof. Dr. Krasae Chanawongse, Chairman, Asian Disaster Preparedness Center, Thailand • Mrs. Surangkana Wayuparb, Executive Director, ETDA, Ministry of Information Communitation Technology, Thailand Media Partners:
CYBER SECURITY
The Social Media Internet Threat: a web of insecurity?
John Baker, Head of Global Operations for the National Security and Resilience Consortium (NS&RC), examines the background to the internet and the threat it now presents to our national and personal security. Defence technologists are most successful when they hone in on specific problems. The Pentagon’s research agencies and their contractors were asked in 2003 to come up with ways to foil roadside bombs in Iraq and Afghanistan, and although they did not defeat the threat entirely, they did produce a number of useful detectors, jammers and other counter-explosive systems. The next wave of national security threats, however, might be more than the technology community can handle . They are complex, multi-dimensional problems against which no degree of technical superiority in stealth, fifth-generation air warfare or night-vision is likely to suffice! The history of the Internet
began with the development of electronic computers in the 1950s. and initial concepts of packet networking originated in several computer science laboratories in the United States, Great Britain, and France, envisaged as a communications system with the ability to by pass threats or damage to lines of communication. Since the mid-1990s, the Internet and mobile phone technology has had a revolutionary impact on culture and commerce, including the rise of near-instant communication. The Internet’s takeover of the global communication landscape was also almost instant in historical terms: it only communicated 1% of the information flowing through
two-way telecommunications networks in the year 1993, already 51% by 2000, and more than 97% of the telecommunicated information by 2007.[1] Today the Internet continues to grow, driven by ever greater amounts of online information, commerce, entertainment, and social networking. The United Kingdom can feel justifiably proud of its role in this technological revolution. Sir Timothy John Berners-Lee, is an English computer scientist, best known as the inventor of the World Wide Web. He made a proposal for an information management system in March 1989, and was the first to successfully communication between a Hypertext Transfer Protocol (HTTP). He was honoured as the “Inventor of the World Wide Web” during the 2012 Summer Olympics opening ceremony. The advocates of free speech expound the virtue and human right to openly share information across social media and the internet. The alternate viewpoint is that the internet and mobile
www.worldsecurity-index.com
World Security Report - 5
CYBER SECURITY
phone technologies have evolved into an Indiana Jonesian pit of serpents, writhing and moving as an uncontrollable mass. The publication of state secrets by Julian Assange, the use of social media and the internet during the UK riots of 2011 and the Arab Spring in 2010 demonstrated the power of these media. The ability of the few to gain control of the hearts and minds of the masses; manipulate strategy, and as individuals wield immense control over the distribution of confidential information, challenges our how we counteract the negative effects in a free and democratic society. The speed of evolution and impact on our society arguably dwarfs any previous technological development. Transformational invention can of course always deliver significant benefit. Facebook, heralded as a utopian place to share ones very existence with ‘friends’ many of whom can be complete strangers or never met has created another hidden tier to our global interaction. The IT literate have found a fertile virtual land to explore gaming hacking and cyber bullying.
The FBI have openly stated on their web site that Internet-based social networking sites have created a revolution in social connectivity. However, con artists, criminals, and other dishonest actors are exploiting this capability for nefarious purposes. 1. Computer savvy hackers who specialize in writing and manipulating computer code to gain access or install unwanted software on your computer or phone. 2. Social or human hackers who specialize in exploiting personal connections through social networks.
Humans are a weak link in cyber security, and hackers and social manipulators know this. Tricking people into getting past security walls by designing their actions to appear harmless and legitimate. Malaysian Prime Minister Najib Razak uses Facebook and Twitter to engage with the public, but Salleh Mat Rashid, director for internal security and public order, said that social networking sites foster “liberal” thinking and therefore pose a threat to national security. “the Internet poses a challenge to the police because it allows people “to know what is going on in and outside the country.” He also expressed concern about
The disregard for personal security or looking beyond ‘the moment’ to the fact that what goes on the internet for the most part stays on the internet forever should be a further concern. Worryingly in the United Kingdom there is an increasing readiness on the part of parents and schools to allow sophisticated mobile phone technology willingly into the lives of the most vulnerable generation in our society.
6 - World Security Report
www.worldsecurity-index.com
CYBER SECURITY
Facebook and Twitter.
these media.
“In a borderless world, human thinking will change greatly, particularly towards the liberal… This is what we’re afraid of because when the thinking of Malaysians is driven by negative things, specifically those that can threaten security and public order, it can lead to a situation where the country is no longer safe,”
The relatively low cost of old technology mobile communications and computer technology, when linked to underlying poverty and social unrest poses a potential threat in many areas of North and Sub Saharan Africa.
Combating the threat International projects to combat negative social media and extremist propaganda exist. The Institute for War and Peace Reporting www.iwpr.net have actively engaged in positive social media with a sophisticated project in Rwanda designed to counter future threat posed by militants or extremists by proactively engaging with the hearts and minds of the population who use
The Ministry of Defence formation of the new enhanced ‘Cyber’ capability is another indicator of how serious the military threat has become.
Research, showing that it takes on average 64 seconds to recover from reading an e mail, and an estimated annual cost of up to £10,000 per employee using e mail at work, means the euphoric tide of instant communication may be turning, with some companies now moving away from e mail and internet communication completely with talk of transitioning to the post e mail world! Could you make that giant leap ?!!
The Homeland Defense and Security Database
WorldSecurity-Index.com is the only global homeland security directory published in English, Arabic and Spanish on the web and in CD network format. www.worldsecurity-index.com The Global Security
Portal
Advertise on WorldSecurity-Index.com from only £515 for 12 months
Contact info@worldsecurity-index.com for details World Report - 7 or call +44 (0) 208 Security 144 5934.
WORLD SECURITY
Yemen: Battle for Regional Dominance
A Saudi-led military coalition has launched airstrikes on Houthi positions since 25 March at the request of President Abdurabbu Mansour Hadi, who fled the country following a significant decline in the security environment. Saudi Arabia has amassed a coalition of Arab and Sunni Muslim states, with US support, to counter the advance of the Shi’a Houthis amid fears of growing Iranian influence in the Arab world, but most of all in Iraq and Syria. Although Operation Decisive Storm has now given way to Operation Renewal of Hope, airstrikes are continuing on Houthi positions, mainly in the southern regions. There is limited evidence of direct Iranian support for the Houthi rebels, but the Saudi coalition’s role in the conflict and the use of arms drops and weapons deliveries is likely to prolong the war and deepen the humanitarian crisis. With little prospect for a peaceful resolution to the crisis, the possibility of total state collapse in Yemen could accelerate the risk of a wider regional conflict. The Political Outlook Iran, Saudi Arabia and the US have signalled their interest in stabilising Yemen via a political solution. Despite efforts by Iran’s Foreign Minister Mohammed Javad Zarif to broker a ceasefire, the initiation of intra-Yemeni dialogue (including all groups involved in the national dialogue) and the establishment of a broad-based government, negotiations are unlikely to begin while the Saudi-led coalition continues the aerial bombardment of Houthi positions. The Saudiled campaign has entered a new phase, namely Operation Renewal of Hope, which is focused on
8 - World Security Report
political developments, but the ongoing military element of the campaign is likely to hamper peace negotiations as the Houthis will increasingly feel marginalised. The UN’s implementation of sanctions, travel bans, an arms embargo and asset freezes against Houthi leaders as well as former president Ali Abdullah Saleh and his family, has singled out the group and may limit their ability to fully engage in political dialogue, a key driver of its decade-long insurgency. The announced appointment of a new UN special envoy to Yemen underscores the body’s role in stabilising the conflict, but perceptions of bias
may hamper the envoy’s ability to bring all parties to negotiations. The release of the defence minister by Houthi fighters, required under the UN resolution, is a positive development that indicates a degree of pragmatism within the group. With no state to speak of, the worsening situation has left little indication of the key players to involve in talks. President Hadi has left the country, has yet to return, and lacks a powerbase, despite his appeal to the Southern Movement (an umbrella group of secessionists calling for a southern state) and tribal militias to establish
www.worldsecurity-index.com
WORLD SECURITY
Key Observations • Near-state collapse following Saudi-led airstrikes has precipitated country-wide violence and a political vacuum • A fragile alliance between the Houthis and forces loyal to former president Ali Abdullah Saleh is disintegrating, while al-Qaeda in the Arabian Peninsula (AQAP) and tribal militias are capitalising on the chaos to carve out their own territory • The aerial campaign is likely to prolong the conflict by utilising arms drops and essential supplies deliveries. The longer the conflict persists, the more likely it is that Saudi Arabia and its allies will launch a ground offensive. • Fighting is likely be concentrated around southern urban areas, particularly Aden, Taiz, Huta and Daleh as tribal militias become the main defence against Houthi advancement • With little prospect for a peaceful resolution to the crisis, full-scale state collapse and anarchy are likely to persist in the medium-term an armed force on his behalf, compounded further by the the overt support of Saudi Arabia. With the southern tribal militias vowing to fight on to “purify” the south of Houthi and pro-Saleh fighters, and the Houthis suffering heavy military losses, the potential for viable and productive talks is muted. Security Environment The crisis in Yemen has exposed the near-total collapse of the country’s security environment. It is feared that the demise of central authority will allow armed non-state actors to extend their power across the country and further entrench themselves as local leaders. Developments such as tribal clashes in Hadramawt and Marib provinces, the taking up of arms by local residents to defend Yemen from a Houthi advance and abandonment by military personnel of their bases across the country all indicate the plethora of power bases that are competing for territory and the withdrawal of loyalties to, or dependence on, the state.
expand such efforts in Hadramawt province, as well as in al-Bayda, Shabwa and Abyan, where it has previously held territory, and remains entrenched in rural locations. Multiple emerging conflict fronts will further destabilise the country. With no single force strong enough to unite the fracturing security forces, it will become steadily more difficult to oust AQAP from seized territory, as the army did with US support in 2012. With the near-collapse of the state, military leaders appear to be losing their patronage networks and monetary influence and therefore the allegiance of their fighters. This is allowing tribes to carve out their own
spheres of influence with little resistance from the armed forces. Although the majority of the security forces remain loyal to former president Ali Abdullah Saleh, or commanders from his regime, several commanders have pledged allegiance to Hadi. In Taiz, a major population centre which was the main centre of anti-government protests in 2011 and anti-Houthi sentiment, military forces appear to have turned on the Houthis, signalling an end to the informal alliance that drove their initial advance. The conflict is likely to further entrench tribal and individual loyalties at the expense of state loyalty, especially as Hadi remains a weak unifying figure from his position in exile in Saudi Arabia. It is possible that rival
Al-Qaeda in the Arabian Peninsula (AQAP) has already begun to capitalise on the disorder by seizing control of parts of Mukalla, including its port and airport. This was achieved with little-tono resistance from the military personnel deployed to protect the city. AQAP are expected to
www.worldsecurity-index.com
World Security Report - 9
WORLD SECURITY
commanders may seek to exert their authority over the military forces and present themselves as candidates to lead a post-conflict Yemen. Intra-military competition, The Political Outlook Iran, Saudi Arabia and the US have signalled their interest in stabilising Yemen via a political solution. Despite efforts by Iran’s Foreign Minister Mohammed Javad Zarif to broker a ceasefire, the initiation of intra-Yemeni dialogue (including all groups involved in the national dialogue) and the establishment of a broad-based government, negotiations are unlikely to begin while the Saudi-led coalition continues the aerial bombardment of Houthi positions. The Saudiled campaign has entered a new phase, namely Operation Renewal of Hope, which is focused on political developments, but the ongoing military element of the campaign is likely to hamper peace negotiations as the Houthis will increasingly feel marginalised. The UN’s implementation of sanctions, travel bans, an arms embargo and asset freezes against Houthi leaders as well as former president Ali Abdullah Saleh and his family, has singled out the group and may limit their ability to fully engage in political dialogue, a key driver of its decade-long insurgency. The announced appointment of a new UN special envoy to Yemen underscores the body’s role in stabilising the conflict, but perceptions of bias may hamper the envoy’s ability to bring all parties to negotiations. The release of the defence minister by Houthi fighters, required under the UN resolution, is a positive development that indicates a degree of pragmatism within the group. With no state to speak of, the worsening situation has left little indication of the key players to involve in talks. President Hadi has left the country, has yet to
10 - World Security Report
return, and lacks a powerbase, despite his appeal to the Southern Movement (an umbrella group of secessionists calling for a southern state) and tribal militias to establish an armed force on his behalf, compounded further by the the overt support of Saudi Arabia. With the southern tribal militias vowing to fight on to “purify” the south of Houthi and pro-Saleh fighters, and the Houthis suffering heavy military losses, the potential for viable and productive talks is muted. Security Environment The crisis in Yemen has exposed the near-total collapse of the country’s security environment. It is feared that the demise of central authority will allow armed non-state actors to extend their power across the country and further entrench themselves as local leaders. Developments such as tribal clashes in Hadramawt and Marib provinces, the taking up of arms by local residents to defend Yemen from a Houthi advance and abandonment by military personnel of their bases across the country all indicate the plethora of power bases that are competing for territory and the withdrawal of loyalties to, or dependence on, the state. Al-Qaeda in the Arabian Peninsula
(AQAP) has already begun to capitalise on the disorder by seizing control of parts of Mukalla, including its port and airport. This was achieved with little-tono resistance from the military personnel deployed to protect the city. AQAP are expected to expand such efforts in Hadramawt province, as well as in al-Bayda, Shabwa and Abyan, where it has previously held territory, and remains entrenched in rural locations. Multiple emerging conflict fronts will further destabilise the country. With no single force strong enough to unite the fracturing security forces, it will become steadily more difficult to oust AQAP from seized territory, as the army did with US support in 2012. With the near-collapse of the state, military leaders appear to be losing their patronage networks and monetary influence and therefore the allegiance of their fighters. This is allowing tribes to carve out their own spheres of influence with little resistance from the armed forces. Although the majority of the security forces remain loyal to former president Ali Abdullah Saleh, or commanders from his regime, several commanders have pledged allegiance to Hadi. In Taiz, a major population centre
www.worldsecurity-index.com
WORLD SECURITY
which was the main centre of anti-government protests in 2011 and anti-Houthi sentiment, military forces appear to have turned on the Houthis, signalling an end to the informal alliance that drove their initial advance. The conflict is likely to further entrench tribal and individual loyalties at the expense of state loyalty, especially as Hadi remains a weak unifying figure from his position in exile in Saudi Arabia. It is possible that rival commanders may seek to exert their authority over the military forces and present themselves as candidates to lead a post-conflict Yemen. Intra-military competition, however, will do little to resolve the current conflict, and could even accelerate the fragmentation of the security forces and deepen the power vacuum. Regional Impact
Saudi Arabia vs Iran not Sunni vs Shi’a Although AQAP denounces the Houthis as heretics, it would be a mistake to cast the current conflict within the parameters of Islamic sectarianism. The Iran-Saudi rivalry is too often characterised as a simple Shi’a-Sunni split, when the overwhelming driver of the current campaign is to increase their regional influence. This is not to discount the fact that the majority of Iran’s allies are in fact Shi’a, but Iran does not necessarily see itself solely as a bulwark of Shi’a Islam.
Indeed, for a country seeking to extend its influence and compete with Saudi Arabia and others for regional dominance, doing so on the basis of Shi’ism is unlikely to succeed as only around 30 percent of the Middle East’s Muslim population is Shi’a. The Houthis are not a religious group, but rather a political force drawn from the Shi’a Zaidi population in Sa’ada province. The group has failed to attract significant support from the rest of the 45 per cent of the population that is Zaidi due to its overtly regional and political agenda. This lack of overt religious motivation helps explain why both the Houthis and Iran deny strong links. The Houthis had sought to lead a mostly peaceful coup after years of conflict with the government over their lack of power, representation and opportunities. However, the group’s proximity to the Saudi border has elicited a strong response. The timing of the military offensive comes at a point when Saudi Arabia and its regional allies are occupied with US-Iranian relations, as a nuclear deal nears. The US has pledged logistical and intelligence support for the Saudiled coalition, and with drone strikes continuing to be reported against AQAP targets, it appears unlikely that rapprochement on
the nuclear issue will result in a sharp turn in US counter-terrorism policy and alliances in the region. The nuclear talks, Iran’s strong presence in Iraq and growing Iranian regional influence have pushed Saudi Arabia’s new king and new, young defence minister into demonstrating the Kingdom’s ability and willingness to take action against perceived Iranian aggression and attempts to gain sway in traditional Saudi spheres of influence. It has yet to be seen whether a ground invasion into inhospitable terrain will benefit Saudi Arabia or engross it in a costly quagmire. The 2009 Saudi Arabia-Houthi conflict indicates that the latter is more likely. Although sectarianism is not a key driver of the conflict, it is being used by other groups to justify attacks against the Houthis, namely AQAP. When the Houthis first seized control of Sana’a in September 2014, AQAP vowed to attack the “heretics” across the country, with clashes and attacks reported in al-Bayda and Abyan provinces as the Houthis moved south. However, this comes as AQAP’s territorial influence is endangered by the Houthi advance, so is driven more by geopolitics and fears of operational restrictions than by religious conviction. Increased risk of terrorism
Scenarios • Highest impact: Saudi-led ground invasion from the north and across the Red Sea triggering an intensification of the Houthi insurgency. The Southern Movement (SM) secessionists declare a separate South Yemen state as AQAP carves out its own enclave in southern provinces, including Hadramawt and Abyan. Tribesmen establish their own mini states as the military collapses along tribal lines. • Best case: Multilateral ceasefire declared and peace talks organised with effective, non-partisan mediators. Decline in fighting to coincide with a new transition plan agreed with fair representation of all key stakeholders, including the Southern Movement, the Houthis and President Hadi. • Most likely: Airstrikes continue in the southern regions where Houthi fighters continue to attempt to advance. Tribal militias become the main defence against Houthi advancement, entrenching an entitlement for increased autonomy in defended areas. Stuttering peace talks are unlikely to appease all parties, especially as the Houthis are likely to object to the reinstatement of Hadi as president.
www.worldsecurity-index.com
World Security Report - 11
WORLD SECURITY
The regional success of Islamic State (IS) affiliates is largely attributable to the erosion of state control and the proliferation of ungoverned spaces, allowing militants to move freely across borders, acquire weapons and train recruits. This has seen the group expand from its bases in Syria and Iraq to form strong cells across Libya, as well as affiliate relationships in Nigeria and Egypt. Yemen’s deteriorating security situation may also facilitate the formation of such militant groups, further aided by the presence of large numbers of AQAP fighters and, reportedly, foreign nationals coming for religious training (often associated with more militant interpretations) in the country. Saudi Arabia now perceives itself to be encircled by in-crisis states, and to present a valuable target to jihadists such as IS and AQAP. These, it believes will seek to infiltrate the Kingdom and conduct attacks on state institutions and foreigners, as well as travel elsewhere to join affiliates or conduct attacks in Western countries. Operating Environment Foreign businesses have largely withdrawn from Yemen in recent months and the YLNG terminal in Balhaf has entered force majeure due to the conflict. The US Embassy withdrew its staff in
February as security deteriorated in the capital, followed by the withdrawal of US Special Forces from the al-Anad base (from where it conducted counter-terrorism training) on 21 March. Since then, the majority of diplomatic missions have also evacuated the country. Multiple countries have deployed ships and aircraft to evacuate their citizens, including China, Malaysia and India. As airstrikes and clashes continue across the country, much of the critical infrastructure has been damaged and water shortages and power cuts are being reported across the conflict zone. Fuel shortages are affecting the operation of emergency services and the transport of goods. Balhaf and similar infrastructure are likely to be increasingly targeted by armed groups as they seek to monopolise key industries as a means to exert political control or gain finance sources for their newly-acquired territory. Reports from Mukalla indicate that AQAP has taken over the port there and has already taken shipments of oil and grain. Oxfam reports that at least 120,000 people have been displaced due to the fighting, with 18 out of 22 governorates affected, particularly Sa’ada and Hajjah provinces. The new displacement figures are in
addition to the 300,000 people who were internally-displaced (IDP) prior to the Saudi-led aerial campaign, with many having to flee for a second time. The World Health Organisation (WHO) has raised particular concerns over the lack of water; already a desperate problem in Yemen. With sources of clean water scarce, the risk of the spread of diarrhoea and other diseases is heightened. Coupled with a collapse of the health sector and a lack of medical supplies, an outbreak would be difficult to contain and treat. The food, water and commodity shortages are exacerbated by the closure of points of entry into Yemen, including sea ports. Multiple vessels have reported being turned away from ports and aid shipments are struggling to gain permission to land at Sana’a’s airport. The Saudi-led coalition is reportedly behind the closures, citing concerns over weapons shipments to the Houthi rebels. The UN has warned of a humanitarian crisis in Yemen unless grain shipments, medical supplies and other aid can be distributed. However, the evacuation of dozens of aid workers and other foreign nationals who staff agencies (including the World Bank) has also damaged the ability to distribute such aid to the population. A continued blockade of the country will hinder the ability of aid agencies to get people and supplies on the ground, while the dangerous security environment will also prove an impediment to movement and distribution, particularly in the worst-affected areas. Although Saudi Arabia has pledged to meet the UN aid bill, until the country allows full access to Yemen by aid workers, the country will teeter on the edge of a humanitarian disaster.
Courtesy of G4S Risk Consulting
12 - World Security Report
www.worldsecurity-index.com
2nd-3rd March 2016
Including Critical Information Infrastructure Protection
The Hague, Netherlands www.cipre-expo.com
Convergence for Enhancing Security CALL FOR PAPERS
Abstract submittal deadline - 31st July 2015 The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands. Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure. For further information and to submit your abstract visit www.cipre-expo.com “The EU Internal Security Strategy highlights that critical infrastructure must be better protected from criminals who take advantage of modern technologies and that the EU should continue to designate critical infrastructure and put in place plans to protect such assets, as they are essential for the functioning of society and the economy.”
Leading the debate for securing Europe’s critical infrastructure
Exhibit & Sponsorship Enquiries: Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Europe please contact: Tony Kingham Exhibit Sales Director T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurity-index.com Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Denne Johnson Exhibit Sales Manager (The Americas) T: +1 918 863 9792 E: dennej@torchmarketing.co.uk
www.cipre-expo.com
Owned & Organised by:
Hosted by:
Supporting Organisations:
Media Partners:
PERSONNEL SECURITY
World Travel Risk Management
By Nadine Sulkowski, Faculty Lead for International Development Applied Sciences, University of Gloucestershire The international tourism industry is one of the fastest growing and most important parts of the global economy. By 2030, 1.8 billion people are expected to travel internationally each year and with this, protecting the safety and security of travellers, host destinations and transport infrastructure has become one of the most significant issues in public and private sector strategies. Events such as the recent deliberate crashing of Germanwings flight 4U9525, the museum attacks in Tunisia, and a series of terror attacks in Indonesia between 2002 and 2009 that were aimed at international tourists are only a few examples that highlight the vulnerability of the global tourism industry to terrorism and other manmade acts of destruction.
A
panel discussion at the 2011 World Travel Market has however highlighted that the industry still has not reached an understanding of risk management in its totality. Of the three levels of risk management, including operational, project and strategic perspectives, managerial approaches towards dealing with safety and security at an operational level are the ones most fully understood, whereas those at project and the strategic level seem to be lagging behind in terms of how organisations approach their planning and implementation. Organisational networks within the tourism industry are at times complex and diverse involving informal as well as strategic alliances amongst travel companies, airlines, accommodation providers, local attractions and tourism authorities. There is a pressing need to support organisations within these networks to work
14 - World Security Report
synergistically in analysing and mitigating against relevant risk factors. Industry leaders and those managing day-today security aspects must be equipped to understand and respond to the needs of specific business contexts which include amongst travel for business and leisure large scale and high profile events with specific security aspects. At the same time, they must be capable of responding quickly to a wide range of risks which are unpredictable and evolve over time. Whilst in some situations this evolution might occur over a long and sustained period of time, thus offering opportunities for the careful planning of appropriate responses, other situations evolve very quickly and require instantaneous measures to safeguard the lives of people and infrastructure. Emergency preparedness and business continuity planning
have thus become crucial issues for corporations and the public sector. Relevant strategies must be embedded in the overall operation of an organisation and based on information sharing amongst strategic groups, business partners, local authorities and government security. Given the changing external context, tourism education must be concerned with helping to develop and promote the knowledge and skills required by the industry to maintain a secure environment within which international travel can continue to prosper. To do so, educational institutions depend on an infrastructure that is able to facilitate close interactions and strategic partnerships with industry organisations and associations. The University of Gloucestershire is an example of an UK institution
www.worldsecurity-index.com
PERSONNEL SECURITY
that develops and enhances its educational activities based on such partnerships. The University’s School of Leisure has a history of success in providing degree programmes within tourism and related fields of management with one of the highest employability rates within the UK higher education sector. All graduates gain full-time employment or proceed to further study with 71% taking up managerial positions within six months of graduation. The University’s courses are accredited by recognised industry associations including the Association for Tourism & Leisure Education and Research (ATLAS), the Tourism Management Institute (TMI), the Institute of Hospitality and the Association for Events Management Education (AEME). The University of Gloucestershire encourages students to engage closely with potential employers throughout their course of study and is one of only seven UK Higher Education institutions to insist on students completing a compulsory placement in these fields. Its academic environment is closely connected with industry, offering students placements and graduate opportunities with
www.worldsecurity-index.com
diverse companies in the UK and internationally. Since September 2014, the Growth Hub located at the University’s Gloucester campus provides additional opportunities for enriching the curriculum through interaction with industry. Having attracted £7 million of funding, the Growth Hub is a unique partnership between the University of Gloucestershire and GFirst LEP and provides a range of services to boost the development of companies with high-growth potential and helps businesses access existing services provided locally and nationally. It also offers short-courses and networking events some of which are developed in collaboration with University of Gloucestershire academic staff. For a number of years now, the University of Gloucestershire has been teaching risk management as part of its tourism, hospitality and events management courses. However, given the growing significance of risk and security management to tourism businesses there is a pressing need to revisit and extend the way in which the subject is embedded in future curricula. Likewise, there is a need to provide opportunities for those already in industry to be educated on current risk factors and best practices in prevention and management. For both of this to
happen, academia needs strong partnerships with organisations that are able to provide relevant expertise as well as insights into real-life scenarios and practice. With its global reach and numerous capability platforms that provide consultancy in core sectors of the international tourism industry on matters of security, the National Security and Resilience Consortium (NS&RC) is the only organisation of its kind in the world able to provide a comprehensive and unparalleled range of collaborative activities that would help position educational programmes benefiting from those as world-leading. Such activities might include joint curriculum development and delivery, the provision of both short- and longterm placement opportunities, joint research and consultancy, as well as the provision of training for industry. The vision of creating a strong partnership between academia and the NS&RC is as exciting as it is timely and has the capacity of opening up a new era of education in this and other fields of study that would leave future graduates not just with a strong foundation in risk and security management, but also with a professional network they can rely on in working to safeguard the security of people and infrastructure within their sectors.
World Security Report - 15
PERSONNEL SECURITY
Security Success depends on the level of situational awareness of the decision makers and the people on the ground. ‘Within Seconds’ Security Professionals making life impacting decisions based on: what is the situation – position – implications, and actions to consider to engage.
S.P.I • Situation - what, who, when, how and why is one of the formulas when investigating that has to be learn’t so that it is instinctively used.
“Clarifying the situation and the reaction speed determines the outcome” Security success depends on the level of situational awareness of the decision makers and the people on the ground. Heightened Situational Awareness [ HSA] is also used for all sectors of security – such as investigation and protection. Specific focus is paid attention to using it in management and operations.
Keeping in mind: Using all senses such as taste, touch, smell, felt and heard • Clarifies the Position - of the situation providing a clear picture of the situation and who should be involved • Implications that provide a plan for engagement.
[ HSA] is ‘extracting reliable and usable information through sound – sight – smell – touch and taste – to manage emotions’
HSA is used for different reasons and in different scenarios for security – investigation – protection
The Security Professional masters certain skills to maintain ”this mind-set of heightened situational awareness ” for a number of reasons.
Identify the conspirator and/or is it a conspiracy in concert with others
Using a simple structured method for ‘Situation Awareness’
Investigative or Undercover Advantage: To identify if another person can read people; No one knows who can read people. It is highly beneficial to to know how to hide emotions, agendas, strengths and weaknesses when necessary. Orchestrating situations that could unfold with opportunistic potential In negotiations - the person that can ‘read’ the other better – wins Selecting stakeholders, monitoring and managing projects.
16 - World Security Report
Verifying incident and validating accurate reporting. Interviewing and Investigation: To find the why – or identify the fear to manage emotions Situation Clarification in handling disputes Developing Situational Awareness Mentality. The mentality of the security professional therefore has to be focused and maintain the ‘mind set’ of Heightened Situational Awareness. Security Professionals master the art of reading people using lie and deception detection to Heighten Situational Awareness as it is not the weapon but people that cause mayhem. To master – using a learning curve and instructional guide – the mind is trained. This is to be practiced each day – as they may do for close combat or weapons handling. The mind is used more often than any other tangible tool in their arsenal of weapons. A tool that can be used daily is the E-Connect Application tool that can be used online or obtained at a workshop in person to heighten situational awareness instinctively. Heightened Situational Awareness [HSA] can only be learnt and embedded to be used instinctively through mastering the art of reading people using lie detection skills. Master in Mind is the only ISIO Accredited method for security professionals for a number of reasons. www.master-in-mind.com
www.worldsecurity-index.com
BORDER SECURITY
ECIPS issues the ‘EXODUS’ Alert
T
he President of the European Centre for Information Policy and Security (ECIPS) Mr. Ricardo Baretzky called for an International action on migration and warned that the present migration policies in the EU need urgent strengthening. He said the present migration problems pose a major threat to European Security and the stability of the EU. President Baretzky said that the European Parliament should take precise and executable actions against the trafficking of humans and its trafficking rings that assists illegal migrants. He said that one of the biggest risks are that of terrorist organizations such as ISIS and Al-Qaida using mass migration as one of their social tools that brings unwanted results. He said
www.worldsecurity-index.com
that the rise of uncontrolled mass migration will lead to an increase in terrorism and the “European Values” could be at threat as a whole if no decisive action is taken today and warned that we should see clearly the security risks associated with mass migration. He referenced to the fact that 42% of all international aid goes to Africa and African leaders should be held accountable for their actions. He noted that the present xenophobic attacks in South Africa are only the beginning of the international problems to come and stressed that during 2013, the previous xenophobic attacks in South Africa, the ECIPS warned of migration risks from Africa in future. President Baretzky said that no attention was given to the growing issues and now the present problems have reached a possible future “EXODUS” a point of no return. He said that the diplomatic and political approach has failed with African leaders as the past has indicated and stressed that human trafficking is only one of the factors to blame that needs urgent attention. He said that stronger
border controls are necessary and more funding is needed to combat these problems. The growing instability in Africa and the Middle East is the main factors together with radicalism and its main eye focused on an Islamic state is the key to most of these problems. President Baretzky said that poverty and war has an origin and finical aid is not the solutions but could aid the ongoing problems. He urged the all the 28 European members states to participate and called for an International Security Council to be formed as a matter of urgency to protect the cultural history and basic values of Europe in the spirit of the universal human right declaration is its foundation to find the solutions to the present emerging oppression of mass migrations.
World Security Report - 17
BORDER SECURITY
How to Catch the Terrorists and Criminals who use GPS Jammers
by Prof. Charles Curry, BEng, CEng, FIET, Managing Director, Chronos Technology Ltd The SENTINEL Project investigated a number of interconnected activities involving mission-critical or safety-critical services which need to be able to “trust” GNSS signals at the point of use. The SENTINEL Project was concerned with GNSS interference and jamming, and techniques for mitigating such jamming. Personal privacy often relates to the need to evade fleet tracking or anti hi-jack geofencing systems. Jammers have been recovered from a number of commercial fleet vehicles as a result of police operations where the jammer has been detected. One rationale for use is that the time sheet does not quite match up to where the driver was at a certain time; other examples seen are that the driver wanted to be somewhere else – in one instance this was a lunchtime gym session. An example of jamming geofencing anti hi-jack technology was where a truck driver wanted to spend a night
18 - World Security Report
at home which was more than a mile off the highway. The fleet tracking system was geofencing to a mile from the highway on his route. He used a jammer at the truck stop then drove home, spent the night at home, drove back to the truck stop the next day and switched off the jammer, continuing on his way. The fleet tracking system thought he had been at the truck stop overnight. He was detected because the cell site owner conducted a long term monitoring test at the cell site to get to the bottom of why it failed for up to 8 hours on some nights.
Criminal Privacy Examples of criminal privacy include defeating ankle tag technology or the concern by the criminal that he is being covertly tracked. Detection of one recent example of GPS jammer use for criminal privacy resulted in the arrest of two suspects using a cigarette lighter style jammer because they suspected they may be tracked using covert GPS based technology. Organised Crime Jammers are now regularly being discovered used for organised crime such as the theft of high value cars, builders’ vans or plant. The criminals will assume that GPS tracking technology is being used and will use a jammer to defeat both the GPS tracker as well as its ability to send the GSM data message via the mobile data network regarding its location back to the tracking agencies operations centre. The vehicle or plant can then be taken to a “chop shop” and broken up or
www.worldsecurity-index.com
BORDER SECURITY
will become operational over the next 2 years. eLoran is the only viable technology that can mitigate GNSS jamming and it is of concern that the French Government has recently decided that it will turn off its LORAN transmitters.
exported in a container sometimes with a jammer accompanying the vehicle throughout the export process. There is evidence now that more powerful battery operated jammers are being used by serious organised crime. These have a much greater range than the cigarette lighter style devices and jam the mobile phone signals as well as GPS. Civil Disruption and Terrorism Currently it is not clear if GPS jammers have been used in episodes of civil disruption. However, relatively high powered jammers can be bought over the internet with power capability similar to or greater than that used in the 1996 experiment. These would have the ability to disrupt GPS reception over wide areas such as over the entire City of
London and could compromise (for example) the accuracy of time stamping technology used in high frequency trading applications. Nation State North Korea has demonstrated intentional high powered GPS jamming to disrupt major services operated by South Korea on a number of occasions over the last few years and generally over many days. The evidence is well documented by Research undertaken by Yonsei University, South Korea and has shown disruption to the mobile networks, planes and ships. The situation is so serious that South Korea has now instigated a plan to build a new network of land based Position, Navigation & Timing technology known as eLoran. This eLoran network
The SENTINEL research project is still operational and continually delivering evidence of on-going jamming at a number of locations scattered across the UK. Chronos is working with many agencies and organisations around the world to mitigate the threat and enable local assessment of vulnerability. Currently the evidence shows an increasing use of jammers and in particular, one sensor that has been deployed in central London since 2013 shows a 50% increase in jamming events in two years. The same sensor has
recorded more than 150 events of greater than 60 seconds from January to April 2015. The threat is not going away and one day there will be serous disruption to everyday activities caused by a significantly powerful GPS jamming event. More information on the SENTINEL report is available at www.chronos.co.uk/files/pdfs/gps/ SENTINEL_Project_Report.pdf
www.worldsecurity-index.com
World Security Report - 19
PREVIEW
Is ASEAN’s Critical Infrastructure fully prepared?
Whether it‘s a natural or industrial disaster or a terrorist or cyber attack, the protection critical infrastructure is a fundamental requirement for any responsible government or organisation. As the unfolding disaster in Nepal demonstrates, it is also necessary to have in place procedures, systems and equipment to mitigate the effects of the inevitable natural disasters when they occur?
A
t next month’s Critical Infrastructure and Resilience, Asia experts from around the world will gather together to discuss, debate and share experiences and views about how that can best be achieved. Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, creating uncertainty and insecurity on critical national infrastructure. Climate change has also seen more extreme weather patterns, creating additional hazardous, unseasonal and unpredictable conditions and a severe strain on infrastructure. On a country level, there
20 - World Security Report
are strategies to deal with infrastructure protection issues. On a regional level, there is the Association of Southeast Asian Nations (ASEAN) Agreement on Disaster Management and Emergency Response (AADMER), under which several teams have been set up to deal with disaster management in general, but none is geared towards the protection of critical infrastructure.
Cyber security is also becoming more prevalent, and as more critical infrastructure becomes connected to the internet and exposed to the dangers of cyber security attacks, new strategies and systems need to be developed to mitigate these threats. Critical Infrastructure Protection and Resilience, Asia, which is the third in a series of conferences on the subject, the first two being in Europe. It is co-hosted by Thailand’s Department of Disaster Prevention & Mitigation (under the Ministry of Interior), and the Ministry of Information & Communication Technology and the Electronic
www.worldsecurity-index.com
PREVIEW
The rising death toll in the terrible earthquake in Nepal sadly demonstrates that natural and man-made disasters are still the most likely cause of widespread death and damage to people, property and infrastructure. The 7.8-magnitude earthquake is now known to have killed more than 7,500 people and injured more than 14,500, and the toll will undoubtedly rise as time goes on. The sheer scale of the damage to infrastructure within the disaster zone makes even the most basic movement difficult if not impossible for anything other than by foot or by helicopter. This means getting the right people, supplies and equipment to the right place at the right time becomes more critical as it becomes more difficult. Damage to homes, clean water supplies, food distribution channels, sanitation systems gives rise to post disaster threats such as exposure, starvation or serious outbreaks of disease like cholera, dysentery and other water-borne diseases. Other potential post disaster affects can come from what can be seen as a ripple effect on man-made critical infrastructure like power stations that in turn lead to further man-made disaster. A good example is the Fukushima Daiichi nuclear disaster caused when the plant was hit by a tsunami that had been triggered by the Tohoku earthquake, magnitude 9.0 . A breakdown in law and order is another common factor of natural or man-made disasters as seen during post hurricane Katrina in New Orleans. Probably the single most important factor in “getting the right people, supplies and equipment to the right place at the right time” is communications. However, communications, whether that’s terrestrial, GSM or web based are equally if not more vulnerable to disaster than any other critical infrastructure. Exchanges, cables on poles or below ground are likely to be damaged, GSM masts destroyed and with those on-line connectivity. Building a resilient communications system via satellite and the pre positioning of radio and GSM equipment is the key factor in co-ordinating the proper use of the available resources and getting them to the point of most need at the right time. The immediate response of the international community and the NGO’s to this latest disaster seems to have been good, but has it been as effective as it could be? As the aid pours in is it getting to those most in need especially in the more remote areas simply by virtue of the fact that communications are down and they are unable to call for help! The sad truth is that poorer countries are often those most vulnerable to natural disaster! As you will read later in this issue, industry continues to develop many new and exciting ways of making emergency communications possible and affordable even in the remotest parts of the world. Is it not time that rich countries spend some of their considerable aid budgets on pre-positioning some of these systems in the areas of need prior to disasters so that next time, those on the ground in the all important hours after the event are able to act, and when the international help does arrive it can be directed to the point of most need!
www.worldsecurity-index.com
World Security Report - 21
PREVIEW
Transactions Development Agency. It is also support of the Ministry of Transport and the event is sponsored by Thailand’s Provincial Electricity Authority.
and Emergency Management (ICPEM) – Dr. Koonton Yamploy, Director of Geotechnical and Engineering Division, Department of Highways, Ministry of Transport, Thailand – Dr. Kitti Subprasom, Bureau of Planning, Department of Highways, Ministry of Transport, Thailand – Mr Mohd Zabri Adil Talib, Head of Digital Forensics, Cyber Security Responsive Services, Cybersecurity Malaysia (Under Ministry of Science, Technology & Innovation (MOSTI))
Mr.Pornchai Rujiprapa, Minister of Information and Communication Technology, Thailand
So far confirmed Key note speakers include:
– Dr. Sak Segkhoonthod, CEO and President, Electronic Government Agency and Cloud Security Alliance – Dr. Anond Snidvongs, Executive Director, Geo-Informatics and Space Technology Development Agency
– Mr.Pornchai Rujiprapa, Minister of Information and Communication Technology, Thailand
– Police Major General Apichat Suriboonya, Head of Interpol NCB Thailand, Commander of Foreign Affairs Division, Royal Thai Police
– Lt General Datuk Dr. William Stevenson, MiDAS Chief Executive, Malaysia
– Professor Dr. Panitan. Lukkunaprasit, an adviser to the Center of Excellence in Earthquake Engineering and Vibration, Faculty of Engineering, Chulalongkorn University
Latest line-up of speakers include: – Suwat Chiochanchai, Deputy Governor, Planning and System Development, Provincial Electricity Authority, Thailand – Ms. Lina Kolesnikova, Fellow of Institute of Civil Protection
22 - World Security Report
Policy and Security (ECIPS), CYBERPOL program With its unique programme of joint plenary sessions for closer cross-section discussions to enhance collaboration. combined with sector specific tracks covering Critical Infrastructure Protection and Critical Information Infrastructure Protection (or Cyber Security), Critical Infrastructure Protection & Resilience Asia will deliver high quality discussions on key areas for consideration by government, agencies, operators and the supporting organisations. You can join the discussion at Critical Infrastructure Protection & Resilience Asia on 24th-25th June at the Avani Atrium Bangkok, Thailand. Further details can be found at www.cip-asia.com.
– Prof. Dr. Krasae Chanawongse, Chairman, Asian Disaster Preparedness Center – Ricardo Baretzky, President, European Centre for Information
www.worldsecurity-index.com
INTERVIEW
The standards approach to international security
Editor Tony Kingham talks to Zaun director and co-founder Alastair Henman about the high security market, what clients are demanding and his own response to the developments Q What threats are driving the high security market? A The most widely reported is the threat from international terrorists, whose desire to capture world news agendas has led to greater creativity and shock value in their methods – and the need to be as nimble and innovative in planning and devising security measures to mitigate the threats. Perhaps less obvious is the power afforded to protesters by social media and communications technology to mobilise swiftly and coherently to threaten political or business interests they disagree with. A good example of this is the anti-fracking protests against the likes of Cuadrilla, where even the London offices of their PR firm Bell Pottinger were targeted. Q So it’s not just terrorism we should be worried about? A That’s right. The principal threats today are from terrorism and organised crime. But they could also come from civil unrest, bigotry or discrimination,
www.worldsecurity-index.com
sabotage, politics, power, protest, mindless vandalism and even human jealousy. Q Are some types of organisation at greater risk than others? A Homeland security, military and political targets are clearly very high up the list of risks. But any site of critical national infrastructure (CNI) is susceptible to attack, such as power or water plants, transport hubs like airports and public transport, such as the metro or railways.
history. Increasingly that involves the integration of physical systems with the latest electronics to enhance security and the ability for security forces to respond when integrity is compromised or intrusion is detected or feared. And even the tests new systems are subjected to are evolving with hostile vehicle mitigation and mob attack testing more rigorous than ever before. Q What other developments are we seeing?
Q How has technology developed to counter threats?
A Government and commercial buyers of CNI protection increasingly want to single source to improve integration, drive up standards, accelerate innovation and development timescales and reduce costs.
A The technology is developing as quickly if not quicker than the threats. Certainly we are developing new products, applications and installation techniques quicker now than at any time in our near 20-year
That trend began over 30 years ago in the car industry as vehicle makers the world over adopted the Japanese approach of building supplier keiretsu: close-knit networks of vendors that continuously learn, improve
But, as we’ve seen through the years, office blocks, nightclubs and shopping centres are even at risk.
World Security Report - 23
INTERVIEW
systems and electric fencing to be able to offer an holistic and fully integrated security solution, through design and manufacture to supply and installation. Q What are the benefits to a buyer and to the security of the infrastructure they run? and prosper along with the organisation they are supplying. But for many businesses and governments it did not yield the benefits they hoped. Too often, ‘vendor reduction’ was misused by bullying buyers as a means of beating year-on-year price cuts out of suppliers rather than fostering the long-term partnerships the Japanese had in mind. We saw this most strikingly in the control wielded over their supply chain by the all-powerful supermarket retail giants. But security, and the protection of national infrastructure, are literally too critical an area with which to play ‘squeeze the supplier’ like this. And fortunately national governments and global utility companies have realised this and are not playing fast and loose with their supplier relationships. Q So how has this affected you and how are you responding?
A Firstly, it enables a more truly integrated security solution to be designed. By sharing in confidence with trusted suppliers the full extent of the vision for their CNI facility and the security strategy, it enables the age-old security questions to be explored at the design stage, namely: what asset base are we trying to protect – physical, human, intellectual and even reputational; what risks do or might they face of damage, theft or sabotage; and who or what might pose these risks and how might they carry out their threats? Secondly, sole customersupplier interfaces are driving the development of increasingly higher standards and levels of security to cope with the evolving nature of threat from global terrorism and organised crime. Thirdly, partner relationships are reducing overall lead times in the design and construction of critical
national infrastructure. And finally, the Holy Grail in this era of spiralling debt and hardearned recovery post the credit crunch of the late 2000s, sole source partnering reduces costs.
Alastair Henman is a director and co-founder of Zaun Limited, a British manufacturer of high security perimeter protection systems with regional offices in France and Dubai, a director of the Perimeter Security Suppliers’ Association and a committee member of the Fencing Contractors’ Association. Zaun operates extensively in the CNI sector, working with EDF, Eirgrid, E-on, National Grid and Thames Water, supplying and installing an extensive range of temporary, PAS68 and permanent fencing solutions as well as integrating CCTV and PID systems. It was the largest supplier of high-security fencing systems to the London 2012 Olympics and has since secured the main UK political parties’ autumn conferences; the top secret Bilderberg Conference at The Grove Hotel near Watford and the G8 Summit at Lough Erne in Northern Ireland.
A Our customers’ desire to contract with a single company for all of their security needs – both physical and electronic – and partner with us in an automotive style top-tier supplier relationship is steering our business strategy. Driven by this demand, we have acquired the most respected high-security installer in the UK in Binns Fencing and the latest in CCTV and video content analysis in EyeLynx Limited. We are combining that with collaborations with perimeter intrusion detection
24 - World Security Report
www.worldsecurity-index.com
INDUSTRY NEWS
Sonardyne’s Sentinel sonar technology put to the test during international naval exercises commented Nick Swift, Sonardyne’s Business Manager for Maritime Security.
Diver detection sonar technology developed by Sonardyne International Ltd, UK, has played an important part in a major international exercise organised to train naval forces in mine countermeasures, maritime security operations and harbour protection operations. The International Mine Counter-Measures Exercise (IMCMEX) runs off the coast of Bahrain every 18 months to test the abilities of the navies of the world to keep sea lanes open and safe. A total of 6,500 personnel and 38 warships from 44 navies took part in the event, the third and largest so far. Sonardyne’s Sentinel Intruder Detection Sonar (IDS) is a sonar that has been developed to detect divers and small underwater targets, thereby providing local underwater situational awareness. The sonar is the world’s most deployed system, protecting military ports, harbours and vessels, in addition to shore side critical national infrastructure, commercial ports and vessels. It reliably detects, tracks and
From as early as 2008, Sentinel has been used by the US Navy as part of its Integrated Swimmer Defence programme. It was selected following rigorous trials where it was shown to meet their stringent performance requirements for diver detection. Sentinel detects, tracks and classifies underwater intruders from 1 km away in a 360 degree arc
classifies targets including surface swimmers, divers and underwater vehicles approaching a protected asset up to 1 kilometre away from any direction. Over the course of the three week long exercises, the US Navy owned and operated expeditionary Sentinel system was deployed in a variety of scenarios to demonstrate its capabilities as a rapidly deployable technology for protecting high value marine assets. Divers from participating countries were challenged to evade detection during simulated assaults on various naval assets protected by
www.worldsecurity-index.com
Sentinel. On each occasion, Sentinel was successful in alerting operators to the approaching threat. For this year’s IMCMEX, organisers broadened the focus of the exercise to include maritime security operations such as escorting and defending commercial shipping, and maritime infrastructure protection for oil rigs and harbours. “With a quarter of the world’s navies in attendance, this was the perfect environment to demonstrate Sentinel’s capabilities in protecting high value offshore facilities, ports and critical waterside infrastructure,”
Quick and easy to mobilise, the small design of Sentinel’s sonar head enables a variety of deployment options including lightweight frames for short term deployment, seabed towers, wall, pile or rail mounts for shore side facilities and through hull or over the side deployment for installation on vessels. Besides its proven capabilities and costeffectiveness, another major benefit of Sentinel is that once deployed, the system requires minimal user intervention. Its autonomous operation means that it can be left unattended to seek out and detect intruders.
World Security Report - 25
INDUSTRY NEWS
emergency.lu communication service is providing emergency telecommunications in Nepal emergency.lu is providing vital communication connectivity services following the disastrous earthquake in Nepal that damaged the country’s telecommunications infrastructure in the most severely affected region between Kathmandu and Pokhara. One Rapid deployment kit is already on the ground and operational with two additional kits on the way. All kits are to provide reliable communications connectivity using the SES satellite network. The 7.8 magnitude earthquake, which hit on Saturday, April 25, and its aftershocks, have already claimed more than 5,500 lives and rescue efforts are intensifying. Communication services offered by emergency. lu provide connectivity to humanitarian responders in Nepal and are being deployed in close collaboration with the Emergency Telecommunications Cluster led by the World Food Programme.
disaster. It is a multi-layer platform consisting of satellite infrastructure and capacity, communication and coordination services, satellite ground terminals for rapid as well as long-term deployment and transportation of equipment to the disaster area within the first 12 to 20 hours.
“When a natural disaster such as the earthquake in Nepal hits, telecom landlines and terrestrial wireless systems are inevitably destroyed, or overloaded by people sourcing help and information or trying to contact relatives,” said Gerhard Bethscheider, Managing Director of SES Techcom Services. “Satellite is the only infrastructure which enables communications networks to be restored quickly, facilitating the roll-out of coordinated humanitarian assistance and aid in this mountainous region.”
26 - World Security Report
emergency.lu is addressing the challenge of worldwide rapid response capacity and preparedness for humanitarian emergencies by providing a solution to fill the communication gap in the first hours and days after a large-scale
emergency.lu is a publicprivate partnership between the Luxembourg government and three Luxembourgbased companies. These companies, SES Techcom Services, Hitec Luxembourg and Luxembourg Air Ambulance, design and operate the platform.
www.worldsecurity-index.com
INDUSTRY NEWS
First French Airport Deploys Smiths Detection’s New Integrated Security Solution Toulouse-Blagnac Airport in southern France is to deploy Checkpoint.Evo, a newly launched innovative software solution that greatly enhances the inspection and integration capacities of security checkpoints. It will be the first French airport to install the system, developed by Smiths Detection in partnership with Optosecurity of Canada. Deployment is due for completion by July 2015 at the international airport which handled around 8 million passengers last year. Checkpoint.Evo connects individual sensors to a fully networked checkpoint system to provide real-time data collection, distribution and management that
for instance, x-ray scanners can be centrally monitored away from the noise and distractions of the checkpoint.
improves both the inspection process and operational efficiency. Kevin Riordan, Capability Manager of Smiths Detection, said: “Checkpoint.Evo will significantly improve Toulouse-Blagnac Airport’s operational efficiency and checkpoint effectiveness, enhancing the overall
passenger experience as a result. We look forward to working closely with them to ensure the operational benefits of this new integrated system are maximised.” The centralised remote screening helps speed up inspection of hand luggage because image evaluation and alarm resolution from,
In addition, advanced recheck functions electronically mark suspicious areas in bags to enable a more focused search for illegal items by on-the-spot operators, resulting in faster throughput and reduced queuing times. Checkpoint.Evo’s data management capabilities offer real-time and historical data for analysis and reporting which allows airport operators to share information and monitor the entire screening operation via remote portable devices, such as tablet PCs.
Chemring Technology Solutions Launches World’s First Interchangeable Handheld IED Detector for both Wire and Metal Chemring Technology Solutions has launched what they say is the world’s first hand-held IED detector with interchangeable sensor heads for wire and metal detection, the 0. GroundHunter MHDS (Multi-head Detection System) supports multiple sensor heads to enable search teams to respond quickly to changing scenarios, while the common user interface significantly reduces training burden. The lightweight system has a compact folding design, and allows multiple heads to be carried by a
with future sensor heads. As technologies become available, GroundHunter MHDS will have the ability to address new threats.
single operator for rapid reconfiguration. Currently offering two sensor heads, the CWD100 and MD100, GroundHunter MHDS has a future-proof design that will be compatible
www.worldsecurity-index.com
The CWD100 command wire detector head identifies command wires that are over 20 metres in length, independent of their orientation. Incorporating its own transmitter and receiver, the CWD100 eliminates the requirement for supporting infrastructure. This reduces the total cost of ownership compared with traditional command wire detection products. Using pulsed induction techniques, the MD100
head detects both ferrous and non-ferrous metals. Ian Redwood, Product Manager at Chemring Technology Solutions, said: “Our pedigree of developing exceptional sensors and systems has enabled us to create GroundHunter MHDS, which delivers multiple functions to help military teams react faster and more flexibly to the threats they find themselves facing. GroundHunter MHDS provides a weight and power saving compared to carrying two detectors, as well as being easy to pack and carry”.
World Security Report - 27
INDUSTRY NEWS
HGH Infrared Systems have launched of their latest Spynel model HGH Infrared Systems have launched of their latest Spynel model, the Spynel-M. With dimensions of less than 12x20cm and weight of only 1.8 kg, the Spynel-M is a costeffective, rugged, and compact solution for wide area surveillance. One single Spynel-M sensor effectively replaces up to 16 traditional cameras and is able to perform 24/7 early human intrusion alerts over a 1.5 km-diameter area. “The development of the Spynel-M has made the most of our fifteen years of expertise in major security projects”, said Thierry Campos, CEO of HGH Infrared Systems.
CCTV systems, with the highest simplicity, as a single Spynel-M automatically pinpoints all intrusions day and night on the entire surroundings.”
“With its small footprint and affordable package, the Spynel-M is the ideal solution for critical infrastructure protection like solar and wind farms, prisons, water treatment facilities, power stations, oil depots, airports and ports. It provides far superior protection than
The Spynel-M continuously captures full panoramic, highresolution infrared images every second to provide real-time security against conventional and asymmetrical threats including hardly detectable targets such as UAVs, RHIBs, or crawling men. Easily transportable, it can be carried in a backpack and quickly deployed on a light mast or fixed atop a building for superior wide area surveillance. While
requiring only 8 watts of power, Spynel-M can also be operated with solar or alternate power supply systems to allow for a remote operation. Unlike radar, the system is completely passive, requires no additional light source and cannot be jammed. The intuitive advanced intrusion detection software, Cyclope, automatically tracks and detects an unlimited number of targets from any direction at any time of day or night and under any type of weather conditions. As versatile as it is mobile, the system can also be paired with other systems such as radars and PTZs for data integration and target identification.
Cognitec introduces video camera with integrated face detection and tracking Cognitec now offers a highly specialized IP video camera with built-in face detection and tracking technology as a component of its FaceVACS-VideoScan product. The FaceVACSVideoScan C5 camera provides optimal image quality for real-time face recognition, even under challenging conditions, while requiring low computing hardware and bandwidth resources. Currently, users of highresolution machine vision cameras require constant high bandwidth to receive uncompressed face images for optimal recognition performance. This scenario
biometric performance of the face recognition software. FaceVACS-VideoScan C5 combines advantages of the options above: the high image quality of machine vision cameras and moderate bandwidth requirements of surveillance cameras. requires a dedicated network connection between camera and software. Typical surveillance cameras with moderate bandwidth requirements produce compressed images, leading to decreased
28 - World Security Report
The camera performs real-time, gapless face detection/tracking and generates lossless, cropped video streams for all faces appearing in front of the camera. An integrated camera control provides optimized exposure on the face area. FaceVACS-
VideoScan C5 supports RTSP/H.264 video streams for integration with digital video recording systems. The camera delivers optimal integration with Cognitec’s product FaceVACS-VideoScan, enabling the technology to detect and identify persons of interest in real time and with great accuracy. In addition, anonymous facial analysis over time allows the software to compute people count, demographical information, people movement in time and space, and to detect frequent visitors and crowds.
www.worldsecurity-index.com
INDUSTRY NEWS
3DX-RAY launches the lightweight ThreatScan-LS1 panel At CTX 3DX-RAY released the lightweight ThreatScan-LS1 panel which has an impressive imaging area of 600 x 460mm, is very slim at only 25mm, and is the only detector on the market which can scan to less than 3mm from the ground. This unit, combined with the compact and robust I-Gen generator, provides a system that is easily back-packable with a total weight of just 12kg when
teamed with a rugged tablet.
newest product in their range of portable x-ray inspection equipment. This new generator, together with the long established FlatScan2-15 panel, will allow the traditional users of fluoroscopic or CCD based portable x-ray equipment to experience the superior image quality and compact size of our 3DX-RAY systems for the same investment as the old CCD systems resulting in incredible cost to performance benefits.
They also showed the K-120 generator, the
Smiths Detection to supply Heathrow with advanced hold baggage scanners Smiths Detection has won a contract to supply Heathrow Airport with 17 HI-SCAN 10080 XCT scanners, a revolutionary type of X-ray inspection system that checks hold baggage for explosives. The high-speed system that offers X-ray technology and high-resolution 3D computed tomography, will be used in this instance to inspect outsize (out-ofgauge) baggage before loading into the aircraft hold. Delivery will begin during the summer of 2015. Richard Ingram, President of Smiths Detection, said: “HI-SCAN 10080 XCT is an ideal, cost- effective way to enhance security for all hold baggage and we
be integrated into existing baggage handling systems. A belt speed of 0.5 metres per second enables up to 1800 bags per hour to be screened.
are delighted that one of the world’s major airports agrees. The systems are now operating successfully in airports in South America, and continental Europe. Smiths Detection already provides all of Heathrow’s terminals with X-ray screening and Trace detection systems for hand luggage, and this latest
www.worldsecurity-index.com
award reinforces our close partnership.” The HI-SCAN 10080 XCT’s large tunnel opening facilitates rapid, easy and efficient inspection of all baggage, including oversized objects. Manual checking or the use of other equipment is minimized and it has been specifically developed to
HI-SCAN 10080 XCT has been evaluated by the European Civil Aviation Conference (ECAC) in accordance with Standard 3 and is certified by the US Transportation Security Administration (TSA), fulfilling current regulatory requirements for the security inspection of checked-in baggage. The new Hold Baggage Screening equipment enables Heathrow to be the first UK airport to commit to meeting the new European regulation.
World Security Report - 29
INDUSTRY NEWS
TiCAM Thermal Night Vision Handheld Systems from Thermoteknix At this year’s Counter Terror Expo, British company Thermoteknix Systems Ltd are launched a new range of Mil-Spec non-ITAR handheld thermal imagers for variety of applications. The TiCAM Thermal Night Vision series is based on the Thermoteknix MicroCAM™ thermal imaging core technology. TiCAM monoculars and binoculars offer solutions for reconnaissance, border security, VIP protection, counter drug operations, police surveillance, force protection, hunting, search & rescue and border surveillance: The TiCAM 90 is a small, lightweight, thermal imaging monocular with a unique scroll wheel for easy operation even when wearing gloves. Weighing just 150g and running on just 1AA battery for over 4
invert, laser pointer and gain control. Video out is available for integration into system level transmission and recording systems.
hours with a 40 degree Field of View, TiCAM 90 is optimised for hand or helmet mount applications. The device can be left or right-mounted or in a binocular configuration and is compatible with all major helmet mounting systems including Spuhr. TiCAM 90 features patented
shutterless XTi Technology® making it completely silent and ultra reliable with no moving parts. Low image latency and 5060Hz operation ensures high speed fluid imaging. 384x288 and 640x480 17µ resolution options are available. Features include x2 digital zoom, polarity
Next in the range is the TiCAM 600 thermal imaging monocular which has optional GPS/DMC, in-camera video/still image storage, x2/x4 zoom and runs for 8hrs on 4AA batteries. 384x288 and 640x480 17µ resolution models are available in the miniature TiCAM 600 which weighs just 450g including batteries. Designed to be handheld or tripod mounted, up to 60,000 still images or 8 hours of video can be recorded and downloaded from TiCAM 600 via USB to PC or memory stick. External connections allow external power and video output options.
SATcase is a revolutionary device that has been designed to provide reliable communication in life-threatening situations The SATcase works by transforming the common smartphone into a sophisticated, satellite phone. Therefore communication is still possible outside of mobile range, if coverage is cut off in a disaster and in the most remote parts of the globe. The transformation is seamless: after placing their smartphone inside a durable, ruggedised case, users simply install the accompanying application. The resulting device runs on a familiar operating system that is also loaded with cutting-
30 - World Security Report
edge technology able to assist those in extreme emergency conditions. During an emergency time is a luxury most can ill-afford and the chances for survival decrease dramatically as time continues to pass. The SATcase is equipped with a smart mix of emergency features that can reduce the time it takes Search and Rescue (SAR) teams to locate people accurately. This includes an SOS button, two way rescue communications, online track and trace
for live monitoring, silent alarms and infrared strobes for victims of kidnapping. The device uses technology that can be utilised by SAR teams searching by land, air and sea. Much of the technology built into the unit is something that was previously available only to the military and professionals such as commercial pilots and ship’s captains but now anyone can take advantage of this simple yet intuitive system.
www.worldsecurity-index.com
INDUSTRY NEWS
Townscape Products launches CT Collections
Perimeter security specialist, Townscape launched a new collection for its PAS 68 hostile vehicle mitigation (HVM) CT Blocks at the Counter Terror Expo 2015. The CT Collections range is a new cladding selection of superior quality natural materials designed to give Townscape’s traditional CT Block a finish of the highest standard. Jonathan Goss, managing director of Townscape Products, said: “We know the last thing a property owner wants is to turn their property into a fortress. Our CT Blocks have always been designed to enable facilities managers to protect their people and property discreetly and sympathetically to the local environment. “We’ve listened to the needs of our customers and created the CT Collections range to give a superior finish to our security system which will complement the design of a building, provide a high degree of functionality, whilst still being a strong deterrent to
vehicle-borne attacks.” The CT Collections range is available as full ‘on block’ cladding, planter ‘surround’ cladding or bespoke CT Block seating. The range of natural materials includes; Granite, Quartz and Dekton®. As the hardest structural stone, natural granite makes an ideal material for integration into the city scape. Dekton® is a blend of the raw materials used to produce the very latest innovation in glass and porcelain, as well as the highest quality quartz surfaces, giving durability and scratch resistance. It has a robustness and strength, combined with a tolerance of both low and high external temperatures. The CT Blocks require minimal groundwork due to their low profile foundation, making them cost effective to install without compromising security. The blocks are positioned where a building is vulnerable to vehicular incursion and meet the PAS 68 standard for vehicle immobilisation.
www.worldsecurity-index.com
TASER to Acquire MediaSolv Corporation to Broaden Digital Evidence Management Solutions For Law Enforcement TASER International a global leader in cloudbased digital evidence management and bodyworn video, has announced it has signed a definitive agreement to acquire MediaSolv Solutions Corp., a leading solution for interview room video, CCTV, in-car and on premises digital evidence management. MediaSolv’s product suite will be connected to TASER’s Axon and EVIDENCE.com platform, further enabling law enforcement to unify existing silos of digital media and evidence into a seamless workflow from capture to the courtroom. The combination will offer MediaSolv’s existing customers enhanced management, storage, and sharing capabilities through the EVIDENCE. com cloud platform, while simultaneously enhancing and expanding TASER’s existing portfolio of products and services. Since 2009, MediaSolv has focused on delivering an integrated product suite, expanding its capabilities in 2011 with the acquisition of Insight Video Net - the core team behind the Panasonic Arbitrator In Car Video System. An established leader, MediaSolv delivers
an integrated digital evidence management software product for law enforcement that handles evidence from interview rooms, surveillance cameras and provides support for Panasonic’s Arbitrator In-Car Video. Current customers include the Chicago Police Department, Philadelphia Police Department, Toronto Police Services, among others. In total, Mediasolv’s customers include an additional 7 Major Cities, bringing the total number of Major City agencies on TASER’s digital platform to 23. The acquisition will expand on TASER’s investment in digital evidence management, providing existing and new customers a cloud-connected pathway for data siloed across their agency, including CCTV, in-car video, interview room video, digital images, and more. The MediaSolv product line immediately expands both the near and long term growth opportunities for the EVIDENCE.com platform. It provides law enforcement officials comprehensive tools and resources for managing all of their digital evidence in an efficient and cost-effective manner.
World Security Report - 31
PRODUCT FOCUS
Smiths Detection
World Security Report
World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection
Border Security Matters
Border Security Matters is the quarterly newsletter of BORDERPOL, the World Border Organisation, delivering agency and industry news and developments, as well as more in-depth features and analysis to over 10,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Smiths Detection
advantages
Smiths Detection
advantages
www.defencell.com 32 - World Security Report
www.worldsecurity-index.com
EVENT CALENDAR
May 2015
5-8 IDEF, Istanbul, Turkey www.idef15.com/en 13-15 Oil & Gas Cyber Security North America Houston, USA www.idef15.com/en 19-21 IMDEX Asia, Singapore www.imdexasia.com 19-21 IDET, Brno, Czech Republic www.bvv.cz/en/idet
June 2015
2-4 ISDEF, Tel Aviv, Israel www.isdefexpo.com 2-4 Info Security Europe, London, UK www.infosecurityeurope.com 9-11 Security Document World, London, UK www.sdw2014.com 10-11 Body Search, London, UK www.bodysearchworld.com 16-18 IFSEC, London, UK www.ifsec.co.uk 24-25 Critical Infrastructure Protection & Resilience Asia, Bangkok, Thailand www.cip-asia.com
To have your event listed please email details to the editor tony.kingham@worldsecurity-index.com
August 2015
18-20 Secutech Vietnam, Ho Chi Minh, Vietnam www.secutechvietnam.com
December 2015
8-10 4th World BORDERPOL Congress, The Hague, Netherlands www.world-borderpol-congress.com
March 2016
2-3 Critical Infrastructure Protection & Resilience Europe, The Hague, Netherlands www.cipre-expo.com
July 2015
15-17 Security Conference and Exhibition Melbourne, Australia www.asial.com.au/events/category/securityconference-and-exhibition-13
33 - World Security Report
www.worldsecurity-index.com
4
World BORDERPOL Congress
th
8th-10th December 2015 The Hague, Netherlands
Enhancing collaboration in global border protection and management challenges.
Save The Dates The World BORDERPOL Congress is the only multi-jurisdictional transnational platform where the border protection, management and security industry policy-makers and practitioners convene annually to discuss the international challenges faced in protecting not only one’s own country’s borders, but those of neighbours and friends. Join us for developing co-operation and collaboration through high level discussions and presentations on the future for border protection and management. We look forward to welcoming you to The Hague, Netherlands on 8th-10th December 2015 for the next gathering of border and migration management professionals.
www.world-borderpol-congress.com
Owned & Organised by:
Supported by:
Media Partners: