World Security Report April 2016

Page 1

the new Official Magazine of

MARCH/APRIL 2016 www.worldsecurity-index.com

FEATURE: Growing Terrorism Challenge for Sports Events PAGE 12

FEATURE: Why critical infrastructure should care about its reliance on GPS PAGE 18

COVER STORY

FEATURE: Aviation Cyber Security: Challenges and frontiers of growth PAGE 22

THE ENEMY WITHIN


www.worldsecurity-index.com

The enemy within

Editorial: Tony Kingham E: tony.kingham@knmmedia.com

The tragic events in Brussels will come as no surprise to those of us that follow security issues closely. The fact that it has taken this long for terrorists to once again deliberately target the long queues of people at a busy international airport is perhaps more of a surprise.

Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk

In 2014 10 militants armed with automatic weapons, a rocket launcher, suicide vests, and grenades attacked Jinnah International Airport in Karachi, Pakistan. 36 people were killed, including all 10 attackers, and 18 others

Advertising Sales: Paul Gloc (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk

were wounded.

Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

But not since the bombing in the international arrivals hall of Domodedovo International Airport, Moscow’s busiest airport on the 24 January 2011 have terrorists targeted a European airport. Before that was the unsuccessful vehicle borne IED attack on Prestwick airport in Glasgow.

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.

Copyright of KNM Media and Torch Marketing.

Passenger aircraft have long been a high prestige target for terrorist groups because they cause fear and disruption and attract a lot of publicity. But as the security to get into the departure lounge has ramped up, the vulnerable target becomes the security screening queue itself or as it seems in this case the baggage check-in. The fact is the Brussels attack has caused far more disruption to air travel to and from Belgium than a bomb on an aircraft, without the difficulty of trying to get a bomb on an aircraft. Terrorists always have the luxury of being able to pick their own target and strike at a time of their choosing and the authorities and security services to a degree are always playing catch up, plugging security gaps after the terrorist has struck. Along with the attack on the Metro the reality is that any public place where people gather in numbers is a potential target and once the terrorist has made their bomb and set off to attack their target the probability is that they will cause death and destruction, because even if they are stopped at some sort of security checkpoint, they will be able to detonate their explosive. If we start searching bags going into bus or train stations or airports the terrorist will simply blow themselves up in the queue or switch target again to some other soft target like a busy shopping mall on a Saturday morning or a festival. Obviously in the immediate aftermath of an attack such as Brussels or Paris increasing security on the target area is more about reassuring the public rather than catching would be attackers. The only real chance we have of stopping these sorts of attacks is to stop them before they happen. The real tragedy of both the Brussels and Paris attacks is the failure of intelligence. It has been known for some time that Brussels was


and is a centre for a jihadist activity, indeed it is now clear that it was the centre for a jihadist network expressly established to hit targets throughout Europe. Failure to identify this network and its members and to properly monitor their activities or penetrate the group is what made the Paris attack possible. But what is more tragic that even once the links to Brussels were known, which was almost immediately after the Paris attacks, that the network was not then properly identified and taken down before other members linked to the group were able carry out their attacks. This was despite Salah Abdeslam being on the run in the city for months under the noses of the security services but being caught prior to the Brussels attacks. There are no doubt numerous reasons for the failure including lack of communication between agencies in Belgium and between Belgian and other international agencies; numerous legacy information systems that don’t talk to each other, which means data cannot be shared effectively. But the failure in interrogation of Salah Abdeslam after his arrest but before the Brussels attacks took place is probably the most damning. After all Salah Abdeslam by his actions had already demonstrated that he was less than willing to die a martyr and was therefore possibly more amenable than most jihad-i’s to interrogation. It is highly probable that he had information about other members of the network and other possible attack targets. Whether or not intense interrogation of Salah Abdeslam could have stopped the Brussels attacks we will never know. But what is clear is that many European security agencies need to up their game and make cooperation a reality if we are to stand a chance in countering the well-armed, well organised and well-motivated terrorists within our midst. Tony Kingham Editor

www.cip-asia.com

www.cipre-expo.com


WORLD SECURITY

G4S Risk Consulting Global Forecast 2016 Quarter 2

The G4S Global Forecast for Q2, 2016 focuses on the key thematic threats faced by countries around the world in the coming three months. These include militancy, political and civil unrest, health and disease, terrorism, economic risk and the impact of major geopolitical developments, providing insight by subject matter experts into the most pertinent risks and threats on a regional basis. Africa

Security challenges to persist despite improvements in South Sudan and Nigeria In Nigeria, necessary reform to the state oil sector will trigger oil sector unions and other interest groups to disrupt fuel supplies and electricity production. Meanwhile, the oil-producing Delta region will remain volatile

4 - World Security Report

in Q2 with an elevated threat of attacks on oil infrastructure, kidnappings and piracy. Efforts to extend the remit of the state, such as the prosecution of former militant commander Government Ekpemupolo, alias Tompolo, have triggered increased militancy in the region and a surge in the sabotage of oil facilities and kidnappings. The latter includes piracy attacks on ships in the Gulf of Guinea, while resurgent Biafran separatism is driving civil unrest in the Delta’s cities. President Salva Kiir’s bowing to international pressure to reappoint rebel leader Riek Machar as vice-president of South Sudan will help ensure progress in the implementation of the August 2015 peace agreement in the coming quarter. The formation of a national unity government will be slow given ongoing disagreements between Kiir and

Machar on the demilitarisation of the capital, Juba, and other issues. Despite the progress expected in the political transition, sporadic fighting will continue at a local level between various militia groups that do not respect the overall peace agreement. Dividing the country into 28 new states may generate new land disputes and localised fighting. Terrorism threat continues in West and East Africa There will be a latent terrorism threat for hotels, airports and places popular with foreigners in major cities in West Africa, Somalia, Tanzania and Kenya in the coming quarter. Al-Qaeda in the Islamic Maghreb (AQIM) militants pose an elevated threat in the Sahel region, as seen in the group’s attack on a luxury hotel in Burkina Faso’s Ouagadougou in January and Cote d’Ivoire’s

www.worldsecurity-index.com


WORLD SECURITY

Grand Bassam beach resort in March. Authorities will implement increased security measures due to the threat, including in Senegal and Mali. Security forces to repress protests against incumbent presidents There is a risk of violent civil unrest in the coming quarter in Chad, DR Congo and Djibouti as protests against incumbent presidents are forcefully repressed by security forces. Sporadic protests against the bid of Chad’s President Déby for a fifth term in office appear probable in the run-up to the presidential election on 10 April, when his expected victory in the election may set off protests that would be met with violence by security forces. Opposition protests against delays to elections in DR Congo will also be met with a heavyhanded response from the security forces. In addition, there is a risk of clashes between opposition supporters and police in mid-April in Djibouti as President Ismail Omar Guelleh seeks a fourth term in office and as Sudan holds a referendum on the administrative status of Darfur. Divisions within the South African government threaten political stability The increasing vitriol of the factional divisions within President Jacob Zuma’s government threatens political stability in South Africa in Q2. Tensions between Zuma and his finance minister, Pravin Gordhan, are placing strain on the government as Zuma’s allies step up a campaign to weaken his finance chief, who has the support of the business community. Zuma has lost support among senior figures in the ruling African National Congress (ANC) party, but will remain in position as long as his support survives in the 100-strong ANC National Executive Committee, which selects the party’s leader.

www.worldsecurity-index.com

Municipal elections due to be held across the country from May to August will be a key indicator of the ANC’s future as discontent with Zuma rises and localised outbreaks of unrest increase. Middle East and North

Africa Government offensives to continue in Iraq and Syria A complex network of militia groups and diplomatic ties have continued to develop throughout Q1, and tensions between Turkey and Russia will persist throughout Q2. Turkey will continue to wage its insurgency against the Kurdish Workers’ Party (PKK) in northern Iraq while sporadically targeting Islamic State (IS) and Kurdish YPG fighters on its southern borders. The spread and intensity of Russian airstrikes across Syria in Q1 has depleted the impact of anti-government opposition armed groups. We expect Q2 to see the consolidation of government control over key strategic areas around Aleppo city, which will be at risk of siege tactics by the government. The Geneva peace talks are unlikely to result in any concrete political solutions to the conflict, but will see a continuation of the “cessation of hostilities” that saw violence decline considerably in March. In Iraq, military offensives in Anbar province will continue. Securing strategic towns and, more importantly major highways, will be crucial in disrupting IS logistics in its traditional stronghold. Iraqi forces have been coordinating operations from the city of Hit, and may look to establish more control over towns around

Ramadi. Military reinforcements were sent to al-Hamidiya and Albu Obeid in mid-March, in an attempt to bolster the government’s presence in areas east of the provincial capital. Despite claiming that Ramadi had been liberated in late Q4 2015, small pockets of IS fighters remain in outer areas. Efforts will continue to clear Ramadi of mines and booby-traps in Q2. Military forces will continue to build-up their forces in the Makhmur air base, south of Mosul, as an offensive to take the city is prepared. The airbase will prove an attractive target for attack throughout Q2. IS fighters are heavily entrenched in Mosul, therefore decisive military action will probably not occur until the latter half of 2016 and is highly dependent on the situation in Anbar province, particularly around Abu Ghraib and Ramadi. Libya’s worsening insurgency to pose wider security threats IS fighters in Libya are thought to number more than 6,000, with the group set to further exploit the chaotic security environment and lack of unified governmental control throughout Q2. Although there have been calls by international players for military intervention by an international coalition to counter IS, the current political and security environment makes a concerted, unified effort unlikely. French and allied special operations forces are already operating in Libya, although Western involvement in the country will predominantly take the form of drone strikes and possible training missions in neighbouring countries. The impact of IS’s Libya campaign against oil production and its attempted expansion into Tunisia will make it a priority for Western nations in Q2. Its regional impact could be more serious, promoting

World Security Report - 5


WORLD SECURITY

further instability on Egypt’s western borders and raising concerns over the supply of arms to other IS affiliates. Tunisia, in particular, is at risk of further destabilisation as witnessed by the March assaults on the border town of Ben Guerdane. The Tunisian government will need to develop a more effective counterterrorism campaign to prevent the cross-border movements of militants, but further border town assaults are expected throughout Q2. Given the multifaceted nature of the threat, widespread coordination between Western and north African militaries will be required to effectively combat the regional spread of IS. At the current juncture, this is unlikely due to capacity issues and a lack of political willingness to commit to overseas operations and prevailing chronic border insecurity. Increased risk of terrorism during Ramadan Terrorist attacks are expected to increase in frequency during the fasting month of Ramadan which begins on 6 June this year. In 2015, IS issued a threat that Ramadan would hold “lots of surprises”, with multiple attacks reported in the holy month, from Tunisia, to Kuwait and Saudi Arabia. Given the current strategic importance of the western Libya-Tunisian border region, a sharp spike in activity should be anticipated for this 30-day period. Attacks are likely to target Western interests, mosques and public transport systems. South Asia Political instability breeds pervasive militancy In Afghanistan, despite joint efforts by Afghanistan, Pakistan, China and the US to broker peace with the Taliban, the group will likely eschew any attempt to seek a cessation in hostilities,

6 - World Security Report

opting instead to utilise its recent momentum and continue to push towards government enclaves in southern Helmand province over the next three months. Issues including desertion, corruption, insider attacks and lack of resources will continue to impede the ability of the Afghan National Army to push back against the Taliban. With Operation Zarbe-Azb entering its final phase in Pakistan’s tribal region, militant groups, most notably the Tehriki-Taliban Pakistan (TTP), will seek to increase the frequency of attacks against soft targets, including schools and universities in attempts to demonstrate their undiminished ability to carry out such attacks. This will force greater intelligence sharing between Afghanistan and Pakistan, lest both countries risk deepening insecurity. In the continued absence of efforts by the Indian government to instigate a political solution in Kashmir, and spurred by popular support, separatist groups such as Hizb-ul Mujahideen will escalate action against government and military personnel in and around Srinagar, Jammu and Pulwama. In the wake of an upsurge of attacks in 2016, the government will likely respond with an increase in paramilitary troop numbers and the imposition of greater security measures. Repressive politics threaten violent unrest In Bangladesh, efforts by the government to stifle dissent

and restrain media freedoms will fuel disquiet among democratic advocates. With thousands of opposition activists, many of whom have ties to marginalised Islamist political groups, jailed on historic sedition charges, hardline groups will continue to capitalise on this alleged repression and use it to recruit disenfranchised individuals to their cause, resulting in an uptick in violence against secular and religious targets alike. Islamic State (IS) will claim to spearhead the upsurge in Islamist violence with groups working to increase operational capabilities to strike larger cities. In India, the Modi government will be subject to increasing scrutiny over its repression of freedom of speech laws and the use of nationalist groups to enforce its agenda. Following widespread caste protests in Q1, the government will be forced to consider a more inclusive politics, partially divested of nationalist or sectarian concerns. In Q2, this will likely consist of the inclusion of the Jat caste in employment and education quotas. Protests by student and opposition groups are likely to persist, with an everincreasing likelihood of violent escalation should repression continue. Constitutional reforms signal strengthening of Indian relations With the purview of strengthening ties with its South Asian neighbours, a hallmark of the Modi government’s foreign policy, India will continue to make efforts to capitalise on democratic developments across the region in order to bolster its own economy. Having learned a vital lesson from the protests and resultant economic crisis that stemmed from the promulgation of its new constitution that ethnic groups allege have done little to address proportional representation and constituency delimitation in Nepal. Kathmandu will seek to

www.worldsecurity-index.com


WORLD SECURITY

improve relations with India and prove itself to be a trustworthy trading partner. The Nepalese government’s ability to do this relies heavily on it making good on its promise to directly address the demands of ethnic groups. A healing of relations between the two countries will see bilateral deals reached in sectors including energy, construction and post-earthquake relief support. Following an announcement by the government that the Sri Lankan legislature would commence drafting a new constitution and debating “Amendment 20”, granting greater devolution to Tamil communities in northern provinces, India will look to capitalise on better governance and nurture deeper trading and infrastructure ties, notably in the oil and gas sector. With constitutional reforms directly benefiting the Tamil community, they too threaten to alienate Sinhalese hardliners who will continue to protest the alleged preferential treatment of Tamils, especially with regard to land use. Asia Pacific

for the past year, but Widodo will face a decision whether or not to heed public opinion and make fighting corruption the cornerstone of his administration, or its downfall. In Malaysia, elite corruption is spurring a movement for political reform, but Prime Minister Najib Razak will use every means available to protect his position. Civil society is likely to persist with large anti-corruption demonstrations, drawing attention to Malaysia’s worsening democratic deficit. The change in leadership in Vietnam presents a chance to rebuild public trust, starting with a review of its decade-old AntiCorruption Law. Failure to do so will see corruption, associated with interest groups and crony capitalism, continue to impact much-needed infrastructure projects. On mainland China, the fervent anti-corruption campaign is running alongside a crackdown on civil society. Concerns about China’s increasing influence in Hong Kong will continue to be reflected in major corporations showing signs of unease about the polarised political environment on the back of suspected abductions of booksellers in recent months by alleged Chinese agents. Succession planning

Civil society and corruption Indonesian President Joko Widodo will face a considerable challenge in advancing Indonesia’s long-simmering fight against corruption. Political infighting has placed the issue of the anticorruption agency, KPK, in limbo

www.worldsecurity-index.com

In Thailand, the military junta will remain in power for the foreseeable future, despite rising controversy surrounding the current National Council for Peace and Order (NCPO)’s heavy-handed rule that has seen civil liberties sharply curbed. It appears an accommodation is in place between former prime minister Thaksin Shinawatra and the military, where Thaksin’s family interests have been left untouched in exchange for him disengaging his political machine in the name of achieving a secure succession when the King eventually passes away.

The May presidential election in the Philippines will see Filipinos vote in the most competitive election in the country’s history. Key priorities for candidates are increasing workers’ pay, curbing drug abuse, crime and expanding public infrastructure, as voters decide if they will opt for a continuation of President Aquino’s policies in his anointed candidate, Mar Roxas. Political violence will escalate as the polls draw closer, with Pangasinan, Masbate, Negros Oriental, Lanao Del Sur, Maguindanao and Western Samar most at risk. Reform agendas With the military now the de facto opposition party in Myanmar, prospects for reform rest on what the National League for Democracy (NLD) believes can currently be achieved. NLD leader Aung San Suu Kyi will have to assuage military concerns that they can keep hold of their vested interests. Falling public confidence in the judiciary, communal tensions and growing inequality will fuel public grievances and therefore slow the pace of reform expected by foreign investors. Meeting economic goals will prove challenging due to the weakness of state institutions. In Indonesia, a much heralded “big bang” economic opening has the potential to help spark growth, but the government will need to raise more revenue if public spending is to increase further. For the new Vietnamese leadership, the key policies adopted at the congress mean the government is unlikely to carry out any radical economic and political reforms, as will be the case in Cambodia. North & Central America Electoral processes to increase potential for unrest The coming quarter will be marked by a series of political

World Security Report - 7


WORLD SECURITY

remaining primary elections in Q2. Political attention will focus on leading candidates Donald Trump and Hillary Clinton, with the risk of demonstrations by supporters and opponents of both parties increasing ahead of the nominations. Industrial underperformance and risk of default in the Caribbean

developments that will have an impact on the region’s security environment for the rest of the year. Following the postponement of Haiti’s January presidential runoff election amid severe unrest, the longawaited vote is scheduled to take place on 24 April. Although the implementation of an interim government has eased the potential for a new wave of political violence, the risk of largescale protests by activists seeking changes to the overall electoral system both ahead of and in the aftermath of the vote will remain high, particularly in Port-au-Prince. General elections in neighbouring Dominican Republic, in which President Danilo Medina will seek a second term in office, are scheduled for 15 May. The results are expected to determine the continuation or redirection of immigration policies in regard to Haitian-born nationals, an issue that will continue to trigger regional diplomatic tensions. In Mexico, 12 states will hold local elections on 5 June, which will also define a new composition of the federal congress. The vote, which follows similar elections in 2015, is largely seen as a second survey of President Enrique Peña Nieto’s administration following a series of corruption scandals and slow economic growth. The presidential election campaign will intensify in the US as candidates seeking nomination by the Republican and Democrat parties race to win supporters during the

8 - World Security Report

The announcement of Mexico’s launch of a tender for deepwater oil and gas blocks in late 2016 is expected to increase foreign and private investors’ appetite over the coming months despite low international oil prices. However, state oil company Petroleos Mexicanos (Pemex) and its new director will face increasing pressure to implement substantial reform in order to overcome its current fiscal deficit and a significant decline in production, particularly as the company loses competitiveness to bid for exploration projects. Widespread concerns that Puerto Rico will default on its USD 70 billion debt will increase during Q2 as the May deadline approaches for the US overseas territory to reach an agreement with its creditors. Although the government has presented an unappealing proposal to creditors to restructure its debt, the island will continue to request US Congress to allow it to file for bankruptcy and receive a federal bailout. Concerns over a wider Caribbean economic crisis will increase as Jamaica’s high debt – estimated at more than USD 16 billion – highlights the region’s vulnerability to external shocks. The risk of civil unrest will remain high as growing crime rates and high unemployment add pressure on the newly elected Jamaica Labour Party government to impose unpopular austerity measures. South America Health and environmental

concerns to influence public policies Widespread concerns over Brazil’s ability to contain the spread of the Zika virus, believed to be linked to cases of microcephaly, will intensify as the country prepares to host the 2016 Summer Olympic Games in Rio de Janeiro. Despite governmentled awareness and prevention campaigns in affected areas, the risk of contagion is likely to remain high and the government will face strong international scrutiny, forcing it to increase spending on sanitary measures. The scale and impact of environmental activism is expected to grow in Peru following the declaration of a state of emergency in the Amazon region in the wake of an oil spill into the Chiriaco and Morona rivers. Local communities are expected to continue protesting to demand an effective response from the government and the issue of environmental protection is likely to play a significant role in the upcoming presidential election. Expectations of improved operating conditions raise investor confidence The delay in signing a comprehensive peace agreement between the Colombian government and rebel group FARC, originally scheduled for

www.worldsecurity-index.com


WORLD SECURITY

23 March, has raised concerns over the feasibility of completing the long-awaited deal. However, positive developments in the negotiations continue to boost investor confidence, particularly in the energy sector. President Juan Manuel Santos will need to gather congressional and public support for the eventual deal, which has faced opposition over the rebel group members’ political participation and reparations for the victims. Splinter factions opposing the terms of the potential agreement, as well as other guerrilla groups led by ELN, are likely to continue launching offensives against military, police and infrastructure, seeking to obtain concessions from the government. In Argentina, President Mauricio Macri’s ability to reach a payment deal with holdout creditors, with which the country has been in a dispute for 15 years, will increasingly restore the country’s financial credibility after years of protectionist policies. However, the opposition-held Congress is likely to remain an obstacle, limiting Macri’s margin for political manoeuvre and hindering the effective implementation of other investment-friendly policies.

ability to implement measures to fight economic decline. In Bolivia, President Evo Morales will be under growing pressure to regain popular support following his defeat in a referendum that has banned him from seeking unlimited re-election. The 10 April general election in Peru is expected to be controversial, with opposition candidate Keiko Fujimori, the daughter of imprisoned former president Alberto Fujimori, leading the polls. Regardless of which party assumes power, the next president will face pressure to tackle corruption and strengthen public security.

Regional leaders struggle amid declining approval ratings

Ongoing migrant crisis

The risk of violent civil unrest in Venezuela is expected to remain high in Q2 following the controversial ruling that has strengthened President Nicolas Maduro’s power over the opposition-controlled National Assembly, amid ongoing economic turmoil. Antigovernment protests demanding Maduro’s resignation and the release of imprisoned opposition leaders are likely in Caracas and Tachira state, where clashes between activists and police are frequent. Political tensions will increase in Brazil as calls for President Rousseff’s impeachment over corruption allegations trigger large-scale protests and limit her

www.worldsecurity-index.com

Europe

Warmer weather will bring an increase in the number of migrants attempting to reach northern and western Europe. However, due to increased border restrictions and in anticipation of a deal between the EU and Turkey, numbers successfully passing through the so-called Balkan route to the north are expected to decline. Displaced persons, potentially numbering thousands, could still try to find illegal passage through Macedonia and central Europe to Germany or France. Authorities will continue to detain those crossing borders illegally, placing additional strain on basic infrastructure. The risk of unrest will increase

between local populations and migrants as European governments and authorities continue to struggle to accommodate the large numbers of arrivals. Tensions will remain high, particularly in Macedonia, Greece and south-east Europe, due to continued arrivals from the Middle East. Furthermore, media reports of migrant-related crime are expected to trigger antiimmigrant sentiment in Western Europe, leading to further protests and rallies driven by support for right-wing groups. EU relations The EU will continue to focus on strengthening controls on its external borders, but is unlikely to implement a comprehensive plan to settle migrants arriving from Iraq and Syria. The deal with Turkey is likely to remain fragile, with a number of complex issues unresolved. Political tensions within the EU, and also within the wider continent, are expected to continue as negotiations regarding refugee settlement drag on. Greece is likely to remain in a difficult position, with migrant numbers increasing as its external borders remain closed, and as the country struggles to manage its bailout conditions. Greece has been threatened with Schengen expulsion if it fails to improve border controls amid the migrant crisis. The viability of Europe’s 26-nation Schengen agreement will come under pressure as governments continue to impose temporary border checks and closures to halt the flow of migrants. Caps on migrant arrivals have already been introduced in Austria, Slovenia, Croatia, Serbia, Macedonia and five other Balkan states creating a bottleneck and leaving thousands stranded in Greece. Focus will also turn to the UK where, on 23 June, a referendum will be held on whether the country will remain in the EU.

World Security Report - 9


WORLD SECURITY

Threat from Islamist-related terrorism The threat from Islamist-related terrorism remains a major concern across the region, and it has become widely accepted that further attacks, predominantly linked to Islamic State (IS), are expected. UK authorities have also warned of “large-scale” attacks in Europe. Belgium and France will continue to carry out counter-terrorism operations in response to the November 2015 attacks in Paris. Several countries have been singled out as possible targets via IS and al-Qaeda propaganda, including Sweden, Spain, France, Germany and the UK. However, there also remains a high threat from less sophisticated “lone wolf” attacks, including individuals returning from conflict zones and self-radicalised domestic nationals who have not travelled to the Middle East. Potential targets include transport hubs, large public gatherings and government or military assets. France will remain on high alert during the Euro 2016 Football Tournament in June-July, with host cities having their security budgets increased. Stadiums and designated “fan zones” will have elevated security, involving airportstyle measures, underlining the threat. Russia & CIS

Information war distracts from decline on Russian home front

10 - World Security Report

Attention-grabbing foreign policy activity will continue to dominate Russia’s news cycle in Q2, exploiting crises such as Syria and Ukraine to distract the public from the economy’s regression by positioning the country as a powerful international actor. Moscow’s foreign policy goal in Q2 appears to be a tactical retreat to allow pre-existing internal rifts within rivals to grow, boosting the array of divisive authoritarian populists and extremists ranging from US presidential candidate Donald Trump to the anti-Merkel Alternative für Deutschland movement. These distractions will allow the Russian political economy to continue without significant reform, suffering the consequences of structural corruption, widespread apathy, widening inequality and crumbling infrastructure. Despite this, provincial discontent continues to rise, with police chiefs warning of a rising incidence of unauthorised protests. Nevertheless, the weakness and suppression of the opposition is such that no serious challenge to the regime headed by President Vladimir Putin can be considered imminent in the run-up to legislative elections in September. Weakened energy fundamentals to cause turbulence in Russian near-abroad Nationalist tensions have risen in Georgia over negotiations between Tbilisi and Russian gas company Gazprom, as the opposition accuses the current government of bowing to Russian pressure aimed at preventing the country from moving closer to the West. Instead, Georgia has agreed a deal with Azerbaijan to receive natural gas, in a sign of Russia’s weakening influence in the Caucasus region as a result of low energy prices. In Central Asia, migrant workers from countries including Kyrgyzstan and Uzbekistan continue to return home from Russia in droves as

the rouble falls in value. Some of those that remain in Russia pose an elevated terrorism risk amid concerns that racism, dire economic conditions and Chechen recruiters online will draw vulnerable young people into Islamic State (IS), whether in the Levant or elsewhere. The threat of attacks is highest in Moscow, the North Caucasus and Tajikistan, where IS militants in neighbouring Afghanistan aspire to extend their reach in the increasingly likely long-term event of state failure. Ukraine pursues Minsk process despite adversity In Ukraine, the Minsk process is near dead in the water going into Q2. Both Russia and Ukraine are downplaying the extent of ceasefire violations as Russian-backed separatists aim to make strategic gains on the battlefield and as the Poroshenko government comes under pressure from Western allies and domestic rivals. Ukraine has sought to fulfil its commitments under the deal, but democratic structures such as the parliament have prevented it from following the Minsk process, including conducting elections in the enclaves controlled by Russian proxies. In turn, Russia has largely ignored its commitments under the deal and there is no reason to expect this to change in Q2. The process is unlikely to be officially abandoned by either side, but an unpredictable Kremlin swing back to the Ukraine war is not impossible in the aftermath of the partial withdrawal from Syria The threat of military and cyber provocation continues along the Russian near abroad, stretching from Finland through the Baltic states to Turkey and Moldova, where the elite is leaning towards a pro-Russian presidential candidate to escape a political crisis of its own making.

www.worldsecurity-index.com


including Critical Information Infrastructure Protection

5th-6th October 2016 Bangkok, Thailand www.cip-asia.com Co-Hosted By:

Save with the Early Bird

Department of Disaster Prevention & Mitigation

Developing resilient infrastructure for a secure future Confirmed speakers include: - Shamika Sirimanne, Chief of Division, Information and Communications Technology and Disaster Risk Reduction Division, UNESCAP - Dr. Peeranan Towashiraporn, Director, Asian Disaster Preparedness Center - Kumpol Sontanarat, Director, Information and Communication Technology Department , Securities and Exchange Commission (SEC), Thailand - Air Chief Marshal Somneuk Swatteuk, Senior Expert, National Disaster Warning Center, Thailand - Zahri Yunos, Chief Operating Officer, Cybersecurity Malaysia - Andy Wilson, Director Strategic Development, Ordnance Survey International, UK - Dr. Werner Trieselmann, General Manager CEDIM - Center for Disaster Management & Risk Reduction Technology, Helmholtz Centre Potsdam GFZ German Research Centre for Geosciences, Germany - Hansen Chan, Product Marketing Manager, Alcatel-Lucent, USA Discover the latest challenges, stratgies and solutions for protecting ASEANs critical national infrastructure Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. Book your delegate place today and save with the Early Bird delegate rate book your place online at www.cip-asia.com/onlinereg

Securing ASEANs critical national infrastructure

Owned & Organised by:

www.worldsecurity-index.com

Supporting Organisations:

How to Exhibit Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Asia please contact: Suthi Chatterjee Exhibit Sales Manager (Asia) PRMC Thailand Tel: +66 2 247-6533 Fax: +66 2 247-7868 Mobile: +66 (0) 87-060-5960 E: suthi@prmcthailand.com Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Tony Kingham Exhibit Sales Director T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@knmmedia.com

Media Partners:

World Security Report - 11


EVENT SECURITY

Growing Terrorism Challenge for Sports Events

The issue of security at high-profile stadiums and major sporting events has gained considerable attention in the wake of the 13 November 2015 terrorist attacks in Paris. The incident saw the Stade de France, the iconic national stadium situated in Saint-Denis, north of central Paris, targeted during a series of coordinated assaults carried out by seven terrorists linked to Islamic State (IS) in the most significant terrorist event in France’s history. With France hosting the football European Championships from 10 June-10 July 2016, and Rio de Janeiro the Olympics Games in August 2016, to name but two events, security agencies are now tasked with the increasingly complex challenge of protecting global sporting events from mass terrorist attacks. Motivations Sport is no stranger to the threat from terrorism. Highprofile sporting events, including the Olympics, football tournaments and cricket matches, have been targeted, with varying degrees of impact and success since the 1972 Olympics in Munich, Germany. A number of incidents have been prevented at high-profile sporting events in recent years due to successful counter-terrorism operations. The assault on the Stade de France in November 2015 illustrates the increasing threat from Islamist-related terrorism, especially IS-affiliated entities or sympathisers. Football tournaments are highly attractive targets, with non-Muslim and Muslim supporters and players alike creating a multicultural environment. This cultural and religious diversity is a key motivating factor for IS and such attacks are anticipated to continue. Furthermore, the media attention generated by sporting events is another driver. IS is critically aware of its propaganda campaign and the manipulation of social and mainstream media to increase its profile. As such, the combination of the growing threat from IS, the media attention garnered by the group and sporting events, as well as the presence of a large, condensed crowd of people in a restricted

12 - World Security Report

area, makes sport a prominent terrorism target. This is underpinned by what sport is deemed to represent – togetherness, integrity, inclusivity, among other values that IS, and other groups, diametrically oppose. The threat against sporting events from IS and other Islamist militant groups is set to remain a long-term concern. The 12th edition of Inspire, the al-Qaeda propaganda publication, released in March 2014, called for bomb attacks against sporting events including the US tennis open, the UK FA Cup, the English Premier Football League and the League Cup in France. Al-Qaeda in the Arabian Peninsula (AQAP), which produces the publication, also provided advice on how to carry out attacks, suggesting the best time to target a UK football match is when the crowds are leaving the stadium. IS has also threatened to target future sporting events, as well as France in general, suggesting the 2016 European Championships is a likely target. While the causal link between extremist publications and actual attacks is questionable, it would be irresponsible to ignore the impact of such calls. The Tsarnaev bombers who targeted the Boston Marathon in 2013 used guidance from the first edition of Inspire to carry out their attacks. The threat posed by IS and its intent to target Western

www.worldsecurity-index.com


EVENT SECURITY

interests suggests the risk to sporting events is now more significant than in previous decades. IS claimed after the 13 November attacks that France would remain a priority target, along with other Western countries involved in the anti-IS coalition conducting airstrikes in Iraq and Syria. Western Europe, including France and the UK, has reported an increasing number of foiled terrorist attacks since IS declared its so-called caliphate in June 2014. As such, securing sports events, particularly high-profile games such as the Olympics, the European Championships, Wimbledon and the French Open, has become more challenging and a long-term issue. Impact of Paris terrorist attack The 13 November attacks on the Stade de France triggered a major response by sports organisers. In the following weeks, events across France were postponed, including football league matches and European rugby fixtures. For the Six Nations Rugby Championship match at Stade de France on 6 February, French Rugby Federation (FRF) officials implemented the largest security operation ever seen at a sports event in the country. A robust search regime was introduced, involving some 250 police officers and 900 security staff – almost double the number from

previous years. Specialist teams using dogs and snipers were also deployed. The security perimeter was extended to 100m away from the stadium, with attendees searched at least twice before being allowed to enter. Public transport and routes to the stadium were also under heavy surveillance. Attendees were asked to arrive early, with the stadium opening two hours before kick-off to minimise congestion. The threat has also been felt beyond Europe, with the security operation for the Super Bowl 50 on 7 February in San Francisco involving 4,000 personnel. Counter-terrorism planning for the event had taken three years to formalise, but was reviewed in light of the Paris attacks. Moreover, organisers of football matches in Australia have also committed to improving security in 2016 following advice and consultation with French officials after the 13 November attacks. Sporting events organisers/security managers in Japan, Spain and Trinidad also escalated security.

Attention is turning to the Summer Olympic and Paralympic Games in Rio de Janeiro

Attention is turning to the Summer Olympic and Paralympic Games in Rio de Janeiro, Brazil, in August and September 2016, with the current security budget estimated at some USD 195 million, significantly less than other previous games; London in 2012 (USD 870 million), Athens in 2004 (USD 1.2 billion),

www.worldsecurity-index.com

World Security Report - 13


EVENT SECURITY

Vancouver in 2010 (USD 1 billion) and Sochi, in 2014 (USD 3 billion). It is almost certain that the figure of USD 195 million will have to increase substantially to effectively tackle the terrorism threat, particularly in light of the availability of firearms and high levels of violent crime in Brazil, which places additional pressure on police and other security providers. While Brazil is not considered to be a main target for Islamist terrorism, IS recruiter and French jihadist Maxime Hauchard warned on 16 November 2015 that Rio “would be next”. Terrorism will seek to follow the crowds, along with the media, as IS in particular is very media-savvy, and with the proliferation of firearms, an attack against the 2016 Rio Olympics cannot be discounted. Terrorism Evolution and Sport So-called “Lo-fi” attacks that involve the use of

bladed weapons, tools, and even vehicles, as well as single active shooters, improvised explosive device (IED) attacks in various forms, or a coordinated attack as seen in Paris involving multiple gunmen, are considered the most likely form of terrorism against a sporting event. While it is conceivable that a single active shooter or “lone wolf” attacker could gain access to a stadium, the escalation in physical security and personnel will make this ever more difficult. Attention is also turning to more sophisticated methods. The organisers of the Super Bowl 50 in San Francisco were warned by the FBI and Department of Homeland Security that “high-tech” issues were present and could pose a risk to the event. According to FBI sources, some 10 cables damaged within a 60km-radius of the 49ers’ stadium in mid2015. Officials believe the

14 - World Security Report

incidents were trial runs to see if cutting the cables would disrupt critical services or if the networks could be accessed for information regarding the Super Bowl. Damaging the cables could also hinder response times of the emergency services in the event of an attack. It is anticipated that high-tech threats surrounding cyberterrorism will continue to be a key concern for sporting events, with the London, Beijing and Sochi Olympics linked to a heightened risk of cyber-attacks. Additionally, the FBI warning also gives credence to the future of drones or unmanned aerial vehicles posing a possible threat to sporting events, as demonstrated during the Serbia vs Albania football match in October 2014 when the game was halted after a drone entered the playing area. Ahead of the Super Bowl 50, officials warned that drones could be used to carry out terrorist attacks involving light, explosive payloads, while the more rudimentary risk of deliberately crashing the drone inside the stadium to injure people or disrupt the event was also highlighted. The use of “high-tech” methods, whether drones or cyber-terrorism, is more likely to be used in conjunction with more traditional forms of terrorism; cyber-attacks hampering emergency services and disrupting critical infrastructure, while a deliberately crashed drone could trigger panic and disorder exposing the event to secondary and tertiary attacks involving firearms, explosives or bladed weapons. Ramifications for events The ramifications for sports event organisers will be significant in response to the Stade de France attacks. Event organisers will have to commit to long-term heightened security as seen during the

www.worldsecurity-index.com


EVENT SECURITY

ongoing Six Nations Rugby Championships. While terrorist organisations have targeted sporting events since the 1970s, the IS attacks in Paris and the perceived long-term threat from the group means that the sports industry will have to consider the threat and associated escalated security as the norm. Joan Carles Molinero, the commander of the Catalan police which deals with security at Barcelona’s Nou Camp stadium, says security alerts are “common situations” and that the larger sporting venues may have to adopt airport-style security on a permanent basis. Measures being considered and implemented at other venues include metal detectors, pat-down searches and scanners. Major sporting events, such as the Olympics, Commonwealth Games and football and cricket tournaments, are familiar with implementing robust security to the point where millions, or billions as in the case of the 2004 Athens Olympics and the 2014 Sochi Olympics, of dollars are spent to secure the event. However, it may now be the case that less prestigious sporting events may have to implement much tighter security, at a cost, due to the terrorism threat. While larger, more popular venues could implement such measures, smaller venues may struggle to maintain elevated security for long periods, increasing financial pressures. Regardless of the magnitude of the sporting event, higher security costs, logistical issues and crowd control, particularly measures to manage congestion, will become key factors for organisers necessitating much closer relations with the police and public security agencies, with further financial resources likely in terms of private security personnel and stadium stewards. Additional pressures on public security resources in tackling the wider terrorism threat will likely mean that event organisers become more reliant upon private security providers. This will increase pressure on private security in terms of vetting and screening when employing security personnel. There are already concerns that poor or rushed vetting could allow vulnerabilities to be exposed, even to the point where terrorist sympathisers apply for stadium security roles with the intention of carrying out an attack once inside. Other internal stadium functions, including hospitality, catering and stewarding, which could be voluntary at some venues, would also need to be reassessed in terms of recruitment, vetting, screening, and most crucially, training. Internal staff will also have to undergo the same search regimes as spectators to ensure the stadium’s security integrity. These factors will add financial pressures to security providers and organisers.

protect the venue and mitigate the threat. However, the nature of physical security means that the threat is often displaced rather than removed. There is the potential, due to the escalation in security, that crowds attending sporting events become the next most attractive target, before they enter or when they leave the heavily-protected stadium and enhanced perimeter security. Routes to and from the venue, transport hubs associated with sporting events, bars, cafes and restaurants close to the stadium could be at greater risk despite the measures undertaken, as demonstrated in Uganda and Nigeria where bars and fan-zone screenings were targeted during the World Cups in 2010 and 2014, respectively. This will place greater emphasis on liaison between stadium management and police, and with public agencies responsible for security outside of the stadium. Crowd management Crowd management and how to manage the ingress

and egress of thousands of people within a relatively short time frame will continue to be a critical aspect of stadium security. While spectators are likely to be safe inside grounds, managing crowds outside of a heavily-secured venue becomes more of a challenge. Robust crowd management strategies and procedures will need to be developed to ensure spectators are not exposed to greater risk while exiting or accessing the stadium. Understanding the nuances of crowd management will become essential, with greater emphasis on managing the flow of people outside of the stadium. Core factors that need consideration are the nature of the event, the environment (type of venue, climatic conditions, route layout), demographics of the crowd and the overall mood of the occasion, including spectator grievances with organisers, teams or club representatives. Environmental factors, particularly the terrain around the venue, will

Increasing physical security is an obvious necessity to

www.worldsecurity-index.com

World Security Report - 15


9th-11th May 2017

The Hague, Netherlands www.cipre-expo.com

Co-Hosted by:

Converge; Collaborate; Cooperate The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands.

Save The Dates Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure. Join us in The Hague, Netherlands for the premier event for operators and government establishments tasked with Critical Infrastructure Protection and Resilience. Exhibit & Sponsorship Enquiries: Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Europe please contact: Tony Kingham Exhibit Sales Director T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurity-index.com

Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk

Leading the debate for securing Europe’s critical infrastructure Owned & Organised by:

Supporting Organisations:

Media Partners:


EVENT SECURITY

have an impact on crowd management. In the event of an emergency, stadium authorities will likely use one of five fundamental crowd-related responses; total evacuation, phased evacuation, directed evacuation, stay/shelter in place and invacuation. However, these responses will need reviewing in light of the evolving threat and the direct targeting of people outside the stadium before or after the event. A closer examination of the manner in which spectators enter and exit the venue, particularly when movement is dictated by street geography, may necessitate a change in stadium procedures, policies and how crowdrelated responses are implemented. Routes used to access the stadium may experience congestion due to road narrowing, street design and layout making managing high volumes of people more difficult. Crowd congestion close to the stadium makes spectators attractive targets, particularly for “lone wolf” attackers, which

present a major security challenge. One technique is road closures using soft Hostile Vehicle Mitigation (HVM) tactics; usually, the deployment of emergency vehicles to create a temporary physical barrier. This lessens the need for hard HVM, such as fixed bollards, concrete flower beds, and permanent barriers, which may not be appropriate. However, soft HVM, while a good compromise, can still cause knock-on congestion in the nearby vicinity, potentially creating more disruption and presenting secondary targets near the stadium, including emergency service vehicles acting as soft HVM. Event organisers may have to accept additional costs and entice and encourage spectators to enter the stadium earlier and stay longer, offering additional entertainment and facilities thus reducing the volume of pedestrian traffic immediately before and after the event. While this is done at major events or at times of heightened risk, extending stadium opening times and allowing spectators in the stadium for

www.worldsecurity-index.com

a longer period of time could become normal procedure, necessitating a review of stadium resources. Mitigation measures Heightened stadium security, as witnessed during the Six Nations Championships, while difficult to maintain and expensive, is anticipated to become the default position to protect major sporting events. However, the “ring of steel” approach, while effective for the stadium, presents vulnerabilities elsewhere. The next logical step is likely to be increasing security at nearby locations, including amenities, stores and transport hubs. As security is increased, the focus will shift more towards crowd management. Particular emphasis will need to be given to the dynamics of crowd control and how to manage the flow of people. Congestion, bottlenecks or impeded pedestrian as attractive “soft” targets, causing mass panic and significant casualties in the event of an attack, will need to be avoided. While protecting a flow of spectators at all times is almost impossible, using techniques such as “soft” HVM, partial road closures and diversionary measures can reduce some of the risk. Furthermore, organisers may need to consider policies concerning stadium access and egress, with staggered exit and entry used as a potential mitigation measure to limit large volumes of people assembling before or after events. Resourcing The difficulty in balancing public resources in terms of sustainability, cost and manpower while mitigating the terrorism threat in relation to sporting events is expected to remain a long-term issue. Finite resources may mean that heightened security witnessed at the Stade de France on 6 February may only be applicable for high-profile events, such as the European Championships or the Olympics. Private security providers may become required in the longer term to not only provide stadium security, as is often the case currently, but to also extend their role to outside of the venue, which traditionally falls within the remit of public security agencies. The additional strain on resources to protect crowds during sporting events could mean that event organisers and potentially even attendees shoulder more responsibility. Corporate guests and personnel attending high-profile sporting events may need to consider their own personal security more carefully, and have a greater understanding of their own risk management and emergency response plans in the event of a terrorist incident.

World Security Report - 17


PUBLIC SECURITY

’Invisible’ Security Solutions for the Protection of Public Spaces from Person Borne Threats

Recent events in Brussels, Paris and Egypt have highlighted the growing urgent operational requirements to screen people for concealed threats. Jonathan H. James of Digital Barriers looks at the the evolving nature of the threat and the technological opportunities for securing public spaces. THE EVOLVING NATURE OF THE THREAT In 2014 there were 424 confirmed suicide bomb attacks, resulting in the deaths of 3554 people - a 90%increase on 223 suicide attacks and 2027 fatalities in 2011. Some 36% of these attacks were due to person borne improvised explosive devices (PBIEDs). The threat of undetected PBIEDs in busy public areas is compounded by the growing instances of attacks using concealed automatic weapons as recent tragic events have shown. The person borne concealed threat is a potent weapon in the armoury of the terrorist. A person carrying a concealed threat can modify their actions to suit local circumstances and move to busy crowded areas for maximum impact or to areas of perceived lower surveillance. The nature of the threat from concealed person borne explosives and weapons is evolving and unpredictable. There is a rapidly growing requirement to screen people over a much broader range of locations and security scenarios. The need to screen people for such items has never been greater. The requirement is to screen individuals, covertly and at the earliest opportunity at the perimeter entry points of the locations in question. This must be achieved without impacting the flow rates of people or introducing security screening ‘bottlenecks’. Requirements now include a broad swathe of scenarios, ranging from high volume, high throughput public places

18 - World Security Report

and cultural sites or events, to transport hubs and visitor or employee screening at key assets or VIP sites and infrastructure locations. The threat profile includes metal and non-metal objects, such as, ballistic weapons, explosives, liquids, and ceramics etc. – indeed, anything that may be an offensive weapon. Today’s requirement must be to screen for a wide range of concealed threat objects of all materials, both metal and non-metal in any location where people congregate in large numbers. 1st GENERATION ACTIVE ‘BODY SCANNER’ TECHNOLOGY FOR LANDSIDE/AIRSIDE CHECKPOINTS Many of us are familiar with what may now be termed 1st generation ‘body scanner’ screening systems now deployed at airport landside/airside checkpoints –as specified by European ECAC and US TSA security guidelines. Ionizing security screening technologies such as X-ray backscatter have their place in highly secure locations, where the legal framework permits their use. Deployment of X-ray backscatter ‘body scanners’ in wider public locations is unlikely for obvious regulatory health and safety reasons and throughput limitations. Active millimetre wave screening solutions have been deployed at airport landside/airside security checkpoints. They are typically large telephone booth sized cabins in

www.worldsecurity-index.com


PUBLIC SECURITY

which the person stands stationary during the screening process whilst being illuminated with low levels of electromagnetic waves (millimetre waves). Images of the person and concealed objects are formed using the waves reflected from the person. These active ‘body scanning’ solutions have their place at the landside/ airside checkpoints. This is a consenting search scenario. The travelling public have grown (maybe albeit begrudgingly) to accept delays necessitated by the need to screen stationary individuals within the landside/airside security checkpoint. OPERATIONAL REQUIREMENTS FOR PEOPL ESCREENING IN PUBLIC PLACES It is clear throughput and regulatory factors limit broader roll out of these 1st generation screening solutions for wider public deployment. One can hardly ask the public to stand stationary inside screening cabins on entering busy shopping malls, etc. These are invariably locations of high throughput and high foot fall, that by necessity preclude the use of ‘body scanner’ cabins in which the person must stand stationary. THE IMPORTANCE OF ‘INVISIBLE’ STAND-OFF SCREENING SOLUTIONS In public areas, security screening technology must

be visually unobtrusive; ideally it should be ‘invisible’ to the public. Security screening must not present any barrier or ‘bottleneck’ that restricts the free flow of people in public areas. It must be compact and mobile, discreet, or covert, and capable of screening people at a distance as they move.

The nature of the threat from concealed person borne explosives and weapons is evolving and unpredictable

SUMMARY OF TODAY’S REQUIREMENTS FOR PEOPLE SCREENING Next generation screening solutions must fulfil the following six requirements. 1. To screen people in real time as they move, and not introduce ’security bottlenecks’ that impedes the free flow of people. 2. Be compact and portable for diverse and flexible deployments including covert, rapid mobile deployment or wall/ceiling mounting in much the same way as CCTV cameras. 3. Be passive (safe) and not violate the privacy of the individual. Nothing should be emitted by the screening equipment, anatomical details should not be revealed during the screening process. 4. Screen people at a distance, this is known as ‘stand-off’ screening. 5. Screen for a wide range of concealed objects; nonmetal, liquid, metal. 6. Integrate with wider video management systems, facial recognition software etc.

www.worldsecurity-index.com

World Security Report - 19


PUBLIC SECURITY

ACTIVE AND PASSIVE SCREENING It is important to understand the distinction between active and passive screening solutions. There is much confusion in the definition of people screening technologies in the media and the internet. This is compounded by widespread incorrect labelling of X ray, active millimetre wave and passive terahertz screening solutions on the internet and even in the security trade press. Passive screening solutions emit ZERO energy; they are intrinsically safe. The nearest analogy is the passive infra-red sensor widely used to trigger flood lights, burglar alarms etc. THE DEVELOPMENT OF PASSIVE STAND-OFF SCREENING SOLUTIONS Passive technologies that screen people at a distance (stand-off) and in real time have been developed over the past few years. These

are the most operationally viable solutions to address the six requirements described above. Two passive technologies have emerged: millimetre wave and terahertz. Both operate as receivers only. Camera units collect low energy millimetre or terahertz waves naturally produced by all objects and people. Nothing is emitted by the camera units during the screening process. UNIQUE SECURITY ADVANTAGES OF PASSIVE TERAHERTZ SCREENING SOLUTIONS Differences between millimetre and terahertz waves are mostly academic and unimportant from an operational security perspective. Terahertz waves are of shorter wavelength than millimetre waves. The important operational security advantage of this is that terahertz screening systems are much smaller and lighter than passive

millimetre wave equipment; they are therefore portable and suitable for covert deployment. An additional property of terahertz waves is very advantageous for operational security use. Glass windows are opaque to terahertz waves but transparent to millimetre waves. Passive terahertz security screening systems are easily deployed in areas of large plate glass windows etc. without changing the local environment. Mobile passive terahertz screening solutions are set up and operational in minutes in different locations, they have been widely deployed in areas with large plate glass windows – a common feature of large public places. Conversely, passive millimetre wave systems cannot be operated in locations with windows or sky lights without re-tuning to suit the changing environment; they are influenced by ambient millimetre wave levels due to prevailing weather conditions, cloud cover etc. REQUIREMENTS – AIRPORT ENTRANCES Let us return to the example of the airport. Passive stand-off screening offers airport security operators the ability to discreetly or covertly screen all individuals in real time as they pass through the perimeter entrances at the airport concourse. Most importantly the real time screening ability enables threat detection and isolation at the first opportunity at the perimeter without simply pushing the build-up of queues from the landside/ airside checkpoint to the perimeter entrances of the airport concourse. This is very different to the 1st generation static ‘body scanning’ scenario that many people immediately think of at the landside/airside security checkpoint.

20 - World Security Report

www.worldsecurity-index.com


PUBLIC SECURITY

DYNAMIC FLEXIBILE SECURITY RESPONSE AS CIRCUMSTANCES DICTATE The ability to deploy covert compact mobile units offers security operators of airports and other public places a dynamic flexible security screening response that may be implemented or scaled up/down as prevailing circumstances dictate. Most importantly the public are screened using these ‘invisible’ solutions without the introduction of security ‘bottle necks’. REQUIREMENTS – RETAIL MALLS The same lessons apply to the entrances to high profile luxury retail malls. Typically these have many entrances, ranging from the large visually attractive main pedestrian entrances to escalator or lift entrances from car parks, or public transport networks. Our retail locations, cultural and sports stadia must remain open and welcoming to the public. No security screening technology can be visually intimidating to the public. Flexibility of installation is therefore a critical requirement. The real-time covert stand-off screening ability of passive terahertz screening systems has found use in the entrances of shopping malls. Terahertz waves pass through many common materials that are visually opaque; passive terahertz systems have therefore been covertly deployed in shopping malls behind plastic panels and similar materials. The stand-off imaging ability has enabled them to be deployed either as floor, wall or ceiling mounted units in diverse public screening scenarios. Images are displayed in real time to remote security control operators over standard Ethernet Local Area Networks, or wirelessly. Other entrances to retail malls from car parks or public transport through escalators or lifts form natural ‘pinch points’ that can be used to guide people within the field of view of passive screening systems, these may be overt or discreet ceiling, floor or wall mounted units, or fully covert units concealed within wall cavities behind plastic panels etc.

ENTRANCE SCREENING – CULTURAL, POLITICAL OR SPORTING EVENTS Entrances to cultural sites or sporting events are typically characterised by defined entry points; turnstiles or ticket entry points. These are natural ‘hesitation points’. People have been screened by pairs of passive terahertz units simultaneously screening the front and rear of people as they pass through these entry points. MOBILE DEPLOYMENTS Many cultural or VIP events are temporary. This necessitates the deployment of compact mobile screening points. Passive terahertz technology is intrinsically low power. Mobile screening units with integral battery power have been deployed for mobile use in various locations for this use. Mobile units have, for example also found use for random screening of airport support staff and contractors with airside access.

ENTRANCE SCREENING –VIP AND SECURE SITES This covers a gamut of scenarios: entrances to secure government buildings, critical infrastructure sites, corporate headquarters, VIP residence or international summit meetings, etc. In most circumstances this is normally a compliant subject search situation, by this we mean that the person knows that they are being screened. . Passive screening technology is typically deployed in conjunction with existing or legacy security equipment, such as X-ray baggage screening units, or walk through metal detector gates. In these cases the passive screening of people complements existing security infrastructure and protocols. Employees or visitors may be asked to divest objects from pockets, etc. (airport style security), and bags are passed through X-ray equipment. The incorporation of passive screening of people clearly,

EVENT SECURITY SCREENING Passive terahertz stand-off screening has been deployed by police and security staff to screen 100% of the attendees of major international summit meetings. In all cases all attendees were screened without impacting flow rates. Important operational lessons for public security can be drawn from these deployments as they are directly applicable to public place screening, entrances to airports, retail areas, cultural events etc.

www.worldsecurity-index.com

World Security Report - 21


PUBLIC SECURITY

adds additional security through the detection of undivested non-metal objects. For highest security detection efficiency, with a single passive screening unit, the subject may be asked to make four quarter turns, pausing briefly at each turn. Alternatively, if protocols or throughput requirements do not permit this, pairs of units are used to simultaneously screen people as they pass through the entry/exit check point. In this scenario, the units are frequently positioned either side of existing walk through metal detectors. Passive terahertz technology is deployed in this manner around the world for visitor and employee’s entrance/exit screening at government departments. Pairs of units at each entrance have, for example, been used to screen all staff attending international summit meetings. VIP WALK THROUGH SCREENING Diplomatic protocol can prevent the overt screening of visitors in VIP locations. In this circumstance the person cannot be asked to divest, or stand stationary for a moment. In these scenarios, two or four units are strategically positioned to screen VIP delegations as they pass through the entrance area. Covert or discreet deployment is usually the case here. At one international summit meeting, passive terahertz screening units were

discreetly deployed in flower displays. CUSTOMS BORDER CONTROL Public security professionals may draw on operational lessons learned from the use of passive stand-off terahertz screening in daily use by customs agencies to detect concealed contraband (narcotics, cash etc.) at airports and other border checkpoints. In all cases the use of passive terahertz stand-off screening technology has been operationally ‘invisible’ to the travelling public and has complemented existing border check protocols. Deployments are mobile and covert with no impact on the flow rates of the people being screened. Discreet mobile units have been deployed for spot inspections for inbound or outbound travellers and airport workers with airside access. Single fixed units have been deployed at border locations around the world, screening inbound travellers as they queue in immigration halls.

22 - World Security Report

LOSS PREVENTION Away from ‘classic’ security applications, the deployment of passive screening technologies have demonstrated significant reduction of employee theft (‘shrink’ reduction) from distribution centres or manufacturing sites. This has shown high return on investment though employee theft deterrence. The ability to screen for concealed non-metal objects in addition to metal items has had particular resonance with manufacturers and retail distribution centres stocking items for which there is a ready ‘black market’ such as health and beauty products (perfumes and pharmaceutical products, DVDs etc. CONCLUDING REMARKS – FUTURE DEVELOPMENTS As the nature of the threat continues to evolve, passive screening technology continues to advance at a pace. Integration of passive people screening technologies and existing video management systems with face detection and other behavioural analytics offers one of the greatest operational security benefits in the shorter term Enhancement of automatic threat detection software, or ‘operator assist’ functions are areas of further active development. Moreover the implementation of adaptive scanning algorithms to isolate the individuals with specific threat profiles from the crowd will address further urgent operational needs for public screening applications. ABOUT THE AUTHOR Jonathan James was founding CEO of ThruVision Ltd. – the UK passive security screening company, now part of Digital Barriers. He is responsible for ThruVision Business Development within Digital Barriers. Jonathan has been active in the field of passive security screening since 2002.

www.worldsecurity-index.com


PUBLIC SECURITY

www.cip-association.org

Join the Community and help make a difference Dear CIP professional I would like to invite you as an infrastructure operator or related government agency representative to join the International Association of Critical Infrastructure Protection Professionals a newly formed body that seeks to encourage the exchange of information and promote collaborative working internationally. As an Association we aim to deliver discussion and innovation – on many of the serious Infrastructure - Protection - Management and Security Issue challenges - facing both Industry and Governments. The ever changing and evolving nature of threats, whether natural through climate change or man made through terrorism activities, either physical or cyber, means there is a continual need to review and update policies, practices and technologies to meet these growing and changing demands. Our initial overall objectives are: • To develop a wider understanding of the challenges facing both industry and governments • To facilitate the exchange of appropriate infrastructure & information related information and to maximise networking opportunities • To promote good practice and innovation • To facilitate access to experts within the fields of both Infrastructure and Information protection and resilience • To create a centre of excellence, promoting close co-operation with key international partners • To extend our reach globally to develop wider membership that reflects the needs of all member countries and organisations For further details and to join, visit www.cip-association.org and be amongst the first to shape the future of this increasingly critical sector of national security. We look forward to welcoming you.

John Donlon QPM, FSI Chairman IACIPP


TELECOMS SECURITY

Reasons for caution – why critical infrastructure should care about its reliance on GPS

GPS provides precise positioning and timing information to a wide variety of critical infrastructure. Electricity grids, Digital broadcasters, Telecommunications Networks, Financial institutions, Emergency services and transportation systems worldwide all rely on GPS to provide the information that they need to operate their services safely and efficiently.

GPS precise time is often used for network and phase synchronization in wireless networks, phase synchronization in power grids, precise frequency generation in wireless networks, process scheduling, control and synchronization in energy or critical manufacturing sectors and the precise time stamping of data which is critical to the financial sector.

GPS itself could also be considered as being critical infrastructure; such is the wide range of safety critical applications that depend on the data it provides. Whilst it is obvious that positioning information is used by some critical infrastructure (e.g. Transportation, Emergency Services) it is often less obvious which critical infrastructure segments are dependent on GPS precise time.

At the December 2014 meeting of the US PNT Advisory Board, it was highlighted that 14 of the existing designated critical infrastructures in the US use GPS in some capacity, often for the provision of precise timing information.

24 - World Security Report

GPS has proved itself to be an extremely reliable and

www.worldsecurity-index.com


TELECOMS SECURITY

accurate service with high availability worldwide – but it does have vulnerabilities too – these range from Segment errors to GPS-specific vulnerabilities which are a consequence of the very low received signal power of GPS – these specific vulnerabilities include RF Interference, atmospheric effects and spoofing (where a faked signal is used in an attempt to deceive the target receiver). RF Interference It has become extremely easy to procure jamming devices that are capable of generating disruptive interference. Many websites offer a range of low powered ‘Personal Privacy Devices’ (PPDs) that plug into a vehicle’s cigarette lighter socket and produce radiation that will jam GPS signals – some devices will also jam mobile phone signals as well the GPS signals. To date, GPS jamming has mainly been used by company vehicle drivers to mask unsanctioned use of the vehicle, such as making unscheduled trips, or using the vehicle for personal reasons. But criminals have increasingly got in on the act too – GPS jammers are now often used in the theft of luxury cars and the hi-jacking of valuable freight consignments. Real examples of GPS jamming • On 19 Jan 2016, the United States Coastguard issued a Marine Safety Alert to GPS users– in the alert an incident at a Non-US port is referred to during which outbound

vessels are reported to have experienced sudden losses of GPS signal reception. The Bulletin states “The net effect was various alarms and a loss of GPS input to the ship’s surface search radar, gyro units and Electronic Chart Display & Information System (ECDIS), resulting in no GPS data for position fixing, radar over ground speed inputs, gyro speed input and loss of collision avoidance capabilities on the radar display.” • San Diego – 2007..US Navy accidentally jammed GPS signals during an exercise According to the New Scientist Magazine, https:// www.newscientist.com/ article/dn20202-gps-chaoshow-a-30-box-can-jamyour-life “It was just after midday in

San Diego, California, when the disruption started. In the tower at the airport, air-traffic controllers peered at their monitors only to find that their system for tracking incoming planes was malfunctioning. At the Naval Medical Center, emergency pagers used for summoning doctors stopped working. Chaos threatened in the busy harbour, too, after the traffic-management system used for guiding boats failed. On the streets, people reaching for their cellphones found they had no signal and bank customers trying to withdraw cash from local ATMs were refused”. There is some doubt about the extent of the outages and disruptions that were actually experienced and whilst it is true that the US Navy did accidentally jam GPS signals it is difficult to be certain as to the extent of the disruption that was actually experienced by the end users. • From May 2015, Spirent installed a GPS L1 interference detector on the roof of its offices in Paignton, Devon – an unlikely location for encountering RF interference. In fact since May 2015, several hundred interference events have been detected and characterized – ranging from unintended interference from switching equipment to deliberate

www.worldsecurity-index.com

World Security Report - 25


TELECOMS SECURITY

jamming, probably from a delivery vehicle. The same detection system was used to monitor an electricity grid installation – during the monitoring period a total of 22 events were detected from 15 different jammer types - some of which had the potential to cause problems to a GPS receiver These real events show that GPS jamming events have become quite widespread and Critical Infrastructure operators and owners who depend on GPS need to be aware of the potential impact on their operations. GPS Spoofing While GPS jamming is already a widespread phenomenon today, GPS spoofing is emerging as another threat. GPS spoofing involves a person or group broadcasting “fake” satellite signals to a GPS receiver to fool it into generating a false position and potentially following a false route.

super-yacht in the Ionian Sea in 2013 ), it has often been regarded as being very difficult to conduct and requiring a high degree of expertise and GNSS knowledge. • In August 2015, Huang and Yang from the Unicorn Team, Radio and Hardware Security Research presented a low cost GPS spoofing emulator at DefCon 23 in Las Vegas. Remarkably, they had no expertise in GNSS but found it easy to construct a low-cost signal emulator using Commercial off the Shelf Software Defined Radio and RF transmission equipment. The code needed for a GPS transmitter was freely available on the internet. They were able to spoof a car’s built in GPS Receiver in an underground car park, to spoof the date, time and location on two well-known

brands of smart phone and to spoof a drone so that it would fly in a restricted area. Whilst the spoofing attack was relatively crude, none of the target devices were able to detect the attack or generate any warnings to the user. • More recently, the Department of Homeland Security revealed that Drug Traffickers are spoofing border drones as well as using GPS jamming equipment. http://www.defenseone.com/technology/2015/12/DHSDrug-Traffickers-Spoofing-Border-Drones/124613/ This is the very first time that evidence of real GPS spoofing attacks has been presented and serves to demonstrate that spoofing has become a real attack vector. GPS Segment Errors Occasionally GPS segment errors can cause problems to users. • On 26th January 2016, a bug in the GPS ground software led to the wrong UTC correction value being broadcast. According to the USAF, this bug started to cause problems when satellite SVN23 was withdrawn from service. A number of GPS satellites, while declaring themselves “healthy”, broadcast a wrong UTC correction parameter. Whilst the withdrawal of the satellite from the constellation was conducted without problem, unfortunately the withdrawal triggered the software problem. Amongst those reporting impacts were digital broadcasters including the BBC in the UK.

While GPS spoofing is in its infancy compared with jamming, the wider use of time and location spoofing for malicious or misguided purposes is already common. Whilst spoofing has been referred to as a potential threat to GNSS and has been demonstrated several times in controlled environments (e.g., Todd Humphreys’ spoofing of a

26 - World Security Report

www.worldsecurity-index.com


TELECOMS SECURITY

Solar Weather Last but by no means least are the effects of solar weather on GNSS signals. Whilst the effects caused by GPS scintillation are well known and are encountered on a daily basis by users situated in equatorial areas, other solar weather effects are less well understood and are encountered much less frequently. The sun is capable of generating radio Bursts, Solar Energetic Particles and Geomagnetic Storms in addition to scintillation effects. In June 2015 a solar weather event in the UK (a mid-level solar flare) is known to have caused disruptions to several users of GPS – including at least one critical infrastructure

operator who experienced problems across installations spread across the UK. Risk evaluation and Mitigation GPS / GNSS has unique advantages and will remain as a key component for position, navigation and timing for the foreseeable future. However GPS signals can be vulnerable and operators and owners of Critical Infrastructure need to conduct a thorough risk assessment to consider the following factors to help put mitigation in place:• The importance of accurate GPS location and/or timing information to the overall functioning of the system

www.worldsecurity-index.com

• The extent to which users rely on accurate and/or continuous GPS signal data • The likelihood of the system being adversely affected by one or more identified GPS threats • An understanding of the most likely behaviour of the system when stressed by relevant threats and the impact of this behaviour on

the end-user applications • The risk and impact to the business, its customers, its end-users and other parties if one or more threats impair the proper functioning of the system

frequently include GPS/ GNSS as a key component. GPS itself has a strong case to be designated as a critical infrastructure. Significant improvements in resilience can be achieved through relatively simple mitigation techniques such as multi-constellation, multi-frequency improved antenna placement or performance. Full

protection, for safety or critical infrastructure systems, warrants a more thorough systematic approach as well as ongoing re-evaluation as threats continue to evolve. By Guy Buesnel, CPhys, FRIN

The majority of designated critical infrastructures rely on GPS to some extent – mostly for precise time, some for time and position. Safety critical systems also

World Security Report - 27


AVIATION SECURITY

Aviation Cyber Security: Challenges and frontiers of growth Cyber security in the commercial aviation space is susceptible to challenges that are specific and manifold driven by the need for greater devices that are connected to provide seamless passenger services as well as the emergence of connected planes. This article further explores the complexities that are brought to the fore by these major developments

Cyberspace is vulnerable to several risks involving cyber threats and its hazards, and has, in the past decade, intensified in complexity and technical sophistication. There are many forms of cyber-attack, from malware injection and phishing to social engineering, DDoS, and brute-force attack. These have intensified over the past 2-3 years, and are also being carried out in a stealth mode, often with inert code inserted that may hive off data and wait for a window of opportunity to emerge. While players in the cyber security have been trying to evolve detection and protection mechanisms, staying one step ahead of potential threats has increasingly become a challenge. This is acerbated by the fact that more and more data is now being deployed in the cloud and that more devices are now interconnected. According to a McAfee survey, the recovery cost after a cybercrime is more than the damage cost incurred during a cyber-attack and aviation firms are hugely vulnerable and cannot risk a stray incident since the

28 - World Security Report

implications can be more severe. The aviation industry has made use of digital technology for executing varied aviation processes over the past few years. Digitization of aviation activities makes these processes vital to high security risks. Cyberattacks are on the rise due to the increasing use of internet and growing social media users, which invite new threat vulnerabilities. Also, the recent evolution of Internet of Things (IoT) has brought on several security challenges, such as Point of Sale threat, and threats to sensors, gateways, and end devices. These threats can cause a devastating

impact to smart grid and smart transportation, where a single cyber-attack can cause significant loss of life, apart from financial loss. Consider the following instances: • In 2015, the LOT Polish Airlines’ ground computer systems were attacked by hackers, which led to the cancellation of 10 flights and delay in others. Due to this, around 1,400 passengers were grounded at the Warsaw Chopin Airport. • Earlier, in 2014, a Malaysian flight disappeared and investigations suggest that the missing Malaysian Airline could have been

www.worldsecurity-index.com


AVIATION SECURITY

hijacked using a smart phone.

have also increased.

Airport passenger traffic has seen a major growth over the past few years, increasing from 1.89 billion in 2003 to 3.13 billion in 2013, and is expected to maintain a steady momentum, given the weakness in oil prices. This will further burden airports to become more efficient and lead them to implement systems that are technologically sound and are make airports ‘Smart and Intelligent’. This has already sparked an evolution and led airports to implement connected networks that make it easy for passengers and cargo to get where they need to be. Such connectivity offers passengers a new and helpful experience, from pre-flight to post-flight and a seamless integration of information from various processes — from pre-arrival, to check-in, to security, to flight information displays, to baggage, to boarding and even post departure — to streamline airport operations. Near field communication technology is also being explored and offers great promise as it will enable passengers to perform transactions at airports with the help of mobile devices. For instance, in France, Orange Cyberdefense has set a target to introduce NFC-enabled smartphones in the market. Since the aviation industry has begun relying extensively on IT and computer systems for its ground and in-flight operations, these pose unique challenges for aviation firms and airports alike, and the security of these systems can impact the operational safety of the aviation industry as a whole.

Inspection needs to be done from both airworthiness and security perspectives in order to avoid cybercrime issues. To better detect cyber threats, a highly automated and scalable approach to cyber security solutions is the need of the hour. Investments in cyber security, especially by aerospace and defense firms are projected to increase considerably and at a faster rate compared to other industries, due to the high dependence of these industries on IT to accomplish their operations, the exposure to external systems, and to alleviate the potential for a mass threat to life. The need to protect networks from cyber-threats has also led players in this space to adopt multiple security solutions, which has further increased the complexity of IT infrastructure. To alleviate the effects of complex infrastructure, companies are also opting for converged security solutions, such as unified threat management and next-generation firewalls. Apart from these, there has been a steep rise in the demand for big data analytics tools in the cyber security market. The amalgamation of big data analytics and security solutions becomes imperative in managing

threats and strengthening cyber defense related capabilities. The application of big data in cyber security is also driven by increasing government regulations to develop better data protection and security solutions.

Cloud-based security solutions are also being increasingly deployed as they provide numerous benefits over the traditional premise-based models for cyber security. These are less expensive, more efficient, and provide a higher level of security. They also centralize firewall policies and security rules, and thus facilitate an easier management of cloud-based data, with absolute protection of multiple devices across different networks. The above mentioned factors are expected to contribute significantly to the demand for enhanced cybersecurity and subsequent innovation in related applications owing to the rise in cyber threats.

Source: MarketsandMarkets A detailed report on the Global Aerospace and Defense Cyber Security Market can be found at the link mentioned below: http://www.marketsandmarkets. com/PressReleases/cyber-security. asp

IoT and digitization of operations in the aerospace and defense sectors have made the industry highly dependent on IT and with the evolution of e-enabled aircraft, such as Boeing 787, Airbus 380, and A350, the risk of cyber-attacks

www.worldsecurity-index.com

World Security Report - 29


BORDER SECURITY

REPORT

VOLUME 2 MARCH/APRIL 2016

For the world’s border protection, management and security industry policy-makers and practitioners

COVER STORY

IMPACT OF EU DRUGS MARKET ON SOCIETY

T R A IN ING AGENCY NEWS S H O RT RE P O RT I N D U S T RY N E W S

Keeping pace with the growth of international drug trafficking p.16

A global review of the latest news and challenges from border agencies and agencies at the border. p.9

A New Report Highlights Wide-Ranging Impact of EU Drug Markets on Society p.22

Latest news, views and innovations from the industry. p.22


2

COMMENT

Frontex Report says Europe more vulnerable to militant attacks EU member states reported a record 1.82 million illegal border crossings last year, a surge that made Europe more vulnerable to militant attacks, according to a report from the EU border agency Frontex. Combine the unregistered migrants with returning radicalised EU citizens and what it adds up to is a security nightmare for Europe, probably for a generation or two. Clearly, the vast majority of the migrants are just that, but it was always inconceivable that amongst the huge numbers migrants that there are not radical jihadi’s just waiting their chance to do us harm. Even when migrants are checked and registered it doesn’t mean that they are not a terrorist threat. Indeed, “two of those involved in the Nov. 13 Paris attacks had entered through the Greek island of Leros and had been registered by the Greek authorities after presenting fraudulent Syrian documents”, the report said. It went on to say “The Paris attacks in November 2015 clearly demonstrated that irregular migratory flows could be used by terrorists to enter the EU.” Once migrants are inside EU borders, the potential terrorists amongst them have nothing to stop them moving anywhere within the Schengen area, unless of course nation states re-instate border checks, as we have seen in various countries. The very idea that some of the poorest countries in Europe should have been left to deal with the “Worst migration crisis since World War II” was always been deeply floored, especially Greece. Which, it must be said, struggled on manfully and with great compassion despite its own financial difficulties.

Border Security Report | April 2016

Frontex, which when conceived, was never designed to deal with a crisis, especially one of this magnitude, remains under funded and under resourced for task it faces. We are now seeing fences going up and EU border resources being mustered, but is it, as some people would have us believe, too little too late? Well of course it will be too late to stop some terrorists who have already made it inside EU borders, they are now a law enforcement and security services problem. But is it too little? The crisis and the flow of migrants has not ceased and if we just catch just one terrorist trying to enter the EU amongst the migrants, that could save many lives. You hear much talk about this being “Worst migration crisis since World War II” but the resources allocated to it don’t reflect this. The reason Europe coped with the migration crisis at the end of WWII was that massive resources were available in terms of European and US military personnel and equipment already on hand to deal with it. If we are to deal with this crisis, we need to recognise it as such and all European nations need to mobilise the level of resources necessary to deal with it. Clearly border services across Europe are already stretched to the limit, so whether it’s getting military engineers to help build holding/processing centres, accommodation and hospitals, provide maritime and border patrols or drafting in private companies to take on some of the tasks, we need the resources to match the crisis, not try to make the crisis match the resources. Because if we don’t, the problem facing us already will only get bigger and last longer. Tony Kingham Editor


CONTENTS

3

CONTENTS 4 impact of eu drugs market on society The 2016 EU Drug Markets Report, published by the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) and Europol, estimates that Europeans spend at least €24 billion on illicit drugs each year,

6 frontex risk analysis report A special report on the conclusions from the latest Frontex Risk Analysis Report. »»p.6

9 AGENCY NEWS A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border.

18 TRAINING Border Force is a world leader in the field of drug detection, keeping pace with the growth of international drug trafficking and increasingly sophisticated smuggling techniques.

20 twenty years of diving Coast Guard »»p.20

»»p.4

Since 1995, when in San Benedetto del Tronto was established the first nucleus Sub Coast Guard, divers Corps have worked in different contexts.

22 industry news Latest news, views and innovations from the industry.

»»p.18

Border Security Report | April 2016


4

SHORT REPORT

impact of eu drugs market on society    short REPORT                                    A New Report Highlights of the EU illicit drug market, Wide-Ranging Impact of EU covering the trends along the Drug Markets on Society supply chain from production and trafficking to marketing, The 2016 EU Drug Markets distribution and consumption. It Report, published by the also analyses the considerable European Monitoring Centre costs of these markets for for Drugs and Drug Addiction society including their impact (EMCDDA) and Europol, on businesses, government estimates that Europeans institutions, neighbourhoods, spend at least €24 billion on illicit families, individuals and the drugs each year, making it one environment. of the main profit-generating activities for organised criminals Presenting the report’s A c c e s s t h e R e p o r t a n d in Europe. The report provides findings Dimitris Avramopoulos, S t r a t e g i c O v e r v i e w ( w i t h a state-of-the-art analysis European Commissioner for Migration, Home Affairs and Executive Summary) webpage Citizenship said: “Today’s drug EMCDDA | Europol: business criminals are quick to http://www.emcdda.europa.eu/ exploit and harm global flows start/2016/drug-markets of transport, goods and people, while posing a threat to public health. They use new technology and the internet, the growth of global trade and commercial infrastructure to perform their criminal activities rapidly across international borders. In addition, the instability in regions

Border Security Report | April 2016


SHORT REPORT

neighbouring the EU could have potentially profound effects on the drug market in Europe. This valuable report explores the links to other criminal activities and how the illicit income from the drug trade can fund migrant smuggling and terrorism, and undermine international development efforts. “ Alexis Goosdeel, EMCDDA Director, added “The EU drug market is driven by two simple motives: profit and power. Understanding this, and the wider impacts of drug markets on society, is critical if we are to reduce drug-related harm. This knowledge is essential for the development of new strategies for tackling crime and safeguarding the health, security and prosperity of our citizens”. Rob Wainwright, Europol Director, said “Illicit drug production and trafficking remains one of the largest and most innovative criminal markets in Europe. As it grows more complex and becomes entwined with other forms of crime, and even terrorism, it represents a key threat to the internal security of the EU. Concerted cross-border law enforcement cooperation

Rob Wainwright, Europol Director

is essential in reducing its scale and impact, and this can be achieved through the unique operational capabilities of Europol and other EU instruments.”

5

and geographical borders and harnessing specialist expertise.

- Accelerated rate of change in the drug market due to globalisation and technology: criminal groups are quick to The report — accompanied exploit opportunities provided by a Strategic Overview — by easier access to information, combines the EMCDDA’s drug the internet and the growth in monitoring and analytical skills international trade. with Europol’s operational intelligence on trends in - Geographical concentration organised crime. It describes of groups specialised in drug a market which is constantly related crimes: drug production evolving, adaptable and or trafficking are concentrated in opportunistic, posing a key specific geographical locations, challenge for policy-makers, within Europe and elsewhere; law-enforcement agencies and some are long established, while public health. new zones are also emerging (e.g. heroin trafficking through The report shows that, while the Southern Caucasus). traditional trafficking routes persist, diversification continues. The Report highlights how Routes appear to be less coordinated action at EU level commodity-specific than before, can make a difference in tackling whilst legitimate transport and the illicit drugs trade, and logistic infrastructures continue outlines a comprehensive range to be exploited, with maritime of recommendations and action containers representing a points in key areas to inform convenient channel for large future policies and initiatives. consignments of drugs to be The EU Drugs Strategy (2013– imported into Europe. Recent 20) and Action Plan (2013– developments in internet 16) provide a framework for markets including the dark addressing illicit drugs in the net, anonymising software and EU, complementing Member crypto-currencies also offer new States’ national strategies. opportunities for online drug The overarching objective is supply. a measurable reduction of the availability of illicit drugs through Three main themes emerge the disruption of trafficking, from the analysis in the Report: dismantling of Organised Crime Groups, efficient use -Increasing links between of the criminal justice system, drug trafficking and other forms effective intelligence-led law of crime: organised crime groups enforcement and increased involved in the drug market are intelligence sharing, and an diversifying across multiple EU-level emphasis on largedrugs, engaging in other forms scale, cross-border and of criminality including terrorism, organised drug-related crime. forming alliances across ethnic

Border Security Report | April 2016


6

SPECIAL REPORT

Conclusions from Latest Frontex Risk Analysis Report

standards. Given the threats visible at the external borders of the EU, it is evident that border management has an important security component. What useful function can be played by the border authorities in the area of counter-terrorism?

The EU external borders are confronted with three major challenges: an unprecedented rise in migratory pressure, an increasing terrorist threat and a steady rise

in the number of regular travellers. The challenge for border-control authorities is thus to become more effective and efficient whilst maintaining the necessary quality

Border Security Report | April 2016

The threat of terrorist activities and the methods of entry into the EU have been much discussed during the past year due to several incidents which occurred within the EU in 2014 and 2015. Delineating the tasks and potential tools of those working at the


SPECIAL REPORT

7

The European Commission and the High Representative adopted today a Joint Framework to counter hybrid threats and foster the resilience of the EU, its Member States and partner countries while increasing cooperation with NATO on countering these threats What are hybrid threats? - The concept of hybrid threats aims to capture the mixture of conventional and unconventional, military and non-military, overt and covert actions that can be used in a coordinated manner by state or non-state actors to achieve specific objectives while remaining below the threshold of formally declared warfare. They target critical vulnerabilities and seek to create ambiguity in order to hinder swift and effective decisionmaking. The range of measures applied as part of a hybrid campaign may be very wide: from cyberattacks on critical information systems, through the disruption of critical services, such as energy supplies or financial services, to undermining public trust in government institutions or exploiting social vulnerabilities. A first and crucial step on the road to achieving better protection against hybrid threats is to acquire proper situational awareness. This is why intelligence and information sharing becomes so important. In order to prevent and respond to hybrid threats effectively, it is paramount to enhance the resilience of societies and critical infrastructure. Given the nature of hybrid threats, it is essential to work across geographical borders and agency boundaries. Why are you proposing further actions to counter hybrid threats? - In recent years, the European Union’s security environment has changed dramatically. Many of the current challenges to peace, security and prosperity originate from instability in the EU’s immediate neighbourhood and from changing forms of threats. These have a direct impact on the EU’s internal and external security. They call for the Union to adapt and to mobilise its wide toolbox with the objective of ensuring enhanced protection of its citizens, core values and infrastructure. In his 2014 Political

Guidelines, the Commission President JeanClaude Juncker stressed the need “to work on a stronger Europe when it comes to security and defence” and to combine European and national instruments in a more effective way than in the past. In May 2015, the Foreign Affairs Council invited the High Representative to work with the Commission, the European Defence Agency and the Member States and present a Joint Framework with actionable proposals to help countering hybrid threats, underlining also the need to cooperate and coordinate with relevant partner organisations, including in particular NATO, as well as partner countries, as appropriate. This mandate was further reinforced by the June 2015 European Council. Responding to these requests, the Joint Framework aims to facilitate a holistic approach that will enable the EU, in coordination with Member States, to counter threats of a hybrid nature by creating synergies between different instruments and fostering close cooperation between all relevant actors. What can the EU do to counter hybrid threats? - Insofar as countering hybrid threats relates to national security and defence, the primary responsibility lies with Member States, as most national vulnerabilities are country-specific. However, many Member States face common threats that can be more effectively addressed at the EU level. The EU can be used as a platform to boost national efforts and, through its regulatory capacity, establish common benchmarks that can help raise the level of protection and resilience across the EU. That’s why the EU can play an important role in improving our collective situational awareness, in building Member States’ resilience to hybrid threats, and in preventing, responding to and recovering from crisis.

Border Security Report | April 2016


8

SPECIAL REPORT

borders to help combat this threat is an important discussion which should be undertaken. The corollary of the unprecedented number of arrivals was the strain placed on border-control authorities, which left them with fewer resources available for identifying those attempting to enter the EU. This then resulted in high numbers of entrants were not even attributed a nationality, let alone their identity thoroughly checked. The importance of this issue is twofold; firstly, granting international protection to those in need is a legal obligation. Hence, there is a strong need to ensure the correct and full identification of those arriving at the borders so as to provide the full necessary protection, where required. Secondly, the identification issue concerns the potential threat to internal security. With large numbers of arrivals remaining essentially unclassified for a variety of reasons, there is clearly a risk that persons representing a security threat maybe entering the EU. Second-line checks on arrivals are a crucial step in the identification process. They also provide an important source of information which can be further used for intelligence and risk analysis purposes.

improved availability of information is of critical importance. However, with greater information comes a greater challenge in utilising it effectively. This is especially the case in emergency situations when large amounts of information are available but time is scarce. It is in this context that data and situational information are sometimes not enough, but authorities will require the analysis and intelligence derived from them to make the fully informed decisions. The management of this knowledge process is critical. Regular passenger flows across the external border will also increase significantly in the coming years, in particular at the air border due to rising global mobility.

Improving intelligence and analytical capacities is thus also of great importance. The development of risk profiles of arrivals and training for border guards involved in these fields would also help to ensure greater identification. One improvement which has been evident in the preceding years is the increasing pool of sources of information and data from the external border. Information is key to situational monitoring and for analytical purposes and so the

Border Security Report | April 2016

Visa liberalisation processes and local border trafÂŹfic agreements are also placing increasing responsibility on border-control authorities. Increasingly, while movements across the external air borders are managed through a layered approach, where the border is divided into four tiers, the physical border is increasingly becoming a secondary layer for risk assessment, meaning that checking and screening start well before passengers cross border-control posts at airports. Border management will increasingly be risk-based, to ensure that interventions are focused on high-risk movements of people, while low-risk movements are facilitated smoothly.


AGENCY NEWS

9

Agency News and Updates B

K

elgium’s neighbours yrgyzstan, Uzbekistan tighten borders secucut number of troops in rity after Brussels explosions disputed border area

Belgium Interior Minister said French authorities have prevented 10,000 people from entering the country since the Kyrgyzstan and Uzbekistan November attacks in Paris that have cut the number of troops claimed 130 lives. they had previously deployed at a disputed section of their Belgium’s neighbours France, common border in the Chalasart Germany and the Netherlands area, the Kyrgyz Border Guard tightened border security today Service reported. after the attacks on Brussels airport and metro system that left “As a result of the negotiaat least 26 dead. tions between border guard service officials of Kyrgyzstan In France, where November and Uzbekistan on March 20 terror attacks were intricately the sides cut the number of linked to jihadist networks in troops at checkpoints set up on Belgium, an additional 1,600 Kerben-Ala-Buka road in the police were being deployed to Chalasart area”, the statement border crossings, airports, ports says. The sides have left only and train stations. eight soldiers each there.

T

unisia Reopens Libya Border

Tunisia has reopened its frontier with Libya, which was closed following the recent attack upon Ben Guerdane. The Ministry of the Interior confirmed that both the crossing at of Ras Jedir, on the Mediterranean coast, and Dhehiba were open for passage. Traffic was reported as sparse mid-morning today, consisting mostly of freight trucks.Curfew restrictions have also been eased within the region, despite the continued clashes between militants and security services.

Border Security Report | April 2016


10

U

AGENCY NEWS

S helps Georgia ensure border security

The United States is helping Georgia to better protect its state borders and reduce illegal drug importation into the country. The US Defense Threat Reduction Agency (DTRA) assisted Georgia’s Border Police to develop a K9 centre near Tbilisi International Airport in the outskirt of the capital city. Earlier Georgia’s Interior Minister Giorgi Mgebrishvili and US Ambassador to Georgia Ian Kelly officially launched construction of an administrative building at the new centre.

A

ustria defends controls at border with Italy

Austrian Chancellor Werner Faymann is defending his country’s decision to build border controls at the main crossing with Italy despite EU criticism. He says that it is “politically necessary and important to take the needed steps” at the Brenner crossing as long as the control of the EU’s outer borders is not guaranteed.

of safety near the western sea border with North Korea. A chief superintendent general will be responsible for safety around the tense areas along the Northern Limit Line. So far, safety over the region had been overseen by a senior superintendent general. The move is meant to strengthen maritime security near the critical demarcation line, the scene of several bloody skirmishes between the navies of South and North Korea in recent years.

He spoke amid expressions of concern about the construction from the European Commission. Commission spokeswoman Natasha Bertaud said that “if The officials believed this part- these plans should materialize, SF raids arms smugnership between the relevant then we would have to look at g l e r ’s h o u s e i n agencies of the two countries them very seriously.” Sriganganagar, recover AK-47 would help Georgia ensure its border security and meet inter- Crews started building barri- In a pre-dawn operation, Border national standards. ers, a registration hall and other Security Force (BSF) recovered facilities on the Austrian side of an AK-47 rifle along with a magThe Minister noted a new phase the crossing. The work is sched- azine from the property of a of the project would soon begin, uled to be finished by late May. noted arms and drug smuggler. in which the US will help Georgia develop infrastructure at the K9 In view of the vulnerability of centre. This will include installborder areas and heightened ing cages, monitoring systems abinet raises rank of smuggling activities in the recent and proper technical equippolice officer responsi- past, BSF IG B R Meghwal had ment for the US-trained detec- ble for safety near sea border issued guidelines to all sectors tion dogs. under the Rajasthan Frontier to S o u t h K o r e a ’s C a b i n e t strengthen the intelligence grid approved a bill to raise the rank so as to effectively check antiof the police officer in charge national activities.

B

C

Border Security Report | April 2016


AGENCY NEWS

G

erman border police since 29 February. Liberia was w o r k e d 2 . 7 m i l l i o n declared free of new transmishours in overtime sions of the virus in January.

11

following horrific terrorist attacks in Brussels that claimed the lives of 34 people.

F

inland and Russia Te m p o r a r i l y C l o s e Border to Migrants

German border police have racked up 2.7million hours in overtime last year while dealing with the refugee crisis. Part of the overtime stems from the decision in September 2015 to reinstate border checks at the Austrian frontier. Bavarian authorities also revealed that its police force had notched up over two million hours in overtime last year to cope with the influx of an estimate 1.2 million migrants. Bavaria was the hardest hit as most refugee came through the state.

E

bola deaths in Guinea prompt Liberia to close border

Liberia has closed its border with neighbouring Guinea where there have been at least four recent deaths from Ebola. The deaths have occurred

Prime Minister Malcolm Turnbull said security presence at Australian airports would be in full force over the Easter weekend despite immigration and border protection staff taking Finland and Russia agreed strike action. Tuesday to tighter restrictions at two Arctic border crossings as However, the Community and an increasing number of asylum Public Sector Union tweeted seekers try entering the E.U. on Wednesday morning that through the Nordic state. the strike would be suspended amid security concerns followOnly Finnish, Russian and ing two ISIS bombing attacks in Belarusian citizens and their Brussels on Tuesday morning. families will be allowed to cross at the Salla and Raja-Jooseppi The Prime Minister had called on entry points for 180 days. border force workers to cease strike action in the wake of the For refugees and migrants horrifying terrorist attacks. seeking asylum in the E.U., the 833-mile Arctic border offers an krainian customs detain alternative crossing as weather 19 people at a border warms and southern routes with Slovakia become increasingly restricted. About 1,000 asylum seekers Customs officials in the western entered Finland from Russia part of Ukraine have detained in the first two months of 2016 a record number of illegals. alone, more than the 700 total Authorities apprehended 19 in all of 2015. people who attempted to cross the country’s border with Slovakia. nions cancel Easter airport strikes after Among the detainees are citiBrussels terrorist attacks zens of Afghanistan, Somalia, Pakistan and even Ukraine. All Immigration and boarder pro- of the foreigners are currently in tection staff have cancelled a detention centre in a bordera strike at Australian airports town of Chop.

U

U

Border Security Report | April 2016


12

AGENCY NEWS

I

srael ups security level and ammunition were seized means and to curb cross-border along Egypt’s Sinai border from Fatehpur Border out Post terrorism in the region,” Rajnath (BOP). Singh told journalists while replying to a query on Maoists Deputy inspector general (DIG) getting arms through Myanmar BSF Sumer Singh said the BSF and Bangladesh. sentry observed two Indian nationals, who were working Meghalaya Chief Minister Mukul ahead of the Border Security Sangma had earlier expressed Fence, throwing a packet over concern on the easy availability the fence towards the Indian of arms at “throwaway prices”, side. The BSF troops appre- resulting in the mushrooming Fearing an Islamic State spill- hended them immediately. of armed militant groups in the over, Israel has in recent During the search carried out state. months tightened security along by the BSF, three more packits border with Egypt after an IS ets of heroin along with a 9-mm India shares a 1,600-km affiliate group’s two-year cam- pistol, two pistol magazines and unfenced border with Myanmar paign which has claimed the 15 live cartridges were recov- and a 1,880-km border with lives of hundreds of Egyptian ered from the area ahead of the Bangladesh in the north-eastpolice and soldiers. Border Security Fence. ern states. Along the restive Egyptian border in the northern Sinai Peninsula, IDF soldiers are seen every day patrolling across the 6,000-square kilometer desert terrain, which has for years been a haven for heavily armed militants.

The DIG said thorough questioning will be done from the accused, who were allegedly paid Rs 20,000 to clear a packet of heroin. Both the accused belong to Dhugh village in Amritsar.

Israeli forces said the increased military presence along the Sinai border is in response to unprecedented attacks carried out by the IS-linked militant group since last year, as well as an intelligence assessment that an extremist attack on Israel is possible.

eed More Security Along Border In Northeast

B

N

The porous international border along the northeast has been used by the illegal weapons syndicate to smuggle arms and ammunition to northeastern militant groups. An intelligence official said many militants from Myanmar “maintain good relations with northeast groups and they are getting protection for procurement of arms and ammunition”.

A

ustria urges EU to send soldiers to Greece to police border

SF seizes 4-kg heroin in Amritsar

Two persons were arrested and 4-kg heroin along with arms

Union Home Minister Rajnath Singh on Monday said that there was a need to strengthen security along the international border in the northeastern region to curb smuggling of The European Union should arms. send a team of soldiers and civilians to help police Greece’s “We are trying to ensure border frontiers because the bloc’s security through all possible border agency Frontex is “too

Border Security Report | April 2016


AGENCY NEWS

B

order Police seize illegal weapon from Palestinian Arabs

slow”, Austria’s defense minister said on Monday. A spokesman later said the minister, Hans Peter Doskozil, was proposing a “bridging mission” that would register migrants in Greece or repatriate them until Frontex was fully up to strength and able to implement as planned a new deal between the EU and Turkey that aims to stem the flow of migrants to Europe. “In the past Frontex was responsible for securing the (EU’s external) borders but Frontex is too slow because of the way it operates,” Austrian Defense Minister Hans Peter Doskozil told a news conference during a two-day visit to neighboring Slovenia. “Therefore we suggest ... finding joint solutions in cooperation with ministries of foreign affairs and internal affairs,” he said, without elaborating. The EU has proposed a task force of some 4,000 staff under Frontex auspices that will include judges, interpreters and border guards to help Greece sift through thousands of asylum applications. Greece is sheltering around 43,000 refugees and migrants and more continue to arrive.

I

SIS Crossing Southern Border From Mexico? More Smugglers Sending Money Transfers To Middle East Arizona’s attorney general is raising the alarm about a potential connection between illegal immigration and Middle East terrorism.

13

Attorney General Mark Brnovich said, “We’ve seen a huge spike in money transfers coming from places like Nogales on the border, to Middle Eastern countries. Arizona is on the front line, and we have seen consequences of what has happened when we’ve had an unsecured, porous border. I mean, frankly, just six months ago there were six folks apprehended from Middle Eastern countries, from Pakistan and Afghanistan, at our border.” After waves of terror attacks in Europe and Africa in recent months, conservative lawmakers in the U.S. have increasingly warned about the threat of Islamic State group militants or other terrorists crossing the Mexico border. But immigration reform proponents have argued that making the dangerous border crossing into Arizona is an unlikely path for terrorists, and many of the Middle Eastern migrants who have crossed are more likely to be refugees fleeing war or looking to connect with family members already in the U.S. The Arizona Attorney General’s Office issued a report in early March that highlighted the growing money trail between the Middle East and Mexico. Officials launched the investigation in November after six Middle Eastern men were arrested south of Tucson for illegally crossing the border into Arizona.

Border Police officers recently seized an M16-type rifle during a counter-terror operation on Highway 55 near Qalqilya. During the operation, the officers identified a suspicious vehicle and decided to stop it. The officers blocked off the road but the driver of the vehicle tried to veer off the road in an attempt to escape. A short car chase ensued, following which the officers were able to arrest the two occupants of the vehicle, who were trying to flee on foot.

T

hai-Cambodia Border Meeting Focuses on Security A delegation of Cambodian officials will head to Thailand for three days this week for the 11th Cambodia-Thailand General Border Committee (GBC) meeting, which will focus on strengthening security and border development between both countries. According to an announcement from the Defense Ministry on Saturday, Defense Minister Tea Banh will lead the Cambodian delegation and will meet with Thai Deputy Prime Minister and Defense Minister Prawit Wongsuwon.

Border Security Report | April 2016


14

AGENCY NEWS

B

ulgaria land forces, DG Border Police hold joint training exercises close to Ilinden border crossing

(APF) of Nepal and Seema Suraksha Bal, Indian (border security force) will also coordinate with the other to curb human trafficking, smuggling of illegal drugs, prevent encroachment upon no man’s land and protect border pillars. The agreement was reached at a meeting of the security officials of Nepal and India organised by APF border security office at Bhimdattanagar in Kanchanpur on Friday.

counsellors directly in the rank of Head Constables. Till now, paramilitary forces either used to choose and train some of its regular combat personnel in counselling techniques or hired or invited experts from outside to talk to troops and boost their morale.

The about 80,000 personnelstrong ITBP is deployed in some of the most difficult locations in the hinterland and amidst the Member of Smolyan-based 28 harshest of weathers along the 330 military unit are holding APF Deputy superintendent of 3,488-km long icy India-China Thursday joint training exercises Police Tara Datta Panta said border. with DG Border Police employ- that they also reached an agreeees close to the Ilinden check- ment to exchange information point at the Bulgarian-Greek with the other security officials ross-border sting nets border, the press centre of the of Nepal and India to curb crimi4kg of drugs Ministry of Defence announced. nal activities along the border.

C

The drills are connected with border protection and joint patrolling. Over 40 members of the land forces and of the military police service are taking part in them with specialised equipment.

G

overnment hires stress counsellors in IndoTibetan Border Police

A

greement to control criminal activities along Nepal-Indo border

Government has decided to hire “stress counsellors” in paramilitary forces in order to curb instances of suicide and mental and behavioural disorders amongst troops working under acute pressure in some Security officials of both Nepal of the toughest combat zones and India have reached an of the country. agreement to coordinate to control criminal activities and wild- The Union Home Ministry life poaching along the border. recently gave its nod to IndoTibetan Border Police’s (ITBP) The agreement reads that offi- maiden proposal to recruit at cials of Armed Police Force least 44 ‘stress-cum-teaching’ Border Security Report | April 2016

A sting operation by Cambodian anti-drug police in Stung Treng netted more than 4 kilograms of drugs worth over $100,000, according to Interior Ministry official Yin Panharith. Cambodian police lured Lao national Kham Saiyavongsa across the border into Stung Treng’s Samaki district with a dummy drug deal following a tip from Lao border police. Saiyavongsa entered Cambodia in his Toyota pickup truck on a tourist visa. Meanwhile, two of his associates brought 2 kilograms of crystal meth and 2.1 kilograms of heroin through the porous forest border. An undercover Cambodian


AGENCY NEWS

police officer joined Saiyavongsa in the car and asked him to summon his two associates with the drugs. The police attempted to arrest all three during the drop off, but the two drug mules fled and remained at large.

P

proposal on the restructuring, including the rebranding of the current border operations from ‘Ops Wawasan’ and ‘Ops Merpati’ to ‘Ops Batas, would be handed over to the National Planning Movement Committe next month for a decision.

akistan to ensure He said 127.4km of the border security on Iran border from Pengkalan Kubor to Jeli was currently controlled by the Minister for States and Frontier Armed Forces, and as many Region Lt Gen (R) Abdul Qadir as 120 illegal bases had been Baloch has said that Pakistan detected along Sungai Golok. will ensure security of the bordering areas between Iran and He said the restructuring of Pakistan. border operations was among several proposals to be subHe said Pakistan could ensure mitted at the State Security desirable security for anything Committee meeting to curb all which had to travel on ground border-related issues such as between Iran and Pakistan. smuggling of drugs, weapons, Iran is capable of taking care of goods and human trafficking. problems at its end and “we are capable of handling the prob- Meanwhile, on the misuse of lems on our side”, he said. privately-owned vans for commercial use, like ferrying tourists Baloch said that major issue of into Malaysia illegally, Alias said Afghan refugees had also been the Road Transport Department discussed between Pakistan (RTD) had been authorised to and Iran during President check travel documents such Hassan Rouhani’s visit. “We as passport and border pass need to have a combined strat- of the van driver and issue egy to handle the situation of summonses. Afghan refugees and this might get discussed between the two He said if the van driver refused sides,” he added.. to cooperate or comply with the regulations, including refusing to pay the compound. RTD estructuring o f could propose to the immigraM a l a y s i a - T h a i l a n d tion department to blacklist the border security system driver from entering the country. proposed

R

The National Security Council (NSC) has proposed an overall restructure to streamline the security and access system at the Malaysia-Thailand border in Kelantan to reduce smuggling activities in the area.

15

S

urge in illegal border crossings adds to militant threat - EU reports

EU member states reported a record 1.82 million illegal border crossings last year, a surge that made Europe more vulneraIts secretary-general, Datuk ble to militant attacks, border Seri Alias Ahmad said the agency Frontex said.

The figure was six times more than the previous record in 2014. Syrian nationals accounted for the largest proportion of arrivals, although the share of Afghans rose significantly towards the end of the year and Iraqis were the third largest nationality using this route. Many of the illegal crossings were by people who were counted for the first time when they arrived on the Greek islands from Turkey and again when they crossed one of the EU’s external borders in the Western Balkans. In all, more than one million people migrated into Europe in 2015. The Eastern Mediterranean route, especially the Greek islands in the Aegean, accounted for the largest number of detections - nearly 885,400. Apart from the rise in migratory pressure, Frontex said the data underlined Europe faced an increased militant threat. It also pointed to the routes used for smuggling weapons, often traded from former conflict regions such as the Western Balkans, where about 800,000 weapons are estimated to be in illegal civilian possession in Bosnia and Herzegovina alone. [Source: Reuters]

Border Security Report | April 2016


16

AGENCY NEWS

Dimitris Avramopoulos added: “Terrorist attacks on our soil have shown the threat to our security, at the same time as we face a migratory crisis of unprecedented proportions. Information sharing is at the nexus of both. Our border guards, customs authorities, police officers and judicial authorities must have access to the necessary information and the right tools to tackle these issues rapidly, efficiently and effectively.” There are a number of information systems at EU level that provide border guards and police officers with information on persons crossing borders, but for institutional, legal and political ommission launches discussion on reasons the access for the relevant authorities future framework for stronger and and the data management architecture needs smarter information systems for border man- enhancing for facing today’s threats. The interopagement and internal security erability of information systems has been highlighted as a priority challenge by the European The European Commission has adopted today Agenda on Security, as well as by the European a Communication on Stronger and Smarter Council and the Justice and Home Affairs Council. Information Systems for Borders and Security, setting out options on how existing and future The work launched today will complement existing information systems could enhance both external proposals on the creation of a European Border border management and internal security in the and Coast Guard, the Passenger Name Record EU. Today’s Communication initiates a process Directive and the revised proposals for an Entryof structurally improving the EU’s data manage- Exit System tabled today. The Commission has ment architecture in full compliance with funda- decided to set up an Expert Group on IT Systems mental rights, in particular the protection of per- and Interoperability at senior level with EU agensonal data. The Communication sets out actions cies, national experts and institutional stakeholdto improve the functioning and interoperability of ers to start the process. Based on the work of existing information systems and potential new the Expert Group, the Commission will present systems to address information gaps. concrete ideas to the European Parliament and the Council as basis for a joint discussion on the First Vice-President Frans Timmermans said: way forward. “Border and law enforcement authorities in the EU must have appropriate access to all the exist- As part of this reflection process, the Commission ing databases when needed to help them do their will also seek the input of the European Data specific jobs. Better information sharing is a prior- Protection Supervisor and national data protecity of the European Agenda on Security and the tion authorities coming together in the Article recent attacks confirm our resolve. We will find 29 Working Party. Compliance with fundamena way to do this whilst ensuring that individuals’ tal rights will require well-designed and cordata is safe and that there is no infringement of rectly-used technology and information systheir right to privacy. This is about the intelligent, tems. Technology and information systems can proportionate and carefully regulated access all help public authorities to protect the fundamenour information border and security authorities tal rights of citizens. The Commission’s goal need to do their job - to protect us and the free- is the development of a strategy which better doms we defend.” protects its external borders and enhances its internal security in full respect of data protection Commissioner for Migration and Home Affairs requirements.

C

Border Security Report | April 2016


AGENCY NEWS

R

egional Workshop on Preventing the Flow of Foreign Terrorist Fighters (FTF) through Strengthened Immigration Security and Border Control, Kuala Lumpur, Malaysia

ASEANAPOL Secretariat was invited to attend the Regional Workshop on Preventing the Flow of Foreign Terrorist Fighters (FTF) Through Strengthened Immigration Security and Border Control on 15 – 16 March 2016 at Grand Millennium Hotel, Kuala Lumpur, Malaysia. Supt. Yuli Cahyanti, Director for Plans and Programmes and ASP Johnathan Putra, ASP for Plans and Programmes represented ASEANAPOL Secretariat in this two days workshop.

terrorist fighters travelling from Southeast Asia to the Middle East. In line with the objective, the invited participants were representatives from related law enforcement agencies which are possibly dealing with the flow of FTF especially immigration, custom, police, and foreign affairs from Indonesia, Malaysia, the Philippines and Thailand. This workshop was also attended by observers from United States Embassy in Malaysia, Indonesia, Philippines, Thailand, and Australia. This fruitful workshop is a good platform for international and regional collaboration in which the participants are the main player of the law enforcement community who can share information on new trends of FTF.

17

“By unanimously adopting the main legal texts of AFRIPOL, I’m convinced that with the support of the African Commission, which will work in consultation with the Algerian authorities, the interim secretariat, to be established by virtue of Article 21 of AFRIPOL statutes, will uphold all the decisions taken during the meeting to facilitate a quick launch of the mechanism, once the statutes adopted by the African Union conference,” the director general of Algerian police, Major General Abdelghani Hamel, said in a closing address. Algeria “will spare no effort to sign the statutes of AFRIPOL headquarters agreement, in line with Article 2, to confer to AFRIPOL headquarters and staff the required immunities and privileges.”

A

The headquarters of the frican police chiefs African Mechanism for Police adopt AFRIPOL legal Cooperation (AFRIPOL) was inaugurated in Algiers by the texts minister of the Interior and Local Authorities, Nouredine Bedoui, in the presence of police representatives of more than forty This workshop was jointly countries. organised by Southeast Asia Regional Centre for Counter The inauguration of AFRIPOL Terrorism (SEARCCT), Ministry headquarters, in Ben Aknoun, of Foreign Affairs Malaysia Algiers, was also attended by and Department of State and the AU Commissioner for Peace Department of Justice, United and Security Smail Chergui, Stated of America. One of the the secretary general of the aims is to enhance the knowl- The meeting of African police Arab interior Ministers council, edge and understanding of chiefs wrapped up Monday, in Mohamed Benali Komane, the the participants on the policy Algiers, with the unanimous head of the General Directorate and technical approaches adoption of the main legal texts of National Police, Major in strengthening immigra- relating to the launch of the General Abdelghani Hamel, tion security and border con- African Mechanism for Police and Algiers’ wali (governor), trols to halt the flow of foreign Cooperation (AFRIPOL). Abdelakader Zoukh.

Border Security Report | April 2016


18

TRAINING

national search of vehicles training Border Force is a world leader in the field of drug detection, keeping pace with the growth of international drug trafficking and increasingly sophisticated smuggling techniques. One of the main reasons behind this success has been the high quality of their training. Border Force has developed an extensive portfolio of practical, skill based,

anti-smuggling training. The award winning training is designed to ensure participants have the skills and knowledge necessary to effectively plan and carry out searches of vehicles, whether for commercial freight, containers or passengers. From February 2016 the training centre and vehicles moved

Border Security Report | April 2016

to a new specialist facility at Old Park Barracks, Dover. This allows for detailed and realistic practical training exercises to be conducted in a controlled environment, under constant supervision of experienced trainers. Training concentrates on developing the student’s practical skills but includes theory sessions to ensure they are able to build up a comprehensive understanding of vehicle construction and layout. Border Force currently offer a three day initial course for International delegates and a two day course for UK delegates. They can also design and deliver specialist bespoke courses. Courses are delivered by their team of highly experienced frontline operational officers from ports around the UK, using both


TRAINING

19

classroom and practical sessions. The team were recently awarded a Certification of Merit by the World Customs Organisation for their training programme. Since 2008 the team has delivered hundreds of courses to frontline Border Force officers, European customs, UK Law Enforcement, HMRC road fuel testing unit and Detection dog units (goods & people) across the EU. State of the art training centre Increasing demand for our training has led Border Force to open a new state of the art training facility in Dover. The centre includes classrooms, changing rooms, workshops and a covered training area. In addition to

freight training, Border Force can deliver search training for coaches, containers, cars and small vessels. A German Customs attaché who attended one of their courses stated that the training Border Force provided is unique within the EU and should be developed as a

‘European Centre of Excellence’ For training and technical advice or if you are interested in booking training contact the Border Force Search of Vehicle Training Team, Dover at SOVT@homeoffice.gsi. gov.uk..

The role of border delegates in focus of workshop at the OSCE Office in Tajikistan Twenty-five officials from border security and management agencies of Kyrgyzstan and Tajikistan today completed a week-long workshop at the OSCE Office in Tajikistan on the role of effective border delegates. The course organized by the Border Management Staff College and the Political-

Military Department of the OSCE Office in Tajikistan highlighted that border delegates of national agencies are officials who are assigned according to international agreements for maintaining effective border management, cross border co-operation and resolving border-related incidents. “The best border delegate practices of Belarus, Latvia, and the Russian Federation were demonstrated at the workshop which I believe will help further develop the mechanisms for borderrelated cooperation with the aim of jointly addressing

transnational threats in the region,” said Markus Muller, Head of the OSCE Office in Tajikistan. During the course, participants focused on analysing the existing types of delegated authority and international border delegate co-operation models, ways to identify problem-solving approaches, effective methods for the unilateral and bilateral investigations of incidents, organizing and conducting border representation meetings, as well as border representative apparatus along with its structure and responsibilities.

Border Security Report | April 2016


20

COAST GUARD

twenty years of diving Coast Guard    1995-2015                                     Safety of life at sea, but also protecting the environment and marine ecosystem and protection of fish resources and archeological findings. These summarize the main tasks that are called daily divers Coast Guard, which this year reached the milestone of twenty years. Since 1995, when in San Benedetto del Tronto was established the first nucleus Sub Coast Guard, divers Corps have worked in different contexts and delicate environments. Among the best known we remember the events of the Costa Concordia, with sub Coast Guard engaged in the difficult search of the castaways, monitoring pollution and the safety of the wreck, as well as relief activities for migrants in the Sicilian Channel. In the environmental field to

Border Security Report | April 2016


COAST GUARD

remember the extraordinary rescue of a herd of sperm whales entangled in August 2004 in a net about 50 miles abeam of Palinuro now about to die, most of the large cetaceans could recover thanks to the courage and determination of the sub Coast Guard. Professionalism and sense of duty that make diving excellence component of the Body, in the past committed abroad and in particular in the operation environment “Bahar� (sea in Arabic), on the Lebanese side of the Mediterranean. Here, in 2006, the Coast Guard divers contributed to the clean-up of a large marine area affected by an oil spill of fuel oil, estimated to be over 22,000 tons, poured out into the sea following the bombing of the power plant Jieh, south of Beirut . Among the main activities carried out by maritime police component underwater fall repression abuse state property and the fight against illegal fishing; particularly in Campania, where the core sub is committed to combating the problem of illegal networks and

21

that of the fishing of date mussels, which are a constant danger for the coastal environment. To this was added the supervision of protected marine areas and campaigns of archaeological research, often conducted alongside institutions and researchers and to support university projects: in 2008, off the coast of Messina, divers brought to light the rostrum of a ship Roman, which for its scientific value and the type of vessel to which it belonged, is one of the most important recent discoveries in historical maritime. Today the underwater component uses 5 operating units distributed throughout the country: San Benedetto del Tronto, Naples, Messina, Cagliari and Genoa, where he works specialists possess particular qualities psychophysical. On 7 D e c e m b e r, the representatives of the 5 sub nuclei of the Coast Guard, during training activities, met in the waters in front of Numana, in the jurisdiction of the Maritime Directorate of Ancona, to lay on the seabed a plaque to commemorate the twentieth anniversary.

Border Security Report | April 2016


22

I N D U S T RY N E W S

ADANI CONPASS DV chosen as the solution for the Danish Customs

ADANI the specialist security screening developer has been chosen to supply body scanning systems for the Danish Customs Service-SKAT. Following a competitive tendering process in autumn of 2015 ADANI working together with NORAD A/S, Denmark have been awarded a contract to supply 3 CONPASS DV Full Body Security Screening Systems to cover the needs of the Danish Customs Service.

Leonid Zelenkevich, International Sales and Marketing Director of ADANI Limited said “We have worked hard with the technical and commercial team at NORAD A/S to develop an offer that we are proud has been accepted by the Danish Customs service as it not only meets their technical requirements but can also be delivered and installed in a short timescale. This was an incredibly thorough procurement process with a number

of special requirements and conditions. ADANI CONPASS DV system once again demonstrated its superiority and scored highest marks for its image quality, technical performance and user friendless. We are extremely proud to have won this tender and the results once again demonstrate superiority of the CONPASS DV solution within the marketplace. The demand for more complete personnel screening systems is increasing in a number of key markets as a result of a mixture of events and the realization by the enforcement agencies that the technology exists to safely screen for a wide range of banned and dangerous items. The ADANI

Border Security Report | April 2016

CONPASS product line has demonstrated that its robust design, high performance and flexibility has proven popular with an increasing range of international customers. At ADANI, we have always been proud of the fact that we offer a flexible approach to meeting the customer’s needs. This has proven very successful in the recent past and by the end of the year, we are planning to further expand this with a

wider range of flexible personnel screening solutions.” Hardy Vinter, Senior Customs Adviser of NORAD A/S said, “The key to winning this contract is a combination of the knowledge NORAD has to the Danish end user operations, effective cooperation with ADANI during the tendering process and not at least a quality product that provides the best image quality in the market”

Smiths Detection Inc. wins $65 million, five-year agreement with Federal Protective Service

Smiths Detection Inc. has announced a $65 million five-year agreement to provide X-ray inspection systems to help protect U.S. Federal Government buildings across the country. Federal Protective Service (FPS), part of the Department of Homeland Security, chose SDI’s sophisticated X-ray systems and maintenance to help its agency detect potential threat items entering federal facilities. NORAD A/S, Denmark have been awarded a contract to supply 3 CONPASS DV Full Body Security Screening Systems to cover the needs of the Danish Customs Service. FPS is divided into 11 regions nationwide and is responsible for protecting more than 9,000 federal facilities around the U.S. SDI’sadvanced X-ray inspection systems will be used to screen employees’ and visitors’ personal bags and other belongings as well as packages and deliveries,

22


I N D U S T RY N E W S

before entering buildings. These new systems will be delivered and installed through 2021, and SDI’s service team will maintain the systems through 2026. This award is similar to SDI’s previous FPS national lease agreement in 2009. SDI produces a broad range of checkpoint screening solutions for mail, parcels, baggage, freight, and explosives detection. Around the globe, its X-ray inspection equipment plays a vital role in aviation security, customs inspections and in protecting national critical infrastructure. It is a longtime supplier to agencies across the U.S. government, such as TSA and CBP. SDI’s X-ray inspection systems offer the highest image quality in the industry, a vital factor in the search for explosives, weapons and contraband in baggage, mail and freight. Its lines include HI-SCAN, as well as Baggage & Freight.

23

Integrated Fixed Towers Obtains Border Patrol Chief’s Certification Paving the Way for Further Deployments

Elbit has announced that its Integrated Fixed Towers (IFT) border surveillance system was certified by the Chief of the U.S. Border Patrol to Congress as meeting its operational requirements. This decision is based on review of test results and agent feedback from the first deployment in Nogales, Arizona which confirmed the system adds significant surveillance capability at the border; thereby, increasing situation awareness and agent safety. As part of the 2014 Consolidated Appropriations Act, certification of the first IFT deployment was required in order to proceed with further deployments. .

With the certification now complete, the program can proceed with the deployment of IFT in the Douglas Area of Responsibility (AoR) which commenced in the first week of March. This also opens the door for further deployments based on future needs Robert Ledenko, Vice President of Security Systems and requirements across at SDI, said: “Federal Protective Service’s mission to the southern Arizona protect more than 9,000 government buildings is a border in line with CBP’s tremendous responsibility. Thanks to our longtime Arizona Technology working relationship, FPS knows SDI as a trusted Deployment Plan. partner and has confidence in our technology According to Acting and industry-leading service and support, which Chief of the U.S. Border ensures mission continuity. It is an honor to help Patrol Ronald Vitiello, protect these critical structures and the lives of the certification, based everyone who uses them by providing our state-of- on a review of “test results and agent feedback, confirms that the IFT system adds surveillance capability,

increasing situational awareness and officer safety.” The IFT provides Border Patrol Agents longrange, 360-degree, all-weather, persistent surveillance capability. The system provides agents a high degree of situation awareness along the border by assisting them in identifying and classifying

Border Security Report | April 2016


24

I N D U S T RY N E W S

“items of interest” and coordinating an appropriate response, while also contributing to agent safety. As the prime contractor, Elbit Systems of America integrates state-of-theart sensors with a robust and flexible command and control backbone, man-machine interface specifically adopted to the border patrol operational needs to ensure a high degree of reliability in the demanding desert

environment of the southwest border. The Nogales AoR system, in 24/7 operation since August 2015, provides Border Patrol Agents a high level of operational availability for increased awareness, exceeding contract requirements. As part of the integrated solution, Elbit Systems of America also provides on-site support for the Nogales command center and full logistics support for the entire IFT system.

RP Optical Introduces MultiSensor System for Border & Coastal Surveillance Missions and Critical Infrastructure Protection RP Optical Lab introduces a multi-sensor system for border and coastal surveillance missions and critical infrastructure protection at Defexpo India 2016. The multi-sensor modular system, adaptable to customer needs and missions, consists of an LWIR or MWIR cooled thermal imaging camera – providing multiple zoom lens options, a day camera with multiple optional sensor and lens types, and an accurate eye-safe laser range finder (LRF) unit, all mounted on a Pan/Tilt unit with various performance/ stabilization levels. Among the key benefits are multiple choices of in-house cooled and uncooled thermal imagers in VGA or HD resolutions, using continuous zoom optics. Fully remote controlled, a modular design enables easy maintenance. Meeting MIL-STD, the system has ruggedized construction with IP-66 Border Security Report | April 2016

sealing. It offers either analog or digital control, an optional 2-Axis gyro-stabilization, and GPS providing accurate system position. According to Mr. Ran Carmeli, CEO of RP Optical Lab, “We developed the system in response to growing demand for a modular system that enables our customers to select system modules according to mission requirements. The multisensor system, completely developed in-house, includes the most advanced components in the world, providing the highest quality images in all weather and illumination conditions.

MacB Awarded Prime Contract for U.S. Customs and Border Protection MacAulay-Brown, Inc.(MacB), a leading National Security company delivering advanced engineering services and product solutions, today announced that it was awarded a prime contract for the U.S. Customs and Border Protection Office of Technology Innovation and Acquisition (CBP/OTIA).

This Department of Homeland Security Technical, Acquisition and Business Support Services task order is valued at $47 million over four years. Principle work locations include Arlington, Virginia and Tucson, Arizona.


I N D U S T RY N E W S

U.S. Customs and Border Protection provides training and oversight for its acquisition workforce and all program management offices. The mission of OTIA is to foster innovation and conduct effective acquisition of CBP products and services to improve mission performance in securing America’s borders, and facilitate the lawful movement of goods and people. MacB’s Mission Systems team will provide: Program planning, management and execution - Business operations and analytics - Cost estimating and risk analysis - Acquisition workforce training.

Viracopos International Airport begins 2016 with advanced Automated Border Control technology Aiming for a faster and enhanced secure passenger control process, Viracopos International Airport implemented the latest Automated Border Control technology by installing Vision-BoxTM’s ABC eGates at the end of 2015, already processing thousands of passengers during its first month in operation.

One of the largest centers of air traffic in Brazil, Viracopos International Airport reached a record level of passenger volume in 2015, with an annual

10.3 million passenger movements. To meet this record increase, an innovative Automated Border Control solution was implemented in December 2015, just in

time to meet the special seasonal demand of the higher passenger flow traveling in both domestic and international flights. The Automated Border Control solution implemented by multinational VisionBoxTM allows for a faster passenger identification process, through eGates that ensure both passport authenticity and biometric passenger verification through an automated and selfservice process. The system compares the facial image stored in the chip of the passengers’ passport against the live captured image, all according to the highest quality and security international standards, making sure that they are the genuine owner of the document. Since they have been deployed, the eGates installed at the Arrivals and Departures areas of the airport have processed more than 9000 passengers, each process taking only 15 seconds on average! This represents a considerable reduction

25

from usual time needed in traditional control – around 3 minutes. In terms of security, the new platform guarantees an enhanced level of trust in passenger identification and represents significant improvements in the efficiency of the airport’s border control processes. The Federal Police remotely monitors every passage at the eGates in real time. In case of an exceptional situation during the process, the Police immediately receives an alert in order to evaluate the situation and take immediate action, while the passenger remains inside the eGate. For example, if two people simultaneously enter the eGate or if the passport is part of a database of stolen documents, the Police can take instantaneous action. This exception risk-based automated process offers the Federal Police with the capability to better focus on persons of interest through smart case management.

Border Security Report | April 2016


26

I N D U S T RY N E W S

Automatic advance security checks now being run on all passengers exiting Australia

Australia’s Department of Immigration and Border Protection (the Department) is now running automated checks on all passengers departing the country. The Outward Advance Passenger Processing (APP) program uses iBorders® from SITA, the global provider of border security and IT solutions to governments, airlines and airports. SITA’s iBorders system provides real-time, integration between the airlines’ systems and the Department’s border management systems.

Outward APP, which provides interactive advanced passenger information (i-API),was put in place following legislation enacted by the Australian Government to help improve Australia’s border integrity and national security. As part of these measures, airlines are required to provide data for all travellers departing Australia in advance of their flight. The airline transmits each passenger’s data to the

Department during check-in, receiving in response a ‘board’/’no board’ message in real-time. Passengers who are pre-cleared for departure through this process are allowed to quickly self-process through passport control by using the SmartGate in Australia’s international airports. In addition to providing a more streamlined departure process using automated e-gates, the process also facilitates the identification of

Border Security Report | April 2016

passengers who may be a security concern ahead of departure. SITA’s iBorders enables the Department to receive passenger data from the airlines with enough time to preprocess travellers before they arrive at the border. John Gibbon, Assistant Secretary Traveller Branch at the Department, said: “Outward APP delivers a faster and more seamless experience for travellers, while meeting our business needs to manage threats and ensure the integrity of Australia’s border.” SITA’s work with the Department started as a trial with a limited number of airlines. Full implementation coincided with the commencement of the Foreign Fighters legislation amendments and today the Outward APP program includes all airlines and all flights out of Australia. In total, 47 airlines are now fully certified and running around two million transactions a month through the Australian Outward APP program powered by iBorders. Ilya Gutlin, SITA President, Asia Pacific, said: “Australia has long been recognized as a

leader and innovator in the area of border management. This sophisticated Outward APP program builds on the existing solutions that SITA has been providing to the Department of Immigration and Border Protection since 2000, when the country geared up for the influx of arrivals for the Olympic Games. Working in sync with the airlines, Australia now runs advance, automatic checks on every passenger arriving or departing the country, making the journey smoother for authorized travellers while addressing issues with persons of interest.” Around 30 governments globally use SITA’s iBorders® systems and capabilities to keep their borders secure and transform their border security operations.


I N D U S T RY N E W S

US to fund multi-milliondollar Tunisia border surveillance

The United States has agreed to fund a multimillion-dollar project to install an electronic security surveillance system on Tunisia’s border with strife-torn Libya, the US embassy said.

27

contact Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Advertising Sales: Paul Gloc (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk

In a statement, the diplomatic mission said that the US was disbursing the first instalment of the $24.9 million project to strengthen security along the frontier. The US Defence Threat Reduction Agency (DTRA) awarded the contract to American construction group BTP and consulting and engineering firm AECOM, a diplomatic source told AFP. According to the embassy, the project involves the installation of an integrated surveillance system using sensors and regular security

equipment. The project includes training Tunisian forces to use the system, the statement added, without giving a start or completion date. Tunisia has built a 200-kilometre (125mile) barrier that stretches about half the length of its border with Libya in an attempt to prevent militants from infiltrating. A series of deadly attacks by IS on foreign holidaymakers last year, which have dealt a devastating blow to the country’s tourism industry, are believed to have been planned from Libya.

Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com Border Security Report is a bimonthly electronic magazine and is the border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over15,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide.

Copyright of KNM Media and Torch Marketing.

Border Security Report | April 2016


EVENT PREVIEW

Evolving International Public & Private Sector Resilience

Security & Counter Terror Expo (formerly Counter Terror Expo) opens on 19th-20th April at London Olympia and is open for any professional tasked with protecting assets, business, people and nations from terrorism. Bringing an international audience to London, attendees from across the globe will see the latest technology, hear about the latest developments, share best practice and ensure that their threat mitigation strategies are effective. West Midlands Ambulance Service (WMAS) has launched a brand new bespoke incident command vehicle with the latest technology to deal with major and prolonged incidents. With technology integration and satellite services provided by Excelerate, this state-ofthe-art unit will provide a communications hub and base for the Ambulance Service’s commanders at the scene for the duration of an incident. The Ambulance command vehicle was likened to a ‘mobile mini headquarters’ that would be sent to support air, rail or multi vehicle incidents, or more prolonged incidents such as flooding within the West Midlands region. Trust Chief Executive, Anthony Marsh said:

“It is really important for me and all of our Board that we have the very best equipment to keep our staff safe and enable them to provide the best care, the best treatment and the best service for our patients should the worst happen in the West Midlands.” The unit enables a Tactical command post to be deployed at the incident ground housing operators and commanders and to accommodate multi

30 - World Security Report

agency responses where required. It will also provide West Midlands Ambulance Service with a command training suite. Steve Wheaton, Assistant Chief Ambulance Officer, West Midlands Ambulance Service comments: ‘We are pleased to announce further investment in our emergency preparedness capability with the delivery of the Trust’s command and control vehicle. The new

unit will enhance our current operation to ensure we are fully prepared to respond to significant incidents should anything untoward occur. This state-of-the-art incident command unit will enable improved co-ordination and multi-agency co-operation, enhanced resilience, emergency preparedness and informed command in all environments, now and into the future.” Vehicle specification and operational areas The vehicle is designed on a 7.5 ton Isuzu chassis, with custom slide out side pods. It houses a conference/briefing room facility with seating for up to nine people. This area is equipped with a conference table, briefing screens, video and phone conferencing unit and eight operational laptop positions.

www.worldsecurity-index.com


EVENT PREVIEW

A separate operational area houses two work stations with fixed PC’s and peripherals, with Airwave radio and VoIP handsets. The vehicle features an external 46” interactive touch screen that is used for team briefings. Resilient & remote communications The command unit will utilise multiple communications bearers – 3G, 4G and Excelerate’s KU Enhanced Resilience Satellite Network – to transmit and receive data, video, and voice as well as to enable operational personnel to access back office systems. The integration of multiple communications bearers will support West Midlands Ambulance Service with resilient and remote communications at all times, enabling business

continuity and real time incident management with automated failover provision. On-board cameras and video The command vehicle is equipped with a ‘Sherpa’ unit, which is Excelerate’s automatic pole climbing camera delivery system. Sherpa is fitted with an optical IR camera incorporating COFDM technology (Coded Orthogonal Frequency Division Multiplexing), which enables real time video sharing over high signal loss areas, such as in mountainous or built up locations. A roof mounted optical IR camera on a telescopic 5-metre mast extends coverage within the incident ground and allows the surveillance of wide

areas. Designed for use in harsh and challenging environments, the mastmounted camera enables the transmission of high quality images in real time at distances in excess of a kilometre. A future proof eight channel video server has been integrated on-board which supports the streaming of video back to HQ and other authorised locations, and will record all channels at high resolution automatically. The video server is capable of simultaneously displaying, recording, reviewing and exporting images meaning that recording will not stop if images need to be reviewed at an incident. With its comprehensive range of cameras and video streaming capability, the command vehicle will not only support more

informed command for West Midlands Ambulance Service in its own right, but will also service multi agency responses across the region. Integrated systems management Excelerate’s DDMI (Digital Dashboard Management Interface) supports ease of use of all the on-board systems including the vehicle set up protocols. The DDMI combines all systems into one interface allowing operational personnel to control, monitor and analyse every aspect of incident response from one place – with no IT expertise required. It will be from the command unit at the scene, using data from its raft of equipment that real-time decisions about the handling of an incident can be made.

Mobile checkpoint provides full-HD imagery from underside of vehicles’ In just under a year UK engineers have designed and produced V-Guard, a new security tool that gives users high-definition images from the underside of vehicles. V-Guard, which is due to be on display at SCTX2016 at stand C23, has been designed for permanent or temporary deployment, the V-Guard mobile checkpoint comes with a fully integrated license plate recognition package and optional day/night IR overview camera to help identify vehicles and their occupants. “We spotted a gap in the market for a product that is highly portable, could

fit into something the size of a briefcase, that can be put on the ground very quickly and is very simple to operate – including the graphical user interface (GUI) – and is ruggedized,” said Andy Johnson, project manager at CMCA (UK), the company that started work on V-Guard in December 2014. The system, which can be battery or mains operated, is connected to a tablet via secure wireless or 3G link but can be used with any wireless Windows-based device in order to display – and allow interaction with – information generated by the system. “So that can be a

www.worldsecurity-index.com

ruggedized tablet, a laptop or it could be hard-wired across to any other computer system, so a desktop computer in an office or security station,” said Johnson. “The information we’re feeding into the GUI is drawn from the cameras, so the under vehicle camera does the 1080p HD [full HD] and that’s gathered as the vehicle drives over the system.” V-Guard’s road surfacemounted, 360o HD camera is housed inside strengthened semitransparent resin along with an LED control system. “It’s visual, there’s no active intelligence,” said Johnson,

“there’s no x-ray type backscatter, it’s a visual only system.” “We don’t have a stitched image because we’re using a semi fish eye,” he added. “We looked at our initial stitching and thought: let’s concentrate on the video imagery, let’s make that completely controllable so that we can cycle through the frames – forward and backwards – with the swipe of a finger over the GUI, which means we get the parallax associated with the image so that we can look into spaces from multiple angles rather than having a flat image and trying to enhance it.”

World Security Report - 31


EVENT PREVIEW

Charter Global will exhibit their Obexion range of security shutters for the first time at this year’s Security and Counter Terror Expo, Olympia, London

The Obexion team will show case their range of high security roller shutters.The ‘Obexion MD SR5’ shutter is certified to LPS 1175, Issue 7, SR5 and is designed to provide the highest level of security available for high risk locations such as Critical National Infrastructure, Military and National Security establishments, as well as high value public and commercial premises. The Obexion team’s dedication to innovation is seen throughout the range of Obexion shutters. Through the intelligent use of lightweight material, primarily aluminium, the team have been able to use profiles never seen before, or roll sizes not known in the shutter industry previously. Innovation has meant that the Obexion range is lighter and stronger. Making the Obexion security shutter ideal for use in hostile environments such as blast, ballistic, ram and riot. Charter Global also introduced the keyless LockDown technology meaning that these shutters require no auxiliary locking

system and eliminate the need for keys and pinson locks. Additionally, the shutters will lock in any stop position, whether they are fully closed or not. This means the shutters cannot be forced open to gain entry, which is a key weakness in other security shutters. This makes Obexion shutters with LockDown technology ideal as the first point of entry for any facility. Obexion shutters have a full range of controls including push button, key, radio control or they can be integrated into building management and third party alarm systems. Electronic monitoring and alarms are available as options for higher risk environments. The Obexion range are the only security shutters without any auxiliary locking for LPS 1175, Issue 7, SR3, SR4 and SR5, and the most secure certified perforated shutter lath, to LPS 1175, Issue 7, SR2 and SR3. Visit Charter Global on Stand No. I51 at Security and Counter Terror Expo.

32 - World Security Report

Access control: Real time without cabling A pioneer in cable-free access control based on smart keys, LOCKEN is also the first company to provide real-time communication as part of a stand-alone solution. This achievement is made possible by the combined use of the MyLocken mobile application and the new electronic Cyberkey incorporating Bluetooth technology. In practice, adding Bluetooth technology to the standard Cyberkey allows it to communicate directly with an Android or Windows smartphone. This means users can retrieve their access rights in real time as soon as they have acknowledged their presence on site and solely for the duration of their call. In return, the security manager can be updated instantaneously on all access events occurring on a given site. These new functions make it possible to respond to the clearly expressed aspirations of security managers to improve procedures and reinforce safety measures. For example, a maintenance engineer having to urgently attend a remote site who

can receive his new access rights on his electronic key via his smartphone and thereby open electronic cylinders and electronic padlocks. To do so, he simply has to open his MyLocken App which will then transmit directly to his key the temporary access rights related to the job he has been tasked to accomplish. Nick Dooley, Managing Director of Locken UK Ltd explains: “Thanks to this innovation, LOCKEN is responding to the genuine needs of security managers who are looking to step up security at remote sites where mobile teams intervene. With this new solution, which permits the transmission of access data in real time without the constraints of cabling, LOCKEN is bringing a simple response to the market”. Several thousand technicians already use this innovation which is pushing back the conventional boundaries between the online and offline access control arenas. 150,000 sites in Europe are now equipped with the Locken Cyberlock solution.

www.worldsecurity-index.com


EVENT PREVIEW

The National Barrier Asset protects UK political events

Massive Automated Gates Swing into Action at Eurotunnel

The National Barrier Asset (NBA) is a range of high security systems owned and managed by Sussex Police on behalf of the Home Office, providing robust Hostile Vehicle Mitigation (HVM) measures and security fencing. It is available for use by the UK governmental, foreign governmental and commercial organisations.

Infrastructure (CPNI).

The NBA was funded and developed initially to protect annual political party meetings and conferences from hostile vehicle attacks. More investment was placed in products such as rising gates and pedestrian portals for use at major events. This development was as a part of the Governments protect workstream. To keep abreast of modern threats, the NBA has evolved and developed new systems to meet the requirements of specific events such as the European Justice Ministries conference in Brighton where a need for High security fence that would be robust in the event of mob attacks and considerably reduce the number of guardforce required to patrol the perimeter. The Rapid Deployable System (RDS) an anti-climb temporary HVM system tested to PAS 68 Standards for 2.5 tonnes at 30mph on a 90 Degree angle which was developed with the Centre for the Protection of National

H2S2 were awarded the contract by Sussex Police to deploy the NBA. That contract allows them to not only use the extensive range of NBA products but also their own proprietary products. The NBA is a true collaborative partnership between H2S2 and Sussex Police, the combined team brings a wealth of expertise in the field of HVM and security at major security events.

Jacksons Fencing, one of the UK’s leading designers, manufacturers and installers of security fencing and access control systems, have recently installed a 4m x 14m fully automated double leaf swing gates, as part of the ongoing security updates at the Eurotunnel Coquelles site. With each post weighing over a tonne and each leaf measuring 7m wide, weighing 1600kg and operated by 125mm bore x 1300mm stroke, rams weighing over 200 kilos and capable of lifting over 19 tonnes / 190,000 newtons (the equivalent of a full double decker bus), so this massive gate is anything but lightweight, yet is no slouch with the opening and closing operations completed within 60 seconds. The new gate is one of the largest automated swing gate Jacksons have ever designed, manufactured and installed and naturally includes full safety features and is CE Marked in compliance with the EU Machinery Directive.

Having formed a long standing relationship working together, Highway Care Security Solutions (HCSS) and Hardstaff Barriers have formed a new Joint Venture company named H2S2, working together with Sussex Police, H2S2 are now offering the supply of the National Barrier Asset product range.

The NBA is now available to support the private sector to secure temporary events and can be deployed only as part of a holistic security plan using the most appropriate assets to ensure maximum protection. All products have been tested to PAS 68 standards and where applicable have been subjected to the UK developing “Mob” attack standards. With the involvement from Sussex Police, you can be assured that you will get an open, honest and professional service.

www.worldsecurity-index.com

Constructed from hot dip galvanised steel, to provide protection against corrosion inside and out, before being powder coated white in-house, the gates were manufactured at Jacksons Kent based HQ (located just 12.4km from the UK entrance to Eurotunnel in Folkestone). The Jacksons contracts team based in Calais, working in harness with the design and manufacturing teams in Kent, ensured a fast and accurate installation onto pre –installed posts with hanging and adjustment taking approximately 4 hours. Peter Jackson, Jacksons’ CEO commented: ‘While we have designed and manufactured larger sliding gates, the sheer size, operating environment and performance requirements of this gate presented a few challenges, especially given the short deadline which needed to be met. I’m delighted and proud that the teams here and in France proved that they had the flexibility and determination to rise to this exacting challenge.’

World Security Report - 33


INDUSTRY NEWS

IDIS has announced that it is integrating a range of high definition (HD) cameras with video management software (VMS) from Genetec Inc. The development, which builds on an established relationship, brings to market a powerful combination of IDIS network dome cameras, including vandal-resistant and infrared (IR) models, with Genetec Security Center, an openarchitecture, unified IPsecurity solution. Through this collaboration, IDIS and Genetec will make it much easier for organizations to improve safety, security, and protection for their people, property, and assets while benefitting from the multiple commercial and competitive advantages offered by smarter HD surveillance.

HD vandal-resistant IR camera. The cameras also benefit from low power consumption and require little maintenance ensuring the IDIS signature low total cost of ownership.

IDIS network dome cameras deliver unrivalled HD performance, including outstanding image quality, Full HD (1080p) resolution, a comprehensive range of advanced features, and multiple video streams. Thanks to the multiple video streams, this can be configured and used independently for live

monitoring, recording, and remote data transmission with preferred resolution, quality, and bit rate. Models that are being integrated and validated with Security Center will include the IDIS DC-D1223WX, a Full HD vandal-resistant dome camera, and IDIS DC-D1223WHR, a Full

Security Center integrates three main security applications, including access control, video surveillance, and automatic license plate recognition (ALPR) within a unified, intuitive user interface. Because it is built on an open-platform with a robust software developers’ kit, Security Center can also integrate third party security software, hardware, and business systems for a totally extensible, unified IP-physical security management solution.

Sony’s newest 4K network camera, model SNC-VB770, offers the highest sensitivity in its class The new model combines ultra-high sensitivity with 4K resolution and advanced networking capabilities to give video professionals more flexibility to capture details even in extreme low-light conditions. The new SNC-VB770 camera achieves high resolution and sensitivity, in addition to low noise due to its image processing and full-frame 35mm Exmor sensor – all developed by Sony.

the capabilities of human eyes.

The sensor captures significantly more light with low noise than conventional camera sensors to realize

34 - World Security Report

drastic improvements in sensitivity. The result is low light performance in nearly pitch-black environments beyond

The SNC-VB770’s E-mount lens series accommodates a variety of lens options from wide angle to telephoto, allowing easy integration into a range of video capture applications, including surveillance such as city, transportation, ports or critical infrastructure; web attraction, nature studies or scientific applications.

www.worldsecurity-index.com


INDUSTRY NEWS

Peru selects the technological solutions of the Imprimerie Nationale Group and Gemalto for end-to-end ePassport program The Imprimerie Nationale Group, the world expert in secure identity solutions, and Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, announce they have started issuing the first personalized Peruvian electronic passports. The companies have jointly been awarded a multi-year contract at the end of 2015 to deliver a complete end-to-end ePassport solution for Peru, with the supply of highly secure electronic documents. The Imprimerie Nationale / Gemalto consortium was selected further to an international tender launched last August by the Superintendencia Nacional de Migraciones

de Peru, under a strict bidding process controlled by the ICAO (International Civil Aviation Organization) International Organization. The Imprimerie Nationale leads the consortium and performs the design and manufacturing of the electronic passports. The brand new ePassport offers the highest security levels including exclusive watermark, micro lettering, inlay, UV and rainbow printing, and secure inks. For Peru’s 30 million citizens, the new ePassports will help combat identity fraud and greatly speed border crossing. Gemalto ensures the

www.worldsecurity-index.com

implementation of the complete credentials system, with the creation of 20 enrollment sites and personalization throughout the Peruvian territory, based on its Sealys eTravel secure embedded software for identity authentication, and its Coesys Instant Issuance for on the spot document personalization and delivery. Gemalto will secure data enrollment including automated fingerprint identification system (AFIS), public key infrastructure (PKI) services, ePassport personalization, a contingency data center plus quality and access control across the entire ePassport ecosystem. “Two weeks after the

launch of the program, the first ePassport specimens were delivered to the Ministry of the Interior of Peru. And today, only two months later, the first 5,000 ePassports are delivered on time and the first enrollment and personalization site is fully operational. This is an industry first in terms of timeline,” said Didier Trutt, CEO of the Imprimerie Nationale Group. “With this new electronic passport, the citizens of Peru will receive unprecedented levels of security, privacy and convenience as they travel across the world,” added Frédéric Trojani, Executive Vice President of Government Programs at Gemalto. “The ePassport program for Peru leverages Gemalto’s proven expertise in global eGovernment implementations with more than 30 ePassport roll-outs worldwide. The Gemalto solution encompasses end-to-end program management in addition to the delivery, personalization and instant issuance of these highly secure digital passports.”

World Security Report - 35


INDUSTRY NEWS

Thales Opens New Cyber Security Operations Centre as Cybercrime Continues to Grow Thales announces the opening of a new Cyber Security Operations Centre (CSOC) in Elancourt, near Paris. As cyberthreats grow and cyberattacks become more sophisticated, Thales continues to develop its cybersecurity operations infrastructure, incorporating the latest technologies and innovations to protect the information systems of the most demanding customers. Thales’s cybersecurity offering is built around a commitment to provide personalised support to each customer, in particular through a range of new value-added services. More than 30 major organisations already rely on Thales’s expertise to protect their information systems from cyberattacks. While information systems become more interconnected and mainstream markets embrace disruptive technologies such as cloud computing, Big Data and the Internet of Things, the number of cyberattacks is growing rapidly. In 2015, the number of recorded attacks grew by 51% in France and 38% worldwide. The question facing organisations today is no longer whether they will be attacked, but when the next attack will happen and above all whether it will be detected. Thales is constantly improving

its detection and rapid reaction capabilities to help its customers step up to this challenge. Thales brings to the table more than 15 years of experience in managed cybersecurity services and is positioned as the trusted partner of choice for organisations worldwide. Services include 24/7 cyber surveillance, event analysis and incident response in order to guarantee the performance, continuity and security of critical information systems. The Cyber Security Operations Centre in Elancourt is an integral part of Thales’s holistic approach to cybersecurity and its commitment to provide each customer with solutions that are tailored to their specific needs. It is designed to perform the following key functions:

36 - World Security Report

• Prevent risks and anticipate threats to enterprise information systems. The new Cyber Security Operations Centre is also responsible for the services provided by Thales’s CERT-IST[2], which has maintained permanent security surveillance of customers’ systems since 1999 and issues alerts about any new vulnerabilities that could compromise security. • Detect security incidents and react in real- time, quickly analysing and resolving issues and, when appropriate, mobilising the Rapid Reaction Team set up by Thales in 2013. • Monitor compliance to ensure that user practices are in line with the customer’s security policy at all times. The Thales security supervision offering

provides organisations with a complete range of services to step up to the growing threat of cyberattacks. “With this new Cyber Security Operations Centre, our customers have access to the bestin-class cybersecurity services. It consolidates Thales’s leadership in security supervision and our ability to provide cybersecurity services to customers in Europe and around the world. The new facility strengthens Thales’s position as a world leader in cybersecurity and our ability to provide innovative solutions to the most demanding customers, including critical national infrastructure providers.” Laurent Maury, Vice President, Critical Information Systems and Cybersecurity.

www.worldsecurity-index.com


INDUSTRY NEWS

American Science and Engineering Introduces the CarView Portal to Provide Cost-Effective, High-Throughput, Superior Inspection of Small Vehicles American Science and Engineering has introduced the CarView™ portal, an advanced high-throughput scanning system for superior detection of hidden threats in cars and small vehicles. The CarView system simultaneously produces two images of the top-down view of the vehicle: a high-quality, dualenergy transmission image that highlights metallic threats, and a photo-like Z Backscatter® image that highlights organic threats and contraband. The relocatable, costeffective system is ideal for securing special events and parking garages, as well as high-threat facilities, government buildings, and vital checkpoints. In addition to AS&E’s signature Z Backscatter

without sacrificing image quality.

technology, the CarView system uses innovative Wave Shifting Fibers (WSF) detector technology to provide dual-energy, material discrimination capabilities. WSF detector technology has enabled

the development of more powerful, efficient, compact, and rugged AS&E X-ray systems, such as the CarView portal, which fits into existing traffic lanes and delivers high-throughput screening

“We continue to develop and introduce innovative underlying technologies, such as Wave Shifting Fibers, that can extend the capabilities of new platforms,” said Chuck Dougherty, AS&E’s President and CEO. “The CarView system is the latest in our family of solutions to leverage multiple, complementary technologies in a low-cost, relocatable, compact footprint. This will enable AS&E to extend the served market for portal systems to include commercial applications, demonstrating our ongoing commitment to develop a range of solutions that meets our customers’ real-world operational requirements.”

UK-based ANPR specialists CitySync Limited, part of TagMaster, have announced the next model in a new range of ANPR cameras, the CitySync 50 The CitySync 50 camera is the most complete intelligent (all-in-one) camera for access control/ security, parking and traffic markets.

illumination options (both infra-red and white light) to provide the best quality images, regardless of plate type and lighting conditions. The camera outputs up to 2

and easy thanks to a brand new web-based interface and configuration wizard, greatly reducing setup times and costs. There is also a HD

car park overstay, or dwelltime analysis. The optional HD overview makes it a perfect tool in a parking or bus-lane enforcement environment.

While other cameras can read plates on board and trigger barriers from a simple white-list, the CitySync 50 offers much more comprehensive on-board capabilities. It is designed to be used globally with a variety of

separate relays based upon multiple rule groups, can output email alerts, communicate directly with LED signs and even act as a Wiegand device. All of this is without the need for further PCs or software.

sensor which eliminates the need for varifocal configuration thanks to a depth of field of up to 10m from a fixed lens. For even greater flexibility, multiple

The camera has been developed through cooperation and collaboration between CitySync and TagMaster technical teams, with valuable input from our existing partners in the access control and parking markets.

The camera setup is quick

www.worldsecurity-index.com

CitySync 50 cameras can be connected to the JetParking Server software, enabling

World Security Report - 37


INDUSTRY NEWS

MAGAL to Highlight Fiber-Optic Sensors for Fence, Pipeline, and Dataline Protection Magal Security Systems Ltd. will highlight its fiberoptic sensors for fence, pipeline, and dataline protection at Defexpo. The company has completed development of its new generation of FiberPatrol-PR, which enables coverage of pipes over large distances from a single control point.

presence of explosive atmospheres.

buried sensor in pipeline applications.

FiberPatrol-PR provides protection of over 70 kilometers against Third Party Interference (TPI) for buried pipelines, with the sensor cable buried alongside the pipes. When used in perimeter applications, the coverage is 16 kilometers. The system detects the breaking point within an accuracy of 10 meters. No powered or conductive items are required in the field, making the sensor completely immune to EMI and lighting, and intrinsically safe in the

The solution delivers a high probability of detection and a low Nuisance Alarm Rate (NAR). It accurately locates intrusions – including multiple simultaneous intrusions – and operates even in the presence of non-localized environmental noise that would overwhelm the location capability of other long-range fiberoptic sensors. Providing software-configurable detection zones, FiberPatrol-PR is invisible and undetectable as a

Providing accurate location for directing CCTV or response forces, no outdoor power or communication infrastructure is required. Easy to install and maintain, the solution provides multiple options for integration with SMS, VMS and PSIM platforms. It uses single-mode fiber within telecommunicationsgrade cable, and when the sensor cable is cut, either in an attempt to defeat the sensor or accidentally, FiberPatrol-

PR immediately reports the incident, including its exact location. In addition, the sensor retains the ability to detect and localize intrusions up to the point of the cut. According to Hagai katz, Magal’s SVP Marketing and Business Development, “The issue of Third Party Interference is significant, especially in large countries like India, which has thousands of kilometers of pipes, usually unmonitored. This situation causes millions of dollars in losses every year. Our solution addresses this issue, providing early warning regarding the precise location of events, helping responders to prevent costly damage. The solution is successfully installed in a number of locations around the world and is highly valued.”

Altametry unveils new ALTA Tactical SmartBalloon Altametry has unveiled its new ALTA Tactical SmartBalloon system for persistent low altitude surveillance (PLAS) for law enforcement and border surveillance applications Each ALTA Tactical SmartBalloon system is composed of a micro-sized tethered aerostat PLAS platform designed to be highly portable and provide sustained surveillance for

extended mission sets across a wide variety of terrain and environments. “The mission to secure America’s borders has been catapulted into the spotlight of the national security agenda,” says Dr. Bertrand Dano, Chief Scientist for Altametry. “ALTA Tactical SmartBalloons provide operators the capability to conduct effective Persistent Low Altitude Surveillance™

38 - World Security Report

coverage by day or night in targeted areas requiring fixed aerial monitoring for extended durations.” The ALTA TriVu is a daytime and low-light system offering PLAS™ through three separate high definition cameras operating at various focal lengths. The TriVu system provides full audio and video recording of the targeted area, as well as a

live, encrypted data feed sent to command and control units. The ALTA BatVu is a nighttime system boasting FLIR thermal imaging capabilities accompanied by two low light, high definition cameras recording audio/ video and also allowing for an encrypted data feed to ground commanders.

www.worldsecurity-index.com


INDUSTRY NEWS

70% of state prisoners and 64% of federal prisoners used drugs regularly As prisoners find more ingenious methods of smuggling contraband into correctional facilities, so correctional facilities must find more ingenious methods of detecting smuggled contraband! The Center for Disease Control and Prevention in the US announced in December 2015 that deaths from drug overdoses are at an all-time high, with 61% from Heroin and Opiate use. This is expounded in the correctional facilities, where addiction is an omnipresent problem faced the world over. In Manawatu Prison, New Zealand the amount of drugs people have tried to smuggle has doubled in the past five years. In a recent report released under the Official Information Act, figures showed in 2014-15, there were 118 instances of drugs being seized at the prison, which was an increase of 10 from the previous year, but double of that seized during 20102011. In a 2004 study from the US

Bureau of Justice Statistics figures showed that 70% of state prisoners and 64% of federal prisoners used drugs regularly at the time they committed their crime. 25% of offenders convicted of violent crimes were high at the time of offense. Once in a correctional facility prisoners who are addicts, remain addicts, and as such will find any way possible of continuing their supply of drugs. An ever increasing array of smuggling methods is keeping correctional staff on their toes; with finds in visitor’s underwear and person, in babies’ nappies, inside food cartons, secreted on an offender’s body, and internal concealment. More recent developments include the use of drones, and substances mixed with paint on children’s paintings which inmates chew to get the desired effect. All of which means the authorities need to be far more resourceful when it comes to detecting these smuggled items. Netherlands based security manufacturer, OD

Security add another tool to correctional facilities arsenal in the fight against contraband smuggling with their SOTER RS ThroughBody Scanners regarded as the most effective way of countering the smuggling of contraband material without subjecting inmates, visitors and staff to intrusive body searchers. In March OD Security installed another SOTER RS unit in the US Correctional Establishment, this time at Humboldt County Correctional Facility, California with other counties scheduled for installation during the coming months. The SOTER RS is a low dosage full body scanner which combines ultra low radiation with maximum visibility, for use at airports and prisons. Within seconds the SOTER RS reveals hidden items, such as weapons or narcotics, diamonds, or any stolen or smuggled goods. It doesn’t even have to be metal. The SOTER shows a clear difference between human tissue and other

materials. Even ingested or camouflaged items will be shown. The SOTER RS will increase the level of security operations previously possible through the use of conventional metal detectors. Non-metallic objects hidden under clothes, in natural cavities or within the human body cannot be detected by conventional metal detectors and typically, these non-detectable items, such as narcotics, explosives, precious stones, plastic weapons, or other contraband, can only otherwise be detected by highly intrusive total body searches. SOTER RS is successfully deployed in prisons, in airports, detention centres, police and customs facilities worldwide including; Australia, Denmark, Ghana, Hong Kong, Kuwait, Malaysia, Mexico, Nigeria, The Netherlands, The United Arab Emirates, The United States of America, The United Kingdom, Chile, Sri Lanka and Vietnam.

Bosch, Genetec Inc. and SecureXperts launch cyber secure IP video solution for critical applications Bosch Security Systems, Genetec and SecureXperts have collaborated in the design and development of an IP video solution that is resilient against unauthorized access, malware, brute force cracking and other exploit techniques.

It uses Credentialed High Assurance Video Encryption (CHAVE™) technology to provide highly secure identification and authentication through multi-factor smart card credentials. This makes it ideal for mission critical applications and infrastructure protection.

www.worldsecurity-index.com

While all Bosch IP cameras use a unique embedded Trusted Platform Module to ensure the highest data security, CHAVE™enabled cameras add an extra layer of protection that meets Federal Information Processing Standard (FIPS) Publication 140-2 Level

3 certified encryption standards. Using techniques known as Public Key Infrastructure (PKI) and Transport Layer Security (TLS), CHAVE™enabled cameras allow secure communications over the Internet and other untrusted network connections.

World Security Report - 39


INDUSTRY NEWS

Critical Infrastructure Protection Market Worth $82B by 2026 The physical security segment of critical infrastructure protection market (CIP) is expected to account for 69.9% during 2016 to 2026, while Network Security and the Others segments (includes investment in ancillary and support activities) are expected to account for shares of 27.1% and 3% respectively. The Critical Infrastructure Protection (CIP) market is expected to value US$64.6 billion in 2016, and grow at

a CAGR of 2.44% to value US$82.2 billion by 2026. The cumulative market for global expenditure on CIP is expected at US$813.6 billion over the forecast period. The CIP market is expected to be led by North America with an expected share of 34.6% over the forecast period, followed by the Asia Pacific region at 27.4%, and Europe at 25%. The Middle Eastern market for CIP is expected to account for a share of 10.9%, followed by the Latin American and African

markets with a cumulative share of 2.2%. Global spending in the domain is being driven by the increasing frequency of terror attacks that have taken place in the last couple of years and the associated fear of knowing that non-state as well as organized actors are in all probability active within the country and possess acute local knowledge which might enable some of these elements to strike at critically important networks, sites or

processes successfully. The Global Critical Infrastructure Protection Market 20162026 report offers a detailed analysis of the industry with market size forecasts covering the next ten years. This report will also analyze factors that influence demand for CIP equipment, systems and services, key market trends, and challenges faced by industry participants. Source: www. reportsandreports.com

GJD’s D-TECT 3 IP external motion detector is designed to be an advanced replacement for traditional analogue detectors The D-TECT 3 IP is said to combine all of the versatile benefits of the company’s D-TECT 3, coupled with IP connectivity to provide reliable IP based security detection. The intelligent pairing of quad element PIR and microwave detection technologies, enables the DTECT 3 IP to effectively pinpoint intruders and ensure nuisance triggers are kept to an absolute minimum. The detector also works in conjunction with CCTV cameras to provide visual confirmation of the activation. This not only reduces the costs associated with nuisance alarms, it also generates immediate and relevant action in an effort to keep people, properties and

possessions secure. A key element of the D-TECT 3 IP is the use of a secure webbased interface, which provides real time remote monitoring access, as well as a whole host of benefits including the ability to monitor from anywhere across the world, at any time. The web-based interface is very easy to install as there are no requirements for additional set up or

40 - World Security Report

software, as the user simply logs in through a web address. Another benefit is that detector settings can be remotely accessed and altered via the interface. Some of the adjustable settings include the ability to alter the LUX level trigger, alarm sensitivity and detection range, as well as setting activation for specific times. The D-TECT 3 IP offers seamless integration with

3rd party VMS providers and CCTV systems. Bosch VMS, Milestone Xprotect, Hikvision, Mirasys, SeeTec Enterprise and Probox are to name a few of the supported VMS software providers. Supported cameras for direct control include Axis, Bosch, Ernitec, Hikvision and Sony. Others are constantly being added. The D-TECT 3 IP boasts a programmable beam range of up to 30 metres. This allows users to tailor the detector to suit their specific site requirements and avoid boundary overspill. Further features include the ability to withstand harsh weather conditions, low maintenance, eye pleasing aesthetics and a robust IP65 zinc metal weather-proof housing.

www.worldsecurity-index.com


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Obexion Shutters, developed by Charter Global Ltd, now include the first ever security shutters certified to LPS 1175, Issue 7, SR5 Security shutters to SR2, SR3, SR4 and bespoke risk specific specifications also available protection without compromise

www.obexionshutters.com

0845 050 8705

Targeted Solutions to your PR & Marketing Needs

KNM MEDIA Specialising in the Aerospace, Defence and Security Markets

Tel: +44(0)208 144 5934 Email: tony.kingham@worldsecurity-index.com

www.worldsecurity-index.com

World Security Report - 33


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and HEADLINE HERE looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. CYBER ATTACK INSIGHTS BY INDUSTRY PAGE 00 Official Magazine of

ISSUE 2 | APRIL 2016 www.worldsecurity-index.com

FEATURE: Story Headline goes here for the featured story PAGE 00

FEATURE: Story Headline goes here for the featured story PAGE 00

FEATURE: Story Headline goes here for the featured story PAGE 00

COVER STORY

Smiths Detection

Border Security Report

Border Security Report is the bimonthly border management industry magazine delivering HEADLINE HERE agency and industry news and developments, as well as more in-depth features and analysis to over15,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. BORDER SECURITY

REPORT

FOR THE WORLD’S BORDER PROTECTION, MANAGEMENT AND SECURITY INDUSTRY POLICY-MAKERS AND PRACTITIONERS

VOLUME 1 ISSUE 1 | 2016

COVER STORY

CORPORAT E

SECURI T Y

T EAMWORK

EVEN T S

GREAT ARTICLE

GREAT ARTICLE

GREAT ARTICLE

GREAT ARTICLE

Great looking corporate brochure or magazin! p.2

Great looking corporate brochure or magazin! p.12

Great looking corporate brochure or magazin! p.14

Great looking corporate brochure or magazin! p.18

Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 42 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

April 2016

12-13 Cloud Security Expo 2016 London, UK www.cloudsecurityexpo.com 13-14 Border Security Expo 2016 San Antonio, Texas, USA www.bordersecurityexpo.com 14-16 SecuTech India Mumbai, India www.secutechindia.co.in 18-21 DSA 2016 Kuala Lumpur, Malaysia www.dsaexhibition.com 19-20 Counter Terror Expo London, UK www.counterterrorexpo.com

May 2016

10-12 International Defense Exhibition Bratislava 2016 Bratislava, Slovakia www.ideb.sk/en 11-13 CISO Europe 2016 Stockholm, Sweden www.ciso-summit.com 17-19 ITEC 2016 Bratislava, Slovakia www.itec.co.uk 17-19 G2E Asia 2016 Macau, China www.g2easia.com

June 2016

7-9 GPEC 2016 Leipzig, Germany gpec.de

43 - World Security Report

To have your event listed please email details to the editor tony.kingham@worldsecurity-index.com

13-17 Eurosatory 2016 Paris, France www.eurosatory.com 21-23 IFSEC London, UK www.ifsec.co.uk

October 2016

5-6 Critical Infrastructure Protection & Resilience Asia Bangkok, Thailand www.cip-asia.com

December 2016

6-8 World Border Security Congress Athens, Greece www.world-border-congress.com

May 2017

9-11 Critical Infrastructure Protection & Resilience Europe, The Hague, Netherlands www.cipre-expo.com

www.worldsecurity-index.com


keep threats out and people safe by securing your sea and land borders

For further information on the product or sales, please visit www.smithsdetection.com or contact globalsales@smithsdetection.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.