World Security Report June 2016

Page 1

Official Magazine of

MAY / JUNE 2016 www.worldsecurity-index.com

FEATURE: Securing Connected & Embedded IoT investments, End-to-End PAGE 7

FEATURE: Collaboration on Critical National Infrastructure Cybersecurity Key to Minimising UK Economic Risk According to New Study PAGE 10

COVER STORY

FEATURE: The growing fear of a physical security incident PAGE 13

Rising demand for Industrial Security Systems


www.worldsecurity-index.com

Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Advertising Sales: Jake Addison T: +44 (0) 7545 977741 E: jakea@torchmarketing.co.uk Paul Gloc T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.

Another one of our aircraft is missing! As speculation of the possible cause for the loss of EgyptAir Flight 804 continues, at this point there is no definite evidence to point to a terrorist attack. No one has yet to claim responsibility for the attack which is unusual if it was one. After all publicity is what fuels terrorism, without it, there is no terror. Islamic State were quick to take credit for destroying the Russian Metrojet Flight 9268 which blew up over the Sinai dessert last October, so why not this one if it was them? According to French investigators smoke was detected on a number of automated sensors in several parts of the plane, which could mean a terrorist bomb or a catastrophic fire. So until the plane is found and the black box recovered, we are no closer to knowing the cause. What does seem incredible is that in the age of satellite communication, we are still struggling to find where aircraft are after incidents like this occur and rely totally on a box at the bottom of the ocean to determine the cause. After all, the technology to stream data from aircraft on a more or less continuous basis has been around for years, and the systems to do it are tried and tested. In June 2009, Air France Flight 477 crashed in the Atlantic killing all 228 passengers and crew. Whilst the Brazilian Navy recovered bodies and debris within 5 days, it took 2 years to recover the black box. In July 2011 the French Bureau d’Enquêtes et d’Analyses (BEA) published their initial safety recommendations into the loss of flight 477. Whilst the report focuses on the causes of the accident and the associated recommendations, it also acknowledges the lack of information about the position of the aircraft at the time of impact and the time taken to recover the black box data. An important recommendation from the report covers the transmission of flight data: Recommendation 4 states “that EASA and ICAO make mandatory as quickly as possible, for airplanes making public transport flights with passengers over maritime or remote areas, triggering of data transmission to facilitate localisation as soon as an emergency situation is detected on board.”

Copyright of KNM Media and Torch Marketing.

Seven years on, aircraft are still flying out over the oceans with millions of passengers on board and most of the time we have no accurate means of knowing exactly where they are.


Companies like Star Navigation produce products that can transmit essential and operationally valuable flight data via satcom to airline operators. These systems also use triggering algorithms to initiate streaming of flight data from an aircraft when certain criteria are met, in particular, when emergency situations are encountered, such as an up and coming catastrophic event. In the event an emergency situation is detected, critical data including voice and exact location, is streamed from the aircraft on a second by second basis right up to the point of impact or the catastrophic break-up of the aircraft. So why are these systems not standard on all passenger aircraft? Well the simple answer is cost. Satellite data streaming costs money and airlines are working in a highly competitive market, so anything that requires additional costs and does not result in competitive advantage will not be implemented, therefore legislation by the responsible authorities is required. To be fair some airlines have bought these systems but not specifically for safety reasons because their primary function is to allow improvements of efficiencies in aircraft maintenance, repair and operations by assisting in identifying aircraft components that are not performing at optimum levels and either require servicing or replacement. Jean-Louis Larmor, Chief Operating Officer of Star said: “As the World looks on yet again as search and rescue personnel attempt to locate a downed airliner, we emphasize the need to have as much precise information immediately available after an incident as possible, in order to locate the wreckage, organize the possible rescue, understand what happened and, hopefully, to learn from it.� The reality is that until these systems are made a legal requirement for all passenger aircraft, every time an aircraft goes down over the ocean we will be right back in this position once again, with families waiting weeks, months or even years to learn what happened to friends, family members or loved ones. Do we not owe it to them? Tony Kingham Editor

www.cip-asia.com

www.cipre-expo.com


INDUSTRIAL SECURITY

Rising demand for Industrial Security Systems

The origin of industrial security systems dates back to the early 1880s. Locks and vaults served as the most basic methods of protecting valuable items. During the early 1990s, analog cameras and electromagnetic alarm systems came into existence. Invention of these security systems marked the inception of the industrial security systems. By the end of 1990s, industrial security systems were being used by the defense and homeland security forces in the U.S. and several European countries such as the U.K., and Germany to strengthen the national security of their countries. currently, security systems are being deployed in various applications to mitigate risks against criminal activities,

4 - World Security Report

injury, fire, natural disaster, damage, and terrorism. Installation of security systems such as biometric access control systems, video surveillance systems, intrusion detection systems, fire-safety systems, and evacuation systems are very important for these industries to minimize the risks of such activities. Installation of security systems in government buildings, public infrastructure, factories, commercial office spaces, entertainment infrastructure, hospitality buildings, public transport etc., has become crucial to ensure the safety of such premises. The rapid growth in the construction of government buildings, several small scale and large scale factories, commercial office spaces, entertainment infrastructure, and hospitality

www.worldsecurity-index.com


INDUSTRIAL SECURITY

buildings among others warrants the need for the installation of state-of-the-arts industrial security systems in such establishments. The market for access control systems and intrusion detection systems has been growing rapidly in countries such as the U.S., France, U.K., Germany, UAE, and Australia. The development of new security products, such as biometric and RFID systems has contributed to the growth of the market. The development and usage of security systems in various parts of the world varies by region. Growth of the industrial security systems market in the underdeveloped countries and the emerging countries is very sluggish. This is due to the fact that the usage of contactless cards, locks, and man intensive security measures are still the most prominent methods of access control in these countries. Moreover, security systems are a mandate across all types of industries in various countries. The significant economic growth in countries such as Saudi Arabia and China has also been driving the demand for such products. Due to the above reasons, leading suppliers of security systems foresee these countries as lucrative markets. Hence, the industrial growth in a particular region indirectly aids the demand for industrial security systems market. Most of the key manufactures and the top market players which manufacture industrial security systems are located in the North American region. The North American region is therefore, likely to dominate the global industrial security systems market since the region is highly prone to terrorist threats, thereby necessitating the need for a continuous upgrade and development of newer security systems. The manufacturers of industrial security systems have been investing hugely in the research & development of highly sophisticated industrial security systems, but are lagging in terms of promoting these products adequately. This hinders the growth of the market for such products and limits the profitability of the manufacturers of such systems. For instance, RFID tags can be used for efficient management of vehicles and personnel monitoring along with being an economical and portable option. However, the demand for RFID tags is very low in the market due to widespread awareness regarding the benefits of the same.

security products. Elevated threats to infrastructure have necessitated the development of new and improved security systems. Over the past decade, industrial security systems have become crucial in protecting resources. Technological advancements in the industrial security systems serve as a major driver, enabling growth opportunities for this market during the forecast period. Technological advancements in the field of industrial security systems have grown rapidly over the past decade such as the development of advanced intrusion detection systems. These systems can be integrated with body heat detector technology and have opened up new growth avenues for the industrial security systems market. Moreover, the invention of video analytic systems that are capable of providing long-range infrared or visible wavelength detection, coupled with image discrimination has also fueled the demand for industrial security systems. Although most of the industries rely on the conventional physical alarm systems, video monitoring,

The high cost of technologically advanced security system stands out as another of the major restraints hindering the demand for such systems among end-users. Although there is a need for security solutions, various end-users tend to opt for cheaper alternatives products due to budgetary constraints. This has led to the launch of various cost-effective products suited to small scale industries, schools, colleges, hospitals, and hotels by vendors of

www.worldsecurity-index.com

World Security Report - 5


INDUSTRIAL SECURITY

and manual response relays for monitoring infrastructure, a new suite of technologically advanced remote network monitoring systems is expected to enhance the attributes of industrial security systems over the coming years. Remote monitoring systems can monitor, analyze, and troubleshoot security threats from a distance. These systems enable operators to confront an intruder from a safe zone with the help of cables, internet, and phone as an aggregated set-up. Presently, this technology is in the growth phase and it is expected that security products would be increasingly integrated with remote monitoring systems. Another development pertaining to this sector has been the increase in demand for biometric access control systems, which has been rising steadily in the

industrial security systems market. This is indicative of the trend of biometric physical access control systems replacing conventional security systems which typically involved the usage of conventional identity cards for accessing a particular area. Biometric systems are being preferred as they enable the access to control systems through touch of finger, scan of eye, or swipe of 2D barcode cards, thereby eliminating the burden of storing multiple passwords. Currently, various biometric solutions designed for many different levels of security needs are available in the market, ranging from a single biometric turnstile in a small organization to large government establishments requiring biometric identity authentication for every computer and access point. The industrial security systems market is highly competitive, with a large number of global and local market players. The strategies adopted by industry players to expand their global presence and increase their market share include partnerships, agreements, collaborations, and new product launches. The aforementioned trends are indicative of the growth potential of the market for industrial security systems. by Amrita Pandey - MarketsandMarkets MarketsandMarkets is world’s No. 2 firm in terms of annually published premium market research reports

The Homeland Defense and Security Database

WorldSecurity-Index.com is the only global homeland security directory published in English, Arabic and Spanish on the web and in CD network format. 6 - World Security Report

The Global Security Portal

Advertise on WorldSecurity-Index.com from only ÂŁ515 for 12 months

Contact info@worldsecurity-index.com for details www.worldsecurity-index.com or call +44 (0) 208 144 5934.


CYBER SECURITY

Securing Connected & Embedded IoT investments, End-toEnd

With embedded systems in the power industry, security is typically an afterthought. This resource-driven constraint usually leaves organizations in the automation and infrastructure industry susceptible to cyber-threats that can drain revenues and endanger lives.

The Internet of Things (IoT) is driving massive growth in connected embedded devices which, in turn, is spurring new cyber-attack vectors. In the face of IoT-driven vulnerabilities, a fresh look at best practices is warranted for utilities and other organizations that rely on embedded devices for day-to-day operations. IoT & the new network-security landscape for embedded systems The threat landscape today has changed dramatically

www.worldsecurity-index.com

with IoT. The convergence of computers and connectivity everywhere means we are now enabling computers to interact with our daily lives without us even knowing it. The era of the network perimeter is gone. Critical Infrastructure (Cl) systems such as heating, ventilation, and air conditioning (HVAC) systems, generators, pumps, motors, light bulbs, temperature sensors and the like are increasingly connected networks. Each new technology innovation always brings unforeseen consequences. For the loT, we are deploying computers

World Security Report - 7


CYBER SECURITY

controllers - programmable logic controllers (PLCs) -- and other automated systems driving plant equipment.

to power our everyday lives in new ways, and with no direct human interaction. The consequence is increased cyber-risk. If you can reach out and touch those things that matter to you, hackers can as well. Of chief concern is that we’re connecting devices everywhere with little or no security. Businesses and individuals worry most about others stealing private data. In fact, with all of these computers connected together as part of the loT, there may not be a great deal of personal financial information to steal. There is, however, significant damage that can be done. Today’s cybersecurity technologies are focused almost entirely on the enterprise or home PC. These are computers are running antivirus software with their own firewalls, but the critical loT endpoints that connect the cyber to the physical world do not run any of these technologies. Manufacturers and process automation plants must embrace the necessity of additional security Economics are critical, of course, in the industrial sector where competition is fierce, regulators often are unforgiving, and margins may be thin. Effective operations lead to more efficient output, particularly in oil and gas or utilities. Efficiency derives from automation. Process automation is a huge industry, and we increasingly see

When implementing proper cyber security, the approach must be holistic if it is to be comprehensive. Owners and operators must address all avenues in and through the network. This means taking into account endpoints when devising systems and cyber security programs and purchases. There is no point in securing the front door when the back window is wide open. Doing so merely drives an attacker from the strongest point of defense to the weakest, most unguarded area. It is necessary to think about the entire infrastructure - the technical side, as well as management and operations. The effective cyber safety net shelters people, devices, networks, and data from within as well as externally. Industrial facilities typically deploy both information technology (IT) and operational technology (OT), which often operate separately. The IT side implements high-end enterprise cyber security. OT focuses on efficiency and safety.

and secured, authenticated and validated, to ensure that data is consistently and reliably transmitted, unaltered, only to intended recipients. Most of us secure our PCs even though our broadband providers and ISPs offer firewall protection. Our operating systems also include security yet most of us, and all IT departments, add security to individual machines. Doesn’t it make sense for industrial plants to take the same approach with their networked automation systems? Today, very few are doing so. There must be a balanced assessment when considering the costs of security versus the true cost of losses from downtime, repairs, broken work flows, and more when manufacturers forego comprehensive industrialcontrol security. These losses can be staggering. More than one study has put the cost for resolving a single significant attack as high as $1 million. When human life is in the balance, as it is daily with the critical-infrastructure industries, the costs escalate considerably and are far harder to quantify in dollars. By Frank Ignazzitto, Ultra Electronics, 3eTl

Cyber security must be in place as part of a unified, end-to-end architecture. Every device on the network must be identified

8 - World Security Report

www.worldsecurity-index.com


including Critical Information Infrastructure Protection

5th-6th October 2016 Bangkok, Thailand www.cip-asia.com Co-Hosted By:

Save with the Early Bird

Department of Disaster Prevention & Mitigation

Developing resilient infrastructure for a secure future Confirmed speakers include: - Peter O’Neill, Chief of Transport Policy and Development Division, UNESCAP - Thomas Wuchte, Head of Transnational Threats Department/Action Against Terrorism Unit, OSCE - Kamal Thalib, Head of Financial Crime & Security Services, PT Bank DBS Indonesia - Shamika Sirimanne, Chief of Division, Information and Communications Technology and Disaster Risk Reduction Division, UNESCAP - Dr. Peeranan Towashiraporn, Director, Asian Disaster Preparedness Center - Kumpol Sontanarat, Director, Information and Communication Technology Department , Securities and Exchange Commission (SEC), Thailand - Air Chief Marshal Somneuk Swatteuk, Senior Expert, National Disaster Warning Center, Thailand - Zahri Yunos, Chief Operating Officer, Cybersecurity Malaysia - Dr. Mohammad Shahir, Senior Consultant, THALES E-Security, Malaysia - Hansen Chan, Product Marketing Manager, Nokia, USA Discover the latest challenges, stratgies and solutions for protecting ASEANs critical national infrastructure Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. Book your delegate place today and save with the Early Bird delegate rate book your place online at www.cip-asia.com/onlinereg

Securing ASEANs critical national infrastructure

Owned & Organised by:

www.worldsecurity-index.com

Supporting Organisations:

How to Exhibit Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Asia please contact: Suthi Chatterjee Exhibit Sales Manager (Asia) PRMC Thailand Tel: +66 2 247-6533 Fax: +66 2 247-7868 Mobile: +66 (0) 87-060-5960 E: suthi@prmcthailand.com Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Jake Addison Exhibit Sales Manager (ROW) T: +44 (0) 7545 977741 E: jakea@torchmarketing.co.uk

Media Partners:

World Security Report - 9


CYBER SECURITY

Collaboration on Critical National Infrastructure Cybersecurity Key to Minimising UK Economic Risk According to New Study New study by University of Cambridge Centre for Risk Studies and Lockheed Martin estimates the economic impact of a sustained cyberattack on UK’ critical infrastructure.

A significant cyberattack across the UK’s critical national infrastructure could have far-reaching and significant economic impacts for Britain according to a study carried out by the Cambridge Centre for Risk Studies at the University of Cambridge Judge Business School. The report, developed in conjunction with Lockheed Martin, Integrated Infrastructure: Cyber Resiliency in Society, models the potential impact of a coordinated and sustained cyberattack on one of the UK’s regional power distribution networks and the likely short and long term costs to the UK economy. The report outlines a fictional scenario in which a cyberattack is executed by a disgruntled employee of a distribution network operator with the backing of a nationstate adversary. Disruption is achieved by installing rogue

10 - World Security Report

hardware in a minimum of 65 vulnerable substations in South East England (this attack footprint is expanded to 95 and 125 substations in increasingly extreme variants of the scenario). This rogue hardware empowers the cyber adversaries to trigger rolling blackouts across the region during the winter season, shutting down parts of the London area and impacting all aspects of the UK economy. Justin Walker, vice president for Lockheed Martin’s Information Systems business in the UK and Europe, outlined: “As our critical national infrastructure becomes increasingly interconnected, the risk and cost of a potential cyberattack gets exponentially larger each and every day. Through increased collaboration, government, industry, regulators, and the wider technology industry all have a role to play ensuring the UK economy is resilient to cyberattack.”

www.worldsecurity-index.com


CYBER SECURITY

Key findings from the report include:

Simon Ruffle, Director of Technology and Innovation at the University of Cambridge’s Centre for Risk Studies added: “By better understanding and quantifying the consequences, both economic and societal, of a severe cyber hazard on our country’s critical infrastructure, we underline the level of responsibility amongst each of the key stakeholders in this value chain. Through hyperconnectivity, we have created fantastic opportunities for smarter infrastructure use that also bring with them a complex set of cyber risks for the foreseeable future.” The researchers at Cambridge Centre for Risk Studies consulted widely with stakeholders across the UK power industry as well as government and industry regulators throughout this study. The report does not predict an attack or seek to expose weaknesses in the power grid but rather present likely conclusions that are representative of the impact of the scenario.

By modelling a sustained and coordinated cyberattack on the power distribution network in South-East England, the report underlines the subsequent impact for other key industry sectors including Financial and Professional Services, Retail, Construction, Transportation, Education and Health. In the most conservative scenario, the immediate impact to the UK’s economic output is £12 billion, with the five year GDP impact of £49 billion. In the most severe case, these figures increase to £85 billion and £442 billion respectively. In the latter case, this represents approximately 2.3% of the UK’s GDP over the period. • Scenario variants and rectification timescales range from rapid response (3 weeks until full power restoration), average response (6 weeks restoration) and slow response in the most extreme scenario (12 weeks restoration). • In the most conservative scenario an estimated 9 million people are hit by the blackouts, 800,000 individual train journeys and 150,000 air passenger tickets are impacted daily. In the most extreme scenario these impact rises to 13 million affected, with 1 million and 330,200 rail and air travel tickets cancelled. • Economic losses are in the range of £12 billion to £85 billion across the scenario variants with the overall five year GDP impact (GDP@Risk – the expression of potential GDP lost in the scenario when compared to the baseline economic forecast) ranging from £49 billion to £442 billion. • Financial Services (£1.3 billion losses in the standard scenario), Retail (£1.3 billion), Real Estate (£1.2 billion) and Professional Services (£1 billion) are the most significantly affected industries in terms of immediate economic losses. The remaining £7.2 billion in losses is spread over another 19 industry sectors

www.worldsecurity-index.com

World Security Report - 11


OPINION

Closing the security gap! by john Donlon QPM, FSI, Chairman of the International Association of CIP Professionals and former Director of ACPO Prepare & Protect. With most of our critical infrastructure in the hands of commercial entities, the need for public-private sector cooperation and the timely sharing of information are key factors to enabling an effective and efficient security regime. Some progress has been made at a national level, for example within the United States there is the National Protection and Programs Directorate’s Office of Infrastructure Protection (IP) which leads the coordinated national effort with public and private sector critical infrastructure partners seeking to enhance the security and resilience of the nation’s critical infrastructure. Other countries like the United Kingdom have, over a number of years developed information exchanges through the Centre for the Protection of National Infrastructure (CPNI). CPNI facilitates such exchanges which allow companies to learn from the experiences, mistakes and successes of others, without fear of exposing any individual company sensitivities. This is an excellent initiative and one that I was personally involved in when leading national UK policing activity on the protection of our infrastructure. Information exchanges share information primarily in relation to cyber attack, and, depending on relevance to

12 - World Security Report

the purpose of the exchange, on vulnerabilities relating to physical and personnel-related threats. The key to the success of information exchanges is trust and trust takes time to build. The first of these exchanges took place in 2003 and has developed significantly since then and now involves a wide range of industry sectors such as; Aerospace and Defence, Financial Services, Civil Nuclear Sector, Communications Industry and many others. The US and UK are just two of many country specific examples out there, however, in a global economy with so much of our infrastructure owned and operated by multi-national companies the problem is not just country specific, it’s international. These companies operate on global networks acquiring, sharing, storing and managing information from all corners of the world.. They move personnel, goods and services daily between countries. Yet very little seems to have been done formally and in a structured way to encourage or create a mechanism to collaborate internationally, to share information on security issues across all our borders as well as across public-private entities. Computer viruses like natural viruses are no respecters of national borders or industry boundaries and as we all know criminals and terrorists actively exploit the lack of international co-

operation to help them achieve their aims. Therefore, until we start cooperating and sharing information more effectively across international borders there is a gap in our security will always exist. Here at the IACIPP we see it as our core mission to encourage and facilitate the development of that international co-operation and information sharing. We are at the early stages of our own development as an international association and are starting to build a global network which will enable industry professionals, government agencies and academic institutions to share ideas and good practice in the pursuit of greater connectivity across the arena of infrastructure and information protection. We already have some initiatives in place with events such as; Critical Infrastructure Protection & Resilience Asia 2016 and Critical Infrastructure Protection and Resilience, Europe 2017. We are also seeking to identify and support a range of accredited education programmes and are about to launch a global extranet for CIP stakeholders. These are just the first of many initiatives that we hope to deliver. It is our firm belief that such events and programmes along with the help of other like minded individuals and organizations can go some way to start to close that security gap.

www.worldsecurity-index.com


PHYSICAL SECURITY

The growing fear of a physical security incident

The Business Continuity Institute recently published its annual Horizon Scan Report – a report that looks at what the biggest concerns are to business continuity professionals across the world – and yet again it showed that the greatest of those concerns is a cyber attack. In fact, all of the top three concerns relate to IT infrastructure with data breach coming second and IT/telecoms outage coming third.

Perhaps that is not surprising considering the increasing likelihood there is of such an attack taking place. One study carried out last year by NTT Com Security (Risk:Value Report 2016) indicated that two-thirds of organizations predicted that they will suffer a data breach at some point in the future.

www.worldsecurity-index.com

What was a surprising finding in the Horizon Scan Report was the rise of physical security as a major concern for organizations, with security incident such as vandalism, theft, fraud or protest moving from sixth place in 2015 to fifth place this year, and act of terrorism moving from tenth place to fourth. Of course it needs to

be borne in mind that the events in Paris at the end of the year will still have been fresh in peoples’ minds, and will have got them thinking about what impact an act of terror could have on their organization. You don’t need to be targeted directly to be disrupted by a

World Security Report - 13


PUBLIC SECURITY

www.cip-association.org

Join the Community and help make a difference Dear CIP professional I would like to invite you as an infrastructure operator or related government agency representative to join the International Association of Critical Infrastructure Protection Professionals a newly formed body that seeks to encourage the exchange of information and promote collaborative working internationally. As an Association we aim to deliver discussion and innovation – on many of the serious Infrastructure - Protection - Management and Security Issue challenges - facing both Industry and Governments. The ever changing and evolving nature of threats, whether natural through climate change or man made through terrorism activities, either physical or cyber, means there is a continual need to review and update policies, practices and technologies to meet these growing and changing demands. Our initial overall objectives are: • To develop a wider understanding of the challenges facing both industry and governments • To facilitate the exchange of appropriate infrastructure & information related information and to maximise networking opportunities • To promote good practice and innovation • To facilitate access to experts within the fields of both Infrastructure and Information protection and resilience • To create a centre of excellence, promoting close co-operation with key international partners • To extend our reach globally to develop wider membership that reflects the needs of all member countries and organisations For further details and to join, visit www.cip-association.org and be amongst the first to shape the future of this increasingly critical sector of national security. We look forward to welcoming you.

John Donlon QPM, FSI Chairman IACIPP


PHYSICAL SECURITY

security incident or an act of terror, any organization in the vicinity of such an event has the potential to be disrupted. When the hostage situation was taking place at the Lindt Café in Sydney, many offices in the surrounding area had to be evacuated. Whatever the crisis, it is essential that organizations have plans in place to be able to deal with the consequences. With physical infrastructure, whether the cause is a fire, flood, or act of terror, if the building is out of action then you need to ensure there are plans in plan to work elsewhere. Is there a nearby workspace that can be used instead, or can staff work from home? The technology that is available, either by enabling employees to log in to the server remotely or by using the cloud,

New York City after Superstorm Sandy, can the important work be transferred to a separate location but within the same organization. Again it comes down to ease of access to data, and perhaps size of organization. Smaller organizations may have less flexibility to absorb any disruption, and are less likely to have back-up facilities that could be used. On the other hand, the smaller the organization, the less its requirements will be, so it may have more flexibility to relocate elsewhere. Regarding digital infrastructure, it doesn’t matter whether it’s a cyber attack or a power failure, if the IT is out of action then you need to have plans in place to manage through this. Can it be replicated elsewhere? There are many data replication solutions available that can migrate all of your data to a

“Whatever the crisis, it is essential that organizations have plans in place to be able to deal with the consequences.” makes this a perfectly feasible solution without too much disruption. If the disruption is on a much wider scale, for example

secondary system, removing the potential single point of failure that could result in you losing all of your data in the event of an IT

disaster. With the increasing use of the cloud, in theory people should be able to uproot themselves and move virtually anywhere to get their work done, and in office based environments, this is certainly the case. Disruptive events will always occur, whatever form they may take. By having an effective business continuity programme in place, it should mean that, in the event of an incident, a drama doesn’t turn into a crisis. For more information on business continuity, visit the website of the Business Continuity Institute at www.thebci.org Andrew Scott CBCI is the Senior Communications Manager at the Business Continuity Institute who joined after a brief stint working as the Press Officer for a national health charity. Prior to that he had over ten years at the Ministry of Defence working in a number of roles including communications and business continuity. During this time he also completed a Masters in Public Relations at the University of Stirling. Andrew has successfully taken the Certificate of the BCI exam which he passed with merit.

www.worldsecurity-index.com

World Security Report - 15


EVENT PREVIEW

Developing resilient infrastructure for a secure future

Today’s modern economies and improving living standards rely more and more on the development and security of a country’s critical infrastructure. How would your country cope in the event of a dirty bomb or if it suffered a natural or man-made disaster impacting on its key infrastructure?

Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, creating uncertainty and insecurity on critical national infrastructure. Climate change has also seen more extreme weather patterns,

16 - World Security Report

creating additional hazardous, unseasonal and unpredictable conditions and a severe strain on infrastructure. A terrorist attack, or the impact of a natural disaster against key

national infrastructure could have a catastrophic impact on the country and regions economy. The proper functioning of a nations critical infrastructure is vital to the interests of any society. At this year’s Critical Infrastructure

www.worldsecurity-index.com


EVENT PREVIEW

Protection and Resilience Asia leading experts from around the world will discuss the threats both in the physical and cyber domains and how to mitigate those threats. If you are responsible for national security and emergency/ contingency planning, facilities management in Nuclear, Power, Oil and Gas, Chemicals, Telecommunications, Banking and Financial, ISP’s, water supply, whether you’re an IT, Cyber Security or Information Manager, or responsible for transport security (port or airports), then the conference is a MUST ATTEND for you, and unique in its content and delivery. Critical Infrastructure Protection & Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. The conference will look at developing existing national or international legal and technical frameworks, integrating good risk management, strategic planning and implementation. Key plenary sessions in the conference include: Collaborative Approach to CIP and CIIP

Since last years Critical Infrastructure Protection & Resilience Asia, the region has seen a number of threats to its infrastructure, including: - Myanmar floods - July 2015 - Bangkok bombing - August 2015 - Philippines attacks - December 2015 - South Indian floods - December 2015 - ISIS expands in Southeast Asia - January 2016 - Shizunai earthquake, Japan - January 2016 - Jakarta bomb attacks - January 2016 - India terrorist attacks - February 2016 - Pattani car bomb, Thailand - February 2016 - Muara Siberut earthquake, Indonesia - March 2016 - Narathiwat bombing, Thailand - March 2016 - Philippines bombing - March 2016 - Kumamoto City earthquake, Japan - April 2016 - Philippines bombings - April 2016 - Thailand bombings - April 2016 and individual departments, becomes increasingly important. How can we work better together for common purpose, resource sharing and intelligence gathering to deliver better value for the tax payer and greater success in delivering security & resilience to our Critical National Infrastructure, and improving disaster risk reduction. Insider Threat and The Human Asset Critical National Infrastructure can only be successfully run and

secured by people and often they are the forgotten element within planning the security of CNI. People are the most valuable asset in any organisation, but may also be your most significant vulnerability. How can you ensure systems are in place to ensure your most valuable asset is not your biggest threat? How can human assets be enhanced to add value and security? What identity management & access control strategies need to be implemented to ensure integrity and legitimacy of personnel?

As the lines and responsibilities between CIP and CIIP become increasingly blurred in many areas, a holistic approach to protection of CNI, from both physical and cyber security perspectives is increasingly important. To this nature the collaboration between agencies and CNI operators,

www.worldsecurity-index.com

World Security Report - 17


EVENT PREVIEW

Other high profile speakers confirmed include: – Peter O’Neill, Chief of Transport Policy and Development Division, UNESCAP – Thomas Wuchte, Head of Transnational Threats Department/Action against Terrorism Unit, OSCE – Dr. Peeranan Towashiraporn, Director, Asian Disaster Preparedness Center – Dr. Mohammad Shahir, Senior Consultant, THALES E-Security, Malaysia – Dr. Yunyong Teng-amnuay, Director, Information Systems Engineering Laboratory, Department of Computer Engineering, Faculty of Engineering, Chulalongkorn University, Thailand Risk Based Approach to CIP

– Zahri Yunos, Chief Operating Officer, Cybersecurity Malaysia

Designing and improving security operations requires keeping a balance between business needs and security requirements. How can using a risk based approach enhance business continuity and can policies and practices of national infrastructure, including those operated by governments, be capable of adapting to the changing security and threat environment?

– Shamika Sirimanne, Chief of Division, Information and Communications Technology and Disaster Risk Reduction Division, UNESCAP

Disaster Prevention & Management in CNI Disasters cause serious disruption of the functioning of a community or a society, whether from Environmental emergencies, Natural disasters, Complex emergencies or Pandemic emergencies. A disaster in relation to Critical National Infrastructure can have additional impact on society and the economy of a country by reducing its resilience in mitigating environmental and economic impact. In this session Disaster Management, the organisation and management of resources and responsibilities for dealing with all aspects of

18 - World Security Report

– Kamal Thalib, Head of Financial Crime & Security Services, PT Bank DBS Indonesia – Air Chief Marshal Somneuk Swatteuk, Senior Expert, National Disaster Warning Center, Thailand – Senior Representative, Department for Disaster Prevention & Mitigation (DDPM), Thailand – Mr. Kumpol Sontanarat, Director, Information and Communication Technology Department , Securities and Exchange Commission (SEC) Thailand – Dr. Dhanant Subhadrabandhu, Executive Vice President (Product Development Group), CAT Telecom Public Company Limited, Thailand – Megat Muazzam, Head of Malaysia CERT, Malaysia emergencies, in particular preparedness, response and recovery, will look at the Disaster risk reduction and management, Impacts of and response to disasters and Post-disaster recovery. MINISTERIAL OPENING KEYNOTE Critical Infrastructure Protection & Resilience Asia once again boasts the endorsement of the Ministry of Information & Communication Technology, Ministry of Interior Department for

Disaster Prevention & Mitigation and Ministry of Transport, with Dr. Uttama Savanayana, Minister of Information and Communication Technology for Thailand scheduled to deliver an opening keynote presentation on Wednesday 5th October. Further details with be announed soon on the full programme, but information can be found at www.cip-asia.com where you can currently register as a delegate and benefit from the Early Bird discounts. Register online at www. cip-asia.com/onlinereg.

www.worldsecurity-index.com


BORDER SECURITY

REPORT

For the world’s border protection, management and security industry policy-makers and practitioners

VOLUME 2 MAY / JUNE 2016

COVER STORY

CAN WE STOP THIS ILLEGAL TRADE?

T R A IN ING AGENCY NEWS S H O RT RE P O RT I N D U S T RY N E W S

Becoming the “best Border Force in the world” p.14

A global review of the latest news and challenges from border agencies and agencies at the border. p.9

Technologies can aid effective border control p.6

Latest news, views and innovations from the industry. p.18


2

COMMENT

As one door closes! It would seem that the deal with Turkey is bearing fruit for the European Union with migration traffic across the Aegean and through the Balkans slowing down dramatically. However, like flood water, as soon as you stop the flow in one place it will increase in another.

the problems that will have for generations to come. Already, the migration crisis is the cause of huge dissent within the EU and may well be the primary cause of a UK exit.

Now it seems that the migrant traffic across the far more dangerous Libya to Italy route is once again the main route for migrant traffic. According to the Italian Coastguard they have rescued 5000 migrants in only 24 hours and the problem is set to increase as the weather improves.

In short, Europe needs an active and robust foreign policy towards solving these conflicts, with all the resources that that entails and robust and European wide migration policy.

However, unlike Turkey, with which the EU are able to deal there is no functioning government or state apparatus with which to do business or to enforce an agreement should a deal ever be done. So we have a situation in which traffickers can operate unhindered, piling men, women and children into unserviceable boats with just enough fuel to get them outside Libyan waters where EU agencies have no choice but to continue with what has become one big search and rescue mission and the more rescued, the more will come. The Germans are talking about a deal with Libya similar to that of Turkey but with at least 3 groups fighting each other in Libya, who do you talk to. They are also keen promote the quota system so that all European countries take a proportional number of migrants. But this does nothing to address the reason for the migration crisis in the first place and probably has the effect of encouraging more migration with all

Border Security Report | May/June 2016

The reality is that until the conflicts in Libya, Syria and Iraq are brought to some sort of conclusion there will be no end to the migration crisis. Even then, whilst it may stop the flood of refugees from those countries, many of the migrants are actually economic migrants from impoverished African nations simply looking for a better life.

So, no solution anytime soon! Tony Kingham Editor


CONTENTS

3

CONTENTS 4 The illegal ivory trade With over 60% of African elephant deaths in the hands of the poachers, the illegal ivory trade is decimating the population, all in aid of fulfilling the illegal organised trade in ivory in Asia,

7 technologies can aid effective border control How to Leverage Leading-edge Strategic Solutions to Alleviate the Current Global Aviation Security Pressures and Burdens of Effective Controls.

»»p.7

9 AGENCY NEWS A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border.

14 TRAINING Border Force is a world leader in UK Border Force’s vision to become “best Border Force in the world” took a step closer in March with the opening of a brand new, purpose built, specialist Search of Vehicle Freight Training Centre. »»p.4

»»p.17

17 industry news Latest news, views and innovations from the industry.

»»p.14

Border Security Report | May/June 2016


4

SHORT REPORT

CAN WE STOP This illegal trade?    by Tony kingham

Whilst the world’s governments struggle with the very real human tragedy caused by the conflicts in the Middle East, with its collateral effects of mass migration and international terrorism, another very real tragedy is being played out right across Africa with the systematic annihilation of one of the world’s most precious and iconic creatures, the African elephant.

African elephant tusks, part of the illegal ivory trade, .

Border Security Report | May/June 2016

The Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) estimated that in 2013, more than 20,000 African elephants were killed for their ivory tusks. In 2014, the numbers were virtually the same and an estimated 36,000 were killed in 2015. More than 60 per cent of carcasses surveyed across the continent in


SHORT REPORT

2014 proves that the elephants died at the hands of poachers. According to CITES, anything more than 50 per cent sends elephant numbers into decline and conservationists have warned African elephants could be extinct in the wild within a few decades if poaching is not stopped. In East Africa, statistics from Tanzania are most shocking. The elephant population in that region has been reduced by more than half in the past five years. In Central Africa, the situation is even worse, central Africa’s elephant population has been lost during a ten-year period beginning in 2002, according to the U.S. National Academy of Sciences The trade for ivory is driven by the demand in Asia and especially China, where ivory is seen as a symbol of wealth, power and prosperity and also said to be an aphrodisiac. A few experts argue that making the ivory trade legal will regulate the trade, keep prices down and therefore stop poaching, but as more and more Asians are able to afford luxury goods like ivory, the greater will be the demand. So limited supply and increasing demand will add up to increased prices anyway and more poaching will mean that there will never be enough elephants in Africa to meet demand.

has any business in trading in ivory, for this trade means death of our elephants and death of our natural heritage.” This simple statement really says it all. He has said he will lead calls for a “total ban on the trade of elephant ivory” at the CITES (Convention on International Trade on Endangered Species) conference in South Africa in September 2016. But for the foreseeable future the poaching goes on and in ever increasing numbers. Poachers all over Africa are using military tactics and weapons such as AK47’s, machine guns and even helicopters to slaughter not only elephants but all types of endangered species including Rhino’s. In 2012, in one of the worst atrocities, a group of 50 to 100 Sudanese and Chadian poachers crossed the border into Cameroon’s Bouba Ndjida National Park on horseback and using automatic assault weapons, shotguns and even rocket propelled grenades (RPG) killed as many as 650 elephants.

5

These poachers are thought to be a tribal clan of Rizeigat, affiliated to the Janjaweed, a militia that operate in Darfur region western Sudan. They were well organised, breaking down into smaller groups, following herds and killing all the members of the herd, including the babies. Due to the positions the corpses were found in, the animals are thought to have been mostly alive as they had their tusks cut out with machetes and had other parts of their faces and ears cut off as trophies. Park rangers all over Africa are getting involved in firefights with heavily armed poachers and significant numbers are being killed each year. The David Sheldrick Wildlife Trust estimate that 1000 rangers and soldiers have been killed in the last 10 years. In the Congo’s Garamba Park a total of 11 rangers and Congolese soldiers have been killed during anti-poaching missions in the past year alone.

In Kenya recently the Kenyan government held an anti-poaching conference and burnt 100 tonnes of ivory, stacked up in pyres in Nairobi National Park as a statement of intent. President Kenyatta said: “No-one, and I repeat no-one,

Border Security Report | May/June 2016


6

SHORT REPORT

African governments are fighting what is in essence a low intensity insurgency campaign, only this one is not for religious or political motives, this is purely a ‘for profit’ enterprise. The problem is that the responsibility for waging this war falls to some of the poorest countries in the world with already hard pressed resources.

vehicles, weapons and communications equipment are also needed but probably most important of all, military assistance and training packages. These sorts of measures will not

stop the poaching completely. But they may give the elephants time they need to survive, whilst we work to finally get a total ban on all trade in ivory and educate the ‘customers’ about the wickedness of the trade their purchases underpin.

Wildlife is a global heritage and should be seen as such. Organisations like the UN should be more actively involved in their protection even deploying troops where necessary. If just a tiny fraction of the resources that are used in the fight against terror are used in the fight for the survival of these magnificent creatures, it would have a tremendous impact. For instance, if all the major parks had some air assets, in particular helicopters, blimps or drones. Military

AFRIPOL Police Cooperation Group Holds First Planning Meeting The African Union Commission recently held a meeting on the launch of the African Union Mechanisms for Police Cooperation (AFRIPOL). The participants included the Chairperson and representative of the Southern African Regional Police Chiefs Cooperation Organization (SARPCCO) and the East African Police Chiefs Cooperation Organization (EAPCCO), respectively. Other regional police and law enforcement cooperation organizations, including the ASEAN Chiefs of Police (ASEANAPOL), the European Union’s law enforcement agency (EUROPOL) and the

Border Security Report | May/June 2016

International Criminal Police Organization (INTERPOL) participated at the meeting. The AU Commission and the African Center for the Study and Research on Terrorism (ACSRT) were also represented. Algeria participated as host of the AFRIPOL Secretariat. The meeting was intended to provide an opportunity for AFRIPOL to learn from the experiences and best practices in police cooperation from the other police cooperation organizations, as part of the steps towards the full operationalization of AFRIPOL in 2017.


TECHNOLOGY

7

tECHONO LIGIES CAN AID EFFECTIVE BORDER CONTRO L

How to Leverage Leading-edge Strategic Solutions to Alleviate the Current Global Aviation Security Pressures and Burdens of Effective Controls

The recent global crisis surrounding the mass movement of irregular migrants has highlighted the need for countries to update their immigration policies and procedures in

regard to how they process travelers who arrive on their nation’s doorstep. In response to this crisis, the velocity and tone of the discussion on the issue of border control and immigration has shifted radically to the point that merits of free trade and traffic agreements are being questioned. Consequently, the future of the Schengen Agreement in the European Union (EU) is being debated by Member States, many of which perceive the removal of border controls as the source of new external security threats. This concern is also the case for other trade and border agreements, including the Central African Economic and Monetary

Border Security Report | May/June 2016


8

TECHNOLOGY

Community (CEMAC). As world leaders discuss various ideas and methods to address the causes of this crisis and as they reform their immigration policies, each country needs to consider how to integrate 21st century leading-edge technology into their security infrastructure in order to restore national security without compromising their humanitarian considerations, cultural pluralism, or abandoning their free-trade agreements -- any of which could have unintended consequences. One of the greatest obstacles facing the global security community is the inconsistent application of strategic risk assessment tools and the lack of real-time access to domestic and international databases for use in passenger identity management, immigration control, and profiling. While all countries use and recognize passports as an international identification document and make an effort on some level to verify, record, and track international travelers, passports are being forged and identities stolen with increasing sophistication. Databases such as Interpol’s Stolen & Lost Travel Document (SLTD) are checked regularly at most European airports, but the majority of airports around the world do not perform any data checks whatsoever.

this lax process is a further gap in global security. International security databases must be checked on a real-time basis in order to be of use, and regular risk assessments of all travelers must be performed consistently at the time of both departure and arrival in order to comprehensively improve global security. One of the most effective ways to address these glaring gaps in border security is to implement the use of self-service, fully automated immigration and customs clearance kiosks that provide all the functionalities of a manned immigration processing station. The deployment of such automated systems has the added benefit of streamlining the process of clearing arriving travelers and reducing operating costs while improving security. Immigration and customs kiosks are equipped with multimodal biometric scanners that combine fingerprint scanning, iris scanning,

Many nations focus their resources on the risk assessment of travelers arriving into their countries and are not concerned with screening those departing. Compounding this security gap is the fact that immigration agencies in most countries only conduct ad hoc checks against watch lists and criminal databases, more often than not long after a traveler has arrived or departed, if at all. The net result of

Border Security Report | May/June 2016

facial recognition and travel document authentication can dramatically improve the level of border security around the world. When embedded into existing security infrastructures around the globe, such kiosks can access international databases and identify individuals in real-time, expanding the scope and application of positive identification and tracking of travelers, and mitigate the variable reliability of human assessment techniques. The strategic deployment of multimodal biometric scanners to confirm and positively identify individuals along with travel document authentication technology can minimize the use of stolen and false identities. Kiosks should ideally run positive biometric identity verification and issue veiled alerts to authorities if clearance results are negative. The uniform application of this technology, when applied to both arrivals and departures, would


TECHNOLOGY

9

increase the opportunities for security officials to seize high-risk individuals and reduce opportunities for transnational criminals and terrorists to commit acts of terror. If we program immigration and customs kiosks with touch-screen interaction for travelers to enter their immigration and customs data and program them with multilingual support, we will ensure quick processing and reduced wait times, resulting in saved resources and an improved traveler experience. In order to prevent the next Paris, the next San Bernardino, or the next Brussels, global security leaders must invariably decide how to integrate innovative security practices and technology in order to ensure safety without compromising humanitarian values and economic opportunities. Multimodal biometric identification and predictive risk assessment technologies give the global security community the most effective available tools to address the growing threats today.

ASEANAPOL invite to observe OPERATION SUNBIRD II ASEANAPOL were invited observer for OperationSunbird II. The operation which was innitiated and led by INTERPOL Global Complex of Innovation (IGCI) in Singapore, with close cooperation with ASEAN Member Countries and ASEANAPOL is aimed to improve the cooperation between law enforcement agencies in the field of countering terrorism at the national, regional and international levels across ASEAN borders and waters in order to identify, arrest and investigate priority wanted terrorists and criminals. The operation was jointly funded by INTERPOL and the Government of Canada, Department of Foreign Affairs, Trade and

Development. The operation was also attended by a total of 20 coordinators from Police Force (NCB), Immigration and Maritime Agency of ASEAN Member Countries; Brunei Darussalam, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand and Vietnam. Canada and ASEANAPOL Secretariat present as observers for the operation. ASEANAPOL together with its dialogue partners are always in the same vision to enhance efforts on CounterTerrorism and combating transnational crime.

Border Security Report | May/June 2016


10

AGENCY NEWS

Agency News and U pdates B

order Liaison Office opened on the UzbekAfghan border to further promote transborder cooperation

K

organized crime, building enyan president says mutual trust in the region and security wall along improving the infrastructure of border with Somalia to deter border crossing points. terrorists The main project donor for this particular activity is the Government of Japan, which provided 1,380,000 US dollars through the Japan International Cooperation Agency (JICA) for it implementation in Kyrgyzstan, Tajikistan and Uzbekistan.

The first Border Liaison Office (BLO) on the Uzbek-Afghan border was opened at “Ayritom” border crossing point in May under the framework of the UNODC project “Countering the trafficking of Afghan opiates via the northern route by enhancing the capacity of key border crossings points (BCPs) and the establishment of Border Liaison Offices (BLOs) in Central Asia.” Currently there are thirteen BLOs operating on the KyrgyzTajik, Uzbek-Kyrgyz, UzbekTajik, Tajik-Afghan and UzbekAfghan borders which were opened by the project aimed at countering drug trafficking/

The designated Border Crossing Points were refurbished and equipped with the specialized equipment and BLO officers from the respective law enforcement agencies were trained by the project. At the opening ceremony Mr. Mansurjon Nabiev, the First Deputy Head of the Department of the State Customs Committee of Surkhandarya Region (Uzbekistan), said that BLO activities will facilitate better information exchange as well as contribute to joint actions against drug trafficking and drug related crime.

Border Security Report | May/June 2016

Kenyan President Uhuru Kenyatta said the construction of the security wall along its border with Somalia to help deter terrorists from entering the country. Kenyatta also clarified that the 440-mile wall along the KenyaSomalia border is not aimed at deterring movements of people but to enhance security. “There is nothing wrong with Kenya and Somalia establishing a common border entry point. This will help check on people who want to engage in activities which threaten peace in the two


AGENCY NEWS

countries,” he told local leaders in Mandera county. The East African nation is building the security wall along its border with Somalia in a bid to keep out Al-Shabaab and boost security after a wave of attacks that have claimed scores of lives and provoked severe criticism of the government’s response. city with thousands of border police officers, custom personThe wall, a series of concrete nel, soldiers and private guards barriers, fences, ditches and patrolling daily in the three airobservation posts overlooked ports serving the French capital. by CCTV stations, is expected to stretch from the Indian Ocean In addition to thousands of to Mandera, where both coun- police, army and customs tries converge with Ethiopia. members, some 5000 security guards working for private Reports say the Somali author- contractors are assigned to ities are concerned about the the Roissy-Charles-de-Gaulle, construction of the wall, saying Orly and Le Bourget airports, Nairobi was encroaching on the according to Paris Aeroport, the Horn of African nation’s territory. authority in charge. Nairobi insists the wall is for security purpose meant to prevent increasing armed group Al-Shabaab attacks inside its soil but Somalia is opposed to the plan which it says will only catalyze Al-Shabaab gruesome attacks.

11

A suspected Islamic State (IS) insurgent carried out a suicide bombing during a Turkish police operation at a house near the Syrian border, local media reported. “A terrorist found in a Daesh [Islamic State] hideout activated his bomb belt,” when police arrived, Dogan reported. Several ambulances were rushed to the scene but the state-run Anatolia news agency said no police officers were hurt in the incident. The suicide bomber was killed and another person was arrested in the house in Gaziantep, southern Turkey, close to the border with Syria. Turkey is on maximum alert after being hit this year by a series of deadly attacks attributed to IS or Kurdish separatists.

These forces are responsible for ensuring security both in the airports’ public areas and in orst Ever Riots Erupt reserved areas, such as boardAt Greek Border ing areas, baggage sorting sections and tarmac areas where Migrant Camp only passengers with boarding passes and airport staff with special red badges are allowed.

W

But President Kenyatta who was accompanied by Deputy President William Ruto said uspected IS suicide the government was commitexplosion during ted to peace and stability of the Turkish police raid country.

S

F

rance has tightened Paris airport security since attacks French authorities have tightened security at Paris airports since last year’s attacks in the

Migrants on the border between Greece and Macedonia have rioted, lit fires, charged police and attempted to block a railway during a protest demanding open borders. Police responded with tear gas.

Border Security Report | May/June 2016


12

AGENCY NEWS

The camp on the border village of Idomeni has become home to around 10,000 migrants, more than four months after the Balkans route into northern Europe was shut off. Greek officials have recently announced their plans to evict the camp.

victims and witnesses interviewed by Human Rights Watch have killed at least five and seriously injured at least 14 Syrians who tried to cross the border into Turkey. The closure is trapping tens of thousands of people fleeing conflict, including those previously pushed back at Migrants have repeatedly the border, in dangerous Syrian blocked the nearby train tracks border displacement camps in protest, sometimes using their where recent shelling and airown young children to block the strikes have killed and injured tracks. As they moved to do the dozens of civilians. same again last night the police stepped in.

U

R

M2.4 Million Cash Discovered Inside N: Press Turkey to Open Instant Coffee Mix Boxes Border Stun Border Police

United Nations member states and UN agencies attending the World Humanitarian Summit in Istanbul on May 23-24, 2016, should press the Turkish authorities to reopen Turkey’s border to Syrian asylum seekers, Human Rights Watch said today. Partners should make clear that any border guards who shoot at or beat asylum seekers should be held accountable. Since Turkey closed its border to all but seriously injured Syrian asylum seekers in early 2015, Turkish border guards have pushed back thousands of Syrians and – according to

Border security officials stationed at the Malaysia-Thai border have discovered an astounding RM2.4 million in cash stashed inside BenCafe instant coffee boxes in May during a routine car inspection. According to officials, the suspects, aged 19 and 54, who were heading from Padang Besar to Chuping when their vehicle was pulled over in a roadblock, Utusan Online reports.

B

order Patrol apprehending more migrants from China Border Patrol agents are stopping more OTMs (their term for people coming from countries other than Mexico) now than at any time during the past 16 years. In 2000, they apprehended just over 1,000. Last year, that a number was 2,000 in the San Diego sector. This fiscal year, they’ve already stopped more than 2,500. Some are coming from the usual countries like El Salvador and Honduras but others are traveling nearly 9,000 miles. “Specifically we are seeing people coming from China, India and Romania. The numbers have increased greatly,” said Border Patrol Agent James Nielsen. Last year, the Border Patrol stopped 58 people from China illegally trying to enter into the United States through San Diego. This year, they’ve already stopped 700.

S

upport border security wall, Mandera told

President Uhuru Kenyatta has asked Mandera residents to support the construction of the security wall.

He said the wall, which started being built last year, was not meant to separate Kenyans Aksem officials had earlier from Somalis but to create desnoticed that the car tried to slow ignated entry and exit points. It down and delay approaching is to stretch from the border in the roadblock inviting suspicion. Mandera to Kiunga in Lamu.

Border Security Report | May/June 2016


AGENCY NEWS

There has been strong resistance from the Somalia government, who see the wall as a way of separating them from their Kenyan relatives and hampering business.

round it, human rights groups took issue with it, and it later emerged that not longer after it was completed, repair work was needed.

Uhuru said the wall was meant to stop illegal entry of people, especially criminals who enter Kenya, commit crime, then sneak back to Somalia.

E

xpert: Secure

Border

13

practical people who weigh the expense and possible danger of their illegal border crossings against the risks of being caught, and he revealed what agents learned from interviewing them. “We found that most illegal immigrants believe that Not they will either not be caught, or even if they are caught they will simply be issued a notice to appear and will be released,” he said.

B

I

ulgarian PM inspects progress on Turkish border fence

n a first, 12 women constables will guard Sino-India border in Ladakh

An expert on border security says the border with Mexico is nowhere near as secure as the administration claims. Brandon Judd, union president of the Bulgarian Prime Minister Boiko National Border Patrol Council, Borissov recently carried out an testifyied before the Senate aerial inspection of progress on Judiciary Subcommittee on the extension to the Bulgarian Immigration and the National -Turkish border fence. Interest, said, “Speaking as an agent, and on behalf of line In a post on Facebook, Borissov agents, I will tell you: the border said that the fence would is not secure.” “greatly help the work of border authorities”. Judd said his job is complicated by several factors, including the The new Turkish – Bulgarian growing violence and influence border fence was initiated by of Mexican drug cartels, and the now-departed Bulgarian “the administration’s use of the Socialist Party-Movement for catch-and-release policy to an Rights and Freedoms ruling extent never before seen.” axis of 2013/14, at a time that there was a significant increase Judd estimated 80 percent of illein refugees coming into Bulgaria gals the Border Patrol catches as a result of the crisis in Syria. are released into the U.S. on the The fence also was criticised as administration’s order. He said ineffective because people went the illegals they apprehend are

Twelve female constables of the Indo-Tibetan Border Police (ITBP) will be the first women to guard the high-altitude IndoChina borders. The ‘mahila’ constables, who were flagged off to Leh area in Ladakh last week, will take their positions at the border in a few days. The 12 women from various parts of the country were part of a special contingent of 500 ‘mahila’ constables trained for the purpose. The constables will perform their duties at posts located above 14,000 ft under extreme cold and adverse climatic conditions. The selection criteria is the same as that for male officers.

Border Security Report | May/June 2016


14

AGENCY NEWS

“This agreement will assist in avoiding the risk of overlooking any gaps or overlap in areas covered by our work to better support national crime prevention efforts,” concluded the INTERPOL Chief. “The need for global partnerships to address shared challenges, from advancing sustainable development to countering the threats posed by transnational organized crime and terrorism, has never been more clear,” said UNODC Executive Director Yury Fedotov.

I

NTERPOL and UNODC forge closer ties in combating transnational crime

An agreement between INTERPOL and the United Nations Office on Drugs and Crime (UNODC) will further enhance cooperation between the two organizations in their joint efforts to combat transnational crime and terrorism. Signed by INTERPOL Secretary General Jürgen Stock and UNODC Executive Director Yury Fedotov the agreement will see the implementation of a Joint Action Plan across six common areas; terrorism, illicit trafficking and organized crime, cybercrime, maritime and border security, forensic and criminal justice capacity, and institutional capacity. The announcement, made during the Commission on Crime Prevention and Criminal Justice (CCPCJ), will also see the two organizations develop joint initiatives and closer cooperation in the promotion and use of INTERPOL’s policing capabilities alongside UNODC technical assistance initiatives. “INTERPOL and the UNODC have been working closely together for many years, and this agreement will provide a more strategic, forward-looking orientation for our partnership,” said Secretary General Stock. “The increasingly complex nature of terrorism and organized crime requires a coherent and effective global response to better protect citizens and infrastructures around the world.

Border Security Report | May/June 2016

Recent examples of successful cooperation between INTERPOL and UNODC include the European Union-funded Operation Folosa in September 2015. Targeting drug trafficking from Latin America to Europe via Africa the operation resulted in the seizure of nearly 170 kilogrammes of drugs worth an estimated EUR 10 million, as well as gold coins and stolen credit cards. In April, on behalf of the UNODC, INTERPOL’s Counterfeit and Security Documents Branch delivered a security document examination workshop in Ghana for the African region to help prevent and combat the smuggling of migrants. Within the Network of the Law Enforcement Training Institutions (LE TrainNet) initiative, in June 2016 the INTERPOL Global Complex for Innovation in Singapore will host a joint UNODC and INTERPOL meeting to address a range of topics including cybercrime and money laundering. The agreement between the UNODC and INTERPOL – which will be submitted to the INTERPOL General Assembly in November for approval ̶ will also provide a framework for cooperation in the delivery of the UN’s Sustainable Development Goals, in particular the implementation of Goal 16 and its associated targets of promoting peaceful, fair and inclusive societies.


TRAINING

15

SEARCH OF VEHIC L E FREIGH T     TRAINING CENTRE                                      sophisticated smuggling methods utilised by organised crime groups, it is essential for the UK to ensure that its officers are developed and trained to the highest standard. The award winning training has already been delivered to UK and International delegates from law enforcement agencies and has attracted excellent feedback. The centre offers courses over 2-3 three days for international Border Force is a world leader in UK Border Force’s vision to become “best Border Force in the world” took a step closer in March with the opening of a brand new, purpose built, specialist Search of Vehicle Freight Training Centre based in Kent. The opening by Sir Charles Montgomery, Director General of Border Force, was the culmination of over three years work. This unique facility will now

provide state of the art accommodation incorporating three classrooms and a large workshop for delivering practical search training. Utilising over forty trucks on site, each able to demonstrate a structural concealment, delegates will be able to learn and test new skills in a controlled environment. With a growth in international drug trafficking and increasingly

Border Security Report | May/June 2016


16

TRAINING

delegates and two days for UK delegates, with bespoke courses also available if required, all delivered by highly experienced frontline officers. Focusing on detecting structural concealments used to smuggle illicit goods or people, the course training combines a mix of theoretical training, designed to assist officers in identifying visual indicators, with the emphasis on a ‘hands on’ practical application of learned skills. We can also offer courses in search of cars, containers, small vessels and coaches. The centre is easily placed for access via the M2 or M20, high speed train services and only 15 minutes from the busiest sea port in the UK, Dover.

With the new centre fully operational, Border Force is looking to offer this training to a wider national and international audience.

If you are interested in booking training or would like further information, please contact the Border Force Search of Vehicle Centre SOVT@homeoffice.gsi.gov.uk.

OSCE trains Kazakhstan’s Border Service in profiling techniques The first in a series of OSCEsupported training seminars on profiling techniques at the border checkpoints to help counter transnational crime began in Almaty. Some 20 officers representing the Border Service of the National Security Committee took part in a five-day event, which is co-organized by the OSCE Programme Office in Astana, the US Embassy in Kazakhstan and the Central Asian Regional Information Coordination Center for Combating the Illicit Trafficking in Narcotic Drugs, Psychotropic Substances and their Precursors (CARICC). Experts from the Association of

Psychologists and Behavioral Therapists of Kazakhstan and CARICC presented an overview of the security situation in Central Asia with regards to the illicit trafficking of drugs and on psychological techniques to help identify potential criminals during the border crossing verification process. “Border Guards must use all tools at their disposal to counter threats posed by transnational organized crime and terrorist groups,” said Mirco Guenther, Deputy Head of the OSCE Programme Office in Astana. “Using best practices in profiling techniques and understanding risk indicators will help make borders more secure and the

Border Security Report | May/June 2016

work of Border Guards more efficient.” Director of CARICC, Major General Beishenbai Zhunusov said in his opening remarks: “The use of profiling by the Border Guard Service is one of the relatively new, but very efficient ways to counter not only transnational organized crime, but also terrorism related activities. CARICC is ready to support these activities and initiatives of the OSCE and INL in the future within the framework of information-analytical work and co-ordination of international operations aimed at curbing illegal activities of international drug crime organizations”.


I N D U S T RY N E W S

Veridos Supplies Innovative Border Control Solution to the Kingdom of Morocco The General Directorate for National Security (DGSN) for the Kingdom of Morocco has awarded Veridos with the design and implementation of a national border control system at land border posts, airports and sea ports, including the entire IT infrastructure necessary for the project. Veridos will provide stationary equipment for fixed border posts and mobile systems for border control at various locations.

Veridos’ solution enables the competent services of the DGSN to increase the performance and security of its mandatory border control processes, such as standard primary inspection and further in-depth investigations at a secondary inspection and back office operation. The system will also be linked to all the necessary external systems.

The border control solution for Morocco is based on the Veridos verification platform VeriGO®, which enables the integration of preexisting infrastructures and databases. Since ePassports are now widely in use, border control officers must also be able to check and authenticate these types of ID documents in a reliable, efficient manner. The

delivery of VISOTEC Expert 600 passport readers and VISOCORE Inspect allows the Moroccan authorities to perform an optical and electronic verification of the document. Traveler data, including biometric data such as face and fingerprints, can be captured by the system managing the entry and exit date. This makes it relatively simple to check for visa violations (visa expiry), generate reports, and perform statistical analyses. Veridos is also providing Morocco with Automated Border Control (ABC) eGates that are based on ABC technology currently in use across Germany. The solution allows the

17

North African kingdom to significantly boost the efficiency of its border controls while maintaining the same high level of security. Veridos is also providing more than 140 Veridos mobile border control kits that can be used on cruise liners, for example. The kits contain all the equipment necessary for a primary inspection, including a laptop, a DERMALOG fingerprint scanner, VISOTEC Expert 600 passport readers and VISOCORE Inspect all provided by Bundesdruckerei, Veridos’ parent company. Its average run time is about eight hours and can be linked to a WLAN connection and used in offline mode.

Jacksons Fencing help Eurotunnel provide a safe and secure perimeter at their Coquelles terminal near Calais Jacksons Fencing one of the UK’s leading designers, manufacturers and installers of security fencing and access control systems, has successfully completed 8.5km of security fencing and associated gates at the Eurotunnel Terminal, Coquelles, France as part of the Anglo – French commitment to securing key parts of the site against illegal and dangerous migration activity. Located just 12.4km from the UK entrance to Border Security Report | May/June 2016


18

I N D U S T RY N E W S

sensors such as the TacFLIR 280-HD multispectral ISR turret and the Ranger R6SS Ground Surveillance Radar, the LTV-X also includes an onboard command and control system that enables full control, exploitation, and dissemination of real-time imagery and Eurotunnel in Folkestone and with a reputation target tracking between for delivering certified and approved security deployed mobile fencing systems to other high profile sites of critical national importance, the family owned firm and fixed assets. The LTV-X also offers nearcompleted the project which included more than 40 pedestrian and vehicle gates over an eight week silent operation when stationary. period, to meet a very challenging deadline. The initial project was for 5km of security fencing, The Ranger R6SS ground-surveillance the majority of which was originally specified radar detects and tracks to reinforce physical security measures already personnel and vehicles in place, while the remainder was to replace within a 15 kilometer existing fencing. The contract was awarded to two range, with a low principal contractors with Jacksons responsible false alarm rate, and is for 3.3km. However, due to the changing and designed to perform in escalating nature of threat posed by people the most demanding smugglers operating in and around the Channel environments, including Tunnel railhead in Coquelles, Jacksons Fencing X-band operation has installed a total of 8.5km in four key locations for superior rain within the site which has a 41.8km perimeter. penetration. Featuring

advanced Digital BeamForming (DBF) and a high-speed refresh rate, the FLIR Ranger R6SS offers superior target detection, acquisition, and classification as well as clutter rejection. With FLIR Systems, Inc. has announced the release of built-in North-finding two-high performance ground surveillance tools and GPS capabilities, it for border security and force protection. . can be mounted on a vehicle or dismounted The LTV-X is a rugged, Osprey for rapid tactical reconnaissance deployment in support and carried for artillery and mortar fire vehicle that can be of urgent operational transported inside requirements. Featuring correction. a Bell Boeing V-22 multiple integrated Depending on mission

New LTV-X with the FLIR Ranger R6SS Radar combine to offer long-range, mobile ground surveillance

Border Security Report | May/June 2016

objectives, operators can network multiple vehicles, sensors, and even Unmanned Aerial System (UAS) assets with a central command center to give unprecedented situational awareness and responsiveness. The LTV-X also offers a wireless system that provides target bearing and geo-referenced coordinates to other personnel, vehicles, and command and control systems for precise target location. Other features include a laser rangefinder, laser pointer, illuminator, and battery-operated quiet mode. “The Ranger R6SS and LTV-X are FLIR’s latest innovations in support of mission-critical ground surveillance, force protection, and border security that leverage our unique Commercially Developed, Military Qualified model,�


I N D U S T RY N E W S

said Kevin Tucker, Vice President and General Manager of FLIR Surveillance. “Both products are designed to maximize detection, responsiveness, and reliability in situations

that demand the highest performance. We look forward to deploying these new products to the men and women who help keep borders around the world safe.”

PureTech Systems expands long-range persistent surveillance capability with added integrations PureTech Systems, an Arizona-based physical security software, specializing in video analytics, hasannounced the completed integrations of several force protection sensors. The technical milestone adds to a growing list of long-range persistent surveillance capabilities to the PureActiv Wide Area Surveillance platform aimed at protecting borders and large perimeters. The resulting system capability provides for an enhanced common operating picture (COP). In addition to the display and management of a variety of security sensors and associated alarms on a single map-based user interface, the PureActiv integrations include ability to synthesize the new sensor data with other sensors already integrated within the PureActiv system. Collaborating this sensor data provides more accurate and robust situational information to the operator. “Force protection sensors, such as cameras, intelligent fences, ground sensors and radar, continue to evolve in their ability to detect potential targets, but each has scenarios or environments where detection may be less than optimal,” explains Larry Bowe, president at PureTech Systems. “The collaboration of data from various sensors via integrations, such as these just announced, overcomes these situations, resulting in higher detection rates and more importantly lower incidence of false alarms. This becomes

19

increasingly important as the demand for very long persistent surveillance along country borders and large facilities pushes the detection limits of surveillance sensors.” The military and other high security facilities have long used this multi sensor layered protection approach, via a variety of sensor types, for highly accurate and robust perimeter protection. It is not until recently that this capability has been readily available to the broader security market as technology has improved and prices have become more affordable. This integration list represents only a small portion of sensors available for collaboration within the PureActiv platform. An entire list of integrated sensors and capabilities are available by contacting your customer support representative.

New Tethered Drone from Drone DRONE VOLT has launched (pardon the pun) a new surveillance solution: the Z18 UF. The Z18 UF, an actual autonomous monitoring station is a wired drone capable of 24h stationary flight, ensuring safe, non-stop aerial surveillance. Equipped with a powerful x18 zoom camera, it’s connected to the supply station ELISTAIR on the ground specifically designed for this captive drone. A patented smart fastening system allows operations to be carried out safely. This device, adjustable in height up to 40 meters, offers multiple options of close range shooting at 360° transmitted at high-speed and in real time thanks to its own radio connection. The

quick set up time, of just over 10 minutes allows for an almost immediate deployment on site of this mobile monitoring device. It can be used for a variety of missions including border surveillance, civil defense operations, search and rescue, natural disasters, fire services, crowd surveillance and monitoring of demonstrations and gatherings, etc.

Border Security Report | May/June 2016


20

I N D U S T RY N E W S

Raytheon in final stages of Jordanian border security project Raytheon are in the final stages of delivering their $100 million contract to supply cameras, radars, communications equipment, quick reaction team vehicles and command centre systems. The system is designed to deter and detect infiltrations of Jordan’s borders and to interdict where necessary. The systems cover the Syrian and Iraqi borders along more than 460km of Jordan’s borders. Raytheon was awarded a contract for the Jordan Border Security

Project in 2013 by the US Defence Threat Reduction Agency (DTRA), or DTRA and first operational capability was deployed in 2014. Raytheon are in the final stages of transitioning operational responsibility for all border security systems to the Jordanian forces.

Xenics introduces ‘XenicsCores’ Infrared OEM product family at Eurosatory The new Stirling-cooled XCO-640 MWIR module provides unprecedented thermal imaging stability and optical performance for border and perimeter surveillance, law enforcement and homeland security. The new Stirling-cooled XCO-640 MWIR module provides unprecedented thermal imaging stability and optical performance for border and perimeter surveillance, law enforcement and homeland security. Xenics presents its new Stirling-cooled XCO640 Mid-Wave thermal

Infrared core for longrange monitoring in highly demanding perimeter control, law enforcement and homeland security applications. XCO-640 is based on a newly developed platform with an extended set of on-board image enhancement algorithms.

Border Security Report | May/June 2016

contact Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Advertising Sales: Jake Addison T: +44 (0) 7545 977741 E: jakea@torchmarketing.co.uk Paul Gloc T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com Border Security Report is a bimonthly electronic magazine and is the border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over15,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Copyright of KNM Media and Torch Marketing.


9th-11th May 2017

The Hague, Netherlands www.cipre-expo.com

Co-Hosted by:

Converge; Collaborate; Cooperate The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands.

Call for Papers

Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure. The Advisory Committee is now accepting abstracts for consideration for inclusion in the 2017 conference programme. For further details and to submit your abstract visit www.cipre-expo.com Exhibit & Sponsorship Enquiries: Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Europe please contact: Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk

Jake Addision Exhibit Sales Manager (ROW) T: +44 (0) 7545 977741 E: jakea@torchmarketing.co.uk

Leading the debate for securing Europe’s critical infrastructure Owned & Organised by:

Supporting Organisations:

Media Partners:


INDUSTRY NEWS

Cambridge Pixel Unveils USVx Radar Display for Growing Unmanned Surface Vehicle (USV) market Cambridge Pixel has launched USVx, a new radar display application to control radar sensors and tracking functions on unmanned or autonomous surface vehicles (USV/ ASVs). Cambridge Pixel’s USVx radar display software is targeted at USV developers and manufacturers. USVx provides an integrated display picture of radar, tracks, AIS (automatic identification system) data, context maps and NMEA0183 navigation data from the USV. USVx provides a powerful and intuitive graphical user interface designed for use with touchscreens

steer its course and avoid obstacles.

that allows the operator to change range scale, control the operation of the radar and tracker remotely, and monitor alarms and track reports. Fusion software enables AIS reports to be combined with radar tracks. USVs are vehicles that operate on the surface of the water without a

crew and are controlled from a ground station or a mothership. A typical surveillance USV is a sensor-rich platform with capabilities for selfguidance and automatic decision making. Radar is the key sensor for most ASV applications as it provides the data to

The market for USVs is growing rapidly, driven by demand from navies and commercial enterprises worldwide for more effective maritime security – to combat terrorism, piracy and smuggling, to protect shallow waters and ports, and for environmental monitoring. Cambridge Pixel’s range of interoperable radar processing, display and recording solutions are easily adapted to a wide range of USV platforms to provide local processing as well as remote display of radar and camera video at a control facility.

Thales to Build “Cyber Range”, a Cybersecurity Training and Testing Facility for the Dutch Defence Cyber Command In the Netherlands, the Defence Cyber Command (DCC) and Thales entered into a contract to set up a sophisticated cybersecurity training and testing facility, also referred to as “Cyber Range”. With this “Cyber Range”, the Dutch Ministry of Defence will acquire a number of key cybersecurity capabilities, in particular for education and training of its own personnel. To continuously improve the reliability and security of its sensor, weapon sytems, command

& control systems, information systems, networks and digital infrastructure, the DCC must not only be able to quickly and effectively respond to new threat developments, but also to acquire and test new cyber-defence techniques at an early stage. With the Thales “Cyber Range”, both small-scale and largescale trainings can be carried out. In this facility, cyberattacks, incidents, as well as protective measures can be simulated and tested on different

20 - World Security Report

Defence systems, information technology environments and communication links. As part of the agreement, Thales will build the facility and provide continued support for the next three years. Brigadier General and Commander DCC Hans Folmer said “The Cyber Range is an important step for the Defence Cyber Command (DCC). It is a facility at which many forms of cyber operations can be simulated. This is essential for training our staff and

testing our systems.’’ The Defence Cyber Command (DCC) forms part of the Dutch Armed Forces and is responsible for developing and preparing cyber capabilities and conducting cyber operations. One of the components of the DCC is the Defence Cyber Expertise Centre (DCEC), which aims to enhance the specific knowledge and the innovative capacity of Defence within the cyber domain.

www.worldsecurity-index.com


INDUSTRY NEWS

Waterside research facility upgrades and expands Sonardyne Sentinel IDS security system Six years after it was commissioned, the underwater security system protecting an undisclosed waterside facility in the Middle East, is to be expanded and upgraded to offer enhanced levels of intruder protection. The announcement was made by UK-based maritime security company, Sonardyne International Ltd UK, following the award of a contract to service the Sentinel Intruder Detection Sonar (IDS) system that helps safeguard the high

profile facility from unauthorised access from the sea. The scope of work includes the supply of extra sonar sensors to monitor an additional stretch of coastline and updating the existing in-water sonars to the latest design specification.

from the water, and in particular, from below the surface.

Whilst security measures such as CCTV, radar, access control and motion sensors are proven, cost-effective options for protecting inland locations, sites located close to water remain vulnerable to unauthorised intrusion

Helping to close this surveillance gap is Sentinel IDS, widely recognised as the security industry’s most extensively deployed sonar. It meets the requirements of private, commercial, government and naval end users by reliably

detecting, tracking and classifying divers and small underwater vehicles approaching a protected asset, alerting security personnel to the potential threat. Whether it is protecting a critical infrastructure facility, offshore platform, sea port or superyacht at anchor, Sentinel’s autonomous monitoring capabilities, long range detection and proven low false alarm rates provide a rapidly deployable, 360° underwater security solution for any marine asset.

Saab Develops Underwater Anti-IED Robot Saab has introduced its remotely operated vehicle (ROV), Sea Wasp. Sea Wasp, which relocates, identifies and neutralizes underwater improvised explosive devices (IEDs), is designed to combat below-the-surface terrorism. To produce the Sea Wasp, Saab leveraged technology from its Saab Seaeye line of commercial ROVs, and added capabilities previously developed for its military systems portfolio. The company then worked with the U.S. Underwater Hazardous Device Response Community

“Underwater EOD is a rapidly growing niche around the world, and Sea Wasp’s capabilities correspond to that niche.”

to adopt it for explosive ordnance disposal (EOD) purposes and procedures. “Sea Wasp is a hybrid of pre-existing Saab technologies that can now be applied to an urgent worldwide need,” said Bert Johansson, Sales Director Underwater Systems within Saab business area Dynamics.

www.worldsecurity-index.com

Today, most underwater IED threats are disposed of manually by trained EOD divers. Sea Wasp is operated remotely by twoperson teams, allowing for a safe distance between operators and IEDs. To test Sea Wasp, Saab has partnered with the Combating Terrorism Technical Support Office (CTTSO) in providing Sea Wasp prototypes to three EOD agencies: the U.S. Navy EOD Group 2, the FBI Counter-IED

Unit, and the South Carolina Law Enforcement Division’s Counter-Terrorist Operations Maritime Response Unit. All three agencies have received Sea Wasp training; testing and evaluation is being carried out over the next 10 to 12 months. “The U.S. unmanned underwater vehicle market is very important for Saab,” said Jon Kaufmann, Vice President of Naval Programmes with Saab North America. “Our goal with Sea Wasp is to meet U.S. national security needs with an underwater, anti-IED device that keeps EOD teams safe.”

World Security Report - 21


INDUSTRY NEWS

Hang Nadim International Airport Relies on FLIR for Fail-Proof Perimeter Protection Hang Nadim International Airport (Indonesia) has demonstrated considerable growth ambitions in recent years, as the airport is becoming a major hub for both domestic and international connections. But the airport’s growth also coincides with increased safety requirements, and a continuous effort to prevent accidents, fatalities, injuries or significant damage. To be ready for future growth and to offer its passengers more security, Hang Nadim International Airport recently invested in advanced thermal video security technology from FLIR Systems. Hang Nadim International Airport is located in Batam, Riau Islands, Indonesia. Batam, an Indonesian island located close to Singapore, has quietly emerged as a domestic hub with a large volume of transit passengers. Mostly serving domestic flights, all the major domestic carriers operate out of Batam with services to Jakarta, Surabaya, Bandung, Medan and Padang. Originally developed as an alternative airport for Singapore Changi Airport, Hang Nadim Airport has facilities and the longest runway (4,000 m) in Indonesia, sufficient for wide body aircraft Boeing 747s and several times

more passengers than it is currently serving. Securing The Airport Perimeter Security is a serious issue for airport authorities. The threat of terrorist attacks at airports is never far away. And although passenger screening inside airports has received its due attention worldwide, the airport perimeter often remains a weak spot at many airports, giving intruders much too easy access to airplane runways and taxiways. This has not escaped the attention of Hang Nadim International Airport officials. Until recently, the airport’s 16 kilometer perimeter was only secured by a fence, in combination with CCTV cameras and frequent patrols of security personnel. This approach was insufficiently covering the airport’s security issue, in at least two ways.

so 100% coverage is not possible this way. Second, CCTV cameras cannot see during the night without lighting, which would be very costly to install along a 16 km perimeter. Once inside the perimeter area, it would be almost impossible to install lighting poles across the airfield to support CCTV cameras, because they could possibly obstruct the movements of the aircraft on the runways and taxiways. After thorough research, the airport authorities decided to use thermal imaging cameras from FLIR Systems to monitor the entire perimeter. FLIR thermal security cameras can see as well at night as

they can during the day. And unlike conventional CCTV cameras, they are not dependent on visible light or supplementary illumination from lights or lasers. 27 FLIR FCSeries cameras with 19 mm and 35 mm lens are now used to monitor the perimeter. In addition, Batam airport installed two FLIR PT-602CZ longrange multi-sensor thermal & visible pan/tilt cameras and two FLIR Ranger® R2 high-resolution radar units to have a complete overview of the airport’s aprons, taxiways, and four-kilometer long runway. The PTZ camera and radar complement each other really well and make it virtually impossible for anyone to enter the airfield unnoticed. The Ranger R2 radar accurately detects people and vehicles up to a 1,400 meter range. And, it operates in virtually any climate, weather or lighting condition to provide 24/7 security, scanning 360° every second. Whenever a

First of all, it’s very difficult for security patrols to be everywhere all the time, certainly with the size of the perimeter in mind,

22 - World Security Report

www.worldsecurity-index.com


INDUSTRY NEWS

target is picked up by the radar, an alarm is sent to the FLIR Sensor Manager video management system. This will in turn activate the automatic slew-to-cue mechanism of the FLIR PT-602CZ pan/

tilt camera. This means that the pantilt camera is automatically steered to the exact latitude, longitude and elevation of an alarm, provided by the radar, so that the security personnel in the airport control room can instantly see what’s going on on the visible and thermal camera image. In addition, all thermal video footage is recorded in real time by the FLIR DNR500 network video recorder.

According to the airport’s Chief of Aviation Technics, the FLIR security monitoring system is performing extremely well 24/7 and the authorities have already been able to detect intruders shortly after the installation of the thermal cameras. The fact that the airport does not need to install any lighting to secure the entire area and perimeter has proven to be a great cost-saver. In addition to this, the

detection range of the radar and pan/ tilt systems are so wide that only two units are needed to cover the entire area. The airport officials also value the video analytics on the FLIR FC-Series cameras as they provide optimal intrusion detection in challenging imaging environments. This allows the airport control room staff to take immediate measures whenever that is needed.

Recognising the role and responsibility of the media in effectively reporting on disaster risk reduction and climate change The 2nd ABU Media Summit on Climate Change and Disaster Risk Reduction closed with the adoption of the Krabi Media Action Plan, a non-binding agreement for media professionals that outlines their responsibilities when reporting on disaster risk reduction and climate change. The action plan covers the media’s role as influencers who communicate disaster risk, the impacts of a changing climate, and the need for consistent reporting on these issues. The agreement also

states the importance of building partnerships with key stakeholders in the climate change and disaster risk reduction fields to promote disaster preparedness.

Union, highlighted the importance of capacity building for the media to effectively deliver information to fulfill the commitments of the action plan.

The action plan proceeds the Jakarta Statement of Commitment, the key output of the first ABU Media Summit in 2014. It also takes into account the four priority areas highlighted in the Sendai Framework for Disaster Risk Reduction and the Voluntary Commitment statement from the Media Stakeholder Group formed during the Third UN World Conference on Disaster Risk Reduction in Sendai 2015.

“Broadcasters should be trained to deliver knowledge in a more attractive and acceptable manner, because sometimes the information is there, but if it’s not delivered appropriately the audience won’t listen,” said Dr. Mottaghi.

Dr. Javad Mottaghi, Secretary-General, Asia-Pacific Broadcasting

www.worldsecurity-index.com

He added that with effective and targeted messaging the media can better reach and serve the public by educating them on the risks they face from natural disasters. Darin Klong-ugkara, News Editor and Anchor of Environmental Disaster Issues, Thai PBS, emphasizes the role of the media when

it comes to reporting on disaster preparedness and following the action plan. “It is our duty as the media to report more on disaster risk reduction, to give people knowledge and share what to do during a disaster,” stated Ms. Klong-ugkara. Building the capacity of communities through reporting was one of the overarching themes during the Summit. Others include the importance of storytelling to change people’s attitudes regarding disaster preparedness, policy implementations to support the media’s efforts in pushing disaster risk reduction initiatives, understanding the target audience for better message delivery and utilizing key community members to reach a wider audience at the local level.

World Security Report - 23


INDUSTRY NEWS

Morpho and SNAP, Inc. Provide Ruggedized LiveScan Jumpkit to U.S. Customs and Border Patrol MorphoTrak, a subsidiary company of Morpho (Safran), has announced that it will provide 50 ruggedized LiveScan Jumpkits to the U.S. Customs and Border Patrol (CBP). MorphoTrak will partner with solutions integrator SNAP, Inc. to outfit CBP with the portable, climate-hardy kits. The LiveScan Jumpkit is a solution for biometric acquisition in austere environments, such as the U.S. southwest border, and can be transported and used in military operations and natural disasters. Wherever the kit is required, it can be deployed quickly and efficiently, thanks to its portability. The entire kit is made up of components designed to resist

them in a database as current visitors. Captured biometrics can also be searched against selected databases, using standards-compliant transmission. The results can be transmitted back to the unit or another location, speeding biometric identification in situations where time is of the essence. harsh conditions: the MorphoTop® fingerprint scanner, travel document machine readable zone (MRZ) reader, face capture camera, ruggedized laptop, and rechargeable battery are packed in a secure, watertight carrying case. CBP will use the Jumpkits at U.S. borders to capture fingerprints and face images from visitors to the U.S., and enroll

Steve Vinsik, MorphoTrak Vice President, Criminal Justice and Public Security, commented, “The Jumpkits will provide CBP agents with an enrollment solution that is reliable and functional in a wide range of challenging conditions, which means that agents have the tools they need to perform the critical mission of documenting who is crossing our

borders. We are pleased to be partnering with SNAP, Inc. on this valuable contribution to our country’s security.” SNAP President Navneet Gupta added, “Initially we viewed the partnership with MorphoTrak as a path to incorporate their solutions into our service offerings. Now, with in-depth exposure to MorphoTrak during the course of implementation of a project, we believe that MorphoTrak’s biometric solutions are well suited to support our goals and the missions of multiple agencies under DHS, DoD and other federal agencies. SNAP’s biometric solutions, based on MorphoTrak products, can be an answer for current challenges as well as a wave of the future.”

Smiths Detection wins contract to equip new airport in Turkmenistan capital Smiths Detection has won a significant contract from Polimeks Construction to supply a comprehensive range of advanced detection equipment for the new Ashgabat International Airport in Turkmenistan. Smiths Detection will supply advanced X-ray systems for hand baggage screening at security checkpoints, as well as the innovative millimeterwave scanners for people

screening and trace detection systems for the identification of smallest amounts of explosives. The contract also includes out-of-gauge baggage systems, which will be also used to screen on-board catering for passengers as well as air cargo consignments. Hold baggage at Ashgabat will be screened by ECACapproved Standard 3 systems for automatic explosives detection. The advanced screening

24 - World Security Report

solutions will help to detect and identify explosives and weapons, as well as screening for narcotics and contraband to help Customs personnel to counteract smuggling. Deliveries will be completed by June 2016. Tony Tielen, Vice President EMEA, Smiths Detection, said: “Ashgabat is an ambitious project of the Turkmen government and it gives Smiths Detection

the opportunity to show its strengths as a trusted partner and provider of complete security solutions. Our goal is to make the lives of our customers easier and to help them protect against evolving threats through leading-edge technology. The Ashgabat contract is the largest that Smiths Detection has won in the Central Asian region and we are very proud to have prevailed in a highly competitive environment.”

www.worldsecurity-index.com


INDUSTRY NEWS

FEC Heliports have launched the new MIL-Star Portable Tactical Helipad Lighting System with NVG compatible IR at Eurosatory FEC Heliports Worldwide have announced the launch of their MIL-Star portable battery powered LED helipad lighting system designed primarily for rapid deployment and use by advancing military forces in temporary and emergency situations to provide safe and effective marking at designated or ad-hoc helicopter landing areas and for tactical airborne and air drop operations. The MIL-Star is a versatile man portable landing light system that allows fixed and rotary wing aircraft to identify landing areas or drop zones at night at distances of up to 10 Miles (16kms). Able to support nonovert, covert and FLIR operations, the system contains up to 8 landing lights, each weighing less than 1 kg. A fully populated case of 8 lights weighs only 10.6Kg.

be switched on from the aircraft using an in case Mobile Lighting Controller (MLC) transceiver or using a PC/Tablet with the Zulu “dongle” transceiver. Wireless operation can set up, test and control groups of lights via the VHF MLC transceiver operational at line of sight up to 10km away. MIL-Star is capable of showing, at programmable intensities, red, blue, green, white visible LED’s and infrared or a combination of a visible colour and infra-red to support pilots wearing Night Vision Goggles (NVG’s).

in its case via mains at 100-240V AC, vehicles at 13.5-28VDC, solar or wind power. The MIL-Star landing light system is recharged via the drop in charger cradle located in the carrying case, which accepts either AC or DC input.

The MIL-Star can be easily programmed to flash warning, location beacon or Morse Code and has the ability to detect light levels for automatic sunset and sunrise switching.

MIL-Stars are pilot control enabled and fitted with an 868 MHz (915 MHz in USA) UHF transceiver to enable each individual light or set of lights to be programmed, interrogated and controlled by wireless commands. Using this function, MIL-Stars can

Portable in cases of up to 8 lights and rechargeable

MIL-Star is an IP65 rated light fitted with rubber soled stainless steel base to ensure stability under the toughest rotor-wash conditions and has been successfully tested at the Sikorsky Development Flight Center (DFC) in Florida for stability under the rotor wash of a CH147 (Chinook). The MIL-Star portable LED helipad lighting system has recently achieved FCC certification for operation in the US, and CE certification for the European Union.

J & S Franklin stress the logistical advantages of DefenCell Barriers at this year’s Eurosatory DefenCell Force Protection system offers enormous logistical advantages compared to other deployable systems. Up to ten times lighter and five times more compact than other gabions, DefenCell cuts delivery costs, uses less supply chain resources and is

more effectively deployed to forward positions. All components are lightweight, easy to handle and man portable combined with modular packaging which gives significant improvements in storage and transport costs.

www.worldsecurity-index.com

All units are packed in standard pallets, 20 or 40 per ISO container and one 20’ ISO container will build a barrier more than 450 m long and 2.7 meters high. Defencell’s cellular structure provides its strength combined with built-in redundancy so if

one cell is damaged the ones behind will continue to provide protection and stability. Unlike other gabions DefenCell units are 100% textile so there is no secondary shrapnel, no RF interference and no rust.

World Security Report - 25


INDUSTRY NEWS

High security panic escape pad-lockable device Security is paramount when it comes to energy, water, telecoms, waste disposal and recycling services. Terrorism, vandalism, theft, sabotage can all be considered threats to any infrastructure. MICO designs products specifically for these sectors taking into account the site, weather conditions and simple operation for daily use.

The MICO Abryll high security single point locking systems are manufactured from stainless steel as standard and are currently the UK’s highest rated locking system. These locks are ideal for applications such as chlorine stores, water cabinets and in remote locations where the doors are only operated periodically and therefore a reliable and robust locking

solution is paramount. All locking systems are designed to meet the requirements in the most demanding of applications and environments. On remote sites padlocks can be a preferred choice but can conflict with safety while trying to maintain security, so MICO developed a high security panic escape pad-lockable device. A

unique design function allows free egress from the internal panic escape hardware, even when the padlock is fitted. This ensures perimeter security whilst still ensuring that safety of personnel or members of the public. Manufactured in 316 stainless steel as standard makes the MICO Hasp & Staple ideal for external or hostile environments.

Art theft is big business According to the FBI the global business of art theft is said to be worth $6-8 billion worldwide and is the third largest global criminal enterprise after drugs and guns. Last year in the UK, an organised crime gang committed a spate of robberies of museums using a variety of methods to gain access, including hiding in the building until after closing, forcing windows and shutters, and an angle grinder to cut a hole in a wall. They specifically targeted oriental jade pieces and rhino horn primarily for the burgeoning market in China. The estimated value of the hall was in excess of ÂŁ57 million. Security for museums and galleries pose real problems for those charged with the

can be tampered with. This means that they offer a secure first point of entry.

responsibility. The main vulnerable points are the windows and doors. Specialist security shutters are an ideal solution, such as those produced by UK company Charter Global Ltd which make the only SR4/SR5 rated shutters made from lightweight aluminium. Charter Global produce the Obexion range of shutters which were the first security shutters to achieve an SR5 security rating 2014 and again

26 - World Security Report

in 2016 with externally face fixing detail which makes them ideal for all main entrances as well as secondary entrances and service doors. They have a unique keyless lockdown technology feature that means that the shutters lock in any stop position, closed or not. This means they cannot be forced open even if the criminal is able to get a crow bar or jack underneath the shutter. The shutters open from the inside or outside requiring no external locking mechanism that

The reduced weight of the shutters means they can be retrofitted to historic buildings sometimes without the need for additional steelwork support structure all combined to create a low visual impact. Obexion door shutters were recently installed into the Beacon Museum in Whitehaven UK, which required lifting and fitting the shutters on the top floor of the museum, which was made possible by their lightweight construction. For window protection Charter Global produce the Integr8 SR Built in range, tested to security rated levels SR2 and SR3.

www.worldsecurity-index.com


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Obexion Shutters, developed by Charter Global Ltd, now include the first ever security shutters certified to LPS 1175, Issue 7, SR5 Security shutters to SR2, SR3, SR4 and bespoke risk specific specifications also available protection without compromise

www.obexionshutters.com

0845 050 8705

Targeted Solutions to your PR & Marketing Needs

KNM MEDIA Specialising in the Aerospace, Defence and Security Markets

Tel: +44(0)208 144 5934 Email: tony.kingham@worldsecurity-index.com

www.worldsecurity-index.com

World Security Report - 27


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and HEADLINE HERE looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. CYBER ATTACK INSIGHTS BY INDUSTRY PAGE 00 Official Magazine of

ISSUE 2 | APRIL 2016 www.worldsecurity-index.com

FEATURE: Story Headline goes here for the featured story PAGE 00

FEATURE: Story Headline goes here for the featured story PAGE 00

FEATURE: Story Headline goes here for the featured story PAGE 00

COVER STORY

Smiths Detection

Border Security Report

Border Security Report is the bimonthly border management industry magazine delivering HEADLINE HERE agency and industry news and developments, as well as more in-depth features and analysis to over15,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. BORDER SECURITY

REPORT

FOR THE WORLD’S BORDER PROTECTION, MANAGEMENT AND SECURITY INDUSTRY POLICY-MAKERS AND PRACTITIONERS

VOLUME 1 ISSUE 1 | 2016

COVER STORY

CORPORAT E

SECURI T Y

T EAMWORK

EVEN T S

GREAT ARTICLE

GREAT ARTICLE

GREAT ARTICLE

GREAT ARTICLE

Great looking corporate brochure or magazin! p.2

Great looking corporate brochure or magazin! p.12

Great looking corporate brochure or magazin! p.14

Great looking corporate brochure or magazin! p.18

Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 28 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

June 2016

7-9 GPEC 2016 Leipzig, Germany gpec.de 13-17 Eurosatory 2016 Paris, France www.eurosatory.com 21-23 IFSEC London, UK www.ifsec.co.uk

July 2016

12-14 Secprotec East Africa Nairobi, Kenya www.secproteceastafrica.com

August 2016

14-17 APCO 2016 Orlando, USA www.apco2016.org 22-23 Gartner Security & Risk Management Summit Sydney, Australia www.gartner.com/events/apac/security

September 2016

5-7 OFSEC 2016 Muscat, Oman www.muscat-expo.com/ofsec 7-9 IFSEC South East Asia 2016 Kuala Lumpur, Malaysia www.ifsecsea.com 20-24 Prague Fire Security Days Prague, Czech Republic www.fsdays.cz

29 - World Security Report

To have your event listed please email details to the editor tony.kingham@worldsecurity-index.com

20-24 The Emergency Services Show Birmingham, UK www.emergencyuk.com 21-23 Secure World Astana, Kazakhstan www.industryplatform.kz 27-30 Security Essen Essen, Germany www.security-essen.de/impetus_provider

October 2016

5-6 Critical Infrastructure Protection & Resilience Asia Bangkok, Thailand www.cip-asia.com

May 2017

9-11 Critical Infrastructure Protection & Resilience Europe The Hague, Netherlands www.cipre-expo.com

www.worldsecurity-index.com


keep threats out and people safe by securing your sea and land borders

For further information on the product or sales, please visit www.smithsdetection.com or contact globalsales@smithsdetection.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.