World Security Report October 2015

Page 1

For the latest news, features, essential analysis and comment on security, counter-terrorism, international affairs, warfare and defence

October 2015

Subscribe Here G4S Global Forecast for Q4 The ELASSTIC project and its contribution to resilience EUROPOL forum outlines steps against people smuggling The United Kingdom – the threats we face in 2016 Cell phones, the prison scourge Industry News

www.world-borderpol-congress.com

www.cipre-expo.com

www.cip-asia.com


EDITORIAL

www.worldsecurity-index.com

Be careful you wish for!

Editorial: Tony Kingham E: tony.kingham@worldsecurityindex.com

In the last issue we made the proposition that the only long term way to solve the Middle East refugee crisis is to deal with it at source. To do that we needed to intensify the international military campaign against IS on the ground in Syria and Iraq and resolve the war between Syrian President Bashar al-Assad and the western backed rebels.

Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Advertising Sales: Tony Kingham T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurityindex.com Paul Gloc (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Denne Johnson (Americas) T: +1 918 863 9792 E: dennej@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@worldsecurityindex.com World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to 39,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.

Well a lot can happen in three months and maybe what has happened proves the old adage, be careful what you wish for, it may just happen! Russia has built up its military and logistical forces in the region but its air strikes in Syria seem to have been mainly in support of their client Assad rather than aimed against IS. Whilst of course busily claiming, mainly for home consumption, that they there to fight international terrorism. Turkey joined the fray by attacking IS but at the same time resumed their war against the Kurds, who are fighting on the side of the alliance against IS. Iran has been building their military presence on the ground and are openly fighting alongside and indeed leading the Assad government troops along with Lebanese Hezbollah and other Shiite groups. Meanwhile Saudi Arabia and other Sunni states have also ramped up their support the anti Assad rebels. In reality what we have is an old fashioned proxy war being fought between the major international players, regional powers and religious factions. None of which bodes well for the professed aim of defeating IS and putting an end to the misery of millions in the region. In last week’s talks in Vienna, the first serious attempt to reach some sort of international consensus, it was at Russia’s insistence that Tehran, as one of Assad’s top supporters had to be at the negotiating table too. This of course makes practical sense. The Russians are also insisting that Assad has to be part of any proposed agreement and solution. Again, it might be unpalatable for most in the international community, but as Assad, with help from his friends, doesn’t look as though he is in any danger of losing the war anytime soon, including him in some sort of settlement, even if it is just short term, may be the only way ending the war with the rebels and get on with defeating IS. Amongst the big players there seems to be slow and reluctant acceptance of this fact but bad tempered exchanges between the Iranian and Saudi delegations last week mean that any consensus may be some way off. In the meantime the flood of refugees is showing no signs of abating and as winter approaches their misery will only get worse.

Copyright of KNM Media and Torch Marketing.

2 - World Security Report

Tony Kingham Editor

www.worldsecurity-index.com


WORLD SECURITY

G4S Risk Consulting Global Forecast 2015 Quarter 4

The G4S Global Forecast for Q4, 2015 focuses on the key thematic threats faced by countries around the world in the coming three months. These include militancy, political and civil unrest, health and disease, terrorism, economic risk and the impact of major geopolitical developments, providing insight by subject matter experts into the most pertinent risks and threats on a regional basis. Key issues in this quarters report include the increasing global threat of militancy as Islamic State (IS) continues to draw recruits and allegiances from established militant groups in the Middle East, Africa and Asia. The perceived threat encompasses the wider world as nations remain concerned over the threat posed by returning fighters and self-radicalised individuals. The ongoing conflict in the Middle East and poor governance in some African nations is displacing thousands of people, triggering one of the greatest movement of people into Europe for decades. The influx of refugees and migrants will continue to feature heavily in Q4 as states protect their national interests at the expense of others. Beyond the Middle East, rebel groups in the Americas and Asia are becoming increasingly brazen

www.worldsecurity-index.com

in their bid to win concessions from fragile governments, with violence expected to continue into Q4. Fragility has also been seen in Europe as the economies of the union face increasing pressure domestically. Besides the economy, there remains concern in Europe over the intentions of Russia towards Ukraine.

and frustration at a lack of services. With key elections due in several European, African and American states, political instability, protests and uncertainty will feature prominently throughout the last quarter of 2015. Africa

While the threat of Ebola has eased in West Africa, the Middle East Respiratory Syndrome (MERS) virus continues to pose a health risk in the Middle East and in countries from where the majority of Saudi’s migrant workers and business visitors come from. Political accountability continues to play a role in change and is increasingly a key trigger of unrest. Several Latin American and Asian countries are witnessing a surge in protests and resignation demands over corruption, incompetence

Elections in October at risk of political unrest There is a risk of civil unrest and election-related violence

World Security Report - 3


WORLD SECURITY

in the coming quarter. Guinea (11 October), Burkina Faso (11 October), Central African Republic (18 October), Ivory Coast (25 October), Tanzania (25 October) and DR Congo (25 October) all have upcoming elections that will increase the likelihood of demonstrations and violence leading up to polls and after any disputed results. Ivory Coast’s last presidential election in 2010 sparked a civil war and attention will focus on preventing any return to instability. Similarly, presidential and parliamentary elections in the Central African Republic are being treated as critical for the country’s political future, but they will not act as a solution for ongoing sectarian violence. Peaceful demonstrations are likely in Tanzania both before and after the general election as a coalition of opposition groups seeks to oust the Chama Cha Mapinduzi (CCM) party, which has ruled the country for five decades. Economic growth to slow Growth is expected to slow in Q4 in key economies, including Nigeria, South Africa and Angola, as global commodity prices remain low and doubts increase over foreign investment following the stock market crash in China. All three countries are heavily reliant on Chinese support and with the possibility of decreased investment, their outlook is uncertain. Low international oil prices will continue to impact heavily on the two most oildependent economies, Nigeria and Angola. Nigeria’s President Buhari is expected to announce his cabinet in September after a lengthy delay that has undermined investor optimism in an economic policy vacuum. The risk of debilitating strikes in the gold and coal mining sectors in South Africa is ongoing as negotiations continue between unions and companies over pay and conditions.

4 - World Security Report

Gradual progress against insurgencies Progress against sub-Saharan Africa’s two leading insurgencies – Somalia’s al-Shabaab and Nigeria’s Boko Haram – will be gradual as resilient militant groups are forced to resort to guerrilla tactics. An 8,700-strong joint regional taskforce against Boko Haram including troops from Nigeria, Niger, Chad, Cameroon and Benin will improve coordination between the different national forces, but with militants operating in remote areas and using guerrilla tactics and suicide bombings, progress is likely to be slow and gradual. As the AMISOM mission continues to make territorial gains in Somalia, al-Shabaab too will be forced to continue to utilise asymmetric tactics. Terrorist attacks similar to the bombing of the Jazeera hotel bombing on 26 July in Mogadishu remain likely against high-profile targets in Somalia as well as in neighbouring Kenya. Middle East & North Africa

definitions of terrorism, as in Egypt where a surge in terrorism-related arrests is expected, and as well as the remit of the state to impose indefinite detentions. Meanwhile in Turkey, authorities will continue to target the Kurdish Workers’ Party (PKK) as clashes and attacks continue in the southeast of the country. With Turkish airstrikes targeting PKK and some IS sites in northern Iraq and Syria, the country’s terrorism risk has risen sharply. Attacks on security forces near the border are likely, as are sporadic attacks in major urban centres, including Istanbul. Unrest over poor public service provision Protests broke out in Lebanon and Iraq in late Q3 over the lack, or inadequacy of, public services. Such incidents are likely to persist, if not escalate, into Q4. With state coffers squeezed by conflict and low oil prices, the ability to appease tensions with generous welfare benefits, public sector jobs and cheap utilities is declining. Algeria and Jordan are the two states most likely to be affected in the coming quarter. Health and infrastructure concerns mount

Domestic crackdowns to intensify In the aftermath of a summer of violence in the Gulf and other Arab states, a continued and intensified crackdown on militants and dissidents is expected in Q4. Saudi Arabia has launched a series of arrests against Islamic State (IS) supporters, members and sympathisers, and this is expected to continue into Q4. Any terrorist attack, whether thwarted or successful, will see further arrests, as has been the case in Kuwait. The crackdown is also likely to affect other activists with legislation likely to be proposed and/or passed that extends the

The resurgence of MERS in Saudi Arabia in the latter stages of Q3 may translate into further cases in Q4. Although the virus does not spread easily between humans, an apparent lack of awareness of the disease or observation of quarantine measures is facilitating its spread, with many new infections reported among healthcare workers. Concerns are also rising over measles and typhoid in Iraq and Syria as the Syria civil war and the IS insurgency in northern Iraq have severely damaged already sparse public health infrastructure. Outbreaks of Dengue fever in Yemen are likely to worsen

www.worldsecurity-index.com


WORLD SECURITY

as health infrastructure there has collapsed, exacerbated by water, food and medical supply shortages. The UN warns that Yemen is on the brink of famine, making the population more vulnerable to epidemics. Severe storms in November 2014 swept across the Levant region, triggering flooding in the Gaza Strip, Jordan and Lebanon. Exacerbated by the dearth of drainage infrastructure in the countries, weather-related security issues are likely to be prevalent in the latter part of Q4. Heavy snow also hit the area in January 2015. This may also occur in the latter stages of Q4, resulting in disruption to transport. Asia

Political risks abound in Southeast Asia Political-related unrest is expected to continue into Q4 as crucial elections are due in Myanmar on 8 November, Thailand’s generals continue to push back a return to democratic rule and disputes over the constitution in Nepal trigger violence which is expected to continue unless minority demands are addressed. In Myanmar, the opposition National League of Democracy (NLD) is expected to perform well, but it is unlikely to take the lead in forming a government due to the military’s control over parliament. In Thailand, the 20 August Bangkok

www.worldsecurity-index.com

bombing highlights the fragility of stability in the country. The ruling junta is likely to keep pushing elections back until the King passes away, which increases the probability of renewed unrest. An emboldened civil society in Malaysia will place pressure on Prime Minister Najib Razak to step down over a corruption scandal, but opposition weakness suggests that the falling Malaysian currency presents a greater threat to his position. Security agencies challenged by militancy With the Taliban fragmenting in Afghanistan, insurgents will continue brazen attacks in Kabul and strategic towns as new leader Mullah Akhtar Mansour strives to assert his leadership and undermine President Ashraf Ghani, whose popularity is plummeting as the peace process stalls. Across the border, the Pakistan military persists with operations against insurgents in the tribal areas as the security environment remains weak. In India, Bangladesh and Indonesia, Islamic State (IS) retains the potential to empower existing Islamist militant movements and encourage “lone-wolf” radicals, raising the risk of a high-profile terrorist attack. In the Philippines, President Benigno Aquino will be under pressure to secure passage of the draft Bangsamoro Basic Law (BBL) and end the MILF insurgency, or face the risk that the legislation is not picked up again in the lead-up to the May 2016 elections.

tensions prior to de-escalation. Negotiations between North Korea and South Korea in the wake of tensions during Q3 are unlikely to result in fundamental differences being addressed, particularly over the nuclear programme. With the 10 October anniversary of the founding of the Communist Party, there is a heightened risk of missile launches in Q4. Japan’s passing of a revised security bill that allows for military engagement will strain ties with China, which will use anti-Japanese rhetoric to distract attention from its own domestic crisis in the financial and economic sectors. Within the South China Sea, a clear resumption of China’s land reclamation activities could lead to further flight incursions by the US surveillance aircraft over Chinese-claimed islands, although Washington will be keen to avoid actions that could trigger the declaration of an Air Defence Identification Zone (ADIZ). Beijing will continue to refuse to engage in multilateral discussions with rival claimants. Americas

Regional tensions no closer to resolution

Unrest and political tensions to mark elections

Ongoing intransigence between India and Pakistan over Kashmir is set to ensure that national security adviser-level talks fail to improve bilateral relations. Sporadic exchange of fire across the border will periodically heighten

With elections due in multiple Latin America countries in Q4, large-scale protests and unrest are expected both in the buildup to and in the aftermath of polls. In Guatemala, nationwide

World Security Report - 5


WORLD SECURITY

demonstrations are expected during the run-off presidential vote due on 25 October following the indictment of former president Perez Molina on corruption charges. In Haiti, long-delayed presidential elections will also take place on 25 October. Government opponents have vowed to sabotage the polls amid concerns over the electoral process. Argentina’s President Cristina Fernandez will end her term in December. Although the opposition is running a popular campaign focused on removing current market restraints, a recent surge in the polls by Fernandez’s left-wing movement signals that the October election is likely to be close, with the possibility of a second round in November. In Venezuela, political tensions are set to increase ahead of the highly-awaited legislative elections on 6 December. Although the Maduro administration continues to face declining approval ratings, it has banned a large number of prominent opposition legislators from running in the elections. A series of government manoeuvres aimed at stemming dissent and weakening the anti-“Chavismo” movement is expected to trigger unrest throughout Q4. Unpopular policies breed social discontent Large protests across the region are expected to continue into Q4 as populations attempt to hold their leaders to account for increasingly unpopular policies. Brazil’s President Dilma Rousseff is likely to witness major opposition to her rule and increasing calls for her resignation as the country struggles financially. The fallout from the Petrobras corruption allegations also remains a key issue of discontent, as do ongoing austerity measures. In Mexico, a number of left-wing parties and activists will continue to oppose

6 - World Security Report

the opening of the oil sector, and protests against energy reforms are expected for the remainder of the year. Furthermore, President Peña Nieto’s diminishing approval ratings amid a series of corruption scandals, poor economic performance and a decline in security will continue to reduce public trust in many government-led initiatives. In Ecuador, President Rafael Correa is expected to face further largescale protests against his proposal to lift presidential term limits, as well as against controversial tax policies targeting the use of natural resources. Rebels and gangs continue to cause instability Guerrilla groups will continue to pose a threat to stability in Q4, although this is expected to decline in Colombia as long as rebel group FARC upholds the latest unilateral ceasefire. Although the pace of the current peace negotiations with the government has been slow, President Juan Manuel Santos remains a strong supporter, pledging to reach a deal by the end of 2015. Meanwhile, other rebel groups are likely to launch attacks to demand similar negotiations, particularly the ELN. In Peru, recent official acknowledgement that the Maoist rebel group Shining Path is still active is expected to trigger an increase in military operations against the group, which is likely to launch retaliatory attacks against government targets. The security environment in El Salvador is also expected to deteriorate, as street gangs continue to fight both each other and the government over the control of territory and illicit commercial activities. The government is unlikely to negotiate with gang leaders and further unrest is therefore expected.

Europe

AIslamist-related terrorist threat continues Islamist-related terrorism threats are expected to manifest in further attacks in Western Europe, particularly in Spain, France, the UK, Germany or Scandinavia. Security agencies in the region continue to emphasise the threat posed by individuals returning from Syria who could potentially carry out ”lone wolf” attacks. The threat is expected to develop more rapidly in Scandinavia due to the changing demographics and concerns over domestic Islamist radicalisation. Authorities across Europe will continue to make detentions in relation to Islamic State (IS) and other Islamist groups. In addition, governments are expected to implement travel bans and order passport confiscations as part of heightened efforts to prevent individuals from travelling to the Middle East. Elections to underline political tensions Political challenges are expected to develop in the coming months, with Greece, Poland, Spain and Portugal all holding key elections. Populist, anti-establishment parties have seen their support swell in the last year, with the countries’ leftist parties seeking to capitalise on the prevailing anti-austerity climate. In Spain,

www.worldsecurity-index.com


WORLD SECURITY

Podemos and Ciudadanos are tipped to increase their popularity on an anti-austerity platform ahead of the general election in December. These parties are opposed to coalitions with the ruling Peoples’ Party (PP), which is likely to put the PP under pressure, even if it wins, likely altering Spain’s political dynamic. Antiausterity, populist and nationalist parties such as Golden Dawn in Greece and the Law and Justice Party in Poland, which is expected to do well in October elections, will continue to attract support in Q4 as part of public opposition to austerity, Islamist terrorism and the migrant crisis. Migrant crisis set to continue The ongoing migrant crisis in Europe is expected to continue. Disruption to Channel Tunnel services has seen the UK and France implement further physical security measures, but the likelihood of displacement remains as migrants move to other ports in northern France, Belgium and the Netherlands in order to make the crossing, leading to further localised delays. In Eastern Europe, countries including Hungary and Macedonia are taking firm measures to prevent migrants entering from Serbia and Greece, respectively. Hungary’s border fence with Serbia has failed to stem the flow of people, and it is highly likely that refugee and migrant numbers will continue to rise, putting pressure on domestic services, as well as increasing political tensions within the EU. Macedonia has undertaken stronger measures including deploying riot police and similar actions are likely elsewhere in the weeks ahead. Greece and Italy are struggling to deal with the influx of people, with public services, housing, infrastructure and other primary commodities being stretched. Localised tensions are expected to escalate in

www.worldsecurity-index.com

countries where migrant numbers continue to rise, leading to unrest involving local nationals and illegal immigrants. Russia & CIS

upcoming presidential election in Belarus on 11 October is nearguaranteed to be won by the incumbent, President Alexander Lukashenko, but this may trigger mass demonstrations against the repressive political system. Similarly in Moldova, public anger is growing at the political elite for their role in a web of dubious financial transactions that brought three leading banks to the brink of collapse, prompting an unpopular state bailout worth eight percent of GDP. Ukraine crisis enters holding pattern

Finances continue to suffer across region Finances across the region will be hurt further by the falling global price of oil and the effects of the decline in the Chinese yuan. The shrinking economy in Russia this year is forcing cuts to spending and a pullback from the conflict in eastern Ukraine for fear of an escalation of the EU sanctions that are due for renewal in January 2016. State firms such as Rosneft and Gazprom face a poor outlook, not least from the poor terms that Gazprom has negotiated with China in seeking an alternative to Western European markets. Like other countries in the region, Georgia is preoccupied with a currency crisis, while Kazakhstan aims to boost the competitiveness of its export-focused economy. Currency devaluations may cause protests as food prices soar and local buying power declines. A fall in remittances from Central Asian migrants may force some of them to return, with implications for domestic security.

The limits to Russia’s direction over the separatists in Ukraine are becoming evident in sporadic violations of the Minsk ceasefire agreement and Moscow’s strategic doubt over how to proceed. Kremlin pressure aims to undermine Ukraine’s government, with Moscow resisting pressure to cut support for the rebels and relinquish control over the shared border. The goal of “Novorossiya” – a historic term denoting a region north of the Black Sea, including Crimea and the Donbas - is highly unattainable and even a push to Mariupol seems impossible, as the risk of enhanced sanctions could further wreck the economy. However, any climbdown would infuriate the nationalists, who comprise Putin’s support base, bringing infighting in the Kremlin further into the open.

Public frustration threatens elites Adverse economic conditions are threatening political elites throughout the region. The

World Security Report - 7


PUBLIC SECURITY

EUROPOL forum outlines steps against people smuggling

The INTERPOL and Europol Operational Forum on Countering Migrant Smuggling Networks, held at INTERPOL on 15 and 16 October, has outlined various measures against the organised criminal networks behind people smuggling. Both organisations will reinforce their cooperation to ensure optimal investigative support to police across source, transit and destination countries within their respective memberships.

EUROPOL announced the establishment of the European Migrant Smuggling Centre (EMSC), building on its Joint Operational Team Mare initiative. In cooperation with INTERPOL, it will aim to strengthen support for European Union Member States through enhanced information exchange and the provision of operational support. The production of a joint EUROPOL–INTERPOL report on migrant smuggling networks was also agreed. The report will provide an overview of the criminal networks behind migrant smuggling, their key spots and modi operandi. It will serve as a guideline for coordinated and efficient law enforcement

8 - World Security Report

activities. The steps put forward by the meeting also include the establishment of an INTERPOL Specialist Operational Network against Migrant Smuggling, comprising experts from source, transit and destination countries. Working closely with EUROPOL, this specialist operational network will aim to increase the real-time exchange of police information worldwide so as to more effectively investigate migrant smugglers and dismantle the criminal organisations to which they may belong. Wil van Gemert, Deputy Director of Operations at EUROPOL commented: “The conclusions and recommendations reached at this forum send the clear message that EUROPOL and INTERPOL are determined to identify and disrupt the organised crime networks behind these unprecedented levels of migrant smuggling.

Together, we are stepping up efforts to ensure optimal investigative support to the international law enforcement community across source, transit and destination countries.’’ As part of INTERPOL’s ‘Infra’ (International Fugitives Round-up and Arrest) initiative assisting 190 member countries locate and apprehend fugitives, INTERPOL announced the launch of Operation Hydra, focusing on individuals wanted for people smuggling. Operation Hydra will aim to promote global information exchange on the location of fugitives, enhance networking between fugitive investigators and specialised units, and increase the use of INTERPOL Notices and diffusions. The meeting was attended by more than 120 participants from some 50 source, transit and destination countries affected by irregular migration flows, as well as from international and regional organisations and the private sector.

www.worldsecurity-index.com


PUBLIC SECURITY

Develop satellite tracking of aircraft to improve safety and security, urge MEPs

Satellite technology that could one day track aircraft anywhere, so as to enhance safety, prevent safety and security breaches and facilitate data recovery for crash investigations, should be allocated its own radio spectrum band, say MEPs in a resolution voted on Thursday. They urge the EU Commission to put the case for earmarking this satellite-specific band, in order to promote development work, at the November 2015 meeting of the World Radiocommunication Conference (WRC-15) in Geneva.

“There have been tragedies that have brought out weaknesses in the current tracking system. Flight tracking systems today cover only around 30% of the global airspace, said Transport and Tourism Committee chair Michael Cramer (Greens/EFA, DE), putting a question to the Commission ahead of the vote on the resolution. “Satellite ADS-B - Automatic Dependent Surveillance – Broadcast is one of the technologies, which would allow

better safety, and would reduce infrastructure costs. Necessary spectrum band should be allocated for satellite-based technology“, he added. The tragedies that ended Air France flight AF447 on 1 June 2009 and Malaysia Airlines flight MH370 on 8 March 2014 highlighted the need to put in place new systems to determine the positions of public transport aircraft at all times, MEPs say in the resolution.

Noting that today’s flight tracking systems cover only parts of the globe, MEPs argue that using satellite-based tracking systems would help to determine the location of an aircraft in the event of abnormal behaviour, an emergency or an accident, and improve the effectiveness of search, rescue and accident investigation efforts. Satellite-based tracking systems should not be affected by the loss of normal electrical power on board aircraft and neither should it be possible to disable them during the flight, says the text. MEPs call on the EU Commission to take necessary steps – with a view to the next World Radiocommunication Conference (WRC-15) in November 2015 – “regarding the allocation of the necessary radio spectrum band to support the future development of a satellite-based global flight tracking system”.

www.worldsecurity-index.com

World Security Report - 9


PUBLIC SECURITY

Mass surveillance: EU citizens’ rights still in danger, says European Parliament

Too little has been done to safeguard citizens’ fundamental rights following revelations of electronic mass surveillance, say MEPs in a resolution voted on Thursday. They urge the EU Commission to ensure that all data transfers to the US are subject to an “effective level of protection” and ask EU member states to grant protection to Edward Snowden, as a “human rights defender”. Parliament also raises concerns about surveillance laws in several EU countries.

This resolution, approved by 342 votes to 274, with 29 abstentions, takes stock of the (lack of) action taken by the European Commission, other EU institutions and member states on the recommendations set out by Parliament in its resolution of 12 March 2014 on the electronic mass surveillance of EU citizens, drawn up in the wake of Edward Snowden’s revelations. By 285 votes to 281, MEPs decided to call on EU member states to “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender”. Data transfers to the US MEPs welcomed the 6 October ruling by the EU Court of Justice (ECJ) in the Schrems case, which invalidated the Commission’s decision on the Safe Harbour scheme for data transfers to the

10 - World Security Report

US. “This ruling has confirmed the long-standing position of Parliament regarding the lack of an adequate level of protection under this instrument”, they say. The EU Parliament calls on the Commission to “immediately take the necessary measures to ensure that all personal data transferred to the US are subject to an effective level of protection that is essentially equivalent to that guaranteed in the EU”. It invites the Commission to reflect immediately on alternatives to Safe Harbour and on the “impact of the judgment on any other instruments for the transfer of personal data to the US, and to report on the matter by the end of 2015”. The resolution also reiterates a call to suspend the Terrorist Finance Tracking Programme (TFTP) agreement with the US. In general, MEPs consider the Commission’s response so far to Parliament’s 2014 resolution “highly inadequate” given the

extent of the revelations of mass surveillance. “EU citizens’ fundamental rights remain in danger” and “too little has been done to ensure their full protection,” they say. Concerns over surveillance laws in several EU countries Parliament is concerned about “recent laws in some member states that extend surveillance capabilities of intelligence bodies”, including in France, the UK and the Netherlands. It is also worried by revelations of mass surveillance of telecommunications and internet traffic inside the EU by the German foreign intelligence agency BND in cooperation with the US National Security Agency (NSA). The resolution also calls for an EU strategy for greater IT independence and online privacy, stresses the need to ensure meaningful democratic oversight of intelligence activities and to rebuild trust with the US.

www.worldsecurity-index.com


CONSTRUCTION SECURITY

The ELASSTIC project and its contribution to resilience

Today, the majority of the world’s population lives in urban areas and according to the United Nations, by 2050 that number is expected to rise up to 2/3th of the global population. The growing world population, the ongoing urbanization, the ever increasing size, height and complexity of large scale built infrastructures lead to higher risks with respect to natural and manmade threats. In case of a real incident, the number of casualties and injured people and the amount of damage is increased. The most striking incident in the past decades was the terroristic attack on the twin towers in New York on September 11th 2001. The impact of the passenger jets destroyed large parts of the structural elements, but not enough to cause a direct collapse. The following intense fire led to gradual loss of strength and stiffness of the steel support system, resulting in a catastrophic failure of the entire structure with a large number of casualties, including firemen and first responders who went into the building to rescue occupants. The damage was not limited to the two towers, but also extended to the surrounding infrastructure,

www.worldsecurity-index.com

such as adjacent buildings and the metro system underneath, due to the interconnectedness. Another striking incident is the earthquake and tsunami that hit the North East coast of Japan in March 2011. Entire villages at the coast were destroyed. Around 25000 inhabitants were killed or got missing. A large part of Japan was cut off for a long time of utilities such as running water and electricity. And last but not least, the tsunami triggered the Fukushima Daiichi nuclear disaster. These two examples show how massive and disruptive natural and manmade threats can be. The chaos however is more due

to the failure of the infrastructure than due to the incident itself, as people and first responders lack the possibility and means to act efficiently and safely. Evidently, there is a need for improvement of the security and resilience of large scale complex infrastructures in order to safeguard the infrastructure and its occupants during its entire life-cycle, including regular operational processes as well as exceptional crisis situations. It is the intention of the ELASSTIC project to contribute to this need by developing a comprehensive approach for the design of safe, secure and resilient large scale built infrastructure.

World Security Report - 11


CONSTRUCTION SECURITY

The ELASSTIC Concept The ELASSTIC concept consists of the following principles and definitions: 1. Resilience aims at increasing the general resistance and regeneration capability of the structure and the technical systems, such that the resilient complex is capable of “bouncing back to ‘normal’ status” (note the synonym elastic) in case of an incident. 2. Safety, security and resilience are already to be considered in the planning and design phase. This gives the best opportunities to include resilience in the design in a cost effective way. 3. Information is a key value for both the planning and design phase as well as the operating phase. Information needs to be shared, saved, maintained and updated at all times. 4. Choices or decisions are supported by information and analysis and are borne by the entire team of stakeholders. The consequences and the impact of the choices are known. Architects, consulting engineers and clients should work closely together when designing a building with a high risk profile. They set to work diligently with drawings and calculations, making sure to include security measures in their plans. They are generally advised by a security consultancy in this regard. The security measures consist of structural

measures as well as of operational measures. For this process, the ELASSTIC team develops a comprehensive design approach and supporting tools, such as: - Extended BIM-technology, i.e. Building Information Modelling program including a set of tools to enable architects, structural engineers and building services engineers to assess the safety, security and resilience of designs; - Smart and reinforced building elements; - Coupling and integration of BIM and BMS (Building Management System); - Real time information on the safety, security and resilience of infrastructure for a smart evacuation system. The design process will be tested and validated by making a design of a multi-functional, resilient large scale urban complex, the ELASSTIC complex. It is a showcase to demonstrate the features and potential of the

Figure 1 - The ELASSTIC concept, its key features and the major innovations.

12 - World Security Report

ELASSTIC-concept (see Figure 1), i.e. Enhanced Large scale Architecture with Safety and Security Technologies and special Information Capabilities. Tools and technologies Extended BIM Technology BIM is short for Building Information Modelling. It is a concept where a building is modelled in a computer with intelligent objects (instead of 2D lines). The digital representation of a facility in BIM covers more than just geometry. It also covers e.g. spatial relationships, light analysis, geographic information, and quantities and properties of building components. The use of BIM is spreading and increasing. The increased use of information technology has brought along the possibility of instant exchange of information as well as the possibility of building 3 dimensional models used for visualizations. Combining these elements, we can see the first signs of an integrated design process where architects, structural and services engineers work with an electronic exchange of drawings. Issues and improvements can be judged and improved upon in a compact timeframe. The usage of 3D models allows a perspective view, allowing clients and users to have an image of the final result as well as allowing engineers to check and improve immediately. The BIM concept however envisages more. The BIM is a shared knowledge resource forming a reliable basis for decisions, not just for the design process but for the complete life of a facility or building – from the early concept to demolition. With

www.worldsecurity-index.com


CONSTRUCTION SECURITY

BIM, a computer can automatically perform analyses and simulation runs on the computer model of the building. Dynamic information about the building, such as sensor measurements and control signals from the building systems, can also be incorporated within BIM to support analysis of building operation and maintenance. It are these features, decision support, (semi-)automatic calculations and dynamic building information during the entire lifetime, that are the focus in the ELASSTIC project in relation to resilience, safety and security. It is the objective to deliver a benchmark of extended features of BIM by coupling with building management software (Siemens), with decision tools (TNO) and hazard consequence models (TNO). Building Management System (BMS) The BMS is considered to be the heart of the building control, at all instances, but particularly in case of a crisis. Future (in 10 years or more) features of BMS are: • The BMS will record all sensor data and hazard data in a BMS data base connected to BIM. • The Building management system (BMS) will analyze these data and send a signal which floors, part of floors or rooms of the building (based on building sensor data) and how many persons are affected by the different types of hazards.

addition, the signal can be used to close fire doors or separate fire compartments. For example the ‘fire’ scenario. A fire starts at a critical place in a building; one main exit route is completely blocked by the fire: for the evacuation of all persons, a dynamic and individual rerouting is requested. This is controlled by the BMS, based on real time interactive simulation of the evacuation and the expansion of the fire. A database with representative simulation data is a backup approach for this real time protocol. High temperature sensors embedded in ceilings will be used to assess the accessibility of the above floors for safe evacuation routing. The role of BMS relies on the availability of real-time and accurate data of the status quo of the building. Special sensors are needed to measure this data. The availability and development of sensors and their performance is therefore another research topic within the ELASSTIC project, besides the development of evacuation modelling and the coupling between BIM and BMS. Evacuation modelling In cases of emergency evacuation,

people in the critical areas move immediately away from the threat or actual occurrence of a hazard. Effective emergency evacuation of the population in case of various hazards is a cornerstone to save people’s lives. Evacuations range from small scales of a building all the way to large scale of evacuation of a district. Pedestrian stream simulations are nowadays considered an appropriate approach to evaluate and mitigate risks in critical situations. Buildings can be planned with a focus on safety, making use of virtual pedestrian stream simulation experience. With the help of a simulation tool, a trained user can run through multiple what-if scenarios to gain experience for situations where it is impossible to gather empirical data. However, the modern pedestrian stream models usually do not consider the effects of hazards. They are usually limited to the modelling of evacuation situations related to the occurrence of critical crowd densities or at best the behaviour of people in cases of building fire. ELASSTIC-partner SIEMENS analyses four types of hazards and their effects on evacuation

• The BMS coordinates and guides the evacuation via signals. • Moreover, the BMS signal can be used to trigger the building control systems, e.g. HVAC systems or shut down of oil/ gas supply or elevators. In Figure 2 - Example of evacuation simulation

www.worldsecurity-index.com

World Security Report - 13


CONSTRUCTION SECURITY

possibilities and strategies. Based on this information an improved pedestrian stream model will be developed for people evacuating from buildings in case of earthquakes, high wind loads as present during hurricanes or tornados, explosions / fire and flood disasters, particularly flash floods. The overall objective of the work is to identify and standardize measures, which allow us to maintain the building or urban infrastructure (at least as long as required to ensure safe evacuation of all occupants). It is evaluated how down-time after disasters in urban and building infrastructures can be minimized through increased resilience or means of fast recovery. A classification scheme is proposed, which allows the prediction of disaster impact (by category) and thus provides basis

for recommendations on how to improve resilience sensor-based building management systems (BMS). Wireless sensor network (WSN) ELASSTIC-partner EMI (Fraunhofer Gesellschaft) studies the possibilities of wireless sensor networks for the ELASSTICconcept. Wireless sensor networks are small low-energy electronic units with transceivers that have limited computational and memory resources. They operate autonomously to accomplish a specific measurement task. Currently, WSN are mostly used for environmental applications such as environmental or disaster monitoring. Depending on the sensor type, in general, they query the physical world with sensing, processing, storage

and communication capabilities integrated in a single device. Other current applications include building monitoring, building automation, factory automation, and body area networks. Little has been done so far in the application of WSN for time critical events as is the scope within the ELASSTIC project. Self-sufficient wireless sensor networks in terms of energy supply are relatively new. The main challenges pose the energy harvesting methodology, the energy management and conversion efficiency, and the wake-up receiver. Key factors to address these challenges are efficient computation algorithms, intelligent routing protocols, intelligent synchronization, and the localization. One crucial criterion for an energy autarchic WSN is the power efficiency. The transmitting

The Homeland Defense and Security Database

WorldSecurity-Index.com is the only global homeland security directory published in English, Arabic and Spanish on the web and in CD network format. 14 - World Security Report The Global Security

Portal

Advertise on WorldSecurity-Index.com from only ÂŁ515 for 12 months

Contact info@worldsecurity-index.com for details www.worldsecurity-index.com or call +44 (0) 208 144 5934.


CONSTRUCTION SECURITY

footages or sound, electronically recorded and stored information. Partner INCODE has listed the legal rules ELASSTIC has to take into account when gathering data. These are: • Data must be processed fairly and lawfully. • They must be collected for explicit and legitimate purposes and used accordingly.

Figure 3 - Sensor system overview.

and receiving process require most of the electric energy when compared to other processes such as CPU operation and idle or sleep modes. The functional requirements for the WSN within the ELASSTIC project are chiefly to provide relevant data in the case of a threatening event, such as information on the type of event, its severity and how and where it effects the building. Thus, functional as well as robustness and operational requirements for the sensors and the WSN have been identified.

A schematic overview on the envisaged WSN is depicted in Figure 3. The power supply for the WSN is being designed as an energy harvesting module embedded in floor tiles, which generates electric power using the compression / decompression cycles under pedestrian traffic. The work will also include a study to the integration of the WSN in the structure, and smart elements to protect the sensors and the WSN.

people. To be able to do this in a legal way, the fundamental rights liable to be affected by protection of data are a need to know. The right to protection of personal data is defined by the European Data Protection Supervisor as “a fundamental right.” It is different from, but closely linked to, the right to respect for private and family life. This distinction is notably made in the EU Charter of Fundamental Rights - which mentions the two rights separately, although next to each other in Articles 7 and 8. Data are personal data if they relate to an identified or at least identifiable person. Form of appearance of the data could be: Written or spoken communications, images, CCTV

• Data must be relevant and not excessive in relation to the purpose for which they are processed. • Data must be accurate and where necessary, kept up to date. • Data controllers are required to provide reasonable measures for data subjects to rectify, erase or block incorrect data about them. • Data that identifies individuals must not be kept longer than necessary. • In principle, all data controllers must notify supervisory authorities when they process data. Multi Criteria Analysis (MCA) The design process of a large scale and multi-functional urban building is complex. It deals with multiple stakeholders who have a wide range of stakes,

Legal and ethical issues The building management system comprises the necessity to gather data in favour of the safety of the

www.worldsecurity-index.com

Figure 4 - MCA-tool interface, showing the top level criteria.

World Security Report - 15


CONSTRUCTION SECURITY

and design parameters. It gives a method to structure all project information into one database. System engineering (SE) is used to define the project; • Objectives – higher holistic level; • Functional demands - to fulfil objectives; • Systems/objects - to fulfil the functional needs.

Figure 5 - Example of visualisation.

divergent priorities, different time horizons and different scales of the investments. In such complex, and multi-layered processes, there is a need for a decision making tool that supports the stakeholders in making choices among the different design solutions through assessing the performance of design alternatives based on selected criteria. Thus, the aim of using Multi Criteria Analysis (MCA) in ELASSTIC is to develop a tool to enable quantitative judgment of an integral design, based on a set of design performance criteria defined by the stakeholders. Thanks to the joined efforts, the result is widely supported. In ELASSTIC the MCA will particularly be used to judge the safety and security features of the design against criteria concerning architectural quality, functionality and environmental impact (See Figure 4). Via the MCA tool, the stakeholders (particularly the designers) can see the immediate impacts of the design changes on the performance of the whole complex with respect to the criteria. Within ELASSTIC, the

16 - World Security Report

MCA tool will connect (manually or automatically) to the calculation and simulation models, as it will use the data from the models. The MCA tool itself is developed by TNO and consists of a user interface and the back-end architecture that explores the connection with the BIM server and the calculation and simulation models. The visualisation of the results can be in different formats, as it will help the stakeholders to compare and make decisions. An example is given in Figure 5. The MCA tool will therefore enable the stakeholders to make explicit choices and provide reasoning behind their chosen alternatives. Due to the reasoning and explicit results, the MCA tool will support the iterative nature of the design and assist the stakeholders to keep track of design changes. Relatics Relatics is a tool used by Arcadis to realize the design matrix. Relatics can be used to manage project information, requirements, stakeholders, verifications, risks, changes, tasks, project objects

SE helps to define and structure all quantitative and qualitative specifications. Nothing different than a regular program of requirements but SE provides more structure, a clear coupling of objectives to functional needs and system definition and vice versa, a clear coupling of “indirect” actors. The emphasis within ELASSTIC is put on defining the functions and objects, and the relationships between hazards and objects. The result anticipated is: • A database is created which reflects the building requirements and design; • A relationship between objects/ functions and hazard scenarios; • An analogue set up with the BIM model; • A coupling is created with the BIM model; • A database used to create Design Matrix for Hazard scenario’s. The ultimate goal is to develop an optimal exchange between Relatics and BIM, so that all information can be shown in the BIM model. ELASSTIC Showcase Validation (proof of concept) of the approach and developed tools will

www.worldsecurity-index.com


CONSTRUCTION SECURITY

carried out in order to establish the most favourable dimensions given the limitations of the requirements. The complex includes housing, a theatre, private-sector offices, a hotel, commercial spaces and a public museum with a specific area to receive high security dignitaries.

Figure 6 - The ELASSTIC showcase complex.

be done by evaluating the design of a multifunctional, resilient, large scale urban complex, called the ELASSTIC complex. This design is another deliverable of the project. A first quantitative design is available in BIM now, ready for the evaluation. Site The site for the ELASSTIC complex was chosen to be situated in the inner city of The Hague in The Netherlands, directly next to the central station. This location has been chosen as a representative and interesting site. It has to be mentioned however that the site is a showcase and that the complex could be situated anywhere in the world. Architectural design The architectural design was made by the participating architects, JA and NXNW. From a set of nine concepts, the “Ribbon” (see Figure 6) was chosen as the most suitable solution. Being a “Ribbon” concept, the idea was to have a continuous sectional size all along its length. Multiple criteria were taken into account in order to establish the most favourable dimensions given the limitations of

www.worldsecurity-index.com

the requirements. The requirements behind the “RIBBON” concept are: • Functionality: The complex had to fulfil certain programmatic requirements to allow for complex and representative hazard and escape scenarios. • Safety: The “Ribbon” includes areas which are harder to evacuate than a regular building in times of an evacuation, e.g. long corridors, high towers with long sets of stairs and large public spaces. The aspect of high rise is the result of being able to test the design against the hazard of high wind loads. • Security: Due to the large span and elevation of the top floors, security issues were deliberately taken into account in the design of the complex. • Stability: The dimensions of the “ribbon” need to be large enough to allow sufficient structure and central cores to be integrated without interfering with the usable spaces. • Aesthetics: The idea was to have a continuous sectional size all along its length. Studies were

An example of a typical choice related to the research challenges of the ELASSTIC-project is the theatre. To make the results of the evacuation simulations more interesting, the theatre has been placed at the top of the building, over the main archway, a location which would not likely be considered in real cases due to functional and economic reasons. Structural and services design The first quantitative design is the reference design for the further analyses. It is the work of Arcadis and includes the design of the structure as well as the preliminary design of relevant services. The structure is based on the dead load, live load and wind load, according to European and more particularly Dutch laws and regulation. The main part of the structure is concrete, i.e. a combination of concrete cast in place and prefabricated elements The vertical bearing elements are cast in place. The floors are mostly prefabricated. The top structure consists of steel truss structures. The steel structures which are implemented on the upper arches of the ribbons are used in order to make large spans and cantilevers on the top floors possible. The preliminary design for the MEP discipline (Mechanical, Electrical and Plumbing) is focused on those parts that have

World Security Report - 17


CONSTRUCTION SECURITY

an influence on the shape of the architecture and the design of the structures, as well as those which are relevant for the scenario analysis. More specific, location and size of the technical spaces and shafts have been determined in an iterative design process with architect and structural engineers. The level of details is still coarse, which is in line with the required level of detail needed at this point. Future work: Hazard scenarios The scope of the project is to create a resilient building complex, not only for historical threats and hazards but also for future ones. A thorough risk analysis has been performed to map relevant threat and hazard levels for complexes with typically four functionality sectors (public, public-limited, business, administration). The analyses show that natural disasters are of increasing importance in the planning process of multifunctional building complexes in Europe. The literature points to an increasing trend regarding the number and the magnitude of extreme weather scenarios, like heavy wind or rain, leading to floods. This development is reasoned through the climate change scenarios. A consideration within the planning process is strongly recommended. Since the middle of the 1990s, an increase of intended incidents as acts of sabotage and terrorism is observed. It is expected that such events will reoccur in the future with an increasing trend. The evaluation of past events shows a higher danger in countries of Eastern Europe in comparison to the entire continent. In the ELASSTIC project, the following type of hazards are

18 - World Security Report

Figure 6 - The ELASSTIC showcase complex.

considered: • Seismic loads (by Schüßler Plan) • Flooding (by Arcadis and Siemens); • Fire (by Schüßer Plan and Siemens); • Impact and explosion scenarios (by TNO, Schüßler Plan and EMI Fraunhofer). The ELASSTIC complex will be assessed regarding its resilience, safety and security for incidents of the above nature. The focus during the evaluation will be the structural damage as well as the safety of the people in the building complex. A range of simulation models and calculation tools are used for the assessment. During this assessment, the appropriateness of the different calculation tools for automation will also be determined. If feasible, the most appropriate one will be selected for a benchmark of an automated calculation, controlled by BIM.

Besides the quantitative results regarding the resilience of the ELASSTIC complex, a second result of this work programme, is a blue print for designing resilient building complexes. This blue print will describe the design approach and the lessons learned during the project. This blue print will show how the different tools can be used and how the results can be merged and feed into the MCA-tool, thus leading to the best design decisions and the optimal design.

“This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 312632”. http://cordis.europa.eu/fp7/ cooperation/home_en.html http://ec.europa.eu

www.worldsecurity-index.com


2nd-3rd March 2016

Including Critical Information Infrastructure Protection

The Hague, Netherlands www.cipre-expo.com

Convergence for Enhancing Security Are You PrePAred? The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands. The European Union is developing its policy on critical infrastructures in relation to the European Programme for Critical Infrastructure Protection (“EPCIP”) which considers measures that will enhance, where necessary, the level of protection of certain infrastructures against external threats. Critical Infrastructure Protection and Resilience Europe is the premier discussion bringing together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s national infrastructure.

REGISTER TODAY AND SAVE WITH EARLY BIRD

Save up to 20% on delegate fees when you register online and save with the Early Bird discount rate. (Early bird discount deadline - 2nd February 2016)

For further details and to register visit www.cipre-expo.com

Leading the debate for securing Europe’s critical infrastructure

Owned & Organised by:

Hosted by:

Exhibit & Sponsorship Enquiries: Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Europe please contact: Tony Kingham Exhibit Sales Director T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurity-index.com Paul Gloc Exhibit Sales Manager (UK & Europe) T: +44 (0) 7786 270820 E: paulg@torchmarketing.co.uk Eric Luteijn Exhibit Sales Manager (Netherlands) T: +31 (0) 35 7630 670 M: +31 (0) 653 510 690 E: eric.luteijn@sellair.nl Denne Johnson Exhibit Sales Manager (The Americas) T: +1 918 863 9792 E: dennej@torchmarketing.co.uk

Supporting Organisations:

Media Partners:


CYBER SECURITY

ECIPS and CYBERPOL Implements Evolis ID Security System

The ECIPS and CYBERPOL recently adopted the use of the Evolis (ID) system to avoid any unauthorized public copying the CYBERPOL identification tags. The ECIPS and CYBERPOL recently adopted the use of the Evolis (ID) system to avoid any unauthorized public copying the CYBERPOL identification tags. Several organizations have recognized the important use of the Evolis Technology in recent month in the field of safety and security. Today fraudsters can copy and make almost any identification ID card, but the newly developed encoded and very secure cards for applications such as national identification cards (eID) by Evolis remains revolutionary and makes it difficult to copy any such identification. A must for law-enforcement and Border Security. The President Ricardo Baretzky of ECIPS said that this technology has been implemented due to the fact that there are many whom pretend to be on the ECIPS and CYBERPOL organizations and, in future, they have to produce their legal issued identification card (ID). He further added and said that its the only way to distinguish between CYBERPOL officials and those who are not. Evolis has successfully developed recognized expertise in the

20 - World Security Report

field of safety and security with identification card customization and tailor-made printing systems, especially for governmental and para-governmental projects and users. Evolis solutions allows the issuing of immediately personalized, encoded and very secure identification cards for every type of applications such as national identification cards (eID), driver’s licenses (eDL), voter cards, health insurance cards, high secure identification and access control cards that are almost impossible to fake or copy. The United Nations High Commissioner for Refugees recently implemented the same technology for Refugee ID card issued in for Yemen and hopefully the same system would be used for the Refugee crises management in Europe soon. At present, the DGAC, the French Civil Aviation Authority of France implemented the same technology and had an excellent success rate in the reduction of risks in their access control and identification management program. A large range of solutions

The significant difference in the Evolis solution lay with several level of security implemented during the printing of such identification. The technology caters specifically to the growing need for security and fraud control. The technology benefit from high level encoding options and can integrate different personalized high security features in order to prevent all attempts to falsify the cards. The President of ECIPS said that this technology will ensure that any copying of a CYBERPOL identification becomes practically impossible and will give its audience the surety that the bearer of CYBERPOL ID is indeed the real deal and can be trusted at all times. He urges all border authorities to consider the implementation for this technology for future as it will bring stability in trust to officers that represent migration issues. The CYBERPOL International Cyber Security Summit will take place on 17th-18th November 2015 in Brussels, Belgium. For further information visit www.ecips.eu/summit

www.worldsecurity-index.com


CORPORATE SECURITY

The United Kingdom – the threats we face in 2016

Since the attack on the twin towers in New York and London bombings, the willingness of those who would do harm and act without limit, to kill or injure innocent citizens, whatever their race creed or faith, has transformed our way of life. John Baker, Head of Global Operations at the National Security and Resilience Consortium takes a look into these potential threats. The internet, heralded in the latter decades of the 20th century as the heart of a technological and communication revolution; has, in the 21st century brought with it, the ability of enemies of the state to : * communicate more effectively, * obtain intelligence, * recruit more easily, * radicalise the young and easily influenced, * react more speedily to our strategies and * undertake acts of criminality and terrorism with increasing

www.worldsecurity-index.com

sophistication and impunity.

rapidly evolving world.

Traitorous acts by maverick personnel have highlighted the massive threat the internet represents to national and global security.

The leaders in the fight back against such threat are brilliant, brave and strategically aware.

Recent cyber attacks on high profile companies including Sony Pictures and more recently Talk Talk, with the subsequent arrest of a 15 year old suspect, highlight the potential to disrupt business and the lives of ordinary people. The new order has demanded transformational strategies, technologies and laws which seek to respond effectively to our

Such individuals understand the true nature and gravity of the threat we face and work tirelessly to remain ahead of the enemy based on hours of intelligence and analysis. Regional conflict and the expansion of extremist groups such as Boco Haram, ISIL, Al Shabab and the unprecedented human migration from regions of instability towards the European Union has magnified the threat.

World Security Report - 21


CORPORATE SECURITY

“It uses the full range of modern communications tools to spread its message of hate, and to inspire extremists, sometimes as young as their teens, to conduct attacks in whatever way they can” He continued, “ The speed at which radicalisation can occur online, and the emphasis on low sophistication but potentially deadly plots are two major challenges posed by ISIS, while a greater ambition for “mass casualty” attacks, has been observed in the last year. “

We have reached a point in the defence of the realm where each and every one of us, whether parent, teacher, lecturer, managing director, shop keeper or religious leader has an increased responsibility to support the security services, the police and our lawmakers. In a recent speech Andrew Parker the Director General of MI5 insisted that the terrorist threat faced by the UK is greater than at any time in his career.

through the net. Andrew Parker speaks of a “three dimensional threat” – at home, overseas and online – with an increasing proportion of MI5s casework linked to Syria and Islamic State. He said, “We are seeing plots against the UK directed by terrorists in Syria; enabled through contacts with terrorists in Syria; and inspired online by (ISIS) sophisticated exploitation of technology.

With the increasing sophistication of encryption techniques a proportion of communications are now beyond the reach of the intelligence services. The obsession of society (and most worryingly the young and most easily influenced ) with social media creates an urgent need for the likes of Facebook and Google to have an “ “ethical” responsibility to provide more help in monitoring the communications data of suspected terrorist or those involved in criminality.

He explained that “his service would be unable to keep Britain safe without the use of tools to intercept communications data” and as such there was an urgent need for a modern legal framework that reflected the way that technology had moved on. It is reported that in the last year alone MI5 and those it works with has thwarted six attempts at terrorist attacks in the UK, and several plots overseas. However we should all be aware that despite these successes, the increase in rogue terrorists such as in the appalling case of Lee Rigby means there is an inevitability that at some point - one will slip

22 - World Security Report

www.worldsecurity-index.com


PRISON SECURITY

Cell phones, the prison scourge

The recent case in Wales of Paul Williams who ran a huge drug operation using cell phones from his prison cell, once again highlights the issue of cell phones in prison. Williams was using up to six different phones, making up to nearly 300 calls a day from his cell to a list of 60 phone numbers belonging to suppliers, distributors and users, keeping his drugs empire running smoothly.

C

ell phones are one of the most sought after contraband items in prison and one of the biggest security problems facing prison authorities worldwide. With illegal phones being used to organise crime, inside and outside prison, intimidate witnesses and even organise the murder of witnesses. Phones are smuggled in using a variety of methods, they are hidden in clothing of visitors, legal documents and books, hidden in shoes and body cavities, thrown over prison walls to be picked up

later, and sadly, smuggled in by corrupt prison officers. In Georgia USA, at least 15 Department of Corrections employees were arrested for bringing phones onto department grounds in 2013 and 2014. UAV’s have been used to fly mobiles into prison and in once case in a Brazilian prison a cat was caught smuggling four cell phones and four sim cards. Of course the cat denied smuggling and refused to disclose his owner or the recipient, so no charges were brought.

In the UK in 2013, more than 7,400 handsets were confiscated from prisoners, who are prohibited from using mobile phones and other communication technology. Georgia, the USA’s fourth-largest state prison system, last year confiscated more than 13,500 phones, about one for every five prisoners. Prison authorities worldwide have looked at a variety of technologies to combat smuggling and use of cell phones with varying degrees of success. Jamming mobile phone signals in prisons has proved unsuccessful and is indeed illegal in the US as it interferes with local public phone signals, jams emergency calls and first responder communications. Also, jammers will not block satellite phone signals which will be the obvious alternative for ever resourceful prisoners even if GSM signals were blocked. Call capture is a technology with potential to reduce use

www.worldsecurity-index.com

World Security Report - 23


PRISON SECURITY

of cell phones, whilst ensuring that public and emergency service communications are not interrupted. The technology does not block the signals but acts as a base station for all mobile signals channelling and monitoring them. It allows and passes through all authorized calls, and rejects unauthorized calls. At its first trial in the correctional facility in Parchman, Mississippi, this technology stopped 216,000 illegal calls made by and to inmates in just one month. However, this technology will only work effectively at isolated correctional facilities as it will still cause problems for passing and local mobile traffic in urban areas. Dogs have been successfully trained to sniff out the materials used in the manufacture of cell phones but the dogs themselves

are expensive to train and maintain and so too are the handlers. They can only work effectively for limited times and may also cause offences to some ethnic groups. The reality is that whatever the authorities do inmates will adapt and find ways circumvent the security measures, especially when large amounts of cash can be made by utilising phones to continue criminal activity. As is the case with most security issues, a layered approach is the most effective, utilising a range of procedures and technologies that keep the smugglers off guard and avoid predictable routines. Technologies like metal detectors which are already in use and through body X-ray scanners are an essential part of any part of any security regime. Metal detectors are cheap and easy to use but they have recognised limits. They can detect the relatively small amounts of metal used in cell phones but when set on the high sensitivity can cause many false alarms. They may also miss these small amounts of metal inside body cavities, nor can they pick up non metallic substances. Low dosage through body x-ray scanners are beginning to be adopted in correctional facilities and detention centres around the

24 - World Security Report

world. They have a number of advantages; they will detect any object concealed by an individual, whether metallic or non metallic, hidden in the clothing or in a body cavity. This means that not only can they be used to find mobile phones and sim cards but also for drugs (the other major related problem in prisons) weapons or any other form of contraband. They can be used either routinely, randomly or for spot checks to scan inmates, visitors, prison ancillary staff, contractors and prison officers. This in itself acts as a deterrent. Jan Steven van Wingerden, Managing Director of ODSecurity, manufacturer of the Soter RS low dosage through body scanner said “Our scanners are widely in use in correctional facilities around the world, and we have had lots of feedback from operators who are routinely detecting a wide range of contraband, from drugs to phones. But another important consideration is the human rights issue. Scanners like ours offer a humane alternative to degrading strip searches, which were once the only option when a visitor, inmate or member of staff was suspected of smuggling, which is why Amnesty International supported the use of the scanners we supplied to detention centres for illegal immigrants in Netherlands�

www.worldsecurity-index.com


including Critical Information Infrastructure Protection

15th-16th June 2016 Bangkok, Thailand www.cip-asia.com

Save The Dates Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, creating uncertainty and insecurity on critical national infrastructure. Climate change has also seen more extreme weather patterns, creating additional hazardous, unseasonal and unpredictable conditions and a severe strain on infrastructure. On a country level, there are strategies to deal with infrastructure protection issues. On a regional level, there is the Association of Southeast Asian Nations (ASEAN) Agreement on Disaster Management and Emergency Response (AADMER), under which several teams have been set up to deal with disaster management in general, but none is geared towards the protection of critical infrastructure. Cyber security is also becoming more prevalent, and as more critical infrastructure becomes connected to the internet and exposed to the dangers of cyber security attacks, new strategies and systems need to be developed to mitigate these threats. Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. www.cip-asia.com

Gain access to leading decision makers from corporate and government establishments tasked with Critical Infrastructure Protection and Resilience.

Owned & Organised by:

www.worldsecurity-index.com

Supporting Organisations:

How to Exhibit Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Asia please contact: Suthi Chatterjee Exhibit Sales Manager (Asia) PRMC Thailand Tel: +66 2 247-6533 Fax: +66 2 247-7868 Mobile: +66 (0) 87-060-5960 E: suthi@prmcthailand.com Tony Kingham Exhibit Sales Director T: +44 (0) 208 144 5934 M: +44 (0)7827 297465 E: tony.kingham@worldsecurityindex.com

Media Partners:

World Security Report - 25


INDUSTRY NEWS

Morpho Supplies 160 Itemiser 4DX Trace Detectors to Airports in Germany Morpho (Safran), through its subsidiary Morpho Detection, today announced a contract with the German Federal Police for 160 Itemiser 4DX explosives trace detectors (ETD). Under terms of the contract, Itemiser 4DX is currently deployed to screen passengers and baggage at airport checkpoints throughout Germany to ensure compliance with new EU legislation for enhanced explosives screening. In addition, local Morpho Detection partner ELP GmbH will provide maintenance services to ensure maximum system uptime and peak performance. A lightweight, portable desktop system powered by a non-radioactive ITMS(Ion Trap Mobility Spectrometer) source,

Itemiser 4DX detects and identifies trace amounts of explosives on skin, clothing, carried items, bags, vehicles and other surfaces. “The German Federal Police helps secure air travel at some of the busiest airports in Europe and we are thrilled they have recognized the operational and detection capabilities of Itemiser 4DX by selecting it to protect travelers,” said Karen Bomba, president and

CEO, Morpho Detection. “The ability of Itemiser 4DX to non-invasively detect and identify explosives in challenging environments, combined with Morpho’s global service partnerships, helps airports increase return on investment (ROI) while planning for growth and evolving security mandates.” Optimized for ease-ofuse and mobility, Itemiser 4DX eliminates the administrative, regulatory,

storage and shipping requirements associated with a radiation-emitting trace detection source. By leveraging longlife consumables and internal calibration, Itemiser 4DXseeks to minimize operational costs for airports and air cargo facilities, law enforcement agencies and government and critical infrastructure installations. Currently approved for passenger and cargo screening throughout European Civil Aviation Conference’s (ECAC) 44 member nations, more than 850 Itemiser 4DX ETD have been shipped to airports throughout Europe. More than 23,000 Morpho ETD systems have been supplied to airports, air cargo facilities, law enforcement agencies and secure locations worldwide.

Raytheon broadens cyber capabilities with acquisition of Foreground Security Raytheon Company announced it has acquired Herndon, Virginia-based Foreground Security, a leading provider of security operations centers (SOCs), managed security service solutions and cybersecurity professional services. The acquired company, which will be called Raytheon Foreground Security (RFS), accelerates Raytheon’s expansion into managed security

services across federal, international and commercial markets. RFS has approximately 165 employees, 85 percent who are trained cybersecurity experts. “Raytheon Foreground Security has an exceptionally strong portfolio of solutions and proprietary technology in some of the fastest growing segments of the cybersecurity market,” said Dave

26 - World Security Report

Wajsgras, president of Raytheon Intelligence, Information and Services. “Importantly, they will complement and expand our cybersecurity business. Their capabilities are compelling and clearly add immediate value to our already broad cyber offerings,” Wajsgras added. Foreground Security’s Virtual Security Operations Center (V-SOC) and Automated

Threat Intelligence Platform (ATIP) offer unique advanced cyber monitoring, threat hunting and professional services capabilities. “Foreground has a well-earned reputation for cutting edge, next generation capabilities in security monitoring services and proprietary ‘cyber hunting’ technologies,” said David Amsler, founder and CEO.

www.worldsecurity-index.com


INDUSTRY NEWS

Cyclope Hypervisor Will now Streamline Management of Multiple Critical Sites HGH Infrared Systems has introduced a new feature to accompany their advanced intrusion detection and tracking software, Cyclope, with the addition of Hypervisor. Ideal for critical sites where multiple Spynel, panoramic infrared thermal imaging surveillance systems are deployed, Cyclope Hypervisor centralizes all data to offer a global geolocation of all events tracked by all Spynels over a common network or across the globe. Cyclope, which has benefitted from frequent upgrades since its inception ten years ago, provides users with an automated experience, detecting and tracking an unlimited number of targets-on land, in air, or

on sea- simultaneously from all directions. With Cyclope Hypervisor, the system would automatically connect to all Cyclope workstations to pull up relevant data for the user. Some of this data would include: geolocation of all threats and sensors on vector smart maps, or custom local maps; table display listing the last detected events, with their ID, location and timestamp; a threat properties panel displaying the target’s

infrared thumbnails, location and time information; display and filtering of tracks from different modules (PTZ cameras, VMS or ARPA Radar); a notification panel allowing the user to configure sound alarms upon detection criteria. The award-winning Spynel sensors offer a unique 360-degree perspective for wide area applications, the continuously rotating head captures full panoramic, HD

images which the Cyclope software then automatically analyzes by detecting and tracking all targets identified. The open architecture, which has always been a mainstay within the Cyclope framework, will remain the same to allow for an easy integration with other existing platforms in place such as command and control and radar platforms. Cyclope Hypervisor will provide an additional, enhanced layer of centralized security supervision for a network of Spynel sensors protecting some of the world’s most critical infrastructures such as: airports, ports, international borders, nuclear plants, correctional institutions and more.

Blighter Surveillance Systems has won its first in South America contract Blighter Surveillance Systems has won a contract (it’s first in South America) from Paraguay’s National Civil Aviation Administration (DINAC) via local security systems integrator Omni S.A. - to supply its Blighter B400 Series radar solution for enhanced security at the country’s two busiest

international airports.

Guazú.

The Blighter B400 Series passive electronically scanned array (PESA) radars are now deployed at Silvio Pettirossi International Airport, near Asunción in Western Paraguay and at Guarani International Airport located on the Eastern border in the city of Minga

Mark Radford, CEO of Blighter Surveillance Systems, said: “We are delighted to have secured this contract for the two main airports in Paraguay, our first sale in South America. The significant benefits of the Blighter radar are now being recognised by busy

www.worldsecurity-index.com

international airports such as London Heathrow and others in the United States, Europe and Africa. We plan to build on this success in this region by targeting other airports and infrastructure sites – oil and gas facilities, mines and air bases that would clearly benefit from our advanced protection technology.”

World Security Report - 27


INDUSTRY NEWS

CHARTER GLOBAL announce launch of FIRST EVER SR5 Security Rated (5) Shutter With heightened levels of security across globe, Charter Global, manufacturers of the Obexion LPS 1175 range of security shutters have raised the bar in terms of security by introducing the first ever SR5 security rated shutter. The ‘Obexion MD SR5’ is certified to LPS 1175, Issue 7, SR5 and is designed to provide the highest level of security available for high risk locations such as Critical National Infrastructure, Military and National Security establishments as well as high value public and commercial premises. The SR5 is designed to protect against a sustained and professional attempt

entry for any facility.

to gain entry using a range of handheld performance power tools for extended periods of time. To achieve this exceptional level of security rating, the shutters have to withstand a total attack time of 10 minutes using various high performance power tools including an 18v reciprocating saw and an

angle grinder. Obexion’s unique “Lockdown” technology means the SR5 requires no auxiliary locking system and the unique ‘profiles’ lock the shutters in any stop position, fully closed or not. This means the shutters cannot be forced open to gain entry, making them ideal as first point of

The SR5 can be installed onto reenforced concrete and structural steelwork but its lightweight construction also means it can be installed on buildings of cultural and historic interest. The shutters are motorised to allow controlled ascent and descent with either a 240v/415v motor depending on aperture size and/or duty cycle. There is a full range of controls including push button, key, radio control or it can be integrated into building management systems and third party alarms. Electronic monitoring and alarm are available as options for higher risk environments.

Smiths Detection launches iCmore™ automatic detection software for cargo inspection X-ray systems Smiths Detection has launched iCmore, an advanced software suite for the automatic identification of suspicious items or dangerous threats, concealed within vehicles and maritime containers. The software will allow border control officers to identify items such as cigarettes or dangerous levels of radioactivity precisely. iCmore assists security operators or customs

officers by focusing their attention on any abnormalities within the load during the scanning process, to reduce guesswork and speed up analysis. It helps customs to recoup potentially valuable lost tax revenue. The software also lowers strain levels for operators by improving procedures and speeding traffic throughput. These upgrades are available for the range of powerfulHCV

28 - World Security Report

cargo inspection systems produced by Smiths Detection.

inspection of an ever increasing volume of crossborder traffic”.

Shan Hood, Vice President, Product and Technology at Smiths Detection, said: “iCmore supports an important step change for our customers by offering a much greater degree of automation. It will make a major contribution to the fight against international terrorism and smuggling, by speeding up the

The iCmore software configurations will initially focus on cigarettes, radiation sources and the recognition of nonempty containers. Planned additions will help identify inconsistencies in the load and automatic targeting of expensive or heavy materials such as gold, lead or uranuim.

www.worldsecurity-index.com


INDUSTRY NEWS

The recent story on CNN once again highlights the risks posed by covert surveillance For the first time in decades the US President broke with tradition and declined to stay at the now Chinese owned Waldorf Astoria hotel whilst attending the United Nations General Assembly in September 2015.http://edition.cnn. com/2015/09/11/politics/ obama-waldorf-astoria Terms of the sale of the Waldorf-Astoria to China’s Beijing-based Anbang Insurance Group for $1.95 billion in 2014 included a “major renovation”, which has prompted security concerns in Washington where fears of Chinese eavesdropping and cyber espionage run high. The White House and the State Department, while vague about the reasons

for the change, cited several factors, including security concerns. Travel advice from the US State Departments warns both US citizens and Diplomats in China about physical and electronic surveillance: “Hotel rooms (including meeting rooms), offices, cars, taxis, telephones, Internet usage and fax machines may be monitored onsite or remotely, and personal possessions in hotel rooms, including computers, may be searched without your consent or knowledge,” the department’s travel advice for China says. Business travellers should be particularly mindful that trade secrets,

negotiating positions and other business-sensitive information may be taken and shared with local interests.” Gerry Hall, Managing Director of UK Based IPS said, “This reflects the trends that we are seeing with the increasing use of covert surveillance kit which is easily and cheaply available online for anyone to afford, without even having to leave their homes.” He continued “Advancements in technology means that sophisticated recording equipment both visual and audio can be disguised in practically any object you can imagine. Cameras and microphones have been built into clothes hooks,

smoke detectors, and air freshener containers, electrical wall sockets, bathroom mirrors, even an innocent looking TV remote control can be modified to have a duel use. The list really is endless!” IPS supply security solutions, debugging sweep team services, countermeasures and consultancy services, and are the leading international distributor for Research Electronics International (REI) and the only company in the UK authorized to offer certified training on REI technical surveillance counter measures equipment, including the OSCOR GREEN, ORION & TALAN.

Motorola Solutions Expands Security Services to Fight Attacks Motorola Solutions now offers government and public safety customers expanded cybersecurity services to help protect against cyber attacks, especially as they share information across agencies and work together to solve crimes. The company’s new Cybersecurity Professional Service is a collaborative effort with customers to help them identify and manage cyber risk within their operations by evaluating technology, processes and staff capabilities and recommending solutions to help agencies respond

quickly and effectively to potential breaches. According to a recent survey of businesses and government agencies, the number of cybersecurity incidents detected by respondents climbed to 42.8 million in 2014, an increase of more than 48 percent in just one year. That’s the equivalent of 117,339 incoming attacks each day for a year. Cybersecurity Professional Services help maintain the integrity of police investigations by protecting against cyber threats to mission-critical

www.worldsecurity-index.com

radio networks and realtime information sources such as videos of incidents and photographs and fingerprints of suspects that are shared between agencies. The new service comes in addition to Motorola Solutions capabilities that already help prevent breaches such as network security monitoring and software security updates, which enable customers to maintain the most current and effective versions of programs like records management systems. “Many organisations believe their most sensitive

mission-critical information is safe, but it is becoming clear that even public safety and government agencies are prime targets for cyber criminals,” said Kelly Mark, corporate vice president, Motorola Solutions. “Cybersecurity Professional Services builds on Motorola Solutions’ decades-long experience in mission-critical security services and helps customers respond quickly to ever-changing security threats by providing periodic assessments to identify risks and prioritise next steps to maintain secure communications.”

World Security Report - 29


INDUSTRY NEWS

Thales has announced that it has signed an agreement to acquire data protection company Vormetric Thales has announced that it has signed a definitive agreement to acquire Vormetric, a leading provider of data protection solutions in physical, virtual and cloud infrastructures, for US$400m. The transaction is subject to customary closing conditions and expected to close during the first quarter of 2016. “The acquisition of Vormetric is a great opportunity to accelerate the growth of our cybersecurity activities. Combining Thales critical IT systems protection capabilities with Vormetric’s know-how in data protection will create a global leader in data security, offering comprehensive solutions for protecting enterprises against cybersecurity threats.” Patrice Caine, Chairman & CEO of Thales. Leveraging a range of data-centric security technologies, Vormetric provides efficient sensitive data protection.

This combines perfectly with Thales e-Security activities, which already hold a leading position in hardware security modules (HSMs), protecting critical networks and data of 19 of the 20 largest banks in the world and leading technology companies. When the acquisition is completed, Thales will further extend its cybersecurity capabilities and offer its customers a comprehensive data protection suite of solutions for protecting enterprises against cybersecurity threats at the highest levels of assurance. This strategic move complements Thales’s market leading cybersecurity activities, and further strengthens the Group’s overall

30 - World Security Report

profitable growth strategy. Headquartered in San Jose, California, Vormetric is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. With a workforce of 200 employees, Vormetric helps over 1,500 enterprises, including 17 of the US top 30 companies, to protect their sensitive data from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data — anywhere it resides — with a high performance, market-leading solution set. The company revenues are on pace to reach US$75 million for the current fiscal year.

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with 540 employees in the United States, United Kingdom, and Hong Kong. “The opportunity to join Thales has come at a time when the world is focused on data to enable business due to the explosive growth of mobile, cloud and social media. Jointly we are in a unique position to offer leading security solutions to protect data, while broadening the support to our customers and partners globally.”

www.worldsecurity-index.com


INDUSTRY NEWS

Raytheon Awarded Contract from DTRA Raytheon Company has been awarded an additional $18.6 million contract from the Defense Threat Reduction Agency (DTRA) to help the Government of the Hashemite Kingdom of Jordan (GoHKJ) secure its borders with Syria.

Raytheon previously announced the completion of Phase 2 and 3 (Jordan/ Syria and Jordan/Iraq borders, respectively) as part of the JBSP, delivering key capabilities to help safeguard the Kingdom’s borders.

The award is for increment three of DTRA’s Jordan Border Security Project (JBSP).

“Raytheon continues to leverage local partnerships and regional knowledge to deliver a superior border security solution,” said Dave Wajsgras, president of Raytheon Intelligence, Information and Services

Raytheon expands border security work in Kingdom of Jordan

(IIS). “This latest contract award acknowledges Raytheon’s growing expertise in the region.” Under the latest contract, Raytheon will install passive barrier fencing, sensors, cameras and a command and control system. The focus is to enhance the Jordanian Armed Forces’ ability to deter, detect and interdict threats. “Our goal is to deliver the best possible border security offering for the

Kingdom,” said Todd Probert, vice president for Mission Support and Modernization at Raytheon IIS. “The best border security solution is the right combination of equipment, training and sustainment based on customer needs.” Raytheon’s border security efforts support the DTRA’s Cooperative Threat Reduction Integrating Contract (CTRIC II), awarded in April 2011 as a multipleaward, indefinite delivery/ indefinite quantity contract.

FLIR Introduces Fido X2 Handheld Explosives Trace Detector FLIR Systems has announced the launch of the Fido(R) X2, the latest addition to its leadingedge Fido X-Series handheld explosives trace detectors (ETD). Offering high sensitivity at an accessible price, the easy-to-use Fido X2 features FLIR’s proprietary TrueTrace(TM) technology to quickly and accurately detect a broad range of chemicals used in the manufacture of homemade, commercial, and military explosives. At less than 1.5 pounds and featuring a new ergonomic design, the Fido X2 is ultralightweight and durable for maximum portability. Intended to be used by state and local law enforcement agencies and first responders at security checkpoints or

during high alert stages, the Fido X2 screens vehicles and personal belongings for explosives residue that might indicate contact with explosives or incendiary devices. FLIR’s field-proven TrueTrace technology

www.worldsecurity-index.com

features a proprietary multiplexed luminescence technique for sensing trace levels of explosive chemicals and is uniquely formulated to detect a broad range of explosives. With analysis provided in ten seconds or less, law enforcement officers can quickly and accurately screen for threats to mass transit, sporting arenas, and critical infrastructure with confidence. The Fido X2’s guided user interface allows law enforcement to deploy units broadly across officers with minimal

formal training. On-screen prompts and simple go/no-go alarms guide users through operation and aids sampling and decision-making. The Fido X2 also features on-device video training that provides real-time help and reduces the cost and logistical burden of recurrent training. “The Fido X2 is the latest FLIR product that strives to ensure public safety, and does so at a price-to-value ratio that is unprecedented,” said Andy Teich, President and CEO of FLIR. “The extraordinary sensitivity of the Fido X2 means that users can detect the most minute explosives residue. Additionally, its focus on ease-of-use will allow it to be deployed broadly across many applications.”

World Security Report - 31


INDUSTRY NEWS

Smiths Detection Inc.’s dual-view HI-SCAN 6040-2is qualifies for updated Air Cargo Screening List Smiths has been able to demonstrate the ability to remain on the forefront of security solutions and meeting the needs of its air cargo customers.

Smiths Detection Inc. (SDI) announces its dual-view HI-SCAN 6040-2is X-ray has become its latest system to be accepted into the “Qualified” section of TSA’s Air Cargo Screening Technology List (ACSTL.) The HI-SCAN 6040-2is is an advanced, dual-view X-ray inspection system which uses multiple views and sophisticated algorithms to indicate items that might be threats. It offers ACSTL “Category A” screening for smaller items, items that will later be in pallets, or break bulk cargo. It can penetrate 35mm steel and provides a flexible, easy-to-use interface, which makes it a top choice for government buildings, hotels and other infrastructures where security checkpoints are required. It has also has been approved for EU

Standard 3 Type C (LEDS) use in airport checkpoints across Europe. Terry Gibson, President of SDI, said: “Inclusion on the ACSTL by TSA is further proof of our nextgeneration HI-SCAN 6040-2is’s best-in-class capabilities. SDI works with all our customers to deliver the latest evolutions in

technology to meet their screening requirements and provide speed and accuracy, while remaining cost-effective.” One of the biggest changes in the 2015 update to the ACSTL was the requirement that new X-ray inspection purchases must be dual-view. Through this achievement,

SDI currently has one of the largest selections of dual-view X-ray screening equipment on the qualified section of the ACSTL. Customers can now select from one of twelve SDI dual-view systems for their cargo screening applications to meet the TSA Air Cargo screening requirements. Combined with the industry-leading IONSCAN 500DT, qualified for explosives trace detection, SDI offers its customers the most breadth and most capable platform of technologies to meet today’s strict security standards.

Ophir Optics will launch a new 180-Degree FOV High Definition Lens at Milipol A new extra lightweight, 180-degree field-ofview (FOV) F/1.4, high definition fisheye lens for use in both commercial and defense applications, will be released by Ophir Optics, a leading designer and manufacturer of precision infrared optics at Milipol 2015 The new lens is an extremely wide angle, 180-degree field-of-view lens, compatible with

both HD and VGA format for both 17 and 12m pitch FPAs of leading uncooled detector manufacturers. It is the first of its type for use in both commercial and defense applications. Designed to improve the existing 60-, 90- and 120-degree FOV lenses presently used, this lens weighs just 90 grams and can operate in extreme temperature ranges. The new high definition

32 - World Security Report

lens is the first of a new generation of wide FOV lenses. Constructed to aerospace standards, the 180-degree FOV lens is suitable for many applications in defense and security operations; it is ideal for surveillance, security and situational awareness applications. The external optical surface is coated with (optional) high durability coating or Low

Reflection Hard Carbon coating to provide better durability in harsh environmental conditions.

www.worldsecurity-index.com


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Obexion Shutters, developed by Charter Global Ltd, now include the first ever security shutters certified to LPS 1175, Issue 7, SR5 Security shutters to SR2, SR3, SR4 and bespoke risk specific specifications also available protection without compromise

www.obexionshutters.com

0845 050 8705

Targeted Solutions to your PR & Marketing Needs

KNM MEDIA Specialising in the Aerospace, Defence and Security Markets

Tel: +44(0)208 144 5934 Email: tony.kingham@worldsecurity-index.com

www.worldsecurity-index.com

World Security Report - 33


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Border Security Matters

Border Security Matters is the quarterly newsletter of BORDERPOL, the World Border Organisation, delivering agency and industry news and developments, as well as more in-depth features and analysis to over 10,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 34 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

November 2015

2-5 Asian Defence & Security, Bangkok, Thailand www.asiandefense.com 10-12 Securika Sfitex, St Petersburg, Russia www.securityshows.com/SFITEX 17-18 The CYBERPOL International Cyber Security Summit, Brussels, Belgium www.ecips.eu/summit 17-19 Milipol, Paris, France en.milipol.com 22-26 KIDEC, Kuwait www.kidec.com.kw 26-27 Business security conference, Warsaw, Poland news.sas-ma.org/lang/en

December 2015

1-2 Maritime Security and Coastal Surveillance 2015, Kuala Lumpur, Malaysia www.coastalsurveillancemda.com 2-4 CBRNe Summit Asia, Singapore www.intelligence-sec.com/events/cbrne-summit-asia 8-10 4th World BORDERPOL Congress, The Hague, Netherlands www.world-borderpol-congress.com

January 2016

17-19 Intersec Dubai, UAE www.intersecexpo.com

35 - World Security Report

To have your event listed please email details to the editor tony.kingham@worldsecurity-index.com

February 2016

21-23 ASIS Middle East 2016 Dubai, UAE 22-25 IDEX Abu Dhabi, UAE www.idexuae.ae 23-24 MilSatCom Middle East & Africa Abu Dhabi, UAE www.milsatcom-mea.com

March 2016

2-3 Critical Infrastructure Protection & Resilience Europe, The Hague, Netherlands www.cipre-expo.com

June 2016

15-16 Critical Infrastructure Protection & Resilience Asia, Bangkok, Thailand www.cip-asia.com

www.worldsecurity-index.com


4

World BORDERPOL Congress

th

Speakers include: • Pol. Mj. Gen. Apichat Suriboonya, Head of INTERPOL NCB Thailand, Commander of Foreign Affairs Division, Royal Thai Police • David Parradang, Comptroller, Nigeria Immigration Service • Goran Stojkovski, Border Management Officer, OSCE Office in Tajikistan • Ricardo Baretzky, President, CYBERPOL • Krum Garkov, Executive Director, EU-LISA • Didier Clergeot, Coordinator, INTERPOL IBM Task Force • Florian Forster, Head, Immigration and Border Management Division, International Organisation for Migration • Mark Singleton, Director, International Centre for Counter-Terrorism • Clarence Yeo, Chief Commissioner, Immigration & Checkpoints Authority • Major Issa Al Shaibi, Passenger Information Centre Manager, Royal Oman Police • Hans de Moel, Royal Netherlands Marechuassee Owned & Organised by:

8th-10th December 2015 The Hague, Netherlands

Enhancing collaboration in global border protection and management challenges.

Registration Now Open

Book online today and join us at the annual gathering of the border protection and management community. The World BORDERPOL Congress is the only multi-jurisdictional transnational platform where the border protection, management and security industry policy-makers and practitioners convene annually to discuss the international challenges faced in protecting not only one’s own country’s borders, but those of neighbours and friends. Join us for developing co-operation and collaboration through high level discussions and presentations on the future for border protection and management. Visit www.world-borderpol-congress for further details and the Congress programme. We look forward to welcoming you to The Hague, Netherlands on 8th-10th December 2015 for the next gathering of border and migration management professionals.

www.world-borderpol-congress.com Supported by:

Media Partners:


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.