World Security Report Jan/Feb 2017

Page 1

Official Magazine of

JANUARY/FEBRUARY 2017 www.worldsecurity-index.com

FEATURE: G4S Risk Consulting Global Forecast 2017 Q1 PAGE 4

FEATURE: Risk Based Approach to Critical Infrastructure Protection PAGE 16

FEATURE: Who uses “Password” as a password these days? PAGE 21

COVER STORY

Challenges for PPP in time of new types of security threats


NATO, Security and The Donald! It’s hard to talk about any big issue these days without the new President of the USA, Donald Trump, dominating the conversation. But, what are the implications of a Trump Presidency on global security? The truth is, it’s difficult to say. What Donald Trump said on his campaign trail is one thing, but what he does as President may well be another. A dumbed down version of the “Muslim ban”, euphemistically called ‘extreme vetting’ of borders, is playing out worldwide as I write. But Trump will say this is a campaign promise fulfilled. Bringing back “water boarding” was another campaign promise. But, he has deftly side stepped that promise by saying that he will defer to the recommendations of his newly appointed Defense Secretary, James Mattis and CIA Director Mike Pompeo, who both oppose the use of torture. This he has done whilst still claiming, for the benefit of his supporters, that he still supports torture. I think we can say this one is promise dodged. On another but much more important issue for global security is the question of NATO, on which, on the face of it he seems to have made a complete U-turn. On the hustings, candidate Trump said that NATO was ‘obsolete’. But last week during her visit to the Whitehouse, the UK’s Prime Minister, Theresa May said in her joint press conference with President Trump, that he had confirmed that he was 100% committed to NATO. That commitment was also reaffirmed in the same percentage terms during a phone conversation with Angela Merkel, according to a joint GermanU.S. statement. We have heard no such reassurance directly from the President. If, that is really his view many in Europe and central Asia will now be breathing a huge sigh of relief.

www.world-border-congress.com

Whilst Russia and what is going on in the Ukraine may not be high on President Trumps agenda, but for many European nations and former Soviet nations bordering Russia, it is of vital importance. Ethnic Russians form considerable minority populations in all the Baltic states; in Latvia (556,422), in Estonia (321,198), in Lithuania (174,900) (2011 figures). There are also large ethnic Russian populations in other ex-Soviet states like Kazakhstan, Belarus, Uzbekistan, Kyrgyzstan and Turkmenistan.

www.cipre-expo.com

www.ciprna-expo.com


www.worldsecurity-index.com

If, as some had feared, the US began to be less committed to NATO and perhaps came to a ‘gentleman’s’ agreement with Vladimir Putin about spheres of influence, then an emboldened Russia could use the same tactics and justification employed in the Ukraine and Crimea to interfere in their internal politics or worse, seize territory. NATO has been the bulwark for security in Europe since the end of World War II. Since the fall of the Berlin wall in 1989, it has been increasingly active around the world, with its first operation outside of Europe in 2003, when it took command of the international peacekeeping force in Kabul. It is now de facto, the military alliance of Western democratic nations and without it the world would be a very much more dangerous place. So, let’s hope all the pre-election rhetoric was just a negotiating stance to get others in the alliance to pay their dues. Here, President Trump has a good point! If EU members all met their defence spending targets, which should be 2% of their $17 Trillion (US) GDP, European defence spending would dwarf what Russia could ever afford in terms of military hardware from its $1.2 Trillion (US) GDP, which is less than that of Italy alone. Now that Britain is about to leave the EU, and if the EU survives in its present form, perhaps it’s time for a real European integrated army, and President Trump might unwittingly be the catalyst for it!

Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

World Security Report is a bimonthly electronic, fully accessible e-news service distributed to over 50,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.

Tony Kingham Editor

Copyright of KNM Media and Torch Marketing.

ADVERTISING SALES Paul Gloc (UK and Rest of Europe) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +33 (0) 6 1609 2153

Bernadette Terry (North America) E: bernadette@btiglobalinnovation.com T: +1-613-501-5316


WORLD SECURITY

G4S Risk Consulting Global Forecast 2017 Quarter 1

The G4S Global Forecast for Q1, 2017 focuses on the entry to office of Donald Trump as the new US president which has unsettled the status quo of global governance. Trump is an unknown quantity on both the domestic and international stages and his campaign statements are not a reliable indicator of the direction of his administration. Uncertainty will breed chaos and the most likely outcome will be a return to the era of great power competition and the emergence of a multipolar order in the absence of overarching US power. A key issue will be the evolution of the Trump administration’s relationship with the US military, intelligence and security apparatus. The incoming president’s frequent use of Twitter to voice his unguarded opinions has the potential to trigger diplomatic gaffes that create enmity around the world. Equally influential will be the president-elect’s limited attention to detail, which will place great responsibility in the hands of the core of his senior advisers. Other actors are already seeking to exploit the opportunity. China will continue its emergence on the global stage in 2017. The extent of Beijing’s ambitions will be tempered by the Trump administration’s appetite for confrontation or maintaining the status quo. Russia appears best placed to benefit from a Trump administration likely to adopt a transactional approach to resolving issues that placate key constituents in the US, such as the Iran nuclear deal or relations with Cuba.

4 - World Security Report

Islamic State brand retains high value Although Islamic State (IS) will continue to suffer territorial losses in its Syrian-Iraqi heartlands, the terrorist organisation’s global threat profile will not decline. IS franchises will remain a threat across the globe with the ideology and brand continuing to keep the terrorist threat perception high. As hundreds of foreign fighters flee the conflict zone, many seeking to return to their countries of origin, they will present a critical terrorist threat via organised attacks, as well as low-sophistication, “lone wolf” assaults. Coupled with hundreds of sympathisers ready to launch their own attacks, the threat outside IS territory will intensify in 2017. Although major attacks on critical national infrastructure are unlikely, particularly in Europe and North America, public perception of the group’s ability to operate outside of its base will fuel securitisation measures and encourage radicalised individuals to launch attacks.

Continued rejection of the political elite Empowered by the election of Donald Trump and to a lesser extent the Brexit campaign victory, anti-establishment movements will continue to prosper in 2017, particularly in Europe. Angry voters are seemingly rejecting the liberal worldview, a legacy of the Iraq war and the 2008 financial crisis, and supporting nativist, nationalist and sometimes racist movements and individuals who able to exploit to the electorate’s concerns over immigration, changing social conventions and “out of touch” politicians. Populist rhetoric targeting established parties and immigrants will continue to dominate political discourse in 2017, particularly in Europe. Cyber warfare Cyber warfare will continue its emergence as a critical battle space

www.worldsecurity-index.com


WORLD SECURITY

between great powers in 2017. Mostly occupying the “hybrid warfare” terrain between aggressive diplomacy and outright conflict, the absence of established norms and international treaties will open up the world to the long-feared prospect of a “cyber Pearl Harbour”, in which a surprise attack takes out the online infrastructure of a country, devastating an economy or a military’s commandand-control architecture. With defence manufacturers gearing up to lobby for the Trump administration to fulfil his pledges to invest heavily in cyberwarfare capabilities, US adversaries will be readying their assets for purposes of deterrence, particularly China. Africa

International agencies’ influence to further decline Tensions between some African countries and international institutions have grown through 2016, with an uptick in anti-UN sentiment and moves by the likes of Burundi, South Africa, Kenya and DR Congo to leave the jurisdiction of the International Criminal Court (ICC). The trend will continue into 2017, with ongoing demands to withdraw UN peacekeepers and cancel ICC membership. Despite calls to reconsider, Gambia, Burundi and South Africa have officially withdrawn from the jurisdiction of the ICC, while DR Congo and Kenya have initiated their exit. Opposition within South Africa has halted its departure by filing a case with the country’s constitutional court. Nevertheless, the withdrawals mark a major

www.worldsecurity-index.com

setback for the ICC, which has drawn criticism on the continent for mainly pursuing cases against Africans, leading to governments stirring up popular support by re-claiming sovereignty. Symbolic steps by large and influential African nations may trigger further withdrawals in 2017, such as Uganda and Namibia, which have previously criticised the ICC. The benefits of popular support may interest other authoritarian leaders, such as those of in Chad and Rwanda, although many leaders will avoid alienating foreign donor states.

to compromise with their political opponents, especially in countries where elections are contested or expected, such as Burundi, DR Congo and CAR, preventing national stabilisation.

With the setbacks for the ICC, the show of disregard for human rights and international law will frustrate idealistic African and European governments. US focus on the continent is likely to sharply decline under the Trump presidency, with interest likely to be limited to an exclusive focus on counter-terrorism. The result will encourage some incumbents to cling to power, notably Joseph Kabila in DR Congo, adding to the risk of a negative spiral that will leave civilians vulnerable to repression, ethnic violence and civil war. The countries most at risk will be those that are already unstable: South Sudan, Central African Republic, DR Congo and Burundi.

Continuing conflict in Syria and Yemen

Anti-UN protests have occurred in CAR, Sudan and Mali, among others. UN peacekeepers have been implicated in scores of scandals involving allegations of abuse of power, corruption and incompetence by its forces, ranging from sexual abuse by French peacekeepers in 2014 to the failure to protect aid workers from rape in South Sudan. With UN forces coming under increasing criticism, attention has been diverted away from their role in ending conflicts and towards managing anti-UN sentiment. This trend is likely to continue throughout 2017 and an increasing number of communities could revolt against missions, particularly in Mali, where the complex conflicts in the north-east are gathering pace. Anti-UN sentiment will offer repressive governments an opportunity to subvert pressure from the international community

Middle East and North Africa

The international community and regional governments will continue to work towards political settlements in Syria and Yemen throughout 2017. However, political wrangling will impact the search for peace in both contexts as competing parties seek to make gains on the ground before approaching the negotiation table. In Yemen, the failure of six peace agreements since the outbreak of the war in March 2015 is indicative of the deep divisions between President Abdurabbu Mansour Hadi and the Houthi rebels over the issue of power sharing within a unity government and the future role of the current Yemeni leader. The UN could offer an amended version of the “Kuwait Agreement” in early 2017, although the issue of power sharing has been the root cause of the failure of previous peace proposals. In the absence of a political solution to the civil war, minor ceasefires may be introduced. Despite this, fighting and airstrikes will continue, particularly in the northern provinces from where Houthi fighters routinely launch rockets at Saudi territory. The US election of Donald Trump has cast uncertainty over the direction of the Syrian conflict. The determination of US-Russian relations in early 2017 will dictate the course of the war and projected timeframe for peace. Considering the substantial territorial gains made by the Assad regime during Q4 2016, particularly in Aleppo, pro-government forces will continue to carry this momentum

World Security Report - 5


WORLD SECURITY

throughout 2017, turning attention to other rebel-held areas of the country after Aleppo is secured. In the unlikely event that antigovernment rebel forces substantially alter the current course of the conflict in 2017, there is a high likelihood that President Assad will exact an incremental military victory in the heavily populated western areas of the country. Assad will focus on defeating non-Islamic State (IS) rebels, seeing their capitulation as a victory, while others focus on destroying the IS threat. Fractures may also materialise within the antigovernment rebel alliance, as further territorial concessions exert pressure on the union of revolutionary and jihadist fighting groups. A realised political solution to the conflict is unlikely to materialise in 2017. Failing institutions and austerity breed unrest Across the region in 2017 perceived government legitimacy and political stability will depend on the ability of governments to protect citizens and provide basic services. While defeating IS is the major security focus of the year, failing political institutions and inadequate public services will continue to play a major role in domestic politics. Energy and water shortages will persist in Iraq, Libya, Egypt and Gaza, fuelling public discontent and strengthening anti-government movements. Political failings linked to corruption also remain widespread across MENA and could spark further antigovernment sentiment. In Iraq, Prime Minister Hayder al-Abadi’s failing anti-corruption drive will bolster the Sadr movement, threatening further unrest and instability in Baghdad and the southern provinces, particularly Basra. In Egypt, the government passed a law in Q4 2016 restricting rights groups and civil society activists, indicating a continuation of political repression in 2017. Police brutality is also likely to go unchecked as President Abdel Fatah al-Sisi takes steps to minimise the emergence of coordinated anti-government movements, triggered by accusations of brutality, embezzlement, extrajudicial killings and repression.

6 - World Security Report

With oil prices remaining low, Gulf states and other major oil producers are continuing to make changes to spending and welfare policies in a bid to mitigate large budget deficits. Several states, including Saudi Arabia, Egypt and Kuwait, have already implemented subsidy reductions, but the political fallout has resulted in some backtracking on much-needed austerity measures. Further austerity measures, including reductions in public housing, social payments and the introduction of sales taxes, in the Gulf Cooperation Council and Algeria may trigger protests, particularly in Algiers, while also undermining political stability. Kuwait dissolved its parliament in September 2016 due to political fallout from subsidy removals, indicating the careful balance that rulers must make in states where the social contract is based on state financial benevolence, but highly restricted political freedoms.

will continue throughout 2017. A sustained military operation in the south-east of the country will trigger further terrorist attacks on northern cities, namely Istanbul and Ankara, as the draconian imprisonment of antigovernment activists fuels recruitment for insurgent groups. The Kurdistan Workers’ Party (PKK), and its more violent offshoot Kurdish Freedom Hawks (TAK), will continue to respond with sporadic attacks in major urban centres.

South Asia

Turkey’s international realignment Relations between Turkey’s ruling Justice and Development Party (AKP) and the West deteriorated significantly during 2016. The breakdown was overtly blamed on the Turkish government’s post-coup security round-ups, but this masks the medium-term decline in relations related to issues surrounding antiIslamic State (IS) operations in Syria, specifically the US-led coalition’s support for certain Kurdish groups. Turkey’s expression of interest in joining the Shanghai Cooperation Organisation highlights its sidelining of its pursuit of EU membership and the likelihood of further animosity between Turkey and the West in 2017. Turkish-Russian relations will remain delicate over the next year, in part due to the country’s differing stance on the future of Syrian President Bashar al-Assad. On a domestic footing, Turkey will likely experience a spike in civil unrest in the run-up to the presidential system referendum, scheduled for April 2017, with opposition parties rallying against the referendum throughout Q4 2016. Meanwhile, the government’s crackdown on political dissent and Kurdish-linked individuals and groups

Militancy remains principal regional risk Prospects for an enduring peace in Afghanistan 2017 are slim. While the signing of a peace agreement between the government and Gulbuddin Hekmatyar’s Hezb-e Islami in September 2016 set an encouraging precedent that some of Afghanistan’s militants are amenable to negotiation, efforts to broker peace with the Taliban will remain fraught with difficulty. The likelihood of the group’s demands being met, chiefly the withdrawal of all foreign military personnel, remains remote, with the US and NATO both committing sizeable military forces in 2017 in an effort to shore up Afghanistan’s increasingly precarious security situation. Continuing political deadlock within the country’s National Unity Government (NUG), not least its failure to implement a power sharing agreement, will further serve to fuel insecurity, with urgently-required resources failing to reach areas at risk of being overrun by the Taliban.

www.worldsecurity-index.com


WORLD SECURITY

Meanwhile, Islamic State (IS) is anticipated to grow its presence in the country during the coming year, adding an increasingly sectarian character to Afghanistan’s militant threat. Three major attacks targeting Shi’a worshippers in Kabul in 2016 indicate the group’s intention to foment sectarian tensions in the country, as per its operations in the Middle East. Further attacks against minority religious sites, as well as security forces and civilians in the group’s Eastern strongholds, are highly likely as IS moves to expand its sphere of influence into South Asia. Tackling militancy will also remain high on the security agenda for Pakistan in 2017. Having experienced a series of mass casualty attacks in late 2016, including a number claimed by IS, Balochistan province will likely form the epicentre of the government’s counter-terrorism efforts. The development of the China-Pakistan Economic Corridor (CPEC), a USD 46 billion trade and transport belt of which a large stretch passes through Balochistan, will be a key driver in the government escalating its security provision in the province. While Beijing’s appetite for further investment in Pakistan is unlikely to diminish given the potential for huge rewards and the development of its “One Belt, One Road” strategy, the killing by Baloch separatists of two Chinese workers in Ormara and two Pakistani coast guard personnel in Jiwani, as well as the mass-casualty attacks, threaten to unsettle investor confidence in Pakistan’s ability to preclude militant activity, which it claims to have largely eradicated. Following an IS-claimed attack in Dhaka in July 2016, concerns will remain in Bangladesh over further attacks. IS has made clear its intention to advance its operational presence in the country and will seek to recruit members from the country’s growing pool of Islamists left aggrieved following a government crackdown on the Jamaat-e-Islami (JeI) party during 2016. IS violence in 2017 will likely consist of lo-fi attacks, mainly using hand-held weapons, targeting members of religious minorities. Nonetheless, foreign nationals remain a highly desirable target for IS attacks

www.worldsecurity-index.com

and, while the government has increased security across the country’s urban centres, the threat of a mass casualty attack targeting expatriates remains high.

Asia-Pacific

China dominates regional agenda With US President Donald Trump’s rhetoric questioning the importance of regional alliances in the region, US foreign policy in the Asia-Pacific is expected to take a gradual shift away from the line of the Obama administration. Concern will centre on process, with statements and language used by US leaders’ closely watched, particularly in China, which will exert its regional influence through trade and investment in anticipation of the collapse of the Trans-Pacific Partnership (TPP) trade deal. Possible US focus away from the region will see Beijing push the Regional Comprehensive Economic Partnership (RCEP), which excludes the US, in an attempt to fill a trading void and be seen as a reliable partner. The latent threat of a Trump administration starting a trade war, by labelling China a currency manipulator for example, will deter cooperation. Obama’s policy of engagement at an institutional level will give way to transactional relationships, where the likes of Japan will be expected to contribute more towards their own security. As such, US allies in the region are keen to seek reassurances about Washington’s security commitments to them.

With efforts by the international community failing to deter North Korea from conducting nuclear tests, 2017 is set to be an important milestone in Pyongyang’s nuclear programme. North Korea’s rate of progression suggests further large-scale missile tests are to be expected, prompting neighbouring countries Japan and South Korea to increase their security, with both countries looking set to deploy the US-developed THAAD defence missile system. This could be reevaluated should a liberal candidate become the new South Korean president in the event President Park Guen-hye’s impeachment is upheld. Meanwhile, further tests will cause China to uphold restrictions on travel, exports and asset freezes, as Beijing’s patience deteriorates. The tightening of economic sanctions and likely downsides could make the renewal of the stalled six-party talks attractive for Pyongyang. However, this will be tempered by China’s willingness to work with the US. In the South China Sea, the threat of conflict between claimants over several territorial claims is expected to ease. China and the Philippines will continue to take positive steps towards a conciliatory relationship, such as vessel access to the disputed areas. However, ongoing Chinese miltarsation of artificial reefs will result in friction between Beijing and Washington, but will be limited to military posturing. Insurgency and Terrorism Terrorism and insurgency will remain a latent threat throughout AsiaPacific in 2017, as insurgent groups continue to call on jihadists returning from battlefields in the Middle East to carry out attacks. Security agencies will attempt to mitigate this threat through multiple arrests and detentions of those suspected of engaging or planning to engage in terrorist activities. However, the risk of a large scale attack remains prevalent, particularly in Indonesia. Insurgency in Thailand’s deep south has the potential to spill into popular tourist resorts frequented by foreigners, including Phuket and Hua Hin. Previous bombings in

World Security Report - 7


WORLD SECURITY

August 2016 signify the capability for insurgent operations beyond the volatile southern provinces and will likely see the government push through increased counter-terrorism reforms, as insurgents contemplate whether to maintain the current levels of violence or intensify them for a better negotiating stance. The southern region of the Philippines will continue to remain a base for insurgent groups Abu Sayyaf and the Maute Group with kidnappings a persistent threat. The move to create an autonomous region for the Moro National Liberation Front (MNLF) and Moro Islamic Liberation Front (MILF) will stumble on in 2017; Duterte’s commitment to passing Bangsamoro Basic Law is unclear amid a poor security environment in the south, with cells declaring allegiance to IS and little incentive for MILF to police them. In Myanmar, Aung San Suu Kyi’s government will face a difficult challenge in attempts to reach a political peace deal with ethnic rebel groups, as the military continues with its war of attrition amid lowlevel attacks in the northern regions, undermining the peace process. The two track approach may prove counter-productive. Meanwhile, the military’s questionable treatment of Rohingya Muslims and displaced peoples in Rakhine will likely attract protests in Muslim-majority countries in the region, pressuring Suu Kyi into brokering a tentative agreement on Rohingya rights.

North and Central Americas

Regional strategic relations Regional strategic relations will undergo major change in 2017 under the new United States government, beginning immediately in January 2017 with President Trump’s moves against immigration. Trump’s first 100 days in office will set off strands of political trench warfare that will continue throughout his term. One particularly divisive issue will be threats to cut federal funding to “Sanctuary Cities”, the ten major cities including San Francisco, Oakland, Los Angeles, New York, Chicago and Washington DC that say they will resist moves to deport undocumented migrants, possibly prompting protest action. Republican control of all three branches of government will see the Democrats on the defensive over Barack Obama’s legacy, principally the extent of the rollback of the Affordable Healthcare Act and the Dodd-Frank financial regulations. How the US engages with the wider region will be unclear and unpredictable. The headline US development in Latin America - the rapprochement with Cuba - will come under heavy pressure. Meanwhile, Mexico will be the most impacted with Trump threatening to tax remittances, renegotiate the North American Free Trade Association (NAFTA) and to “build a border wall” during his campaign, all of which would have severe financial and social consequences according to the extent to which they are pursued. Canada faces the most benign outlook, not least as many will look to it to provide stability and reassurance over the coming year, but it will also face headwinds over issues such as an evolving terrorism threat and uncertainty around NAFTA. The US may also reassess development support in Central America, re-directing resources to security. In the long-run, cutting such funding may weaken economies and reverse the net decline in the flow of migrants northwards, aggravating the tensions that will emerge over issues such as smuggling and the border wall. Mexico is already under

8 - World Security Report

heavy US pressure to halt migration from its south, including Honduras, Guatemala and El Salvador; estimated at 450,000 in 2016. These volumes are expected to continue in 2017, placing additional pressure on Mexican infrastructure, public security and state finances. Although Mexico has developed bilateral relationships in recent years, efforts to further tighten the southern border with Guatemala may add to regional friction, not least if the US begins threatened mass deportations of illegal immigrants. Ongoing serious crime to gain ferocity Despite efforts in Central America to stem the level of serious and organised criminality, the issue will remain prevalent in 2017. Honduras, Guatemala and El Salvador have created the Tri-national AntiCrime Task Force, a regional force comprised of military and police personnel tasked with improving security and tackling organised crime. The severity of crime levels, complicity from officials and endemic corruption and poverty will ensure the task force faces an uphill struggle. The three countries and Mexico were ranked as some of the most violent countries in the world in 2016 as a result of conflict over the criminal flows northwards and the militarisation of the drug war, both by law enforcement and by heavilyarmed syndicates and gangs. El Salvador has overtaken Honduras as the non-conflict country with the highest rate of homicide at around 100 people per 100,000, with Honduras recording 64 people per 100,000. There is no reason to expect violent crime rates to decline substantially in 2017. Likewise, organised crime will endure in Mexico despite President Enrique Peña Nieto’s administration seeing an initial decline in violent crime. Violence linked to the expanding methamphetamine and heroin trade saw homicides increase in the latter months of 2016 and this trend is expected to increase in 2017. In the US, drug consumption patterns will continue their long-term shift from inner cities to depressed

www.worldsecurity-index.com


9th-11th May 2017

The Hague, Netherlands www.cipre-expo.com

Co-Hosted by:

Converge; Collaborate; Cooperate The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands. Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure. Join us in The Hague, Netherlands for the premier event for operators and government establishments tasked with Critical Infrastructure Protection and Resilience. For further details and to register visit www.cipre-expo.com Confirmed Speakers include: • Sir Julian King, Commissioner for Security Union, European Commission • Philip Rydén, Chief Security Officer, E.ON Sverige AB • Gonzalo Martin de Mercado, Studies manager, Integrated Applications, ESA – European Space Agency • Konstantinos Moulinos, CIIP Project Manager, ENISA • Ben Govers, Senior Advisor / Project Manager, Dutch Ministry of Security and Justice, Netherlands • Jaya Baloo, CISO, KPN, Netherlands • Andrew Wright, Head of Industrial Resources and Communication Services Group (IRCSG), NATO • Michael Lowder, Director - Office of Intelligence, Security & Emergency Response, US Dept of Transportation • Gabriela Matei, Analysis Team Manager, National CYBERINT Center, Romania • Anjos Nijk, Managing Director, European Network for Cyber Security

• Martin Lee, Technical Lead, Security Research, CISCO • Dr Zahri Yunos, Chief Operating Officer, Cyber Security Malaysia • Pepijn van den Broek, Senior Associate, International Safety Research Europe BV • Frederic Petit, Principal Infrastructure Analyst/ Research Scientist, Argonne National Laboratory and Regional Director, International Association of CIP Professionals, USA • Duane R. Verner, AICP, Program Manager, Argonne National Laboratory, USA • Kalliopi Anastassiadou, Research Associate & Project Manager, Federal Highway Research Institute of Germany / Bundesanstalt für Straßenwesen • Cyril Widdershoven, Director, Verocy • Ayhan Gücüyener, Regional Director, International Association of CIP Professionals, Turkey • Robert Mikac, Faculty of Political Science & National Protection and Rescue Directorate, Croatia

Leading the debate for securing Europe’s critical infrastructure Owned & Organised by:

www.worldsecurity-index.com

Supporting Organisations:

Media Partners:

World Security Report - 9


WORLD SECURITY

areas, notably via the opioid and heroin public health epidemics. The impact of the expanding output of Colombian cocaine will begin to show on US streets, with a potential comeback for crack cocaine and rising crime rates associated with drug consumption.

South America

Economic turmoil threatens political stability In Brazil, President Michel Temer will continue efforts to bolster public confidence in his reform agenda following the impeachment of Dilma Rousseff in 2016. The Temer administration is anticipated to deepen its austerity programme, commencing a major programme of spending cuts in an attempt to shore up public finances and pull the country out of recession. The imposition of these measures, not least Temer’s personal intervention to ensure they receive Senate approval, will likely fuel a violent backlash from diverse opponents who have made clear their intentions to oust Temer in 2017. Protests will be directed at central government offices in Brasilia, where opposition supporters focused their efforts in 2016, as well as in major population centres, such as Sao Paulo and Rio de Janeiro. There will be challenges to the reform process: the recession, an ongoing corruption scandal involving state-owned petroleum company Petrobras and allegations that Temer misused funds during Rousseff’s 2014 election campaign.

10 - World Security Report

Venezuela’s political and economic woes are unlikely to be alleviated for several months as President Nicolas Maduro attempts to tighten his grip on power and push through unpopular reforms. Renewed talks between the opposition and the government are unlikely to be held for several months following the collapse of negotiations in November 2016. Given the high level of public discontent, there is a growing likelihood that Maduro will be forced out of office in 2017; however, Maduro’s refusal to allow a recall referendum to go ahead will likely mean that a transition to a new government will be fraught with disarray. Chronic shortages of essential supplies, including food and medicine, will also serve to fuel anti-government sentiment among the Venezuelan public, an estimated 75 percent of whom are unhappy with Maduro’s leadership, raising the risk of widespread protests across Venezuela, with state repression certain to drive further social unrest. Protests are likely to feature regular clashes between demonstrators and police. Opposition groups will seek to cause as much disruption as possible with a programme of protests targeting major roads in and around the country’s major cities.

In Argentina, President Mauricio Macri’s efforts to revive the economy, likely consisting of further public sector and subsidy cuts, will fuel disquiet among the country’s trade unions. Increasing anxiety over principal trading partner Brazil’s economic fortunes will also serve to worry unions, with Argentinian exports to the country having already fallen by around 50 percent in 2016. Macri’s ability to revive trust will lie largely with his ability to convince the public that the government is addressing poverty and is amenable to negotiation. Scepticism over the government’s ability to deliver economic prosperity will also fuel unrest by public sector workers in Peru. President Kuczynski’s weak presence in Congress will also delay reforms, with the Fujimorista Fuerza Popular party continuing to act as an obstructive political force. The extension into Peru of “Operation Car Wash”, which is currently investigating allegations of corruption within the Brazilian state, will serve to weaken the government’s credibility in the eyes of the public and create unease among foreign investors about the levels of corruption when doing business in the country.

Europe

Reform protests apply pressure on governments Opposition to the emerging trend of centre-right governments in 2017 will see public sector workers, trade unions and students continue to apply pressure across the region as they seek to improve working standards and resist market reforms. In Chile, further demonstrations over the compulsory privatised pension system are expected in cities across the country. With the government promising to review the system by way of reform commission, progress will slow, resulting in growing public frustration with Michelle Bachelet’s Nueva Mayoria (NM) coalition. Dwindling support for Bachelet will serve to grow confidence in the Chiel Vamos (CV) coalition, which is set to perform well in the November presidential election.

Further EU destabilisation Political uncertainty will remain a key theme throughout 2017, with several national elections scheduled to take place amid growing antiEU sentiment. Support for the traditionally smaller Eurosceptic right-wing parties will persist as

www.worldsecurity-index.com


WORLD SECURITY

they increasingly appeal to the widespread public frustration with the establishment. However, although Donald Trump’s victory in the US and the Brexit vote will boost the hopes of the more extreme, smaller political parties in Europe, including Italy’s Five Star Movement (M5S), the Netherlands’ Partij voor de Vrijheid and France’s Front National (FN), the defeat of the far-right Freedom Party (FPÖ) in Austria’s December 2016 presidential run-off vote appears to show that there may be a limit to the increasingly populist sentiment spreading across the continent. In France, centre-right candidate Francois Fillon, is the early favourite to win the April presidential election. However, the conservative National Front (FN) looks to be a strong contender with Marine Le Pen hoping to emulate Donald Trump’s victory in the US. Despite Germany experiencing increasing anti-EU sentiment, Chancellor Angela Merkel is likely to remain in office in the September election. The fallout from Italy’s vote against proposed constitutional reforms will continue. Following the resignation of Prime Minister Matteo Renzi, his replacement is faced with the difficult task of leading a caretaker government until the 2018 elections. Although the Eurosceptic Five Star Movement (M5S) party, which is enjoying an uptick in support, will push for early elections, the government will not wish to prolong political uncertainty in the short-term as the country struggles to contain a growing banking crisis. Fears of a renewed recession have increased as the post-referendum political instability will likely put off investors, placing several banks at risk of failing in the coming months. Negotiations between the UK government and the EU will dominate domestic headlines in 2017 as the UK struggles to define its aims. Much of the government’s energy will be spent finding a balance to placate the Brexit-voting public and commercial interests of big business. EU leaders will not give the UK a more favourable deal than if it had remained in the union. Patience among European capitals will dwindle, with Brexit-

www.worldsecurity-index.com

related uncertainties affecting economic and political environments on a regional level, as the EU fights to stabilise. EU membership talks with Turkey will continue as the EU remains keen to prolong the migrant deal between the two; however, tensions caused by the EU’s condemnation of the ongoing crackdown on opposition supporters and media freedoms following the July 2016 coup attempt may result in Turkey prematurely ending the deal.

despite increased awareness of the threat, regional authorities agree that there remains a high risk of a successful mass-casualty terrorist attack in 2017. Belgium, France, Germany and the UK remain most at risk, while Italy is also considered a target.

Russia and Former Soviet Bloc

Migrant crisis to shift towards central southern Europe Ongoing conflicts in the Middle East and North Africa will continue to see high numbers of migrants attempting to reach Europe, albeit at lower levels than those witnessed in 2015 and 2016. Increased border controls throughout central and eastern Europe, particularly in Bulgaria, Macedonia, Hungary and Slovenia, will see Italy again process the majority of migrants. Migrant numbers will increase through Q2 and Q3 as the summer weather makes the crossing easier. A large proportion will remain trapped in transit countries due border controls. This will continue to place the future of the EU’s passport-free Schengen zone in doubt, as border controls remain in place in eight of its members, including Austria, Hungary and Slovakia. As migrants seek safety in Europe, tensions with local communities will rise, likely resulting in continued antiimmigration protests and a marked increase in reported crimes against migrants. This will be particularly apparent in Austria, France and Italy where migrants have been dispersed away from camps. Enduring terrorist threat National authorities will continue uncovering terrorist plots. As Islamic State (IS) continues to lose territory in Syria and Iraq, there will be increased calls for supporters to carry out attacks in Western Europe. The principle threat will be smaller-scale attacks, carried out by self-radicalised domestic individuals. However,

Political and Security Outlook Like other world powers, Russia’s President Vladimir Putin has entered a holding pattern while awaiting clarity on the course of US policy under President Trump. Russian interventionism overseas in Syria and Ukraine will win new legitimacy under Trump, but at an unknowable cost of reducing the propaganda value of tensions with US and NATO. Russia’s alleged interference in the US election was intended to weaken a future President Clinton, not to enable a President Trump. At a time when the Kremlin is spending 29.4 percent of its 2017 national budget on defence and security but just 2.3 and 3.5 percent on health and education respectively, fractiousness in world affairs may yet rebound on domestic harmony. With a budget deficit running at 3.2 percent of GDP, Putin will eventually exhaust fiscal reserves built up in better times if oil prices do not increase in 2017. Domestically, the complex reorganisation of the various intelligence and security agencies to create a sprawling new KGB under the banner of the Ministry of State

World Security Report - 11


WORLD SECURITY

Security, under Putin’s direct control, will be foremost in the minds of the securocrats who dominate the Kremlin’s corridors of power. An insular Kremlin will skilfully divert attention from its own weaknesses, but will be fundamentally unable to tackle the kleptocracy and corruption at the heart of its post-ideological political system. Continuing increases in labour unrest will be the main outcome, which will go underreported as a result of the Kremlin’s control over media and the diversion of attention elsewhere. Trump and Putin will likely develop a “strongman” relationship, resolving problems with deal-making rather than gradually building consensus via institutions and law. This personalised diplomacy will be intrinsically unstable, as unexpected events set off emotive over-reactions to perceived slights.

Small countries on the border of the post-Soviet space in Eurasia will face the highest threat, including Belarus, Estonia, Georgia, Latvia, Lithuania, Moldova, Montenegro and Ukraine, all of which lack a strong enough security apparatus to resist Russia in the absence of collective defence mechanisms. If Trump’s election sees a softening of the NATO security umbrella, as appears highly likely, it will encourage Russian action in the blurred space between kinetic warfare and aggressive diplomacy. Non-linear events will characterise 2017, as they did 2016, ranging from a failed coup by Russian nationalists in Montenegro to the escalation of information warfare and advanced persistent threat campaigns aimed at political adversaries. Support for Marine Le Pen’s EU-threatening candidacy for the French presidency will be top of the Kremlin’s external agenda. In Central Asia, authoritarian

continuity will remain the norm. Already unlikely, hopes of change after the death of Uzbekistan’s dictator have evaporated with the selection of a pro-Kremlin candidate to succeed him. Essential to understanding the longevity of these regimes is their deep ties, formal and informal, with Russia’s security community. With Moscow’s plan to combine all of its security agencies to recreate the Soviet Union’s sprawling KGB, this may well accelerate in 2017. However, Russia’s rivals in the region – led by China but also including Turkey and Iran – will offer the likes of Kazakhstan and Turkmenistan an option to balance the Kremlin.This renewed KGB will come up against Chinese interests in Central Asia in 2017, where President Xi’s planned “One Belt, One Road” summit in Beijing will continue to pull the region into the Chinese orbit with economic development.

The Homeland Defense and Security Database

WorldSecurity-Index.com is the only global homeland security directory published in English, Arabic and Spanish on the web and in CD network format. 12 - Global World Security Report The Security

Portal

Advertise on WorldSecurity-Index.com from only £515 for 12 months

Contact info@worldsecurity-index.com for details www.worldsecurity-index.com or call +44 (0) 208 144 5934.


INFRASTRUCTURE SECURITY

Challenges for PPP in time of new types of security threats

Modern critical infrastructure (CI) are remarkably complex systems with numerous stakeholders from across multiple sectors. Homeland security leaders should rigorously examine ongoing challenges in Critical Infrastructure Protection (CIP) and strive to bridge the divide between appearance and reality. The old-time “government protects” model has shown itself to be insufficient. The fracture between appearance and reality creates a false sense of security, where, there might be none in. This is where the Public Private Partnership (PPP) model comes to rescue, we are told. The practice tells us that the reality is not so obvious. CIP consists of two parts – CI and P. First, the concept of CI is to be reviewed, with a view to accommodate those systems and/or entities that might not be critical but are critical to something important for a society or a government. Chance is that many of such “indirect” CIs are still “hidden”. Secondly, it becomes increasingly clear that “protection” evolves into “resilience”. This broader concept suggests a more integrated role for the private sector in protecting CI. Whilst the list of CI’s is growing (e.g. computer-based), governments have less and less relevant skills available. Inevitably, governments turn to entities that have such skills, typically in private sector; therefore, PPP collaboration became the “new normality”. In IT, for example, resilience would mean a network (combination of infrastructure,

www.worldsecurity-index.com

applications and data) being able to absorb shocks or disruption without cascading negative effects across the entire network itself. In its latest incarnation, the idea is supported, for example, by the blockchain-based distributed ledger technology.

government officials’ personal email accounts had been illegally accessed by hackers from China. Clear national security implications of this incident make evident that strong working relationships between public and private sectors are essential in CIP.

Resilience places CIP within an immense network of public, private, non-profit, civic, and individual actors. The general public also participates in activities to enhance resilience. One of the good illustrations could be the NYC Metropolitan public awareness campaign “If You See Something, Say Something”. Individual preparedness can be translated into societal preparedness as well.

The rise of APTs (advanced persistent threats) means that the former perimeter defense if not at all sufficient. Modern CI does not so much have one-off attacks, but rather it is continuously under attack. This leads to understanding that any perimeter defense will sooner or later be broken; and here comes layered defense, defense in depth and similar approaches. They aim naturally at multiple controls for monitoring, identifying and catching unauthorized activities at every level and within any zone.

Cyber security challenges In June 2011, Google alerted the FBI that several senior US

But there is another side to it.

World Security Report - 13


INFRASTRUCTURE SECURITY

Deep involvement of governmental agencies can raise objections from businesses; for example, as a threat to their efforts to ensure secure services for their clients; regarding their private data. Such as the FBI’s demands for Apple to assist in hacking into iPhone of the San Bernardino shooter. Apple refused on customer privacy protection, trust and security grounds. Opening a back door will immediately attract terrorists, hackers and all kinds of bad guys, entice them into forcing, bribing and blackmailing their way to such functionality and information about it; subsequently putting all and any private data in danger. Having institutionalized such tools, the road will be open to the unprecedented wide surveillance on people via all kind of modern devices, including those equipped by cameras – as many gadgets and TVs. Eventually this leads to a real-time surveillance and control, i.e. a Big Brother risk. Worse, in addition to the official government Big Brother, there might be multiple others – e.g. Big or Bigger Brothers by private groups and/or foreign governments. Notably, most of the IT behemoths – such as arc-rivals Google, Amazon, Facebook, Microsoft – all united to support position of Apple. It all means we cannot imagine a successful PPP in such circumstances. It will take legislators to impose laws that IT giants must abide. We turn from partnership to leadership or dictate of the state.

sector actors leaving one another to bear the costs of the partnership. The latter leads resilience into difficult budgetary considerations. In many cases, the outcome of such considerations depends on how well a certain objective (or a problem) is “sold” across major stakeholders. On the second side; these considerations deeply depend on the “history” of the underlying CI, whether and to what extent modern resilience is built-in. Information sharing and cooperation problem There is an expectations gap in information sharing between the public and private sectors. Neither of the two sectors appears satisfied with the information they are receiving from the other. There is also a mutually acknowledged reluctance to exchange certain sensitive information. There is also a sense among businesses that government is holding back information, and not providing them the “whole story”. In IT, similar situations are handled by a setup translated into the Red, Blue and Purple teams. Red team would typically be a specifically focused private group (e.g. ethical hackers), Blue team would be a regular CIRT (computer incident

response team), e.g. governmental, supported by Purple teams; the latter typically bringing missing or improved skills, again, from private sector. Shortfalls in private sector engagement in CIP Businesses need incentives to spend money on their own protection measures. It is easy to confuse a firm’s work in developing CI technologies with investing in self-protection. Under these circumstances, and without effective regulation, firms can easily justify not investing in robust protection. Governments usually appeal to patriotism or civic responsibility. Businesses may publicly promote their commitment to security, but behind closed doors, there is an upper limit to firm’s security expenses. With ongoing economic crisis businesses are faced with the difficult choice between spending on short-term survival, or longerterm investments in protection. For both the short and medium term, then, it is important to develop effective incentives to promote private sector engagement. It is up to government to choose among incentives: regulation, financial incentives, definitions of liability, contracts, subsidies, loans,

Obstacles to Cross- sector coordination How information is shared among sector members it is another important component of institutional design. Effective PPP sector coordination in CIP continues to face challenges. These issues can result from imprecise contracts that can create a mismatch in expectations, a lack of centralized mechanisms for coordinating integrated actions, a tendency for each actor in a partnership to act purely out of self-interest, and the prospect of public or private

14 - World Security Report

www.worldsecurity-index.com


INFRASTRUCTURE

tax relief, fines etc. Rather than appealing to good citizenship or other values. Generally, project-oriented PPP’s have been more successful than process-oriented public-private partnerships. The former’s missions tend to be more clearly defined, include a definite timeline and budget, and usually enjoy a greater sense of urgency and support among senior leadership. On the other hand, institutionalizing process-oriented PPP’s has proved more challenging. The goals of such partnerships are often less clearly defined. Senior leadership support facilitates the provision of resources to build up operational capacity, adds urgency, provides assistance in crucial moments, and helps break dependencies. Exercising effective leadership by those implementing the partnership is equally important to achieve early results and form the proper foundation for further growth. Such leadership is particularly important to ensure a smooth transition in the early stages of the partnership. Still, institutions can only flourish if they have been designed intelligently. Such design includes a sustainable funding model, a clear division of labour, and the identification of appropriate

www.worldsecurity-index.com

counterparts. Their success is ultimately dependent on the underlying incentive structure, which can be partly influenced endogenously, creating value for the participants early on, and through specific and focused projects. Preferences and the cost-benefit perceptions of the participating actors will ultimately determine the success or failure of the partnership. A sense of urgency helps to create a bond between the public and the private sectors, fostering a willingness to collaborate and achieve a common vision, ultimately allowing the partnership to mature and endure. The longevity of the partnership depends on the interplay between these factors and is a dynamic process with periods of both weak and strong performance. So, it is necessary to create a sense of urgency and use triggering moments as windows of opportunity. It is also necessary to create legal environment that allows necessary actions to be taken. It is necessary to focus on interdependencies and international dimension. So, it might be a statecoordinated initiative, where state ultimately takes the leadership and, if required, implements supporting legislative or regulatory measures. So, PPPs in CIP are at important crossroads. The definition of CI is constantly evolving, which

challenges cross-sector coordination efforts and information sharing. There is a frustrating lack of robust financial incentives to promote businesses’ engagement in CIP. Uneven public and private sector approaches to cyber security show that protection efforts are out of alignment. There are certain steps, which could be taken: • Choose collaborative leadership, not regulation. Don’t hesitate to use regulation if other methods don’t • Measure what is really happening – not what appears to be happening • Focus on quality, not quantity, of information • Increase awareness of cyber security issues in the emergency management community. • Figure out resilience and its testing, combining skills from several sources

Lina Kolesnikova is a Security Expert in the areas of security, risk and crisis management and has researched and written on a wide range of topical issues arising from recent events on the global scene, and is also a frequent speaker and moderator at international meetings.

World Security Report - 15


INFRASTRUCTURE

Risk Based Approach to Critical Infrastructure Protection

In 2005, I was the first Loss Prevention Manager for The Ritz-Carlton Jakarta. The hotel was nearing its completion when I got on board and I was part of the opening team. It was the first time that I work for a hotel. I didn’t stay long at The Ritz-Carlton, I was there only for about a year and then I moved on. Around two years before my employment with The RitzCarlton, 05 August 2003, a car bomb exploded outside the lobby of the JW Marriott, just across the road; a dozen people died and dozens other were injured. It was the first time that there was such terrorist attack in Jakarta. A year before the Marriott bombing, on 12 October 2002, Denpasar experienced its first terrorist attack, the one with most casualties to date in Indonesia: multiple bombings, hundreds died and hundreds other injured. I was working security when our way of life was changing because of these horrific events. Back then the approach to security was still straight forward. We were expecting somebody to attack us from the outside, such as suicide bombers with their explosive vests or a vehicle borne improvised explosive device or a VBIED, a car bomb. We put physical barriers up front, gates, vehicle inspection points, personnel inspection points with walk through metal detectors, and explosive vapour detectors; no X-rays deployed at that time as our assumption at the time was that somebody will come in with a bomb and attack us and this is what we were mitigating against. This view became the norm for most of the hotels and office buildings. Didn’t anybody ever consider any other scenarios? Consultants, security groups, and many others have discussed many other scenarios of attack. “What if” scenarios and how would you mitigate them. For example, what if

16 - World Security Report

the attackers took apart their bombs, snuck them in piece by piece, and then reassemble them in the toilet and attack from the inside? Nobody really had an answer then and there was no historical data that such an attack ever happened or any information that it could happen. After the 2002 Bali Bombing and the 2003 Marriott Bombing, on 9 September 2004, a car bomb exploded outside the Australian embassy in Jakarta, killing 9 people, injuring more than a hundred, and shattering the glass of surrounding buildings. On 01 October 2005 Bali experienced its second terrorist attack, suicide bombers with explosive vests attacked tourist areas killing 20 people and injuring 100 others. Within those 4 years, the methods were either VBIED or suicide vests, until 17 July 2009 when the terrorists actually checked into a room, snuck in the parts for the IED piece by piece with help from somebody in the inside, and assembled it there. The suicide bombers exploded the IED inside the lobby of the JW Marriott and the restaurant at The RitzCarlton Jakarta, there was an underground tunnel connecting the two hotels. The unthinkable happened and it changed how we perceived hotel security. Actually, calling it the unthinkable is incorrect as somebody somewhere may have thought of it but the feasibility or the

www.worldsecurity-index.com


INFRASTRUCTURE

and its vulnerability, e.g.: through security assessments, and use a scoring or a matrix to see whether or not it has a high probability of being attacked.

probability was deemed as low at the time, and herewith lies the challenge. Merriam-Webster defined risk as “possibility of loss or injury”; loss could be a result of action or inaction. Generally, if we are talking about possibilities of things that could lead to loss, it is endless and with the limited resources that we have we may not very well be able to manage them all. Before we go to any risk management strategy, we would first want to know what threats that we are faced with. It could be as simple as listing them down. How many? It could stretch as far as your imagination. It could be from a building fire to a nuclear meltdown, a bank rush to a full on economic fallout, an earthquake to a mega quake, a terrorist attack to a full-scale invasion, a pandemic to a full blown zombie apocalypse. We may think that a zombie apocalypse scenario is ridiculous but if we think about it, there are multiple scenarios in there that could be used for emergency preparations, crisis management, and even business continuity planning. In 2014 there was actually a bit of news coverage on “CONOP 8888” when the Pentagon actually used the zombie scenario as a fictional training tool. The CDC actually still has a page dedicated to zombies, because of its usefulness to educate people on preparedness. Now that we have our list of possible threats, now we will need to assess them. In classic risk management, risk is a product of probability and impact, usually known as well as severity. It is a two dimensional model which could be turned into a matrix. We could use a numeric scale or other scales to rate from low to high probability and impact. One of the ways how probability could be measured is by historical data or frequency of it happening. We could say that once in every 5 years is considered low probability and once a year is high, but this will depend on the organization of what is perceived as low or high. There are other ways of measuring probabilities, for example if we are talking of a terrorist attack we could look at the attractiveness of the target, e.g.: using historical information or other intelligence,

www.worldsecurity-index.com

For impact or severity, it’s usually broken down to economical, reputational, and people. If the institution is governmental, you may want to consider political impact which is sometimes the same as reputational. The economical impact of an attack is the financial loss which could be measured in dollars and cents. Reputational is how we are perceived in the eyes of the public, it could be a loss of trust for example; not just the public, it could also be from the government or regulators. Loss of people is usually attributed to death or injury, but at times it does not have to be so bleak, it could also be how key people are unable to come to work because of a major flood. This could also be presented as a scale, how low or high an impact is would depend on the organization’s risk appetite. We will need to assess each threat of its probability of happening and its severity when it does. In doing this initial exercise it is best to look at it inherently, without thinking of the mitigations or interventions that we have in place. In other words the gross risk that we are faced with prior to our mitigation plans. As we have two coordinates now, the probability and the impact, we could map it out in a two dimensional risk matrix. There are many ways of how we would map this out, how low, medium, or high is perceived will again depends on the risk appetite. The risk map is a useful tool to prioritize your risks. We could even use a three dimensional risk map, adding another dimension such as how well we could detect a particular threat or event. We are then able to see, based on our assessments which ones are low risk, which we could put aside, and focus on the medium and high risk. For example, a threat with low impact but high probability and high impact but low probability could be seen as a medium risk; medium probability and high impact would be seen as high risk; we would want to put our resources to mitigate these risks.

World Security Report - 17


RESILIENCE

December 5-7, 2017

Orlando, Florida www.ciprna-expo.com

The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands.

- Chemical Sector - Commercial Facilities Sector - Communications Sector - Critical Manufacturing Sector

Call for Papers

- Dams Sector - Defense Industrial Base Sector - Emergency Services Sector

Abstract submittal deadline: 30th April 2017 Submit your abstract online at www.ciprna-expo.com

- Energy Sector - Financial Services Sector

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety. Critical Infrastructure Protection and Resilience Americas brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing North America’s critical infrastructure. The Advisory Committee is now accepting abstracts for consideration for inclusion in the 2017 conference programme. Join us in Orlando, Florida for the premier event for operators and government establishments tasked with the regions Critical Infrastructure Protection and Resilience.

- Food and Agriculture Sector - Government Facilities Sector - Healthcare and Public Health Sector - Information Technology Sector - Nuclear Reactors, Materials, and Waste Sector - Sector-Specific Agencies - Transportation Systems Sector - Water and Wastewater Systems Sector

For further details and to submit your abstract visit www.ciprna-expo.com To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Americas please contact: Bernadette Terry (North America) E: bernadette@ btiglobalinnovation.com T: +1-613-501-5316

Paul Gloc (UK and Rest of Europe) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +31 (0) 6 1609 2153

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Leading the debate for securing Amercia’s critical infrastructure Owned & Organised by:

18 - World Security Report

Supporting Organisations:

Media Partners:

www.worldsecurity-index.com


BORDER SECURITY

REPORT

VOLUME 5 JANUARY/FEBRUARY 2017

For the world’s border protection, management and security industry policy-makers and practitioners

COVER STORY how to better manage migration

S P E C IAL R EPO R T AGENCY NEWS S H O RT RE P O RT I N D U S T RY N E W S

Enhanced Border Security: Global Cargo & Vehicle Screening Solution p.11

A global review of the latest news and challenges from border agencies and agencies at the border. p.15

PROTECT research project p.9

Latest news, views and innovations from the industry. p.26


2

COMMENT

Be Careful What You Wish For! As we go to press, US President Donald Trump has delivered on one of his main campaign policies and issued an Executive Order banning citizens from seven Middle East countries from entering the US. The countries affected are Iran, Iraq, Syria, Sudan, Libya, Yemen and Somalia. Whilst not quite the blanket ban he promised during his campaign this move will be popular with Trump voters. Along with the temporary travel ban there has also been a suspension of all refugees entering the US for 120 days. The White House is insisting that it is not a “blanket ban” but is instead “extreme vetting”. A statement from President Trump today, said “it’s working out very nicely” and is a “massive success”. Whether you are for it or against it, what is obvious is, the whole thing was ill-conceived, badly thought out and badly implemented, causing chaos at airports worldwide. Green card holders, people with valid visa’s and dual passports have all been caught up in the chaos. Canadian and UK citizens are apparently exempt from the ban but there have already been examples of both facing problems. The immediate fall out is colossal and global. Law suits are flying around the US, with more to follow no doubt. To date 16 State Attorney Generals are opposing the ban and many others will question whether the Executive Order is even legal, whilst it seen as unconstitutional and discriminatory. Spontaneous protests have broken out in airports across the US and condemnation is pouring in from leaders around the world. But will it work? Well the answer to that is unknowable. Ha a would-be terrorist on their way to the US to commit an atrocity found themselves stuck at an

airport, unable to board their flight to the US from Yemen or one of the other proscribed countries? We will never know. Trump supporters will say if these measures stop just one terrorist then it’s worth it! Although we are in pretty much, uncharted territory here, as we are with so much of what President Trump is doing, experience would indicate that this is going to be purely counter-productive. ‘Extreme vetting’plays perfectly into the rhetoric of ISIS and other jihadists. That the West and the US in particular, are anti-Islam and are in fact at war with Islam. And that the much talked about values and freedoms that western democracies champion so vocally is only ever applied unequally or not at all when it comes to Muslims. It is in fact the perfect recruiting call for radical Islam around the world and in the US itself. It must be remembered that 80% of terrorist acts in the US have been carried out by US citizens. It also makes life very uncomfortable for the US’s allies around the world, especially in the war against radical Islam. Iraq for instance is one of the countries on the list but is a key ally of the US, on the ground fighting and dying to defeat ISIS. The UK’s Prime Minister Theresa May has just come back from what was seen as successful first meeting with Donald Trump, cementing the alliance and their joint commitment to NATO and the war on terror. Before she’s even got off the plane, her association with him is already having negative effects on domestic UK politics and may well have wider implications for NATO and EU relations. No one questions the US’s right to control is own immigration and borders. But a more considered and intelligent approach would have been more effective and better received. Except with the Trump supporters of course! Tony Kingham Editor

Border Security Report | January/February 2017


CONTENTS

3

CONTENTS 4 How to better manage migration EU presents its contribution on how to better manage migration before Malta Summit.

6 interpol report INTERPOL launches new project targeting African-Asian wildlife crime links and other INTERPOL news.

7 OSCE report Defusing conflicts - re-establishing trust - fighting radicalization and violent extremism and other OSCE news.

»»p.4

8 EUROPOL report Operation Bosporous Against Firearms Trafficking Results in Nearly 250 Arrests in 2016 and other Europol news.

9 PROTECT research project PROTECT research project offers contactless on-the-move border crossing while maintaining security and privacy

»»p.9

»»p.7

11 Enhanced Border Security: Global Cargo & Vehicle Screening Solutions Border security is one of the most complex and critical security challenges that governments face today.

15 AGENCY NEWS A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border.

21 World Border Security Congress Building A Coherent Global Border Management Response at the World Border Security Congress in Morocco, 21st-23rd March. »»p.11

26 industry news Latest news, views and innovations from the industry.

Border Security Report | January/February 2017


SPECIAL REPORT

4

how to better manage migration

EU presents its contribution on how to better manage migration before Malta Summit

Ahead of the meeting of EU Heads of State and Government in Malta on 3 February 2017, the Commission presented its contribution on how to better manage migration and save lives along the Central Mediterranean route.

saving lives remains a top priority for the European Union. The Joint Communication presented today outlines possible short and medium term actions to address migration in relation to the Central Mediterranean in a comprehensive way.

The European Commission presented a number of additional measures to strengthen the work along the Central Mediterranean migration route, including with and around Libya. With the high number of lives lost at sea and along the Central Mediterranean migration route, the question of managing flows and

The proposed actions include:

Border Security Report | January/February 2017

• Reducing the number of crossings and saving lives at sea • Stepping up the fight against smugglers and traffickers • Protecting migrants, increasing


SPECIAL REPORT

resettlement and promoting assisted voluntary return

• Increased cooperation with Egypt, Tunisia and Algeria

the Council authorise the opening of negotiations with Serbia and the former Yugoslav Republic of Macedonia to allow for carrying out operational activities on their territory which may imply the deployment of European Border and Coast Guard teams to both countries.

• Stepping up funding

Back to Schengen

The success of these actions requires close cooperation with the relevant partners in North Africa and concerted efforts by EU institutions, Member States, as well as cooperation with International Organisations like the United Nations High Commission for Refugees (UNHCR) and the International Organisation for Migration (IOM). These actions should be seen as complementary to the substantial amount of initiatives already being implemented by the EU and its Member States, notably under the European Agenda on Migration and the Migration Partnership Framework .

The European Commission has today recommended the Council allows Member States to maintain the temporary controls currently in place at certain internal Schengen borders in Austria, Germany, Denmark, Sweden and Norway for a further period of three months.

• Managing migrant flows through the southern Libyan border

European Border and Coast Guard Agency

Fourth progress report towards an effective and genuine Security Union Moreover, the Commission presented its fourth report on the progress made towards building an effective and genuine Security Union. This month’s

5

report highlights key developments in four areas: information systems and interoperability, soft target protection, cyber threat and data protection in the context of criminal investigations. The report also outlines some of the upcoming initiatives aimed at further strengthening the EU’s defence and resilience against terrorism and organised crime. Cooperation and Verification Mechanism for Bulgaria and Romania Finally, the Commission issued today its latest reports in the context of the Cooperation and Verification Mechanism (CVM) applied to Bulgaria and Romania. After 10 years of the CVM, the Commission took stock of steps taken on judicial reform and the fight against corruption and in the case of Bulgaria on organised crime.

The European Commission also took stock of the progress achieved and the work still needed in making the new European Border and Coast Guard Agency fully operational. Three months after the launch of the Agency, important steps have been completed, including the setting up of mandatory rapid reaction pools for border guards and equipment and the launch of new pools for return intervention teams. Currently, the European Border and Coast Guard Agency has more than 1,550 officers deployed to support Member States who have the primary role and competence in reinforcing the controls at the external border, complementing their existing national capacities of Member States. The Commission recommended

Border Security Report | January/February 2017


6

INTERPOL REPORT

INTERPOL launches new project targeting African-Asian wildlife crime links INTERPOL Secretary General Jürgen Stock said the project embodied the added value of INTERPOL to help countries more effectively target specific crime threats. “Protecting the world’s wildlife heritage is our collective responsibility, as global citizens and as international law enforcement,” said Secretary General Stock.

A new project to identify and dismantle the organized crime networks making billions in illicit profits behind wildlife trafficking between Africa and Asia has been launched by INTERPOL. Targeting high profile traffickers in Asia sourcing wildlife from Africa, the project will provide a strengthened law enforcement response in source, transit and destination countries, particularly those linked to the illicit trade in ivory, rhinoceros horn and Asian big cat products.

“It is essential that decisive action is taken to combat environmental crime and this project targeting the organized crime links between Africa and Asia will enable all involved actors to unite in their efforts, and provide a blueprint for future actions elsewhere in the world,” added the INTERPOL Chief. A recent INTERPOL-UN Environment report showed 80 per cent of countries consider environmental crime a national priority, with the majority saying new and more sophisticated criminal activities increasingly threaten peace and security.

With environmental crime estimated to be worth up to USD 258 billion and linked to other criminal activities including corruption, money laundering and firearms trafficking, the project led by INTERPOL’s Environmental Security programme will draw on the expertise of other specialized units.

Supported by the United States Agency for International Development (USAID) and in collaboration with the International Consortium on Combatting Wildlife Crime (ICCWC), the INTERPOL initiative will draw on the intelligence gathered from existing projects including Wisdom, Predator and Scale.

These include the Anti-Corruption and Financial crime unit, the Digital Forensics Lab for the extraction of data from seized equipment, the Firearms programme for weapons tracing and ballistics analysis and the Fugitive Investigations unit to assist countries locate and arrest wanted environmental criminals.

In addition to expanding the level of investigative cooperation between the involved countries, the project will also provide increased analytical support for activities both in the field and for online investigations.

INTERPOL supports public-private partnerships to combat cybercrime at World Economic Forum At the World Economic Forum (WEF) Annual Meeting in Davos, world leaders were updated on the progress of recommendations to increase global collaboration against cybercrime.

Cybercrime Project set the scene for a unified approach between law enforcement and private industry partners for better prevention, detection and mitigation of cybercrime.

Unveiled during the 2016 gathering by Jean-Luc Vez, WEF’s Head of Public Security Policy and Security Affairs, the recommendations of the WEF’s

In support of this initiative, INTERPOL acts as a global hub for cybercrime related data and intelligence from its member countries and partners.ir continued.

Border Security Report | January/February 2017


OSCE REPORT

7

Defusing conflicts - re-establishing trust - fighting radicalization and violent extremism among young people: “We must vigorously engage and address this situation. The OSCE is the right platform to do so,” said Kurz.

OSCE Chairperson-in-Office, Austria’s Foreign Minister Sebastian Kurz, highlighted three key challenges facing the Organization and its participating States as Austria took over as the 2017 OSCE Chairmanship: deplorable and complex crises and conflicts in the OSCE area, a fundamental lack of mutual trust and confidence, and an alarming phenomenon of growing radicalization and violent extremism, especially

“It is my firm belief that a strong OSCE is the basis for a secure Europe – particularly in these agitated times. Austria stands ready to take responsibility and chair the Organization for a second time within two decades,” Kurz added. Pointing to the OSCE’s experience as a facilitator, mediator and connector for a common space of 1.2 billion people, the Chairperson-in-Office emphasized that the organization can provide all necessary tools for promoting de-escalation and enabling sustainable political solutions to the conflicts in the OSCE area, not least the conflict in and around Ukraine.

OSCE Office donates equipment to Tajik border law agencies A donation ceremony involving Tajikistan’s State Committee for National Security, Border Troops and Customs Service took place on 27 December 2016 emphasising successful co-operation between the OSCE Office in Tajikistan and the border agencies in 2016 as well as in commemoration of the 25 anniversary of the Tajik security forces. The Office donated desktop computers to the State Committee for National Security and to the Border

Troops, while desk computers and dosimeters were donated to the Customs Service. Special equipment for the identification of forged travel documents was donated for installation at the Khujand International Airport. The technical equipment is meant to complement training activities conducted over 2016, aimed at strengthening the professional capacities of Tajik border law enforcement agencies.

Kazakh and Uzbek representatives discuss bilateral co-operation in combating terrorism financing and money laundering Representatives of financial intelligence agencies from Kazakhstan and Uzbekistan today in Chisinau concluded a two-day expert meeting led by the OSCE on enhancing bilateral co-operation in combating the financing of terrorism and money laundering.

practices..

Representatives of the two countries exchanged views on the perspectives of bilateral cooperation in addressing terrorist threats and combating money laundering, and shared best Border Security Report | January/February 2017


8

EUROPOL REPORT

Operation Bosporous Against Firearms Trafficking Results in Nearly 250 Arrests in 2016 trafficked into Europe via Bulgaria. Nearly 250 arrests and 556 gas and alarm pistols seized are a few of the final results of Operation Bosphorus, a series of international actions in 2016 in 10 EU Member States, coordinated by Romania as the Activity’s Action leader and with the full operational and analytical support of Europol. Operation Bosphorus is a series of actions developed under the EMPACT Firearms OAP 2015 targeting gas/alarm pistols of Turkish manufacture

Based upon intelligence packages provided by Europol, ten Member States, namely Romania, Greece, Belgium, the Netherlands, Poland, Cyprus, Finland, Sweden, Spain and the UK, with the support of Bulgaria, agreed to investigate the acquisition and the possession of such firearms by their nationals or in their territory, since according to their own national legislation, a declaration or authorisation is required to acquire, import and possess such a firearm in these countries.

3561 Artefacts Seized in Operation Pandora Europol has joined forces with law enforcement authorities from 18 countries, INTERPOL, the United Nations Educational, Scientific and Cultural Organization (UNESCO), and the World Customs Organization (WCO) to tackle the theft and illicit trafficking of cultural goods. Operation Pandora was successfully led by Cypriot and Spanish police and resulted in 3 561 works of art and cultural goods were seized, almost half of which were archaeological objects; 500 archaeological objects were found in Murcia, Spain, of which 19 were stolen in 2014 from the Archaeological Museum in Murcia; over

400 coins from different periods were seized following investigations into suspicious online advertisements; 75 individuals were arrested; 48 588 persons, 29 340 vehicles and 50 ships were checked; 92 new investigations were initiated. Several of the retrieved artefacts are of great cultural importance in the archaeological world, such as a marble Ottoman tombstone and a postByzantine icon depicting Saint George, along with two Byzantine artefacts. All of them were seized in Greece during actions carried out by the Hellenic Police.

EUROPOL, Spain and Poland Dismantle a Criminal Group Involved in Drug Smuggling Europol has coordinated a joint investigation led by the Spanish National Police and the Polish Police (Police Central Bureau of Investigation) to dismantle a criminal group involved in the international smuggling of large quantities of marijuana (mainly to Poland and Germany). The investigation started once the Spanish National Police detected a criminal group, composed of Spanish and Polish individuals, which had houses with robust security measures, where the organization set up marijuana cultivations and stored large quantities of this illegal drug. These

houses were protected not only by a CCTV system but by armed members of the organisation and the marijuana was vacuum-packaged to hide its smell before its concealment in the vegetables shipments. The leader of the group, a Polish national, was supported in the criminal activities by two Spanish deputies. While one of them was in charge of the purchase of the drug in Spain and the management of the rented houses of the organization in Valencia, the other one dealt with the international distribution of the drug.

Border Security Report | January/February 2017


SHORT REPORT

9

PROTECT research project offers contactless on-the-move border crossing while maintaining security and privacy PROTECT is the successful consortium for the EU’s Horizon 2020 call for proposals BES6/2015 for research and development of prototypes for contactless, on-the-move biometric border control. The project began in September 2016 and is already on the way to designing a 21st century solution, utilising advanced multimodal biometric and proximity sensors, mobile devices and ePassports.

yet put everything together to create a ‘virtual control’ through which eligible passengers flow without really being aware of the processes behind the scenes – but which stops the suspect and the ineligible in their tracks. PROTECT is looking at a ‘biometric corridor’ or ‘Biometric Fast Lane’ approach where scanning takes place at multiple locations ahead of arrival

Research is needed in order to explore whether it is possible to use other biometric data (potentially already used in another context and in another domain) than fingerprint, iris or facial picture to store in the e-Passport chip, which would guarantee the same or higher level of security, but would be more accurate and could be retrieved in a more efficient manner than in the case of the conventionally used biometric data types… [EU BES 6 Call Notice]

Imagine if airports, sea and land border crossing points could offer ‘no queue’ solutions to travellers moving across EU external borders. Imagine too that this would be done with no compromise to the integrity of the control or to the privacy of travellers. This ambitious aim is the central core of the EU-wide PROTECT consortium, coordinated by the UK’s University of Reading. This research project will test the concept through prototypes placed in a real environment – airport and land border crossing – and, if possible, using real travellers. The desire for free-flowing border control is definitely real (how else do we deal with more travellers and proportionately fewer border guards?) and the physical components (biometrics, sensors, and expert systems) exist. But no one has

at the primary arrivals (or departures) and vehicle control and which allows border guards time to intervene if necessary. The PROTECT team want to extend the possibilities of electronic identity using ePassports and even mobile devices such as (smartphones and tablets. The ICAO standard biometrics are the basic starting point: but will it be possible to combine them with other biometric modalities to achieve the non-stop, drive-through, contactless control of the future? Follow the progress of PROTECT on Linked In, Facebook, Twitter - and on the project website at http://projectprotect.eu

Border Security Report | January/February 2017


10

SPECIAL REPORT

EU extends emergency border controls to tackle migration EU extends emergency border coEuropean Union envoys agreed to extend emergency border controls inside the bloc’s free-travel zone for another three months to mid-May, as immigration and security continued to dominate the political agenda. The so-called Schengen zone of open

borders collapsed as about 1.5 million refugees and migrants arrived in the bloc in 2015 and 2016, leaving the EU scrambling to ensure security and provide for the people. Germany, Austria, Sweden, Denmark and Norway started imposing the emergency border controls from

September, 2015, and got the go-ahead on Wednesday to keep them in place for longer. Germany is all but certain to seek further extensions beyond that in the build-up to Sept. 24 national elections. trols to tackle migration.

Managing national borders ‘cannot be based on any form of discrimination’ – UN chief Guterres Refugees fleeing conflict and persecution are entitled to protection, United Nations Secretary-General António Guterres said today, expressing concern at decisions around the world that have undermined the integrity of the international refugee protection regime.

against” and that “blind measures, not based on solid intelligence, tend to be ineffective as they risk being bypassed by what are today sophisticated global terrorist movements.”

“Refugees fleeing conflict and persecution are finding more and more borders closed and increasingly restricted access to the protection they need and are entitled to receive, according to international refugee law,” Mr. Guterres said in a statement.

At the start of the regular noon-briefing at UN Headquarters, Spokesperson Stéphane Dujarric said Mr. Guterres is currently on his way back to New York from the African Union Summit in the Ethiopian capital, Addis Ababa, and he had had the opportunity to express his disagreement with the United States Executive Order on refugees.

The UN chief made a particular mention of Ethiopia, the largest refugee-hosting country in Africa, that, he noted “for decades has been keeping its borders open to hundreds of thousands of refugees from its neighbours, many times in dramatic security situations.”

The statement follows President Donald Trump’s signing last Friday of an Executive Order that, among things, suspends the US refugee programme for 120 days and, according to the media, bars entry of refugees from several mostly Muslim countries, including Syria, until further notice.

Further stating that countries have the right and the obligation, to responsibly manage their borders to avoid infiltration by members of terrorist organizations, Mr. Guterres cautioned that this cannot be based on any form of discrimination related to religion, ethnicity or nationality, noting that doing so “is against the fundamental principles and values on which our societies are based.” He also warned that it could “trigger widespread anxiety and anger that may facilitate the propaganda of the very terrorist organizations we all want to fight

Border Security Report | January/February 2017


SPECIAL REPORT

11

Enhanced Border Security:

Global Cargo & Vehicle Screening Solutions

Border security is one of the most complex and critical security challenges that governments face today.

Complex in nature as the differing terrains, topography and natural elements make monitoring access to countries a technological and logistical challenge. Critical in the growing movement of illicit goods and unknown people across borders that not only pose a direct threat to populations and highprofile sites, but impact economic and social prosperity. Conversely, as the entry and exit for both people and goods, the border remains critical to the prosperity of countries. Improvements in border

monitoring can provide dramatic benefits for countries, not only to improve security, but by creating a more trade-friendly environment through increasing flow of legitimate goods and, therefore, collection of customs revenue, bolstering the state’s economy. However, evolving global situations and trends, including political and security unrest, growth in travel, migration and distribution of goods and trade among nations, continues to place increasing pressure on border security.

Border Security Report | January/February 2017


12

SPECIAL REPORT

A range of government agencies, such as border control, border guards, customs and immigration, that are involved in border security continue to struggle with monitoring and detecting threats across the entire length of their borders; authorised border crossing and access points continue to develop and pose challenges of their own. The table below outlines some of the issues and impacts that the flow of people and goods is having on states.

SecurIty SolutIons Customer needs

and

Whilst the requirement for investment is clear, the available budgets, political intent and strategic direction of governments differ widely and, in many cases, limit the deployment of border security solutions. In many situations it is the countries that have the highest threat and greatest need for border security solutions that also face some of the largest constraints. Many continue to struggle with the high costs associated with securing borders, whilst others have technological and expertise shortages within the country, limiting the ability to deliver the level of border security required. This presents a challenge to government agencies and the industry to provide solutions that enable countries to protect their

borders in more innovative and achievable ways moving forward. The Need for Integration The current level of infrastructure deployed at borders is mixed; however, the adoption of technology continues to grow. The border agency and end-user need has developed beyond standalone screening and detection solutions and toward integration of intelligence and information from law enforcement, official databases and information sources to give a greater level of data on vehicles and cargo at entry and exit points. This may include the integration of license plate recognition, more in-depth background checks against national and international databases and cargo inspection lists, or further information from other sensors or technology, such as RFID tracking within shipping. Collating this information gives border guards better visibility and situational awareness to identify potential threats and criminal behaviour.

Border Security Report | January/February 2017

In addition, due to the remote locations of many of the border p o in t s , g e t t in g u p - t o - d a t e information quickly from centrally held sources can be problematic. Deployment of high-speed area networks allows quicker access and greater flow of information to enable a better, more efficient assessment and decision making for each inspection. As policymakers and governments address the range of challenges that they face, the security industry continues to play a supporting role. Whilst security considerations are paramount for the policymaker, there are other driving factors for investment and protection of borders. Border agencies remain a large expense and, in many cases, human-intensive activities. Solutions that can address efficiency and operational procedure whilst maintaining high standards of security screening are of greater interest for governments. Reduction of waiting and inspection times of vehicles will help foster a culture and perception of tradefriendly nations, a strong image that most governments continue to encourage. Legal cross-border commerce is critical to the growth of countries’ economies. Increasing the number of vehicles that can be effectively screened entering the country,


SPECIAL REPORT

13

network that delivers actionable information to SAT inspectors, law enforcement and military personnel in real time; • Comprehensive training of border inspection staff and supervisors; and

whilst ensuring the correct taxation of legitimate goods and identifying illicit materials, will have continued economic benefits. The RapiScan and S2 Global Solution To address many of the challenges and requirements set out above, Rapiscan Systems and its affiliate business unit, S2 Global, have developed a border security and trade enhancement offering to improve security, increase efficiency and provide greater economic benefit to governments and border agencies. The SAT Project: An IntelligenceBased Approach to Border Security In recent years, Mexico has experienced an escalation in violence and organized crime activity along its borders, driven in part by increased smuggling of weapons, narcotics, currency and other threat items. However, legal cross-border commerce is critical to Mexico’s economic growth. In an initiative with Mexico’s tax administration service, Mexico’s Servicio de Administracion Tributaria (SAT), Rapiscan Systems and S2 Global have deployed a new security strategy

that aims to provide an effective border security solution. The SAT project improves border security systemically and measurably. It seeks not only to increase seizures of weapons, narcotics, etc., but also to provide intelligence to pre-empt criminal activity, while allowing border agents to quickly discriminate between potential threats and legitimate commerce. To accomplish this, the SAT Project combines the following elements: • State-of-the-art, non-intrusive cargo and vehicle inspection technology and border inspection facilities, designed to examine cars, trucks and containers at high rates of throughput; •

• Regional Analysis Centers – integrated command and control centers – where law enforcement, military, SAT personnel, etc., can jointly assess and respond to potential threats. Results to date Increased Security Analysis of Cargo and Vehicles • The SAT project has increased the capacity of the Mexican government to perform large-scale, high- volume, in-depth analysis of cars and vehicles crossing its borders, which is essential to improving border security. In a sixmonth period, the number of X-ray images of cars and vehicles that have been analysed has increased from approximately 60,000 per month to approximately 115,000 per month. Reduced Inspection Time and Improved Border Throughput

Software that integrates, analyses and presents data from surveillance cameras, license plate readers,

X-ray inspection equipment, manifest data, etc., as well as law enforcement databases; • A dedicated data

Border Security Report | January/February 2017


14

SPECIAL REPORT

• Advanced screening technology allows inspectors to quickly identify threats in suspicious cars and vehicles, whilst significantly decreasing the amount of time required for cargo inspection. Specifically, for vehicles selected for inspection, inspection time has decreased from an average of three hours per vehicle to approximately 15 minutes per vehicle. Improved Seizure Capabilities • By combining high-resolution X-ray images of cargo containers, trucks and other vehicles with vehicle record data and shipper manifest data, SAT project staff

has been able to flag vehicles whose declared contents do not match the contents actually inspected. This intelligencebased approach to screening has, according to SAT officials, led to significant seizures of illegal weapons, ammunition, currency and smuggled goods. The Last Word The solution has provided a new approach to border security that has yielded impressive results and returns for the customer. For those countries that want to facilitate a high trade flow across borders and do not have the capital

to invest in sophisticated security and screening solutions, a model of a managed service that includes payment of operational costs, rather than large initial capital expenditures, will be appealing. Solutions such as the Rapiscan and S2 Global SAT project demonstrate an example that addresses the constraints and barriers facing many government stakeholders in border security throughout the world. These types of offerings provide a good opportunity for countries to work closely with key industry participants to increase security across their borders, whilst also enhancing trade and economic benefits.

December Figures for Three Main Migratory Routes Into EU In December, there were nearly 11 000 detections of illegal border crossings on the three main migratory routes into the EU.

migration pressure on Greece eased significantly following the implementation of the EU/Turkey statement in late March.

More than 8 200 migrants reached Italy by sea in December, indicating a drop of nearly 40% from the previous month due in large part to wintry weather conditions in the Central Mediterranean. Because of a spike in arrivals over the previous two months, the total number of migrants taking the sea route to Italy in 2016 reached an all-time high of 181 100.

In December, Syrians, Algerians and Afghans made up the largest portion of the migrants on this route.

Nationals from Nigeria, Côte d’Ivoire and Guinea accounted for the largest number of arrivals in Italy last month.

The number of detections of illegal bordercrossings in the Western Balkans last month stood at nearly 1 170, less than 1% of the figure from the same month a year ago. Nationals from Pakistan, Afghanistan and Syria accounted for a large majority of the migrants on this route.

Meanwhile, the number of migrants reaching the Greek islands in the eastern Aegean fell to slightly fewer than 1 600 in December, nearly 28% lower than in November. This was less than 2% of the number of migrants arriving on the Greek islands in December 2015. In all of last year, 175 000 migrants reached Greece by sea, although just one in 10 migrants who reached the islands did so after March. The

Border Security Report | January/February 2017


AGENCY NEWS

15

Agency News and Updates T

rump Advances Border Wall to Start Immigration Crackdown

President Donald Trump on Wednesday signed directives to build a wall along the U.S. border with Mexico and crack down on U.S. cities that shield illegal immigrants as he charged ahead with sweeping and divisive plans to transform how the United States deals with immigration and national security. The Republican president is also expected to take steps in the coming days to limit legal immigration, including executive orders restricting refugees and blocking the issuing of visas to people from several Muslimmajority Middle Eastern and North African countries including Syria,

Sudan, Somalia, Iraq, Iran, Libya and Yemen. The intent of those proposals is to head off Islamist violence in the United States, although critics have said it soils America’s reputation as a welcoming place for immigrants of all stripes.

H

unt for rebels shows gaps in border security

Army chief General Bipin Rawat, during his first visit to the Eastern Command after assuming charge, visited the 4th Corps in Tezpur. Security forces, who are combing the thick forests near the interstate border, fear that the rebels might have escaped. A source said people of a remote village on the inter-state border have told security forces that they have seen the rebels move towards Arunachal Pradesh through the jungles. The jungle route from the border is just two km away from the Indo-Myanmar border.

I

nternational multi-agency operation nets a tonne of cocaine, 15 charged

Chasing the rebels of Ulfa-I and Manipur’s CorCom after they killed two jawans of Assam Rifles in an ambush in Tinsukia district, security forces have found gaping holes on the Assam-Arunachal Pradesh interstate border that were used by the rebels as entry and exit points to travel from their bases in Myanmar.

An international multi-agency operation which ran for more than two-and-a-half years has resulted in the seizure of approximately 500 kilograms of cocaine in New South Wales (NSW) and more than 600 kilograms of cocaine in Tahiti which was destined for Australia. This amount of cocaine has

Border Security Report | January/February 2017


16

AGENCY NEWS

M

an estimated street value of approximately $360 million.

Malaysia is looking into tightening its border security with an integrated surveillance system, including the use of high technology gadgets.

Additionally, 15 men allegedly involved in the Australian criminal syndicate responsible for the attempted importations have been charged with serious drug importation offences. They range in age from 29 to 63 years.

A

BF and Hong Kong Customs work together against illicit drug trade Australian Border Force has partnered with Hong Kong Customs and Excise to stop more than 25 kilograms of illicit drugs from reaching our community in a joint operation that has been underway since October. The joint operation successfully detected a number of narcotic importations through the mail system and directly stopped these dangerous drugs from breaching our borders. From 17 October – 9 December 2016, the agencies worked together at the Melbourne International Mail Facility and Hong Kong Air Mail Centre to detect 14 attempted importations of methamphetamine, ephedrine, GBL and performance and image enhancing drugs (PIEDs).

B

alaysia to boost border security

State Secretary of the Security Council of Belarus Stanislav Zas told reporters, BelTA informs. Stanislav Zas said that Belarus President Alexander Lukashenko has approved the resolution on Belarus’ state border protection in 2017. The meeting also focused on the results of 2016. “There were no systematic problems or failures in the operation of the State Border Committee last year. The agency has done a lot to enhance border security in Belarus. The chairman of the State Border Committee has reported on it today,” Stanislav Zas said. The resolution on the state border protection specified the tasks which fully take into account the peculiarities of the situation at the Belarusian border. According to the state secretary of the Security Council, the decision to introduce the five-day visa free entry to Belarus via the Minsk National Airport is one of the peculiarities. “It does not have any influence on the security of our state and neighbors.

Deputy Prime Minister Datuk Seri Dr Ahmad Zahid Hamidi said border control was not just about having a physical barrier, adding that this must be combined with such a system.

He said at present, the 767km Malaysia-Thailand border was guarded by only a basic surveillance system such as barbed wire fencing and a wall. He said the authorities in Yunnan, which shares a 4,060km border with Vietnam, Laos and Myanmar, were using a high definition surveillance and tracking system such as drones, security cameras and satellites.

C

hina tightens Tibetan border security to combat ‘separatism’

e l a r u s ’ e f f o r t s t o There will be no changes in the enhance b o r d e r arrival control procedures. Every China has tightened security security praised citizen will go through a passport regulations in Tibet’s border region The Belarusian State Border Committee has done a lot to enhance border security,

checkpoint like before. We will also filter out people whose stay in our country is undesirable due to some reasons,” he said.

Border Security Report | January/February 2017

to battle the risks of terrorism and ‘separatism’, the state-owned Global Times said.


AGENCY NEWS

along its borders with Syria and Iraq to fight illegal crossings, the Turkish military said.

The move follows a call by China early in December for southwestern neighbor India to avoid complicating a simmering dispute over a visit by a senior exiled Tibetan religious leader to a border region.

According to a Turkish General Staff press statement on border incidents in 2016, Turkey also put up 191 kilometers (119 miles) of reinforced fences along those borders to boost physical security. The statement said that nearly 425,000 people from 74 different countries trying to illegally cross Turkey’s borders were captured in 2016, adding that over 390,000 of them were from war-torn Syria.

Sunday’s change “provides a legal foundation to combat potential terrorist activities brought by the further opening-up of Tibet,” the paper quoted Wang Chunhuan, a scholar of the Tibetan Academy of Social Science, who worked on the new law, as saying.

The statement added that foreign fighters from 68 different countries tried to cross the border to join the Daesh terrorist organization from August to December 2016, but that this number was seven times less than in the same period in 2015.

The measure brings land ports and trade zones within the scope of the previous law, and charges low-level government with the responsibility of tipping off police to help regulate the border.

T

echnology Strengthens Uganda Border Security

2

016 border security measures included 330 km of walls

Turkey last year erected 330 kilometers (205 miles) of walls

Uganda is making the most of technology to speed visa issuance and strengthen border security. The landlocked East African country’s adoption of technology is anticipated to help the country facilitate travel, enhance national security and protect travelers from identity theft. Gemalto,

the

Dutch-based

17

international digital security company, is spearheading the drive. It is supplying the Directorate of Citizenship and Immigration Control (DCIC) with its Coesys Visa Management that combines swift issuance of all visas and permits with biometric enrollment upon arrival. Gemalto is supporting the new solution with integration, deployment, maintenance and training for immigration officers. Its turnkey solution incorporates a convenient online portal to apply for visas and permits at any time prior to travel.

C

ameroon-Nigeria – Trans-border Security Solutions Discussed The 5th session of the Cameroon/ Nigeria Trans-border Security Committee is on course in Yaounde. Concrete solutions and recommendations were expected to be proposed to the teething varied security challenges along the Cameroon-Nigeria common border, when experts of the Cameroon/Nigeria Security Committee ended the 5th session of their deliberations. Cameroon’s Minister of Territorial Administration and Decentralisation, René Emmanuel Sadi speaking during the opening ceremony of the session outlined the security challenges. He acknowledged that the operational capacity of the Boko Haram terrorist group, the common enemy to both countries has been weakened but the terrorist militants still put up pockets of resistance around the Lake Chad Region from where they launch attacks against Nigeria, Cameroon, Chad and

Border Security Report | January/February 2017


18

AGENCY NEWS

Niger. Other security challenges, he added, included the combined effect of the length of the common border between Nigeria and Cameroon and its openness to the Gulf of Guinea where perverse activities of maritime pirates are endemic.

C

H

undreds of African that the step was taken to counter migrants enter Spain terrorism attacks. Currently, the through Ceuta border scope of the new program is

The new requirement asks visitors to disclose their accounts on various social platforms including Facebook, LinkedIn, Twitter, Google+, and YouTube.

roatia welcomes new border kit

Croatia, which last year struggled with soaring levels of migrants and refugees as people movement swelled across Europe, has been handed new border equipment including biometric scanners. The EU’s newest member has been handed 23-multipurpose vehicles under framework of the Schengen Facility Fund, although it is not a part of the Schengen visa system. The vehicles come with mobile fingerprint readers for processing migrants, for example at mobile border crossings. Earlier this year, the EU said the country will be gradually integrated into the Schengen Information System (SIS), a new computer intelligence network designed to crack down on illegal immigration and cross-border crime. The European Commission said the move would help “increase the security of European citizens” and shows Brussels is still backing Schengen despite a series of political setbacks.

limited to visitors falling under the visa waiver program.

According to Jose Antonio Nieto, the Spanish Interior Ministry’s secretary for security, some 800 migrants from sub-Saharan Africa had attempted to enter Ceuta from Morocco in one morning and 438 succeeded. The migrants tried to climb the eight-kilometer-long and sixmeter-tall fence that separates the Spanish enclave from North Africa. The police and border security officials also clashed with the crowd as they tried to push them back. Nieto said that some 49 people were treated in a Ceuta hospital for injuries, adding that none of them were seriously wounded. The Ceuta border barrier is also known as the “killer fence” because of the barbed and bladed wire that caps it.

U

S Customs and Border Security to Collect Social Media Details of Foreign Visitors The US government has started asking select foreign visitors to voluntarily disclose their social media presence. Authorities claim

Border Security Report | January/February 2017

The program was introduced by The Customs and Border Protection. Refusal to provide social media account information cannot lead to prohibiting entry to the US. The proposal was first introduced for discussions last summer.

According to the US Federal Register, the collection of such data is for enhancing “the existing investigative process and provide Department of Homeland Security (DHS) greater clarity and visibility to possible nefarious activity and connections by providing an additional tool set which analysts and investigators may use to better analyze and investigate the case.” The move has been severely criticized by consumer advocates as well as by the tech companies. The main grievance against the new policy is the loss of privacy of the travelers. However, the US authorities insist that the purpose of this new policy is to “identify potential threats.”


AGENCY NEWS

19

Towards a balanced narrative on migration Media in many countries on both sides of the Mediterranean face major challenges when it comes to telling the migration story in context. This is the key finding of the ongoing study “How do media on both sides of the Mediterranean report on migration?” (www.ICMPD.org/EMM4migration_narrative) whose preliminary results will be presented in a multistakeholder event today in Brussels. EUROMED Migration IV, funded by the Directorate General Neighbourhood and Enlargement Negotiations of the EU, commissioned the Ethical Journalism Network to conduct this study for which writers from 17 countries are examining the quality of migration media coverage in 2015/16 from a national perspective. The study covers 9 EU countries and 8 countries in the south of the Mediterranean: Austria, France, Germany, Greece, Hungary, Italy, Malta, Spain, Sweden on one hand and Algeria, Egypt, Israel, Jordan, Lebanon, Morocco, Palestine, Tunisia on the other hand. The work in progress finds that journalists are often uninformed about the complex nature of the migration narrative; newsrooms are vulnerable

to pressure and manipulation by voices of hate, whether from political elites or social networks. At the same time, the authors identify highlights and inspirational examples of journalism at its best – resourceful, painstaking, and marked by careful, sensitive and humanitarian reporting. A set of draft recommendations, including a call for training, the funding of media action and other activities to support and foster more balanced and evidencebased journalism on migration, are also part of the study. One such activity is the EU-funded Migration Media Award (www.Migration-Media-Award.eu) for which several partners have come together on the initiative of the International Centre for Migration Policy Development ICMPD (www.ICMPD.org); it will be announced today under the auspices of Malta’s EU presidency. The award competition is a collaboration of the EU-funded projects EUROMED Migration IV and the Open Media Hub, in partnership with the European Asylum Support Office and Malta’s Ministry for Foreign Affairs.

Mediterranean Migrant Arrivals Reach 3,829 Deaths at Sea: 246 IOM reports that 3,829 migrants and refugees entered Europe by sea in 2017, through 25 January, well over two thirds arriving in Italy and the rest in Greece. This compares with 48,029 through the first 25 days of January, 2016. IOM’s Missing Migrants Project reports 246 estimated deaths at sea on various routes, compared with 210 through the first 25 days of 2016. This 2017 fatalities figure represents almost a reverse of the pattern of casualties from a year ago, when just 20 deaths occurred on the Central Mediterranean Sea route connecting North Africa to

Italy and only five deaths occurring off Spain. In 2016 at this time, 185 deaths were reported on the Eastern route between Turkey and Greece. So far this year the Central Mediterranean route, with 221 deaths, and Spain, with 25, account for almost all the fatalities of migrants or refugees at sea, with just one reported death off Greece, recorded earlier this week.

Border Security Report | January/February 2017


20

AGENCY NEWS

Among the casualties reported by IOM’s Missing Migrants Projects this week are 16 new deaths confirmed by IOM Libya since January 21. Christine Petré, an IOM press officer for Libya, reported Thursday that on Tuesday, 24 January, 135 migrants were rescued off Tripoli and on that same day 10 bodies were retrieved (8 men, 1 woman and one child) nearby. She said the previous Saturday, 21 January, five bodies were retrieved off Subratah and another off Tripoli.

For the month so far, IOM Libya reports the total number of migrants rescued at sea by Libyan authorities or commercial fishermen is 319. The total for bodies recovered in January is 42.

IOM’s Missing Migrant Project notes worldwide deaths through 25 January are 314 men, women and children – a figure that is approximately 25 percent lower than the 403 deaths recorded by the same date in 2016.

Handing and Taking over Duties of Director for Plans & Programmes, ASEANAPOL Secretariat of the Handing and Taking over Certificate was witnessed by the Executive Director of ASEANAPOL Secretariat, Pol. Brig. Gen. Yohanes Agus Mulyono. ACP Aidah Othman has already begun her 2 year term as the Director for Plans and Programmes starting from 01 January 2017.

On 17 January 2017, the ASEANAPOL Secretariat successfully conducted a special ceremony of Handing and Taking Over Duties of Director for Plans and Programmes between Supt. Yuli Cahyanti from the Indonesian National Police (INP) and her successor ACP Aidah bt. Othman from the Royal Malaysia Police (RMP). The signing

The momentous event was done in front of invited guests from various Member Countries of ASEANAPOL, Dialogue Partners and Observers based in Malaysia, and the guest of honour, Deputy Commissioner Police Datuk Khalil Bin Kader Mohd, the Secretary of Royal Malaysia Police also graced the event. The Secretariat expressed its sincere thanks to all the guests and officers from the Royal Malaysia Police and wishes Supt Yuli Cahyanti the very best in all her future undertakings.

Naval Criminal Investigative Service (NCIS) Visits ASEANAPOL The Executive Director of ASEANAPOL Secretariat, Brig. Gen. Yohanes Agus Mulyono together with the Director for Police Services and Director for Plans and Programmes received a courtesy visit from the Naval Criminal Investigative Service (NCIS) led by Special Agent in Charge (SAC) Johnnie Green with Asst. SAC Brian Miller and Officer Steven Ruder. The NCIS visit was intended to enhance partnership with other law enforcement agencies

across the region. Their focuses are on naval and maritime security which includes terrorism, narcotics, fraud etc. In future development with ASEANAPOL, they proposed assistance in naval investigations, information sharing and capacity building through Security Training Assistance and Assessment Teams (STAAT). NCIS wishes to establish relation with ASEANAPOL, creating network and looking forward for future collaborations.

Border Security Report | January/February 2017


CONGRESS NEWS

21

Building A C oherent Global B order Management R esponse    event update                                    World Border Security Congress Congress Programme will deliver high level discussions.

21st-23rd March 2017 Casablanca, Morocco

It was recently reported on the UK’s BBC Newsbeat programme that large amounts of illegal drugs are being delivered unknowingly by UK postal workers with few checks.

Newsbeat reported that “For www.world-border-congress.com several months we have been investigating drugs in the post bought on the dark web. We heard that “millions of pounds of drugs

are bought online every day” via the hidden layer of the internet where dealers can sell drugs anonymous-ly.” Newsbeat spoke to delivery staff who said they had “definitely handled suspect packages” but there was “nothing they could do”. In the US, the problem may be even worse. It was reported in the San Diego Union Trib-une that in 2016, Postal Service inspectors seized mail containing more than 37,000 pounds of illegal drugs and

Border Security Report | January/February 2017


22

CONGRESS NEWS

$23.5 million in suspected drugtrafficking proceeds nation-wide. Of that, about 36,000 pounds was marijuana. If one assumes that the proportion of seized goods is only a fraction of what is sent by mail, then the problem is a huge. At this years’ World Border Security Congress this is one of the key issues that will be addressed by keynote speaker Mr Tony Verachtert of the Council of Europe / Pompidou Group & Chief Commissioner of the Belgian Federal Judicial Police. Tony Verachtert will deliver a keynote presentation emphasizing the role of the Pompidou group in drug policy and on the emerging trends of drug trafficking by mail and express mail and risks of drugs transport via general aviation. Other keynote presenters in the opening of the Congress will see Khalid Zerouali, Wali, Director of the Moroccan Directorate for Migration and Border Surveillance who will give an overview of Morocco’s strategic border security programme and Ambassador Frederic Ngoga, Head of Conflict Prevention Early Warning Division, African Union. The organisers of the 2017 World

Border Security Congress recently announced the Preliminary Congress Programme for the forthcoming event to be held in Casablanca, Morocco on 21st-23rd March 2017. Discussions in the Congress programme include: Building Coherent Global Border Management Response Against Illegal Migration and International Terrorism Whether it’s the threat from international terrorism to mass migration, or organised criminal gangs involved in trafficking of humans, drugs, contraband and CBRNe proliferation, all these generate a national security threat to any country. How should emphasis be placed on ensuring freedom of movement against the security threats these provide? Can a coherent border management strategy be developed and implemented in the face of increased security threats from migration challenges? Are we compromising safety and security at airports, border points and seaports through streamlining for cost efficiencies? Maritime, Port and Coastal Border Security Challenges Whether it’s the current high profile

migration and human trafficking threats across the Mediterranean, Andaman or South China Seas, or from the west coast of Africa to southern Europe and the Far East, migrants continue to risk their lives across the waters to reach their salvation. With many organised criminal gangs exploiting these channels, what are the main challenges for the coast guards and how can we best guard the coast and major ports from international organised criminal activities, including human trafficking and drug smuggling? Standardization of Systems and Making Advanced Passenger Information (API) Work There are many trusted traveller programmes available, yet few integrate and communicate to create a more global benefit of passenger clearance and information sharing. Standardization of systems has not occurred despite lots of talk at ICAO, IATA. Is it possible for standardisation to occur and how can API and PNR sharing be made to work more effectively? External and Internal Land Border Challenges External land borders provide unique challenges in the fight against cross border organised c r i m e , h u m a n t r a ff i c k i n g , smuggling and mass migration. Yet internal land borders, such as at airport and ports, are becoming an increasing focus of terrorist threat or illegal travellers using fraudulent travel documents. What are the latest global challenges and how can strategies and technologies help deliver a more secure border? Identity and Biometrics at the Border – Compliance, Application and Implementation Ease of travel for bona fide travellers

Border Security Report | January/February 2017


CONGRESS NEWS

23

the border to better engage and tackle the increasing threats and cross border security challenges that pertain to today’s global environment. has not become less burdensome, it has become more complicated despite new technologies such as biometrics and e-visas. How can biometrics can be implemented in compliance within legal, privacy and data protection requirements. And be more effectively applied and integrated with trusted traveller programmes and other data sources to ensure the integrity of the traveller to speed up the travel process? The Global Fight Against International Terrorism and Cross Border Organised Crime and How We Make Interagency Co-operation and Information Sharing a Reality Countering border threats as a result of the so called “war on terror” & “the war on drugs” is without end despite the billions spend in human resources and treasure. What are the latest challenges and threats? How can agencies better collaborate and share intelligence in the fight against organised criminal gangs and international terrorist movement? How can border administrations better share information and data under increasing pressure from privacy laws? IBM and Technology Challenges

and Security in the Face of Mass Migration In todays currently climate of mass migration caused through war and unstable regions, terrorist organisations are able to infiltrate countries using migration routes as cover. What are the latest challenges and threats to security and what challenges does this pose to Integrated Border Management (IBM). How can IBM and the use of latest technologies adapt to be more effective in such challenging times? Pushing Out the Border and the Future of Successful Border Management In the climate and pressure of achieving greater results from limited resources, how can we best make information sharing and upstream intelligence a reality for identifying the genuine traveller. How can we push out the border for making identification of threats more effective and efficient? What is the future for ensuring successful border management? The World Border Security Congress aims to promote collaboration, inter-agency cooperation and information/ intelligence sharing amongst border agencies and agencies at

Border agencies and agencies at the border can benefit from the ‘Closed Agency Only Workshops’, hosted by the Moroccan Directorate for Migration and Border Surveillance, Directeur de la Migration et de la Surveillance des Frontiers, with a series of behind closed door discussion and working group opportunities. This years Closed Agency Only Workshop topics are: International Border Security Challenges – from THB and Document Fraud to Inter-Agency Co-operation and Information Sharing Information sharing and upstream intelligence is key to identification and tracking of travellers. Yet agencies and enforcement organisations are still not effective in accomplishing this to best effect. How can agencies best share information and what are the restrictions and implications? Is it regulation and/or operation that needs to be modernised? Health Issues in Border Security It is not just the migration crisis seeing vast numbers of people cross borders with potential health risks. Legitimate travellers also bring health issues across borders, such as the Zika virus, Ebola and

Border Security Report | January/February 2017


24

CONGRESS NEWS

Asia Bird Flu epidemics. How can we enhance best practices for, and what role should the different agencies play in detecting and preventing the international spread of health issues? Soft Surveillance at Borders – Human Development Initiatives Without its people a nation cannot achieve anything and they are a vital part of the security community. How can we improve human development on borders and work with people to enhance cross border security? How can Human Development Initiatives in a Public Private Partnership help tackle international security issue? The World Border Security Congress is a high level 3 day event that will discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and secure border and migration management. Closed Agency Only Workshops The World Border Security Congress aims to promote collaboration, inter-agency cooperation and information/ intelligence sharing amongst border agencies and agencies at the border to better engage and tackle the increasing threats and cross border security challenges that pertain to today’s global environment. Border agencies and agencies at the border can benefit from the ‘Closed Agency Only Workshops’, hosted by the Moroccan Directorate for Migration and Border Surveillance, Directeur de la Migration et de la Surveillance des Frontiers, with a series of behind closed door discussion and working group opportunities.

Speakers include: • Michel Quille, Project Team Director, EuromedPolice IV, France • Captain Willem Mudde, Manager, National Tactical Command, Royal Netherlands Marechaussee • Luísa Maia Gonçalves, National Director, Immigration & Border Service (SEF), Portugal • Abdellatif Hammouchi, Head of Morocco’s internal intelligence service also Chief of General Directorate of National Security (DGSN), Morocco • Elijah Santigie Koroma, Technical Lead, National Registration Secretariat (NRS), Ministry of Information and Communications, Sierra Leone • Don Enrique Belda Esplugues, Deputy Director General of Communications and Information Systems for Security, Ministry of Interior, Spain • Florian Forster, Head, Immigration and Border Management (IBM), Department of Migration Management (DMM), International Organization for Migration • Alvaro Rodriguez-Gaya, Head of Strategy and Outreach - European Migrant Smuggling Centre, EUROPOL • Dr Anthony Luka Elumelu, Head of Division Free Movement & Migration, ECOWAS Commission • Simon Deignan, Counter Terrorism Officer, OSCE • Peter van den Berg, President, European Association of Airport & Seaport Police • Lina Kolesnikova, Security Expert, Belgium • Rear Admiral Enrico Credendino, Commander, EU Naval Force Mediterranean • Rear Admiral Dr Hatem Albesher, Assistant of the General Department Director for Legal Affairs & International Cooperation, Saudi Border Guards and Chairman, Saudi Maritime Center for Consultations and Services, Saudi Arabia • Peter Nilsson, Project Manager, Border Police Division, AIRPOL • Muhammed Babandede MFR, Comptroller General, Nigeria Immigration Service, Nigeria • Olga Derkach PhD, Senior Officer, International 2017Lieutenant-Colonel World Border Security Congress cooperation and Eurointegration Department, State Border Guard Service of Ukraine • Lieutenant-General Vasyl Servatiuk, The First Deputy Head, State Border Guard Service of Ukraine • R K Arora, Professor, Police University, India For full speaker line up and Preiminary Congress Programme visit www.world-border-congress.com.

Border Security Report | January/February 2017


CONGRESS NEWS

25

Closed Agency Only Workshops The ‘Closed Agency Only Workshops’ will be hosted by the Moroccan Directorate for Migration and Border Surveillance, Directeur de la Migration et de la Surveillance des Frontiers, for encouraging such collaboration, cooperation and sharing of information between agencies. Workshop topics: International Border Security Challenges – from THB and Document Fraud to Inter-Agency Co-operation and Information Sharing Health Issues in Border Security Soft Surveillance at Borders – Human Development Initiatives For further details visit w w w. w o r l d - b o r d e r - c o n gress.com/conference/ closed-workshops. If you are interested in participating in the Closed Agency Only Workshops, you need to obtain clearance to attend. Please register via www. world-border-congress.com/ agency-registration.

By further encouraging such collaboration, cooperation and sharing of information between agencies, the World Border Security Congress aims to promote safer, more secure borders. The World Border Security Congress, supported by the Ministry of Interior of Morocco, Organization for Security & Co-operation in Europe (OSCE), European Association of Airport and Seaport Police, International Security Industry Organisation, National Security & Resilience Consortium and International Association of CIP Professionals, is the premier multi-jurisdictional transnational platform where the border protection, management and security industry policy-makers and practitioners convene annually to discuss the international challenges faced in protecting borders. You are invited to join the world border management and security community in Morocco on 21st-23rd March 2017 to develop strategic border management resolutions and solutions - Tackling

International Border Security Challenges. To view the full Congress programme, Closed Agency Only Workshops and for registration details visit www.world-bordercongress.com and download the full Preliminary Congress Programme guide.

2017 World Border Security Congress Supported by:

Ministere de l’Interieur & Directeur de la Migration at de la Surveillance des Frontieres

2017 World Border Security Congress

Border Security Report | January/February 2017


26

I N D U S T RY N E W S

Airbus DS Electronics and Border Security adds portable jammer to its innovative “Xpeller” CounterUAV product family Airbus DS Electronics and Border Security (EBS), future HENSOLDT, has added a portable jamming system to its family of Counter-UAV products which detects illicit intrusions of small drones over critical areas and offers electronic countermeasures minimizing the risk of collateral damage. After several enhancements, the completed product family now will be christened “Xpeller” at the Consumer Electronics Show (CES) in Las Vegas.

with latest data fusion, signal analysis and jamming technologies. It uses radars, optical and other sensors to detect and identify the drone and assess its threat potential at ranges from a few hundred metres up to several Kilometers depending on the type of drone. Based on an extensive threat library and real-time analysis of control signals a jammer then interrupts the link between drone and pilot

and/or its navigation. The modular “Xpeller” system concept relies on the selection of individual devices from the product family depending on customer requirements and local conditions. With the completion of the capability spectrum, “Xpeller” is able to protect sensitive areas against illicit intrusions of small drones, ranging from individual buildings through big events to airports.

ADANI CONPASS MIP chosen as the solution for the Danish Customs ADANI the specialist security screening developer has been chosen as a supplier of the mobile x-ray body screening solution for the Danish Customs Service-SKAT..

“Together with our partners, we have created a modular counter-UAV system which is extremely effective”, said Thomas Müller, CEO of Airbus DS EBS, future HENSOLDT. “Due to its versatility, it is able to offer maximum protection under a variety of conditions and ranges”. The most recent addition to the “Xpeller” product line is a lightweight jamming system from South African HENSOLDT subsidiary GEW Technologies completing

the capability range of the existing portfolio. Up to now, the modular “Xpeller” product family consisted of future HENSOLDT’s own products – radars, infrared cameras and long-range jammers – close-in RF detectors from Danish partner company myDefence and shortrange optical-acoustic-RF sensors from US partner Dedrone. The system offers very high effectiveness by combining sensor data from different sources

ADANI working together with NORAD A/S, Denmark and Hartmann GmbH, Germany have been awarded a contract to design, develop and supply the CONPASS MIP Mobile Full Body Security Screening System to cover the needs of the Danish Customs

Border Security Report | January/February 2017

Service in screening of potential drug smugglers, attempting to import illicit substances into Denmark. Leonid Zelenkevich, International Sales and Marketing Director of ADANI Limited said “We have worked extremely hard with the technical and commercial teams at


I N D U S T RY N E W S NORAD A/S and Hartmann GmbH to develop a fully custom-made mobile x-ray body scanning solution that will completely satisfy the end user need

and provide them with another effective and extremely flexible tool for prevention of illegal drug import into the country.

Smiths Detection’s HI-SCAN 6040aTiX X-Ray System Achieves Industry First EDS Cabin Baggage Screening Certification Random searches of air travellers’ cabin luggage will soon be a thing of the past for airports claim Smiths Detection.

Using Smiths Detection’s industry leading cabin baggage X-ray system, the HI-SCAN 6040aTiX. The advanced checkpoint screening solution is the first in the industry to be awarded the new European Explosive Detection Systems (EDS) certification EDS CB C1 for its automated explosives detection capability. Airports using the system can dispense with random searches using additional explosive trace detectors or dogs, thanks to its advanced detection

Cameron Mann, Global Market Director for Aviation at Smiths Detection, said: “We are delighted to be the first in the industry to receive EDS CB C1 certification. Regulators are looking to next-generation detection technology to handle ever evolving threats and we are proud that they have recognized our ability to keep passengers safe. We’re continuously working to meet the highest industry

27

standards with our security solutions, ensuring passengers can travel safely and securely, while also helping lighten the load for airport operators.” ECAC is focused on moving towards automatic detection of explosives in cabin baggage through the latest standards. EDS CB C2 systems will take automation a step further, meaning that electronic devices such as laptops can remain in bags.

Securiport’s Intelligent Immigration Control System Facilitates Senegal Authorities to Intercept & Extradite Wanted International Criminal to Justice in France

According to recent media reports in Dakar, Senegal, a French National who was apprehended for acts of armed robbery and system, which significantly wanted by Interpol, was intercepted and enhances airport security detected through Securiport’s Integrated while also speeding up the Immigration Control System (IICS). With the inspection process and intelligent watch-list management database boosting throughput. implemented at the International Airport of Additional benefits for Dakar, security authorities on-site were alerted airports include cost savings for administration and maintenance, as there is no need to use threat image projection to review operator performance. The system helps maintain high levels of operator performance as the complexity of X-ray images remain consistently the same, helping facilitate threat detection.

Border Security Report | January/February 2017


28

I N D U S T RY N E W S

immediately and were able to intercept the suspect. Since the apprehension of the Central African citizen, Otto “Prince Charming” Longola has been imprisoned in Rebeuss jail while awaiting his December extradition to France. African Media further reported that the criminal, known for impersonating a businessman through a fictitious company, was highly sought by Interpol at the request of the court of Bordeaux. Upon Longola’s arrest, French officials asked for the extradition of the Central African citizen that was captured at Dakar International Airport. Throughout 2016, Securiport has successfully aided officials in several African countries with apprehending international criminals on the international watch lists. Similar to the latest incident involving Longola, numerous arrests have occurred at the Senegalese airport

contacts Editorial: Tony Kingham E: tony.kingham@knmmedia.com

through the use of Securiport’s traveler screening tools. Securiport’s threat detecting systems alert immigration officials of possible risks in real-time. A recognized leader in border security through the use of intelligent immigration controls and aviation security solutions, Securiport is the “gold standard” for providing tools for threat assessment and identifying transnational criminal activities. In addition to providing proprietary threat assessment tools, Securiport’s exclusive systems also conduct passenger biometric screening and security controls of travelers.

Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com Border Security Report is a bi-monthly electronic magazine and is the border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over 16,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide.

Copyright of KNM Media and Torch Marketing.

ADVERTISING SALES Paul Gloc (UK and Rest of World) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +33 (0) 6 1609 2153

Bernadette Terry (North America) E: bernadette@btiglobalinnovation.com T: +1-613-501-5316

Border Security Report | January/February 2017


21st-23rd March 2017

Casablanca, Morocco www.world-border-congress.com Confirmed speakers include:

Developing strategic border management resolutions and solutions REGISTER TODAY 2015/16 saw unprecedented crisis on a global scale, from the Middle East warring factions creating mass refugee movements across Europe, illegal economic migrants from Africa and Asia have created increasing challenges for the international border management and security community. 2016 is expected to see a continuation of the migration challenges for the border management and security community, as little sign of peace and security in the Middle East is apparent. The World Border Security Congress is a high level 3 day event that will discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and secure border and migration management. We need to continue the discussion, collaboration and intelligence sharing. Supported by the Ministry of Interior of Morocco, the Organisation for Security & Cooperation in Europe (OSCE), National Security & Resilience Consortium, International Security Industry Organisation and International Association of CIP Professionals, the World Border Security Congress is the premier multi-jurisdictional global platform where the border protection policy-makers, management and practitioners together with security industry professionals, convene annually to discuss the international challenges faced in protecting borders. We look forward to welcoming you to Casablanca, Morocco on 21st-23rd March 2017 for the premier gathering of border and migration management professionals.

www.world-border-congress.com for the international border management and security industry

Supported by:

- Khalid Zerouali, Wali, Director General, Moroccan Border Police - Alvaro Rodriguez-Gaya, Head of Strategy and Outreach - European Migrant Smuggling Centre, EUROPOL - Simon Deignan, Counter Terrorism Officer, OSCE - Rear Admiral Enrico Credendino, Commander, EU Naval Force Mediterranean - Peter Nilsson, Project Manager, Border Police Division, AIRPOL - Muhammed Babandede MFR, Comptroller General, Nigeria Immigration Service, Nigeria - Lieutenant-Colonel Olga Derkach PhD, Senior Officer, International cooperation and Eurointegration Department, State Border Guard Service of Ukraine - Lieutenant-General Vasyl Servatiuk, The First Deputy Head, State Border Guard Service of Ukraine - Rear Admiral Dr Hatem Albesher, Assistant of the General Department Director for Legal Affairs & International Cooperation, Saudi Border Guards and Chairman, Saudi Maritime Center for Consultations and Services, Saudi Arabia - Peter van den Berg, President, European Association of Airport & Seaport Police - Senior Representative, ICAO, WACAF Office - Alket Furxhiu, Executive Director, Central Bureau of Investigation, Albania - Michael Gaul, Senior Advisor, NATO’s Emerging Security Challenges Division

Invitation to Exhibit: To discuss the limited exhibiting and sponsorship opportunities and your involvement with the 2017 World Border Security Congress please visit www.world-border-congress.com.

Media Partners:


INFRASTRUCTURE

Risk Treatment With risks in most cases we could not eliminate them because there is no such thing is zero risk, well unless you are able to avoid that particular activity completely that is, meaning not doing the particular business or product. At most times we are looking at reducing or mitigating the risks, trying to reduce the impact or the probability of it happening. We could share or transfer the risk such as by outsourcing it or having insurance, or that we are comfortable with a particular risk that we decide to accept it. The protection to our facilities, the design, policies, procedures, should take these risks into considerations. The concept of deter, detect, delay, respond, or permutations of that concept is a way to mitigate security risks. There is also crime prevention though environmental design to built in those mitigations into the facilities. There are many methods to do this, but again our resources are limited so we will need to prioritize which risks that we want to spend our resources upon. One may want to focus first more on the medium and high severity but with a higher probability of occurring. Those with low probability but with high impact may come second.

call that such attack could occur in Jakarta. They say that hindsight is 20/20, after the incident occurred everything becomes so obvious. We don’t know what we don’t know. To be fair, there is only a limited amount of data available to us to drive a decision. We may have gut instinct or even psychic visions, but it is difficult to justify our decisions if we are unable to utilize verifiable information. Risks are instinctive but we will need to do the research and assessment in order to verify those risks and hence be able to mitigate them. The more accurate the data, the more accurate the risk calculation, therefore better resource management. No matter how well we could identify the risks and mitigate them, unless we avoid the activities entirely, there is no way that it could go all the way down to zero. There will always be a residual risk, meaning that the risk that we are mitigating against could still happen albeit with lower probability and/or lower impact. This residual risk, if it’s low enough, will usually be accepted. At best, we may be able to manage up to 99% or even to 99.9%, but there is still a 1% or a 0.1% chance that it could still happen.

The availability of resources may come as a challenge as there is a finite amount of it. This could eventually drive the decision whether the risk is worth the gain that the activity provides; if it is then there should be an effort of putting more resources to manage those risks.

We may have done all we can to reduce the probability ad/ or the impact of the said risks, we may have put systems and procedures in place, put manpower, electronic detection and so on but now we still need to prepare on what to do if it does occur.

Take into consideration the story that I had given earlier. From 2002 to 2005, the major terrorist attack in Jakarta and Bali involved VBIED and/or explosive suicide vests. There is historical data to back this up and if my facilities are part of those attractive targets I would actually put the effort to make those facilities harder to attack, target hardening, making it less vulnerable and less attractive. But there is only a certain amount of data that you have, so you may only be able to justify your decisions to certain types of threats.

Emergency Response and Business Continuity Planning

Another example is the active shooter scenario; take the November 2008 Mumbai attacks, the November 2015 Paris attacks, and the mass shootings that happened in the US. Prior to 2016, we in Jakarta may not have thought of these happenings. But terrorists in Indonesia have a tendency to copycat or to mimic attacks in other places. After Paris I thought that there is a probability that it could happen here in Indonesia. It is not easy to obtain firearms in Indonesia and materials for explosives have become more difficult to obtain over the years, but again that doesn’t mean that there is no risk of this happening. The probability may be low, but there is still a probability, we may want to put it up on the map. We may not spend a lot of resources on it, but we could simply start with training for an active shooter scenario and have a procedure if such a situation should befall our facilities. On 14 January 2016, Jakarta experienced its first terrorist attack involving a combination of shootings and IEDs. Though it was not as big as Mumbai or Paris, it was definitely a wakeup

www.worldsecurity-index.com

Every organization should have emergency response, crisis management, and business continuity planning. Though these terminologies at times are used interchangeably, they are not the same thing. An emergency may not necessarily be a crisis, but it could if it was mismanaged. A crisis does not necessarily trigger the activation of the business continuity plan if it does affect the four pillars of business continuity, i.e.: loss of workplace, loss of infrastructure, loss of data, and loss of people. The emergency response scenarios should be based on the

World Security Report - 19


INFRASTRUCTURE

affect the facilities’ operations significantly if there are a lot of the employees affected and they happened to be key personnel. A loss of people scenario does not necessarily have to mean that the person died, but a number of key people are unable to come to work. In this scenario, the organization may want to explore how the knowledge and the workload could be taken up by a number of staff.

risks that we have identified, e.g.: earthquake, floods, fire, blackout, terrorist attack, etc. Emergency response is part of the mitigation to reduce the severity of an incident during the event itself because at this point whatever risks that we have on our list is already happening. Prior to 2016, perhaps most of institutions in Jakarta would not even thought of having an active shooter scenario as part of their emergency planning, but now perhaps more organizations would consider it. These emergency scenarios should not be static; they should be reviewed regularly to include emerging risks. Your business continuity scenarios are also affected the same way. The goal of business continuity, ideally, is to have business as usual at any given situation. That is the golden standard of business continuity but then again depending on the resources you have these standards could be a luxury that we may not have. For example: not every business could have identical facilities on different locations providing the same service so if when one is down the other could take up the load until the business resumes on that facility. Take power plants, if one is down, would another power plant be able to provide 100% power to the city? Usually, this is not the case. There will be load sharing and scheduling, prioritizing which areas would receive electricity. Well, at least that was what I have experienced so far. This is a continuity plan to ensure at least that there is still some power to the city. Not a single point of failure, there is a backup plan. Loss of power is a common occurrence where I’m from. Most buildings have their own generators. This has become the norm. It is an example when we have an unstable infrastructure and the mitigations have been embedded in our daily lives. How often that there is a blackout in our area and how long? But this has gotten better in the past five years or so, we don’t get blackouts as much as we used to, at least in the Greater Jakarta area. Floods are not an unusual scene in Jakarta. Our facilities may not be affected by the flood itself, but our employees are and they are unable to come to work. This would

20 - World Security Report

There are some events are so widespread and so severe that there is little that we could do in terms of emergency response and business continuity. These are the black swan events, they are rare but devastating, the unexpected ones or those that even if we have considered them there is no feasible way of mitigating them; such as the Aceh Earthquake and Tsunami 26 December 2004 and the Tohoku Earthquake and Tsunami 11 March 2011. We still may be able to manage some aspects of the threats with what information and resources we have. As there is a history of the event, we could actually learn from it and include it in our risk assessments. There are many methodologies of risk assessments, but our assessments of risks are only as good as the accuracy and updated information that we could have. At most times we could only have secondary information that is readily available to us from public sources. Sometimes we have that information because we own it or we are able to do our own field surveys and find out the information first hand. We use the information that we have to map out our risks in doing our business. Risks are not static, they change. It is quite important to review them regularly and include emerging threats. There is also a finite amount of resources therefore its allocation will need to be based on priority for mitigation. Even after mitigation there will still be a lower probability of the event occurring. We also have to put this into consideration by putting them into emergency response, crisis management, and business continuity planning. We manage our risks based on what we know or what we could find out to the best that we can with the circumstances presented to us. Plan the best that we can because if not then we have already failed, “Failing to plan is planning to fail.”

This feature is the personal view of Iriawan Kamal Thalib, who heads the Financial Crime and Security Services (“FCSS”) in PT Bank DBS Indonesia (“DBSI”) and is also part of the Emergency Management Team and Occupational Health and Safety Committee within DBSI.

www.worldsecurity-index.com


CYBER SECURITY

Who uses “Password” as a password these days?

There is an interesting farce being played out in the United States of America which is both amusing and disturbing at the same time. On the one hand is the incumbent President and on the other the President-Elect.

In the blue corner, the incumbent President, supported by the CIA, FBI, Senators, the media in all its forms and an assortment of those who are losing position, power and influence are accusing Russia of hacking the Clinton presidential campaign’s e-mails in an endeavour to influence the outcome of last November’s Presidential election. In the red corner the President–Elect and Wiki-leaks Assange, a man of impeccable integrity, deny it all, until recently, claimed that they have evidence that Russia was not involved in the illegal activity. Whatever the truth and outcome, both of which I doubt we shall ever know, it would appear that the security systems and protection adopted by the Clinton campaign was woefully inadequate. Who uses “Password” as a password these days? Not even silver surfers!!!

www.worldsecurity-index.com

Hilary has a chequered history with regards to e-mails, servers and the like, and was not a role model for her campaign to follow. The blues, Democrats, accuse Trump of sucking up to Putin. The reds, Republicans, accuse the losing Democrats of sour grapes and trying to rewrite history. Whatever the truth of it, it is demeaning and not worthy. Yet there is a much more serious side to all this. Cyber-crime is on the rampage, conducted by criminals, “autistic” hackers, game players and undoubtedly state sponsored institutions. Spying has been with us since time immemorial – it cost Mary Queen of Scots her head – and given the existence of MI5, MI6 and GCHQ, and others, I am under no illusion that that GB is at it as well. In truth we are all vulnerable. Our e-mails, iPhones, social media

accounts and electronic banking are all vulnerable to attack and corruption. Individually we must take all the security steps available to us, and make sure that we have the latest virus protection software applied. What is staggering is that corporate bodies, including the Democratic Party, have such poor levels of protection and high levels of vulnerability. Advice is readily available, protective systems are inexpensive and easy to install. Whole systems can be readily monitored 24/7/365 and threat alerts installed. Company Directors and Managers have a duty of care to their employees, their shareholders, and their customers to ensure that the organisation they lead is fit for purpose. In the 21st Century that includes Business Continuity Plans being in place and understood,

World Security Report - 21


CYBER SECURITY

communications systems readily available and regularly tested, and all possible steps taken to ensure that cyber threats are minimised. Yet recent experience would show that this is not the case and, for some years, cyber security has been effectively ignored or its threats minimised. For banking services it has been the “crime that dare not speak its name”. Reputation is all and steps are taken to protect reputation, and not necessarily to protect the service. The recent attack on Tesco Bank is a text book example of what not to do. One of the World’s biggest companies, Yahoo Inc, has just been forced to admit that not only did it leak 500 million user account details in 2012, but it has now found out that in 2013 it also had 1 billion user account details stolen from it. This means that roughly one in every seven people in the world has had their personal details leaked by Yahoo.

impose fines of up to 4% of global turnover or €20 million. Report or be damned. Ignorance will no doubt be frowned upon, especially by shareholders and customers. Cyber security is routinely reported as the top concern keeping CEO’s and CIO’s awake at night. It should be! Its consequences can be fatal. The GDPR is probably the first step the regulators will take to reinforce responsibility, it is not just bottom line and share value! An amendment to the Companies Act requiring a statement on business continuity, resilience and cyber protection in the Annual Report would concentrate minds. 2017 has all the hallmarks of a challenging and interesting year. The first week has laid impactful foundations.

What is more astounding is that it has taken Yahoo three whole years to find this out. Whoever stole this information, a state sponsored actor, criminal enterprise or teenage hacker, has had three years to mine the data for their own gain. Yahoo, TalkTalk, Tesco Bank, the Democratic Party, none of these are small under-funded organisations. But they, and many others, have had a blind side and they have been severely punished for it. The EU will bring into play the General Data Protection Regulation this year. The UK is signed up to it and failure to report a breach can

22 - World Security Report

Richard Barnes is the former Statutory Deputy Mayor of London and now a Senior Consultant: Crisis Control www.crises-control.com

www.worldsecurity-index.com


CYBER SECURITY

Growing Cyber Risk for Energy Sector

Cyber threats are considered to present a critical risk factor for all sectors according to the executives and sector leaders. However, among all industry types, energy sector which lies at the core of the continuity of modern economy are increasingly suffering from cyber-attacks that the sector is currently seeking to eliminate and minimize this new emerging threats. In fact, energy sector is rapidly digitalizing and becomes more and more dependent to automated systems. In that sense, while

IoT (Internet of Things) is increasingly using in energy sector with the aim of ensuring more productivity and less costs however, every digital system has its own vulnerabilities and the hidden invisible threat is growing simultaneously. As a result of a successful cyber-attack, companies or countries could lose thousands of million dollars. However and more seriously a smart and targeted cyber-attack on OT systems (operational technologies) could have direct impacts on

facilities’ activities (ex: power generation, gas distribution) or human life. In such context, raising awareness, ensuring effective sector coordination and providing continuous training seems as the most important urgent action agenda. With respect to these growing threats, a Turkish think-tank- Bilgesamorganized two days on “Cyber Risk Management for Energy Sector” with the support of IACIPP (International Association of CIP) in 26-27th December in İstanbul. 19 delegates from different sectors participated to the event with the aim of improving their awareness regarding specific cyber threats to energy industry and finding the opportunity to increase their capability to assess the cyber risks for their institutions. During the event, different types of topics were handles from hybrid warfare

to cyber risk assessment methodologies. The lecture on cyber insurance and its practices in energy sector and the case study on attack on Ukraine’s power grid were one of most attention-grabbing presentations. Additionally, IACIPP’s Caspian and MENA Region Director Ayhan Gücüyener also gave a lecture on “Assessment of Cyber Attacks Targeted Energy Sector”. At the end of two days training, participants found the opportunity to work with cyber risk assessment tools sponsored by Demiroz Consultancy and worked on real case scenarios in an interactive way. Finally, all delegates were certificated by Bilgesam and IACIPP.

CYBERPOL Says Internet Crimes Increased by Estimated 52%

CYBERPOL, The International Cyber Policing Organization General Secretariat announced that cyber crime might have risen by as much as 52% last year. It is

noted that data theft and financial crimes are first on the list followed by identity theft, human trafficking, pornographic and sex crimes against children.

CYBERPOL, in partnership with Protecting Tomorrow in the USA, is to roll out an international action plan to combat online criminal activity.

The spokesperson also pointed out that major stake holders such a Yahoo and Google are doing very little to mitigate this problem to remove harmful content and are not doing nearly enough to prohibit certain content without adult identity verification.

In recent month, CYBERPOL has made substantial progress in placing the building blocks necessary for international cooperation that fills the gray area between criminality and technology. Unlike traditional enforcement organizations, CYBERPOL’s main focus is on tracking and monitoring

www.worldsecurity-index.com

illicit behavior and websites which brings the missing coordination links to be enforced between working parties on a global scale. Fake social media accounts are rapidly growing and it’s not only the high profile accounts that are a target but everyone who has internet access. It has been warned that many social media accounts are fake and driving identity theft at a unprecedented rate.

World Security Report - 23


ASSOCIATION NEWS

IACIPP - John Donlon News from the Chairman As a new year starts to unfold the IACIPP looks forward to further developing our activities and encouraging new members from around the globe. 2016 saw the launch of the association and a wide range of events being delivered focusing in on the threats and dangers that critical national infrastructures continue to face whether it be from natural and man made disasters or cyber attacks and espionage. The conferences that we support, CIPRE in The Hague in March last year and CIPRA in Bangkok in October were extremely well attended. They provided a platform to connect like minded people together to share information, innovation and experiences in order to further enhance a collective response to the many challenges within the protection and resilience of our critical infrastructure. IACIPP will continue to support such events in 2017 as it develops its international reach and enhances the services available to infrastructure professionals. We have been working on the launch of a global intranet which will allow our members to communicate in a secure network and I am pleased to say that the last stages of our test processes are now underway and all is looking good for its introduction within the next few weeks. We also continue to develop our network of Regional Directors. We currently have:

weeks and we will interview a candidate for Western Europe in February. We look forward with great enthusiasm to 2017 being a year where the IACIPP continues to develop and contributes to the reduction of vulnerabilities of Critical Infrastructure and Information. If you would like more information on our asscociation then please go to our web site www.cip-association.org

Take the IACIPP Poll IACIPP is currently running a poll on the Association webiste www.cip-association.org. If you wish to add your opinion, visit the website a vote: Where do you see your next major security threat? (current results:) • Cyber attack - 31% • Insider Threat - 28% • Man Made / Ineptitude - 21% • Terrorist attack - 13% • CBRNE threat - 5% • Natural Disaster - 3%

• Dr. Frederic Petie covering North America • Dr Bill Bailey looking after Australasia • Dr Robert Mikac in Eastern Europe and • Ayhan Gücüyener, who is based in Turkey with responsibility for the Caspian, Middle East & North African regions. We have also identified a Regional Director for the ASEAN area and hope to see that individual appointed within a few

24 - World Security Report

www.worldsecurity-index.com


PUBLIC SECURITY

www.cip-association.org

Join the Community and help make a difference Dear CIP professional I would like to invite you as an infrastructure operator or related government agency representative to join the International Association of Critical Infrastructure Protection Professionals a newly formed body that seeks to encourage the exchange of information and promote collaborative working internationally. As an Association we aim to deliver discussion and innovation – on many of the serious Infrastructure - Protection - Management and Security Issue challenges - facing both Industry and Governments. The ever changing and evolving nature of threats, whether natural through climate change or man made through terrorism activities, either physical or cyber, means there is a continual need to review and update policies, practices and technologies to meet these growing and changing demands. Our initial overall objectives are: • To develop a wider understanding of the challenges facing both industry and governments • To facilitate the exchange of appropriate infrastructure & information related information and to maximise networking opportunities • To promote good practice and innovation • To facilitate access to experts within the fields of both Infrastructure and Information protection and resilience • To create a centre of excellence, promoting close co-operation with key international partners • To extend our reach globally to develop wider membership that reflects the needs of all member countries and organisations For further details and to join, visit www.cip-association.org and be amongst the first to shape the future of this increasingly critical sector of national security. We look forward to welcoming you.

John Donlon QPM, FSI Chairman IACIPP


AGENCY NEWS

Islamic State Changing Terror Tactics to Maintain Threat in Europe As the so-called Islamic State (IS) loses ground in the Middle East, the pattern of its recent terrorist attacks in Europe suggests that it has already adopted new tactics to attack the West. These developments are highlighted in the report Changes in Modus Operandi of IS revisited published today by Europol’s European Counter Terrorism Centre (ECTC).

lone actors; attacks directed by IS and those inspired by IS; the use of explosives and automatic rifles as well as bladed weapons and vehicles; and carefully prepared attacks alongside those that seem to be carried out spontaneously. The so-called Islamic State has proven to be very effective in inspiring people to commit terrorist acts and in setting attacks in motion themselves.

The report provides an upto date assessment of the threat this group poses to the EU, on which basis EU Member States can prepare for future attacks. Currently the EU is facing a range of terrorist threats and attacks: from networked groups to

Europol’s Director Rob Wainwright: “The last two years have seen a number of jihadist attacks, several of which have caused mass casualties. The scale of this threat has been widely acknowledged in Europe, triggering an intensified

cooperation between police and security services across the continent leading to an increase of arrests and plots foiled before terror attacks could be carried out. This shows that the increased cooperation and exchange of data between all relevant services across Europe is a successful means to mitigate the threat posed by IS. Nevertheless today’s report shows that the threat is still high and includes diverse components which can be only tackled by even better collaboration.” Gilles de Kerchove, EU Counter-terrorism Coordinator: “We have to be vigilant, since the threat

posed by the so-called Islamic State (IS) and returning foreign fighters is likely to persist in the coming years. These people are trained to use explosives and firearms and they have been indoctrinated by the jihadist ideology. An effective response requires a comprehensive approach and long term commitment. Of course, the primary responsibility in the fight against terrorism lies with the Member States. However, the EU and its agencies such as Europol can and should play a supportive role that helps respond to the cross-border nature of the threat.”

INTERPOL supports public-private partnerships to combat cybercrime at World Economic Forum At the World Economic Forum (WEF) Annual Meeting in Davos, world leaders were updated on the progress of recommendations to increase global collaboration against cybercrime. Unveiled during the 2016 gathering by JeanLuc Vez, WEF’s Head of Public Security Policy and Security Affairs, the recommendations of the WEF’s Cybercrime Project set the scene for a unified approach between law enforcement and private industry partners for better prevention, detection and

mitigation of cybercrime. In support of this initiative, INTERPOL acts as a global hub for cybercrime related data and intelligence from its member countries and partners in the private sector, as well as providing training on best practices for combating cyber and technology-enabled crimes. The WEF recommendations call for the increased exchange of information between law enforcement and the private sector, greater awareness and enforcement of legislation against cybercrime, and joint capacity building activities.

26 - World Security Report

“Collaboration with private sector and academia leveraging their technology, expertise and information - is at the heart of INTERPOL’s strategy to combat cybercrime,” said Noboru Nakatani, Executive Director of the INTERPOL Global Complex for Innovation (IGCI).

information sharing platform against cybercrime. Reaffirming the Organization’s commitment to the initiative, INTERPOL and the WEF will co-host a workshop dedicated to the implementation of the initiative’s recommendations at the IGCI in Singapore.

“INTERPOL champions this approach and appreciates the leadership of the WEF in this initiative,” added Mr Nakatani. In this regard, the WEF initiative recognizes the IGCI’s Cyber Fusion Centre as an effective global

www.worldsecurity-index.com


INDUSTRY NEWS

RT LTA to Unveil a New Member of the SkyStar Family: the SkyStar 110 RT LTA Systems Ltd., a worldclass designer, developer, and manufacturer of the Skystar™ family of aerostats for use in intelligence, surveillance, reconnaissance, and communications applications, introduces a new member of the Skystar family: the Skystar 110 . The Skystar 110 is based on the platform of the Skystar 100 micro balloon system, and includes the Epsilon 140 payload – a dual sensor payload with a 3.3x IR continuous zoom lens. The light weighted Epsilon 140 enhances the systems’ performance by maximizing night-time surveillance capabilities as well as by offering a built in target tracker and moving target indicator. The Skystar 110 is a micro

screen. Navigation capabilities such as point to coordinate and hold coordinate as well as manual control modes are integral part of the system. The system can be used as a relay for other systems such as mini UAVs or ground sensors.

balloon system, designed to provide field commanders with real time “over the hill” reconnaissance capability. The system is compact, robust and can be transported, assembled, launched and operated by only two personnel after minimal training. Backpack or pickup truck transportable, the system can be assembled and launched in 15 minutes, for a 1,500 feet surveillance range. Skystar 110 Handheld

Personal Ground Control Station (PGCS) is a compact unit that can be worn over a protective vest or mounted on a tripod. The Personal Ground Control Station unites a userfriendly software interface with advanced Real-time Control hardware. The PGCS includes an integral Digital Video Recorder (DVR), for recording video and data during the entire mission. Map and video telemetry displayed simultaneously on a Personal Ground Control Station

According to Rami Shmueli, RT’s CEO: “Our latest product, the Skystar 110, allows field commander to detect and track moving or stationary targets from very long distances and high attitudes, using the Epsilon 140 IR zoom capability. Providing surveillance with very high mobility in very short time at a very minimal cost, the Micro Skystar 110 is an ideal solution for a large range of missions, including military, homeland security, law enforcement operations and Search and rescue missions”.

INTOS and Stage Gate 11 develop the first shoe scanner based on light rays UVscan technology detects dangerous substances in passenger footwear in airports accurately and rapidly than before, airports can now pick out passengers who have hidden unsafe and undesirable substances, like explosives, in their shoes.

INTOS, one of the biggest interiors specialists in the Netherlands, together with Stage Gate 11 (SG11), a start-up in technological product development for the security industry, have recently developed the Delta R Shoescanner. The Shoescanner is a detection unit that uses UV light. More

The Shoescanner is one of the products based on the UV-scan technology that SG11 has owned the exclusive mondial rights to and has developed since last year. The technology, discovered at the University of Florida, detects traces of substances using UV reflection. It compares the emitted beam of light with the reflected one that has bounced off a surface. Because all substances have

www.worldsecurity-index.com

their own unique patterns, the technology rapidly and accurately recognises traces of, for example, explosives or narcotics. The Shoescanner scans passenger footwear as they pass through, without anyone having to remove their shoes. This increases the efficiency of security checks in airports and the passengers are checked in a far friendlier manner. “INTOS is continuously involved in innovation that influences our markets, including airports. Based on our reputation and a fascination for UV-scan technology, we were

invited to collaborate on the development of the Shoescanner. Starting with the idea, INTOS advised SG11 about the design, material, sustainability and possibilities for maintenance. And the resulting standalone column that now is the Shoescanner, is manufactured entirely in-house. The technology is suitable for many different applications, like sample - and parcel scanning. Hopefully INTOS will be invited to contribute in the following product developments”, says JanWillem Spanjaart, INTOS Business Development Manager.

World Security Report - 27


INDUSTRY NEWS

Thales announces the results of its 2017 Thales Data Threat Report of breaches will continue to increase.” Compliance the top driver for IT security spending

Thales announces the results of its 2017 Thales Data Threat Report, issued in conjunction with analyst firm 451 Research. Sixty-eight percent of respondents have experienced a breach with 26 percent experiencing a breach in the last year – both numbers that rose from last year. Paradoxically, overall security spending is also up; in 2017 73 percent of organizations increased IT security spending – a marked jump from 2016 (58 percent). Old Habits Die Hard - The report, which is in its fifth year, polled 1,100 senior IT security executives at large enterprises around the world and indicates an ongoing disconnect between the security solutions organizations spend money on and the ability of those solutions to protect sensitive data. While 30 percent of respondents classify their

organizations as ‘very vulnerable’ or ‘extremely vulnerable’ to data attacks (and the number of breaches continues to rise) the two top spending priorities are network (62 percent) and endpoint (56 percent) protection solutions. Counterintuitively, spending on data-at-rest solutions (46 percent) comes last. Garrett Bekker, senior analyst, information security at 451 Research and author of the report says: “One possible explanation for this troubling state? Organizations keep spending on the same solutions that worked for them in the past but aren’t necessarily the most effective at stopping modern breaches. Data protection tactics need to evolve to match today’s threats. It stands to reason that if security strategies aren’t equally as dynamic in this fast-changing threat environment, the rate

The reasons behind security spending decisions are varied, but the key driver remains constant: compliance. Almost half (44 percent) of respondents list meeting compliance requirements as their top spending priority, followed by best practices (38 percent) and protecting reputation/brand (36 percent). Fifty-nine percent also believe compliance is ‘very’ or ‘extremely’ effective at preventing data breaches. While compliance regulations provide a data security blueprint, they are by no means are the only consideration when building a security strategy robust enough to withstand today’s sophisticated attackers. External and Internal Cyber Actors the top threat

executive management is seen as the second-most-risky insider, followed by ordinary employees (36 percent) and contractors (33 percent). Securing Data from Future Threats: Promise or Peril? In this age of the cloud and SaaS enterprise deployments, more and more enterprise data is being created, transported, processed and stored outside corporate network boundaries, making traditional perimeter-based security controls and legacy network and endpoint protection solutions increasingly less relevant. Other new, popular technologies also bring added security challenges. For example, nearly 40 percent of respondents are using Docker containers for production applications. At the same time, 47 percent cite security as the ‘top barrier’ to broader Docker container adoption.

As in years past, the 2017 Data Threat Report explored threat perceptions. All vertical industries polled identified cyber criminals as the top threat (44 percent), followed by hacktivists (17 percent), cyberterrorists (15 percent) and nation-states (12 percent). With respect to internal threats, 58 percent of respondents believe privileged users are the most dangerous insiders (a slight decrease from last year’s 63 percent). At 44 percent,

To offset the data breach trend and take advantage of new technologies and innovations, organizations should, at a minimum, adhere to the following practices • Leverage encryption and access controls as a primary defense for data and consider an ‘encrypt everything’ strategy • Select data security platform offerings that address a variety of use cases and emphasize ease-of-use • Implement security analytics and multi-factor authentication solutions to help identify threatening patterns of data use.

28 - World Security Report

www.worldsecurity-index.com


INDUSTRY NEWS

Cambridge Pixel’s RadarVision Allows Easy Integration of Radar Data with Any VMS System VMS with minimal effort.”

Cambridge Pixel has announced RadarVision, a plug and play solution to allow the easy integration of radar data with any security video management system (VMS). RadarVision allows high fidelity radar imagery to be added to a security display and viewed alongside data from traditional daylight and thermal cameras. The high-resolution radar image may be zoomed and panned with an on screen or physical joystick using the PELCO-D interface from the VMS. RadarVision interfaces to radars at the level of video, plots or tracks and composes a picture of the radar information, optionally with maps underlaying the radar. The picture is then

converted to a camera-like IP data stream for input to the VMS. This means that any VMS can easily interface to a radar and display and manipulate the radar picture. David Johnson, CEO, Cambridge Pixel, commented, “High resolution radars are increasingly being incorporated into security

solutions to provide enhanced situational awareness. However, incorporating radar data into a camera-centric VMS system has been a challenge for integrators in the past. With RadarVision, we have overcome this with a novel solution that makes the radar look and behave like a camera and thereby integrate easily with the

RadarVision interfaces to a wide range of security, maritime and specialist radars. It accepts radar video as either radar signals through an acquisition card, as ASTERIX CAT240 network data or in proprietary formats. The radar data is then scan converted into a plan image and then output as a H.264 (RTSP packaged) network video stream that feeds directly into the VMS. RadarVision is available as a software application or as a box level solution and provides a wide range of radar acquisition, processing and display options that incorporate Cambridge Pixel’s award-winning radar technology.

Startups & Enterprises Launch Blockchain IoT Protocol Initiative In December, representatives from a group of startups and innovative Fortune 500 companies met in Berkeley, CA to discuss the challenges facing blockchain and IoT innovation and the potential for a collective effort to address them. The meeting, New Horizons: Blockchain x IoT Summit, was the first step towards a collaborative effort to explore and build a shared blockchain-based Internet of Things protocol. Participants in the discussions included blockchain companies Ambisafe, BitSE, Chronicled,

ConsenSys, Distributed, Filament, Hashed Health, Ledger, Skuchain, and Slock. it, along with Fortune 500 corporations BNY Mellon, Bosch, Cisco, Gemalto, and Foxconn. The initiative was motivated by the leaps made by startups and large, bluechip IT firms in deploying blockchain-registered tamper-proof hardware for various use cases and making new blockchain-based software systems available to enterprises. The meeting included presentations from blockchain and IoT focused

www.worldsecurity-index.com

startups on their established use cases, industry findings, and identification of common needs. The group agreed that security, trust, identity, and registration and verification would be the cornerstones of any common protocol, while also acknowledging the need for integration and interoperability across multiple chip types, communication protocols, proprietary platforms, cloud service providers, and blockchain systems. A blockchain technology industry consortium

emerging from the meeting will move forward in defining the scope and implementation of a smart contracts protocol layer across several major blockchain systems with elective steer from the attending Fortune 500 companies. The functioning of the group is voluntary at this stage with intent to emphasize nimble and fast-moving open source collaboration with any formal membership or governance structures emerging if and when necessary..

World Security Report - 29


INDUSTRY NEWS

AUDS Counter-drone System First to Achieve TRL-9 Status Following Successful Deployment with U.S. Forces strategically important sites/ events. These include nuclear power stations, borders, political, sporting or VIP events, airports and airbases.

The AUDS counter-UAS defence system – field proven to detect, track and defeat malicious and errant unmanned aircraft systems (UAS) or drones – is the first fully integrated system worldwide to achieve TRL-9 status. This follows the successful mission deployment of the AUDS system with United States Forces. TRL-9 is the very highest technology readiness level or maturity that a technology system can attain. According to the United States Department of Defense (DoD) and NASA definitions, TRL-9 signifies that a technology system or product is in its final form and that the actual system is proven through successful mission operations. Mark Radford, speaking for the AUDS team, said: “Achieving TRL-9 status is an important milestone for AUDS in the embryonic counter-drone market. The sale and deployment of multiple AUDS systems to the U.S. military to protect critical assets and personnel makes AUDS, we believe, the only TRL-9 rated fully

integrated strategic counterUAS system on the market.” Over the last 18 months, the AUDS system has been heavily evaluated and tested by military and government organisations. Through this process, AUDS consistently exceeded the mission requirements, simultaneously providing ground and air surveillance against possible threats. The AUDS system – developed by Blighter Surveillance Systems, Chess Dynamics and Enterprise Control Systems – can detect a drone six miles (10km) away using electronic scanning radar, track it using precision infrared and daylight cameras and advanced video tracking

software before disrupting the flight using a non-kinetic inhibitor to block the radio signals that control it. This detect, track, defeat process is very quick and typically takes 8-15 secs. Using AUDS, the operator can effectively take control of a drone and force a safe landing. The AUDS system works in all weather, day or night and the disruption is flexible, proportional and operator controlled. AUDS is positioned at the strategic end of the UAS countermeasures market for use by government agencies, the police and military to protect high value critical national infrastructure or

AUDS is also currently being evaluated by the U.S. Federal Aviation Administration (FAA) for use at major U.S. airports as part of its Pathfinder Programme. The FAA has signed a Co-operative Research and Development Agreement (CRDA) with Liteye Systems, the AUDS team’s manufacturing and integration partner in North America, to test AUDS at US airports selected by the FAA. To further consolidate its market leading position, the AUDS team has developed a range of new platforms – fixed, semi-permanent and temporary - to better meet the needs of customers in different markets. These include a platform for the deployment of AUDS to the roof of a building; a field mast system for the protection of semipermanent sites such as forward operating bases (FOB), air bases or army camps; and a system for rapid deployment purposes.

Smiths Group welcomes European Commission clearance for acquisition of Morpho Detection In order to secure approval in Phase I of the EU merger review process, Smiths Group proposed the divestment of Morpho Detection’s explosive trace detection (“Trace”) business. This divestment is

conditional on the successful closing of Smiths Group’s acquisition of Morpho Detection and on the European Commission’s approval of the purchaser of the Trace business as a suitable purchaser.

30 - World Security Report

Completion of the acquisition of Morpho Detection by Smiths Group remains conditional upon approval from the relevant authorities in the United States and certain other territories, among other

conditions. Smiths Group continues to engage with these authorities in order to secure the necessary clearances as soon as possible

www.worldsecurity-index.com


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Obexion Shutters, developed by Charter Global Ltd, now include the first ever security shutters certified to LPS 1175, Issue 7, SR5 Security shutters to SR2, SR3, SR4 and bespoke risk specific specifications also available protection without compromise

www.obexionshutters.com

0845 050 8705

Targeted Solutions to your PR & Marketing Needs

KNM MEDIA Specialising in the Aerospace, Defence and Security Markets

Tel: +44(0)208 144 5934 Email: tony.kingham@worldsecurity-index.com

www.worldsecurity-index.com

World Security Report - 31


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 50,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Border Security Report

Border Security Report is the bimonthly border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over16,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 32 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

February 2017

13 8th Annual Land Forces Simulation and Training London, UK www.landforcestraining.co.uk 15-17 European Defence Procurement Amsterdam, Netherlands www.eudefenceprocurement.com 19-23 IDEX Abu Dhabi, UAE www.idexuae.ae

To have your event listed please email details to the editor tony.kingham@worldsecurity-index.com

March 2017

7-8 Defence Logistics Eastern Europe Prague, Czech Republic www.defence-logistics.eu 14-16 HomeSec Madrid, Spain www.homesec.es 21-23 World Border Security Congress Casablanca, Morocco www.world-border-congress.com 28-31 Emergency Management for Airports Summit Singapore www.equip-global.com/emergency-management-forairports-summit-2017

April 2017

4-6 Milipol Asia Pacific Singapore www.milipolasiapacific.com 4-7 Laad Defence & Security Rio de Janeiro, Brazil www.laadexpo.com.br

33 - World Security Report

12-14 Secutech Taipei, Taiwan www.secutech.com 24-27 CBRNe Summit Europe Madrid, Spain 26-28 Adriatic Sea Defense & Aerospace Split, Croatia www.adriaticseadefense.com

May 2017

9-11 Critical Infrastructure Protection & Resilience Europe The Hague, Netherlands www.cipre-expo.com

December 2017

5-7 Critical Infrastructure Protection & Resilience Americas Orlando, Florida, USA www.ciprna-expo.com

www.worldsecurity-index.com


DEFENCELL

ENGINEERED PROTECTION

Blast Mitigation – Extensively Tested HVM protection – PAS 68 & K12

Ballistic Protection – Small Arms to RPG Ranges & Shoothouses– NRA approved

Non-metallic – No shrapnel Durable, lightweight & easily deployed

Weldmesh gabions, geotextile lined Rapid protection, standard sizes

Barriers

MAC

J&S Franklin Ltd. Franklin House, 151 Strand, London WC2R 1HL Tel: +44 (0) 20 7836 5746 Email: info@defencell.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.