World Security Report May/Jun 2017

Page 1

Official Magazine of

MAY/JUNE 2017 www.worldsecurity-index.com

FEATURE: Ransomware as an Emerging Threat to CNI PAGE 8

FEATURE: A Military Perspective on Critical Infrastructure Protection and Resilience PAGE 12

FEATURE: Terrorist attacks on airports: lessons learned from recent events (Brussels and Istanbul) PAGE 18

COVER STORY GPS disruption and Critical National Infrastructure


Who has recalibrated their moral compass? Sadly, we seem to have become almost immune from news from the Middle East of the slaughter of innocents. It seems very distant to us and somehow sickeningly normal for that poor war-torn region. But the increasing tempo of terrorist attacks against western nations over the last couple of months is perhaps a taste of what we too can expect as the new normal. Since the 22 March there have been 3 attacks in the UK, two in London, one in Manchester, one in Paris, one in Stockholm and one in Saint Petersburg. In all, upwards of 51 people have been killed and hundreds injured. The other thing that is so striking is the senseless waste and pointlessness of it all. Do the perpetrators genuinely believe that Western democracies can be bombed into abandoning their way of life when blanket bombing across Europe during World War II failed to achieve any decisive victory for either side? Will it lead to an apocalyptic religious war between the Islam and the other faiths? No, because our communities are too intertwined and the rule of law, democratic principles and the law of natural justice too embedded for that to even be a remote possibility. So why then are young Moslem men and women choosing death over life? What is so appealing to them that makes them think that slaughtering and maiming innocent men, women and children is anything other than disgusting? Who has recalibrated their moral compass so effectively that they think that their own death is good and murdering others is justified? Are these people themselves not victims? Victims of brainwashing? If we are to defeat them, we need find and tackle the source of this invidious propaganda and to directly challenge the ideas and promises that convinces them that the afterlife is better than this life. I was pleased to hear the widespread condemnation of the atrocities by the mainstream Moslem community, certainly in the aftermath of the UK attacks but I think we need to hear more.

www.ciprna-expo.com

www.world-border-congress.com

We need to hear Imam’s across Europe challenging the specifics of the false promises that these gullible individuals expect when they get to wherever they think they are going.


www.worldsecurity-index.com

We need more community policing to keep ears and eyes on the ground, to build relationships and trust in local communities and pick up on those who may not be directly involved in terrorism but are spreading the ideas that the young are falling for. We need to spend far more money and resources tackling radicalisation via the web, dark web and social media, which acts as the primary command and control system, training manual and chief propagator of this evil ideology. That means ISP’s and technology companies must play their part, and we may need tougher laws to ensure this happens. In fact, we need to recognise that security is the first obligation of the state and that we should be increasing security budgets across the board, not looking at security and policing as another opportunity to make savings. As ISIS territory in the Middle East is squeezed, those foreign fighters not killed there will seek to take the fight elsewhere. Home grown radicalised individuals with no ISIS fight to join in the Middle East will continue take the fight on to our streets. This is a fight of ideas and ideology so we need to prepare for the long haul and to equip ourselves with the tools to take the fight to our enemies!

Tony Kingham Editor

Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

World Security Report is a bimonthly electronic, fully accessible e-news service distributed to over 100,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counter-terrorism, international affairs, warfare and defence.

Copyright of KNM Media and Torch Marketing.

ADVERTISING SALES Paul Gloc (UK and Rest of Europe) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +33 (0) 6 1609 2153

Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700


December 5-7, 2017

Orlando, Florida www.ciprna-expo.com

Online Registration Now Open Early Bird Deadline: November 5th, 2017 Register online at www.ciprna-expo.com/onlinereg

- Chemical Sector - Commercial Facilities Sector - Communications Sector

The Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety.

- Critical Manufacturing Sector - Dams Sector - Defense Industrial Base Sector - Emergency Services Sector - Energy Sector - Financial Services Sector

Critical Infrastructure Protection and Resilience Americas brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing North America’s critical infrastructure.

- Food and Agriculture Sector

Conference Topics Announced An exciting range of topics have been announced for the conference program to include discussions: Developing Greater Resilience in CNI; PPP & Collaboration in CIP and CIIP; Emerging Threats on CNI; Cyber Security Legislation, Best Practice & Standards; Standards and Best Practice in CIP and Resilience; Cybersecurity Threats and Trends; Enhancing Preparedness and Response Capabilities; Cyber Defence Strategies for CII; Technologies to Detect and Protect; Cyber Techniques and Technologies to Detect, Prevent and Protect; Critical Infrastructure Interdependencies

- Information Technology Sector

- Government Facilities Sector - Healthcare and Public Health Sector - Nuclear Reactors, Materials, and Waste Sector - Transportation Systems Sector - Water and Wastewater Systems Sector

Join us in Orlando, Florida for the premier event for operators and government establishments tasked with the regions Critical Infrastructure Protection and Resilience.

ONLINE REGISTRATION NOW OPEN www.ciprna-expo.com for further details

For further details and conference fees visit www.ciprna-expo.com

To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Americas please contact: Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700

Paul Gloc (UK and Rest of World) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +31 (0) 6 1609 2153

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Leading the debate for securing Amercia’s critical infrastructure Owned & Organised by:

4 - World Security Report

Supporting Organisations:

Media Partners:

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

GPS disruption and Critical National Infrastructure

Evidence of growing GPS jamming threats near Airports shows the need for increased vigilance In 2013 pilots reported 11 incidents of GPS interference or malfunction through NASA’s Aviation Safety Reporting System (ASRS); in 2014 the number jumped to 24; in 2015, it was 28, and 28 incidents were also reported in 2016.

That amounts to 91 occurrences of GPS disruption in aviation in four years – each sufficiently serious to justify professional pilots reporting them to a voluntary, anonymous database. In the majority of these incidents a GPS-based navigation system either experienced a total loss of signal or – more seriously – misreported the aircraft’s position. What’s more, these reports only represent the incidents that flight crew have reported to the ASRS database, so the actual number is undoubtedly higher. Unknown causes In many of these cases there is no immediate explanation provided for

www.worldsecurity-index.com

the malfunction. Many reports simply say the signal was lost for a time and then returned – with flight crew either falling back on other navigation techniques or asking air traffic control for guidance. For example, a Cessna pilot reporting an unexplained incident in 2014 wrote:

Military exercises

“While established on the localizer for the approach to Runway 22L in Boston, the GPS signal was lost numerous times (more than 3) from 20 miles out from the runway to 5 miles out. Each time the GPS failure message remained for approximately 10-15 seconds before signal returned. The weather was VFR and navigation was not affected.”

These tests are vital to the effective operation of the US military, and are usually either testing how military equipment copes with signal jamming, or are used to train military personnel to work in hostile environments where an enemy might be jamming navigation signals. They are conducted in open-air ranges over a wide geographical area, so can have a

The remaining reports provide better insight into the source of the disruption, with around 20 of them specifically citing nearby GPS jamming exercises by the US military.

World Security Report - 5


INFRASTRUCTURE SECURITY

significant impact on private and commercial aviation in nearby airspace. Even though advance notification of the exercise is normally given, it can still cause problems, as in the following example: Early in 2016 a private jet pilot received an advisory Notice to Airmen (NOTAM), requesting him/her to avoid a wide swathe of air space in the southwestern United States during a military jamming exercise, and it triggered this response: “… The coverage area of this test effectively grounds all GPS-equipped aircraft in the Southwest flying IFR since they may experience unknown signal loss… At the time that ground based Navaids are being decommissioned and our government is promoting GPS based systems as primary navigation sources, the repeated interruption of GPS signals by our military [is] threatening the safety of our aviation system.” Judging from the reports in the database, military testing does cause widespread problems, and not only for aviation. In 2015, agricultural businesses in Idaho were knocked out of operation for several hours by a military exercise they had not been made aware of. Disruption near airports Another growing source of interference to commercial and private aviation comes from ignorant, or even malicious, use of widely available pocket-sized jamming devices. These are widely used by car thieves, road toll evaders, tracker evaders, lorry drivers bypassing commercial mileage limits as well as those wanting a short respite from the fleet operator’s vigilance – as suggested by the following advertisement from the web: “If you are sales personnel and delivery drivers, this GPS tracking jammer is a very popular item for you to take lunch or make a personal stop outside of your territory or route off the radar!” As major airports and ports (and other critical infrastructures such as finance, grid and telecoms) are often situated near to major road networks, they can be vulnerable to interference caused by these devices

This sort of jamming is typically indiscriminate and can be both moving and stationary. It may be fairly low power – something like a 500m bubble that blocks any GPS receiver or transmitter that might be used to identify location – but still be as effective as hiding in an underground car park. In any case, a car thief is unlikely to be concerned with managing power levels to minimise risk to other GPS users. The Aviation Safety Reporting System (ASRS) includes several reports of signal disruptions experienced by pilots landing at several airports that suggest an intermittent presence of a nearby jammer. For instance, one flight crew operating into Manila International Airport in the Philippines, reported “…..Complete GPS loss of signal as we crossed the coast in point to RPLL. Signal was lost for remainder of flight. Also on takeoff from RPLL we had a complete loss of GPS signal until coast out. No notice on NOTAMs viewed. No notices on RPLL ATIS.” In other words, this crew reported a total loss of the GPS signal on both their arrival and departure from this airport. Another flight crew operating into Mexico City reported GPS jamming on approach into the international airport: ”Finally, we received an approach clearance and set the lower altitude in the window. At this time we were now addressing the route discontinuity and as we were verifying that everything looked OK, we descended below the published altitude, but not before we received notice that our GPS was being jammed, first one side, and then the other.” In another report, the user almost landed at the incorrect airport due to an issue with his GPS device: “The android tablet had frozen and was showing the aircraft approx. 10 nm to NW of JVY. The PIC visually identified what he mistakenly thought was JVY and proceeded to fly Southbound towards the field. The PIC flew to LOU and the

6 - World Security Report

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

table remained intermittent. The PIC entered a pattern at LOU at approx 1500 MSL and noted the runway configuration did not appear consistent with the airport of intended landing” In the following report intermittent interference was traced to a jammer in a truck in a car park near North East Philadelphia Airport: “… they were losing GPS satellite coverage on the RNAV (GPS) RWY 33 approach within the last mile of the approach. This would happen intermittently with different aircraft, and different avionics… A Federal Communications Commission Enforcement Bureau agent located a GPS jamming unit in a truck located within one mile from the approach end of Runway 33. The truck was in a parking lot, henceforth the intermittent interference; when the truck left the area, the GPS approach was normal… The driver had no idea he was using a device that was illegal. He was using the jammer to disable a tracking device that was placed in his vehicle by a vendor, to hide his location.” Disruption near other Critical National Infrastructures At a United Nations Committee for the Peaceful use of Outer Space) (COPUOUS) sub-committee meeting in February 2017 it was revealed that there had been a complaint from a cell provider in Florida that its cell phone tower sites had been experiencing interference: Forfeiture Order affirms proposed $48,000 forfeiture against a man for using a cell phone signal jammer in his car while commuting to and from work on a Florida highway over a 16-24 month period. Also an Australian Transport Safety Board (ATSB) bulletin released in March 2016 revealed that the crash of a drone in 2015 that occurred whilst it was filming a major event at the Melbourne Cricket Ground was most likely caused by Radio Frequency interference. Luckily the drone crash landed on a road outside the stadium and there were no injuries.

www.worldsecurity-index.com

Understanding and addressing the risks The good news is that in all of these reports everyone involved was able to work around these failures and avoid serious damage. But, as our Critical National Infrastructures become reliant on GPS for obtaining precise positioning and/or timing data, the scope for disruption can be seen to be growing. Aviation is a particularly good source of reports referring to GNSS interference, not because it is affected more by, or is more vulnerable to, GNSS interference but due to the voluntary, non-attributable reporting system that is available for flight crews. This all means it is essential for manufacturers, commercial airlines, private operators, airport authorities, and other ground-based GPS-reliant businesses to gain a better understanding of the risks – whether financial or safety-related – and how to implement appropriate mitigation strategies. There are three obvious ways to improve that understanding. The first is to model test cases for GPS devices and flight management systems. The tests need to replicate the sort of real world conditions described in the ASRS reports. That would be a daunting task were it not for the availability of sophisticated test solutions designed specifically to make it easy to simulate every sort of operating environment and condition under controllable laboratory conditions. The second approach is to continuously monitor the RF signal environment around critical infrastructures such as airports or ports to understand where and when interference is occurring. There are very accurate interference detectors available (such as the Spirent GSS200D) that will automatically monitor and record results around the clock and – potentially – inform not only on what interference to expect but also provide data to help identify the source of the problem. Thirdly, there is a need to share our experience and keep each other up to date with current threats, risks and effective workarounds. A good start would be to sign up for the GNSS Vulnerabilities LinkedIn Group. Guy Buesnel PNT Security Technologist- Robust Position, Navigation and Timing Spirent Communications

World Security Report - 7


INTERNATIONAL SECURITY

EUROPOL Report on the Trafficking or Distribution of Drugs in Europe

Drug markets remain the largest criminal markets in the EU. More than one third of the criminal groups active in the EU are involved in the production, trafficking or distribution of various types of drugs. The trade in drugs generates multi-billion euro profits for the groups involved in this criminal activity. The EU retail drug market is estimated to be worth at least EUR 24 billion a year. The immense profits generated from the trade in drugs fund various other criminal activities allowing Organised Crime Groups (OCG’s) to thrive and develop their criminal enterprises at the expense of the health, prosperity and security of EU citizens. OCGs involved in drug trafficking heavily rely on corruption to facilitate their trafficking activities. They also make use of fraudulent documents such as fake import or company registration certificates to import illicit drugs among legal goods, to procure pre-precursors and purchase equipment used as

8 - World Security Report

part of production processes. Cannabis remains, by far, the most widely consumed illegal drug in the EU. Cannabis is distributed on EU markets as cannabis resin and herbal cannabis. In recent years, herbal cannabis has been increasingly popular with consumers, which has led to an increase in the production and availability of herbal cannabis within the EU and in countries close to EU markets. Growing equipment, seeds and other raw materials used for cannabis cultivation in the EU are readily available online and often originate from the Netherlands. The indoor cultivation of herbal cannabis in the EU is expected to further expand over the coming years

www.worldsecurity-index.com


INTERNNATIONAL SECURITY

with new growing techniques and increasingly sophisticated growing technologies being used by OCGs in order to increase harvest yields and profits. Outdoor cultivation of herbal cannabis remains limited compared to the indoor cultivation of cannabis. Albania remains the main source of herbal cannabis trafficked to the EU. The main source of cannabis resin consumed in the EU is Morocco from where it is trafficked to the EU primarily by sea and road transport. Cannabis resin originating from Morocco is increasingly smuggled to the EU across the Mediterranean Sea departing from Libya. Cannabis resin shipments are transported across the Mediterranean Sea to the Spanish coast using high-powered vessels where they are dropped into the sea and retrieved by OCGs on local fishing vessels or pleasure boats using GPS signalling devices. Cocaine is primarily produced in Colombia, Peru and Bolivia and trafficked to the EU via other South American countries such as Brazil, Venezuela, Argentina, the Caribbean Sea region and West Africa. Over the last two years, the production of cocaine in Colombia has intensified significantly. An increase in the production output in Colombia will likely impact on the EU in the form of intensified trafficking activity as well as greater availability of cocaine on drug markets in the Member States.

(UAE) and destinations in East Africa have emerged as hubs for cocaine couriers travelling to the EU. Cruise ships departing from the Caribbean Sea region are increasingly being used to traffic cocaine to the EU. Afghanistan remains the leading producer of heroin trafficked to the EU. The production output of opium and heroin in Afghanistan is very high and is projected to remain so for the foreseeable future. Production of heroin remains rare in the EU. However, depending on the development of the demand for heroin and potential disruptions to trafficking activities from Afghanistan further laboratories may emerge in the EU in the future. Heroin is also available on online marketplaces and is occasionally distributed across the EU in small quantities via post and parcel services. Synthetic drugs and new psychoactive substances or NPS.

The production of different types of synthetic drugs takes place in various Member States. The intended destination markets for synthetic drugs produced in the EU vary according to the substance and production location. A share of the largescale production of 3.4 -methylenedioxymethamphetamine (MDMA), amphetamine and, to a lesser extent, methamphetamine in the Netherlands and Belgium is intended for trafficking to markets outside the EU, while the production of synthetic drugs in other parts of the EU predominantly supplies domestic and neighbouring EU markets. The Netherlands and Belgium remain a globally significant production and distribution hub for MDMA and amphetamine. The OCGs involved in the production of synthetic drugs are highly flexible and have significant financial resources to constantly explore new market opportunities such

The trafficking modi operandi associated with the trade in cocaine have largely remained the same. Cocaine is typically trafficked as part of large shipments in containers or in smaller quantities by couriers. Large shipments of cocaine are trafficked in containers hidden among legal goods or as part of the rip-on/rip-off modus operandi. Brazil is a key point of departure for cocaine couriers travelling directly to the EU. The United Arab Emirates

www.worldsecurity-index.com

World Security Report - 9


INTERNATIONAL SECURITY

over the last two years. The production of synthetic drugs generates large quantities of highly toxic waste. OCGs dump this waste away from production laboratories to conceal their location. Dump sites often remain contaminated for a significant period of time and their recovery is costly. The dumping of toxic waste in public places also entails significant risks for the health and safety of citizens. In recent years, the number of dump sites discovered in the EU has been increasing. Dump sites are most frequently discovered in the Netherlands and Belgium.

as engaging in the production of other synthetic drugs including mephedrone. Production sites for methamphetamine are expected to also appear in other Member States in greater numbers in the future, especially those with existing production capabilities for amphetamine. OCGs producing synthetic drugs in the EU continue to be highly flexible and will remain so in the future. They are quick to adopt alternative precursor and pre-precursor substances in reaction to any shortages in established precursor substances. China remains a major supplier of pre-precursor substances and essential chemicals as well as hardware and glassware for synthetic drug laboratories in the EU. Some OCGs have specialised in the procurement and production of preprecursor and precursor substances supplying OCGs producing and distributing synthetic drugs in the EU. NPS continue to be produced in China and, to a lesser degree, India and trafficked to the EU in large quantities. NPS production in the EU is largely limited to packaging and re-selling of imported substances. However, some limited NPS production is thought to take place in the EU. The great quantities of MDMA and amphetamine produced by Dutch OCGs are not solely intended for distribution in the EU. The MDMA and amphetamine output from production in the Netherlands and Belgium is trafficked to destination markets around the world. Australia remains among the most significant destination markets outside the EU for synthetic drugs produced in the Netherlands and Belgium. In some cases, large shipments of synthetic drugs are trafficked to destinations outside the EU in maritime shipping containers. There has been a significant increase in the amount of MDMA trafficked from the Netherlands to the United States

10 - World Security Report

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

A Military Perspective on Critical Infrastructure Protection and Resilience

Written by Colonel Wolfgang Paulik (German Army) and Captain Marian Corbe (German Army)

The topics of resilience and protection of critical infrastructure are of vital importance for the functioning of our societies on their own, but even more so, if these topics are combined.

30 years ago, there would have been no place for this topic. During the Cold War security was a topic of a quite simple nature. The art of military strategy was solely focused on military capabilities in a bipolar world between NATO and the Warsaw Pact.

In fact, the military in democratic states contains key elements of both: It is both an element of critical infrastructure for the external security of any government, and it can only function in this purpose when the soldiers represent the values and norms of their society. Last year in July, resilience and critical infrastructure have been endorsed by the heads of NATO Member States during the Warsaw Summit, with a specific emphasis on the Baltic Region. From a security perspective, this region is defined by the lifelines of the energy supplies through the North-Stream

www.worldsecurity-index.com

Military strategy was focusing on major tank battles in the flat basin of Northern Germany and the concept of deterrence, guaranteed by Mutual Assured Nuclear Destruction. One and Two pipelines, but as well as through a perception of insecurity among the population. Critical infrastructure and resilience have always been of the same high importance for our security and societies. However, they did not receive the attention they deserved.

This approach completely ignored the impact of the civil environment and societies. It completely ignored the fact that it was not tanks against tanks but system against system. However, and despite an increased renaissance of NATO’s core task of collective defence since the two

World Security Report - 11


Advertise in the next issue of World Security Report and on www.WorldSecurity-index.com in a unique promotional package

What we are offering is a unique promotional opportunity in the security market. For one price advertisers receive:

Official Magazine

of

EmBER 2016 NOVEmBER/dEC ity-index.com www.worldsecur

FEaTuRE: Energy Security and Conflicts: Protecting our Critical Energy Oil and Infrastructures with Specific Gas Infrastructure approach PAGE 12

FEaTuRE: ture Critical Infrastruc Interdependencies assessment PAGE 8

FEaTuRE: ation Today’s authentic ire Going Challenges Requ mFa Beyond 2Fa and

• An advertisement in World Security Report reaching over 100,000 subscribers worldwide via our digital magazine, which includes the VIP’s, delegates and speakers from every conference we have organised over the last 5 years including World Border Security Congress, Critical Infrastructure Protection and Resilience Europe and Critical Infrastructure Protection and Resilience Asia. • A company profile on www.WorldSecurity-Index.com for 2 months, which averages over 5 million page downloads per year. During that 2 months they can share news and job vacancies all linked directly to their profile. For an example see S2 Global. • A banner advertisement on www.WorldSecurity-Index.com for 2 months. • Be the only media published on the closed International Association of Critical Infrastructure Protection Professionals (IACIPP) global extranet. • Discount on exhibiting at any of our own specialist events: Critical Infrastructure Protection and Resilience North America, World Border Security Congress, Critical Infrastructure Protection and Resilience Europe and Critical Infrastructure Protection and Resilience Asia. • Include your news via our social media network. Official Magazine of

PAGE14

Official

maRCh/aPRil 2017 www.worldsecurity-index.com

fEaTURE: Brazil’s prison system at breaking point PAGE 4

fEaTURE: The Threat from above PAGE 10

Magazin e of

Bonus Distribution

fEaTURE: Cyber Security in the Critical National infrastructure PAGE 14

FEATUR E: Training need no tied dow keep you n PAGE 8

SEPTEM BER/OC www.wor TOBER 201 ldsecuri ty-index. 6 com

FEATUR E:

High-te ch securit trialled for the y screening firs Shanno n Airport t time at PAGE 12

FEATUR E: Albuqu erq Departm ue Police ent (AP first aut D) laun ch omated cloud ABIS in the the PAGE14

Y COVER STORY COVER STOR UN RESOlUTiON highlighTS iNTERPOl’S

17iN:PROTECTiNg CRiTiCal 20ROlE HOTSPOTS IN IS iNfRaSTRUCTURE fROm E TERRORiSTS m aNd TH

RROR dISRuPTION, TE E RESPONSE aT OR RP CO

D IG ITAL MAGAZINE

Circulated to over 100,000 industry experts

CO HOLDIN VER STORY G BACK THE TID E

E-NEWS

Distributed monthly to over 100,000 industry experts

ONLINE

S O C I A L ME D I A

www.worldsecurity-index.com Over 30,000 unique visitors/month

Unique members across focussed LinkedIn groups

For details contact your local agent: Paul Gloc (UK and Rest of Europe) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +33 (0) 6 1609 2153

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700


INFRASTRUCTURE SECURITY

campaign planners. In fact, this change of thinking was a result of the stability operations in the Balkans since the early 1990s. The Balkan Wars provided new challenges to military planning during the ensuing stabilizationoperations on the tactical, operational and strategic levels. These challenges highlighted the lack of a civil-military understanding for mutual interaction during such kind of operations on both the military and the civilian side. recent NATO summits, to expect a scenario similar to the Cold War is simply not realistic. Too much has changed in the overall strategic picture, which has become much more diverse and complex since. What are the new challenges? The threat perception has changed from a symmetric scenario to multiple sources of insecurity. Often labelled as hybrid threats, these include, terrorism, espionage, cyberattacks, fake news, disinformation, and propaganda among others. We need to be aware that several of these threats are carried out already. Therefore, instead of preparing our defence against a conventional armed attack, it is necessary to prepare for and defend ourselves against hybrid threats. From our Western perspective, the very nature of hybrid threats, being in a grey zone between war and peace, makes it difficult to develop effective counter measures. The common factor among these threats is that they are not necessarily of a military nature and not primarily aimed at military targets. They constitute a threat against our soft under belly: the integrity of our societies, our social resilience. Recent events, such as the destabilization of Ukraine, the referendum on the Crimean Peninsula, large military exercises at the borders of the Baltic States, the ongoing violation of air space, or the 2007 Cyber-attack on Estonia, are examples for this sophisticated

www.worldsecurity-index.com

and fragmented use of covert military, propaganda, separatist, and cyber activities. In the case of Ukraine, these activities have succeeded in destabilizing a functioning state and society. Moreover, this has been achieved without crossing the red-line of an armed attack as defined in Article 51 of the Charta of the United Nations. This approach limited the traditional possibilities for a response within the international legal framework. In general, a military response is difficult when hybrid activities are carried out by non-state actors, or covert groups, without clear attribution to a specific aggressor. While this draws an uncomforting and daunting picture on security and defence, there is also a positive side to the change in the perception of conflict. During the Cold War, the battlespace had been defined as an area exclusive to the presence of the opposing Armed Forces. Large urban areas, such as the City of Hamburg, would have been marked as a ‘free zone’, not to be touched by the conflict parties. However, such a clinical distinction between combatants and the civil population has never been realistic in war. There was always a civil theatre and a civil dimension to any conflict. But it has taken a long time until this civil dimension had been fully acknowledged by political and military decision makers and

Thus, one of the lessons learned for NATO was the idea of a Comprehensive Approach. And consequently CIMIC – Civil-Military Cooperation – was created as an enabler, with commonly agreed doctrines, embedded within military structures and equipped with professionally trained personnel. During the following 15 years, CIMIC became integral part of all stabilization operations, accepted as trusted agent and interface to the military by a growing number of non-military organizations. The most prominent example for this has been the International Security Assistance Force (ISAF) and the still ongoing operations in Afghanistan. In this context, the Centre of Excellence on Civil-Military Cooperation (CCOE) was founded and accredited in 2007. It serves as the multinational sponsored competence center, which supports the development of Civil-Military Cooperation. Our main areas of expertise are collecting Lessons Learned, education & training, concept development and acting as the custodian of the NATO CIMIC doctrine. In this capacity, our main customers are our Sponsoring Nations and NATO, but we also collaborate with the United Nations, the European Union, nongovernmental organizations and academia. Current situation and critique Our current focus lies on the interpretation and implementation of the political guidance received

World Security Report - 13


INFRASTRUCTURE SECURITY

from the NATO summits in Wales and Warsaw in 2014 and 2016, to find answers to the current security challenges like hybrid threats and resilience. NATO Secretary General Stoltenberg prominently described hybrid warfare as “the dark reflection” of NATO’s Comprehensive Approach. While hybrid warfare employs the combination of political, civilian, and military instruments to threaten a society, the Comprehensive Approach calls for the use of the same tools to stabilize targeted countries and societies by strengthening the resilience of NATO members, allies and partners, combining civilian and military capabilities. Therefore, civil-military cooperation takes an important role in that scenario as main facilitator between civil and military actors within a Comprehensive Approach. However, the CCOE is witnessing a variety of challenges in structure and attitude amongst our own militaries and governmental agencies, which often appears to be an uphill battle against own forces for these two reasons: First, adversaries have the structural advantage that they may employ aggressive means, which are either not appropriate from our cultural and normative standpoint, or simply illegal. Examples for these means are propaganda, the use of alternative facts, or fake news, misuse of international law, or offensive cyber capabilities. While it is important to keep our moral high ground in condemning the use of these tools, they nevertheless provide any adversary with the advantage to act to achieve their desired outcome. Therefore, it is even more important to work towards a common mindset to establish a Comprehensive Approach in order to formulate an effective counter action. Second, nations seem to often hold on to an antiquated separation of

14 - World Security Report

available means and competences. Instead of working together, the different ministries remain in competition, leading to a stovepiped struggle for resources and appraisal. While this problem is mainly reflected in national structures, it is nevertheless even harder to align several stove-piped national systems towards a common goal. Therefore, if we continue to fight the wars of tomorrow with the means of yesterday, we will not be able to answer to hybrid threats with a Comprehensive Approach, which follows a balanced investment of resources, tailored to the perceived level of threat. On the basis of one single set of doctrines, even NATO member countries are applying their very individual interpretations of CIMIC. • They often blind out the broad portfolio of core competences and just focus in their area on (quick impact) projects, which never had a sustainable positive impact in winning the hearts and minds of any population in any operation. They very often just serve the good feeling of politicians or commanding officers or support their portrait in the media. • They pay little attention to the socio-cultural aspects of the mission area in the military planning process. Thus, deployed CIMIC forces are confronted with the tedious liaison work with local actors, which often has to focus

on the mitigation of negative incidents, caused by other deployed forces which could have been avoided in the first place by better intercultural competence. • With their limited experience of the last 15 years, they connect CIMIC solely with stabilisationoperations and have no perception about the value of CIMIC with regard to collective defence and hybrid warfare. • They abandon CIMIC as a joint function and merge CIMIC capabilities with others like Intelligence, or Psychological Operations. These units lose their reputation as the trusted agent to the non-military environment and therefore their value for the military leader. • As resources determine priorities in reality, drastic budget cuts and shrinking numbers of CIMIC units with professional personnel, seem to support the stated impression, that the drivers of hybrid warfare do have a better understanding of this dark side the comprehensive approach, than the white side. Food for thought Hybrid threats do actually provide opportunities for a cross functional approach between civil and military actors and between the different military capabilities. The first challenge here will be to raise the awareness amongst all actors on the relevance of CIMIC in all operations beyond just stabilization.

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

We have to find answers for the question which can be the role and the mandate of the military in the protection of critical infrastructure and increasing resilience in our domestic societies? If military personnel are deployed on the territory of a sovereign NATO member nation, with a functioning civil infrastructure and government services, a different set of coordination is required than for a stability operation in Afghanistan, Mali, or Kosovo. Allied Forces here need to interact and liaise differently with the host nation military, or government entities. CIMIC can here support the civil environment by facilitating consultations and integration of Allied Forces into the host nation society. CIMIC personnel further assumes competencies which can deliver support to counter hybrid threats. This is a valuable asset, which not all the nations owning CIMIC capabilities, are actually aware of. CIMIC experts are assuming competence to assess secondary effects on the civil environment. How would the local populace react to an electricity blackout? Which support would they need? Would there be movement of population, or of refugees, requiring humanitarian aid and attention of government agencies? Such questions need immediate attention and assessments which can be delivered by CIMIC personnel. CIMIC personnel can further facilitate the proper interaction among the providers of humanitarian aid, government agencies and second responders, such as the European Union or the United Nations. This is a so-called ‘Comprehensive Approach’. To achieve this, NATO and nations need to better evaluate the conceptualization and skillset of their CIMIC personnel. Being used effectively, CIMIC capabilities can support a Comprehensive Approach, which is effective in countering hybrid threats. A Comprehensive Approach, as the consequent answer to hybrid threats, should lead to a concerted use of the capabilities which facilitate synergies between the different military capabilities and their counterparts in other governmental agencies, as well as the private sector.

Besides Civil-Military Cooperation, these comprise of Strategic Communications, Cooperative Cyber Defence, Crisis Management, Disaster Response, and Energy Security. All of these capabilities have a civiland a military dimension. On the military side, competencies are formalized in NATO and national doctrine, from the policy level down to the application by practitioners, through manuals and operating standards. For civil-military cooperation, this development consists of an adaptive process of lessons learned from the stability operations in the Balkans and Afghanistan. Therefore, it is not to re-invent new doctrine for every emerging challenge, but to put greater emphasis on applying existing doctrine more consistently. On the civilian side, operating procedures and a culture of open communication often differ. As the military is a large bureaucratic structure, it is important for us to identify the proper civilian counterparts to work with. Although many of our procedures involve classified content, CIMIC does not follow the rule “need to know” but rather “dare to share”. It is therefore important to foster a constant dialogue and to enhance the mutual working relations. Properly put together, the understanding of a comprehensive approach in NATO should see a re-birth, leading to efficient working relations between military and civilian parts. This must apply specifically to governmental organizations, international organizations, nongovernmental organizations, the civil population, and the private sector. Within our capabilities, the Civil-Military Cooperation Centre of Excellence is willing and able to take a central role in facilitating effectively between these different stakeholders.

www.worldsecurity-index.com

World Security Report - 15


INFRASTRUCTURE SECURITY

Outlook

EU, but contains also a cross-check with the doctrines of other civil and military capabilities.

The Civil-Military Cooperation Centre of Excellence is in a unique position to execute the old Nokia slogan: Connecting people.

We do further contribute with policy papers and academic analysis to current security challenges. For example, we will publish a book on Civil-Military responses to hybrid threats later this year.

We provide contacts to other military entities within the NATO nations and the NATO Command Structure, and provide a guide through military processes.

Consequently, the role of CIMIC as an integral part of any type of operation needs to be stressed during mission preparation, operational planning and execution. This requires to initially define the requirements of the different types of operations for the development of doctrines. Secondly, it demands relevant training and education for individuals. And on the unit level this requires specialist training for CIMIC professionals, as well as generic training on the awareness for the civil dimension for all military personnel.

We can provide you with training on the military perspective of the civil environment, as well as on our ways to conduct assessment and operational planning, to increase the mutual understanding of operating procedures.

Setting the proper levels of ambition on these needs constitutes the only way to provide mission relevant advice and support for the commanders.

It is always better to understand how your future partners do think and act, before you meet them in a crisis scenario in a Headquarters of in the field.

The Civil Military Cooperation Centre of Excellence encompasses all of these aspects by progressively combining lessons learned, doctrine development, education, training and testing of new concepts.

We are the custodian for NATO doctrine on civil-military cooperation. This also includes the synchronization with the doctrines of other organizations, such as the UN and

To achieve this and to raise awareness on the importance of CIMIC, the CCOE will be both persistent and courageous to provide answers without questions, and to render advice without being asked.

The Homeland Defense and Security Database

WorldSecurity-Index.com is the only global homeland security directory published in English, Arabic and Spanish on the web and in CD network format. 16 - World Security Report The Global Security

Portal

Advertise on WorldSecurity-Index.com from only ÂŁ515 for 12 months

Contact info@worldsecurity-index.com for details www.worldsecurity-index.com or call +44 (0) 208 144 5934.


BORDER SECURITY

REPORT

VOLUME 6 MAY/JUNE 2017

For the world’s border protection, management and security industry policy-makers and practitioners

COVER STORY Smarter Borders in Spain

S P E C IAL R EPO R T AGENCY NEWS S H O RT RE P O RT I N D U S T RY N E W S

Addressing Threats and Challenges of Border Security in Ukraine p.9

A global review of the latest news and challenges from border agencies and agencies at the border. p.22

Progress on ICAO compliance p.17

Latest news, views and innovations from the industry. p.29


2

COMMENT

‘Do these times not justify special measures’ As military pressure on Islamic State (ISIS) in the Iraq and Syria continues to squeeze their so-called caliphate, the number of Jihadists returning from the war zones of the Middle East is only set to rise and Western nations are not prepared. Like the UK many countries, nearly 10 years on from the global crisis, are spending less in real terms on border security, policing and the security services than they were, not more. It has been widely reported that the UK currently has about 400 people who are believed to have returned from Syria to the UK after fighting with ISIS. All over Europe the situation is much the same. It would be inconceivable to our parent’s generation that lived through WWII, that soldiers fighting for the Nazi’s with the Division Nordland, Freiwilligen Legion Niederlande, Französisch Freiwilligen-Sturmbrigade or the British Free Corps could wander back home whilst the war was still going on and simply melt back into society. No, at the very least they would have been interned, faced charges of treason or even summary justice. So why do we allow those whose stated aim is to destroy our way of life by killing innocents walk our streets protected by the liberal democratic laws they so despise instead of facing internment and mandatory deradicalization. One reason is that it is that the burden of proof lies with the state, and under the normal standards of law, proving what these people having been doing whilst they have been out of the country is difficult. Many may also have gone to great lengths to hide their involvement with ISIS. But do the times not justify special measures? Perhaps the onus should be put on the traveller or suspect individual to prove their whereabouts over the period in question and not for the authorities to prove they have been involved with ISIS. After all, it’s not difficult to track legitimate traveller’s movements these days with credit and debit card transactions, plane and train tickets, geolocation on mobile phones and credible witnesses. In fact, you would have to go to extreme efforts to avoid leaving some trace, which is the point.

resources at border control, and that applies to technology, systems, manpower and co-operation. Time and again at our conference World Border Security Congress, the issue of information sharing of watch lists and databases is raised. Much important information and intelligence is sitting on legacy databases which can’t even be shared with national partners, let alone international partners. Is it not time for an existing intergovernmental body such as Interpol to act as a trusted third party or perhaps a new border specific body be formed. After all the World Customs Organisation has been in existence since 1947 and whilst its remit is more to do with revenue than security it could be the basis, model or even host for a new border security organisation. Whatever form or structure the organisation takes it would have to be fully funded to develop an open architecture web based system for the sharing of information and watch lists across platforms and across borders. Trust would be the next issue but that’s not something you can impose, that’s something that would have to be developed over time. But the sooner we start, the sooner we get there. The current global security situation means that there is no doubt that more resources must be spent on security and border control. New technology should not be used as a way of reducing staff at border control. There is no substitute for trained staff asking probing question, using their powers of observation, training and intuition to spot those individuals that justify further investigation and if necessary to be held in detention until they are either cleared or face charges for supporting terrorism. Tony Kingham Editor

Another big issue is picking them up as they try to re-enter their country of origin. And this problem is largely a question of

Border Security Report | January/February 2017


CONTENTS

3

CONTENTS 4 Smarter border in Spain Delivering Effective Border Security Through a Strategic Integration Project.

9 Addressing Threats and Challenges of Border Security in Ukraine Every country defines itself the tasks on facilitation of the national borders.

13 AFRIPOL First General Assembly

»»p.4

The First General Assembly of the African Union Mechanism for Police Cooperation (AFRIPOL) was held in Algiers, Algeria

14 AGENCY REPORTS Latest news and reports reports from key agencies INTERPOL, OSCE and EUROPOL.

17 progress on ICAO compliance Continued progress on ICAO compliance crucial to unlocking socio-economic development in Africa. »»p.18

»»p.13

18 Brexit, BORDERS and Cyber Security Brexit is a multifaceted issue which will continue to dominate the news headlines for years to come.

22 AGENCY NEWS A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border.

26 World Border Security Congress Review of the gathering of the international border security community in Morocco, 21st-23rd March. »»p.29

29 industry news Latest news, views and innovations from the industry.

Border Security Report | January/February 2017


SPECIAL REPORT

4

Smarter Borders in Spain: Deli vering Effective Border Security Through a Strategic Integration Project

Dr. Enrique Belda Esplugues, Deputy Director General of Communications and Information Systems for Security Spanish Ministry of Interior.

Security is one of the top priorities for the European Union citizens. The main risks and threats to security facing Europe today, such as terrorism, cross-border organized crime, drug trafficking, cybercrime and trafficking in human beings are rapidly adapting to scientific and technological developments. Therefore, a “global security”

Border Security Report | January/February 2017


SPECIAL REPORT

5

Communications and Information Systems for Security mission is the procurement of communication and information systems for the Spanish Security Forces.

approach is required, capable of adapting both to the needs of citizens and to the challenges of the dynamic and global 21st century. In this sense, the Deputy Directorate General of Communications and Information Systems for Security of the Spanish Ministry of Interior plays a fundamental role in reaching these objectives, being one of its strategic lines of work and the impetus for the creation of the Security Technology Center (CETSE). The CETSE based in Madrid, was inaugurated in April 2016 and is a concept led by the Deputy Directorate General of Communications and Information Systems for Security (SGSICS). The CETSE also houses the National Center For Critical Infrastructure Protection (CNPIC), as an end user of the CETSE systems and technology, along with other diverse staff of the Ministry of the Interior. Our position within the Spanish Ministry of Interior gives us a global vison, which allow us from the beginning to integrate: plans, projects, programs, advising, control, coordination, standardization and harmonisation, promotion, research-development and innovation, assessment, and international relationships in the technological security field.

sophistication and sensibility has led to the establishment of a New Technological Architecture in this field, the CETSE Concept. We are working for the main Security Forces in Spain: Policia Nacional, Guardia Civil, Mossos d’Esquadra, Ertzaintza and Policia Foral de Navarra. We are also working for other end users like: Spanish Army and Navy, Security of Royal House, Security of the President of Government, Intelligence Centre against Terrorism and Organized Crime, National Centre for Critical Infrastructure Protection, Europol, euLISA… Therefore, we offer the European Union our experience in this “Engineering Reduced Model” to help find a global solution which allows us to build a real European Technological Architecture in the field of Security, a sustainable solution in terms of economics and evolution. The Deputy Directorate General of

The primary purpose of these systems is to enable the Spanish Security Corps to exercise its role in safeguarding the rights, freedoms and security of citizens more efficiently and effectively. The project areas we work in are Communication systems (such as the Spanish Emergency Digital Radiocommunication System), Schengen and Smart Borders, Security Databases, Lawful Interception and Data Retention, Operation Coordination Systems and other projects for the Ministry of Interior And as a part of their functions, the DEPUTY DIRECTORATE GENERAL has developed the Smarter Borders project in Spain. Our smarter borders project aims at managing the Spanish border through a comprehensive vision, in which we have Border Crossing Points (BCPs) at airports, seaports and land borders. At these control points, we can have both automatic control systems (ABC Systems) and manual control systems, and different physical equipment such as passport readers, fingerprint readers, ID card readers, etc.

The current complexity of the Information and Communication Systems – in terms of budget,

Border Security Report | January/February 2017


6

SPECIAL REPORT

In addition, we have a set of current or future information systems and external databases such as SIS (Schengen Information System), VIS (Visa Information System), APIS (Advanced Passenger Information System), EES (Entry/Exit System), etc. All resulting data is collected at the different Police Border Control Centres where the information is visualized and analysed, giving support to decision making. System Requirements and elements include: The ABC (Automated Border Control) System, which aims to ease the crossing of the outer border of the Schengen area for European citizens, over 18 years old who carry an electronic passport or Spanish electronic ID without prior enrolment.

possible in an automated way. Use of biometrics systems have been employed in a number of different ways. Mantrap configuration where the identification module is located inside a mantrap. Two-Steps configuration, in which the identification is made first and then the traveller goes to an exit door, holding the fingerprint as a token and mixed configuration, where the identification module is integrated in the access module. For Automated Verification so far, two types of access module have been installed, the main components of which are cameras, electronic mirrors, touch screen, smart card readers and passport verifiers. In the first instance, the physical validation and verification of the document is carried out.

There are three key components of the ABC system which are the Identification Modules, in which the traveller performs, in an unattended way, the process of document validation and identification through facial and finger biometry. The Access Modules, that automatically allow the border crossing if the previous process was successful. And System Control Posts, from where to monitor the system and attend to those cases in which the border crossing was not

Border Security Report | January/February 2017

This consists of reading the MachineReadable Zone (MRZ) and the Visual Inspection Zone (VIZ) of the passport in visible light, Ultra Violet (U/V) and Infra-Red (IR) and then, the security elements are compared through a passport security pattern database. Second, the verification of the chip is performed. Once the algorithms for secure access and authentication of the passport chip have been executed, the system must verify the data read from the chip and verify its authenticity by executing all parts of Passive Authentication following the ICA09303 standard, as well as some additional controls available in 2nd generation passports. Third, facial biometric verification is performed [3D face recognition] The system extracts the electronic pattern image stored in the document and compares it with the photograph taken live to the traveller and with the one captured from the biographical page of the document. Finally, the biometric fingerprint verification is carried out [alive fingerprint recognition] The system captures the traveller’s fingerprint and compares it with the pattern stored in the document. Then, the system’s Business logic


SPECIAL REPORT

7

decides if the traveller can cross the border, depending on the result of the previous verifications. The following checks are also carried out in police databases. Verification of traveller’s personal data against police databases in search of hits and verification of the document number in the stolen and lost documents databases. With the Spanish electronic ID, the process is analogous. The main difference is that for finger verification a Match-on-Card algorithm is used. The ABC in Spain began in 2010 with a pilot project in the airports of Madrid and Barcelona, with a total of 24 Identification Modules installed. In 2014 the Malaga airport is incorporated. And in June of 2015, the airports of Madrid and Barcelona are extended and the ones of Girona, Alicante, Palma de Mallorca, Tenerife, the port of Algeciras and the police control of La Linea de the Concepción were added, with a total of 127 Identification Modules at a national level. Regarding the manual controls, the Spanish smarter borders project

includes two different configurations. Stand-alone police control posts, in which there are different devices available for biometric control such as fingerprint reader, document verifier and smartcard reader. And Police Control Posts associated to ABC Systems, that have the same elements, together with the ABC management and control equipment.

seaports and land borders”.

In this sense, and as part of the global Smart Border project, we have developed and implemented a set of Border Control Centres that “Provide the National Border Police with a technological infrastructure to display, monitor and manage the border control activity at the airports,

In addition, the European border Countries would need to think about the possibility of establishing a similar solution on the other side of the European external border, with third Countries, following the European Neighbourhood Policy.

In summary, there is a set of means and systems, both manual and automatic, whose information can be merged and analysed (always in a respectful way with the individual rights and the data privacy and protection), to allow intelligent border management from police control centres.

Yuma Sector’s Border Safety Initiative Event Continues Educating U.S., Mexico Media Yuma and El Centro Border Patrol sectors held their annual Border Safety Initiative (BSI) event on June 1 to educate reporters on the dangers immigrants face when attempting to enter the United States illegally. Since 1998, when the BSI initiative was created, the Border Patrol invites media to see how the Border Patrol trains and uses multiple resources to rescue illegal immigrants who fall victim to Yuma’s harsh desert. This year’s event was also attended by individuals from Mexico’s Centro de Comunicaciones, Computo, Control Y Comando (C4). In translation…Center for Communications, Calculations, Control and Command. The event kicked off with a call for help through

Yuma Sector’s dispatch concerning an individual in distress. BORSTAR then deployed with a canine team, ATVs and UTVs. Even C4 members and reporters pitched in to help BORSTAR track down the caller. It was ‘only’ 90 degrees when the event kicked off but everyone was reminded that temperatures can climb as high as 125, and averages 110 during the summer.

Border Security Report | January/February 2017


8

SHORT REPORT

€9.2 million in EU funds for police modernisation, border security projects €9.2 million in EU funds are being spent on modernising the Malta Police Force and on border surveillance, Home Affairs Minister Carmelo Abela and PS for EU Funds Ian Borg announced.

the ICT section. This includes the strengthening of the Police force’s National Schengen Unit. The project complements the existing border system in use at the airport and the seaport.

Mr Abela said five projects on border security, which is a priority, have been completed so far.

The new equipment will allow fingerprints to be compared with the European Visa System. These include the purchase of bulletproof vests, riot kits and surveillance The fifth project saw the introduction equipment; access to the Europol and of the Advance Passenger Information Interpol databases; the Smart Policing System. project, which will see the Cyber Crime unit strengthened, the purchase The system is capable of gathering of new forensic equipment; and the early information from airlines and strengthening of the automated case passenger ships. It also compares management system.

These included the acquisition of radios and biometric devices for border guards and modern equipment that can analyse a person’s unique physical characteristics, like fingerprints. Two other projects are related to

cross references this information with international lists, seeking out people using fake documents. Mr Abela said the Malta Police Force is also benefitting from othe projects falling under the EU Internal Security Fund 2014-2020.

AMERIPOL Offensive Against Micro-Traffic Surrounding Educational Institutions The Metropolitan Police of the Valley of Aburrá, in coordination with the Attorney General of Colombia, through research and intelligence activities and through operatives developed in several parts of the metropolitan area, caught 15 people dedicated to the storage, dosage and sale of narcotic substances. The official actions were carried out in the Tuscan and Trinidad neighborhoods of the city of Medellín and El Trianón and San José neighborhoods in the municipality of Envigado, where units attached to the SIJIN Criminal Investigation Section in conjunction with the SIPOL Police Intelligence Branch and the Prosecutor’s Office General of Colombia, by executing seven search warrants, captured 15 people, including two women, and seized the following items:

received these blows were “Barrio Antioquia”, “la paralela” and “trianón” dedicated among other crimes, to the storage, dosage and sale of hallucinogenic substances, in small amounts (doses), in the Educational institutions near their places of interference. It is highlighted that among those captured is a man who has been a fugitive from justice since January of this year and who currently possesses a warrant for the crime of trafficking, manufacturing or possession of narcotic drugs. Those captured were left at the disposal of the competent authority for the crimes of trafficking in the manufacture or possession of narcotic drugs.

• 35 Grams of bazuco. • 19,571 grams of marijuana. • 16 Popper units. • A 32-gauge Revolver with six cartridges for it. • 21 Caliber 38 cartridges. • $ 7,522,000 in cash. It is noteworthy that organized criminal gangs that

Border Security Report | January/February 2017


SPECIAL REPORT

9

Addressing Threats and Challenges of Border Security in Ukraine

by Lieutenant-Colonel Olga Derkach Ph.D., Senior Officer, International cooperation and Eurointegration Department at the Administration of the State Border Guard Service of Ukraine

Today border security becomes a significant challenge on a global scale because of constant growth of emerging border security threats all over the world. It is obvious that every country defines itself the tasks on facilitation of the national borders, taking into account the threats to their national interests.

military-political situation ensuring the territorial integrity of Ukraine, non-violation of its state borders and renewal of peace, as well as guarantying sovereignty and independence are the main tasks of the country’s state policy in order to provide for national security and protection of its borders.

Ukraine is not an exception in this regard – under the current

The State Border Guard Service of Ukraine (SBGSU) is a

Border Security Report | January/February 2017


10

SPECIAL REPORT

All above mentioned forced the SBGSU to change its approaches to the provision of effective border security drastically. In terms of the Russian aggression, the State Border Guard Service of Ukraine continues to conduct comprehensive reforms as a law enforcement agency, not only for PROTECTION, but also for DEFENSE of the state border. As a result, the Service got several new additional and specific tasks:

law-enforcement agency with a special assignment and is one of the main institutions of the security and defence sector of Ukraine, responsible for the national security focussed on ensuring state border protection and border security. ITS MAIN TASKS ARE: - Protection of the land and marine borders; - Provision of the security of sovereign rights of Ukraine within its exclusive marine time economic zone; - Control of admission of persons, vehicles and cargos via the state borders; - Participation in combating organized crime, counteracting illegal migration and fighting terrorism;

the State Border Guard Service of Ukraine had been developing as a border agency of the European model with law-enforcement functions. However, three years ago the VECTORS OF THREATS in the sphere of the national security of Ukraine changed dramatically: • Aggression of the Russian Federation caused temporary occupation of the Crimea, and deployment of real military actions in the East of Ukraine, which provoked great changes to the border security of Ukraine. • This coincided in time with the migration crisis in the EU and a dramatically increasing terrorist threat on the continent.

- Coordination of activities of the military formations, law-enforcement and other bodies while fulfilling their tasks along the state border. What should be taken into consideration is that before 2014

Border Security Report | January/February 2017

- within zone of conducting Antiterrorist operation (along the contact line with the separated areas of the Donetsk and Luhansk regions of Ukraine); - along the administrative line with the temporary occupied Autonomous Republic of Crimea; - readiness for the renewal of control over the temporary uncontrolled sectors of the Ukrainian border (with the help of the OSCE Special Monitoring Mission to Ukraine); - reinforcement of land borders with the Russian Federation and the marine coast. Describing the new emerging threats and challenges to border security of Ukraine it is important to pay ATTENTION AT: 1) The AGGRESSIVE RUSSIAN


SPECIAL REPORT

11

transferring migrants and cigarettes via the state border, were detained by the Ukrainian border agency.

POLICY AGAINST UKRAINE, which is the MAIN DESTABILIZING FACTOR that influences much the strategy of the SBGSU and must be taken into account by Ukrainian partners. For the last two years the Russian Federation: - militarized the temporarily occupied Autonomous Republic of Crimea and changed it into a powerful military base; - increased its military presence in the BLACK SEA basin dramatically; - continues to support militants in Donbas (in the east of Ukraine) in spite of the international attempts to normalize the situation. We monitor the regular shelling at Ukrainian positions, including shootings in the direction of control points of entry-exit along the contact line, where peaceful civilians live. In addition, we monitor the demonstrative concentration of Russian troops NEAR Ukrainian BORDERS.

• concerning ILLEGAL MIGRATION – in 2016 over 2,5 thousands of illegal migrants were detained and 3,3 thousands of potential migrants were not allowed to enter Ukraine. Due to the efforts of our Turkish, Bulgarian and Rumanian colleagues, the channels of ILLEGAL MIGRATION were not redirected via Ukraine. There are no mass flows of illegal migrants from Russia, as well as refugees from Syria. The potential risks exist, but the situation remains under control. • concerning SMUGGLING ACTIVITY - the most characteristic feature is illegal transfer of goods – smuggling of cigarettes, luxury cars, perfumes, meat, cultural values and other. Alongside with smuggling of goods, there also exists a threat of trafficking in human beings. The State Border Guard Service has more and more cases of detention of a small aviation aircrafts, which are used with criminal purpose. Alone in 2016 22 small airplanes, which were

The bright result of the cooperation with Moldovan colleagues was the performance of a special operation on detention of an international criminal group and the returning of 17 paintings of Renaissance epoch to Italy, which were stolen from Verona museum. The total value of those paintings is about 16 Mio.euro. • The tendency of usage of the marine channel for DRUGS TRAFFICKING still remains. In parallel there are also cases of drugs trafficking, carried by land transport. In 2016, the State Border Guard Service of Ukraine confiscated 175 kilos of drugs and precursors. In addition, the border security checks in marine ports were significantly enhanced. According to our information our colleagues from Poland, Holland, Germany and other countries liquidated several transborder channels of drug trafficking, confiscated more than 325 kg of drugs and detained drugs couriers in Brazil, Turkey and Armenia. • Countering illicit cross border trafficking in weapons, ammunition and explosives is still actual. The Commandment of the SBGSU is convinced that only COMMON SECURITY ENVIRONMENT can

2) Alongside with the Russian aggression such TRADITIONAL THREATS as illegal migration, smuggling of goods, illicit trafficking of weapons, drugs trafficking etc. continue to influence on the situation of the state border of Ukraine

Border Security Report | January/February 2017


12

SPECIAL REPORT

ensure an adequate counteraction to MODERN CHALLENGES to border security of Ukraine. The SBGSU, being the main subject of the realization of the Integrated Border Management in Ukraine, considers the international (regional) cooperation to be one of the most effective and efficient means to address modern threats and challenges to its border security trough: - Implementation and concluding of international agreements governing the security of the state border; - realization of programs and plans on measures to ensure international cooperation; implementation of joint projects in the sphere of border security and organization of joint operative security measures on the common border; - Monitoring and addressing the status of cross border and transnational organized crimes; - Improving the cooperation with neighbouring- and EU countries that do not have a common border with Ukraine; - Increasing the cooperation with the Organization for Security and Cooperation in Europe (OSCE); - Improving the cooperation with FRONTEX, INTERPOL and EUROPOL; - Intensifying cooperation with partner countries under the umbrella of NATO; - Ensuring and enhancing cooperation with the states of the Black Sea region; - Further developing the cooperation with the European Union Advisory Mission on civil security sector reform for Ukraine (EUAM) and the Mission of the European Commission’s assistance on border issues to Ukraine and Moldova (EUBAM), - And others.

Taking into consideration all above mentioned, Ukraine in the face of the SBGSU has very ambitions plans to tackle the current and potential border related threats and challenges. That’s why it has defined the following priorities for the 2017, which are successfully executed, but at the same time require international support: 1) Integrated border management development in the view of the best international practice by means of: - enhancing protection of the eastern border and increasing the level of efficiency at the border with EU; - integration of EU standards into the border checks procedures; - (joint control, biometric checks, INTERPOL databases); - IT-technologies implementation and info-system modernization, database integration; - risk assessment and management system improvement, development of situational centres and contact points; TWINNING-initiatives implementation. 2) Increase of combat effectiveness level and readiness to perform tasks on border protection through: - increasing of defence capacities at the border with the Russian Federation; - creation of a technologicalintellectual system of border protection (“Intellectual border”); - creation of “DOZOR” mobile units system, their re-equipment and related training; - development of an Aviation and Maritime Guard, Ukraine sovereign rights protection enhancement in the exclusive economic zone; - maritime surveillance system modernization.

Border Security Report | January/February 2017

3) Ensuring readiness to protect temporary uncontrolled segments of the border after Ukraine’s territorial integrity restoration by: - creation of units for re-establishment of border protection at uncontrolled segments; - increasing capacities of rapid reaction units, their equipment and training; - creation of resources deposits for the re-establishment of border protection and relevant infrastructure; - Improvement of personnel training systems, including for rare specialties. 4) Systematic fight against corruption, increasing the level of public confidence to SBGSU through: -

Anticorruption program implementation; - Implementation of a road map for internal security units reform; - “New face of the border” project extension; - Further enhancement of integrity, strategic communication, openness and transparency for the society. It is important to stress that UKRAINE REMAINS a RELIABLE PARTNER AND SECURITY FORPOST on the eastern border of Europe and is ENTIRELY READY FOR ENHANCED COOPERATION. The State Border Guard Service of Ukraine is strongly committed and capable to implement the best international practice and to significantly enhance trust among the security subjects of the region and the international organizations.


SHORT REPORT

13

AFRIPOL First General Assembly held in Algiers, Algeria, May 2017 the supreme technical and deliberative organ of AFRIPOL, with the responsibility to provide leadership and direction regarding police cooperation in Africa. It is composed of the Chiefs of Police from all AU Member States.

The First General Assembly of the African Union Mechanism for Police Cooperation (AFRIPOL) was held in Algiers, Algeria, from 14 to 16 May 2017. Tan Sri Dato’ Sri Khalid Bin Abu Bakar, InspectorGeneral of Police, Royal Malaysia Police and also the Current Chairman of ASEANAPOL attended the General Assembly. The General Assembly is

The General Assembly also offered opportunity for Chiefs of Police and their representatives from 45 AU Member States to exchange views and share experiences in combating transnational organized crime and terrorism. The General Assembly, under its 2017-2019 Work Plans, adopted strategic outcomes to deal with the various crime areas. In this regard, the Chiefs of Police committed to enhanced cooperation, including in sharing information and intelligence, in order to defeat criminals and terrorists operating on the continent.

Visit by UNODC and USAID to ASEANAPOL Secretariat ASEANAPOL Secretariat received a visit from officers of the United Nations Office on Drug and Crime (UNODC), Mr. Giovanni Broussard, Regional Coordinator Global Programme for combating Wildlife / Forest Crime and USAID Wildlife Asia Law Enforcement Specialist, Mr. Salvatore Amato. They welcomed by the Executive Director of ASEANAPOL Secretariat, Insp. Gen. Yohanes Agus Mulyono, Director for Police Services PSSUPT Ferdinand R. P. Bartolome and Director for Plan & Programme ACP Aidah Othman and Staff.

supporting ASEANAPOL’s participation and engagement on countering wildlife trafficking efforts in the region. UNODC and USAID see ASEANAPOL as a significant player in ensuring the enhancement of our enforcement networks, particularly in capacity building of personal in wildlife trafficking law enforcement.

On the visit, the Secretariat discussed the role and experiences of the ASEANAPOL in responding to the challenges faced in enforcing wildlife and forest law across the region as a cooperation mechanism for ASEAN Member States. The visiting officers, on one hand, introduced the USAID Wildlife Asia activity including plans of

Border Security Report | January/February 2017


14

INTERPOL REPORT

Suspected terrorist among 17 arrested during INTERPOL operation in Southeast Asia countries screening passports at 35 land, air and sea border points against INTERPOL’s global databases. Some eight million searches were conducted during the operation, resulting in 17 arrests and 110 ‘hits’ on passports recorded in INTERPOL’s Stolen and Lost Travel Documents (SLTD) database.

Enhancing cooperation between law enforcement agencies against terror suspects and criminals travelling across Southeast Asia was the focus of a border operation conducted as part of INTERPOL’s Project Sunbird. Operation Sunbird III (28 March to 5 April) involved police, immigration and maritime authorities from all 10 Association of Southeast Asian Nations (ASEAN)

Among the arrests were a suspected foreign terrorist fighter of Malaysian nationality who was deported to Kuala Lumpur from Turkey, and a Sri Lankan national intercepted by Indonesian immigration in Bali travelling on a stolen blank Italian passport registered in the SLTD database who is suspected of purchasing the passport in Kuala Lumpur from a criminal organization. In this respect, the Deputy Director of the Criminal Investigations Department, Royal Malaysian Police, Azham Othman, underlined ‘the role of the operation in tracking the movement of terror suspects’..

Fake document detection training by INTERPOL enhances security in Americas Identifying fake documents to enhance border security was the focus of an INTERPOL training course in Costa Rica. With terrorists and other criminals increasingly using fraudulent travel documents to avoid detection as they cross borders, the three-day (24 – 26 May) course included practical exercises to develop the technical skills

needed to spot fake passports and other IDs. Some 18 Police, immigration and border control officers as well as forensic document examiners were updated on the latest document security features and printing techniques and methods used by criminals to alter travel and identify documents..

INTERPOL assisting UK coordinate international response after Manchester terrorist attack INTERPOL is assisting UK authorities coordinate their international response following the terrorist attack in Manchester in which at least 22 people lost their lives. The world police body is in close liaison with its National Central Bureau (NCB) in Manchester and has contacted the NCBs in all of its 190 member countries to advise them that any information or requests for updates can be channelled through its Command and Coordination Centre, where a crisis cell has been established. With many countries checking if any of their nationals were killed or injured in the attack, the support provided by INTERPOL is aimed at streamlining exchanges with

the UK and relieving pressure on the authorities currently investigating the incident. Secretary General Jürgen Stock said INTERPOL would continue to provide every support necessary to the UK authorities following the attack. “In a fast moving investigation such as this, the clear flow of information is vital, both for police focusing on their enquiries and for the families and friends trying to establish if their loved ones have been involved. “INTERPOL will provide whatever support is required by the UK both now and as their enquiries progress.”

Border Security Report | January/February 2017


OSCE REPORT

15

First deployment of OSCE Mobile Training Team to address cross-border challenges in identifying foreign terrorist fighters officers from airports in Bosnia and Herzegovina learned how to identify potential foreign terrorist fighters at the border crossing points in compliance with international human rights standards.

AThe newly established OSCE Mobile Training Team for the identification of foreign terrorist fighters delivered its first on-site interactive training course from 23 to 25 May in Sarajevo. During the three-day event, 22 border

The programme included discussions on international, regional and national legal frameworks, effective use of databases, detection of forged travel documents, risk analysis and management, understanding of behavioural indicators and table top exercises. The training seminar was delivered by members of the OSCE Mobile Training Team, from Austria, Algeria, Bosnia and Herzegovina, Malta and Spain. Expert speakers from OSCE, INTERPOL and UNHCR supported the event by sharing their knowledge and expertise.

Training of trainers for border officers of Tajikistan and Kyrgyzstan number of border officers who had already attended basic patrol leadership course served to develop their skills and abilities to teach and transfer knowledge further within their respective services and training institutions.

Ten Kyrgyz Border Service and ten Tajik Border Troops Officers completed today a three-week training-oftrainers (TofT) course organized by the OSCE Office in Tajikistan. The advanced training course for a limited

During the course Tajik and Kyrgyz Officers learned about developing curricula, programmes and lessons plans, conducting training sessions and managing ToT. Other topics covered by the course included public speaking, programme planning and the principles of active learning. The participants were also introduced to pathfinding methodologies, military topography and first-aid training as well as the preparation and delivery of practical training activities using technical equipment.

OSCE concludes workshop on use of social media to counter violent extremism and radicalization The two day workshop in Pristina, Kosovo, aimed at providing the participants with guidance on different Internet platforms and social media, how they work and how to find them. It looked into enhancing their capacity to identify extremist narratives, and to counter them by creating positive narratives and alternatives, and disseminating them. John Gustavsson, Senior Organized Crime Advisor of the OSCE Mission’s Department for Security and Public Safety said, “It is extremely important for officials working on preventing or fighting extremism.� Border Security Report | January/February 2017


16

EUROPOL REPORT

Successful Police Operation Results in 24 Detained and 5.5 tonnes of Cocaine Seized Spanish National Police, Spanish Customs and Ecuadorian Police have conducted an operation resulting in the seizure of 5.5 tonnes of cocaine onboard a cargo vessel in Ecuador. Supported by the UK’s National Crime Agency (NCA) and Europol, the investigation saw one of the largest seizures of cocaine to date.

Operation Moccus, which started in 2016, has managed to disrupt a large drug maritime trafficking organisation operating between South America and Spain. The criminal network settled in the north-west of Spain (Galicia) to coordinate its cocaine shipments. One of the criminal group members was travelling in the intercepted vessel, as ‘guarantor’ of the illegal load and contact person with the Spanish criminal network. On several occasions, members of the Spanish criminal branch had travelled to Colombia and Panama to plan the cocaine shipment. The South American criminal organisation had hidden the cocaine load in a merchant vessel named “Kraken I”, flying Panama’s flag, which departed from Ecuador to Spain via Panama. Intelligence indicated that crew members had received and concealed the drugs in a hidden compartment located between the hull and one of the holds of the vessel.

EUROPOL Supports the Dismantling of Labour Exploitation Gang As a result of joint operational activities, authorities from Belgium and Spain, supported by Europol, have dismantled an organised criminal group involved in trafficking Moroccan and Spanish victims for the purpose of labour exploitation. 23 searches of premises were performed in Belgium by the federal and local police services. A further 5 premises were searched in Spain by officers of the Guardia Civil. The searches in Belgium included building sites in Roeselare, Zwevezele, Antwerp, Sint-Martens-Lierde and

Borsbeek. In Spain, 5 searches took place at the company offices (Valencia and Sagunto) and the homes of the suspects. Europol specialists were deployed on the spot to support both the national authorities. As a result, 9 suspects were arrested in Belgium and 6 suspects were arrested in Spain. In total 23 potential victims of human trafficking and labour exploitation were identified. The victims were from Spain and Morocco. All were offered care and assistance by a specialist NGO.

Criminal Network Involved in Migrant Smuggling and Document Fraud Dismantled The criminal gang is accused of facilitating the illegal entry of migrants - mainly Syrians, Afghans and Iraqis - to and within Europe and the Schengen area, through the production and supply of false documents. It is estimated that the irregular migrants paid EUR 2 000 – 3 000 for each false document. Investigations revealed that the gang had been criminally operating for 10 years.

crime group accused of facilitating the illegal entry of migrants to and within Europe and the Schengen area, as well as producing and facilitating false travel documents for use by irregular migrants.. Eight members of the criminal organisation were arrested, seven in Spain and one in Greece.

With the support of Europol and Eurojust, the Spanish National Police, in cooperation with the Hellenic Police and the Belgian Federal Police, have dismantled an organised

Border Security Report | January/February 2017


SHORT REPORT

17

Continued progress on ICAO compliance crucial to unlocking socio-economic development in Africa ICAO Secretary General Dr. Fang Liu highlighted this week that African States, with ICAO’s assistance and support, are achieving significant progress in complying with international civil aviation standards, but that much more can and should be achieved to help them better optimize the significant socio-economic benefits of safe and efficient global air transport connectivity. Her message was delivered to the hundreds of government and air transport participants from 36 states and 21 international and regional organizations to the Fourth ICAO Africa and Indian-Ocean (AFI) Aviation Week, which was held from 22 to 25 May. The series of meetings was jointly organized this year by the Government of Botswana and ICAO under the theme “Strengthening aviation as a driver to economic and social development.” The 2017 AFI Aviation Week provided an opportunity to jointly assess AFI Region’s challenges, and to harness applicable opportunities to pursue the global and regional goals. The participants recognized the improved level of compliance with ICAO Standards and Recommended Practices (SARPs) by several States as well as the commitments and actions taken by a number of them to resolve Significant Safety and Security Concerns (SSCs and SSeCs) identified through ICAO’s Safety And Security Oversight Audits. “Since the last AFI Aviation Week, an increasing number of States have accepted ICAO Plans of Action, the implementation of which has resulted in an increase in the number of States that have attained and improved upon the 60% minimum EI target in ICAO’s Global Aviation Safety Plan,” Dr. Liu remarked. Pointing out the challenges ahead, Dr. Liu highlighted the importance of ICAO’s No Country Left Behind initiative, and the support of its Regional Offices

in realizing its assistance and capacity building objectives, while recognizing the contributions of Botswana’s regional leadership on aviation developmental issues. “I would like to recall that the attainment of this target by at least 80% of States, and the resolution of all outstanding SSCs, are the key safety Goals for the AFI Region in 2017,” she highlighted. The Secretary General then took the occasion to present Botswana with an ICAO Council President Certificate of Recognition for its recent efforts and the results achieved during the 2016 ICAO Universal Safety Oversight Audit Programme cycle. Looking forward, the Secretary General stressed the associated need for greater allocation of resources, particularly towards the Human Resources Development Fund for Africa (HRDF). “Under the HRDF, voluntary contributions are being used today to assure the skilled personnel required for future operational efficiency and continuous implementation of ICAO SARPs, and other programme activities in the civil aviation sector,” Dr. Liu remarked. “This is a very important capacity-building initiative for Africa’s civil aviation sector, and I would like to encourage support from States, industry partners and other interested parties.” Dr. Liu further extended a special acknowledgement to ASECNA Member States (Benin, Burkina Faso, Cameroon, Central African Republic, Chad, Comoros, Congo, Cote d’Ivoire, Equatorial Guinea, Gabon, Guinea Bissau, Madagascar, Mali, Mauritania, Niger, Senegal, and Togo), as well as China, Kenya, Nigeria, Saudi Arabia, Seychelles, Sudan, Turkey, and United Republic of Tanzania, for having already made significant contributions in support of the HRDF.” Left: The Secretary General of ICAO, Dr. Fang Liu, at the occasion of her opening address of the Fourth Aviation Week for the Africa and IndianOcean (AFI) Region. Right: The Secretary General of ICAO, Dr. Fang Liu, presenting Botswana’s President and Head of State, H. E. Ian Khama, with an ICAO Council President Certificate of Recognition for its recent efforts.

Border Security Report | January/February 2017


SPECIAL REPORT

18

Brexit, BORDERS and Cyber Security

Andrew Fitzmaurice is CEO of Templar Executives, an award winning international Cyber Security advisory services and solutions company operating at the highest levels across the public and private sectors

Border Security Report | January/February 2017

Brexit is a multifaceted issue which will continue to dominate the news headlines for years to come. The consequences of this historic decision by the UK is subject of much partisan debate, and the economic uncertainties ahead, a matter of surmise until new agreements are forged between the UK, EU and other nation states. In addition to electronic trade, one of the biggest logistical elements to be considered by governments, will be the re-instatement of substantial border controls between the UK and the rest of Europe. Border controls do exist now at both ports and airports of course, but with free movement within the EU and the advent of e-passports, biometrics, and intelligence-led


SPECIAL REPORT

19

others with greater risk attached, will undoubtedly be left to human decision makers. The latest iterations of Cyber Security Operating Centres (CSOCs) look to integrate information from a myriad of sources including ‘humint’ (human intelligence) and from across the magnetic spectrum from where suitable data can be derived. The diagram below shows graphically an indicative range of information feeds that a modern CSOC would expect to utilise in creating ‘real-time’ situational awareness.

targeting, they are mainly an automated affair with minimal need for physical interaction. However, the current situation is far from ideal, with waiting time at airport border controls for non-EEA citizens regularly failing to meet the UK government’s ‘45 minute target’. There has also been criticism that technology has been introduced solely to replace staff rather than for genuine innovation. In terms of the scale of challenge a post-Brexit world presents, how can Cyber Security benefit us to make our borders controls better, without further increasing security exposures, inconvenience and waiting times? The Challenge In a post-Brexit world, whilst trade may be reduced, there will be an increased requirement for vehicle/ luggage searches and a greater need to establish identities of travellers more quickly than can currently be achieved. Many companies run a ‘just-in-time’ concept for the delivery of perishable goods and livestock. Anything that would increase delays from current levels could have a disastrous effect on trade and the timely conveyance of goods. Air travel too would suffer.

Resources for airport border staff have not matched the increase in passenger numbers in recent years. In the UK whilst passenger numbers increased from 220.6 million in 2012 to 251.5 million in 2015, the Border Force budget dropped from £617 million in 2012/13 to £558.1 million in 2016/17. With reducing resources, increasing passenger numbers and travel time being so important, designing new effective Brexit border controls will certainly present a significant challenge. To add to this complexity, Europe-wide partnerships, such as Europol and the Schengen Information System, will also have to be redefined and agreed. What does Holistic Cyber Security have to offer? Holistic Cyber Security comprises information and intelligence flows around people, processes and Information Communication Systems. In organisations that have successfully deployed such an approach, information from all three areas are fused to arrive at a point where risk-based decisions around business issues can be made. Some of these decisions may be aided through artificial intelligence or heuristic machine learning, whilst

However, in terms of border controls, it is not just Cyber Security principles that that will make the difference – it is the application of tools, techniques and processes used in holistic Cyber Security to gain and maintain exceptional situational awareness, which will enable an acceptable level of integrity around border controls. That all sounds relatively simple, but of course it isn’t. Companies that employ such CSOCs may have many thousands of personnel over a number of different geographical locations, but the challenges this represents pale to insignificance when faced with securing the UK’s 11,000 kilometres of coastline and the sixty-five million people who live here. So where else can the principles of Cyber Security help? The successful employment of holistic Cyber Security is also dependent on taking that riskbased approach; to ensure that you are taking the right amount of risk, there needs to be a ‘feedback loop’ which is forever challenging the risk-based decision making. This is ‘assurance’. In pure information assurance, there are a number of defining assurance characteristics that are designed to be scaled but really address the provenance and quality of the data used for decision making derived from individual systems. In terms of border control, data is

Border Security Report | January/February 2017


20

SPECIAL REPORT

Diagram: Threat Intelligence Context Aware derived from multiple sources, so in effect you would have a ‘System of Systems’. For this, it is advocated that the following assurance sequence of lenses is applied: integrity, value, and risk appetite setting. The first two lenses can certainly lend themselves to certain amounts of automation, indeed so can risk appetite, however, ultimately this will be a human function based upon a number of factors, not least intelligence. Brexit The ‘WannaCry’ attack demonstrated the level of global interconnectivity, with over 150 countries being affected. It also brought into sharp focus the fact that end-to-end encryption and the internet make it is an almost impossible task to keep all under effective surveillance. Implementing the principles of holistic Cyber Security are essential to our security; including effective training and understanding

for situational awareness, better nuanced risk appetites, and secure intelligence sharing on an international basis. It is paramount that whilst Brexit may mean changes to the physical border of the United Kingdom, it does not disrupt the ability to share critical information in a secure and dynamic manner, particularly in light of the evolving international component of malicious threats. Summary The UK will probably not be able to cope with a ‘hard’ border, if it wishes to keep movement through our borders at current levels. Investment in Border controls has reduced in real terms with people being replaced by technology, not just in the UK, but worldwide, and with no real step-change in innovation. Holistic Cyber Security employs tools and procedures that may help increase real-time situational awareness and utilises assurance

Border Security Report | January/February 2017

to help with risk-based decisions. Whilst the debate and uncertainties around Brexit will continue unabated, one thing that is certain is that an ‘enhanced situational awareness’ is essential for effective border control; and this can only be maintained if governments and the intelligence communities both here and abroad continue to exchange information in a timely manner.


SHORT REPORT

21

TSA to Evaluate New Personal Electronic Device Screening Technology as Potential Alternative to the Electronics Ban On March 21, 2017, the U.S. Department of Homeland Security imposed new restrictions on electronics in aircraft cabins on direct flights to the United States from a number of North African and Middle Eastern airports. Recent reports indicate that an expansion of the ban may be extended to flights from European airports and other regions potentially impacting thousands of flights a week.

The new electronics scanner is a compact, affordable solution that could be immediately deployed to airports for detecting explosives concealed in electronic devices. One Resonance Sensors, has announced that the U.S. Transportation Security Administration (TSA) will evaluate ORS’ personal electronics scanner. MobiLab® ES is the only state-of-theart inspection system that effectively screens devices such as tablets and notebooks, which are currently banned from being carried onboard by passengers on a number of flights to the United States. In contrast to CT and other X-ray technologies, MobiLab ES is an affordable solution that may be deployed for at-gate or checkpoint electronics inspection.

“We are pleased to have ORS’ MobiLab ES assessed by the TSA as a potential solution for screening of electronics and to deliver a new, more compact, and less costly security capability to airports and air carriers to address threats to transportation security,” said ORS Chief Executive Officer Pablo Prado. “MobiLab ES was designed specifically to address the threat of explosives concealed in portable electronic devices. We are confident that the scanner will demonstrate its effective and rapid detection capabilities and its mission-critical utility in security checkpoints.” ORS’ MobiLab ES uses harmless radio-frequency electromagnetic waves to inspect electronic devices for concealed threats. The U.S. Department of Homeland Security and the U.K. Department for Transportation have evaluated the performance of the scanner, and trials have been performed at two airports in the Middle East.

24-hour patrols after news of KL busting ISIS cell which smuggled weapons from Thailand Thai soldiers have been deployed to patrol full time a long stretch of the Thai-Malaysian border in two provinces to stop illegal border crossings and smuggling. The patrols came about following recent news that the authorities in Malaysia had captured

several militants from the country who support the Islamic State in Iraq and Syria (ISIS) and had been smuggling weapons from Thailand. This led to fears of possible cooperation between the Muslim insurgents in South Thailand and the ISIS terror group.

Border Security Report | January/February 2017


22

AGENCY NEWS

Agency News and Updates T

wo Bulgarian Border The operation led by the Special P o l i c e a m o n g s i x Prosecutor’s Office was continuing. arrested in bust of peopletrafficking operation at Sofia Airport utomated border control to enhance movement, trade with Iran

A

Abdulqadir Abdulla said both border crossings of Haji Omran and Bashmakh on the Iranian border have been connected to the electronic system and work to cover other gates is expected to be complete before end of this year.

U

.S. Diplomat Says China Has Tightened Border Controls with North Korea Six people, including two Border Police, have been detained in an operation against an organised crime group that was trafficking refugees through Sofia Airport, Bulgarian Prosecutor-General Sotir Tsatsarov said. This is the first time that Bulgaria’s security services have bust such an operation at the airport in the capital city.

TAuthorities in the Kurdistan Region have announced that the main border gate of Parwez Khan to the neighbouring Iran will be fully automised before June this year to facilitate the growing movement of travellers and goods between the two countries.

Two of the others arrested were foreign citizens, from Bangladesh, who had been living in Bulgaria for about more than a decade, Tsatsarov said. The other two were refugees who had entered the country illegally.

The office of Kurdistan Region customs service said last week the electronic system will be installed in all Kurdish border crossings this year to cope with the increasing number of visitors and cross border trade.

Border Security Report | January/February 2017

Chinese officials have told the U.S. that they’ve tightened inspections and policing along the border with North Korea as part of U.N. sanctions aimed at halting Pyongyang’s nuclear and missile activities, the top U.S. diplomat for East Asia said Friday. Beijing’s action reflects a growing awareness about the urgent need for China to pressure North Korea


AGENCY NEWS

into halting its testing of missiles and nuclear bombs, Acting Assistant Secretary of State Susan Thornton told reporters in Beijing. President Donald Trump’s administration has made a renewed push to enlist Beijing’s help in those efforts following a meeting between Trump and Chinese President Xi Jinping last month. Touching on other areas of the relationship, Thornton said the new administration has not changed its commitment to greater engagement with countries in the Asia-Pacific region or its approach to naval operations in the disputed South China Sea.

T

rump’s $1.6 Billion Budget for Border Walls — Mostly for South Texas

The 2018 budget increases allocations for border security by $1.1 billion, and $1.5 billion for the U.S. Department of Homeland Security (DHS). The director of the Office of Management and Budget also urged Trump voters to be patient and said this proposed action was a beginning for a project that will be protracted. “Keep in mind; you can’t just … you don’t automatically magically build a wall in the middle of nowhere,” the director stated. The budget for the U.S. Department of Justice also asks for $1.8 million to “meet litigation, acquisition, and appraisal demands during the construction along the border between Mexico and the United States.”

M

23

the country,” he said, noting that the incidents took place in three countries that Malaysia shares borders with. Two additional ships will be deployed to patrol the waters off Sabah, Mr Hishammuddin said. Quick Reaction Force (QRF) personnel will be placed with troops on islands in Sabah waters, and patrols will be increased in areas that have been identified as entry points into the southern Philippines.

B

order clashes have seen forcing Pakistan to boost defence spending Pakistan’s powerful military will probably push for an increase in defence spending ahead of the national budget as border clashes with neighbouring India and Afghanistan mount.

alaysia Steps Up Border Security after Bangkok, Jakarta, Mindanao Pakistan’s relations with its neighbours Attacks have drastically deteriorated this year.

The plan is for the Rio Grande Valley Sector to receive 32 miles of a new border wall, and 28 miles of a new levee wall. The levee in Hidalgo County is designed to address flooding. The budget refers to the new border wall as “a physical wall.” Budget Director Mick Mulvaney said, “We are absolutely dead serious about the wall.” He called it one of President Trump’s “top three” budget priorities, reported Breitbart News on Tuesday. Mulvaney denied that the administration was scaling back funding for border walls by saying the Trump administration’s budget was a striking hike from the 2017 budget.

On Tuesday, India’s military said it hit army posts in the Pakistan-controlled part of Kashmir that it said were providing cover for insurgents planning attacks, a claim that Pakistan’s forces denied.

Malaysia has stepped up its border security in the wake of attacks in Bangkok, Jakarta and Mindanao, Malaysian defence minister Hishammuddin Hussein said on Saturday. In a statement, Mr Hishammuddin said he had been “closely monitoring” the recent attacks and bombings in neighbouring countries. “I have instructed the armed forces to improve border control across

F

our Australian men arrested after border security makes major methamphetamine bust

Four men have been arrested after the Australian Border Force (ABF) took down a large methamphetamine syndicate. The four men, three of whom are from Victoria, were arrested after a sixmonth investigation by the ABF found they were smuggling chemicals used

Border Security Report | January/February 2017


24

AGENCY NEWS

to manufacture methamphetamine, also known as ice, into Australia. It is alleged that the men worked with an international gang of organized criminals to import enough ephedrine to produce 45 million U.S. dollars of ice. ABF officers in Victoria and New South Wales (NSW) carried out raids on a series of properties in the two states on Friday morning where the four men were arrested and 65 kilograms of ephedrine seized. “Seizing this ephedrine is an important step in helping decrease the domestic manufacture and supply of ice,” Wayne Buchhorn, ABF assistant commisoner, told reporters.

G

reeting on Border Guards Day

exchanged fire for several hours. The Pakistani military said in a recent statement that the Chaman crossing into Afghanistan’s Kandahar province had been reopened on “humanitarian grounds” after Afghan officials submitted a request. “It has been agreed upon by Pakistan authorities that ceasefire shall continue to be maintained and no border violation will be acceptable,” the statement said. It, however, noted that Pakistani troops would maintain positions along the border.

P

unjab border on alert: Top cops take stock of situation, security increased

IG (border) Naunihal Singh, DIG AK Mittal, Pathankot SSP Vivek Sheel Soni, Gurdaspur SSP BS Virk and Batala SSP Deepak Hilori led Punjab police force who made visits to the frontier posts of Border Security Force (BSF) to take stock of the situation..

K

akistan r e o p e n s Punjab Police have increased its Afghanistan border strength in these border villages under which four customised armoured crossing

Pakistan has reopened a major border crossing with Afghanistan more than three weeks after several people were killed when troops from both sides

According to information, police is investigating the seizure of the bag containing army combat dresses which bears the mark of Jammu while the dresses are made in the army authorised units of Shahjahanpur and Kanpur. The “planned” hiding of these uniforms in the bushes near the army area is worrying security agencies.

elantan Aksem To Ti g h t e n K e l a n t a n Thailand Border Security

Vladimir Putin congratulated military and civilian personnel and veterans of the FSB Border Guards Service on their professional holiday, Border Guards Day.

P

requisitioned from PAP Jalandhar whereas an additional 300 police personnel have been deployed in different parts of the border villages of Pathankot and Gurdaspur districts.

personal carriers (APC) have been requisitioned from PAP Jalandhar whereas an additional 300 police personnel have been deployed in different parts of the border villages of Pathankot and Gurdaspur districts.

The Malaysian Border Control Agency (Aksem) in Kelantan will mount integrated operations to beef up security at the Kelantan-Thailand border to curb cross-border criminal activities.

Seeing the regular seizures and alerts issued by the intelligence agencies, Punjab Police have increased its strength in these border villages under which four customised armoured personal carriers (APC) have been

Its commander, Mohd Asri Yahya said the operations would be in collaboration with other enforcement agencies including the Customs Department, Royal Malaysia Police, Immigration Department, Malaysian

Border Security Report | January/February 2017


AGENCY NEWS

Maritime Enforcement Agency and the Malaysian Armed Forces. Deputy Prime Minister Datuk Seri Dr Ahmad Zahid Hamidi said security control at all entry points in the country, including ‘rat trails’ would be enhanced to prevent infiltration of terrorists now being hunted by the authorities. He had reportedly said the measure was taken following the recent series of terrorist attacks involving militants in Marawi, southern Philippines, Indonesia and Bangkok.

I

1

1 migrants detained Marinov, the chief secretary of the near Romania-Hungary Interior Ministry, said for BNT on 26th of May. border

Romanian border police say they have detained 11 Syrian and Iraqi migrants who are suspected of trying to illegally cross the border and reach the Schengen zone. Police said in a statement that a man with both Romanian and Hungarian citizenship is also being investigated for migrant smuggling. The statement said that police noticed a car with Hungarian plates which stopped 500 meters (550 yards) from the border with Hungary.

talian Police Search for Terrorism Suspect Who Slipped Through Border There were five Syrian and Iraqi

The Italian police are looking for a Tunisian man suspected of having terrorist ties who entered the country on Wednesday, traveling in a car with German license plates, according to a police statement and Italian officials. The suspect, Fouad Khaskhoussi, 36, was born in Tunisia and has German residency papers. The statement from the police released said he was traveling in the car with Wassim Ben Hassem, 31, who was also born in Tunisia and lived in the Italian town of Reggio Emilia. They passed through the border security post in the Italian city of Como, which is on the border with Switzerland. The Florence highway division of the state police circulated mug shots of the two men and said in a statement that they were traveling in a white Citroën with the German license plate. An internal police document showed that Mr. Khaskhoussi appeared in Italy’s database of terrorism suspects..

25

citizens, aged 23 to 32, and six minors aged 1 to 10 in the car, traveling with temporary asylum-seeker documents.

Unfortunately, such a migrant trafficking ring thorugh the airport can not exist without the involvement of such employees, Marinov said. The organizer who is a foreign citizen and two undocumented foreigners have been detained. They are part of the people who assisted for the illegal entry of migrants into the country.

N

o new customs points planned for Irish border after Brexit, says Revenue chief

B

ulgarian Border Police Officer Detained for Alleged Smuggling of Migrants

A Bulgarian border police officer was detained in an operation targeting iliegal trafficking of migrants, which took place in the center of Sofia in the evening on 25th of May. The investigation is on-going under the leadership of the specialized prosecutor’s office. More employees of the Interior Ministry may be detained in the course of the operation, Mladen

Ireland’s tax chief is “almost 100% certain” there will be no new customs posts along the Irish border after Brexit. Niall Cody, chairman of Revenue Commissioners, categorically rejected reports that it was actively looking for locations to establish new checkpoints. The speculation, which he blamed on an early contingency paper from a “medium ranking” official, has led to landowners along the Irish border directly offering him sites for sale. But Mr Cody told a parliamentary committee in Dublin: “We are not planning customs posts.”

Border Security Report | January/February 2017


26

CONGRESS NEWS

gathering of the international border co mm unity    event REVIEW                                    The international border security and management community gathered in Casablanca, Morocco in March to discuss the global border issues and how international collaboration and cooperation can contribute towards enhancing border security challenges.

21st-23rd March 2017 Casablanca, Morocco

www.world-border-congress.com

The 2017 World Border Security Congress held in Casablanca, March 2017 was a considered a great success by all participants. Under the patronage of the Ministry of Interior of Morocco and supported

Border Security Report | January/February 2017

by the Directeur de la Migration at de la Surveillance des Frontieres, the Congress was described by a senior member of the International Organisation for Migration (IOM) on day one, as, “a timely and important event at a special moment in time” The opening session set the scene for this 3 day congress articulating both the importance of Border Management activity internationally and the significant challenges, which Governments, Policy Makers and Law Enforcement Agencies face with increasing pressures in a difficult


CONGRESS NEWS

economic climate. The task for the event was to explore the major issues that were common to so many nations and seek to continue to develop border management resolutions and solutions. With a global audience from over 40 nations and nearly 250 participants the conference saw some excellent presentations from a broad range of distinguished and experienced border related experts. Alongside this, and importantly, there were some exceptional discussions and debates teasing out some of the more demanding areas of concern and addressing them from a range of perspectives, both from government and commercial positions. The congress was very fortunate to have had a fantastic level of support

from the Kingdom of Morocco and in particular the Ministry of Interior with the opening welcome being delivered by, His Excellency, Khalid Zerouali, Wali, Director of Migration and Border Surveillance, in Morocco. His Excellency also gave the keynote address where he articulated his clear view on the connections between transnational organised crime leading to terrorism in the Maghreb region. He went onto empathise the importance of inter-agency cooperation both nationally and internationally and this continued to be a general theme throughout whole conference. The event was also fortunate to have the support of, and speakers from, a wide range of international security organisations who have a focus on and around border management operations. Organisations such as: • Organisation for Security and

27

Cooperation in Europe (OSCE) • International Organisation for Migration (IOM) • United Nations • European Association of Airport and Seaport Police (EAASP) • Pompidou Group • Airpol • EU Border Assistance Mission in Libya (EUBAM-Libya) • EUROPOL It was a truly global conference seeking to address global border issues and one which continually highlighted the need for continued efforts in developing, national, regional and international; Coordination, Cooperation and Communication. There were also some clear messages from some developing nations of the significant need for international support, expertise and training to assist them in addressing

Border Security Report | January/February 2017


28

CONGRESS NEWS

the challenges they face. Hot topics discussed at the Congress included: - Building Coherent Global Border Management Response Against Illegal Migration and International Terrorism - Maritime, Port and Coastal Border Security Challenges - Standardization of Systems and Making Advanced Passenger Information (API) Work - External and Internal Land Border Challenges - Identity and Biometrics at the Border – Compliance, Application and Implementation - The Global Fight Against International Terrorism and Cross Border Organised Crime and How We Make Interagency Co-operation and Information Sharing a Reality - IBM and Technology Challenges and Security in the Face of Mass Migration - Pushing Out the Border and the Future of Successful Border Management Whilst the Closed Agency Only Workshops gave the agencies the opportunity to discuss highlighted issues behind closed doors, and looked at the topics of: - International Border Security

Challenges - from THB and Document Fraud to Inter-Agency Co-operation and Information Sharing - Health Issues in Border Security - Soft Surveillance at Borders - Human Development Initiatives Organisations such as EUROPOL spoke about the very positive developments being made in terms of information sharing across Europe and with other international partners and organisations and also through their operational agreements with countries such as the United States and Columbia. They believed that there were a number of factors which have contributed to their growing success in this area which included demonstrating the ability to store data on a truly secure platform and ensuring the integrity of data that is shared. Other references were made to developing networking platforms to enable the development of interagency cooperation such as the OSCE, who referenced their Points of Contact Network. Coordination was a recurring theme throughout the conference The World Border Security Congress wanted

Border Security Report | January/February 2017

to assist in developing coordination platforms and announced on the final day that they would be launching a ‘World Border Security – Password Protected Platform’ for invited agency and government delegates, the intention being to enable the continuation of the great dialogue and communication which has taken place throughout the event. It will also provide access to the conference presentations, provide a platform to share news and case studies and allow opportunities to identify new technology trends. The launch of the platform will hopefully encourage active participation from all delegates, speakers and others and will lay the foundations for the next event in March 2018 in Madrid. The 2017 World Border Security Congress wished to thank the Ministry of Interior of Morocco and the Directeur de la Migration at de la Surveillance des Frontieres for their excellent support. The next gathering of the international border security community will take place on 20th-22nd March 2018 in Madrid, Spain.


I N D U S T RY N E W S

Cochin International Airport Selects Smiths Detection’s CTX 9800 for NextGeneration Hold Baggage Screening Smiths Detection has announced that India’s Cochin International Airport has deployed four high-speed CTX 9800 DSi™ hold baggage explosives detection systems (EDS) to screen all passenger checked baggage..

With the inauguration of its international Terminal 3, Cochin is the first airport in India to screen all checked baggage, referred to as Level 1 screening, with computed tomography (CT)-based EDS. Commonly referred to as European Civil Aviation Conference (ECAC) Standard 3 capabilities, CT EDS produce high-resolution, 3-D images that facilitate more accurate detection, lower false alarm rates, and reduce the need for manual inspections. In addition to CTX 9800 EDS, Smiths Detection has supplied 13 HRX™ dual

view X-ray systems to screen arriving baggage at customs checkpoints. To ensure maximum uptime and performance, Smiths Detection’s onsite network of expert engineers and technicians will provide preventative and rapid-response services for a minimum of ten years. Commenting on the new terminal and growth, Mr. A.C.K. Nair, Airport Director at Cochin International said: “Cochin’s goal is to offer our passengers and airlines a worldclass airport experience. Working with Smiths Detection to automate

and enhance hold baggage screening capabilities is an important part of our infrastructure plan to meet the demands of anticipated domestic and long-haul growth over the next 20 years.” “Congratulations to Cochin International Airport on the inauguration of Terminal 3 and being the first airport in India to screen all checked

29

baggage with leadingedge CT technology,” said Pravin Surana, Director, Smiths Detection India. “As airports in India and throughout the region continue to upgrade explosives detection capabilities, Smiths Detection’s customized EDS solutions and services are ready to meet the unique challenges and growth plan of any airport.”

The Imprimerie Nationale Group and Lyon SaintExupéry Airport unveil the first automatic e-gates for border control, after the announcement of Thales Identity and Biometrics integration in the Imprimerie Nationale Group The Imprimerie Nationale Group, launches the first e-gates deployed for border control at Lyon SaintExupéry Airport, within the national PARAFE (Passage Rapide aux Frontières Extérieures – Fast Pass through the External Borders) framework experimentation. Developed by engineers from Thales Identity & Biometrics, recently acquired by Imprimerie Nationale Group, this equipment, compliant with the PARAFE system, allows to significantly speed up border identity controls. This experimentation is based on a unique architecture that includes a series of five gates

with fingerprint-based biometric recognition in the border control area. The installed system is

Border Security Report | January/February 2017


30

I N D U S T RY N E W S

Airborne Industries’ Aerostat System Successful in Border Surveillance Trials

innovative as it already supports fingerprint recognition and it is ready for the addition of face recognition capability in the near future. It is open to passengers equipped with a French or German biometric passport and it will gradually be extended to other European Union passengers. The test configuration installed in Lyon allows controlling 5 passengers at once by a single police officer while, in a traditional setting, an officer is needed to control one passenger. This installation allows passengers to go through border controls in a simplified, fluid and fast manner. It consists in: - Presenting one’s passport on the document reader at the gate entrance, - Going through the gate after the entrance door opens, - Presenting a finger on the fingerprint reader, - Exiting the gate through the exit door after the fingerprint has been authenticated by the

system. Commenting on the occasion, Didier Trutt, the Imprimerie Nationale Group CEO, declares: “We are very happy to be here today for the launch of these e-gates that will allow to reinforce border security and to provide better services to Saint-Exupéry Airport passengers. We thank the Airport authorities for their confidence in the technologies and expertise of our new Biometric Identity Solutions branch (formerly Thales Identity & Biometrics), for their choice of these userfriendly and secure systems for automated identity control.” The teams belonging to Imprimerie Nationale Group’s Biometric Identity Solutions branch (formerly Thales Identity & Biometrics) benefit from more than 30 years of experience in the field of integrated identity management throughout the world. They rank first in civil biometric market in France.

Airborne Industries’ Aerostat Surveillance system has proved successful in an exercise within Saudi Arabia to monitor border security. Airborne Industries was selected as the Aerostat provider for the trial by the Saudi Research Institute PSATRI. designation, a Blighter radar system and a CRFS - RF eye electronic surveillance system.

The trial was a proof of concept exercise for an Aerostat to carry a combined payload for border surveillance and force protection applications. The exercise was organised by PSATRI in order for them to trial their integration software for multiple payloads. The system used in the trial comprised Airborne Industries’ 850 Aerostat carrying a Wescam MX15 camera with laser illumination and target

Border Security Report | January/February 2017

For this trial the Aerostat was flown at an altitude of 1000 ft and the visual, motion and electronic signatures of the payloads carried were shown to be capable of picking up data at 30 kms. The system, can, however, be configured to be flown at 4000 ft, giving greater range. All the systems can loiter for about one week. Airborne Industries is currently developing a strategic range of rapidly deployable systems able to carry military cameras for a range of applications such as Force Protection, Border Surveillance, Critical National Infrastructure and Large Event Surveillance. The company’s capabilities will be demonstrated at CIPRE in The Hague in May.


I N D U S T RY N E W S

Face Recognition Technology from Cognitec Supports Automated Border Control at Venice Airport

contacts Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk

Cognitec’s automated passport control product FaceVACS-Entry features in eight ABC gates (eGates) at Venice Marco Polo Airport, following the airport’s decision to facilitate expedited border control checks at the international terminal. The eGate implementation project was delivered by N-Aitec, an airport IT provider and system integrator.

As the traveler enters the eGate, FaceVACS-Entry detects the person’s face, adjusts the position of the cameras according to the person’s height and then captures best-quality images that guarantee high verification accuracy. The software instantly verifies the live images against biometric photos stored in passports

31

Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

or other ID documents, and a confident comparison result opens the gate door. Since the initial rollout in July 2015, more than 600,000 passengers have used the self-service eGates for immigration processes, with four gates serving arrivals, and four gates the departure area. Venice airport sees a growing number of travelers favoring the speed and usability of the automated procedure.

Border Security Report is a bi-monthly electronic magazine and is the border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over 16,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide.

Copyright of KNM Media and Torch Marketing.

ADVERTISING SALES Paul Gloc (UK and Rest of World) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +33 (0) 6 1609 2153

Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700

Border Security Report | January/February 2017


20th-22nd March 2018 Madrid, Spain

www.world-border-congress.com

Collaboration and Interaction for Action

Converging and Enhancing Border Security Through Constructive Dialogue

CALL FOR PAPERS Call for Papers is now OPEN - Submit your abstract today at: www.world-border-congress.com/conference/call-for-papers The world is experiencing the largest migration movement in history, with challenges for the border management and security community, as little sign of peace and security in the Middle East is apparent and porous borders in Africa and Asia continue to provide challenges. International organised criminal gangs and human and drug trafficking groups exploit opportunities and increasingly use the internet and technology to enhance their activities. Controlling and managing international borders in the 21st Century continues to challenge the border control and immigration agencies around the world. It is generally agreed that in a globalised world borders should be as open as possible, but threats continue to remain in ever evolving circumstances and situations. Advancements in technology are assisting in the battle to maintain safe and secure international travel. The border security professional still remains the front line against these threats. The World Border Security Congress is a high level 3 day event that will discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and secure border and migration management. We look forward to welcoming you to Madrid, Spain on 20th-22nd March 2018 for the next gathering of border and migration management professionals.

www.world-border-congress.com for the international border management and security industry

Supported by:

Media Partners:


AIRPORT SECURITY

Terrorist attacks on airports: lessons learned from recent events (Brussels and Istanbul)

On 22nd of March Brussels marked the first anniversary of double terrorist attacks at the airport of Zaventem and Maelbeek underground station. On 28th of June Istanbul Ataturk airport has one year from terrorist attack on its premises as well. One year after these tragic events we may better see what lessons could be learned and what recommendations could be given to national law enforcement and to airport authorities. Airports always attract terrorists and we have witnessed several significant terrorist attacks on airports in recent years. The attack on Moscow Domodedovo international airport on January 24th in 2011, which took lives of 37 people with more than 170 people wounded, was one of the most significant. Terrorists attacked the arrival hall and unfortunately landside attacks became the reality. We may put this case on the same level of significance as Lockerbie and 11th of September terrorist acts, which changed the face of air security. Domodedovo’s attack changed the face of landside security. Huge investments into sophisticated equipment for individual passenger checks before boarding has resulted in a lack of security measures for the physical protection of people on the ground. Airports currently prioritise “airside” security, or the area accessible only to airport staff and passengers with boarding cards. Effectively, the insecurity of landside is a by-product of improvement in airline security. Long lines of people expecting pre-flight security checks, as well as at check-in, are tempting targets for terrorist attacks.

www.worldsecurity-index.com

Flight departure and arrival information can also “help” terrorists to target certain nationalities at counters of airline companies or check-in desks or in arrival halls. Adding to the complexity of enforcing security is the financial pressure of running an airport as a business enterprise. In recent years, due to economic pressures, many airports have added retail facilities in public areas to generate revenue. Airports even advertise themselves as special shopping zones with a wide choice of boutiques. Airports also increasingly mix high-security aviation with other modes of transportation that get much lower security attention. Across Europe, most airport hubs have train stations inside or near the terminals. Keeping in mind that most of these facilities were built decades ago with an approach to security which, while acceptable at that time, is now woefully inadequate. In its nature, the Brussels attack was similar to the Paris attack on 13th of November 2015. The group of terrorists split it into two parts for simultaneous attacks of different targets. However, it was fulfilled by a less prepared group

World Security Report - 17


AIRPORT SECURITY

According to Turkish officials, one of the explosions was set off by a third attacker in the parking lot across the street from the terminal. Turkish law enforcement also insisted that terrorists planned to take hostages among passengers and to play a Mumbai scenario. At the beginning of the attack terrorists were confused with thieves so reaction of security personnel was more relaxed. Lessons learned

with less resources than in Paris. We may also assume that attacks on 22nd were provoked by arrest of Salah Abdelslam on 18th of March. Understanding that he may cooperate with investigation, the rest of the cell had to carry out attacks as soon as possible. The CCTV footage showed three men identified as main suspects in the suicide attack in Zaventem. The first two men have been dressed in black, progressed through the hall with airport carts carrying their suitcases. They were followed by a third man in a white jacket and a hat. Men in black were wearing only one glove on their left hand. As security experts believe these single gloves could have helped them to hide a detonator. It is clear that the third man also had a bomb in his luggage; however, he did not have a glove. This might suggest that the state of readiness of the third device or its constructive characteristics were somehow different from the two bombs managed by the men in black. One hour later the underground station Maelbeck was attacked by suicider as well. The response to simultaneous attacks is quite a challenge. Lack of information a challenge for efficient communication, unpredictability of the development of the whole situation and very often insufficient inter-agency cooperation and coordination are only some of the issues which arise at the time of very complex response activities. The Belgian authorities did not have much experience with counterterrorism response. In case of Istanbul we have three terrorist-suiciders, who opened a fire next to the x-ray scanner. At Ataturk, in fact, screening had been pushed all the way back to terminal entrances. It is so-called Moscow model of security, which was introduced in many airports after Domodedovo attack. That, of course, creates crowds at terminal entrances that can be targeted—and that appears to be what happened at Ataturk. If there is going to be screening, it has to be done somewhere, and therefore some crowding somewhere is inevitable.

18 - World Security Report

Though no credible proof is identified so far, it is possible that a pattern seems to emerge: in the latest attacks, there are multiple suicide bombers and, potentially, one (or more) collaborators who are prepared differently, act in a distinctly different way, possibly serving as eyewitnesses, and potential participants or “finishers” for when something goes wrong. It is especially striking as terrorist attacks in Brussels are thought to be quickly cooked in the aftermath of the Abdeslam’s arrest. There is one more very disturbing fact that should be considered. It seems the world of terrorism is now an oligarchic-style market where competition is raging among jihadist groups. Such competition is proving even more dangerous than the threat of continued “lone wolf” attacks and localized bombings by jihadists who have either returned from the Islamic State or were inspired by them. The Dutch Intelligence Service (AIVD) report rightfully concern with this issue. The competition, particularly between al-Qaida and IS, is likely to lead to more attacks in the West, as each of them try to assert themselves and to “demonstrate to one another that who is the real leader of jihadism,” the AIVD report says. This is particularly crucial for al-Qaida, which may stage an attack soon in order to re-establish its blurring image and power at a time when IS seems to be getting the most attention (and followers and funding). IS’s attacks so far were not so high profile. Tough targets were al-Qaida’s trade mark. Therefore, we may witness a struggle among terrorists themselves for a leadership. Another interesting fact was an origin of terrorists. Terrorists at Istanbul attack

www.worldsecurity-index.com


AIRPORT SECURITY

were from Russia’s North Caucasus region and the others from Uzbekistan and Kyrgyzstan. So, we see more and more terrorists from ex-Soviet Union (Central Asian or Russian origin (Caucasus). There are other terrorist attacks which this brings to mind: Boston marathon bombing (Chechens), night club Istanbul bombing (Uzbek national), Stockholm (Uzbek national), STPetersburg (Kyrgyz origin, Russian naturalisation), terrorist plot in Norway (Chechen refugee). These terrorists from Central Asia are more frequently suiciders. The terrorists in Brussels continued the very dangerous pattern when operatives come from the same family or circle of very close friends. To prevent such attacks is practically impossible, for members of one family have very high loyalty and practically never inform police about terrorist plot. Technically, the composition of both attacks is the same. Penetration to the area where crowds are and act violently. The attacks of September 11, 2001, marked a change in terrorist attitudes in that the aim is no longer merely to threaten and get public attention, but also to kill as many people as possible. To paraphrase famous terrorism studies researcher J R White, killing was once an outcome of an operation, now killing is a terrorist operation itself. So, both attacks had the aim to kill as many people as possible. The Brussels terrorists were known to intelligence authorities and were in wanted lists of several countries. Unfortunately, there was no sharing of information between law enforcement and airport authorities and the airport had no appropriate system of face recognition. The bad news for airport authorities is that if terrorists were not stopped by law enforcement prior to arrival, terrorist attacks are their responsibility to deal with. So, what can be done? Roughly speaking landside threats of terrorist-related incidents could

www.worldsecurity-index.com

be: - Vehicle-Borne Improvised Explosive Devices (VBIEDs) in non-screened (public) areas; - Small Improvised Explosive Devices (IEDs) in non-screened (public) areas; - Suicide bomber in terminal public areas and - Shooting in screened and non-screened terminal areas. In some situations, we may have a combination of incidents – for example, suicide-bomber who is also an active shooter and so on. Airports should rely on risk based and proportionate security with holistic approach. The perfect security solutions should be passenger friendly and not very visible to non-security personnel. Unfortunately, many airports, backed by governments, go into opposite direction – we see high presence of military and law enforcement personnel who are heavily armed. With scenarios of active shooters and bombers we come again with a problem of remote checking of luggage. One solution, say security researchers, is to keep people moving, and scan them remotely as they pass through the building. Researchers are trying to build more nimble versions of some existing technologies, as well as entirely new ones. Meanwhile, we have to consider more advanced technology when identifying “dangerous” substances at the perimeter (explosives, arms, …) in combination with profiling and also develop on-the-go controls as well. It is quite possible that terrorists can to keep “low profile” at certain moment in time (e.g. when passing through the perimeter controls), but they might “relax” or “change the behaviour” beyond the perimeter control. Consistency of the declared aim and behaviour might be one of the parameters to think of. Technology for remotely detecting explosives will continue to be developed. Using it effectively will be another matter. Security personnel should be equipped not only with lethal weapons, but also various other non-lethal techniques that

World Security Report - 19


AIRPORT SECURITY

might be more appropriate when employed in the crowded space. After raising the security bar and equip personnel, consider also protection of passengers. What makes these attacks deadly and so harmful is the presence of crowds in open space. Zaventem had enormous negative impact which was caused by such factors as splinters and shock waves. The modern design of buildings has to done with various elements (e.g. check-in rows, etc.) in such as to “segment” the open space. This will prevent or, at least, minimize “cross-contamination” – injuries in one segment after an explosion in the other. Infrastructure and airport design features to mitigate the threat from attack should also increasingly be integrated in airport design. These can include: blast proofing; the use of materials to minimize damage such as shatterproof glass; bollards, flowerpots and other structures to prevent drive-in attacks. It is an urgent need for airport

20 - World Security Report

operators to build stronger relationships with national regulators. Collaboration with local or national authorities responsible for security of landside spaces is crucial; in many instances airports own the real estate landside, but the responsibility for public spaces lies with local law enforcement. Consider both active (perimeter and on-the-go controls) with passive architectural and design to minimize damaging effects of possible attacks (explosions, fire, chemical…) solutions might help us to save lives of passengers and make world more secure.

www.worldsecurity-index.com


ASSOCIATION UPDATE

Improving prevention, response, and recovery John Donlon Chairman International Association of CIP Professionals (IACIPP)

The threats we all face from terrorism continue and promise not to go away anytime in the near or even distant future. The dreadful 22nd May suicide attack by a British-born Libyan targeting predominantly young people at a concert in Manchester only emphasizes that nothing is beyond the realms of possibility in terms of what may happen, where, when or how. ‘This is further evidenced by the most recent horrific attack in the UK on 3rd June which resulted in a number of lives being lost and many injured. What would appear to be the random nature of attacks is only really matched by the uncertainty of future targets. Soft targets still appear to be the preferred choice but methodologies continue to change and we all have to be mindful that complacency is an open invitation to those who would seek to do us harm. Protection of Critical Infrastructure and Information remains a priority issue for states, in reaction to the growing risks posed by terrorism. All governments recognize now that terrorism is an enduring threat which requires a sustained and coordinated response. The need for a closer coordination between states, international organisations, public and private sectors to secure and improve prevention, response, and recovery continues to be subject of significant effort.

layered security regimes that have developed over time, it is weaknesses in some that will be easily identified through testing and reconnaissance and ultimately ruthlessly exploited by terrorists. The setting of threat levels provides some assistance and guidance to all in terms of understanding the current threat position that a country faces. Within the UK there are five levels of threat the highest of which is: CRITICAL- An attack is expected imminently. We saw this level announced after the Manchester bombing, the first time in over a decade that the UK has moved to a Critical level. It was then, within a few days, reduced back to SEVERE, where an attack is highly likely, once the police and the Security Services had a better understanding of the circumstances. Alongside the threat levels the UK Government Response Levels provide a general indication of the protective security measures that should be applied at any particular time. They are informed by the threat level, but also take into account specific assessments of vulnerability and risk. There are three levels of response EXCEPTIONAL, HEIGHTENED and NORMAL and these equate to threat levels and tend to relate to sites.

Who knows what the targets of tomorrow may be but we should assume that our infrastructure is continually considered from both a physical and cyber terrorism attack perspective. Therefore, the need for those with responsibility for our infrastructure, whether public or private and from both a protection and resilience perspective, have to be confident that they are as well prepared as they can be; that they are ready to respond should an incident occur and are able to recover from a crises situation. It is an unfortunate fact that in today’s uncertain world organisations and businesses need to be ‘crisis ready’ for an ever growing range of modern day threats. This was a subject of some debate at the recent Critical Infrastructure Protection and Resilience (CIPRE) conference held in The Hague in May, where it was recognised that notwithstanding the multi-

www.worldsecurity-index.com

At these times of uncertainty it is worth reminding ourselves of the correlation between the threat and response levels, and ensuring that within our organisations we clearly understand what needs to be done to improve prevention, response, and recovery.

World Security Report - 21


AGENCY NEWS

INTERPOL coordinating global law enforcement response to WannaCry ransomware attack

As part of its ongoing coordination of the global law enforcement response to the WannaCry ransomware attack, INTERPOL has hosted a virtual conference with affected countries. Immediately following the 12 May attack, information provided by UK authorities via the INTERPOL National Central Bureau (NCB) in Manchester outlining the key malware features and mitigating actions to be

taken was circulated to all 190 member countries via an INTERPOL Purple Notice.

exchange information and provide updates on their investigations.

The UK’s National Crime Agency also requested INTERPOL to coordinate and conduct an immediate survey of all member countries in order to establish the global impact of the WannaCry malware.

“We are still in the early stages of this globally significant, complex international investigation,” said Secretary General Jürgen Stock.

Responses from member countries detailing the actions they have taken are being collated and analysed by a critical incident cell established at the INTERPOL Global Complex for Innovation in Singapore, supported by specialists from its Cyber Fusion Centre. Today’s virtual meeting enabled specialists to

“It is essential the full scale and scope of the attack is established if we are to assist member countries deliver an effective response, and put measures in place to prevent future cyberattacks against critical infrastructures,” added Mr Stock. “Today’s meeting enabled specialists to directly exchange information and update each other on activities in the field which is essential to avoid duplication of efforts and save

precious time and resources. “INTERPOL is uniquely and ideally placed to ensure our member countries’ efforts in dealing with this attack are aligned. Attribution in cases such as this is complicated but vital and may take weeks, or even months, but we will work with police around the world until those responsible for this attack are identified and held to account,” concluded the INTERPOL Chief. A second Purple Notice issued by INTERPOL containing additional details on the malware provided by the private sector has also been sent to all NCBs for dissemination to national specialized cyber units.

27 Arrested in Successful Hit Against ATM Black Box Attacks

The efforts of a number of EU Member States and Norway, supported by Europol’s European Cybercrime Centre (EC3) and the Joint Cybercrime Action Taskforce (J-CAT), culminated in the arrest of 27 individuals linked with so-called ATM “Black Box” attacks across Europe. Perpetrators responsible for this new and sophisticated method of ATM jackpotting were identified in a number of countries over different periods of time in 2016 and 2017. There were arrests

in Czech Republic (3), Estonia (4), France (11), the Netherlands (2), Romania (2), Spain (2) and Norway (3). The ATM “Black Box” phenomenon first appeared in Western Europe in 2015, but most arrests took place in 2016 and 2017, with the most recent in Spain this month. “Black box” is a sort of ATM logical attack through connection of an unauthorised device (usually unknown Box or laptop) which sends dispenses

22 - World Security Report

commands directly to the ATM cash dispenser in order to “cash-out” the ATM. Criminals gain access to the ATM Top Box usually by drilling holes or melting in order to physically connect such device. The device can send relay commands that cause the ATM to dispense all cash. Therefore losses can be significant and counted in hundreds of thousands of Euros. This new Modus Operandi also demonstrates connections between illegal cash-outs due to cyber related techniques used in the background. Europol’s European Cybercrime Centre organised

4 operational meetings in 2016 and 2017 at its headquarters in The Hague to tackle this rising threat appropriately. Perpetrators involved in ATM Black Box attacks come mainly from countries such as Romania, Moldova, Russia and Ukraine. Some of the investigations are still ongoing and further arrests are expected in the near future. The EC3 Analysis Project (AP) Terminal, involved in the operational coordination of cases at the European level, cooperates also with the ATM industry in order to detect Black Box incidents properly.

www.worldsecurity-index.com


AGENCY NEWS

78th Incident Prevention and Response Mechanism meeting takes place in Ergneti On 7 June 2017, the 78th meeting under the Incident Prevention and Response Mechanism (IPRM) was held in Ergneti in an open and constructive atmosphere. Ambassador Ksstutis Jankauskas, Head of the European Union Monitoring Mission in Georgia (EUMM), and Ambassador Guenther Baechler, Special Representative of the OSCE Chairperson-in-Office for the South Caucasus, cofacilitated the proceedings. Ambassador Baechler opened the proceedings and Ambassador Jankauskas provided a short overall summary of events since the last meeting. These included the general security

situation, hotline activations and detention cases. It was noted that the number of detentions since the last meeting was higher compared to the previous month, but lower compared to the same period last year. The ongoing imprisonment of Giorgi Giunashvili was again discussed and further information was provided. The issue of several unannounced gatherings close to the Adminis­trative Boundary Line (ABL) was raised. The co-facilitators underlined the availability of the Hotline to inform – if possible, in advance – about such and similar visits or raise questions.

Following deliberations on the impact of borderisation on the lives of people residing along the ABL, Ambassador Jankauskas stressed the importance of a humanitarian approach. Additionall,y a five-day regional training course for 16 cybercrime and digital forensics investigators from Azerbaijan and Georgia focusing on using the Python programming language for the retrieval of digital evidence, started on 5 June 2017 in Tbilisi. It aims to give trainees a better understanding of software systems and advanced digital forensic tools, and practice developing their own Python

programmes for automating forensic processes and gathering open source intelligence. The course, which is organized by the OSCE Transnational Threats Departments Strategic Police Matters Unit with the support of Georgia’s Interior Ministry and its Police Academy, was preceded by a short e-learning component so that participants could learn or refresh their knowledge on the basics of the Python programming language and its main concepts.

CYBERPOL Estimates more than 4.6 billion email passwords breached CYBERPOL said, that IT estimates, that as many as 4.6 billion breached emails and passwords are “Out There” floating in the dark web, based on cyber breaches that surfaced from 2013 to date. IT warned, that cyber attacks are on the global raise, and that corporations needs to pay attention to avoid accountability by the rules of data protection out there. One of the largest such data breaches appeared during 2016 on the link thecthulhu. com that was later taken down by unknown sources almost one year later. The thecthulhu.com contained the worlds six largest data breached sets including

,Yahoo, LinkedIn and Myspace breaches.

infected, but not surfaced as yet.

Last month, the head of CyberPol Red SoC Principal Mr. Shehab Najjar, pointed out at the conference organized by the Kaspersky Lab in Vienna, in Austria, that the public is most likely venerable to “Randsomeware” today and that it very well forms part of a Cyber Terror risks today.

CyberPol urged that we need to realize a global QA (Quality Assurance) set of rules that forms part of an “International Cyber Identity Protocol” in order to enable an effective identification to mitigate any global cyber risks and threats to the global cyber infrastructure of tomorrow.

Such has proven correct, just one week later, the Randsomeware WannaCry infected an estimated 220 000 computers whilst as many as 1,8 Million computers, according to the statistical research, might already be

www.worldsecurity-index.com

IT said that most likely, few will sign up to any treaty proposed, but nobody can object to set of rules to abide by in such protocol in which, effectively will not influence any authority, but assist on enhancing their capability into effective cyber risk

management of mitigation on global scale. CyberPol released the first CyberBoK cyber set of rules identification the definition of cyber crime during 2015 which is today widely accepted by most cyber authorities and experts around the globe. CyberPol said IT will invite all parties who supports such “International Cyber Identity Protocol” for global stabilization on cyber risk mitigation and to join forces in the signature of such Protocol presently in preparation by its legal team. The date has not been set yet, but should be announced latest during 2018.

World Security Report - 23


PUBLIC SECURITY

www.cip-association.org

Join the Community and help make a difference Dear CIP professional I would like to invite you as an infrastructure operator or related government agency representative to join the International Association of Critical Infrastructure Protection Professionals a newly formed body that seeks to encourage the exchange of information and promote collaborative working internationally. As an Association we aim to deliver discussion and innovation – on many of the serious Infrastructure - Protection - Management and Security Issue challenges - facing both Industry and Governments. The ever changing and evolving nature of threats, whether natural through climate change or man made through terrorism activities, either physical or cyber, means there is a continual need to review and update policies, practices and technologies to meet these growing and changing demands. Our initial overall objectives are: • To develop a wider understanding of the challenges facing both industry and governments • To facilitate the exchange of appropriate infrastructure & information related information and to maximise networking opportunities • To promote good practice and innovation • To facilitate access to experts within the fields of both Infrastructure and Information protection and resilience • To create a centre of excellence, promoting close co-operation with key international partners • To extend our reach globally to develop wider membership that reflects the needs of all member countries and organisations For further details and to join, visit www.cip-association.org and be amongst the first to shape the future of this increasingly critical sector of national security. We look forward to welcoming you.

John Donlon QPM, FSI Chairman IACIPP


INDUSTRY NEWS

AUGGMED brings reality to the Virtual Reality training of first responders AUGGMED is a European Commission H2020 funded €5.5m, 36 month project, which aims to develop its serious game platform so that it can provide training for first responders. Now, two years into the project, AUGGMED is well on the path to showing how virtual and mixed reality training of first responders can be applied at a practical level. AUGGMED is linked up with the state-of-the-art evacuation and circulation simulation software tool EXODUS which models crowd behavior based on best available data. The developed system allows end users to assume a variety of roles within the simulation and to interact with a simulated crowd. In addition, AUGGMED implements mathematical models that describe the effects of fire hazards and explosions on people and infrastructure. Laurence Marzell, Serco’s Combined Effect Lead and Exploitation Manager for

on mixed rather than virtual reality, the reality of how Virtual and Mixed reality training of first responders in Europe and beyond is able to deliver real practical value and application to societal safety, security and resilience is being clearly demonstrated by the AUGGMED project.

AUGGMED, said: ““This multimodal VR and MR platform will be able to be used anywhere, via a variety of devices and technologies from smartphones and tablets to high-end PCs with multiple monitors and Head Mounted Displays. “With terrorism, natural disasters and man-made accidents continuing to be a major threat to life and infrastructure around the globe, it is becoming increasingly challenging for first responders to predict, prepare and respond against attacks or disasters. In the past training for these has

used traditional live scenarios through full-scale exercises. But with their increasing cost, time constraints and inability to fully replicate real world life threatening incidents, VR and MR training (such as that being developed by AUGGMED) significantly reduces the major cost and time resources of these traditional methods whilst at the same time increasing the frequency and availability of training opportunities.” With two pilots of the AUGGMED system successful completed and a further one planned for Greece in early 2018, based

Under the coordination of BMT Group Ltd, AUGGMED is a consortium of 14 project partners from six EU countries. Partners include: Serco; University of Greenwich; Piraeus Port Authority; Ferrocarrils de la Generalitat de Catalunya; University of Birmingham; GEOMOBILE; Sistema D’Emergencies Mediques; Police and Crime Commissioner for West Yorkshire; CENTRIC at Sheffield Hallam University; Israteam; Konstantinos Kardaras (Integration Power); Ministry of Citizens Protection and Unversidad Politécnica de Madrid.

EFAFLEX have established a separate division within the Munich based business to specifically focus on ballistic protected and anti- burglary high- speed doors Rainer Daniel, Head of Ballistic Protection and former special force explained, ‘We are considered as global pioneers within the highspeed door industry. This latest development and the formation of the EFAPROTECT enables us to enter a highly specialised market. We have designed the world’s first multi- hit resistant shutter which is ballistic protected up to cal. 5,56 x 45, 7,61 x 51 and

www.worldsecurity-index.com

7,62 x 39.’ He went on to add, ‘EFAFLEX doors are installed around the globe. The brand is synonymous with premium quality and precision engineering. We have taken that expertise, and used that knowledge. Not only is EFAPROTECT burglar resistant up to RC4 but it has exceptional opening and closing door blade speeds of up to 2 metres per second. As you can imagine, speed is of the essence under high threat

security related situations.’ EFAPROTECT combine maximum operating speeds, ballistic protection and functional security and will be available in a variety of protection classes, which are certified according to country specific guidelines. The highspeed shutters will feature EFAFLEX’s unique patented spiral design which is virtually wear free for reduced maintenance and extremely quiet.

World Security Report - 25


INDUSTRY NEWS

Northwest Florida Beaches International Airport (ECP) has installed DeTect DroneWatcher™ drone detection and defense system DeTect is a local technology-based firm with several projects that enhance aviation security and safety. Drone incursions into controlled airspace around airports has emerged as a major security and flight safety risk over the past few years and DeTect’s DroneWatcher™ system provides the highest level of detection and control available. “We are excited about our partnership with DeTect and its drone detection technology,” said Parker W. McClellan, Jr., airport Executive Director. “The safety of our airport, community and visitors is paramount and with the DroneWatcher™ system installed at ECP, we are able to detect drones on or in the vicinity of the airport and take actions to ensure the safety of

and defense solution consisting of three technologies that can operate independently or together to provide complete, multi-layer security,” DeTect’s President and CEO Gary Andrews said. “ECP is one of the first airports in the US to install a comprehensive drone detection system.”

arriving and departing aircraft. When fully implemented the system will include DeTect’s DroneWatcher RF (radiofrequency), APP (smartphone application) and DSR (drone surveillance radar) technologies to provide multi-layer drone detection and defense for the airport. The Phase 1 installation and

commissioning completed to date includes a DroneWatcher RF sensor on the airport control tower and deployment of multiple. DroneWatcher APP enabled smartphones that will be used by airport police as roving drone detectors. “DroneWatcher is a unique drone/small UAV detection

Over the next month, a DroneWatcher DSR will be installed on the airport to provide a third layer of drone detection and defense. The DSR will additionally function as a bird radar providing real-time birdaircraft strike risk alerts to airport flight safety managers. Drone incursion alerts and birdstrike risk alerts will be provided to airport users via custom, real-time web displays and through automated text messaging.

Safety and Security Must Come First When It Comes to Prison Work Release Programs In many parts of the US, work release programs are seen as a vital tool in rehabilitating inmates in the weeks and months prior to their release back into normal society. Under these programmes selected inmates can leave prison to do paid work in the community during the last months of their confinement. Inmates must return to custody at the end of each working day. It teaches them about the managing in the work place, normal social interaction, time keeping, paying bills, rent etc. But work release

programmes are a double-edged sword. Access to the outside world can mean access to temptation, and that may mean drug addiction and drug smuggling. According to a recent report in the West Fargo Pioneer: The work release program at the Cass County Jail remains off limits to inmates after Cass County Sheriff Paul Laney put the program on hold for about a year ago because of inmates smuggling drugs into the facility in their body cavities. “The problem is,” he said, “in the last couple years

26 - World Security Report

we started seeing a huge rise in the amount of narcotics being trafficked into the facility by work release personnel.” Like many other officers Sheriff Laney is a supporter of work release programmes but officials must balance the safety and security of inmates and the public against the benefits of rehabilitation programmes. One death from an overdose in prison that can be attributed to drugs possibly smuggled in by a work release inmate, is enough to justify putting these vital programmes on hold.

Right across the US, corrections facilities are turning to Full Body X-Ray Scanners to plug this gap. Jan Steven van Wingerden, Managing Director of ODSecurity said “We are currently installing around two Soter RS scanners per week in correctional facilities and county jails across the US. Users tell us that they are amazed at what this technology can do. The Soter RS is based on the use of a very narrow co-limited x-ray beam and the exposure dose absorbed is lower than 2 µS making it perfectly safe. “

www.worldsecurity-index.com


INDUSTRY NEWS

Surveon Maintains a Safer Environment for Passengers with Reliable Transportation Solutions Being in the generation of global village, people usually travel between cities and countries, and the security of transportation has become one of the main issues to deal with under certain circumstances. Transportation needs to provide a safe and secure environment and stay one step ahead of vandalism to protect passengers from potential threats. The challenges of transferring and managing mass amounts of information from vehicles or stations to the operations control center often entail strenuous effort for system integrators. To help integrators work on the system, Surveon offers reliable transportation solutions, including compact cameras and enterprise VMS with video analytics, ensuring proper actions can be taken in time to secure the safety of passengers. Transportation projects

require the solutions to provide sufficient reliability for long-term operations. Besides, the cameras have to support shock proof and provide clear images, regardless of different kinds of lighting environments for applications. Surveon compact series camera provides excellent megapixel image quality with low light performance and WDR, and allows users to adjust the shooting angle with equipped 2-axis, protecting passengers and vehicles from any threats. Among Surveon camera selection, 2MP

compact dome CAM1320S2 with built-in MIC and 2-axis support, 2MP compact bullet camera CAM3361LV with SONY Exmor sensor and vari-focal lens could be the options in such applications. As the operation control center needs to access information from different vehicles such as bus and train, the solutions of transportation require advanced centralized management to ensure smooth operation. Surveon enterprise VMS with smart search and playback enables the operation control center

to search and export large quantities of recorded video to deal with critical situations in a very short time. Besides, the real-time video analytics like Virtual Fence can be used as an active alarm, ensuring rapid action can be taken to protect passengers from potential accidents, such as crossing over the waiting line. In addition, Surveon Control Center (SCC) supports hundreds of channels in an hierarchical system architecture, offering rich services including camera control, live monitoring, recording, and alarm handling to keep every detail under control. Its remote viewing allows security guards to manage surveillance anywhere, preventing suspicious person or potential threats to safeguard the passengers on public transportation.

Quantum Technology Science’s Vector Series intrusion detection system is now available for Milestone VMS users upgrading to XProtect 2017 R1 Vector directly integrates into the Milestone VMS XProtect Alarm Manager console to provide advanced alert messaging and initiate deterrence devices and slewing of cameras to the point of the intrusion. Immediately available for new customers, or as a seamless upgrade without a software update required from Quantum, simple integration eases installation or upgrading from 2016 R3

editions. It uses the existing configuration files to easily upgrade with minimal configuration changes to minimize any gaps in security

www.worldsecurity-index.com

awareness during the transition. A Smart Client enhancement, Quantum’s Vector Series perimeter intrusion detection system detects, classifies and alerts to threats beyond line-of-sight detection to include pedestrians, vehicles and gunshots. “The power of Vector series lies in its ability to

detect and classify intrusion without visual line of sight. With integrations to trusted VMS solutions such as Milestone XProtect, we’re excited to be driving earlier warning with actionable intelligence, where threats can be identified and more effectively deterred or neutralized before doing harm,” remarked Kevin Mikalsen, director of product marketing, with Quantum Technology Sciences, Inc.

World Security Report - 27


INDUSTRY NEWS

Soliton Systems, the lead manufacturer of mobile video streaming solutions for Public Safety applications, have announced a partnership with Milestone Systems, the global leader in IP video management software (VMS) for video surveillance solutions Soliton Systems is a Japanese technology company that manufactures solutions for the Public Safety market, for live streaming video over the 3G and 4G LTE network. They have the Smart telecaster range of products that can be utilised for real-time video from a remote situation via body worn or other types of mobile video cameras. Soliton´s Smart telecaster product works with a range of different cameras that can be placed in moving vehicles such as ambulances, fire trucks, police cars, motorcycles and helicopters, and can live stream at speed, or from a static location such as a remotely place video surveillance van. The light weight units can be carried on a person allowing streaming from body worn cameras for applications such as facial recognition. In addition, software can be downloaded from the App Store that allows live streaming direct from a smartphone back to a command centre inclusive of GPS information. Milestone System are the leading VMS solution provider and have many global customers remotely

managing surveillance cameras with an array of management functionality. Mogens Jensen, the Managing Director of Soliton Systems Europe comments “It is a great privilege for Soliton to work with Milestone. Many of our Public Safety and emergency service customers already have Milestone so by partnering, this will allow them to manage their mobile video feeds from a central management console from the leading manufacturer of VMS solutions.” The Smart telecaster range of products utilises H.265 encoding technology that efficiently compresses realtime video for streaming over

28 - World Security Report

multiple 3G and 4G mobile networks simultaneously. As it is the next generation of H.265, as oppose to H.264, it can successfully operate even when mobile signal becomes weak to provide reliable high quality video. Henrik Sydbo Hansen, Group Manager of Devices & Integrations at Milestone Systems commented further. “Many of our integrations to date have been from static type cameras. Given Soliton’s strength in live streaming from a mobile device, we see this as a natural extension of our own offering and something that many of our clients have been requesting.” With Milestone’s open

platform architecture, users have an array of management functions allowing for a more efficient administration from a mix of different IP video surveillance and CCTV cameras. It allows cameras to be remotely managed and can include continued or selective video streaming that can be event or alarm based, maps of locations, and securing video for law enforcement and for storing for evidence. Milestones certification plan allows for third party systems and devices within the video surveillance eco system to be integrated to guarantee interoperability allowing for customers to take advantage of innovative and new technology as they come to market. Sydbo Hansen continues “Soliton’s H265 technology which is in line with our roadmap, and their commitment to ONVIF, a standard for video surveillance, gives us a synergy that not only works now, but provides an innovative road-map in an industy that is constantly evolving. We look forward to a successful and long partnership.”

www.worldsecurity-index.com


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a quarterly electronic, fully accessible e-news service distributed to over 40,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

www.worldsecurity-index.com

World Security Report - 29


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 50,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Border Security Report

Border Security Report is the bimonthly border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over16,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 30 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

June 2017

20-22 IFSEC London, UK www.ifsec.events/international/

July 2017

4-6 INTEPOL World Singapore www.interpol-world.com 26-28 Security Exhibition & Conference Sydney 2017 Sydney, Australia www.securityexpo.com.au

August 2017

8 Cyber Security Summit: Chicago Chicago, USA www.cybersummitusa.com/2017-chicago

September 2017

6-8 IFSEC Southeast Asia 2017 Kuala Lumpur, Malaysia www.ifsec.events/sea 7-9 CEDIA Expo 2017 San Diego, USA www.expo.cedia.net 12-15 Defence and Security Equipment International 2017 London, UK www.dsei.co.uk

To have your event listed please email details to the editor tony.kingham@knmmedia.com

25-28 ASIS 2017 Dallas, USA securityexpo.asisonline.org 27-28 SecurityUser Expo 2017 Copenhagen, Denmark www.securityuser.com

December 2017

5-7 Critical Infrastructure Protection & Resilience North America Orlando, Florida, USA www.ciprna-expo.com

March 2018

20-22 World Border Security Congress Madrid, Spain www.world-border-congress.com

14-17 ISAF Security Istanbul, Turkey www.isaffuari.com

31 - World Security Report

www.worldsecurity-index.com


An OSI Systems Company

Highly Trained People are a Critical Requirement for Effective Border Screening Operations Border security initiatives are better served when the people whom are responsible for the processes are highly trained. S2 Global provides border security training for governments and entities looking to maximize the potential of their personnel.

For more information contact Gary Heffner, Director of Training gheffner@screeningsolution.com +1 954-779-7102 www.screeningsolution.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.