World Security Report Sep Oct 2017

Page 1

Official Magazine of

SEPTEMBER / OCTOBER 2017 www.worldsecurity-index.com

FEATURE: Exhibition and Terror - the need for a new security concept PAGE 8

FEATURE: Fighting back - the strength of modern e-learning PAGE 14

FEATURE: In cloud computing, more data loss on the horizon PAGE 16

COVER STORY Protecting Critical Infrastructure


December 5-7, 2017

Kennedy Space Center Florida www.ciprna-expo.com

Online Registration Now Open

ONLINE REGISTRATION NOW OPEN www.ciprna-expo.com for further details

Early Bird Deadline: November 5th, 2017 Register online at www.ciprna-expo.com/onlinereg

Current confirmed speakers include:

The Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety.

• Matt Conner, Chief Information Security Officer, National Geo-Spacial Intelligence Agency

• Bryan Koon, Director, Florida Division of Emergency Management

Critical Infrastructure Protection and Resilience Americas brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing North America’s critical infrastructure. Conference Topics Announced An exciting range of topics have been announced for the conference program to include discussions: Developing Greater Resilience in CNI; PPP & Collaboration in CIP and CIIP; Emerging Threats on CNI; Cyber Security Legislation, Best Practice & Standards; Standards and Best Practice in CIP and Resilience; Cybersecurity Threats and Trends; Enhancing Preparedness and Response Capabilities; Cyber Defence Strategies for CII; Technologies to Detect and Protect; Cyber Techniques and Technologies to Detect, Prevent and Protect; Critical Infrastructure Interdependencies Join us in Orlando, Florida for the premier event for operators and government establishments tasked with the regions Critical Infrastructure Protection and Resilience. For further details and conference fees visit www.ciprna-expo.com To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Americas please contact: Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700

Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +31 (0) 6 1609 2153

Paul Gloc (UK and Rest of World) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

• Joseph Wassel, Director, C4 Resilience & Mission Assurance, US Department of Defence • David Fortino, Regional Continuity Manager, Federal Emergency Management Agency (FEMA) • Fred Ruonavar, Chief of DISA/DODIN Critical Infrastructure Program • Senior Representative, Office of Infrastructure Protection, U.S. Department of Homeland Security • Michael Lowder, Director – Office of Intelligence, Security & Emergency Response, US Dept of Transportation • Frederic Petit, Research Scientist, Argonne National Laboratory & Regional Director, International Association of CIP Professionals • Victoria Sherazi, Project Lead “Mitigating Risks in the Innovation Economy”, World Economic Forum • Stacey Stanchfield, Lead Cybersecurity Engineer, MITRE • Nathaniel Evans, Cyber Operations, Analysis and Research Lead, Argonne National Laboratory • Adrian Fielding, Business Leader – Telecoms and Security Integration, Honeywell • Andrea Chiappetta, Professor of Geopolitics, Marconi International University

Leading the debate for securing Amercia’s critical infrastructure Owned & Organised by:

2 - World Security Report

Supporting Organisations:

Media Partners:

www.worldsecurity-index.com


www.worldsecurity-index.com Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk

Mass murder, active shooters and gun control?

Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk

The terrible events in Las Vegas in which 58 people were killed and hundreds hurt has once again sparked a vociferous debate within the US on gun control.

Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 100,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, armed and security forces and civilian services and looks at how they are dealing with them. It is a prime source of online information and analysis on security, counterterrorism, international affairs, warfare and defence.

Not surprising given that the number of mass shooting incidents is on the rise, the 17 mostly deadly have occurred in the last 10 years. But active shooter incidents are just part of the story. Gun crime in the US is also on the rise. As I write the number of people killed with firearms so far in 2017 is 11,979 (statistics www. gunviolencearchive.org) and there has been 278 incidents of mass shootings already (more than 4 people shot). So why? Well one obvious conclusion is that guns are so freely available. There are more guns in civilian hands in the US than any other country on earth, by some considerable margin. The Yemen is in second in terms of civilian gun ownership and is forth in table of mass shootings.

Copyright of KNM Media and Torch Marketing.

www.ciprna-expo.com

It is always difficult to draw conclusions from statistics like these because you are not always comparing like with like. However, it is hard not to see a direct correlation between gun ownership and the number of gun related incidents. One of the chief arguments that you hear when discussing guns with gun owners is that “guns don’t kill people, people do” which is one of those glib, bumper sticker remarks that are made people who are struggling to come up with a more plausible argument. It is meant to mean that proper vetting and training should prevent unsuitable people owning guns. But the reality is you can’t vet people for problems they haven’t yet had or for that ‘moment of madness’, jealousy or uncontrollable rage. In the US every year 42.5 million American adults (or 18.2 percent of the total adult population in the United States) will suffer from some mental illness, with such conditions as depression, bipolar disorder or schizophrenia. Many of these sufferers would have started with undiagnosed and unreported conditions. How many of these people owned guns?

www.world-border-congress.com

www.cip-asia.com

The simple truth is that there are now so many guns in private hands in the US that there is no practical way take all the guns out of circulation. Even if all registered guns were banned tomorrow, what then of the estimated 250-280 million illegal guns in criminal hands. It would be the law-abiding citizens that would be the ones disarmed and they would say left defenceless. This is a debate for US citizens alone, but if I lived in the US, I would own a gun! Tony Kingham Editor

www.cipre-expo.com

READ THE FULL VERSION The full version of World Security Report is available as a digital download at www.torchmarketing.co.uk/WSROct17


INFRASTRUCTURE SECURITY

Protecting Critical Infrastructure

In February this year, the UN Security Council (UNSC) urged joint measures to protect ‘critical infrastructure’ from terrorist attacks. Given the importance of critical infrastructure for a country’s prosperity and security and against the backdrop of increasingly diverse physical and cyber threats from terrorist groups, the United Nations Security Council underlined the need for international collaboration, both domestically and across borders to ensure their protection. In a resolution adopted unanimously, the 15-member Council reiterated “the need to strengthen efforts to improve security and protection of particularly vulnerable targets, such as infrastructure and public places.” Attacks against objects and sectors such as banking and finance, telecommunications, emergency services, air, maritime and rail transportation, and energy and water supply – perceived as ‘attractive targets’ for terrorist groups, can result not only in civilian casualties, but also damage property on a large scale,

4 - World Security Report

disrupt proper functioning of public services, and create chaos in societies. Such attacks may also cause widespread environmental damage, as well as significantly undermine national defence capabilities. It called upon UN Member States “to share information […] to prevent, protect, mitigate, investigate, respond to and recover from damage from terrorist attacks on critical infrastructure facilities, including through joint training, and use or establishment of relevant communication or emergency warning networks.” The UNSC also highlighted INTERPOL’s global role in providing capacity-building and technical assistance to protect critical infrastructure from terrorists. INTERPOL Secretary General Jürgen Stock said the interdependence of infrastructure across sectors and industries, between cyber and physical

areas, and across national boundaries, means that the consequences of an attack could be far-reaching. “One attack on a single point of failure could disrupt or destroy multiple vital systems in the country directly affected, causing a ripple effect worldwide. This creates an appealing target to those intending to harm us. As our cities and infrastructure evolve, so do the weapons of terrorists,” said Secretary General Stock. “Conflict zone tactics – such as simultaneous active shooter events, armoured vehicle-borne improvised explosive devices (VBIED’s) or portable Unmanned Aerial Systems (Drone’s) with explosive payloads – can be honed for use in our city streets and against key facilities. “Law enforcement is keenly aware of a tragic paradox: a terrorist incident is often among the best opportunity for learning and improving. Sharing these lessons across borders means reaping

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

Well let’s look at some of those highlighted by Secretary General Stock. One of the most worrying developments in recent years from a security perspective, is the proliferation of drones. Drones are everywhere and are set to become a part of everyday life. Highly capable drones can already be bought through retail outlets and specialist drones with much greater capability can be bought direct from manufacturers, but still very easily and usually unlicensed. the benefits, without paying that cost. It’s a win-win scenario,” concluded the INTERPOL Chief. Subsequently the issue hit the headlines again when the UK government issued a warning to Britain’s airports and nuclear power stations to tighten their defences against terrorist attacks in the face of increased threats. So why, when ISIS and Al Qaeda are increasingly mounting and calling for low-tech attacks on soft targets such as we have seen at public gatherings in Paris, Nice, Berlin, London and elsewhere, should we be concerned about attacks on critical national infrastructure (CNI). After all low-tech attacks on soft targets are difficult to detect and stop, can be carried out by so called lone wolf attackers, require little or no technical skill or support from an established terrorist network. And it would seem attract just as much publicity as attacks on airports and other CNI. So it would seem like a winning formula for terrorists. Well the simple answer is that whilst low-tech attacks attract publicity and cause terror, the effects are largely localised and don’t cause the wide spread disruption to the normal everyday lives of the vast majority of citizens. ISIS and Al Qaeda especially, still hanker after that world changing ‘spectacular’ like 9/11 that will, they believe, show that they are still able to strike the sort of massive blow that can cause mass casualties, disrupt economies and lives in a way that only an attack on critical infrastructure is likely to produce. Whether it is a dirty bomb at a port, an attack on a nuclear power station or the biological contamination of the water supply, critical infrastructure offers terrorists the sort of impact they crave. So how do we protect our CNI? One of the key challenges facing us is the sheer number of potential targets and the fact that most are not operated by government bodies but by commercial organisations. Many of these organisations also operate across national borders, which further complicates managing national jurisdictions and legislative governance. Which is why the sort of co-operative PPP approach led by an international organisation like Interpol is so important! So, what are the threats and how do we counter them?

www.worldsecurity-index.com

The capability of drones is also growing rapidly. Drones like the Freefly Alta 8 has a payload of up to 9kg, a control range of 2km and a flight duration time of 16 minutes and can be bought on Amazon. The DJI Agras MG-1 has a payload of 10kg, a control range of 1km and a flight duration of 24 minutes. The Amazon delivery drone, currently under development, is planned to carry a payload of 25kg. It is inevitable that civilian drones will be used as precision guided bombs to attack CNI targets at some point in the future, and in this scenario the fences, ground sensors and guards around our CNI are effectively rendered useless. Single drones or even swarms of drones may be used to strategically place explosives in attacks on fuel facilities, power generation and chemical manufacturing or storage facilities, causing damage and devastation massively disproportionate to the size of the explosive employed. More frightening still is the potential for an attack on nuclear plant. It is said the nuclear facilities are built to withstand a direct hit from a commercial jetliner, but it is not inconceivable that single or multiple drones could target the cooling or power systems that keep the facility functioning safely. So how do we stop them? Well, where there is a problem there is a solution and industry has been working hard to develop technologies to counter the threat. One of the first operational systems on the market was the Blighter AUDS

World Security Report - 5


INFRASTRUCTURE SECURITY

Counter-drone System becoming the first to achieve TRL-9 status following successful deployment with U.S. Forces. AUDS uses electronic scanning radar to detect a drone six miles (10km) away, track it using infrared and daylight cameras and advanced video tracking software before disrupting the flight using a non-kinetic inhibitor to block the radio signals that control it. Another technology approach is by DroneTech in Australia. Their DroneShield uses a patent-pending acoustic detection technology that they say can sense drones that are invisible to radar or that lack radiofrequency links. Sensors recognize unique sound properties of common UAS types. They listen to surrounding activity and take a sound sample when they sense drone activity nearby. If it finds a match, the system issues an alert and records identifying information about the aircraft. Once detected, for interdiction they offer a tactical drone jammer called the DroneGun, which is rifle shaped equipment with a back pack, which they claim has a range of 2km and allows the operator to perform a controlled vertical landing of the drone. Probably more interesting for the CNI environment, they are developing DroneSentry, which combines DroneShield Long Range Sensing and RF and/or GPS jamming technologies to create a combined effective detection and countermeasure. DroneSentry system is programmed to detect and respond to drone threats autonomously. The unit has an effective range of up to 1km across a 90° arc so four units would be needed to defend a 360° perimeter with a 1km radius.

One of the other threats highlighted by Secretary General Stock is the Vehicle Borne Improvised Explosive Device (VBIED) or truck bomb. This is still a favourite weapon of the terrorist. Why, because you can move large quantities of explosives direct to the target undetected, and once there, they are very difficult to stop. From the Beirut truck bombs in 1983 which killed 220 French and US military to Ankara car bombing last December and more recently in Bagdad, the carnage and loss of life caused by VBIED’s goes on and on. You don’t need much imagination to envisage the damage one of these weapons could do to a nuclear power station or an oil refinery like Buncefield in the UK or chemical plant like Bhopal in India. Pick the right target and in effect you create a dirty bomb, causing damage and widespread contamination. So, what’s the answer? Well one answer is offered by UK company e2v who produce the RF Safe Stop. Activated when a vehicle fails to stop or triggered by security staff, it uses similar technology to the AUDS system. It transmits a non-lethal microwave energy pulsed beam which couples into the vehicle’s electronic systems to confuse the engine management system, temporarily deactivating the engine. It works on cars, trucks, motorbikes and even boats. RF Safe Stop is already operationally deployed at a number of CNI sites. However, solve one problem and you create another. How do you integrate multiple systems from multiple manufacturers, including CCTV, thermal image camera’s, advanced electro-optics, motion sensors, IR sensors, microwave sensors, radar, sonar, acoustic, the list goes on, into one effective security system? To address this problem Monaco based company, MARSS have developed the NiDAR system. Developed over 10 years of collaboration with the European Union, European defence agencies,

6 - World Security Report

NATO and academia, NiDAR is a non-platform specific command and control system for protecting high value maritime and land-based assets such as critical infrastructure. Through the integration of multiple sensor and data feeds it will generate a 360° perimeter security shield around any asset. Rob Balloch, Strategy, Sales and Marketing Director at MARSS said: “We talk to customers, almost on a daily basis, who believed they had bought an integrated system but in-fact they find themselves with radars that don’t talk to the camera’s, camera’s that don’t talk to the sensors and they end up with a command and control system with multiple displays and multiple functionality that they don’t understand and they haven’t been properly trained on. NiDAR is platform agnostic, it can handle an almost unlimited number of sensors working on virtually any known operating platform made by any manufacturer. The real beauty of NiDAR is that anyone who can operate an iPad or an iPhone can run their entire system from a single tablet via a userfriendly touch screen experience. It provides total integration of all their sensors generating a single tactical picture on a single display. Using an advanced algorithm, the system will automatically build alarm and warning zones, intelligently detect, classify and respond to multiple air, surface and underwater objects determining potential threat levels whilst allowing for the legitimate movement of regular traffic. Enabling the user to sit back and monitor the system and it can even be operated and monitored remotely.” What is clear is that we are locked in a perpetual technological battle to protect ourselves from a relentless and ruthless enemy. There will be attacks on our CNI, how and when we can’t say. But where there is a discernible threat we must do everything we can to be ready for it, because when it comes to CNI, the cost of failure could be catastrophic!

www.worldsecurity-index.com


INFRASTRUCTURE SECURITY

NIAC Warns That United States is “Falling Short” in Defending Critical Infrastructure The President’s National Infrastructure Advisory Council (NIAC) is composed of senior executives from industry and State and local government who own and operate essential critical infrastructure. In August, the NIAC issued a draft report assessing the U.S.’s cyber preparedness related to critical infrastructure. The report called Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure, concluded that “The U.S. government and private sector collectively have the tremendous cyber capabilities and resources needed to defend critical private systems from aggressive cyber-attack, provided they are properly organized, harnessed, and focused. Today, we’re falling short.”. The challenges the NIAC identified are well-known and reflected in study after study. There is a narrow and fleeting window of opportunity before a watershed, 9/11-level cyberattack to organize effectively and take bold action. The report called on the Administration to use this moment of foresight to take bold, decisive actions: Establish SEPARATE, SECURE COMMUNICATIONS NETWORKS specifically designated for the most critical cyber networks, including “dark fibre” networks for critical control system traffic and reserved spectrum for backup communications during emergencies. FACILITATE A PRIVATE-SECTORLED PILOT OF MACHINE-TOMACHINE INFORMATION SHARING TECHNOLOGIES, led by the Electricity and Financial Services Sectors, to test public-private and

www.worldsecurity-index.com

company-to-company information sharing of cyber threats at network speed. Identify best-in-class SCANNING TOOLS AND ASSESSMENT PRACTICES, and work with owners and operators of the most critical networks to scan and sanitize their systems on a voluntary basis. Strengthen the capabilities of TODAY’S CYBER WORKFORCE by sponsoring a public-private expert exchange program. Establish a set of LIMITED TIME, OUTCOME-BASED MARKET INCENTIVES that encourage owners and operators to upgrade cyber infrastructure, invest in state-of-theart technologies, and meet industry standards or best practices. Streamline and significantly expedite the SECURITY CLEARANCE PROCESS for owners of the nation’s most critical cyber assets, and expedite the siting, availability, and access of Sensitive Compartmented Information Facilities (SCIFs) to ensure cleared owners and operators can access secure facilities within one hour of a major threat or incident. Establish clear protocols to RAPIDLY DECLASSIFY CYBER THREAT INFORMATION and proactively share it with owners and operators of critical infrastructure, whose actions may provide the nation’s front line of defence against major cyber-attacks.

PILOT AN OPERATIONAL TASK FORCE OF EXPERTS IN GOVERNMENT AND THE ELECTRICITY, FINANCE, AND COMMUNICATIONS INDUSTRIES led by the executives who can direct priorities and marshal resources - to take decisive action on the nation’s top cyber needs with the speed and agility required by escalating cyber threats. USE THE NATIONAL-LEVEL GRIDEX IV EXERCISE (NOVEMBER 2017) TO TEST the detailed execution of Federal authorities and capabilities during a cyber incident, and identify and assign agency-specific recommendations to coordinate and clarify the Federal Government’s unclear response actions. Establish an OPTIMUM CYBERSECURITY GOVERNANCE APPROACH to direct and coordinate the cyber defence of the nation, aligning resources and marshalling expertise from across Federal agencies. Task the National Security Advisor to review the recommendations included in this report and within six months CONVENE A MEETING OF SENIOR GOVERNMENT OFFICIALS to address barriers to implementation and identify immediate next steps to move forward. This report is a warning not just for the USA CIP community but should act as a rallying call for CIP professionals anywhere in the world!

World Security Report - 7


EVENT SECURITY

Exhibition and Terror - the need for a new security concept

We allow ourselves to say that today, no exhibition anywhere in the world is immune from terrorist attack. One can confidently make such an all-inclusive statement, as the protection of exhibitions from terrorist attack is accorded no definition whatsoever in the concept of exhibition organizers and exhibition centers the world over. In the absence of a definition, it follows as a matter of course that no action is taken… until the first attack. When that occurs, the world of exhibitions switches to ‘panic mode’, and everyone is prepared to do ‘anything’ to prevent the recurrence of such an event. One does not need to be a psychic in order to predict that if this is done, the security measures would be piecemeal, undertaken on a ‘patchwork’ basis without a structured security concept capable of identifying and preventing terrorist activity at exhibitions. Although we said ‘prevent’, the intention is ‘minimize’. This, because it is known and agreed that in the absence of advance intelligence information, it is difficult and almost impossible, to prevent terrorist attack. It is possible, however, to nip it in the bud and minimize the damage. The extent of damage is a major factor in the impact of the terrorist attack: The greater the damage, the greater and more prolonged effect it will have on the habits, work and consumption of larger segments of the public. This emphasizes the critical importance of the actions of the security system. Could Exhibitions be the next target of Terrorism? Every security system in the world prepares itself for the

8 - World Security Report

moment it is put to test. The differences in results lie in the level of performance and capability. However, one thing is completely certain – a place or organization without a security system ready for action, will be able to provide no response at all. Moreover, the world of exhibitions is defined as a “soft underbelly”. While governments respond by securing airports, major facilities and other strategic elements of infrastructure, terrorists might shift their focus to the so-called “soft targets”. Unless the exhibition organizers all over the world aggressively move to keep in step with this threat, they will, paradoxically, become more vulnerable to attack. Consider, for example, the recent incident in Paris, both in Charlie Hebdo and the kosher food supermarket. No antiterrorism force could have foreseen what was going through the mind of the lone terrorist who decided to go on the rampage. Remember the attempt to execute a terror action in the Los Angeles airport LAX, some years ago against El Al passengers. It could not be avoided but El Al Security, as part of its basic concept, was ready to quickly overcome the terrorist and minimize the damage. Think for a moment how vast this tragedy could have been had the

www.worldsecurity-index.com


EVENT SECURITY

understand the far-reaching effects of actions that focus on soft targets: the psychological trauma and economic consequences of such attacks made them particularly attractive to these organizations.

terrorist not been rapidly eliminated, and the attack had claimed more victims. LAX and other airports are “easy” targets, as regards impact, compared to exhibition centers. People will continue to fly even after attacks on aviation, for the simple reason that flying cannot be avoided. But is visiting exhibitions an unavoidable imperative, if such venues are under terrorist threat? Definitely not! In other words, the world of exhibitions could sustain a fatal blow if visitors avoid them because they do not feel safe there. The world will keep on going even without exhibitions. This, of course, must be prevented, and it is essential that the necessary preparations be made before the first incident occurs. The effect of modernization and globalization on terrorist organizations Today’s face of terrorism is the cumulative outcome of three developments:

But if prior to New York’s September 11th or the Paris September 11th, each attack brought with it damage to the local country or community, today, we are faced with altogether altered circumstances. The terrorist organizations, using the power of the global media, realized that events that occur only in far-off countries have less impact than an attack taking place on our very doorstep. The resultant jitteriness means that with each successful terrorist attack, in which innocent civilians are killed, millions of people become more and more convinced that the safest course is to stay put. This applies to organizations as well as to individuals: witness the influence on the wholesale cancellation of conferences and conventions since the events of September 11th. Imagine what would be the influence on the French exhibition and conference industry, if instead of Charlie Abdo headquarter, if the terrorists would choose one of Paris’s exhibition centers? It should be noted here that these remarks refer only to means and methods, and do not pertain to the motives and habitats of terrorism.

• First, trends in technological innovation, combined with the widespread availability of know-how through the Internet and other channels, make it easy for terrorist organizations both large and small to acquire the wherewithal for terrorist attacks.

Why Exhibitions?

• Second, the globalization of democratic norms over the past half-century has had the concomitant effect of enabling would-be terrorists to move freely across national boundaries and establish bases of operation throughout the world.

• International exhibitions are venues where influential persons from all over the world gather together, and therefore the impact of the terror attack is not limited to the location where it takes place.

• Finally, the information revolution and with it, the emergence of “instant news” has served to greatly magnify the impact of any terrorist action. (The harrowing pictures of the September 11th attack, broadcast on the world’s media within minutes of the event, produced an almost instantaneous decline in the aviation industry). In the 90’s organizations espousing terrorism began to

www.worldsecurity-index.com

International exhibitions are a highly important potential venue for terrorist attack. Why?

For example, in Los Angeles, despite the limited scope of the incident itself, its international impact was widespread, extending to three countries: the US, Israel, and Egypt (the terrorist was Egyptian). Take a moment to

World Security Report - 9


EVENT SECURITY

consider how far the impact would have spread had the number of casualties been larger, and if the victims had been from several different countries. One must understand that, as in the wellknown saying from the world of advertising, which also applies to terrorism – “If you did something and didn’t advertise it, you didn’t do a thing”). Borrowing from this advertising axiom, if you committed a terrorist attack and it was not accorded worldwide media coverage – you were only partially successful. This leads us to a central parameter of international terrorism: Media success of terrorist attacks against people also depends on the distribution of the victims’ countries of origin. Business people from all over the world attend international exhibitions. • A terrorist attack at an international exhibition could cause tremendous damage to the industry represented at the event. Consider, for example, the Ces tradeshow: The entire “Who’s Who” of the IT industry worldwide gathers for the opening ceremony and keynote address. Those attending often include government officials, as well as the CEOs of companies and corporations. What damage could be wrought upon the IT industry worldwide were these people to fall victim to a terrorist attack at the exhibition? • Acts of terrorism can be easily perpetrated at tradeshows, in a number of ways: The logistical organization involves trucks entering the premises, carrying packed equipment directly to the heart of the exhibition, thus necessitating inspection of the trucks. Individuals entering the exhibition with briefcases and suitcases must also pass through security checks. These two possibilities are in keeping with the nature of the exhibition routine; and this situation is liable to signal the terrorist organizations that it would not be difficult to infiltrate large quantities of explosives here.

10 - World Security Report

• A tradeshow is a mass event. Large numbers of people arrive at certain hours, and large concentrations – with no security supervision – are created. • The news media are present at tradeshows, and everything that happens there is accorded live coverage. Every visit of a VIP is accompanied by the media. The chance of a terrorist attack being broadcast live is a factor that could be tempting to potential perpetrators. In Germany, for example, the Chancellor takes part in the opening of important exhibitions, as do presidents and government ministers of other countries. These examples suffice to explain why exhibitions are liable to become a preferred target of international terrorism. What is required of Exhibition Organizers today? Exhibition organizers must prepare to provide the proper response to the threat of terrorism. They owe this effort to the exhibitors, visitors, and employees. The basic attitude of the exhibitors, employees and the visiting public vis-àvis the exhibition organizers resembles that of citizens to their government. They expect the government to see to their basic security needs – which, for our purposes, refers to protection against terrorist attack, assurance of safety, etc. At tradeshows they expect the organizers to provide them with the necessary protection. The exhibitors know it is incumbent on them to provide the proper solutions to such issues as industrial espionage, for example, and do not expect the organizers to do so. In addition, the exhibitors take precautions against theft, despite the fact that they certainly also expect the exhibition management to provide solutions in this area. In regard to terrorism, however, the exhibitors do not have the capability to provide the necessary protection, and they expect the organizers to do their utmost to ensure a safe and secure exhibition. Situation Picture - What is done at the present time? Exhibition organizers the world over, pass the responsibility for protection against terrorist attack to the local authorities and security forces, while considering themselves directly responsible only for:

www.worldsecurity-index.com


EVENT SECURITY

• Access control of exhibitors and visitors, the main emphasis on ensuring orderly entrance • Prevention of theft • Maintaining the public order • Preparations required in order to obtain the necessary insurance coverage In some cases, there are indications that exhibition organizers are starting to realize that they must also deal with the risk of terrorism. However, this has not been incorporated into the organizers’ requirements of the security companies they hire to perform guard duties, nor is it evident in the methods used by those companies in their day-to-day work. For example: How many exhibition organizers are equipped to inspect the trucks that bring the exhibitors’ equipment into the show area, in order to ensure that the truck is “clean”, and is not a car bomb? What needs to be done To meet the new security challenges, exhibition managers must see to the following essential steps: • Risk assessments • Security auditing • Design and implementation of tailor-made security measures • Work plans and security management at the corporate and site levels More specific actions that may be noted, without analysis of the particular show site and type of exhibition, are: • The duties of the Security Manager at the site should be redefined, and it must be ensured that this position is filled by an individual whose qualifications meet the new definition. This does not necessarily mandate that the responsible parties be replaced, but rather that new content be incorporated into the position of Security Manager.

be analyzed, and the appropriate levels of security defined for the various types. For example: On-site preparations differ in accordance with the type of exhibition and the nature of the visitors. An exposition accompanied by a convention (as is often the case in the US) require different preparations from an exhibition attended solely by persons from that particular sector or industry, but who come in large numbers and from different countries. • Security requirements should be defined for exhibitors. As exhibitors have free and more continuous access to the show area, the security treatment and classification of the exhibitors should commence as early as the registration stage. Subsequently, the exhibitors should be required to comply with the security procedures of the exhibition. • The two entities that run the exhibition, i.e., the exhibition center management and the tradeshow organizer, must work in full coordination – both mental and technological – on the subject of security. • Clear-cut parameters should be defined for the various security circles, in accordance with the level of security required. Naturally we shall not go into details regarding the means of security needs and methods: o Entrance to the exhibition area. Vehicle entry to the tradeshow area must be strictly controlled. The same goes with visitors o Access control to the pavilion. This will pertain to all persons entering the pavilion, including visitors, service providers, exhibitors and employees. It should be emphasized that all this is not just wishful thinking: such a system is now being installed in Israel, and it can also provide an up-to-the-minute picture of the whereabouts of the “suspect” within the exhibition area. This system can also assist in collating relevant business information. o The exhibition hall. Visible and plainclothes security personnel would be positioned in the hall in order to identify suspect persons or individuals who were able to pass through the first two circles and also to respond as quickly as possible to a terrorist incident, if one were to occur.

• The types of exhibitions should

www.worldsecurity-index.com

World Security Report - 11


EVENT SECURITY

Furthermore:

system may utilize the personnel currently performing guard duties – on condition that they undergo appropriate training and exercises and are properly equipped for the newly defined duties, including computerized equipment. Consequently, the added cost needed for protection against terrorism need not be large, but it does require a shift in emphases and a changed approach.

• It should be ensured that the first aid station is equipped to provide immediate treatment, rather than only evacuating casualties to the nearest hospital. • Means of communication between the exhibition center/ organizer and the relevant government authorities should be ensured, so as to provide appropriate coverage and achieve integration between all the systems related to all stages of security treatment. Personnel suitable for the new duties

Summary

Most of the technologies to be used are connected to computers and communication means and does not necessarily, requiere increasing the volume of personnel. Nevertheless in order to implement the security concept for prevention of terrorist attacks at exhibitions, the

Organizing the security system at exhibitions so that it provides a better response to terrorist threats is a logical, natural and essential need in this time of unending threats. The feeling of security of exhibitors, visitors and employees, deriving from their knowledge that the exhibition management is seeing to this matter, will contribute to the overall calm and make it possible to focus on the purpose for which the tradeshow is being held – doing business. It should be emphasized once again that preparing to meet the threat of terrorism must be part of an overall concept, implemented during all stages of the work – from the moment the exhibitors and visitors register for the exhibition, until the last person and vehicle has left the show site.

Co-Hosted By:

17th-19th July 2018 Sarawak, Malaysia www.cip-asia.com

Developing resilient infrastructure for a secure future

Call for Papers

Are you interested at speaking at the Critical Infrastructure Protection and Resilience Asia conference? The Critical Infrastructure Protection and Resilience Asia Advisory Committee are inviting abstracts for consideration for inclusion in the conference. If you are interested, you are invited to submit your abstract for consideration by the conference committee by submitting an abstract of approx 200 words. Your presentation should not be overtly commercial in nature. For further details, guidelines and to submit your abstract online visit www.cip-asia.com.com

The 3rd Critical Infrastructure Protection and Resilience Asia brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing South East Asia’s critical infrastructure.

Gain access to leading decision makers from corporate and government establishments tasked with Critical Infrastructure Protection and Resilience. Owned & Organised by:

Media Partners:

Supporting Organisations:

CIPRA2018 A4 Ad CFP.indd 1

12 - World Security Report

Doron Shany is the Ceo of the Israeli Security Consulting and Management firm Shafran Ltd.

How to Exhibit Gain access to a key and influential audience with your participation in the limited exhibiting and sponsorship opportunities available at the conference exhibition. To discuss exhibiting and sponsorship opportunities and your involvement with Critical Infrastructure Protection & Resilience Asia please contact:

Isaac Shalev is an exhibition specialist – Itex Exhibitions & Data Services

Suthi Chatterjee Exhibit Sales Manager (Asia) PRMC Thailand Tel: +66 2 247-6533; Fax: +66 2 247-7868 Mobile: +66 (0) 87-060-5960 E: suthi@prmcthailand.com Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700 Paul Gloc (UK and Rest of Europe) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820 Marc Soeteman (Benelux & Germany) E: marcs@torchmarketing.co.uk T: +31 (0) 6 1609 2153 Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

03/08/2017 09:38:31

www.worldsecurity-index.com


ASSOCIATION UPDATE

Planes, Trains and Automobiles John Donlon Chairman International Association of CIP Professionals (IACIPP)

For those of you old enough to remember - Planes, Trains and Automobiles was a great American comedy film released in 1987 starring Steve Martin and John Candy. In another context Planes, Trains and Automobiles are all essential parts of our transport networks worldwide and therefore an integral part of our Critical National Infrastructure. Unfortunately they are also very high on the list of terrorist attack considerations whether as a target for IEDs or as a weapon of destruction. We have recently seen the case of a terrorist bomb kit allegedly being airmailed from Turkey to Sydney, the targeting of a tube train at Parsons Green in London and the use of vehicles as weapons at several locations across Europe. These are but a few of the incidents where transportation has been a focus for terrorism atrocities, however we are all aware that transportation has for decades been a constant consideration for terrorism groups. If you browse the CPNI (UK) web pages you will clearly see it stated that while the threat from terrorism to the UK as a whole is high, and historically both international and Northern Ireland terrorist groups have targeted UK infrastructure, the current terrorist threat to the national infrastructure can be characterised as generally limited and often aspirational. The exception to this is Transport which continues to face enduringly high levels of threat from international terrorism. This is not a position which is unique to the UK but one that is replicated internationally. As long as terrorism is with us then transportaion will without doubt continue to remain high in terms of priorities to those who seek to do us harm. The fundamental principles of terrorism are not changing. Terrorists are evolving their tactics, techniques and procedures at a greater pace than policies and measures that are put in place to prevent them and it is acknowledged that the magnitude of the current threat cannot be contained by the public sector alone. There has for some time and continues to be a growing momentum for greater collaboration and information sharing between the public and private sectors and within transportation, internationally, a great deal has been achieved

www.worldsecurity-index.com

and I am sure a great deal more can be developed. This is a message that was recently reinforced by The Metropolitan Police Commissioner, Cressida Dick, during a speech in July this year and although not referring to the transportation industry specifically, she reminded the audience that, in the light of the ‘shift’ in threat, more is now required from the business community. I think that this is a message that we would all recognise as being relevant within these challenging times. It is certainly one which we, within the International Association of Critical Infrastructure Protection Professionals (IACIPP), will look to assist with through our range of activities. In the meantime stay safe when travelling......

The IACIPP Poll Over the past few weeks, the IACIPP website has been undertaking a poll from the industry - the results are in: Where do you see your next major security threat? Cyber attack: 35% Insider Threat: 27% Terrorist attack: 14% Man Made / Ineptitude: 11% Natural Disaster: 10% CBRNE threat: 3% The next poll is now available on the IACIPP website: Where do you see cybersecurity certification of Operational Technology’s (ICS / Scada) components fit best? 1. Defense 2. Nuclear 3. Energy 4. Transport 5. Telecomms 6. All of them 7. None of them Visit www.cip-association.org and cast your vote.

World Security Report - 13


SECURITY TRAINING

Fighting back the strength of modern e-learning

Doug Cook MBE CSyP FSyI of the International Secure Minds Training Academy (iSMTA.com) looks at how elearning is enhancing training in the security industry.

Take any day and reflect on the news. Probably there will be reports of world leaders threatening war, cyber-attacks, major data losses, terrorist atrocities, environmental disasters such as hurricanes, earthquakes and flooding, scenes of mass migration, or the emergence of some new strain of a deadly virus.

and when. The evidence from recent weeks shows that even with some warning, there can still be devastation and loss of life.

Sound familiar? And, indeed, throughout this excellent journal, the pages are filled with more analysis on new challenges facing our beleaguered security and resilience industries and those individuals who are responsible to prevent or minimise the damage caused.

This is the same question for every business and to every person. How can we reduce our risk?

It is clear to me that the threat challenges we face are greater, more complex, more diverse and, currently, more likely than ever before. It is the threat source that has the upper hand. In particular, the criminal, the terrorist, the fraudster or the cyber attacker, has the choice where they can focus on their capability, their target and their attack timing. When it comes to environmental threats, we have the disadvantage of not always knowing what is coming

14 - World Security Report

So, what are the key challenges to reduce our risks. How can we improve the protection and resilience of our critical infrastructure?

The obvious answer is to reduce our vulnerability, but how? I am sure that the investment by governments in providing early warnings and guidance helps to save lives and reduce damage. I am also sure that the media helps to provide guidance protection and resilience advice during an emergency. We all seem to turn to news broadcasts when a situation occurs. This is because we don’t live in a totally safe paradise, we can’t live in a permanent state of readiness, we can’t live in a permanent state of alert, and we can’t barricade our businesses and homes to be sure to prevent crime. So what can be done?

Fundamentally, the challenge is about knowing. This means national and regional leaders who know their role to protect their people and economy. Organisation and business leaders who know their role to protect their employees and brand. Security and resilience experts who need to be educated and, hopefully, qualified to provide proactive and reactive solutions against all risks. Employees and citizens who need to know about risks, how to mitigate the risks and what to do when a situation happens. This all relies on education and training. Fighting Back So, if education and training are the key, then the question is how can many people be educated and trained quickly, how can the education and training be suitable and relevant to a particular location, critical infrastructure or business, how can we ensure that the knowledge is available when needed and finally how can we ensure that the knowledge is updated to cover new risks? The advance in modern technology is the main reason why e learning is

www.worldsecurity-index.com


SECURITY TRAINING

now at the forefront of education and training services for international and national organisations, businesses and busy people who embrace the power and availability of their IT and communication devices. The modern world needs modern solutions and e-learning is providing that new and modern way to educate and train students at any suitable time, at any suitable location and with a consistency of content that is guaranteed. All on a modern mobile device. What better way is there to deliver security awareness messages to thousands of business employees across the world and all at the same time and much lower costs. You can ensure that employees have access to the awareness messages on their portable IT device when they most need it? Provide cost effective CPD to all those who need it, anywhere in the world, without term times, sitting in classrooms, taking time off work and all under the pressure of assignment deadlines.

To meet the key challenges for security and resilience, the modern e learning provider needs to offer a wide-range of courses that can satisfy all customer demands, by providing;

Such courses should help students to learn additional elements of security and resilience and, at the same time, demonstrate a commitment to career development.

• Accredited qualifications that provide meaningful and credible certificates of professional competence. These should meet the needs of the employer looking to recruit and retain competent professionals who want the highest standards of protection at the same time as meeting the demands of the organisation or business. Accredited qualifications are those certified by national institutions that set and maintain standards.

• General Awareness which should be a bespoke capability of the e learning provider to partner with others to build and manage very short security and resilience awareness modules for employee training and awareness programmes. These are common now for a multi-national or national business to deliver employee guidance for example on, data privacy rules, incident response actions, traveling safely and lone working. But the possibilities are endless.

• Professional Courses that cover a range of specific and relevant subjects at different academic grades. The aim being to assist students at various competency levels and to attract people in to a rewarding security and resilience career. • CPD which should be a range of short courses that cover topics of both general and specific interest.

Global Visitors

Fighting back, the strength of modern e-learning!

S : r IS M te r M RO is T F in P te N’ TE y M e M oun ce DO NO urit llac l C eren Y c a ba f KE Se n W Glo Con UK Be ne ism y O ror Da Ter

10,000+

All of this to be delivered by technology to the users’ device, anywhere and anytime, and in such a way that suits the lifestyle of the modern student.

250+ 100+ High-End Countries Exhibitors

Represented

LONDON HOSTS WORLD CLASS INTERNATIONAL SECURITY EVENT TOPICS COVERED:

Designing Out Terrorism

Global Counter Terrorism

Major Events & Stadiums

Protecting Crowded Places

Building & Facilities Management

Critical National Infrastructure

Aviation & Borders

Cyber Security

Transport Security

250+ High-End Exhibitors, 200+ Speakers, 250+ Sessions! GOVERNMENT AGENCIES & DEPARTMENT ZONE

LIVE DEMONSTRATIONS

NEW CYBER INTELLIGENCE ZONE

Featuring

In association with:

In association with:

Alternatively register a delegate pass to access the high-level Global Counter Terrorism Conference. Readers can save 15% on published rates with discount code UKSEC15

REGISTER FOR A FREE VISITOR PASS NOW N www.worldsecurity-index.com

www.uksecurityexpo.com/wsr World Security Report - 15


CYBER SECURITY

In cloud computing, more data loss on the horizon

By now, it’s a familiar story: A company puts massive amounts of data on a remote cloud server – then someone finds a way in, gaining access to sensitive business documents or the personal information of millions of people. It happened to Verizon. It happened to WWE. It happened to the political data company Deep Root Analytics. Most recently it happened to the accounting firm Deloitte, according to a news report that said hackers tapped into the company’s email system simply by logging on as an administrator. And it will keep happening, experts say, especially when companies neglect data security in their eagerness to convert to the cloud. “They inherently believe they get all these magical properties of security by moving (to the cloud), and it just doesn’t happen,” said Josh Douglas, Raytheon’s chief strategy officer for cyber services. Cloud computing is an increasingly popular option for businesses. The cloud-services market could generate as much as $236 billion in revenue by the year 2020, according to Forrester Research. The reasons are clear: The cloud cuts the cost of hosting and maintaining on-site servers, it allows employees to work seamlessly from anywhere, and it adjusts to the size of the organization. But just like any other connection to the internet, it creates ample opportunities for cybercriminals to attack, Douglas said. “As we tell our clients, cloud computing puts your

16 - World Security Report

information on someone else’s computer,” Douglas said. “So it’s vital to protect the cloud exactly as you would your own servers.” The Verizon, WWE and Deep Root Analytics breaches all appear to stem from improper cloud-security settings; media reports on all three incidents said the databases were accessible to anyone who had the URL. In the Deloitte breach, news reports said the attackers signed onto a server that required only a login and password – less protection than many people have on their social media pages. A common measure known as “two-factor authentication” would require both a login/password combination and another means of verifying identity, such as a fingerprint or PIN code that appears on a secondary device. “It is a basic part of cyber hygiene, and while it might not have prevented the intrusion altogether, it would have at least slowed the attackers and forced them to use more sophisticated methods,” Douglas said. Douglas said other common mistakes in converting to the cloud include failure to scan old code for vulnerabilities, failure to segregate systems and forgoing “red-teaming,” also known as adversary emulation testing, where security consultants play the role of hackers and attempt to breach systems critical to the business.

www.worldsecurity-index.com


CYBER SECURITY

But data security in the era of cloud computing isn’t just about setting things up correctly – it’s also about the behavior of employees, said Matt Moynahan, CEO of Forcepoint, a cybersecurity company jointly owned by Raytheon. Using technology to monitor employee activity, identify possible errors and sniff out malicious intent can help reduce risk, he said. “Regardless of whether organizations are securing data using on-premises or cloud-based technology … organizations need to balance protecting privacy and understanding how their employees interact with critical business data and intellectual property,” Moynahan said.

Milipol Paris 2017

Worldwide Event For Homeland Security 20th edition

Even with all the risks cloud computing can present, businesses shouldn’t fear conversion to the cloud. Companies often over-correct after cybersecurity problems, with security measures so strict they impede the growth of business. That, Douglas said, is also a mistake. “If the pendulum swings too far to the right, security puts a standstill to the innovation and technology,” he said. “It’s important to adopt things like clouds, because that innovation is what helps our society grow.”

Take Up The Challenge of a Safer World

The World’s Leading Network of Homeland Security Events

21-24

NOV. 2017

QATAR

www.worldsecurity-index.com www.milipol.com

www.milipolqatar.com www.milipolasiapacific.com

PARIS NORD VILLEPINTE FRANCE

World Security Report - 17


EVENT PREVIEW

Collaborating and Cooperating for Greater Security

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety. Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. This directive supersedes Homeland Security Presidential Directive 7.

prosperity, and well-being.

We must be prepared!

Critical infrastructure must be secure and able to withstand and rapidly recover from all hazards. Achieving this will require integration with the national preparedness system across prevention, protection, mitigation, response, and recovery.

The Nation’s critical infrastructure provides the essential services that underpin American society. Proactive and coordinated efforts are necessary to strengthen and maintain secure, functioning, and resilient critical infrastructure – including assets, networks, and systems – that are vital to public confidence and the Nation’s safety,

This directive establishes national policy on critical infrastructure security and resilience. This endeavor is a shared responsibility among the Federal, state, local, tribal, and territorial (SLTT) entities, and public and private owners and operators of critical infrastructure (herein referred to as “critical infrastructure owners

18 - World Security Report

and operators”). This directive also refines and clarifies the critical infrastructure-related functions, roles, and responsibilities across the Federal Government, as well as enhances overall coordination and collaboration. The Federal Government also has a responsibility to strengthen the security and resilience of its own critical infrastructure, for the continuity of national essential functions, and to organize itself to partner effectively with and add value to the security and resilience efforts of critical infrastructure owners and operators. Critical Infrastructure Protection and Resilience North America

www.worldsecurity-index.com


EVENT PREVIEW

Schedule of Events Tuesday December 5th, 2017 2:00pm-3:30pm - Opening Keynote Session 3:30pm-4:00pm - Networking Coffee Break 4.00pm-5:30pm - Plenary Session 1: Developing Greater Resilience in CNI 7:00pm - Welcome Reception

Wednesday December 6th, 2017 9:00am-10:30am - Plenary Session 2: FEMA: Long Term Power Failure Workshop 10:30am-11:15am - Networking Coffee Break in Exhibition Hall 11.15am-12:30pm - FEMA: Long Term Power Failure Workshop 12:30pm-2:00pm - Delegate Networking Lunch

Critical Infrastructure Protection Track

Critical Information Infrastructure Protection / Cyber Security Track

2:00pm-3:15pm - Session 3a: Emerging Threats on CNI 3:15pm-4:00pm - Networking Coffee Break 4:00pm - 5:30pm - Session 4a: Standards and Best Practice in CIP and Resilience

2:00pm-3:15pm - Session 3b: Cyber Security Legislation, Best Practice & Standards 3:15pm-4:00pm - Networking Coffee Break 4:00pm - 5:30pm - Session 4b: Cybersecurity Threats and Trends

5:30pm - Networking Reception in Exhibition Hall

Thursday December 7th, 2017

Critical Infrastructure Protection Track

Critical Information Infrastructure Protection / Cyber Security Track

9:00am-10:15am - Session 5a: Enhancing Preparedness and Response Capabilities 10:15am-11:00am - Networking Coffee Break 11:00am - 12:30pm - Session 6a: Technologies to Detect and Protect

9:00am-10:15am - Session 5b: Cyber Defence Strategies for CII 10:15am-11:00am - Networking Coffee Break 11:00am - 12:30pm - Session 6b: Operationalizing Resilience

12:30pm-2:00pm - Delegate Networking Lunch 2pm-2:45pm - Plenary Session 7: PPP & Collaboration in CIP and CIIP 2:45pm-3:30pm - Plenary Session 8: Critical Infrastructure Interdependencies 3:30pm-4:00pm - Review, Discussion and Conference Close

Leading Speaker Line Up Including: • Bryan Koon, Director, Florida Division of Emergency Management • Matt Conner, Chief Information Security Officer, National GeoSpacial Intelligence Agency • Joseph Wassel, Director, C4 Resilience & Mission Assurance, US Department of Defence • David Fortino, Regional Continuity Manager, Federal Emergency Management Agency (FEMA) • Fred Ruonavar, Chief of DISA/ DODIN Critical Infrastructure Program • Senior Representative, Office of Infrastructure Protection, U.S. Department of Homeland Security • Michael Lowder, Director – Office of Intelligence, Security & Emergency Response, US Dept of Transportation • Frederic Petit, Research Scientist, Argonne National Laboratory & Regional Director, International Association of CIP Professionals • Victoria Sherazi, Project Lead “Mitigating Risks in the Innovation Economy”, World Economic Forum For full conference programme and speakers visit www.ciprna-expo.com

will again bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing North America. The conference will look at developing on the theme of previous events in helping to create better understanding of the issues and the threats, to help facilitate the work to develop frameworks, good risk management, strategic planning and implementation. Why the Need for Such a Discussion? All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and

www.worldsecurity-index.com

Programme Includes: FEMA Half Day Workshop – “Long Term Power Failure” The focus of this workshop is specifically the local level response and interaction / coordination of local and state agencies and private sector partnerships. The workshop will yield a better understanding of how LTPO response is managed and its relationship within the multiagency coordination concept. The discussion will assist in improving sustainment of power and response continuity. Private sector, state and local government entities will have the opportunity to participate in discussions addressing an LTPO.

Register for the FEMA Workshop and Conference at www.ciprna-expo.com/registration

World Security Report - 19


EVENT PREVIEW

security of their respective internal critical infrastructure that supports primary mission essential functions. Such infrastructure need to be addressed in the plans and executed to the requirements of the National Continuity Policy. The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either

physical or cyber-attacks, means the need to continually review and update policies, practices and technologies to meet these demands. Critical Infrastructure Protection & Resilience North America takes place at the Kennedy Space Center’s Center for Space Exploration, Florida, USA on December 5th-7th, 2017.

REGISTRATION The Critical Infrastructure Protection & Resilience North America is open for members of federal government, emergency management agencies, emergency response and law enforcement or inter-governmental agencies, DHS, FEMA, Fire, Police, INTERPOL, AMERIPOL and associated Agencies and members (public and official) involved in the management and protection of critical national infrastructure. Applications will be reviewed and considered on an individual basis. Delegates are requested to register sufficiently early to ensure participation. For all above mentioned communities the Critical Infrastructure Protection & Resilience North America early registration is “Free of Charge“ for registration prior to November 5th. Register online today at www. ciprna-expo.com/agency-reg.

OVER 1 MILLION MANIFESTS VERIFIED With an innovative customer focused approach, S2 Global helps customers worldwide access state-of-theart screening technology that improves security, streamlines trade and increases revenue. www.screeningsolution.com

20 - World Security Report

Industry companies, other organizations and research/ Universities sending staff members to Critical Infrastructure Protection & Resilience North America are required to purchase a conference pass. For further details and to register online visit www.ciprna-expo.com/ registration.

The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands.

www.worldsecurity-index.com


AGENCY NEWS

UN Security Council, senior counter-terrorism officials stress ‘All of UN’ approach Addressing the Security

Council, the head of the newly created United Nations counter-terrorism office today outlined a framework to devise a cohesive, wellcoordinated programme to support Member States as well as the priority areas of such work. “We must recognize that there are four important spheres of UN activity that need to be aligned if we are to effectively develop a coherent and well-coordinated ‘All of UN’ framework for our future counter-terrorism efforts,” Vladimir Voronkov, UnderSecretary-General of the UN Office of Counter-Terrorism (OCT), said at a briefing to the 15-member body on the threats to international peace and security caused by terrorist acts.

These four spheres are the Security Council and its subsidiary bodies; the General Assembly; the UN Secretariat headed by the Secretary-General; and the 38 UN entities that directly or indirectly contribute to counter-terrorism efforts, Mr. Voronkov said. Today’s meeting marked the 16th anniversary of Council resolution 1373, which was adopted today in 2001, following the 11 September terrorist attacks on the United States. He said that he had more than 50 high-level meetings with Member States and international and regional organizations last week in the margins of the General Assembly’s annual debate and that he listened carefully to the statements delivered in the Assembly, in which counterterrorism was clearly a priority for many UN Member States. An effective, future-oriented and balanced counterterrorism programme to support Member States would be built on six key areas; strengthening international counter-terrorism cooperation;

preventing violent extremism conducive to terrorism; addressing the terrorist use of the Internet; enhancing the foreign terrorist fighters’ threat; and increasing the sharing of information and good practices, he said. Also briefing the Council was David Scharia, Officerin-Charge of the CounterTerrorism Committee Executive Directorate (CTED), who discussed how CTED’s work can contribute to the “All of UN” approach to combating terrorism. He said that CTED provides the Counter-Terrorism Committee, a subsidiary body of the Security Council, with neutral and independent expert assessments of Member States’ implementation of Council resolutions on terrorism. To date, CTED has conducted 133 visits to 96 Member States, including 16 this year.

measures in place,” he added, expressing an expectation that the establishment of the Office of Counter-Terrorism will shorten the time period between CTED assessments and the delivery of assistance. He noted that the entire UN system should benefit from CTED analysis, “which is probably the most updated and comprehensive researchbased analysis in the UN system on counter-terrorism trends and developments.” “Together, we have achieved a great deal since the adoption of resolution 1373 in 2001,” he said. “However, the terrorist threat continues to evolve at an alarming pace.” CTED recently updated the Technical Guide to the implementation of Council resolutions on terrorism.

This process, Mr. Scharia said, helped these countries to enact new laws, establish new institutions and strengthen capacities. “Yet, many States still do not have all counter-terrorism

Joint Action Day Targets Counterfeiters on the Darknet

A joint action day carried out by seven EU Member States and coordinated by Europol has resulted in the arrest of 53 criminals active on the Darknet. The arrestees were involved in buying and/or selling counterfeit

euro banknotes on illegal Darknet marketplaces, such as AlphaBay and Hansa Market. In February 2017, Austrian authorities dismantled an illegal euro banknote print shop in Vienna and arrested

www.worldsecurity-index.com

one person. The data retrieved from this operation mainly related to illegal euro banknote counterfeiting on the Darknet. Among the documents seized, investigators found details of 33 different European and non-European countries to which the arrested person had sent counterfeit money.

World Security Report - 21


AGENCY NEWS

New OSCE/ODIHR publication on good practices in identity management aims to support states in improving civil registration and identification systems A new publication highlighting good practices in identity management, both in providing evidence of identity in the issuance of travel documents and identity cards and in ensuring access to economic, civil and political rights, was launched at an event in Vienna on 29 September 2017. The Compendium of Good Practices in Identity Management in the OSCE Region was produced jointly by the OSCE Office for

Democratic Institutions and Human Rights (ODIHR), which contributed based on its work on identity management and freedom of movement, and the OSCE Transnational Threats Department, which contributed based on its work on travel document security. “Secure and efficient systems for civil registration and identification as well as for residency registration are important components of the identity management infrastructure and therefore indirectly but decisively

determine to what extent people enjoy certain basic rights,” said Christine Hirst, Deputy Head of the ODIHR Democratization Department. “Breaking new ground in its holistic presentation of identity management, this compendium bridges the different dimensions of security to provide insights and guidance in a complex area,” said Ms. Rasa Ostrauskaite, the OSCE Secretariat’s Co-ordinator of Activities to Address

Transnational Threats. “We hope this resource will be used by states to compare and contrast their identity management systems with others, to identify possible security gaps or weak links in their own systems, and to remedy these gaps using some of the good practices highlighted.”

Millions of medicines seized in largest operation against illicit online pharmacies to Budapest, Hungary, to conduct checks on the spot.

In the largest action of its kind, INTERPOL’s Operation Pangea X targeting the illicit online sale of medicines and medical devices, saw some 400 arrests worldwide and the seizure of more than USD 51 million worth of potentially dangerous medicines. Europol supported INTERPOL’s Operation Pangea with two analysts performing checks on entities against Europol’s databases. In addition, a specialist and an analyst with a mobile office and a device for forensic support were sent by Europol

22 - World Security Report

Overall, involving 197 police, customs and health regulatory authorities from a record 123 countries, Operation Pangea X led to a record number of 25 million illicit and counterfeit medicines seized worldwide. The action resulted in the launch of 1058 investigations, 3584 websites taken offline and the suspension of more than 3000 online adverts for illicit pharmaceuticals.

In addition to medicines, Operation Pangea X also focused on the sale of illicit medical devices, such as dental devices and implants, condoms, syringes, medical testing strips and surgical equipment. Illicit devices worth an estimated USD 500 000 were recovered. Starting with just eight countries in 2008, Operation Pangea has grown exponentially during the

past 10 years, with police, customs and drug regulatory authorities from 123 countries taking part in 2017. The main trend identified during the decade of Pangea operations is the continuous growth of unauthorised and unregulated online pharmacies, which capitalise on increasing consumer demand worldwide to advertise and sell illicit or counterfeit medicines.

Among the fake and illicit medicines seized during the international week of action (12 – 19 September) were dietary supplements, pain reduction pills, epilepsy medication, erectile dysfunction pills, antipsychotic medication and nutritional products.

www.worldsecurity-index.com


INDUSTRY NEWS

Blighter Unveils Lower Cost E-scan Doppler Radar for Airports and Critical Infrastructure Protection mounted on top of existing site buildings - for ease of connection to readily available sources of power and network connectivity, while still giving clear line-of-sight to the perimeter and maintaining the full integrity of the radar coverage zone.”

Blighter Surveillance Systems has introduced a lower cost, entry level version of its Blighter B400 Series Doppler ground surveillance radar aimed specifically at airports and critical infrastructure sites such as oil/gas facilities, power stations or even palaces. The new version of the radar delivers all the benefits of a solid-state e-scan Doppler radar - including exceptional detection (man at 4km), day/night operation in all weather and light conditions, low manning levels, zero maintenance, low installation costs, lower through life costs and lower false alarm rates – at a lower price per km² than any other ground radar. The BlighterView HMI 2 software has also been optimised for perimeter security allowing control over multiple radar and cameras (automatic slew-to-cue) and sophisticated alert and exclusion zones to be created. Blighter engineers have also

enhanced BlighterView to allow easy integration with standard video management systems (VMS) with ONVIF compliance. Mark Radford, CEO, Blighter Surveillance Systems, said: “Our engineers have optimised the design of the new radar, the processing chain and the control software to better meet the needs of our critical infrastructure customers. We have reengineered the Blighter B400 radar to get to a price point that is attractive to this market and that will deliver improved detection at a lower cost compared with CCTV, thermal

imaging systems and low cost, short range mechanically scanned radars.” The solid-state Blighter passive electronically scanned array (PESA) radar detects small and slow-moving targets - even in cluttered environments - due to the radar’s coactive frequency modulated continuous wave (FMCW) Doppler fast-scan processing. “Our radar’s PESA technology and wide elevation beams are a big advantage for critical infrastructure sites,” added Mark Radford, “as it allows the radars to be

Blighter B400 radars are already in use at many critical infrastructure sites including several major international airports in Europe, United States, South America and Africa. In the UK, a Blighter radar/camera surveillance system already forms part of the perimeter security solution at Heathrow airport. A typical Blighter airport/ critical infrastructure site configuration consists of the new Blighter B400 Series radar (90 or 180-degree scanning with detection ranges of 2km, 5km and 8km), BlighterView HMI software, and slew-to-cue PTZ (pan, tilt, zoom) thermal imaging surveillance camera systems.

Senstar Introduces the Senstar LM100 Intelligent Perimeter Lighting and Sensing Solution Senstar has introduced the Senstar LM100, the world’s first intelligent perimeter lighting and sensing solution. Combining two key security functions in one cuttingedge product, the LM100 acts as a powerful deterrent against intruders, detecting and illuminating them at the fence line while alerting a security management system (SMS). “The Senstar LM100’s specially-engineered LED

sense vibrations caused by attempts to cut, climb or break through the fence, the LM100 is a highly effective tool for protecting property and assets from theft and vandalism.” lighting was specifically designed for perimeter security applications and optimized for use with CCTV camera systems,” said Product Manager Todd Brisebois. “With its ability to

www.worldsecurity-index.com

Consisting of luminaires mounted along the fence, the Senstar LM100 uses wireless self-healing mesh communication network technology to relay intrusion information enabling the

system to operate in a coordinated fashion and resulting in robust site-wide security. When networked, the LM100 reports intrusion attempt locations to the site’s SMS to enable a directed response. The Senstar LM100 is easy to install and maintain, environmentally-friendly, and is suitable for sites of all sizes as a standalone or complimentary perimeter security system.

World Security Report - 23


INDUSTRY NEWS

Government of Canada Awards Drone Airspace Management System Contract to Kongsberg Geospatial Kongsberg Geospatial, an Ottawa-based developer of geospatial software technology, announced today that Public Services and Procurement Canada (PSPC) has awarded them a contract to produce an Emergency Operations Airspace Management System (EOAMS) for evaluation by Canadian government agencies for safely managing drones at emergency and disaster scenes. The contract was awarded via a competitive request for proposals under the Canadian Safety and Security Program in a project for Defense R&D Canada’s Centre for Security Science. The EOAMS is a portable display that interfaces with a variety of local sensors, including RADAR and Automatic Dependence Surveillance – Broadcast (ADS-B) receivers to give a clear picture of the airspace around disaster areas. It is intended to allow first

responders to safely use unmanned aerial vehicles (UAVs) to survey the area, without risking collision with other emergency aircraft, including water bombers or rescue and police helicopters. The system would also provide a warning to first responders if unapproved UAVs approach the area – providing a degree of protection against what is becoming an increasing problem with the proliferation of small consumer camera drones at fires and accident scenes. “Securing and managing the airspace around disaster scenes or at big public

events is becoming a real concern for all levels of government,” said Paige Cutland, IRIS program director for Kongsberg Geospatial. “Even if a drone operator isn’t acting with malicious intent, they have the potential to cause considerable harm if, for example, they fly into the path of an air ambulance. We need effective tools to help prevent this while also allowing legitimate UAV operations to be safely integrated into the emergency airspace. ” The new EOAMS will be based on Kongsberg Geospatial’s IRIS UAS™ airspace visualization system. The IRIS spatial

awareness system evolved from technology originally developed for air traffic management display systems, and for supporting flight operations for military UAV systems like the US Navy Triton Global Hawk. The system has been developed for safely operating UAVs beyond visual line-of-sight (BVLOS), and has been adopted by the FAA ASSURE group for use in research toward developing regulations for commercial BVLOS operations in the United States. “Kongsberg Geospatial has been pioneering innovation in airspace management for unmanned aircraft for over a decade,” said Ranald McGillis, president of Kongsberg Geospatial; “With the EOAMS project, we have the opportunity to introduce some really exciting capabilities in a portable system that will help first responders use UAVs in new and effective ways to support emergency response efforts.”

FEC Heliports introduce the new HEMS-Station Solar Plus product The new HEMSStation Solar Plus consists of the housing for up to 10 HEMS-Star portable lights, a remote lighting controller, complete with solar panel and solar powered illuminated wind cone. The FEC Heliport’s HEMS-Station® is

24 - World Security Report

designed to securely house and charge HEMS-Star® portable helipad lights adjacent to designated helipads and can be mounted either inside a building or externally to a wall, post or floor mounting frame.

autonomous and include an Illuminated wind cone and solar power source. The system can be installed within a couple of days and are ready to use immediately.

4 units have already been sold to a UK Air Ambulance operator for designated helipads in rural districts. These units are completely

www.worldsecurity-index.com


INDUSTRY NEWS

EchoStar Mobile and Thales emphasize importance of communications connectivity for public protection and disaster response 2 GHz band Provides the Resiliency Needed for Mission-Critical Applications EchoStar Mobile and Thales detailed their approach to Public Protection and Disaster Response in the new white paper “A Critical Tool for Europe for Effective Public Protection and Disaster Response (PPDR) Communications Connectivity: 2 GHz Mobile Satellite Service with a Complementary Ground Component.” Jennifer A. Manner, senior vice president of regulatory affairs at EchoStar Corp., commented, “With the successful launch of EchoStar XXI, EchoStar Mobile and Thales are well positioned to provide an effective PPDR solution—this white paper

solution is primed to become the first affordable PPDR communications service on the market to meet the requirements of the PPDR community without massive investments by the states.”

shows the important role that the 2 GHz band will play in bringing reliable connectivity to the PPDR community.” EchoStar Mobile and Thales are collaborating to develop end-to-end mobile satellite and terrestrial solutions for PPDR, as well as specialized

mobile satellite and terrestrial terminals. Thibaut Pichard, service manager for Thales’ Eiji solution, added “we are excited that, with supplementation by the EchoStar Mobile MSS/ CGC network, Thales’ Eiji

A state-of-the-art S-band MSS satellite with Ka-band feeder links, EchoStar XXI, owned and operated by EchoStar, is located at the 10.25 degrees East geostationary orbital position. Through an agreement with EchoStar, EchoStar Mobile will utilize a portion of the EchoStar XXI payload to provide MSS capacity throughout Europe, including the European Union.

Microsemi Corporation announce breakthrough approach to protecting critical infrastructure against GPS spoofing and jamming threats Microsemi Corporation has announced the recent development of a breakthrough approach to protecting critical infrastructure against GPS spoofing and jamming threats with the introduction of its BlueSky™ GPS Firewall. Designed to provide security protection for GPS delivered position, navigation and timing (PNT) data, the BlueSky GPS Firewall solution can be deployed in-line between any standard GPS antenna and stationary GPS receiver to provide protection against GPS signal incidents, both intentional or accidental, before they enter a GPS receiver system. In response

first line of defense against GPS threats to help build out a secure, robust and resilient PNT platform for their infrastructures.

to the growing number of GPS incidents and their potential threat to critical infrastructure, and to assist customers in rapid adoption, Microsemi is making BlueSky GPS Firewall Evaluation kits available in advance of the full production release of the solution. The dependency on PNT is increasingly important to critical infrastructure sectors such as telecommunications, energy, transportation, emergency services,

www.worldsecurity-index.com

financial services and enterprise infrastructure, and is mainly provided through GPS. Published best practice documents by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) describe steps that can be taken to mitigate outages and disruptions with GPS reception. In alignment with these documents, Microsemi’s new BlueSky GPS Firewall provides critical infrastructure sectors with a

Microsemi’s BlueSky GPS Firewall filters the GPS signal in real time, removing anomalies from the GPS signal before it is consumed by the downstream GPS receiver. This creates an intelligent and secure barrier against jamming and spoofing, and prevents the GPS receiver from being impacted by such incidents. Deployment of the BlueSky GPS Firewall does not require any new cabling or alteration of the preexisting antenna installation and is interoperable with standard GPS receivers.

World Security Report - 25


PRODUCT FOCUS

Smiths Detection

World Security Report

World Security Report is a bi-monthly electronic, fully accessible e-news service distributed to over 100,000 organisations globally. It tracks the full range of problems and threats faced by today’s governments, security and armed forces and civilian services and looks at how they are dealing with them. It aims to be a prime source of online information and analysis on security, counterterrorism, international affairs and defence. Smiths Detection

Border Security Report

Border Security Report is the bimonthly border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over 20,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide. Smiths Detection

advantages

Smiths Detection

advantages

www.defencell.com 26 - World Security Report

www.worldsecurity-index.com


EVENT CALENDAR

October 2017

24 Security Cleared Expo London, UK www.securityclearedexpo.com 25-27 Securika St. Petersburg St. Petersburg, Russia http://securika-spb.ru 31-1 Nov Amsterdam Security Expo Amsterdam, Netherlands www.amsterdamsecurity.com

To have your event listed please email details to the editor tony.kingham@knmmedia.com

November 2017

14-17 8th Middle East Security Conference & Exhibition Kingdom of Bahrain www.asisonline.org 6-9 Defense & Security Asia Bangkok, Thailand www.asiandefense.com 7-9 Securexpo East Africa Nairobi, Kenya www.securexpoeastafrica.com 21-24 Milipol Paris Paris, France en.milipol.com 21-22 SecTech Sweden Expo Stockholm, Sweden www.securityworldmarket.com 29-30 UK Security Expo London, UK www.uksecurityexpo.com

27 - World Security Report

December 2017

5-7 Critical Infrastructure Protection & Resilience North America Kennedy Space Center, Florida, USA www.ciprna-expo.com

March 2018

20-22 World Border Security Congress Madrid, Spain www.world-border-congress.com

July 2018

17-19 Critical Infrastructure Protection & Resilience Asia Sarawak, Malaysia www.cip-asia.com

September 2018

25-27 Critical Infrastructure Protection & Resilience Europe The Hague, Netherlands www.cipre-expo.com

www.worldsecurity-index.com


PRINCIPALITY STADIUM CARDIFF

14-15 MARCH 2018 BEHAVIOURALANALYSIS.COM

A TWO-DAY SECURITY CONFERENCE EXPLORING NON-RACIAL PROFILING, STRESS RESPONSES, BEHAVIOURAL INDICATORS AND TACTICAL RISK ANALYSIS TECHNIQUES TO IDENTIFY HOSTILE OR CRIMINAL INTENT

TOPICS INCLUDED: PROFILING TECHNIQUES

CROWD DYNAMICS

PHYSIOLOGICAL STRESS INDICATORS

SUICIDAL TERRORISM

SYMPATHETIC & PARASYMPATHETIC NERVOUS SYSTEM STEREOTYPICAL BEHAVIOURS INFLUENCES ON PERCEPTION PREVENTION OF RACIAL PROFILING SECURITY & CUSTOMER EXPERIENCE

FIXATED THREATS TECHNOLOGY’S ROLE IN THREAT DETECTION QUESTIONING TECHNIQUES & DECEPTION INSIDER THREAT IDENTIFICATION SUICIDE BOMBER INTERVENTION CASE STUDIES

SPORT S STAD IA ENTER TAINM ENT VE NUES

OUTDO OR FES TIVALS & EVEN TS

AIRPOR TS

TOURIS T ATTR ACTION S

A MUST ATTEND CONFERENCE FOR ALL THOSE RESPONSIBLE FOR THE SECURITY OF:

MASS T RANSP ORT HU BS

SHOPP ING CE NTRES GOVER NMEN TAL IN STITUT IONS

BEHAVIOURALANALYSIS.COM


BORDER SECURITY

REPORT

VOLUME 7 SEPTEMBER/OCTOBER 2017

For the world’s border protection, management and security industry policy-makers and practitioners

COVER STORY Bomb Technicians and Portable X-Rays: it is all Black and White

S P E C IAL R EPO R T AGENCY NEWS S H O RT RE P O RT I N D U S T RY N E W S

WCO supports Indonesian Customs to strengthen its IPR border enforcement p.13

A global review of the latest news and challenges from border agencies and agencies at the border. p.14

UN civil aviation body urges greater cooperation for more effective aviation security p.4

Latest news, views and innovations from the industry. p.18


2

COMMENT

Refugees, migration and fake passports The IOM, the UN Migration Agency, has reported that 139,763 migrants and refugees have, so far this year, entered Europe by sea in 2017 with over 75 per cent arriving in Italy and the remainder divided between Greece, Cyprus and Spain. It has also recently been reported in the German newspaper Bild am Sonntag, that IS is currently in possession of up to 11,000 stolen blank Syrian passports. The stolen passports are genuine identity papers that have not yet been filled out with an individual’s details. Taken together these two facts pose a serious problem for border authorities and security services across Europe.

This means that these individuals with fake or altered documents had already made their way to Germany one way or the other. So, that leaves us with some unanswered questions. How long have these passports been in IS hands? How long have the authorities known about them? How long was it before the lists were shared? And How many individuals with fake documents headed elsewhere in Europe?

Tony Kingham Editor

“Developments in connection with the refugee situation have shown that terrorist organisations are using the opportunity to infiltrate potential attackers or supporters into Europe and Germany undetected,” a spokeswoman for the BKA federal criminal police told Bild am Sonntag. This of course is not news because it is already well known that many of the assailants in the Paris attack back in 2015 had fake Syrian passports. What is not clear from the reports is how long these passports have been in the hands of IS. But given their previous track record and stated intentions, it is fair to assume that if they have had their hands on them for any length of time, many documents will have already been used to infiltrate jihadists into Europe and possibly elsewhere. The good news is that the German authorities are reported to hold the serial numbers of all the stolen passports, so presumably refugees and migrant’s identities will be being checked against the serial numbers. But that pre-supposes that all the refugees and migrants are being processed and that the list is available to the processing staff on the ground in Italy, Greece, Cyprus and Spain! What has been reported, again in Bild am Sonntag is that in 2016 the German authorities identified some 8,625 fake Syrian passports.

READ THE FULL VERSION The digital version of Border Security Report contains all the additional articles and news listed in the contents page below. The full digital version is available for download at www.world-border-congress.com/BSR

Border Security Report | September/October 2017


CONTENTS

3

CONTENTS     BORDER SECURITY REPORT                                    4 United Nations civil aviation body urges greater cooperation for more effective aviation security Head of the United Nations civil aviation body urged greater cooperation among Member States.

5 Bomb Technicians and Portable X-Rays: it is all Black and White John Howell, EOD Technician and Director of Explosives Technologies at DSA Detection takes a look at x-ray technologies.

»»p.5

10 AGENCY REPORTS Latest news and reports reports from key agencies INTERPOL, OSCE, EUROPOL and the IOM.

13 World Customs Organization supports Indonesian Customs to strengthen its IPR border enforcement WCO National Workshop on Combating Counterfeiting and Piracy was held for Indonesian Customs »»p.10

»»p.13

14 AGENCY NEWS A global review of the latest news, views, stories, challenges and issues from border agencies and agencies at the border.

16 World Border Security Congress Details of the next gathering of the international border security community in Madrid, Spain on 20th-22nd March 2018.

18 industry news Latest news, views and innovations from the industry.

»»p.14

Border Security Report | September/October 2017


4

SHORT REPORT

Head of the United Nations civil aviation body urges greater cooperation for more effective aviation security civil aviation and aims to enhance the effectiveness and sustainability of global provisions, and the sustainable implementation of preventative measures. The Global Plan, which she referred to as a major milestone for civil aviation security contributing to the UN global counter terrorism strategy, has five priority areas: enhancing risk awareness and response; establishing a better-defined security culture; improving technological resources and fostering innovation; improving oversight and quality assurance; and increasing cooperation and support. Highlighting multifaceted threats to aviation security in the context of international peace and security, the head of the United Nations civil aviation body urged greater cooperation among Member States, at all levels, to make global aviation security more effective. “We must find a way to identify and judiciously share essential elements of information necessary to implement appropriate measures at the proper level,” Fang Liu, the Secretary-General of the International Civil Aviation Organization (ICAO), told the Security Council today at its meeting on threats to international peace and security caused by terrorist acts. In her briefing, Ms. Liu informed the 15-member Security Council on the new ICAO Global Aviation Security Plan, which focuses extensively on the threat of terrorism to

“It will only be by virtue of sustained political will, especially at the highest levels of governments and industry, that the [Global Plan] will succeed,” the IACO chief added. Also in her briefing, Ms. Liu spoke of threats from cyber space; Man-Portable Air Defence Systems (MANPADS), especially in conflict areas; and improvised explosive devices in portable electronic devices. Concluding her remarks, the head of ICAO also urged the Security Council to allocate a portion of the counter terrorism funds as well as to encourage UN Member States to increase their contributions to aviation security projects, in particular for capacity building and training to enhance the effective implementation of ICAO Standards.

Security Council re-authorizes operations to disrupt migrant smuggling off coast of Libya The UN Security Council has extended by one year the authorization for Member States to inspect vessels on the high seas off the coast of Libya that they have reasonable grounds to suspect are being used for migrant smuggling or human trafficking.

The Council underscored that the resolution is intended to disrupt the organized criminal enterprises, but not to undermine the human rights of individuals or prevent them from seeking protection under international human rights law and international refugee law.

Unanimously adopting a resolution, the 15-member body condemned all acts of migrant smuggling and human trafficking into, through and from the Libyan territory and off the coast of Libya, which further undermine the process of stabilization of Libya and endanger the lives of hundreds of thousands of people.

The Council reiterated its calls on Member States, acting nationally or through regional organizations, to cooperate with the Government of National Accord and with each other to assist Libya, upon request, in building needed capacity to secure its borders and prevent, investigate and prosecute acts of smuggling of migrants and human trafficking through its territory and in its territorial sea.

Border Security Report | September/October 2017


SPECIAL REPORT

5

Bomb Technicians and Portable X-Rays: it is all Black and White

by John Howell, EOD Technician and Director of Explosives Technologies at DSA Detection E: jhowell@dsadtection.com

As an EOD Technician I was trained my entire career on black and white imaging with our portable EOD x-ray units. Now I am pretty old so that was a very long time ago but even today EOD technicians are still using black and white images when they conduct x-ray operations. Many years ago when I was using wet film in a cassette we did not have cell phones and the internet was not even a thing yet. Let’s fast forward

to today and technology has exploded around us. The advances we have seen in technology have streamlined and improved many of the tools we use today. However EOD as a whole is still working with Black and white imaging with their x-ray systems and it begs to question why. When you dig into the issue it is not that the portable EOD x-ray technology has not changed, it is EOD Technicians

Border Security Report | September/October 2017


6

SPECIAL REPORT

have not changed and adopted the new imaging capabilities that the portable systems now offer. There have been a ton of advances in the portable x-ray technology but for some odd reason EOD technicians are still doing all of their image interpretation in black and white. When I got out of the Marines and went into the private sector I went into the checkpoint security field deploying explosive detectors to embassies worldwide. I was also introduced to checkpoint x-rays and we started teaching IED recognition to the guard forces. As you can imagine our 1st x-ray interpretation course was all in black and white. We soon realized that all of the x-ray systems were in color and our presentation was not very effective. We needed to train the guards on images the x-ray systems were providing and color imaging was what all of these system showed. I learned that these color images were called material discrimination and each color represented a type of material (Organic, Inorganic, and Metals). At first I honestly had no idea what the colors represented and even when I went to the training it still did not make that much sense. All I needed to do was teach the guards what a threat looked like in x-ray so they could detect it when screening a person’s bag. The more I was exposed to this color imaging the more I started to see that different materials would turn different colors and I could even categorize them into a color template.

machines. We had to get a bunch of IED training aids and put them into bags so we could create all of the images. What we did not know was that explosives typically always turn orange (expect for a few) and all of the training aids we were using were made of clay (turns green). The next huge problem was that these x-ray could automatically detect explosives by placing a red box around anything that had a density and average effective number in the range of explosives. None of the clays we were using was getting a red box (go figure). This was all way before 9/11 and TSA/DHS so we had no standards to work from so we learned as we went. The below image is one of the slides we created and as you can see the explosive is green (wrong). Even the caps we were using looked wrong in the x-ray. This is where we learned that you had to use x-ray correct training aids to teach x-ray interpretation to a guard that is working on a dual energy checkpoint x-ray system. What we had been doing for years in EOD (using clay for C-4, etc.) was not going to work on these systems because they could tell the difference. So if any of you bomb guys get asked to teach the courthouse Deputies about x-ray cause you are the “expert” you had better make sure you are using x-ray correct training aids and images or you are going to really mess them up bad.

So we had to make new slides for the guards so the images matched what they were seeing on the x-ray

Border Security Report | September/October 2017


SPECIAL REPORT

So what does this all have to do with EOD portable X-rays? The first thing you need to know is that most of the EOD portable units that are on the market today can all provide material discrimination imaging. This new capability is the next step for EOD technicians that will improve the information provided from an x-ray image. This new capability greatly enhances the amount of information an EOD tech can obtain from the x-ray image and even opens up forensic capabilities that black and white imaging could never provide.

I attend a ton of shows and at the EOD shows I have heard people say material discrimination does not work. The

7

most common reference they use is if something is in front of the organic material you cannot see it. That is actually true but I do not think they REALLY understand how it all works. The same effect is also true for grey scale imaging because when you have a high and low density material in line with each other, you will never see the low density material because the high density one will block it. Both grey scale images and material discrimination images are “measurements� of either the high and low x-ray energy and they both are effected by what materials they are passing through. Both are subject to a higher density (grey scale) or higher average effective atomic number (material discrimination or Z eff) object in front of the lower density/Z eff object. So when I hear somebody use that as a reason it tells me they actually have no idea what they are talking about. Typically you will hear this from vendor who CANNOT do material discrimination (well if a vendor said it, it must be true). So if you are one of those people who say material discrimination does not work you need to come up with another reason why because it actually works very well, you just do not understand it.

Welcome to the Biometrics Innovation Leader. Brunei, Malaysia, Indonesia and many more other countries are using DERMALOG' Border Control technology as well as several member states of the European Union. DERMALOG biometrics for Border Control, ePassports and national eID cards are your best solution for increasing your security levels.

Border Security Report | September/October 2017

www.dermalog.com


8

SPECIAL REPORT

What are some examples of how material discrimination can help a help an EOD Technician in the field? Example 1: Is a tool box that has over 2 lbs of plastic explosives. In black and white you do not have a good reference of where the organic material is located. However in the material discrimination image you can clearly see where it is located. This is a one very key example of how a material discrimination image can help provide more info over just black and white.

Another very impressive capability with material discrimination is a feature called “Probe�. Several vendors have this software and it is very impressive at being able to show you an organic material that is behind a blocking material. So for all you saying material discrimination does not work wait till you see this.

The example above was provided by 3d x-ray and shows how they can remove the blocking material and let you see the organic material behind it. This is very impressive and provides a capability that EOD never had before. In a black and white image only system you would never have this kind of capability. So when you hear somebody say material discrimination can be blocked and it does not work show them this little gem. So why are EOD not using material Discrimination (color) imaging?

Example 2: Another example of how material discrimination can potentially show you where the organic/explosive material is located. When formulating a RSP it is always good to have more information as to the location of the explosives.

Example 3: Material Discrimination can tell you what items are metal in the x-ray image. Remember with x-ray units the numbers of pulses of energy you shoot at the

The reason that a capability like material discrimination is not being used by EOD is nobody in the EOD community understands it and how to interpret the colors. EOD school does not teach it and nor does HDS, so nobody out there has a good idea how to actually put these imaging features to effective use in the field. There needs to be somebody in the training side to champion material discrimination imaging so it can be taught correctly and effectively. It is an incredible tool the EOD community just has no idea how to use effectively.

Border Security Report | September/October 2017


SPECIAL REPORT

package is going to determine your level of penetration. So things that are not penetrated will turn black in a black and white image. This would typically make one think when they see black that the item is metal. With material discrimination there is no question about what is metal and what is not metal. Example 4: Gun powders and PVC pipe bombs with material discrimination is very effective as you can see below. In a black and white image you would not be able to tell the difference between a PVC pipe with black powder or smokeless powder. Black powder and black powder replacement are one of the few explosive materials that turns green. All of your smokeless powders turn orange in x-ray (single base, double base). PVC pipes always turn green in a material discrimination image because they have a higher Z eff than organic materials. However the smokeless powder still shows up orange even though it is in a higher Z pipe. I thought those guys were saying that material discrimination can be blocked and it does not work? Hmmmm

9

Example 5: This example is a really good one but you have to know what the colors mean and what colors things turn before you can understand what you are seeing. In a material discrimination image when you x-ray electronics the only colors that you should see are green and blue. Seeing the color orange in an electronic item is not normal so in the below you can see clearly the explosive that has been packed into this electronic item.

I could give you hundreds of examples of how much more information a material discrimination image can provide over black and white. The checkpoint security industry has been using it for years and it is very effective (they must know something). The EOD x-ray industry has just recently figured out how to do material discrimination with portable systems. The biggest problem right now is EOD techs do not understand it and like all things when they do not understand something it is not accepted. We need to fix this and all of the EOD “experts” out there need to learn what material discrimination is and how to use it effectively.

CRIMJUST, WACAP and the Nigerian Drug Project implemented a Joint Training on Investigation and Prosecution of Organised Crime and Drug Trafficking Together with UNODC ROSEN and UNODC Country Office Nigeria, in particular the Nigerian Drugs Project “Response to Drugs and Related Organised Crime in Nigeria”, and the West African Network of Central Authorities and Prosecutors (WACAP), CRIMJUST collaborated to bring together criminal justice officials from Ghana and Nigeria, who work on cases of drug trafficking and transnational organised crime. Given the challenges in police and judicial cooperation, regional networks and interregional initiatives serve an important role in facilitating international cooperation at formal and informal levels by building trust. The objectives of the joint training were to promote collaboration between criminal justice entities in both

countries, to increase the capacity of law enforcement officers, prosecutors, and judges to work on long-term responses to organized crime, and the development and implementation of relevant juris-prudence and practices in-line with national law, international standards and human rights. During the training, the 30 participants (among them 10 women) enhanced their knowledge on the specificities of drug trafficking cases and the integrated approaches to handle them, shared good practices in international and regional cooperation regarding organized crime and drug trafficking cases, and exchanged comprehensive information about their respective judiciary system and national criteria for cooperation.

Border Security Report | September/October 2017


10

EUROPOL REPORT

Dismantling and Arrest of a Moldovan Criminal Organisation between the Moldovan investigators and police services from several EU Member States. Several operational meetings were organised, financed and chaired by Europol in order to enable the investigators to decide and coordinate their operational actions.

Four suspects were arrested in Moldova for associating with a criminal organisation and trafficking very large amounts of drugs. The arrests were the result of a longterm operation run by the Moldovan authorities (the National Inspectorate of Investigations and the Organised Crime and Special Cases Section of the Prosecution Office), supported and coordinated by Europol. Europol’s coordinating and supportive role proved critical for the success of the operation. For almost 2 years, Europol acted as the main platform for the exchange of intelligence and for coordinating operational measures

The criminal organisation dates back to 2011 and brought together several organised crime groups into a single hierarchical structure, with a unique concept of action and clear division of responsibilities. The criminal activities of the organisation had a complex character and were carried out on the territories of several EU Member States and third States, by specialised offenders who were aware of police techniques and were constantly deploying countersurveillance and anti-interception methods. At the centre of the criminal scheme, the drugs (mainly hashish) were purchased in Spain, loaded into and concealed in various means of transportation and smuggled all the way to the Russian Federation. Upon arrival, the couriers were received by other members of the criminal organisation (Moldovan and Russia nationals) who took over the drugs and allocated them for sale, under the coordination of the leader of the criminal organisation.

43 Arrests in Successful Hit Against Organised Crime In one of the biggest EU investigations in recent years, led by the Polish Prosecutor’s Office and the Police Central Bureau of Investigation, a coordinated international operation targeting an organised crime group involved in the production and trafficking of drugs and psychotropic substances, as well as firearms trafficking, tobacco smuggling, luxury vehicle thefts and other offences, has resulted in the arrest of 43 individuals. Law enforcement agencies and judicial authorities

from Germany, the Netherlands and Poland, supported by Europol and Eurojust, carried out a simultaneous action targeting this organised criminal network in their respective countries. More than 330 police officers executed 75 house searches in Poland. As a result, 43 individuals were arrested, and firearms, substantial quantities of drugs, fake euro banknotes, and cigarettes without excise stamps were seized, among other evidence.

Nigerian Sham Marriage Criminal Network Dismantled in Germany and Portugal An international police operation supported by Europol has resulted in 50 house searches and the arrest of 5 suspects. The investigation, led by the German Federal Police and Criminal Investigations Department of Berlin, in close cooperation with the Portuguese Immigration and Borders Service / SEF, was initiated in October 2016 on the suspicion of facilitation of illegal immigration via marriages of convenience, so-called sham marriages.

network which was engaged in the facilitation of these sham marriages through the provision of false information and documentation to marriage registrars, thus exploiting the asylum and immigration system. These criminal elements were gleaning huge profits by organising EU residency status for Nigerian nationals through these marriages of convenience.

The investigators identified a Nigerian-led criminal

Border Security Report | September/October 2017


INTERPOL REPORT

11

INTERPOL General Assembly adopts data processing policy on refugees to the processing of Red Notices and diffusions against refugees endorsed by INTERPOL’s Executive Committee in June 2014. It is also in line with the United Nations Security Council resolutions which call on all countries to take appropriate measures to ensure that refugee status is not abused by the perpetrators, organizers or facilitators of terrorist acts. Underlining INTERPOL’s unique role in law enforcement cooperation, participants also supported the Organization’s seven global policing goals for 2030 on key security topics such as:

With the sponsorship of the Japanese Customs Cooperation To avoid refugee status being abused by criminals and terrorists, INTERPOL’s General Assembly has officially adopted a policy on the processing of data on refugees. The resolution, which was overwhelmingly endorsed by delegates, outlines a range of measures which should be taken by member countries during the asylum application process. These include: - systematically checking INTERPOL’s databases - use of INTERPOL’s Information System to exchange information - establishing the relevant protocols to enable regular communication between the authorities in charge of reviewing asylum applications and the relevant INTERPOL National Central Bureau/s - expanding to all relevant authorities, including border control and authorities in charge of reviewing asylum applications, access to the INTERPOL Information System In accordance with their national laws and confidentiality requirements, the policy also encourages member countries to inform INTERPOL’s General Secretariat headquarters, or the Commission for the Control of INTERPOL’s Files, if an individual has been granted refugee status and on the outcome of an asylum application review.

• countering terrorism • promoting border integrity • protecting vulnerable communities • securing cyberspace • promoting global integrity • curbing illicit markets, and • supporting environmental security Secretary General Stock said a collective effort to address evolving security threats was needed more than ever, with INTERPOL the natural custodian of global law enforcement interests. The four-day conference, which concluded today, brought together nearly 1,000 senior law enforcement officials and government ministers from 156 countries. In all, the General Assembly adopted 19 resolutions including a resolution interpreting Article 4 of the Constitution which governs the criteria under which countries can apply for membership of the Organization, and a resolution limiting the term of office of the Secretary General to two five-year mandates. The next session of the General Assembly will take place in Dubai, United Arab Emirates, in November 2018.

“This resolution strikes a balance between enhancing international police cooperation and providing adequate and effective safeguards to protect the rights of refugees,” said INTERPOL Secretary General Jürgen Stock. The resolution formalizes the policy which has been applied

Border Security Report | September/October 2017


12

OSCE REPORT

Mongolian police officers complete OSCE-supported course on trends and tendencies of organized crime, with focus on trafficking in human beings “By applying the Learn-Team-Coaching principle, we were able to work side by side with our Mongolian counterparts and effectively adapt the course to their needs,” said Joachim Wenz, the OSCE Police Affairs Officer. Developed specifically for the training, the Learn-TeamCoaching method ensured that regardless of language barriers and unique local requirements, the participants acquired the necessary knowledge by vividly discussing all relevant given topics under the supervision of local and OSCE trainers. Local police officers from Mongolia completed a weeklong OSCE-supported course on trends and tendencies of organized crime, with a specific focus on trafficking in human beings, which took place from in October 2017 in Ulaanbaatar. The course was delivered by a team of trainers, consisting of representatives from the Strategic Police Matters Unit of the OSCE’s Transnational Threats Department and the Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings.

During the course the OSCE Special Representative and Co-ordinator for Combating Trafficking in Human Beings, Ambassador Madina Jarbussynova, also addressed the participants. “It is critical to sensitize and train frontline police in the early detection of the crime of human trafficking and ensure that law enforcement possesses the specific and necessary skills to work with human trafficking victims,” said Ambassador Jarbussynova. “I welcome the timely delivery of this training course and look forward to further good co-operation with national authorities across Mongolia.”

Detecting forged travel documents in focus at OSCE training course in Sarajevo TAn advanced five-day training course on increasing operational awareness to detect forged documents and imposters for border police officials from Bosnia and Herzegovina started today in Sarajevo. The course for some 20 officers, organized by the OSCE Transnational Threats Department, in co-operation with the OSCE Mission to BiH, aims to increase the operational awareness of border guards by disseminating knowledge of travel document security. The training builds on the existing skills of officers related to travel document security and seeks to complement them through in-depth knowledge about the manufacturing process, document security features, as well as the latest trends in counterfeiting methods and means of identifying them.

which entails a ‘whole of government approach’ to the issue of border security, and believes this approach will not only help the country enhance its commitment to border security and management, but also ensure a safe and secure environment for the citizens of Bosnia and Herzegovina,” said Dr. William B. Langan, Head of Security Co-operation, OSCE Mission to BiH. As part of the practical exercises, the participants will examine the security features of passports, visas, plastic cards and banknotes common in the region and practise identifying facial and behavioural indicators for imposters.

“The OSCE Mission to Bosnia and Herzegovina espouses the OSCE’s ‘comprehensive border management concept’,

Border Security Report | September/October 2017


SPECIAL REPORT

13

World Customs Organization supports Indonesian Customs to strengthen its IPR border enforcement (ROCB A/P), China Customs and Japan Customs shared their knowledge and practices with the participants and facilitated the discussions. During the Workshop, the participants re-examined their current IPR enforcement at the border and the impacts of the illicit trafficking in IPR infringing goods by comparing them with the requirements of the WCO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS Agreement).

With the sponsorship of the Japanese Customs Cooperation Fund (CCF Japan), a WCO National Workshop on Combating Counterfeiting and Piracy was held for Indonesian Customs in Jakarta from 11 to 15 September 2017. The Workshop was attended by 21 Customs participants involved in IPR border enforcement. Resource speakers from the Asia/Pacific Regional Office for Capacity Building

The participants then discussed the challenges and possible solutions as a way forward through a series of group discussions. The discussions covered a wide range of topics, namely the legal framework, operational procedures, risk analysis, information recordation at Customs, informationsharing among Customs officers, cooperation with right holders and IPR training programmes. Through the intensive group discussions, the participants identified specific future actions to be taken, and shared their common understanding on how to improve IPR border enforcement.

ICAO Cooperation Enhances Effective Border Management through African Capacity Building The UN Migration Agency (IOM)’s African Capacity Building Centre (ACBC) in Tanzania hosted a training course on travel document security and fraud detection. The training was jointly implemented by IOM and the International Civil Aviation Organization (ICAO) with the objective of building the capacity of African States on border control and migration management. The trainees were border control management and aviation systems officials from Kenya, Tanzania and Uganda.

November 2016. IOM and ICAO assist Member States in meeting the growing operational challenges of migration management, advancing the understanding of migration issues, encouraging social and economic development through migration, and upholding the human dignity and well-being of migrants through efficient immigration and border management policies and structures.

The two UN agencies collaborate to promote and facilitate the safe and orderly development of international civil aviation in global air travel and in border and identity management. This collaboration, including in the area of traveller identification management, is underpinned by the Memorandum of Understanding (MoU) signed by the two UN agencies in

Border Security Report | September/October 2017


14

AGENCY NEWS

Agency News and Updates B

usiness travellers and States, Australia, Canada and Japan frequent visitors from who are already benefiting from the 40 countries can now benefit service. from faster entry to the UK following the expansion of the government’s Registered ross border Traveller service co-operation to stop illegal fishers

Frequent travellers to the UK from 15 new countries are eligible to apply for membership of the service, which brings the potential for improved trade and tourism links. The new countries to be covered by the service are Andorra, Bahamas, Botswana, Holy See (Vatican City), Macao, Maldives, Monaco, Namibia, Nauru, Papua New Guinea, Samoa, Seychelles, St Vincent and the Grenadines, Tonga and Trinidad & Tobago. They join countries such as the United

factors driving the increase in illegal fishing, making co-operation with other nations vital to stopping the problem.

C

1

French New Caledonian Armed Forces officers have met their Australian Border Force counterparts in Cairns to better target illegal Vietnamese fishermen.

Over 12 kg of heroin and four Pakistani mobile SIM cards were seized by the Border Security Force (BSF) troops in Abohar sector of Punjab, a BSF official said.

The meeting follows a spike in the number of Vietnamese sea cucumber fishing boats caught off the Far North coast during the past two years.

While 11 kg of heroin along with the SIM cards were seized at the Border Out Post Dona Raja Deena Nath, 1.10 kg of heroin was seized at the Border Out Post Jodhawala of Abohar sector, the official said.

ABF North Queensland area command superintendent Mandy Sinclair said there were a variety of complicated

Border Security Report | September/October 2017

2 kg Heroin, 4 Pakistani SIM Cards Seized In Punjab’s Abohar

The second search operation was conducted at the Border Out Post


AGENCY NEWS

Jodhawala yesterday where 1.10 kg of heroin was seized which was also wrapped in yellow plastic tape and was lying in the fields. The BSF has recovered a total of 150.104 kg of heroin in the year 2017 alone.

the Beitbridge border post by having a one-stop border post at the busy international gateway.

F

rontex Launches Capacity Building Project for Africa During AFIC Meeting

S

Minister for Foreign Affairs Vivian Balakrishnan and his Indonesian counterpart Retno Marsudi jointly submitted for registration the treaty on delimiting territorial seas in the eastern part of the Singapore Strait, the two countries’ foreign ministries said in a joint statement. The treaty was signed in Singapore on Sep 3, 2014 and was brought into force on Feb 10 this year after 10 rounds of discussions over three years. It is the third treaty relating to the delimitation of the territorial sea boundary between Singapore and Indonesia, and delimits a 9.5-kilometre stretch of sea boundary in the waters between Changi in Singapore and Batam island in Indonesia.

management and security, building better awareness of the situation at the African borders and exchange of information about migratory movements.

12 million more for Ceuta’s border fence

The Spanish interior minister, Juan Iganacio Zoido, announced on 12 September that a further €12 million will go to the border fence in Ceuta, a Spanish enclave in north Africa bordering Morocco, as the fence does not currently “fulfil its purpose”.

ingapore and Indonesia conclude third maritime boundary border treaty Singapore and Indonesia concluded a third maritime boundary border treaty.

15

Frontex, the European Border and Coast Guard Agency, hosted the 21st meeting of the Africa-Frontex Intelligence Community (AFIC), gathering representatives of 21 African countries and a number of EU institutions. During the gathering, Frontex launched a project to develop the capacity of AFIC countries to work on joint intelligence analysis of crime. This project will focus on training experts and setting up AFIC Risk Analysis Cells (RACs). It is funded by the European Commission. “Criminal networks are increasingly crossing national borders. None of us can manage the threats they pose to our countries and societies alone. There is little doubt that the increasingly international criminal groups require a global, cross-border response,” said Frontex Executive Director Fabrice Leggeri.

Zoido said that the fence needs reinforcing because over the last year there has been an increase of 34% in the number of people arriving in Ceuta. Some 8,956 people have apparently tried to enter Spanish territory by climbing over the razorwire topped fence, compared to 613 in the previous year. The money will go towards more thermal vision cameras, reconstructing damaged or deterioated sections of the fence and eliminating “blind spots”.

C

ambodia Shutters Border With Thailand to Curb Illegal Crossings

outh Africa, Zimbabwe “But for this to happen it is necessary push for one-stop to strengthen cooperation between all affected countries. This will help Beitbridge border post

Cambodia’s government closed all checkpoints along its border with Thailand to anyone other than Cambodian migrant workers returning home from the neighboring country, drawing criticism from residents who say their livelihoods depend on traveling between the two nations.

President Jacob Zuma said South Africa and Zimbabwe must implement their 2009 agreement aimed at cutting the massive delays characteristic with

The move follows a royal decree passed by Thailand which imposed jail terms of up to five years and hefty fines on illegal workers in the country.

S

dismantle organised crime networks engaged in people smuggling and trafficking in human beings,” he added. Participants discussed border

Border Security Report | September/October 2017


16

CONGRESS NEWS

the most engaging discussions in border manage ment    event update

World Border Security Congress Congress Programme will deliver high level discussions.

20th-22nd March 2018 Madrid, Spain

The international border security community gathers in Madrid, Spain on 20th-22nd March 2018 to discuss the latest issues, challenges and solutions facing the industry.

As we see the continued escalation www.world-border-congress.com of the global migration crisis, with mass movements of people fleeing the war zones of the Middle East as

Border Security Report | September/October 2017

well as illegal economic immigration from Africa and elsewhere, international terrorism shows every sign of increasing, posing real threats to the free movement of people. The world is expected to see a continuation of the migration challenges for the border management and security community, as little sign of peace and security in the Middle East is apparent and porous borders in Africa continue to provide challenges.


CONGRESS NEWS

17

the opportunity to develop the solutions to these challenges.

International organised criminal gangs and human and drug t r a ff i c k i n g g r o u p s e x p l o i t opportunities and increasingly use the internet and technology to enhance their activities. Controlling and managing international borders in the 21st Century continues to challenge the border control and immigration agencies around the world. It is generally agreed that in a globalised world borders should be as open as possible, but threats continue to remain in ever evolving circumstances and situations. Border Security Congress have developed a Congress Programme. The World Border Security Congress is a high level 3 day event that will discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and secure border and migration management. The 2017 event hosted by the Moroccan Ministry of Interior saw the opening session set the scene for this 3 day congress articulating both the importance of Border Management activity internationally and the significant challenges, which Governments, Policy Makers and Law Enforcement Agencies face with increasing pressures in a

difficult economic climate. With a global audience from over 40 nations and nearly 250 participants the conference was delighted to have received some excellent presentations from a broad range of distinguished and experienced border related experts. Alongside this, and importantly, there were some exceptional discussions and debates teasing out some of the more demanding areas of concern and addressing them from a range of perspectives, both from government and commercial positions.

Cooperation and Coordination continue to be two recurring themes during discussions and the building of trust to ensure that these two C’s can be accomplished with greater success. Identifying and understanding the latest and evolving threats and challenges for border agencies. Topics of discussion at the 2018 World Border Security Congress will cover:

• Foreign fighters and counterterrorism strategies at the border • Implementation of Advance Passenger Information • Coordinating Coastal and This was a truly global Maritime Border Surveillance conference seeking to address • Big Data and how to use it at global border issues and one the border which continually highlighted • Counter-Strategies for Human the need for continued efforts and Drug Trafficking in developing, national, • Surveillance Systems and regional and international; Technologies on the Border Coordination, Cooperation and • Future trends in International Communication. There were Border Management also some clear messages from • C h a l l e n g e s i n t h e some developing nations of the Mediterranean significant need for international • Ensuring international funding/ support, expertise and training support reaches the hotspots to assist them in addressing the • Information Exchange - the way forward challenges they face. The 2018 World Border Security Congress provides the platform for the international border security community to discuss, debate and challenge the existing situation, and offers

Further details on the programme and registration to attend the Congress in Madrid in March 2018 can be found at www.world-border-congress. com.

Border Security Report | September/October 2017


18

I N D U S T RY N E W S

Veridos eGates accelerate border control procedures at Luxembourg Airport The Police Grand-Ducale Luxembourg have commissioned Veridos to install ten eGates for automated border control (ABC: Automated Border Control) at the country’s international airport. The solution reduces the time taken to check passengers while also ensuring high security during the verification of travel documents.

market, namely our eGate solution. This will ensure they are well prepared to cope with the increasing

number of passengers,” says Veridos Sales Director, Labinot Carreti.

Smiths Detection wins biggest ever single order for next-generation hold baggage scanner for Frankfurt Airport Smiths Detection has won its largest single order ever for its advanced HI-SCAN 10080 XCT hold baggage scanners, with an associated eight-year service agreement.

Automated border control systems – known as eGates – are an solution for efficient and secure identity document verification. Passengers in Luxembourg will be able to enjoy the benefits of this innovative solution from 2018. Veridos will be supplying ten eGates to Luxembourg Airport, which is also the country’s sole international airport. In addition, the Veridos VeriGO® system will be used in Luxembourg to facilitate the integration of existing infrastructures and databases. “Our border officials have been using VISOTEC® devices to verify identity documents in real time

for more than a decade, making the introduction of eGates the next logical step on the road to creating the most safe and innovative border control system possible,” says Germain Schmit, project manager for ABC gates of the Luxembourg Police. Integrating eGates for departure and arrival is part of the ongoing expansion of Luxembourg Airport. The ability to verify identities within just 18 seconds via eGates will soon lead to a welcome reduction in waiting times. “We are delighted to be able to support Luxembourg with the most modern border control technology on the

The contract covers 35 of our HI-SCAN 10080 XCT next-generation scanners to support the upgrade to the ECAC Standard 3 explosives detection systems. The solution will deliver increased security and operational efficiency, and can easily be upgraded to meet future requirements to identify evolving threats, such as homemade explosives. Frankfurt is Europe’s second busiest airport in terms of cargo and fourth in terms of passenger

Border Security Report | September/October 2017

numbers, with over 60 million in 2016, making a high-speed, high volume hold baggage system critical to screening efficiency. The HI-SCAN 10080 XCT scanner combines high-resolution X-ray technology, medicalquality computed tomography (CT) and advanced detection algorithms to deliver exceptional levels of security. It supports a high throughput of up to 1,800 bags per hour,


I N D U S T RY N E W S

can accommodate items measuring up to 1,000 x 800 mm, and operates with a low false alarm rate to deliver a highly efficient screening process. Delivery will take place on a rolling basis between

2018 and 2021 with the order also including an eight year service agreement.The scanners will be used in Terminals 1 and 2 and will be operated by the German Federal Police.

contacts Editorial: Tony Kingham E: tony.kingham@knmmedia.com Contributing Editorial: Neil Walker E: neilw@torchmarketing.co.uk

Advanced fingerprint scanning technology simplifies border control for the German Federal Police

Design, Marketing & Production: Neil Walker E: neilw@torchmarketing.co.uk Subscriptions: Tony Kingham E: tony.kingham@knmmedia.com

The Smart Borders project is anticipated to incorporate biometric checks in order to identify previously denied persons who enter the Schengen area, to better identify criminals, identify persons who are staying within the EU longer than authorized and to enable an automated border control process. Pilot tests were carried out for this project at land, sea and air borders. JENETRIC has been part of this pilot project at the Frankfurt Main airport that utilizes JENETRIC’s fingerprint scanner LIVETOUCH quattro for several months. For the integration into

19

Border Security Report is a bi-monthly electronic magazine and is the border management industry magazine delivering agency and industry news and developments, as well as more in-depth features and analysis to over 16,000 border agencies, agencies at the borders and industry professionals, policymakers and practitioners, worldwide.

the border control system, JENETRIC cooperates with the German Federal Police and the IT security company secunet Security Networks AG. In addition, the study is accompanied by the Federal Office for Information Security and the Federal Criminal Police Office.

Copyright of KNM Media and Torch Marketing.

ADVERTISING SALES Paul Gloc (UK and Rest of World) E: paulg@torchmarketing.co.uk T: +44 (0) 7786 270 820

Paul McPherson (Americas) E: paulm@torchmarketing.co.uk T: +1-240-463-1700

Jerome Merite (France) E: j.callumerite@gmail.com T: +33 (0) 6 11 27 10 53

Border Security Report | September/October 2017


20th-22nd March 2018 Madrid, Spain

www.world-border-congress.com

The World’s most engaging event and discussion...

Collaboration and Interaction for Action

Converging and Enhancing Border Security Through Constructive Dialogue The world is experiencing the largest migration movement in history, with challenges for the border management and security community, as little sign of peace and security in the Middle East is apparent and porous borders in Africa and Asia continue to provide challenges. International organised criminal gangs and human and drug trafficking groups exploit opportunities and increasingly use the internet and technology to enhance their activities. Controlling and managing international borders in the 21st Century continues to challenge the border control and immigration agencies around the world. It is generally agreed that in a globalised world borders should be as open as possible, but threats continue to remain in ever evolving circumstances and situations. Advancements in technology are assisting in the battle to maintain safe and secure international travel. The border security professional still remains the front line against these threats. The World Border Security Congress is a high level 3 day event that will discuss and debate current and future policies, implementation issues and challenges as well as new and developing technologies that contribute towards safe and secure border and migration management.

ONLINE REGISTRATION NOW OPEN For further details and to register online: www.world-border-congress.com/registration We look forward to welcoming you to Madrid, Spain on 20th-22nd March 2018 for the next gathering of border and migration management professionals.

www.world-border-congress.com ...for the international border management and security industry

Supported by:

Media Partners:


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.