Counter Terror Business 12

Page 1

www.counterterrorbusiness.com | ISSUE 12

BUSINESS CONTINUITY | PERIMETER SECURITY | BAPCO 2013 | PLUS MORE

T EVENIEW PREVn to Countet r

CYBER SECURITY

HOW’S YOUR DEFENCE?

3a dow Count r Expo 201 n on Terro ia, Londo Olymppril 24-25 A

Protecting against hacktivists and cyber-terrorism TERRORISM

GLOBAL TERRORISM INDEX Ranking and comparing 158 countries for the first time

CCTV

CCTV SURVEILLANCE Invaluable in the protecting against terrorist attacks in populated areas


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS 05

05 COUNTER TERROR NEWS ‘Cyber Reserve’ to help tackle computer attacks; RAF Olympic security role praised

11 CYBER SECURITY Cyber conflict is flourishing writes Professor John Walker of the ISACA Security Advisory Group. Plus Ross Parsell, director of cyber security at Thales UK, talks about the brand new Research Institute in the Science of Cyber Security

21 INFOSECURITY EUROPE 2013 PREVIEW A look at next spring’s Infosecurity Europe show at Olympia in April, which gathers vital information about the latest trends in the IT security industry

23 PERIMETER SECURITY

11

Following on from an article in issue nine of CTB which discussed the need for a holistic approach to protecting the perimeter of high security sites, the Perimeter Security Suppliers Association has been active in pursuing a solution, writes Richie Bignell

23

29 SECURITY & POLICING PREVIEW The Home Office event Security & Policing 2013 takes place at Farnborough in March, and brings together serious players in the public security arena

33 COUNTER TERROR EXPO 2013 53

Counter Terror Expo returns on 24th & 25th April and concentrates its content on protecting people and assets from the international terrorism threat

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

39 BRITISH APCO 2013

The Free Professional Development Workshops taking place at British APCO will directly benefit the day‑to‑day activities of those working within public safety communications

47 BUSINESS CONTINUITY Next years’ Business Continuity Awareness Week will help with understanding business continuity and the role it plays in mitigating risk

49 EMERGENCY SERVICES SHOW REVIEW Taking place in Coventry, the recent Emergency Services Show promoted multi-agency collaboration, and even the nasty weather didn’t deter visitors from seeing the extensive range of products and services on show

53 CCTV & SURVEILLANCE In many cases where a terrorist organisation has been successful, CCTV has been known to help bring those involved to justice, writes the BSIA

59 GLOBAL TERRORISM INDEX The Global Terrorism Index, produced by the Institute for Economics and Peace, is the first index to systematically rank and compare 158 countries worldwide over a ten-year period to shed light on the impact of terrorism

69 ARMOURED VEHICLES The International Armoured Vehicles 2013 show, which runs from 5-8 February in Farborough, provides live defence vehicle demonstrations

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Karl O’Sullivan DESIGNER Richard Gooding PRODUCTION DESIGN Jacqueline Lawford PRODUCTION CONTROLLER Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Lucy Carter, Charlotte Casey GROUP PUBLISHER Barry Doyle REPRODUCTION & PRINT Argent Media

© 2012 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

3



CYBER SECURITY

‘Cyber Reserve’ to help tackle computer attacks

Cyber specialists are to be recruited by the UK government to make up a “Cyber Reserve” force to help with cyber security threats. Run by the Ministry of Defence, it will allow the armed forces to use the expertise from those in the cyber field to support work protecting the country against the growing threat of cyber attack. Minister Francis Maude said help was needed with “critical” work in combating online crime. The scheme’s details will be unveiled next year. The announcement came in the first annual update of the Government’s cyber security strategy, during which Maude promised efforts to make the UK “one of the most secure places in the world to do business in cyber space”. He said the coalition government was looking to “move towards the establishment of a UK National CERT (Computer Emergency Response Team)”, to act as a “focus point for international sharing of technical information”. Maude also said: “Working with the private sector to improve awareness of the

need for better cyber security continues to be a priority. We are now focusing our efforts on making sure that the right incentives and structures are in place to change behaviour in a sustainable way. “Government departments and agencies are working with professional and representative bodies to ensure the consideration of cyber security becomes an integral part of corporate governance and risk-management processes.” The government also wants to train more students with cutting-edge skills at tackling online crime. A degree course module on the subject is being piloted at De Montfort University, the University of Worcester and Queens University Belfast. Maude continued: “We are constantly examining new ways to harness and attract the talents of the cyber security specialists that are needed for critical areas of work. To this end, the MoD is taking forward the development of a ‘Cyber Reserve’, allowing the services to draw on the wider talent and skills of the nation in the cyber field. “A detailed announcement will follow in 2013”, concluded Maude.

BUILDING SECURITY

Large-scale emergency evacuation tested at London’s Shard

News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NEWS IN BRIEF Pakistan plans to form new counter-terror body The Pakistan government has approved a draft law to establish a new counter terrorism body aimed at better coordinating efforts to defeat Taliban and al-Qaeda-linked violence. Pakistan says 35,000 people have been killed as a result of terrorism since the 9/11 attacks and the 2001 US-led invasion of Afghanistan. Suicide attacks, bombings and shootings are a day-to-day reality, particularly in parts of the northwest near the Afghan border. Information minister Qamar Zaman Kaira said the main objective was to defeat terrorism.

Head of al-Qaeda in Iraq arrested The head of al-Qaeda in Iraq has been arrested and a number of other operative names have been seized. According to one source, forces spent two months tracking down the al‑Qaeda leader before arresting him. They are currently interrogating the man but have not yet released his name. However, Iraqi media reported that the man in custody is in fact Abu Bakr al-Baghdadi, who is known as the head of a collective of armed groups called the ‘Islamic State of Iraq’. The organisation has claimed responsibility for a number of attacks, including those in the capital in October 2009, which killed 155 people.

Copyright Stellar

US Homeland security grant spending questioned

Three hundred people were evacuated from the Shard in London, the tallest building in the European Union, as part of a large-scale emergency simulation. It was also an opportunity to practice the building’s evacuation procedures before The Shard opens to visitors and tenants next year. The Metropolitan Police helicopter circled overhead whilst firefighters, ambulance crews and the Shard’s own staff took part in the drill. “London’s firefighters are highly skilled and it is our job to make sure that we are fully prepared for any challenge that we might face,” said David Brown, London Fire Brigade’s head of operations, prevention and response.

“Exercises like this at the Shard are a key part of the Brigade’s normal training for the wide range of emergencies it is asked to respond to.” Irvine Sellar, chairman of developers Sellar Property Group said: “Safety and security is of paramount importance at London Bridge Quarter and The Shard, and working with the fire brigade to facilitate this training exercise gives us the opportunity to practice evacuation procedures in readiness for the building opening in 2013.” Special equipment has been installed in the Shard to ensure that radio systems used by the emergency services will function at the top of the tower.

The purchase of an underwater robot in an American midwest city with no major rivers or lakes nearby and a hog catcher in rural Texas have been highlighted as examples of wasteful spending of tax money intended for counterterrorism purposes, a report has found. Senator Tom Coburn said in his 54-page report that while much of the spending for the department’s Urban Area Security Initiative (UASI) appeared to be allowed under the program’s rules, it was still inappropriate in an age of budget austerity. Among the projects Coburn found questionable were $98,000 for an underwater robot in Columbus, Ohio, where there are no major rivers and few lakes nearby, $21 for a fish tank in Seguin, a small Texan town, and a ‘BearCat’ armored vehicle bought with a $285,933 grant in Keene, New England.

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

5



DATA SECURITY

UK warned secret intelligence could be compromised after data theft in Switzerland Hugely sensitive counter-terrorism intelligence could be compromised after a ‘disgruntled’ Swiss IT worker walked out of his job at NDB, Switzerland’s spy agency, with millions of classified data files. While the technician was arrested by Swiss authorities last summer and the stolen data seized, one source said that Swiss investigators could not be positive the suspect did not sell or pass on any of the information before his arrest. This has lead to Swiss authorities alerting America’s CIA and Britain’s MI6 that shared

information could be compromised. A European security source said it is believed the IT worker became disgruntled when he felt his advice on operating the data systems was not being taken seriously. He worked for the NDB – or Federal Intelligence Service, which is part of Switzerland’s Defense Ministry - for about eight years. Describe as a ‘very talented’ technician, he also had ‘administrator rights’, which gave him unrestricted access to most or all of the NDB’s networks, including those holding vast caches of secret data.

News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NEWS IN BRIEF Research started into airport security checkpoints More passenger friendly airport security checkpoints will be researched over the next five years by a consortium of research institutes, security specialists, airport operators and equipment manufacturers from across Europe. The £15 million project, called XPDITE, will develop a method for designing checkpoints which balances factors such as security, cost, throughput, passenger convenience and societal acceptance. The results will aid the design of more effective and efficient checkpoints while the passengers will suffer less hassle from the checks. The project is part funded by the EU under the Seventh Framework Programme.

Woman jailed after al-Qaeda material found on phone A woman has been jailed after two editions of al-Qaeda’s Inspire magazine was found on her mobile phone. Twenty-two year old Ruksana Begum is sister to Gurukanth Desai and Abdul Miah who were sentenced for a plot to blow up the Stock Exchange. Hossein Zahir, defending, said Begum downloaded the material to understand why her brothers had taken the path they had. The judge, Justice Fulford, said there was nothing to suggest that Begum was involved in terrorist activity. She is likely to be released in a month.

ACCESS SECURITY

Vatican introduces new security measures to prevent further ‘Vatileaks’ Vatican clergy and staff will now need to carry an identity card complete with a microchip-tracking device, as part of new security measures designed to prevent a repeat of the ‘Vatileaks’ scandal. Much tighter controls have already been introduced for anyone seeking access or photocopies of the Holy See’s archives, dossiers and documents. The Papal apartments, which include the living quarters of Pope Benedict XVI and the offices of his personal staff inside the Apostolic Palace, are totally off limits to anyone without strict authorisation. Slovenian priest, Mitja Leskovar, an anti‑espionage expert nicknamed ‘Monsignor 007’, is in charge of implementing the new security procedures with the identity cards expected to be introduced from January 1.

Leskovar, who grew up in the former Yugoslavia under communism, is responsible for the transmission of confidential documents between the Vatican and its papal nuncios or diplomats inside the Secretariat of State and also supervises all requests for document photocopying within the secretariat. Thousands of clerical and lay staff working inside the walls of the Vatican from the Apostolic Palace to the Secretariat of State will be affected by the tighter scrutiny that will also enable their superiors to monitor when they clock in and out. Claudio Sciarpelletti was convicted in November of aiding and abetting Paolo Gabriele, the pope’s former butler, who himself was convicted of stealing the pontiff’s private documents and leaking them to an Italian journalist in an embarrassing security breach, known as the ‘Vatileaks’, that rocked the Vatican earlier this year.

Post-Soviet states to intensify joint counter-terror training Leaders of the Commonwealth of Independent States (CIS), a loose association of post-Soviet nations, have reaffirmed their resolve to intensify their joint counter‑terrorism training programmes, a Russian presidential spokesman has said. “They also reaffirmed their readiness to intensify cooperation in logistical and technical support for (counter-terrorism) units,” Dmitry Peskov said on the sidelines of a CIS heads of state meeting. The CIS heads of state also discussed cooperation in countering drug trafficking, extremism, separatism and trans‑border organised crime, as well as defence cooperation, Peskov said. The CIS is made up of Armenia, Azerbaijan, Belarus, Kazakhstan, Kyrgyzstan, Moldova, Russia, Tajikistan, and Uzbekistan.

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

7



EVENT SECURITY

RAF’s role in Olympic security commended Seventeen personnel from across the RAF have been awarded for their outstanding contribution towards a safe and secure London 2012 Olympic Games. Chief of the Air Staff, Air Chief Marshal Sir Stephen Dalton, presented the awards and personally thanked more than 100 personnel for their professionalism, dedication and work supporting the Games. He said: “The Royal Air Force played a critical role in supporting this year’s Olympics. In the air we provided air security for the Games whilst maintaining our operational commitments, including the protection of

the entire UK airspace by the Quick Reaction Alert Force. “On the ground, Royal Air Force personnel, together with our sister Services, made a significant contribution to the overall success of the Olympics, performing security, support and ceremonial duties at the Games. “With the Olympics, Her Majesty The Queen’s Diamond Jubilee and our round-the‑clock operations, overseas and at home, I could not be more proud of the dedicated and professional young men and women of the Royal Air Force, and of course the families and friends that support them – well done and thank you all.”

CYBER SECURITY

BORDER CONTROL

Netherlands and US cooperate on cyber security

‘Risk profiling’ software to protect borders

The US and the Netherlands have signed a joint agreement on scientific and technological cooperation, with an emphasis on cybersecurity research. The US-Netherlands Agreement on Cooperation in Science and Technology Concerning Homeland and Civil Security Matters will help foster bilateral cooperation in fields that have a direct impact on national security, including research, evaluation, and preparation of chemical, biological, radiological, nuclear and anti-explosive protection measures to better protect the flow of commerce and the citizens of both nations. “Continued innovation is critical to keeping cyber networks and systems safe,” said US Secretary of Homeland Security Janet Napolitano.

New ‘risk profiling’ software has been created that is believed to help detect and prevent potentially dangerous passengers and cargo entering the UK. The technology takes into consideration information that is already know to be true about a passenger entering into the country, such as nationality, point of origin, Visa information, and uses that develop a ‘risk score’. This score will help immigration officers sift through who’s a potential threat from who is not. Developers UK company SAS Software say the use of such a programme could well have prevented the so‑called Underpants Bomber, Umar Farouk Abdulmutallab, being able to board a flight to Detroit in 2009 with explosives sewn into his underwear.

News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Record number of visitors attend Transport Security Expo 2012 Transport Security Expo has closed its doors after another highly successful event. The two-day conference, exhibition and workshop witnessed 3,000 attendees, a record number in its decade long history. Well over six hundred delegates attended Transport Security Expo’s three focused conferences in the maritime, aviation and public transport arenas. The conference was supported by an extensive exhibition featuring in excess of a hundred key vendors from across the globe. Delegates, exhibitors and visitors gathered additional insight from a range of knowledge centric workshops held during the two-day event. Delegates attending the maritime conference received detailed briefings from the United Nations (UN), North Atlantic Treaty Organisation (NATO), European Commission (EC), the EU NAVFOR and others, on the state of play in addressing security concerns including continued acts of piracy on the high seas. With major regulatory change planned in the aviation sector, senior figures from the Department for Transport (DfT), UK Border Agency and Center for the Protection of National Infrastructure (CPNI), debated with industry representatives from ACI Europe, Airport Operators Association (AOA) and thinkers from across the airport and airline communities, as to how change might be implemented and the benefit it could possibility bring. Significant challenges remain across the open systems that form the public network travellers use on a daily basis. Nevertheless, delegates heard from the Department for Transport (DfT), Center for the Protection of National Infrastructure (CPNI), Transport for London (TfL), British Transport Police (BTP) and others that change is happening in this arena too, which will enhance security over coming years. Transport Security Expo hosted international delegations from Dubai, Saudi Arabia, Oman, Libya, Brazil and Morocco, highlighting the importance of this event to key transport security professionals from across the globe. Admiral Lord West, security advisor to former Prime Minister Gordon Brown and previously First Sea Lord at the Admiralty and Chief of Naval Staff hosted lunch for over a hundred VIPs attending the event.

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

9


Bringing security to your world

Delivering security solutions that fit your needs Government Identity and Access Management solutions from HID Global. The right interoperable products, the right field-proven brands like LaserCard® Optical Security Media (OSM), ActivID Credential Management System and FARGO® ID card printers and encoders. Tailored processes backed by years of the right design and integration expertise. We power the world’s most secure Identity programs. We’re HID Global. Learn more at hidglobal.com/main/government-solutions


CYBER SECURITY

Written by Professor John Walker, chair, London chapter, ISACA Security Advisory Group

CYBER ATTACKS: WHAT IS YOUR DEFENCE?

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

In the economic downturn, Cyber conflict is flourishing, which puts us all in a position of logical and at times physical exposure to cyber criminals, hacktivists and state sponsored hackers, writes Professor John Walker Businesses are struggling to stay healthy and operational under the shadow of financial pressures. Yet, whilst dealing with this, it would seem that at every opportunity, there may be someone, somewhere ready to take advantage of a vulnerability, poor system configuration, or a badly coded application to gain some position of leverage, or financial compensation for their criminal efforts. During this economic downturn, those involved in the imaginative world of cyber crime, hacktivism, cyber extortion, and those annoying drive‑by‑hackers are all, or would seem to be, doing very nicely. There has been recent debate about the levels of cyber-risk faced by users, business, governments, and the Interconnected Global Village and a modicum of time invested in research will soon reveal the levels of real‑time

risk faced by society today. The simple fact of the matter is, if you or your business uses the Internet you are potentially exposed to cyber exploitation. A small research project running under the academic banner of Nottingham Trent Computing and Informatics Department is measuring the scale of cyber attackers, and incidents on a day-by-day basis. To date there have been some interesting revelations for instance, whilst the US were suffering the after effects of Hurricane Sandy, it was noted that the levels of attack on the eastern seaboard dramatically increased over the same period. These attacks were possibly driven by those who have their own government, hacktivists, ideological, and politically motivated axe to grind, thus taking advantage of the weakened state of their victims.

The fact simple tter is, a of the mbusiness if your Internet, uses thepotentially you are d to cyber expose itation explo

ACTIVE ATTACK GROUPS There are a number of active groups who may launch an attack, ranging from those focused on specific individuals; companies; or even governments. Individuals may be targeted by those with an interest in deviance and personal exploitation, seeking to locate targets for purpose of grooming, abuse, be that on, or off-line (e.g. Paedophiles). We must then consider persons, or groups who utilise cyber space to drive political, antisocial activities, who we may refer to as hacktivists, and the associated ideological factions. And then that brings us to the world of serious and organised cyber criminals, seeking to make a quick profit by exploitation of selected targets. And let us not overlook those cyber warfariens, acting as mercenaries, or state sponsored groups – all of which pose varying levels of risk, to all levels of society. Consider the classifications of cyber threats, and what they have in common with their predecessors from the eons prior to our reliance on computers. It was just a matter of them morphing conventional crime to fit E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

11


Does your endpoint security have a wait problem? Traditional endpoint security solutions—with fat clients and huge update downloads—leave your users waiting to use their machines and the network. Why wait to move to nextgeneration endpoint security technology.

Webroot® SecureAnywhere™

Fast

eliminates waiting for long scans

Less than 6 seconds to install Extremely fast scans —average of 4X faster

and signature updates. Trial Webroot today, and see how it puts more time and computing power back in your users’ hands—and hours back in your day.

Painless No conflicts with other security products Eliminates the need for a dedicated server

Secure 100% Effective against zero day threats 99.8% Effective against malware

To download a free 30 day-trial today, visit www.webroot.com/CTbusinesstrial To speak to our Sales team, call + 44 (0) 8701417070 © 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, and the globe design are trademarks of Webroot Inc. in the United States and/or other courntries.


CYBER SECURITY  the logical landscape, representing increased opportunities to reach a wide target audience. For example, take the good old extortion rackets, leveraging some opportunity to target subjects for financial exploitation to pay up, or suffer a consequence. Well consider how this has changed from the blue collar hands-on approach, to that of the much more respectable cyber extortion. Say finding a supposed vulnerability, and demanding payment, or else! Or just threatening the target with a Denial of Service Attack, unless that is, they pay up! This is a problem that is more common than realised – it is just that those within their various sectors, be that online gambling, or financial houses don’t report these events – in some cases, they simply blunder along under the watchful eye of their wanting, and at times, junior CISO. An underpinning fact of the criminal groups is their increasing level of sophistication utilising crime ware, hacking tools, and logical opportunities (e.g. Advanced, Threats, and Advanced Evasion Techniques) which are available at a click of a mouse. Like any businesses, there is no doubt that having the right tools to do the job will increase the rate of success. To accomplish this, well‑engineered applications may be sourced such as CotS (Crimeware-off-the-Shelf), or CaaS (Crimeware-as-a-Service) ready-made, ready to go, or even bespoke metered applications. Again, this is nothing new, as from way back in heyday of Computer Viruses, such utilities were then readily available in the form of virus creation kits, with which the average fledgling hacker could create his/her own vector of infection, to set loose on the unsuspecting public. However what has changed with the advance of time is that such malicious products are now more sophisticated, and commercially oriented in the criminal sense, and no longer seek to simply announce their logical presence, but are honed with covert operations as a clear objective. ANONYMOUS PROBLEM And then we may look at Anonymous, a group motivated by political, or radical opinions, or what may be described as an anarchistic conscience, with the clear objective of expressing protest through electronic means, seeking to disrupt, embarrass, or to exemplify a target. The concern here is what may spark the attention of an attack of hacktivism, focusing on any given individual, site, brand, or community. It is here of course where some may wish to challenge the ethics of any miscreant social conscience, on a collision course with a particular target be that international government, through to any commercials interest – all potentially sitting ducks. For instance, after the arrest of six prime LulzSec members, Anonymous declared that, by association, the security firm Imperva were on their hit list, and stated that, notwithstanding key members

of LulzSec had been removed, “You haven’t stopped us. You have merely disrupted the active faction.” Here, in the case of Imperva, Anonymous also clarified that the firm were considered a nuisance to them, and had earned a place for future attention. To balance an objective view of Anonymous, and other like-minded groups, one should also consider potentials anarchistic sentiment, driven within such adversarial communities, who feel they must redress the balance with cyber-protest, against what are considered wrongs to society. And, not wishing to raise any political debate, but one may appreciate that, out of the financial collapse, corrupt and fraudulent public servants, outrageous actions of media moguls, and modern day social impact across the entire

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

some new Act’s, the individual, or company are potentially culpable of an offence. For many years, Cyber War has also been discounted as a matter of fiction which would be better associated with the writings of HG Wells. However, as of 2012, this opinion is no longer valid, and it is recognised that the prospect of computers being used as a weapon is a reality. In fact, utilisation of computers in such an aggressive guise may only be limited by the imagination of the attacker. It could be that cyber attacks could be a selective strike to impact a particular target, infrastructure; or the attack may represent a precursor which would be launched alongside a Kinetic capability against targets like SCADA (Supervisory Control, and Data Acquisition). SCADA is used to control nearly every utility network from energy to

Given reported cyber attacks, and levels at which successful infiltrations currently occur, exposure already exists which should not be considered acceptable. Speculation is also rife that criminal entities may be waiting for the next opportunity to exploit, with the very real possibility of using Virtualisation, Cloud or BYOD platforms. global population, some individuals have been radicalised to protest in frustration. Thus one should recognise that ideological forms of protects can be very dangerous. And when we look back to 2007, with the advent of Titan Rain, we may recall cyber attacks aimed at UK, US, and German Governments. There have also been a number of attacks against the 13 root servers, upon which the very backbone of the Internet relies, and in more recent times. On top of this logical adversity, if we are to believe reports, there are millions of compromised home, and business computers recruited into Botnets, with the personal financial impact of cyber crime resulting in a potential illicit revenue being generated from say, a compromised banking transaction, there is real cause for concern.

transport. As an example of what an attack against a SCADA system could impose, just look up at the light in your office, or the computer on your desk, both of which are enjoying the life-blood of electrical current to keep them operating the delivery of such power could be stopped by interfering with a SCADA component. But just how exposed and vulnerable are the systems we use each day to run our businesses? Given reported cyber attacks, and levels at which successful infiltrations occur, one could argue that exposure already exists which should not be considered acceptable. It may also be concluded with speculation, that it could be the case that criminal entities may just be waiting for the next opportunity to exploit, maybe using the platform of Virtualisation, Cloud, or BYOD – who can say? L

BOTNETS Other major contributors to the world of cyber insecurity is that of the Botnet manifesting in adverse impacts on a system near you, and probably right now – unaware users at both work, and at home may be infiltrated with malicious logic in the form of phishing, or scams, which could result in identity theft, or the exploitation of local system resources for whatever intended purpose manifesting from the attackers imagination. Imagine if such exploitation was to employ your personal or company Internet connection to download pirate, or bootleg software, films, or music – under

FURTHER INFORMATION Professor John Walker is chair, London chapter, of the ISACA Security Advisory Group. ISACA is an independent, not‑for‑profit association which engages in the development, adoption and use of globally accepted, industry‑leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. Visit www. isaca.org for further information

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

13


Counter Terror Solutions for an Evolving World

Counter Terror Expo 2013 is the largest international event to mitigate threats, protect against terrorist attacks and understand current modern day risks in a secure environment. Discover solutions to protect against threats for: Police, Emergency Services, Government, Military, Intelligence & Security Services, Private Sector, Large scale sites, Oil & Gas, Cyber, Maritime/AntiPiracy and Critical National Infrastructure.

• • • • • • • • • •

A-Z of modern counter terrorism solutions 9000+international attendees 400+ exhibitors 4 conference streams 17 show floor workshops Closed door and secure briefings 200+VIP and International delegations Meet the Buyer Programme Networking Opportunities Brand new show features to protect against current security risks

If you’re involved in security & counter-terrorism then register today to protect against the terrorist threat.

www.counterterrorexpo.com/CTBusiness

Co-Located with

Lead Media Partner

Supported By

SAMI www.seasecurity.org


DATA SECURITY

TACKLING THREATS FROM THE INSIDE

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Organisations have been protecting sensitive data and IT technology from threats for over twenty years now. But are insider threats to data safety and integrity being overlooked? When we think of data protection and cyber security threats, usually the image of a malicious outsider comes to mind. A hacker trying to breach our defences, cybercriminal gangs trying to compromise us, cyber-terrorists pushing their agenda through a targeted attack. Companies have been protecting sensitive data and IT technology from malicious hacker attacks and other external threats for over twenty years now. Without having ever even met a real hacker or a virus writer in their life, they invest a significant part of the IT security budget into the protection against the consequences of the work that these persons have done. Very often, though, they ignore another category of threats; the threats that are represented by people that they meet everyday – by the very employees of the company and people on the inside. Protection against internal threats thus becomes a very current issue. LOCKING OUT THE BAD A 2010 Verizon study revealed that 48 per cent of all data breaches were caused by insiders. And furthermore, that 93 per cent

from outside threats through the use of quality firewalls and antimalware software, than it is to govern all internal processes within an organisation, where data may get compromised. But probably the most overlooked part is psychology. Simply put, for most it is easier to see an anonymous outsider as a threat, rather than your trusted co-worker. Most managers we ever talked to, could not bring themselves to accept the results of the Ponemon Institute study, which indicated that 59 per cent of corporate workers surveyed stated they would have no qualms leaving with sensitive company data upon layoff or departure, 79 per cent of these respondents admitted their company did not permit them to leave with company data and 68 per cent were planning to use email lists, customer contact lists and employee records for their own business. And the problem is not limited just to data loss. You could also apply elements from the above attitude towards sensitive data to other security protocols and realise that even a well thought out defence plan can be brought down through employee negligence or malicious activity. The problem with the current situation

A 2010 Verizon study revealed that 48 per cent of all data breaches were caused by insiders. And furthermore, that 93 per cent of these were deliberate, and 75 per cent of them involved embezzlement, skimming or related fraud. of these insider breaches were deliberate, 75 per cent of them involved embezzlement, skimming or related fraud and 49 per cent involved system access or privilege abuse. So, if the insider threat is responsible for one in two data-loss incidents, why are most security efforts focused on keeping the bad things out, instead of keeping the good things in? The answer is made up of many parts. A part is legislation, where certain rules regarding privacy are usually imposed on the employer regarding his employees; so much must rely on trust, while none of that governs the fight against a malicious anonymous outsider. And then there is the problem of practicality. It is in principle much easier to lock down computers

is the imbalance between the protection against external threats and protection against internal threats. The manufacturers and distributors of these solutions are met with not only strained budgets that leaves no room for internal security solutions, but also certain reluctance and apprehension that one of the persons whom everybody knows and sees on a daily basis may turn out to be a security threat. If the company ignores the existence of internal threats, it is putting its interest and resources at risk.

protection, Safetica has introduced a new line of software products, with never before seen levels of integration, which keep all sensitive company data under safe control. Not only can it limit employees’ access rights according to their clearance level, it can also monitor and block unauthorised access attempts, copying, emailing, bluetooth access or other data removal methods, so it can ensure that sensitive company data stays inside the company. It can also maintain a secure password policy for all users, offers web access monitoring, email and network traffic control, alerting supervisors of all anomalies before they become a serious problem, making sure employees stay focused on the job and minimising the risk of any data disclosure. Should a laptop or USB stick with delicate data be lost or stolen, Safetica software also has the ability to automatically destroy or lock the data so it is unusable for unauthorised access. Safetica Endpoint Security is the world’s only monitoring software able to protect your company from all major problems caused from the inside: sensitive data leaks, financial losses and damaged reputation. At the same time, Safetica Endpoint Security reveals any suspicious behaviour long before any harm is sustained, while staying in compliance with all legislation governing employee and customer privacy rights. L FURTHER INFORMATION www.safetica.co.uk

IN SAFE HANDS In order to keep data in check and provide a consistent and comprehensive internal threat

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

15



CYBER SECURITY

Ross Parsell, director of cyber security at Thales UK, talks about The Research Institute in the Science of Cyber Security – the UK’s first academic centre dedicated to studying the cyber threat Whether aimed at an individual, private organisation or the public sector, cyber attacks are always about threats to information. This means that everyone should take cyber security seriously because a successful attack can result in the loss of high-value information to an entity: the consequences of such lost data for a public sector body can range from fines and reputational damage to the theft of national secrets and putting the public at risk. The same rules apply to the public sector as to the enterprise. When thinking about cyber security, a public sector body needs to consider the sort of information it wants to protect; the consequences of losing that information; its risk appetite when it comes to information security; and, importantly, where sensitive data resides in the organisation. Once public sector bodies have taken a mature approach to risk assessment, data protection and dictating response policy, they can make serious strides to improving their cyber security posture. In recent years the UK government has made significant progress in raising national cyber security standards: on 25 November 2011 the government published its new Cyber Security Strategy which outlines how it plans to create a more trusted and resilient digital environment for the nation; and in September 2012 Minister for the Cabinet

Office Francis Maude announced the launch of a new research institute into Cyber Security which will become a focal point for the UK’s efforts to protect cyber space. NEW ACADEMIC CENTRE The Research Institute in the Science of Cyber Security is the UK’s first academic centre dedicated to studying the cyber threat. Funded by a £3.8m grant, the Institute is part of a cross-government initiative led by GCHQ, the Department for Business, Innovation and Skills (BIS), the Research Councils’ Global Uncertainties Programme (RCUK) and the Office of Cyber Security and Information Assurance (OCSIA).

Written by Ross Parsell, director of cyber security, Thales UK

CYBER SECURITY: HOW THE UK IS PROTECTING ITSELF

Led by UCL’s Head of Information Security Angela Sasse, the virtual facility brings together leading authorities in cyber, IT, mathematics, social sciences and other disciplines to increase the UK’s resilience to digital attacks. Academics from the University of Aberdeen, Imperial College, Queen Mary College Royal Holloway, University of London, Newcastle University, and Northumbria University will collaborate with industry experts and international researchers to address some of the most pressing cyber challenges affecting the public and private sectors. One of the main principles of the Institute is that it will study real life cyber issues, thereby ensuring that its research remains relevant to the rapidly evolving cyber threat. With the UK already generating 8 per cent of its GDP from the cyber world, it is of critical importance that the UK retains its status as one of the most secure places in the world to do business. The arrival of the Institute is therefore welcome news indeed for the UK. For the very first time, the entire nation will have a focal point for its efforts to improve cyber security and the Institute can carry out important work to tackle current deficiencies in the UK’s cyber security posture.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PUBLIC SECTOR CYBER SECURITY One of the main benefits of the Research Institute will be to raise cyber security awareness amongst the general public, private enterprise and crucially the public sector. Amongst the upper echelons of the public sector, government minsters to CIOs in public sector bodies have at least some grasp of the cyber threat. However, there is a clear dichotomy between the message and direction of cyber strategies coming from the top and the implementation of those strategies further down the food chain. It would not be misleading to say that the majority of public sector employees have a very limited grasp of the issues surrounding cyber security and of major national IT projects in general. As a case in point, a survey was recently conducted into awareness of the Public Services Network – one of the most important UK ICT projects in recent years. The Public Services Network is designed to be the cornerstone of the UK’s ICT strategy and is designed as a ‘Network of Networks’ for the E

The Research Institute in the Science of Cyber Security is the UK’s first academic centre dedicated to studying the cyber threat. Led by University College London’s Head of Information Security Angela Sasse, the virtual facility brings together leading authorities in cyber, IT, mathematics and social sciences. Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

17


Effective security demands exceptional equipment Totalpost Services Plc. The provider of choice for an increasing number of security-conscious businesses that are investing in cutting edge X-ray technology to screen incoming mail, parcels, baggage and cargo. Totalpost Services Plc is the exclusive distributor of industry-leading Astrophysics x-ray and metal detection equipment in the UK and Ireland.

Features include: Dual View and Threat Image Projection (TIP) Six colour image and atomic number recognition A choice of mobile detection units and walk-through metal detectors

ill be w t s o Totalp ting the i exhib cs range ror physi Astro Counter Terh at the 24th & 25t Expo l 2013. Apri G60 Stand

To discuss how we can help please call 0845 4900360 or email sales@totalpost.com Approved supplier and maintainer of franking machines

www.totalpost.com


CYBER SECURITY

Cyber Security Research status has now been granted to eight UK universities. In the pipeline are government plans for a second research institute and increased grants for studying cyber topics.  public sector to share resources, ease the procurement burden and instil a minimum security standard of IL2. Of those surveyed, sixty-one percent of respondents stated that they were completely unaware of the initiative, which is indicative of the challenge the UK government is facing. RELIEVING THE PRESSURE When it comes to cyber security, it is usually the case that IT managers in the civil service, military and emergency services look to Government Communication Headquarters for guidance. But Cheltenham simply doesn’t have the capacity to deal with all enquiries. The new Research Institute should help relieve some of the pressure on GCHQ and go some way to addressing unanswered queries. Another area where the Institute can greatly help with the nation’s cyber security efforts is in tackling the serious skills shortage the UK faces when it comes to qualified information security personnel. The private sector currently struggles to hire staff with the necessary skills and experience to work in cyber security. Workers with cyber expertise are a scarce resource and command premium salaries which drives up operational costs. The public sector usually cannot compete on salary packages with the private which places the nation in a vulnerable position. The obvious problem here is that UK is simply not producing enough graduates or post‑graduates with the right IT skills to meet

command. An additional pressure is that university leavers with the right skills frequently do not see information security as an attractive career path. While it is relatively easy to attract younger children to cyber security with talk of codebreaking and the dark arts, the UK needs to be much more proactive in encouraging secondary school children to take up IT courses and gain an interest in information security. Last year Michael Gove pointed out how IT lessons at secondary schools were ‘demotivating and dull’ for the majority of students: we’re focusing on PowerPoint and Excel when we should be teaching children how to code. It is therefore pleasing to see the government acting on its word and phasing in programming lessons so that students can learn some hard skills. Projects such as Raspberry Pi initiative - where inexpensive, single-board computers are provided to schools with the intention of teach basic programming – may also help in this regard. Finally, the Research Institute will be able to conduct the sort of academic research that the private sector cannot. As has been stressed time and time again, if the UK is to adequately address the cyber threat, collaboration between the public and private sector is critical. If we were to leave the problem to the public or private sector alone, we simply would not address all sides of the issue. Many security firms, for instance, have expertise in the banking and finance industries, transport, defence and critical national infrastructure which

er The Cybrategy St Securityesearch and R hopes to Institutehe UK one make t ost secure of the m usiness b e n i l n o hubs

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

they can bring to the UK’s cyber security project. However, the government must work with a range of organisations to ensure all bases are covered. The Institute will be able to provide an overall strategy and groundbreaking ideas. FITTING INTO CYBER SECURITY STRATEGY The Research Institute is an integral part of the government’s Cyber Security Strategy that was officially launched in 2011. Responsibility for the direction of that strategy ultimately rests with the Office of Cyber Security and Information Assurance (OSCIA). A number of respected industry bodies feed into the strategy, however. OSCIA engages with industry through the ‘Cyber Security Industry Working Party’. The Working Party then collaborates with a range of other industry associations including Intellect, Aerospace, Defence and Security Industry association (ADS), and many others in the energy, banking and CNI sectors. GCHQ naturally plays a major role in feeding into the strategy as well. THE FUTURE The Cyber Security Strategy and Research Institute are laying the foundations to make the UK one of the most secure places in the world to do business online. Private enterprise will be pivotal in making the project a success. Resources in academia are also being harnessed to bolster the UK’s cyber security capabilities. Cyber Security Research status has now been granted to eight UK universities. Also, in the pipeline are government plans for a second Research Institute and increased grants for students studying cyber topics. The future of UK cyber security looks bright. Building upon the UK’s knowledge resources, we are capable of making the nation resilient to cyber attack and a great place to do business. L FURTHER INFORMATION Ross Parsell is director of Cyber Strategy at Thales UK. He has an extensive background in devising guidelines for private, public and defence security strategies with more than16 years’ experience in the security industry, and sits on a number of governing bodies that decide the UK National Cyber Security Strategy

Security Document World returns to London in 2013 Following the outstanding success of SDW 2012, which saw a packed exhibition floor with over 90 companies exhibiting and more than 1,300 attendees, this must-attend event will return to the Queen Elizabeth II Conference Centre, London UK on 21-23 May 2013. The show will continue to track all the cutting-edge developments surrounding the security document industry. From the latest in next generation e-documents to the cutting-edge developments being made by manufacturers of advanced physical

security features. The show also explorers the identity architecture within which these documents are used, and specifically their use in intelligent border control systems. With more than 90 companies on the exhibition floor, and an exciting three‑day conference programme, this event is designed for government officials, document examiners, company executives and technologists in the ePassport, visa, eID, driving license, registered traveller, law enforcement, employee ID, security printing, biometric and smart card industries.

FURTHER INFORMATION Tel: +44 (0)1189 844932 Email: m.lockie@science mediapartners.com www.sdw2013.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

19


Working in

Information Assurance? Think you’re

professional? Think you’re

competent?

Prove IT With our CESG approved certification

Our assessment process is entirely online. Start the certification process today and prove your credentials.

www.apmg-ia.com


INFOSECURITY EUROPE 2013

GET UP TO SPEED ON THE LATEST IT SECURITY ISSUES

Infosecurity Europe

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Next spring’s Infosecurity Europe show, held at London Earls Court Exhibition Centre between the 23rd and 25th of April 2013, continues to be the only UK and European event that enables industry professionals to gather vital information about the latest trends and developments in the IT security industry Infosecurity Europe 2013 promises to be held against the constantly-changing threat landscape of three main types of electronic threats: politically motivated hacktivists; cyber criminals seeking to monetise their frauds; rogue states, and cyber terrorists looking to both promote their cause to the wider majority and, of course, educate their radical colleagues using the Internet. Against this complex background there is a rising tide of malware, spear phishing and an increasing awareness that – this time around – the cyber criminals might just be winning the battle against the security white hats. For most IT security professionals, it is the time element that is the scarce

are needed that utilise risk management to protect an organisation’s information assets in a way that reflects the value of that information to your business. SPENDING Smarter security spending will optimise information security spend without exposing the organisation and will determine the best way to meet the challenge of balancing security to prevent or manage the risk of loss or a breach of the organisation concerned. Commonsense dictates that, in order to counter this tidal wave of electronic trickery and hackery, IT professionals need to tap into every available resource at their disposal, but, of course,

For most IT professionals, it is the time element that is the scarce commodity, which is why Infosecurity Europe has established a reputation for offering the most effective information security education programme in the industry. In 2013, the event promises to be held against the constantly-changing threat landscape of three main types of electronic threats. commodity, which is why Infosecurity Europe has established a reputation for offering the most effective information security education programme in the industry. Celebrating its 18th year, the show continues to provide a sparkling programme and now features in excess of 350 exhibitors, the most diverse range of new products and services, an unrivalled education programme serving an audience of more than 12,000 unique visitors from every segment of our industry. The show and integrated education programme has become the most important date in the calendar for IS professionals across Europe. Research carried out by the show organisers has found that the topics that are causing most concern for 2013 are risk mitigation, spending levels, growth of cyber crime, what the future has in store, and how to develop an incident response plan. Strategies

those resources must be cost‑effective. Measuring cost efficiency usually involves a calculation based on price – together with the time taken to sufficiently educate oneself on how the product or service functions. THE FUTURE Analysts can help the IT security team scan the threat horizon and predicting future risks and challenges so that they can keep of current threats and plan ahead for an uncertain future. Key areas that analysts have highlighted include information warfare and cyber espionage, along with hacktivism, malware, data security and the internal risks of new technologies – which have conspired to create raft of emerging threats facing our industry. Once the security team in your organisation have established which trends in information

security are most relevant they can then determine which of the security technologies coming up in the short and medium term are most relevant to drive your security strategy forward and plan for the future. GROWTH OF CYBER CRIME In order to successfully combat cyber crime, it is essential that the security team has a deep awareness of the latest: attack techniques, motivations and threats and how to defend against them, which will look at the profile of the cyber criminals that threaten our IT resources. Are the cyber criminals attacking your organisation financially motivated, disgruntled employee – or an upset supplier? Or perhaps a politically motivated hacktivist? Or even a terrorist or member of an organised crime syndicate? Attending the show will help the security team assess current cyber threats, and better understand the motivations driving cyber crime, the methodologies and attack vectors of choice and the strategy plus architecture you need in place to protect your organisation. At the show attendees will learn practical lessons from industry experts who will share their insight and experience in tackling cyber crime and let you know what you should be worried about right now. INCIDENT RESPONSE STRATEGY An incident response strategy that is fit‑for‑purpose will cover off a technical response, legal action, and a well thought out communications programme. Often in the age of the hacktivist any one of the three main areas of incident response that is not correctly handled will make the situation far worse and give attackers a reason to intensify their activity. Visitors to the show can find out how to ensure that your response doesn’t do more harm than good and explore the anatomy of a successful incident response strategy and how to co-ordinate it across your entire organisation. Show-goers will benefit from the opportunity to learn lessons directly from organisations that have experienced a breach and who can share best practice. FURTHER INFORMATION To register free or to find more information on Infosecurity Europe 2013, visit www.infosec.co.uk

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

21


Suitable for protecting: Cable Ducts Pipelines Fences

The MILES is an innovative fiber optic detection system that has a number of different configurations to detect attacks in many different applications.

It can be used as a fence mounted detection system, a pipeline protection system and for detection of interference or removal of cables in ducts or troughs.

There is even a buried system, which has particular applications rail and tunnel safety and security applications.

It has: 

Very high detection capabilities

Attack point identification to within a few metres

Variable range capabilities from 1km up to 25km

No power required in the field

No requirement for new fibers, using existing spare fibers if available Contact us now at

WWW.GPSPerimeter.co.uk

GPS Perimeter Systems

Sales@GPSPerimeter.co.uk

for more detailed information

+44 ( 0 ) 1604 648344


HIGH SECURITY SITES

Following an article in issue nine of CTB which discussed the need for a holistic approach to protecting the perimeter of high security sites, the Perimeter Security Suppliers Association has been active in pursuing a solution, writes Richie Bignell It is of strategic importance for the relevant stakeholders at the site to protect their people and property from attack, being mindful of understanding the type of threat and the budget available to secure the property. Often, many organisations not only have a moral obligation but a legally defined and enforceable requirement for the correct level of physical site protection. There can be a disconnect between the potential and actual ability for the site to be

attacked. For example, a truck carrying a bomb will need a fair length of clear road to achieve 50mph. If the site is located in such a position where the place of attack is in a heavily built up area, comprising of many side streets, then the vehicle may well only reach 30 mph. This would result in an alternative solution to the problem and the resultant scheme budget would be considerably different. Clients have many sources for specialist advice throughout the supply chain, which

THE CHANGING THREAT The method of attack, either terrorist or criminal, continues to evolve and develop as they seek ways to circumvent existing perimeter protection systems. Keeping abreast of this changing threat is a constant challenge for the manufacturers, who seek to develop products and services to mitigate this. Understandably, manufacturers operate in this arena all of the time, whereas end users or specialist advisors may only address a security change or upgrade periodically. Also, what often appears to be a very simple product to the non-expert can be extremely complex in reality to install. For example, a ‘simple’ shallow depth static bollard alone can have differing characteristics, from foundation depths, to footprint, to finish, to installation angle etc. E

Written by Ritchie Bignell, Perimeter Security Suppliers Association

THE CHALLENGE TO ADDRESS END USER NEEDS

will clearly be given with the very best of intentions. It will also have been grounded in historical experience and the latest level of understanding. Gathering this advice will be time consuming for all the parties involved and not be without some costs involved. It would be very disappointing if this advice was found to be incompatible with the abilities of the products and services available from the manufacturers.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

If the specification for perimeter products is broadly or poorly defined, the main contractors can only realistically seek the best product ‘fit’, obtain costs and price the tender accordingly. Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

23


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

24

COUNTER TERROR BUSINESS MAGAZINE | Issue 12


HIGH SECURITY SITES  As the products become more complex in nature, the implications on the number of variances increase. Therefore, understanding the most appropriate type of perimeter product to protect the site will be a key driver in writing a suitable specification. The next challenge for the end user is once the solution to address protecting a perimeter has been agreed, the specification is often placed out to tender to the vast number of main contractors. This separates the end user and their specific security risk management requirement from the expertise located with the equipment manufacturers. It is clearly important for the end users to keep control on their costs and retain focus on their core activities, so the move towards employing the services of main contractors is unlikely to be reversed.

robustly and independently show that the products and services which members supply will, wherever possible, meet the end users needs, this will give all stakeholders more confidence and ensure sites are secured in a more cost effective and safer manner.

Whilst as Ah LONGER TERM the PSSre to do, STRATEGY o m h g c To achieve this, the n i u m y show he PSSA has indentified d a e r l a t it is first three stages of res for and the a c t i t a longer term strategy s t tha n f clie to be recognised as a needs ots to make trusted partner in this wan ing sites vital area. A single PSSA scheme comprising of three protect sier elements which will address a e these stages is under way.

QUALITY SPECIFICATION The quality of the specification is of paramount importance. If the specification for perimeter products is broadly or poorly defined, the main contractors can only realistically seek the best product ‘fit’, obtain costs and price the tender accordingly. This clearly has the potential to water down, change or compromise the intended expectation of the end user, as many manufacturers’ products and services have the ability to solve the same problem. Generally, the main contractors will want to win the business and will thus tender their most competitive prices. This may initially appear attractive to the end user, who will be looking to achieve the correct level of perimeter security for the most cost effective offering. However, a low project price may not take into account whole life costs. What seems a keen price during construction, may not end up being so during maintenance, service and operation over the life of the product(s). Finally, the manufacturer(s) who win the perimeter products supply can often find that the expectations of the end user are out of sync with the terms of the contract from the main contractor. This can result in additional unbudgeted costs to be discussed and agreed, which can be a source of disagreement and angst or a potentially lesser specified solution being installed. In each of the above cases there is potential for the optimum security solution to be compromised. The PSSA has asked itself, how can this situation be reduced or prevented? After many discussions with the majority of the industry, who have experienced both good and bad projects for all types of sites, a consensus view was formed. If we can

Firstly, each member product should be shown to have been manufactured and supplied ex works as it was designed and where appropriate, PAS 68 crash tested. To achieve this, the product verification scheme was introduced by the PSSA in December 2011. We have seen the first set of products from a number of manufacturers successfully pass the stringent requirements set by this new standard. Other members have positively

solution where clients have the confidence that the right products have been supplied and installed by competent organisations.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

REDUCED TENDERING Another benefit from having a series of integrated elements within a single scheme will be that the costly and time consuming process of the tender PQQ requirements would be reduced. It has been shown that membership of CHAS and SAFEcontractor for organisations has given confidence to clients that the H&S questions need not be posed and answered over and over. The saving in time for both parties has been immense and the procurement process made easier. The PSSA sees no reason in the fullness of time why clients would not view its scheme, which incorporates health and safety requirements, with equal confidence. The scheme also incorporates the requirements of PAS 68. But the PSSA sees that those clients who are not considered to be part of critical national infrastructure but still have a terrorist or criminal threat, must also be accommodated. Having the ability to generate confidence in the industry as a whole can not only be a benefit for all end users, it will also help raise the profile of the UK’s expertise in this field in export markets. As the end user client base is becoming more global in its

Another benefit from having a series of integrated elements within a single scheme will be that the costly and time consuming process of the tender PQQ requirements would be reduced. The PSSA sees no reason in the fullness of time why clients would not view its scheme with equal confidence. embraced this scheme and numerous applications for product verifications are actively in progress. The second PSSA scheme working group, which is currently nearing conclusion, works to address the requirements end users have in terms of fencing specifications. Clients are telling us that they want a single point of contact scheme, which is easy to understand and use but has the robustness to give confidence. Finally, a working group has begun focusing on installation to discuss the integration of the physical products and fencing, both with each other and with other existing or new site items. It is clear to the PSSA members that the end user is mostly interested in an effective perimeter site protection solution, rather than its component parts. As technology continues to see changes in products and services, it is imperative that the sum of the parts are greater than the individual. This will mean that more flexibility in how products and services interact with each other will be required. The installation element is working towards a

operations, with it being exposed to similar types of threats, the PSSA see no reason why it cannot play its part in raising the perimeter security industry standing and cost effectiveness internationally. In summary, the PSSA has embarked on a journey to help end users and all the other stakeholders in the perimeter security value chain to specify and install suitable products and services with total confidence. Whilst the PSSA and its members have much more to do, they are already showing that they care for the needs of the clients and want to make the process of protecting sites easier and more certain. ABOUT THE PSSA The PSSA is the trade association for companies involved in the supply of equipment and services designed to provide the highest levels of physical protection for sites and their perimeters from terrorist or criminal attack that involves the use of extreme force or explosives. For further information www.pssasecurity.org

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

25


The must-attend trade event for safety communications officers working within the Emergency Services, Utilities, Rail, Air-Traffic and Mass Transport industries. Discover new technologies See and assess the new public safety communications systems, services and technologies that will shape your future operations, in the FREE exhibition. Discuss and debate pressing topics with key industry players in the FREE Professional Development Workshops.

n and hops hibitio ks ual Ex ment Wor n n A lop The l Deve a n io ss Profe

ntral e C r e 3 est Manch30 April 201 29 –

See www.bapco.co.uk for more information or contact: bapco@hgluk.com


HOSTILE VEHICLE MITIGATION

HIGHWAY BARRIER ‘CRASHES’ INTO SECURITY MARKET

After a summer of royal and sporting events which saw security barriers used on a scale never previously envisaged, the SecureGuard suite of certified BSI PAS 68 barrier systems has made its mark firmly on the UK security landscape The SecureGuard range of barriers and ancillary products provides steel and concrete systems, which have been designed and developed to meet BSI PAS 68 criteria for both temporary and permanent HVM perimeter security. SecureGuard systems offer protection against vehicular and pedestrian intrusion whilst allowing controlled vehicular and pedestrian access if required. SecureGuard products are supplied and installed by Highway Care Security Solutions (HC SS), a division of Highway Care Ltd. SECURE GUARD’S ORIGINS Highway Care is an originator and supplier of specialist safety products predominantly for the highways sector. In the late 1990s, the BarrierGuard steel barrier system was designed and developed for use as a vehicle restraint system. BarrierGuard proved to offer significant benefits compared with Temporary Vertical Concrete Barrier (TVCB), often used on the highway to protect road workers. BarrierGuard provided a high containment steel safety barrier that could be rapidly deployed. BarrierGuard was quickly recognised as a product which had sufficient capacity to offer very high containment performance and flexibility of installation in areas where terrorist vehicular and /or pedestrian intrusion would present a considerable risk to national and private infrastructure.

STRINGENT TESTING BarrierGuard has been successfully tested to BS EN1317 containment level N2, 110km/h, 1500kg car, 20 degree impact, impact energy 82kJ and containment level H2, 70km/h, 1300kg bus, 20 degrees, impact energy 287kJ. The system offered the lowest deflection characteristics of any portable steel barrier in the world. Following successful testing to BS EN 1317 criteria and the known performance of the product, Highway Care decided to test BarrierGuard to the more stringent American testing standard NCHRP 350. BarrierGuard became the first and only temporary steel barrier in the world to qualify to both NCHRP 350 and the European standards. Within five years of BarrierGuard’s launch Highway Care entered into discussions with the UK Government Centre for Protection of National Infrastructure (CPNI) to evaluate the potential use of BarrierGuard for the national security programme. It was agreed to test BarrierGuard to the BSI PAS 68 vehicle security barrier test specification. Testing was carried out with heavier vehicles and greater impact angles than the system had been previously been subjected to, requiring the barrier to contain vehicles impacting at much greater energy values. BarrierGuard was impacted at 45 degrees with a 7500kg vehicle at 48km/h [30mph], resultant energy 361kJ. Anchored only at either end of the barrier

run, BarrierGuard successfully redirected the vehicle; which did not breach the barrier. As a result of this successful testing programme and the platform for further development that BarrierGuard offered, Highway Care recognised that there was an engineering and market potential for BarrierGuard for security applications. BarrierGuard could be enhanced to offer higher containment for these types of vehicles. Highway Care designed an additional rear support frame to work in conjunction with BarrierGuard. This additional steel frame enhanced the protection level offered by the system, thus creating a new product now known as SecureGuard. SecureGuard has been successfully tested to 48km/h [30mph] with a 7500kg vehicle with an impact angle of 90 degrees, impact energy of 723kJ. SecureGuard prevented vehicle penetration.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CONTINUING PRODUCT DEVELOPMENT Following this successful test programme SecureGuard has subsequently been subjected to an impact with a 7500 kg vehicle, 90 degrees at 80km/h [50mph], and massive impact energy of 1852 kJ. SecureGuard met the criteria of this test, there was no vehicle penetration, and the SecureGuard barrier did not deflect from its original position. SecureGuard offers performance characteristics that will withstand localised multiple impacts and can be combined with a variety of anti-personnel fencing. Continuing product development has added a surface mounted concrete block system – SecureGuard CB – as well as pedestrian portals, surface mounted temporary bollards, permanent bollards, vehicular rising arm barrier gates and surface mounted blockers all of which can be combined with the SecureGuard barrier systems using BSI PAS 68 certified connections. SECUREGUARD’S KEY BENEFITS SecureGuard’s suite of designs provides systems that meet the requirements of BSI PAS 68 from 32km/h [20mph] through to 80km/h [50mph] for fully laden 7500kg (N2) trucks, and maintains crash friendly performance for innocent motorists in errant vehicles. It is crucial to consider all potential impacts when considering perimeter security. When an HVM barrier needs to be placed next to a highway, consideration must be given to the motoring public. The SecureGuard system satisfies both these requirements. HC SS has now installed SecureGuard temporary and permanent systems at many UK sites, where complex layouts and precise time scales have been accommodated. SecureGuard is a modular, scalable system which can provide a complete HVM solution for perimeter security in this high profile industry. L FURTHER INFORMATION www.hcsecuritysolutions.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

27


www.security.bfioptilas.co.uk

Experience the high performance of thermal IP cameras Meet the new range of ONVIF™ compliant thermal imagers NEW WatchMaster® IP Elite from DRS Technologies Delivering a level of performance previously unseen for day and night surveillance with thermal IP imaging cameras. ONVIF™ compliant cameras allow full integration into IP CCTV systems for 24 hour security, evidential data capture, and improved response in monitoring borders, critical infrastructure and homeland security.

Call our experts in imaging solutions on 01908 326308 for a demonstration

Get in touch: Tel : +44 (0)1908 326326

Email : info.uk@bfioptilas.com

design. consult. integrate.


SERIOUS SECURITY PLAYERS GATHER IN FARNBOROUGH Backed by the Home Office and organised by ADS, Security & Policing 2013, taking place at Farnborough in March, brings together serious players in the public security arena and gives visitors a chance to network with the experts

r 30 For ove curity e years, Sing has & Polic platform da providefessionals to for pro e with the engag hest level very higecurity of s

It is clear that the security sector is of vital importance to the UK’s safety, both financially and physically – and a major contributor to sustaining this business and developing it further is the Security and Policing equipment exhibition. Security & Policing 2013 is taking place at FIVE (Farnborough International Venue & Events) in Hampshire from 12-14th March, and is the UK’s only secure event for police, law enforcement and security professionals tasked with security, civil protection and national resilience. Since its inception over 30 years ago, Security & Policing has provided a platform for professionals from the UK and across the world to engage with the very highest level of security expertise. The event

continuously develops in size and scope and exists to provide the level of industry engagement needed to enable UK Government to procure and deliver its national security priorities. Showcasing world leading products and services, the event brings together people with operational needs with companies that have the relevant solutions within a secure environment. GOVERNMENT ZONE Unique to this event is the participation of UK Government. Senior Government officials and industry representatives will host a series of briefings for exhibitors and visitors which are designed to bring clarity to the most topical issues facing security today and address the significant challenges that lie ahead. The E

List of exhibitors 5.11 Tactical UK J12 Aappro D6 Adams Metal Detectors D3 ADS Europe Ltd D15 Aeroflex E28 Allen Total Perimeter Security L21 Allen-Vanguard D21 Alpro Architectural Hardware L9 Anritsu G5 Apec Systems Limited E33 Apex Security Engineering Ltd K16 Applied Satellite Technology Systems C13 ARINC E59 Ascot Doors Limited K26 Atek Pty Ltd D16 ATG Access H11 Audiotel International Ltd E51 BAE Systems K11 Bavak P.A.S. E5 BCB International Ltd E4 Beechwood Equipment D31 Bennett Safetywear Ltd B32 Benweld Secure Ltd H5 + X4 Blacktree Technologies B36 Bluecher UK Ltd L2 Bruker Daltonics Ltd E37 Calumet Photographic Ltd D20 Cambridge Consultants D23 Camouflage-Solutions L33 Carro Srl F15 CEIA S.p.A. K30 Cellxion Ltd B24 Centerprise International, t/a Scyron D11 Charles Fellows Supplies Ltd C14 Chemring EOD K27 Chemring Group K27 Chronos Technology Limited C19 Claresys Ltd B20 CLCS / Abloy UK J11 Cobham H17 + X5 Commesh Ltd H16 Comnet Europe Ltd C28 Cooneen Group E20 Covidence a/s D17 CPT-International J27 CRFS J7 Cunning Running Software D14 Datong C24 David Horn Communications D12 Deenside Ltd H8 Digital Barriers C29 DMS Protective Equipment Ltd A21 DMS Technologies E39 DSA Detection LLC F9 DuPont International Sarl B34 Edgar Brothers Police & Military Division B19 EDSL (EPC-UK) D26 Enterprise Control Systems E57 Erebus UK K9 Evidence Talks K7 Facewatch Limited F23 Fastlane Turnstiles B12 FCO Services E45 Finmeccanica UK E7 Fischer Connectors J18 Forensic Telecommunications Services E32 Foster and Freeman Ltd B15 Frontier Pitts Ltd C21 Galliford Try Infrastructure Security K24 Gamma TSE Ltd K29 General Dynamics G13 Geonautics International Ltd D4 Geoquip Worldwide J6 GMK Ltd B8 Griffiths Communications D34 Griffon Hoverwork Ltd E22 Harristech Pty Ltd D9 HazmatLINK Ltd L14 Heckler and Koch UK G9 HESCO Bastion Ltd K10 Hewlett-Packard L24 Honeywell Building Solutions C23 Image Sensing Systems Europe J15 + X63 IndigoVision D22 Intellicam C6 International Procurement Services L13 International Safety Products Ltd J14 Intertek (ITS Testing Services (UK) Ltd F10 James Fisher Inspection G16 Jankel G4 + X1 JSI Telecom Inc D13

Security & Policing 2013

EVENT PREVIEW


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

WatchMaster® creates unsurpassed intruder detection images day and night, in all weather conditions In all weathers and any time of the day and night thermal imaging technology gives unsurpassed intruder detection. Using the heat differences between people, vehicles and the background temperature, high target images are created which are ideal for implementing with video analytics or simply displaying on monitor screens. Acal BFi has had many years’ experience in both thermal imaging solutions, making the company well equipped to advise and support customers with this technology. The WatchMaster® IP Elite is uniquely compact in size and has an affordable price tag, bringing advanced thermal imaging technology to a wide variety of commercial surveillance and security applications. The WatchMaster® IP Elite with DRS proven long-wave, uncooled 320 x 240 VOx thermal imaging technology (8-14 micron), produces crystal clear imagery all day, in all-weather conditions, including complete darkness and through dust, haze, light fog, and smoke. Consuming less than 12.95 watts of power, the WatchMaster® IP Elite can operate over its full temperature range in extreme environments while powering within standard IEEE802.3af (PoE) limits over conventional network cabling. As a result,

30

COUNTER TERROR BUSINESS MAGAZINE | Issue 12

the camera can be configured and installed easily into existing security infrastructure. Measuring 2025 cm3 (less than 25L x 9H x 9W cm) and weighing less than 1,500 grams, the WatchMaster IP Elite is lightweight and sealed to an IP66 rating which makes it ideal for outdoor use. The WatchMaster® IP Elite is available with a choice of three fully-sealed and hard carbon coated athermalised fixed-focus lenses, which provide a horizontal field of view of 40, 16 or 9, and are all capable of 4X Digital Zoom.

Its digital technology incorporates embedded memory to support storage and video analytics, and it is conformant with ONVIF™ interoperability standards for the interface of IP-based physical security products. Surveillance personnel can operate the camera in a networked environment through a central office or remote video management system or through the DRS provided web interface utility. With the inclusion of the cost effective WatchMaster® thermal IP cameras into such surveillance systems, poor light or severe weather conditions will not reduce the ability to detect intruders and other illegal activity, thereby giving full 24/7 secure coverage. Acal BFi has WatchMaster® IP Elite thermal cameras available in the UK for demonstration. Contact the company on 01908 326308 for the opportunity to evaluate this exciting new technology. FURTHER INFORMATION Tel: 01908 326308 www.acaltechnology.com acal@acaltechnology.co.uk


EVENT PREVIEW  Government Zone at Security & Policing 2013 brings together Government agencies from the policing and security sphere. LEARNING FROM THE OLYMPICS One of the key themes the 2013 event will be presenting is the vast knowledge and experience gained at the Olympic and Paralympic Games. This successful event proved beyond doubt that by including security experts to work alongside designers and visionaries in the design phase of the Olympics, the UK successfully delivered a secure games, from the very real threat of terrorism right through to crowd control within the Olympic Park and on public transport. Sessions at the event will cover how this was achieved, sharing the knowledge and experiences with delegates. APPROVED ATTENDEES Visitors to Security & Policing must be employees or agents of the police service throughout the UK and overseas, government, security and law enforcement organisations, Home Office, prison service, fire service, military, customs and immigration services or key providers of Critical National Infrastructure and their security managers for the UK. Due to the secure nature of the event, trade visitors,

Rob Coleman, the director of the Centre for Applied Science and Technology, as well as representatives from other Government departments. The ADS Security Innovation Awards will also be presented at the dinner. These are presented to advanced engineers of a piece of equipment, technology or service which is deemed to be unique and innovative. The judges will be looking for innovations conceived and marketed commercially in the past two years – equipment or technology which has significantly improved crime prevention, or has significantly improved and made efficient Police/Law Enforcement Agencies operability. Details of a referee from a Police Force or Law Enforcement Agency who will confirm that they have found the innovation to be effective and fit for purpose is needed. Entering the ADS Security Innovation Awards 2013 is a great way for manufacturers to showcase innovation to the security community. The judges will include representatives from the Centre for Applied Science and Technology (CAST). ABOUT THE ORGANISERS ADS is the trade organisation for companies operating in the UK Aerospace, Defence, Security and Space sectors. Farnborough

One of the key themes Security & Policing 2013 will be presenting is the vast knowledge and experience gained at the 2012 Olympics and Paralympics, which showed that the UK successfully delivered a secure games. consultants/agents and companies who supply equipment to CNI providers are not eligible to attend. Agents from overseas may apply, but can only attend with prior Home Office approval. Another unique aspect of the event is the way in which companies are allowed to present themselves. Exhibitors are limited in exhibition stand size to ensure that the focus of the event is on the technology being displayed and not the power of the plc. Small and Medium sized Enterprises (SMEs) can therefore exhibit their, often niche, products alongside major UK primes, offering full security systems and solutions in a comfortable environment where the focus is on technological capability. GALA DINNER ADS will host an exclusive networking dinner for the exhibitors and visitors of Security & Policing 2013 at Guildford Cathedral, a unique and exclusive venue, which offers a larger capacity than in previous years. The dinner provides an opportunity to network with several high profile Government representatives invited by ADS including

International Limited (FIL) which runs the Farnborough International Airshow, is a wholly owned subsidiary. ADS operates to create the best possible climate in which its members can do business, including lobbying and media relations, as well as networking and other business‑to‑business activities. ADS offers a wide range of products and services to help member companies grow their businesses and widen their contact networks with the supply chains in all relevant sectors, including the UK Home Office, UK MoD and in export markets. A dedicated team of events specialists coordinate and manage a comprehensive events programme encompassing everything from large international trade shows through to table top events and specialist networking lunches. ADS also provides advice on export licensing, industrial participation, anti‑corruption legislation and business ethics. L FURTHER INFORMATION Tel: 020 7091 7828 securityandpolicing@adsgroup.org.uk www.securityandpolicing.co.uk www.adsgroup.org.uk

Keela / Ilasco C5 L-3 ASA C17 Land Rover L22 Laser Innovations (UK) Ltd C20 Law Enforcement International Ltd L18 Liteye UK Limited C22 Lorax Ltd K22 LPCB (BRE Global Ltd) F12 Marshall Land Systems C11 MASS J10 Master Locksmiths Association/Sold Secure F14 MC Products UK Ltd B31 McQueen Targets – Sykes Global Services L10 Metrasens F13 Mico-Tindall Engineering H9 MLA Ltd (Michael Lupton Associates) B35 Mobile Content Management Solutions E52 Morgan Marine/PSF Wales J21 Motorola K28 MS Instruments F6 Municipal Security A14 NDI Recognition Systems D25 Nightsearcher C9 NJL Custodial Ltd L6 Olive Group D27 Ovation Systems Ltd C27 Pace Systems International Ltd H4+X16+X17 Panasonic Computer Products Solutions B10 Panoptech G6 PDA Electronics Ltd F16 Pentax Ricoh Imaging Deutschland GmbH H10 Pickersgill-Kaye Ltd L4A Plextek Ltd F11 Plowman Craven Limited L3 Premier Hazard E3 Price Western Leather Company Limited E34 Primetake Ltd E12 Providence SA Ltd C10 Pyser-SGI Limited C16 Q Electronics A39 QCC Interscan Ltd F18 Qinetiq H15 Rapiscan Systems Limited D18 RepKnight Ltd D28 Reveal Media Limited K8 Rhino Engineering Ltd F1 + X19 Roke Manor Research K27 Safetyflex Barriers G11 SAS J24 SATARE E18 Scanna MSC Ltd E8 Scott Safety L17 SDS Group Ltd H12 SEA J10 Seartech cc E36 Secupro Government BV E11 Securiclad Ltd J20 Security Labels International D8 Senstar Ltd F4 Sepura plc E38 Seqtor C10 Seven Technologies D19 Shark Marine Technologies Inc H3 Shearwater TSCM G12 Smith Myers C8+X22 Smiths Detection H7 Sonic Communications (Int) Ltd G7 Southern Scientific Ltd D7 Stafford Bridge Doors Ltd J23 Steinbach & Vollmann GmbH & Co. KG K13 Sunray Engineering Ltd B30 Sure Antennas F7 Surelock McGill Ltd F17 Survival Aids K39 SystemWare Europe Ltd E46 Tactical Electronics UK Ltd C26 TCH (UK) Limited A15 Telesoft Technologies B33 Tellemachus Ltd B11 Tensor J25 Terrafix Limited E31 Thales E13 Thermo Scientific B28 Thermoteknix Systems Ltd E17 Thomas Jacks Ltd L5 Thomas Lowe Defence Ltd J17 Timespace Technology Ltd D32 Totalpost Services Plc C18 Traka J1 True Position B18 Ultratec Ltd H6 Vemotion E33 Vysionics ITS Ltd G10 Warehouse Express Ltd K19 William Bain Fencing Ltd J16 Winkelmann (UK) Ltd K23 Wireless CCTV Limited E40 WireOnAir A/S E9 Zaun H14

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

Security & Policing 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

31


Providing Housing Solutions to Industry

LPCB Security Rated GRP and Steel Housings and Door Sets Tested and Certified to LPS 1175 to SR Level 2, 3 and 4 www.morgan-marine.com T: 01269 850437 | F: 01269 850656 | E: sales@morgan-marine.com

Morgan Marine Ltd Llanybie Ammanford Cairns SA18 3GY


EVENT PREVIEW

COUNTER TERROR SOLUTIONS FOR AN EVOLVING WORLD

Counter Terror Expo brings focus, clarity and recognition to the complex and multifaceted task of protecting people and assets from the threat presented by international terrorism The emergence of non-traditional threats to national and private security enterprises ranging from cyber-attacks, protection of high net-worth individuals and assets, to safeguarding sensitive sites, makes Counter Terror Expo 2013 more relevant than ever. Returning to London Olympia on 24-25 April 2013, it is the largest international event to mitigate threats, protect against terrorist attacks, security threats and understand how current modern‑day risks affect your business. The internationally acclaimed Counter Terror Expo Conference returns for 2013 with an expanded programme of content. Over 100 high level speakers from across the counter-terror and security spectrum will come together to deliver up-to-date and accurate analysis critical to the safety of assets, personnel and information, across the globe. A strategic two-day conference focusing on

global counter terrorism forms the underlying core of the event. Highlighting key strategies against an environment of shifting threats and a backdrop of considerable economic difficulties, this analysis is essential to maintain and secure safe societies and safe businesses. The conference also includes topics such as protecting our critical national infrastructure, protecting crowded places, cyber security and electronic terrorism, thus ensuring that delegates take away the most comprehensive set of answers and assessments designed to protect digital and physical assets. The 2012 event produced a record attendance – 8,519 members of the global counter terror community came together from across government, police, military, critical national infrastructure, emergency services, border control and transport security. There were significant

Counter Terror Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

increases from attendees within the private sector/critical national infrastructure, MOD, training, government, transport security and border control/customs & immigration. WORKSHOPS In addition, Counter Terror Expo offers 17 free to attend workshops providing the latest equipment and technology direct from leading manufacturers and suppliers. Available to all visitors, the show floor workshops provide you with insider information crucial to protect against current and future threats, essential to your everyday business. With topics including building and facilities protection, data and intelligence, integrated security solutions, communications, screening and scanning, and surveillance, CCTV, Visitors will participate in an effective and concise programme of live demonstrations and presentations to combat business security and terrorist threats. The event takes place in a secure central London location in order to provide a new closed‑door briefing programme. The programme is heavily supported by leading organisations, representative of the ties with influential community members, paving the way for future sector developments and counter‑terrorism and security strategies. FEATURED ZONES Counter Terror Expo 2013 delivers a number of Featured Zones designed to promote and demonstration the best products and solutions available from our exhibitors. E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

33



EVENT PREVIEW  The Armoured & Support Vehicle Zone brings together the suppliers of armoured and support vehicles together, in one dedicated area on the show floor to showcase retro‑fit, up-armouring and upgrade solutions. Armoured vehicles offer crucial protection to the services of homeland security, counter terrorism, police security, force protection and SWAT teams as well as protecting key personnel in more volatile areas of the world. The zone is aimed specifically at purchasers, fleet operators and end user specificers such as police, military, tactical, special ops and private security, as well as embassies, government personnel and private enterprise looking to protect critical personnel. This area will feature a dedicated Armoured Vehicle Zone within the exhibition hall to exhibit armoured vehicle manufacturers, armouring solution, accessories, retro-fit solutions, up-armouring & upgrade solutions. CYBER SECURITY ZONE The internet has long been an integral part of our society, from personal to enterprise level businesses; from governmental usage to national and international level operations. It is all pervasive and of fundamental importance to our society today.

Cyber security, therefore, is one of the highest areas of interest within the security market. Its security threats range from the personal to the corporate, and right up to national security, whether through terrorism, crime or industrial espionage. Cyber terrorism, e-crime and cyber‑crime are now a fact of life, and we have to be prepared, in our security and counter terrorism strategies, to guard against attacks of this nature to protect our access to the internet, our data, key systems and networks. STRATEGIC ANALYSIS New for 2013, the Cyber Security Conference and Solutions Zone will focus on strategic analysis of cyber security for homeland security, governments, critical national infrastructure and enterprise level corporations. It will look at cyber security from a strategic level, not the IT management level, and will cover strategic content and solutions for advanced evasion techniques, secure global networks, secure government ICT networks, and secure on-line platforms, amongst others. Perhaps the most common and widely used weapons of the terrorist are Improvised

Over 100 high-level speakers from across the counter-terror and security spectrum will come together to deliver up-to-date and accurate analysis critical to the safety of assets, personnel and information across the globe.

Explosive Devices (IEDs). On the battlefield, in the public transport arena and within the urban environment, the threat from IEDs remains potent. Advanced threat detection methods, threat handling techniques and threat containment solutions, are helping to mitigate the danger inherent in safe IED disposal and enhance the safety of those engaged in this difficult work. This feature was one of the most popular events for the 2012 show targeted specifically at EOD regiments, police, bomb disposal teams, fire, military and special ops teams. The demo will continue to showcase, live, scenario based IEDD demonstrations, featuring a range of ROV (Remote Operated Vehicle) solutions, Hook & Line solutions, and protective suits.

Counter Terror Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INTEGRATED SECURITY ZONE When it comes to mission-critical security operations within complex environments, single, stand-alone security solutions are simply not enough. Government facilities, critical national infrastructure, military bases, safe city projects and global corporations need to look at multiple, integrated security solutions which can connect up, whether legacy or new, and provide intelligence and data in real time on the current state of play within any given situation. By co-ordinating data and intelligence over IP networks from multiple systems and security points, organisations, police, armed forces, emergency services, homeland security, intelligence agencies and security personnel can respond faster and better to evolving situations. The Integrated Security Zone, new for 2013, will bring together some of the leading suppliers of integrated solutions with a full workshop programme to demonstrate: intelligence reporting and analysis, video management systems, video analytics, CCTV, perimeter security, access control, and biometrics, amongst others. MARITIME AND ENERGY SECURITY Security and defence are key challenges for the maritime world at this time of changing global circumstances. Threats from terrorism, piracy and political crises need new solutions and joint actions for the protection of shipping routes, ports, harbours and our supply chain. For 2013, Counter Terror Expo will contain a new Maritime Security Zone dedicated to the following solutions for combating this increasing risk. Oil & Gas installations and exploration operations are critical in supplying society’s power needs and represent one of the core areas of critical national infrastructure. By their very nature their on‑shore facilities cover wide expanses of land, while their off-shore facilities are, by definition, remote. Both are linked by vulnerable networks of pipelines and support facilities that need to be protected from a multitude of threats including: terrorist attack, sabotage, illegal tapping, and natural disasters. E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

35


Meet the team from SP at the Counter Terror Expo on stand E14

Sign up to our newsletter to get all the latest news and special offers from SP www.spservices.co.uk/signup

Unit D4, Hortonpark Estate, Hortonwood 7, Telford, Shropshire, TF1 7GX

Tel: 01952 288 999

www.spservices.co.uk http://www.spservices.co.uk/facebook

http://www.spservices.co.uk/twitter


Counter Terror Expo

EVENT PREVIEW  There is a wide range of facilities involved in this sector, from oilfields and refining base areas, to the headquarters of the operating companies or contractors, to pipelines, seaports, airports and power generating facilities. All of them require unique security solutions in order to protect, not only the assets, but also the people involved in each part of the supply chain. The Oil & Gas Security Zone at CTX 2013 will cover solutions including: blast protection systems, fire protection suppression, THE NEW &SP 2012 command & control technology, fibre optic CATALOGUE IS transmission systems, IP based transmission systemsNOW for CCTV AVAILABLE surveillance, close protection, hostage crisis management, on‑board monitoring (POB), Intrinsically Safe detection and surveillance and access control.

in the resilience business recognise Counter Terror Expo as the ‘must attend’ exhibition in the annual calendar if they want to know the latest solutions when addressing counter EXCELLENCE AWARDS terrorism threats. CSARN recognises that this The Counter Terror Expo Excellence Awards, will be an important date in the calendar to be held on 24 April 2013, will be moving of its members, is proud to support this to the exclusive private members Hurlingham year’s Counter Terror Expo and looks forward Club located on the banks of the River Thames. to partnering this world class event.” Recognised throughout the world as one of The Association of Event Venues meanwhile Britain’s greatest private members’ clubs, it will once again be holding their security retains its quintessentially English traditions working group meeting at Counter Terror and heritage, while providing modern Expo. Lee Holloway, DipOSH MIOM, AEV facilities and services for its members. Technical Adviser, stated: “Our partnership This prestigious and secure setting with Counter Terror Expo has will be ideal for an awards delivered great value to the evening celebrating and members of AEV Security recognising excellence Working Group. If the throughout the counter feedback from the group, terrorism industry. comprising some of The categories will the leading venue side cover both the CALL FOR YOUR FREE COPY security professionals outstanding products from our industry, and services from is anything to go by industry manufacturers CTX hits the mark designed to prevent every year in terms of terrorist attacks and also both the products they celebrate and reward security want to see and the sector practitioners for their excellent developments showcased in work in counter terrorism protection. the outstanding seminar content.” Philip Hunter, event director, commented: “We’ve expanded the awards evening FORENSICS EUROPE to celebrate both manufacturers and Counter Terror Expo is co-located with security practitioners. The Hurlingham Forensics Europe Expo 24-25 April Club is an idyllic and secure setting to 2013, guaranteeing you two productive add a touch of glamour to the event and days to conduct business, source new produce an evening to remember.” products, services and solutions, learn The Counter Terror Expo Excellence Awards new strategies and network with acknowledges the mission‑critical work peers in these must-attend events. undertaken by key members of the international With the closure of the Forensic Science counter‑terrorism and security industry. Service earlier this year, the supply of forensic analysis and products has evolved JOIN THE DEBATE into a completely new open market. A wide range of topics will be discussed Forensics Europe Expo, in partnership and debated over the show, including city with the Investigator and sponsored by LGC security, IT security, business continuity, Forensics, will fill this void with the premier counter terrorism architecture & design and international event for sourcing forensics event safety. Brett Lovegrove, chief executive, products, equipment and services in one CSARN, one of CTX’s briefing programme dedicated forum. It is uniquely placed to partners commented: “The City Security and provide the definitive source of education, Resilience Networks (CSARN) is delighted best practice, training and networking for to be in partnership with Clarion Events at the entire forensics sector and supply chain. Counter Terror Expo 2013. Most professionals The inaugural Forensics Europe Expo will

r Counte po x Terror Ergest is the lanal event tio interna ect against to prot st attacks terrori derstand and un rn-day mode s risk

bring together the widest range of Forensics suppliers, services and practitioners from across the globe and features a comprehensive conference programme. This high level, two stream Conference will bring together over 50 internationally recognised experts in the field of forensics to cover the latest topics affecting the entire industry. Specifically targeted topics include: re-examining a crime scene to maximise the evidential potential in arson investigations and detecting drugs in fingerprints. Forensics is the second highest expense for police forces and a major cost for lawyers, government agencies and corporate companies. Only at Forensics Europe Expo will you have the opportunity to choose from a variety of international analysis providers, understand e-discovery and e-intelligence and share experience whilst networking with the largest collection of forensic professionals, in one Central London location. Digital Forensic investigation in the corporate space is fast becoming an indispensable service with the need to deliver digital investigation solutions and prevent digital attacks is ever more growing. Forensics Europe Expo unites a wealth of private corporations to deliver the latest updates, regulations, legislation and procedures essential to the protection of your digital networks. Forensics Europe Expo offers a unique tool to source cost-effective solutions in order to drive down every-day business costs and source the widest breadth of new suppliers within Crime Scene Investigations. This free to attend exhibition showcases the latest innovations, solutions and technology aimed at effectively completing the process from solving crime to putting criminals behind bars. Visitors involved in any type of investigation and court presentation which requires the analysis of evidence, from lawyers, government bodies and agencies through to private organisation and lab themselves, Forensics Europe Expo offers unrivalled access and perspective to the core issues surrounding your business. L FURTHER INFORMATION www.counterterrorexpo.com/ctbusiness www.forensicseuropeexpo.com/ctbusiness

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

37


Is your business data under threat? How safe is your mobile data? Greater Manchester Police fined £120,000 for serial data breaches

‘Entirely avoidable’ loss of sensitive children’s records leads to penalty for London charity

Charity fined £70,000 ICO Slaps Stoke City Council With Hefty for losing Data Breach Fine children’s records

Council fined £250,000 after employee records found in supermarket car park recycle bin

Payroll Data for 700,000 People Goes Missing in Mail

Or... spend just £1.25* per device, per month, and • Deploy a global (FIPS) accredited encryption solution • Protect against loss of sensitive data • Limit corporate breaches of the Data Protection Act • Control access to sensitive data from applications, connections and ports • Protect corporate reputation even in event of lost or stolen devices Your corporate infrastructure is, hopefully, secured against any unauthorised access. But what about your mobile deployment? Does your corporate security policies extend to field based devices? Is your mobility deployment compliant with the Data Protection Act? Are you sure that sensitive data is completely protected in the event of a lost or stolen device? Secure Mobile protects all of the selected data on end point devices and ensure that you are able to deploy security policies that limit access to encrypted folders from Applications, Connections and Ports. Due to its architecture our solution is completely invisible to the end user and also does not drain the battery or reduce device performance when data is encrypted at bit level in real time.

All enquires this month are eligible for our special introductory offer at only 50p per device, for the first twelve months. Contact us, quoting code CT11, for a no-obligation discussion to help us consider your requirements.

digital-defence.com/secure-mobile phone on +44 1604 521 108 (EMEA) or +1 425 210 5576 (Americas) *On basis of a three-year agreement

EMEA: Digital Defence Ltd, 400 Pavilion Drive, Northampton Business Park, Northampton, NN4 7PA Americas: Digital Defence Ltd, 616 Corporate Way, Suite 2-5928 Valley Cottage, NY 10989

enterprise mobility

validated


Safety Communications

EVENT PREVIEW

BRITISH APCO 2013: WHAT TO EXPECT?

Attending the free Professional Development Workshops at British APCO will directly benefit the day-to-day activities of those working within public safety communications ”At the very heart of dealing with major incidents, be they terrorist based, natural disaster or accident, lies the critical requirement for the emergency services to be able to work closely with key partner agencies,” explains Ian Readhead, immediate past president of British APCO, talking about next year’s event. “This requires the very best technology, communication structures and common business practices matched by great leadership. Next year’s British APCO is a great opportunity to meet those who supply the equipment, to network with the individuals who set the strategy, along with those who deliver it at the front line,” Readhead continues. British APCO 2012 saw the annual British APCO event move from the city of London to the vibrant venue of Manchester Central and

this change of location reflected an important change in the refreshed focus of the event. For the first time, the British APCO show took on outsourcing, merging, future technologies and collaborations on a global but also very national level. Organisations from across the country, and abroad, gathered in Manchester to experience the latest products and services, hear from individual key contributors and to learn from one another. 2013 will continue to build on this progress and, as the show’s new theme highlights, will do so by

focusing on Smarter Partnerships between forces, it’s vertical markets of oil, gas, transport and utilities and the suppliers. Now in its 15th year, the show is the leading European multi-agency forum for all professionals in mission critical communications, civil contingency response, business continuity, and emergency information and data management. INFORMATIVE WORKSHOPS New to B-APCO 2013 – Maximising Technology for Smarter Partnerships, is the shift from the former conference programme format to a free-to-attend Professional Development Workshops focusing on a number of key themes. These include maximising technology for smarter partnerships, with a joined utilities/ transport/blue light training course and information exchange over two days. Shaping user requirements for the future for the digital trunk road system will also be explored, as will command and control and the merging markets. The workshop will also look E

“British is a 013 APCO 2 portunity p great o work with to net deliver the ho those w y and deliver strateg the front it at e” lin

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

39



EVENT PREVIEW  at the new Police Crime Commissioners, the Police Service and how will they impact upon other emergency services. The decision to make these cost-free was based on the desire to provide all those working within public safety communications with the opportunity to attend sessions that will directly benefit day-to-day activities as well as focus on future improvements. TECHNOLOGY AND SOCIAL MEDIA The team from the BlueLightCamp will be holding free social media induction sessions, discussing not only how to get started with your online profile but how to prosper with it. This is a space for you to ask questions, and see for yourselves how social media can be used to the best advantage, in a way that works for you. The Exhibition and Professional Development Workshops offer users, buyers and specifiers from across the public sector and related agencies – including transport, MoD, central and local government and utilities – access to the best current and developing technologies which support their businesses and services, and which will shape their future operations. The workshops and exhibition will offer a unique viewing platform for local and global technologies and applications, as well as a forum to explore the most pressing issues within the industry today.

Cost-free Professional Development workshops will provide all those working within public safety communications the opportunity to attend sessions that will directly benefit day-to-day activities as well as focus on future improvements. EXHIBITORS The exhibition caters for all platforms and applications, from existing TETRA technologies, to newer providers of LTE, 4G broadband applications and services, smart asset and people management with RFID, and maximising mobile functionality for frontline service providers. Confirmed exhibitors include: 3tc Software, APD, Airwave, Arqiva, Fortek, Intergraph, Mason, Motorola Solutions, Panasonic and Remsdaq. The full list can be seen when you log on to www.bapco.co.uk. One of the main challenges public safety organisations face today is the need to deliver safer and more flexible operational capabilities, while handling increasing workloads with fewer resources. Meanwhile, organisations require more data for applications to enhance operations with the latest broadband innovations. At the 2013 British APCO event Motorola Solutions will demonstrate how to extend its TETRA solutions with a powerful combination

Safety Communications

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

of broadband technologies, multimedia applications and advanced devices. Tom Quirke, VP and general manager of the Global TETRA Organisation, spoke on behalf of Motorola Solutions: “Motorola Solutions is helping to transform user safety, equipment ease of use, ruggedness and operational flexibility of mission-critical operations. “In addition, we are helping customers optimise their TETRA networks with enhanced performance capabilities and lower cost of ownership. Our focus on network technical innovations helps our customers deliver ‘much more with less’ while simplifying their migration to next-stage mission‑critical networks. “We are looking forward to engaging with users and the public safety communications audience at British APCO again in 2013. The exhibition and workshops remain an important event for us to present our solutions and engage with experts.” E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

41



EVENT PREVIEW

 IT SYSTEMS 3tc Software, another returning exhibitor, will be demonstrating their new mobilising system, Guardian Command. The system accommodates the changes that FRSs currently face. With IT equipment having fallen in cost over the years and by using commercial off-the-shelf technology (COTS), the total cost of ownership across the lifetime of this product has been given particular attention. The amount of time and effort an FRS spends in managing

during the development sessions. We are very much looking forward to the next event,” said Jacqueline Norton, 3tc sales director. Having recently celebrated winning a £5 million contract with the Ministry of Justice to supply its access management solutions to potentially every HM Prison in the UK, Traka is also looking forward to the 2013 British APCO show. The company has recently been acquired by world leader security solutions provider ASSA ABLOY and specialises in manufacturing

At the very heart of dealing with major incidents, be they terrorist-based, natural disaster or accident, lies the critical requirement for the emergency services to be able to work closely with key partner agencies. This requires the very best technology, communication structures and business practices matched by great leadership. their systems is reduced by automating back office processes and data management. The gazetteer search engine, Geode, will show how FRSs can save time and money on database cleansing whilst enhancing performance in the control room. “British APCO was very successful for us in 2012, with lots of visits to our stand and interest around the Guardian Command mobilising system, which we launched at the event; we also published a white paper on our gazetteer search engine, Geode,

automated radio-vending solutions that will store and manage access to radios from a secure software controlled locker. With integrated battery charging, handsets are always ready for use saving money that would otherwise be needed for spare batteries. Systems can also enable radio software updates during the charging process. Traka’s solution could save thousands from the capital spend on radios as it negates the need for each officer to have their own handset. The radios, and more, will be on display at the event.

Safety Communications

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

GET EDUCATED Jasvinder Sidhu, event director, stated: “Continuing from the success of the 2012 show, we’re very much looking forward to building on the knowledge and co‑operability already gained. New and old exhibitors, coupled with the free workshop sessions running over the two day event, will make the 2013 show an extremely relevant and un-missable event. ”We believe that, in order for you to benefit most from the show, technology, education and collaboration must remain key. The 2013 exhibition and professional development workshops are completely free‑to-attend and will use topical issues and case studies to ensure you stay informed with the most current and up-to-date industry knowledge. You can discuss with industry colleagues and remain one step ahead to give you the freedom to fulfil your day‑to‑day work life to the best of your ability.” The British APCO event is an abundant networking opportunity – on the exhibition floor as well as in the sponsored workshops. True to tradition, the annual gala dinner will be held on the first night of the show, enabling you to network with industry colleagues old and new. The dinner is a welcome respite from the first day’s bustling activities and includes four delicious courses, cabaret and after-dinner entertainment. Due to the high demand of 2012, the 2013 dinner will incorporate a bigger capacity of guests. Nonetheless, we suggest you book tickets early to avoid disappointment. L FURTHER INFORMATION www.bapco.co.uk

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

43


APPLICATION STORY

Solar farm surveillance enhanced with thermal imaging cameras

The FLIR PT-313 thermal imaging camera system provides crisp high contrast thermal images regardless of lighting and weather conditions.

The number of solar parks in Europe is increasing as the demand for renewable energy is rising. Many of these solar parks are in remote locations, so protecting them properly can be a challenge. One of the security companies that have come up with an answer to this challenge is Reading, UK, based Westronics Fire & Security Ltd. To ensure good visibility of intruders in the surveillance system, even at night or in adverse weather conditions, Westronics includes thermal imaging cameras in its solar park protection systems. “We have been installing closed circuit television (CCTV) systems ever since the technology was released to the public in the early ‘80s but CCTV cameras run into severe limitations when it comes to nighttime operation and certain weather conditions”, explains Westronics’ Managing Director Graham Miller. “Thermal imaging cameras are sensitive to electromagnetic radiation in the infrared spectrum, which is emitted by all matter as a function of its temperature. They need no light whatsoever to function, making them perfect for nighttime surveillance". Based on the recorded intensity of infrared radiation they produce clear, high contrast images, regardless of lighting conditions. Sun glare, shadows, smoke, rain, fog, all

of these factors can render CCTV cameras useless, but FLIR thermal imaging cameras are not hampered by these conditions. They can be used to see in complete darkness, through smoke and light fog. Thermal imaging: an obvious choice According to Miller the choice for FLIR thermal imaging cameras was obvious. “These sites need to be protected day and night. Since they are in remote locations there is no street lighting present, so for CCTV cameras to be effective during the night we would have to install additional lighting. This would not only increase the energy consumption of the security system, which obviously needs to be avoided, especially at a solar power plant, but would also have an unacceptable impact on the local wildlife,

When the microwave intruder detection system is triggered the nearest FLIR PT-313 thermal imaging camera is automatically pointed towards the location where the alarm was triggered to verify the alarm.

as these are protected green belt areas. FLIR thermal imaging cameras provide very high quality imagery, without the need for lighting. That is why we selected the FLIR PT-313 thermal imaging camera system for several recent solar farm protection projects. These particular camera models are very easy to incorporate in our security systems, as they are compatible with the standard TCP/IP protocols we use for our systems network designs.”


APPLICATION STORY “The FLIR PT-313 thermal imaging camera system contains both a thermal imaging camera and a visual CCD camera”, continues Miler. “ At first we mainly used the thermal imaging camera for nighttime surveillance, but we discovered that these thermal imaging cameras also enhanced the surveillance during the day. Whilst the visual CCD camera included in these multisensor camera systems is excellent, we soon found that apart from limitations like sun glare and fog, obscurants like the foliage of undergrowth can also hide intruders from view. Tests showed, however, that the foliage does not entirely camouflage the body heat of intruders from the thermal imaging camera. This allows the control room operators to track the movements of intruders even if they try to hide in the bushes.” FLIR PT-313 thermal imaging camera system The thermal imaging camera included in the FLIR PT-313 thermal imaging camera system contains an uncooled Vanadium Oxide (VOx) microbolometer detector that produces crisp thermal images of 320 x 240 pixels. The FLIR PT-313 thermal imaging camera can be used to detect a man-sized target from a distance of up to 880 meters, ensuring that no intruder will go unseen. The pan and tilt platform allows the user to rotate the camera 360° continuously and to tilt it +90° or -90° and with its extremely rugged housing, which meets IP66 requirements, the thermal imaging camera’s vital core is well protected against both dust and water ingress. The FLIR PT-313 thermal imaging camera systems are installed at three solar parks, one in Wiltshire and two in Cornwall. The security systems at these locations have three layers of defense. “The first layer of defense is a standard fence”, explains Miller. “Apart from deterring intruders this fence keeps out wildlife, to limit the unwanted alarms.” The

FLIR PT-313 Microwave intruder detection

An intruder that climbs the fence will trigger the microwave intruder detection system. The live thermal video footage from the FLIR PT-313 thermal imaging camera system allows the control room personnel to quickly assess the situation.

second layer is an invisible virtual fence of microwave detection between the actual fence and the solar panels. The third layer consists of the thermal imaging cameras, which are installed in strategic locations on four metre high posts, covering the entire area. Triggering the alarm “If an intruder climbs over the fence and enters the area between the microwave transmitter and receiver a difference will be detected in the beam, which triggers an alarm”, continues Miller. “The alarm is sent to the corresponding Alarm Receiving Center (ARC). Simultaneously the thermal imaging cameras are automatically pointed towards the area where the intrusion was detected, proving a wide angle view of the area.” The thermal and visual footage from the FLIR PT-313 thermal imaging camera systems is recorded by a standard hard disc recorder and simultaneously shared with the ARC through a secure broadband connection. “The operators of the ARC can remotely operate the cameras to provide the best view of the possible intrusion, switching between day and thermal cameras as the weather and lighting conditions dictate”, continues Miller. “The ARC staff can warn off would be intruders with the on-site public address (PA) system which provides an audible deterrent to casual intruders. If

The FLIR PT-313 thermal imaging camera can be used to detect a man-sized target from a distance of up to 880 meters, ensuring that no intruder will go unseen.

appropriate, the ARC staff can also deploy a mobile patrol or report the incident to the police. The footage recorded on the digital video recorder can be passed on to the police as evidence.” Visual confirmation is crucial Although the microwave intruder detection system can be excellent for intruder detection, according to Miller it is also notoriously susceptible to unwanted alarms caused by large animals or certain weather conditions. “For that reason a visual confirmation of alarms is crucial to provide a robust security solution. The FLIR PT-313 thermal imaging cameras provide exactly that. They allow the ARC to accurately distinguish between an alarm triggered by animals or a true security breach by intruders, regardless of lighting and weather conditions.” The thermal imaging equipment for this installation was supplied by the FLIR Platinum level distribution partner CCTV Center. ”Westronic’s system design and strategic placement of the FLIR thermal PTZ cameras has created a benchmark solution for both perimeter protection and measured area surveillance within the site; day and night, and under all weather conditions", adds CCTV Center's Technical Director Tim Cocks. "Their solution has been rightly recognised by the industry and serves as a 'best practice' model for similar sites within the energy and utilities sector.”

The FLIR PT-313 camera system contains both a lowlight color CCD camera and a thermal imaging camera for continuous surveillance, day and night, in all weather conditions.

FLIR Commercial Systems AB Luxemburgstraat 2 2321 Meer Belgium Tel. : +32 (0) 3665 5100 Fax : +32 (0) 3303 5624 e-mail : flir@flir.com www.flir.com

AS_1110_0036_EN

For more information about thermal imaging cameras or about this application, please contact:


Follow the easy path to business continuity Let’s face it; business continuity planning can be complicated. But like most complicated journeys, if you take it one step at a time, you’ll eventually get to your destination—and when you have a map, you’ll reach your destination even faster. The Definitive Guide to Business Continuity Planning is the one-stop reference to guide you on your way, step by step, to creating a business continuity plan for your organization. This comprehensive reference guide shows you how to create an effective business continuity plan from start to finish. It’s got information on useful planning tools, methods for testing your plan, ideas on keeping your plan up to date and smart ways to prepare for an audit. Best of all, the guide makes it easy for you to focus on just the topics that are most important to you. Each chapter covers a different aspect of BC planning, so you can start with the first or the last, or anywhere in between. Take a look at what’s inside: • Step-by-step information to help you create your own BC plan • Complete instructions on how to perform a business impact analysis • Strategies to successfully develop your plan in spite of tight budgets and limited resources • A list of tools needed to develop your BC plan, with the pros and cons of each • Tips on what an auditor is likely to request, and a schedule with steps to test and adapt your plan Take the first step on the path to business continuity by downloading a copy today.

Emergency notification is an important part of any comprehensive business continuity plan. Intelligent, two-way, mass notification from MIR3 can reduce response times, saving lives and property when danger strikes. © 2012 MIR3, Inc. All Rights Reserved. MIR3 is a service mark of MIR3, Inc. 26102012

Visit www.mir3.com/bcguide-uk today to download your copy of The Definitive Guide to Business Continuity Planning.


RISK

GETTING BACK ON YOUR FEET

Business Continuity

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Business Continuity Awareness Week 2013 will help deepen the understanding of business continuity and the role it plays in mitigating the risks that threaten organisations of all size Set against a volatile international climate where terrorist attacks and political uprisings have besieged the tabloid headlines, where organisations are confronted with an ever growing range of risks – man-made and natural – the role of business continuity (BC) to support organisations in their quest to become more resilient has never been greater than now. However, the real challenge organisations face is trying to understand the impact of any disruption, regardless of its scale or complexity. This is where BC really comes into force. Although, we can’t plan for everything, we can plan to be better prepared and BC helps us to do just that. Business Continuity Awareness Week (BCAW) takes place every year in March. Its purpose? To raise the awareness of the importance and value of business continuity by showcasing its worth as a strategic, integrated business discipline in every sector worldwide. BCAW is facilitated by the Business Continuity Institute (BCI), the leading institute for business continuity worldwide. Each year a new theme for the week is decided based on public demand. This year, risk has topped the charts and so the week will focus on how business continuity helps you to deal with the risks and threats you can see and the ones you can’t. INCREASE RESPONSE CAPABILITY How does BC help? BC enables an organisation to increase its response capability such that it can respond effectively to an existing, emerging or even an unknown risk. It does this by getting organisations to understand and decide which activities are critical to their survival and therefore need to be the centre of any focused recovery action and which ones could be temporarily parked. It is all about survival planning; it’s about mitigating the impact of any disruption on the most urgent and high priority activities. This is where the value and strength of BC lies; BC provides us with the framework for dealing as effectively as we can with whatever challenges the world throws at us, expected or otherwise; it helps us to prepare for and recover from the least to the worst possible scenario.

WHAT BCAW HAS TO OFFER? BCAW opens up the doors to anyone who wants to find out more about what BC is all about and how it might benefit their own organisation, and all that at no cost and with no obligation. It is a chance to look through the BC window and step through a door that leads to a whole new approach that will transform the way you deal with risks or threats in the future. Throughout the week, a wide range of multimedia resources and engagement/ learning opportunities are made available that will help deepen your understanding of business continuity and provide some valuable insights into a discipline that will add value to your role, your organisation and the industry as a whole.

ations s i n a g r O fronted are conr-growing e with evd the role of HORIZON SCAN risks, anss continuity REPORT e n i e One of the key s c u n b esilie r p highlights of the week l e h to is the Horizon Scan er been has nevater Report that is published gre by the BCI. Based on

widespread industry research, the Horizon Scan has established itself as an important and valuable reference source on top threats to businesses. By providing a consolidated view of the threats organisations face as well as valuable insights on how other organisations working in the same sector or region assess these threats, the output of this annual survey provides high-value information that can be used to help organisations better prepare against potential threats. A full programme of free-to-join webinars is delivered each day during the week,

which always attracts a high level of interest from participants around the globe. Industry experts deliver some insightful presentations on a wide range of relevant topics based on the overarching theme of the week. This year’s topics include cyber threat; supply chain disruption (of particular value to organisations that are heavily reliant on third party suppliers); crisis response; horizon scanning techniques and security. Participants benefit from the expert’s eye based on long-standing industry experience and have an opportunity to ask questions relevant to their own particular point of interest. GAME ON For those individuals or organisation looking for opportunities to learn about business continuity in a more playful fashion, then BC24, the BCI’s online crisis simulation game, offers a great way to experience first‑hand what business continuity is about in an informal, game environment. Normally with a price on its head, the game is made available free of charge throughout the month of March. BC24 is the perfect way to find out how good your staff reacts in a crisis situation and provides useful benchmarking information on individual performance. This is just a taster of what the week has to offer; there is of course a lot more. A dedicated website will be live from January onwards, so make sure you add www.bcaw2013.com to your list of favourites and check back for regular updates. L FURTHER INFORMATION Email: donna.monkhouse@thebci.org to be added to the mailing lists for BCAW 2013

Business Continuity Awareness Week takes place every year in March to raise awareness of the importance and value of business continuity by showcasing its worth as a strategic, integrated business discipline in every sector worldwide.

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

47


Low cost multi- bearer tracking system Provide worldwide coverage Full management report forms Web based control software

fix a r r Te

ited m i L

emai l :

enquiries@ter rafix.co.uk

we b

: ww

w.t er

raf

ix.c

o. u

k t: (

01

78

2)

57

70 15 f: ( 01 78

2)

83

56 67


EVENT REVIEW

BRINGING TOGETHER THE BLUE LIGHT COMMUNITY

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A record number of emergency responders and operational staff from all sectors of the emergency service gathered at the Emergency Services Show 2012, making it another highly successful year

High profile events such as the Diamond Jubilee and the 2012 Olympic and Paralympic Games have thrust the emergency services into the public eye and have opened up discussions around the importance of interoperability between the blue light services. Against this backdrop, an astounding 5,289 visitors attended the Emergency Services Show 2012, representing an 18 per cent increase from the previous year. The show promoted multi-agency collaboration by bringing together everyone involved in an emergency, attracting the leading buyers of emergency equipment and services. The significant increase in numbers indicated that, even during the current poor economic climate, the emergency services are still committed to improving public safety with new innovations and services. Even the inclement weather conditions didn’t deter visitors who battled their way

through wind and rain to see the extensive range of products and services on show. The most recent success for the emergency services was the London 2012 Olympics; one of the biggest security challenges the UK has faced for a number of years. With security levels at their highest, pressure was on the emergency and resilience industry to guarantee that correct plans and procedures were in place to ensure that the various events being held across the country ran as smoothly as possible. NO SERIOUS INCIDENTS The Olympic Torch Relay and the Games themselves saw thousands of people flocking to London and their local towns and cities and with no serious incidents, proved to be outstanding examples of blue light collaboration and efficient emergency planning. Joint training exercises before the games

allowed the different services to improve their knowledge and understanding of each other’s systems, building new relationships and partnerships that prove so invaluable when taking part in large-scale events. Other events such as the terrorist alert at the M6 Toll and the widespread flooding throughout the UK saw all emergency services come together to offer a collective support network. Although the M6 Toll alert was eventually proven to be a false alarm, it was reassuring to see all emergency services including police, fire and ambulance responding quickly and effectively to a potential terror threat. Networking and collaboration with suppliers, colleagues and partner agencies is and will continue to be an essential part of ensuring an emergency is dealt with as efficiently and effectively as possible. E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

49


The Devon & Somerset Fire & Rescue Service Training Academy is one of the leading fire and rescue training providers in the UK. Courses are available to organisations, other fire & rescue services, emergency services

The Academy offers courses such as:

• Confined Space (Full suite of City & Guilds 6150)

personnel and individuals.

• Swiftwater Rescue in partnership with Rescue 3 UK

Our training programmes supply workers/operatives with the specialist knowledge and skills required to work safely and effectively in hazardous conditions.

• Rope Rescue • Working at Height • Large Animal Rescue for vets (BEVA accredited) and fire & rescue services • Breathing Apparatus/ CFBTI/ PPV (I) • Suite of STCW95 Maritime Firefighting and BTEC Level 3 & 4 • Fire Safety/ Fire Awareness

Visit www.dsfire.gov.uk/trainingacademy or email trainingacademy@dsfire.gov.uk


EVENT REVIEW

An astounding 5,289 visitors attended the Emergency Services Show 2012, representing an 18 per cent increase from the previous year. The show promoted multi-agency collaboration by bringing together everyone involved in an emergency, attracting the leading buyers of emergency equipment and services.  LIVE DEMONSTRATIONS The Emergency Services Show 2012 was the ideal place for emergency planners, business continuity and resilience professionals to explore new ideas and initiatives in delivering efficient and effective emergency planning, as well as networking with like-minded professionals to discuss collaboration, ideas and initiatives focused on improving public safety. Over 400 exhibitors displayed their products and services during the Emergency Services Show, of which 100 were new to the event. Several exhibitors demonstrated live, including the Road Haulage Association, who re‑enacted a road traffic collision recovery. CBRN RESPONSE The EPS CBRN Professional Working Group (PWG) working with the GDS has identified that there are concerns particularly amongst local authority staff about the challenges posed by decontamination after a CBRN incident. Although there have been several incidents, of varying types, in the UK in the past few years, together with an increase in the capabilities on offer from various sources, there remains uncertainty in some quarters as to how to deal with such incidents. In response to this concern, the Emergency Planning Society held a CBRN Decontamination Workshop, which was designed to help local authority staff improve their knowledge and ability to deal with decontamination incidents. The workshop, sponsored by the Health Protection Agency, featured speakers from the Cabinet Office, Home Office and Government Decontamination Service. JESIP SUMMIT New to the show this year was the Joint Emergency Services Interoperability Programmes (JESIP) National Interoperability Summit. The summit brought together leaders and strategic managers from UK Cat 1 & 2 responders to the first ever high profile

national summit addressing this critically important topic. Topics covered included, an overview of JESIP and discussion on the external challenges from the worlds of law, academia and the military. Government speakers also gave their thoughts on the way forward for emergency services following a safe and successful Olympic & Paralympic games; the largest national security challenge the UK has seen for many years. To conclude the summit, the views from police, fire and ambulance were given from three national associations (ACPO, CFOA & AACE) The Emergency Response Zone featured exhibitors from fire and rescue, police, ambulance, government and voluntary organisations from around the UK, demonstrating the capabilities of partnering agencies and the voluntary sector. What’s more, the CFOA National Resilience team was also on hand, demonstrating its range of flood equipment and discussing its role in the latest flooding, that in some areas of the UK devastated whole communities. PRODUCTS AND SERVICES The exhibition hosted a range of suppliers including CFOA National Resilience, Government Decontamination Service, Emergency Planning College, Babcock, Fire Service College, Emergency Planning Society, Civil Contingencies Secretariat and British Red Cross. Exhibiting companies were on hand to demonstrate their latest innovations and developments and talked about cost saving initiatives. New exhibitors for 2012 included Falck Emergency Services UK, Arco, Training 4 Resilience, Serco Combined Resilience and Explosive Learning Solutions.

The l Nationability era Interop brought Summitleaders and r togethe ic managers strateg K Cat 1 and from U ponders 2 res

TOPICAL PRESENTATIONS Excelerate hosted a number of topical presentations within its auditorium on stand 102 that visitors could attend. David

The Emergency Services Show

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The event is organised by Broden Media and was launched in 2006 in response to the publication of The Civil Contingencies Act 2004. The free to attend two-day exhibition is open to all emergency responders. It is the UK’s largest event for those with a role in operations, procurement, training, recruitment and emergency planning. The types of products on show from exhibitors include: communications & IT, first response equipment, PPE, station equipment, training and education, vehicles and vehicle equipment, public order equipment, business continuity and outsourcing. A one day conference runs alongside the exhibition and attracts high profile speakers, discussing relevant and topical issues and examples of best practice. Savage, CEO and founder of Excelerate talked about enhancing resilience and capability dedicated for emergency response. Attendees learnt what really differentiates the choices in the market. Olaf Baars, deputy chief fire officer, Royal Berkshire Fire and Rescue Services, spoke about interoperability and the benefits of using fully integrated data, video, and voice via satellite and wireless. Andre Lloyd, Surrey Police discussed catching criminals faster and apprehending suspect vehicles within minutes via satellite and wireless data and video. Meanwhile Keith Sharp, HART manager, East Midlands Ambulance Service, spoke about improving incident response and management with realtime resilient applications. EVENT SUCCESS David Brown, event director commented: “We are thrilled to have seen such a significant increase in the number of visitors to the event this year, especially taking into consideration the appalling weather conditions the UK faced over the two days of the show.” “The show is continuing to grow year upon year, and we are very much looking forward to planning next year’s event, as the UK’s leading multi-agency show, which is reflected in another year of record attendance.” The Emergency Services Show will return to Stoneleigh Park in 2013. You can keep up to date with show news throughout the year on the event website. L FURTHER INFORMATION www.emergencyuk.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

51


locate dangerous radiation while keeping the world in motion.

rapiscan radiation detection

Detect rogue radiation on moving people, vehicles, cargo, bags and parcels. Radiological threats are real, and they are making worldwide headlines. Rapiscan Radiation Detection provides accurate, reliable and comprehensive monitoring devices for: • Customs and border agencies • Government, military and intelligence • Emergency and law enforcement • Medical institutions and facilities • Transportation authorities

• Mining operations • Nuclear companies and organizations • Radiation control facilities for raw materials, manufactured products and waste materials

To learn more or to schedule a demonstration, contact us at +44 (0) 870-7774301 (EMEA), +1 310-978-1457 (Americas), or +65 6846-3511 (AsiaPac). Visit us in 2013 at these trade shows: Security and Policing Counter Terror Expo Farnborough, UK London, UK March 12-14 April 24-25 Stand D18 Stand K55

sales@rapiscansystems.com • www.rapiscansystems.com

ONE COMPANY – TOTAL SECURITY


TECHNOLOGY

A WATCHFUL EYE ON OUR CITIES

CCTV & Surveillance

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

In many cases where a terrorist organisation has been successful, CCTV has played an essential role in the investigation and has been known to help bring those involved to justice, writes James Kelly, Chief Executive of the British Security Industry Association CCTV technology is continuously improving in order to be as effective as possible, and has proved itself as a vital security tool for the police, private companies and many public sector organisations over the years. Surveillance in the form of CCTV can be beneficial in terms of both crime deterrence and detection, and is fundamental in the prevention of terror activities, particularly in large cities. In those cases where a terrorist organisation has been successful, CCTV has played an essential role in the investigation of such activities and has been known to help bring those involved to justice. Such was the case in the London 7/7 bombings, where images of the perpetrators were obtained from CCTV at Luton railway station. In terms of the planned attack on 21/7, which was aborted, the police were able to rapidly issue images of the alleged culprits captured by CCTV on various public transport. Nearly 28,000

CCTV recordings gathered by police helped lead to the convictions of four men, who were ultimately found guilty of conspiracy to murder. The footage was condensed into seven hours worth of recordings from buses, trains and stations, which was then used as evidence in court. NUMBER PLATE RECOGNITION One particular type of surveillance was extremely influential in this high profile case – the widespread network of congestion charging cameras placed in the Congestion Charging Zone in central London. Usually, these cameras utilise Automatic Number Plate Recognition (ANPR) in order to collect

CCTV re sa analytice in the bl invalua on against i protect risk of the attacks t s i r o r r te lated in popuas are

congestion tolls during busy hours. In this case, however, the ANPR systems enabled the police to decipher the movement of particular vehicles in the lead-up to both incidents, allowing for a clearer timeline of events to strengthen the investigation. ANPR software can generally be extremely useful in terms of city surveillance. This type of mass observation utilises optical character recognition on images in order to read vehicle registration plates. This kind of technology can be used in conjunction with existing CCTV, road-rule enforcement cameras or surveillance typically designed for this type of task. ANPR is currently used by various police forces as a way of electronic toll collection. However, it can also be an effective way of fighting crime and locating individuals who may have committed wrong doings, making it easy to track down vehicles in close to real time. These systems also typically use infrared lighting, allowing for careful monitoring of vehicles both day and night, which is extremely important as perpetrators may treat nightfall as a perfect opportunity to commit crimes or plant potentially threatening devices. THE ADVANCES OF TECHNOLOGY CCTV is constantly developing in order to suit the security needs of the country as a whole. Sophisticated mobile Digital Video Recorders (DVRs) are now being fitted to buses and trains – known victims of terrorist acts – so that passengers can be safe in the knowledge that any potential harmful activity will be closely monitored and the necessary action taken to prevent an unwanted situation. When fitted, these compact, self-contained systems are capable of continuously monitoring the inside of a carriage or bus for suspicious behaviour, moreover providing a significant deterrent to criminal damage, delivering much-needed reassurance to the travelling public. Another key area where CCTV is rapidly developing is that of video analytics. This impressive technology is invaluable in the protection against the risk of terrorist attacks in largely populated areas. One application of this technology that is extremely useful in terms of city surveillance is ‘object left/object E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

53


Ready to meet

the world’s most flexible infrared cameras? Thermal imager combined with IP camera electronics

Meerkat-Fix

Raven-640

Imagine the invisible The high resolution Raven-640 is the smallest thermal infrared camera in the world fitted with a 640 x 512 detector. The analog video-out interface makes it an easy plug-and-play system. Thanks to excellent image quality and small configuration the Raven-640 is designed for instant, accurate and cost effective integration into most complex security and night vision applications. The outdoor camera version Meerkat-Fix consists of fixed mounted cameras with a fixed field of view, and even for more situational awareness, with zoom lenses. The Meerkat-Fix features H.264 video compression and optional ONVIF. www.xenics.com - www.stemmer-imaging.co.uk


TECHNOLOGY  removed’. In terms of ‘object left’, this refers to the identification of something that tends to cause panic in populated areas – an unattended item. Often, people make the assumption that the item, such as a bag or package, is a threat, perhaps containing an explosive device, which could lead to a chaotic situation. It is therefore crucial for security professionals to make the assertion as to whether there is an innocent explanation or if the item is indeed suspicious, resulting in an evacuation of the immediate area near the article. Object removed allows CCTV operators to be notified regarding the offending object, allowing for its removal and the restoration of public order.

process. When employed in the right contexts, cameras like these can allow for a more widespread observation in larger areas. CCTV FOR EVENT MANAGEMENT CCTV is also extremely invaluable in ensuring the smooth and safe running of events. Year round city centres host a wide variety of different events, ranging from Christmas markets, New Years Eve street parties, sports matches and concerts. These kinds of events result in a large increase in people flow, thus creating an increase in risk of crime or large scale attacks. CCTV, along with other security measures, allows for greater

In the London 7/7 bombings, images of the perpetrators were obtained from CCTV at Luton railway station. In terms of the planned attack on 21/7, which was aborted, the police were able to rapidly issue images of the alleged culprits captured by CCTV on various public transport. TRANSPORT SAFETY This technology is useful in busy areas where, unlike airports, extensive security checks are not typically carried out. The transport sector makes particular use of this equipment. In 2007, Clapham Junction station in London was amongst the first rail stations in the country to install a CCTV system equipped with video analytics specifically aimed at addressing the rising risk of terrorist attacks. The cameras were installed to help in the identification of suspicious behaviour and in spotting unattended equipment. In recent years, this technology has been utilised by many other stations in the UK transport network. High Definition (HD) CCTV is also expanding across a wide range of video surveillance applications. “HD CCTV signifies an unprecedented revolution in the quality of images that can be delivered, the ability to more easily identify suspects and make sense of their actions, and the potential to improve the successful conviction rate on the ground,” says Simon Adcock, Chairman of the BSIA’s CCTV section. HD cameras also open up the possibility of covering a much wider area without having to use multiple different cameras. For example, in terms of wide angled and fisheye lenses which cover more surface area, there are features available that will allow operators to easily monitor an area without any distortion of the images, almost as if they were looking through the lens of a normal Pan Tilt Zoom (PTZ) camera. Operators of these cameras will also be able to pan, tilt and zoom the camera with the use of a joystick, adding flexibility to the monitoring

control over these potential threats and constant supervision of a wide range of areas. Video surveillance technology at events helps to provide the best possible situational awareness so that those in monitoring the cameras either in the control room, command vehicle or on the ground, are able to see the big picture of what is going on. This wide-scale view, with CCTV footage linked to a digital map of the vicinity, ensures that officers and event stewards can be marshalled effectively. At a tactical level, operators can drill-down to obtain more detail on a specific incident as it develops so extra resources can be brought to bear and, if necessary, potential troublemakers identified and dealt with. CCTV cameras do not have to be static, for example one solution that is now used around major events is that of Football Command Vehicles. These offer a high visibility presence and include a mast‑mounted unit that provides a good all round

view of a vicinity, allowing for relocation to specific hotspots if needed. Typically these are used at sports events where the threat of rival fans clashing can be imminent; however these vehicles could also be employed in city centres during busier times. LINKING WITH OTHER SYSTEMS The integration of CCTV with other kinds of security equipment can also be extremely useful, particularly at events. For example, CCTV can be linked to an access control system, which monitors those individuals entering and leaving a particular area. The CCTV can provide pre-event and post‑event images of said individuals, and could lead to the identification of a criminal if an offence has been committed or a threat made. CCTV can also be detector activated. When an incident occurs, a Remote Video Response Centre (RVRC) is alerted and images of the activated site can be accessed and monitored. This then allows the appropriate action to be taken, and the police to be notified if necessary, saving time and giving way to a faster response. Regardless of the kind of CCTV that a business or organisation employs, it is most important to choose from a supplier who is inspected to a quality standard, ensuring that the service is professional and trustworthy. BSIA members offer a reputable service and are inspected to UKAS accredited standards, to find out more about the CCTV section or to find a supplier near you, visit the BSIA website. L FOR MORE INFORMATION www.bsia.co.uk/cctv/ about-bsia-cctv

CCTV & Surveillance

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com




Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com info.uk@infranor.com


TERRORISM

TERRORISM: THE GLOBAL PICTURE

The Global Terrorism Index, produced by the Institute for Economics and Peace, is the first index to systematically rank and compare 158 countries worldwide over a ten-year period to shed light on the impact of terrorism The Index is based on data from the Global Terrorism Database (GTD) of the National Consortium for the Study of Terrorism and Responses to Terrorism (START) - the most comprehensive dataset on terrorist activity with over 104,000 cases of terrorist attacks codified. The Index ranks countries based on the following four indicators weighted over five years: Total number of terrorist incidents; Total number of fatalities from terrorism; Total number of injuries from terrorism, and; Estimated property damage from terrorism. Each of the factors is weighted between zero and three, with fatalities having the highest weighting, and a five year weighted average is applied to reflect the lasting psychological effect of terrorist acts over time. DEFINING TERRORISM Defining terrorism is not a straightforward matter. There is no single internationally accepted definition of what constitutes terrorism, and the terrorism literature abounds with competing definitions and typologies. The GTI accepts the terminology and definitions agreed to by START researchers and its advisory panel. The GTI therefore defines terrorism as “the threatened or actual use of illegal force and violence by a non-state actor to attain a

political, economic, religious, or social goal through fear, coercion, or intimidation”. This definition recognises that terrorism is not only the direct physical act of an attack, but also the psychological impact it has on a society, sometimes for many years after. The biggest rise in global terrorism took place over the period from 2005 to 2007 and was driven by events in Iraq. Four other countries also significantly contributed to the global rise with Pakistan, India, Afghanistan, and the Philippines all experiencing increases, especially between 2007 and 2009. Only 20 nations scored a zero for terrorist impact over the 2002-2011 period, indicating the impact of terror, while heavily concentrated in some places like Iraq, Afghanistan, Pakistan, and India, is nonetheless widely distributed around the world. There has been a significant increase in the total number of terrorist incidents over the ten year period with the

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

number of terrorist incidents increasing by 464 per cent. The most significant jump was from 2007 to 2008 with incidents rising from 2520 to over 4000. Since then the number of incidents has plateaued. The success rate of these attacks remained very high, ranging between 89 per cent and 97 per cent. In 2011 the average rate of success was 91 per cent. From 2004 there has been an increase in the total global number of injuries from terrorist incidents which reached its peak in 2009, while the number of fatalities peaked in 2007 and by 2011 were back to a similar level to 2006. The results for 2011 show Iraq, Pakistan and Afghanistan were the three countries most affected by terrorism that year. Of the 158 nations included in the GTI, 84 did not suffer a terrorist incident in 2011. WEAPONS AND TARGETS According to the report, the most common type of weapons used in terrorist attacks are explosive devices. Attacks with firearms have increased steadily over the last decade while suicide bombings have become more prevalent in Iraq, Afghanistan, and Pakistan. At over four and a half times their 2002 levels, global trends for suicide attacks peaked in 2007 at 288, however once again these trends are dominated by Iraq. US, UK AND EUROPE The attacks in the US during the 2002‑2011 period were predominately of a ‘domestic’ nature and mainly committed E

“I welcome the launch of the Global Terrorism Index. It promises to be a useful tool for policy makers in their efforts to track and tackle terrorism.” Khalid Mahmood, Chair of the UK-All Party Parliamentary Group on Tackling Terrorism, UK

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

59


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Rescue equipment tactical@holmatro.com | http://tactical.holmatro.com


TERRORISM Global Terrorism Index: key findings

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

In 2011 there were 4564 terrorist incidents globally, resulting in 7473 deaths and 13961 injuries. Most terrorist attacks occur in the context of a wider conflict situation. Whilst religious terrorism often gets widespread coverage, there is a significant level of terrorism from non-religious groups. Western Europe experiences many more terrorist incidents than the U.S. having also suffered 19 times more fatalities than the U.S. Over the period 2002-2011, terrorists were most likely to target private citizens and property, government, police, and business. The trends for these attacks have been increasing as a percentage for all targets since 2002. Military installations and personnel were only targeted in 4% of incidents. Global incidents, fatalities and injuries are dominated by events in lower middle income countries. Seven of the ten countries most affected by terrorism are from the lower middle income bracket.

 by environmentalists, animal activists, racists, and anti-abortion activists. In the US, most terrorist attacks were aimed at buildings and businesses, with minimal attacks on private citizens. In 2009, a spike in US terrorism was the result of the Army Major Nidal Malik Hasan opening fire on fellow soldiers at a military facility where he killed 13 soldiers and injured 19. In spite of the persistent number of relatively small and medium sized incidents in the US, from 2002 to 2011 North America was the region with the least number of terrorist attacks, followed by Western Europe. When combining Western and Eastern Europe as one region and aggregating all the countries, it can be seen that Europe experiences many more incidents of terrorism than the US. Since 2002, Europe has had 2,341 incidents with 1,431 occurring in Central and Eastern Europe and the other 910 incidents occurring in Western Europe, 25 per cent of which

took place in the UK. Of these attacks, two thirds were committed by unknown perpetrators. Where the perpetuators were known, attacks have centered on nationalist separatist objectives. In Central and Eastern Europe, Chechen Rebels and the Kurdistan Workers Party (PKK), who have been fighting for independence from Russia and Turkey respectively, were the most active. The Basque Fatherland and Freedom (ETA) were the most active in Spain. As with other parts of the world, bombings/explosions are the most common type of terrorist attack in Europe. The majority of terrorist incidents in Europe were domestic. That is to say, the raison d’etre seems to be focused on national issues as in Greece with its austerity measures or Spain with its nationalist/separatist discontent. Incidents in Europe increased drastically in 2007, primarily due to Russia which suffered 140 attacks in 2008. Chechen Rebels and the Caucasus Emirate are known E

Low income countries are much less likely to suffer from terrorism than lower middle income countries. This suggests that poverty is not a prime driver of terrorism. The majority of global incidents, fatalities and injuries occur in countries with hybrid regimes1 and account for 46% of incidents, 54% of fatalities and 60 per cent of all injuries. Terrorism correlates with low political stability, low intergroup cohesion, human rights violations and with high levels of group grievances. From 2002 to 2011, North America was the least likely region to suffer from a terrorist attack, followed by Western Europe.

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

61


International Speakers Include: Major General Andrew Sharpe DG DCDC UK MoD

5-8 February 2013 Five, Farnborough, UK www.internationalarmouredvehicles.com

CONFERENCE

600+

65+

Attendees 53% military

Senior speakers from 34 countries

2,100+

Attendees from 52 countries

15

Minute

long tracks and obstacles

TEST TRACK

EXHIBITION

200

15 Vehicles

and 100 Exhibition Stands

Lieutenant General David Halverson, Deputy Commander TRADOC, US Army

Brigadier General Steffan Andersson, Deputy Commander, Swedish Army

Fleet Admiral Marco Antonio Guimaraes, Commander, Brazilian Marine Corps

sqm

site at start and finish points

Lieutenant General Dalbir Singh Sidhu, Indian Army

Major General Topply Lubaya, Chief of Army Staff, Zambian Army

PLUS! G6 INDUSTRY LEADERS STRATEGY DEBATE IS BACK! Addressing the priorities and challenges for future vehicle developments, the G6 industry leaders will showcase and investigate industry’s response to future battlespaces, the main characteristics of future conflicts and the armoured vehicles market.

Counter Terror Business readers save 20% to attend with code IAVs2013_CTB

Register online at www.internationalarmouredvehicles.com, call +44(0) 20 7368 9510 or email armouredvehicles@iqpc.co.uk.


TERRORISM

 to have each committed around 7 per cent of these attacks. Georgia was also the victim of increased attacks, going from not being targeted once in 2007 to suffering 31 attacks in 2008. While the majority of these attackers remain unknown, South Ossetian separatists account for around a third of all incidents. A second increase in incidents occurred in 2009 and 2010 which again can be attributed to rising attacks in Russia. In Western Europe, the increase observed in 2007-2009 can be largely attributed to increased activity in Greece that rose from 14 incidents in 2007 to 115 in 2009. Since 2009 however, incidents have decreased in Western Europe to around 2002 levels. The US had a lower number of terrorist attacks than the UK with 127 incidents being recorded from 2002 to 2011, compared to 236 in the UK,

the majority of which occurred in Northern Ireland. On the whole, the numbers of fatalities in Europe have decreased since 2002. CORRUPTION AND TERRORISM Although the correlation between corruption and terrorism is not strong, a deeper investigation highlights that those countries with the highest levels of terrorist activity also score poorly on corruption measures. Four of the 15 countries with the highest level of activity are ranked in the bottom ten on the Corruption Perception Index, with the rest being in bottom third and only Thailand and India having mid-ranking scores on corruption. There are many countries which are ‘corrupt’ but do not have terrorism, indicating that corruption on its own does not necessarily lead to terrorism. However, nations severely

Top 10 countries affected by terrorism in 2011 RANK 1 2 3 4 5 6 7 8 9 10

COUNTRY Iraq Pakistan Afghanistan India Yemen Somalia Nigeria Thailand Russia Philippines

GTI SCORE 9.56 9.05 8.67 8.15 7.30 7.24 7.24 7.09 7.07 6.80

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

affected by terrorism share high levels of corruption. As corruption increases it has little effect on peace until a tipping point is reached, after which very small increases in corruption result in very large decreases in peacefulness. To further understand what types of corruption were associated with low levels of peacefulness, the Global Corruption Barometer (GCB) from Transparency International was correlated against the GPI. Changing levels of corruption in the police, military and judiciary were found to be most closely aligned with changes in peace. This demonstrates the link between corruption and the breakdown of rule of law, and would indicate that measures aimed at reducing corruption within the law enforcement agencies would go a long way to improving their legitimacy and undercutting societal discontent. E

DOWNLOAD THE FULL GLOBAL TERRORISM INDEX REPORT To download the full Global Terrorism Index report, and to see interactive maps based on the data its uses, visit tinyurl.com/ d5hf6fm

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

63


55X

ALL NEW FULL HD PAIR MEGAPIXEL ZOOM LENS The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been combined with a HD Full HD resolution 55X zoom lens for even greater quality SD and definition to offer the best possible security.

 PAIR-Technology  Up to 140X ZOOM with build-in 2.5X Extender  Full HD Resolution 1080p  2 Megapixels  High Speed Motors  1/2", C-Mount  Iris Override  Presets  Compact and Robust  Optimised for use in Port Facilities, Border Control, Coastal Oil Fields, Highway Monitoring etc.

PENTAX RICOH IMAGING DEUTSCHLAND GmbH Security Systems Division

PENTAX RICOH IMAGING UK LTD. Security Systems Division

PENTAX RICOH IMAGING FRANCE S.A.S. Security Systems Division

Julius-Vosseler-Str. 104 22527 Hamburg Germany Sales: +49 (0)40 56192109 Email: ssd@pentax.de

Heron Drive, Langley Slough SL3 8PN United Kingdom Sales: +44 (0) 7973 154430 Email: ssd@pentax.co.uk

112 Quai de Bezons, B.P. 204 95106 Argenteuil Cedex France Sales: +33 (0) 680 614348 Email: ssd@pentax.fr

www.pentax-security.com


TERRORISM  BLACK SWANS AND BURSTINESS The GPI features a contribution entitled Black Swans and Burstiness: Countering Myths about Terrorism by Gary La Free, director of the START Consortium at the University of Maryland. He writes: “Terrorism has two characteristics that make it prone to myth-making - It’s ‘Black Swan Nature’ and its ‘Burstiness’ “Essayist Nassim Taleb defines a black swan incident as one that falls outside the realm of regular expectations, has a high impact, and defies predictions. The term is based on the observation that before they visited Australia, Europeans had assumed that all swans were white; an assumption that at the time was supported (for Europeans at least) by their own experience. Taleb claims that the coordinated terrorist attacks of 9/11 are a perfect example of a black swan event because they were unexpected, had a huge impact on policy and were difficult to predict. One of the major challenges in responding to terrorism is that a handful of very rare cases can have a disproportionate effect on setting the agenda for the phenomena more generally.

“But terrorism also tends to be bursty. Bursty distributions are those that are highly concentrated in time and space. Recent research has shown that diverse phenomena are bursty, including streams of e-mail messages; traffic on crowded freeways; the frequency of forest fires and the global distribution of terrorism. These two qualities – its black swan character and its burstiness – make responding to terrorism challenging. On the one hand, terrorism is relatively infrequent and hard to predict; on the other hand, when it starts to happen there is a tendency for it to happen in the same place a lot.

a al-Qaed sible pon was res one out for only00 terrorist 0 of the 5nts in 2011, incide of the most 1 while 1 tive groups c 20 a -Qaeda l a e r e w linked

BEYOND AL-QAEDA Bill Braniff, executive director of the START Consortium, contributes a chapter entitled ‘Beyond al-Qaeda’ which examines the ten most lethal organisations in the timeframe of the report. These include the Taliban, the Islamic State of Iraq and its two precursor organisations (al-Qaeda in Iraq and Tawhid wal Jihad – which make the top ten on their own record), Tehrik‑i‑Taliban Pakistan, and Boko Haram.

Braniff states: “Four of the five most lethal‑single attacks of 2011 were conducted by al-Qaeda in the Arabian Peninsula (110 killed), the Tehriki-Taliban Pakistan (80 killed), al-Shabaab (70 killed), and al-Qaeda in Iraq (65 killed). According to GTD data, however, the al-Qaeda organisation itself was responsible for only one incident – a kidnapping – out of the 5000 terrorist incidents in 2011, while 11 of the most 20 active groups globally were al-Qaeda linked. As a result, the al-Qaeda organisation does not currently claim the majority of our attention, except when another important cadre member is killed or captured. Instead, observers ponder the meaning of the continuous or frequently increasing levels of violence from other jihadist groups in the context of a post Arab-Spring world, despite the fact that the various narratives of the Arab Spring seem to undermine al-Qaeda’s reliance on violence and its call to reestablish the caliphate as the governing structure for the Muslim nation. “Additionally, individuals continue to join jihadist groups or plot violent attacks of their own volition. What should we take from these seemingly contradictory developments? Did al-Qaeda succeed by inspiring widespread jihadism, or has it lost to a variety of more popular, parochial actors? To address these questions, it is essential to understand al‑Qaeda’s origins and its place in the E

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

65


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

UK buildings need more protection against terrorist threats, according to property expert Jonathan Goss Owners of public buildings aren’t doing enough to protect their staff and visitors from terrorist attack, according to a property security expert. Jonathan Goss, managing director of Townscape Products, which manufactures hostile vehicle mitigation security systems, is warning high profile property owners not to let their guards drop despite the Olympic Games passing without incident. Jonathan advises: “There are 350 high priority sites identified by the National Counter Terrorism Security Office which require particular attention and preventative security measures. However, these 350 were taken from a wider list of more than 25,000 properties and places surveyed where crowds congregate. “The current threat of terrorist attack in the UK is ‘substantial’, according to the Home Office, meaning an attack is a ‘strong possibility’. As the highest profile buildings step up their anti-terrorist protection, terrorists will look at alternative targets where they have the most chance of success. This is why it is vital for potential targets to do everything they can to stop vehicle-borne attacks.” These warnings were issued by Townscape at the launch of www.concretebarriersHQ.

co.uk. The new website has been developed by Townscape as a guide for security consultants, facilities managers, contractors and local authorities on protecting their buildings and premises from vehicle-borne threats. Goss continued: “There is an increasingly significant requirement for security and protection of public building and spaces from terrorist attacks. “Several years ago we identified this danger and developed the PAS 68 CT Block to stop vehicle-based attacks.We felt it was important to share our research and knowledge on perimeter protection through an

online resource. ConcreteBarriersHQ explains the importance of hostile vehicle mitigation and PAS 68: 2010, as well as showing how the CT Block has helped protect many of the UK’s airports and high profile buildings. We’ve also developed a free downloadable fact sheet on perimeter protection.” Townscape’s CT Blocks, which it manufactures at its Sutton-in-Ashfield factory, each weigh in at 2.2 tonnes and are made using a special mix of aggregates designed for ultimate strength. The CT Blocks only require minimal groundwork due to their shallow profile foundation, making them cost effective to install without compromising on security. CT Blocks are positioned where a building is vulnerable to vehicular incursion and meet the PAS 68:2010 V/7500[N2]/48/90 standard for vehicle immobilisation. Townscape Products has supplied CT Blocks to many of the UK’s major airports, including Manchester and Gatwick, and they also protect The Tower of London, Belfast Titanic Centre and numerous other visitor destinations nationwide. FURTHER INFORMATION www.concretebarriersHQ.co.uk

PROTECTION FOR YOUR PROPERTY AND PEOPLE CT Block is a PAS 68 approved hostile vehicle mitigation system which combines proven security, cost effective installation and natural design. • • • •

Minimal Groundwork: 100mm recess means no costly disruption to underground services Strong: Tested to PAS 68 standard Transferable: Keeps pace with your changing security requirements Attractive: A range of natural colours and finishes

CT Block is already protecting many of the UK’s largest airports, utilities infrastructure, visitor attractions, government and public buildings.

CTBLOCK

Find out how CTBlock can secure your property.

01623 513 355 Townscape Products Ltd Fulwood Road South, Sutton-In-Ashfield, Nottinghamshire NG17 2JZ, UK

CTBLOCK

sales@townscape-products.co.uk www.concretebarriershq.co.uk

66

COUNTER TERROR BUSINESS MAGAZINE | Issue 12

Created by


TERRORISM  broader Islamist landscape; only in context can the decline of the al‑Qaeda organisation and the persistence of violent jihadism be understood and can governments formulate policy for a threat environment beyond al-Qaeda.” YOUTH UNEMPLOYMENT AND TERRORISM Professor Raul Caruso of the Institute for Economic Policy in Milan elaborates some points on future aspects of terrorism on a global scale. Caruso highlights trends and aspects that would make terrorism and political violence a serious threat. “What inflames terrorism? No clear-cut answers exist in this respect. However, there is a growing consensus on the positive association between declining economic opportunities and the emergence of violence. In particular, there are several studies analysing the causal relationship between economic conditions and antisocial behaviors, political violence and terrorism. In this vein, a particular aspect which has been often underestimated, namely the relationship between youth unemployment and emergence of terrorism. “Youth unemployment is a particular aspect of economic environment. Youth unemployment in many countries is currently a growing phenomenon. According to the figures released by the ILO in May 2012, 12.7 per

It is worth noting that only 43 countries scored a zero for terrorist impact in 2011. While terrorism is highly concentrated in places such as Iraq, Afghanistan, Pakistan and India, the GTI report states that it is also distributed globally. cent of the global youth labour force will be unemployed in 2012. If we take into account the global numbers, there will be nearly 75 million unemployed youth aged 15 to 24 in 2012. This constitutes an increase of nearly 4 million since 2007. In fact, the global economic distress worsened the youth unemployment rates across the world. In fact, it is widely acknowledged that youth employment is more sensitive than adult employment. SWING SENSITIVE “Young workers are supposed to be vulnerable because of their lack of seniority and their skills are low. That is, in times of economic sluggishness, employers would hire workers with superior experience and competences, namely adults unemployed. Therefore, youth unemployment is expected to be more sensitive to the swings of the business cycle. However, the rise of youth unemployment has been asymmetric across

Global Terrorism Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

regions. In 2011, in North Africa, the 27.9 per cent of young people was unemployed 2011. In the Middle East the rate was of 26.5 per cent. In Latin America and the Caribbean the figure peaked to 15.6 in 2009 and eventually decreased to 14.3 per cent in 2011. In developed economies in 2012, the figure is expected to be around 18 per cent. In my view, the dramatic rise of youth unemployment is likely to constitute the fundamental engine of political violence and terrorism.” L FURTHER INFORMATION The Institute for Economics and Peace (IEP) is a non-profit research organisation dedicated to shifting the world’s focus to peace as a positive, achievable, and tangible measure of human well-being and progress. To download the full Global Terrorism Index report, and to see interactive maps based on the data its uses, visit tinyurl.com/d5hf6fm

High Performance Antennas for Countermeasures, where Security is Critical Directional Planar Spiral Antennas High Power, 0.15 to 15GHz

Phase Matched Cavity-Backed Spiral Antennas

Ultra Wideband Omni Antennas, 0.1 to 18GHz

Multiple Bands in Stacked Omni Array

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture The most important thing we build is trust

High Power Planar Spiral

Ultra Wideband Omni-Directional

• Directional, ultra wideband, high power • Bandwidths up to 30:1 • Ultra slim

• • • • •

Cavity Backed Spiral • High fidelity monotone patterns • Direction finding systems • Phase and amplitude matching available

Biconical omni-directional antennas Fully efficient Vertically polarised Bandwidths from 3:1 to 30:1 Multi-stacked omnis for versatile configurations

Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, United Kingdom T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

67



EVENT PREVIEW

DRIVING DEFENCE FORWARD

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

International Armoured Vehicles 2013 partners with the Long Valley Test Track for a live defence vehicle demonstration International Armoured Vehicles, the largest show dedicated solely to the armoured vehicles community, has just announced that they are launching a live dynamic vehicle experience at the Long Valley Test Track during the 2013 event, which takes place at the FIVE in Farnborough, UK. Long Valley Test Track, located in Aldershot, features different terrains and obstacles, such as the alpine track, sand traps and water features, for an enhanced live experience. Open for test track exhibitors and their military guests, the dynamic vehicle experience is designed for vehicle manufacturers to showcase their products to their clients in an ‘immersion’ setting, with each track running a duration of anywhere from 15-30 minutes at a time. NICHE MARKET With this new installation, the 2013 International Armoured Vehicles show marks a clear evolution in Defence IQ’s flagship armoured vehicle event. The event is traditionally comprised of a large scale conference of 600+ attendees, combined with a focused exhibition hall, which annually welcomes 2,100+ visitors from 47 countries. It runs from 5-8 February 2013 (exhibition open from 6-7 February 2013) and is open to defence-related professionals. Quoted in February 2012 in his previous role, Lieutenant General Christopher Michael Deverell, Director Land Materiel, DE&S UK MoD commented: “There are lots of conferences around, but there’s not another one on this sort of scale that is specifically focused on armoured vehicles, so it fills a very useful niche.” Running for its 12th time in 2013, International Armoured Vehicles once again offers a high-level and technical programme during the conference, with topics focusing on survivability, innovative armour, simulation, maintenance and industry requirements. The popular introduction of last year’s G6 Industry Panel sees its return for 2013, with new panellists such as General Dynamics, Iveco, Lockheed Martin, Nexter, Renault and Textron, as well as the addition of the International Industry Leaders Panel (IILP). Much like the G6 Panel, the IILP will feature leaders in the international space, discussing up-and-coming markets of interest to the land defence industry, such as Turkey, Brazil, Russia and the Middle East. The 2013 show also introduces the Industry Focus Day, which is designed to provide a platform for technical experts

Long Valley Test Track, located in Aldershot, features different terrains and obstacles, such as the alpine track, sand traps and water features, for an enhanced live experience. from Tier 1 companies to present their current projects, challenges and future capability requirements to members of the military and Tier 2 and 3 groups. Amongst the prestigious speaker faculty are Lieutenant General David Halverson, Deputy Commander TRADOC; Major General Andrew Sharpe OBE, DG DCDC UK Ministry of Defence; and Fleet Admiral Marco Antonio Guimaraes, General Commandant of the Brazilian Marine Corps. Joining them are over 50 senior government officials and international flag officers from 24 countries, including Major General H. R. McMaster, Commanding General Maneuever Center of Excellence, US DoD, and Major General Ian Copeland, Director Joint Support Chairn, DE&S, UK MoD. Additional military speakers will represent international organisations such as the Malaysian DoD, German Army, Danish DoD, French Army, Australian DoD, Italian Armed Forces, and the Indian DRDO. INNOVATION The exhibition spans the whole of the FIVE venue, and is set to feature 100 exhibitors from around the world, the International Armoured Vehicles Awards, as well as the Innovation Stage. Featuring direct

updates from upcoming vehicle programme requirements from major OEMs, to the SMEs providing the newest and most innovative solutions for today’s capability challenges, the 2013 Innovation Stage provides attendees insight into the future of the armoured vehicles market. Last year’s Innovation Stage offered exhibition guests insight from guest speakers of leading industry such as General Dynamics, Kaller, Thales and Tawazun. The official programme for the Innovation Stage is scheduled for release in early November 2013. Full details on the dynamic vehicle experience at the Long Valley Test Track, conference and exhibition are available on the event website, www. internationalarmouredvehicles.com Professionals involved in armoured vehicles are encouraged to register for a free exhibition pass to the 2013 exhibition (does not include the conference), or to join Defence IQ’s extensive social media community on www.defenceiq. com, LinkedIn group (Armoured Vehicles Networking Group), Twitter (twitter. com/IAVehicles, and Facebook. L FURTHER INFORMATION Email: armouredvehicles@iqpc.co.uk www.internationalarmouredvehicles.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

69


Always in its element.

Iveco DV’s range of Multirole Vehicles, Tactical and Logistic Trucks and Armoured Fighting Vehicles covers the full spectrum of on- and off-road military requirements and represents a well thought through, comprehensive and effective response to the needs of the military customer. Iveco recognises that this needs change in response to the evolving operational environment, developing doctrine and changing threat. As a part of the company’s commitment to our custo-

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

mers’ needs, we aim to identify or anticipate at an early stage how requirements are likely to develop. As a result, the whole product range is subjected to a continuous development process. Evolving needs are fed back to Engineering, who in turn develop a steady stream of enhancements in terms of payload, mobility and protection. Where necessary, complete new vehicle families are developed.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


DEFENCE VEHICLES

COLLATING EXPERTISE FOR THE ULTIMATE SOLUTION

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Iveco Defence Vehicles has boosted its vehicles by tapping into the expertise of other companies to create a one-stop-shop solution for the defence customer For vehicle manufacturers, one of the key characteristics of recent vehicle procurements has been the move away from simply offering a platform with a given level of protection, mobility and capacity, and towards the provision of a system which provides an increasing range of capability. This may require the provision of weapon stations or turrets, local situational awareness systems and sights, or advanced ECM suites. Increasingly, there will be a requirement for a mandated vehicle architecture standard, such as the UK’s Generic Vehicle Architecture. This step change in user requirements presents both challenges and opportunities to vehicle manufacturers, pressuring them to adapt quickly, further refining existing skills and developing new ones as appropriate. A BROADER FOCUS The expanding scope of capability requirements, driven by the military need to exploit each piece of equipment to the full, inevitably extends well beyond what might be thought of as the traditional skills

company has focused on enhancing its in-house expertise in such areas as EMC engineering and designing for protection whilst, on the other, it has sought to form partnerships with established market sector leaders in relevant technical areas.This enables the company both to ensure that it can act as an intelligent customer or partner, and to understand the implications for vehicle design of developments in these technologies. This combination of approaches is well illustrated by two of the company’s most recent vehicle developments. In each case, the company’s engineers have evolved original designs, one from a MOTS power train and running gear and one from a COTS chassis, to allow the integration of systems and solutions from third party suppliers. The first of these is the development of the 8 x 8 SUPERAV, a highly innovative vehicle developed to meet a requirement for a vehicle to support littoral operations. The vehicle’s design exploits the reliable, well proven Centauro/VBM drivetrain, and focuses

The expanding scope of capability requirements, driven by the military need to exploit each piece of equipment to the full, inevitably extends well beyond what might be thought of as the traditional skills sets possessed by manufacturers sets possessed by vehicle manufacturers. This has particularly been the case when developing logistic support vehicles to operate in the current operating environment. Whilst cost considerations have tended to drive procurement towards a MOTS driveline, operational requirement pressure has tended to drive ever more complex cabs, electronics and top hampers. In order to meet such pressures satisfactorily, vehicle manufacturers must either grow rapidly evolving technologies organically in-house, or, more practically, seek to source them elsewhere. VEHICLE DEVELOPMENTS Iveco Defence Vehicles identified this growing need to work outside the confines of automotive solutions at an early stage and has adopted a two track approach to meeting it. On the one hand, the

innovation on the configuration of the fighting compartment. In this activity, the company’s engineers have worked in close collaboration with IBD, developing a system which provides class leading protection without compromising the vehicle’s amphibiosity. Recognising the growing criticality of vehicle electrical systems, Iveco DV has focused closely on developing these skills in-house, allowing the development of a fully digitised on-board electronic system. This provides a simple standard Mil CAN interface ready for integration with national standard mission architecture, greatly facilitating the task of vehicle systems integration. In adopting this approach, Iveco Defence Vehicles has re-evaluated the role which the vehicle platform manufacturer can play in facilitating systems integration. By bringing the interface between the platform and the

required mission systems to a higher level of technical preparedness, using industry or military standard protocols, the company has ensured that SUPERAV’s economic production cost is matched by low cost, simple integration. SUPERAV has, in short, been designed as a component part of a whole vehicle system, rather than as a platform onto which mission systems can then be mounted. EPLS DEMONSTRATOR The second approach can be seen on a recent programme to develop an EPLS demonstrator based on Iveco’s heavy COTS Trakker chassis for use on a number of upcoming programmes. Here, Iveco has focused on using its vehicle systems domain knowledge to enter into partnerships with a wide variety of specialist organisations. Based on a UOR to develop a Protected Self Loading Dump Truck (SLDT(P) for use by the Royal Engineers, the demonstrator exploited many of the working relationships which were developed during the initial project, seeking to augment these with further partner companies as the opportunity and requirement arose. To date, the EPLS vehicle programme has involved no less than eight companies, from GD(UK), who provided the EMC, radio fit and power solutions developed for SLDT(P), to Marshall of Cambridge and Cargotec, providing the flatrack and load handling system, and Amsafe, who have provided a Tarian fit for the cab. By building a community of companies, each of them expert in their field, Iveco DV is able to develop innovative demonstrators, bringing together best of breed solutions to deliver a low risk, highly capable solution to the military customer. L FURTHER INFORMATION For further details, please e-mail andrew. bucknall@iveco.com or call 01923 259728

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

71


Essential

Essential intelligence calls for instant communications anywhere. Video imagery can be the key to tactical decision making. Vislink digital technology delivers the highest quality video via ground based, aerial and satellite technology in the harshest environments.

www.VISLINK.com


EVENT PREVIEW

ROUNDING-UP THE LATEST DEFENCE TECHNOLOGY

Defence Technology

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

State-of-the-art defence technology across land, sea and air will be demonstrated at International Defence Exhibition & Conference (IDEX), the only international defence and maritime security exhibition in the Middle East and North Africa (MENA) region, on 7-21 February 2013 International Defence Exhibition & Conference (IDEX) is the only international defence and maritime security exhibition in the Middle East and North Africa (MENA) region. It demonstrates the latest technology across land, sea and air sectors of defence and is a unique platform to establish and strengthen relationships with government departments, businesses and armed forces. In 2011, the event attracted 1,060 exhibiting companies from 52 countries and over 60,000 attendees. First held in 1993, IDEX takes place biennially under the patronage of HH Sheikh Khalifa Bin Zayed Al Nahyan, President of the UAE, and is organised by ADNEC (Abu Dhabi National Exhibitions Company) in association with the UAE Armed Forces GHQ. IDEX 2013, will take place at the Abu Dhabi National Exhibition Centre, Abu Dhabi, United Arab Emirates from the 17-21 February. The exhibition hall features local and international exhibitors who specialise in naval, maritime and coastal security technology, equipment and craft.

Abu Dhabi Autonomous Systems

Investments (ADASI), is the IDEX principal sponsor for the e u q i n u area, and the Association a is the n i for Unmanned Vehicle n o i t exhibi ion, and is a Systems International eg (AUVSI) – the world’s MENA rm to establish largest non-profit platfor th government organisation devoted exclusively to advancing links wipartments the unmanned systems e d and robotics community ed and arms – will help support the technology workshop. force

UNMANNED SYSTEMS ZONE New for 2013, IDEX will be hosting a focused Unmanned Systems Area. Dedicated to the technology and equipment of unmanned vehicle systems, the area will feature a one‑day technology workshop, a purpose‑built exhibition hall and a static and live demonstration area.

“We work to ensure every edition of IDEX keeps pace with the forefront of industry innovation and market requirements,” said Saleh Al Marzooqi, IDEX director. “Unmanned systems represent the very leading-edge of defence technology, reinforcing strong security infrastructures and keeping troops out of harm’s way. The Unmanned Systems Area fits naturally with IDEX’s history of innovation and market leadership.” “The autonomous and special mission systems in the market today demonstrate how innovative systems design and technological integration can help further enhance national security, and help nations conduct high level surveillance, security and exploration missions, including search and rescue,” said Ali Al Yafei, CEO of ADASI. “We are pleased to offer our support for the Unmanned Systems Area at IDEX which we feel represents a key burgeoning area of the defence industry.” LIVE DEMONSTRATIONS A programme of live demonstrations will take place daily at the dedicated dock edge demonstration area. The area will have live commentary and video feed of all of the action taking place. This programme will include

choreographed and organised demonstrations of land and airborne unmanned systems, helicopters, on-water crafts and vessels. The waterfront location of NAVDEX enables exhibitors to berth crafts and vessels within walking distance of the NAVDEX exhibition area. These on-water exhibits, moored to temporary marina pontoons, will be easily accessible for visitors to view from the walkway and for guests to be invited on‑board. Tawazun Holding, the UAE’s strategic investment firm building skills, expertise, products and systems for the industrial manufacturing sector, will be returning as headline sponsor for 2013. The company views the sponsorship as a strategic imperative given IDEX’s role as the Middle East’s largest tri‑service defence exhibition. “We are very pleased to have the continued support of Tawazun, which has been a strong backer of IDEX almost since their inception,” said IDEX director, Saleh Almarzooqi. “The on-going support of leading organisations domestically and internationally is critical to the success of IDEX.” Established in 2007 under the umbrella of the Tawazun Economic Council, Tawazun is selectively building strategic manufacturing and engineering businesses helping contribute to the fast-growing industrial backbone of the UAE. Its investments focus is on the development and expansion of emerging industries that add value to the UAE economy and its diversification plans. At its core, Tawazun works to build industries backed by UAE talent and driven through local ingenuity. L FURTHER INFORMATION www.idexuae.ae

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

73


MILITARY BUILDINGS


DEFENCE BUILDINGS

PROTECTION IN CHALLENGING ENVIRONMENTS

Rubb will be promoting its Expeditionary Forces Aircraft Shelter System, which features hangars, sunshades and warehouses, at IDEX, the International Defence Exhibition and Conference Rubb Buildings is an innovating world leader when it comes to the design, manufacture and delivery of relocatable helicopter, fixed wing aircraft and military storage ‘super hangar’ systems. Rubb will be promoting its Expeditionary Forces Aircraft Shelter System (EFASS) at Stand C6-002, at IDEX at ADNEC, Abu Dhabi, UAE, from 17-21 February 2013. PUSHING BOUNDARIES The EFASS shelter system, which features hangars, sunshades and warehouses, is uniquely suitable for the military services, designed to be rapidly deployed and quickly erected anywhere in the world. General manager Ian Hindmoor said: “This will be our second time exhibiting the EFASS range at IDEX. This range of military buildings really pushes the boundaries and is in a league of its own when it comes to the rapid deployment of robust and reliable shelters, hangars, warehouses and sunshades. It provides protection to personnel and vital equipment in the most challenging of environments. It also offers some unique qualities including new state-ofthe-art door options and crane technology.” Each hangar can be rapidly constructed using a number of steel fabricated components together with uniquely designed aluminum roof and leg sections, that bolt together to form the span trusses. When assembled, tough PVC coated polyester fabric sheets slide between the aluminium extrusions of adjacent spans, to form

the shelter. Rubb Buildings will be showcasing all the latest innovations the EFASS range has to offer including new door configurations and combinations used in recent military operations. Ian added: “We have been busy working on an exciting aircraft hangar project for Horizon International Flight Academy in Al Ain, UAE. Rubb provided three 24m x 36m steel and aluminium hybrid EFASS structures to Horizon and we are looking forward to showcasing this project and meeting new clients. IDEX is the ideal platform to do this and is part of our ongoing strategy to meet military requirements nationally and internationally.” Structures are available in three spans: 11.1m (36ft), 20.4m (67ft), 25m (82ft), by any length, with multiple door options. They pack into 20ft ISO containers ready for transport by sea or air. With unmatched engineered fabric structures currently in action across the globe, Rubb has the ideal solution to military and defence application requirements. Rubb has been meeting the needs of the UK Ministry of Defence for more than 30 years and has the expertise and facilities to custom make an extensive range of military hangars, buildings, shelters and sunshades to individual specifications. Rubb has also supplied military buildings to USA, UAE and Canadian forces. Rubb Military products are designed and manufactured in Gateshead, Tyne and Wear, UK. The company offers state-of-the-art door options including Heli-Door, Trident and Roller

Shutter options. The innovative roof mounted crane provides optimal operational capability. Rubb uses superior aluminium structural frame: 6082 T6 aluminium is annodised black and steel components are hot dip galvanised to protect from corrosion. Structures are supplied with integral foundation arrangements to securely anchor structures to the ground. They are covered with high strength, heavy weight, coated, military standard fire retardant fabrics from proven suppliers. The flexible membrane and aluminium design allows installation on uneven or sloping sites. They offer clear span space to accommodate a wide variety of rotary and fixed wing aircraft and land vehicles. Structures can be insulated, heated or air conditioned to provide a perfect operating environment whatever the climate. What’s more, Rubb offers client support from technicians from quotation to installation and beyond.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HELI-DOOR This revolutionary door has been specifically designed and manufactured for the EFASS range by Rubb Buildings Ltd, providing a robust, reliable and easy to use system. The main door horizontal members are standard EFASS building roof elements, which comply with the strict standardisation of parts code. The door is electrically operated via two slow moving helical geared motors, with emergency hand operation capability. This system does not require a base foundation or ramps and there are no locking bolts. The door goes up and down at the touch of a button. Locking and safety devices operate automatically. TRIDENT DOOR The Trident Door is specific to the 20.4m span EFASS. This full end-opening door speeds up aircraft deployment. The door is constructed using the same high quality aluminium framework as the main structure. Three framed PVC panels are hinged at the base of the hangar and the door operates via a button controlled motorised folding mechanism. L FURTHER INFORMATION www.rubbmilitary.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

75


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PRINTING

CAN A NEW APPROACH TO PRINTING ENHANCE DOCUMENT SECURITY?

Graham Lowes of OKI Systems investigates how both industry and government can improve security with the introduction of managed print services, as well as drive efficiency and cut costs Recently, across both industry and government there has been a rise in the number of spending cuts. Only a week ago, it was announced that the Metropolitan Police has been forced to sell New Scotland Yard as it makes cuts of more than £500 million. While, earlier this year the Ministry of Defence announced it has to lay off 54,000 staff by 2015, in an effort to reduce expenditure by £4.1bn. In addition, it is a well-known fact that the public sector is under increasing pressure to deliver more for less. As a result, there is now, more than ever, a need to cut costs, while still ensuring all operations are run efficiently and securely. To achieve this, the various organisations within this wide sector need to consider adopting best practice processes across all operations, whether this means streamlining administrative procedures or improving IT service management, there are a range of approaches which can be taken. SAVINGS IN A SURPRISING AREA However, when it comes to cost savings, one area that often gets overlooked, is print. For many, print may not seem the first port of call, but improving print efficiency and management can dramatically reduce spend and increase security for all organisations. In fact, most departments do not have a clear view of print spend or how to streamline the process to make it more cost effective. Given the sensitivity of data handled across both government and industry, it is critical that print is managed correctly and that an even more vigilant approach to securing intellectual property is taken. Organisations need to be in control of print every step of the way. However, the challenge is that when sensitive data reaches print, many departments are not using the most appropriate print devices for the job. WORKING WITH AN EXPERT Working as a global business-to-business brand, dedicated to creating, affordable, professional in-house printing solutions, OKI has recognised the need to ensure printing is both cost effective and as secure as possible. OKI strives to push the boundaries of technology to ensure all customers receive a tailored service for their printing needs. With a

76

COUNTER TERROR BUSINESS MAGAZINE | Issue 12

team of 25,000 experts across 120 countries, OKI has developed and launched a wide range of incredibly fast and high performance machines, which help organisations protect bottom line, increase productivity and make data more secure. All these benefits can be easily achieved through the introduction of OKI’s managed print services, an approach, which consists of a portfolio of programmes that together help to reduce print-related costs and enhance security. CHANGING THE WAY WE PRINT To reduce costs and print effectively, often, all it takes is a change in approach. Typically, managed print services is associated with mainstream businesses as it unifies and manages all print processes, while ensuring printing operations are more closely matched to a company’s workflow to help meet specific business goals. However, working with a professional print vendor such as OKI, there is no reason why the benefits of reduced costs through improved print efficiency and management, cannot be transferred during this time of austerity. The first step of managed print services is for the print vendor to assess the current print landscape to find out how print is currently being used, identify areas where cost savings can be made and workflow efficiencies improved. OKI analyse the print landscape to establish each organisations specific printing needs. Using the results, a long-term print strategy is then established, one which ensures print devices are used in the most resourceful manner and printing practices can be controlled and managed more closely. WORK SMART Reducing print costs is just as much about deploying the right printer as it is about changing working habits – all issues which OKI can highlight after an initial managed print services audit. For example, simply by setting the devices up to print in mono as standard, reduces unnecessary colour printing. In addition, changing settings to automatically print double-sided can cut paper wastage by up to 50 per cent. While the correct use of the most advanced printing devices can streamline processes, they

also enable organisations to become greener, which in turn, further helps to reduce costs. In fact, often a substantial amount on energy and budget is wasted powering outdated equipment, particularly when it is not in use. To address this problem OKI introduced ‘Deep Sleep’ mode – a setting that reduces power consumption to the bare E


 minimum (often less than one watt) yet, the machine is still able to ‘wake up’ instantly when a new job is needed. Today this function is standard on all new ranges. Moving forward, OKI is now building ‘Auto‑Power Off’ technology into many devices, saving hundreds of watts of power and reducing CO2 emissions to the minimum. The setting automatically powers down the printer after extended periods of non‑usage, which can be determined by the user and, this in turn, delivers big savings in power usage over the product’s life. In fact, OKI’s new C800 series includes added green benefits. Not only does it have Deep Sleep and Auto-Power Off settings, but it also features a new engine design with advanced cooling technology and it can print its first page out in nine seconds. TAKING SECURITY TO THE NEXT LEVEL Another key benefit of OKI’s managed print services offering is its emphasis on print security. After the initial managed

print services audit has been completed and organisations are aware of what they are printing, it becomes possible to investigate the opportunity for automated document management workflows to ensure essential files are stored exactly where they are supposed to be. One of the biggest security concerns for many organisations is the protection of intellectual property. On a daily basis employees print, fax, copy, scan and send sensitive information and there are often a whole host of security firewalls and barriers, which data has to pass through before it reaches print. However, the challenge is when the data reaches print organisations do not have the most appropriate print devices for the job. When deploying a more efficient and secure in-house printing solution, choosing the right printer is vital. With a vast portfolio of pioneering products, the OKI team has the resource and knowledge to offer customers the expert guidance and

support they need to improve existing print operations, while enhancing security. When implementing new print devices as part of OKI’s managed print services programme, each printer is selected because of its ability to fulfill the needs of the client, including the need for intellectual property protection. OKI only offers the most advanced and innovative devices to ensure that those working across both industry and government can operate efficiently and securely. The entire OKI range now has built-in encryption printing and secure printing capabilities. For example, Secure Print enables the user to store documents to print on the printer’s Hard Disk Drive. Only when a four digit, user-defined password is entered on the printer’s front panel, can the document be printed – the document is not retained after it is accessed. Another, security feature that can be used is secure release, which is an optional interface that allows users to connect a Secure Print release card solution. This makes it possible to manage printing through the use of smart cards, which are swiped by a user to release the print job. Plus, OKI can advise and manage the use of user authentication solutions to ensure sensitive hard copies remain protected. OKI Network Intellectual Property Security Support also enables access to a printer (for changing configurations and for printing) to be limited to specific PCs or range of PCs. This limits the number of people who can print to a specific device. In addition, all products support the disablement of unused protocols and network ports, which prevents unauthorised access to printer and print servers and in turn, reduces the likelihood of external hacking attacks. Adopting different working habits can also help improve security. By ensuring that printed documents are disposed of in the most appropriate manner and making sure that a print device is not located in an area where it is possible for members of the public to see confidential information, organisations instantly create a more secure working environment.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A CHANGE IN APPROACH Given the increasing spending cuts across both industry and government, organisations should be very seriously considering the implementation of managed print services to reduce costs. Working with an expert print vendor such as OKI, organisations can be confident that print services will be managed in the most efficient and secure manner. Managed print services, is more than the introduction of new printers. It is a tailor-made, long-term print strategy and approach that really can drive efficiency, cut costs and improve security, during this time of austerity. L FOR MORE INFORMATION www.oki.co.uk

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

77


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IP VIDEO SURVEILLANCE

A SMOOTH USER EXPERIENCE

IndigoVision’s integrated end-to-end IP Video solution has been used for a 3700 plus camera surveillance system in the new Terminal 3 at Delhi International Airport. The project is believed to be the largest single installation of an IP Video system anywhere in Asia The new terminal was built as part of the massive infrastructure development for Delhi ahead of the highly successful 2010 Commonwealth Games. Delhi is India’s second largest airport and with the recent expansion can handle 34 million passengers per year. Airport’s create one of the most demanding security environments, with multiple operators from different agencies and departments requiring access to live and recorded video 24/7, from different locations in and around the terminal building. This requires the surveillance system to be flexible, reliable, easy to use, and low maintenance in order to avoid any delays or problems in the operation of the airport. IndigoVision’s distributed server-less IP Video architecture provides the airport with such a solution, being scalable, resilient and through a virtual matrix easy to operate, even for a project of this scale. Commenting on the success of the project, an operations manager at DIAL’s state of the art AOCC control room said, “The Control Room and all 3700 plus cameras run extremely well and without any problems. The video quality is excellent and the software

78

COUNTER TERROR BUSINESS MAGAZINE | Issue 12

is easy to use by our operators. Due to the high number of cameras and amount of activity in the airport, it was important to have a system that provides a smooth user experience and no downtime – IndigoVision has exceeded all of our expectations.” CONTROL CENTER WORKSTATIONS IndigoVision’s ‘Control Center’ Security Management Software is at the heart of the system and is used by operators throughout the airport. IndigoVision’s distributed architecture allows ‘Control Center’ workstations to be used at any point on the network. The software provides advanced Identification Authentication Management (IAM) features, which ensure only the operators with the correct permissions are allowed to access the video. This allows the various cameras to be partitioned into groups for various departments and agencies. For added security, 120 cameras for the Immigration department have been allocated to a separate site database, with recording on their own dedicated Network Video Recorders (NVRs).

A total of 80 ‘Control Center’ workstations have been installed in three separate control rooms; the Airport Operation Control Centre (AOCC), situated in the terminal; the Airport Security Building (ASB), located off-site 250m away; and in the Air Traffic Control (ATC) centre, where aircraft ground movements are monitored. The AOCC, which is the main monitoring centre for the airport, boasts the biggest video wall in Asia. The 10 X 5 metre wall holds twenty-eight 70” screens that display the information inputs from all the airport departments through live camera feeds. Each screen can display up to 25 multiple camera images, providing the AOCC with the capacity to display 700 images at one time. Monitoring so many cameras in such a complex building is a major task for any security team. DIAL has extensively deployed IndigoVision’s real time analytics, which run at the network-edge in IndigoVision IP cameras and encoders, to help operators improve efficiency and incident response. Analytics are configured to create alarms when certain conditions in a camera scene are met, automatically alerting operators to potential problems. Examples of the analytics deployed include Virtual Tripwire for alerting entry into secure areas and Abandoned Object, used to identify luggage stuck on a conveyor belt in the baggage handling system. Operator efficiency is further enhanced by the use of IndigoVision’s integration modules to interface to the CEM access control system (over 3000 card readers) and the series of travelators and escalators from ThyssenKripp (using an OPC interface). Again the operators are automatically alerted if for example, a forced entry alarm is triggered by a door or an emergency stop button is pushed on an escalator. VIDEO QUALITY Another area that is vitally important for the airport is the quality and reliability of recorded video; operators and law enforcement agencies need to rely on highquality evidential video to aid investigations and cannot afford to lose video through missing frames or unreliable equipment. IndigoVision is unique in the ability to deliver very high-quality full-framerate video with a guarantee to never drop a frame under any circumstances. This coupled with its fault-tolerant recording solution provides DIAL with the archive security they require. The airport uses a total of 57 IndigoVision 10TB Windows NVRs for recording video continuously for 30 days from all of the cameras. Ten of the NVRs are used as backups, automatically recording video from any of the primary NVRs that go off line. L FURTHER INFORMATION Tel: +44 131 475 7200 enquiries@indigovision.com www.indigovision.com


IP VIDEO SURVEILLANCE

SECURING THE GHERKIN

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

IndigoVision’s integrated IP Video surveillance system has been deployed as part of a major security upgrade at one of London’s most iconic skyscrapers 30 St Mary Axe, widely known as ‘The Gherkin’ is situated on the former site of The Baltic Exchange and at 180m tall, is the third tallest building in the City of London. ‘The Gherkin’ is a multi-tenanted commercial office block occupied by a number of the world’s best known insurance and legal businesses. The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems. Using this advanced capability, Universal Security Systems Ltd, IndigoVision’s Authorised Partner, implemented a fully integrated surveillance, access control and intercom solution. The new surveillance system replaced old analogue CCTV matrix and DVR equipment with a fully digital network solution using an IP-based distributed virtual matrix. This allows any component in the system to be located at any point on the IP network, delivering a scalable and flexible solution that was a key factor in IndigoVision being chosen for the project. All of the original analogue fixed and PTZ cameras were reused and the migration was achieved without any disruption to building operations, an important consideration for a building of this type with diverse activity occurring 24/7. HIGH QUALITY AUDIO AND VIDEO IndigoVision’s ability to stream high-quality, fully synchronised audio across the network alongside the video, allowed Universal Security Systems to develop an innovative video intercom system, recording audio from existing intercom equipment with the appropriate video from nearby cameras. The security of the video archive, through the use of a resilient and redundant recording solution, was another important factor for the building owners choosing IndigoVision. Video is recorded on 6 standalone IndigoVision Network Video Recorders (NVRs), with a seventh used as a failover backup. Should any NVR fail or be taken off-line for maintenance, the backup automatically starts recording in its place. The standalone NVRs have a Linux-based software engine and a fault tolerant design with dual redundant network and power supply connections. Two ‘Control Center’ workstations are used in the Security Office to monitor live video and analyse recorded footage from all of the cameras. ‘Control Center’ provides advanced analysis tools such as motion thumbnails for fast incident review. Guard tours, sequences and Privacy Zones are all supported, with

The distributed and open architecture of IndigoVision’s IP Video system provides the ideal installation platform for the migration of legacy CCTV and the seamless integration with other security systems. video being displayed on PC viewing panes or traditional monitors. Operators can view an interactive map of the entire site to quickly locate cameras and alarms. L

FURTHER INFORMATION Tel: +44 131 475 7200 press@indigovision.com www.indigovision.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

79



THERMAL IMAGING

KEEP CRIMINALS IN THE DARK

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Find out how the range of Argus handheld thermal-imaging cameras can help law enforcers prevent crime, protect officers, catch criminals, save money and increase efficiency Leading the market in highly advanced thermal imaging cameras, Argus cameras surpasses its competitors in technology, providing a range of settings and viewing options with increased accuracy for use in many policing applications. Argus thermal imaging has launched a range of cameras designed with the guidance of a number of specialist police and security departments. The range will include a thermal torch for first responders called the Argus TT Type, a monocular camera called the Argus P Type for covert surveillance and a specialist search camera called the Argus F Type. STAYING AHEAD OF THE CRIMINAL The TT may resemble a normal torch but benefits the user in countless ways a torch never can, providing patrol officers with the ultimate advantage over criminals. Not only does it detect the heat signatures of people and objects in daylight hours, it also provides an abundance of additional advantages in the dark of night. Officers

up fast. It is capable of withstanding harsh environments and provides the most superior features available on the market. Designed using sophisticated digital technology, the P Type offers users advanced thermal image quality, providing video recording and image capture to support the gathering of evidence. The P type has interchangeable lenses so will be fantastic tool for covert surveillance operations; officer safety; fugitive/suspect search; collecting evidence; border surveillance; and marine patrol. The Argus F Type offers a simple-to-operate configuration; it is a robust, self-contained camera with fully automatic operation. The camera is lightweight at less than 3lb and specifically created to help police and security personnel to detect heat signatures in specialist search operations. The F type uses a high-resolution 320 x 240 pixel Amorphous Silicon (ASi) microbolometer detector. It has been designed using advanced digital imaging technology providing it

Officers can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. When the Argus TT is used in total darkness, officers can go virtually undetected. can quickly and effectively search between homes and buildings, see into dark garages, entranceways and under vehicles. They can scan car parks, where they can see suspects hiding between cars, and can identify vehicles that were recently driven. When used in total darkness, officers can go virtually undetected, as they search for prowlers, and other criminal behaviour. Officers will be able to use this new technology for a range of patrol applications including: fugitive/suspect search; officer safety; search and rescue; detecting evidence; routine patrols; training and assessing; routine raids; occupancy evaluation; and collision investigation. WITHSTANDING HARSH ENVIRONMENTS The Argus P type is a handheld, robust, simple-to operate, lightweight monocular thermal imaging camera which can power

with the sharpest picture available and superior performance. The F Type comes with the most advanced features available in any thermal imaging camera on the market and is a superb tool for applications like drug interdiction operations; detection of hidden compartments; and finding embedded electronic equipment. The benefits to law enforcement agencies is clear; suspects can be caught quicker using less man power and most importantly thermal imaging keeps the good guys safe and one step ahead of the criminal. The cameras are not as expensive as you might think, Argus cameras have been designed to keep purchasing cost down, creating affordable effective tools for the fight against crime. L FURTHER INFORMATION www.argusdirect.com

Issue 12 | COUNTER TERROR BUSINESS MAGAZINE

81


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

We’re here to help around the clock... ● ●

LPCB Steel Doors LPCB Timber Doors Mechanical Locking Solutions Electromechanical Locking Solutions ● Intelligent Intruder Detection Systems ● Maintenance Services ● Locksmith Services ● ●

Phone:

01522 532038

79-83 High Street

Fax:

01522 536060

Lincoln

Email: info@lincolnsecurity.co.uk Lincolnshire Website: www.lincolnsecurity.co.uk

LN5 8AA

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service ACAL BFI APM Group

GPS Perimeter Systems

22

PK Hydraulics

34

20

Heald 4

Rapiscan 52

Arinc OBC

Highwaycare 27

Reflex 15

Bapco 26

Holmatro 60

RMS 66

Briton EMS

65

Identity Assurance

Rubb Buildings

Central Scanning

65

Indigo Vision

78, 79

SDW 2013

19

Cobham Antenna Systems

67

Infranor 58

SP Services

36

Counter Terror Expo

14

International Armoured Vehicles

62, 69

Stemmer Imaging

54

Devon & Somerset Fire and Rescue

50

Iveco

70, 71

Stoof International

68

Digital Defence

38

Ledco 30

Terrafix 48

Draeger Safety

IBC

Lincoln 82

The Mercian Labels Group

IFC

80, 81

MIR3 46

TotalPost Services

18

Morgan Marine

Trizo 24

E2V Fibre Technologies Flir Commercial Systems

82

28, 30

6 8, 44, 45

OKI Printing Solutions

10

32 76, 77

Vision Base

74, 75

40

Frontier Pitts

24

Pentagon 16

Vislink 72

G6 Global

42

Pentax Ricoh

Webroot 12

COUNTER TERROR BUSINESS MAGAZINE | Issue 12

64




Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.