Page 1 | ISSUE 36





DESIGNING OUT TERRORISM Fostering best practice to create terror resilience in crowded places, as part of International Security Expo


TERRORISM & TRANSPORT Providing an update of the British Transport Police’s work across the UK’s transport hubs


The FLIR Griffin G510 GC-MS enables responders to confidently identify unknown chemical threats. It is the ultimate chemical detection toolbox, with guided controls and simple threat alarms. Completely self-contained and mission-ready, the G510 is built for everyone and everywhere. Learn more at

FLIR Griffin G510






KEEPING PACE WITH A SPIRALLING PROBLEM As we go to print with our November issue of Counter Terror Business, our last of 2018, news of Philip Hammond’s budget boost for counter terrorism policing has caught extra attention. The spending pledge, which the Chancellor announced as £160 million, is roughly the equivalent of 1,000 extra officers and would be used to help forces keep pace with the spiralling problem of rising live investigations. However, as the Guardian has reported, a leaked letter from a security official to the chair of the counter-terrorism policing strategic board claims the year-on-year extra funding only amounts to £59 million.


DESIGNING OUT TERRORISM Fostering best practice to create terror resilience in crowded places, as part of International Security Expo


TERRORISM & TRANSPORT Providing an update of the British Transport Police’s work across the UK’s transport hubs

This isn’t the first time the government has, accidentally or deliberately, misled the public on police funding. But with budgets having been continuously cut for the last eight years, some clarification would be welcome. This issue prints a few weeks before the annual International Security Expo. As media partner to the event, we are pleased to provide a number of interviews with some of the expo’s key speakers, starting on page 15.

Follow and interact with us on Twitter: @CTBNews

Lastly, from 2019, CTB will be a digital-only product. With our content continuing to strive to remain market leading, covering the latest news, thought pieces and events from across the counter terrorism industry, I would encourage you to subscribe to the new digital magazine via the weblink below: Michael Lyons, editor

ONLINE // IN PRINT // MOBILE // FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, fax: 020 8532 0066. PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: EDITOR Michael Lyons PRODUCTION EDITOR Dan Kanolik PRODUCTION DESIGN Sophia Mew PRODUCTION CONTROL Lucy Maynard WEB PRODUCTION Victoria Casey ADMINISTRATION Isabelle Hayes BUSINESS DEVELOPMENT MANAGER Martin Freedman PUBLICATIONS SUPERVISOR Jake Deadman REPRODUCTION & PRINT Argent Media

Counter Terror Business would like to thank the following organisations for their support:

The Professional Publishers Association Member

© 2018 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533




CONTENTS CTB 36 15 INTERNATIONAL SECURITY EXPO The International Security Expo provides a unique platform for the entire security industry to come together to source products and share experience. Here, we interview a number of leading speakers from the upcoming show

35 DISASTER RESPONSE Ahead of the first International Disaster Response Expo, co-located with the International Security Expo, Philip Ingram shares some thoughts on the show’s origins, discussion points and its role in improving the disaster response arena

38 TRANSPORT SECURITY With the British Transport Police having opened its first regional counter terrorism hub in Birmingham in May this year, the force provide an update on its work across the UK’s transport network and its role in Project Servator

43 PERIMETER SECURITY With Christmas markets just around the corner, visitor safety is at the forefront of organisers’ minds. Iain Moran discusses the alternative security measures that organisers can implement this year to avoid creating a ‘fortress mentality’

48 PANEL OF EXPERTS Current UK systems for immigration were built nearly a half-century ago, limiting the progression of technology and hindering necessary information-sharing. Given Brexit-related soft borders, is it now time for new lines to be drawn?

50 PANEL OF EXPERTS The critical communications sector needs to provide new solutions that can also be integrated into existing technologies as well. But, to what extent are blended communications the future of resilience in communications?

55 SECURITY & CT EXPO Security & Counter Terror Expo, taking place next March, is a world-class showcase of the capabilities, strategies and intelligence that keeps nations, infrastructure, business and people safe

59 COUNTERING DRONES With the Countering Drones conference taking place this December, Perran Bonner looks at the current regulation of the UAV industry and whether the speed of technology advances is helping or hindering security services

65 CYBER SECURITY Lisa Ventura, founder and CEO of the UK Cyber Security Association, looks at how cyber attacks impact businesses and SMEs, how sophisticated they are and what can be done to prevent them

Counter Terror Business magazine // ISSUE 36 | COUNTER TERROR BUSINESS MAGAZINE



MI5 to lead fight against extreme rightwing terrorism It has been reported that MI5 will take the lead in combating extreme rightwing terrorism amid increasing fears over violent racial conflict on Britain’s streets. The Guardian claims that the move to swap responsibility from the police to the security service, meaning far right extremism is treated under the same bracket as Islamist terrorism and Northern Ireland-related terrorism, follows months of negotiations. Since March last year, four extreme rightwing alleged plots have been thwarted in the UK, while there are

approximately 100 investigations into the extreme rightwing currently live. As the threat is assessed as growing, the claims follow the recent incident in the US where a man has been charged with sending 13 pipe bombs to opponents of President Donald Trump, including Barack Obama and Hillary Clinton. The decision, which will see extreme rightwing activity now designated as posing a major threat to national security, means MI5 will now formally take responsibility for identifying suspects and assessing what danger they pose, conducting

network analysis and ranking threats. It is hoped that the security service’s approach, techniques and greater powers will enable a better understanding of the violent intentions of the extreme right than the police can provide. The far-right terror threat gained attention after the assassination of the Labour MP Jo Cox in June 2016.




£160 million on counter terror funding next year

Terrorism investigations must consider communities

As part of his Budget announcement, Chancellor Philip Hammond announced that the government will spend an extra £160 million on counter terror policing next year. It was recently revealed that Scotland Yard and the security services are running a record high of more than 700 live investigations into suspected terrorists. The new funding seeks to ensure that authorities can keep pace with the spiralling problem. The spending pledge is set to be the equivalent of 1,000 extra officers. Hammond said: “Nobody should be in any doubt, on this side of the House we are proud of our Armed Forces and we will always back them with the investment to keep them safe.” Additionally, the Chancellor said

that £1 billion to be given to the Ministry of Defence to cover the remainder of this year and next to boost ‘cyber capabilities’ and improve ‘anti-submarine warfare capacity’.



£160m for counter terrorism policing contradiction A leaked security letter has suggested that the Chancellor exaggerated funding for counter terrorism policing in the Budget, with the £160 million announcement questioned. Chancellor Philip Hammond said that an additional £160 million would be used to ‘protect CT police numbers and to allow future CT police funding to be considered in the round at the spending review’. However, a leaked letter from a security official to the chair of the counter-terrorism policing strategic board, seen by the Guardian, said next year’s year-on-year extra funding only amounted to £59 million. Labour’s policing spokesperson, Louise Haigh, said: “The government have been caught being misleading time and time again on police funding.

They’ve slashed budgets for eight years at the expense of public safety and now they’ve been caught red-handed once again massively exaggerating the amount that is actually going into counter-terrorism policing this year. The public and the police deserve better.”


Max Hill QC, the outgoing independent reviewer of terrorism legislation, has said that police chiefs need to take into account the impact of large‑scale operations on communities. Assessing the impact the investigation into the Manchester arena bombing had on the city’s Muslims, the watchdog’s annual report claimed that the ‘dynamic and urgent investigation’ into the attack, known as Operation Manteline, deserved to be commended. In total, Greater Manchester police arrested 23 people in the aftermath of the attack. However, a 35-yearold woman was wrongfully arrested in the days after the attack and has since been compensated. The woman, known as Subject G, has been dubbed as ‘collateral damage’ as she was a resident at a Manchester address next door to a location that was significant to the investigation. Hill’s report said: “The police should consider and reflect upon the community impact of a large-scale investigation, centring as it did on particular areas of Manchester with a large Muslim population. Good community policing, as well as good counter terrorism policing, demands that real efforts are made to work within and with local communities, where many blameless residents will have been inconvenienced if not traumatised by the regular appearance of police search and arrest teams on their street or in their home. My observations … should be linked to a review of Manteline so far as it involved collateral damage so as to necessitate the payment of compensation to one arrested person, namely Subject G.”




0345 646 4666

Leading providers of IT Asset Disposition


Wth the arrival of the GDPR it’s more important than ever to consider a vital aspect of your compliance to the regulation, that of your IT asset disposition (ITAD) policy.


At Restore Technology we have a wealth of experience in IT asset disposition and can provide the highest level of service - allowing you to ensure you are following all regulatory and environmental obligations.

Highly certified


Audit trails provided


Environmentally friendly


We are compliant with all industry standards and government regulations, such as the WEEE directive and the industry standards ISO 9001, 14001 and 27001.

We provide you with full audit trails, enabling you to identify where your hardware is at all times and where it is going, i.e. whether it is to be resold, reused or recycled.

At Restore Technology we don’t take any shortcuts. We operate a strict zero waste to landfill policy - recycling is only used as a last resort, utilising specialist recyclers in the UK.

We are also one of only six UK companies that have achieved an ADISA Pass with Distinction with Honours (currently held by our company The ITAD Works).

We collect your outgoing IT assets with GPS-tracked vehicles and store them in secure facilities which use NCSC-approved destruction methods.

Our advanced management system allows you to track your sustainability progress, including facts and figures about your environmental contributions.


Counter terror bill ‘threat to press freedom’

A number of organisations have warned that powers intended to tackle the ‘vaguely defined’ crime of hostile state activity threatens the protection of journalistic sources. In a joint statement, nine organisations have urged the House of Lords to recommend significant amendments to the new Counter Terrorism and Border Security Bill as it reaches the closing stages of its passage through Parliament. The bill, first tabled in the Summer, proposes broad powers for border guards to stop and search individuals without suspicion on the grounds of tackling ‘hostile state’ activity, and would criminalise travel to terrorist hotspots and the viewing of terrorist-linked material online.

This means that a journalist taking a domestic flight could be stopped without any suspicion of wrongdoing and it would have to hand over materials, with no protection for confidential sources. The organisations, including Index on Censorship and Reporters Without Borders, follow the criticism from the cross-party Joint Committee on Human Rights which argued that the legislation could restrict free speech and curb access to information. Joy Hyvarinen, the head of advocacy at Index on Censorship, said: “The counter-terrorism and border security bill would change the law on freedom of expression in Britain, restrict press freedom, damage academic research and



Anjem Choudary has been released from prison

US military figure urges UK to take back IS ‘foreign fighters’

Radical preacher Anjem Choudary has now served half of his sentence and will complete the rest under strict supervision having been released from prison on 19 October. Choudary was sentenced in 2016 to five-and-a-half years in prison having been found guilty of leading an extremist network linked to violent jihadists, including one of the killers of soldier Lee Rigby in 2013. Reports have claimed that police are preparing up to 25 measures to control him following his release from Belmarsh prison. The measures include a ban from preaching at or attending certain mosques, supervised internet access and he will only be allowed to associate with people who have been approved by the authorities.


Major General Patrick Roberson has called on the UK to take back Islamic State fighters who have been ‘caught on the battlefield’ in Syria. The senior commander of US special ops discussed the case of El Shafee Elsheikh and Alexanda Kotey, two Londoners known as the IS Beatles, and said that the Syrian Democratic Forces (SDF) and the US were ‘working very hard to make sure that the countries of origin get these foreign terrorist fighters back into their custody’. Elsheikh and Kotey, who were captured in January, have reportedly been stripped off their British citizenship with the government negotiating for them to

endanger fundamental rights. The bill is fatally flawed and we urge the House of Lords to ensure that the government rethinks the bill.”


face trial in the US. The two men have since disputed the citizenship claim. Roberson is the first senior US military officer to publicly call on the UK to take back its nationals and former nationals. At present, the men could face the death penalty if found guilty of alleged involvement in the killing of a number of hostages. However, the comments of General Roberson suggest the US would prefer them to stand trial in the UK.



Committee proposes amendments to Counter Terrorism bill The Joint Committee on Human Rights has submitted significant amendments to justify the extensive powers being proposed in the Counter Terrorism and Border Security Bill. The report raises concerns that the Bill is legislating close to the line – or indeed crosses the line – in breaching human rights and will now be considered and debated in the House of Lords as it continues to progress through Parliament in coming weeks. The Committee proposes a total of 27 amendments for parliament to consider, including the deletion or amendment of clauses that would make it an offence to express an opinion or belief in support of a banned organisation, view or otherwise access terrorist material online, and enter overseas terror hotspots

referred to as ‘designated areas’. Alongside the amendments, the Labour Party has sought explanation as to why the government has yet to appoint a new independent reviewer of terrorism legislation to oversee the use of the powers if and when they pass into law.




Company Focus

Korean company looks set to revolutionise airport runway safety

Nick Koiza, Head of Security Business at Plextek

Wave Tech’s foreign object detection radar, developed with UK-based consultancy, Plextek, has the potential to prevent aircraft accidents and save millions of pounds worth in damages. LEARNING FROM THE PAST Wave Tech, a Korean-based RF signal technology company, is implementing a radar that could dramatically reduce the amount of Foreign Object Debris on runways. Foreign Object Debris (FOD) on runways and taxiways costs airlines and air forces millions each year in damage caused to aircraft.

currently not clearly detected by existing radar technologies in the marketplace.

FOREIGN OBJECT DETECTION Wave Tech partnered with Plextek to successfully design and develop the world’s most advanced FOD detection solution for operation on airport runways.

The most notorious incident was the Paris Concorde accident in 2000, in which, 113 people were killed by FOD making its way into the engines during take off.

This state of the art system is currently installed at Incheon Airport in Korea and is able to detect very small objects (e.g. the size of a bolt) from ranges in excess of 400 metres.

Threats from FOD can consist of very small items where early detection is paramount and centimetre-sized objects are

This hugely successful deployment represents an example of how Plextek was able to utilise mm-Wave technology

Contact us for your free one hour of consultation.

email: tel: +44 (0)1799 53200 Ref: PLX-1HR-CT

for high accuracy in crucial small object detection. A Wave Tech spokesperson commented: “The radar technology was key for Wave Tech to execute this project successfully and Plextek have the know-how as well as a leading position in this field which makes them an excellent partner for us.”

COLLABORATION Plextek provides a range of highly innovative and specialised detection solutions for the security market. Plextek’s expertise in this area builds upon 30 years of successful radar sensor development. Throughout this time they have been at the forefront of advanced solution deployment for leading-edge security applications.


£5 million for community groups to fight extremism Minister for Countering-Extremism Baroness Williams has awarded £5.3 million for projects countering extremist views to help build resilience within communities. Part of the Building a Stronger Britain Together programme, which aims to protect communities and empower them to challenge extremism, the funding will aid projects as wideranging as work in prisons to reduce re-offending and transform young people’s lives to using video testimony by Holocaust survivors to educate people on genocides across the world.

Baroness Williams said: “Building a Stronger Britain Together is powerful coalition of positive voices in society who are standing up to the hatred and extremism which, sadly, is present in Britain. We are increasingly confronted with statements designed to justify support for twisted ideologies – these must be challenged in all their forms. I am proud of the support we are giving groups and local communities, who recognise that this country is stronger together.” The funding as announced at the Building a Stronger Britain

Over 1,000 companies join counter terrorism training course just those who have a security role – can follow the course and be in a stronger position to help protect themselves, colleagues and the public. “We are grateful to Marks and Spencer who entered into this collaboration with us. This is the type of joint working we want to see more of in the future across all sectors. Our officers will still be available to deal with companies on a one-to-one level but this will lead to many more ‘eyes and ears’ available to help us that could potentially save lives.”



Updated version of attack response app UK counter terror charity citizenAID has released an updated version of its award winning app and pocket guide which provides members of the public with simple step-bystep instructions on how to help themselves, and others, when there are casualties from a deliberate attack. The app, which won a Counter Terror Award last year, provides advice on shooting, stabbing and bombing incidents, and has now expanded to also provide support in both vehicle and acid attacks. There is also guidance for what to do on encountering an unattended item in a public place. Brigadier Tim Hodgetts CBE, Co‑Founder of citizenAID, said: “Since




The National Counter Terrorism Security Office has announced that more than 1,000 companies across the UK have signed up to an innovative one-hour training scheme that could help prevent terror attacks. Organisations as varied as John Lewis & Partners, the English National Opera and Manchester Cathedral have enrolled their staff in ACT Awareness e-Learning. The training, developed between Counter Terrorism Policing and retail giant Marks & Spencer, covers how to spot the signs of suspicious behaviour and what to do if an attack should take place. Deputy Assistant Commissioner Lucy D’Orsi, national police lead for Protective Security, said: “All staff working in crowded places – not

Together network meeting. The new funding will expand the Building a Stronger Britain Together network to more than 220 groups.

citizenAID was launched in 2017, we witnessed an unfortunate surge in deliberate attacks. Some of these have used acid or vehicles to create harm and we have been determined to ensure that our advice was extended to involve these threats. The new version of the app is also even simpler, making greater use of icons over text, which we believe increases its utility in a crisis, extends its accessibility, and supports its ability to be more easily translated.”


UK police not matching evolving terrorism threat Assistant Commissioner Neil Basu has warned that UK police forces are not a match for the threat of Islamist and extreme far-right terrorism. Speaking to the Home Affairs Select Committee, the country’s most senior counter terrorism officer reported that there are a record 700 live terrorism investigations and that Islamists and far-right extremists feed off each other. Approximately 80 per cent of the inquiries related to Islamist plots, while the remainder included extreme right-wing conspiracies. Basu said of the terrorist attacks in Manchester, London Bridge and Westminster Bridge that there was a ‘sustained shift in that threat’ and that the UK counter terrorism machine ‘continues to run red hot’. He commented: “The attacks demonstrated both the breadth of targets and methodologies employed have increased. The weapons used by attackers now range from homemade explosives to a family car or an everyday kitchen knife. The greatest concern to me comes from simple attacks on softer targets that are cheap to mount, easy to disguise and therefore harder to see and stop.”






Safety-critical infrastructures are attractive targets for cyber‑terrorism. Frequentis’ Christian Flachberger explains the need for effective cyber risk management and why preventative measures against future threats are being stepped up The threat of terror in cyber space has developed at an alarming rate as terrorists continue to search for new vulnerabilities. Water, electricity, transport networks, emergency services and healthcare are all perfect targets for hackers wanting to cause chaos to critical national infrastructure. As these organisations have become smarter, more automated and interconnected, they have subsequently made themselves more susceptible to potential cyber threats through open and/or cloud-based solutions. In response to an increase in targeted attacks, and persistent threats against critical infrastructures, governments worldwide have taken steps to increase security, setting new standards for security obligations. Critical infrastructure organisations must now provide demonstrable evidence for appropriate cyber risk management and regulators will have new powers to assess these industries, to ensure strategies to prevent successful attacks and plans for contingency are in place. They will also have the power to issue legally-binding orders to improve security, and, if necessary, enforce substantial fines. Consequently, the managers working in these areas need to ensure they are adequately protecting infrastructures or face being held accountable for security breaches. Under the UK’s Network and Information Systems (NIS) Directive fines could be as much as £17 million or four per cent of global turnover, with the penalties forming part of the governments five-year National Cyber Security Strategy (NCSS) to ensure the country’s resilience. CONFLICTING REQUIREMENTS Applying cyber security practices from the business IT world for safety-critical missions is often in direct conflict with safety requirements, so many public safety end-users find themselves with somewhat conflicting safety and security requirements, yet, both must be implemented. The problem of integrating safety and security requirements into one common solution is also a concern of industrial


automation and control systems, widely used by critical infrastructures. Besides the well-known best practises of IT security, specific concepts for securing operational technology (OT) have evolved in this domain. IT security focuses on protecting data, while OT security is concerned with protecting operational processes. In safety critical environments we suggest the introduction of protection zones within the technical system in order to apply the appropriate IT and OT security concepts to the right places. Protection zones are defined as a collection of hardware, software and personnel with a common trust level. We suggest having at least three distinct protection zones with adequate isolation between them. The internal zone is under full control of the organisation with dedicated resources (e.g. the network) and no direct connections to other systems. The shared zone functions with resources that are shared with another ‘trusted’ network. Connectivity is established to other, dedicated, operational systems. In this scenario there is linkage between two systems, but there is still no access to a public zone. A public zone is the part of a system with any connection to an untrusted environment, such as public network or third-party resources. Different operational security practises can then be applied depending on the protection zone in order to focus on safety (internal zone) or on high connectivity (public zone). Examples are: frequent patching in the public zone, safety-assured software revisions in the internal zone; strict account lockout policy in the public zone (fail secure), monitoring without automatic lockout in the internal zone (fail safe). STAYING SECURE Keeping operational technical systems secure is a day-to-day management task requiring system operators and vendors to collaborate when completing activities such as cyber risk management, monitoring security warnings, applying patches,


managing accounts, maintaining firewalls, monitoring the system to detect intrusions and so on. If the environment has changed and previous security assumptions have weakened it is essential to revaluate, perform a risk assessment of the changes and perhaps implement new measures to maintain the security of those systems. The fact that many companies operate legacy systems which were designed and procured years ago means that although these systems may still provide up-todate functionality and productivity, the landscape of cyber threats and the solutions for defending systems has changed. If the security of these systems has not been continuously updated it is advisable to carry out a security health check. RECOGNISED RELIABILITY Frequentis has been providing highly reliable communication and information solutions in safety-critical applications for over 70 years. We regard security as essential for safety and began focusing on it a decade ago. We achieved the ISO 27001 certification for our integrated security management system in 2011. We recommend a security health check and the selection of appropriate measures on a technical and administrative level through an understanding of safety and security as well as relevant IT and OT security standards. For us to provide secure systems we apply a secure development lifecycle, a security verification and a defined security handover. The key to safeguarding day-to-day operations and keeping personal and operational data safe is an effective cyber threat protection strategy. There is no safety without security. L

DR CHRISTIAN FLACHBERGER Frequentis AG, Chief Information Security Officer/ Head of Global Information Security Christian joined Frequentis in 1998, working in various roles from system engineer and technical project manager to security research team lead. He is now responsible for the group wide security strategy and its implementation across business areas and company locations. Additionally, Christian is a management consultant and security expert for the European Union.




THE COUNTER TERROR AWARDS 5 March 2019, ILEC Conference Centre, London

INTERNATIONAL SECURITY EXPO 28-29 November 2018, London Olympia

International Security Expo is the premier showcase for homeland and commercial security attracting a global audience of government, transport and borders, law enforcement, military, emergency services, CNI, cyber security, facilities managers and the public and private sectors. Through a series of conferences, workshops and interactive features, the event tackles some of the most challenging threats to our citizens, borders and infrastructure. You can read our preview to the International Security Expo on page 15, as well as inteviews with a number of the event’s leading speakers, including Professor Jon Coaffee, Brian Dillon and Erika Brady.

INTERNATIONAL DISASTER RESPONCE EXPO 28-29 November 2018, London Olympia

International Disaster Response Expo (IDR) tackles some of the most challenging threats to our nations, whether man-made or natural disasters. Supported by government, NGOs and key stakeholders, it is the first event to unite the entire international disaster response community, from aid to force protection, featuring practical sessions and debates surrounded by a major-scale exhibition of specialist equipment and services. IDR is co-located alongside International Security Expo, an established world-class event with a strong crossover audience of government, military, law enforcement, CNI and the private sector.

The tragic and despicable terrorist events of the early 21st century have forced the international community to act. Increasingly sophisticated strategies and technologies are being employed by organisations throughout the world in order to counter the threat. The Counter Terror Awards will be staged to recognise the efforts of organisations in both the public and private sectors and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats and striving to keep the public safe. The Counter Terror Awards will take place for the second time on 5 March 2019, in association with the Security and Counter Terror Expo. You can enter the 2019 Counter Terror Awards here:

SECURITY & COUNTER TERROR EXPO 5-6 March 2019, London Olympia The Security & Counter Terror Expo is a worldclass showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe. The event brings together over 10,000 senior professionals from government, the private sector, critical national infrastructure, military, law enforcement, transport security, border security, security services, major events and emergency services. Understanding the threat horizon is crucial for effective mitigation. The World Counter Terror Congress, part of SCTX, provides a closed-door forum to explore the latest terrorist risks and the capabilities to maximise resilience to them. Becoming a delegate at World Counter Terror Congress provides you with the latest intelligence, strategies and tactics to successfully prepare and protect against terrorism. Clarion Events, the organisers of SCTX, are supporters of the Counter Terror Awards.



The new beating heart of checkpoint security by Smiths Detection Discover how security, operational efficiency and the passenger experience are all elevated by this groundbreaking new scanner – the first from Smiths Detection to feature Computed Tomography (CT) technology for the checkpoint. The HI- SCAN 6040 CTiX optimises performance by improving productivity, increasing throughput and reducing costs – it is the new beating heart of your checkpoint security. This exceptional scanner is a key element in our end-to‑end, state-of-the-art checkpoint solution – integrating it into a smart checkpoint with the latest lane design and management software, can truly revolutionise the screening process and experience.

The HI- SCAN 6040 CTiX has already gained TSL Advanced Technology (AT-2) Tier II certification from the TSA; and also ECAC EDS CB C2 approval with CB C3 testing well underway. Scanning baggage without removing electronic devices and/or liquids, expedites screening and makes the whole process less stressful for passengers. Simply handling fewer trays can significantly increase throughput. At an impressive 0.2m/s the CTiX belt speed will also keep things moving. The HI- SCAN 6040 CTiX is easily incorporated into existing checkpoints and integration into an advanced screening and management platform such as Checkpoint.Evoplus streamlines operations even further through remote screening and directed search. It also delivers bothreal-time and historical data to support resource allocation; and supports general administration and modification of the system. Smiths Detection will be an exhibitor at International Security Expo on 28-29 November 2018. Let us show you how this impressive new technology takes the detection of explosives in hand baggage to a completely new level – visit us on Stand G50 at International Security Expo 2018.




he numbers of terror suspects, numbers of individuals returning from fighting with Daesh or Al Qaeda in Iraq and Syria and numbers of individuals who are an active threat has been widely reported over the past year. Maintaining a database of 20,000 on a watchlist, keeping more than a weather eye on 3,000 active terror suspects, maintaining 650 active investigations and knowing buried in your statistics are some 450 returned foreign fighters, this is no mean feat. With the terrorists only having to be successful once, the pressure on the security service and counter terror policing community is immense; and what a credit to their work with 2018 not suffering in the same way 2017 did. However, what are already stretched resources have been hit with another priority, further diluting the counter terror effort. That other priority is the need to redirect resources that were taken from counter espionage at the end of the Cold War to focus on counter terror, back to counter espionage to deal with the Russian and other hostile intelligence services operating in the UK, and the trigger for that was the attempted assassination of the former Russian GRU Colonel, Sergei Skripal, in Salisbury in March of this year. Once again good old-fashioned counter espionage, once the core of MI5 activity,

was back on the priority list. Speaking to one MI5 Officer very recently he said that the pressure in dealing with both situations had them ‘beyond breaking point’. Changing priorities, better use of scarce resources, improving public private partnership, exploiting innovation and technology are all themes at this year’s free to attend International Security Expo being held on 28-29 November at Olympia in London. The Designing Out Terrorism conference that follows on from this year’s Safer Cities Summit will pull lessons that will hopefully lead to some ideas to ease the pressure on stretched organisations. An example of one of the potential discussion points between police and mayoral representatives from London, Glasgow, Cardiff, Birmingham, Belfast, Manchester and Salisbury at the Safer Cities Summit will be to understand how in Northern Ireland there has been on average one terror incident every four days since the signing of the Good Friday Agreement. Yet we hear very little about it nationally, so how do the PSNI just get on with it? How does business and the community cope with the disruption and how do the PSNI and local authorities work together to minimise disruption? There must be lessons that can be used to reduce the amount of publicity given to terror incidents in Great Britain

and the disruption caused and therefore the pressure on resources. However, Salisbury will have a clear view given the disruption the Novichok incident has caused. An 80 per cent reduction on visitor footfall since March has had a massive impact on the local economy, but what are the implications for a similar incident in any of our other major cities? The International Security Expo, formerly the UK Security Expo, changed its name to reflect what the event is all about and that is bringing an international audience to London to share best practice, get updated on new thinking, processes and technologies and to come together as a community whose sole purpose is to keep us a little bit safer. Reflecting an element of the international feel, Dr John Coyne from the Australian Strategic Policy Institute (ASPI), who is a renowned global expert in Border security, strategic intelligence, transnational and serious organised crime, will be a keynote speaker at the Expo both at Lord Wests lunch and in the Aviation and Border Conference. In one of his recent articles, entitled ‘Weapons of Mass (Economic) Destruction’, he says: “The threat of terrorism and weapons of mass destruction remains as real now as when the term was first used in 1937. Today in Australia the greatest potential for harm is E




PARCELS, BAGGAGE AND PALLETIZED CARGO SCREENING 50X30 ● 60X45 ● 60X80 ● 100X100 ● 160X165 ● 160X180 Dual view models: 60X45DV ● 70X80DV ● 100X100DV


CONPASS MIP Mobile Inspection Point




OCCUPIED VEHICLES AND CARGO INSPECTION When contacting us please quote ''CTB'' to receive a special discount Phone: +44 333 577 9813 w w w. a d a n i s y s t e m s . c o m

INTERNATIONAL PAGE FLAG SECURITY EXPO  the threat of the deliberate use of chemicals or biological materials as weapons particularly in the agricultural sector.” This could apply anywhere! DESIGNING OUT TERRORISM This year’s event has built on the phenomenal success we had last year and, as mentioned, kicks off again with the Safer Cities Summit with the focus this time being on UK cities. Following the Safer Cities Summit will be the Designing Out Terrorism conference, and this will begin with a fascinating briefing from Rich Stevens, deputy director for Global Security (EMEA) with EY looking at the role of security Intelligence in setting the scene for wider security planning. It will tease out some of the processes you should go through to identify risks and threats and put them into mitigation context. It is the old saying, if there is no threat, why have a lock on the door? Peter Jones, the CEO of Nineteen events who deliver the expo, has the philosophy of making a difference and as an event organiser the best way he has found to do that is by delivering a platform that highlights innovation, enables the sharing of best practice, allows greater understanding between the public and private sectors and delivers some outstanding networking opportunities. This personal approach to adding value highlights the importance people are within the wider security arena. However, as we all know dealing with people are the greatest challenge. To

LOOKING AFTER THE NEXT GENERATION IS CRITICAL AND THE SECURITY INSTITUTE HAVE DECIDED TO LAUNCH THEIR ‘NEXT GENERATION’ INITIATIVE try and give a flavour for how to read people a little better, in the Aviation and Borders conference we have a fascinating speaker, Darren Stanton. Darren, an ex-police officer who has worked in prison psychology, is now described in the press and on television as The Human Lie Detector. Darren will give his tips for border staff to look for as they are talking to people as they seek entry into the country. His skills are equally applicable to anyone who has to interact with people. He is not just a body language expert, he looks for what he describes as ‘tells’ and these are micro indications, they could be body language related, or the way someone puts a sentence together or the way they move when they talk and can interpret when people are telling the truth or are trying to hide something. Critical to making a difference is looking after the next generation and the Security Institute have decided to

launch their fantastic ‘Next Generation’ initiative where a group of 50 secondary school age children, including Volunteer Police Cadets, will receive a guided tour of the show with the aim of demonstrating all the disciplines and diversity that the security sector can offer.  LIVE DEMONSTRATIONS There are 13 different conferences over the two days delivering 55 hours of CDP training with over 350 exhibitors displaying and launching over 1,000 products and a huge new and completely innovative feature showcasing how to best protect our urban spaces. The exciting new feature will take centre stage at the show, focusing on large scale threats and the protection of people and buildings in the ‘public realm’. The area will be split into two scenes; a landscaped plaza to the left and a park setting to the right. Each will provide an open space for live demonstrations and allow visitors to step into the demonstrator to experience a variety of physical security equipment and innovative technologies first hand in real life context. The demonstrator will showcase the best in permeant and rapidly deployable physical security products and innovative technologies. Over 30 products and technologies will be on display from perimeter fencing, street furniture, cycle rack, bollards, street lighting, high security gates, biometric technologies, planters, CCTV, mass screening cameras, under vehicle screening and video analytics. Alongside the feature will be a Command & Control Room where the feeds from the technologies on the demonstrator including CCTV, surveillance, biometrics, mass screening, intrusion sensors and crisis management apps will be on display on a live video walls and

terminals. Visitors to this area will be able to integrate the information and learn about how to use this in the decisionmaking process when dealing with threat. In addition, the feature will form the environment for several interactive scenarios, offering a realistic back drop to visitors to the area, where you can experience several demonstrations focusing on: how can you protect an urban area from a marauding gun-man attack or suicide bomber? How can you prevent a vehicle from being used as a weapon of mass destruction, or identify a terrorist conducting a reconnaissance prior to an attack?; Protestor management and removal; accurate and rapid identification of individuals; and mass screening for individuals for concealed threat items. There are a number of country pavilions including USA, Canada, India, China, Australia and an EU Pavilion complementing the different zones that include a live demonstration area, our Drone Zone and Government Agency and Department Zone, Cyber, Intelligence and Information Security Zone, LPCB Zone where you can see things being smashed up and so much more. In addition to the zones there will be at least 50 international delegations attending from all corners of the globe. These are being coordinated through the government Department of International Trade, Defence and Security Organisation (DIT DSO). The international interest shows that the UK is still seen as a source of leading capabilities and products for the security industry but also as the source of best practice processes and procedures. L





Ahead of the International Security Expo, Counter Terror Business talks to Jon Coaffee, professor in urban geography at the University of Warwick, about creating terror resilience in crowded places and counter terrorism in the public realm

ISE: DESIGNING OUT TERRORISM INTERVIEW T he International Security Expo is taking place on 28-29 November at Olympia London. Professor Jon Coaffee (JC) will be chairing the Designing Out Terrorism Conference.

CTB: IN AN ARTICLE THAT YOU PENNED LAST YEAR YOU SAID THAT ‘TRADITIONAL COUNTER TERRORISM APPROACHES ARE SEEN AS LARGELY INADEQUATE’. HOW, IF AT ALL, HAS THE SECURITY INDUSTRY ADAPTED TO BETTER COPE WITH THE THREAT OF URBAN TERRORISM? JC: Counter terrorism approaches have sought to respond to the changing nature of the threat, although there is always a lag-time. In the UK during the 1980s and 1990s the key threat was seen to come from

PIRA vehicle bombs where warning was often given. The central aim was economic terrorism and hence the financial zones of London were the prime target with security cordons and bollards the preferred solution. In the post-9/11 world, terrorist tactics and targets changed and indiscriminate no-warning attacks against crowded locations became the modus operandi of choice. This has meant counter-responses have had to not only consider defensive requirements but also be concerned with ensuring that vibrant public places do not turn into sterile and deserted locations as a result of terrorism and our responses to it. The security industry has responded to this challenge and some innovative interventions do exist, but there is still a tendency to default to traditional bollardbased solutions. E





JC: It’s now possible to use stealthier security features that can be almost seamlessly blended into the urban landscape or disguised as street furniture. The balustrades down either side of Whitehall near the Houses of Parliament in London, or tress in large plant pots that have proved popular in a number of European cities like Cardiff and Rome, serve as emblematic examples of this type of semi-invisible security. Such features will work well if they have the same hostile vehicle mitigation functionality – the ability to stop a seven tonne truck travelling at 50 miles an hour – as bollard and barrier-type solutions. There are a number of artistic security solutions available on the market now. Some conform to this security standard whilst other might not. The issue with more artistic interventions that have the highest security standard is that they will likely cost a great deal more and therefore have not proved that popular. There are also now examples of plans that have been drawn up that better integrate security features into largescale public realm improvement schemes. The recently completed redevelopment of Times Square in New York by Snohetta serves as an example of this. CTB: IN YOUR INTRODUCTION TO DESIGNING OUT TERRORISM, TO BE DISCUSSED AT THE INTERNATIONAL SECURITY EXPO, YOU SAY THAT DESIGNING OUT TERRORISM CAN HAVE ‘GOOD, BAD AND UGLY IMPACTS’. CAN YOU GIVE US A HINT AS TO WHAT YOU MEAN BY THAT?

might be termed ‘bad’ practice where default bollard-type solutions prevail and where decisions made about the appropriateness of the counter-terrorism has not involved a wide range of stakeholders. Then we have the ‘ugly’ temporary concrete blocks that are literally thrown across the city in an ad hoc way as an immediate reaction to a recent attack or fear of a future attack.

CTB: A REPORT ON LONDON’S PREPAREDNESS FOR A MAJOR TERRORIST INCIDENT BEFORE THE WESTMINSTER ATTACK LAST YEAR SAID THAT ‘LONDON BECOMES A CITY WHERE SECURITY AND RESILIENCE IS DESIGNED IN AND IS PART OF THE CITY’S FABRIC’. GIVEN THE ATTACKS LAST YEAR AND THE RECENT WESTMINSTER INQUEST, HOW TRUE WAS THAT STATEMENT AND HOW MUCH FURTHER DOES THE CAPITAL HAVE TO GO TO BE BETTER PROTECTED? JC: The Harris review of London preparedness for a major terrorist attack identified a number of designlinked recommendations that sought to create regulations for designing in counter terrorism to new developments and retrofitting them into existing structures and spaces. At present such a need is not obligatory but rather a material consideration in the planning process. Such an obligation is unlikely to be mandated, although given recent incidents in London, most development processes are considering terrorist risk and seeking specialist advice in putting in place appropriate and proportionate security.

CTB: THE DESIGNING OUT TERRORISM STREAM OF THE INTERNATIONAL SECURITY EXPO IS ABOUT FOSTERING BEST PRACTICE TO CREATE TERROR RESILIENCE IN CROWDED PLACES. MOVING FORWARD, JUST HOW IMPORTANT IS THIS? JC: Learning from the experience of others is really important as long as solutions deployed are specific to context. One issue that has held back counter terrorism being seriously considered by developers and planners over the last decade or so, is a lack of practice examples from which they can learn lessons or derive inspiration. Often developers have not been keen to highlight examples of where counter terrorism features have been designed-in and, as such, the Expo provides an opportunity to illuminate the many different contexts in which security has been enhanced or where security gaps have been highlighted. If we are concerned with resilience we should be seeking a longer-term solution and not a short term fix. Here the design process needs to be as collaborative as possible and think holistically about the effects of solutions. Viewing this purely as a security problem will not lead to solutions that are effective and acceptable. Solutions require a coming together between those that secure those that plan, those than manage and those that use public spaces. L


JC: In thinking through the effects of implementing counter terrorism in the public realm there can be a multitude of design impacts. We might see ‘good’ design practice, notably those features that are integrated within the overall planning of a public place and are relatively unobtrusive. These type of solutions are relatively rare. What is more common is what



vzx consultancy

Local Government Contractor Lending Contractors to Local Government may find it difficult to meet their obligations to HMRC, Bank, Creditors and of course Sub‑Contractors. Love Money can help Love Money provides low cost micro-bridging finance that can help both the Contractor and Local Government. Lending up to £350,000 per claim, per week – no personal guarantee required makes this a very attractive route for all parties. The Love Money Local Government Contractor basic lending package is so simple: An undertaking from the Local Government that payment will be made upon certification We offer complete transparency with no set up fees Payment to the contractor within 24-hours of certification 5 to 120-day rolling agreement (your choice) No long-term undertaking No personal guarantee A one off agreement fee


T: 0330 320 8013




Ahead of the International Security Expo, Counter Terror Business talks to Erika Brady, from the Handa Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews, on the Prevent scheme, monitoring terrorism and understanding extremism

ISE: LESSONS ON THE PREVENT DUTY T he International Security Expo is taking place on 28-29 November at Olympia London. Erika Brady will be speaking in the Education Security Conference, providing an analysis of the Prevent Duty in St Andrews and Oxford.

CTB: HOW IS PREVENT CURRENTLY  EMBEDDED IN UK UNIVERSITIES?  Erika Brady (EB): There has been a significant amount of controversy around Prevent, much of which precedes the implementation of the Prevent Duty in 2015. The Prevent Duty itself made it a statutory requirement for various public bodies to contribute to the effort of preventing the radicalisation of vulnerable individuals. The bodies affected by the Duty include educational institutions of all levels. To be honest, if we remove the emotive debate around Prevent, I think most people would not have a fundamental problem with stopping people from becoming terrorists. The problem is in how Prevent, as a counterradicalisation strategy, was developed and implemented. My research has indicated that there has been a clear move by university leadership to abide by the legal requirement and policies have been written and published. However, there is significant variation on how the Prevent Duty and its policies are understood and received by various

affected groups. There are also challenges of implementation, and significant push back has been seen from student bodies across the country, much of which has been led by the National Union of Students (NUS) who have organised the opposition to the legislation. In particular, the NUS celebrated the outcome of a High Court ruling in July 2017 that said that universities did not have to follow Prevent Duty guidance which had been issued by the government to assist universities in the implementation of the Duty. The ruling was based primarily on the clarity of Prevent itself as opposed to the guidance presented to assist in its implementation. So, there is some legal precedent that the Prevent Duty was ill-conceived and has been open to criticism. While the University of St Andrews has a robust policy in place, I was unaware of any communications in this regard. So, when I looked into it in more detail, I found that, even as recently as August, staff had been informed of Prevent training which was taking place. So, it is in effect, but never seems to be a big talking point among students, that I am aware of at least. I think it is therefore important to look at it in a little more depth and see if more can be learned about the changes, or lack thereof, over time. My main issue with the reporting on this, both from media and student bodies, is that it appears to me to be a roll-on effect from E



Sky Mantis Long endurance aerial surveillance UAV platform Core features: • 1 hour true flight time (normal conditions)

• Rugged carry back pack

• 30X zoom RGB HD camera

• 50 Mph wind capable (reduced flight time)

• Dual thermal/IR + 30X zoom HD cameras

• Secure encrypted video stream

• 5km secure low latency video

• Extra stable landing (no flip-over)

• 7Kg all up weight

• Weatherproof (wind / rain)

• 30 seconds from bag-to- air

• Straight up / down view

• Ergonomic, rugged remote controller

• 225° camera tilt angle

• Rapid battery swap

• Modular upgrades

Available options and add-ons: • Triple camera gimbal • Additional rugged video screen viewer • 640x512 30 FPS thermal / IR • Mapping / waypoint ablet • 20 Km video streaming • All around collision avoidance

Field to Cloud live video streaming • Live video stream from the UAV to anywhere in the world • Secure encrypted link • Browser based stream viewing (encrypted/secure HTTPS) • HD 30 FPS video • True real time - under 1 second delay / lag • View anywhere in the world

Evolve Dynamics Ltd UAV aircraft and software w: e: f: t: +44 (0) 1483 684814

STAND D22 Surrey Technology Centre 40 Occam Road, Guildford GU2 7YG, United Kingdom


which gives us some ability to see the extent of the work being undertaken by the security services. So, on some levels, yes, I do believe CONTEST has been successful. But new challenges, such as low-tech terrorism tactics are becoming increasingly challenging to prevent. I think casting CONTEST in a success-failure dichotomy is an oversimplification of a complex problem.

a threat, and taken off surveillance, but years later come back on the intelligence services’ radar. These individuals are called ‘recurring subjects of interest’ and the process of actioning surveillance on these individuals was seen to be flawed. The data provided by the security services indicated that thousands of individuals had, at one point or another, been under surveillance for terrorist activity, but had been deemed subsequently to no longer be a threat. Following the Committee’s report, the security services stated that they would update their processes in this regard and improve their regular monitoring review capabilities. If we take this on face value, it can be hoped that there are effective monitoring procedures in place.



(EB): My overall impression is that the UK is doing a good job of monitoring suspects, on the whole. However, this view only really holds up until an incident takes place. The complexity involved in monitoring suspects, who have not committed any crime (yet) is incredible. It is a resource-heavy and diffuse issue that is not easily done. And as soon as someone slips through the net, a negative backlash ensues. I am not saying this to defend the intelligence and security services, nor to criticise them. But I do consider the challenge of the job to be immense and, in the context of this challenge, there are strong indications that the public is being protected as can be reasonably expected. An interesting point to raise here is in regard to the review report on the murder of Fusilier Lee Rigby in 2013, which was undertaken by the Security and Intelligence Committee and published in November 2014. In this review, the security services were generally commended for their work in preventing terrorist attacks. However, the Committee noted several key failings regarding the actions of the security services in relation to the perpetrators, Adebowale and Adebolajo. In addition, issues arose with regard to terrorism suspects who, at a given point and time, are deemed to no longer be

(EB): It’s always difficult to predict future outcomes. Unfortunately, when it comes to Brexit, we are all in the dark. No state has ever left the EU and so a lot of the political chaos we are currently seeing is a symptom of this. I think CONTEST will continue to work, on the whole, as it has been doing. It’s not as though, suddenly, the system will collapse. It is important to note that a lot of the elements of CONTEST have informed the EU’s counter-terrorism strategy, so there is a commonality of understanding and purpose. I don’t doubt that the EU and the UK will continue to communicate and collaborate on the threat from terrorist throughout the continent. I think the biggest impact from Brexit on both the terrorist threat and the ability of CONTEST to function will be the transition period, and this could take years to work out. How the processes of the UK are going to extricate themselves from the EU is not something that has been answered yet. Everyone agrees that security issues will remain a priority and everyone will work together to ensure public safety. But how this is implemented or worked out remains to be seen. Counter terrorism tactics such as protecting public spaces, arresting suspected terrorists and training for emergency services, in other words domestically-focused policies, will all continue as normal. However, issues E

MY OVERALL IMPRESSION IS THAT THE UK IS DOING A GOOD JOB OF MONITORING SUSPECTS. THERE ARE STRONG INDICATIONS THAT THE PUBLIC IS BEING PROTECTED AS CAN BE REASONABLY EXPECTED.  the negative reception of Prevent as a whole. The arguments are not new, but are renewing issues raised in the past, and much of the ‘evidence’ is anecdotal. I have no doubt that poor procedure has led to misunderstanding and misrepresentations of radicalisation among students. However, it becomes far more difficult to see, at first glance, whether these issues have been remedied. Perhaps at first there were issues, but universities improved their implementation. Or perhaps they didn’t. So, what I am attempting to understand from my research on the Prevent Duty in universities is what policies have been implemented, what procedures are in place for review, how are communications developed and is the negativity warranted, even now, three years on.

CTB: GIVEN THE GROWTH IN ‘HOME-GROWN’ TERRORISM IN RECENT YEARS, CAN WE DEEM THE CONTEST STRATEGY AS HAVING BEEN SUCCESSFUL? (EB): This is a good question, and something that is, perhaps unsurprisingly, not easily answered. It all depends on the data you are looking at. For example, if you are including terrorist activity in Northern Ireland, there are indications that that has been consistently high, although to some extent perhaps on the increase over the past few years. The attacks in Northern Ireland don’t often result in mass casualties, however, and so they are less likely to be on peoples’ radar, outside of Northern Ireland. However, if you take the data in the rest of the UK, I would argue that it’s not so much an increasing trend as it is a series of dissociated events which stand out. In the bigger pattern, there were successful events in 2005, 2013, 2016 and 2017. However, the killings of Fusilier Lee Rigby (2013) and MP Jo Cox (2016), although horrifying, were single incidents and did not result in mass casualties, so they need to be understood a little differently. In my view, the idea there is an increasing trend in terror attacks throughout the UK is somewhat misleading. That being said, I think you can tell a little more about the success or failure of a counter terrorism strategy by what doesn’t happen. By all accounts, several substantial terror plots have been prevented from taking place each year. Over the past few years, more information is being released on these numbers,





Modular, high security walling and room building systems You decide the purpose, we take care of the rest!


K70 5a New York Way | New York Industrial Park | Shiremoor | Newcastle upon Tyne | NE27 0QF | T: 0191 257 3100

INTERNATIONAL SECURITY EXPO  such as border security and the movement of people may actually be negatively impacted during the transition. The biggest concern will be the public’s frustration with the transition, which will give those on either end of the extreme political spectrum the opportunity to turn economic uncertainty and hardship into an active and dissatisfied electorate, and very small elements of these groups could spill into violent backlash which could in turn result in other communities responding in kind. The deal that is reached for Brexit will cause dissatisfaction among many – those who feel it goes too far and those who feel it doesn’t go far enough, and so civil unrest will be inevitable. It just remains to be seen whether this will spill over into violence, and what kind of violence that might take. And of course, the Northern Ireland border could have a significant impact on the situation there, both from a political perspective and a security perspective. That shouldn’t be underestimated.

CTB: IS THE DEFINITION AND UNDERSTANDING OF ‘EXTREMISM’  HELPING EFFORTS TO PREVENT HOME-GROWN RADICALISATION? (EB): Academics and policy makers have tried for years to come to a consensus understanding of what ‘terrorism’ means, with limited success. I don’t believe that it is hindering efforts to prevent

home-grown radicalisation, but this is where the crux of the matter lies – the differences between those who are working on this understanding and those who are being communicated with (the public). I believe that it is essential that policy-makers and academics understand the changing landscape of terrorism, and controversial terms such as ‘extremism’ and ‘radicalisation’, because they are subjective, and result in more heated debate. The public, usually through the media, receive a perception of chaos from these debates, but this is the process of understanding a highly complex and challenging problem. Every effort to understand these terms, from the perspective of academics and policy-makers, is, in my view, worthwhile and important. However, it is equally important to understand the public’s view on these issues. I don’t doubt that the public considers the ongoing debate on terminology as pointless or detracting from the real issues. And this is understandable. People do struggle to understand the term ‘extremism’ and because it is not related to an action, but rather a state, it becomes one more concept that most people may never fully understand. This means that misperception and heightened tensions can absolutely result. And I believe many experts would agree that this perceived ‘obsession’ with definitions is not going

to get the job done. But I consider it essential in understanding the complexity of the issue. On one level, you have the person who leaves their house on a given morning with a backpack loaded with explosives and decides to blow themselves up in a crowded place – that is the worst case scenario and one extreme end of the scale. On the other end of the scale, you have individuals who may or may not move into the realm of committing a violent terrorist attack, but who nonetheless enable an attack to take place. This level is that of the extremist, who dances within the law, but enables others to carry out the criminal act of terrorism itself. And the results of the activities of this so-called ‘extremist’ may not be immediate; they may take as little as days or may take as long as years to develop. So, governments are struggling to address this end of the scale. And this is why we are seeing ‘new’ terminology develop and seeing the heated debates arise because of the subjective and complex nature of the issues. L

Read the full interview with Erika Brady online at:


Introducing iNTACT iNtelligent Access Cover Technology by Hugslock Systems Ltd

Real time remote monitoring Removes the need for physical inspections Environmental Monitoring Bespoke sensing options Fully preventative solution Remote locking Notification of an attack upon first contact



International Launch



A unique range of Advanced Imaging products focused on the latest Artificial Intelligence and neural network technologies




Ultimate Surveillance Solutions

TITAN AI provides high speed Image Analysis developed specifically for security and safety applications: • Facial Detection, Recognition and Identification • Behavioural Analysis • Video and Forensic Analysis • Biometric Applications • Queue Management • People Counting • Footfall Analysis See TITAN AI in Action at the UK Security EXPO - London Olympia 28/29 November Tel: +44 (0) 141 643 3070




Counter Terror Business talks to Nigel Cook, head of security at Royal Historic Palaces, about the relationship between safety and visitor experience and designing effective mitigation

ISE: PROTECTING CROWDED PLACES CTB: WHO AND WHAT CAN WE EXPECT TO HEAR ABOUT WITHIN THE PROTECTING CROWDED PLACES & COUNTERING TERRORISM STREAM OF THE EVENT? Nigel Cook (NC): The concept of protecting crowded places and events from the threat of terrorism is complex and multi-faceted. The wide variety of venue types, coupled with the evolving range of terrorist attack methodologies means that delivering proportionate, effective, yet unobtrusive security can be a real challenge. The conference will hear from a wide range of leading practitioners, who will be speaking on a varied range of mitigation opportunities. Delegates will hear from, and have the opportunity to pose questions to, subject matter experts. International Security Expo has, once again, succeeded in pulling together an impressive line-up of speakers and I feel certain that the conference will promote healthy discussion and debate. The topics on the agenda for the day are as diverse as they are interesting, and I genuinely believe that everybody who attends will pick up at least one ‘nugget’ that they can take away with them. CTB: JUST HOW IMPORTANT IS STAFF AWARENESS OF THE POSSIBILITIES OF AN ATTACK AND KNOWLEDGE OF HOW TO REACT? NC: I don’t think that anyone would argue that effective briefing needs to be a core element in any security operation, not only for those who directly deliver security, but for every member

of staff who can contribute to the security effort. Understanding the terrorist threats that face a business, and what employees can do to mitigate those threats, as well as the actions to take in the event of the threat materialising, are critical requirements. No business, particularly those that operate in the ‘crowded place’ sector, can guarantee that it will not become the target of terrorist interest, and therefore equipping its employees with the best available information and intelligence will always be a business imperative. Like many businesses, Historic Royal Palaces (HRP) receives regular operational updates from the Metropolitan Police Service, and is strategically linked into a number of other sources. HRP has always been an active supporter of Project Griffin and has made efforts to release staff to attend briefing sessions whenever possible. However, releasing staff from the workplace for such important briefing and awareness sessions is not always easy, particularly for smaller businesses. That fact has been recognised, and the new online Action Counters Terrorism awareness initiative ensures that the valuable information contained within the seven e-learning modules can be made available to a far wider business audience. Of course, whilst there is clear value to be derived from receiving appropriate briefings and undertaking relevant learning opportunities, the value of both will be significantly enhanced through a process of testing and exercising the business response to a range of scenarios. These can be as simple or complex as time will allow, but whatever the complexity of the testing, huge value can be derived from fully debriefing E




ENABLE PREVENTIVE ACTIONS through the use of artificial intelligence and harmless radar technology

Radio Physics develops, manufacturers and commercializes products protected by patented detection technologies to provide early warnings of person-borne concealed threats, in order to prevent shooters in schools, violent crime and suicide bombers. Radio Physics answers the need for detecting concealed person borne threats well before existing security infrastructure, thereby enabling early intervention by security operators to protect the public before threats are unleashed. Radio Physics’ MiRTLE systems enable real time, autonomous, covert screening of people for concealed weapons, including assault rifles and suicide bomb vests.


Networked MiRTLE systems send audio and video alarms generated by an artificial intelligence software who processes harmless millimeter-wave signals that permeate clothing at frequencies between 75 and 110GHz. • detects up to a range of 30 meters ( 100 feet ) • weighs less than 8 Kg • consumes less than 35 W • can be set-up in under 15 mins, lending itself to ad hoc events & VIP security The scope of operations allows the system to be deployed in multiple scenarios, including scanning high throughput, unstructured crowds scenarios.

Radio Physics Solutions Ltd. Ely, Cambridgeshire, UK

INTERNATIONAL SECURITY EXPO  what went well, as well as what did not. Lives, as well as business continuity, can depend on the decisions taken in the first few seconds and minutes of any terrorist event, and in the panic and confusion a potential enemy can be indecision.

CTB: WHAT ARE THE CURRENT DIFFICULTIES WITH BALANCING PROTECTION AND VISITOR EXPERIENCE? NC: There are a number of factors which impact this question, one being a potential that ‘protection’ and ‘visitor experience’ can sometimes be viewed as being mutually exclusive. Whilst some may believe that security regimes are, in themselves, a negative visitor experience which can inflate a sense of fear, the evidence, particularly since the 2017 attack on Manchester Arena, has been that the converse is the reality. Whilst many visitor attractions saw a discernible drop in visitor numbers in the months after the attack, those with effective security regimes on entry did not suffer to the same degree. Data compiled by the Association of Leading Visitor Attractions clearly showed that to be true, and customer feedback across HRP revealed that enhanced security regimes had actually reassured our visitors and was reported as having been a positive experience. Where possible, human interaction will always play a positive

role in the delivery of security regimes, offering an opportunity to enhance the visitor experience. However, this can be extremely difficult to deliver at venues and events which attract significant crowds, especially if the majority of those crowds arrive shortly before the start of the event. The practical difficulty of securing such crowded place events has been the focus of research by the Home Office’s Joint Security and Resilience Centre (JSaRC), in partnership with the CPNI, and this work has resulted in the creation of what is known as the High Footfall Screening Concept. The aim of this concept is to offer the ability to deliver a proportionate level of security assurance against larger threat items without inconveniencing visitors and creating long queues. Whilst the primary aim of the High Footfall Screening Concept is to detect mass casualty threat items such as explosives and firearms, there is a complimentary aim to provide an enhanced visitor experience through easy access combined with assurance about their own security. The concept has been trialled in a wide range of settings, and the feedback received from those who have been involved has been reported as having been overwhelmingly positive. So, whether security regimes are primarily delivered with a human interaction or predicated on the use of technology, the evidence clearly shows that in both scenarios the balance between protection

The future of infrastructure safety Hugslock Systems is a safety and security service provider offering infrastructure operators industry leading incident prevention and response management. The company has launched its flagship product an ‘intelligent’ access cover. Hugslock has redesigned the traditional access cover, allowing for remote monitoring 24/7, environmental monitoring and remote locking. The access cover can also be connected to underground utilities such as broadband and power networks which would provide an enhanced level of service to customers. Whether you operate communication networks, utility services or secure high-profile locations, it is critical to ensure that you have 100 per cent controlled access to ensure business continuity and the highest level of service is provided to your end customers. Hugslock Systems has created a truly smart cover

using iNTelligent Access Cover Technology. As the world’s first remote lockable access cover, iNTACT’ will truly revolutionise the security of underground critical infrastructures. It is secure, impenetrable and intelligent. Intelligence is embedded within the cover in the form of sensors that can offer various monitoring capabilities such as gas, heat, water sensors, Infrared CCTV, motion, bio-hazard and seismic. iNTACT completely removes the need for any physical inspections, as the remote-operated locks can be remotely monitored from a central control room. FURTHER INFORMATION

Tel: 07832 296181

and visitor experience, with careful planning, can be successfully achieved.

CTB: THE OVERARCHING THEME OF THE EXPO IS ‘EVOLVING SECURITY THROUGH INNOVATION’. HOW DOES CROWDED PLACES PROTECTION FIT INTO THAT MANTRA? NC: Unfortunately, designing effective mitigation is easier once the threat has materialised, but the reality is that by then it’s too late. So, whilst those charged with keeping us safe strive to deliver defensive mitigation, the terrorists are adapting and changing their attack methodologies, a sort of ‘cat and mouse’ scenario. It is for these reasons that those responsible for considering what mitigations are required must remain agile and ‘think the unthinkable’. Successful defence against future attacks will always be a difficult task. We must continue to evolve if we are to meet the challenge of remaining ahead of the terrorist curve, and our ability to innovate the use of existing or new technologies, as well as the training and deployment of security personnel will continue to be a key factor in determining our success. L


Finding concealed threats from a distance

In response to modern day terrorist threats and violent criminal assaults, Radio Physics Solutions has created MiRTLE; a mounted wave device that can non-intrusively, identify concealed person borne weapons at a distance of up to 30 metres. Our clients range from airports to government buildings and schools seeking

to identify attackers and their weapons remotely. Our vision is to create a family of co‑operative MiRTLE products each of which features ever greater miniaturisation. Come and see us on Stand B73 FURTHER INFORMATION

Tel: +44 (0)1353 667237 Email:




Counter Terror Business talks to Brian Dillon, director of Rubicon Resilience Limited, about the importance of crisis management planning and staying in step with contemporary threats

INTERNATIONAL SECURITY EXPO: EXERCISING CONTINGENCY PLANS B rian Dillon leads a London-based international consultancy focusing on crisis management, contingency planning, exercising and embedding organisational learning. Before joining the private sector Brian was the UK Commander on the European Counterterrorism Intervention Network and head of New Scotland Yard’s Specialist Firearms Command. He led a national counter-terrorism capability and London’s armed response service.




Brian Dillon (BD): I’m going to be presenting on simulating chaos and how to stress test contingency and crisis plans. For me the emphasis is on developing confidence so



that those who have to respond in extreme circumstances do so in a manner that is likely to prove effective. Post event debriefs and after-action reports continually emphasise the benefit in exercising contingency plans but many people have experienced weak exercises which fail to live up to the initial promise. We know that the golden hour of the initial response is essential in setting the tone and tempo of incident management and this is applicable in terrorist situations as much as civil emergencies. So, I’m also going to look at how to maximise the investment of time and resources when planning an exercise.

CTB: YOUR CONSULTANCY FIRM, RUBICON RESILIENCE, DRAWS ON EXPERIENCE IN CRISIS MANAGEMENT. HOW IMPORTANT IS INTEROPERABILITY AND EFFECTIVE PARTNERSHIPS IN COMBATTING TERRORISM IN THE UK? (BD): It’s encouraging that the government’s latest review of CONTEST has recognised the importance of close working with industry and in practice there are some very positive collaborative initiatives led by NaCTSO and CPNI. Operationally, interoperability is the lifeblood of successful incident management and that can only come about through meaningful partnerships. One aspect which I think we’ll see more of is security firms improving their compatibility with the emergency services, particularly in large areas that are privately owned and accessible by the public. In these locations there is a need to have a degree of effective interoperable arrangements because this enhances safety and improves the response. There’s certainly some good examples of this already in the UK and I see this developing further.

CTB: WHAT IS THE BEST WAY FOR ORGANISATIONS TO TEST ASSUMPTIONS, IDENTIFY VULNERABILITIES AND DEVELOP MANAGEMENT TEAMS IN PREPARATION FOR THE UNLIKELY EVENT OF AN ATTACK? (BD): In the wake of last year’s attacks a number of organisations looked to refine and evaluate their contingency plans

which was sensible, but if a test hasn’t taken place for some time, if at all, it can be useful to start on small scale scenarios before looking at extreme threat situations. More generally, it’s important to base all contingency planning on an informed threat assessment and from there define roles and responsibilities which should form the basis of training for key personnel. There’s little point in doing any exercising without these basic building blocks in place. It’s also essential to pitch a test at the right level and to understand what success looks like. Exercising should create safe learning environments where plans and people can be stress tested. I always aim to simulate realism to develop people’s confidence so they’re able to operate dynamically and flexibly – real world events will never entirely match any exercise scenario so you need people who can think and make decisions, not simply follow a script because that rarely delivers optimum performance.


UK SECURITY AND POLICE FORCES FOR A FIREARMS ATTACK? (BD): Last year’s grotesque terrorist attacks in the UK thrust armed policing into the spotlight and they were not found wanting: courageous, swift and highly effective in their response. To those familiar with the subject this was not a surprise; strategy and tactics have adapted to stay in step with the contemporary threat. An extraordinary amount of hard work has gone into developing this and the UK armed policing model is at a very high standard. But although armed policing is generally at the sharp end of the response – intervention and resolution – it operates in a wider counter terrorism landscape. Clearly, 2017 was a year of exceptional demand and inevitably that will have led to some refinements in practice and procedure. I think we’ve seen the authorities keep pace with the threat and they’ve produced some extremely successful results as numerous convictions demonstrate. Nevertheless, there seems to be no sign yet of the threat diminishing and in whatever way it manifests I’m confident that the police and security services will be prepared. L






Survae Live enables real-time situational awareness with recorded video streams and the ability to snap from recorded to live views from multiple perspectives.


Derive meaning and make quick decisions by connecting live and recorded video, infrared and sensor data to Esri, Google Maps and your own GIS basemaps and layers.

@survae @CenterpriseInt

Survae – +1 609 751 0150 Centerprise – 01256 378000


Ahead of the first International Disaster Response Expo, Philip Ingram shares some thoughts on the show’s origins, discussion points and its role in improving the disaster response arena

MAKING A DIFFERENCE, IMPROVING DISASTER READINESS P lanet Earth is becoming increasingly fragile and climate change has been blamed for the rise in extreme events causing natural disasters across the globe. However, man-made disasters through corruption and conflict in Africa and the Middle East in particular have heaped further misery on people. The UK continues to show its global leadership by being one of the few countries around the world to meet its commitment under a UN agreement to spend 0.7 per cent of gross national income on Official Development Assistance (ODA) with much of this coordinated through the Department for International Development (DFID). I think it is important to understand where DFID’s priorities lie, and they have been stated in their annual plan as: strengthening global peace, security and governance; strengthening resilience and response to crisis; promoting global prosperity; tackling extreme poverty and helping the world’s most vulnerable; and delivering value for money. This sets a framework for the launch of the first International Disaster Response Expo and gives rationale for the co-location of our new event alongside the well-established International Security Expo. The final bullet point direction is achieved by enabling a platform to help deliver value for money through exposure to best practices and innovation. That is what the International Disaster Response Expo does. What we have seen over recent years with more storms and hurricanes, earthquakes

and tsunamis that kill thousands, volcanos that close airspace, refugee crisis that turns the Mediterranean Sea into a death-trap for the desperate is that these events are a constant and will always cause suffering. The content over the two days focuses on all aspects of dealing with natural and manmade disasters from preparation, to responding to resilience building for the longer term. In addition, decision making, the importance of media law and the effects of these horrors on individuals mental health will all be examined.

SHOW CONTENT Although this is the International Disaster Response’s first year, at the centre of the event is the Government and NGO zone showcasing some of the innovation DFID brings to its approach to disasters, highlighting the coordination between them, the UNHCR, The Cabinet Office Emergency Planning College and the charitable sector, this year represented in the zone by the British Red Cross (BRC). As well as things like deployable shelter packs, DFID is hoping to showcase some of the newer technologies at the forefront of an innovative approach to providing disaster support. One such device is a 3D printer that in the field can print medical instruments, parts for water pumps and so much more. At the core of the International Disaster Response Expo is the two-day free to attend conference that is looking at subjects as diverse as the Rohingya Crisis, challenges with E




RRP £99.95


Product Features Maximum beam distance of 352 metres – one of the longest-distance beams you can find on any rechargeable torch of this size/weight/cost!

One of the longest run-times of any rechargeable torch in its class, designed and capable of lasting a complete work shift

One-handed Slide Focusing from long-range Spot to Ultra-Wide Flood…..Only a very few brands offer this highly valuable option

Incredible performance in run-cycles (number of recharges) per each Li-ion battery, equivalent to minimum 2400 x AAA batteries each

To our knowledge, the widest, purest and best Flood Beam of any hand-held rechargeable torch we know of in the marketplace

Incredibly low running-cost due to batteries saved (as above)

Widest and most comprehensive accessory kit of any rechargeable torch in the marketplace

High-Low and Strobe light options all designed specifically for Law Enforcement, Military, Security and Search & Rescue sectors

Supplied with 3 batteries (2 spares), versus only 1 with the vast majority of rechargeable torches and 2 with a very few others

Backed by 5 Years COAST warranty, LED is also further guaranteed for 100,000 hours service life.

For orders & enquiries email:

or call Jake Deadman on: 020 8532 5736

See us at Stand L1

DISASTER RESPONSE  setting up Ebola hospitals from scratch in Sierra Leone, to leadership, mental health, legal and media issues all associated with dealing with disasters. In addition, we have guest speakers covering two passionate areas for Princes William and Harry, that of demining by the HALO Trust and protecting wildlife through the South African mainly female antipoaching organisation, the Black Mambas. The Black Mambas were founded in 2013 by Transfrontier Africa National Park and now protect all boundaries of the 52,000ha Balule Nature Reserve, part of the Greater Kruger National Park in South Africa. They follow a philosophy they call their ‘Broken Window’ philosophy where they striving to make their area of influence the most undesirable, most difficult and least profitable place to poach any species. With a passion for wildlife and rhino conservation, these women are the voice in the community through their conservation work. Critical to their success is the training and mentoring they receive and the International Disaster Response expo is extremely lucky to have Alice Bromage, a former Major in the British Army and now leadership mentor, who has spent six months with the team on the ground developing their skills.

Disasters are not all natural and one of the worst man-made legacies of war is the numbers of landmines and unexploded ordinance that remain long after conflicts have finished and continue to kill and maim the civilian population. One of the organisations helping deal with this deadly legacy is the HALO Trust founded in 1988 in response to the global humanitarian catastrophe caused by landmines by Colin Mitchell, Guy Willoughby and Susan Mitchell OBE, who witnessed first-hand the devastation caused by landmines and other explosive remnants of war in Afghanistan and they resolved to do something about it. HALO’s Afghanistan programme employs thousands of Afghans and they expanded the scope and breadth of their work to include explosive ordnance disposal, stockpile security and management, weapons disposal and armed violence reduction, in addition to humanitarian de-mining. A key aspect of their approach is to use local labour and hence create local employment. The landmine issue shot to international prominence in 1997 when Princess Diana walked through one of HALO’s minefields in Angola. From small beginnings back in the late 1980s they now employ thousands of men and women from the communities we serve in conflict and post-conflict countries and territories around the world.


DISASTER VICTIMS Speaking on both days of the International Disaster Response Expo’s packed conference programme and with a live demining practical demonstrator, the talks by Simon Conway Director of Capability with the HALO Trust and their contribution will be fascinating. Looking after the victims of a disaster is one thing but looking after those who go in to provide assistance is another. They often are exposed to the sorts of horrors no one should ever see, but they throw themselves in to save life and rebuild communities but the toll on individuals can be great. The International Disaster Response Expo is very fortunate to have Doctor Lorraine Porteous who will highlight the ‘Challenges of working in complex environments’ and drill into the potential impact on the mental health and well-being of those involved.

The objectives of the Black Mamba project are not only the protection of rhinos through boots on the ground but also through being a role model in their communities. With 32 young women and one man, they want their communities to understand that the benefits are greater through rhino conservation rather than poaching, addressing the social and moral decay that is a product of the rhino poaching within their communities. They are concerned for their children’s sake as the false economy has brought loose morals and narcotics into their communities.

One of the more worrying disasters in recent years was the Ebola Crisis in Africa that erupted in 2014 and the Save the Children charity were, some would say, unfairly criticised for their handling of the first Ebola dedicated hospital facility. At the time Save The Children’s Global Humanitarian Director was Michael Von Bertele OBE, and he said the criticism stemmed from ‘a misunderstanding. When we were asked to take on the centre, we made it absolutely clear that this was new business for us ... We have never run frontline health services at this scale’. Talking to Mike, the issues were even bigger, there was friction in London between government agencies and the leaders of not just the Save The Children charity, but also elements of the UN and other NGOs and charities as well as the UK MoD who had built the facility. The practical understanding of what was needed to ensure the safe treatment of the patients and reduce the risk of wider spreading of the disease took much more resource that had originally been thought. He also said at the time that ‘the charity organisation had been obliged to recruit and train some 250 local staff and more from around the world. We set out a plan that involved us maybe taking just two or three patients in the first week, while we understood the complexity of working in a new environment with a new disease, and that is what we did’. In the end the Save the Children Charity was the only organisation that stepped up to run the hospital. One of the great things at the International Disaster response Expo is that Mike will be there, giving his warts and all account of the challenges he faced and the frictions between different organisations. His talk has been timed in a group with many agencies like those involved and he will then chair a panel discussion. If ever there was a session that will bring out real lessons from a challenging, practical and deadly event, it is this. The synergy of co-locating this first event alongside the International Security Expo is clear as there is so much cross over in planning, information requirements, communications, and other technologies as well as general interests of the over 50 country delegations and of over 4,000 of the visitors to the International Security Expo who had indicated in their profiles they worked in the area of disaster response. This two day, free-to-attend event on 28-29 November 2018 is one that in its first year is likely to set a very high benchmark. As you can tell, the content alone is fascinating. L





PROJECT SERVATOR With the British Transport Police having opened its first regional counter terrorism hub in Birmingham in May this year, the force provide an update on its work across the UK’s transport network

TERRORISM AND TRANSPORT: DISRUPTING AND DETERRING T he British Transport Police (BTP) polices Britain’s railways, working with rail operators to ensure the safety of the 8.6 million passengers who use the network every day. The force also polices networks such as the London Underground, Midland Metro tram system and Glasgow subway. BTP officers were the first emergency responders to arrive following the Manchester Arena attacks in May 2017, providing lifesaving care to the injured and making the area safe for other emergency services.



The following month a BTP officer, PC Wayne Marques, was seriously injured as he attempted to protect members of the public during the London Bridge attack, while the force’s armed officers formed part of the specialist response to that incident, working alongside members of the Metropolitan Police and City of London Police. In more recent months BTP officers have been deployed to protect the public at some of the country’s most significant events, such as the UEFA Champions League Final in Cardiff

TRANSPORT and the World Athletics Championships in London. The force will also be involved in the policing of Christmas markets and festive events in Birmingham, Manchester and Scotland during the festive season. Such operations involve a range of specialist anti-terrorism policing, such as armed officers, search dogs and behavioural detection teams (BDOs), all of which form part of the force’s Specialist Operations unit. Since 2017, specialist BTP officers have also been deployed on trains outside London as well as within the capital, and, in May 2018, the force opened its first regional counter terrorism hub in Birmingham. Speaking at the launch of that establishment, superintendent Chris Horton, BTP Specialist Operations, explained: “This provides us with a regional base for our specialist operations teams which means we can better respond to incidents should they occur, as well as patrol the network more effectively, reaching most of the country in a relatively short space of time. “Our specialist officers are there to reassure, protect and respond to any incident should the need arise. They will be highly visible on the network and particularly around Birmingham New Street station, engaging with the public every day so people will get used to seeing them. In the current climate, we know how important it is to make sure we have specialist officers in the right place at the right time to keep people safe.” BTP’s counter terrorism activities also include providing awareness training for staff members from the rail industry and associated businesses. Under the ACT-Action Counters Terrorism banner, the programme is delivered at locations across the country, and aims to equip individuals to detect, deter and report terrorist activity. The sessions cover topics such as possible methods of attack and how to recognise terrorist reconnaissance, while also aiming to build effective working relationships between rail staff and BTP officers, empowering people to report suspicious activity. In particular, rail staff members are told to be aware of people who may be showing interest in restricted areas or appear to be checking security arrangements, for example filming CCTV cameras at a station, or avoiding rail staff and police officers. PROJECT SERVATOR BTP officers continue to play an important role in Project Servator, an initiative that was initially set up by the City of London Police (in February 2014) and introduced by BTP in November 2015. Project Servator deployments are unpredictable and designed to be highly visible. Their aim is to make the rail network an uncomfortable

WHILE LONDON HAS SEEN THE MAJORITY OF PROJECT SERVATOR, OPERATIONS, THEY HAVE ALSO BEEN STAGED IN MANCHESTER AND BIRMINGHAM, IN ADDITION TO WALES AND SCOTLAND place for criminals to operate, while simultaneously reassuring members of the public and rail staff. Operations use high-profile techniques such as officers in uniform and hi-vis clothing, in addition to search dogs and armed police. They are intended to appear unpredictable in terms of where and when they take place and can happen anywhere and at any time. Deployments involve officers who are specially trained in identifying criminality. In particular, Project Servator officers

will be looking for anyone who might be carrying out hostile reconnaissance or who may have other malicious intent. Hostile reconnaissance can be defined as the purposeful observation of people, places, vehicles and locations, with the intention of collecting information to inform the planning of a hostile act against a target. Criminals, whether extreme protest groups, organised crime groups or terrorists, have to conduct hostile reconnaissance in order to plan a E




 successful attack. Project Servator patrols aim to disrupt and deter them at an early stage, with the intention they will abandon their plans. Tactics such as these help to create an enhanced and strategic approach to protecting the critical national infrastructure and are part of BTP’s drive to deploy its resources more effectively. DETERRING TERRORISM Project Servator is a standardised and consistent approach across many UK Police Services to disrupt, detect and deter terrorism, and all crime types during the act and during the planning stages. This is achieved by completing unpredictable and highly visible deployments using an agreed engagement method. BTP Specialist Operations Inspector Peter Day comments: “Project Servator is of great value to the railway network,

BY INTERACTING WITH RAIL STAFF AND BUSINESSES AT RAILWAY STATIONS, BTP IS HELPING TO DEVELOP A CULTURE OF VIGILANCE; RAISING AWARENESS OF HOW TO REPORT SUSPICIOUS ACTIVITY because it involves officers engaging with local businesses, train operating companies, station staff and the travelling community, encouraging the reporting of suspicious activity through clear and simple methods, such as texting or contacting local Neighbourhood Policing Teams. As a national police service, BTP is continually forging new joint working with other Project Servator police services, completing joint deployments. In so doing we are disrupting, detecting and deterring terrorism and all crime types across the UK.”

The use of specially trained officers, such as BDOs, has proved to be highly effective in detecting criminals and those with criminal intent. Project Servator operations also increase the opportunity for interactions between police officers and the public, providing further reassurance to people and helping to deter and detect other criminal perpetrators. By interacting with rail staff and businesses at railway stations, BTP is also helping to develop a culture of vigilance; raising awareness among rail staff and the travelling public of how to report suspicious activity. This combines with highly visible communications tactics, including adverts on digital screens, audio announcements, social media posts and media and online coverage. Messaging is also consistent across all police services, to ensure the brand is instantly recognisable as Project Servator. In addition, surveillance is provided via a network of CCTV cameras, with officers working with operators to identify criminals and suspicious behaviour. While London has seen the majority of Project Servator, operations, they have also been staged in Manchester and Birmingham, in addition to Wales and Scotland. L




Redi-Rock Vehicle Security Barriers (VSB) ...The vehicle security system that protects from vehicle impact

To see the VSB in action Scan the QR Code

BSi specification PAS 68:2007 V/7500(N2)/48/90:1.6/0.0

Utility / Critical Infrastructure Buildings of High Importance Military Facilities Crowded Places Civil / Nuclear Installations Transport Hubs


T: 01179 814500 F: 01179 814511 E:

Fast to install Lego™ like system security blocks Removable / Relocatable No ground anchor - uses its own weight. Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 km/h (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment


With this year’s Christmas markets just around the corner, visitor safety and security is at the forefront of organisers’ minds. Iain Moran discusses the alternative security measures that organisers can implement this year to avoid creating a ‘fortress mentality’ while still keeping people safe

SAFEGUARDING THE PUBLIC THIS FESTIVE SEASON T he festive season is almost upon us, and with it, the return of Christmas markets across the UK. The Christmas market has become an established feature of the festive landscape, with both capital cities and smaller towns joining the craze in recent years. As well as bringing local communities together to get into the holiday spirit, they’re a key tourist attraction, attracting visitors from far and wide and providing a significant boost to the local economy. However, this additional footfall to towns and cities also brings greater

security concerns. Over the past couple of years, we’ve seen a sharp rise in vehicleramming attacks across the world. Hostile vehicles are becoming the weapon of choice for terrorists - they’re easy to obtain, they can inflict large amounts of damage in a short space of time and, unlike explosive devices, they require little skill to operate.   Densely populated, highly accessible areas are vulnerable to these devastating vehicle attacks, and Christmas markets are no exception. The Berlin attack of December 2016, which saw a lorry smash into a Christmas market, E



PERIMETER SECURITY  killing 12 people and injuring 56, showed that crowded Christmas markets have unfortunately become a target for hostile vehicle attacks. While these incidents should not disrupt our way of life, it’s vital that steps are taken to ensure that the public is as protected as possible at events such as these. Serious consideration needs to be given to protecting crowded markets so that they are safe for everyone to enjoy the festivities and get into the Christmas spirit. STRENGTHENING SECURITY Last year, many event organisers in the UK sensibly took steps to avoid a repeat of these tragic events. Heavy police presence was seen across cities including London, Birmingham, Manchester, Leeds and Edinburgh, with armed officers patrolling festive attractions as well as plain clothed officers mingling amongst crowds. Staff at some markets were provided with antiterror training, there were increased security checks, and temporary concrete barriers were placed around many Christmas market sites. Although erecting strong, sturdy barriers around public spaces can be an effective deterrent to prevent vehicles from targeting a site, performance within a Christmas market installation can be limited.

Large concrete blocks around a perimeter are not only visually unappealing, but also prevent the free flow of pedestrians and restrict entrance and exit to designated points. This actually creates vulnerable queues outside the ‘protected zone’, which is far from ideal. It has been proven that some of these surface mounted blocks slide on impact, creating a crushing effect in close proximity to crowded places. For temporary events, like Christmas markets, surface-mounted bollards and barriers which consider pedestrian flow offer a sensible alternative. These are barriers that don’t need bolting down, so are quick and easy to deploy, avoiding lengthy and disruptive road closures. They can be pedestrian permeable, allowing people to easily manoeuvre in and out of the barriers, which aids the flow of visitors accessing the site and avoids queues or crowds from forming. Importantly, most surface-mounted barriers are specifically designed to withstand the force of a moving

vehicle up to a certain speed and weight, so they are a highly effective form of hostile vehicle mitigation. SAFETY WITHOUT STRESS To make people feel reassured when visiting public events, like Christmas markets, visible security measures can go some way towards showing that steps have been taken to keep them safe. Indeed, our research last year revealed that 29 per cent of people would like to see more visible security measures put in place at events to make them feel safer. However, sometimes the natural response to seeing extra security can sometimes be one of fear or concern that the extra measures reflect an increased level of danger. A balance should be achieved where the public feel safe, reassured and comfortable, without the security measures creating a ‘fortress’ mentality or proving too disruptive. Visitors should be able to enjoy the festivities of a Christmas market, without having their overall experience compromised. E





REDUCING RISK: BEST PRACTICE PERIMETER SECURITY Heras are at the forefront of perimeter security and provide effective, protective strategies against the risk of attack While every organisation has their individual security requirements and their physical security installations may differ, the 4D+C methodology remains true across industry sectors. From those requiring high security solutions such as utilities, critical national infrastructure (CNI) and governments, to those looking for commercial solutions such as transportation, manufacturing and industry.

It only takes one attack to damage an organisation. Physical perimeter security measures are often the first line of defence against a malicious attack because it protects infrastructure, people and assets and ensures business continuity. It reduces vulnerabilities and the fallout from careless behaviour and gives criminals fewer opportunities to exploit weaknesses. Heras, one of the leading perimeter security specialists, believes that, in order to provide the best chance against attack, organisations must take a holistic approach to perimeter security. Its 4D+C methodology combines demarcation, deterrence, detection, delay and controlled access, which form a reliable layered protection solution to ensure effective and seamless perimeter protection strategies. Firstly, demarcation defines the boundary of a location where a protective barrier or fence should be installed, which helps deter potential attackers. A security-rated fence combined with appropriate signing offers an ideal deterrence. Combining the watchful eyes of trained security professionals with technology, like a Perimeter Intrusion Detection Systems (PIDS), is the best way to detect suspicious behaviour at the perimeter. While no barrier or fence is impenetrable, solutions must be built to maximise the time it takes to breach the perimeter, delaying attack before and after detection has taken place. Controlled access is vital to ensure entry is gained only by authorised people.


HIGH SECURITY SOLUTIONS Some organisations need top security measures because they either face greater risk of attack or they house top secret or operationally sensitive information or people such as high security areas within power stations, research centres, oil and gas terminals, military, government and utility sites. This means their perimeter security solutions must be of the highest standards and offer the best possible protection against attack. An example of a high security perimeter protection solution would comprise: High security fencing, such as Heras Zenith SR3. This is a welded triple skin mesh fence creating a secure demarcation and deterrent. The mesh 358 is tightly configured ensuring there are no toe or finger holds. Security toppings such as barbed wire can be added to further reduce risk of attack, vandalism and forced entry; A premier intrusion detection solution (PIDS) such as Heras-owned Geoquip Cyber Assurance of Physical Security System (CAPSS) - the first and only PIDS on the market to have received CPNI approval – to identify unauthorised personnel crossing a perimeter and protecting IP security systems from cyber attack at the perimeter. The detection technology is integrated with the organisation’s overall security management system so that control room staff can be notified in real time of any potential intruder. The system could also be incorporated with other perimeter protection products such as cameras or access control systems, limiting the ability to hack the entrance;


High security bi-fold gate such as Heras sGate, designed to provide highly reliable and safe entrance control as well as fast and continuous operation and flow. The gate opens and closes in a matter of seconds, providing quick, controlled entry, and locks securely to prevent unauthorised vehicle or pedestrian access. It seamlessly integrates with other perimeter security solutions. COMMERCIAL SECURITY SOLUTIONS Manufacturer, logistic centre and retailer risk assessments require slightly less comprehensive perimeter protection because they generally are less at risk of sophisticated attack and have fewer high value assets on site. These organisations could consider a commercial security solution that includes: Welded mesh fencing system such as Heras Pallas Xtra, a rigid and robust Secured by Design fence that combines specialist security fixings to create an extremely secure demarcation and deterrent; A premier intrusion detection solution (PIDS), such a that includes a sound system, alarm light, for example, to detect unauthorised access. Such a PIDS system operates in zones so that if there is an attack, the control room knows exactly where it is for faster response from either police or security teams; Rugged and reliable turnstile allowing pedestrian access control. The turnstile grants entry to one person at a time, allowing for a safe and regulated yet high frequency flow of people and a programmable control unit interfaces to most access control systems. Heras will be demonstrating both a high security solution and a commercial security solution at the International Security Expo 2018 on the 28-29 November at London Olympia, stand number C50. See these solutions in action and be the first to learn about Heras’ new product line that will be announced at the show. Heras is an expert in perimeter protection and preserving business and so knows how to make security a top priority. Since its inception in 1952, Heras has helped a range of businesses around the world create a safe environment for their customers, suppliers, partners and employees. To make an appointment to meet at the International Security Expo 2018, please call 0808 164 2250 or email Or visit Heras at stand C50 and see Heras’ presentation on How to Build your Perimeter Protection Strategy on day one of the show. L



 One way of achieving this is to consider the appearance of barriers and bollards and how they will fit in with the surroundings. While concrete barriers provide some protection, their size and crude aesthetic appearance can make them seem intrusive. However, security systems don’t need to be an eyesore to be effective, as they can be specifically designed to subtly blend in with the environment they’re deployed to. Permanent and temporary security barriers can be customised with sleeves, symbols or advertising slogans to look less imposing and fit in with their environment. Last year, some local authorities took particularly festive steps to soften the visual impact of anti-vehicle barriers at their Christmas markets. In the city of Bochum in Germany, authorities placed 20 1.2-ton pellet bags downtown for their Christmas market, which were then wrapped up to look like Christmas gifts. Hull took a similar tactic, turning the concrete barriers around Queen Victoria Square into Christmas trees. With this in mind, authorities should give serious consideration to the design and appearance of their security measures to help Christmas market visitors to feel more comfortable this year. With millions of visitors expected at Christmas markets in cities and

WITH THIS IN MIND, AUTHORITIES SHOULD GIVE SERIOUS CONSIDERATION TO THE DESIGN AND APPEARANCE OF THEIR SECURITY MEASURES TO HELP CHRISTMAS MARKET VISITORS TO FEEL MORE COMFORTABLE THIS YEAR towns across the UK and Europe this year, increasing security around these areas has to be of the highest priority. With a variety of innovative barriers now available that can either be rented or bought, and deployed in a matter of hours, there is no excuse for the general public to be left vulnerable this festive season. COUNTER TERROR MEASURES FOR THE ROYAL SHAKESPEARE THEATRE Reports have claimed that counter terrorism measures to protect the Royal Shakespeare Theatre from attacks are to be in place next month. A six month trial placement of the bollards aim to prevent vehicles being able to mount the pavement outside the world-famous theatre, following a number of terrorist attacks across Europe using vehicles as weapons. As part of plans, new bollards will be installed on the paved area at

Waterside in September, while a oneway traffic system on Sheep Street and Chapel Lane will be put in place. Discussing disruption the the local market, Tony Jefferson, leader of Stratford District Council, said in August: “This is all about security measures to keep the RSC safe and it all has a knock-on impact. It is a trial and Stratforward will be consulting with businesses during that time to get their views. In reality the security threat is not going away and something needs to happen.” Stratford has already seen some security measures put in place with temporary barriers installed at special events such as the Shakespeare Birthday Celebrations and the Christmas Lights Switch On. L





PANEL OF EXPERTS Current systems for immigration and customs in the UK were built nearly a half-century ago, limiting the progression of technology and hindering necessary information-sharing. Given the issue of Brexit-related soft borders, is it now time for new lines to be drawn?

TECH AND THE POSTBREXIT LANDSCAPE SIMON DAYKIN, CHIEF TECHNOLOGY OFFICER, LEIDOS Simon Daykin is chief technology officer for Leidos UK’s Civil, Defence and Health business units, providing strategic business technology leadership for UK customers. Motivated by the benefits technology can bring, Simon is passionate about supporting digital transformations through strategy, design and delivery to solve some of the most challenging problems in today’s world. Before joining Leidos, Simon served as chief architect of NATS and CTO of Logicalis.


n today’s digital age, our borders are no longer simple lines drawn on a map and border crossings do not only take place at distinct points of entry along those lines. From a business and security perspective, to operate efficiently in this environment of fluid border crossings, border service organisations require visibility of who or what is entering the country, as well as ensuring that people who are meant to leave by a certain date do so. Sharing data is at the heart of this. However, the problem that the UK


PAUL PARKER, SOLAR WINDS Paul Parker brings over 22 years of IT infrastructure experience, having worked with multiple miltary, intelligence, civilian and commercial organisations. Paul has received multiple military and civilian awards for service, support and innovation, having served as vice president of engineering for the federal division of Inflobox, an IT automation and security firm, as well as holding positions at CS2, Ward Solutions, Eagle Alliance and Dynamics Research Corporation.

faces, particularly as it prepares to leave the European Union, is that current systems for immigration and customs control have evolved over 50 years, layering legacy software system upon legacy software system. Organisations and government departments involved in the border process can find themselves working in information silos, meaning that data is being shared inefficiently. Furthermore, a wholesale revamp of the UK’s customs and immigration systems isn’t practical or cost effective


but visibility into these systems and their information sets is required. Border services organisations, such as Border Force, HMRC, intelligence services and law enforcement, among others, can leverage digital technologies and analytics to facilitate customs and immigration decisions regardless of which ‘silo’ the information was created in. The good news, as outlined by Paul Parker, is that we can implement technology and connect different agencies with shared information faster and safer than ever before. In short, there is no technological reason that border security should be outdated. Organisations need to define what information and data is required, at what velocity and level of detail. Understanding the required information sets allows technologists to determine the data model and interfaces required to ensure secure, reliable and appropriate access with minimal necessary duplication. INTEGRATED TECHNOLOGY SOLUTIONS Simon Daykin is in agreement. Sharing his thoughts on the issue, he told Counter Terror Business that integrated technology solutions, such as advance passenger screening, virtual cargo screening and customs fee automation, as well as analytics that highlight people and cargo deserving closer inspection, are required. Such innovations will result in better flow management, improved intelligence and early decision targeting and interventions - essentially creating a safer more secure and efficient border. From Parker’s IT perspective, postBrexit border security should be an easy process. You scan your passport at the border, and it should flag whether you are allowed to enter the country. Radio-frequency identification (RFID) and chips in passports, biometric scanners, and records databases are all there to enable this.




However, he identifies uptake, interoperability, and communication between different border forces and agencies as the main obstacles that need to be overcome: essentially, it’s about the human factor. Overcoming the human challenges around culture and communication will take time and collaboration, and while that’s going on, it may be worth considering some of the supporting infrastructure that can help. Paul Parker highlights the example of an approach currently being used in the United States. Preauthorisation (TSA PreCheck) sees citizens pre-vetted to speed up the immigration process at the point of entry. In addition, thanks to collaboration between private entities and the US government, the CLEAR membership scheme collects additional biometric data on participating individuals in advance of passing through immigration, to speed up vetting and allow approved individuals ‘fast-track’ access. In the UK, it will be important to enable this kind of interconnection between public and private, alongside more collaboration between the police and border forces. A big part of enforcing new border controls will be ensuring that people also leave the country when they are expected to do so. This means that entry visas, existing criminal records, and biometric information like fingerprints need to be cross-checked to reliably monitor the legal status of people entering and exiting the country. IMPROVING THE BORDER Sharing data can considerably simplify a task, such as clearing a cargo container through customs. When cargo described in a manifest appears to match the images of

items from an X-ray screening of a cargo container, the probability of the cargo manifest being accurate rises. The need to open the container and perform time and resource intensive, hands-on inspections of the cargo upon arrival in port declines. Machine learning and AI software can be designed to fuse data from manifests, with images from X-rays, to flag shipments for closer inspection when the results do not appear to match. On a smaller scale, data from customs declarations by individuals can be similarly fused with x-ray data on luggage to accelerate travellers’ passage through airport customs. By permitting data to do more ‘heavy lifting’ for customs and immigration, we can share that data across departments and create operational cost savings for border services organisations. That way borders services organisations such as HMRC, Border Force, Immigration, and Port Authorities can continue to generate data using the software it chooses, but it would be shared to generate actionable intelligence. However, this approach to data sharing will require new levels of standardisation, system reliability, and security. Any technology connecting public and private entities, like the one being implemented between the NHS and Private Healthcare Information Network, needs to be supported by well-monitored, well-maintained networks that enable different organisations to use one repository containing all necessary information relating to a person’s immigration status. However, such a comprehensive system will require sophisticated access management, endpoint security, and event logging to ensure it’s only being accessed by the right people for the right reasons. L

SIMON DAYKIN, LEIDOS “Brexit negotiations have made the process of border management as the centrepiece of policy negotiations which has placed these set of processes as a major investment item for the UK government. At the operational level, agencies and departments now have the platform to debate and set out what investments need to be made and with what priority to support a safe, secure and better border. The challenge today in the UK is that this data is spread across many systems, layers of technologies and organisational boundaries. “Ensuring smart people have access to smart data provides a more effective and lower cost operation and will provide a border that is fit for purpose. Now is the time, whatever happens with Brexit, to break down these silos and invest in our border management capabilities and processes.” PAUL PARKER, SOLAR WINDS “Utilising technology such as log and event management will be important to the success of cross organisation communication technology—much less flashy, perhaps, than deploying new iris scanners, but hugely important in maintaining the security and integrity of the shared services network. Having a method to track record access, access duration, and events related to the records will be critical for proving that the system is not being misused and is updated regularly by the right people. “With a trusted network linking different endpoints from police forces, to border control agents, to immigration officials, down to the physical passport and biometric scanners, the UK can build a more comprehensive immigration and customs system that will be fit for the challenges of a post-Brexit landscape.”




CRITICAL COMMUNICATIONS The critical communications sector needs to provide new solutions and technologies that not only meet existing challenges posed by emergency situations, but can also be integrated into existing technologies as well




Jackson White is business development director at Getac UK where he is responsible for growing the organisation’s defence, security and first responder customer base.

Nick Paris is one of the radio industry’s most experienced system designers.

Simon Hill is an experienced technical director at Excelerate Technology Ltd, with a demonstrated history of working in the telecommunications industry.

After joining the Royal Corps of Signals at 16, where he looked after general communication systems, Jackson supported Special Forces operations for 10 years. He then moved into the corporate world where he oversaw future technologies and innovation for video surveillance and communications systems organisations.


he development of the terrorist threat over the last few years, never mind the last couple of decades, has meant that security services and emergency responders must be prepared to deter and react to a number of differing threats from a number of differing places. Since 9/11, the UK government and international security departments have had to contend with weapons of mass destruction, a concerning rise in cyber attacks, the possibility of biohazard airborne attacks and,


Nick has designed, installed and supported systems using a wide range of technologies, from conventional analogue, MPT1327, DMR Tier II and Tier III solutions. His installation experience includes large skyscrapers in London’s financial district and nuclear power stations. He also sits on OFCOM’s technical advisory group, and has pioneered the design & specification of Endurance Technology®.

most recently, vehicular attacks from home grown radicals. In fact, using 9/11 as our example, an excerpt from the 9/11 Commission Report highlighted the damage of not having an emergency communications protocol in place. It said: “Effective decision-making in New York was hampered by problems in command and control in internal communications… The Port Authority’s response was hampered by the lack both of standard operating procedures and of radios capable of enabling


Simon is skilled in service delivery, technical support, mobile communications, Radio Frequency (RF) and VSAT.

multiple commands to respond to an incident in unified fashion.” Closer to home, Inspector Simon Davies of the Greater Manchester Police and the North West Counter Terrorism Unit gave a presentation at a BAPCO event in Newcastle on the work he and colleagues completed as Airwave Tactical Advisors following the bombing of the Manchester Arena on 22 May 2017 which killed 22 people. The audience sat in near silence as he talked about the issues of the operation which lasted




PANEL OF EXPERTS weeks, rather than the days most of us would think about. There was no doubt that communications were vital to all of those agencies involved and to ongoing public safety. As important as providing the right equipment to allow responders to do their job, is providing the right systems and assistance to allow them to communicate. In this day and age that starts with the first person to report an incident, usually a member of the public, rather than after a control room has received a call and dispatched resources. The ability to collect, interpret and share the information provided by a caller already at the scene can be vital in providing the best and most appropriate response to an incident. By harnessing the technology carried by most members of the public, emergency services can get ahead of the game in their response times and actions. Ask once, record properly and share as often as necessary has to be a requirement of really working together and providing the best response. Yet while steps have been taken to increase preparedness against these attacks in the last 15 years, with the recent Budget announcing an extra £160 million on counter terror policing next year and expensive and protective measures being implemented for President Donald Trump’s Summer visit, how much attention is being given to the glue that holds preparedness and response together: communications? CONNECTED COMMUNICATIONS As we become more connected – so do our lives and daily routines. In 1987 the means of communication was limited to landlines, analogue CCTV, limited data over command systems and analogue duplex radio. Today, how would you manage to get through a typical day without your mobile phone for example? It seems almost impossible when you consider its use for making calls, social media, getting directions or even adjusting the temperature of your home. It is clear that we are more efficient when we are connected and the same applies to responders in the field – by being able to carry out important tasks remotely, responders reduce duplicating efforts and workflow inefficiencies. The fluctuating availability of terrestrial networks poses a serious challenge for responders trying to access and share reliable content remotely and can often become unusable in situations when it matters most. Lessons learned show that communication plays a significant role in the outcome of an event and due to the unpredictable nature of responses, terrestrial networks should not be solely relied upon. Emergency Responders need a variety


of solutions to ensure maximum resilience so that operational assets are fit for purpose. A resilient and private data network over multiple bearers, such as 3G, 4G, LTE, COFDM and Satellite, ensures that responders are able to share time-critical data, video and voice securely in all environments. This includes instances when terrestrial networks are congested, under threat or suffering from disruption. The public expect their services to be using at least the same technology as them and the best available. Broadband is the new expectation. 4G and even 5G are the new buzzwords along with LTE. It’s no longer enough just to talk to pass information, it’s vital to be able to share data and to share it immediately. Public safety communications and technology is following what is available to the public and to business. There is a move away from the ‘old’ radio systems to the ‘new’ communication systems. The UK is at the forefront of implementing the new technology. The government’s Emergency Services Mobile Communications Programme (ESMCP) will deliver a new Emergency Services Network (ESN) using the same technology we are all familiar with for our mobile phones and based on a commercial, rather than a bespoke, network provided by a commercial partner.

THE INTERNET OF THINGS Information and data are the lifeline of any organisation. If not available, and shared freely, responders in the field will struggle to collaborate with one another as well as other responding agencies. The growth of IoT (Internet of Things) represents our increasing ability to share information globally. By sharing data between vehicles, assets and people, the most up-todate, accurate information is readily available for continuity of knowledge and shared situational awareness. The convergence of IoT and incident response enables a fully connected incident ground with any number of integrated ‘smart’ technologies. With a resilient and secure communications infrastructure in place, responders are able to monitor the unfolding situation and share those insights in real-time with commanders whether they are in the field, on-board a command and control unit or back at headquarters. Current applications include mapping, command software, vital signs monitoring, access to the cloud, video streaming and more. In order to evolve into a new efficient digitally enabled organisation, learning from past events, analysing the current capability and staying tuned into current developments are effective methods for carrying out a true gap analysis and needs assessment. True

INFORMATION AND DATA ARE THE LIFELINE OF ANY ORGANISATION. IF NOT AVAILABLE, AND SHARED FREELY, RESPONDERS IN THE FIELD WILL STRUGGLE TO COLLABORATE WITH ONE ANOTHER Expert in radio communications, Nick Paris says that combining ‘broadband’ communication methods, including the aforementioned Wi-Fi, 4G and LTE, with a traditional radio is an exciting proposition. Whilst two-way radio is highly resilient and reliable, its limitation is that it only allows a limited amount of data to be transmitted to the device making transmission of photos, videos or large amounts of information out of the question. Adding broadband capability into the device breaks down this barrier, and opens up many more possibilities. The next evolution in radio is the arrival of LTE, or PTT-over-cellular, devices. Instead of using traditional RF radio to talk to other users, these devices communicate to a server in a data centre over Wi-Fi or a 4G/LTE network. This will mean that traditional radio coverage constraints no longer exist, whilst also opening up the possibilities for convergence with other platforms, applications and systems.


digital transformation can only happen when a clear understanding of what your organisation and most importantly the people you serve expect today and will expect in the future. BLENDED COMMUNICATIONS Without a working and effective communications system, an emergency response operation will not be able to be carried out properly. As Jackson White points out, blended communications is important because it delivers the ability to fuse data – where different architectures, devices and systems all deliver data to one system – which gives security organisations a tactical advantage. It provides the ability to handle, manipulate and analyse data from a myriad of systems and IoT devices – ANPR, CCTV, bodycams, smart devices, AR etc. This form of blended communications gives operational advantages and provides greater inherent resilience because of how it draws down and disseminates data and communications.


EXPERT FINAL THOUGHTS JACKSON WHITE “Rolling out a new system can take 18-24 months, by which point the technology can be almost obsolete. We see that time and again with delays to deploying any bleeding-edge infrastructure, where the desire to deploy the newest technology is thwarted by the time it takes to build and deploy it. So open architecture provides the means to ensure robust, future-proofed systems, while also fulfilling the need for backward compatibility. It’s our strategy to be compatible with legacy, current and future technologies, so we never force in the latest technology at the cost of legacy. We find a way to enable both.”

A strategy around blended communications needs to recognise the vital role of inter-agency interoperability in terms of how the services work together on operations and the communications protocols they use. The differing communications systems and the differing procurement cycles of government departments means that we’re not going to see a common architecture at any time soon. Consequently, the security services base their planning for resilient communications on open architecture that will allow all key stakeholders to integrate their communications. INNOVATIVE TECHNOLOGIES Designed with ease of use in mind, Excelerate’s new Portable Hub enables real-time data, video and voice applications – with enhanced roaming capability. This smart 4G Hub can plug in to any fleet vehicle or be deployed elsewhere within the incident ground for enhanced and extended communications capability. Connex Hub, a vehicle-based compact box, has the addition of a built in CPU for Excelerate’s Digital Dashboard Management Interface (DDMI). DDMI, combines all systems and applications in to one easy-touse interface and is currently being utilised by the majority of our customer base. This solution is fully scalable and customisable to user-needs and supports 3rd party integration.

Returning to radios, last year’s release of the Hytera PDC760 advanced multimode radio was a game-changing moment for the radio industry. It not only provides a fully featured DMR radio for true critical narrowband voice communications but it also combined a full-sized Android smartphone, opening up the possibilities for data rich organisation-specific platforms, such as building management, customer relationship management or point-of-sale applications. The next evolution in radio is the arrival of LTE, or PTT-over-cellular, devices. These devices communicate to a server in a data centre over Wi-Fi or a 4G/LTE network. This will mean that traditional radio coverage constraints no longer exist, whilst also opening up the possibilities for convergence with other platforms, applications and systems.L


NICK PARIS “Equipping users with lots of pieces of technology, each with their own specific function, is expensive, difficult to maintain, and lacks the level of cross-platform integration required for an efficient workplace. Providing users with one reliable device such as the Hytera PDC760 which fulfils all of their needs, operating on a clients wholly owned resilient critical infrastructure whilst also allowing access to data rich third party services is a very compelling option.” SIMON HILL, “As technology becomes smaller, innovation has continued to grow with the launch of a number of new products. The demand for these solutions is rising, as responders adopt a more digital way of working and with a need for portable devices that can be used on the move – feeding back information en route to speed up processes, enabling more efficient working, supporting interoperability and improving overall safety. “We are continually developing offerings to ensure that customers have the right solutions to address their converged technology needs. Our in-house R&D department monitors leading edge technologies to understand if they can benefit our customers and complement our overall offering.”






THE UK’S LEADING NATIONAL SECURITY EVENT Meet face to face with over 10,000 security professionals

200+ Free-to-attend seminar sessions

350+ Exhibitors - Explore the latest products and solutions

Benchmark strategies with the security experts from over 100 countries


Part of UK Security Week




SCTX Security & Counter Terror Expo, taking place on 5-6 March 2019 at Olympia, London, is a world-class showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe


fter celebrating its 10-year anniversary, Security & Counter Terror Expo (SCTX) is launching a brand new decade with its 2019 edition. The goal of the 2019 campaign is to see a more joined-up approach in connecting the government, wider public sector and security individuals with the aim of preventing terrorist attacks. This vision informs a key theme of this year’s event, which is improving the communication channels from central government to local communities. Working in close partnership with the National Police Chief’s Council (NPCC) and Counter Terror Policing (CTP), SCTX will continue to establish itself as the leading business and networking platform for security professionals. More than ever before, the event will be centred on fostering community within the security sector and building valuable relationships with various

government agencies, national operators and local authorities, all of whom work in tandem to execute the CONTEST Strategy. SCTX 2019 will bring together 350 leading suppliers and over 10,000 senior security professionals from 100 countries representing a comprehensive range of sectors: government, private sector, Critical National Infrastructure, defence and military, law enforcement, transport security, border security, security services, crowded places/ major events and emergency services. The event will provide plenty of networking opportunities for likeminded industry professionals to discuss security issues, gain valuable insights and forge new relationships. SCTX 2019’s education programme is specifically built to engage senior security professionals in topical discussions such as CNI Protection, Transport & Border Security and E





Every day.

Ordinary days require extraordinary protection.

Find out more about the software behind the everyday at

Š 2017 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.


SCTX WILL FEATURE FOUR STRATEGIC CONFERENCES TO REFLECT THE LATEST DEVELOPMENTS IN THE SECTOR  securing Crowded Places. In particular, the internationally-renowned World Counter Terror Congress brings together global experts to share national updates on counter-terror strategy, operations and policy, examining the key areas of Prevention, Pursuit and Protection from international terror threats. NEW FEATURES AT SCTX 2019 The national security landscape has evolved immeasurably over the past decade, with domestic attacks becoming more prolific than ever before and threat levels rarely changing from ‘severe’. SCTX 2019 will feature four strategic conferences to reflect the latest developments within the security and counter terror landscape. Armed Response & Intervention Conference Both in Europe and further afield, the risk of a Paris-style attack remains a real threat. In such situations armed intervention forces provide the only barrier standing between perpetrators and a catastrophic loss of human life. The Armed Response and Intervention Conference offers a dedicated platform for the discussion of operator-focused training, tactics techniques and procedures (TTPs). Crowded Places Conference ‘Soft targets’ and crowded places such as stadiums, shopping centres, airports,

stations and major events will continue to be a target for terrorist activity. These are places that are easily accessible and often have minimal security. Senior security professionals, owners and operators from over 100 countries will gather at the Crowded Places Conference to benchmark strategies, discuss best practices and explore latest technology for protecting people in the best possible ways. Transport & Border Security Conference As nations seek to advance their resilience and ability to respond to the global terrorist threat, security of external borders and internal transport networks is paramount. With the support of British Transport Police and Civil Aviation Authority the Transport & Border Security Conference will deliberate best practice for the defeat of this highly mobile and truly international threat. CNI Security Conference The UK’s national infrastructure and associated assets, as well as a broader range of UK businesses and organisations, currently face threats from international and domestic terrorism, espionage and increasingly hostile foreign activity. The CNI Security Conference will discuss new strategies and explore solutions to reduce the vulnerability of the national infrastructure to terrorism and other threats.

Throughout 2018, the national security landscape has remained turbulent as terrorist attacks continued to afflict the UK and the rest of Europe. In this critical time, SCTX plays an important role in bringing together the entire security community to discuss challenges, benchmark strategies and explore the newest technologies to combat terrorism. SCTX covers the full security lifecycle, following the four P’s of counter terror. From preparation (the CNI Security Theatre), through to pursuit (the world-leading Forensics zone), every step has top-level discussions and key decision-makers present. It allows government, first responders, corporate experts and academics to come together in pursuit of improved approaches to preventing terrorism. Don’t miss the best event of the year for security professionals. COUNTER TERROR AWARDS Taking place alongside the Security & Counter Terror Expo, the second Counter Terror Awards will be held at the ILEC Conference Centre on 5 March. Staged to recognise the efforts of organisations and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats, organisations will be recognised in twenty categories for their contributions to reducing the threat from global terrorism. L




Do you need the last civilian technology to secure the low airspace above your critical infrastructures or outdoor events from malicious drones? Drone Detection Sys is your C-UAS expert to protect the 3rd dimension. For more info: Email: Phone: +41 79 544 48 37

DRONES With the Countering Drones conference taking place this December, Perran Bonner looks at the current regulation of the UAV industry and whether the speed of technology advances is helping or hindering security services

COULD DRONES BE THE NEXT THREAT FROM ABOVE? S peed of change within the ‘tech’ industry is considerable, however that speed is particularly evident within the unmanned aviation sector, perhaps in some areas almost comparable to that of the IT industry. Recent events and ongoing concerns around unmanned technology and the security sector highlight a significant divide between the two areas and one that needs careful management in the interests of national security. When considering the security sector as an industry it is an area that typically learns from mistakes or omissions, often losing precious time against developing technology. Parallels could be drawn with the internet and security breaches that have recently transposed. This same problem has been manifesting around UAV capability, in part due to the fact that

no significant attack has been executed on UK soil. This may be true. However, global patterns have seen an increase in the use of small unmanned aircraft as an attack platform on a tactical (local) level as well as their use for hostile reconnaissance. The regulatory environment provides limited scope in dealing with this problem for many reasons, not least because those with criminal intent do not seek training, registration or operational process. Parallels can be drawn with many different areas of security concern, such as legal versus illegally held firearms, with few crimes committed by those who follow home office governance. As technology advances smaller and less obtrusive platforms have the ability to detect and avoid or sense their way around a 3D environment. E



Primetake DB-5 12 Gauge Cartridge • Rapid • Reliable • Cost Effective • Safe Securing National Infrastructure

• CONTAIN • PROTECT • SECURE LPCB GRP & Steel Enclosures Doors, Barsets, Cages and Covers For full listings please refer to red book live


01269 850437 • •


DRONES  Camera technology has become smaller and much more capable, flight times have been extended as the hunger for mobile phone technology drives the development of Lithium Ion Polymer batteries. Of course, availability and affordability of unmanned technology is a major factor. For £1,000 you can now purchase a drone that can sense and avoid, fly autonomously, maintain flight for 28 minutes, gather TV qualify imagery and reach extended ranges of 5km. All of this whilst deploying from a case that is no more than a small handbag and is so non-descript that any discerning security officer would be forgiven for missing or dismissing its presence. In the security context such a small drone is covert prior to flight and due to the small size remains so when airborne, not least as few people spend their day looking skyward for threats to their well-being. All of these developments further the vulnerabilities of those wishing to protect people, infrastructure and reputation. WOULD REGULATION HELP BALANCE THESE VULNERABILITIES? The Air Navigation Order regulates small unmanned aircraft in the 3Dimensional world of airspace and that order was recently amended to further increase the distances that drones should be flown from airport boundaries and limiting heights to 400ft. From a public perspective that is a good move and indeed for those security officers guarding our airports they know that nothing else should be flown within their working boundaries. Of course, that assumes they can see them and that they are aware of these new regulations (or indeed the operator is adhering to these regulations). Therefore, there is another important factor and that is education, informing the security industry of capability and regulation both effecting threat profiles. Therefore, if the technical capability is high and the profile low, making detection very difficult, technology must have a large role in identifying, tracking and countering unwanted drone flight. However, this technology comes at considerable cost and budgets are not widely allocated for counter drone equipment. Some of this equipment has been proven on the battlefields of Northern Iraq where the final assaults on ISIS strongholds were delayed due to the use of unmanned aircraft. Despite the expense there is another area that hinders this development and that is the credibility of some companies making wild claims about their technical ability. This is a common problem throughout the wider drone industry anyway. Any potential counter drone capability has to be considered carefully, perhaps utilising link budget analysis to make sure the threat really is mitigated. By the virtue that drones are now so advanced and operated by firmware

IN EUROPE, THE FOCUS MUST REMAIN ON THE EFFECTIVE IDENTIFICATION OF DRONE INCURSIONS AND THE DELIVERY OF LEGISLATION TO PROTECT SITES AT RISK that controls their positioning perhaps more work should be done around the use of embedded identification from IP data streams. Equally the purchasing process could have a wider role in regulating the ownership and intent of people buying unmanned aircraft. Up until the development of widely available unmanned aircraft the threat posed by the aviation industry was mitigated post 9/11 with the many security measures put in place. Currently we remain at an unknown position where drones could be the next threat from above. Of course, the corresponding development of drone capabilities is also advancing efficiencies in police and emergency service operations. Saving lives, reducing helicopter operating costs, creating new dimensions to crime scene investigation to name a few. Therefore, whilst regulation has limited effect when countering drones many efficiencies are being gained by security services operating them. COUNTERING DRONES The civilian market is moving closer to implementation of technology to detect, identify and neutralise malicious drone activity. However major regulatory hurdles remain before we can see the employment of drone neutralising technology. Law enforcement agencies, prisons, stadia and other facilities should celebrate the current trajectory of drone regulation, which appears to be prioritising safety and enforcement. The threat to civilian life is diverse; in the Middle East drones have become a common terrorist tool, requiring law

enforcement and militaries to adopt counter measure with immediate effect. In Europe, the focus must remain on the effective identification of drone incursions and the delivery of legislation to protect sites at risk. Taking place on 11-13 December at London’s Hilton, Canary Wharf, Countering Drones will provide a unique platform where security professions can share their challenges with governments, regulators and industry, to assist in developing a lens for threat assessment and a framework for progression. Key questions the Countering Drones conference will answer include: What are the recent developments in drone and counter drone technology and how is this technology impacting the security of key commercial and civil facilities?; what are the pros and cons of different counter-drone systems and which nations or sectors are currently employing or planning to employ such systems?; how vulnerable is critical national infrastructure to attacks by civilian drones? What are the current safeguards to protect against this and how can we measure this risk?; what kind of counter-drone solutions should commercial organisations employ, if any, and what might be the legal implications of their use?; and how does industry plan to solve these challenges for government and commercial industry – from detection to disruption? L





How often do you check for new sanctions & PEP’s? Over 1,100 worldwide watch lists changing daily! We provide Daily Monitoring on all of your customers, email alert any new match status, automate most of your Enhanced Due Diligence cases and this is all included in your basic AML cost. With over 1,100 worldwide Sanction & PEP watch lists changing all the time, Daily Monitoring is the only practical solution.

Call us now to book a free demonstration on:

0113 333 9835 Or visit us online:


SMARTSEARCHUK.COM SmartSearch delivers UK and International Business checks in the UK and International Markets with inclusive Worldwide Sanction & PEP screening, Daily Monitoring, Email Alerts and Automated Enhanced Due Diligence.

ADECS The Asia Defence Expo & Conference Series is a leading defence and military exhibition focused specifically on trends and opportunities within the Asia Pacific region



he Asia Defence Expo & Conference Series (ADECS) is a leading defence and military exhibition focused specifically on trends and opportunities within the Asia Pacific region. The local environment and conditions pose unique challenges to defence in this part of the world. Frequent natural disasters require a well-developed and efficient disaster response process, for example. Tropical waters impact platform performance and design requirements. Climate, geography, and regional politics inform training operations. ADECS 2019 provides the perfect platform to connect key local government officials with the wider defence community, and enables over 50 companies to showcase their latest technologies, solutions and systems. It is also host to four conferences that discuss solutions, strategies and incoming trends that will impact and inform regional military defence planning. MILITARY TRAINING Military leaders are increasingly turning to modelling and simulation (M&S) for a number of applications, ranging from the analysis of doctrine and plans through to more efficient and cost-effective training. M&S usage is set to grow with the advance of new technologies in hardware and software. As equipment costs fall, highly detailed and customised simulations solutions have become readily available from a range of advanced suppliers. Military end users can now provide a full range of immersive M&S scenarios, supporting everything from mission rehearsals to live fire exercises. In 2019, the Military Training & Simulation Conference (MilSim) Asia will focus heavily on the next generation of simulation and training technologies, and their application in military and law enforcement training. The use of VR in simulation and systems has steadily risen, offering new methods for developing individual and small unit tactics. This in turn widens the opportunities for blended media training, combining Live and Virtual programmes with war gaming

and computer assisted exercises (CAX). Introducing new training programmes inevitably gives rise to questions around best practices and appropriate design. It’s vital to understand both the current military requirements for M&S in training, and the end user’s perspective to ensure the technology and instructional strategies are having maximum impact. M&S and VR also offers the opportunity for training collaboration across forces and national borders, enabling coalition forces to ‘train the way they fight’. UNDERSEA DEFENCE TECHNOLOGY The growth in investment in subsea technology has been a key factor in defence planning in the Asia Pacific region over the last decade. There are new entrants to the submarine operating environment, and those with established capability are seeking upgraded or enhanced platforms. In 2019, the Undersea Defence Technology Conference (UDT) Asia will concentrate on optimising regional undersea and ASW operations. With the rise of new technologies, comes the next generation of undersea platforms and capabilities. New opportunities are available around Man/Machine teaming underwater, as well as longer-range sensors and communication capabilities. There have also been significant advances in unmanned and autonomous systems, which impacts surveillance and mine countermeasures. This gives rise to questions around tactical and operational concepts of employment for unmanned systems, and the challenges that need to be overcome for efficient utilisation. This new technology does not exist in a vacuum, however, and many forces are engaged in both midlife upgrade programmes and integration of next generation systems with legacy platforms. MARITIME PATROL Across the Asia Pacific region, nations are continuing their investments in the economic development of the maritime environment. The sea is a vital highway for trade, for the delivery

of humanitarian aid and as a source of natural resources. To protect these investments, nations are accelerating the development of their maritime security and defence capabilities. A key pillar of these developments is the advances being made in maritime domain situational awareness across the region, and the ability to deliver security through the creation of maritime patrol capabilities. Maritime Patrol Asia 2019 provides a vital forum for maritime operational and technical experts to see and hear the latest developments in the delivery of littoral maritime security. It will focus on delivering enhanced maritime situational awareness in the region through improved EEZ surveillance and security in territorial waters. This includes countering illicit activities such as piracy, trafficking and illegal fishing. Getting the balance of adaptability, affordability and efficiency right is a challenge, and this is where open architecture can provide solutions. Current and future ISR systems, including AI and robotics, can enable enhanced mission modularity and adaptability. ELECTRONIC WARFARE Against a backdrop of rapidly advancing capabilities and geo-political uncertainty, EW Asia returns in 2019 to explore the future of EW and EM Operations in current and emerging threats. These include hybrid warfare, and Anti Access/ Area Denial (A2/AD) where potential regional opponents are excelling. Mastery of this developing warfare domain would mean dominance over all others for, in the EW and EM spectrums, you are only as strong as your weakest link. The conference is produced by the Association of Old Crows, the leading association for individuals and organisations with common interests in Electronic Warfare, bringing together expert speakers from the military, government, academia and industry. 




The leading online course in Terrorism Studies Individual Modules | 4 Weeks Certificate | 16 Weeks Advanced Certificate | 32 Weeks Start dates: February, June, October Learn online with expert tutor support and connect with a global network of like-minded professionals.

Shortlisted for Best Online Distance Learning Programme at the 2018 Learning Technologies Awards

Leading academia in terrorism and political violence since 1994 – join us to celebrate 25 years in 2019 Tel: +44 (0)20 7017 4483 | Email: Quote VIP code: CT Business


Lisa Ventura, founder and CEO of the UK Cyber Security Association, looks at how cyber attacks impact businesses and SMEs, how sophisticated they are and what can be done to prevent them

HOW TO PROTECT YOUR BUSINESS AGAINST CYBER ATTACKS A ccording to a recent study undertaken by Barclays Bank the average cost of each cyber attack is more than £1,000 per attack, and 29 per cent of cyber attacks and attempts against small businesses and SMEs are successful. What’s more, 10.6 per cent of those who took part in the study revealed that they had been victims of a cyber attack, and 8.58 per cent of these had to make staff redundant to cover the cost of what happened to them. With 43 per cent of all cyber attacks and hacking attempts being against small businesses and SMEs, this is an area that is fast becoming one that can no longer be ignored. A cyber attack is any criminal act against computers and networks and is often called hacking. It can also cover more traditional crimes conducted through the internet. Some common types of cyber attacks against businesses can include computer system attacks, malware, ransomware, business identity theft, phishing, web-based and denial of service (DDoS) attacks. These kinds of attacks have the potential to inflict enormous damage to growing businesses, especially those who operate on small margins. However, many small businesses and SME’s do not have this as one of their main priorities, with other areas such as HR, accounts and investor pitching often taking precedence.

THE GROWING SOPHISTICATION OF CYBER ATTACKS With cyber attacks continuing to increase at an alarming rate and evolve beyond disruption towards specific objectives such as targeted data theft, they are now becoming more and more sophisticated. As such, traditional approaches to cyber-security are fast becoming ineffective. Perimeter-based security, detecting and blocking what comes in and out of the environment, is no longer adequate in stopping cyber attacks. 2018 is fast becoming the year in which CEOs can no longer ignore the growing cyber threat. Cyber security and the prevention of cyber attacks is now everyone’s responsibility. SECURING YOUR BUSINESS FROM CYBER ATTACKS Regardless of what industry your business operates in or the size of your business there are some simple steps you can take to help safeguard against potential cyber attacks.

Ensure your systems are up to date at all times - While there are many valid reasons why small businesses and SMEs struggle to keep their systems up to date including the cost of doing this, ensuring you are running the latest version of Windows, Mac OS and other E



Recognize AND Analyze Is she an employee? How often was she here this month? Is she a known suspect?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics |



When, where did she enter? Does she appear in videos recorded last week?

How old is she?

CYBER PAGESECURITY FLAG  software is crucial. By updating your systems on a regular basis major issues are often fixed, and you are less likely to be compromised by a cyber attack.

Back up, back up, back up and back up again - while in the past backing up company data was a laborious process, cloud storage solutions today are affordable, simple and fast. There are huge benefits to storing your data on the cloud and while there is still a small risk that these can still be compromised your data will be protected against certain types of cyber attacks such as ransomware. It is vital you take complete back ups of your company files and data on a regular basis. Knowledge is key: Educate your staff – the more training and awareness that your staff have of cyber fraud, the better equipped they will be to safeguard against potential attacks. With small businesses and SMEs being more reliant and dependent on the internet than ever before, it is vital that you train all your staff to be cyber aware at a minimum. Conduct regular risk assessments – while there is much you can do to help protect your systems and business from cyber fraud internally, having regular risk assessments undertaken by a professional may highlight any areas that may have been overlooked. Cyber Essentials is a great place to start for this. Introduce a password policy – insecure passwords can often be an organisation’s weakest link, so review these regularly. Introduce a password policy that forces your employees to change their passwords frequently.


HOW IS THE CYBER SECURITY INDUSTRY DEVELOPING ITS SKILL SET? Despite the cyber skills gap that exists today, the UK government and many leading organisations are working together to ensure the next generation of security professionals have the skills and expertise to stay one step ahead of hackers. Since the UK Cyber Security strategy was rolled out in 2011, several measures and organisations have been developed and launched to help combat the growing cyber threat. These include:

The launch of the National Cyber Security Centre – in response to the ever-growing threat of cyber attacks, the UK government in conjunction with GCHQ launched the National Cyber Security Centre. Based in London, the centre aims to be at the forefront of the cyber security industry by providing relevant, timely and up to the minute responses to the latest malware, ransomware and other sophisticated cyber attacks. Training neurodiverse individuals for a career in cyber security – studies have shown that neurodiverse adults, such as those who are on the autistic spectrum, are well suited to a career in cyber security. In Worcester, Dr Emma Philpott has set up a Community Cyber Security Operations Centre (SOC) which is being used as a training centre for neurodiverse individuals in cyber security. It also operates services to protect vulnerable adults who are commonly targeted by cyber criminals. By tapping into the neurodiverse community the cyber skills gap can be addressed and opportunities given to these individuals to have a meaningful career that they wouldn’t have otherwise had. Getting young people interested in cyber security and programming – the key to developing the cyber security professionals of the future is to get them interested in cyber security while at school, and to help with this the Cyber Security Challenge was born. The Cyber Security Challenge UK is a set

of learning programmes, networking events and competitions that run all over the UK which are designed to identify leading cyber security talent and to encourage young people to be more cyber aware and consider becoming cyber security professionals. Through this medium the next generation of cyber security talent can be found, nurtured and developed.

Ensure the cyber security supply chain is protected – everyone has a smartphone, tablet or computer and the components used to make these are very similar. As other devices are developed and made it is essential that security practices, operations and methods that supply chains use are audited and reviewed regularly. Cyber essentials is a great way to show that you’re your organisation takes cyber security seriously, and having this accreditation can open doors for companies to trade with the government, councils and the MOD. Training, education and cyber awareness - the growing cyber threat cannot be combated without raising awareness of the seriousness of cyber security. It is critical that this is done without hype but also with the aim of ensuring that cyber security is everyone’s responsibility. Everyone should have access to tools that will help them to protect their homes, companies but most importantly of all, to protect themselves against potential cyber attacks. Educating the general public about cyber attacks will help awareness about the growing cyber threat cascade into offices, schools, further education establishments and even further afield. The development of a cyber workforce that is strong and robust – if cyber security is to be at the heart of education it should be heavily promoted via science subjects, technology, engineering and mathematics (STEM subjects) to ensure that those with a strong interest in cyber security can develop and utilise their skills to enter a career in the cyber security industry. Utilising the strong talent that exists in hacker communities should be a top priority. The growing threat from cyber attacks is not going to disappear any time soon, therefore small businesses and SMEs need to embrace this and ensure they are as prepared as they can be against cyber-attacks. With a few simple steps and training, you can successfully protect your business against cyber fraud. L




Feel ™ EQUIPPED AlphaTec® VPS

AlphaTec® 4000

(formerly known as TRELLCHEM® VPS)

(formerly known as MICROCHEM® 4000)

Heavy-duty reusable hazmat suit designed to provide maximum protection against chemicals in liquid, vapour, gaseous and solid form, including chemical warfare agents. Offers very good abrasion and flame resistance. Certified to EN 943-2/ET.

Heavy-duty hazmat suit designed to provide an exceptional barrier against organic and inorganic chemicals as well as biological agents. Permeation tested against over 190 chemicals.

Ansell is a global leader in protection solutions with a range of products engineered specifically for first responders. Our extensive portfolio helps keep them protected in the toughest of situations. For more information, email

Ansell, ® and ™ are trademarks owned by Ansell Limited or one of its affiliates. © 2018 All Rights Reserved.


£1MILLION MILESTONE FOR FELIX FUND Felix Fund – the bomb disposal charity has just reached a major milestone, that many charities strive to achieve; over £1 million has now been paid out in grants to individuals and groups from across the Explosive Ordnance Disposal (EOD) and search community from all three services as well as the Metropolitan Police Counter Terror Unit (SO15)

Since its launch back in April 2011 Felix Fund has been assisting serving personnel, veterans and their dependents from the bomb disposal and search community by providing grants for a whole host of items, tailored help and support. The assistance provided from this £1m has ranged from the provision of living expenses for a former soldier who needed to travel to Australia for pioneering surgery, after losing both legs in Afghanistan; a football wheelchair for the disabled son of a former Sapper and a specialist medical cap was provided for the baby son of a serving soldier. In addition, we have helped purchase bespoke sporting equipment for two former Sappers which then enabled them to compete in the Toronto Invictus Games last year, one of whom went on to win a silver medal, and such support as help with funeral costs, specialist counselling for the wife of a serving soldier suffering from severe mental health issues; the help offered by the NHS was not adequate for her needs, to travel costs for a family who had crowd funded to get specialist medical help in the USA for their son. Felix Fund prides itself on the wide range of help and support it can give, and in many cases, we have been able to turn this assistance around, within a very short period of time – less than 24 hours from the request being received to the money being paid out, which enabled the family in question to get the immediate help that was urgently needed.

SO WHERE DO WE GO FROM HERE? The work these EOD and Search teams carry out never stops, we may never hear about much of it in the media but there are out there ensuring the country stays safe. Tragic events, such as the Manchester bombing and the attacks in London last year, as well as the more recent incidents with chemical weapons in Wiltshire call upon the men and women of the bomb disposal community. This continued exposure to high stress situations can have a lasting effect, and charities like Felix Fund are in place to ensure individuals and their families receive the support they need. When Felix Fund was first set up the Trustees always said we would continue until such time as the help the charity offers was no longer needed. Since the early days of the charity the help has changed slightly, but there is certainly still a need. With unknown enemies both at home and abroad these personnel constantly face threats to their life and wellbeing, but this is just the day job for many. Whilst large numbers are no longer deployed overseas, those still serving deal with long periods away from home on duty and many veterans are dealing with their experiences, particular in Iraq and Afghanistan, and the mental and physical injuries they have suffered. The support Felix Fund provides is wide ranging and is aimed at this high-profile tri‑service community. At its heart is a

AS A CHARITY WE ARE THRILLED TO REACH THIS MILESTONE. THE HELP WE HAVE GIVEN OVER THE YEARS HAS MADE A SIGNIFICANT DIFFERENCE TO MANY LIVES AND WE WILL CONTINUE TO OFFER THIS SERVICE FOR AS LONG AS IT IS NEEDED. A BIG THANK YOU MUST GO TO EVERYONE WHO HAS SUPPORTED THE CHARITY ENABLING US TO HELP SO MANY desire to reduce the mental stress caused by conducting EOD & Search duties. For a small charity, its impact has been significant, and it is cutting edge in the services it provides. We are massively proud to have been able to pay out the sum of £1m to help these unsung heroes. For more information about the work of Felix Fund and how you can help us support more personnel who have conducted or assisted with Explosive Ordnance Disposal (EOD) and Search duties please visit our website: Melanie Moughton, CEO of Felix Fund, said: “As a charity we are thrilled to reach this milestone. The help we have given over the years has made a significant difference to many lives and we will continue to offer this service for as long as it is needed. A big thank you must go to everyone who has supported the charity enabling us to help so many.” A former Sapper injured in Afghanistan added: “The help Felix Fund has given me has dramatically changed my life. I now face a far more positive future with my new wife. Our home has been adapted with help from Felix Fund, making it a happy and practical place to start a new chapter.” L




High Security Modular Construction System ● Turnkey solutions: design, manufacture & build ● Inside or outside build or transport complete pod ● Walls, ceilings, doors, roof, structural steelwork ● Quick & clean to build to any size ● Secure store, comms room, utilities enclosures, large data centres or test/production facilities

Option GS Approved for UK Government Use For details contact CPNI

Certified forced attack protection LPS1175 SR1 to SR5

Fire Protection to EN1364 90 minutes integrity & insulation – Options for Blast, Ballistics and EMC protection

Contact us or visit our website for more information: T: +44 (0)20 8786 8787


The publishers accept no responsibility for errors or omissions in this free service Adani Systems

Hidden Technology Systems

Akkadia 8

Hugslock Systems

Apstec International Trading

Knect 365

Automatic Systems



18 27,31 64

Madico 40

Bastion Security Products


Mercian Labels


BBB Investments


Mitsubishi Electric Europe


Centerprise International


Morgan Marine

Cognitec Systems


Plextek 10

Cova Security Gates


Primetake 60

CPM Group


R West

Drone Detection Systems


Radio Physics Solutions

Evolve Dynamics


Remtech Computer Service

Felix Fund


Selctaglaze 44


IFC 30,31 70

Frequentis 12

SmartSearch UK


Frontier Pitts


Smiths Detection


Genetec Europe


Visual Management Systems


Heras UK


VZX Consultancy



AUTOMATIC SYSTEMS is a world leader in the automation of secure entrance control.

Access Controlled... Future Secured

The company has been designing and manufacturing pedestrian, vehicle and passenger access systems for nearly 50 years.

AUTOMATIC SYSTEMS Equipment UK Ltd. Units 18-19 Babbage House, Northampton Science Park, Kings Park Road - Moulton Park Northampton - NN3 6LG, UK. Tel: + 44 (0) 1604 65 42 10


The First Fully Automatic Real-Time Mass People Screening Solution Protecting Public Places from Terrorist Attacks Unparalleled Throughput Highly Accurate Fast & Efficient Cost-Effective

Profile for PSI  Media

Counter Terror Business 36  

Delivering Key Strategies To Combat Terrorism

Counter Terror Business 36  

Delivering Key Strategies To Combat Terrorism

Profile for psi-media

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded