Counter Terror Business 37

Page 1 | ISSUE 37






What is the additional element of ‘control’ that Brexit will bring to the UK border?


AN INSIGHT INTO SCTX A look at the key speakers at Security & Counter Terror Expo


The FLIR Sarosâ„¢ Dome camera is a detection solution for small-to-medium size businesses that watches over an entire perimeter. Saros combines an optical camera with thermal sensors enabling analytics to limit false alarms. From the industry leader in thermal imaging, FLIR Saros provides an effective, efficient, and economical security solution.






2019 - AN OPPORTUNITY TO LEARN By all accounts, Europe experienced something of a respite from the threat of terrorism in 2018 after the horrific incidents that have struck the continent in the last few years. Nonetheless, while attacks have been thwarted, the ongoing uncertainties in Parliament mean that warnings remain noticeable across national press this month. Assistant Commissioner Neil Basu has claimed that the current ‘febrile’ atmosphere around Brexit could be exploited by farright extremists while Metropolitan Police Commissioner Cressida Dick has warned that a no-deal exit from the European Union could threaten access to EU-wide criminal databases and put the public at risk.



What is the additional element of ‘control’ that Brexit will bring to the UK Border?


AN INSIGHT INTO SCTX A look at the key speakers at Security & Counter Terror Expo

At present, Brexit persists as just as much of an anomaly as two years ago, but it would be unwise to dismiss such warnings as a plea for more funding and officers. The chaos caused at Gatwick and Heathrow after Christmas, as well as the bomb threat in Londonderry last month, highlight the vulnerabilities in our security systems and the UK forces and security services must now take every opportunity to mitigate against the terrorist and right-wing extremist threat in the UK. Therefore, March’s Security & Counter Terror Expo could not be more timely. Read our preview on page 13.

Follow and interact with us on Twitter: @CTBNews

We are looking forward to next month’s second Counter Terror Awards and await seeing those shortlisted at the event on 5 March. Michael Lyons, editor

ONLINE // MOBILE // FACE TO FACE To register for your FREE Digital Subscription of Counter Terror Business, go to: or contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, fax: 020 8532 0066. PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: EDITOR Michael Lyons PRODUCTION MANAGER Dan Kanolik PRODUCTION DESIGN Sophia Mew PRODUCTION CONTROL Lucy Maynard WEB PRODUCTION Victoria Casey BUSINESS DEVELOPMENT MANAGER Martin Freedman PUBLISHER Jake Deadman REPRODUCTION & PRINT Argent Media

Counter Terror Business would like to thank the following organisations for their support:

The Professional Publishers Association Member

© 2019 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533




Get the best performance and value for key and asset management. Our KeyWatcher and RFID-powered AssetWatcher systems are packed with features and capabilities, expertly engineered to protect, control and track your keys and assets. It’s more of our outside-the-box thinking – that you’ll find right inside the box.

Product door not shown in image. Fingerprint reader optional.

To learn more visit

think inside the box.


CONTENTS CTB 37 Supported by 13 SECURITY & COUNTER TERROR EXPO Security & Counter Terror Expo is a renowned showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe

26 BORDER SECURITY One of the standard political catchphrases in the ongoing saga of the UK’s exit from the European Union is ‘taking back control of our borders’. But what does this mean? Tony Smith explores

31 PERIMETER SECURITY With the heightened threat levels and the general awareness of security, we are seeing wide reaching changes in attitudes towards perimeter protection, writes Paul Jeffrey, chairman of the Perimeter Security Suppliers Association (PSSA)

35 AIRPORT SECURITY With the threat of vehicle-related attacks having increased in the last 18 months, Gavin Hepburn discusses best practice for airport security officials looking to upgrade their retrospective solutions

39 DRONES Counter-UAV defences are now top priority for airports and critical infrastructure around the world, after drone panics saw the military called into assist at the UK’s two largest airports. By Tim Robinson

40 PANEL OF EXPERTS What can we expect to see in the future, from a rapidly changing IT security landscape? We ask our Panel of Experts for their thoughts on cyber threats and solutions

44 INFORMATION SECURITY Given the pace of change and scale of threat in the digital world, Steve Durbin, managing director at the Information Security Forum, details how organisations can increase their cyber resilience profile over the next twelve months

49 BIOMETRICS It was recently revealed that the Metropolitan Police has spent more than £200,000 on controversial facial recognition trials that resulted in no arrests. So is biometric technology flashy or fruitful when it comes to security services?

51 FORENSICS Forensics Europe Expo is the most important forum of discussion and debate for the global forensics community. It takes place on 5-6 March at Olympia, London, alongside Security & Counter Terror Expo.

Counter Terror Business magazine // ISSUE 37 | COUNTER TERROR BUSINESS MAGAZINE



Border safety concerns as HMRC plans to simplify customs checks

Ministers have revealed that hauliers will be able to bring goods into the UK without facing checks at the border in the event of a no-deal Brexit. The special arrangement, which will affect goods coming in to 20 ports

Rod McKenzie, from the Road Haulage Association meanwhile told the BBC: “Business is simply not ready for a chaotic no-deal Brexit. “The systems aren’t in place, the staff are not trained, there isn’t the time in the day for hauliers and businesses to do all the paperwork.” The UK is due to leave the EU at 23:00 GMT on Friday 29 March, with or without a deal.

around the country, is expected to last for up to six months. Hauliers have warned that a no-deal Brexit could result in long queues at Channel ports, with senior industry figures warning that, even with these simplified procedure, firms would still not be ready for a no-deal EU exit. Labour MP Geraint Davies raised safety concerns. He said: “Now the plan is to wave things through irrespective of our safety. “We’ll have no idea what is coming into our ports.”




Prevent chief expects review to focus on far right referrals

£7 billion equipment funding black hole for MoD

Chief Constable Simon Cole, head of Leicestershire Police and national lead for Prevent, has welcomed the up coming review of the Prevent strategy as “the time for hard fact, not twisted fiction.” With an annual budget of around £40m, Prevent aims to stop people becoming terrorists or supporters of terrorism and places a statutory duty for schools, NHS organisations and those in the prison service to raise concerns about those thought to be at risk of radicalisation. It has been criticised heavily by civil liberties and human rights organisations who claim the strategy fosters discrimination against people of Muslim faith. Writing on his blog, Chief Constable Cole said: “It will be interesting to see what the review discovers. I believe it will quickly find out that often it is the perception of Prevent, rather than its realities, that cause some of the doubts. “I have been encouraged to see both the West and the East Midlands host open sessions with anonymised Channel panels, meaning anyone can see the kind of challenges that are being faced on a daily basis across the UK. “This is the type of transparency which helps to build trust, which I believe must also be one of the primary goals of this review.

“It will also surely reflect on the growth of far right referrals – which rose by 36 per cent in the latest Home Office figures for 2017/18. “My colleague, and the head of Counter Terrorism Policing, Assistant Commissioner Neil Basu, recently warned that the hostile political atmosphere and increasingly extreme online rhetoric around Brexit and nationalism is fuelling an increase in hate crime and far-right sentiment in this country – with concerns that is being exploited by far-right extremists. “Whatever the reasons, there is no doubt that we are seeing increasing number of Prevent referrals relating to young and vulnerable people showing signs of right wing extremism, and Prevent will continue to be a crucial tool in reversing this worrying trend. “Most of all, though, I think the review will find that some of this is incredibly difficult. Where should the line be drawn between freedom of speech and becoming an offender? How intrusive is it to talk to a family about concerns raised around a child? “As I regularly say to our Prevent teams both locally and nationally, if it doesn’t feel difficult then you are probably in the wrong place.”


The Public Accounts Committee has revealed that the Ministry of Defence (MoD) has a funding black hole of at least £7 billion in its 10-year plan to equip the UK’s armed forces. MPs, who claims that the government does not have a ‘coherent and credible’ funding plan, warned in its report that the MoD lacked the ability to ‘accurately cost programmes’ and that the shortfall could reach £14.8 billion by 2028. The department intends to spend in excess of £180 billion on new warships, submarines, jets and armoured vehicles over the next decade, but has been labelled ‘a repeat offender’ when it came to poor financial planning. Therefore, the Public Accounts Committee has demanded more information on the risks associated with major projects, including the purchase of F-35 stealth jets and Type 31e frigates. Meg Hillier, chair of the committee, said: “In terms of poor financial planning, the Ministry of Defence is a repeat offender. The Department’s progress with addressing the concerns set out in our last report on the Defence Equipment Plan has been woeful. The MoD simply cannot afford everything it says it needs and it is not acceptable for officials to continue deferring decisions that have a bearing on its current affordability gap and longer-term risks. “A department that is unwilling or unable to take the action required to help it live within its means is failing taxpayers, who rightly expect government to deliver the best possible value for their money. We urge the MoD to act on our recommendations now, work with the Treasury to ensure its funding and planning models are fit for purpose, and bring some much-needed clarity to its priorities and costs.”





There’s no need to make life complicated, you have three problems; we have one solution! We deliver AML, Sanctions & PEP checks “all-in-one” search, individual checks take 5 seconds, business checks take longer, 1-2 minutes! Daily monitoring of all your clients for Sanction & PEP changes for the lifetime of your contract is included at no extra cost. Automatic enhanced due diligence, biography, adverse media and photographic evidence is also included in your basic AML price. You’d be nuts not to view our demonstration!

Call us now to book a free demonstration on:

0113 333 9835 Or visit us online:


SMARTSEARCHUK.COM SmartSearch delivers UK and International Business checks in the UK and International Markets with inclusive Worldwide Sanction & PEP screening, Daily Monitoring, Email Alerts and Automated Enhanced Due Diligence.


Facial technology to be deployed in Romford

As part of the Metropolitan Police Service’s trial of the technology, live facial technology is being deployed in Romford town centre. Metropolitan Police is carrying out 10 deployments as part of the live facial recognition trial. The technology will be used overtly with a clear uniformed presence and information leaflets will be distributed to the public. Posters with information about the technology will also be displayed in the area. In order to sufficiently test

the technology, the deployment will run for about eight hours each day. It was recently reported that the Met spent more than £200,000 on controversial facial recognition trials in London that resulted in no arrests. Detective Chief Superintendent Ivan Balhatchet, strategic lead for live facial technology, said: “The Met is currently developing the use of live facial recognition and our trial period is coming to an end. Following the final deployments of the trial, a full independent evaluation of the deployments and the technology itself will commence. “In December 2018 the Live Facial Recognition technology was deployed in Westminster. Two arrests were made as a direct result of the system identifying individuals wanted for violent offences. Tackling violent crime is a key priority

CLICK HERE to find out how Live Facial Technology works




Improvements needed to tackle violent extremism in London

Mayor of London Sadiq Khan is calling for improved and renewed efforts to tackle the growing threat of radicalisation and far-right extremism in the capital. Recent research has found that nearly two-thirds of Londoners would not know how to seek support from the authorities if they were worried about an individual being vulnerable to violent extremism. Khan, who welcomed the recent announcement by ministers of an independent review of the government’s Prevent strategy, pointed to research carried out last year to understand what Londoners’ views and experiences of extremism are, focusing on how they would identify and refer any concerns they had to the police or another authority. This research forms an early part of the mayor’s Countering Violent Extremism programme and found that 61 per cent of respondents thought that the threat from extremism is increasing and that 25 per cent had witnessed or experienced extremist views in the past 12 months. Furthermore, 65 per cent of respondents see strong, cohesive and integrated

for the Met and we are determined to use all emerging technology available to support standard policing activity and help protect our communities. “The technology being tested in this trial is developing all the time and has the potential to be invaluable to dayto-day policing. We continue to engage with many different stakeholders, some who actively challenge our use of this technology. In order to show transparency and continue constructive debate, we have invited individuals and groups with varying views on our use of facial recognition technology to this deployment.”

communities as the most effective way of reducing the risk of people carrying out extremist acts, hate crime and terrorism, but 64 per cent would not know how to seek help from the authorities if they were worried about an individual being vulnerable to manipulation or exploitation towards extremism or terrorism. Khan said: “Violent extremism is one of the biggest threats facing London and our country. We simply must do better at safeguarding the vulnerable and stopping people from promoting these vile ideologies with such horrific consequences. “There is a role for all of Londoners in tackling the spread of violent extremism, but this research shows that unfortunately, the Prevent programme is failing some of the communities that most desperately need it. I welcome the government’s announcement of an independent review of Prevent to ensure a better programme that has greater community confidence. We have to do more to empower communities to speak out and challenge hate crime and extremist views. We need communities to report concerns to the police and local authorities, and find lasting solutions that will stop the spread of violent extremism completely.”


FORS Counter Terrorism toolkit created for fleets The Fleet Operator Recognition Scheme (FORS) has developed new online toolkits and guidance, which includes a new requirement to help fleets guard against the threat from terrorism. ThE fifth iteration of its guidance sets new parameters to help members improve environmental operating practices, and includes a new requirement to help fleets guard against the threat from terrorism. A free FORS Counter Terrorism toolkit has also been created to help members meet new Bronze requirement ‘O7 Counter terrorism’. The toolkit provides members with advice on writing an effective counter terrorism policy and highlights which procedures they must have in place to support the policy. Graham Holder, FORS head of Quality Assurance & Compliance, said: “The FORS Standard is updated every two years in order to maintain relevance in a fast-moving industry. Along with our dedicated helpline, the free toolkits and guidance are designed to assist FORS members as they progress through accreditation, and work towards even higher standards of operation and best practice.” CLICK HERE for the FORS Counter Terrorism Toolkit




Embracing a multimedia control room The next generation control room must be able to manage and respond to all kinds of communication paths to increase the flexibility and ease of use for both operators and public emergency contact, while reducing emergency response times The world is changing; becoming more virtual and integrated through software-driven communications solutions and social media. The next generation control room must be able to manage and respond to all kinds of communication paths to increase the flexibility and ease of use for both operators and public emergency contact, while reducing emergency response times. The presentation of multi-channel communications needs to be mobile, flexible, practical, secure, robust and reliable, situational aware and capable of supporting all types of media. Frequentis’ 3020 LifeX seamlessly handles multimedia information, in any form, feeding it out to the operator as a single communication stack. It’s about more than just voice. 3020 LifeX is a future-oriented public safety communication and collaboration platform designed to satisfy all the demands of a next-generation control room and for contact

centre multimedia handling. The solution has been selected by a number of customers already, including the UK Department of Health, North Wales Police and the Bavarian Police Force in Germany. The 3020 LifeX solution provides a fully web‑based call-centre solution including automatic call distribution (ACD), integrated voice response (IVR), recording, and integration with Airwave and ESN (when available). Together with many other features, tailored to safety critical control rooms, it provides an exceptionally reliable solution on which to base critical control room operations. Frequentis will be presenting its LifeX solution at BAPCO, March 12-13, 2019. Meet us at BAPCO stand E1, Ricoh Arena, Coventry.




5 March 2019, ILEC Conference Centre, London

12-13 March 2019, Richo Arena, Coventry

The Annual Event




The tragic and despicable terrorist events of the early 21st century have forced the international community to act. Increasingly sophisticated strategies and technologies are being employed by organisations throughout the world in order to counter the threat. The Counter Terror Awards will be staged to recognise the efforts of organisations in both the public and private sectors and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats and striving to keep the public safe. The Counter Terror Awards will take place for the second time on 5 March 2019, in association with the Security and Counter Terror Expo.

SECURITY & COUNTER TERROR EXPO 5-6 March 2019, London Olympia The Security & Counter Terror Expo is a world-class showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe. The event brings together over 10,000 senior professionals from government, the private sector, critical national infrastructure, military, law enforcement, transport security, border security, security services, major events and emergency services. Understanding the threat horizon is crucial for effective mitigation. The World Counter Terror Congress, part of SCTX, provides a closed-door forum to explore the latest terrorist risks and the capabilities to maximise resilience to them. Becoming a delegate at World Counter Terror Congress provides you with the latest intelligence, strategies and tactics to successfully prepare and protect against terrorism. Clarion Events, the organisers of SCTX, are supporters of the Counter Terror Awards.

The BAPCO Annual Conference & Exhibition is a TWO EVENTS crucial event for everyone that is involved in critical communications and public safety solutions. For the very ONE LOCATION first time it will take place in conjunction with TCCA’s BAPCO Annual Conference and Exhibition

TCCA Critical Communications Europe, Series Critical Communications (CC Europe) at the Ricoh Arena, Coventry, UK, from the 12-13 March 2019. Alongside a plethora of the latest technology and solutions from top suppliers and expert led conference sessions on the latest topics, BAPCO with CC Europe 2019 will have more interactive features than ever before.


@BAPCOEvent @



18-20 June 2019, BAPCO withLondon TCCA’s Critical Communications Europe (CC Europe) 2019 is a key industry ExCel, event supported by leading professionals in technology, critical communications, public safety, transport and emergency services.

The expert-led conference sessions will cover topics that are crucial to keeping up-to-date with the latest innovations and developments, attendees will also be able to: •

Network with the communication industry's biggest suppliers

Compare and source new comms methods, products and services

Receive free expert advice on the implementation and management of equipment and technologies

Attend best-practice workshops and pose questions to the experts at the industry's forefront

Learn how to increase service efficiency and reduce costs

Do business, make new contacts, and place orders face-to-face

27,000 security professionals gather yearly at IFSEC,

Our Sponsors Europe’s leading integrated security event. PLatinum Sponsor

The event is an opportunity to see the latest security technology put to the test, learn directly from world-renowned industry leaders and network with security directors & managers, Sponsors Gold Sponsorsintegratory and distributors fromSilver installers, across the globe. Beyond an internationally esteemed product showcase, IFSEC International is the world’s centralised gateway to the critical security conversation. Amidst mutating threats, the integrated path to achieving global safety starts with IFSEC. BAPCO_DIRECT_MAIL_A4_Printad.indd 1 Access inspiring high-level panel debates from government and industry influencers, and join the collaborative conversation between installer, integrator, end user and vendor. IFSEC allows visitors to discover the high-quality solutions and talk to the experts behind the products, as well as network with the global security industry.








THE UK’S LEADING NATIONAL SECURITY EVENT Meet face to face with over 10,000 security professionals

200+ Free-to-attend seminar sessions

350+ Exhibitors - Explore the latest products and solutions

Benchmark strategies with the security experts from over 100 countries


Part of UK Security Week





Security & Counter Terror Expo is a renowned showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe

SECURITY & COUNTER TERROR EXPO 2019: THE NEXT DECADE A fter celebrating its ten-year anniversary, Security & Counter Terror Expo (SCTX) is launching a brand new decade with its 2019 edition. The goal of the 2019 campaign is to see a more joined-up approach in connecting the government, wider public sector and security individuals with the aim of preventing terrorist attacks. This vision informs a key theme of this year’s event, which is improving the communication channels from central government to local communities. Working in close partnership with NPCC and CTP, SCTX will continue to establish itself as the leading business and networking platform for security professionals. More than ever before, the event will be centred on fostering community within the security sector and

building valuable relationships with various government agencies, national operators and local authorities, all of whom work in tandem to execute the CONTEST Strategy. SCTX 2019 will bring together 350 leading suppliers and over 10,000 senior security professionals from 100 countries representing a comprehensive range of sectors. These include government, private sector, critical national infrastructure, defence, military, law enforcement, transport security, border security, security services, crowded places/ major events, and emergency services. The event will provide plenty of networking opportunities for likeminded industry professionals to discuss security issues, gain valuable insights and forge new relationships. E

Supported by


Police and security services need powerful data Data that moves with their targets

THE WORLD IS TRULY MOBILE...WHICH MEANS YOU MUST BE TOO To stay one step ahead of your target, you need current information on anyone who may be of interest to your investigation. And you need a powerful, intuitive way of getting to that information... With person and business information derived from hundreds of sources, Orbis provides a gateway that will enhance and assist your investigations. Locate people and find linked individuals from even the smallest amount of known data.

ORBIS WILL PROVIDE SUPPORT TO EVERY ASPECT OF YOUR OPERATIONS For further information please contact: Simunix | The IT Centre | York Science Park | York YO10 5DG T: 01904 567765 | E:

SCTX PREVIEW  SCTX 2019’s education programme is specifically built to engage senior security professionals in topical discussions such as CNI protection, transport security and securing crowded places. In particular, the internationallyrenowned World Counter Terror Congress brings together global experts to share national updates on counter-terror strategy, operations and policy, examining the key areas of prevention, pursuit and protection from international terror threats. To get hands-on with the products serving the market, the Demo Zone offers an interactive showcase of innovative technologies in operation. The purpose of the Demo Zone is to showcase premium solutions from industry leaders in all main security verticals. It creates an integrated experience which enables visitors to see innovative technologies and techniques in operation, from policing and specialist ops as well as defence security. NEW FEATURES AT SCTX 2019 The national security landscape has evolved immeasurably over the past decade, with domestic attacks becoming more prolific than ever before and threat levels rarely changing from ‘severe’. SCTX 2019 will feature four strategic conferences to reflect the latest developments within the security and counter terror landscape. The Armed Response & Intervention Conference will cover tactics for armed response units and the countering of improvised threats. Both in Europe and further afield, the risk of a Paris-style attack remains a real threat. In such situations armed intervention forces provide the only barrier standing between perpetrators and a catastrophic loss of human life.

AS NATIONS SEEK TO ADVANCE THEIR RESILIENCE AND ABILITY TO RESPOND TO THE GLOBAL TERRORIST THREAT, SECURITY OF EXTERNAL BORDERS AND INTERNAL TRANSPORT NETWORKS IS PARAMOUNT The Armed Response and Intervention Conference offers a dedicated platform for the discussion of operator-focused training, tactics techniques and procedures (TTPs). Simon Chesterman from the National Police Chief’s Council will take the first presentation, talking about armed police capability development and the future of armed policing in the UK. Director of Israeli Tactical School Tomer Israeli meanwhile will discuss approaches to training armed intervention units for operations in complex urban environments. PROTECTING PUBLIC PLACES The Crowded Places Conference will look at mitigating terrorist threats to accessible public spaces. ‘Soft targets’ and crowded places such as stadiums, shopping centres, airports, stations and major events will continue to be a target for terrorist activity. These are places that are easily accessible and often have minimal security. Senior security professionals, owners and operators from over 100 countries will gather at the Crowded Places Conference to benchmark strategies, discuss best practices and explore the latest technology for protecting people in the best possible ways. Ken Scott, head of inspectorate at the Sports Ground Safety Authority will talk about keeping people safe at major events in today’s world.

Ken will outline the key changes included in the recently published 6th edition of the Guide to Safety at Sports Grounds and will focus on the need to understand the environment outside of venues. A representative from the National Cyber Security Centre (NCSC) will deliver a presentation on cyber risk management for major events, with practical advice for non-technical event managers on how to integrate cyber security into event planning and delivery, making discussions about cyber security more meaningful and beneficial. David McIlhatton and John Cuddihy from the Centre for Trust, Peace and Social Relations will give an analysis of the current considerations, barriers, and incentives for protective security of crowded places. They will provide an understanding of how counter terrorism is considered in the development of crowded places, critical infrastructure and large real estate developments, and identify the barriers to implementing counter terrorism measures. TRANSPORT & BORDERS The Transport & Border Security Conference will examine the threat of terrorism to transport networks As nations seek to advance their resilience and ability to respond to the global terrorist threat, security of external borders and internal E

Supported by



CHALLENGED BY IDENTIFYING TRACES OF EXPLOSIVES FROM MULTIPLE SURFACES AND LOCATIONS WITH SPEED? Our portable trace detector, TRACE-PRO, provides you with the fast, accurate answers you need to make quick decisions. Armed with an on-board camera and GPS, TRACE-PRO puts even more features at your fingertips to make it easier to collect, analyse and record multiple samples on the spot. For additional information or to schedule a demonstration contact us via phone +44 (0)1923 658100 or email TRACE-PRO is a trademark of Smiths Detection Group Ltd.

SCTX PREVIEW competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years. Dr Evangelos Ouzounis at ENISA will discuss ENISA’s role in enhancing the security of Europe’s critical information infrastructures. Robert Hall, executive director from Resilience First will talk about developing critical business resilience in a connected world. The presentation will examine what makes us resilient in the new world disorder and whether it remains necessary that we look at what common aspects bind us in the common space. Such an examination isn’t just about the hard skills of policies, procedures and systems but also the soft skills of behaviours, culture and connectedness. The question is: can the two skill sets be aligned for critical business operations in the face of significant disrupters?

THE GLOBAL SECURITY COMMUNITY NEEDS TO CONTINUALLY STAY ONE STEP AHEAD OF THE THREAT FROM VIOLENT EXTREMIST GROUPS, COMBINING THE LATEST TECHNOLOGY WITH CONSTANTLY EVOLVING OPERATIONAL STRATEGIES AND POLICY  transport networks is paramount. With the support of British Transport Police and Civil Aviation Authority the Transport & Border Security Conference will deliberate best practice for the defeat of this highly mobile and truly international threat. Adrian Hanstock, deputy chief constable at the British Transport Police will examine how to protect people travelling across the railway network each year. Adrian will talk about the context of violence and counter terrorism in a railway environment, what to do to prevent it, what technology is being used and how to support prevention and prepare. CRITICAL NATIONAL INFRASTRUCTURE The CNI Security Conference will focus on developing resilient critical infrastructure in a networked world. The UK’s national infrastructure and associated assets, as well as

a broader range of UK businesses and organisations, currently face threats from international and domestic terrorism, espionage and increasingly hostile foreign activity. The CNI Security Conference will discuss new strategies and explore solutions to reduce the vulnerability of the national infrastructure to terrorism and other threats. Steve Durbin, managing director of the Information Security Forum will take the first session, addressing the future cyber threat landscape. Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world, organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity,

LEADING INDUSTRY EXPERTS For 2019, SCTX is honoured to be supported by a board of advisers bringing with them a wealth of experience and knowledge. Alistair Bunkall is one of the country’s leading broadcasters on foreign affairs, diplomacy and security. As defence correspondent for Sky News he has reported on global terror attacks and wars. Alistair will be involved with the programme of World Counter Terror Congress at SCTX 2019. Richard Barrett is director of the Global Strategy Network, a group of policy makers and practitioners working to increase social cohesion and community resilience against violent extremism. Mak Chishty has an extensive career with the police force, spanning across two decades. As the former Met Police commander, Mak has demonstrated a remarkable understanding of the crime and security landscape, including serious and organised crime, intelligence, surveillance, special branch, forensic science and countering violent extremism. Scott Wilson was the UK National co-ordinator for protect and prepare at National Counter Terrorism HQ Scotland Yard. Until recently, Scott was a detective chief superintendent and a senior investigating officer with extensive working knowledge in homicide and counter terrorism investigations having led over 50 murder and counter terrorism enquiries. Commander Robert James Broadhurst OBE, QPM was the 2012 Olympics Gold Commander for the Metropolitan Police Service. He was formerly commander for public order and pan-London operational support of London’s Metropolitan Police Service. Terri Nicholson MSc served for 30 years in the Police service, E

Supported by


UNIQUELY UK MANUFACTURED SECURITY SCANNING TECHNOLOGY Designed to counter terrorism and push the boundaries of the security screening sector 2X Systems is committed to providing innovative yet uncomplicated vehicle scanning technology to meet the requirements of the industry and its customers around the world. Using locally sourced components, meaning products aren’t bound by US sanctions; 2X Systems has developed a range of class-leading x-ray scanners with a truly global reach. An experienced entrepreneur with extensive knowledge of the x-ray security market, CEO Frank Baldwin has an unparalleled understanding of the industry and its requirements. He has overseen the delivery and installation of systems and projects worldwide, working with some of the most innovative and progressive companies in the sector – one of which received two prestigious Queen’s Awards under his leadership. With Frank at the helm, the team at 2X Systems has developed a range of security screening solutions with ease of installation and transportation in mind. Not only to eliminate the difficulties associated with the installation of such products, and the requirement for expert personnel to carry it out – but also to improve the security of screening operations. This is achieved by enabling them to be easily moved to a safe distance away from buildings or venues, increasing the commonly minimal security perimeter. The innovative designs are based on delivery to site and out-of-the-box operation, removing the need for highly skilled engineers where possible – and can be used in various system applications including border checkpoints, government buildings, military bases, nuclear power plants, hotel and events venues. The product portfolio currently includes the multiapplication 2X-300 system, which transcends those currently available in the market. Designed specifically for the screening of vehicles (including their chassis) using high-definition, top-down imaging of the vehicle, the system provides operators with excellent, fast and easy imaging tools for detecting threats, drugs, explosives, weapons, contraband and people trafficking.

 +44 (0)1420 614141 

Featuring an optimised footprint to simplify integration into existing structures, the 2X-300 system can be fully operational in as little as 30 minutes on flat ground (depending on the type of deployment) and can process up to 250 vehicles per hour in drive-through mode. These application models are: • 2X-300DT – a rapid deployable, fully self-contained system requiring minimal support for installation. • 2X-300DF – a fixed model for situations where the system is to be operated on a permanent or semipermanent basis. • 2X-300DC – includes all the features of the 2X-300D systems, but with the added benefit of driverless, conveyor operation As well as the 2X-300 system, 2X Systems have also developed a selection of additional solutions to cater for a range of security screening scenarios. This includes the: • Secupod – a container system which can be operational in under an hour and allows multiple units to be joined together to create a physical barrier. • 2X-833 – a class-leading, walk-through metal detector which offers security operators a reliable system for use in various operational environments. • Mobile security space solutions – temporary buildings and structures that have been designed to accommodate security checkpoints and multiple search areas at sports events and high-security venues. These latest developments mark a significant shift in how security screening operations are conducted, as the industry looks to improve both efficiency and effectiveness. Over the next five years, 2X Systems will seek to continue driving innovation in the sector forward – expanding its product portfolio further with a range of advanced, best-inclass security screening solutions. For more information about 2X System’s products and how they can be utilised within your security system applications, please visit


THE WORLD COUNTER TERROR CONGRESS PROVIDES A HIGH LEVEL PLATFORM FOR DISCUSSION OF THE CURRENT THREAT AND APPROACHES TO SAFEGUARDING OUR NATIONS FROM IT  performing senior leadership roles in Counter Terrorism and Organised Crime at Scotland Yard, the National Crime Squad and SOCA. Terri retired as assistant chief constable – deputy senior national coordinator for Counter Terrorism in the UK in June of this year. She is now vice president for international security at Viacom – the multinational media conglomerate. Richard Walton, former head of the Met’s Counter Terrorism Command (SO15) (2011-2015), has many years’ experience delivering successful counter terrorism and counter extremism strategies within a ‘rule of law’ framework. Richard was head of counter terrorism for London during the Queen’s Diamond Jubilee and London Olympic and Paralympic Games in 2012. Together, Alistair Bunkall, Richard Barrett, Mak Chisty, Scott Wilson, Commander Robert James Broadhurst, Terri Nicholson and Richard Walton and will contribute to guiding the conference content, providing commentary on pertinent topics and leading the discussions for 2019. WORLD COUNTER TERROR CONGRESS The threat from international terrorism has grown over the last few years. The devastating attacks have caused major loss of life, destruction of property and economic damage across the globe. The global security community needs to continually stay one step ahead of the threat from violent extremist groups, combining the latest technology with constantly evolving operational strategies and policy. This starts with counter extremism – the prevention of marginalisation that creates a breeding ground for terrorism – and moves through intelligencegathering on potential attacks to discuss operations for shutting down imminent incidents. As nations seek to advance their resilience and ability to combat the global terrorist threat, there is need for collaboration on shared challenges faced. The World Counter Terror Congress provides a high level platform for discussion of the current threat and approaches to safeguarding our nations from it. Aligned with the UK’s CONTEST strategy, the conference will cover a broad spectrum of priorities, including de-radicalisation and the prevention of individuals/groups from engaging in terrorist activity, protective security measures and the safeguarding of our societies as well as intelligence led operations and the pursuit of terrorist suspects. WCTC will bring together over 300 internationally recognised security experts at a closed door, paid-for conference as they seek to find the strategic and operational approach to fight terrorism. Russell Travers, deputy director at the National CounterTerrorism Centre’s Office of the Director of National Intelligence, will take the first session after the chairman’s opening comments. He will discuss the changing nature of the terrorism threat and the challenges posed to the global counterterrorism community. His presentation will examine the threat of homegrown violent extremists across the ideological spectrum as well as the solutions, such as increased information sharing, collective defense, and addressing underlying causes. Michael McGarrity, assistant director of the counterterrorism division at the FBI, will discuss the methods of detecting, deterring, and disrupting terror threats to the United States. Major Cristina Andreu is head of counter-terrorism intelligence at the Intelligence Centre for Counter-Terrorism and Organised Crime at the Ministry of Interior in Spain. In her presentation, she will talk about the Barcelona 2017 terrorist attacks, comparing it with other European terrorist actions and sharing the lessons learned. Meanwhile, first commissioner Jean-Pierre Devos from the

Federal Police Belgium, will share his experience of the Brussels National Airport attack. Iain Donnelly from the National Data Analytics Solution (NDAS) Project at West Midlands Police HQ will talk about leveraging AI led tools to focus and enhance investigations for CT policing. The City of London police’s Commander James Phipson will give a presentation on how it is important to engage volunteers and the public to counter terrorism. Rasa Ostrauskaite from the Organization for Security and Co-operation in Europe (OSCE) will talk about a consolidated framework for the fight against terrorism, and Timothy Groh from the Terrorist Screening Centre at the FBI will discuss the possibilities and realities of watchlisting and biometrics. MARK YOUR CALENDARS Throughout 2018, the national security landscape has remained turbulent as terrorist attacks continued to afflict the UK and the rest of Europe. In this critical time, SCTX plays an important role in bringing together the entire security community to discuss challenges, benchmark strategies and explore the newest technologies to combat terrorism. SCTX 2019 will continue to be the leading platform for the government, wider public sector and security professionals to come together and make impactful decisions to ensure our homes, citizens and nations are safe. E


At the forefront of transformative design Eskan provides advanced solutions to increase local and international security, and to reduce the risks of disruption to peaceful existence posed by criminals and terrorists. Eskan develops, engineers and manufactures equipment, with supporting products in the company’s new purpose-built UK premises, for law enforcement, intelligence services and military organisations worldwide. For over three decades, Eskan’s development engineers have been working to provide the most advanced products available. A substantial part of its production is dedicated to manufacturing bespoke products for it’s discerning customers. Eskan’s new Greenford production facility has leading edge equipment, and every item in the manufacturing process is tested beyond ISO 9001 2015 standards to ensure total operational reliability. The Queen’s award for

Enterprise is highly regarded and strengthens the organisation’s reputation in the countries to which Eskan exports. It continues to work hard to help make the world a safer place. Technical innovation needs to be backed by training and support. Eskan’s UK based team of technical engineers are available to discuss your protection and security requirements, and to provide you with support so that you can take full advantage of the company’s many product features and in-depth training courses. FURTHER INFORMATION

Tel: +44 20 8813 0776

Supported by



COUNTER TERROR AWARDS 2019 The Counter Terror Awards, taking place on 5 March 2019 at the ILEC Conference Centre, is staged to recognise the efforts of organisations in both the public and private sectors and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats and striving to keep the public safe.

SCTX 2018: A RECAP Last year’s UK Security Week at Olympia, which had a number of co-located events, including Security & Counter Terror Expo and the World Counter Terror Congress, saw 71 international delegations and 304 exhibitors, making it the most successful event ever. Covering over 13,000 sqm, the show is the largest national security event in the UK, enabling 304 companies

to showcase their latest products, technologies and services alongside ten conferences, two live demo areas and the world-renowned, World Counter Terror Congress. The Congress was attended by over 700 VIPs, delegates and highranking police officers and chaired by Richard Barrett, coordinator of the Al-Qaeda/Taliban monitoring team of the United Nations Security Council. The event featured speakers such as the Met Police’s Mark Rowley.


The Counter Terror Awards, taking place on 5 March 2019 at the ILEC Conference Centre, is staged to recognise the efforts of organisations in both the public and private sectors and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats and striving to keep the public safe. The Counter Terror Awards are supported by Counter Terror Business magazine and hosted in association with the Security and Counter Terror Expo. Organisations from the UK and overseas will be recognised in 20 categories for their contributions to counter terrorism. Categories include cyber security, information sharing, terrorism research, public sector contribution to counter terrorism, emergency services and outstanding contribution to counter terrorism. Detective chief superintendent Scott Wilson, former national coordinator for protective security at the National Counter Terror Security Office (NaCTSO), said: “The current threat from terrorism, both in the UK and internationally, means it is vital police work closely with commercial organisations to improve our collective security. Events like SCTX and the Counter Terror Awards give us chance to showcase the tools we have available to help companies increase their understanding of the issues and the measures they should be taking. We look forward to taking part in the awards again this year.” CLICK HERE FOR MORE INFORMATION

Terri Nicholson MSc QPM served for 30 years in the police service, performing senior leadership roles in Counter Terrorism and Organised Crime at Scotland Yard, the National Crime Squad and SOCA. For her services, Terri was awarded a Queens Policing

Medal in the 2018 honours list. Terri retired as assistant chief constable deputy senior national coordinator for counter terrorism in the UK in June 2018. She is now Vice President for International Security at Viacom – the multinational media conglomerate.

Supported by





CNI Security Developed from 2018’s cyber security theatre, this conference looks at ways to develop resilient critical infrastructure able to withstand increasingly sustained terrorist attacks, both physical and cyber. Armed Response & Intervention Supported by the MoD Police, the conference helps develop tactics for armed response units and the countering of improvised threats, with leading operators from Europe, the USA and Asia. Crowded Places This dedicated conference was developed to discuss the growing trend in ST-CP attacks, and will discuss ways for law enforcement and venues to mitigate terrorist threats to accessible public spaces.

Commander Robert James Broadhurst OBE, QPM was the 2012 Olympics Gold Commander for the Metropolitan Police Service. He was formerly

commander for public order and pan-London operational support of London’s Met Police Service. He has commanded many public order events.

Transport & Border Security Deliberating best practices for countering the threat of terrorism to transport networks, this conference is supported by the British Transport Police, the Civil Aviation Authority, and Camor. World Counter Terror Congress Aligned with the UK’s CONTEST strategy, this conference is the leading national forum for discussing national strategies for countering violent extremism and the threat of terrorism.

UK SECURITY WEEK Over the two days, UK Security Week will present full security solutions for professionals tasked with protecting people, critical national infrastructure and major assets. Running on 5-6 March 2019, the two days will incorporate five leading events and will collectively see over 350 exhibitors, ten conferences as well as multiple demonstration and

networking platforms. Join over 10,000 security professionals for two days of immersive learning, networking and exploration of the latest technologies. The co-located events that make up UK Security Week are: Security & Counter Terror Expo; World Counter Terror Congress; Ambition (for those working in emergency preparedness); Forensics Europe Expo; and the People Movement and Management Zone.

Supported by


TECHNOCOVER Providers of high integrity physical security solutions for the protection of national critical assets.

One Focus … Preventing Unauthorised Access Providing ‘Total Service’ Physical Security Solutions for Effective Asset Protection Whether for above ground, below ground or for building hardening, new build or retrofit, Technocover has unmatched design, production and installation capabilities to deliver right-first-time, lowest total cost security solutions answering physical protection challenges to any scale. Technocover work for almost every type of industry in the public and private sectors with clients including Water Companies, Energy Providers and Distributors, Highways and Rail, Telecommunications, Finance and Data Centres, Oil and Petrochemical Companies, Dock and Harbour Companies, Military and Government Establishments.

• Consultancy • Site Surveying and Risk Assessment • Design • Manufacturing and Finishing • Supply and Installation • Maintenance

For further information on products and services offered by Technocover, visit our website at Supplier ID 2380 2380 Supplier

TECHNOCOVER.CO.UK T 01938 555511

SCTX PREVIEW Ahead of the Security & Counter Terror Expo, we revisit our Counter Terror Business submission to Inside SCTX, examining what our borders may look like post-Brexit



ollowing the referendum vote to leave the European Union in June 2016, much of the weight behind the Leave vote was attributed to control of British borders. The NHS bus may have been ridiculed for it’s apparent funding lie, but it was undoubtedly immigration that burdened people’s minds. Now, less than two months away from our official departure date, details of what Brexit will actually mean to the UK are finally being revealed. Only recently, analysis of the EU withdrawal agreement suggests that Britain would lose GDP growth equivalent to the annual economic output of Wales by 2030, Chancellor Philip Hammond has conceded that the UK will be worse off under all possible scenarios and former Defence Secretary and long-term Theresa May ally Sir Michael Fallon said that the ‘worst of all worlds’ deal must be renegotiated. So far, not looking as shiny as Number 10 would have hoped for. One issue that has remained in the headlines is that of the UK border, especially in Ireland, and what it will mean for UK security, trade and migration. Lessons taken from the border between Norway and Sweden showcase how tough it would be to achieve a frictionless soft border, irrelevant of how strongly Downing Street believe it can be negotiated. The Home Affairs Committee chair, Yvette Cooper, has claimed that Home Office officials are ‘not being straight’ with MPs over the security implications of a no-deal Brexit, highlighting the possible information lost to Border Force if the UK were to be excluded from the Schengen Information System database in March. Estimates report that the database, which contains details of terrorists and criminals, is currently checked by British police officers, border and immigration officials 1.4 million times every day. That followed a warning from the National Audit Office that argued that border disruption following a no-deal Brexit could create serious security weaknesses, especially given that new border infrastructure at ports, airports and other sites could take up to three years to construct. As we are all too aware, it would not take organised criminals long to exploit any perceived weaknesses or gaps in security, and three years is a long time.

LESSONS TAKEN FROM THE BORDER BETWEEN NORWAY AND SWEDEN SHOWCASE HOW TOUGH IT WOULD BE TO ACHIEVE A FRICTIONLESS SOFT BORDER, IRRELEVANT OF HOW STRONGLY DOWNING STREET BELIEVE IT CAN BE NEGOTIATED INTERNATIONAL BORDERS Leaving the EU needn’t be a reason for a more inward facing UK, and given that air traffic is set to double over the next 20 years, and freight set to triple over the same period, any agreement and security arrangement must account for not only a freer flowing international border but also for an increasing range of threats. Assistant Commissioner Neil Basu has already warned that UK police forces are not a match for the threat of Islamist and extreme far-right terrorism, and that outlook is unlikely to improve in the next four months.

The most successful border security programmes don’t make the news. It is those that fail which hit the headlines. With a heightened focus on UK activity and borders, as well as the threat of more terrorists returning from the Syria, let’s hope for an uneventful year for our borders that excludes the issue from the front pages. L


Supported by




BREXIT By Tony Smith CBE, Chairman, International Border and Technologies Association.


ne of the standard political catchphrases in the ongoing saga of the UK’s exit from the European Union is ‘taking back control of our borders’. This is alongside ‘taking back control’ of a few other things, such as our money, laws, fishing and farming. So, what do we mean by border control – and how will this really change after Brexit (assuming Brexit ever happens, that is)? In fact, the UK already has a pretty comprehensive border control in place. Every passenger arriving in the UK goes through passport control where identity is verified and watch lists are checked. A great many of them are in fact checked before arrival, through the submission of Advanced Passenger Information (API) by the transportation company bringing them. Electronic exit checks are also in place. The only exception to this is at the UK/Irish border, where the Common Travel Area allows free movement of persons between the UK and Ireland. And the Channel Islands, for that matter.



Unlike most of the other EU Member States, neither the UK nor Ireland is part of the ‘Schengen Acquis’ which allows the free movement of people within the Schengen zone. In fact, both the UK and Ireland have a specific ‘opt out’ of Schengen – something no longer available to other EU Member States. This means that all EU and EEA passports holders will still go through passport control upon entry to the UK or Ireland; and may be refused entry in certain circumstances relating to public health, public security or public policy. Equally, ‘third country’ nationals require a permission to enter the UK when arriving from another EU Member State; and this includes a visa if they are citizens of a country on the UK visa list. So, what is the additional element of ‘control’ that Brexit will bring to the UK Border? The CTA will be preserved, so, contrary to some opinion, there will be no need for passport controls between Northern Ireland and the Republic of Ireland, E




BORDER SECURITY  although customs controls are more problematic. Everybody arriving from elsewhere will still go through passport control. What difference will Brexit make? EU MIGRATION The key distinction will be the UK proposal to end ‘free movement’ of people within the EU. This means in effect that EU and EEA (and Swiss) passport holders will in future need a ‘permission’ to enter the UK. You might argue that they already need that now – and you might be right, to a point. But under current law there is an expectation that all EU/ EEA/Swiss passport holders will be admitted at the UK Border, regardless of their purpose in coming to the UK or their proposed duration of stay. That is not the case for other ‘third country’ nationals. They need ‘permission’ (currently described in law as ‘leave’) to enter the UK; and this may be refused if they do not meet the requirements of the immigration rules. So – at some point in the future – all EU/EEA/Swiss passport holders will require leave to enter the UK, in the same way that ‘third country’ nationals require leave to enter now. And they will need permission to stay. Indeed the EU registration scheme is already underway, inviting those EU nationals wishing to stay in the UK post Brexit to register for a permission to so. So, when we talk about ‘taking back control of our borders’ what we really mean is ‘taking back control of EU migration’. This is beyond doubt a response to rising immigration figures from the EU; and the consequential impact upon UK population growth and pressure upon social services, accommodation and infrastructure in the UK to cope with this. Ironically, since the decision was taken by the British people to leave the EU in 2016 net migration from EU countries has dropped from a high of 180,00 in 2015 to 74,000 in 2018; suggesting that many EU citizens voted with their feet when they felt unwanted. Oddly, net migration from ‘third country’ citizens rose to a record high of 248,000 in 2018; the highest figure since 2004. Yet this is an area over which the UK government already has control (or should have control)? So, you might say that the government could ‘take back control’ of its borders (and by that they really mean immigration, which doesn’t have the same ring to it) without leaving the EU at all, but by issuing rather less visas and permits to stay than they do now. Something they vowed to do some years ago, with a policy intent to reduce overall net migration to less than 100,000 a year. Small wonder there has been a row in Cabinet between the new Home Secretary


Sajid Javid and the former Home Secretary and now Prime Minister Theresa May over this policy; and a change of tone to reduce immigration to ‘sustainable numbers’ rather than a set figure. In fact, many politicians argue (with some justification) that leaving the EU will compromise UK border control. That is because UK membership enables access to several EU systems such as Europol, Eurojust and the Schengen Information System (SIS2) for background checks. UK BORDER FORCE But perhaps things are rather simple. People will always disagree on immigration and asylum policy, numbers and so on. But the majority still need to feel that they have ‘control’; and policy can be adjusted in tune with the elected government of the day. This becomes more difficult when the elected government of the day cedes power in contentious policy areas such as this to an unelected supra national authority such as the EU Commission. Which is itself wedded to fundamental freedoms of movement of goods, people, capital and services. And woe betide any Member State who dares to challenge that.

The UK Border Force is one of the best in the world, training border agencies across the globe on detection, intelligence, targeting and the like. To say that we don’t have control of our borders undermines them and the great work that they do both overseas, at our ports of entry, and inland. But like anyone else they need to understand who is calling the shots on immigration and asylum policy in the UK; and what tools will be provided to them to enable them to deliver their mission. There will never be complete agreement on Brexit. It is hard to imagine a topic that has created greater division in UK society than this. But endless squabbling in the UK Parliament – and between the UK and the EU – is not helping, regardless of your position on leave or remain. The restoration of very clear powers to the UK parliament, coupled with consistent messaging and actions from our political leaders, is the most likely vehicle to satisfy people that the government is really in control of its borders – or anything else, for that matter. L




Redi-Rock Vehicle Security Barriers (VSB) ...The vehicle security system that protects from vehicle impact

To see the VSB in action Scan the QR Code

BSi specification PAS 68:2007 V/7500(N2)/48/90:1.6/0.0

Utility / Critical Infrastructure Buildings of High Importance Military Facilities Crowded Places Civil / Nuclear Installations Transport Hubs


T: 01179 814500 F: 01179 814511 E:

Fast to install Lego™ like system security blocks Removable / Relocatable No ground anchor - uses its own weight. Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 km/h (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment


It cannot be stressed enough that any product or system protecting critical infrastructure and people must always be fully operational and be available to work if and when required. Paul Jeffrey, chairman of the PSSA, looks at the importance of accreditation for entry point control


ith the heightened threat levels and the general awareness of security, we are seeing wide reaching changes in attitudes towards perimeter protection from secure fencelines and perimeter intrusion detection to entry point control using Hostile Vehicle Mitigation (HVM). Many sites, especially critical infrastructure, are securing their perimeters and creating a hardened stand off area for improved protection against attacks. Unfortunately, while awareness of threat changes are undoubtably a positive, there are elements of the reactions to changes which are often excessive and at times ill-conceived. This is because the reactions can be knee-jerk and consequently do not follow a proper process of assessment of what protection is needed, or why and how it can be properly implemented. Most of the best practice process is detailed in standards IWA-14.2:2013 (Security Barriers – Application) and IWA-14.1:2013 (Security Barriers – Performance). However, without the right partners (consultants, manufacturer, installer) the process will be difficult to complete satisfactorily.

THREAT ASSESSMENT Before embarking on any proposal for the implementation of entry point control, it is essential that there is a full understanding and quantification of the threat, including the assets under threat, stand off needed to protect those assets, consequential risk (collateral damage) and possibilities for passive mitigation designs. Detailed threat assessments are usually very complex and require a large amount of experience and knowledge to be completed satisfactorily. As the initial assessment is the cornerstone of the design of any entry point control, it is always recommended that expert consultants are used to carry out this function and they will follow the principles set out in IWA-14.2 2013 (Security Barriers – Application) which superceded the PAS69 standard. It is more common than you would expect for a high security system to be installed on an entry point with no consideration being given to a remote exit point leading to the same critical assets and these projects have invariably missed this vital step in the design process or have used inexperienced or unqualified consultants. E




REDUCING YOUR RISK: TAKING A SECURE APPROACH TO BUILDINGS SECURITY Security is one of the fastest growing industries globally and the need to keep organisations safe is increasing. Robinsons Worldwide Solutions Ltd offer a range of solutions against potential threats

In today’s society, we witness security breaches to organisations all over the world. Some of the likely threats or security risks that may be experienced are theft, vandalism, sabotage, unauthorised access, violence, burglary and terrorism. Owners of buildings and offices have the responsibility to keep their assets safe and equally staff and visitors. With people spending about 90 per cent of their lives indoors, and the majority of this is at their work place, buildings are far more than just four walls. In this modern and fast paced world, security is more important than ever. It is one of the fastest growing industries, and there is a real reason for this, and it’s not going to go away. So when we talk about security, it is not just limited to just physical attack. Organisations should therefore research their own possible security risks or threats that may endanger their own businesses. At this point, Robinsons Worldwide Solutions Ltd (RWS LTD) would be engaged to assess the current organisation identified threats and provide a professional Security Risk Assessment to inhibit these threats, including any identified additional security concerns.


MAIN RECEPTION As office reception areas are open and welcoming, these are open to security breach and should be equipped with the appropriate security measures. RWS Ltd offers a range of security options to help prevent physical breach and attack. Whether a building is new or undergoing refurbishment works, RWS Ltd offers a comprehensive range of security speedgates, portals, cabins and revolving doors with option for firearms detection. Depending on the client requirements, the portals, cabins and revolving doors are provided at different levels of passage and are bullet resistant up to and including level BR4. All companies should have an emergency response plan, and knowing that your employees understand and know what security measures your company has is critical to maintaining the security level of the workplace. This way when a security procedure is carried out, it is done so correctly ensuring all members of staff can feel safe within their workplace if an event were to ever happen. ACCESS CONTROL There are many levels of access control available in today’s security market, integration through graphical user interface benefits from single or multiple control locations. Introducing access


control methods that manage high people flow typically moving about offices and public buildings is instrumental in today’s fast pace working environment. RWS Ltd elegant speed gates and revolving doors provide the high people flow requirements needed combined with security. Our high performance systems seamlessly link with proven technology control methods such as key code and barcode, single or dual biometric control and proximity card readers, confirming personal identification and maintaining safe controlled passage. RWS Ltd will integrate with existing security systems or bring a completely new secure solution to the client. With over 30 years’ experience designing and installing security solutions incorporating blast and ballistic facades/windows and internal security screens throughout the UK and Europe, we are the experts you can trust. L

FURTHER INFORMATION Steve Moody: / 07894 588 546

PERIMETER SECURITY  The implementation of any project of this type could greatly impact the running of the facility and it is important to identify and engage with all stakeholders in the early stages of the project design to ensure smooth implementation and buy in. It should not be forgotten that any barrier system will impede vehicle access and this often leads to frustration by users which is easier to manage if all stakeholders are ‘on board’ from the start. OPERATIONAL PROTOCOL The physical operational impact of entry point control is something that is often missed in consideration of protection measures. There have been many instances where a control point has been implemented, gone live on day one and then switched off on day two due to the impact on local transportation links. Obviously, this is not a good situation and can easily be avoided by anticipating and considering the consequences of the implementation of a control point on the environment. For example, if the threat assessment allows, the operational protocol for entry point control can be varied to accommodate peak traffic flows by using the traffic itself as the barrier until the flow becomes more manageable. While this would necessitate a secondary more advanced check point, it would not necessarily require any barrier control.

DUTY OF CARE As an employer you have a responsibility (whether legal or moral) to staff to protect them from harm and while with security protection this is not always possible, there should at the very least be a clear and documented understanding of the risks of the roles and an assessment of what (if any) protection can be put in place. If a threat assessment identifies a serious risk that requires an intervention or protection in the form of entry point control then you are understanding and accepting that there is the possibility of a major incident and are crystallising the likely location of that incident with a control point. Any staff deployed to operate systems at the control point (or other staff/general public in the vicinity) will consequently be at enhanced risk and need to have a carefully considered plan to mitigate the risk. The concern is that when the risk is an explosion then the reaction is often

ONCE AN ENTRY POINT CONTROL SYSTEM HAS BEEN ASSESSED, DESIGNED, PROCURED, INSTALLED AND COMMISSIONED, IT IS VERY EASY TO CONSIDER THE PROJECT COMPLETE Operator training is an essential part of any security system and possibly even more critical when it comes to entry point control. With the wide spread use of sub-contract security companies to operate and maintain site security, the ultimate stakeholder is more remote from the frontline security in both the literal and theoretical sense. This makes the need for a clear and auditable process for training even greater and stakeholders need to be sure that proper training is being carried out continuously. Don’t forget that the equipment being deployed at these check points can, if misused, be lethal and you would not issue a loaded gun to untrained staff! Operational Health and Safety is always the most important consideration and any barrier installation will need to have a safety risk assessment completed before commissioning, although a safe operating procedure should have already been incorporated within the protocol and any residual safety risks addressed by safety systems on the physical equipment.

‘there is nothing that can be done to reduce the localised effect’. While this may be the case, if you can mitigate the risk by even a small percentage then, given that as an employer you are putting employees at an enhanced danger level, any improvement in protection, however small it may seem, should always be considered. Risk mitigation can take in many forms and can include physical protection from blast/ballistic attack, as well as adjustments to the operational protocols ensure that the least amount of personnel are at risk at any point in time. SELECTION PROCESS With the development of more and more innovative physical blocking solutions, careful research of what is available using product sourcing sites such as HVM hub will aid the process considerably. Whole life cost should always be understood when selecting products and this should include not only the product cost but foundation

requirements/cost, installation, warranty periods, maintenance costs and life expectancy. Information on duty cycling and mean time between failure will also help with the selection process. Using vetted manufacturers (for example PSSA members) will always give some additional confidence that what is being procured/used is from a reputable source with a history of successful projects. Project references are a valuable source of confidence support and can often highlight potential issues that have been seen on similar sites. MAINTENANCE While maintenance would arguably sit outside the selection and implementation process (other than whole life costs), it is necessary to include at least a few comments here due to the often overlooked or ignored nature of this area of work. Once an entry point control system has been assessed, designed, procured, installed and commissioned, it is very easy to consider the project complete and this is exacerbated by the likelihood that the maintenance work is more likely to form part of a different department. The purpose of the system installed and operating is easily forgotten in time, and the criticality of the ongoing functionality of equipment (that was originally installed as a potentially life saving piece of equipment) may be reduced in importance. It cannot be stressed enough that any product or system protecting critical infrastructure and people must always be fully operational and be available to work if and when required. This is why proper and regular maintenance by fully trained and competent engineers (such as PSSA Installer members) of the equipment should be, and remain, the highest priority once system has been commissioned. SUMMARY Any entity that enters into a process as described above is doing so to protect lives and critical infrastructure and following the correct process with the best consultants/partners will ensure the best solution. L




Experts in Perimeter Protection Demarcation | Entrance control | Detection

Heras designs, manufactures, installs and services complete perimeter protection solutions across the UK. Experts in perimeter protection


With the threat of vehicle-related attacks on the rise, Gavin Hepburn, director at ATG Access, discusses best practice for airport security officials looking to upgrade their retrospective solutions

PROTECTING AIRPORTS AGAINST VEHICLE RAMMING ATTACKS I nternational airports unfortunately have been, and continue to be, a key target for acts of vehicle-related terrorism. This is largely due to the fact that airports have always had to remain as public spaces, accommodating both vehicle and pedestrian accessibility. Airports are classed as critical national infrastructure and so represent a severe blow to society, both economically and symbolically, if successfully attacked. Among the first recorded instances of such an act occurred in 2007, wherein a Jeep Cherokee – loaded with deadly explosives – was driven directly at the doors of Glasgow Airport and set ablaze. A far more recent example occurred in Lyon last September, when a man drove

a stolen car into the local airport’s terminal doors before speeding onto the runway. While casualties were minimised in these instances, there have been a string of similar vehicle-ramming incidents across a range of public spaces over the past decade. Vehicle attacks can cause major damage in a very short period of time, can come from virtually nowhere, and have thus become an increasingly common feature of violent terrorist acts throughout the West. Preventing this type of attack has therefore naturally become a key concern for security officials. However, the act of protecting airports is rather different to other public spaces, such as sports arenas or concert venues. After all, E




14 scholarships – crime, terrorism, forensic science and policing courses Fourteen scholarships MSc in Crime and Forensic Science

*MSc in Crime Science *MSc in Countering Organised Crime and Terrorism

*MSc in Policing

Call: +44(0)20 3108 3206

*now available via distance learning These courses are created in partnership with police and industry organisations and are ideal both for practitioners seeking to progress their careers and for students wishing to enter these fields. • UCL consistently ranked as one of the world’s best universities (Ranked 7th in QS World University Rankings 2017). • Our department ranked joint-1st in the UK in the last Research Excellence Framework (REF 2014) for world-leading impact. • Certificate and Diploma also available.

Email: 36


AIRPORT SECURITY  airports are open and frequented by the public 24/7 and this means that operational disruption must be kept to a minimum. However, thanks to advancements in technology, there are a wealth of options available for fast and effective deployment of security measures to minimise operational disruption. With this in mind, let’s take a closer look at how airports can upgrade their security solutions. BUILD ON EXISTING SYSTEMS Key to minimising the disruption caused by installing security measures is first assessing the solutions which are already in place, and subsequently building upon these foundations. The aim should not be to completely replace existing systems, but rather to take a close look at how they can be adapted or augmented to better suit each airport’s individual security needs. Therefore, the first stage of implementing any new hostile vehicle mitigation (HVM) strategy should be to determine exactly what the aims of the project will be and the realistic level of threat, as well as how it will integrate with incumbent solutions. Security officials must think carefully about exactly when, where, why and how traffic needs to access different areas of the airport at any given time, in order to ascertain the most suitable security methods to deploy, and decide which locations will need extra protection. For example, given that runways are vulnerable to vehicle access – as we recently saw in Lyon – extra protective measures, such as strategically-placed bollards at different access points, should be an important part of any airport security solution. ERADICATING THE THREAT – NOT JUST MOVING IT Of course, an airport is far more than just the terminal itself. Protecting one area of the airport in isolation – at the cost of other areas such as the runway or the airport exterior – would not actually eradicate a terror threat, but simply move the area of impact. For this reason, it’s important to not forget about other locations not directly part of the airport, such as the outer perimeter. These places are also likely to be a prime target for attack considering the volume of pedestrians that gather outside the terminal for additional transport and transfers. To ensure that airports are sufficiently protected requires a multi-layered approach which encompasses all areas. This could be through a combination of physical security measures and human factors – such as more security staff inside the terminal, and a greater emphasis on physical measures to protect the perimeter – to effectively safeguard all areas of the airport.


DISCRETION IS KEY Disruption is by no means the only consideration when it comes to security solutions. While visible measures such as armed security officers, concrete barriers and bollards certainly minimise damage, to civilians they can also be a disquieting reminder of the threat terrorism can have. Therefore, a balance must be struck between access and aesthetics, in order to ensure that the public feel as safe as possible. Security solutions have now advanced to the point wherein discretion no longer needs to be sacrificed for quality or overall effectiveness. Some examples of solutions which could be implemented to balance protection with discretion are crash test certified street furniture items, which can blend seamlessly into the background, and stainless-steel bollards, which can be retracted when not needed. Changi Airport and Dubai Airport are both fantastic examples of aesthetically pleasing security schemes being completed to protect international airport infrastructure. In an airport context, shallow mount bollards, deployed at multiple areas throughout the airport, work particularly well. These bollards can

be deployed quickly and discreetly, without any extensive foundation preparation work required or need to disrupt airport operations. PREVENTION IS THE BEST CURE If recent incidents such as Lyon have taught us anything, it is that even ostensibly secure spaces, which have been the subject of constant security attention for decades, are still not safe from attack, highlighting a need for constant vigilance. For security measures in and around airports to remain one step ahead of any future attacks, the highest of standards must always be maintained. We must look at the likes of Lyon and Glasgow as a crucial reminder of the need for continual investment in our airport security, ensuring that these public spaces are never the ‘soft’ targets so favoured by terrorist organisations. After all, airport security protects the safety of thousands of people daily – and one misstep could prove fatal. L




Do you need the last civilian technology to secure the lower airspace above your critical infrastructures or outdoor events against malicious drones? Drone Detection Sys is your C-UAS expert to protect the 3rd dimension. Technologies to detect, locate, identify and defeat: RF Sensors Radars Electro-optics and IR Sensors Jammers* SCTX London 5-6 March 2019, Stand: E65 For more info: Email: Phone: +41 79 544 48 37 *Solely for authorised governmental bodies




ounter-UAV defences are now top priority for airports and critical infrastructure around the world, after drone panics that saw the military called into assist at the UK’s two largest airports. But public and media scares about mystery aerial intruders have been precursors to new aerial technology before, argues Tim Robinson Nearly a month on from a 36 hour shutdown that saw thousands of passengers delayed, flights cancelled at the UK’s busiest single-runway airport during the most hectic time of the year, the motivations of who was actually behind the ‘Gatwick drone scare of 2019’ are still a mystery. Was it one, multiple drones? Ecoprotesters, a criminal blackmail gang or a ‘hybrid warfare’ test? There is also the uncomfortable possibility, raised by the police themselves, that there was in fact no original drone menacing the skies and it was a case of escalating false alarms as people reported official UAVs searching for the intruder. False alarms and media hysteria about ‘rogue drones’ popping up everywhere and causing a knee-jerk reaction is nothing new. Indeed over 100 years ago, there were reports of ‘Phantom Airships’ by the public in the UK and US – mystery dirigibles sightings by the public, that in some cases were whipped up and exaggerated by the press, who had spotted a guaranteed

headline-grabber. These occurred just as the potential of steerable lighter-thanair vehicle technology was entering the public consciousness. Paradoxically, of course, the last wave of mystery airship sightings over the UK in 1913, was followed only three years later by actual hostile airships in the form of German Zeppelins, reigning down death and destruction – and causing public, media and political outrage in Britain. These airship raids, along with the fixed-wing Gotha bomber attacks in 1917, thus contributed to pressure for an independent air service, and laid the seeds for RAF’s air defence network that would be so critical in 1940. COUNTER DRONES NOW A HIGH PRIORITY In a sense then, the identity of the perpetrators does not matter. The public and media outrage over the shutdown (whether justified or not) has seen Counter Drone (or C-UAS) measures catapulted right up the priority list of the UK Government’s already stuffed in-box – and visibly demonstrated (luckily without loss of life) the vulnerabilities of critical infrastructure to this technology. For defence planners, security experts and airports, both in the UK and around the world, this has been a timely wake-up call to prepare and defend against a cheap, yet difficult to counter form of air attack. As one BBC correspondent has noted from the Iraqi police and army’s

experience fighting IS armed drones, the only really concrete CUAS solution, is to find and kill the operators. What was an asymmetric weapon used by ISIS in Iraq and Syria, armed consumer drones in radical groups (or individual) hands have the potential to carry out precision assassination strikes – as has been seen in Venezuela and most recently Yemen. However it is important to remember, that as with the ‘mystery airships’ of the 1900s, thanks to today’s 24 hour rolling news coverage and social media exaggerating every sighting, a large proportion of unidentified lights or objects in the sky are likely to turn out to be hoaxes, misidentified aircraft or balloons, or even, as in one pilot aerial near-miss report, a plastic carrier bag. Overreaction in some cases, may be just as (economically) damaging as underreaction, and sifting genuine reports from false alarms will be a major challenge. What is true is that that the drone era is well as truly with us.

This article was originally published on the Royal Aeronautical Society website. Tim Robinson is Editor in Chief of AEROSPACE - the flagship magazine of the Royal Aeronautical Society.





PANEL OF EXPERTS What can we expect to see in the future, from a rapidly changing IT security landscape?




Andy Burston is a member and advocate of the Information Systems Security Association UK, a registered charity and membership body to help others further their career and to ensure that providers have a safe environment to collaborate and share ideas.

In this role as senior director he uses his 15 years of experience in cyber security to protect Leidos Corporation and support the cyber goals of clients around the world.

Sascha Giese holds various technical certifications and has more than 10 years of technical IT experience, four of which have been as a senior pre-sales engineer at SolarWinds.

Andy has 15 years’ experience as a police officer including in cyber security operations before moving to the private sector. He currently works for CGI and leads on data protection project delivery within UK HMG.


n today’s modern world the blurred edges between the physical and digital domains means that cyber security is quickly finding itself at the forefront of the global conscience. As British mathematician Clive Humby opined last decade, if ‘data is the new oil’ then the protection of that data becomes a sovereignty imperative transcending from the national level through to individual citizens. Andy Burston, our panellist from ISSA UK, says that rather than using an oil comparison, data is actually like sunlight - it will not run out anytime soon. If handled well


When not on a plane, most of his time is spent coaching his son’s sports teams or enjoying a rare quiet moment on the back porch with his wife.

then we greatly benefit, if handled poorly or we ignore it, we burn. After 2017’s headlines on how the NHS was affected by the WannaCry ransomware, the public sector has been relatively quiet in terms of the changing IT security landscape. However, the lack of a specific targeted attack against the public sector causing this kind of widespread disruption in 2018 should not be cause for complacency. The same automated tools developed to assist digital purging will lend themselves to a number of alternative applications including a police service looking to solve long standing missing person cases by contrasting the


As a senior pre-sales engineer, Sascha was responsible for product training SolarWinds channel partners and customers, regularly participated in the annual SolarWinds Partner Summit EMEA, and contributed in the company’s professional certification program, SolarWinds Certified Professional.

photograph of many years ago to the masses of data online today. Or perhaps a health authority seeking to recognise the tell-tale symptoms of disease and ill health in a single individual across as many sources of bulk digital evidence as possible. Andy suggests that this enables the broader ethical approach to data retention. The more options made available to an individual in respect of just how much they ‘opt in’ and how accurately their data is retained and presented, then the more confidence others will have in the security and data protection approach of the organisation concerned. E




The Annual Event




TWO EVENTS ONE LOCATION BAPCO Annual Conference and Exhibition TCCA Critical Communications Series

REGISTER NOW @BAPCOEvent @CritCommsSeries

Reasons to Attend

New for 2019

BAPCO with TCCA’s Critical Communications Europe (CC Europe) 2019 is a key industry event supported by leading professionals in technology, critical communications, public safety, transport and emergency services. The expert-led conference sessions will cover topics that are crucial to keeping up-to-date with the latest innovations and developments, attendees will also be able to: •

Network with the communication industry's biggest suppliers

Compare and source new comms methods, products and services

Receive free expert advice on the implementation and management of equipment and technologies

Attend best-practice workshops and pose questions to the experts at the industry's forefront

Learn how to increase service efficiency and reduce costs

Do business, make new contacts, and place orders face-to-face

Drone Zone

Showcase Theatre

Our Sponsors PLatinum Sponsor

Gold Sponsors

Networking Zones

Silver Sponsors

BAPCO Annual Dinner

PANEL OF EXPERTS  Bill Brennan of Leidos says that, when considering what we can expect to see in cyber security’s future, the challenges are extensive but the requirements coalesce into a few critical areas. Sascha Giese is in complete agreement, claiming that there is no question that the threat landscape is diversifying and changing as public sector security teams and hackers face off in an ongoing race against each other. Giese also points out that it is not just the threats that are diversifying, but also the angles of attack. As we move to an always-on, always accessible digital culture, attackers no longer have to lie in wait, watching for an opportunity. Research shows that the cyber attack surface is ever growing with the advent of the Internet of Things and its 31 billion devices projected by 2020. You only have to read our second Panel of Experts discussion in September with Gabe Chomic, Simon Daykin and Paul Parker to be reminded that, while IoT is a natural evolution of our technology enabled and connected world, it also poses a security risk. This is part of the dichotomy of moving to the cloud. On the one hand, the cloud offers a standardised approach that is easier to manage. On the other, adopting cloud infrastructure puts control of the physical and network access in the hands of a third-party provider. This means that tremendous quantities of data are made readily available in computers no longer protected by an organisation’s own security infrastructure. While the cost, speed, and functionality benefits of adopting cloud computing are irrefutable, data-centric cyber security has to be a key strategic element. Many of these devices were never engineered with security in mind but instead the priority was put on connectivity and functionality. This provides bad actors ready access to control everything from cameras, to automated doors and locks through security systems from the safety of their home locations. As more devices become Internet connected it is imperative that our cyber security solutions protect these devices without impeding the functionality they are intended to deliver. While security is regularly seen as a binary, all or nothing endeavour, the modern solutions must recognise and balance risk effectively. Then we must consider how well directives are followed. Sascha highlights how people seem less engaged with critically considering the security implications of new infrastructure; when organisations receive a directive to adopt the cloud, for example, it can be difficult for individuals to feel confident and enabled to disagree or challenge the decision from a security perspective.

A big part of this is the need for general awareness, throughout public sector organisations. These days people expect there to be physical security when you’re at a train station, and it can be useful to apply a similar level of vigilance to IT threat awareness in public sector security. IT users might not know how a cloud works, and they don’t need to, they just need to ensure that it is secured. Bill Brennan emphasises that there is a worldwide dearth of cyber professionals, with a projected shortfall of over two million openings worldwide by the end of the decade. This is also complicated by a dramatic lack of diversity in the cyber security workforce which further shrinks the workforce capacity. Without significant increases in the global workforce this shortfall will further compound the challenges of securing IT devices.

THERE IS A WORLDWIDE DEARTH OF CYBER PROFESSIONALS, WITH A PROJECTED SHORTFALL OF OVER TWO MILLION OPENINGS WORLDWIDE BY THE END OF THE DECADE Planning to educate end users about security matters is a task that IT should be devoting the same level of preparation to as, for example, planning to secure operating systems. Sascha and SolarWinds establish three steps public sector organisations can take, in the defence space and beyond, to be more prepared for whatever IT security threats emerge in 2019: root out vulnerabilities; keep your security procedures checked and up to date; and embrace a range of defences. The watchword for 2019 is very much vigilance when it comes to the changing IT security landscape. As threats diversify and cyber criminals get smarter in their targeted assaults, it will be all down to ongoing preparation to be able to withstand any attack. Leidos suggest that the solutions to the future challenges in cybersecurity will be found in achieving visibility and by optimising the human/machine interaction. As Bill says, ‘you cannot protect what you cannot see and you cannot control what you cannot track’. Future success will be dependent on finding secure ways to protect the devices holding and processing organisational data. Additionally, a keen understanding and execution of data governance, understanding what data is and its importance/risk to the organisation, separate successful organisations from their peers. L

EXPERT FINAL THOUGHTS ANDY BURSTON, ISSA UK “Innovation and fresh thinking are key for the cyber security industry to maintain their competitive advantage. However, the security future in the next five to 10 years will be just as much a change of mind-set as technology. Organisations will increasingly carefully consider their behaviours and responsibility to data long after the noise surrounding high profile breaches die down. Consumers cannot assume that the mere adoption of technology or services makes them any more secure than previously thought without first taking the appropriate steps to identify what personally and corporately matters most.” WILLIAM BRENNAN, LEIDOS “In the near future the reliance on machines for automated cyber defence must exponentially increase; this is not to downplay the importance of humans but instead underlines their key role in success. The advent of modern SOAR (security orchestration, automation, and response) technologies will change the role of humans from operators of machines to curators of actions. The closer integration of machine learning and eventually artificial intelligence into cyber defence will require humans who can not only do the action themselves but teach a machine how to make the decision to take that action automatically in the future.” SASCHA GIESE, SOLAR WINDS “As the IT security landscape changes, the main challenges will be awareness and user education. Remaining vigilant and prioritising training to meet new and emerging threats is a useful first step. On top of this, investment in the right range of IT security tools such as automated patch management, device tracking, network monitoring, and firewalls can help public sector organisations be ready for whatever 2019 may bring.”




BUILDING CYBER RESILIENCE IS CRITICAL AS THREATS RISE CYBER SECURITY Given the pace of change and scale of threat in the digital world, Steve Durbin, managing director at the Information Security Forum, details how organisations can increase their cyber resilience profile over the next twelve months


t’s becoming an all-too-familiar refrain, but it’s nonetheless true — 2018 was another banner year for cyber crime, data breaches and reputational ruin. We’ve added political drama, such as government shutdowns and manipulated elections, to the usual drumbeat of personally identifiable information (PII) exposures, ransomware attacks and banking malware. Traditional security risks have long since become central business risks. The scope and intricacy of the challenges around sustaining a business and protecting data assets in the digital era have pushed cyber security risk to the top of the executive boardroom agenda. The threats are growing in every dimension: variety, scale, complexity, country of origin, and type of bad actor — from script kiddies and hacktivists to organised cyber crime rings and foreign intelligence operatives. Then there are the persistent factors like human error, loss and theft of physical devices, malicious insiders, and security skills gaps and shortages. In modern digital ecosystems, proactive risk management and multi-layered defence must be structured and sustained as enterprise-wide efforts.



GUARDING HIGH VALUE ASSETS IS A VITAL TO CULTIVATING RESILIENCE C-level executives and senior information security and IT practitioners are accountable to report and educate stakeholders about the corporate risks associated with their organisation’s activities in cyberspace. Highly publicised breaches, financial loss and a growing collection of privacy and security regulations have made the hot seats hotter in organisations around the world. The pressure is on to assure stakeholders that the highest value assets — the ones that pose the greatest risk to the company if compromised — are monitored and protected as comprehensively as possible. Assets such as property, plant and equipment are tangible. Digital assets are intangible and represent a distinct type of risk. The most valuable intangible assets generally fall into one of two buckets: legal, including trade secrets, copyrights and customer lists; and competitive, including company culture, collaboration activities and customer relationships. Both types are essential drivers of business continuity, market advantage, and shareholder

INFORMATION SECURITY value. It’s common practice to rank the importance of information using a simple classification chart. It’s vital to remember that mission-critical information assets represent only a thin slice of the top layer. Assets may be ‘high’ or ‘critical’ in value but not designated as mission-critical. Ensuring that all intangible assets central to sustaining business operations are identified, assessed, and secured requires a new, more nuanced approach to risk management. DEVELOPING RISK RESILIENCE To anticipate, mitigate, and respond to the negative impacts of cyberspace activity, organisations must extend risk management to include risk resilience. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Fortifying governments and enterprises to build up broader ecosystem resilience is imperative — everything is interconnected and interdependent, including risk. Cyber resilience requires a balanced approach that protects both

THE ARRAY AND SOPHISTICATION OF CYBER SECURITY THREATS WILL CONTINUE TO RISE SIGNIFICANTLY OVER THE NEXT DECADE organisations and individuals while also enabling open, safe commerce and communications. This is an exceedingly difficult balance to strike, as many organisations learned during their GDPR preparations. In order to achieve cyber resilience, risk management should encompass confidentiality, integrity and availability of information. At the same time, resilient organisations recognise and prepare for the unintended business consequences from cyberspace activity, including commercial, financial, and reputational damage. MAKING CYBER SECURITY EVERYONE’S JOB Cyber threats are no longer the sole domain of information security. All business units are affected, as are external customers, suppliers, investors,

public relations and advertising agencies, and other stakeholders. Senior business leaders, preferably the chief executive or chief operating officer, should take a coordinated, collaborative approach to preparing the organisation for unpredictable events. Organisations must be agile in order to prevent, detect and respond quickly and effectively, not just to the technical aspects of incidents, but also to the fallout. An incidence response team comprised of areas from across the organisation should be created to develop and test plans, investigations, and followups. This team should be equipped and trained to respond quickly to an incident by communicating with all parts of the organisation, notifying individuals who might have been compromised, cooperating with regulators, and diligently monitoring for delayed consequences. E




Delivering peace of mind around the world. More and more customers everywhere let us know every day how much they appreciate the work we do to help them protect, control and track their keys. We invented key management, and we just keep making it better for you.

Product door not shown in image. Fingerprint reader optional.

Visit to learn more

think inside the box.

INFORMATION SECURITY to an already heavy compliance burden. Companies need to use better reporting tools and data governance platforms to streamline workflow and integrate risk management activities. Security and incident response procedures should be in place and tested. Be sure to step up your security assurance requirements for vendors and business partners.


BUILDING A SUCCESSFUL CYBER RESILIENCE PROGRAM It’s increasingly clear that traditional risk management isn’t nimble enough to deal with constantly evolving threats over which organisations have varying degrees of control. A comprehensive cyber security program leverages industry standards and best practices to protect systems and detect potential problems, along with processes that provide actionable intelligence on current threats and enable timely response and recovery. Leveraging a resilience-based approach to apply cyber security standards and practices leads to comprehensive and cost-effective risk management that goes well beyond compliance requirements. Cyber resilience is about ensuring the sustainability and success of an organisation, even when it has been subjected to the almost inevitable attack. By adopting a realistic, broad-based, collaborative approach to cyber security and resilience, government departments, regulators, senior business managers and information security professionals will be better able to understand the true nature of cyber threats and respond expediently.

 MANAGING RISING COMPLEXITY The array and sophistication of cyber security threats will continue to rise significantly over the next decade. Managing cyber risk from cyberspace must extend beyond traditional information security parameters to include employee devices, third-party suppliers, mergers and acquisitions, and the Internet of Things (IoT). As they prepare to deal with existing threats as well as ones we’ve yet to imagine, there are three main drivers’ businesses must consider:

Internal threats - As technologies bring new benefits to the enterprise, they also increase risk, particularly when security implications are not thoroughly assessed prior to implementation. Periodic reviews of the business impact and risks stemming from supply chain should be conducted. Employee policies and procedures for BYOD programs as well as password logins should be optimised and enforced. Your security team should

be involved at the outset in reviewing the security of any new suppliers.

External threats - State-sponsored espionage, widespread ransomware, and attacks on systems used to manage critical infrastructure in the real world (banks, hospitals, utilities, industrial control systems, municipal governments, etc.) are outpacing IT resources, even at the largest and most well-protected organisations. Enterprises would do well to follow government’s unified situational awareness approach with controls in place to monitor, detect and remediate problem areas in real-time. Collaboration and sharing of attack information with trusted law enforcement agencies and business partners will also help to keep external risks in check. Regulatory threats - In the cloud era, regulatory mandates, data privacy laws, and the push towards greater private/ public sector collaboration and disclosure about security preparedness is adding

TIGHTENING THE GAP BETWEEN AWARENESS AND ACTION Preparation is the key to resilience. Following is a short list of next steps to consider in the year ahead: focus on the basics; include both people and technology; adopt policies and procedures that engage; prepare for the future; be ready to support new business initiatives; align security with risk management; change your thinking about cyber threats, risk, and resilience; re-assess the risks to your organisation and its assets from the inside out; collaborate and share insight and intelligence; and understand your unique and shared vulnerabilities. Business leaders readily recognise the enormous benefits of cyberspace — innovation, productivity, and engagement with customers. It is much more difficult to intelligently assess the risks versus the rewards, and then act from that understanding. Leading the enterprise to a position of readiness, resilience, and responsiveness is the most proactive way to secure assets and protect customers, partners, employees, and the bottom line. L




Institute of Risk Management

Prepare for risk in the digital age with the IRM’s new Digital Risk Management Certificate Enrolments open now at a special introductory price of just £995 > The digital world and the “4th industrial revolution” > Digital disruption, organisational and societal change > Risk management principles and practices in relation to digital risk > Ethical implications of digital innovation > Principles and practice of cyber security and incident management > Audit and assurance for digital and emerging risk

Developed with

Find out more and test your knowledge with our quick quiz at Developing risk professionals

Recognize AND Analyze Is she an employee? How often was she here this month? Is she a known suspect?

Premier face recognition technology for real-time video surveillance, recorded video investigation, crowd detection, and anonymous people analytics |



When, where did she enter? Does she appear in videos recorded last week?

How old is she?




recent freedom of information request by The Independent revealed that the Metropolitan Police has spent more than £200,000 on controversial facial recognition trials that resulted in no arrests. The newspaper claims that the police force spent over £222,000 on several live facial recognition trials – not including the cost of uniformed and undercover officers – and didn’t make a single arrest. In fact, six deployments were made by the police which resulted in only two people being stopped, and then released. Trials carried out between August 2016 and July last year saw 110 people’s faces registered as potential ‘alerts’ against watchlists of wanted criminals, the majority of which came at 2017’s Notting Hill Carnival. Despite the police saying that members of the public were informed facial recognition was being used by posters and leaflets, the Independent claims that no one questioned after having passed through a scanning zone in central London in December had seen police publicity material, causing campaigners to suggest that the technology is being rolled out ‘by stealth’.

The National Police Chiefs’ Council is reported to be considering drawing up national guidance on how the technology should be used, despite the lack of arrests during trials, in a move that critics have labelled as a ‘shambles’ and a waste of public money. Cressida Dick, commissioner of London’s Metropolitan Police, has publicly claimed that the government desire for the police service to transform itself and make use of new technology is being ‘hamstrung’ by outdated technology. After some schools in the US discussed bringing in facial recognition technology to combat gun violence, critics asked the state Education Department to block the technology from any New York school, saying it would ‘have a chilling effect on school climate’. So, to what extent can biometric technology be seen as aiding the fight against terrorism? BIOMETRIC DATA In December 2017, INTERPOL revealed that it was working to increase the use of its biometrics databases and capabilities to better track their movements globally. Project First, launched earlier this year, is among INTERPOL’s initiatives to assist

law enforcement in member countries in enhancing their border security through the use of biometric data – such as fingerprints and facial recognition – on foreign terrorist fighters and other individuals linked to terrorist activities. Speaking at the 1st INTERPOL Fingerprint and Face Symposium, also held in December 2017, INTERPOL Secretary General Jürgen Stock highlighted the importance of law enforcement moving from a ‘need to know’ to a ‘need to share’ culture relating to biometric data on known and suspected terrorists, and ensuring that this data reaches officers on the frontlines in a timely manner. The police force network, whose fingerprint database contains more than 180,000 records supporting more than 40,000 searches every year, contributes the success of biometric monitoring with the capture of an individual wanted in connection with a terrorist attack in the Caucasus, after Greek authorities ran checks of migrants arriving by boat against INTERPOL’s fingerprint database. More recently, in February last year, police in Buenos Aires arrested an internationally wanted murder suspect after his image was identified as a likely match by facial recognition technology. AIRPORT SECURITY In October 2018, Shanghai Hongqiao International Airport became China’s first to launch an automated security clearance system using facial recognition. The eight security machines that form the system scan passengers’ ID cards and faces to check they match, reducing the clearance procedure time to around 12 seconds. Although primarily focused on speeding up the passenger journey through the airport, from the check-in desk to boarding, Shanghai, which took three years to develop the system, is just the latest in a long line of airports keen to jump on the biometrics bandwagon. Plans for a full-scale roll out of new Heathrow facial recognition biometric services from the summer of 2019 were also announced in October, promising to reduce the average passenger’s journey time by up to a third. The airport, recently under fire for drone sightings, claims that, as well as being beneficial for the passenger, facial biometrics offer increased security. Gatwick Airport promised something similar in May.



Life saving decision making in the palm of your hand!

Mira DS is the new handheld chemical identification system from Metrohm. Identify hazardous chemicals, explosives and narcotics in seconds! • Powerful – respond to threats faster and safer than ever • Fast – deployed in <1min, results in seconds • Flexible – choice of probes for sampling safely • Tough – IP67 sealed, drop/shock tested Find out more at


Forensics Europe Expo is the most important forum of discussion and debate for the global forensics community



orensics Europe Expo, taking place on 5-6 March, is the meeting place for thousands of senior buyers looking to source the latest technological innovations on the market and to hear about recent developments in the industry. For the first time, Forensics Europe Expo will take place on the same show floor as Security & Counter Terror Expo at Olympia, London. As part of UK Security Week, the show attracts over 1,500 international forensics professionals from the government, law enforcement, laboratories, private sector, military, legal sector, universities and intelligence sector. The event continues to be the most important forum of discussion and debate for the global forensics community. The conference programme will deliver high-level speakers discussing the latest industry trends. Following Roy Isbell’s opening remarks to kickstart the first day of the event, the first session will be hosted by Brian Cusack, director of the Cyber Forensic Research Center at AUT University. His session will be about making sense of digital forensic international standards. Scott Zimmerman, legal editor at Digital Forensics Magazine, will follow

with a presentation on social media, the dark web and admissibility. Digital evidence gathered through a traditional investigation is well understood, but nowadays, it is more likely that evidence will be gathered from multiple remote systems which are not under the control of the investigators. This session will take a look at two categories of remote evidence: social media and the dark web. Gareth Davies, academic and cyber consultant at the University of South Wales, will lead a talk on vehicle data forensics on unsupported systems. The presentation will help attendees understand how to approach a vehicle from a digital forensics perspective, covering a range of infotainment units, data extraction methods and examples of what data types can be used as digital evidence. Dan Pierce, PhD researcher at Staffordshire University will discuss how the Internet of Things can be used for investigations and intelligence. NLP algorithms are at the foundation of the increasingly popular virtual assistants such as Amazon Alexa, and empower such devices to interact with users on an almost human level. Deployment of similar technology within digital

forensic investigations has the capability to search vast evidential data sets based on sentiment and emotion. Joseph Pochron, president of forensic technology and consulting at Transperfect will discuss contemporary collection techniques that adhere to best practices and avoid excessive litigation costs. The afternoon conference session will kick off with Dr. Raffaele Olivieri from the Digital Forensics laboratory of Italian Law Enforcement. Investigations with a high amount of heterogeneous data represent a huge problem in the search of events connection, facts or to demonstrate alternative solutions. Raffaele will discuss the need for contextualisation after data collection and digital forensics analysis. Zeno Geradts, senior forensic student at Netherlands Forensic Institute will lead a session on artificial intelligence in digital forensic science, and Gabriela Ahmadi-Assalemi from Wolverhampton Cyber Research Institute will discuss driver attribution for digital forensic investigations in connected cars.L





Public reports have helped with 400 counter terrorism investigations in just under 12 months. Counter Terrorism Policing examines the work and significance of the Counter Terrorism Internet Referral Unit in turning the tide against terrorists online

IDENTIFYING AND REMOVING TERRORIST CONTENT W ith the help of around 1,300 referrals from the public in 2018 – some of which were from material encountered whilst at work – the Met’s Counter Terrorism Internet Referral Unit (CTIRU) has assisted with 400 live counter terrorism investigations across the UK in the past 12 months. From January to November, 1,297 reports of online terrorist content were made by the public and passed to the CTIRU, which is part of the National Digital Exploitation Service (NDES), within the Met’s Counter Terrorism Command. As well as assessing the public referrals, officers from the CTIRU scour the internet on a daily basis to find terrorist content themselves.

This work has led to the CTIRU being actively involved in supporting 396 counter terrorism investigations from January to December 2018. This figure has doubled since 2017, when the CTIRU was supporting, on average, around 15 investigations per month, compared with 33 per month in 2018. When the CTIRU was initially set up in 2010, it was predominantly focused on working with internet companies to get terrorist content removed from online. However, with the establishment of other internet referral units across the globe, the CTIRU has been able to significantly increase its investigative capabilities over the past 18 months. This has led to officers being able to spend more time identifying specific UK-based threats and E



POLICING  then supporting investigations into the individuals or networks behind them. Detective Chief Superintendent Kevin Southworth, from the Met’s Counter Terrorism Command, who leads the CTIRU, said: “We’ve been able in the past year or so, to concentrate more on investigating the individuals or networks who are posting terrorist material online. Where the CTIRU is able to identify a UK footprint, this will then be fed into investigations across the UK’s Counter Terrorism Network. It might be that we’re already investigating a suspect for terrorism offences, and the CTIRU finds further evidence of what they’re doing, or it might be that they haven’t


found to be posting thousands of online messages in which he was encouraging others to carry out attacks and posting instructions on how to make explosives and administer poisons. Despite Rashid going to great length and effort to try and cover his tracks, specialists within the CTIRU, working with CTPNW colleagues, were still able to build a comprehensive picture of the channels and posts Rashid was responsible for, which culminated in him being jailed in July for a minimum of 25 years for various terrorism offences. A PROACTIVE APPROACH Since 2010, the CTIRU has worked to get 310,000 pieces of online terrorist material removed. Specialist

come onto our radar before and we’ll then launch a new investigation. “The public really do play a vital role in this. By reporting terrorist content they see online via the ACT website they are having an impact in two very important ways. Firstly, we’re able to request the removal of any terrorist content, which means those who are potentially vulnerable to radicalisation don’t then come across that material. Secondly, and increasingly, it’s leading us to identify the people or networks behind the content, investigate and stop them, and bring them to justice. “It’s also important for people to remember that this applies equally to any terrorist-related material or content they might encounter through their work, as much as anything they might come across in their personal lives. Virtually every business will have some sort of online presence, so it’s important they too think about reporting any suspicious material to police, the same way that any responsible member of the public would.” One such case led to the identification of 29-year-old Mohammed Kamal Hussain from east London, who was encouraging and inviting support for Daesh online. The investigation into Hussain all stemmed from a public report after a man received a Facebook message from Hussain encouraging him to join Daesh. The report came to the CTIRU, where officers linked the message back to Hussain and an investigation was launched. Hussain was eventually arrested, charged and jailed in February for seven years for terrorism offences. In another case this year, the CTIRU supported detectives based in Counter Terrorism Policing North West (CTPNW) with their investigation into Husnain Rashid. Rashid, from Lancashire, was



officers assess material to determine its nature and whether it breaches any terrorism legislation, and where it does, take steps to get it removed by the host website or platform. But the shift in focus from removals to investigations has been possible, in large part, due to the fact that internet and technology companies and content providers are now becoming more effective at removing the content themselves – much of this has been achieved through initiatives, such as the Global Internet Forum to Counter Terrorism, as well as content providers becoming more proactive in their approach following the various terrorist attacks globally in recent years. A key driver for progress in

POLICING this and other initiatives has been the Home Office, with whom the CTIRU enjoys a close working relationship, both in terms of policy and strategy. A report by Facebook stated 9.4 million pieces of Islamist-related content was removed from the platform between April and June 2018. Similarly, Twitter has reported that between July and December 2017, nearly 275,000 accounts were permanently suspended for violations related to the promotion of terrorism, with over 1.2 million accounts suspended for terrorist content since August 2015. Over the past four years, the CTIRU, which was the first unit of its kind to be established in the world, has also shared its model with other nations – particularly in Europe and the ‘Five

Eyes’ countries. With the introduction of similar units around the world, it has shared the responsibility of identifying and removing terrorist content, enabling the CTIRU to take a more proactive investigative approach. Detective Chief Superintendent Southworth, added: “At its height, around 2016, the CTIRU was identifying and removing around 10,000 pieces of content every month, but this has reduced considerably in the past year. It’s not because the material is no longer there, but that others are now stepping up and taking more responsibility – particularly major communication service providers. “It’s a reflection of the excellent work and dedication of the officers

in the CTIRU and their efforts to both raise awareness of this issue across the industry, and export the CTIRU model to other countries around the world that we’re seeing the tide turn against terrorists online. We cannot, however, afford any complacency and we will continue to work with the public, partners and industry to make the internet as hostile a place as possible for terrorists.” L

To report material online, simply fill in the confidential form at




FRONTIER PITTS Protecting Your World

+44 (0)1293 422800

Business Awards

International Business of the Year


The publishers accept no responsibility for errors or omissions in this free service 2 x Systems


Institute of Risk Management

Cognate Systems


Knect 365

CPM Group


Mercian Labels

Drone Detections


Metrohm UK

Energetics Technology


Morse Watchmans

Eskan Electronics FLIR (Detection)


48 IBC 6 50 4,46


RWS 32


Simunix 14

Frequentis 10

SmartSearch UK


Frontier Pitts

Smiths Detection



Heras UK


Technocover 24

Hess Bastion


University College London

Hidden Technology Systems




Terrorism Studies Leading online course Individual Modules | 4 Weeks Certificate | 16 Weeks Advanced Certificate | 32 Weeks

Start dates: February, June, October Learn online with expert tutor support and connect with a global network of like-minded professionals. Tel: +44 (0)20 7017 4483 | Email: | Quote VIP code: ctb2


Courses include: • • • •

Security Studies Counter-terrorism Security and Terrorism Law Security Management

• Terrorism, Policing and Security • Intelligence and Security • Diplomacy and Security

Available as Postgraduate Certificate / Postgraduate Diploma / Master +44 (0)20 7017 4483 | Quote VIP code: ctb


The FLIR Griffin G510 GC-MS enables responders to confidently identify unknown chemical threats. It is the ultimate chemical detection toolbox, with guided controls and simple threat alarms. Completely self-contained and mission-ready, the G510 is built for everyone and everywhere. Learn more at

FLIR Griffin G510

Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.