Page 1

www.counterterrorbusiness.com | ISSUE 47

ONLINE EXTREMISM

EVENT SECURITY

FAR RIGHT EXTREMISM

PEGASUS

DEMOCRATIC OR DANGEROUS? Why is Pegasus grabbing the headlines?

FACIAL RECOGNITION

FACING UP TO TERRORISM

Is there a need for facial recognition technology to combat terrorism?


Design, manufacture, install & service perimeter protection solutions Spend less time dealing with multiple companies for different aspects of your perimeter security, as Heras offers a full end-to-end solution encompassing:

Detection

perimeter intrusion detection systems

Integrated systems

security and video management

Entrance control

safe and secure entry points

Service

keeps your business moving

Herons Way | Doncaster | DN4 8WA | South Yorkshire | United Kingdom +44 808 164 2250 | info@heras.co.uk | heras.co.uk

Demarcation

defining the boundary of the premises


COMMENT

COUNTER TERROR BUSINESS 5

www.counterterrorbusiness.com | ISSUE 47

RE-EVALUATING THE TERROR THREAT We are at an odd junction in the development of security and counter terror legislation in the UK.

ONLINE EXTREMISM

EVENT SECURITY

FAR RIGHT EXTREMISM

PEGASUS

DEMOCRATIC OR DANGEROUS? Why is Pegasus grabbing the headlines?

FACIAL RECOGNITION

FACING UP TO TERRORISM

Is there a need for facial recognition technology to combat terrorism?

Follow and interact with us on Twitter:

@CTBNews

On the one hand, the Protect Duty, which will set out a legal requirement for all public places to ensure they are prepared for a terrorist attack, remains a work in progress, with the recent incident at the EURO 2020 final highlighting the need for it to be established sooner rather than later. On the other hand, police forces are set to see league tables for 101 and 999 call answering times introduced under a new Beating Crime Plan which has, so far, only provoked ridicule and more questions than answers from those it is likely to affect most - the police. Attempts to make the police more accountable are needed, unnecessary steps that are likely to make them less efficient are not. This issue of CTB is jam-packed with interesting and varied content, from the threat of far right extremism (pg 14) to the need for facial recognition technology (pg 46), from the Pegasus story (pg 52) to protecting crowded places (pg 74). Each feature is a very worthwhile read. Meanwhile, this year we are again pleased to partner up with a number of leading security conferences, including the Counter Terror Expo, the Emergency Services Show and DSEI. Perhaps most importantly we are glad to be supporting the International Security Expo again this September. You can find an extensive preview to ISE 2021 beginning on page 19. Michael Lyons, editor

ONLINE // MOBILE // FACE TO FACE To register for your FREE Digital Subscription of Counter Terror Business, go to: www.counterterrorbusiness.com/digital-subscription or contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Web: www.psi-media.co.uk EDITOR Michael Lyons PRODUCTION MANAGER & DESIGNER Dan Kanolik PRODUCTION CONTROL Lucy Maynard WEB PRODUCTION & ADMINISTRATION Victoria Casey PUBLISHER Jake Deadman

Counter Terror Business would like to thank the following organisations for their support:

© 2021 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

3


Communicate Smarter Sepura’s intelligent SC Series TETRA radios enable automated actions to help the world’s leading police forces to communicate safely and efficiently Visit www.sepura.com to see how our solutions support public safety organisations around the world


CONTENTS

CONTENTS CTB 47 Sponsored by

14 FAR RIGHT EXTREMISM Tomás Francisco Martínez, from the Centre for the Analysis of the Radical Right, discusses recent shifts in the strategies of farright movements brought about by the coronavirus pandemic

19 INTERNATIONAL SECURITY EXPO The increasingly sophisticated threats of today rely on a united front to tackle them effectively. The International Security Expo, co-located with the International Cyber Expo, will discuss a number of emerging security challenges

42 CYBER SECURITY The Cyber Resilience Centres are here to grow and strengthen the UK’s resilience to online crime. Chris White analyses the need for the CRC network and the services on offer to help UK businesses improve their cyber resilience

46 FACIAL RECOGNITION Former Surveillance Camera Commissioner Tony Porter explores the use of FRT to combat terrorism, and how organisations ought to utilise FRT to enhance public confidence and fit in line with the new EU’s proposals

48 ONLINE EXTREMISM Terrorist groups use social media in myriad ways to issue threats, incite violence and plan attacks. Here, the Counter Extremism Project’s David Ibsen explores the current issues with Big Tech and online extremist content

52 PEGASUS Jim preen writes for CTB about the current state of play regarding Pegasus spyware and why the shocking revelations uncovered in this recent investigation look set to wither on the vine Sponsored by

55 COUNTER TERROR EXPO This year marks the 13th iteration of the Counter Terror Expo. The event will explore counter terrorism and other complex security operations, as well as facilitate the development of new ideas and security technologies

62 TERRORISM LEGISLATION There is little value in putting in place a counter terrorism mechanism doomed to failure. So, what are the chances of proposed measures being successful and how do we go about evaluating that success? Read more from Lee Jarvis

67 EMERGENCY SERVICES The Emergency Services Show is the UK’s leading annual showcase of the blue light sector, featuring over 450 exhibitors, live demonstrations, unique learning opportunities and unrivalled networking. Read our preview here

70 EVENT SECURITY With fans now slowly being able to return to stadiums and other large venues, how do processes need to change to ensure staff and visitors are as safe as possible when using these sites? Iain Moran explores

74 CROWDED PLACES Terrorists are constantly searching for new ways to manipulate their victims to get them where they want them to inflict the greatest amount of harm. Jim Preen discusses how terrorists get their victims where they want them

77 DSEI To help you reach a targeted audience, DSEI is divided into five sector focused Zones: Aerospace, Land, Naval, Security & Joint. Find our more about the DSEI Zones in our preview to September’s show

Counter Terror Business magazine // www.counterterrorbusiness.com ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

5


CTB NEWS CRIME

New crime plan includes increased stop and search powers

The government has said that the new Beating Crime Plan will level up the country by ensuring everyone has the security and confidence that comes from having a safe street and a safe home. The measures, which are set to build on progress to date toughening sentences to keep the most dangerous offenders behind

bars and the delivery of almost 9,000 of the 20,000 extra police officers promised by 2023, are hoping to ensure the public is better protected across all parts of the country, with each neighbourhood having contactable, named police officers, who know their area and are best placed to ensure that persistent crime and anti-social behaviour is tackled. As part of the announcement, the government has also detailed plans whereby the public will be given more opportunity to scrutinise results, with league tables for 101 and 999 call answering times to be introduced for each force. Seeking practical measures to deliver real results across communities, the measures will also see the Home Office permanently relaxing conditions on the

use of section 60 stop and search powers to empower police to take more knives off the streets and the roll out of two further rounds of the Safer Streets Fund to increase the safety of public spaces through steps including targeted patrols, increased lighting and CCTV, and work with councils to design out crime. The plans have been met with some criticism, with Liberty saying that the permanent relaxation of search powers would ‘compound discrimination in Britain and divide communities’ and Shadow Home Secretary Nick ThomasSymonds saying that named officers were not a substitute for the effects of cuts on community policing.

CLICK TO READ MORE

ENGLISH CHANNEL

PRITI PATEL

UK and France sign new Channel security treaty

PFEW no longer has confidence in the Home Secretary

Foreign Secretary Dominic Raab and Home Secretary Priti Patel have agreed a new maritime security treaty between the UK and France. Under the UK-France Maritime Security Treaty, negotiated between the UK Home Office and French Secrétariat général de la Défense et de la Sécurité nationale, UK emergency responders will have more power to deal with terrorist incidents in the Channel. Representatives from both countries have said that the arrangement is the foundation for seamless joint and coordinated action to be taken by UK and French forces in response to an incident, such as a terrorist attack on board a ferry or other large vessel in the Channel.

The Treaty includes provision such as: sharing security information concerning potential security threats; mounting swifter and stronger initial responses to serious security incidents; coordinating more efficient joint responses; and cooperating more effectively in the aftermath of an attack or incident. Raab said: “As close allies it is vital the UK and France work together to protect our citizens and values. Today’s signing of the UK-France Maritime Security Treaty will reinforce our ability to jointly respond swiftly and effectively to terrorist threats in the Channel.”

CLICK TO READ MORE

The Police Federation of England and Wales has said that its national council has overwhelmingly supported a vote of no confidence in the Home Secretary. The organisation has also made a decision to withdraw its support and engagement from the Police Remuneration Review Body, labelling the current police officer pay mechanism ‘not fit for purpose’. The announcement follows Home Secretary Priti Patel’s claim that the government ‘recognises the bravery, commitment and professionalism’ of police officers, while offering no improved financial package to our members to illustrate that is the case. The PFEW says that there is enormous anger within policing, with officers across England and Wales saying the government takes them for granted and treats them with contempt.

CLICK TO READ MORE

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

7


THE PREMIER BRAND OF TAMPER EVIDENT SECURITY PRODUCTS

DUAL LAYER

NO RESIDUE

SECURITY TAPE

Label Lock™ products have been used to secure the safety of many events across the globe, from exhibitions, political conferences, national elections and Papal visits to sealing gemstones, cash, examination papers and pharmaceuticals in transit.

Tamper Evident High Security Proven Technology Unique Sub-Surface Numbering Available From Stock

ALSO AVAILABLE Asset Labels Tamper Evident Bags C-TPAT Metal Bolt Security Seals Plastic & Metal High Security Seals

Label Lock™ is a product brand and registered trademark of Mercian Labels based in Staffordshire, UK.

Order yours TODAY!

+44 (0)1543 431099 | sales@labellock.com


CTB NEWS LONDON

Fresh review to further improve London’s terror preparedness particularly in 2017, when terrorists, often acting alone and radicalised online, used vehicles and knives to carry out attacks. A bomb attack in the Manchester Arena in 2017 also killed innocent children and in Salisbury a chemical attack brought death, injury, and a new kind of threat to the UK. The new review will consider the changing threat of terrorism facing London and any implications of the pandemic for London’s immediate and long-term preparedness for an attack. Khan said that extremists are set on exploiting the uncertainty and hardship caused by the pandemic for their own gain and has now instigated a new and fresh review to pick up on learning from the attacks in the last five years and identify any gaps in our city’s response and capabilities to ensure the London is as prepared as it can be to deal with the threat posed by terrorists.

Mayor of London Sadiq Khan has appointed Lord Toby Harris to complete a new and wide-ranging independent report into what could be done to improve London’s preparedness for a major terrorist incident. Lord Harris published his Preparedness Review in 2016, at a time when the backdrop of terrorism was shaped by marauding firearms attacks such as the terrible attacks at the Bataclan,

Paris, and those in Brussels and Nice. At the time, the Harris Review made more than 100 recommendations, the vast majority of which have now been implemented, resulting in significant improvements to safety of our city – including the speed and coordination from our emergency services, intelligence services and partner agencies to a terrorist attack. Since then, however, London has experienced a succession of attacks,

SOCIAL MEDIA

POLICE

Tech giants to target attacker manifestos in database

Forces urged to use new body-worn video policy

Some of the biggest US tech companies, including Facebook and Microsoft, are planning to significantly expand the types of extremist content shared between firms in a key database, aiming to crack down on material from white supremacists and far-right militias. The Global Internet Forum to Counter Terrorism’s (GIFCT) database has traditionally focused on videos and images from terrorist groups on a United Nations list and so has largely consisted of content from Islamist extremist organisations such as ISIS, al Qaeda and the Taliban. Now, the group has said that over the next few months it will add attacker manifestos -- often shared by sympathisers after white supremacist violence -- and other publications and links flagged by UN initiative Tech Against Terrorism. It will use lists from intelligence-sharing group Five Eyes, adding URLs and PDFs from more groups. Speaking to Reuters, Nicholas Rasmussen, GIFCT’s executive director, said that technology groups want to combat a wider range of threats. Fourteen companies can access the GIFCT database, including Reddit, Snapchatowner Snap, Facebook-owned Instagram, Verizon Media, Microsoft’s LinkedIn and file-sharing service Dropbox. GIFCT was created in 2017 under pressure from U.S. and European governments after a series of deadly attacks in Paris and Brussels.

CLICK TO READ MORE

The Police Federation of England and Wales is urging more forces to utilise new guidelines which enables them to release body-worn video footage easier. Last year, National Chair John Apter raised his concerns to the National Police Chiefs’ Council over the public sharing selective video clips of police interactions on social media and the damaging impact it can have on public confidence and criminal justice processes. As a result, Apter worked with the then NPCC lead on bodyworn video Chief Constable Andy Marsh and the NPCC issued new

CLICK TO READ MORE

policy to forces November last year, but further improvements need to be made in this area. Peers discussed the need for forces to be more proactive with releasing body-worn video footage in a House of Lords session on 7 July. As part of that deliberation, Minister of State, Baroness Williams of Trafford, said ‘speed is of the essence’ when it comes to police publicising their interactions with the public.

CLICK TO READ MORE

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

9


CTB NEWS RETAIL

New report highlights terrorist threat to retail and hospitality

As UK restrictions ease and the number of crowded venues proportionally increases, Pool Re issues a new report examining the evolving terrorist threat to the retail and hospitality sector. The second in a series of Sector Risk Reports which identifies a number of potential terrorist threats to the retail and hospitality sector, the paper is aimed at supporting businesses such as small shops, multibranch retail businesses, hotels,

and major towns and more attention therefore needs to be given to potentially less secure sites on suburban and rural areas. This is especially true as the government eases lockdown restrictions and retail and hospitality spaces will becomes some of the most crowded places in the country. If an attack on retail and hospitality is successful, Pool Re says that it is highly likely to cause disruption to local economies and damage public confidence, outcomes that could be particularly acute given businesses are beginning to recover from the pandemic.

CLICK TO READ MORE

CYBER SECURITY

EUROPEAN UNION

NCSC publishes advice to fix global cyber vulnerabilities

EU Council renews restrictive measures to combat terrorism

Advice on countering the most publicly known, and often dated, software vulnerabilities has been published for private and public sector organisations worldwide. The National Cyber Security Centre (NCSC), alongside the Cybersecurity and Infrastructure Security Agency (CISA), Australian Cyber Security Centre (ACSC), and Federal Bureau of Investigation (FBI), has published a joint advisory highlighting 30 vulnerabilities routinely exploited by cyber actors in 2020 and those being exploited in 2021. Cyber actor exploitation of more recently disclosed software flaws in 2020 probably stems, in part, from the expansion of remote work options amid the coronavirus pandemic. The rapid shift and increased use of remote work options, such as virtual private networks (VPNs) and cloudbased environments, likely placed additional burden on cyber defenders struggling to maintain and keep pace with routine software patching. In 2021, malicious cyber actors continued to target vulnerabilities in perimeter-type devices. The advisory lists the vendors, products, and CVEs, and recommends that organisations prioritise patching those listed. Four of the most targeted vulnerabilities in 2020 affected remote work, VPNs, or cloud-based technologies. Many VPN gateway devices remained unpatched during

10

restaurants and bars, and other leisure and entertainment venues. Created to support the retail and hospitality sector’s understanding of the threat of terrorism to their businesses, the report assesses various attack methodologies, the likelihood of their occurrence and their potential impact on businesses. It also notes ways that retail and hospitality businesses can manage and mitigate terrorism risk, including increasing understanding, seeking advice, strong preparation, training, security assessments and reinforcing business continuity plans and appropriate insurance cover. Pool Re suggest that the threat to terrorism is not exclusive to cities

2020, with the growth of remote work options challenging the ability of organisation to conduct rigorous patch management. As well as alerting organisations to the threat, this advisory directs public and private sector partners to the support and resources available to mitigate and remediate these vulnerabilities. Paul Chichester, NCSC Director for Operations, said: “We are committed to working with allies to raise awareness of global cyber weaknesses – and present easily actionable solutions to mitigate them. The advisory published today puts the power in every organisation’s hands to fix the most common vulnerabilities, such as unpatched VPN gateway devices. Working with our international partners, we will continue to raise awareness of the threats posed by those that seek to cause harm.”

CLICK TO READ MORE

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

The European Council has renewed the so-called EU terrorist list, which sets out persons, groups and entities subject to restrictive measures with a view to combating terrorism. The 14 persons and 21 groups and entities on the list are subject to the freezing of their funds and other financial assets in the EU. It is also prohibited for EU operators to make funds and economic resources available to them. The European Council first set up the list as implementation of UNSC Resolution 1373/2001 that followed the terrorist attacks of 11 September 2001. It reviews the designations at regular intervals, and at least every six months, on the basis of a regular exchange of information between member states on any new facts and developments relating to the listings. The list includes persons and groups active both within and outside the EU.

CLICK TO READ MORE


CTB NEWS DEFENCE

UK and Kenya sign new Defence Cooperation Agreement

The UK is stepping up its counter-terrorism and military support to Kenya as the two countries signed a new five-year Defence Cooperation Agreement. Defence Secretary Ben Wallace and

Kenyan Cabinet Secretary for Defence Dr Monica Juma signed the accord which will enable the two countries to enhance coordination in their joint efforts to improve regional security in East Africa, including the fight against Islamist terrorist group Al-Shabaab. The UK and Kenya already regularly work together to counter the threat from Al-Shabaab, not only through training as strengthened in the DCA, but also by sharing information and identifying new ways to target the group financially with sanctions, and starve them of new recruits by addressing the root causes of violent extremism.

Building on the existing agreement, the new DCA will provide a basis for the exchange of military personnel for defence activity, allowing for enhanced training opportunities and increased collaboration in peace support work. The two defence secretaries discussed a range of additional enhanced UK counter-terrorism support to Kenya, including increasing protection for tourists on the coast, where many of the 180,000 British tourists who visit Kenya every year travel to.

CLICK TO READ MORE

HONG KONG

First person tried under HK security law found guilty of terrorism The first person to be tried under Hong Kong’s sweeping national security law was found guilty of secessionism and terrorism. So far more than 100 people have been arrested under the security legislation, and on 27 July the Hong Kong High Court handed down the verdict in the case of 24-year-old Tong Ying-kit, with the verdict being closely watched for indications as to how similar cases will be dealt with in future. The trial was held in the High Court with no jury, under rules allowing this exception from Hong Kong’s common law system if state secrets

need to be protected, foreign forces are involved or if the personal safety of jurors needs to be protected. Tong is accused of driving his motorcycle into a group of police officers a day after Beijing imposed sweeping national security legislation on Hong Kong following months of anti-government protests in 2019. Tong pleaded not guilty to charges of inciting secession, terrorism and an alternative charge of dangerous driving. A guilty verdict carries a maximum sentence of life imprisonment.

CLICK TO READ MORE

FRANCE

France approves anti-separatism bill to battle Islamist extremism

The French National Assembly has approved a new ‘anti-separatism’

bill in order to bolster the country’s secular system, despite critics arguing that it breaches religious freedom. The anti-separatist bill, dubbed ‘anti-muslim’ by far-left leader JeanLuc Mélenchon, was approved by 49 votes to 19 on 23 July. France’s main opposition parties, including the Socialists and the centre-right Les Républicains, along with the French Communist Party, voted against the bill for different reasons. Only three parties in the National Assembly – the ruling La République en marche (LREM) party and its two allies – voted for the law. The far-

right National Rally, led by Marine Le Pen, abstained from the vote. The bill contains a slew of measures on the neutrality of the civil service, the fight against online hatred, and the protection of civil servants such as teachers. The legislation follows three attacks in France late last year by extremists, including the beheading in October of teacher Samuel Paty, who had shown his pupils cartoons of the Prophet Mohammed during a civics class.

CLICK TO READ MORE

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

11


ADVERTISEMENT FEATURE

Q&A

A threat from above Written by Michael Delueg, Frequentis head of Defence Product Portfolio

Drones are providing many industries with efficiency gains, however, they are also offering terrorists new capabilities including assisting Chemical, Biological, Radiological and Nuclear (CBRN)-related crimes. Michael Delueg, Frequentis head of Defence Product Portfolio, explains how organisations can stay ahead with the right technology

12

CAN YOU TELL US A LITTLE ABOUT FREQUENTIS AND YOUR ROLE? Frequentis has over 70-years’ experience of mission-critical communication, information and surveillance systems with cross-industry knowledge that spans civil aviation, defence, public safety, maritime and public transportation markets. One of our core products is our secure communication system, which is the fundamental piece of the puzzle for all safety-critical control rooms. Frequentis is acknowledged as the number one supplier of safety critical communication systems globally. As Head of the defence product portfolio I am responsible for managing the global defence product families, their roadmaps, and innovations, to provide best in class solutions for our defence customers. WHAT ROLE DO COMMUNICATION SYSTEMS HAVE IN LIMITING THE THREAT OF TERRORISM IN EUROPEAN AIRSPACE? Secure, resilient, and reliable communication is fundamental to ensuring critical information reaches the right people, at the right time for effective decision making. The starting point for managing any kind of incident is a communications system to link relevant stakeholders. You can find a Frequentis communication system in 35,000 controller working positions worldwide, from pilots to police dispatch personnel. In addition to that there would ideally be an incident management system in place to coordinate alarming, risk assessment and the intervention of procedures and communications.

The Frequentis Incident and Crisis Management (ICM) system provides a common operational picture based on a Geographical Information System (GIS), as well as interfaces to central data sources. A collaboration and decision support service with multi-user support based on role and rights assignment, an integrated link to the voice communication system (VCS) and legal recording functionality complete the solution. Key to mention is the mobile application, ensuring information can be received anywhere, at any time. We also promote cross-agency collaboration with our ICM system, which allows multiple agencies to work together on an incident in real-time. IN THE GLOBAL DEFENCE AGAINST TERRORISM, ESPECIALLY IN THE EVENT THAN AN AIRCRAFT IS HIJACKED, HOW IMPORTANT IS INTERAGENCY COOPERATION? AND HOW HAS FREQUENTIS WORKED TO INCREASE COOPERATION WITHOUT INCREASING WORKLOADS FOR CUSTOMERS? There are a multitude of command and control systems (C2) in use today with varying levels of functionality. Often these systems cannot interact with each other, and when they do, they can only do so on a very basic level. This challenge is faced today by both defence and locallyfunded emergency services who procure their own independent systems. The Frequentis ICM solution allows the seamless interconnection of all those independent systems, from multiple

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

agencies, enabling ordinarily siloed systems to work together to share information, reducing manual information sharing and speeding up reaction and resolution times. Frequentis was commissioned by the German Armed Forces to equip the German National Air Policing Centre (NAPC) with an Air Policing system with this very aim. The system integrates numerous data sources from defence agencies, government and national local emergency services, even public buildings, allowing contact at the touch of a button with “click to dial” functionality. Information can be shared securely, and layered on top of existing systems, ensuring all required parties have a fused Civil-Military common operational picture in the event of a crisis. The best way to manage any emergency is for all contributing agencies to work together to improve response times and coordinate resource allocation. By sharing information across the entire national network, linking assets and communicating in real time, a common operational picture is created, allowing real-time intelligence and tactical decision-making. Air policing, Joint Operations, Search and Rescue, Drone Detection and Cyber Defence are just some of the typical use cases which benefit. WHAT IS YOUR EXPERIENCE WITH THE EMERGING DRONE MARKET? IT IS A CHALLENGE FOR DRONES AND CIVIL AVIATION TO COEXIST IN THE SHARED AIRSPACE, HOW DOES FREQUENTIS SEE THIS MARRIAGE BEST ESTABLISHED? Frequentis has a long history supplying communication and surveillance systems for air traffic control and air defence so we have a deep understanding of aviation stakeholders, solutions, and air space regulations. The primary concern with integrating drones, or unmanned traffic management (UTM), and air traffic management (ATM) is safety, and ensuring manned aviation, as well as individuals and property on the ground are not negatively impacted. The key to solving this challenge is to enable timely and high-quality information sharing between ATM and UTM, and, again, the ability to communicate in real-time. By integrating ATM and UTM on the same platform, situational awareness and safety will be enhanced, allowing increased use


ADVERTISEMENT FEATURE of drones in everyday life. When both civil aviation and drone pilots can communicate in real time, will we see the most benefits in terms of safety and efficiency. ONE CONCERN IS DRONES IN VICINITY OF AN AIRPORT. HOW DO YOU SUGGEST AIRPORTS OR AVIATION SERVICE PROVIDERS TAKE ACTION? As drone traffic increases, airports, law enforcement, and air navigation service providers (ANSPs) face new safety and security challenges. The key is ensuring quick response times and appropriate action. A system that fuses ATM, UTM, Drone Detection, Visual Reports, and Blue Force Tracking into a common air / ground situation picture, ensures common situational awareness in complex drone incidents. With integrated communications and incident management, all organisations can work together on the same goal, focusing on the procedures, and minimising response times in the event of drone incursions. Part of managing the incident is airspace deconfliction, where a data integration with ATM and UTM is a value add. With that integration, we can give automatic warnings to air traffic through ATC, deconflict UTM and counter-UAS operations, and can also differentiate between the good and the bad guys. Another element is managing countermeasures; this starts with coordinating law enforcement units to find the drone and drone operator. We are currently working in partnership with the German Federal Police, German ANSPs and a large German airport on the Falke project, researching threat scenarios for airports and validating appropriate solutions to incidents. This puts us at the forefront of airport counter-UAS management. The findings will serve as a blueprint for all airports in Germany and potentially other European countries such as the Netherlands. With integration of mitigation systems, law enforcement units can jam and disrupt drones. With blue force tracking integration, resources can better managed, asking airport staff to identify and follow the drone and coordinate with police forces who will have the means to take the drone down. Key to mention is also the use of a mobile application; intelligence is collected by the incident manager and shared to

mobile devices so that the right people can be notified at the right time, allowing them to take action wherever they are. ARE THERE AIRSPACE RESTRICTIONS THAT NEED TO BE CONSIDERED WHEN DEPLOYING DRONES TO SUPPORT COUNTER TERROR OPERATIONS? Frequentis is also working on other projects providing the common information services (CIS) function of the ATM/UTM airspace integration platform that allows ad hoc drone flight plans to be submitted and approved in real-time. The CIS can also differentiate between regulated and nonregulated drones to assess safety concerns and trigger automatic alerts. The system then allows communication with aerodromes to close the airspace and law enforcement agencies to locate the drone operator. As mentioned, this is also available on the mobile client. WHAT ABOUT THE THREAT OF DRONES BEING A POTENTIAL TOOL FOR TERRORISTS TO COMMIT CRBN ACTIVITIES? A Frequentis subsidiary, CNS-Solutions and Support GmbH, is part of the European Defence Agency (EDA) CBRN Surveillance as a service project, which will utlise drones and unmanned ground vehicles (UGVs) to keep the European population safe from potential CRBN incidents.. The project, led by the Austrian Institute of Technology (AIT), is made up of a consortium of 12 partners from four countries with the aim of developing a rapidly deployable 24/7 CRBN surveillance capability.

CNS will be providing the ICM software technology, mainly consisting of a CBRN Common Operational Picture (COP), integrating aggregated sensor data from UAVs (Unmanned Aerial Vehicles) and UGVs (Unmanned Ground Vehicles). Other incident-relevant information and a CBRN-specific Incident Management module will also be displayed. The integration of this sensor data will allow operators to see threat locations and react accordingly, including deploying troops, supporting the decision-making processes. A direct video livestream from the UAVs and UGV will be integrated into the ICM suite to provide an even better on-scene perspective and optimise strategical planning. The objective is to have a fully functional technical demonstrator available by spring 2023. Our experience in serving not only ANSPs but also military and blue-light customers, means we have the breadth of understanding and experience to deliver integrated cross-agency solutions that span the full requirements of a counter-UAV solution in an airport environment. L

Meet Frequentis at DSEI, 14th-17th September 2021, stand H4-110 With a Masters in engineering from the technical university of Vienna, Michael Delueg has a background in software development and project management. He joined Frequentis in 2014 and is responsible for the Defence product portfolio, their inter-relationships, and the portfolio’s role in the market, including profit and loss.

FURTHER INFORMATION www.frequentis.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

13


FAR RIGHT EXTREMISM

THE RADICAL RIGHT AND COVID-19 R

adical-right groups across the globe were largely indifferent to Covid-19. Their responses are probably well-known to readers in Europe and North America, but given that these groups are so widespread today – after 9/11 they increasingly moved into the mainstream – their response has been highly fragmented globally. Today, two of the five biggest democracies have a radical-right leader (Brazil and India); the U.S was under Trump only months ago, two EU member states effectively have radical-right governments (Hungary and Poland), and radical-right parties are part of government coalitions in several other countries (such as Switzerland, Bulgaria, and Estonia). Given that the radical-right is a heterogeneous political phenomenon, what draws together such a group, such as the Hungarian Civic Alliance (spearheaded by Victor Orbán) or Modi’s BJP in India? For

14

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

most scholars, the tie that binds is their core ideology, above all nativism, populism, and authoritarianism. Accordingly, the diverse parties making up the constellation of global radical-right actors do not have a consistent approach to the pandemic. Yet radical-right groups were quick to find a target to blame for the pandemic in its early stage. Here was another opportunity to rail against immigrants and ethnic minorities. Their discourses were often charged with racist undertones. In Europe, for instance, Muslims were particularly targeted, while in the United States an anti-Chinese and more general anti-Asian sentiment was highlighted. Sadly but unsurprisingly, antisemitic narratives were not uncommon either. More broadly, in Europe, the pandemic offers a chance to bash the EU and globalisation as well. Although parties in a number took this position, ‘they did not use the nativist discourse’ according to Wondreys and Mudde. Many radical-right E


FAR RIGHT EXTREMISM

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

15


FAR RIGHT EXTREMISM

 groups welcomed the idea of border closures and lockdown measures as these, in Klein’s assessment, ‘fit well with the authoritarian tendency of such groups, who often express praise for strong leaders who can ensure socio-political isolation for the purposes of reducing external threats to their totalitarian power’. It must be underscored, however, that under radical-right groups in power authoritarian measures were not put forward consistently - probably not due to a lack of will, but because most groups did not have enough political power to do so. Orbán was the exception, confounding experts who are still coming to terms with a radicalright Hungary being part of the EU. PROPAGANDA Undoubtedly, propaganda has always been a crucial aspect to these groups, and it is interesting to see how their strategy has recently changed in this regard. Here, the pandemic has

16

clearly proven beneficial. People worldwide have spent many behind the screen, while online gaming – which is fertile ground for recruiters – has reached an all-time peak. The prevalence of online extremist channels facilitates the connection of isolated users and the development of closed ‘echo chambers’ of likeminded people in which extremist beliefs can be further reinforced and amplified. Misinformation is the order of the day on many popular sites. According to Eviane Leidig, for instance, an expert on the Indian farright, this phenomenon seems to be originating on newer platforms like TikTok, which started becoming popular with the radical-right in recent years. Contrary to the expectations of most political and media commentators, moreover, propaganda efforts have also translated into offline activity. The capacity to mobilise sympathisers during the pandemic and associated lockdowns, when the right to public

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

assembly was severely restricted or forbidden, was scarcely disrupted. This has allowed radical-right groups to present themselves as embedded to communities, acting as defenders of individual freedoms and the national economy. This is true for two far-right groups that have not yet fully made the leap into national politics, Hogar Social in Spain and CasaPound in Italy. Both were physically active during the initial months after the pandemic was declared, wandering around lowincome neighbourhoods and handing out food – but to nationals only. New groups also emerged, like Orange Vests in Italy, modelled after the recent protest group in France, the Yellow Vests. Both online and offline, then, radical-right groups been highly visible, appearing to offer a radical solution to the ‘injustices’ in their national polities. These different promotional campaigns recently put in motion, furthermore, go hand-in-hand


FAR RIGHT EXTREMISM

THE PREVALENCE OF ONLINE EXTREMIST CHANNELS FACILITATES THE CONNECTION OF ISOLATED USERS AND THE DEVELOPMENT OF CLOSED ‘ECHO CHAMBERS’ OF LIKE-MINDED PEOPLE IN WHICH EXTREMIST BELIEFS CAN BE FURTHER REINFORCED AND AMPLIFIED with conspiracy theories, which are also becoming noticeably mainstream in various countries. As the leading discourse analyst Ruth Wodak points out, the radicalright has a ‘penchant for conspiracies, scapegoats, and the politics of fear’. The question they try to answer is who is ‘behind all of this’, and there are a range of responses. In this area, it is important to underscore that there is overlap between the disparate radical right, the Anti-Vax movement, QAnon, and other conspiracists. Familiar arguments include that Covid is a plot to decimate the world, 5G radiation

is causing Covid, and that Covid have been manufactured by China. Many other conspiracy theories perpetuate antisemitism, one the main tropes for the radical right globally, past and present. LOCKDOWN Worryingly, some conspiracy theories pose a security threat offline since – as has been mentioned - are seemingly not put off by lockdown enforcement. For example, in the U.S there are many radical-right groups, albeit usually with smaller audiences, that have joined forces during the

pandemic. They espouse similar antigovernment views, and reproduce the consistent anti-establishing messaging. Many take to the streets, sometimes attempting to blend in with massive anti-protest movements and clashing with the police. Even worse, however, is that many of the followers are actively and literally trying to spread the virus to ‘enemies’, to the extent of even committing hate crimes. This shows that, once again, in general, it is all too easy to find a connection between political extremism and conspiracy theories. Yet it is still early to tell whether radical-right groups have managed to gain in popularity during the pandemic. But that also goes for traditional parties. Contrary to popular belief, radical-right groups have not uniformly shown their incompetence during this period - this is mainly centred on Modi, Bolsonaro and Trump’s poor pandemic response. Yet all the same, on a global scale the radical-right is utilising the present crisis to re-shape ideas about sovereignty, globalisation, democracy, equality, diversity, and even political legitimacy. This is closely linked to attempts at destabilising democracies by committing violent acts and spreading dystopian fantasies of collapse to push their interests – exemplified by 6 January in the US. Likewise, misinformation and conspiracy theories, so frequent today, especially online, pose a huge challenge to big tech companies such as Facebook or Twitter. Many people, including U.S President Biden, called them out amid the rise of Covid cases due to the new contagious delta variant. Interestingly, their narratives are growing to such an extent that radical-right extremists can now pander to Covid deniers while simultaneously attracting those who believe the virus is real. While radical-right extremism was already increasing prior to the pandemic, it is likely to continue increasing in size and threat. As sociologist Paolo Gerbaudo argues: “What may be in store is thus something much worse than the populist right of the 2010s: an extreme right using the whole arsenal of the red scare and right-wing authoritarianism to intimidate opponents and defend its interests from demands for meaningful economic redistribution. Though it has been confounded by this crisis, the populist right has not been suppressed. It is just mutating.” L

Written by Tomás Francisco Martínez, Marketing and Events Intern at the Centre for Analysis of the Far Right.

FURTHER INFORMATION

www.radicalrightanalysis.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

17


DESIGNERS, MANUFACTURERS AND INSTALLERS OF AWARD WINNING PERIMETER SECURITY PRODUCTS

@healduk

Heald Ltd

Heald Ltd

HealdLtd

www.heald.uk.com +44 (0)1964 535858 info@heald.uk.com Heald Ltd, Northfield, Atwick Road, Hornsea, United Kingdom, HU18 1EL


INTERNATIONAL SECURITY EXPO

Sponsored by

INTERNATIONAL SECURITY EXPO RETURNS TO LONDON THIS SEPTEMBER

I

nternational Security Expo will return to Olympia, London from 28 - 29 September, reuniting the entire security market at the show’s first face-to-face event for over 18 months. Thousands of vetted international visitors will come together under one roof looking to source the latest security products and solutions for government, CNI, major events, law enforcement, military, and more. For the first time in the show’s history, International Security Expo will be colocated with a brand-new cyber security event, The International Cyber Expo, which will bridge the gap between the physical and cyber security industries. Aimed at government and CISOs, it will deliver premium learning opportunities around cyber security risks and threats, detection and response, as well as showcasing the very latest technology and services that protect the digital and physical future of businesses.

SEE THE LATEST FROM WORLD-CLASS EXHIBITORS Security and counter-terror professionals from around the world will be able to peruse the stands of hundreds of global exhibitors, to source, test and buy the latest game-changing solutions from the world’s leading suppliers. The line-up includes the likes of HS Security Group, Mitie, Bastion Security Products, ADANI Systems, Leidos, Heras, Marshalls and more. For example, ADANI Systems will display its range of innovative high-technology solutions, including the BV STREAM, intended for X-ray screening of backpacks, bags, parcels and personal items to detect blades, firearms, ammunition and any other prohibited items. Elsewhere, Audax will showcase its full range of nextgeneration wearable security solutions including its ‘flagship’ product - the awardwinning BIO-AX® Camera System. Audax recently announced it has secured the provision of a significant number of its E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

19


Design-led solutions for safe urban spaces

With our series Contrast Freestyle Safe, we at Milford offer an innovative way of working with certified HVM solutions. We believe that safety in urban spaces is crucial in creating liveable cities where everyone thrives. Contrast Freestyle offers protective street furniture that you can integrate in any landscape design. The series is entirely customisable and discretely integrates IWA and VADS compliant structures. Go to contrastfreestyle.com/urban-safe-spaces for a video demonstration.

Get in touch Wyatt Harding, expert in urban safety solutions, will be happy to assist with any inquiries via email or phone. Email: wharding@milford.dk

Contrast Freestyle™

Tel: (+45) 44 97 10 99


INTERNATIONAL SECURITY EXPO  latest body-worn video cameras, Bio-AX®, for Mitie Security’s frontline security team in Regent Street. A ZONE FOR EVERY SECURITY PROFESSIONAL With significant government support, the event will have a specialist Government Zone that will host the likes of Joint Security & Resilience Centre (JSaRC), The National Counter Terrorism Security Office (NaCTSO), Civil Aviation Authority (CAA), Defence and Security Accelerator (DASA) and the Security Industry Authority. The zone will also host the Home Office’s law enforcement command, BorderForce, who will showcase a Ford Kuga that was seized at the border and uses a sophisticated magnet system to open a concealment area within the rear of the vehicle. In addition, BorderForce dogs which are used to help find concealments built into a wide range of transport vehicles from family cars to heavy goods vehicles will be present on the stand. Nineteen Group, the organisers of the event, are also working with the Department for International Trade’s UK Defence & Security Exports’ team to secure international participation at this year’s exhibition. A number of other dedicated zones will also enable exhibitors to demonstrate their product capabilities, technological advancements, and high-level solutions. In association with LPCB and supported by the Perimeter Security Suppliers Association, an enhanced Perimeter Protection Zone will feature the latest products from fencing, barriers, bollards, video surveillance and intruder detection, with a Live Testing Lab showing these physical security products in action. The zone will host exhibitors including Barkers Fencing (part of HS Security Group), Fastline Steel Services, Sellox, ARX Security, Rezizt and Surelock McGill. Plus, the event’s exceptionally popular Drone & Counter UAV Zone will return for 2021, hosting exhibitors including Robin Radar, SeeQuestor, D-Fend Solutions, Metis Aerospace Ltd, NSO Group, Live Link Aerospace and Riegl. The Disaster and Resilience Zone will showcase the latest products to remain resilient during a crisis as well as the solutions to recover and the tools to rebuild from. Exhibitors include SHERP, Everbridge, Safeguard Medical, Fischer Panda, Pilgrims Risk Management Group, and GardaWorld, as well as SCEG which will be hosting its very own pavilion within the Zone. Visitors will be able to learn from thought-provoking presentations and panel discussions in the zone’s dedicated conference theatre sponsored by Everbridge.

Highlights include Richard Nugee CB CVO CBE, Climate Change and Sustainability Strategy Lead - UK MOD delivering a session on the UK MoD approach to delivering enhanced security and resilience through green projects, and Tony Thompson, Former Chair - Emergency Planning Society in a session on how to ensure a resilient culture, focusing on how organisations should approach the practical challenges with an eye on lessons from Grenfell.

Sponsored by

EXCLUSIVE LEARNING OPPORTUNITIES FROM LEADING EXPERTS With innovation at the heart of the event, this year’s freeof-charge and CPD certified educational programme is set to deliver the latest insights, analysis and invaluable perspective from world-leading security, police and cyber industry experts, discussing mitigation strategies, best practices and high-level policy. E

SECURITY AND COUNTER-TERROR PROFESSIONALS FROM AROUND THE WORLD WILL BE ABLE TO PERUSE THE STANDS OF HUNDREDS OF GLOBAL EXHIBITORS, TO SOURCE, TEST AND BUY THE LATEST GAME-CHANGING SOLUTIONS FROM THE WORLD’S LEADING SUPPLIERS

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

21


INTERNATIONAL SECURITY EXPO

 The Global Counter Terror and Serious and Organised Crime Summit will focus on the changing nature of serious and organised crime and terrorism, along with the most prevalent terror trends currently affecting UK Counter Terror capability from Prevent to Protect, Pursue and Prepare. With 16 sessions across the two days, the Summit will look at current topics dictated by the Home Office and Counter Terror Police UK, focusing on Prevent, but also looking at how threats have developed during lockdown and what as an industry, is needed to collectively help counter them. In his first public outing since taking over from Neil Basu, the UK’s Assistant Commander of Counter Terror Police, Matt Jukes, will deliver a presentation on current counter-terrorism priorities and the developing challenges facing the UK today. He will explain how state-sponsored activities, the rapid growth in extreme right-wing terror and how the threat has developed,

Sponsored by

THE DISASTER AND RESILIENCE ZONE WILL SHOWCASE THE LATEST PRODUCTS TO REMAIN RESILIENT DURING A CRISIS AS WELL AS THE SOLUTIONS TO RECOVER AND THE TOOLS TO REBUILD FROM throughout the pandemic. Other highlights include Temitope Olodo, President of the Africa Security Forum, presenting a session on how the face of terrorism is evolving and why nations must rewrite their CVE strategy to win the war of terror. Giving a very personal account in the first of the ‘Realities of Terror’ sessions, a real-life hostage, Peter Moore, will share his account of being taken hostage for 946 days, whilst a contractor in Iraq 2007. He will highlight the hard-hitting reality of living with terrorists for two years, seven months and one day. Nick Bailey, retired Detective Sergeant, will also share his experiences and the personal impact of being poisoned by the Russian GRU in the Salisbury Novichok poisonings in 2018. Concluding the first day will be a notto-miss panel discussion on terror and organised crime, debating whether

they are common bedfellows. The panel will feature industry experts including Aaron Edwards, Senior Lecturer, Royal Military Academy Sandhurst; Alberto Testa, Professor of Applied Criminology at the University of West London; Figen Murray, whose son Martyn Hett was tragically killed in the 2017 Manchester Arena terror attacks; and Aimen Dean, Former member of al-Qaeda and MI6 Spy. Other sessions taking place in the Global Counter Terror and Serious and Organised Crime Summit will look at the use of technology to reduce crime, corruption and organised crime, the developing terror threat from a US perspective, and the farright as a global security threat. In a different area on the show floor, the International Security Conference will take place, centred around two themes. Day one will consider CNI, Transport and Aviation, whilst E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

23


Trusted Secure Communications                   

       

   

                  

We take security seriously:

Contact Armour Communications Ltd 1st Floor Millbank Tower London, UK, SW1P 4QP Tel: +44 (0)20 36 37 38 01 Email: sales@armourcomms.com


INTERNATIONAL SECURITY EXPO  day two will explore the nighttime economy, public sector and major events/stadiums. Referencing recent case studies, Sergeant Peter Lucas, Community and Business Engagement, National Project Servator Team at City of London Police, will focus on how operations, community engagement and communications can be used to disrupt hostile activity at major events, with an introduction to hostile reconnaissance. Elsewhere, in a session on operational deployment and use of behavioural detection, Darren Stanton, The Human Lie Detector, will be joined by Richard Foreman, Director of Profile Aware Ltd to outline the importance of behavioural detection, and how CPNI developed their behavioural detection. Promising a fun and interactive discussion, they will carry out a series of practical exercises to offer tips and teach attendees some basic techniques. Providing even more learning opportunities, the Global Cyber Summit will also deliver two days of high-level sessions covering current cyber threats and priorities, pandemic cyber challenges, understanding the needs of CISOs, ransomware attacks, protecting critical national infrastructure and more. A range of international experts will deliver the sessions including the likes of Ciaran Martin, CEO of National Cyber Security Centre and Professor at Oxford University, Ian Thornton Trump, CISO at Cyjax and Professor Lisa Short, Director and CoFounder of P&L Digital Edge Limited.

Sponsored by

THE GLOBAL COUNTER TERROR AND SERIOUS AND ORGANISED CRIME SUMMIT WILL FOCUS ON THE CHANGING NATURE OF SERIOUS AND ORGANISED CRIME AND TERRORISM, ALONG WITH THE MOST PREVALENT TERROR TRENDS CURRENTLY AFFECTING UK COUNTER TERROR CAPABILITY FROM PREVENT TO PROTECT, PURSUE AND PREPARE reputation our intelligence and security agencies have worldwide. International Security Expo is the high-end security event that showcases that centre of excellence, and I am delighted that so many major brand names exhibit.” Rachael Shattock, International Security Expo Event Director, added: “This past year has shown us that we live in unprecedented and uncertain times and as such, protecting our security for all eventualities is more important than ever before. “As the world begins to open up again, we are delighted to host the show’s first physical event in over 18 months and connect the security industry through face-to-face meetings. With such an incredible Advisory Council behind us, we’re confident we

can deliver an event that no security and protection professional can miss.” L

FURTHER INFORMATION

www.internationalsecurityexpo.com

BACKED BY GOVERNMENT AND INDUSTRY EXPERTS Helping to shape the agenda, a carefully curated Advisory Council made up of the most credible Government, industry and leading academic stakeholders has been formed to ensure the exhibition accurately reflects the security industry and covers the full spectrum of security trends. An impressive 62 industry experts sit on this panel, including the likes of Dr Jamie Shea, Deputy Assistant Security General at NATO, Philip Whittaker, Head of Security Projects Operational Security group, HM Prisons and Probation Service, and Patrick Holdaway, Head of Operations at National Business Crime Unit (NBCC). Chairman of the International Security Expo Advisory Council and former UK Security Minister, Admiral the Rt Hon Lord West of Spithead GCB DSC PC DUniv said: “The UK is ideally suited to being the global centre of excellence for security given our long history in counter terrorism, joint approach between government and the private sector and the

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

25


ADVERTISEMENT FEATURE

Eagle broadens LPS1175 and IWA14-1 ranges Eagle Automation Systems Limited is your single source supply for high Security PAS68 and IWA14-1 gates, bollards and blockers

The International standards for perimeter security were evolving to new heights even as the world was entering a lockdown of a different kind. So as nations across the globe emerge tentatively to a life of fewer restrictions in which outdoor space is better cherished and utilised, those standards will be appreciated by consumers, retailers, venue operators, travel hubs and police and security forces, among others. They were already showing growing interest in loss prevention and Hostile Vehicle Mitigation (HVM) measures prior to the pandemic as the prevalent fear then was keeping people safe from terrorist attack. From Ariana Grande’s infamous concert at the Manchester Arena; via Al-Shabaab’s 80-hour siege at Nairobi’s premier shopping centre, Westgate; to the Bataclan concert hall on that fateful November night in Paris; or at the Lindt café hostage crisis in Sydney. They are merely a small selection of literally hundreds of terror atrocities in the past decade. This was the pre-pandemic backdrop in which security experts, town planners and architects were designing and reconfiguring the cityscapes of today. Street humps, ad-hoc concrete blocks and metal barriers shot up in Birmingham, Brisbane, New York and York city centres, at entertainment and sporting venues. That’s why perimeter systems provider Eagle Automation Systems invested heavily throughout the pandemic and is leading the way in boasting a comprehensive portfolio certified to the latest standards – both in the UK and internationally. Three new bi-folding trackless gates are the latest Eagle products to achieve the most recent Security Ratings (SR) certifications

26

from the Buildings Research Establishment (BRE) – to add to its comprehensive range of bi-folding, sliding and swing gates, PAS68tested blockers, bollards and street furniture and its comprehensive range of turnstiles. Eagle’s full range will be on show at the International Security Expo (ISE) stand C120 at London’s Olympia from 28-29 September. ISE is the premier security showcase attracting an audience of government, transport, intelligence, defence, law enforcement, emergency services, CNI and the private sector. ISE features a major-scale exhibition including a series of CPD-certified conferences, workshops and interactive features exploring security considerations. David Ashby, Eagle managing director, said: “This latest revision of SRs to LPS1175 offers the security industry the

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

best model for perimeter protection with security wired in from the outset. That’s why we’ve engaged comprehensively with the LPS1175 standard – and the international vehicle attack standard IWA14-1 – and have invested in developing our renowned trackless bi-folding gates to meet the trusted and respected testing of the BRE accreditation. “We achieved the ISO9001:2015 certification two years ago – a prerequisite of manufacturing LPS1175 solutions, which enhanced our internal management processes. “And our LPS1175 journey won’t stop here either, with more products currently in development to meet the ever developing demand.” BRE revised its SRs to LPS1175 to issue 8.1 listed in Red Book Live, which sets out the requirements and testing procedures for the Loss Prevention Certification Board (LPCB) certification and listing of intruder resistant building components, strongpoints, security enclosures and free-standing barriers. Specifically, this revision extended the previous single digit performance


ADVERTISEMENT FEATURE

LPS 1175: Issue 8 Cert/LPCB ref. 1572

classifications (SR 1 to SR8) to one of two elements that classify performance in terms of: • Threat level (first element) – letter (A to H) corresponding with the tool kit used to evaluate the product’s intruder resistance and number of attackers involved. •

Delay (second element) – numeric value (1, 3, 5, 10, 15 or 20) corresponding with the minimum delay in minutes provided by the product when placed in a locked condition.

The three new EAG50010 trackless bifolding speed gates achieve A1 (SR1), B3 (SR2) and C5 (SR3) ratings. These are both the first and currently the only LPS1175 trackless bi-folding gates on the market. The speed gates need no additional secondary locking devices in the

secured (closed) position, making them faster and more reliable to operate, with fewer serviceable parts. They come in single and double leaf configurations – with a variety of infills, including vertical bar, mesh, or bar and mesh combinations – allowing openings up to 10m wide to be secured. Eagle has already installed them at a major data centre in Hemel Hempstead and more projects are currently in production. Eagle has also introduced two new IWA14-1 additions to CPNI’s latest HVM ImpactRated Catalogue of Security Equipment. The EAG10040 ‘Arrestor’ is a rising arm barrier to secure openings up to a class-leading 7.1m. The barrier is secured before impact and does not reply on the unreliable catch mechanism to engage on being hit by a vehicle. And the EAG080-30BR bridge expansion railing system is a combination of bollards and railing with super-shallow

foundations (only 50mm), which is suitable for bridge deck installation. The system is capable of expanding or contracting by 150mm when installed across bridge movement joints, with a 4.1m clear break in the foundation structure. The beams are lightweight and removable for service access, while accommodating architectural fretwork designs to blend in with the surrounding streetscape. All systems are complemented by the most comprehensive range of LPCB-rated turnstiles from A1-D10 (SR1 through SR4), meaning Eagle now has 13 products listed in Red Book after acquiring the exclusive IP rights to the Clarke Instruments range of turnstiles in 2019. The LPCB says that although the new twopart classifications cover 48 combinations of threat and delay, it is considered unlikely that most specifiers, end users and regulators will require individual products to achieve security ratings. Instead, they are more likely to achieve an extended delay by deploying a series of products in a layered approach; a strategy that is supported by the classification system introduced within this standard. For example, it is considered a 10-minute delay against a level ‘F’ threat is more likely to be achieved by deploying two layers formed of products that achieve an ‘F5’ security rating instead of a single layer formed of products that achieve an ‘F10’ security rating. Ashby concludes: “I like this layered approach as it encourages security designers and specifiers to think of successive and increasing rings of security being hardened the closer an intruder gets to the most critical and sensitive assets.” L

FURTHER INFORMATION www.eagleautogate.co.uk

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

27


Selectaglaze secondary glazing can provide an unseen level of security to any property. It creates a second barrier of protection from the inside that can prevent the most determined thief or protect occupants from the effects of bomb blast. Products throughout the range have been tested by 3rd party organisations.

Attack testing on Selectaglaze products at ISE 2019 Founded in 1966, Royal Warrant holder Selectaglaze has gained a reputation as a leading secondary glazing specialist offering high performance noise insulation, improved building energy performance, environmental control and certified security. Visit Selectaglaze at the International Security Expo 28th – 29th September 2021 Olympia, Stand B123 +44 (0) 1727 837271 enquiries@selectaglaze.co.uk www.selectaglaze.co.uk

Selectaglaze Limited Alban Park Hatfield Road St Albans AL4 0JJ


INTERNATIONAL CYBER EXPO

Sponsored by

UNITING THE WORLDS OF CYBER AND PHYSICAL SECURITY

T

he number of cyber attacks on companies, governments and individuals has been consistently rising in recent years, with global ransomware attacks increasing significantly in 2020, up 485 per cent in compared to 2019. Tackling cyber security and protecting key critical infrastructure is key to national security, and the quick pivot to remote working during the Covid pandemic has seen even the most prepared organisations face new security challenges, with cyber criminals quick to take advantage. This is highlighted by research that reveals CEOs are more concerned than ever about cyber security vulnerabilities, up to 91 per cent from 80 per cent last year. Alarmingly, nearly 80 per cent of senior IT and IT security leaders believe their

organisations lack sufficient protection against cyber ttacks, despite the fact that they have increased investment in security over the past 12 months. Highlighting the growing need for cyber security readiness and the complex environment security professionals are now operating in, the newly launched International Cyber Expo will open its doors at Olympia, London from 28-29 September – providing invaluable opportunities for faceto-face networking and a chance to discover the latest thinking and solutions designed to mitigate cyber threats. Co-located with the highly acclaimed International Security Expo, two leading industry events under one roof will provide attendees with the perfect platform to identify the very latest technology and E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

29


THE QUEEN’S AWARDS FOR ENTERPRISE: INTERNATIONAL TRADE 2021

You’re Invited

Register Here

Queen’s Award Presentation & Open Day - 3rd September 2021 What to expect In addition to the Queen’s Award Presentation and ceremony, Westminster is hosting an open day at our head office in Banbury, Oxfordshire. Visitors can expect an intimate exhibition style experience where they can get hands on with some of our most popular products, technical solutions and services such as: Mass Entry Screening Systems Narcotics & Explosives Detection Under Vehicle Screening Systems Mobile Phone & Metal Detection K9 Services

Perimeter Detection AI Security Systems Barrier & Access Control Drone Detection and Mitigation Heartbeat Sensors (Clandestine Detection)

...and many more!

www.wg-plc.com enquiries@wg-plc.com +44 1295 756300

KEEPING PEOPLE SAFE

Westminster Group PLC, Westminster House, Blacklocks Hill, Banbury, Oxfordshire OX17 2BS


INTERNATIONAL CYBER EXPO

ALARMINGLY, NEARLY 80 PER CENT OF SENIOR IT AND IT SECURITY LEADERS BELIEVE THEIR ORGANISATIONS LACK SUFFICIENT PROTECTION AGAINST CYBERATTACKS, DESPITE THE FACT THAT THEY HAVE INCREASED INVESTMENT IN SECURITY OVER THE PAST 12 MONTHS  services to protect the digital and physical future. Aimed at government officials, cyber policymakers, export leaders and CISOs from around the world, the event will help improve the security and resilience of national infrastructures and business continuity with representatives from the communications, energy, utilities, finance, government, health and transport sectors all in attendance. CYBER-DEFENCE SOLUTIONS IN ACTION With game-changing products and services on display, attendees will meet more than 50 exhibitors, including Tripwire, Jacobs, Dencrypt, 3M, and Ascentor, as they demonstrate their expertise in Network Protection, Industrial

Systems, Endpoint Security, Managed Services, Apps, Mobile Security, Identity & Access Management, Cloud Security, Threat Intelligence, Disaster Recovery and more. Product demonstrations will be staged in the Product Innovation Theatre, where leading brands launching products and services will showcase their innovative solutions. Live demonstrations will also take place in the Live Cyber Attack Demonstrator, in association with CrisisCast. Bringing realistic, informed, crisis management and disaster incidents to life, CrisisCast will partner with leading International Cyber Expo exhibitors to deliver a highly immersive, real-time cyber attack on an eminent retail chain. Incorporating hi-tech stage and film

Sponsored by

techniques, visitors to the exhibit will be able to see and understand the psychology and motivating factors behind the attack from two perspectives at once – the attackers and the entity’s boardroom. Elsewhere on the show floor, Cyber Griffin will present its award-winning Decisions and Disruptions tabletop exercise designed to explore the decisions that people make in real-life scenarios to protect their businesses from modern-day threats. Fully immersive teams will put to the test as they respond to both hacking and malware attacks, in addition to physical security threats. The National Cyber Security Centre (NCSC) certified training will offer participants a chance to see first-hand how cyber security can affect an organisation’s turnover, reputation and regulatory fines while highlighting how cyber and physical security impact each other. UNDERSTANDING THE MOST PERTINENT INDUSTRY TRENDS Offering exclusive insights into the most pertinent industry trends, the event will also host the E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

31


METIS Aerospace Ltd is a UK based company designing and manufacturing intelligent Cyber and Electro-Magnetic Activity (CEMA) Solutions and Services to monitor Radio Frequency (RF) signals for both commercial and military customers. The SKYPERION family of proven, cost effective, passive RF drone detection sensors is a prime example of their ability to provide an agile response to customer requirements.

visit www.metisaerospace.com for further information on how we can support your needs.

METIS Aerospace Ltd Boole Technology Centre Lincoln LN6 7DJ


INTERNATIONAL CYBER EXPO

sectors, and the solutions required to help security professionals protect our nation and secure our networks. With unparalleled insights from our Cyber Advisory Council, our event will provide exclusive insights and the latest solutions to improve the security and resilience of business and critical infrastructures.”

CONTINUED ENGAGEMENT ACROSS THE INDUSTRY AND BETWEEN INDUSTRY AND GOVERNMENT, AND WITH FRIENDS AND PARTNERS ACROSS THE WORLD, IS WHAT WILL KEEP US SAFER AS WE GROW EVER MORE DEPENDENT ON TECHNOLOGY AND THE EVENTS INDUSTRY IS VITAL TO THIS  Global Cyber Summit where current and future threats will be put under the spotlight. Running over two days, the programme will see a range of globally renowned experts share their knowledge and expertise on a range of topics from serious organised cybercrime, state-sponsored hacking, ransomware attacks, protecting critical national infrastructure and more. BACKED BY GOVERNMENT, INDUSTRY AND LEADING ACADEMIC PROFESSIONALS Ensuring the event has a laser-like focus on the issues facing us now and in the future, an impressive panel of 27 renowned industry experts have joined the International Cyber Expo Cyber Advisory Council and will share their experiences and knowledge with the show organisers. Chaired by Professor Ciaran Martin, former CEO of the National Cyber Security Centre and professor at Oxford University, the panel also includes Richard Benham, Global Expert in Data Management, Artificial Intelligence (AI) and Cyber Security, Foreign and Commonwealth Office; Paul Chichester, Director

Sponsored by

of Operations, National Cyber Security Centre (NCSC); Lisa Ventura, CEO & Founder, UK Cyber Security Association (UKCSA); and Henry Pearson, Cyber Security Ambassador and UK Defence and Security Exports, Department for International Trade (DIT), UKDSE. Martin commented: “In this year of all years, keeping the cyber security community together is more important than ever. Continued engagement across the industry and between industry and government, and with friends and partners across the world, is what will keep us safer as we grow ever more dependent on technology and the events industry is vital to this. I am delighted and honoured to be asked to chair the Cyber Advisory Council and look forward to supporting, adding value, sharing knowledge and shaping the future of these essential cyber events.” Rachael Shattock, International Cyber Expo Event Director, said: “With growing investment and awareness of cyber capabilities, never has there been a more important time to understand the convergence of the physical and cyber security

THE NATIONAL CYBER AWARDS® - 2021 Now in its third year, London is this year’s venue for The National Cyber Awards® on Tuesday 28 September 2021. Sponsored by the National Police Chiefs Council and the Chartered Institute of Information Security, the highlight of the evening will be the winner of The National Cyber Citizen of the Year award who will receive a unique gold Cyber Citizen figure trophy. This year the organisers are supporting and donating to The CyberTrust, Cyber Security Challenge UK and Help for Heroes. Dame Janet Trotter, chair of The Cyber Trust, said: “The Cyber Trust is a charity that seeks to protect those most at risk in the areas of personal cyber and online security. We are delighted to have been chosen as one of the charities of choice by The National Cyber Awards 2021 allowing us to fund our fantastic APP ‘Speak Out’ that teaches users particularly young teenagers about staying safe online.” L

FURTHER INFORMATION

www.internationalcyberexpo.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

33


E

Logistics Solution Provider

Logistics Support

rantee gua ar ye 25

Approve d in sta lla tio n

Made in Britain

Logistics

g si

n

a ye

rs

te

70

am

Manufacture

of

ex p

er i

enc

e

In h

e ed s ou

Logistics + Installation Service

Linebacker® PNR

Discreet protection against vehicle-borne attacks

Get a free quote

0800 408 4766

www.jacksons-security.co.uk


INTERNATIONAL SECURITY EXPO

Sponsored by

IT’S OUR DUTY TO BETTER PROTECT PUBLICALLY ACCESSIBLE LOCATIONS

T

he Euros 2020 final was an event hotly anticipated by the entire nation, all eager to see the England squad attempt to ‘bring it home.’ Hospitality venues across the country were overwhelmed with bookings from groups of people excited to celebrate the big match together and absorb the electrifying atmosphere. Wembley Stadium was all set for the occasion, with some Covid-19 restrictions still in place, the maximum capacity was set by the government at 60,000 despite the stadium being capable of hosting 90,000 fans at a time, to allow for adequate social distancing. However, it seems a large number of fans who missed out on tickets took matters into their own hands, storming the security gates on the outer edge of the stadium; overwhelming security personnel and gaining unauthorised access to the stadium.

Reporters from The Telegraph described the shocking scenes inside the stadium as ‘carnage,’ as they witnessed ticketless fans aggressively barging through the barriers with no regard for staff, ticketholders, or property. In the aftermath, various parties have been questioned over their lack of control of these intruders, and this event has highlighted the need for the industry to reconsider the proactive protective measures used to ensure this doesn’t happen again. BETTER PREPARED Now Covid-19 restrictions have eased, the UK is beginning to reopen. As such, public venues including stadiums will be prepping in hope of a busy year ahead to make up for the loss of business. Sadly, terrorism and random acts of violence remain a very real threat to citizens, and this event at E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

35


BastionWALL A.C.E ™

Modular room building and partitioning system with multi-threat capability: Forced Entry Blast

Ballistic Blast Fragmentation STAND

D50 Operational HQ | Armstrong Works | Scotswood Road | Newcastle Upon Tyne | NE15 6UX | T: 0191 257 3100

www.bastionprotects.com


INTERNATIONAL SECURITY EXPO

 Wembley Stadium highlighted just how important the careful consideration of protective measures by venue owners is to ensure the public can enjoy the site or space, safely. In February this year, the government launched a consultation on newly proposed anti-terrorism legislation to protect the general public. The Protect Duty, as it’s billed, builds on ‘Martyn’s Law’, legislation campaigned for by the mother of one of the victims of the 2017 Manchester Arena attack. The consultation will consider ways of developing proportionate security measures in publicly accessible locations. The aim is to make it a legal requirement for venue operators and owners of other public locations to assess and mitigate security risks, to better protect the public. As it stands, there is no legal requirement to do so. WHAT’S PROTECTED? Publicly accessible locations are any spaces the general public have

Sponsored by

IN FEBRUARY THIS YEAR, THE GOVERNMENT LAUNCHED A CONSULTATION ON NEWLY PROPOSED ANTI-TERRORISM LEGISLATION TO PROTECT THE GENERAL PUBLIC. THE CONSULTATION WILL CONSIDER WAYS OF DEVELOPING PROPORTIONATE SECURITY MEASURES IN PUBLICLY ACCESSIBLE LOCATIONS permission to enter. Within this, there are three main categories: public venues with a capacity of over 100 people, such as stadiums, tourist attractions and shopping centres; large organisations including retail or entertainment chains with a minimum of 250 staff; and public spaces such as parks, beaches and thoroughfares. It’s impossible to predict or prevent all terrorist attacks, but from a security perspective, it is best practice to abide by the assumption that any publicly accessible location can become a target at any time.

Robust training and education are therefore key for those responsible for these venues in question. This will leave them better prepared to take appropriate action at any time. The consultation aims to provide a security framework, which will help them achieve this by considering the adequacy of adopted security measures, systems, and processes. VIGILANCE IS KEY Within the consultation document a list of recommendations for venues is also included: E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

37


ADVERTISEMENT FEATURE

Delivering 4G, direct-to-cloud body camera for the commercial market Secure 4G and Wi-Fi capabilities, two-way audio, geo-tagging, and alarm features combine with Eagle Eye Networks true cloud infrastructure for unrivaled body camera offering for guarding companies, in-home service companies, ambulance and other commercial entities Eagle Eye Networks, the global leader in cloud video surveillance, has introduced the first-of-itskind 4G, direct-to-cloud body camera designed specifically for commercial use. This new offering provides commercial customers with affordable access to feature-rich, professional-grade body camera services, which improve staff safety and accountability, trigger immediate response, and provide valuable evidence, all while protecting assets and keeping communities safe.  Body cameras dissuade aggression, improve accountability, and reduce false accusations. Employees from private security guards to retail staff, in-home service providers, and delivery workers feel safer and more valued when wearing body cameras.  Global research organisation Omdia has identified body cameras in non-law enforcement applications as a top trend in 2021, saying the potential addressable market for commercial body-worn cameras dwarfs that of law enforcement. Paul Bremner, Principal Analyst in Omdia’s critical communications group, said: “The commercial body-worn camera market is ripe for new entrants. Features such as cloud connectivity, 4G, live streaming, GPS, and price, are important to retailers, delivery services, guards, and others in the commercial sector.”  Jaime Abad Valdenebro, CEO at reseller OmniCloud, said fixed IP cameras integrated with 4G-enabled body cameras represent the extension of video cloud services in a real mobile environment, providing a new disruptive video surveillance solution. “In a smart city application, Eagle Eye’s new 4G, direct-to-cloud body cams will provide extra protection for security guards and ensure

patrols are completed on time. The 4G is important, because it gives the user live access to body camera video. It will make a high performance true cloud video surveillance system even more powerful,” he said. With Eagle Eye Body Cameras, users can:    • Use 4G or Wi-Fi for live streaming, real-time remote viewing, and direct to cloud recording • Blend fixed, mobile, and body-worn cameras, making it easier for your entire surveillance system to work together • Stream to a monitoring or security operations center and use geo-tagging for immediate response and support • Experience a larger viewing area with fisheye capabilities that are

• • • •

dewarped in the Eagle Eye Cloud Management Application Manage a large number of cameras in the cloud and watch from a control room Use two-way audio to clearly communicate Protect your people at work and in the community Future-proof your investment with hardened cameras that offer ‘law enforcement-level’ durability and quality at an affordable price Gain flexibility for live streaming and video retrieval during docking with rapid recharge capabilities

Dean Drako, founder and CEO of Eagle Eye Networks, said: “The demand for high-quality body cameras that connect to the cloud has been growing for several years, accelerating even more with the pandemic, social unrest, and the shift to providing more in-home, curbside, and remote services. Traditional law enforcement body cameras use a high dollar subscription model, which is too steeply priced for commercial customers. Eagle Eye Networks will support the new Eagle Eye Body Cameras at the same low subscription cost of fixed cameras, making the solution affordable for commercial customers accustomed to paying up front for advanced cameras with affordable long-term subscriptions.” L

FURTHER FURTHER INFORMATION INFORMATION www.een.com/bodycam www.frequentis.com

38

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47


INTERNATIONAL SECURITY EXPO

 • Be alert to suspicious behaviours, engage the person in a welcoming and helpful manner or report them to the police • Be alert to abandoned bags • Be security-minded, especially online. Avoid providing specific information that could aid a terrorist, for example, floor plans with security details • Encourage and enable a security culture • Complete and provide ACT (Action Counters Terrorism) Awareness e-learning • Have a clear action plan. How would you respond to an incident inside or outside your site? • Periodically review and refresh the risk assessment ESSENTIAL PLANNING The framework includes three key points that all spaces and organisations should pay attention to:

Completing a risk assessment – This covers understanding what a potential terrorist’s motivations could be, where they might target, considering how they might attack, and how those motivations and methodologies might change. Considering security as a system – Here thinking of security as a combination of physical and behavioural interventions is important. You shouldn’t only think of erecting physical measures such as fences, bollards, CCTV and blastresistant glazing, but also building and sustaining a security-minded culture. Vigilance needs to be encouraged and the appropriate training provided to staff involved in the day-to-day running of your establishment. Correct installation – While choosing the right product for the job is

Sponsored by

ORGANISATIONS ARE ENCOURAGED TO USE INFORMATION AND GUIDANCE PROVIDED BY THE GOVERNMENT, AND POLICE SERVICES. THIS WILL HELP THEM WHEN ASSESSING THE LIKELIHOOD OF TERRORIST THREATS AT THE LOCATIONS THEY OPERATE

important, it’s essential to look beyond this and also ensure your system doesn’t conflict with other safety measures, such as health and safety and fire regulations. To comply, organisations are encouraged to use information and guidance provided by the government, and police services. This will help them when assessing the likelihood of terrorist threats at the locations they operate. This guidance has been compiled to help gauge the potential impact of the risks. These risks will be unique to each site and depending on the specific functions or qualities of the venue in question, as well as the existing security systems. A ‘reasonably practicable’ preparedness system is encouraged across the board, this will ensure that all staff, not just those that work in security, are trained to know how to react quickly during an emergency. PARTNERS IN CRIME These organisations can turn to the government for advice on practical preparedness measures, understanding threats and attack methods, and how to stay vigilant and plan for incidents. A new digital platform is also in the pipeline to launch later this year, offering additional advice and training for users. Several sectoral and regional engagement days have also been outlined in the proposal, which will

involve updates and revisions to training and e-learning programmes. An app devoted to ACT was launched in March 2020, and the government authorities Career Transition Partnership (CTP) and Centre for Protection of National Infrastructure (CPNI) are also providing advice. BEST IN THE BUSINESS Moving forward, there are plans in place for security specialists to work with the government and these businesses. Organisations that deliver and support security solutions will be able to provide unrivalled support for venues looking to comply with The Protect Duty. At Jacksons Fencing we’ve demonstrated for years how easy it is to blend security and aesthetics in and around a public site. As such, we are delighted to see this renewed focus on integrated security in public venues to improve the safety of these venues that so many of us enjoy visiting. More often than not, security really can aid the user experience in a very positive way. When visitors feel safe in their surroundings, they’re far more likely to visit again. It’s a win-win solution for all parties involved and it’s only right that it’s fully embraced. L

Written by Peter Jackson, managing director of Jacksons Fencing.

FURTHER INFORMATION

www.internationalsecurityexpo.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

39


PAS68, IWA14 & LPS1175 perimeter solutions manufacturer

Eagle Automation Systems Ltd designs, manufactures and installs a comprehensive range of PAS68, IWA14-1, LPS1175 and government-approved perimeter security solutions, including gates, bollards, blockers, barriers, turnstiles and street furniture. Established in 1988, Eagle is one of the leading gate automation and security companies in the UK. Its mission is to provide a single source for all clients’ HVM requirements. All automated gates and vehicle barriers are secure before impact (SBI) meaning that Eagle has designed systems that are locked down before a collision and do not rely on vehicle energy to catch the gate or barrier.

Eagle’s maintenance and service back-up is second to none. Fully trained engineers with the latest equipment and maintenance software specifically written for the gate automation industry ensure services are carried out on a regular and timely basis. Eagle has a department that specialises in risk assessments and force testing. Installations are designed and installed to ensure that all systems meet current and future legislation. FURTHER INFORMATION Tel: 01992 524800 sales@eagleautogate.co.uk www.eagleautogate.co.uk

Protecting people and assets from present and future dangers

Bastion has been an innovative and successful brand for almost 40 years, supplying advanced physical security solutions to many sectors including: police, government, defence, nuclear, medical and commercial. The company’s modular room building and partitioning systems form the backbone of its protective systems, whilst retaining the experience for resolving unique and challenging physical security risks. The BastionWALL family of bolt-together systems, provide high to ultra-high levels of physical security. Physical security is often the last line of defence and as such, Bastion has been developing and testing the multi-threat capabilities of it’s systems. The BastionWALL A.C.E system is

40

approved for Government use (please contact CPNI for details) and has significant determined forced entry, small-arms ballistic, bomb blast and blast fragmentation performance in a slim-line (50 mm) thickness. Projects experience includes the design and building of large data halls, ballistic lining of critical facilities, secure cabinets for Restricted materiel, secure rooms (SCIF’s) and armouries, amongst a longer list. Bastion’s aggressive R&D program is leading to the launch of several new products and product improvements this year and in the years to come, with an eye on emerging threats and tactics.

FURTHER INFORMATION www.bastionprotects.com

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

Eagle Eye Networks: Transform your video surveillance system

Founded in 2012, Eagle Eye Networks, Inc., is #1 in cloud video surveillance worldwide, addressing the needs of businesses, alarm companies, security integrators, cities, and individuals. Eagle Eye’s 100 per cent cloud-managed solutions provide cloud and on-premises recording, bank-level security and encryption, and broad analog and digital camera support – all accessed via the web or mobile applications. Businesses of all sizes and types use Eagle Eye solutions for operational optimisation and security. All Eagle Eye products benefit from Eagle Eye’s developer-friendly RESTful

API platform and Big Data Video Framework ™, which allow for indexing, search, retrieval, and analysis of live and archived video. Eagle Eye’s open API has been widely adopted for integration in alarm monitoring, third-party analytics, security dashboards, and point-of-sale system integrations. Eagle Eye sells its products through authorized global resellers and installation partners.

You can find Eagle Eye Networks at the International Security Expo at stand number F72.

FURTHER INFORMATION www.een.com

Developing intelligent CEMA solutions

METIS Aerospace Ltd provides signals intelligence expertise, products, and RF spectrum monitoring capability to government agencies, military organisations, commercial integrators and private organisations. Encapsulating all that is CEMA (Cyber and ElectroMagnetic Activities), METIS has taken the technology from the company’s compact, modular, and scalable HYPERION RF signal detection system and developed it into a flagship SKYPERION passive RF drone detection solution. SKYPERION, a CPNI rated product, has become a proven capability with both commercial and military customers. Instrumental in the re-opening of London Gatwick Airport

following the 2018 drone intrusion ‘crisis’, SKYPERION continues to provide 24/7 cover at that location. Alongside these products, METIS has also developed considerable expertise in the field of unmanned systems development. Not only does the company utilise COTS and modified COTS drones for its own development work, but also provides respected partnership support to a wide range of innovative projects, programmes, and solutions. With a range of applications across military and commercial markets, METIS capabilities integrate with existing security measures to protect armed forces, critical national infrastructure, VVIP’s, individual and institutional privacy, and public safety.

FURTHER INFORMATION Tel: 01522 963125 www.metisaerospace.com


NIMBUS: Managing an organisation’s investigations

BlackRainbow was formed with the sole strategic intent of bringing a modern, intuitive and innovative solution to market, re-inventing complex case investigation and evidence management to solve inefficiencies and manage risks faced in law enforcement, government and intelligence sectors. The company has worked as, and with, investigators in over 40 countries over the past two decades to understand their challenges and develop solutions to meet their needs. BlackRainbow acknowledged the demands of every investigator are evolving and

changing in line with complexities of crime, advances in technology, and regulatory requirements. The company, therefore, believes that the best solution is to maximise the efficiency of the investigator by bringing various technology and process tools together in one place with NIMBUS, in a manner that is automated, orchestrated, simple, defensible and intuitive to produce a solution perfected to your requirements. NIMBUS is designed for cross-disciplines, applying centralised workflows delivering significant efficiencies, greater collaboration, optimised case transparency, and improved quality. NIMBUS modules are integrated, and dynamic user experience and interaction is flexible and configurable, to build and shape to current or future working practices.

FURTHER INFORMATION www.blackrainbow.com

Secure communications for everyday devices

Armour Communications supplies leading technology for secure communication via 3/4/5G, Wi-Fi and satellite for voice, video, messaging and data on Android, iOS, Windows, Linux and macOS platforms. Armour Mobile features in-built secure conferencing between multiple callers. SigNet by Armour provides similar end-user features with enhanced AES-256 bit peer to peer encryption. Armour Mobile and SigNet by Armour are available as Cloud or On-Premises solutions. If required, Armour’s technology can interoperate with SIP based PBXs and commonly used UC installations, extending the reach of mobile

secure comms to the desk phone in the enterprise. Armour Mobile and SigNet by Armour enable users to communicate transparently within a secure environment, while taking advantage of the reduced costs and increased flexibility provided by Voice over IP corporate communications. Armour’s products include NATO, CPA and ISO27001 approved offerings up to OFFICIAL-SENSITIVE and NATO Restricted with solutions via selected Armour partners available to mitigate threats up to SECRET.

FURTHER INFORMATION www.armourcomms.com

Safe, secure and sustainable fencing and access solutions

Jacksons Fencing is a UK fencing manufacturer specialising in premium quality security products with a 25 year guarantee. The company is a complete service provider, designing, manufacturing, supplying, and installing everything from welded mesh panels, vertical bar fencing, and metal railings, to acoustic barriers, LPS 1175 security rated products, and hostile vehicle mitigation solutions. With a key focus on quality and innovation, Jacksons’ aim is to satisfy every security need with high quality, long-lasting products, with minimal maintenance and a low lifetime cost, and a duty to get it right first time. Jacksons Fencing supply

solutions to all sectors, including commercial properties, government facilities, transport applications, data centres, and utilities. The organisation has an extensive team of experts, including experienced sales teams, CAD technicians, delivery drivers, account managers, craftsmen, and installers. The company has achieved a number of valuable accreditations over the years, and attained an ISO 9001 certification as a Quality Management System. Products are designed to British Standards to ensure they are safe and fit for purpose, with ranges approved by Secured by Design, and suitable for UK government use. FURTHER INFORMATION www.jacksons-security.co.uk

To register for your FREE Digital Subscription of Counter Terror Business, go to: www.counterterrorbusiness.com/digital-subscription or contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055

Follow and interact with us on Twitter:

@CTBNews

www.counterterrorbusiness.com ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

41


CYBER SECURITY

WHAT ARE THE CYBER RESILIENCE CENTRES? T

hey are here to grow and strengthen the UK’s resilience to online crime. The 10 Cyber Resilience Centres were set up to support and help protect businesses and charities across the UK against cyber crime. Working in conjunction with local universities and the local police forces, we possess the latest information on emerging cyber threats, criminal trends, and best safeguarding practice. This enables us to provide you with timely guidance to prepare and protect your business, staff, and customers from cyber criminals. The CRC network is modelled on a successful structured collaboration acclaimed by the National Police Chiefs’ Council (NPCC) with each centre’s team being led by two senior police officers. WHY DO WE EXIST? Cyber crime is a growing problem. Last year, it was reported up to 39

42

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

per cent of UK companies suffered a cyber attack the previous 12 months. Indeed, one small business in the UK is successfully hacked every 19 seconds, according to the insurance sector. Ransomware groups do not target companies but do target software vulnerabilities. So, if there are 10,000 companies using a piece of software and the hackers know of a vulnerability in that software, they go for all 10,000. These cyber attacks are potentially ruinous events for business owners. The latest Cyber Security Breach Survey revealed that the average cost of a cyber security breach in the UK is £8,460 across all businesses. However, this figure becomes greater as the size of a business increases. The cost of a cyber attack is not only financial, with the average time large businesses spend on managing the impact amounting to 3.4 days,


CYBER SECURITY

according to statista.com. The CRCs provide guidance and toolkits that help businesses improve their cyber resilience and mitigate the threat posed by cyber criminals. We also help to explain and remove those three common myths concerning cyber security:

Cyber is complex - I do not understand it. Cyber attacks are sophisticated - I cannot do anything to stop them. Cyber attacks are targeted - I am not at risk. HOW DO WE HELP BUSINESSES? The first step to cyber resilience is knowledge. That is why we produce blogs and newsletters that keep you updated on the latest news, views, guidance, and events relevant to the business community. We provide a range of services delivered by top talent from local universities, including staff training. We also have a network of Trusted Partners who can help you complete the government-backed Cyber Essentials programme – designed

to protect businesses from the most common cyber attacks. Cyber security does not always have to be expensive. Some of the basic improvements that can protect you from the majority of cyber crime can be implemented for free. We will help you and your business navigate the internet to find these and improve your cyber security at an affordable rate. We always talk about keeping your software updated being so important, why? For every 1,000 lines of computer code, there are between 10-15 errors. Each error can become a vulnerability/ weakness for your organisation, which could be exploited by someone. For example, Windows has an estimated 10-50 million lines of code, and Office 365 has an estimated 75 million. Install those updates when the device warns you, it is likely to save your bacon, even better, turn on auto-update and if you do not need the software - uninstall it. WHAT MEMBERSHIP OPTIONS ARE AVAILABLE? We offer all businesses free membership in addition to our paid membership opportunities. Businesses can choose from four membership options as well as selecting any of the services we deliver.

WHO ARE OUR TRUSTED PARTNERS? Our Trusted Partners are official providers of Cyber Essentials and Cyber Essentials Plus Certification. Cyber Essentials helps you to guard against the most common cyber threats and demonstrate your commitment to cyber security which can often become a requirement when tendering for work in both public and private sectors. Cyber Essentials is a simple but effective, government-backed scheme that will help you to protect your organisation, whatever its size, against a whole range of the most common cyber attacks. WHO ELSE DO WE WORK WITH? Each centre has established an Advisory Group featuring a range of industry professions from all backgrounds to help support growth. The Advisory Group provides guidance that influences the direction of the centre. We also work in partnership with the UK’s Police Protect Network, which works proactively and reactively on significant cybercrime investigations. By working alongside the National Cyber Security Centre (NCSC), we can keep our members up to date with the latest cyber threats and guidance. E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

43


CYBER SECURITY  WHAT SERVICES DO WE PROVIDE? We provide a range of affordable cyber resilience services with the very current knowledge and technical expertise from the UK’s top university cyber talent. Our services help SMEs and therefore prepare and improve cyber resilience of the UK’s supply chain. The services we offer are listed here https://www.secrc.co.uk/ services on our website. For example,

Are your staff in need of some cyber training? • We can help them to recognise a phishing email whether it is a new starter or as part of an organisation’s training program. • We can improve their response to a cyber event like they have practised in a fire drill or medical incident?

44

THE FIRST STEP TO CYBER RESILIENCE IS KNOWLEDGE. THAT IS WHY WE PRODUCE BLOGS AND NEWSLETTERS THAT UPDATE ON THE LATEST NEWS, VIEWS, GUIDANCE, AND EVENTS RELEVANT TO THE BUSINESS COMMUNITY • The Information Commissioners Office recommends that new staff complete training within one month of joining the organisation and that the workforce has annual refresher training.

When did you last visit your cyber security policies? • We can assist in changing a workplace culture as sometimes it is the data handling process that creates the vulnerabilities.

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

• Highlighting good / bad practices e.g., clean desk policy to comply with GDPR; not plugging devices into USB to charge. • Recognising and rewarding staff’s proactive behaviour e.g., reporting phishing emails to ICT. How do you reward your staff for following best practices to assist in changing the culture? Send them a chocolate bar for every phishing email that is reported for example.


CYBER SECURITY • Do you have an information security policy, cyber security policy, business continuity plan or disaster recovery plan?

• Police Cyber Alarm helps organisations monitor and report malicious activity they face from the Internet - https://cyberalarm.police.uk/

• Are those policies readable for staff and not realms of just words?

• Have I been pwned is a worthwhile service that notifies you know about comprises featuring your organisation’s emails in data breaches. These usually are a precursor for phishing email campaigns and business email compromises - https:// haveibeenpwned.com/DomainSearch.

Do you want to find out whether there are presently any weaknesses in your organisation’s cyber security? • We can carry out a specific assessment of your infrastructure and assess it for vulnerabilities. • Alternatively, if you think or know the infrastructure has weaknesses already, we can offer solutions on how these can be fixed. Some freely available tools:

• The cyber readiness assessment provides your organisation with an indication of cyber security maturity with regards to Cyber Essentials, upon which the option of free cyber insurance. This also provides you with the ability to request your contractors adhere to the scheme therefore strengthening your

supply chain to a cyber attack - https:// getreadyforcyberessentials.iasme.co.uk/. There’s a network of cyber resilience centres across the country that are here to help. For more information and to gain access to affordable cyber services, training, and guidance in your area, find out your where your nearest cyber resilience centre by visiting: https://www.secrc.co.uk/uknetwork. L

Written by Chris White, Detective Inspector and head of Cyber & Innovation, The Cyber Resilience Centre for the South East.

FURTHER INFORMATION

www.secrc.co.uk

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

45


FACIAL RECOGNITION

FACIAL RECOGNITION: FACING UP TO TERRORISM

T

he EU Commission intends to define rules for the public use of artificial intelligence (AI) by setting precise boundaries for systems which may present risks for the rights to data protection and privacy. AI systems intended to be used for remote biometric identification of persons in public places will be considered high risk and will be subject to a third-party conformity assessment, including documentation and human oversight requirements by design. Although, there will be ‘serious’ exceptions to this prohibition, such as terrorism investigations, finding missing children and public safety emergencies, as officers will need to take urgent action. However, there are still misconceptions about the validity of facial recognition —both the technology itself and its deployment— which may entice some police authorities and organisations to limit or withdraw the use of Facial Recognition Technology (FRT) altogether.

46

This article seeks to explore the use of FRT to combat terrorism, and how organisations operating in the supply chain ought to develop and utilise FRT to enhance public confidence and fit in line with the new EU’s proposals. THE NEED FOR FRT TO COMBAT TERRORISM In a hostile world, terrorism risks are increasing. These risks pose a significant threat to not only national security, but to political and social stability and economic development. The utilisation of facial recognition solutions can play a key role in improving the efficiency of police forces, intelligence agencies and organisations to respond and prevent major attacks, in a way that minimises intrusiveness for citizens. In general, FRT is a biometric surveillance aid which uses a camera to capture an image of an individual’s face, mainly in densely populated places such as streets, shopping centres, and football arenas. It is then

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

able to provide a similarity score when it recognises a similarity between a facial image captured, with an image held within a criminal database. If a match is made, an alarm will inform the security operator to do a visual comparison. The operator then can verify the match and radio police officers and have them conduct a stop, if one is needed. It is important to note, the technology does not establish individual ‘identity’ – that is the job of humans. Moreover, many terrorists are not known to a database and can move around populated spaces largely unnoticed. With the advancement

WITH THE ADVANCEMENT OF AI, SURVEILLANCE SYSTEMS CAN NOW MONITOR PATTERNS OF IRREGULAR BEHAVIOUR


FACIAL RECOGNITION of AI, these surveillance systems can now monitor patterns of irregular behaviour, such as someone leaving a bag unattended for a long period of time or returning to a site regularly to take photographs. This information can then be used as the basis on which to perform actions, e.g. to notify officers to conduct a stop search or to record the footage. Security officers need access to this type of intelligence, to secure the perimeter of their facility and ultimately save lives. PRIVACY REMAINS A TOP PRIORITY It is essential, in this particular case, that privacy remains a top priority when utilising FRT. Privacy advocates, and AI sceptics suggest FRT can be hijacked for nefarious purposes, including unlawful surveillance. But what these sceptics are not aware of are the measures that can be put in place to ensure the privacy of individuals captured by Automatic Facial Recognition (AFR) cameras is protected. This can include anonymising by passers in the camera’s field of view without obscuring movements or encrypting original footage so that only authorised users can access sensitive data. Moreover, it is the responsibility of FRT developers to implement internal policies that clearly stipulate they will not partner with end users who do not act upon the importance of privacy and security in the implementation and operations of their systems. It is also equally important that these customers are properly prepared, trained and competent to use FRT lawfully. It must also be said, where FRT is being used under a Directed Surveillance Authority, the UK has one of the strongest and globally respected regulatory authorities under the Investigatory Powers Commissioner. This provides for oversight, restriction of collateral intrusion and greater provision of accountability for surveillance operations of this nature. ACCURACY IS IMPROVING In addition, while face masks have helped reduce the spread of Covid-19, they have also become a significant security threat. Security officials have raised concerns that facial recognition cameras will not be able to identify terrorists because they can blend into crowds and hide their faces with a mask. In fact, as recently as July 2020, NIST flagged that even the best of the facial recognition algorithms studied were unable to correctly identify a mask-wearing individual up to 50 per cent of the time. However, these systems no longer have to operate best when environmental factors are controlled, meaning that extreme angles, occlusion and contrast in lighting can now be compensated for. It must be pointed out, that with most technology, FRT is advancing at rapid rates. Indeed, as of January 2021, facial recognition algorithms can now correctly

THE UTILISATION OF FACIAL RECOGNITION SOLUTIONS CAN PLAY A KEY ROLE IN IMPROVING THE EFFICIENCY OF POLICE FORCES, INTELLIGENCE AGENCIES AND ORGANISATIONS TO RESPOND AND PREVENT MAJOR ATTACKS

identify individuals up to 96 per cent of the time, regardless of if they are wearing protective facial coverings or not. Moreover, however flawless our technology is when it is designed and produced, it can of course be abused when operated by an oppressive end user. Where inadequately regulated in a democracy, such dysfunction is a short ride away from dystopia. Developers must therefore work closely with end users such as police departments, to understand the user requirement and the legitimacy of endeavour. They must work collaboratively where necessary to enable and support client compliance to statutory obligations and to build appropriate safeguards where vulnerabilities may arise. Indeed, anyone who develops machines which have an impact upon society carries a responsibility, to ensure that they are only used as a force for good and to the benefit of the society and communities which our technology may help to shape. CLOSING THOUGHT The entire supply chain must welcome the recent declaration made by the European Union to establish a pan European Data Governance Act and put

further measures in place to ensure FRT is deployed and utilised in an ethical way. It is our hope that this legislation will provide much needed statutory leadership in the establishment of clear rules and guidance by which the use of technologies such as FRT can be more confidently designed, produced and operated in a manner which maintains trust in safer societies. This will allow overstretched and under-resourced law enforcement agencies to fight terrorism and other serious crime without one hand tied behind their backs. L

Tony Porter, former Surveillance Camera Commissioner, is the Chief Privacy Officer at Corsight AI – a leading Facial Recognition Solutions provider with unparalleled speed, accuracy and privacy protection. Tony works across Corsight’s senior team to assist in further developing FRT to achieve best practice, legal compliance and to be best in class.

FURTHER INFORMATION

www.corsight.ai

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

47


ONLINE EXTREMISM

48

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47


ONLINE EXTREMISM

ONLINE COMMUNICATIONS, REAL LIFE CONSEQUENCES T

he advent of social media has been a boon for global terror. Terrorist groups use social media in myriad ways, from fundraising, radicalisation, and recruitment, to issuing threats, inciting violence, and planning attacks. Indeed, extremists’ rapid adoption of major tech platforms has been critical to the organisation, expansion, and success of terrorist networks. The results, as we all know, have been devastating. In 2019, far-right gunmen in Christchurch, New Zealand and El Paso, Texas killed 74 people between them. Both had been radicalised in online extremist echo-chambers where their attacks were subsequently celebrated by others. While the global pandemic provided scant opportunity for atrocities on this scale in the years that followed, terrorism officials across Europe and America have repeatedly warned that they are likely to resume as society begins to reopen.

LEGISLATIVE PROGRESS In the face of this coming crisis, there is at least some positive news to report. The first half of 2021 has been an historically busy period for online counterterrorism legislation. In May, the UK Government unveiled the first draft of its Online Safety Bill, a landmark item of legislation that will allow the Office of Communications to fine major platforms up to £18 million for failing to remove harmful content. Not to be outdone, the French government recently adopted a new counterterrorism and intelligence bill allowing for greater surveillance of extremist online networks through the monitoring of algorithms, while the German parliament has approved an amendment strengthening the country’s Network Enforcement Act (NetzDG) by giving researchers regulated access to social media data. At a continental level, April saw the longawaited adoption of the EU’s Regulation on E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

49


ONLINE EXTREMISM

 the Dissemination of Terrorist Content Online (TCO), a sweeping package of laws that will require online platforms to remove content deemed terrorist in nature, within one hour of notification. The TCO will work in tandem with the upcoming Digital Services Act (DSA) to protect citizens from online hate speech and extremist propaganda. Across the Atlantic, the US Justice Department has taken a similarly positive step by proposing to roll back tech companies’ legal protections under Section 230 of the Communications Decency Act, thus allowing platforms to be held legally accountable for negligence. BIG TECH’S OBSCURANTISM With the people, the politicians and the experts all on the same page when it comes to rooting out extremists online, only one group remains as obdurate as ever. For years, Big Tech and its lobbyists have relentlessly sought to obscure the conversation around online extremism. To this day, they continue to perpetuate groundless claims meant to shift the burden of responsibility for promoting extremist and terrorist content to anyone but themselves.

50

For example, tech companies routinely claim that mainstream sites have improved their content detection and removal capabilities to the point where most extremist activity takes place on smaller platforms. This is demonstrably untrue. Far from big tech platforms leading the way in content moderation, a study of media responsibility published in February of this year found that Facebook, Twitter and YouTube are being significantly outpaced by smaller platforms in their efforts to eliminate harmful posts. Recently, Facebook has been forced to acknowledge that its Groups feature is plagued by ‘enthusiastic calls for violence every day’ and is now being overhauled, while ISIS continues to elude the site’s detection simply by superimposing Netflix logos on top of its propaganda videos. YouTube, meanwhile has refused to take down content from the Rise Above Movement (RAM), a violent white supremacist group. RAM has also used Instagram to promote a clothing line. When pressed with these facts, tech lobbyists have sought to justify industry complacency by asserting that content removal itself might radicalise users. This

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

absurd excuse disingenuously conflates a user’s feelings of inconvenience with the complex psychological process of extremist radicalisation. The flimsiness of the excuse is also exposed every time a new PR crisis forces them to make lurching overreaches in their content moderation, to compensate for their failure to attack the problem in a systemic, proactive fashion. As we move into the second half of the year, Big Tech can have no more excuses for failing to root out the extremists they have so long played host to. A PROGRAM FOR ACTION After years of negligence, tech companies have finally been forced into action around online extremism. Under the new legislative regimes we are seeing emerge, major social media platforms will be made to do more in the fight against extremism whether they like it or not. Nonetheless, Big Tech still has a lot of power. It is they who hold the technical expertise regarding how best to alter and reform their own internal algorithms and content surveillance systems. If they choose to continue battling legislators tooth


ONLINE EXTREMISM

and nail, doing the minimum possible to satisfy their legal obligations while fundamentally disregarding the spirit of the law, a lot of innocent lives could yet be lost in future terror attacks. With that in mind, there are a number of best practices that Big Tech must adopt, whether legally obliged to or not, if they want to get serious about cleaning up their act. Firstly, it should be clear by now that automated monitoring tools alone are not up to the job of policing major platforms. Human researchers and content moderators must be included in the decision-making process and be on the lookout for emerging trends. Technology companies should ensure that these departments are fully staffed, and appropriately prepare, train, and educate their human reviewers. Secondly, platforms must be proactive in content monitoring. Many social media sites primarily review and remove content that has been reported to them. Instead, given the vast financial resources these companies have at their disposal, each should spearhead internal efforts to find terrorist content and remove it without relying on the public, or even legislators,

THE ADVENT OF SOCIAL MEDIA HAS BEEN A BOON FOR GLOBAL TERROR. TERRORIST GROUPS USE SOCIAL MEDIA IN MYRIAD WAYS, FROM FUNDRAISING, RADICALISATION, AND RECRUITMENT, TO ISSUING THREATS, INCITING VIOLENCE, AND PLANNING ATTACKS to police the platform for them. Thirdly, while removing content quickly from Internet and social media sites is clearly an important component of any effort to restrict the dissemination of terrorist propaganda, ‘time online’ should not be the only metric used to gauge tech’s progress in combating terrorist propaganda. CEP has found that in many cases, extremist videos removed within two hours still received dozens and, in some cases, hundreds of views. If big tech platforms are willing to cooperate with legislators and work within the new legal regimes that have been established to regulate them, the decade to come may yet see them partially restore the reputations they have so badly damaged through their recalcitrance to date. L

Written by David Ibsen, executive director of the Counter Extremism Project (CEP). CEP is a not-for-profit, non-partisan, international policy organisation formed to combat the growing threat from extremist ideologies. Led by a renowned group of former world leaders and diplomats it combats extremism by pressuring financial and material support networks; countering the narrative of extremists and their online recruitment; and advocating for smart laws, policies, and regulations.

FURTHER INFORMATION

www.counterextremism.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

51


PEGASUS

WHY IS PEGASUS GRABBING THE HEADLINES NOW?

T

he Western liberal press has been saturated with stories about Pegasus spyware. Following investigations by Forbidden Stories and human rights group Amnesty International it has emerged that this weapon’s grade spy technology may have been snooping on 10 Prime Ministers, three Presidents and a King, not to mention business executives, human rights activists, politicians and nearly 200 journalists. French President Emmanuel Macron and Angela Merkel the German Chancellor both appear to have been targets. The software is made by Israeli company NSO which is being very bullish about the whole affair, has denied any responsibility and won’t release the names of their clients. On their website NSO say they ‘create technology that helps government agencies prevent and investigate terrorism and crime to save thousands of lives around the globe’. They also claim all customers are rigorously vetted.

52

There’s no mistaking the cleverness of this technology. No longer does it require some luckless employee to click on a phishing link that downloads malware on to your phone or computer. Shaun Ormerod, IT infrastructure analyst, says: ‘Pegasus lets the spyware be installed without the user’s knowledge and once installed it can harvest all the device’s data: contacts, call logs, browsing history, the works. It then reroutes most data through a proxy server so it can be tracked in real time’. AUTHORITARIAN REGIMES The recent revelations show many far right, authoritarian regimes use Pegasus enabling them to target individuals they see as hostile. One example concerns the death of Saudi journalist Jamal Khashoggi who was murdered in October 2018 while visiting the Saudi consulate in Istanbul. The BBC says the spyware was installed on his fiancée’s phone after his murder, and that his wife’s phone was hacked between September 2017 and April 2018.

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

In 2017 the Mexican journalist Cecilio Pineda Birto was shot dead. According to The Guardian newspaper Pineda had received a string of anonymous death threats. The newspaper says: ‘his mobile phone number was selected as a possible target for surveillance by a Mexican client of the spyware company NSO Group’. WATCHDOG OF DEMOCRACY All of which is alarming to those who believe in the right to privacy, the freedom of the press and see it as a watchdog of democracy. What it doesn’t explain is why this is a big story now. Anyone with

TO ISRAELIS, THEIR INTEL SUCCESSES DEMONSTRATE THEY ARE ON THE RIGHT SIDE OF HISTORY IN THEIR FIGHT AGAINST TERRORISM


PEGASUS access to the internet who engages in minimal research will discover that these stories have been in the public domain for more than two years. Why the fuss now? Here’s the opening paragraph to an MPN News story from 7 November 2018: ‘Whistleblower Edward Snowden told an Israeli audience on Tuesday that surveillance software designed by an Israeli company had been used to target groups of journalists in Mexico as well as Saudi journalist Jamal Khashoggi who was murdered last month in the Saudi consulate in Istanbul’. At the same time Snowdon is quoted in The Jerusalem Post saying that NSO was ‘selling a digital burglary tool’. Immediately, NSO hit back: ‘Edward Snowden found a refuge and warm welcome in Russia from where he has chosen to deal with issues like the rights of citizens and democracy and to slander Israeli technology companies without having any knowledgeable basis [about them] or familiarity with their operations.’ Any journalist will tell you that certain stories have their moment. The recent allegations about the British actor, Noel Clarke, had been swirling for some time but hadn’t warranted much attention. This all changed when the actor was presented with the Outstanding British Contribution to Cinema award by BAFTA. The press then saw him as fair game. Following the accusations of sexual misconduct BAFTA suspended his award. Stories like this have spiked in the film and television industry following the revelations about Harvey Weinstein and the Me Too movement. But that still doesn’t explain why Pegasus is such a big story now, though of course the revelations about the French President and German Chancellor being targets have helped keep it in the news cycle. NEW ADMINISTRATIONS What has changed is that there are new administrations in both the US and Israel. Donald Trump and Benjamin Netanyahu were singing from the same song sheet. The Biden administration is of a different order and while it is unlikely to want to rock the boat with Israel it is possible these revelations are being used as some form of leverage in a foreign policy negotiation. The Israeli state is closely linked with NSO and though there have been murmurs that the government will look at the revelations, the idea they will cut NSO loose is fanciful. To Israelis, their intel successes demonstrate their country is on the right side of history in their fight against terrorism. Most Israelis take pride in their technology industries which symbolise ‘Jewish exceptionalism’. As Prime Minister Netanyahu said in 2018 when it comes to hi-tech Israel ‘punches above its weight’ and in doing so makes a great deal of money for the country. Hi-tech innovation supports the nation. This may explain why the Pegasus story has cut little ice with the Israeli

NSO SAY THEY ‘CREATE TECHNOLOGY THAT HELPS GOVERNMENT AGENCIES PREVENT AND INVESTIGATE TERRORISM AND CRIME TO SAVE THOUSANDS OF LIVES AROUND THE GLOBE’ public. In a piece by political strategist, Dahlia Scheindlin, she points out the day after the Pegasus story broke with its tales of gruesome murders and political espionage a far bigger story blew it out of the headlines. This involved the decision on the part of Ben and Jerry’s to stop selling its ice cream in the ‘occupied Palestinian territories’. As Dahlia says: ‘By midweek one had to squint to find NSO in the Israeli media, as the ice cream incident was dominating headlines.’ WHY ARE WE SURPRISED? Of course, some will wonder why there is such surprise at this invasion of privacy. Many of us live at least part of our lives online and willingly share personal details. Journalist Yael Lavie who lives and works in Tel Aviv says: ‘Many of the Pegasus revelations are horrifying, but if people are surprised and shocked, they are frankly naïve.’ She goes on: ‘Privacy is dead. I’ve been under the assumption for at least a decade that I’m being watched and filmed’. She says if she really wants to protect a source, she meets them in person. She also thinks there is a fine line between Israeli patriotism and censorship. CRISIS MANAGEMENT Looking at this story from a crisis management perspective raises some interesting issues. When an organisation is involved in a crisis, and few would dispute that it is far from smooth sailing for NSO right now, the advice usually proffered is to be as open and even handed as possible. Firms are advised to step forward and not hunker down. This being the best way to mitigate the problem. This received wisdom has been entirely dispensed with by NSO. When attacked they fight back in the strongest possible terms. ‘The report by Forbidden Stories is full of wrong assumptions and uncorroborated theories that raise serious doubts about the reliability and interests of the sources. It seems like the ‘unidentified sources’ have supplied information that has no factual basis and are far from reality. After checking their claims, we firmly deny the false allegations made in their report. Their sources have supplied them with information which has no factual basis, as evident by the lack of supporting documentation for many of their claims. In fact, these allegations are so outrageous and far from reality, that NSO is considering a defamation lawsuit.’ They make it very clear they see themselves as the good guys: ‘We

would like to emphasise that NSO sells it technologies solely to law enforcement and intelligence agencies of vetted governments for the sole purpose of saving lives through preventing crime and terror acts. NSO does not operate the system and has no visibility to the data.’ The last sentence seems at odds with their central message saying as it does that even if people do misuse their technology, it’s not their fault as they just make the stuff. In their latest press statement, they have taken this forthright approach to crisis management one step further. Under their headline ‘Enough is enough’ they say: ‘NSO is announcing it will no longer be responding to media inquiries on this matter and it will not play along with the vicious and slanderous campaign’. RISKY STRATEGY In most other parts of the Western world this would be a risky strategy, but in the closed, combative world of Israel they are probably safe. As mentioned NSO is closely linked to the Israeli state and the government is highly unlikely to cause them any undue harm. In Israel journalists typically practise self-censorship and are reluctant to dig too deep. Don’t forget that no Israeli journalist will report that the country has nuclear weapons and has done so for more than fifty years. NSO can expect an easy ride. The only actor that could cause NSO problems is the United States but given the closeness of relations between the two countries that is also an unlikely prospect. So, despite all the noise and frankly shocking headlines generated by the Pegasus revelations this story looks set to wither on the vine. L

Written by Jim Preen, Crisis Management Director at YUDU Sentinel. Jim designs and delivers crisis simulation exercises and is responsible for the company’s written material. Formerly a journalist, he worked at ABC News (US) where he covered the Gulf War and the Bosnian conflict. He won two Emmys while working at ABC. Jim would like to thank Yael Lavie, journalist and lecturer in media ethics, for her extensive help on this piece.

FURTHER INFORMATION

www.yudu.com/sentinel

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

53


Register now PREVENT • RESPOND • RECOVER

14 -16 September 2021 ExCeL London

COUNTERING TOMORROW’S THREATS, TODAY Counter Terror Expo (CTX) unites professionals from industry, infrastructure, government and policing to explore counter-terrorism and other complex security operations. The event facilitates the development of new ideas and technologies to combat the latest threats facing the UK and other regions. Join us in ExCeL London to re-unite with the counter-terror community and discover the latest developments and technology solutions in security.

Visit ctexpo.co.uk/register Scan for more info:

Co-located events:

FORENSICS

EUROPE EXPO 14 -16 September 2021 ExCeL London

Organised by:


COUNTER TERROR EXPO

CTX: COUNTERING TOMORROW’S THREATS, TODAY

C

ounter Terror Expo (CTX) is the UK’s leading networking event for security professionals from industry, infrastructure, government and policing. The 2021 event returns to the London ExCel Centre from 14-16 September, when it will once again bring together key industry stakeholders to discover new ideas and technology with the goal of improving security and aiding in the fight against terrorism. Co-located with Forensics Europe Expo (FEE) and set to take place for the first time alongside DSEI 2021, CTX brings together the world of security, preparedness, resilience and response under one roof. The themes of CTX 2021 align three major focuses for counter-terror policy, operations and technological innovation, with seminar sessions to take place over the three-day event.

Speakers are selected from across industry, infrastructure, government and policing bodies, with the aim of exploring counterterrorism and other complex security operations to combat the latest threats facing the UK within the wider, global context. SPEAKERS’ CORNER Confirmed speakers for this year’s event include Bert Appleton, who leads the CounterExplosive Ordnance Defence Engagement (CEDE) Office in the UK Ministry of Defence; Lt Col Claire Park MBE RAMC, who is a Consultant in Prehospital Care with London HEMS and in Anaesthesia, Critical Care and Trauma at Kings College Hospital; and Will Baldet, who has worked in counter-terrorism for over thirteen years and has extensive experience of both policy and policing within E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

55


ADVERTISEMENT FEATURE

E

As terrorists evolve their propaganda strategies, AI can help counter-terror agencies stay one step ahead Dealing with terrorist propaganda online means dealing with a threat that’s constantly evolving. To avoid content filters, terrorist groups are constantly trying new techniques, exploring new platforms and reaching new corners of the internet. Daesh supporters, for example, often reserve social media accounts for new releases. These accounts look innocuous at first, never posting content in support of the group - until the crucial moment arrives. The account then immediately begins sharing as many links as possible before they are suspended to boost the reach of pro-Daesh content and hashtags on those platforms. Major companies like Google, Facebook and Twitter have invested heavily in automated tools that detect and remove this kind of content, alongside moderators trained to remove harmful and illegal material. Terrorist propaganda poses a challenge for them, but not an overwhelming one. But terrorist content is by no means confined to the major social networks. To ensure the longevity of their message, terrorist groups upload releases to multiple platforms - many of them very obscure video streaming sites or text pasting sites - so that, if one is removed, another link will always remain live for their supporters.

faculty.ai

Many of these platforms are not large enough to have a moderation team. Some are one-person start ups. Without support, these companies have very little hope of quickly and efficiently finding harmful content. This is where machine learning can play an important role. Faculty has developed AI tooling that is able to automatically detect terrorist propaganda videos, imagery, audio and text with high levels of precision. This technology, which won CTX’s IT in Counter Terrorism Award in 2019, is now being operationally deployed to support analysts to spot a range of signals in terrorist media and extract intelligence. Staffed by a team of counter terror specialists and AI experts, Faculty’s CT team is built to help agencies change the face of counter terrorism with machine learning. We help agencies tackle terrorist content and behaviours on larger scales, with greater accuracy, and over the long term. If you’d like to find out more about the work described here, visit our website. Want to discuss your own challenges in the sector? We’ll be exhibiting at CTX from 14-16th September. Email us on workwithus@faculty.ai to set up a meeting.

facultyai

faculty_ai


COUNTER TERROR EXPO

 the Prevent strand of the UK’s counter-terrorism strategy, CONTEST. Day one of the conference will focus on ‘Understanding the Threat’, where speakers will offer a comprehensive overview of the threat facing the sector when considering requirements for defeating terrorism. The threat picture is everchanging and terrorist organisations continue to demonstrate adaptability and resourcefulness, in many cases altering their attack methodologies and use of available technology to outmanoeuvre and defeat the efforts of security services. The agenda for day one will see speakers provide a strategic overview of the threat, attack methodologies and tactics, and improvised threats and technologies. Day two will consider future terrorist attacks and subsequent mass casualty incidents, which are an inevitable reality that must be faced and prepared for. The ability of emergency services to launch a swift and coordinated response is instrumental in mitigating loss of life and damage to infrastructure. Subjects covered within the day two agenda will include emergency preparedness, resilience and response, incident command and interoperability, and the medical response to terrorism. On day three, the focus will shift to how the counter-terror sector can introduce a robust set of protective security measures, which remain key to deterring and defeating terrorist attacks. Environments such as mass gatherings, transport networks and busy public spaces represent attractive targets for terrorist organisations and must be secured accordingly. Speakers will look at a strategic overview of the threat, and discuss attack methodologies and tactics, including improvised threats and technologies.

THE THEMES OF CTX 2021 ALIGN THREE MAJOR FOCUSES FOR COUNTER-TERROR POLICY, OPERATIONS AND TECHNOLOGICAL INNOVATION, WITH SEMINAR SESSIONS TO TAKE PLACE OVER THE THREE-DAY EVENT Additionally, a number of show floor seminars will take place alongside the main conference, in the exhibition area or breakout rooms. Available to all CTX visitors and exhibitors at no additional cost, the agenda will be organised around three core pillars: Prevent, Respond, Recover. The full programme, which will span all three live event days, is now available on the website.

EXHIBITOR HIGHLIGHTS On the exhibition floor, visitors will gain insight into the latest technologies and products developed for the law enforcement, government and private counter-terror sectors. Organisations from across the counter-terror spectrum will present their latest technology solutions, with exhibitors lined up to attend already including, among E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

57


Polimaster is the Team of 200+ professionals aimed to make the world safer! Our main line of business is designing and manufacturing professional equipment for radiation detection, monitoring and control. The strong technical basis combined with cutting-edge technologies turn into unique technical solutions and worldclass products. Everyday thousands of industry professionals use our instruments to protect the environment, individuals and whole nations from the harmful effects of radiation. Polimaster Today • 6 companies in Belarus, Lithuania, Austria, Japan and the USA • Wide distribution network all over the world • Instruments are sold in more than 90 countries • A network of service centers

E

Phone: +370 (5) 210 23 23 Email: info@polimaster.eu Polimaster Europe, UAB, Ezero str., 4, Didziasalio k. Nemezio sen. LT-13264 Vilnius, Lithuania


COUNTER TERROR EXPO  others, Robin Radar, Echodyne, Mas Zegrange, Teledyne, The Security Institute, Logos Imaging, and 3DX-Ray. Drone detection experts Robin Radar Systems will highlight work being done to support security and police in confronting increased numbers of smuggling attempts from ‘drug mule drones’ since the coronavirus pandemic began. According to the company, incidents of drone involvement in drug drops at prisons have risen drastically in the news since the beginning of 2020. Authorities have been caught off guard by the spike in recent incidents, not only due to a depleted workforce, but because it’s a particularly difficult threat to tackle, with drones able to soar above the sight of security cameras and scanners, and fly too high to trigger motion detection systems. While this threat is rapidly evolving, it is not new, and the company will present its counter-drone solutions on stand CT840 at CTX 2021, as it looks to tackle the challenge head-on. Siete Hamminga, CEO of Robin said: “Detecting a drone in airspace isn’t an easy task, especially as they become even more evasive to detection; smaller, faster and able to fly further for longer. Only a few technologies are proficient in

DAY ONE OF THE CONFERENCE WILL FOCUS ON ‘UNDERSTANDING THE THREAT’, WHERE SPEAKERS WILL OFFER A COMPREHENSIVE OVERVIEW OF THE THREAT FACING THE SECTOR WHEN CONSIDERING REQUIREMENTS FOR DEFEATING TERRORISM detecting active drones, and one of those technologies is purpose-built radar. “Other methods include radio frequency, acoustic sensors and optical sensors. Most security authorities opt for a combination of these technologies to achieve optimum insight and the ability to neutralise the threat, as well as detect it. But for a prison, simply detecting a drone and tracking its movements is an opportunity for intel, establishing sources of smuggling within the prison and holding parties accountable. It’s a chance to gather insight and ultimately eliminate the root of problem; which is not criminal drones, but criminals operating drones.” A new technology from 3DX-RAY aims to enhance secure access to buildings such as government offices, embassies and corporate headquarters.

AXIS™-CXi is a cabinet based x-ray system for screening mail, parcels and small baggage for potentially harmful items and contraband. It is a mobile unit so can be relocated easily within buildings for applications including building entrances, mail rooms, reception areas, hotel lobbies, goods in, executive mail screening, loss prevention and contraband detection, either as part of standard security processes or for deployment during times of raised threat levels. The AXIS™-CXi provides colour differentiated images to enable operators to determine the shape and the nature of the materials being scanned. Orange shows organics, such as; explosives, chemicals and drugs, and more innocent items such as foodstuffs. Blue shows metals, such as; guns, knives, and potential IED components; E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

59


Detection and identification of radiation sources

Polimaster’s main line of business is designing and manufacturing professional equipment for radiation detection, monitoring and control. The strong technical basis, combined with cuttingedge technologies, turn into unique technical solutions and world-class products. Everyday thousands of industry professionals use the company’s instruments to protect the environment, individuals and whole nations from the harmful effects of radiation. Polimaster has six manufacturing, service and marketing companies in Belarus, Lithuania, Austria, Japan and the USA, a wide distribution network all over the world, with instruments sold in

60

more than 90 countries and a network of service centers. The product line includes: Personal Dosimeters, Personal Radiation Detectors, Hand-Held Radiation Monitors, Radionuclide Identifiers, Radiation Portal Monitors, Mobile Detection Systems, Contraband Detector, Chemical Warfare Agent Detector, Radiation Monitoring System and Calibration Equipment. Users include Customs and Border control services, police, security agencies, military, first responders and firefighters, nuclear power plants, transport/ logistics companies and health care providers. FURTHER INFORMATION info@polimaster.eu www.polimaster.eu

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

Using the power of AI to solve the most pressing problems

Faculty believes that AI has the power to change everything - including solving the company’s customers’ most important problems. Faculty is Europe’s leading applied AI firm, working with governments, law enforcement teams and intelligence agencies around the world to harness the power of AI through the development of strategy and skills and building bespoke AI software that has had a transformative effect on society and national security. Faculty believes in the power of AI to save lives and has worked to achieve this through working with clients to unlock the potential for insight-led transformation. This work ranges from developing custom data

acquisition and analysis capabilities, allowing analysts to explore complex datasets for intelligence, to building bespoke digital forensics capabilities that direct users toward features of interest in imagery, audio, video and content metadata. Faculty has an in-house team of over 60 PhD-qualified data scientists and has been trusted to deliver high impact, high profile work for national security clients. A previous winner of CTX’s IT in Counter Terrorism Award, Faculty built custom models for the detection and analysis of terrorist propaganda for the Home Office. Other recent technology include developing models detecting disinformation, extremist content and hate speech. FURTHER INFORMATION faculty.ai


COUNTER TERROR EXPO

 while green shows inorganic materials, such as those used in homemade explosives. A grey scale is used for the recognition of shapes and the form of objects. This use of colour, without pseudo-colourisation, allows an operator with very little training to analyse items more accurately, quickly and easily. Another new system will be on display on the NOVO DR stand. The new NOVO Shadow 12SF system includes the 12SF Detector that weighs in at only 1kg, making it among the lightest in the world. The 12SF is extremely thin at just 15mm, and is very robust with a 75cm drop test and 100kg load proof. Its active borders are a mere 3mm from the ground and side, providing outstanding image quality and 90mm steel penetration. Specially designed for missions where minimum size and weight, including maximum speed is required, the Shadow System can be operated with an Android phone or a small Windows tablet via cable or through wireless communication. It can even work without any computer/ phone attached, utilizing a Deadman switch and is capable of saving up to 500 images on its own internal memory. The entire system fits in a small custom backpack and its operational weight with a Golden XR-150 is just 4kg, truly making the Shadow the lightest and smallest ultraportable, covert solution for portable x-ray imaging. WHY ATTEND? As the UK’s leading networking event for security professionals across industry, infrastructure, government and policing, CTX attracts attendees and exhibitors from across Europe, all of whom will have the opportunity to seek business synergies with a wider pool of stakeholders attending DSEI across the Land, Naval, Aerospace, Joint, and Security domains. Registration for the 2021 is now open, and attendees can expect to meet with specialist exhibitors to explore sector-leading services, discover innovative products from established suppliers and new market entrants, freely attend educational conference sessions on topical issues, and network with industry peers and stakeholders from across the security spectrum. Visitors will also be able to explore co-located events FEE, Europe’s leading forensics exhibition and conference with a focus on digital forensics, laboratory equipment, scene of crime and forensic analytics; and DSEI, where integration will be in the spotlight as the UK Ministry of Defence and the British Army, Royal Navy, Royal Air Force and UK Strategic Command work to develop and maintain organic integration at all levels and across all domains. L

FURTHER INFORMATION

www.ctexpo.co.uk/register

VISITORS WILL ALSO BE ABLE TO EXPLORE CO-LOCATED EVENTS FEE, EUROPE’S LEADING FORENSICS EXHIBITION AND CONFERENCE, AND DSEI, WHERE INTEGRATION WILL BE IN THE SPOTLIGHT AS THE UK MINISTRY OF DEFENCE AND THE BRITISH ARMY, ROYAL NAVY, ROYAL AIR FORCE AND UK STRATEGIC COMMAND WORK TO DEVELOP AND MAINTAIN ORGANIC INTEGRATION AT ALL LEVELS AND ACROSS ALL DOMAINS

Protecting property, buildings and landmarks from attack

Cova Security Gates celebrates over 34 years of providing specialist and bespoke design, manufacture, and installation of high quality bi-folding gates, sliding cantilevered gates, rising road blockers, static and rising bollards, car park barriers, pedestrian gates, and turnstiles from our 20,000 square foot manufacturing facility near Gatwick airport. The company’s PAS 68:2010 compliant ‘crash rated’ portfolio has been specifically developed and tested by recognised world class test houses and will provide complete protection when a 7.5 tonne

vehicle is accelerating at 30mph (48kmh), 40mph (63kmh) and 50mph (80kmh) into the products. Global clients include government buildings, police, airports, stadiums, data centres, utilities and power generation, transport sites and financial services. Cova Security Gates stays ahead of its competitors by implementing a constant regime of in-house research and development, which the organisation strongly believes provides clients with an everimproving product range. Key to the success of Cova is maintaining good and lasting relationships and communication with architects, consultants, building contractors or the end user on all projects. FURTHER INFORMATION www.covasecuritygates.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

61


LEGISLATION

THE THREE W’S OF COUNTERTERRORISM: A FRAMEWORK FOR ANALYSIS 62

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47


LEGISLATION

O

n 29 April 2021, the UK’s new Counter-Terrorism and Sentencing Act was granted Royal Assent. Provisions contained within the Bill include new stricter sentencing guidelines for those convicted of terrorism offences, an end to early release for the most serious offenders, widening the range of offences that can be linked to terrorism, and a strengthening of disruption and risk management tools for counter terrorism purposes. As the Home Secretary, Priti Patel, argued at the time: “This legislation will lengthen sentences for terrorists, improve monitoring of these dangerous offenders, and give the law enforcement agencies the powers to strengthen their ability to take action. Those who senselessly seek to damage and destroy lives need to know we will do everything possible to stop them. I will always take the strongest possible action to protect our national security.”

How, though, are we to evaluate such measures and their consequences? Academic research is surprisingly, and frustratingly, thin on issues of effectiveness in this policy domain. Critical perspectives, moreover, challenge the very criteria against which such powers should be evaluated by approaching counter terrorism policy as an example of security theatre intended either to reassure or to frighten publics. In this piece I set out the contours of an analytical framework for evaluating counterterrorism policy that helps us to: (i) Clarify the stakes in any evaluation of such powers; and, (ii) break the task of evaluation into smaller parts that may have greater or lesser significance for particular audiences. This framework – The Three W’s of Counterterrorism – proceeds via three core questions: E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

63


LEGISLATION

 ARE COUNTER TERRORISM POWERS WARRANTED? The first question to ask is whether there is – actually – a need for specific, or uprated, or proposed counter terrorism powers. In the United Kingdom, for instance, Andrew Neal has shown how the history of counterterrorism lawmaking is one characterised by rushed responses to dramatic events that repeatedly leads to unconstitutional powers with questionable value for countering terrorism. This hasty and repetitive pursuit of new powers contrasts markedly with other countries where existing powers are applied to new threats without the parliamentary theatrics to which we are here accustomed. As Shami Chakrabarti argued in her evidence to the Home Office Affairs Committee back in 2014, sometimes, in counterterrorism, less is more: ‘Talk is cheap and legislation is almost as cheap. If I were Home Secretary I might not even legislate. That’s the thing; there is always this idea that legislation will help and often it doesn’t. Sometimes, it makes things worse’. Asking whether a counter terrorism power is therefore warranted can be broken down further into three subsidiary questions: 1) What threat is being addressed, and how serious is that threat? 2) Are there already sufficient mechanisms in place to address the threat? 3) How problematic would the absence of a new power be? Answering the first of these questions will always prove difficult to analysts outside the police and intelligence services as we are dealing with a world of classified information to which many of us have limited access.

64

As Marc Sageman memorably argued: ‘we have a system of terrorism research in which intelligence analysts know everything but understand nothing, while academics understand everything but know nothing’. The question is also, importantly not only a statistical one involving calculations of probability and outcomes; all threats to security rely, to some extent, on their being interpreted thus. This is especially true of the politics of terrorism in which any labelling of a bombing, kidnapping, hostage-taking and so on as ‘terrorist’ is notoriously contestable. Answering the second and third of these questions involves evaluation of the adequacy of existing policy frameworks to deal with new threats as well as reflection on the level of risk with which we are willing to live. This brings us, then, to the likely effectiveness of a proposed measure: the second of our three W’s. WILL PROPOSED COUNTER TERRORISM POWERS WORK? There is little value in putting in place a counterterrorism mechanism doomed to failure. Few would support government efforts to do something against terrorism – simply for the sake of doing something against terrorism – if we knew that the something would be of no use. So, the second of our questions asks whether or not a particular measure will work: what are the chances of a proposed measure being successful, and how do we go about evaluating that success? A first issue here is that – perhaps counter-intuitively – the purposes of counterterrorism programmes are not entirely straightforward. Paul Wilkinson (2011), for example, argued that counter terrorism laws may serve a variety of purposes, including addressing underlying grievances, deterring would-be terrorists or their sympathisers, upgrading the tools available to law enforcement

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

officials, reassuring the public that something is being done, and expressing public revulsion toward terrorism. The banning of terrorist organisations through proscription powers, to give one example, is frequently justified on symbolic as well as strategic grounds with advocates seeing such powers as a mechanism for communicating intolerance toward terrorism as much as a tool for preventing terrorism. As James R. Clapper, the former United States Director of National Intelligence (DNI), and chief intelligence advisor to the President, argued, the listing of terrorist groups can be ‘more symbolic, more political, than substantive’. A second challenge is that assessing the efficacy of a particular measure involves a claim about cause and effect that may be difficult to substantiate. How do we know, for example, that a particular attack was abandoned because of the deterrence effect of a counter terrorism framework rather than due to unrelated reasons. Looking forward – into the future – of course, is even more difficult still with the absence of counterfactuals to aid us. All policymaking involves speculation about the future, and counterterrorism is no different here even if the stakes are so great. A third issue is that counter terrorism policies are aimed at reflexive actors – ‘terrorists’ and their sympathisers – whose ideas, motives, behaviours and targets are themselves constantly changing (although the level of innovation and creativity within terrorist organisations remains much debated). Efforts to reduce the risk of an attack in a specific time or place, for example, may result in the selection of an alternative target, as happened in response to target hardening efforts in response to aircraft hijackings in the 1970s. So, taking these together, questions to be considered within the second of our three W’s include: 1) Can we identify the purpose(s) of a specific counterterrorism power? 2) Can we predict the future operation of a counterterrorism power? 3) How confident can we be in linking cause and effect here, such that we can link actions and their outcomes? 4) How will a particular counterterrorism power impact on its targets, and their behaviour? ARE COUNTER TERRORISM POWERS WORTH THE CONSEQUENCES? The final set of considerations refers to the consequences – intended and otherwise – of counterterrorism efforts and activities. Uppermost here might be the costs in manpower, money, and time of an attempt to deter or respond


LEGISLATION to a terrorist threat. By some estimates, the post-9/11 war on terrorism has now cost an eye-watering $6.4 trillion, to say nothing of the cost in human life in Iraq, Afghanistan and beyond. Such costs may be less pronounced in the context of less exceptional counterterrorism tools – such as the Bill with which we began our discussion – but they exist nonetheless and may not always be foreseen in advance. Work on the targeting of minority and especially ‘suspect’ communities in the post-9/11 climate, for instance, has demonstrated the widespread incursion of contemporary counter terrorism frameworks upon civil liberties and other fundamentals of citizenship. And this is to say nothing of the opportunity costs of counterterrorism efforts: parliamentary time spent debating a new counterterrorism bill which could be put to any number of alternative uses, of course. How we assess such costs is therefore a matter, in part, of economic calculation. As John Mueller (2006: 1) argues, overreaction to the threat of terrorism has ‘led to wasteful, even self-parodic expenditures and policy overreactions, ones that not only very often do more harm and cost more money than anything the terrorists have accomplished, but play into their hands’. It is also, however, a matter of ethical and political decision: not least: Are we willing to trade-off or ‘balance’ liberties for security if we think this will work? Are we willing to trade the liberties of some for the security of others? As a fundamentally political question, our third W of Counterterrorism again evades any straightforward or simplistic answer. As before, though, we may find it helpful to break the question down further to the following constituents:

WHAT THREAT IS BEING ADDRESSED, AND HOW SERIOUS IS THAT THREAT? ARE THERE ALREADY SUFFICIENT MECHANISMS IN PLACE TO ADDRESS THE THREAT? AND, HOW PROBLEMATIC WOULD THE ABSENCE OF A NEW POWER BE?

4) Have we considered, and are we willing to justify potentially unintended consequences – for example, the impact of counterterrorism policies upon social, cultural and other relations between groups, communities and publics within and beyond a particular territory. These Three W’s of Counterterrorism do not exhaust the kinds of question we might ask when evaluating the counter terrorist activities of executives, legislators, police or other security professionals. What they do, however, offer, is a broad framework for evaluating proposed or actual counter terrorism policies, and for thinking through the questions they raise. L

This is an updated version of an earlier piece published on UEA’s Easminster site, written by Lee Jarvis, Professor of International Politics at the University of East Anglia, UK. Lee’s work focuses on the construction and communication of security threats, and the implications thereof for social and political life. Twitter: @LeeJarvisPols. Email: l.jarvis@uea.ac.uk

FURTHER INFORMATION

www.ueapolitics.org

1) Is a proposed counterterrorism mechanism worth the costs in time, treasure, and other resources? 2) Is a proposed measure worth the opportunity costs, or could these resources be put to better or more efficient use? 3) Are we willing to justify the intended consequences of such a measure, especially if there are impacts upon civil liberties, citizenship, and so forth?

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

65


ADVERTISEMENT FEATURE

West Sussex FRS adopts specialised fireground comms solution

Written by Richard Russell, Solution Architect, Tait Communications

Critical Comms vendors Tait and Affini took a holistic view of West Sussex FRS individual firefighters’ needs when designing their new communications solution. Small details like readily identifiable Intrinsically Safe devices and accessories work together with Edge Computing solutions to keep officers safe and connected batteries, and user experience across the fireground – keep it simple!

When the fireground radio equipment of West Sussex Fire and Rescue Service (West Sussex FRS) had to be replaced, they wanted to take advantage of technological developments to improve the safety of their firefighters and the efficiency of their operations. Moreover, they wished to invest in a digital communications solution that would provide interoperability with adjacent Fire Rescue Services, and support their future choice of Breathing Apparatus (BA). After a careful selection process, West Sussex FRS found that a solution from Tait Communications and partner Affini Technology Limited – a pre-qualified supplier to the Crown Commercial Services and supplier of the Tait Fireground Solution – best suited their needs. Taking the entire fireground into account Tait and Affini worked together with West Sussex FRS to gain a holistic perspective of the entire fireground, carefully considering each operational task, including BA Wearers, Entry Control, Officers, and Incident Command Unit vehicles. This allowed Tait and Affini to develop a specialised solution that addresses the specific challenges faced by each individual on the fireground. One key requirement was to simplify and standardise the radios,

Safety, efficiency, and interoperability The solution was delivered to a very high standard by Affini. They supplied standard, non-ATEX radios for Incident Command Officers and Entry Control Officers (ECOs) and Intrinsically Safe (IS) ATEX-rated radios and accessories for BA Wearers to address both safety and operational requirements. The radios are colour-coded so users can be confident they have the right device for their role: Blue IS radios and accessories for BA Wearers and red ones for Command Officers and ECOs. The digital radios comply with the UK FRS National Operational Guidance configuration and are backward compatible with analogue radios used by neighbouring Fire Rescue Services to ensure essential interoperability. The right equipment for every firefighter To provide BA wearers with increased protection in hazardous environments, high-powered IS radios were chosen to deliver enhanced range and clear, reliable audio, with glove-friendly IS Remote Speaker Microphones (RSM) providing easy access to comms in low visibility. IS radios approved for use in explosive atmospheres support staff working in environments containing volatile gases. Specialised Ballistic Headsets were provided to Marauding Terror Attack (MTA) officers, to help protect their

hearing when Firearms are discharged. Entry Control received high-powered red non-ATEX radios and large glove-friendly red RSMs with a lightweight, noisecancelling headset, significantly improving communications with Breathing Apparatus wearers. Officers also use the red nonATEX radios with Bluetooth® RSMs and earpieces for discreet communications. Both BA Wearers and Officers use the same ATEX battery, simplifying the battery choice on the fireground, which is a huge benefit to firefighters. If changes need to be made to radios, all radio configurations are securely managed with the Tait EnableFleet cloud device management tool, providing complete control over the West Sussex FRS fleet of radios. Tait Unified Vehicle: Connecting the entire fireground To keep everyone on the fireground safe and connected, Incident Command Unit vehicles were equipped with fixed repeaters to extend range and coverage, while Tait Unified Vehicle, a converged mobile communications platform that integrates multiple networks, application processing, and voice recording, provides enhanced connectivity. Access to analogue and digital radio networks can connect firefighters to the control room, while LTE offers broadband data connectivity in areas beyond radio networks. Tait Unified Vehicle also offers WiFi and Bluetooth® connectivity to enable devices to connect in and around the Incident Command Unit. The on-board voice recorder app records and stores all voice communications for training or incident investigation purposes, and the application builder enables custom applications to enhance efficiency, providing West Sussex FRS with options for future digitised operations. The team at Tait are committed to creating communications solutions that help our communities’ firefighters do their jobs as effectively as possible, and get them home safely. L Learn more about Tait at booth C50 of The Emergency Services Show, NEC Birmingham, 7 - 8 September 2021.

FURTHER INFORMATION www.taitradio.com

66

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47


EMERGENCY SERVICES SHOW

Sponsored by

HOW EMERGING TECHNOLOGIES ARE TRANSFORMING COUNTER TERROR CAPABILITIES

A

s live events return to the UK, The Emergency Services Show at the NEC, Birmingham, 7-8 September 2021 will be the first opportunity for the entire UK emergency services community and its supply chain to get together. The Emergency Services Show uniquely brings together emergency responders and anyone engaged in public safety, counter-terror and civil contingency with their partners and suppliers. It is the one place where visitors can explore innovative technologies, see the latest equipment, share experiences, exchange best practice and learn from each other. The transformational power of new and emerging technologies will be the central theme of the expanded and enhanced trade show, which features over 450 exhibitors, more than 90 of which are new. Foremost among technology exhibitors are leading support organisations for the emergency services sector, including the police National Enabling Programmes (NEP), Police Digital Service, techUK, and the Home Office Emergency Services Network (ESN), which will replace the current Airwave service used by the emergency services in Great Britain (England, Wales and Scotland) and transform how they operate. Adapting to the new challenges created by Covid has heightened the demand and pressure on our emergency services. Diverse and innovative emerging technologies have been rapidly deployed in a period of unprecedented change and are the core theme of the exhibition and accompanying programme of over 80 CPDaccredited seminar sessions in five theatres.

FUTURE POLICING A new feature of the 2021 show, Future Policing Zone, is supported by an influential Advisory Council chaired by Lord Bernard Hogan-Howe, the former Commissioner of the Metropolitan Police Service. Showcasing the latest innovations available for the police sector and sponsored by Audax, the Future Policing Zone has the full backing of the Home Office, techUK, Blue Light Commercial, National Enabling Programme, Police Digital Service, The Police Federation of England and Wales and The Police Superintendents Association. In addition, the zone will feature a high level conference featuring high level and influential speakers covering topics such as embedding digital technology in frontline policing, addressing and protecting police officers from harm, case studies of multi-agency collaboration and more. THE EMERGING TECHNOLOGIES THEATRE Sponsored by MSA Safety, The Emerging Technologies Theatre will showcase the most cutting-edge technology and equipment used in operational response. In addition, it will cover how the emergency services can use data and technology more efficiently, including overcoming the organisational challenges presented by the pandemic. Key sessions includes life saving drones used for emergency services, collaboration for improved public safety outcomes and how frontline teams are working to support the testing and preparation for Emergency Services Network (ESN) sharing their experiences of the technology and the importance of being ESN -ready. E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

67


TRANSFORMING THE FUTURE OF THE EMERGENCY SERVICES

450+

EXHIBITORS

10,000+ VISITORS

NEW FOR 2021

FUTURE POLICING ZONE

9

KEY FEATURES

CO-LOCATED WITH

REGISTER FOR YOUR FREE PASS TODAY: WWW.EMERGENCYUK.COM

CPD ACCREDITED CONTENT


EMERGENCY SERVICES SHOW  THE VEHICLE INNOVATION THEATRE The Vehicle Innovation Theatre will focus on one of the fastest growing areas of innovation in the sector that includes everything from vehicles with electric, hybrid and decarbonised drivetrains, to smart and connected vehicles that serve as communications hubs and mobile incident command units. As the UK looks to reach net zero emissions by 2050, low emission vehicles are expected to grow to meet the demands. The theatre will shed light on how the emergency services sector will need to adapt its practices and operations to support a more economical and efficient way of working. THE LEARNING & DEVELOPMENT THEATRE The Learning & Development Theatre connects personal development with the overarching theme of emerging technologies to feature a series of seminars designed to help professionals enhance and upgrade their personals skills and proficiency, enhancing their careers. It will also focus on operational improvements as the emergency services have dramatically and dynamically pivoted their ways of working. Sessions not to miss include looking at the key roles and activities required before, during and after a crisis focussing on the demands of a leader of an organisation and of the Chief Communications Officer, enhancing educational experience through simulation training and policing Covid-19. OVER 450 EXHIBITING COMPANIES Technologies on display in the exhibition include connected and smart vehicles, satellite communications, GIS and mapping technologies, ruggedised mobile computers, tablets and phones, data, cloud storage, wearable tech, connectivity, UAVs/drones, hybrid and electric vehicles, virtual and augmented reality training, body-worn cameras and other video capture systems. Among more than 90 organisations exhibiting for the first time in 2021 are Linkwave Technologies, Bullitt Group, Halo Technologies and BiTEA. Other organisations showcasing counter terror equipment and services include: 5.11 Tactical UK, Ansell Healthcare, Audax, Avon Protection, Citizen Aid, Draeger, Haztec International, Interspiro, ResilienceDirect, Respirex, Terberg DTS and Will-Burt. Enabling ICT applications will also be showcased, including control room systems from new exhibitors like APD Communications and Hexagon, data management, mobile apps for emergency service and public use and the multiple technologies being used to speed and aid collaboration. The exhibition floor also continues to feature innovation from leading names in search and rescue, extrication, training, protective clothing and uniforms, medical equipment, vehicles and vehicle equipment and outsourcing. HEALTH & WELLBEING FOCUS The seminar programme in the Health & Wellbeing Theatre sponsored by MSA Safety is designed to equip front line workers with the tools and techniques needed to maximise wellbeing and drive performance. A speaker line-up of experienced professionals will share their expertise of mental wellness, health and nutrition, workforce diversity and the latest digital support platforms. The Police Federation will talk about how it is fighting for changes to current legislation on police conduct cases which currently have no time cap, and are often the cause of considerable distress to officers. Visitors can also find out how a digital workplace platform called 87% has helped tens of thousands of frontline workers to build mental fitness throughout the Covid-19 pandemic and has been used by the likes of Police Scotland. In the networking hub of the show, The Collaboration Zone, visitors can meet a range of charities, voluntary groups and NGOs which can offer practical, emotional and sometimes financial support. The newly launched Future Policing Zone will also showcase organisations such as Oscar Kilo, Police Care UK, Surfwell – Devon & Cornwall and Dorset Police, and Service Dogs UK; who are providing best practice, research and guidance to help shape the wellbeing agenda and encourage collaboration.

Sponsored by

Meanwhile people services’ experts Rego will be discussing transforming workplace culture, The Eleos Partnership will be sharing tips on reducing the impacts of stress and pressure and PSTD999 will be offering trauma response training, and expertise on psychological health and safety and the assessment and treatment of PTSD. CO-LOCATED EVENTS Free-to-attend and based again in Hall 5 and the Outside Area at the NEC, The Emergency Services Show 2021 will for the first time be co-located with the Safety & Security Event Series; The Fire Safety Event, The Health & Safety Event, The Security Event, The Facilities Event and newly launched National Cyber Security Show, creating the UK’s largest event dedicated to the protection of people, places and assets. NATIONAL CYBER SECURITY SHOW Newly launched to complement the security offering at the Safety & Security Event Series, National Cyber Security Show will help SMEs gain a better understanding of the current mitigating threats. Featuring an interactive exhibition of 50 industry leading suppliers, it will also feature a CPD accredited conference focusing on managing cyber security, how to secure your networks and connections, securing IT equipment as well as protection and recovery. HOW TO REGISTER The NEC Venue Protect programme ensures all participants in The Emergency Services Show enjoy a COVID-safe and secure visit with comprehensive social distancing measures and enhanced cleaning and sanitisation. L

FURTHER INFORMATION

www.emergencyuk.com

Providing critical comms for fire emergency and response

Tait has been providing mission critical communications for more than 50 years. The company’s clients protect communities, save lives, move citizens and power cities all over the world. Tait works with them to create, support and unify the critical communication solutions they depend on to do their jobs. The Tait Unified Solutions portfolio enables the convergence of narrow and broadband technologies, both in the vehicle and on the person. Join Tait at stand C50 where you will get the opportunity to experience Tait’s holistic solution to Fireground Communications. Learn how Fire Rescue Services like East Sussex FRS and West Sussex FRS took advantage of technological

developments to improve the safety of their firefighters and the efficiency of their operations. Learn how the extended connectivity of Tait Unified Vehicle can dramatically improve efficiency in your organisation and on the fireground by connecting everybody to everybody. Experience our concept of the Unified Fireground which connects the Incident Ground to the Control Room to ensure a proper flow of communication from the fireground back to the control room. Book your meeting with Richard Russell, Tait expert on Incident Ground Communications, below.

Visit Tait Communications at the ESS 2021, Stand C50 FURTHER INFORMATION marketing.emea@taitradio.com www.taitradio.com/ fire-emergency

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

69


EVENT SECURITY

70

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47


EVENT SECURITY

THE IMPORTANCE OF STADIUM SECURITY POST COVID-19 T

he pandemic has impacted every part of the live events and entertainment industry. Whether it’s the fans who have missed out on watching their favourite bands and teams play, or stadium managers that have lost contracts and suffered financial hardship, the consequences of the pandemic have been devastating and disruptive for the entire industry. However, with fans now slowly being able to return to stadiums and other large venues following the relaxation of some government rules in England, how do processes need to change to ensure staff and visitors are as safe as possible when using these sites? Whilst capacity will likely be reduced throughout entertainment venues at least until July to account for social distancing, is the reduced capacity a potential for the industry to overlook other serious risks to fan safety? The government has recently discussed

the launch of a Protect Duty that is tipped to impact all entertainment venues in the coming months. The counter-terrorism proposal will look at the security and readiness of public venues in the event of terror attacks and will be a key consideration for venues as they continue to welcome back spectators in the coming months. With this in mind, how can stadium managers prepare for the return to stadiums? How can security be kept high on the agenda and what can be done to minimise the risk of a terror incident in the months and years following the pandemic? ASSESS EVERY THREAT Whilst risk assessments are a continuous process, it is important to carry one out as new developments are made. With the pandemic requiring social distancing, some sites doing thermal testing and E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

71


EVENT SECURITY

 fans needing to wear masks in some spaces, these are all changes that may require a different security response. Similarly, any pre-existing anti-terror risk assessment could be out of date, and therefore, carrying out a new assessment that considers any changes to the current security landscape is imperative. This is particularly significant for the introduction of the new Protect Duty legislation that is set to be introduced towards the end of July this year. Whilst the legalities are yet to be outlined, it is anticipated that stadium managers will need updated risk assessments, with clear counter-terrorism action plans set out ahead of the roll-out. Similarly, anyone who might be affected or included by the Protect Duty legislations can also take free ACT (action counters terrorism) training that can help individuals learn to spot the signs of suspicious behaviour and understand what to do in the event of a major incident. Being as

72

prepared as possible for when the duty is introduced will be in organisers’, and visitors’, best interests. CONSIDER ANY TERROR VULNERABILITIES With the pandemic affecting the number of fans allowed in a stadium at any given time, new measures such as external queueing, staggered arrival times and a greater focus on Covid measures, mean that terror threat, whilst still considerable, may be underestimated or overlooked. Recent years have seen a clear rise in vehicles being used as weapons and according to the University of Maryland’s global terrorism tracker, 152 of the 183 hostile vehicle attacks that have occurred globally since the 1970s have happened since 2010. With many stadiums now introducing rapid testing, temperature checks and staggered arrivals, there are often long queues that will form outside of the

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

entrance and exit points and spectators can therefore become vulnerable to external threats such as vehicles. This requires a significant security consideration as large numbers of fans could be waiting outside the venue for longer periods than they would have done before the pandemic, and could become an attractive target for vehicle-based terror attacks. The good news is that carefully planned anti-terror measures, such as new temporary perimeter security solutions to protect those outside a venue, can help, ensuring that fans, staff and players are all as safe as possible, and free to enjoy the sports they love after such a long wait. REFRESH AND RETRAIN EMPLOYEES With stadiums welcoming back visitors to their sites after a long time away, staff may need refresher training sessions in security management.


EVENT SECURITY

Having training on crowd management as well as being trained in how to look out for security breaches or suspicious behaviour at a site, will always be valuable and security teams will most likely need these to account for the evolving security considerations that are also posed by recent coronavirus measures. It is also essential that a terrorist threat is never underestimated. With the number of spectators permitted into a venue being expected to be relatively low for the foreseeable future, there is the distinct possibility that the risk of terrorist activity will be dangerously underestimated. Stadium managers should do everything they can to ensure that they are as prepared as possible, should a terror event regrettably occur. As we emerge from the coronavirus lockdowns and look ahead to returning to life as normal, there is an understandable excitement to return

WITH NEW ENTRY AND EXIT PROCESSES BEING INTRODUCED, STADIUM MANAGERS SHOULD NOW BE CARRYING OUT NEW RISK ASSESSMENTS, CONSIDERING EVOLVING SECURITY THREATS AND INSTALLING MEASURES THAT ARE EFFECTIVE IN KEEPING EVERY VISITOR AND STAFF MEMBER AS SAFE AS THEY CAN BE

to entertainment venues and stadiums. Fans have long missed out on the excitement of supporting their favourite teams or entertainment acts, but making sure they continued to be protected and are as safe as possible when using the site must be a top priority. With evolving security legislation and new entry and exit processes being introduced to cater to continued coronavirus measures, stadium managers should now be carrying out new risk assessments,

considering evolving security threats and installing measures that are effective in keeping every visitor and staff member as safe as they can be. L

Written by Iain Moran, director at ATG Access, the leading innovator of road blockers, bollards and vehicle barriers.

FURTHER INFORMATION

www.atgaccess.com

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

73


CROWDED PLACES

HOW TERRORISTS GET THEIR VICTIMS WHERE THEY WANT THEM

T

errorists look for the big spectacular, they know the effects of a massive attack. This usually means loss of life and the destruction of buildings and infrastructure. Generally, their aim is to cow the general population or goad a government into action in ways they deem beneficial to their cause. Journalist Lawrence Wright was one of the first to suggest that bin Laden’s goal all along was to lure the United States into Afghanistan, which had long been called ‘The Graveyard of Empires’. If you visit the MI5 website, they itemise the many different methods of attack; many of which are wearyingly familiar. But the security service also talks about the terrorist’s ability to innovate and goes on to cite the Paris attacks which involved a complex plot deploying ‘multiple attackers and a range of weapons’. Terrorists are agile and are constantly searching for new ways to manipulate their victims to get them where they want them to inflict the greatest amount of harm. US EMBASSY ATTACK In 1998 terrorists attacked United States embassy buildings in two East African

74

cities. More than 200 people were killed when truck bombs exploded in Nairobi and Dar es Salaam. At the time I was working for ABC News and was despatched by their London bureau to go to Kenya to help cover the story. Twelve Americans died in the attacks, but the vast majority of casualties were African citizens. The explosion in Nairobi damaged the US embassy but far greater devastation was done to the nearby Ufundi Building. Thousands were injured in the attack and while covering the story we visited local hospitals where they were taken. Many of the victims had terrible facial wounds and were blinded. We soon found out why. When the terrorists drove their bomb laden truck to the embassy, they opened fire on the security guard at the gate to gain entry. They also threw a stun grenade at other guards and this small explosion was heard by those in surrounding buildings, bringing many people to the windows. Moments later the truck bomb detonated and windows within a half mile radius were shattered causing terrible injuries to people’s faces. Whether this was the assassin’s intention it’s impossible to know but

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

the small blast followed by the huge explosion had terrible consequences. For the moment at least, and I may be tempting fate here, the spectaculars seem to be in obeyance. Perhaps this can be linked to Covid and the subsequent lockdowns which has led to atomised working. Terrorists like their victims in tightly packed groups. Credit should also go to the security services who are now far better at uncovering large, sophisticated plots. However, once again, terror groups have innovated and now often rely on individuals to carry out their atrocities. LONE ACTORS In London we endured the 2005 attacks on the tube and bus networks when 52 people were killed and hundreds more were injured in explosions on three Underground trains and a bus. It happened the day after London was awarded the 2012 Olympic Games. Since them we’ve seen a string of terror attacks in the capital largely perpetrated by lone actors. In March 2017 five people were killed and many more injured by a man targeting pedestrians as he drove across Westminster Bridge. Aside from


CROWDED PLACES jumping into the Thames, there was no avenue of escape. He went on to crash into the gates of Parliament before fatally stabbing PC Keith Palmer. In June of the same year three terrorists drove a van at people walking over London Bridge before staging an attack in nearby Borough Market. Eight people were killed including the attackers who were shot dead by police. UNREPENTANT FANATIC The most recent, most egregious example, of a fanatic manipulating the system to put his intended victims in extreme jeopardy was another attack on London Bridge perpetrated by convicted terrorist Usman Khan. In 2012, Khan pleaded guilty to preparing an act of terror and was sentenced to a 16-year prison term. He was released halfway through his sentence and had been living in Stafford following his release on licence in December 2018. While in prison Khan is reported to have written a letter asking to take part in a de-radicalisation course. In the letter, obtained by ITV News, Khan wrote: “I would like to do such a course so I can prove to the authorities, my family and soicity [sic] in general that I don’t carry the views I had before my arrest and also I can prove that at the time I was immature, and now I am much more mature and want to live my life as a good Muslim and also a good citizen of Britain.” Unfortunately, he was taken at his word. In November he travelled, unescorted, by train, to attend a prisoner rehabilitation initiative run by Cambridge University at Fishmongers Hall on London Bridge. He gamed the system which allowed him to go on a deadly rampage among an entirely unprotected group of people who were all gathered to help benefit his life and others like him. He repaid that trust by taping knives to his wrists and killing two young people: Saskia Jones and Jack Merritt. Members of the public subdued Khan with a fire extinguisher and an ornamental Narwal tusk before police, fearing he was about to detonate a suicide vest, shot him dead. The vest was a fake. To combat these opportunist attacks the security services, and the public must be on their guard to respond to new attack vectors. Anyone walking over the bridges of central London will see that barriers are now in place stop attackers driving at pedestrians. Similarly, we are constantly being reminded of the See it, Say it, Sorted mantra which is designed to keep the public on their guard. Authorities often struggle to tread that fine line between keeping the public safe and aware without unnecessarily alarming them.

TERRORISTS ARE AGILE AND ARE CONSTANTLY SEARCHING FOR NEW WAYS TO MANIPULATE THEIR VICTIMS TO GET THEM WHERE THEY WANT THEM TO INFLICT THE GREATEST AMOUNT OF HARM TECH INNOVATION From a terrorist’s point of view these attacks have often proved successful perhaps because of their low-tech nature. Security services inevitably find it difficult to track individuals acting alone brandishing knives or driving cars. Where terrorists are anything but low-tech is when it comes to their use of social media. An article on the Lawfare website points out that at its peak, ‘Islamic State operated more than 46,000 Twitter accounts and could push content to millions of people’. Largely, because of their ability to manipulate social media, they were able to draw more than 40,000 foreign fighters from 120 different countries to their theatre of operations in Iraq and Syria. The group also used social media to plan and coordinate terror attacks. Discussions could become virtual and removed the need for face-to-face meetings between those planning an attack and the operative who was to carry it out. Their approach coincided with a huge rise in the numbers of people using social media. In 2010 Facebook had roughly 600 million monthly users. By 2014 that number stood at 1.4 billion. What was once niche had become mainstream. WhatsApp and other similar applications offering end-toend encryption played into their hands and allowed inaccessible communications between jihadists. On 24 July 2016 Mohammed Daleel detonated a suicide bomb at a German music festival. The plot was kept from the authorities and the bomber was the only fatality though fifteen others were injured. The Lawfare website quotes a discussion between the bomber and his handler that took place over social media just prior to the attack. It’s quite clear that Daleel was very fearful, and the attack might not have happened at all had the handler not been online.

Daleel: [The music festival] will be over soon, and there are checks at the entrance. Handler: Look for a suitable place and try to disappear into the crowd. Break through police cordons, run, and do it. Daleel: Pray for me. You do not know what is happening with me right now. Handler: Forget the festival and go over to the restaurant. Hey man, what is going on with you? Even if just two people were killed, I would do it. Trust in God and walk straight up to the restaurant.

Social media companies have faced pressure to remove jihadi and other extremist material but as this chilling dialogue indicates apps can have many uses. So how are we best placed to avoid putting ourselves in danger? How can we escape being put where terrorists want us? VULNERABLE MUSTER POINTS Just before the pandemic and the subsequent lockdowns forced us to work from home, I was at a meeting at the offices of a client in one of the newer skyscrapers in the City of London. The fire alarms sounded and although it was clearly a drill, all those inside had to quit the building and assemble at a muster point nearby. The building boasts more than thirty floors, so it took more than an hour to clear the site as we weren’t allowed to use the lifts and had to walk down the emergency staircases. Everyone was told that the muster point was Leadenhall Market, which is where we all went to be accounted for. Perhaps it’s my over fertile imagination but I’m sure I wasn’t the only one thinking what a vulnerable group we all were standing in large groups waiting to have our names checked. Nothing happened but as offices start to be repopulated and work moves away from home perhaps it’s this kind of drill that needs looking at. Was it a good and effective exercise or could it have played directly into the hands of terrorists? Terrorists are agile, innovative, and as has been said many times have only to be lucky once whereas security services are charged with keeping the public safe at all times. We may have been lulled into a false sense of security during the pandemic with its concurrent drop in terror activity. Unfortunately, we can be quietly confident the threat has not gone away. L

Written by Jim Preen, YUDU Sentinel Crisis Management director. Formerly a journalist, he worked at ABC News (US) where he covered the Gulf War and the Bosnian conflict. He won two Emmys while working at ABC.

FURTHER INFORMATION

www.yudu.com/sentinel

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

75


DSEI

WHAT TO EXPECT FROM DSEI 2021 R

eturning to ExCel London from 14-17 September 2021, DSEI encompasses the entire defence and security audience, including Air, Land, Naval, Security and Joint, to reflect the complex nature of modern warfare and security operations. This includes an increased emphasis on Space and Cyber. After a lengthy global shutdown of the exhibition sector during the Covid-19 pandemic, feedback from across the defence and security industry has shown a strong appetite to come back together in person at DSEI. A range of new online opportunities to complement the live event will be introduced. ‘DSEI Connect’ is a digital platform that will bring participants from around the world together with those attending the event in London to create a flexible and accessible ‘hybrid’ format. The new digital offering gives registered participants a secure and regulated platform to build relationships, share knowledge and develop business. DSEI’s connection portal, MeetMe, enables users to view recommended contacts through its supply chain listings, identify

networking opportunities and arrange secure online or in-person meetings at the event. DSEI Connect will feature an exclusive series of live and on-demand presentations from eminent international guests, including keynote speeches from military figureheads outlining pressing equipment requirements and opportunities, in addition to podcasts and exclusive interviews with senior government officials discussing key policies and strategies. WHY VISIT? Grant Burgham, DSEI Event Director, said: “DSEI has been shown to accelerate the trajectory of businesses that attend. The last year has encouraged us to think more imaginatively about our long-term offering to the defence and security sector and analyse what makes DSEI so important for the industry. As such DSEI will now provide a wider range of opportunities for those who don’t normally - or this time cannot - attend in-person, and we are pleased to take this opportunity to introduce DSEI Connect to the market.”E

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

77


DSEI  DSEI connects governments, armed forces, industry thought leaders and the global defence and security supply chain on an unrivalled scale. The event is curated to consistently support both the prime contractors as well as small and mediumsized enterprises while, crucially, giving the UK exports a significant boost. On a rolling 10-year basis, the UK remains the second largest defence exporter in the world. This year DSEI will feature eight theatres, packed with content from exhibitors spanning the entire defence spectrum. The event will also welcome over 100 exhibitors who are new to DSEI, augmenting the commitment made to DSEI by all the major defence primes. DSEI will also feature 19 international pavilions, providing exhibitors and attendees with an excellent opportunity to engage with the global defence community. Backed by the UK Ministry of Defence, DSEI remains the best way to gain a comprehensive cross-section of the Defence industry, welcoming exhibitors from the entire defence and security supply chain, from Primes/OEMs to Tier 3 manufacturers. DSEI is the only event of its kind to integrate all the pillars of national security and defence: Air, Space, Land, Naval, Security, Cyber and Joint. DSEI has always been an ideal place to engage with innovative SMEs on the forefront of technological development. This process will be facilitated by DSEI Connect, a digital platform. DSEI CONNECT The event is pleased to introduce DSEI Connect – an online platform that will enable registered participants from around the world to access content from the event’s prestigious speaker line up, while facilitating cross-industry engagement, and buyer-led business appointments. DSEI is recognised as an ‘unmissable’ biennial event for the defence and security industry, and so to improve and support the experience of those attending live and facilitate participation for those

78

unable to attend, DSEI Connect provides an additional range of opportunities for the sector to come together. For seven weeks from 16 August to 30 September 2021, DSEI Connect will provide an exclusive series of live and on-demand content-led presentations from eminent international guests. It will also include a comprehensive schedule of seminars, roundtable and panel discussions focused on the DSEI 2021 central theme: An Integrated Response to Future Threats. As global governments place increasing importance on organic integration of procurement and deployment of capabilities across their armed forces, DSEI Connect will offer an opportunity to engage with representatives from governments, national armed forces, industry thought leaders, and the global defence and security supply chain. DSEI Connect will also provide a new seller-buyer matching programme – MeetMe. Specially designed for “LinkedIn” style buyer-led networking, MeetMe is a secure platform which enables registered participants to identify, message, and arrange secure online meetings with key potential business contacts and ultimately generate significant leads. Sally de Swart, Managing Director of DSEI, said: “The launch of DSEI Connect is the first part of an extensively researched programme that we are proud to bring to market. The last year has encouraged us to think more imaginatively about our offering to the defence and security sector, analyse what makes DSEI so important for the industry and examine how this can be expanded virtually for the audience on an ongoing basis. DSEI Connect reflects this, driving industrial collaboration, defence engagement, and the development of new technology, while also providing a platform for strategic thinking and messaging from global leaders, during 2021 and beyond”.

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

KEYNOTE SPEAKERS DSEI 2021 is proud to present a keynote programme featuring the top Defence officials from the UK Government and Forces, alongside some of their key international partners. All speakers will be broadcast live from our on-site studio to every theatre in ExCeL, and the sessions will also be available via the event app. DSEI 2021 will provide an invaluable opportunity for senior figures in the military and in government to converse with exhibitors. Over the four days of DSEI, DSEI will host keynotes from figures including General Sir Patrick Sanders, Commander of Strategic Command, and General Sir Nick Carter, Chief of the Defence Staff. Representatives from Government will also be featured, such as Jeremy Quin MP, Minister for Defence Procurement, and Sir Simon Bollom, Chief Executive of Defence Equipment and Support. DSEI IN A COVID WORLD The venue, ExCeL London has worked closely with DSEI and the rest of the exhibitions industry throughout the pandemic, and with Government, to ensure that standards are in place to run Covid-secure events. DSEI and the venue will ensure that they implement the latest public health guidance and advice at the time of the event. The DSEI team are working hard to ensure that all attendees at DSEI 2021 enjoy as full an experience as possible, whilst taking the necessary precautions. DSEI have assured attendees that they will carefully scrutinise the latest public health guidance and adjust our plans as required, ensuring that all attendees are kept fully informed. BRITISH ARMED FORCES: AN INTEGRATED FORCE Bringing together defence innovation leaders from across the land, air, sea and joint domains, participants from all levels of the defence industry will be able to engage directly with British Armed Forces stakeholders and gain insight into the capabilities and structures required for the future. The 2021 Cyber Security Forum features discussions on Tuesday 14th to Thursday 16th September, developed in partnership with the UK MoD StratCom Working Group. The Forum is designed to enable dialogue between all parts of the supply chain around the following core themes: Industry engagement and acquisition; Future operational requirements; obtaining and retaining skills; and information exploitation. Leading the government participation at DSEI, the new Strategic Command is charged with transitioning the traditional warfare era’s Joint Force into the Information Age’s Integrated Force. The Command’s priorities include achieving strategic integration across defence and establishing


DSEI

dominance in the grey zone of the battlefield through special operations, and harnessing disruptive technologies such as artificial intelligence and big data in the cyber domain. General Sir Patrick Sanders, Commander UK Strategic Command, commented: “UK Strategic Command looks forward to being a key participant in DSEI 2021, setting out our responsibilities and our thinking – as UK Defence’s integrator and responsible for key strategic capabilities against the rapidly changing character of warfare.” With a focus on adapting to the evolving character of warfare, the British Army’s presence at the DSEI Land Zone will be led by a ‘Future Soldier: An Integrated Army’ theme that will look to build support for its new operating concept at the highest level. Key to this is the Army’s ability to work collaboratively with industry. General Sir Mark Carleton-Smith, Chief of the General Staff, said: “The Army’s relationship with industry will be vital to ensuring it has innovation at the heart of future capability and we will be actively seeking opportunities to develop Defence’s relationship through the Army’s Land Industrial Strategy.” DSEI 2021 will host the largest Aerospace Zone and Space Hub offering to date where the Royal Air Force will take centre stage. The service will seek out technological innovation that will deliver success in the “grey zone” – including space, cyber, special operations and information operations. With key strategic assets joining the UK air fleet in 2021, including the F-35 Joint Strike Fighter and P8 Poseidon maritime patrol aircraft, the Next – Generation Air Force will also address the integration theme driving UK defence transformation. Air Chief Marshal Mike Wigston, Chief of the Air Staff for the Royal Air Force, said: “To continue making a leading-edge contribution to the UK’s place in the world, the Royal Air Force must be at the leading edge of technological innovation in all that we do; DSEI 2021 offers an excellent international platform on which to explore those challenges alongside our industry partners.” Alongside international warships on static display and waterborne demonstrations on the River Thames, the DSEI Naval Zone will backed by the Royal Navy. With HMS Queen Elizabeth and HMS Prince of Wales now fully supporting operations internationally, the service will focus on laying out its multi-domain integration requirements and harnessing maritime innovation and technology that will help build a fully networked digital force. Admiral Tony Radakin, First Sea Lord and Chief of Naval Staff commented: “The Royal Navy continuously seeks to remain at the forefront of maritime defence technology, and events such as DSEI help to keep us there. I am delighted that the Royal Navy is once again playing a leading role

in DSEI in 2021. Our ongoing success on operations around the world is a direct result of the strength and skill of the UK defence industry, as well as our international partners. DSEI gives us the ideal opportunity to bring all the key players together to discuss the latest innovations, developments and technological achievements.” L

FURTHER INFORMATION

www.dsei.co.uk

Keeping ahead of threats with Radio Frequency solutions

Enterprise Control Systems (ECS) helps defence, policing and security sectors solve difficult radio frequency (RF) problems in challenging markets. Its extensive capabilities in design, development, manufacturing, and testing mean it is frequently first to market, enabling customers to rapidly address critical and emerging tactical and operational needs in live operational theatres. ECS technology is focused on RF systems, which underpins its two key capability groups, RF Data Links and RF Inhibitors. RF Tactical Data Links (TDLs) enable secure communications within ISR systems. RF Inhibitors provide signal inhibition, disruption and jamming for Counter-UAS and Counter-RCIED systems. The company supplies leading OEMs, integrators, military,

security agencies and police forces across the globe. ECS products and solutions are operationally proven. Its Claw RF inhibitor has been tested against over 10,000 UAS sorties of over 60 UAS types and is credited with over 2,000 UAS ‘kills’ on operations. Its RF Data Links have supported global police forces and been operationally proven in numerous conflict zones and security operations, including Iraq and Afghanistan. Enterprise Control Systems will be showcasing a significant new addition to its RF capability lineup for the first time at DSEi, stand H2-956.

FURTHER INFORMATION www.enterprisecontrol.co.uk

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

79


THE UK’S NO.1 COMMERCIAL, ENTERPRISE & DOMESTIC SECURITY EVENT 1000+ PRODUCTS & SOLUTIONS LIVE DEMOS & WORKSHOPS CPD ACCREDITED CONTENT ONE PASS, SIX EVENTS REGISTER FOR YOUR FREE TICKET

WWW.THESECURITYEVENT.CO.UK

OFFICIAL MEDIA PARTNER

CO-LOCATED WITH:

ADVERTISERS INDEX The publishers accept no responsibility for errors or omissions in this free service Armour Communications

24,41

Heald 18

Bastion Security Products

36,40

Heras IFC

Black Rainbow

22,41

Jacksons Fencing

Cova Security Gates

60,61

Mercian Labels

Durabook 76

Metis Aerospace

Eagle Automation Systems

Milford P/S

Eagle Eye Networks Enterprise Control Systems Faculty AI

80

26-27,40 38,40

Polimaster Europe UAB

8 32,40 20 58,60

79

Selectaglaze 28

56,60

Sepura 4

Frequentis 12,13

Tait Communications

Frontier Pitts

Westminster International

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 47

34,41

6

66,69 30


EVENTS DIARY

7-8 September 2021, NEC Birmingham www.emergencyuk.com Featuring over 450 exhibitors displaying the latest equipment on the market, live interactive demonstrations, unique CPD accredited seminar programme, and unrivalled networking opportunities, this two-day event brings together all areas of the emergency services industry - both public and private sector, to discover innovative technology and solutions, share their experiences and unite in their collaborative approach to operational effectiveness and efficiency. There are plenty of networking opportunities throughout both days of the show. ESS is an ideal place to meet your peers, forge relationships with potential new partners, or to strengthen relations with current clients. With four other relevant events co-located alongside, benefit from the cross over audience. The new Future Policing Zone at ESS 2021 will feature a dedicated exhibition area of the most innovative products and services including mobile technology, AI, facial recognition, body-worn tech, digital forensics, through to connected vehicles, digitally-enabled officers, kit and boots and training. 7-9 September 2021, NEC Birmingham www.thesecurityevent.co.uk Created for the commercial and residential security market, this free-to-attend event will bring together a world-class education programme, market leaders and industry experts back at the home of UK security. Spearheaded by nine of the industry’s major players, the exhibition will showcase the world’s leading security brands. The Security Event will attract thousands of attendees with key features including a tailored content programme and networking opportunities out of show hours. The highly focused tailored education programme investigates the evolving challenges and opportunities involved in the delivery of security projects throughout the supply chain. The Security Event will tap into the expertise of leading security professionals and explore the latest innovations from suppliers. 14-16 September 2021, ExceL London www.ctexpo.co.uk

Counter Terror Expo (CTX) unites professionals from industry, infrastructure, government and policing to explore counter terrorism and other complex security operations. The event facilitates the development of new ideas and technologies to combat the latest threats facing the UK and other geographies. Having launched in 2008, this year marks the show’s 13th iteration, but first at the new ExCeL London home. With all attendees verified and approved, you can expect a high quality, relevant audience encompassing law enforcement, government and the private sector. Targeting the evolving threat landscape, CTX allows highlevel security stakeholders to: meet with specialist exhibitors to explore sector-leading services; discover innovative products from established suppliers and new market entrants; freely attend educational conference sessions on topical issues; network with industry peers and stakeholders from across the security spectrum; and explore co-located events, including Forensics Europe Expo and DSEI.

opportunities for networking, a platform for business, access to relevant content and live-action demonstrations, the DSEI community can strengthen relationships, share knowledge and engage in the latest capabilities across the exhibition’s Aerospace, Land, Naval, Security & Joint Zones. As British forces modernise to meet the demands of the information age, they do so with the understanding that success on the future battlefield requires integration across land, sea, air, cyber and space. Under the theme of ‘Integrated Response to Future Threats’ DSEI 2021 will be shaped to support this strategic shift with input from industry, academia, international partners and delegates. 28-29 September 2021, Olympia London www.internationalsecurity expo.com International Security Expo is the only flagship event bringing government, industry, academia and the entire end-user community in charge of regulation and procurement together to debate current challenges, share knowledge and updates and to source the latest security technologies, products and services. With innovation at the very heart of the event, International Security Expo provides a unique and secure place to source the latest products, test and evaluate the technologies and see them in action in one of our live demonstration areas. Additionally, debate the latest topics and challenges in our high-level educational seminars, all free-of-charge and CPD certified. Speak to product experts, share knowledge and have your questions answered by world-renowned speakers and acclaimed global security leaders. 28-29 September 2021, Olympia London www.international cyberyexpo.com The International Cyber Expo (ICE) takes place alongside International Security Expo 2021 delivering best in class education around Cyber Security Risks & Threats, Detection & Response and the very latest technology and services that protect the digital and physical future of businesses. Aimed at government, CISOs and an international audience, the event is designed to help improve the security and resilience of national infrastructures and business continuity.   ICE is the first event to bridge the gap between the physical and cyber security industries on a global scale. Featuring an exhibition of the latest cyber security capabilities and innovation, a two day ‘Cyber in Security’ Conference with ‘real world’ case studies from the industry’s leading thinkers, a Cyber Innovation Theatre, Live Attack Demonstrator and more.

14-17 September 2021, ExCeL London www.dsei.co.uk DSEI connects governments, national armed forces, industry thought leaders and the entire defence and security supply chain on a global scale. With a range of valuable

ISSUE 47 | COUNTER TERROR BUSINESS MAGAZINE

81


THE NEW INTERACTIVE ONLINE EVENT SERIES FROM COUNTER TERROR BUSINESS

COMING SOON SOON... WATCH OUT FOR ANNOUNCEMENTS OF OUR NEXT EVENT ON

MISSED OUR 22ND APRIL EVENT - RADICALISATION & EXTREMISM - THE BIGGER PICTURE? YOU CAN CLICK HERE TO REGISTER AND WATCH IT ON DEMAND

CTB365 ON DEMAND – NEVER MISS ANOTHER CTB EVENT. EVER.

Profile for PSI  Media

Counter Terror Business 47  

Delivering Key Strategies to Combat Terrorism

Counter Terror Business 47  

Delivering Key Strategies to Combat Terrorism

Profile for psi-media

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded

Recommendations could not be loaded