STADIUM SECURITY
CRITICAL COMMS PERIMETER SECURITY
AVIATION SECURITY
EVOLVING THREATS
CHANGING SECURITY NEEDS IN GLOBAL AVIATION
www.counterterrorbusiness.com | ISSUE 58
WORLD WORLD
E
To register for your FREE Digital Subscription of Counter Terror Business, go to: www.counterterrorbusiness.com/digital-subscription or contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 ONLINE // MOBILE // FACE TO FACE Counter Terror Business would like to thank the following organisations for their support: Welcome to EDITOR’S COMMENT E Follow and interact with us on X: @CTBNews Connect with us on Linkedin: @counter-terror-business LINKEDIN PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED 226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Web: www.psi-media.co.uk EDITOR Polly Jones EDITORIAL ASSISTANT Robyn Quick PRODUCTION MANAGER & DESIGNER Dan Kanolik PRODUCTION DESIGNER Jo Golding PRODUCTION CONTROL Deimante Gecionyte ADMINISTRATION Enkelejda Lleshaj WEB PRODUCTION Freya Courtney SALES EXECUTIVE Liam Williams PUBLISHER Damian Emmins www.counterterrorbusiness.com COMMENT 3 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
Are
you interested in learning about what it takes to be compliant when protecting buildings ?
Grow your knowledge with the Surelock McGill Group during our CPD approved webinars on blast and ballistic resistance standards, as well as the potential conflicts between physical security and life safety. Scan
Each CPD session provides an accessible but comprehensive introduction to some of the key physical security standards required in relation to the protection of buildings and vital infrastructu re.
What to expect?
• A CPD cer tificate
• A free introduction to relevant security standards
• Live Q&A session with our industr y exper ts
FUNDAMENTALS OF BL AST AND BL AST RESISTANCE STANDARDS
As long-standing leaders and innovators in the physical security sector, at the Surelock McGill Group we stand uniquely positioned to share our exper tise with customers and contacts across the industr y
We run training sessions with the goal of helping you and your staff to understand when par ticular standards are relevant, how these standards are tested and cer tified, and ultimately allowing your designers, architects, and engineers to specify and order with confidence.
EXPLORE THE WORLD OF INTERNATIONAL BALLISTIC STANDARDS
EXPLORE THE CONFLICT BET WEEN COMPLETE SAFET Y AND ULTIMATE SECURIT Y
The standards covered during this session include:
EN
13123/13124, ISO 16933, ASTM F2927
EN 1522/1523, EN
UL
The standards covered during this session include:
1063,
752, FEBR
EN 179, EN 1125, UL 305, UL 10C, EN 1634, LPS 1175, EN 1627, PAS 24, EN 1522, Cer tifire
The standards covered during this session include:
to register
NEWS CRITICAL COMMS CCW CYBER SECURITY BEHAVIOURAL ANALYSIS CTX PERIMETER SECURITY STADIUM SECURITY MARTYN’S LAW HVM AVIATION SECURITY SURVEILLANCE 7 17 20 22 38 29 35 41 42 44 53 47 CONTENTS CTB 58 Counter Terror Business magazine // www.counter terrorbusiness.com CONTENTS 5 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
Written by Fred Kao,
HOW RUGGED TECHNOLOGY
IS REVOLUTIONISING THE MILITARY AND DEFENCE SECTOR
Identifying emerging opportunities within the rugged technology sector is never an exact science, particularly in volatile economic markets, but the past 12 months have highlighted its increasing importance within the military and defence sector
The emerging role of rugged technology in improving communication and productivity on the battlefield has led to an increase in demand for more sophisticated devices, but new methods of warfare have also helped to shape the functionality and capabilities of this technology. Increasing situational awareness through digital application and advanced technology remains vital, helping protect forces and keep them one step ahead of the enemy, but customisation and the emergence of 5G technology, artificial intelligence and the Internet of Things is proving a game-changer. These developments within the rugged technology market are transforming the military and defence sector and, as these devices continue to offer a strong return on investment, we anticipate that demand will continue to grow. Over the past year, increased aerospace and defence spending budgets across Europe resulted in strong investment in technology. This includes investment in the Internet of Military Things (IoMT) and technology that improves situational awareness on the battlefield.
Durabook experienced an 11 per cent uplift in sales for the military and defence sector alone, and we expect to see continued requirements and spending across several territories in the year ahead to support digitisation within this sector. We also anticipate more emphasis on information technology integration for drone, real-time imaging, telemetry and surveillance applications to combat increasing hostilities.
As technology continues to advance, we expect to see rugged devices that are smarter, more efficient, and more reliable supporting military organisations across new territories. Innovation and digital transformation are shaping the way organisations operate across every industry worldwide, but nowhere is this more prominent than in the military and defence sector. The most successful and dynamic organisations are investing in flexible and versatile systems and networks that improve operations; and recognising that this is where investment is most beneficial. While speed and agility is critical, the growing risk of cyber warfare cannot be underestimated. This is why the latest intelligence systems are designed to meet stringent military standards that protect data in every environment. The most advanced rugged devices are, revolutionising the sector, setting the pace for digital change that can change the shape of warfare.
Durabook has a full range of rugged devices built specifically to meet the needs of defence, military, public safety organisations. L
FURTHER INFORMATION www.durabook.com
ADVERTISEMENT FEATURE
CEO at Durabook and Twinhead International 6 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
MARTYN’S LAW
Martyn’s Law campaigners to walk from Manchester to London
Figen Murray, mother of Martyn Hett, who died at the Manchester Arena attack is to walk from Manchester to Downing Street to raise awareness of Martyn’s Law.
She will begin the walk at Manchester Arena on 7 May and will arrive at Downing Street on 22 May, the seventh anniversary of the attack.
Murray will be joined by other campaigners, including Brendan Cox, whose wife Jo Cox was murdered in 2016. The campaigners will stop at the sites of other terrorist attacks en route.
A consultation on Martyn’s Law closed in March and the results are currently being considered by the government.
The government committed to Martyn’s Law in the 2019 manifesto and the 2022 Queen’s speech. However, there is no update on when it will become law.
Speaking to the BBC, Ms Murray said: “Almost five years on from their first commitment, the draft legislation still hasn’t been tabled.
“No parent should have to experience the pain and loss I’ve felt.
“I truly believe we have an opportunity to make public spaces safer and more secure by introducing Martyn’s Law.”
Mr Cox added: “Martyn’s mum shouldn’t be having to walk from Manchester to London to put pressure on the government to do something it has promised multiple times,” he added.”
AIRPORT SECURITY
Airports given extension to install security tech
Airports have been granted an extension to install the newest security technology.
New scanners detect prohibited items with greater accuracy, which is intended to make air travel safer and easier for UK passengers.
Initially, the government’s deadline for airports was 1 June 2024, but the changes could be pushed back to a year later.
Some UK airports are being given more time to install new security technology with serious financial penalties planned for those who fail to meet the new deadlines.
Transport secretary, Mark Harper, said: “These cutting-edge scanners will make air travel safer and easier for passengers by strengthening security even further.”
He added that the UK is “leading the world with its roll-out of this technology”, but said it’s important to give airports time to meet the deadline.
Harper said: “Due to issues such as the global supply chain’s continued recovery from the pandemic, some airports have been unable to upgrade their security checkpoints before the 1 June 2024 deadline announced at the end of 2022.”
He finished by saying that extensions have been given on a case-by-case basis.
First announced in 2018, the new scanners detect prohibited items with greater accuracy, meaning security staff can work more efficiently and passengers no longer need to take items out of their hand luggage to simplify the security screening process.
Once in place, travellers will also be able to take greater quantities of liquids through...
CONTINUE READING READ MORE NEWS 7 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
Counterterrorism,
Risk Management and Resilience MSc
Full-time/part-time
We understand that the threat of terror related events not only impacts civilian society, but business infrastructure, economic networks and vital communication routes.
This course has been developed to bring together a distinctive mix of subjects, providing you with the knowledge, expertise and evidence-based tools and approaches necessary to understand, analyse, mitigate and aim to prevent terrorism.
We also offer a range of related short courses.
For further information, please contact:
E: studydefenceandsecurity@cranfield.ac.uk
T: +44 (0)1234 758540
Men first to be charged under National Security Act
As part of a Counter Terrorism Policing investigation, several people have been charged with an investigation into alleged offences under the National Security Act.
The charges are the first to be brought about under the new legislation that came into effect in December 2023.
Dylan James Earl from Leicestershire has been charged with aggravated arson, contrary to section 1(2) and (3) Criminal Damage Act 1971; preparatory conduct, contrary to section 18 of the National Security Act 2023; and assisting a foreign intelligence service, contrary to section 3(1) and (9) of the National Security Act 2023.
Jake Reeves from Croydon has been charged with aggravated arson, contrary to section 1 of the Criminal Damage Act, 1971 and agreeing to accept a material benefit from a foreign intelligence service, contrary to section 17(2) and (11) of the National Security Act 2023.
Dmitrijus Paulauska, also from Croydon, has been charged with failing to disclose information to police about terrorist acts, contrary to section 38B of the Terrorism Act, 2000.
The foreign intelligence service these charges relate to is that of Russia.
The investigation is being led by officers from the Met’s Counter Terrorism Command and has been supported by officers from CTP East Midlands, Leicestershire Police, CTP South East and Kent Police.
Earl appeared at Westminster Magistrates’ Court on Saturday, 20 April and was ...
Reading stabbings were avoidable, inquest finds TERRORISM
An inquest has concluded the deaths of three men murdered by a man convicted under antiterror laws in a Reading park could have been avoided.
Khairi Saadallah killed James Furlong, David Wails, and Joe Ritchie-Bennett, in Forbury Gardens in 2020.
In 2021, he was given a whole-life term after admitting to the murder and attempted murder of three other people.
However, Judge Coroner Sir Adrian Fulford found that there were major problems with intelligence sharing between authorities.
Counter Terrorism Policing, the Probation Service and Berkshire NHS Foundation Trust were among the organisations criticised for failing in the case.
Saadallah arrived in the UK in 2012 as a teenage refugee, having fought in the Libyan revolution, and suffered from PTSD, among other conditions.
He had extensive contact with mental health services, but Fulford said Saadallah was “caught in a catch-22” with no continuity of care.
He concluded it was “at least possible” Saadallah would never have attacked the men if his mental health had been correctly managed by authorities.
The night before the attack, a police officer visited his home on a visit. Body-worn video from the two-minute encounter shows Saadallah reassuring the officers, who asked how he was feeling and if he had enough food.
A carrier bag containing a knife was visible on the floor behind him.
Fulford said Saadallah should have been recognised as a high-risk patient. He had ...
NATIONAL SECURITY ACT
CONTINUE READING CONTINUE READING NEWS 9 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
LISTA Mobile Solutions are consistently proven in the the most rugged, demanding environments around the globe. With a fully mobile ready to go design, these solutions ensure unparalleled convenience and efficiency in deployment. Our unrivalled quality and durability guarantee long lasting performance, even in the most demanding environments. LISTA Mobile Solutions boast maximum flexibility, and their application-specific design allows for seamless integration into diverse workflows and spaces. Backed by over 75 years of experience and a global footprint, LISTA stand out as a trusted choice in the toughest environments
www.lista.com/en For more information contact: info.uk@lista.com
Fast-deployable mobile workshops Meet
at Eurosatory 2024 Paris, France - 17-21 June Booth F 96
us
STAY AHEAD WITH LISTA
Plans to increase UK defence spending to 2.5 per cent of GDP by 2030
The prime minister has announced plans to increase defence spending to 2.5 per cent of GDP by 2030.
Rishi Sunak made the announcement on a trip to Poland, alongside NATO secretarygeneral Jens Stoltenberg.
During his speech, the prime minister said that we are at a turning point in European security and called for allies to step up.
According to a government statement, “an axis of autocratic states like Russia, Iran and China are increasingly working together to undermine democracies and reshape the world order”.
The announcement means that defence spending will increase immediately and then rise to hit £87 billion at the end of the decade and reach 2.5 per cent of GDP.
There are three areas of focus for the increased defence budget. The first is to fire up the UK defence industrial base, which would involve investing at least an additional £10 billion over the next decade on munitions production.
The second focus is modernising the armed forces by reforming defence procurement and creating a new Defence Innovation Agency to ensure the UK is at the cutting edge of modern warfare technology, with at least 5 per cent of the defence budget to be committed to R&D.
The final focus is backing Ukraine’s defence with the government backing an additional £500 million this year for the ammunition, air defence and drones Ukraine needs...
Met Police to pay damages over arrest
The Metropolitan Police have been ordered to pay damages to a French publisher arrested under Schedule 7 of the Terrorism Act 2000, the BBC reported.
Ernest Moret was travelling to the London Book Fair in 2023, when he was stopped at St Pancras station by police. Officers asked about demonstrations he had attended in France and took his phone and laptop.
He was detained for more than 24 hours.
Schedule 7 is an exceptional counter-terrorism power which enables police at ports to examine individuals entering or leaving the UK, in order to determine whether they are terrorists, and without any grounds for suspicion.
Officers can detain for up to a maximum of six hours, search, seize devices, require cooperation (including passwords to devices) and take biometrics.
A person who is examined must give any information in his possession which the examining officer requests. It is an offence, punishable by up to 3 months’ imprisonment or a fine, to fail to comply with this duty. However, a person may only be convicted where the exercise of the Schedule 7 power was lawful.
The independent reviewer of terrorism legislation, Jonathan Hall KC, said the questioning was unnecessary, and called the interviews conducted “exaggerated and overbearing.”
Hall said: “This was an investigation into public order for which counter-terrorism powers were never intended to be used...
DEFENCE
POLICE CONTINUE READING CONTINUE READING NEWS ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE 11
| HVM Barriers | TVRA & VDA | Counter Terrorism Consultancy | K9 Detection Services | Behavioural Detection Teams | Security & Stewarding | Zone Ex Security | Traffic Management | Close Protection | Risk Management | Accredited Training INTEGRATED SECURITY AND COUNTER TERRORISM SPECIALISTS IN Get in touch to find out more: www.safecrowds.co.uk info@safecrowds.co.uk +44 (0)204 581 7770 counterterrorbusiness.com @CTBNews VISIT OUR WEBSITE TO SIGN UP FOR YOUR DIGITAL SUBSCRIPTION FREE 12 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
Prevent Duty self-assessment tool for school staff launched
A free self-assessment quiz for teachers on the government’s Prevent Duty has been launched by education technology charity LGfL–The National Grid for Learning.
The ‘Prevent Quiz for Staff’ is a multiple-choice assessment that consists of 25 questions based around the Home Office’s recently updated Prevent duty guidance (2023) and the Department for Education’s (DfE) Part 1 Keeping Children Safe in Education (2023), designed to ensure that individual staff have understood all the mandatory safeguarding information.
The quick quiz covers all aspects of the guidance including radicalisation, British values, responding to concerns and more.
Designated Safeguarding Leads can follow up staff training with the quiz.
Once completed, the staff receive their results via email, with corrections to any questions answered incorrectly, and feedback on areas to revisit in the guidance. The assessment results also allow DSLs to identify any gaps in training, and areas for further development.
Mubina Asaria, Online Safeguarding Consultant at LGfL-The National Grid for Learning, said: “At LGfL we always aim to be proactive and responsive to the needs of schools and staff. During DSL training sessions, it became apparent that schools would find it useful to be able to log and evidence Prevent training for Ofsted inspections, so we developed the Prevent Quiz for Staff.
“The quiz is already proving a real hit with schools, it’s a simple and quick way of keeping records and providing data.”...
Hate Crime laws come into force in Scotland:
READ MORE
Manchester Arena survivors to sue MI5:
READ MORE
Two men charged with offences under Official Secrets Act: READ MORE
Government to increase protection of universities: READ MORE
Public History project established for the Troubles: READ MORE
New National Security Advisor appointed: READ MORE
Government announces plans to improve police productivity with technology: READ MORE
Terrorgram proscribed as terrorist organisation TERRORISM
The Terrorgram collective has been proscribed as a terrorist organisation.
It is now a criminal offence to belong to the group or invite support for it, with a potential prison sentence of 14 years, which can be handed down alongside or in place of a fine.
Section 58 also makes it a criminal offence for a person to collect or possess information which is likely to be useful to a person committing or preparing for acts of terrorism, including where an individual views or accesses documents or records containing information of that kind.
The group has now been added to the list of proscribed organisations in the UK, alongside 80 other organisations.
According to the Home Office, the group is an “online network of neo-fascist terrorists who produce and disseminate violent propaganda to encourage those who consume its content to engage in terrorist activity.”
READ MORE
PREVENT CONTINUE READING More
news stories
www.counterterrorbusiness.com
top
from
NEWS ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE 13
ADVANCING SAFETY STANDARDS IN HIGH-RISK ENVIRONMENTS WITH BBX
BBX offers a barrier against attacks using normal construction methods and tools
At BBX, we innovate to protect. Each BBX block is a testament to our commitment to safety, designed to resist the most severe blast and ballistic impacts. Certified to the highest standards, our products offer unparalleled protection without compromising on installation efficiency — using normal construction methods and tools.
Our discrete block construction system is not only a barrier against attacks but also a revolutionary advancement in protective building methods. By incorporating BBX blocks, structures gain the resilience needed to withstand highpressure shocks and direct attacks, ensuring the safety of occupants and critical assets. With extensive testing at facilities like RAF Spadeadam and certifications that surpass Home Office standards, BBX’s capabilities are proven in the field. Our solutions are designed around your needs, whether retrofitting existing structures or integrating into new designs. L
FURTHER INFORMATION www.bbxblocks.co.uk
ADVERTISEMENT FEATURE 14
BUILT TO SURVIVE
Protective block construction system
BBX is a discreet block construction system which provides multi-protection against blast, ballistic, fire and breach threats
Uniquely certified to C15 blast resistance and BR7 ballistic resistance standards, the highest achievable.
BBX is tested & certified to Home Office standards
MANUFACTURED BY www.bbxblocks.co.uk
We’ve been security experts since 1864. Providing optimal security solutions and user experiences for our customers Through our partnerships with the world’s leading manufacturers, no one else offers better-rated, better-tested products:
High Security Portals
High Security Revolving Doors
High Security Full Height Turnstiles
Smart Access Control Systems
Protecting your space. Powering your business.
ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
microwave route must also be considered. Fibre mounted to poles is at risk of sabotage, wind damage, or fire damage. Microwaves may be subject to wind damage or the loss of relay points.
In contrast to government networks, the approach to hardening infrastructure deployed by mobile network operators is sensitive to cost and, consequently, less demanding. Cellular service economics relies upon high capacity in the cell sector, resulting in lower transmission power and extensive frequency reuse. These characteristics mean the cell system base station grid is far denser than a government Professional Mobile Radio (PMR) network.
With the need to host many more sites, the mobile network operator has a reduced expectation for site hardening. Site access may be prevented by something as simple as a lock on a cabinet door. Incidents of attacks on 5G antenna sites by citizens fearful of radiation included the burning of 5G transmission antennas in the UK. Likewise, power resilience on cell sites is typically designed for hours of backup instead of days. A single strand of fibre may be all that is available for a link to the core network.
Nations that plan to move push-to-talk group voice communications from PMR networks to a mobile network must establish plans for both transient and long-term failures of the cell network. Following a massive natural disaster, recovery of the mobile network will be an extended process compared to recovery for a PMR network. Deployable cell sites help speed the
process, but those deployable sites are subject to the same low power and poor spectrum propagation as standard fixed cell sites. The deployable cell site coverage can be very spotty.
THE SOFT DIGITAL UNDERBELLY
Modern critical communications are marvels of software innovation. But that achievement brings complexity, expanding the threat vectors for digital attack or human failings.
Cyber attacks on communications infrastructure can capture sensitive information or disrupt traffic. The good news is that PMR and mobile networks are designed with extensive protection against cyber attacks. Unlike typical enterprise networks subject to ransomware attacks, core communications network elements are based on UNIX and are isolated from general internet traffic by security gateways.
Unfortunately, the complexity of cellular networks has resulted in a pattern of incidents triggered by human error. Errors in IP route reachability with the BGP protocol crippled a toptier Canadian mobile network in 2021. The AT&T mobile cellular network supporting FirstNet failed due to an error while expanding the network in 2024.
Attacks on the digital infrastructure also include the disruption of GPS/GNSS time signals. Accurate time signals are required for synchronising cellular handsets and the network. Because these time signals arrive from the satellite constellations at very low power, a local jamming source can easily overwhelm the space-based signal.
CRITICAL COMMS
COPING WITH FAILURE
From an operational perspective, we must assume that critical communications will fail. The failure may be trivial and local, such as a fibre cut, or complex and national, as with a mobile core network configuration error. Though not frequent, these failures occur often enough to make resilience planning an essential element of any critical communications design.
The acronym PACE is a valuable framework for addressing resilience: primary, alternate, contingency, and emergency. Primary is the standard day-to-day communications channel. If the primary channel fails, an independent alternate link is required. A backstop contingency mechanism must be identified in the unlikely event that both the primary and alternate fail. Finally, an emergency approach must be identified in case none of the other routes are available, and an urgent message must be relayed.
Providing these multiple layers of resilience requires planning and investment. Regrettably, many critical communications deployments fail to support a complete PACE plan due to cost or lack of vision.
From an operational perspective, we must assume that critical communications will fail. The failure may be trivial and local, such as a fibre cut, or complex and national, as with a mobile core network configuration error. Though not frequent, these failures occur often enough to make resilience planning an essential element of any critical communications design.
ENTER THE VEHICLE AS A NODE RESILIENCE CONCEPT
One of the most promising approaches to multilayer resilience emerged in Australia following the catastrophic 2019 bushfires in New South Wales. In response, the New South Wales Fire and Rescue Service designed a vehicle node that combines P25 PMR connectivity, an LTE alternative, and a GEO satellite contingency. This Vehicle-as-a-Node (VaaN) solution is being deployed across their fleet.
In the New South Wales approach, a fire appliance communicates with the control room over P25 voice communication when within range of a P25 tower. If the tower is out of service or beyond range, the vehicle’s P25 radio switches to a P25 over IP using an ethernet link. A vehicle router forwards the IP traffic to a cloud-based gateway. With no LTE signal, the vehicle router forwards the IP traffic over a low-speed satellite connection.
Central Pierce Fire and Rescue in Washington State, USA, is implementing a reduced
approach to VaaN. In this approach, a primary communications channel is LTE-based pushto-talk over cellular (PTToC) combined with an LEO-based satellite alternative.
The primary benefit of the VaaN approach is that each individual network option can be less than perfect. The combination of alternatives boosts the resilience to levels far higher than can be achieved with a single super-hardened network. An additional benefit is that the VaaN concept can be further extended with ad-hoc mesh network connectivity to link teams that travel on foot from the vehicle in isolated regions. The resulting communications deliver high-quality, resilient communications supporting situational awareness, command, and control.
BENEFIT FROM THE WISDOM OF THE CROWD
TCCA’s Critical Communications World 2024 brings together the top experts on critical communications from around the globe. Ministerial officials and industry innovators will gather to discuss the latest approaches for resilient, high-performance critical communications. The conference and exhibition provide a valuable opportunity for local and national officials to hone the expertise needed to meet the critical communications mission. Critical Communications World takes place from 14-16 May 2024 in Dubai.
MOVING FORWARD WITH MISSION CRITICAL SERVICES CERTIFICATION
The Global Certification Forum (GCF) is working together with TCCA to develop an industry certification program for mission critical products and solutions where conformance to 3GPP standards will be checked and verified and thus ensure interoperability between different solution providers.
The work on establishing this certification program will progress at a dedicated workshop on May 17, following Critical Communications World. This workshop, the third in the series, will aim to gather input to the future development of the MCX certification programme, and will provide an opportunity to hear from local stakeholders to understand regional requirements and ensure alignment with industry. The workshop is open to all GCF and TCCA members, and to non-members subject to approval. L
CritComm Insights is a member of TCCA FURTHER
Register for the workshop here CRITICAL COMMS 19
INFORMATION
THE GLOBAL NETWORKING HUB HEADS TO DUBAI
Serving the sector for more than 20 years, Critical Communications World (CCW) unites mission-critical and business-critical end-users with manufacturers and suppliers for three days of inspiration, knowledge and connections
This year, the event takes place in The United Arab Emirates from 14th to 16th May in Dubai World Trade Centre. Dubai was chosen as it has long been a beacon of innovation, constantly striving to stay ahead of the communications curve by bringing together the world’s leading experts to share best practices and showcase the latest nextgeneration solutions.
At its heart, CCW is a global networking hub, allowing visitors to view the latest technology and forge new business relationships with leading brands from across the globe. In the exhibition hall, you’ll find the latest
technologies and build strong supply chain partnerships as you get hands-on with new equipment, see product launches, and speak to knowledgeable exhibitors on how they can solve your challenges. Exhibitors include platinum sponsor Motorola Solutions, gold sponsor Ericsson, and host operator Nedaa. Visitors also have an opportunity to join Tech Tours and watch live product demonstrations from carefully selected exhibitors around specific subjects.
The theme of this year’s conference is “Securing society and industry - Connection is the lifeline,” with a focus on how we can enable
CCW
20 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
and protect via resilient and failsafe critical communications. Hear from a unique line-up of international critical communications leaders and innovators who will discuss vital developments, challenges and what the future holds for the sector. Topics for discussion include the MCX - the evolution to nextgeneration mission-critical services, as well as managing the migration to critical broadband. Visitors will also be able to participate in crucial presentations around emerging technology, such as 5G, AI and satellites.
Alongside the conference programme, Focus Forums provide in-depth, deepdive sessions of knowledge sharing and comprehensive updates in specific topic areas. These focused sessions will comprise multiple presentations, interactive discussions and roundtables, allowing specialists to learn about developments and share their challenges, experiences and skills.
A hallmark of CCW is the Global Village. This dedicated space will unite governments and national operators, providing a safe place for representatives of national critical communications projects to discuss ideas, challenges and best practices.
Critical Communications World serves an international audience and attracts attendees from across the globe. To assist with your travel, we have partnered with Emirates and
are delighted to extend an offer for discounted flights to those travelling to Dubai for Critical Communications World. This promotion is valid between 10th May 2024 - 21st May 2024 and is valid from and to gateway cities in which Emirates operates direct flights.
With an exhibition of leading international brands, a conference programme led by experts at the forefront of critical communications, in-depth focus forums, and Government Authorities fostering collaboration across international borders - CCW is an unmissable event.
“Dubai has long been a beacon of innovation, constantly striving to stay ahead of the communications curve by bringing together the world’s leading experts to share best practices and showcase the latest next-generation solutions. This was at the forefront of our thinking during the selection process and, in hosting CCW next year, we have no doubts that Dubai will further elevate its position on the critical communications frontier and instigate further vital reform that benefits the industry and the world.”
Kevin Graham, CEO, TCCA. M
FURTHER INFORMATION
CCW is entirely free to attend; find out more at www.critical-communications-world.com
CCW
21
GETTING THE CYBER SECURITY BASICS RIGHT
Cyber Essentials helps organisations, whatever their size guard against a whole range of the most common cyber threats. This governmentbacked certification scheme is based around five key technical controls that, when implemented correctly, enable the minimum cyber security protection that organisations should aspire to
IASME is the National Cyber Security Centre’s partner for the delivery of the Cyber Essentials scheme and we are firm believers in the five core controls which are the basis for this scheme and encapsulate foundation cyber security best practice. One thing is certain, if you are going to do cybersecurity right, you’ve got to get the basics right first; so let’s talk about getting the basics right.
THE RISK OF USING LEGACY AND UNSUPPORTED SOFTWARE
Unsupported software is a key target for cyber attacks. Known vulnerabilities in unsupported
software left un-patched are easy targets for hackers who create programmes and services to make them easy to exploit, even for criminals with low levels of technical expertise. Software and firmware are supported by the manufacturer for a period of time after they have been developed (this can range from two to eight years depending on the manufacturer). This ‘support’ means that if a mistake or weakness, known as a vulnerability, is discovered in the code that makes up all software, the manufacturer will address it with an update or patch which fixes the problem before it can be exploited by cyber criminals. All critical and high-security updates must be applied within 14
CYBER SECURITY 22
days; the easiest way to achieve this is to enable ‘automatic update’ on all your devices. For some larger organisations, there is a concern that some software updates may stop other software from working or cause some features to break. Most IT teams in larger organisations aim to fully test each update on a controlled sample of devices, before applying it company wide.
It is always a good idea to have backups of your data before updating.
The National Cyber Security Centre has some useful guidance on installing software updates without breaking things.
CREATE AN ASSET REGISTER
Knowing which devices access your organisational data and which software and firmware you have and whether they are supported is really important. Keeping a documented inventory of your devices, software, firmware as well as the cloud services you use is sometimes referred to as an asset list. Maintaining an asset inventory helps to track which software you have in use in your organisation and when it becomes unsupported or is no longer receiving security updates.
SEGREGATE YOUR NETWORK
Perhaps because of the financial implications of updating software, using unsupported software is one of the most common reasons that an applicant fails Cyber Essentials. If an unsupported or legacy piece of software continues to be used in an organisation, could
It is always a good idea to have backups of your data before updating
those vulnerable systems be segregated via a firewall or VLAN onto a closed network? This could keep it safely out of scope and separate to the financial and business data systems of your organisation.
CLOUD SERVICES ARE NOT SECURE BY DEFAULT
Today, most organisations use some elements of cloud computing; others have migrated their entire IT infrastructure off premises into the ‘cloud’ (Infrastructure as a Service or IaaS). A particularly attractive feature of cloud service tools and applications is that they are highly E
CYBER SECURITY 23
scalable and easy to access remotely. It allows for a flexible and collaborative use of a resource without having to make the large outlay for ever-changing technology. Yet despite these incredible benefits, there are some serious security concerns. If professionals and customers can access data over the internet from any location, so can criminals.
Most cloud providers (e.g. Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform) attempt to create a secure cloud for customers and aim to prevent breaches and maintain public trust, however, they cannot control how their customers use the service, what data they add to it, and who has access. Most data breaches in the cloud are a result of badly configured accounts and interfaces with the most common cause being weak, default or stolen passwords. This highlights how important it is that all cloud services are set up correctly and have the essential security controls in place. Organisations should have a comprehensive password policy applicable to all employees and contractors. According to research by Microsoft, there are over 300 million fraudulent sign-in attempts to their cloud services every day, they also estimate that 99.9 per cent of attacks can be blocked simply by using multi-factor authentication. Enable multi-factor authentication on all accounts accessible over the internet.
UNDERSTAND THE SHARED RESPONSIBILITY MODEL WITH CLOUD SERVICES
When talking about security, cloud service providers often reference a ‘shared responsibility model’. This means that for some security controls, it is the cloud service that is responsible for implementation whereas for other features, it is the user organisation. Who
implements which controls will vary depending on the design of the cloud service being subscribed to?
Where an organisation uses Infrastructure-asa-Service products, such as Microsoft Azure, Rackspace, Google Compute Engine, or Amazon EC2, they access virtual machines (VMs), storage, networks, and operating systems over the internet that are located on part of a server in a data centre. Despite the computing infrastructure being provided remotely by the cloud service provider, all of the security and backing up is the user organisation’s responsibility.
DO YOUR DUE DILIGENCE ON YOUR CLOUD SERVICE PROVIDER
It is crucial to research the company that is hosting the cloud service and looking after the computers which hold your data. Many data centres are kept up to date and secure, but it cannot be taken for granted as some do not understand or value security. It is essential that the user organisation researches the security controls used by the cloud service provider before entrusting organisational data to that service.
ACCOUNT SEPARATION
Another common cause behind a cyber breach is when users are using local admin accounts for everyday tasks.
It is best practice that all staff should use a standard user account to carry out their normal day-to-day work and a separate administrator (admin) account should be used to install and remove software, and other administrative tasks. Admin accounts typically have the greatest level of access to information, applications and settings and will cause the most damage if accessed by attackers. An attacker will have the same privileges as the account that you have used to log in and, if that is an admin account, they will be able to perform actions such as install malicious software, delete files and access sensitive data. For this reason, administrative accounts must be restricted, kept track of and not used to carry out everyday tasks.
Did you know the first account that is set up on Microsoft 365 by default is a global admin? These accounts will have full power to configure and change the settings and controls of everything in your organisation’s account. If this account is set up without the necessary security controls and then hacked, an attacker could access your whole system and possibly take all the data out of the organisation.
CYBER SECURITY 24 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
The huge control panels within the admin centre for a cloud service in Microsoft or Google can be a daunting prospect, and anyone setting up accounts will need to set role assignments, groups and permissions to each account as well as passwords and multi-factor authentication. This is the same whether you are a large enterprise or a micro organisation and therefore expert guidance in configuring these settings may be a necessity.
CLOSE THE REMOTE DESKTOP PROTOCOL PORT
Remote Desktop Protocol enables a user of a computer in one location to access a computer or server somewhere else. This is often used by technicians to support users and to carry out maintenance tasks.
Remote Desktop Protocol (RDP) is a common attack vector for ransomware and should not be exposed or accessed across the internet.
Close or block the RDP port at the firewall so that it is not open for use across the internet. Where possible, rather than using remote connections, utilise cloud services such as OneDrive or Google Drive.
Review the cyber security of your organisation
against the five controls of Cyber Essentials with the free online Cyber Essentials Readiness Tool. The process of working through the questions will inform you about your organisation’s level of cyber security and what aspects you need to improve. Based on your answers, you will be directed towards relevant guidance and a tailored action plan for your next steps towards certification.
L FURTHER INFORMATION Apply for Cyber Essentials Detect and Mitigate Threats Impacting Security and Safety Using Open-Source Intelligence from PenLink Cobwebs Technologies www.cobwebs.com CYBER SECURITY ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE 25
The culmination of this vision has been the development of a proven methodology.
Enhancing Spaces Saving Lives
A unique approach to Hostile Vehicle Mitigation
With a focus on striking a balance between aesthetics, suitability, and compliance Logic Protect is a specialist HVM consultancy and supplier; sharing innovative HVM strategies and implementing systems to assist the development of safe and extraordinary spaces.
Discover
Conducting in depth analysis to uncover risks and vulnerabilities.
Design
Establishing tailored solutions. Proven yet customisable.
Develop
Implementing strategies to enhance safety and aesthetics.
PROTECT
E
SPECIALIST HVM
CONSULTANCY
With the new Martyn’s Law legislation fast approaching, landowners will be faced with a difficult, mandatory requirement; one that comes with great responsibility
Venues or areas with the scope to accommodate a certain number of people could require hostile vehicle mitigation (HVM) strategies as part of a bid to increase security. Once passed, areas of public activity such as amenity spaces, retail parks or arenas could be mandated to implement HVM solutions. Typical Hostile Vehicle Mitigation systems designed to be safe, compliant, and simple can turn these environments into visual fortresses rather than the calm, relaxing spaces they were designed to be. With a focus on striking a balance between aesthetics, suitability, and compliance, Logic Protect provides specialist HVM consultancy; sharing innovative HVM strategies and implementing systems to assist the development of safe and extraordinary spaces.
The culmination of this vision has been the development of a proven methodology.
1. DISCOVER
Conducting in-depth analysis to uncover risks and vulnerabilities.
This initial phase involves a thorough analysis of your premises aimed at uncovering risks and vulnerabilities within your environment. By meticulously examining various factors, we discover the unique challenges your space presents, laying the foundation for moving forward with effective protection solutions.
2. DESIGN
Establishing tailored solutions. Proven yet customisable.
Transitioning from discovery, we design specific and bespoke solutions that are both effective and adaptable to your space. Drawing upon proven methodologies, we draft robust strategies that provide you with a reliable blueprint for the prevention of a vehicle-borne attack.
3. DEVELOP
Implementing strategies to enhance safety and aesthetics.
In the final stage, we work together to implement security strategies, prioritising both protective effectiveness and aesthetics. By integrating innovative technologies and strategic approaches, your space will not only be protected but also enhanced visually. This comprehensive approach enhances both functionality and design, creating a beautiful and secure environment. L
hello@logic-bespoke.com
01642 373400
INFORMATION
FURTHER
logic-bespoke.com
27 ADVERTISEMENT FEATURE
THE TOP FIVE CHALLENGES IN THE AEROSPACE INDUSTRY
The aerospace industry continues to face a number of challenges. From supply chain disruption to the need for modernisation, the industry needs to be able to overcome these obstacles
DIGITAL TRANSFORMATION OF MANUFACTURING
Digital transformation is helping to streamline and revolutionise industries, but can the aerospace sector keep up? As technology continues to rapidly advance, it can be a challenge for industries to keep up.
As more and more updated and digitally revolutionised technologies are introduced, employees must receive the training to use them. Aerospace manufacturers must ensure that their business strategies consider what’s to come. If sufficient funds aren’t put aside, companies will struggle to invest in these new technologies.
CYBERSECURITY THREAT
Cybersecurity is a serious threat faced by the aerospace industry. Companies within this sector are a particular target due to the high-value data and assets that they hold.
These cyber criminals target the aerospace industry at each individual level of the supply chain. Whether it be phishing attacks, malware or other malicious activity, cyber-attacks can be detrimental.
SUPPLY CHAIN WEAKNESSES
Shipping delays, material shortages, rising cost of supplies, compliance issues and global wars all impact supply chains. To mitigate these supply chain disruptions, companies have begun to change the way they operate. With shipping taking longer, production needs to be quicker. And with outsourcing slowing down the process, more in-house options need to be considered.
Increasing passenger numbers
There has been an undeniable increase in air travel passenger numbers since Covid-19 lockdown restrictions were lifted. In 2022 alone, global air traffic passenger demand increased by over 64 per cent compared to the previous year. With disruptions to supply chains and a need for modernisation, keeping up with such high demand is a challenge. Climate change has also impacted the industry and manufacturers are tasked with developing new, innovative solutions to keep air travel sustainable.
SKILLS SHORTAGE
It’s vital to ensure that there is a constant flow of skilled aeronautic engineers and manufacturers ready to takeover. But finding these skilled individuals is a challenge in itself. More specialist courses and opportunities to upskill are needed to help bring talented young people into the sector. One initiative addressing the skills shortage has been the introduction of University Technical Colleges (UTCs). These colleges equip students with the technical skills required to meet the needs of employee partners, who sponsor the college. M
FURTHER INFORMATION cpcases.com
ADVERTISEMENT FEATURE 28 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
TOWARDS A UNIFIED AVIATION SECURITY: EMBRACING A PUBLIC UTILITY MODEL FOR GLOBAL SAFETY
Matthew Vaughan, director of aviation security and cyber at the International Air Transport Association (IATA) investigates the evolving security needs in the age of global aviation
Flying is secure. Yet, the threat to civil aviation from terrorism is dynamic and unyielding. This risk demands a dynamic and forward-thinking approach to security. Since the tragic events of 9/11, the focus of aviation security has progressively shifted from countering large-scale hijackings to preventing more nuanced threats, such as the smuggling of explosives and the movement of foreign terrorist fighters (FTFs) as defined by United Nations Security Council Resolution 2178 (2014). These evolving threats highlight the complex and adaptive nature of those targeting civil aviation, necessitating an equally adaptive response from the aviation security sector.
RATIONALE FOR A PUBLIC UTILITY MODEL
Traditional methods of aviation security, which are reactive and fragmented, have become inadequate. Airport security checkpoints appear similar to those in the 1970s, now with more threat-based restrictions and use of technology. Ever since the 2006 liquid terrorism plot in the United Kingdom, 17 years ago, a fragmented mix of passenger restrictions persist. These lack a cohesive international strategy, despite the rarity of such threats repeating. This absence leaves governments without guidance on how to phase out liquid-related security measures based on risk assessment. E
AVIATION SECURITY 29 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
In the International Air Transport Association’s (IATA) Annual Security Report, we argue for viewing differing security approaches as opportunities for change. Focusing on protective outcomes can enable a shift to more risk-based security protocols, especially evident in how domestic aviation systems handle passenger volumes at screening checkpoints. Not all passengers need constant screening. Demographic and technological advancements offer benefits.
Envisioning aviation security as a public utility leads to a conceptual framework
However, the current government approach often unintentionally hinders innovation and stakeholder confidence in addition to raising operational costs. Aviation security, pitted against terrorism threats, becomes a “zero-sum game”. As a result, we suffer from governmental responses to past terrorism acts and live with reactive preventative measures.
Passengers are frustrated. IATA’s Global Passenger Survey consistently places security processes among the top three inconveniences. Many have expressed willingness to share more personal information for a seamless travel experience.
The concept of treating aviation security as a public utility is rooted in the understanding that the safety of aviation is a common good that benefits all segments of society. This approach advocates for a unified, standardised system that prioritises the collective security and convenience of passengers while optimising operational costs.
VISION FOR THE FUTURE: REIMAGINING AVIATION SECURITY
Envisioning aviation security as a public utility leads to a conceptual framework where security is not just a series of checkpoints and screenings but a comprehensive, cohesive, and adaptive system that prioritises the safety, efficiency, and convenience of the global traveling public. This vision encompasses the development of a standardised security protocol that leverages demographic and
AVIATION SECURITY
30
technological innovations to streamline passenger processing, without compromising on safety.
The integration of automated screening lanes, biometric identification systems, and AI-driven analytics for risk assessment can revolutionise the passenger experience, allowing for a more seamless journey from curb to cabin. This approach not only addresses the operational challenges posed by rising passenger volumes but also mitigates the risk of complacency and human error in security operations.
Furthermore, the digital age has highlighted technology’s impact on global safety. Improvements in data sharing and intelligence, facilitated by international cooperation with organisations like the ICAO, have been instrumental in enhancing threat assessment and risk management. However, technological advancement and the adoption of new methodologies in security operations have been uneven, leading to disparities in security standards across regions and airports.
While challenges in balancing effectiveness, privacy, and passenger convenience remain, the continuous advancements in technology and international cooperation provide a strong foundation for the future. IATA envisions a passenger security experience where travellers can journey with all allowed items packed in their bags without having to remove them, undergo a physical and/or digital screening only once, irrespective of subsequent travel destinations. With 2024 marking the ICAO
The
integration of automated screening lanes, biometric identification systems, and AI-driven analytics for risk assessment can revolutionise the passenger experience
Year of Facilitation, any aviation security strategy ought to be focusing on enhancing the passenger experience, reducing airport congestion, optimising cost across the supply chain, and ultimately be encouraging air travel and tourism.
OPERATIONALISING THE VISION
Operationalising this vision requires innovation, collaboration, and transparency. By fostering a risk-based approach, encouraging technology investment and pilot programs, aviation security can surpass the limitations of the current approach. This transformation also necessitates reevaluating passenger security fees and funding, ensuring investments enhance security effectiveness and passenger convenience.
CONCLUSION: CHARTING A PATH FORWARD
As the aviation industry stands at a crossroads, the shift towards a public utility model for aviation security represents a bold step forward. This approach not only promises to address the evolving spectrum of threats in a more effective and efficient manner but also aligns aviation security practices with the principles of accessibility, reliability, and public service. By embracing this model, the aviation sector can ensure that it remains a pillar of global mobility and safety, prepared to meet the challenges of the future head-on. By challenging preconceived notions and embracing a culture of continuous reform and adaptation, we can strengthen our collective resilience against terrorism, and safeguard the future of civil aviation. Let us not underestimate the critical role of aviation security in the broader fight against terrorism, as we strive for a future where safety, security, and convenience converge in our skies. L
FURTHER INFORMATION
www.iata.org
ALL CAPITALS IN TAB AVIATION SECURITY
31 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
ENHANCING AIRPORT SECURITY: TODD RESEARCH’S CUTTINGEDGE SOLUTIONS
In today’s global landscape, ensuring airport security is paramount. With the constant evolution of threats, airports must stay ahead of the curve in safeguarding passengers, cargo, and personnel
This necessitates innovative technologies that not only detect potential risks but also streamline operations for efficiency and effectiveness. Todd Research stands at the forefront of this endeavour, offering state-ofthe-art solutions tailored to meet the evolving challenges faced by airports worldwide.
THE TR-STS TROLLEY SCANNER: REVOLUTIONISING SECURITY SCREENING OF INFLIGHT SUPPLIES
The Todd Research TR-STS airline cart x-ray scanner represents a breakthrough in aviation security, specifically tailored to detect harmful items and threats concealed within inflight supplies. With its advanced imaging technology, the TR-STS scanner offers unparalleled capability to identify potential risks, ensuring the safety and security of passengers and crew. Statistics reveal the gravity of the threat posed by concealed items in inflight supplies. In recent years, there have been numerous incidents of contraband, weapons, and even
explosive materials being smuggled aboard aircraft disguised as innocent items. From sharp objects concealed within food packaging to illicit substances hidden in beverage carts, the potential for harm is significant. In response to these threats, the TR-STS scanner provides a proactive solution, enabling airlines and the airline supply chain to enhance security measures and mitigate potential risks effectively. By implementing this advanced technology, airlines can ensure a safer and more secure inflight experience for passengers and crew alike. While manual searching is labour-intensive and time-consuming, often resulting in delays and inconsistencies, the TR-STS scanner offers a swift and comprehensive solution. With its advanced imaging technology, the scanner can quickly and accurately display hidden threats within inflight supplies, ranging from weapons to explosive materials. Unlike manual searching, which relies on visual inspection and physical handling, the TR-STS scanner provides detailed X-ray images that allow operators to identify suspicious items with precision and efficiency. This not only speeds up the screening process but also ensures a higher level of security, reducing the risk of undetected threats. By streamlining the searching of inflight supplies, the TR-STS scanner enhances operational efficiency for airlines while maintaining the highest standards of safety and security for passengers and crew.
32 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58 ADVERTISEMENT FEATURE
CARGO SCANNERS: SAFEGUARDING GLOBAL SUPPLY CHAINS
In addition to inflight supply security, the secure transportation of cargo is critical for maintaining the integrity of global supply chains. Todd Research’s cargo scanners provide a comprehensive solution for detecting potential threats in freight shipments, ensuring the safety and security of goods in transit.
Utilising advanced technology, Todd Research’s cargo scanners offer unparalleled penetration and resolution capabilities. From palletised freight to oversized cargo containers, these scanners can inspect a wide variety of shipments with precision and efficiency. The high-resolution images generated by the scanners enable operators to identify suspicious items quickly and accurately, minimising the risk of undetected threats. Furthermore, Todd Research’s cargo scanners are designed to integrate seamlessly into existing cargo handling infrastructure. Whether deployed at freight terminals, logistics centres, or border crossings, these scanners can be customised to meet the specific requirements of any facility. With rapid scan times and minimal downtime for maintenance, they ensure uninterrupted operations while maintaining the highest levels of security. The implementation of Todd Research’s cargo scanners not only enhances security but also facilitates compliance with
regulatory requirements governing the transportation of goods. By providing detailed inspection reports and audit trails, these scanners enable stakeholders to demonstrate adherence to strict security protocols and industry standards.
CONCLUSION: ELEVATING AIRPORT SECURITY STANDARDS
In an era of evolving security threats, airports must continually innovate to ensure the safety and well-being of passengers, personnel, and cargo. Todd Research’s airport security products, including the TR-STS cart scanner and cargo scanners, represent a significant advancement in this endeavour. By combining cutting-edge technology with user-friendly design, these solutions offer unparalleled capabilities for threat detection and risk mitigation. As airports strive to maintain the highest security standards while enhancing operational efficiency, Todd Research remains committed to providing innovative solutions that meet their evolving needs. With a proven track record of excellence and a dedication to continuous improvement, Todd Research is poised to shape the future of airport security and safeguard the global transportation network for years to come. M
FURTHER INFORMATION toddresearch.co.uk
TR-STS scanner 33 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE ADVERTISEMENT FEATURE
The
Find suspects in minutes
Reduce search times for suspects in video footage from days, hours . . . to minutes!
Cognitec’s face recognition technology imports still images and video material, finds all faces, and clusters the appearances of the same person, even across multiple media files.
Investigators can search videos to find unknown persons, persons appearing together, frequently seen persons or groups, and known persons.
Talk to us about your face recognition requirements and projects!
Most experienced. Highly trusted.
Cognitec is the only company that has worked exclusively on face recognition technology since its inception in 2002.
www.cognitec.com | sales-emea@cognitec.com
HOW FACIAL RECOGNITION TECH COULD CHANGE THE POLICE FORCE
As the government invests even more into police technology, we explore whether facial recognition will lead the next generation of surveillance
Facial recognition technology at its most basic level has existed since the 1960s, when an American team experimented to see if a computer could use a rudimentary scanner to map a person’s hairline, eyes, and nose.
Today, the technology has advanced massively and is used in a variety of public spaces to improve security across the UK.
Back in April, the government announced a £55 million investment set to expand facial recognition technology, including mobile units
that can be deployed on high streets to identify individuals wanted by the police to crackdown on retail crime.
The investment will be made over the next four years, while the £4 million for mobile units will be spent over the next year.
Prime minister Rishi Sunak said the increase in funding was “sending a message” to criminals.
“Whether they are from serious organised criminal gangs, repeat offenders or opportunistic thieves – who think they can E
SURVEILLANCE 35
get away with stealing from these local businesses or abusing shopworkers, enough is enough,” he said.
THE STORY SO FAR
Facial recognition technology is currently only being used by two police forces in the UK, those being the Met and South Wales Police.
They are testing the innovation with the help of the National Physical Laboratory (NPL ) which provides cutting-edge measurement in science, engineering and technology.
The NPL test plan was specifically designed to help identify any impact this technology may have on any protected characteristics, in particular race, age and sex.
A report conducted by the NPL on the use of facial recognition technology in the two police forces was published last year, which they said gave a better understanding of what setting the algorithm can be operated at where there is no statistical significance between demographic performance.
Facial recognition technology is currently only being used by two police forces in the UK, those being the Met and South Wales Police
THE MET AND SOUTH WALES POLICE
The Met has published examples of how the technology has been helping to reduce crime.
For example, on 9 April, 12 arrests were made with the assistance of Live Facial Recognition (LFR) technology.
Officers arrested a man who breached his sexual harm prevention order following an alert at a previous deployment in Clapham.
An investigation following this alert found the man was sending explicit images to children. He has been charged with two counts of sexual communication with a child and has been remanded in custody.
Lindsey Chiswick, the Met’s director of intelligence said they are “guided by data” as part of ‘A New Met for London.’
She said: “The data for our deployments is available to the public and shows the technology is outperforming what an independent study predicted.”
Chiswick added that reports into law enforcement use of this technology found the public are “mostly supportive.”
“It’s vital we bring communities in London with us so we are continuing work with independent advisory groups and invite them to deployments,” she commented.
The use of facial recognition technology is proven to assist in freeing up police time and apprehending criminals.
For those not in the know, there are three main types of facial recognition technology. The aforementioned Live Facial Recognition tech compares a live camera feed of faces against a predetermined watchlist to find a possible match that generates an alert.
SURVEILLANCE
36
Retrospective Facial Recognition (RFR) is used after an event, and compares still images of faces of unknown subjects against a reference image database in order to identify them.
Finally, Operator Initiated Facial Recognition (OIFR) is a mobile phone use of facial recognition which compares a photograph of a person’s face taken on a mobile phone to the predetermined watchlist to assist an officer to identify a subject.
These are three types of recognition that are being used by both police services in conjunction with the NPL.
South Wales Police have used the technology in a similar way to the Met as they are both being monitored by NPL.
When they announced they were going to implement the technology into their policy work at the start of 2023, Chief Constable Jeremy Vaughan, said: “My priority will always be to protect the public while relentlessly pursuing those people determined to cause harm in our communities.”
He added: “I believe the public will continue to support our use of all the available methods and technology to keep them safe and thanks to the work of the National Physical Laboratory and the results of its independent evaluation I believe we are now in a stronger position than ever before to be able to demonstrate that the use of facial recognition technology is fair, legitimate, ethical and proportionate.”
THE CONCERNS
The public reaction to facial recognition technology being used by the police has been mixed.
Retrospective
Facial Recognition
(RFR) is used after an event, and compares still images of faces of unknown subjects against a reference image database in order to identify them
A 2022 joint survey by Ada Lovelace Institute and the Alan Turing Institute found that while only 12 per cent of people said they had a good knowledge and experience of the technology, 86 per cent of the participants believed that police’s use of it is beneficial.
However, the facial recognition technology does tend to conjure images of a dystopian society and many members of the public are concerned with the ethical and privacy issues surrounding the innovation.
One of the groups opposing the use of facial recognition tech by the police is Big Brother Watch.
Director Silkie Carlo said in response to the government’s latest funding into the tech: “Criminals should be brought to justice, but papering over the cracks of broken policing with Orwellian tech is not the solution.
“It is completely absurd to inflict mass surveillance on the general public under the premise of fighting theft whilst police are failing to even turn up to 40 per cent of violent shoplifting incidents or to properly investigate many more serious crimes.
“Rather than resourcing police to actively pursue people who pose a risk to the public, the government’s investment in facial recognition cameras for retail offences relies on shoplifters walking in front of marked police cameras and as such will effectively target the lowest hanging fruit.”
The risk of wrongful arrest is another of the main concerns surrounding the use of facial recognition by law enforcement.
Both police forces said if someone is not on a watchlist, they will never store their biometric data and it will automatically be deleted. L
ALL CAPITALS IN TAB SURVEILLANCE
37 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
BEHAVIOURAL ANALYSIS 2024: A PREVIEW
London, or more specifically the Gtech Community Stadium in Brentford, will be the venue for the sixth international security conference on tactical risk assessment and non-racial profiling
Security practitioners and academics will be gathering 21-23 May 2024 to exchange ideas, benchmark procedures and share best practice in respect of the identification of hostile, criminal and negative intent.
A record attendance gathered for Behavioural Analysis 2023 last May at Prague Airport. The London event is likely to well exceed that number based on early registrations and the interest demonstrated by responses to the Call for Papers.
Philip Baum, founder and chair of the conferences, stresses that: “The security industry encourages the general public to see something and say something when it comes to the observation of suspicious activity”, yet: “too often it prioritises technology and downplays human intuition despite the historical proof of its efficacy.” He sees behaviour detection not as an alternative to screening technology but rather as a tool which should work in tandem with it. “After all, technologies are often developed to identify the weapons and explosives of the past, whilst humans have a greater potential for identifying the threats of the future due to
deviances in baseline behaviours”, and it is this message that Baum aims to drive home in these now annual three-day gatherings. Delegates to Behavioural Analysis 2024 will benefit from a behaviour detection officerfocussed masterclass delivered by one of the most preeminent names in the field of nonverbal behaviours - former FBI agent, Joe Navarro. The two-hour masterclass, entitled ‘What Every BODY is Saying to Security Professionals’, serves as the centrepiece of the conference and Navarro will highlight how nonverbal communication and speed-reading people can help the security services identify those who might pose a threat to a vulnerable target or, indeed, themselves. Joe Navarro’s book, ‘What Every Body Is Saying’, has now sold more than a million copies worldwide. Other law enforcement perspectives being presented include Sal Naseem - senior associate fellow at The Police Foundation and the former director for London of the Independent Office for Police Conductwho will be addressing the challenges of xenophobia, racism and bias in security decision-making in light of the conflict in the Middle East. Benjamin Delachal, the head of the Behaviour Detection Working Group at AIRPOL and, deputy head of the Aviation Security Department at France’s General Secretariat for Defence and National Security, will be examining how behaviour detection is being embraced by airport police in a European context, and Eirίkur Valberg, Detective Chief Inspector, Reykjavik Metropolitan Police and a lecturer in Criminal Investigation at the University of Akureyri, will be discussing developments in suspect interviewing in Iceland.
BEHAVIOURAL ANALYSIS
38 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
Innovative initiatives relating to behavioural science will be delivered by Maciej Dachowski of the United Nations Office for Counter-Terrorism’s BI Hub in Qatar.
Global risk management consultancies will be sharing their data and insight, Alexandra James of Osprey Flight Solutions. Meanwhile, leading proponents of behavioural analysis in the consultancy and academic world who will be sharing their latest research include: Dr. Craig Donald, An Gaiser, Prof. David Keatley and Dr. Sagit Yehoshua.
Whilst the conference focuses on the protection of crowded spaces, this year’s programme does explore how potential attacks can be identified through observation of suspicious indicators in online data.
Additionally, a session is devoted to the insider threat and, on day three, to AI and automated threat detection – commencing with a presentation by Kee Ein Cern, Deputy Director (Profiling) of Singapore’s Home Team Science & Technology Agency.
Truly international in nature, perspectives on behaviour detection will be presented from around the globe. Dr. Barbora Vegrichtová (Czechia) will discuss the identifying indicators of radicalisation and tendencies towards violent extremism; Varsha Avadhany (India) will present socio-cultural diversity appreciation of workplace violence in Asia and the West; Dan Werber (Hungary) will explain how to establish a BDO system utilising the experience of Budapest International Airport; and, Nkechi Onyenso (Nigeria) will provide a West African perspective on human intuition and investigative interviewing.
It’s not only a question of identifying suspicious signs. As Baum points out, “That’s the relatively easy part. Being able to resolve signs through the elicitation of information by means of effective questioning techniques and subsequent management of persons of concern is essential,” if an organisation wishes to deploy non-racial profiling capabilities effectively. Hence sessions at Behavioural Analysis 2024 on The Question of Questioning and Human Resource Management of Behaviour Detection Units. Terrorism is not the only threat behaviour detection officers are supposed to identify.
It’s as much about recognising those who, perhaps experiencing poor mental health, could be a threat to others or themselves.
The session on Stalking and Human Trafficking reflects this; Dr. Xavier L’Hoiry will explain how academics and law enforcement cooperated to develop a Sexual Trafficking Identification Matrix (STIM) to help police comb adult services websites for indications of human trafficking and Philip Grindell will use case studies to illustrate how the fixated threat can be mitigated by behaviour analysis.
As always, a smorgasbord of presentations is on offer. Just down to you to register! M
FURTHER INFORMATION
Counter Terror Business is delighted to report that it has negotiated a 15% discount off the prevailing rate for its readership. Simply enter the code ‘CTB15’ in the promotional code box of the registration form at www.behaviouralanalysis.com
BEHAVIOURAL ANALYSIS
39
REVOLUTIONISING THE APPROACH TO PHYSICAL SECURITY
Charter Global offer a high-performance, comprehensive range of bespoke security shutters to properties of all types
With dedicated UK manufacturing facilities, an experienced workforce, and an unrivalled product range, Charter Global are revolutionising the security shutter industry, engineering preventative products for a variety of applications.
One of their major innovations is RapiDeploy; a custom-built upgrade feature, bespoke to the Obexion range of shutters.
Used for emergency situations, terror attacks and lockdown situations, RapiDeploy technology was developed to ensure a swift and total closing of the Obexion shutter range, significantly reducing the time in which an industry standard shutter can be deployed in high risk spaces.
RapiDeploy is typically used in environments that need to protect assets (people or property) from rapid and dynamic attacks. These would typically be terror situations rather than criminality, which is reflected in risk assessment with reference to the suitable level of response. Typical risks would be ‘lone wolf’, ‘live shooter’ type of attacks when the building needs to go into lockdown as quickly as possible.
MD of Charter Global, Roger Humphreys explains: “The idea behind the technology arose after completing a security shutter install for a highprofile client in the financial district of London. The client asked us to investigate possible upgrade options to allow the shutter to close more rapidly in emergency situations. The limitations regarding product proportions as well as the environment meant that physical changes to the shutter were not an option. Our specialist electronics team therefore developed the RapiDeploy upgrade panel that
allowed the closing speed of the existing security shutter to be substantially increased.”
A second innovation that is employed on the Obexion MD XR shutter is Charter Global’s exclusive LockDown Security System.
LockDown ensures that the shutter requires no auxiliary locking to maintain the security rating as well as ensuring that the security shutter never gets left in an insecure state. The technology means that the shutter, when forced or challenged, will lock at any point during closing, rather than having to be fully closed first. This impressive feature of the Obexion MD XR shutter has been recognised by and given full product accreditation by the National Protective Security Authority (NPSA).
Charter Global welcome the early involvement in security projects to enable their design team to offer expert advice to provide the most suitable security bespoke solutions and implementation for a client’s needs. L
FURTHER INFORMATION
www.charter-global.com sales@charter-global.com 0845 050 8705
ADVERTISEMENT FEATURE 40 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
THE CAMPAIGN FOR MARTYN’S LAW
Martyn’s
Law is still working its way through parliament and with a general election on the horizon, there’s no clear timeline of when it will become law
Figen Murray, mother of Martyn Hett, who died at the Manchester Arena attack, and after whom the law is named, is to walk from Manchester to Downing Street to raise awareness of Martyn’s Law.
She will begin the walk at Manchester Arena on 7 May and will arrive at Downing Street on 22 May, the seventh anniversary of the attack.
Murray will be joined by other campaigners, including Brendan Cox, whose wife Jo Cox was murdered in 2016. The campaigners will stop at the sites of other terrorist attacks en route.
MARTYN’S LAW
Martyn’s Law will impose requirements in relation to certain premises and events to increase their preparedness for, and protection from, a terrorist attack by requiring them to take proportionate steps, depending on the size and nature of the activities that take place at the premises.
The proposed requirements would apply to those responsible for qualifying public premises and qualifying public events. They might be individuals but, in most cases, would be a business or other organisation.
The proposals set out different requirements for standard tier premises, which would have a capacity of 100-799 individuals and enhanced tier premises and qualifying public events, both
of which have a capacity of 800 individuals or more.
A consultation on Martyn’s Law closed in March and the results are currently being considered by the government.
The consultation was aimed at organisations, businesses, local and public authorities, and individuals who own or operate publicly accessible premises or events that the Terrorism (Protection of Premises) Bill will potentially affect.
The consultation sought views from those responsible for smaller premises which would fall within the standard tier.
The government committed to Martyn’s Law in the 2019 manifesto and the 2022 Queen’s speech. However, there is no update on when it will become law.
Speaking to the BBC , Ms Murray said: “Almost five years on from their first commitment, the draft legislation still hasn’t been tabled.
“No parent should have to experience the pain and loss I’ve felt.
“I truly believe we have an opportunity to make public spaces safer and more secure by introducing Martyn’s Law.”
Mr Cox added: “Martyn’s mum shouldn’t be having to walk from Manchester to London to put pressure on the government to do something it has promised multiple times.” L
MARTYN’S LAW
41 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
ENHANCING URBAN SAFETYINTEGRATING HVM STRATEGIES IN RETAIL ENVIRONMENTS FROM SUPERMARKETS TO DEPARTMENT STORES
The PSSA explain the importance of HVM in public spaces
In the UK, the safety of our shopfronts and public spaces, particularly in heavily populated pedestrian areas, is becoming an increasingly pressing concern. Following on from the Perimeter Security Suppliers Association’s (PSSA) recent interesting article on ‘ designing out crime,’ it is clear that Hostile Vehicle Mitigation (HVM) is a crucial step in safeguarding our streets and shopfronts. HVM strategies aim to prevent or minimise the damage caused by vehicles crashing into shop fronts, whether these incidents are accidental or deliberate acts of aggression. The role of PSSA members in this endeavour is both vital and multifaceted, offering expertise and innovative solutions to businesses looking to protect their premises.
Physical barriers such as bollards, planters, and reinforced street furniture play a key role in HVM by stopping or slowing down vehicles before they can cause harm. These measures, when thoughtfully implemented, do not detract from the aesthetic of our urban landscapes but rather can enhance them. They are the first line of defence in creating safer spaces for both shoppers and shop owners alike. Also, the design of our urban environments can contribute to safety, with planning and
architecture that guide vehicles away from vulnerable areas, subtly integrating security into everyday life.
Traffic calming measures further ensure that vehicles move at speeds that allow for greater control and reaction time, significantly reducing the likelihood of accidental crashes. Access control systems, both electronic and manual, restrict vehicle access to high-risk areas, allowing only authorised vehicles at specific times. These measures, comprehensive in their approach, not only protect individuals but also the structural integrity of our shop fronts.
PSSA members are at the forefront of implementing these HVM strategies. Their expertise is not just in identifying potential threats and vulnerabilities but also in providing innovative solutions tailored to specific locales and needs. From consultation and planning to the installation and maintenance of HVM products, these members ensure that safety measures are not just implemented but are also effective and maintained over time. They also play a crucial role in educating businesses and local authorities on the importance of HVM and the best practices for maintaining and operating these security measures.
HVM 42 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
The need for such measures has been highlighted by various incidents across the UK and globally, where vehicles have been used as weapons in attacks or have crashed into public spaces due to loss of control. Notable examples include the 2017 London Bridge attack, where a van was deliberately driven into pedestrians, and the 2014 Glasgow bin lorry crash, which tragically illustrated the catastrophic potential of vehicles losing control in crowded areas. These incidents, among others, highlight the critical need for effective HVM measures to protect our public spaces and the people who use them.
Whether it is a bustling supermarket, a smallscale corner shop, or a sprawling department store, Hostile Vehicle Mitigation (HVM) plays a crucial role in safeguarding shopfronts and everyone inside. By integrating HVM strategies, businesses of all sizes can protect their premises from the potential threat of vehicles being used as weapons or accidental crashes. This not only ensures the structural integrity of the building but also makes a safer environment for customers and staff alike. The versatility of HVM solutions means they can be tailored to fit the specific needs and layouts of different retail spaces, ensuring that safety measures enhance, rather than detract from, the shopping experience.
Paul Jeffrey, chairman of the PSSA, stresses the need for forward-thinking actions: “As the
By integrating HVM strategies, businesses of all sizes can protect their premises from the potential threat of vehicles being used as weapons or accidental crashes
threats to our public spaces and shop fronts change, we must keep ahead with creative and cohesive security measures. Our members are not just creating but also putting into place HVM solutions that fit right into our cities and towns, making sure safety does not take away from how our streets look and feel.
The PSSA is an international organisation and has chapters around the world, showing our dedication to working together across the globe. This international network lets us exchange ideas, advice, and new approaches, making sure we are all ready to face any new challenges. Working together across countries, we aim to make a real impact, uniting to ensure our public spaces and commercial areas are safe.”
As we continue to strive for safer urban environments, the collaboration between businesses and PSSA members is essential. By working together, we can implement effective HVM strategies that not only protect our shop fronts but also preserve the bustling, vibrant character of our streets. This partnership is not just about security; it is about creating spaces where commerce can thrive and where the public can feel safe and welcome. For those interested in protecting their premises, talking to a PSSA member is the first step towards a safer future for all. M
FURTHER INFORMATION https://pssasecurity.org
HVM
43 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
COUNTER TERROR EXPO 2024
CTX – The Counter Terror Expo returns to ExCeL London on 19th & 20th June to unite professionals from industry, infrastructure, government, and policing to explore the latest counter-terrorism technologies and solutions
CTX encourages the development of new ideas and the discussion of innovative strategies to combat the latest threats facing the UK and its partners.
The theme of the CTX content programme this year is the four key strands of the CONTEST strategy: Prevent, Pursue, Protect, and Prepare. The programme will be driven by panel discussions around the key areas affecting our national security – in the physical, online and emotional spaces – led by senior leaders from policing (including CTP, BTP and MPS), government, regulatory bodies, P/CVE specialists, academics, victims of terrorist attacks, leading campaigners and charitable organisations. Our panellists will share their insight of the CONTEST strategy, and its relevance in the face of a changing terrorist threat. How are global events shaping our foreign and domestic security policies? How do we identify the signs of radicalisation and extremism, what are the
tools and platforms being used to corrupt the young, and the vulnerable? How do we stop this – through preventative education, compassion, reasonable regulation, and legislation? Or by imposing a state of surveillance, oppressive legislation, restrictive regulation, and closed borders? Whose responsibility is this? Who is accountable for all of this? How do we react as individuals, organisations, communities, and society at large – and can we be better prepared, more organised and have greater resilience to any future events?
The Israel/ Hamas conflict has ignited passions globally. Numerous demonstrations have taken place in cities around the world – some peaceful, others not. Referrals to PREVENT have soared, since Hamas launched their attack on Israel. Finger-pointing, blame and counter-blame has ensued. The spread of misinformation, and disinformation – videos detailing horrific actions from both sides – have flooded social media
CTX 2024 44
platforms, and only served to further inflame tempers. How does this affect our counterterrorism posture? How do the authorities successfully police these demonstrations, amid calls of Islamophobia, Racism, and anti-Semitism?
Martyn’s Law has been the subject of a Public Consultation – but only one half of it, the Standard Tier Premises. The Government has dragged its feet on delivering a promise that the Bill will be put before Parliament this Spring. It is now unrealistic to expect it to get its first reading in this session of Parliament. Figen Murray, Nick Aldworth and others, who have campaigned relentlessly for the best part of the last seven years to get this legislation enacted, are losing patience with this government – and rightly so. The programme over the two days of CTX will look like this:
DAY ONE
A series of four panel discussions looking at the topics of: Is the CONTEST strategy nimble enough to deal with the current multi-faceted terrorist threat; How the Israel/ Hamas conflict has changed the narrative for PREVENT; Radicalisation & Extremism – the new global pandemic. How do we PREPARE for it? And PROTECT Duty: How protective security best practice can be delivered for Martyn’s Law.
DAY TWO
Two panel discussions and a presentation looking at the key areas of: The realities of a terrorist attack. Can you PURSUE a normal life as a survivor? How to PREVENT and undermine terrorist information operations, including online disinformation efforts. And a presentation by Dr Craig Jarvis: Cyberterrorism: Myth and Reality. The key partnership for CTX again this year is with TINYg – the Global Terrorism Information Network – who are a not-for-profit, knowledge and threat sharing organisation. You’ll be able to hear from TINYg members in the conference
programme and engage with them at their stand on main exhibition floor.
To reinforce the messages that we are covering at CTX this year, we have chosen to support two charities that are the embodiment of our event, RAPAID – The emergency bandage charity who aim to #stopthebleed by making life-saving emergency bandages as commonplace as fire extinguishers and defibrillators across the UK, and the National Emergencies Trust – the Nationwide Disaster Charity. Please engage with them at their stands on the main exhibition floor to see how you and your organisation can support their vital work.
Come and join us at CTX and its co-located event, Forensics Europe Expo this year to learn, engage and form the future of preventative, resilient national security and forensic investigation innovation.
We look forward to welcoming you to CTX & FEE in June. L
Entrance to both CTX and FEE is free, subject to meeting our registration criteria, physical security clearance on the day and production of photo ID on entrance and clearance of our security protocols.
CTX 2024
FURTHER INFORMATION Register today at: https://ctexpo.co.uk Connect with CTX on LinkedIn here Follow us On Twitter/ X here Connect with FEE on LinkedIn here Follow us On Twitter/ X here PROTEC T • RESPOND • RECOVER ExCeL London 1 - 20 June 20 24 9 45 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
Helping people to secure what matters most.
OUR COMPANY
OUR COMPANY
Our company has specalized in Perimeter Security since 1982 With over 40 years of industry experience we design bespoke solutions to suit customer requirements
Our company has specalized in Perimeter Security since 1982 With over 40 years of industry experience we design bespoke solutions to suit customer requirements
We pride ourselves in delivering high quality customer service. Ensuring our customers get an appropriate solution to help solve their problems
We pride ourselves in delivering high quality customer service Ensuring our customers get an appropriate solution to help solve their problems
We offer a range of perimeter intrusion detection systems, which have been designed to defend and detect potential attacks on the perimeter Including, Electric Fencing, Flexiguard and Microguard. Visit our website to find out more
We offer a range of perimeter intrusion detection systems, which have been designed to defend and detect potential attacks on the perimeter Including, Electric Fencing, Flexiguard and Microguard Visit our website to find out more
WHY CHOOSE US?
WHY CHOOSE US?
From new perimeter intrusion detection system installations to retrofits of other systems, you can be sure Advanced Perimeter Systems can help By listening to your individual needs we use our range of systems to create a highly effective barrier to detect anyone trying to breach your perimeter
From new perimeter intrusion detection system installations to retrofits of other systems, you can be sure Advanced Perimeter Systems can help By listening to your individual needs we use our range of systems to create a highly effective barrier to detect anyone trying to breach your perimeter
OUR STORY
OUR STORY
Our security systems were originally designed for Commercial, Industrial, and Military use so are most commonly found in Prisons, Military sites, as well as protecting other critical infrastructure worldwide With a focus on high security our systems can be used for business and around any property with something worth protecting
Our security systems were originally designed for Commercial, Industrial, and Military use so are most commonly found in Prisons, Military sites, as well as protecting other critical infrastructure worldwide With a focus on high security our systems can be used for business and around any property with something worth protecting
OUR PROMISE
OUR PROMISE
We made a promise to our customers to continue to support our products throughout their full life cycle
We deliver highly reliable and robust systems designed to last for many years Whether you require an upgrade or some spare parts, our systems have been designed to be backwards compatible so you are never left without effective security. We are even known to help customers with electric fence retrofits
We made a promise to our customers to continue to support our products throughout their full life cycle We deliver highly reliable and robust systems designed to last for many years Whether you require an upgrade or some spare parts, our systems have been designed to be backwards compatible so you are never left without effective security We are even known to help customers with electric fence retrofits
OUR MISSION
OUR MISSION
We believe businesses should be able to grow without the worry of having to experience a break in With an Advanced Perimeter System you can be sure you will be alerted of any potential break in on your perimeter Allowing you to respond to the situation before any damage can be done
We believe businesses should be able to grow without the worry of having to experience a break in With an Advanced Perimeter System you can be sure you will be alerted of any potential break in on your perimeter. Allowing you to respond to the situation before any damage can be done
CONTACT US www.AdvancedPerimeterSystems.com
01786 479862
sales@apsltd net CONTACT US www.AdvancedPerimeterSystems.com
01786 479862
Helping people to secure what matters most. sales@apsltd net
mitigation and advanced fencing solutions to Perimeter Intrusion Detection Systems (PIDS) and beyond.
As a not-for-profit organisation, PSSA is dedicated to elevating industry standards and safeguarding ethical practices within the sector. Our members, who are rigorously vetted, adhere to a strict code of conduct that mandates quality, transparency, honesty, and integrity in all business dealings. This commitment is not
commitment to best practices is the Hostile Vehicle Mitigation Installers Scheme (HVMIS). Introduced as a recent code of conduct, HVMIS sets stringent standards for training, installation processes, and overall professionalism in deploying critical security assets. This scheme, auditable and free for members, also opens its doors to non-members, extending our reach and impact in ensuring industry-wide best practices. E
PERIMETER SECURITY 47 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
48
HOSTILE VEHICLE MITIGATION LPS1175 - FORCED ENTRY
HVM
Frontier Pitts, Crompton House, Crompton Way, Manor Royal, Crawley, RH10 9QZ
The PSSA takes accountability seriously. Complaints against members are extremely rare, but when they occur, they are investigated thoroughly, with outcomes reported and necessary actions taken. This rigorous approach has been instrumental in promoting a culture of excellence and trust, which is why PSSA membership has increasingly become a prerequisite in numerous tender specifications globally.
The value of PSSA membership extends beyond compliance and ethical business conduct. We have instituted a comprehensive and ongoing vetting process for new applicants, which includes evaluating financial stability, quality control systems, website transparency, as well as quality and health and safety policies. This thorough review ensures that only the most credible businesses join our ranks, enhancing the overall quality of offerings available in the market. Our not-for-profit status allows us to focus solely on elevating industry standards rather than expanding membership numbers indiscriminately.
Communication and continuous learning form the backbone of our association. Through initiatives like the Interact Day seminars, regular newsletters, active participation in exhibitions, and robust social media engagement, we facilitate ongoing dialogue among
This inclusivity is crucial as it enhances global security networks
manufacturers, installers, government agencies, academia, and end-users. These platforms encourage collaboration and innovation and enable our members to showcase their achievements and innovations to over 10,000 followers worldwide.
INTERNATIONAL COOPERATION
The PSSA also values and promotes international cooperation by welcoming security associations from around the globe as reciprocal members. This inclusivity is crucial as it enhances global security networks and supports the development of our regional chapter structure, making the PSSA a central figure in the ever-changing security landscape. Members of the PSSA take great pride in their affiliation, recognising the association as a representation of quality and excellence in the high-security perimeter market. Our collective efforts raise the bar for security products and services and contribute significantly to the safety and security of societies worldwide. As we look to the future, the PSSA remains committed to leading from the front, ensuring that our members and their offerings meet the highest security and reliability standards. By adhering to our principles and continuously evolving to meet the challenges of a dynamic global environment, we are setting the standard for security and integrity in the high-security perimeter market.
PSSA
If you are interested in the future of global security standards – the PSSA is a hub for professionals in the industry, whether you’re a manufacturer, installer, consultant, or a company in need of high-security perimeter solutions. The PSSA is dedicated to promoting excellence and integrity within the industry, and you can get involved by applying for membership, attending our Interact Day seminars (next day is 12th June 24), or following us on LinkedIn . Your participation can help elevate safety and effectiveness standards worldwide. To learn more about our community and how you can contribute, please visit our website pssasecurity.org . Or contact paul.jeffrey@pssasecurity.org L
ALL CAPITALS IN TAB PERIMETER SECURITY
49 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
SOLUTIONS FOR EVENT ORGANISERS AND VENUES IN 2024
As the UK gears up for a year filled with public gatherings and events, a pressing question looms: How safe do Brits feel in these settings?
Heald, the leading manufacturer of hostile vehicle mitigation systems, surveyed 2,000 individuals to investigate this crucial question. The results are not just numbers; they paint a picture of public feelings, especially against the backdrop of recent updates to the Protect Duty legislation.
Protect Duty updates, also known as Martyn’s Law and the Terrorism (Protection of Premises) Bill, emphasise the nation’s commitment to enhancing security measures at public venues. In this context, Heald’s survey gains importance, shedding light on how Brits perceive safety at various events. The findings reveal a sense of unease among attendees. From sporting events to music festivals, a notable percentage of respondents expressed apprehension about their safety. Football matches, in particular, emerged as a focal point of concern, with the aggressive behaviour of some fans cited as a significant factor. The statistics and firsthand experiences highlight the urgent need for robust security measures, especially in cities where such events evoke heightened anxiety.
According to Heald’s new study, individuals feel concerned for their safety when attending public gatherings (6 per cent). The events where individuals feel the least secure include sporting events (28 per cent), with men more likely to be more fearful (30 per cent) than women.
One respondent expressed that he feels nervous about attending events like football games due to the aggressive attitude of some fans: “Many football game visitors don’t come to see the match, but they come to fight. Football should be visible on TV only.” Cities that feel sporting events are the least safe include Cardiff (40 per cent), Southampton (38 per cent), and Norwich (33 per cent), according to Heald’s survey.
The new data reveals that women are more likely to feel uneasy when attending concerts/music festivals, with 37 per cent reporting a sense of insecurity. Gig attendees in Belfast (61 per cent), Bristol (40 per cent), and Edinburgh (36 per cent) are also among those where attendees feel least safe. These findings are backed by YouGov research, which indicates that one in five women have experienced harassment at a festival.
Gender disparity in perceptions of safety cannot be overlooked, with women expressing greater unease, especially at music festivals. The prevalence of harassment incidents at events like this highlights the importance of proactive measures to ensure a safe environment for all attendees. What factors influence this pervasive sense of insecurity? Crowd size emerged as a significant concern, highlighting the challenges of managing large gatherings effectively. However, respondents also emphasised the importance of visible security infrastructure, such as bollards and barriers, in alleviating their fears. The correlation between past incidents, like the Manchester Arena attack, and diminished confidence in event safety highlights the need for proactive risk mitigation strategies.
50 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58 ADVERTISEMENT FEATURE
This preference for heightened physical security measures at events suggests that visible infrastructure like bollards and barriers can reassure attendees by highlighting safe zones, managing crowd flow, and deterring unauthorised access or hostile vehicle incursions. This finding follows respondents emphasising that past incidents, such as the Manchester Arena attack, influence their sense of security, negatively impacting their confidence to attend future events. In addition to implementing perimeter security solutions, there is a call for increased security personnel. In light of impending legislation mandating enhanced security measures for venues, there’s an urgent call to action for event organisers and venues. Adopting a comprehensive approach to security is imperative, including physical barriers, robust surveillance systems, well-trained personnel, and effective emergency response protocols. As Debbie Heald MBE comments, it’s the synergy of these elements that ensures the safety and security of visitors — an outcome that must remain non-negotiable.
As the Terrorism (Protection of Premises) Bill approaches enforcement for venues with over 100 attendees, it’s evident that the
implementation process is taking longer than stakeholders would prefer. Event organisers and venues should consider taking proactive steps to secure their premises before the legislation becomes law. Not only does this proactive approach give them a head start, but more importantly, it demonstrates a commitment to prioritising the safety and security of event attendees above all else. Neglecting these concerns has far-reaching ramifications. Beyond immediate safety implications, there’s a real risk of dampening the vibrancy of events, undermining their appeal to attendees and stakeholders alike. Security experts at Heald highlight that proactive engagement with public sentiment is essential as we navigate the complexities of the modern threat landscape. Event organisers and venues must listen to the public’s concerns and leverage them as a motivation for meaningful change. M
FURTHER INFORMATION
To learn more about the UK’s perception of safety and security at events in 2024, please visit: https://www.heald. uk.com/news/exploring-the-uksperception-of-event-security/
51 ADVERTISEMENT FEATURE
GROUNDBREAKING WEAPONS DETECTION SYSTEM
For more information, contact your CEIA representative at info@ceia.co.uk or call us today at +44 1789 868 840 • +44 7887 421 410
• QUICKLY AND AUTOMATICALLY SCREEN GUESTS with their backpacks and bags
• EXTREMELY HIGH THROUGHPUT with near-zero nuisance alarms
• DETECTS HANDGUNS AND MASS CASUALTY THREATS, such as high caliber assault weapons and IEDs
• EASY TO RELOCATE AND QUICK TO INSTALL: Less than 1 minute setup time
• INDOOR AND OUTDOOR OPERATIONS
THREAT DETECTION THROUGH ELECTROMAGNETICS www.ceia.net GAME DAY AT RECORD SPEED.
NEW OPENGATE_advert_FC060K0480v1000gUK.indd 1 08/03/2022 08:31:08
2024’S SUMMER OF SPORTS
2024 will see the men’s Euros and the Olympic and Paralympic games take place in neighbouring countries over the space of a couple of months. These are some of the world’s biggest sporting events and will need detailed and effective security planning
Previous events of the last few years should serve as a learning platform of what to do and more importantly what not to do, when it comes to stadium security, with a few high-profile events standing out. The threats to large-scale sporting events are varied, and include ineffective policing and security planning, terrorist attacks, large numbers of ticketless fans and supporter violence.
EURO 2020, WEMBLEY, 11 JULY 2021
The men’s Euros are due to take place in Germany in July. The previous competition was delayed due to Covid, with the final taking place at Wembley on 11 July 2021. England’s first final appearance was marred by crowd disorder and racist abuse of players.
The home final at Wembley came after a year of, and amid still ongoing Covid restrictions. E
STADIUM SECURITY 08:31:08 53 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
86 people were arrested that day, including 53 at Wembley
Thousands of England fans collected at Wembley, well in advance of the game, and many without tickets. Police were forced to request that those without tickets did not travel to Wembley. Ticketless fans fought with stewards and police and tried to get into the stadium – and some achieved this. 86 people were arrested that day, including 53 at Wembley for offences including public order breaches, assault, drunk and disorderly conduct, and criminal damage. Others were arrested later, including two men who were arrested on suspicion of stealing items that helped ticketless fans storm Wembley Stadium ahead of the final.
19 police officers were injured, as was Harry Maguire’s dad.
Following the game, which England lost to Italy on penalties, some members of the England team were racially abused online.
Just after the event, Deputy Assistant Commissioner Laurence Taylor said : “Throughout the course of the Euros tournament, the vast majority of people have watched the matches responsibly and safely, and enjoyed the build up to last night’s final.
“However, the unacceptable scenes we saw yesterday were a small number of people intent on using the football as an excuse to behave appallingly towards other members of the public and officers.
“The reports of online hate crime abuse are utterly abhorrent and totally unacceptable. We have launched a post-event investigation and will actively pursue and investigate offenders and criminal offences.
“This behaviour is not welcome in London and I urge anyone who is being subjected to any
STADIUM SECURITY
54 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
abuse, both online and in person, to contact police and report it so the police can investigate thoroughly and accordingly.”
It was reported that about 2,000 people were able to get in illegally and there were 17 mass breaches of disabled access gates and emergency fire doors.
CASEY REPORT
A 129-page report looking into the report was later published by Baroness Louise Casey. She concluded that there was a “collective failure” of organisations involved in the planning of the game and said the incident was “a source of national shame”.
It was highlighted that the Met deployed 553 officers, however, they were not deployed until 3pm. Crowds had been gathering since 9 o’clock in the morning.
Casey found that the stewards recruited for the match were lacking in experience and authority.
The “hollowing out” of police resources over the last decade led the crowd to believe that there was less chance of them being stopped
The main entrance area to the stadium is owned by property group Quintain and discussions over how to manage it included six separate parties. However, Casey found that no one was deemed responsible for safety.
Brent council’s chief executive Carolyn Downs had previously expressed concerns about increasing disorder as the competition progressed. Ticketless fans had previously tailgated their way into the semi-final against Denmark.
Drugs are also believed to have played a significant role in the day, with 45 per cent of ticketed fans saying they had seen someone snorting drugs at Wembley that day. Casey remarked: “If it had only been alcohol I’m not sure if people could have sustained themselves for that period.”
It was also highlighted that the “hollowing out” of police resources over the last decade led the crowd to believe that there was less chance of them being stopped. Those that were involved in the disorder also knew that due to Covid restrictions, about 25,000 of the 90,000 seats would be empty.
CEO of the FA, Mark Bullingham, said: “We planned for this event in a bigger way than any event that’s ever been held at Wembley. We absolutely had more stewards, we had more security. What the review said is that rather than planning for it as an incremental event and learning lessons from previous events at Wembley, you’ve got to step back and almost view these events as a completely different nature.”
RECOMMENDATIONS
Baroness Casey recommended empowering authorities to act more strongly against drug use, flares and smoke bombs and people entering without a ticket.
She also recommended an FA campaign to change attitudes, better communication between agencies overseeing the match and a new category for football matches of national significance. E
ALL CAPITALS IN TAB STADIUM SECURITY
55 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
In her review, Baroness Casey said: “The events of Sunday 11 July 2021 (Euro Sunday) at Wembley Stadium were a ‘near miss’. I am clear that we were close to fatalities and/or lifechanging injuries for some, potentially many, in attendance. That this should happen anywhere in 21st century Britain is a source of concern. That it should happen at our national stadium, and on the day of our biggest game of football for 55 years is a source of national shame.
“I want to be very clear from the outset that responsibility for that risk to human life lies with the individuals without tickets – nearly all men, it has to be said – who attacked the stadium, successfully or otherwise. The drunkenness, drug taking, irresponsibility, criminality, and abuse of innocent people –including staff, families, and disabled ticket holders – was shocking and intolerable. I hope the police and other authorities continue
“I am clear that we were close to fatalities and/or life-changing injuries for some, potentially many, in attendance”
to prosecute as many of the perpetrators as possible and the courts and football authorities apply the toughest possible punishments.
“Nevertheless, some of what happened was sadly foreseeable, even if the scale of it was not. And even if it had not been predictable, there are always wider lessons to be learned from such events. That is the opportunity of a near miss.”
She continued: “There is no question, however, that the day was spoiled by a horde of 6,000 or more ticketless fans, many of whom were no more than mindless thugs. The outpouring of vile racist abuse that followed in the days after only made this worse. These men may wear England shirts but they can’t be allowed to represent us. I choose instead to be represented by the England team, and by organisations like the Football Supporters’ Association, who support all decent law-abiding football fans, England supporters or otherwise, and were on the ground to assist visiting Italian fans that day.”
UEFA ordered England to play one match behind closed doors and the FA was fined 100,000 euros.
Since then, phase one of improvement works related to Baroness Casey’s recommendations has been completed. This includes making turnstiles and accessibility entrances more
STADIUM SECURITY
56
Large numbers of fans were unable to gain access to the stadium in the build up to the game and French police used tear gas and pepper spray on Liverpool fans
secure and having locks on all perimeter doors strengthened. There is also a new command and control centre, with more than 50 new CCTV cameras.
CHAMPIONS LEAGUE, STADE DE FRANCE, 28 MAY 2022
The 2022 final of the men’s Champions League between Liverpool and Real Madrid made the headlines for the wrong reasons.
Large numbers of fans were unable to gain access to the stadium in the build up to the game and French police used tear gas and pepper spray on Liverpool fans.
After the game, large groups attacked and mugged supporters of both teams as they left the venue. There were also widespread reports of sexual assault.
BLAME GAME
Though some attempted to blame fans for the chaos, an ‘independent’ report by UEFA, found that as event owner, UEFA was responsible for the failures that led to the “disaster”.
The report found that early on, congestion had built up around a narrow pedestrian underpass on the way to the turnstiles. Police were requested to divert people away from here, but they were slow to act and fans remained trapped, whilst others joined them at the other end. According to the report, by 19:45, 75 minutes before kick off, police abandoned this area and withdrew along with stewards. Thousands more people entered the space and the report concluded that there was “a clear and immediate danger of a fatal crush”.
The decision was made to delay kick-off, though those outside the stadium did not know this and therefore fans still desperately tried to enter. Police used tear gas and pepper spray and the report says: “It is remarkable that no one lost their life”.
Announcements were made on the big screens and therefore to broadcasters around the world, that the delay was due to supporters arriving
late. The report states that this claim was objectively untrue.
The report also points out that several entities, including French ministers, UEFA and others blamed Liverpool supporters trying to enter without valid tickets for the events that unfolded. Again, this report indicates that this was not true.
The report states: “It has been a feature of our investigations that several key stakeholders have not accepted responsibility for their own failures but have been quick to attribute blame to others. Some have continued to make allegations – in particular against supporters – based upon ‘facts’ for which there is no evidence. Assertions that late, ticketless supporters were either the primary cause or contributed to the dangerous events have a particular resonance with Hillsborough where similar allegations were made 33 years ago and persisted for decades before being comprehensively disproved.”
The similarities with Hillsborough are hard to ignore.
CONCLUSIONS
The report concluded that there were two organisational failures at the route of what went wrong. This is that the UEFA model for organising the event was defective as there was an absence of overall control or oversight of safety and security – similar to what was pointed out at the Wembley incident. E
ALL CAPITALS IN TAB STADIUM SECURITY
57 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE
Assumptions led to an ineffective policing model
The second failure is that the safety, security and service model which is laid out in the SaintDenis Convention, was put aside in favour of a security approach “inappropriately based on incorrect assumptions that Liverpool FC supporters posed significant threats to public order.”
The report pointed out that the police “adopted a model aimed at a non-existent threat from football hooligans”.
Intelligence from UEFA, Liverpool, Real Madrid and police forces from both countries indicated that there had been no significant incidents of football-related violence from either club in recent years.
These assumptions led to an ineffective policing model.
Defective policing was also highlighted when discussing the attacks by locals in the aftermath of the game.
Aside from security measures, defective route planning was also highlighted as a contributing factor with too many people being directed to take a single train line which led to congestion.
The panel also concluded that despite some reports, there was not an extraordinarily large number of people trying to access the game without tickets.
The report also highlighted two years of Covid restrictions and a late change of venue away
from St Petersburg, following Russia’s invasion of Ukraine, as possible contributing factors.
The report makes 21 recommendations. These recommendations include creating internal compliance mechanisms within UEFA and constructing a process to ensure that the recommendations from the panel are implemented.
It is recommended that host stadiums have well managed security perimeters, welcome services & crowd guidance and orientation and that it is a formal requirement of the bidding process that the police will commit to compliance with the Convention.
The report recommends that UEFA should move rapidly towards digital ticketing and that medical and first aid personnel should always be visible and accessible.
EURO QUALIFIER, BRUSSELS, OCTOBER 2023
This year’s Euros has already been hit by a terrorist attack.
In October 2023, two Swedish nationals were shot dead in Brussels, Belgium on the same day as a qualifier for the 2024 Euros between the two countries was taking place. The victims were on their way to the game when they were killed and were wearing Swedish shirts.
The attack was carried out by Abdesalem Lassoued, who fled the scene, and was killed the next day by police.
He posted a video online in which he claimed responsibility for the attack and said he was inspired by Islamic State.
STADIUM SECURITY
58
It was later revealed that an extradition request by Tunisia in August 2022 had not been followed up by Belgian magistrates. It was reported that in 2005, he was sentenced to 26 years in prison in Tunisia for crimes including attempted murder. He escaped prison, travelled on a small boat to the Italian island of Lampedusa, then moved to Belgium, where his application for asylum was rejected. Tunisian authorities put in an extradition request, which was received by Belgium officials but not processed. Understaffing was blamed for this. E
In October 2023, two Swedish nationals were shot dead in Brussels, Belgium on the same day as a qualifier for the 2024 Euros between the two countries was taking place
ALL CAPITALS IN TAB STADIUM SECURITY
59
It was later revealed that an extradition request by Tunisia in August 2022 had not been followed up by Belgian magistrates
The attacker had previously applied for asylum in Norway, Sweden and Italy. Italian intelligence officials identified him as radicalised in 2016 and began to monitor him. He had also served a prison sentence in Sweden for drug trafficking – two years for possessing 100g of cocaine.
This attack was the fifth deadly Islamist terrorist attack in Belgium since 2014. It was reported that the attacker had targeted Swedish people, possibly in revenge for recent Quran burnings in Sweden.
The second half of the game was abandoned after news of the attack spread, with spectators being held in the stadium until around midnight and then evacuated. Swedish fans are reported to have removed Swedish garments when travelling after the game.
The game was not replayed, and both teams approved the decision as the result would not impact who qualified from that group. Belgium will play in the tournament, but Sweden did not qualify.
The failings here are again cited as understaffing in public authorities and lack of communication between security authorities –this time across different countries.
STADIUM SECURITY
60
CHAMPIONS LEAGUE, APRIL 2024
As recently as April, there were terrorist threats made against Champions League games. A pro-IS media channel called for attacks against venues hosting quarter finals in England, France, Spain and Germany. Security was stepped up and the games took place without incident.
FA CUP, WEST BROM, JANUARY 2024
There have also been incidences of ‘supporter’ violence over recent years. The most notable of these for British fans would be the clashes between Wolves and West Brom fans at an FA Cup game in January.
The game was the first Black Country derby held in front of fans in 12 years.
Violence broke out in the stands after Wolves scored their second goal in the 78th minute. Opposition supporters were seen fighting each other and others invaded the pitch.
The game was halted and players left the pitch. Footage circulated online showing a man covered in blood being escorted away by police, while opposition supporters seemed to chant “let him die”.
There were flares in the away end, objects thrown at Tommy Doyle as he attempted to take a corner and a ball boy needed treatment after being hit with a missile.
The area that saw the violence, was close to where the families of the West Brom players were seated. Some players ran into the crowd, with Kyle Bartley carrying his child out. When the match resumed, he was substituted so he could remain with his children.
The stand where the violence occurred was supposed to only house the West Brom fans. E
Opposition supporters were seen fighting each other and others invaded the pitch
ALL CAPITALS IN TAB STADIUM SECURITY
61
The game was deliberately scheduled early to avoid day drinking and also allocated extra police officers
However, it is believed the violence began after some Wolves fans revealed themselves by celebrating the goal.
Due to the rivalry between the two teams, the game was deliberately scheduled early to avoid day drinking and also allocated extra police officers.
EUROPEAN FOOTBALL
A month before the above incident, forty-six Legia Warsaw fans were arrested after violence at a European tie with another West Midlands team, Aston Villa. Four police officers were injured in the violence with deputy chair of the West Midlands Police Federation saying at the time, that it was the worst football violence police had seen for decades. Police horses were punched and kicked and police dogs were injured after walking on broken glass. It is believed the violence began as 1,000 away fans were not given tickets. Aston Villa lodged a complaint with UEFA over the lack of cooperation by Legia club officials.
The game went ahead but, the Legia Warsaw fans were barred from entry. Some did manage to get in, but were kicked out when they were discovered. A special court had to be set up at Birmingham Magistrates’ Court to hear the cases.
In December, fans were banned from all topflight games in Greece after widespread violence and a riot in which a police officer was left with
STADIUM SECURITY
62 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58
life-threatening injuries. Following this, all 14 top-flight clubs will have to install surveillance cameras inside stadiums and use personalised ticketing systems that identify fans before they enter.
In France in October, an Olympique de Marseille v Olympique Lyonnais game was called off, when the away bus was hit with stones and beer bottles and the coach was injured.
LOOKING FORWARD
All of the above are relatively high-profile men’s football matches – other sports do not seem to be the scene of such serious incidents. Though the men’s Euros will take place in Germany this year, which has not seen such occurrences, there is still understandable concern that similar events may take place. It is hoped that lessons have been learnt from the police response to Wembley and the Stade de France, but the threats to the Champion’s League this year, also targeted Germany, where the threat from terrorism is considered to be high.
There will also be football at the Olympics in Paris. The men’s rugby world cup passed in France last year without serious incident. However, what occurred at the Stade de France – a venue that will be used during this year’s Olympics and Paralympics – is still fresh in people’s minds. There are many British, Spanish and French people, and others who will have seen what happened that would rather stay away for fears over their safety.
The French government has cut the number of spectators who will be able to watch the opening ceremony of the Olympics from the banks of the Seine
PREPARING FOR PARIS
The BBC reported that the French government has cut the number of spectators who will be able to watch the opening ceremony of the Olympics from the banks of the Seine, as they were worried about threats such as drone attacks. Originally free tickets were going to be given to 600,000 members of the public. However, now there will only be tickets for 300,000 invited guests.
President Macron even said the event could be moved to the Trocadero Gardens or the Stade de France if the risk was deemed too high.
There will be 20,000 soldiers and more than 40,000 police officers from France providing security, along with 2,000 troops and police officers from other countries.
Security services have also begun screening around one million people who will be involved in the games, including athletes, medical staff and volunteers, as well as those who live near the venue.
Germany has also stepped up security ahead of the Euros in June, including by introducing land border checks. L
ALL CAPITALS IN TAB STADIUM SECURITY
63
64 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58 PRODUCT FINDERS INSPECTAHIRE
(0) 1224 789692 AERIAL INSPECTION
+44
Inspectahire are proud to partner with the UK’s leading visual surveillance, scanning and monitoring technologies. We have led the way in providing the latest and most effective technologies to the security industry, governments, and critical infrastructure for over 35 years. www.inspectahire.com enquiries@inspectahire.com
COGNITEC SYSTEMS GMBH +49-351-862-920 FACIAL RECOGNITION sales-emea@cognitec.com www.cognitec.com From temporary to permanent, we have one of the widest ranges of physical security landscape protection solutions, providing a cutting edge in bollards, road blockers and barriers. Within our HVM (Hostile Vehicle Mitigation) product range we provide a diverse array of options including high level crash tested public and asset security to PAS68 and IWA-14 standards. ENVIRONMENTAL STREET FURNITURE 028 9036 4101 HOSTILE VEHICLE MITIGATION sales@worldofesf.com www.worldofest.com
Cognitec is the only company worldwide that has worked exclusively on face recognition technology since its inception in 2002, offering products for facial image database search, recorded video investigation, real-time video screening and people analytics, border control, ISO-compliant photo capturing and facial image quality assessment.
65 ISSUE 58 | COUNTER TERROR BUSINESS MAGAZINE PRODUCT FINDERS
CEIA 01789 868 840 PERIMETER SECURITY info@ceia.co.uk www.ceia.co.uk FRONTIER PITTS LTD 01293 422800 PERIMETER SECURITY Terra Bi-folding Gate. The dual leaf HVM Terra Bi-folding Speed Gate has been successfully impact-tested to the IWA14 Specification, stopping a 7.2t vehicle travelling at 30mph as well as being intruder resistant to LPS1175 SR2. The first VSB in the Red Book Live under dual certifications. www.frontierpitts.com sales@frontierpitts.com Defence & Security are sectors in which work is carried out in confined and harsh conditions. Mobile workstations from LISTA are the ideal solution. This modular system is ideal for a wide range of applications, diverse tasks, and extreme environments. Security and safety features ensure full functionality in any environment. LISTA UK 01908 222333 STORAGE SOLUTIONS info.uk@lista.com www.lista.com
CEIA (Company for Electronic Industrial Automation) was founded in 1962 in Italy when it began production of metal detectors for the textile industry, since then our product line has grown covering many sectors from military and security to pharmaceutical and food. CEIA provide a range of sophisticated technologies designed for the detection of threats.
66 COUNTER TERROR BUSINESS MAGAZINE | ISSUE 58 The publishers accept no responsibility for errors or omissions in this free service ADVERTISERS INDEX Advanced Perimeter Systems 46 Arktis Endurance Textiles IBC BBX Blocks 14 CEIA 52, 65 Charter Global 40 Cobwebs Technologies 25 Cognitec Systems GmbH 34, 64 CP Cases 28 Cranfield University 8 Critical Communications World 2024 IFC Durabook 6 Environmental Street Furniture 64 Frontier Pitts 48, 65 Heald 50 Inspectahire Instruments Company 64 Lista UK 10, 65 Logic Manufactured Bespoke 26 Meesons A.I. 16 SAFECROWDS 12 Streamlight BC Surelock McGill Group 4 Todd Research 32 ADVERT 020 8532 0055 www.psi-media.co.uk VISIT OUR WEBSITE TO SIGN UP FOR YOUR FREE DIGITAL SUBSCRIPTION www.counterterrorbusiness.com ISSUE 57 TRANSPORT SECURITY HVM PLANNING AHEAD FOR EURO 2028 With the UK and Ireland recently being announced as hosts, what security considerations should be taken into account? STADIUM SECURITY ADVERTISERS’ INDEX
Arktis was founded in 1985 by a former Royal Marine Commando determined to improve the function and performance of the standard issue combat uniform.
Today we have continued this mission, manufacturing specialist clothing & equipment for military units, police forces, and security personnel all over the world.
Arktis has developed a specialist reputation for designing and engineering some of the best quality, functional clothing & equipment on the market.
Our smocks, combat trousers, jackets, tactical vests, and specialist gear, have been tested to the extremes by military units in the toughest environments around the world. We believe it’s essential that those on the front line have the best equipment available to meet the hazards and challenges they face.
That is our mission.
To learn what we can do for you, contact - info@arktis.co.uk E
TLR® RAIL MOUNT LONG GUN SERIES
OPTIONAL MODELS: LIGHT ONLY OR LIGHT WITH RED OR GREEN LASER Made for situations when failure is not worth contemplating, Streamlight® has created the broadest range of professional torches and lighting tools that can be trusted for a lifetime. streamlight.com HPL FACE CAP FOR A LONGER REACHING, TIGHTER BEAM TLR® RM 2 LASER-G TLR® RM 1 LASER-R TLR® RM 1 LOW-PROFILE BODY. TIGHTER, LONGER BEAM REACH. OPTIONAL INTEGRATED RED OR GREEN LASER