Counter Terror Business 15

Page 1

www.counterterrorbusiness.com | ISSUE 15

CYBER SECURITY | MILIPOL PARIS 2013 | FORENSICS | PLUS MORE PERIMETER SECURITY

DSEI 2013

MARITIME SECURITY

NATIONAL SECURITY

NATIONAL THREAT LEVELS

Adapting your security plans in line with current threat levels CRITICAL NATIONAL INFRASTRUCTURE

KEEPING THE UK RUNNING

The need to protect the utilities sector from terrorist attack

EVENT PREVIEW

NEWS

el for ics Pan cted h t E f o le Chair don se in Lon urity head g in c li c e po eland S US Hom ominated n ckers in ing ha Recruit ernment gov

TRANSPORT SECURITY EXPO 2013

The industry gathers to discuss the major threats


Recognize and Analyze Is he a known suspect?

How old is she?

How often was he here this month?

Are they authorized staff?

When, where did she enter?

Is this VIP Mia Clark?

How many people are here? Is it too crowded in this area? FaceVACS-VideoScan uses premier face recognition technology to detect and identify persons of interest in real time while computing demographic and behavioral data, supporting security staff and operations management.

www.cognitec.com info@cognitec.com Cognitec develops market-leading face recognition technology and applications for facial image database search, real-time video screening and analytics, border control, and biometric photo capturing.


COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 15

CYBER SECURITY | MILIPOL PARIS 2013 | FORENSICS | PLUS MORE PERIMETER SECURITY

DSEI 2013

MARITIME SECURITY

NATIONAL SECURITY

NATIONAL THREAT LEVELS

Adapting your security plans in line with current threat levels CRITICAL NATIONAL INFRASTRUCTURE

KEEPING THE UK RUNNING

The need to protect the utilities sector from terrorist attack

EVENT PREVIEW

NEWS

el for ics Pan cted of Eth Chair don sele d g in Lon y hea policin eland Securit ed US Hom nominat kers in ing hac Recruit ernment gov

TRANSPORT SECURITY EXPO 2013

The industry gathers to discuss the major threats

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RECRUITING CONVICTED HACKERS: HIGH RISK? A recent BBC Newsnight programme explored the potential of recruiting convicted hackers within the UK’s new Joint Cyber Reserve Unit. Who better to help catch the cyber criminals than the [former] cyber criminals themselves? The head of the unit, Lt Col Michael White was questioned as to whether he would employ someone with a criminal record for hacking but had all the other skills. He said: “If they could get through the security process and if they had the right capabilities and the vetting authority were happy with that, then why not?” The point was made that there is a shortage of people with the types of IT skills that the cyber force unit is looking for and that hackers are some of the best talent. Dr David Day, a professor of computer forensics at Sheffield Hallam University, said it’s a “terrible shame” that certain reformed individuals who have been convicted of malicious hacking can’t get jobs in industry as they have the skills and capabilities needed. But former Lulzsec member Jake Davis said employers may be scared of dipping into the hacker recruitment pool: “If you are a black hat hacker you obviously have an ideology or some kind of inset belief which would scare the type of people that would be hiring in case of another Snowden situation. So it’s ironic because it would be highly beneficial to employ hackers, especially at a corporate level, but they are scared to do it.” Read the full story on page 7. Where do you stand? Email your views to editorial@psigroupltd.co.uk

Angela Pisanu

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Casey REPRODUCTION & PRINT Argent Media

© 2013 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

3


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS

07 CTB NEWS

29 MARITIME SECURITY

11 NATIONAL SECURITY

35 PERIMETER SECURITY

James Kelly, Chief Executive of the BSIA examines the critical nature of the UK’s ports and inland waters and how they should be protected

Chair of new Ethics Panel for policing in London elected; UK cyber defence unit could recruit convicted hackers; Obama nominates new Homeland Security head

11

Chris Phillips examines what the national threat levels mean to the nation, and how businesses should plan their response accordingly

15 CYBER SECURITY

Given the amount of attention that data breaches get and the wealth of standards and technology available to prevent them, why do they still occur, asks Mike Small

41 MILIPOL PARIS 2013

Milipol Paris, the international event for key players in the internal State security sector, will open its doors from 19 to 22 November 2013

An impressive 32,169 visitors attended DSEI 2013, a rise of 13 per cent on the previous record in 2011

The utilities sector is responsible for the critical elements of our everyday life, and as such, needs robust protection against terrorist threats, writes the BSIA’s James Kelly

26

Counter Terror Business magazine talks to Stephen Munden, manager of the PSSA’s Verification Scheme, about how the scheme is giving peace of mind to those buying perimeter products

51 DSEI 2013

19 CRITICAL NATIONAL INFRASTRUCTURE

15

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

61 BORDERPOL 2013

26 TRANSPORT SECURITY

The conference and workshops at Transport Security Expo will assess the transport threat horizon

This year, the World BORDERPOL Congress – on 3-4 December, Central Hall, Westminster, London – will be hosted by Border Force UK

23 FORENSICS

51

What does the counter terrorism investigative community need to know about the Criminal Procedure Rules? The Forensic Science Society’s Karen Squibb‑Williams, provides the answers

Fo featu r the late res st www and anal news, ysis .co busin unterterr , visit o ess.c om r

www.counterterrorbusiness.com | ISSUE 15

UE 15 .com | ISS

rbusiness

nterterro

www.cou

www.cou

nterterro

CYBER SECURITY | MILIPOL PARIS 2013 | FORENSICS | PLUS MORE PERIMETER SECURITY

ELLIGENC TION | INT IGA SUE 12 ICLE MITIS HOSTILE VEH s.com | DSEI 2013 nes

ICS E | FORENS

PER NATIONAL SECURITY IMETER

SECURITY

NATIONAL THREAT LEVELS

si rorbu SECURITY terter PERIMETER

.coun www

rbusiness

.com | ISS UE 15

MARITIME SECURITY

HOSTILE VEH ICLE MITIGA TION | INT ELLIGE

RE | PLUS MO

MARITIME

DSEI 2013

SECURITY

DSEI 2013

NCE | FOR ENSICS

| PLUS MO RE

MARITIME

Adapting your security plans in line with current threat levels

SECURITY

KEEPING THE XXXX UK RUNNING XXXXXX

UITY NTIN ESS CO BUSIN

mETEr | pErI

X XXXXXX mOrE XXXXXXXXX | plUS XX O 2013 XXXX XX XX pC | Ba XX TY XXXX rI XX SECU

Cover

The need to protect the utilities XX sector from terroristXXXX attack XXXXXX XXXXXX XXXXXX

and like

CRITICAL NATIONAL UCTURE INFRASTR

THE KEEPING S G NEWIN UK RUNN

for Panel Ethics cted

pol eland ed US Hom nominat kers in ing hac Recruit ernment gov

Counter Terror Business ists hacktivrism ainst ro ting agd cyber-ter Protec an

NT r EVEVIEW nte Cou t PREown to 2013 aon

ISM

TERROR

ntd xpo don Cou rror E , Lon -25 Te mpia l 24 Oly Apri

like dline in here Cover hea

this and like

| ISSU

E 11

NATION

TRANSPORT SECURITY EXPO 2013

UK RUNN E ING

Cover hea dline in here like this and like this

IEW

EVENT PREV

Y

s.com

AL REATS AN BUTH SINES D YOU SCov COerNhea dline in here TIN like this UITY |and PERI like this METER SECU RITY NATIONAL CRITICAL | DEF INFRASTR ENCE FOCU KEEPING UCTURE S|& TH

The industry gathers to discuss the major threats

T NSPORY Ur ’S YOCE? TRA CURIT E S HOWE N E 3 D F EXPO 201 SECURIT

sines

NATIONAL SECURITY THRE ATS

EVENT PREVIEW

this here like inir of dlineCha don selethis in Lon like Cover hea y head icing and Securit

CYBER

rorbu

NEWS

NATIONAL U D YO S AN like this THREAThea dline in here this

S NEW

www .coun

terter

CRITICAL NATIONAL INFRASTRUCTURE

NATIONAL ATS SECURITY THRE

MORE

CYBER SECURITY

www.counterterrorbusiness.com TRANSPO T SECU RY EXPO 2R0IT 13 What governments and industry can do together to protect against cyber threats

EVENT PREV

this

Cover hea dline in here like

ISm rrOrDEX8 al TE IN aring 15 d comp st time GlOB ing an r the fir

this and like

IEW

this

Rank tries fo coun

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE TRAN

SPORT

V

CE IllaN

PROT ECT SECURIT

Y

5



CYBER SECURITY

UK cyber defence unit could recruit convicted hackers Convicted computer hackers could be recruited to the UK’s new Joint Cyber Reserve Unit if they pass security vetting, the head of the unit Lt Col Michael White told Susan Watts on BBC’s Newsnight. When questioned whether he would recruit someone with a criminal record for hacking but had all the other skills, Lt Col Michael White said: “If they could get through the security process and if they had the right capabilities and the vetting authority were happy with that, then why not?” But Former Lulzsec hacker and spokesman Jake Davis said employers may be reserved to do so: “If you are a black hat hacker you obviously have an ideology or some kind of inset belief that the type of people that would be hiring would be scared of in case of another Snowden situation. So it’s ironic because it would be highly beneficial to employ hackers, especially at a corporate level, but they are scared to do it.” In the programme former Lulzsec hacker Mustafa al-Bassam and Dr David Day, a professor of computer forensics at Sheffield Hallam University – who helped convict him – meet for the first time. Following the interview, when questioned by Susan Watts as to whether he would employ Mustafa, Day replied, READ MORE: “he tinyurl.com/lhh7myf might.”

Somali piracy attacks at 7-year low Pirate attacks off the coast of Somalia are at the lowest level since 2006 because of tougher ship security and more Western naval patrols, while onshore al-Shabaab militants have shifted tactics to guerrilla warfare, the United Nations has reported. In a report to the UN Security Council, Secretary-General Ban Ki-moon said there were 17 attacks in the first nine months of 2013, compared to 99 attacks in the same period last year.

Russia drops Greenpeace piracy charges Russia has reclassified piracy charges against 30 Greenpeace activists with hooliganism charges. The new charge has a maximum penalty of seven years rather than 15. Greenpeace’s Arctic Sunrise vessel was seized by Russian forces as activists tried to scale an offshore oil platform. All 30 people on board were detained. So far all bail applications in the case have been refused. Russian President Vladimir Putin said last month that the activists had violated international law but it was “absolutely evident that they are, of course, not pirates.”

BORDER SECURITY

CYBER SECURITY

India and China agree on border defence

US cyber security framework for securing critical infrastructure

India and China have signed an agreement on border defence co-operation after tensions between their armies in disputed territory earlier this year. The deal aims to improve communication between the two armies. Chinese Premier Li Keqiang said it would help maintain border “peace, tranquillity and stability.” The two countries disagree over the demarcation of several Himalayan border areas and fought a brief war in 1962. Tensions still flare up from time to time. Both sides are keen to ensure that the spat does not derail a general warming in relations. The agreement was signed during Indian Prime Minister Manmohan Singh’s READ MORE: visit to tinyurl.com/n8n5t2a Beijing.

NEWS IN BRIEF

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A preliminary cyber security framework has been introduced in the US to help companies prevent critical infrastructure attacks. The framework from the National Institute of Standards and Technology (NIST) offers guidance that supports President Obama’s executive order issued in February on ‘Improving Critical Infrastructure Cybersecurity’. NIST has encouraged organisations to implement the voluntary framework, which is designed to complement an enterprise’s existing security management programme, rather READ MORE: than tinyurl.com/oqt7x4a replace it.

READ MORE:

tinyurl.com/qaq54ch

Obama nominates new Homeland Security head US President Barack Obama has nominated former top Pentagon lawyer Jeh Johnson as the new secretary of homeland security. He will replace Janet Napolitano, who announced her departure in July. Mr Johnson, 56, was a central figure in several key administration policies, including ending the Pentagon’s ban on openly gay members of the military. The former Pentagon and Air Force lawyer’s nomination must be confirmed by the Senate. READ MORE:

tinyurl.com/mwqgjtk

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

7


CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

POLICING

COUNTER TERROR EXPO

Chair of new Ethics Panel for policing in London elected

READ MORE:

tinyurl.com/ngbhknm

A series of new features has been planned for Counter Terror Expo’s 6th edition on 29 – 30 April 2014, at Olympia, London Protecting Critical National Infrastructure, government and businesses from malicious intrusion is the second major point on the UK’s National Security Strategy. The new Secure Communications and Cyber Terrorism Zone will provide a showcase of all latest technology and products designed to ensure coherent integration of cyber terrorism prevention aimed at mitigating this evolving security risk. With unmanned ground, air and sea vehicles having an increased adoption within government, law enforcement and businesses to deliver more cost effective, efficient and safer remote monitoring within hazardous zones, the introduction of the Unmanned Vehicles Zone will cater for this growing security sector. The Border Security and Access Control Zone introduced into CTX 2014 for the first time will showcase the latest technology vital to securing international borders. What’s more, the Integrated Security Zone will feature the latest range of CCTV, access control, perimeter protection and control room security technology, as well as showcasing integrated security platforms in action.

AIRPORT SECURITY

BORDER CONTROL

US Homeland Security to increase staff at Dublin Airport

New e-passport with added security features for Ireland

The US Department of Homeland Security is to boost the numbers of staff at its Customs and Border Protection facility at Dublin Airport. The move will enable all transatlantic Aer Lingus passengers to clear immigration before arriving in the US. At the moment, passengers from as many as 15 Aer Lingus flights a week are unable to clear US immigration in Dublin due to a staff shortage at the facility The CPB operates another facility in Shannon, and the two operations are currently the only such pre-clearance sites in the world, outside of Canada and the Caribbean. The pre-clearance allows fliers to land in the US as domestic passengers, enabling them to avoid lengthy immigration queues on arrival. The deployment of the additional personnel comes on the back of an influx of tourists from the US thanks to the ‘Gathering’ festival this year.

READ MORE:

tinyurl.com/p8hawo4

8

Lord Carlile of Berriew, QC, the former Independent Reviewer of Terrorism Legislation, has been appointed by Mayor of London Boris Johnson as chair of a new Ethics Panel for policing in London. The Ethics Panel, which will complement the existing structures in place in the capital that oversee the way the city is policed, will examine issues of public concern around the ethics and quality of policing and make recommendations. This will help to provide reassurance and boost public confidence in policing – a key challenge that the Mayor has set for the Met. The role of the Chair will be to act as an independent, public-facing figurehead to lead the work of the Ethics Panel. The Deputy Mayor for Policing and Crime Stephen Greenhalgh said: ‘I am delighted that someone with the seniority and expertise of Lord Carlile has agreed to serve London in this way. This new panel will be truly independent and will offer advice on ethical issues that will help the Mayor’s Office in its role to ensure the efficiency and effectiveness of the Met and to boost public confidence in policing.

New features for Counter Terror Expo 2014

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

A newly designed electronic passport (e-passport) has been rolled out in Ireland with added security features. The newly designed e-passport for Ireland uses the latest security technologies to protect citizens’ identities while providing the Government of Ireland with a flexible, efficient and highly secure passport solution. HID Global joined forces with DLRS Group, the leading security printing company in Ireland, and X INFOTECH, a leading system integrator and MultiPerso software suite developer, to implement the Irish e-passport project. The new Irish e-passport replaces the previous document, and provides an exceptional level of security including HID Global’s polycarbonate electronic data page with contactless chip inlays making the passports very hard to forge or copy. The new e-passports also incorporate HID Global’s innovative Crack Prevention Feature (CPF) that enhances the durability and reliability of polycarbonate e-passport datapages, especially those with embedded RFID chips. With CPF, governments can fully leverage the advantages of smart card technology and protect their investment by extending the life of ID credentials for up to ten years. X INFOTECH provided its MultiPerso personalisation solution for contactless chips including ICAO data preparation.

More than 630,000 Irish passports were issued in 2012 and the Republic of Ireland has approximately 4.5 million citizens who could potentially be issued READ MORE: these new tinyurl.com/ngbhknm passports.


FA R N B O R O U G H , 1 1 - 1 3 M A R C H

THE ONE EVENT THAT HELPS YOU COPE WITH ALL THE REST

CYBER SECURITY

POLICING

AVIATION SECURITY

COUNTER TERRORISM

Threats to our security are getting ever more sophisticated and prolific. This is why Security & Policing 2014 is essential for anyone responsible for Civil Protection or National Resilience.

✓ The only Home Office security event ✓ Security & Policing is FREE to attend ✓ Strict Home Office criteria will ensure a secure environment for visitors and exhibitors

✓ Network at the very highest levels of decision making ✓ Free to attend Government briefings ✓ Liaise with other agencies To register your attendance, or for more information, please visit www.securityandpolicing.co.uk or contact +44 (0)20 7091 7835



National Security

NATIONAL THREAT LEVELS

Security expert Chris Phillips examines our understanding of the UK’s national threat levels, what they mean to us as individuals and the impact they could have on businesses So what do the national threat levels mean to you? Do you know anything about them, or are they just something you read about in time of emergency? Really though, how much does your business understand the UK terrorism threat levels? What plans have you got should the threat level go up or down? If anecdotal evidence is to be believed, most businesses have no idea. This can be costly and very risky. I found it interesting recently to be confronted by three fully armed police officers – with machine guns – patrolling one of our London train stations. We’re used to seeing this type of patrol at airports but it was surprising to see what appeared to be paramilitary police officers working in close formation across the concourse of Euston Station. HEIGHTENED THREAT Such patrolling may be needed in times of heightened threat but we are currently in a situation where the terrorism threat level is judged by the Joint Terrorism Analysis Centre (JTAC) to be at moderate inside the United Kingdom. This is good news and is pretty low in comparison to much of the past 10 years when it has hovered between substantial and severe for most of the time. Having a terrorism threat level so high for so long has produced the effect of raising the levels of the normal. It would be interesting to conduct a survey to gauge how many people

view machine-gun-toting police as reassuring or proportionate in the present security situation. I think we are all in agreement that there is a need for firearms officers in the background, ready to respond at short notice. The terrible incident earlier this year in Woolwich required that response, and an excellent job those officers did, too. But I don’t believe we are ready for, or even want, regular armed foot patrols – either in a train station or on the high street. My guess is that it raises fear levels when a single unarmed officer in a Bobbie’s helmet would help reassure the public that things are as normal. And where do we go from here? If this is the type of policing at train stations when the threat level is at moderate, what can we expect should the threat levels increase to substantial, severe or critical? Maybe machine gun posts behind sandbags at the doors, as I witnessed recently in Pakistan? Heaven forbid. Those of us who were aware of the policing arrangements after the terror attacks in 2005 will be aware that the British Transport Police (BTP) didn’t have a firearms section

Written by Chris Phillips

NATIONAL THREAT LEVELS AND YOU at that time, and had to request assistance from Home Office forces to carry out armed patrols. This situation has clearly changed and I fear that now the BTP have the resources, they feel the need to use them even when there is no good reason. Who has made the decision to carry out routine firearms foot patrolling at train stations? This, of course, has much wider implications for policing in the UK. We proudly hold on to our unarmed police forces and, time and again, the public and officers themselves refuse to go down the ‘permanently armed’ route. Long may that continue.

BUSINESS PLAN So, let’s bring this into the We’re world of commerce. Does o t used ed your business actually rm a g have adaptable plans n i e , se orts p r i which alter in the a t a patrols s surprising light of the threat to a people, assets, but it w rmed officers your information and reputation? If you have, to see aing in close how do you decide to work tion in a implement them and, a m r fo ation crucially, how do you decide train st to come back down to a normal state when the threat decreases? If you have the specialist services, the extra guards, the spanking new bits of unwieldy kit and layers of security in place around your assets, how do you decide to put them back in the cupboard? It’s all about planning. Most businesses, especially those in the centre of cities, E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

11



NATIONAL THREAT LEVELS

About the author Chris Phillips GCGI FSyI is Founder and Managing Director of the International Protect and Prepare Security Office. He started the company after thirty years as a Police officer. Working as a Police Security Coordinator (SECCO), he co-ordinated the Counter Terrorist security for visits to the UK from foreign governments and dignitaries. His specialism however is in the field of strategic Counter terrorism advice and best practice. He had three major responsibilities within the United Kingdom. Within this role he developed National Strategies for these work streams and especially for the protection of Crowded Places. He has written many articles for magazines and is frequently quoted in the newspapers and has appeared as a commentator on all the main News Channels. Since retiring from NaCTSO he has worked as a consultant with blue chip companies including Aon, Marks and Spencer, Regester Larkin and Sodexo. Chris is a fellow of the Security Institute.

Does your business actually have adaptable plans which alter in the light of the threat to your people, assets, information and reputation?  have plans, such as the kind which have been agreed at some stage in the distant past, and may get watered down with use and budget reductions. We all know that security is one of the first areas to feel the economic downturn (arguably it should be the last but that’s for a different debate). But how many businesses have really thought of their actions should a major emergency strike? What if they get a visit from counter terrorism officers telling them they may be the target of a terrorist plot? What if a major security incident happens that puts a business in the firing line? What’s your plan to increase security? Who makes the decision? If you have a plan, are you able to increase in line with its recommendations? PLAN AHEAD So many plans make assumptions about extra resources that are unlikely to be able to be fulfilled. If you need extra guards, I can guarantee that many others are thinking exactly the same and putting in requests. Let’s hope you get in first. To some extent, increasing security is relatively easy. But a well thought-out

risk assessment should also give you an evidence-based rationale for reducing back down to normal security levels. The best security in my mind is that which has been thoroughly thought through. By far the best way of defeating terrorism is for us to understand the threats but carry on as normal, as much as is humanly possible. Have a security plan which allows you to increase and decrease security as necessary. Ensure someone at a senior level in the organisation is making decisions on the level your security team is working. Communicate changes to staff and allow them to understand why extra measures are in place. You should also engage all staff in a security culture in your organisation. An organisation that involves all the workforce in the security effort is about as good as you can get. In summary, for businesses: you should make sure your plans have different levels so you can increase security in times of higher threat and decrease when times are good. Don’t wait for the emergency to think of making these plans, there really is no time like the present. L

National Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

High Performance Antennas for Countermeasures, where Security is Critical Directional Planar Spiral Antennas High Power, 0.15 to 15GHz

Phase Matched Cavity-Backed Spiral Antennas

Ultra Wideband Omni Antennas, 0.1 to 18GHz

Multiple Bands in Stacked Omni Array

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture The most important thing we build is trust

High Power Planar Spiral

Ultra Wideband Omni-Directional

• Directional, ultra wideband, high power • Bandwidths up to 30:1 • Ultra slim

• • • • •

Cavity Backed Spiral • High fidelity monotone patterns • Direction finding systems • Phase and amplitude matching available

Biconical omni-directional antennas Fully efficient Vertically polarised Bandwidths from 3:1 to 30:1 Multi-stacked omnis for versatile configurations

Cobham Antenna Systems, Microwave Antennas Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, United Kingdom T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

13


ADVANCED TARGETED ATTACKS. WE GET THEM BEFORE THEY GET YOU.

There is a new threat landscape. You may think your existing security defenses prevent the next generation of threats from entering your network and stealing your data. They don’t. Attacks such as spear phishing or APTs easily evade firewalls, IPS, AV and gateways. Your best defense is FireEye. Trusted by the top companies in the Fortune 500, FireEye is the global leader in stopping the next generation of threats.

Visit www.FireEye.com/StopAPTs and let us help you close the hole in your network.

© 2013 FireEye. All rights reserved.


INFORMATION SECURITY

DOING AWAY WITH DATA BREACHES

tion Informa losses d leaks an any ways, m occur in from misuse, ranging ling and theft d mishan ta by insiders of da rnal attacks to exte stems and on sy ple peo Information is the currency of the 21st Century. People likely would not treat money with the same disregard that they treat information and data. Taking care to look after property that is not your own is called stewardship. Information stewardship is not a new term; it has been in use since the 90s and covers the wide range of challenges involved in managing information as a key organisational asset. These include the management of the whole information lifecycle from ownership to deletion, as well as aspects such as business value, data architecture, information quality, compliance and security. However the focus has previously been on areas other than security. Information leaks and losses occur in many ways, ranging from misuse, mishandling and theft of data by insiders to external attacks on systems and people as well as system failures and accidents. Recently, there has been an increase in the frequency of coordinated attacks on organisations with the objective of stealing information. However, many data breaches stem from mishandling of data or from well-known technical issues for which there are easy remedies. BASIC SECURITY MEASURES NEED CAREFUL ATTENTION The processing of data in datacenters, outsourcers or the cloud has several risk points. From the 2013 Verizon report, the second largest percentage of data breaches were from servers. This was down from last year but still indicates that basic technical security measures, such as configuration and patch management,

still need careful attention. The staff in the data centre may have privileged access to systems for administrative purposes. Automated services may also have elevated privileges (backup systems, for example). This privilege may be abused or subverted and data may be stolen or misused. Media need careful handling - there are a number of reported cases of data being found on storage devices that had been disposed of but were later acquired through auction sites. Backup media may be lost in transit. MOBILE RISKS Portable devices, such as laptops, tablets, smart phones and USB media, are a significant risk. For the first time, according to the Verizon report, the end user-device was the one most likely to have been compromised during 2012. These devices may contain sensitive data and are frequently lost or mislaid by their owners. Data may be misused by insiders by copying to these kinds of devices (often against corporate governance rules). This copying may not be malicious but rather a misplaced attempt to improve efficiency. Data may be printed out and then the printout may be lost or disposed of without due care. Sensitive or regulated data may be emailed outside of the organisation or to people who ought not to have access. As is often the case, the weakest link may be the people in the organisation. Information can be given out inadvertently or deliberately using the phone, fax or postal mail. Only recently, a list of missed UK government targets came to light when an advisor was photographed carrying a document in

Written by Mike Small CEng, FBCS, CITP, London Chapter, ISACA

Theft and loss of information from organisations continues to be a significant problem. Given the amount of attention to this problem and the wealth of standards and technology available, why do these data breaches still occur? Mike Small examines the situation

Downing Street. Documents can be lost inside or outside of the organisation’s premises. Ill-judged conversations in public can be overheard or people can pass information on to increase their social standing. The Information Commissioner’s Office (ICO) provides a large number of examples where personal information has been mishandled. Information stewardship uses good governance techniques to implement information-centric security. Information stewardship involves the business as well as the IT services group. Line-of-business managers, application owners and everyone who touches information are involved, as well as the IT service providers. It creates a culture where the people in the organisation understand the sensitivity of information and the ways in which this information can be put at risk. It applies best practices and uses the most appropriate technologies to protect information. It makes sure that the organisation is resilient to loss of data by protecting information against that eventuality. And, when the seemingly inevitable leakage/loss occurs, information stewardship provides the resilience necessary to mitigate the damage and restore both the information as well as the trust of users.

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COBIT 5 FRAMEWORK The COBIT 5 framework makes a clear distinction between governance and management. These two disciplines encompass different types of activities, require different organisational structures and serve different purposes. Governance ensures that stakeholder needs, conditions and options are evaluated to determine balanced, agreed-on enterprise objectives to be achieved; setting direction through prioritisation and decision making; and monitoring performance and compliance against agreed-on direction and objectives. Management plans, builds, runs and monitors activities in alignment with the direction set by the governance body to achieve the enterprise objectives. Implementing information governance comprises three major phases. The initial phase is to understand the business needs and obtain approval for a plan of action. A key objective of this initial phase is to get executive sponsorship. This sponsorship is critical to the success of information governance projects. The second phase is to define the changes needed by the organisation and culture, and leads to a clear assessment of the information risks. The third phase is to implement best practice, secure the infrastructure, monitor the controls and implement continuous improvement. E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

15


Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INFORMATION SECURITY  UNDERSTANDING WHAT IS AT RISK In the classical model, information and data have a business owner who classifies its value to the organisation and the impact of threats. The data is then created by and used by business processes; and it is eventually deleted according to policies, when no longer required to be retained. However, information is increasingly created in an unstructured form (like emails, documents, spread sheets and presentations) almost everywhere in the organisation. This explosion in unstructured information changes the balance. Now, anyone who writes an email or creates a document is responsible for recognising the sensitivity and value of the information it contains. Hence everyone in the organisation needs to understand and accept this new responsibility. Big Data also introduces new challenges to information stewardship. Big Data involves absorbing and analysing large amounts of data that may have originated outside of the organisation that is using it. If you don’t control the data collection process, how can you be sure of the data source and integrity? How do you know you have the right to use the data in the way that is being planned? These points are brought out very clearly in a UK report on the use of smart metering of power consumption by utility companies. Human behaviour is one of the key factors to achieving information stewardship. Many factors drive the way people behave and it is a challenge for management to ensure that these are taken into account. Within all organisations, the people have attitudes toward the security of information. The task is to align these attitudes with the needs of the business and how different kinds of information need to be handled.

benefits. What is needed is a positive image for security as an enabler. One of the key activities in changing perception is through an internal marketing campaign to rebrand information security in a positive way. Creating information stewardship ‘champions’: people within the organisation who are respected by the people in the organisation because of their role or their track record are needed to champion information stewardship. Education, Teaching and Mentoring: the value of information should be clearly communicated. This should be supported by clear information security guidance (e.g., policies) and training on how to apply them. Rewards and sanctions: Everyone should be able to see that information security is practiced in daily operations. There is visible management support for information security and there are clear sanctions against people who deliberately flout the rules. CREDIBILITY PROBLEMS IT organisations have not been well connected to the business and this has led to problems of credibility and to lines of business bypassing the disciplines involved in securely delivering IT services. Many IT organisations are structured as siloes, each focusing on a different technical area or topics that are not well aligned with what the business and security needs are. Information stewardship involves the whole organisation – not just the new business‑oriented IT department. These roles and responsibilities overlap between IT and business. They necessarily involve IT services because that is where the data is held and processed. They involve the business because that is where the information is owned, created and used. The key new role is one

From the 2013 Verizon report, the second largest percentage of data breaches were from servers. This was down from last year but still indicates that basic technical security measures, such as configuration, still need careful attention The Business Model for Information Security (BMIS), a model released by ISACA, urges enterprises to adopt an intentional culture of security. Principles from BMIS are now incorporated into COBIT 5, and a new publication, COBIT 5 for Information Security. A guide from ISACA, titled Creating a Culture of Security, explains how enterprises can put one in place. According to this guide, management needs to show leadership; however, creating a culture is not simply a serial process; it requires intentional shaping and direction in a number of dimensions. Changing the perception of security: Security is often seen as a negative thing; something that prevents actions without there being a clear understanding of the risk or the

16

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

responsible for creating and maintaining the information stewardship culture. Everyone who touches information and data has a responsibility for its stewardship. It is important to assign responsibility for creating this information stewardship culture. For example, it could be a specific role or an additional responsibility of the chief information security officer (CISO). However, for this role to be successful, it needs marketing and change management skills as much as it needs traditional security skills. Another key to information stewardship is the adoption of best practices to secure information and IT services. These best practices represent the combined knowledge of the best brains in the industry. However,

About the author Mike Small is a member of the London Chapter of ISACA Security Advisory Group, a fellow of the BCS, and an analyst at KuppingerCole. Until 2009, Mike worked for CA where he developed CA’s identity and access management product strategy. He is a frequent speaker at IT security events around EMEA.

ABOUT ISACA

With more than 100,000 constituents in 180 countries, ISACA is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA Journal, and develops international IS auditing and control standards. The COBIT framework helps enterprise fulfill their IT governance responsibilities.

ISACA Knowledge Center: www.isaca.org/knowledge-center ISACA on Twitter: https://twitter.com/ISACANews ISACA on LinkedIn: http://linkd.in/ISACAOfficial

be selective – not everything will apply to your organisation. In addition, it is important to require any outsourced IT services providers to also follow these standards. Two important sources of best practices are COBIT from ISACA and ISO/IEC27001. CREATING OPTIMAL VALUE COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. Simply stated, it helps enterprises create optimal value from information technology by maintaining a balance between realising benefits and optimising risk levels and resource use. COBIT 5 for Information Security, builds on the COBIT 5 framework in that it focusses on information security and provides more detailed and more practical guidance for information security professionals and other interested parties at all levels of the enterprise. ISO/IEC 27001:2005 is a well-established standard that provides a code of practice for information security management. It is supplemented by ISO/IEC27002:2005 which provides detailed advice and control objectives. The standard identifies 134 controls and provides detailed advice on this subject. L FURTHER INFORMATION www.isaca.org.uk


CYBER SECURITY

After previously discussing the US approach to Critical National Infrastructure (CNI) cybersecurity for the energy sector and power grid, here, Lila Kee of Globasign, explains how Public Key Infrastructure (PKI) can secure CNI networks against advanced cybersecurity attacks Recent headlines and mounting evidence suggest that cyberattacks on Critical Infrastructure (CI) systems are increasing as cybercriminals have identified electric utility grids as prime targets for disruption activities. As a result, CI cybersecurity has become a prime concern for governments and citizens alike. THE USE OF PKI IN SECURING CNI In recent months, US wholesale energy participants have shown that CI providers can strengthen cybersecurity by implementing standard-based PKI. The US energy sector contains more than 6,413 power plants (including 3,273 traditional electric utilities and 1,728 non-utility power producers) with approximately 1,075 gigawatts of installed generation. Electric power providers, the wholesale energy market, regulators and market participants are embracing PKI as a secure, scalable, flexible and cost-effective method to securely authenticate the digital identities involved in the wholesale electricity market. Independent systems operators (ISOs), which coordinate, control and monitor electrical power system operations from state to state, are using PKI standards developed by the North American Energy Standards Board (NAESB) to strengthen security for their cyber-based business processes and transactions. PKI is a robust technology that provides a method to securely authenticate digital identities on large and complex networks, such as those that manage business processes for the wholesale electric market. However, due to the many implementation details involved, if the technology is not executed correctly it can also produce a vulnerable system. NAESB members have produced a standard for the wholesale energy sector that is based on best practices, proven management techniques and advanced digital certificate technologies. IMPROVED SECURITY FOR ALL In the wake of increasing attacks, US CIs are stepping up efforts to amplify their cybersecurity and strengthen defenses. In fact, in GlobalSign’s previous article it noted that in President Obama’s recent Executive Order, the National Institute of Standards and Technology (NIST) was directed to lead the effort to develop a

cybersecurity framework that would consist of adopting industry best-practices wherever possible. As part of NIST’s draft cybersecurity framework of best practices, guidelines and standards, the NAESB standard on PKI stands a good chance of being applied to other CI sectors. All CIs are managed, controlled and accessible via internet-connected systems, making them vulnerable to cyberattacks. ISOs in the energy sector have recognised the value of cybersecurity frameworks, have adopted standards developed by NAESB and have demonstrated that standards can be developed using shared expertise from both the public and private sectors – setting a framework for all US CI sectors. With regards to protecting the CNI in the UK and Europe, The European Programme for Critical Infrastructure Protection which is leading the EU initiatives for European stakeholders, could potentially benefit from this recent US development.

fortify our cybersecurity framework,” said Rae McQuade, president of NAESB. “In establishing these standards we hope to provide a strong cybersecurity strategy so that we may best protect the business practices related to the electricity market that is a critical part of the everyday lives of our citizens.” As part of the standard PKI development, NAESB has also adopted an accreditation specification that describes the minimum requirements an authorised certification authority (ACA) must follow. NAESB recognises the fluidity of cyber threats and expects the PKI subcommittee to continue to review ACA specification for areas that may require changes in the future. When such areas are identified, NAESB will make the appropriate changes. While most CIs have recognised that they need improved cyber defences, most have not yet made the tremendous strides forward that the energy sector has made. L

NAESB: CYBERSECURITY STANDARDS ADOPTION Through the adoption of these standards, NAESB and its member organisations believe that cyber defences have been significantly strengthened and the possibility of a successful attack that could impact the operations or well-being of the nation’s electric power supply has been greatly reduced. “NAESB has made it a priority to establish PKI standards to

FURTHER INFORMATION Tel: 01622 766 766 press@globalsign.com www.globalsign.co.uk

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

Written by Lila Kee, Chief Product Officer, GMO GlobalSign Inc

HOW PKI CAN SECURE CRITICAL NATIONAL INFRASTRUCTURE

Advertisemenr Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

17



UTILITIES SECURITY

KEEPING THE UK RUNNING

The utilities sector is responsible for the critical elements of our everyday life, and as such, needs robust protection against terrorist threats. James Kelly, chief executive of the British Security Industry Association, discusses the security options available to protect our critical energy and water supplies

In the event of a potential attack, the ability to effectively secure a wide range of infrastructures is of the utmost importance to government agencies, the police and security managers. This is especially true for the utilities sector, which is responsible for the critical elements of our everyday life including the water and electricity supply, gas and oil. The growing scope and impact of this sector in almost everything we do has greatly increased its vulnerability to threats such as terrorism and vandalism; therefore, utilities companies must adopt security solutions with longevity. Recently, Channel 4 aired a faux-documentary entitled Blackout; a dystopian drama that envisioned what would happen if the UK suffered a massive power failure following a suspected cyber-attack on the national grid. As expected, the narrative depicted a state of disarray, with citizens feeling completely unsafe in a hostile new world. While this was a fictional TV feature, the threat of such an attack is still very real. CYBER SECURITY Cyber security has become a much bigger priority in recent years, with the threat of an attack encompassing everything from online shopping, e-mail, banking and e-commerce to mobile phones, social networks and online gaming. Alongside these daily ‘essentials’, it also includes our national infrastructure, identity fraud and global terrorism; and if terrorists were able to gain control of our national infrastructure, such as the power grid, there could be harrowing results. It could be considered that the first step in reducing this risk is recognising that it exists. In the past, companies have been urged by the Centre Protection for National Infrastructure

to consider security, and as a result, analogue security systems were soon replaced by new firewalled IP networks, local control rooms were hardened and CCTV monitored, vulnerable points were risk assessed and critical networks were isolated from unsecured corporate data via private networks (VPN). The idea of a power plant being disabled or taken over by cybercriminals is a very real threat, whether it be by organised groups or even individuals bored with creating simple email viruses and looking for a new challenge to overcome. As such, it is essential that businesses continue to invest and secure these crucial industrial networks by adding a robust layer of security. While this type of security exists at a cyber-level, there are also some physical measures that can be implemented as well.

BALANCE THE NEED FOR HIGH SECURITY Security solutions should offer temporary access to mobile employees whilst balancing the need for high security, the ability to withstand attack and cope with potentially corrosive conditions due to extreme weather. Access control systems can offer a wide range of benefits and provide the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and around a building or site. Mike Sussman, Chairman of the BSIA’s Access Control Section, comments: “Having access control technology in place will not only deter criminals, but can physically prevent them from entering the site, whilst offering a versatile and costeffective way to regulate entry to premises.” Access control readers can also offer temporary PIN access via SMS or card‑based access, assigning user rights via GSM systems, helping to ensure the utilities sector’s need for flexible and secure solutions. These systems can be useful at both remote locations and at administration and production facilities which also require high security and management of access, as disruptions in operations as a result of security breaches can have devastating effects on our infrastructures.

ACCESS CONTROL As well as cybercrime, utility companies are exposed to a number of risks including natural disaster, theft and internal crime. The utilities sector is characterised by its large number of remote locations, as well as its multi‑site offices and production facilities which are used by a variety of people every day. These remote locations offer practical challenges in themselves. For one, these premises need to be secure yet accessible around the clock. With maintenance visits being irregular and often conducted by different staff, keys are constantly changing hands, subsequently increasing the security risks and potentially resulting in theft,

WHERE IT HAS HELPED The Norec Limited Liverpool Bulk Terminal dock at Bootle is a coal importing facility which supplies the various power stations of energy giant E.ON. Norec stores and distributes coal via road and rail, and runs and performs maintenance on the Merseyside site on behalf of E.ON. The Terminal was looking for a reliable smart card attendance and security regime due to occasional threats from people such as protestors. “People are visiting us all week and we needed a secure access and time and attendance system that would match our special requirements,” explained Jimmy Finch, Deputy Supervisor and Engineering Planner. E

The utilitiess sector ied by eris charact number of its largee locations, remot fer practical f which ollenges in cha lves themse

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

Written by James Kelly, chief executive, British Security Industry Association

vandalism or acts of terrorism. Reliable and professional companies will understand the requirement for robust solutions, with security systems offering physical security as well as flexibility in terms of access control.

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

19


INDUSTRIAL OPTICAL SYSTEMS DIVISION

H63ZME-F-HD-PR01 63X ZOOM LENS

RICOH ENHANCED BINOCULARS

...for Security Installations

...for perfect mobile Security

The lenses zoom range is 20 to 1,250 mm, and when the internal 2X extender is switched in, the focal length increases to 40 to 2,500 mm. With 2,500 mm focal length at 1,000 m distance, the field of view is 2.5 m by 1.9 m. The extremely high magnification in combination with HD resolution means a person can be identified at distances in excess of 1 km. Therefore, this lens is ideal for video surveillance in city centers, air ports, harbours, as well as at the border, intersections, city streets and highways. The integrated PAIR Technology reduces the affect of particles in the air, such as fog, rain, sand, smoke and snow.

The perfect solution for enhanced mobile security: Digital binoculars with electronic image stabilisation for clear viewing without image shake even in fog or after dark. Designed to give you a clear view of the subject you want to look at, even in the harshest of environments. Equipped with water and dust-proofing and a functional design that is easy to use even with gloves on! Records still images and videos of the scene, straight to SD card. Displays latitude and longitude of the scene via on-board GPS technology. Integrated PAIR Technology allows liquid and solid interference to be reduced for a clearer, sharper view.

Atmospheric Interference Reduction

Atmospheric Interference Reduction

Up to Full HD Resolution

Up to 2,500 mm Focal Range

Day & Night

High Speed Motors

RICOH IMAGING UK Ltd. Industrial Optical Systems Division Heron Drive, Langley, Slough SL3 8PN, United Kingdom Office: +44 (0)1753 211071 Email: iosd@eu.ricoh-imaging.com

2 Megapixel

Image Stabiliser

Night Vision

GPS & Electronic Compass

Video Recording

Waterand Dustproofing

PLEASE CONTACT US FOR MORE DETAILED INFORMATION ON OUR PRODUCTS OR VISIT OUR WEBSITE

www.pentax-security.com


UTILITIES SECURITY  A BSIA member provided this solution in the form of an access control system which incorporated time and attendance software and a fire roll call monitoring facility where the dock’s employees use contactless smart cards to clock in and out, or to book jobs and absences. The system also triggered the opening and closing of the site’s security gate, with the control of the safety gate being automatic. “Now no-one can get on-site without using a card to go through the gates, so the system works very well as far as security is concerned,” commented Jimmy. THE BENEFITS OF INTEGRATION Access control systems can also be usefully integrated with other security measures, such as CCTV technology, for an even more comprehensive security plan. One major benefit of this type of integration is pre and post-even video recordings which are initiated by the access control system. Video recordings can be linked with event information, which makes searching for a particular event on the recording much more efficient. For example, if an intruder has entered a premises and attempted to breach an access controlled area by forcing a door, operators can search for ‘Door forced – control room 4’ allowing them to easily take a look at images of the intruder and respond accordingly.

This kind of integration can also be beneficial in terms of human resource management. CCTV can be combined with Time and Attendance systems in order to detect the occurrence of ‘buddy‑clocking’ – when employees clock each other on and off work – thus making sure that everyone is working their appropriate hours and no one is treated unfairly. SECURING THE PERIMETER Whilst carrying out security measures within a premises is extremely beneficial, implementing new systems on the outside can be equally as crucial. It is often said that the perimeter is one of the most essential places to be secured; the sooner a threat can be detected, the more time and space personnel have in order to respond. An increased response time means a greater possibility of a safe resolution to security breaches, giving the operating body the time to gather adequate force and countermeasures to deal with the danger. In the event of violent attacks, extra seconds could save lives, and any delay or forewarning of such an attack is critical in preventing it. Such measures can include physical obstructions such as security fencing, gates and wire obstacles, which are useful in deterring any would-be threat. The overt presence of such measures may stop an act of criminality or terrorism at the outset, presenting an

image of impregnability that might dissuade those seeking unauthorised access. COVERT SECURITY The unfortunate downside to overt perimeter security measures is, however, that they are by nature easily detected, and thus can be avoided or compromised by individuals with time, skill and preparation. Thus, an alternative measure is to use covert systems that are less obvious to the observer, and consequently less likely to be bypassed by a criminal element. Particularly effective forms of covert security include heat and motion sensors that are hidden and connected to alarm systems. Known as Unattended Ground Systems (UGS), when activated they enable an early warning system, giving personnel time to respond effectively.

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CHOOSING QUALITY When it comes to protecting our national infrastructure, no corners can be cut, particularly when choosing a quality supplier. It is absolutely crucial that your security provider meets with the essential British and European Standards for their product and service; members of the BSIA are all inspected to high quality standards and can offer a reputable service. L FURTHER INFORMATION www.bsia.co.uk

Lincoln Security are experts in providing physical and electronic security solutions Lincoln Security are a major supplier and reliable infrastructure partner to a significant number of high profile critical national infrastructure companies across the UK. Our product independence enables us to offer bespoke and innovative physical and electronic security solutions in areas of sensitivity, CNI, Government and Transport.

• • • •

LPCB Steel Doors LPCB Timber Doors Mechanical Locking Solutions Electromechanical Locking Solutions • Intelligent Intruder Detection Systems

For more information, please contact us at: Lincoln Security, 79-83 High Street, Lincoln, Lincolnshire LN5 8AA T: 01522 532038 F: 01522 536060 www.lincolnsecurity.co.uk info@lincolnsecurity.co.uk

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

21



FORENSIC REPORTING

IN THE INTERESTS OF JUSTICE

CRIMINAL PROCEDURE RULES Part 1 of the Criminal Procedure Rules sets out the overriding objective, which is that “criminal cases be dealt with justly.” This includes: acquitting the innocent and convicting the guilty; dealing with the prosecution and the defence fairly; recognising the rights of a defendant, particularly those under Article 6 of the European Convention on Human Rights; respecting the interests of witnesses, victims and jurors and keeping them informed of the progress of the case; and dealing with the case efficiently and expeditiously. The duty of each participant in the conduct of each case includes: the preparation and conduct of the case in accordance with the overriding objective; and compliance with the Rules, practice directions and directions made by the court. Part 3 of the Rules sets out that the duty of the court is to further the overriding objective by actively managing the case, which includes: the early identification of the real issues; the early identification of the needs of witnesses; achieving certainty as to what must be done, by whom, and when, in particular by the early setting of a timetable for the progress of the case; ensuring that evidence, whether disputed or not, is presented in the shortest and clearest way.

Written by Karen Squibb-Williams, director of communications and in-house counsel, The Forensic Science Society

What does the counter terrorism investigative community need to know about the Criminal Procedure Rules? The Forensic Science Society’s new director of communications and in-house counsel, Karen Squibb-Williams, provides the answers and highlights the importance of ‘Streamlined Forensic Reporting’

Streamlined Forensic Reporting (SFR) has been designed to enable investigators, scientists and lawyers to comply with the Criminal Procedure Rules (CrPR), in the interests of justice. “The Criminal Procedure Rules give courts explicit powers to actively manage the preparation of criminal cases waiting to be heard, to get rid of unfair and avoidable delays.” SFR objectives are to reduce costs and delay associated with forensic evidence where such evidence adds no value to the administration of justice. It also aims to provide a stronger basis for Stage 2 forensic reporting through compliance with CrPR, and Part 3, rules 3.2 and 3.3, which set out the Court Case Management requirements for the early identification of real issues.

Forensics

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

BETTER PRE-TRIAL MANAGEMENT The primary purpose of robust pre-trial management is to narrow down the real issues, particularly those of a scientific nature, upon which the jury must decide. SFR is a revised case management procedure for producing forensic evidence at court and seeks to reduce unnecessary costs, bureaucracy and delays in the

SFR ans is a me ing the nt of preseof forensic results exhibits in tests of l cases, in a crimina form that single multiple serves oses purp

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

23


Marshall Aerospace and Defence Group is one of the largest privately owned and independent aerospace and defence companies delivering innovation and excellence in engineering and support solutions in the air, on land and at sea. We designed, developed and manufactured a portable DNA capability to produce indisputable evidential grade results anywhere in the world. We were delighted to be recognised in the 2013 Queen’s Award for Enterprise in Innovation.

DNA

Innovation and Excellence in Engineering and Support Solutions.

marshalladg.com/forensics


FORENSIC REPORTING

SFR is a fair, transparent, efficient process which is designed to further the overriding objective of the CrPRs, to deal with cases justly. It requires nothing more than that the parties and the courts comply with their exsiting respective duties under the Rules  through the early preparation of a short report that details the key forensic evidence the prosecution intend to rely upon. The aim is to achieve early agreement with the defence on forensic issues but where this cannot be achieved in the first instance, to identify the contested issues. Effective use of SFR will lead to: “a lower risk of discontinuance, likely to be due to case papers being better prepared and the defence being informed of the evidence at the earliest stage; an improvement in the early guilty plea rate, resulting in fewer cases coming to trial unnecessarily, helping to ease the pressure of trial dates and associated costs; and a reduction in the number of cases requiring additional forensic evidence, saving time and costs associated with gathering this evidence.” The former Senior Presiding Judge for England and Wales, the Right Honourable Lord Justice Goldring, supported the national introduction of SFR by saying: “In short, everything suggests that SFR can deliver significant benefits to the courts, prosecution and defence. Court time is saved. Unnecessary forensic work is avoided. Unnecessary prosecution work is avoided. The defence are better able to focus on the real issues and appropriately advise their clients.” THE LAWYERS’ PERSPECTIVE SFR is a means of presenting the results of forensic tests of exhibits in criminal cases, which in most instances are unlikely to be in dispute, in a single form that serves multiple purposes. Its purposes and benefits include enabling experts to produce their findings as early as possible after a forensic result is obtained and enabling experts to produce their findings in the most cost effective way. SFR ensures that further analysis is confined to cases and issues where there is a real issue with the forensic evidence, and it ensures that investigators have accurate information to conduct investigations, make arrests and conduct interviews. SFR helps police and prosecutors to make early and informed charging decisions, and ensures that the defence is able to have early sight of the Initial Details of the prosecution case. It ensures that early and informed pleas can be entered by defendants, and provides a format for the prosecution to serve as part of its case for committal, service or trial. SFP provides a format for evidence to be

presented in the shortest and clearest way by s10 admissions made pursuant to the CrPRs; it assists the courts to fulfil their CrPR duties actively to case-manage cases; and provides a platform and means for the real issue which any further forensic work must address. ASSISTING COMPLIANCE SFR is a fair, transparent, efficient process which is designed to further the overriding objective of the CrPRs, to deal with cases justly. It requires nothing more than that the parties and the courts comply with their existing respective duties under the Rules. SFR is designed to assist compliance with the Criminal Procedure Rules by ensuring that evidence is presented in the shortest and clearest way by facilitating the early identification of the real issues in a case (CrPR, rule 3.2(2)(a)). Each party must actively assist the court in fulfilling its duty (CrPR, rule 3.3). Therefore SFR assists the defence to fulfil its obligations to assist the courts. SUPPORT FOR EARLY CASE MANAGEMENT The basis for seeking an admission or early identification of the real issues by the defence: A substantial body of case law provides support for the requirement for all parties to engage in active case management. For example: R v Chorley Justices 2006 EWHC 1795, ‘…the days of ambushing and taking last minute technical points are gone. They are not consistent with the overriding objective of deciding cases justly, acquitting the innocent and convicting the guilty’ and Balogun v DPP [2010] EWHC 799, ‘...the spirit or letter of the CrPRs is [not] complied with by asserting that the Crown is put to “strict proof...”.’ There are restrictions on a defendant’s ability to assert a positive case if the prosecution are put to proof on forensic or any issues. And, in an exceptional case, where a party manifestly does not comply with the rules, the prosecution may apply for the SFR to be admitted in the interests of justice under s114 CJA 2003. R v Ishmael Adams [2007] EWCA Crim 3025: ‘… otherwise D would escape on purely technical grounds.’ This doesn’t reverse the burden of proof: ‘the question is not whether it is for the Crown to prove possession but how the Crown shall be permitted to prove it.’ L

Forensics

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Forensic Science Society The Society was established in 1959 and is the independent Professional body for forensic scientists and forensic practitioners. Its purpose is to promote rigorous quality assurance mechanisms ensuring that members serve the criminal justice system and the public interest with skill, professionalism and integrity at all times. It is international with members from Barbados to India and the USA to Australia. For many years the Society has been at the forefront of setting quality standards in forensic science. It works closely with the Forensic Science Regulator. As a registered charity it is free from political or commercial influence and serves the national interests of justice with a clear, consistent voice across the UK. As well as running conferences and workshops the Society offers postgraduate diplomas in crime scene investigation, firearms, fire investigation and document examination in conjunction with the University of Strathclyde. There are six grades of membership: Student, Affiliate, Associate, Professional Member, Accredited Forensic Practitioner and Fellow. They are drawn from a wide cross-section of the forensic community and include scientists of all disciplines, scenes of crime officers, police, medical personnel, lawyers and academics. Its vision, to be the professional voice of forensic science, is achieved through links with forensic providers, police forces, policy makers and all stakeholders in the Criminal Justice System and forensic community.

FURTHER INFORMATION www.forensic-science-society.org.uk

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

25


Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THE TRANSPORT THREAT HORIZON

Through an in-depth conference, extensive programme of workshops and a world-class exhibition, visitors to Transport Security Expo will immerse themselves in the challenges transport operators face in maintaining high levels of security Transport Security Expo, the annual gathering of professionals within the aviation, maritime and public transport arenas, convenes again 13-14 November 2013, against a backdrop of the industry being at a developmental crossroads in terms of both its regulation and ability to respond to current and emerging threats. This key event will gather policy makers, world leading experts, technologists and industry operators together in London, to examine current protective measures, assess the threat horizon and determine how best to maintain traveller safety in a changing and increasingly hostile world in austere economic times. Through an in-depth conference, extensive programme of workshops and a world‑class exhibition, delegates and visitors will immerse themselves in the challenges transport operators face in maintaining high levels of security and the solutions to them, during a two-day event held at the Olympia Conference and Exhibition Centre. There will also be a world-leading exhibition of state of the art software and hardware products from vendors from across the globe. MAJOR THREATS FOR TRANSPORT For the first time in its long history as the premier gathering for industry professionals, the event introduces the “Major Threats to Transport Security” plenary session this year. This entirely new addition to an already extensive programme has been developed to clearly identify overarching threats common across all transport interests and foster convergence of thought. Transport Security Expo’s plenary session will deliver a ‘360 Global Threat Assessment’. The session is open to all delegates attending the event and features debate on how best to manage the risk to transport networks from terrorism and other crimes,

26

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

discussion on protecting national and global transport systems from acts of terrorism and other security threats, as well as discourse regarding the extent of the cyber security threat to transport industries. CYBER SECURITY Transport Security Expo has identified that the industry wide problem of cyber security is becoming acute, thus the prominence being afforded this issue during the forthcoming event. The transport industries depend on information technology and would likely grind to a halt without ready access to data required for day-to-day

perhaps most particularly in the aviation sector. Next generation aircraft currently being introduced into service are e-enabled via secure Internet Protocol (IP) communication channels passing data back and forth between ground and on-board systems. Currently the Airbus A380 and the Boeing 787 are the only e-enabled commercial aircraft in service, but the coming Bombardier CSeries and the Airbus A350 will also adopt this feature. Real time direct communication allows airlines to directly monitor aircraft health, pass relevant operational information to air crew and enable such like as e-commerce in the air. Such systems also provide an interface

Transport industries collectively owe it to themselves to ensure that the information technology they depend upon, has a sufficient level of redundancy built in to limit downtime and aid prompt recovery in the event of a cyber attack or hardware failure operations. This imposes a requirement that the systems deployed across the transport networks are both robust and secure. The traditional approach to cyber security has been to focus most resources on the crucial system components and protect against the biggest known threats. This approach is insufficient in the interconnected world of today, where a much more holistic approach to cyber security across transport networks is absolutely vital. CYBER TERRORISM IN AVIATION Cyber security should be at the top of the agenda issue across the transport world but

with a piece of equipment known as the Electronic Flight Bag (EFB). This is a series of software tools that allow pilots to automate tasks such as weight and balance, along with allowing pilots to track routes with weather overlays. It’s estimated that 30,000 laptop or tablet computer EFBs are used in North America alone. Concern is high that EFB connectivity could deliver a path for malicious code to enter into airborne systems aboard e-enabled aircraft. The airline industry cyber security consultancy firm AvIntel says that 80 per cent of airlines recently surveyed have an active EFB programme running, but only 40 per cent have


an active EFB cyber security plan in place. Given that ubiquitous connectivity for EFBs means the devices are constantly sniffing for a signal, it is possible for these devices to compromised if pilots go online over public internet connections to download information prior to flight. It has become very evident over recent years that terrestrial networks are easily compromised; therefore the aviation industry needs to pay close attention to aircraft that have network connectivity. Transport industries collectively also owe it to themselves to ensure that the information technology they depend upon, has a sufficient level of redundancy built in to limit downtime and aid prompt recovery in the event of a cyber attack or hardware failure. Two of biggest airline carriers in the United States, American and Southwest, have suffered major outages during this past year, which have grounded flights, caused chaos at airports across the country and taken costly time to recover from. THREAT WITHIN A recent US Government Accountability Office (GAO) study reported a worrying 26 per cent increase over three years in Transportation Security Administration (TSA) personnel transgressions considered Blue light advert CT 14/10/13 to be a security threat. The issues

REGIONAL WARNINGS INTERPOL issued a global security alert in early August advising increased vigilance for terrorist activity, following a series of prison escapes across multiple member countries, in which well over a thousand individuals with links to terrorist organisations fled. Concern has been expressed that these apparently coordinated escapes may be a precursor to an upswing in jihadist attacks across the Middle East and North Africa. Some parts of this region have been in a state of turmoil since the uprisings of recent years and consequently have weakened or diminished counter terrorism capabilities, border control mechanisms, internal security priorities, and other shortcomings. The rise of new or transitional governments in Egypt, Tunisia, Yemen, and Libya, and ongoing unrest in Syria and Mali, have offered new opportunities for established affiliates to the likes of al-Qa’ida, other aspiring terrorist groups, and like-minded individuals to conduct attacks against western interests across the region. Transport Security Expo will bring attention to the regional threats faced by the maritime and supply chain sectors when it convenes again in November. L

highlighted ranged from sleeping on the job, through allowing friends and family members to pass freely at screening to theft of in transit traveller property. The property theft briefly captured headlines after a TSA employee was captured on film stealing from baggage in the mêlée following the San Francisco (SFO) air crash in which three people died and multiple other passengers were seriously injured. Separately, when fire engulfed Kenya’s Jomo Kenyata International Airport (NBO) in early August, some airport personnel grasped an opportunity to indulge in widespread looting. Police, airport security and random other airport personnel reportedly engaged in the looting spree while the fire raged. Multiple people across all disciplines have been arrested and are facing charges. Transport Security Expo has warned of the insider threat previously and continues to monitor this worrying upward trend in activity such as highlighted above. The insider threat has the potential to compromise other defenses in place at airports, ports and other border crossings and could very well open the door to further terrorist activity. It is a here and now issue which demands immediate action before it escalates to critical 10:14 Page 1 and potentially life-threatening proportion.

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.transec.com

Blue lights lift barriers. Who are YOU selling to?

Don’t let a terrorist’s dream become your worst nightmare Disposing of ex blue light and security vehicles? Be sure they are properly de-commissioned and only offered to verified motor trade professionals.

Call The Fleet Auction Group now on 01530 833535. The Fleet Auction Group Ltd, Brindley Road, Stephenson Industrial Estate, Coalville, Leicestershire, LE67 3HG Tel. 01530 833535 Fax. 01530 813425 Email: chris.jager@fleetauctiongroup.com www.fleetauctiongroup.com

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

27


MOBILE SECURITY SOLUTIONS

BODY WORN SYSTEM and 3G Transmission in ‘real time’ BODY WORN SYSTEM HIGHLIGHTS n Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memory n Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location. The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/ Edge/GPRS SIM based cellular provider. Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications

Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: info@audaxuk.com W: www.audaxuk.com


PROTECTING WATERWAYS

RESTRICTING THE FLOW OF TERRORISTS According to the British Ports Association (BPA), the UK has the fourth largest economy in the world and our nation’s waterways play a vital role in this, with UK ports handling over 95 per cent of UK import and export tonnage. In fact, in 2010 alone, the BPA estimated the value of trade through British ports to be around £340 billion. The ports industry hosts a wide range of operations, ranging across passenger ferries, containers, oil, leisure, fishing, bulk goods and general cargo. To put this into perspective, the BPA reports that in 2010 UK ports handled more than 500 million tonnes of freight and saw over 67 million passenger journeys. The industry is also responsible for the transportation of products that are essential to our daily lives, such as petroleum, oil and coal. Naturally, if the control of this vital transport network fell into the wrong hands – such as those of terrorists – it could have detrimental effects on our society. VITAL WATERWAYS The essential nature of our waterways stems beyond that of traffic in and out of ports and along the coast, but to the UK’s inland waters and domestic traffic as well. The Department for Transport’s statistical report entitled Domestic Waterborne Freight, 2011, released in December 2012, explained just how influential UK inland waters are in transporting vital goods and resources throughout the UK. The report described domestic waterborne freight as consisting of: inland waters traffic carried by a barge or seagoing vessel on the inland waterways network (such as rivers and canals), coastwise traffic carried around the coast from one UK port to another, and one-port traffic to and from offshore locations – such as oil rigs – and sea dredging.

While coastwise traffic is the largest component of domestic waterborne freight, inland waters traffic transported 43.9 million tonnes of goods in 2011. As such, our rivers and canals are still extremely essential in the transportation of natural resources. As expected, the River Thames remains the busiest inland waterway in the country, with the River Forth coming in second. KEEPING THE CHANNELS SAFE These figures demonstrate just how busy our waterways really are, highlighting the essential need to keep these transportation channels safe from the hands of terrorists or organised crime. Police forces across the UK recognise this need and have subsequently launched Project Kraken, a national police, maritime crime and counter terrorism initiative to protect the waters of the UK. Police forces, such as those in Devon and Cornwall, have been appealing to their local communities to keep an eye out for any potential threats to ports or coastal waters and advise on particular elements of suspicious behaviour to look out for. Such behaviour can include someone who is asking questions about security procedures or who is filming, taking photographs of, or making notes on a maritime facility. This could mean they are assessing security measures in place in order to come up with ways to infiltrate them. Other potentially dangerous behaviour to look out for includes the insertion of strange objects into waterways near bridges, pipes or critical infrastructure at unusual times or without the normal maintenance support, along with anyone watching carefully or videoing security procedures or ID checks at a ferry terminal.

PRIVATE SECURITY MEASURES While careful observation is extremely important in keeping potential terror attacks at bay, private security measures are also invaluable. It is often beneficial to take a holistic approach to security, balancing common sense with a variety of robust security measures in order to ensure maximum protection. One aspect of security that may not immediately come to mind when it comes to maritime security is that of information destruction. Information destruction is the secure disposal of information in all of its different forms; so why is this so relevant to the maritime sector? While financial reports or employee records are considered to be extremely confidential pieces of information, there are other forms that could be equally as dangerous if in the wrong hands. In particular, ID badges and uniforms. According to the BPA, a government study discovered that the UK’s ports directly employed around 73,500 people. With such a high number of staff passing through ports each day, ID badges are often crucial in helping to distinguish employees from visitors or passengers. Often, outside visitors to maritime sites are also granted ID badges in order to access authorised areas of the premises. If these badges are disposed of insecurely at the end of the day, the security of the area could be compromised and if placed in the wrong hands, there could be detrimental effects. The same goes for uniforms; the unsafe disposal of branded clothing gives opportunists a way to enter secured areas undetected, allowing them to blend in with other employees without drawing attention E

Written by James Kelly, chief executive of the British Security Industry Association (BSIA)

The UK’s ports and inland waters are responsible for the transportation of products that are essential to our daily lives, such as petroleum, oil and coal. If control of this vital network fell into the wrong hands, the ripple effect could be catastrophic

Maritime Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Department for Transport’s statistical report entitled Domestic Waterborne Freight, 2011, released in December 2012, explained just how influential UK inland waters are in transporting vital goods and resources throughout the UK Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

29


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Special Tactics equipment tactical@holmatro.com | http://tactical.holmatro.com


PROTECTING WATERWAYS  to themselves, potentially granting intruders access to secure areas. Such materials should be destroyed, either on-site or off-site, to the extent that they may never be reconstructed. Product destruction is the fastest growing sector of the information destruction industry. Each year, BSIA information destruction companies destroy 200,000 tonnes of confidential waste – this includes non‑paper material such as IT equipment and audio and videotapes. Through a secure destruction process, the losses through fraud of all types can be significantly reduced. To guarantee a professional service, decision makers must ensure that the company they entrust with their information destruction is reliable and operates to industry standards. MEETING STANDARDS The essential standard for an information destruction company to meet is that of EN15713. This standard includes a range of specific requirements that a company must comply with, such as having an administration office on-site where records and documentation are kept for conducting business. In terms of security measures, intruder alarms that are closely monitored by an Alarm Receiving Centre (ARC) should be installed on the property and CCTV should be placed at the points where the unloading, storage and processing of

information is conducted. Companies that meet with this standard will be able to deliver a reputable service, ensuring that confidential waste is disposed of securely. ACCESS CONTROL With such a heavy foot flow of passengers and employees, access control systems can be extremely beneficial in helping to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site. These systems can be employed both on land at the ports and out on the waterways, with authorised areas of vessels being secured by the technology. Ensuring that access is restricted solely to authorised people is pivotal to secure against threats such as theft, vandalism or, in more critical scenarios, tampering with products or transportation for terrorism purposes. If a terrorist were to breach security at a port and gain access to a boat, this additional fundamental layer of security on-board could prove essential in keeping the intruder from taking control of the vessel and potentially sailing it to a dangerous location. PERIMETER SECURITY While implementing security measures on the inside is always extremely beneficial, securing the perimeter of an area is also essential. An early detection of a threat on the perimeter –

perhaps near the borders of a port – allows for more space and time for personnel to formulate a necessary response, potentially preventing an intrusion all together. While security fences and gates act as a useful deterrent, more covert measures can also be beneficial. With concealed forms of perimeter protection, intruders will not be aware that they have been spotted or will not be able to see the security in place as easily. Particularly effective forms of covert security are heat and motion sensors that are hidden and connected to alarm systems. Known as Unattended Ground Systems (UGS) they enable an early warning system, giving personnel time to respond effectively. Likewise, trip-sensors are another option. Once they are activated, personnel are able to pinpoint the location of the breach and react accordingly. When choosing security measures to protect one of our most thriving industries, one thing is absolutely certain – security must be sourced from a reputable supplier that meets with the relevant British and European standards for their product or service. Members of the BSIA are all inspected to high quality standards and will offer a reliable service. To find a supplier near you, visit: www. bsia.co.uk/find-a-local-security-company L

Maritime Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION www.bsia.co.uk

Frontier Pitts’ impact-tested PAS 68 Compact Terra Barrier takes on the world With installations of the Hostile Vehicle Mitigation Compact Terra Barrier growing both nationally and around the world (with sites now in Tanzania, Cyprus, Greece and Russia), Frontier Pitts has literally seen the Compact Terra fly off. The Compact Terra Barrier is a BSi PAS 68:2010 impact-tested Hostile Vehicle Mitigation (HVM) Drop Arm Barrier, which successfully stopped a 3.5t lorry travelling at 30mph (48kph). The aesthetically pleasing HVM solution looks like a normal car park barrier, so is subtle enough not to highlight any sites potential security threat to its local community. There are a wide range of accessories available for the Compact Terra Barrier, including full-height swivel skirts that provide the visual deterrent of a gate whilst keeping the operational speed of a drop arm barrier. Compact Terra Barrier is PSSA Verified: over recent years, especially in the run up to the Olympics, the PAS 68 impact test specification programme saw an influx of activity. With the hostile vehicle mitigation industry seemingly saturated with new permanent and temporary products, new standards were required to ensure not only

the quality of the installed equipment but the same specification of product that was successfully crash-tested was, in fact, installed. As a PSSA (Perimeter Security Suppliers Association) certified product, Frontier Pitts can prove that the Compact Terra Barrier has been verified during an independent third-party audit against a range of detailed criteria to confirm the HVM Barrier’s reliability, longevity, serviceability or safety. The PSSA Scheme can only help to assist the industry’s clients when deciding what HVM solution to install on its site. Sally Osmond, brand and development manager of Frontier Pitts, says: “Since our first impact test in 2004, we have worked tirelessly to forge the HVM industry forward. By achieving the PSSA-Verified status, we can install faith in our clients: the faith that the product they receive is of the same specification and resilience as the product that we, as a company, have successfully impact-tested to the PAS68 standard.”

International installations: since Frontier Pitts’ Compact Terra Barrier and other HVM solutions have become PSSA-Verified, the company has received a significant increase in enquiries from overseas regarding the various accreditations that it holds for its British-engineered designs. This further highlights the need for such standards awarded to a quality and reliable product. FURTHER INFORMATION Tel: +44 1293 548301 sales@frontierpitts.com www.frontierpitts.com

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

31


Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com info.uk@infranor.com


MECHANICAL PROCESSES

ZERO COGGING SERVOMOTORS

Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors significantly improve machine performance. In many cases, they can… Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counterparts. This is a closer look at the technology, plus realistic tips on evaluating whether or not your application could benefit from a slotless motor. SLOTTED SERVOMOTOR CONSTRUCTION A traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these teeth and when current flows in the wire, an electromagnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However, a slotless stator is built without teeth. Motor windings are

This in turn induces voltage in the surface of magnets (e=dø/dt). These magnets are conductive so a current flows in them. These Eddy currents increase exponentially with speed and create heat in the magnets, which in turn diminishes their strength.

Higher torque is beneficial for most applications and can often be the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output – and that a smaller motor may be used wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits. BENEFITS OF SLOTLESS MOTORS Higher torque: a slotless motor’s redesigned stator allows the rotor to be significantly larger, because torque increases proportionally to rotor diameter. Torque from a given slotless motor is significantly higher than that from a similarly sized traditional slotted motor. Due to the absence of teeth, the area available for windings is also greater, which further increases torque. More specifically, torque at a given speed can be increased by up to 25 per cent compared to a slotted motor. Higher speed: as the magnets pass by the teeth in a slotted motor, a change or modulation in the magnetic flux is created.

As slotless motors have no teeth they can achieve speeds in excess of 32,000 rpm. Higher power: power is calculated by multiplying torque by speed. Because a slottless motor outputs both higher speeds and torques, it can produce more than twice the power of a slotted motor of the same size. Smoother motion: as the magnets on a slotted motor’s rotor move past the stators iron teeth, they are magnetically attracted. This creates a torque disturbance known as cogging. As there are no teeth in

a slottless motor, cogging is eliminated, thereby yielding a smoother motion. Easier tuning: motors with larger rotor inertias can be easier and simpler to tune. If the load becomes momentarily decoupled from the motor (a common phenomenon) the servo loop is less likely to become unstable if motor inertia is high relative to the load. In fact, precise servo tuning and filtering, which can be difficult to achieve, may not be required with a slottless motor. Better stiffness: a rotor with a larger diameter has greater stiffness because torque increases with rotor diameter and a higher torque motor responds faster to any displacement from the commanded position. The torque displacement curve is steeper. Higher efficiency: all of the above traits boost the efficiency by up to 25 per cent over that of slotted motors.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A MIXTURE OF MOTOR TECHNOLOGIES Some applications using a mixture of motor technologies available from Infranor: Frameless – land and sea-based gun systems; surveillance radar and masts; and underwater cranes. AC brushless – positioning turrets/towers; motion platforms/bases; aircraft pilot controls. DC brushed – vehicle ventilation, ELLS; missile system platforms; ordinance storage. DC brushed – all munitions feeds; aircraft payload management systems. Encoders – guidance systems. APPLICATION BENEFITS Higher torque is beneficial for most applications and is often the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money (if the motor is part of a moving component, a smaller motor also weighs less and requires less energy to move). A motor that can run fast may be the obvious choice for high-speed applications, such as centrifuges. But faster speeds can also help reduce overall machine cost and help increase machine output. If the machine’s mechanics can handle higher speeds, a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed, a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and engineering teams. L FURTHER INFORMATION info.uk@infranor.com www.infranor.com

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

33


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PERIMETER SECURITY

A BLOW TO EDUCATION Over the last decade there have been a variety of isolated attacks on schools and higher education facilities throughout the world. ATG Access examines how educational establishments can increase their security to protect them from external threats

The Nanping school stabbings in China were one of the more high profile incidents of attacks on educational establishments in recent years, along with a Rio de Janeiro school shooting, gun man attacks in US universities and even an explosive device being detonated in an Institute of Technology, Estado de Mexico. The sad reality of these individual attacks means that an increase in education complex security is of paramount importance. To be able to control who accesses colleges and schools is key to monitoring the level of risk an environment is subjected to. To live in a world monitored so closely turns everyday life into a ‘Big Brother’ reality but if these are the measures which are needed to keep children and staff safe then the extra rigour is worthwhile. ATG Access have been working with a variety of different schools and universities to implement the measures necessary to control access to campuses across the UK and internationally. Whether it is installing a duel bollard system to secure the entrance of a building and car park linked to a school reception or multiple high-security bollards to prevent an explosive device being detonated; ATG Access will endeavour to find a solution. EDUCATION POSES A CHALLENGE One of the greatest challenges for any education establishment is balancing the need to create an open and stimulating environment that encourages learning, while ensuring that the people and buildings are protected from the threats of a vehicular attack or an unwanted intruder. Investment in equipment is higher now

34

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

than ever before and the focus on reducing accidents or a vehicular attack to protect staff and pupils has put an unprecedented focus on security. With ATG’s products, experience and reliability, they are able to identify, advise and implement measures that will address the education sectors current and future security needs. The National Counter Terrorism Security Office (NCTSO) has produced a range of reports to offer protective security advice for a variety of sectors. They state that there is a balance to be stuck between a friendly and welcoming atmosphere for the public and implementing the necessary measures to reduce your environments vulnerability to terrorism and intruder risk. KNOW YOUR ACCESS POINTS Access control plays a major part in controlling an environments vulnerability. The NCTSO advise to keep access points to a minimum, put restriction in place to ensure vehicles are kept at a safe distance from your premises (the recommended space being 30 meters). These traffic calming measures should be robust, well signposted and lit. They must fit into the surrounding environment avoiding a ‘fortress mentality’ but providing a reassuring presence to deter any would-be-attackers. One of the NCTSO reports is targeted at

protecting higher and further education facilities. Many educational sites across the country and worldwide have already benefitted from ATG’s expertise. Port Regis school in Dorset have had an automatic bollard system installed to control traffic and visitor access to the secluded, private school. The system has been a great success allowing the facility managers at the complex to have complete control over vehicle access to the site. Eltham College, London was another project which ATG Access secured. The ATG Access VP200 automatic bollards were built to the highest quality standards and proved to be the perfect solution for access control to this campus. Access control was required for Eltham College and the adjoining YMCA building. ATG Access supplied and installed two separate automatic bollard systems both linked via an intercom which was hard wired to the main reception. Both installations were fitted with a time clock which allows the bollards to be automatically lowered twice a day: opening and closing times. When required the bollard system can also be operated via a linked telephone system. HIGH SECURITY SOLUTION ATG Access also successfully completed a project in Bahrain to secure the American School in Manama. Bahrain has a strong American community due to its geographic and political location. They had a natural interest for a high security solution for the multiple entry points around the school. Thirty two high security automatic bollards divided into several sets were provided to offer a high security solution around the campus. The emergency fast operation (EFO) system was required in case of a terrorist-attack. Bollards were fitted with stainless steel sleeves to make sure the aesthetics matched the prestigious site. A wide range of educational facilities are beginning to think about perimeter security and access control on their campuses due to the changing political environment. It is better to prevent damage to your site before an attack happens rather than providing damage control after a violation of security occurs. L FURTHER INFORMATION www.atgaccess.com

One of the greatest challenges for any education establishment is balancing the need to create a stimulating learning environment, while ensuring that the people and buildings are protected


PRODUCT VERIFICATION

KEEPING BACK INTRUDERS

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A highly secured perimeter is the first line of defence against intruders. Whilst there is an abundance of products on the market, how can you be sure these products are fit for the job? Counter Terror Business magazine talks to Stephen Munden, manager of the PSSA’s Verification Scheme, about how the scheme is giving peace of mind to those buying perimeter products WHAT IS THE PSSA VERIFICATION SCHEME? Physical perimeter security if often the first line of defence against terrorism or malicious criminal attack. It is therefore imperative that critical national infrastructure, high value commercial assets and places vulnerable to extensive loss of life are adequately protected. Vehicle security barriers, for example, have an important role to play in hostile vehicle mitigation, as part of an organisation’s perimeter security strategy. The components that comprise the physical security system, including vehicle security barriers, access control points, security fencing and other perimeter installations must work together effectively to provide protection from hazards, threats, risks or loss. Against this background the Perimeter Security Suppliers Association (PSSA) has been working for the last two years to develop a robust scheme to help those responsible for security to put really effective perimeter security provisions in place. The scheme seeks to provide confidence to perimeter security product buyers and others that products supplied by PSSA members conform to nationally recognised quality standards and provide assurance that products are fit for purpose, are consistently manufactured and supplied conforming to their agreed specification, and when in use, produce the intended performance outcomes specified by the customer. HOW DOES THE SCHEME ACHIEVE ITS OBJECTIVES? The scheme achieves its objectives by evaluating the supplier’s ISO 9001 certified management system to verify that it operates effectively in supplying specified products. It analyses the supplier’s test data to verify that the appropriate standards have been selected and that products continue to conform with them. The scheme also continuously assesses and audits the suppliers to check that the products supplied continue to conform with specified requirements. HOW ARE THE PRODUCTS ASSESSED? Evidence is assessed and evaluated by an independent UKAS accredited certification body to verify that the products and system meet requirements in three PSSA specifications; for the product, testing and PSSA certification.

Following a rigorous process of evaluation of both the supplier’s management system and verification of the product, authority to use the PSSA Verified Product Mark is given and the product is listed in the PSSA’s industry listing of verified products. WHAT ARE THE BENEFITS? The main benefit of the scheme is the peace of mind it gives the government and other organisations that put in place

installation, which will be piloted later in 2013. Installation can be complex, with multiple dimensions and requirements to be borne in mind. It consequently can sometimes go wrong. The PSSA has heard from consultants and security advisors that problems have occurred with existing installations and they have urged that safety and security standards be recognised and implemented during installation. Therefore we are working

The components that comprise the physical security system, including vehicle security barriers, access control points, security fencing and other perimeter installations must work together effectively to provide protection from hazards, threats, risks or loss high security perimeter products. It gives them the confidence that the supplier is capable of consistently managing the product and regulatory requirements associated with the security equipment as part of its overall business management systems and processes. What’s more, customers have an independent source of reference on which to base their procurement decisions. HOW IS THE SCHEME DEVELOPING? Now that the Verification Scheme is in place for key products, the PSSA has turned to developing a module covering product

with installers, consultants, specifiers and government agencies to develop a specification for perimeter security product installation, which will be a world first. The installation module will need to accommodate verification of a range of authoritative standards, including those for installation specification and performance, service design and delivery, and requirements for testing, activation and handover. L FURTHER INFORMATION www.pssasecurity.org www.pssaverification.com

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

35


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HOSTILE VEHICLE MITIGATION

SAFETYFLEX PAS 68 BARRIERS SECURE MAJOR UK HOSTILE VEHICLE MITIGATION PROJECT Safetyflex Barriers are now one of the world’s leaders in securing and enhancing fence lines against vehicle borne threats with their patented design of PAS 68 crash rated fencing and PAS 68 anti-terrorist bollards. They are becoming the number one choice, and a specialist regarding PAS 68 products and solutions. And they have won another major contract for securing and enhancing fence lines with their PAS 68 products

36

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

SAFETYFLEX PAS 68 BARRIERS ANNOUNCED AS NATIONAL BUSINESS AWARDS FINALIST Safetyflex Barriers, the world’s number one manufacturer of anti-terrorist PAS 68 spring steel barriers and bollards, has been shortlisted in the final of this year’s National Business Awards. The leading manufacturer of high-security anti-terrorist bollards and barriers, which is part of the GME Springs group based in Coventry in the West Midlands, has beat off stiff competition to be shortlisted for the prestigious Innovation Award. The winner will be revealed at the National Business Awards gala dinner held on November 12th in London. Marcus Gerrard, director at Safetyflex Barriers, said: “We’re absolutely delighted to have made it through to the final of the most prestigious business awards in the UK. “Innovation is at the forefront of every security product we design and produce to protect people and key infrastructure all over the UK and we are proud our achievements have been recognised by the judges. “We’ve enjoyed a whirlwind year ever since producing anti-terrorist bollards and barriers for 2012 Olympic sites all around the UK and now we’re really looking

forward to taking our place at the National Business Awards final on November 12.” Finalists were chosen from the hundreds of businesses that entered or were nominated for the titles, with overall winners of 17 awards categories to be revealed at the awards ceremony at Grosvenor House, London. Alex Evans, programme director of the National Business Awards, said: “The quality of finalists is outstanding every year – with Britain’s most promising new businesses and most impactful social enterprises recognised alongside top performing SMEs and the most sustainable mid market and large cap firms.” NEW CRASH TESTED FENCE SYSTEM Safetyflex Barriers has launched a new PAS 68 crash rated fence system to protect army barracks, oil refineries and power utilities. The latest PAS 68 product is the new patented springline 30 crash rated fence system. Safetyflex were commissioned to make a shallow mount crash rated fence system. The criteria was to design a system, with a very shallow footing, and to stop a 7500kg truck. As other systems in the market require massive foundations, Safetyflex have designed a shallow foundation of only 400mm. The system was tested in soft


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

New PAS 68 crash fence

ground providing another major benefit. Safetyflex have also designed a PAS 68 crash rated fence, and a PAS 68 Fence enhancement, which has been specified in six new major projects. This new system is ideal for large perimeters, to protect major assets, like army barracks, oil refineries and gas/water utilities.

to export its services, backed by support from UK Trade and Investment (UKTI). “It’s fantastic to be attracting so much interest from sites and projects all over the world. ACCELERATED GROWTH

“There’s no doubt about it, JOB our work at the Olympics Y C N VACA ss has helped to accelerate our growth and our Busine ent reputation in the m Develop equired security sector. r r e It has given us the g a Man CV d springboard to kick n e s e Pleas fo@ on and win further business, and in the to in ers. first i r r a b three months x e safetyfl om of this year alone we c worked on 12 contracts,

KICKING ON FROM LONDON 2012 Twelve months on from London 2012, and protecting multiple Olympic sites, Safetyflex has enjoyed a whirlwind year and has led to interest and orders taking off. “Since being selected as a key supplier for anti-terrorist bollards to London 2012, enquiries and orders really have snowballed,” Marcus said. “There’s now more interest in our work, domestically and internationally, than ever before. “We were extremely proud to see our products used extensively for so many Olympic sites, and in doing so provide us with a platform to take our work into new markets and we’re now constantly being approached to tender for major projects all over the world.” Marcus noted that the successful completion of major projects at the Olympics, along with a string of other high-profile sites, has given the company the confidence

totalling 2,000 bollards. “UKTI has also realised the potential of our products and we’re pleased to be working with the organisation’s high-value opportunities department to attract worldwide attention for Safetyflex. “We see exporting as a major area of growth for the company and as part of our expansion we are putting together a new global distributor base to market and sell our products across the globe.” L

FURTHER INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry. Tel: +44 (0)24 76 664911 www.safetyflexbarriers.co.uk

Sites Safetyflex Barriers are installed • The O2 • Excel Centre • Ricoh Arena • Titanic Centre Belfast • St James’ Park • Wimbledon • Key London Sites • Horse Guards Parade • Numerous data and cash centres

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

37




OUR FOUNDATIONS IS OUR TECHNOLOGIES, OUR MISSION IS EXPANDING YOUR CAPABILITIES.

Scott Safety, formerly Scott Health & Safety are world leaders in the design and development of Respiratory Protection Equipment (RPE). We have a detailed understanding of the physiological and psychological burden RPE can place on users. That is why we test in the field. And we apply what we learn there - as well as emerging research and technologies to every design to ensure capability, functionality and comfort. Irrespective of whether your requirement is for CBRN protection, Breathing Apparatus for EOD, USAR, damage control, fire-fighting or for specialist applications Scott can meet your requirements - comfortably.

LET’S WORK.

T O L E A R N M O R E V I S I T : S C OT T S A F E T Y.CO M

© 2013 Scott Safety ®, ScottSafety.com®. All Rights Reserved.

V I S I T U S AT M I L I P O L , PA R I S 2 0 1 3 , STA N D B 1 7


EVENT PREVIEW

STAYING AHEAD OF THE MAJOR RISKS

Milipol Paris 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Milipol Paris, the international event for key players in the internal State security sector, will open its doors from 19 to 22 November 2013 for four days of exhibitions, meetings and debates about public and industrial security Security professionals from around the world will gather at Milipol Paris 2011 to see first hand the latest security products and services that help protect the public from serious threats. This year Milipol Paris will again offer a wide, diverse range of technological innovations and equipment for personal and property security. The show covers some 18 business sectors and among the exhibition you will find a complete range of solutions, developments and services enabling States to protect their populations.

Milipol Paris 2013 will welcome some 1,000 exhibitors from 50 countries and is expecting 30,000 visitors. THE MAJOR RISK AREA The dedicated Major Risk area, which covers technological, industrial, natural, health and major risks, will again bring together companies from around the globe. They will present their innovative solutions in this constantly‑evolving field which integrates all the activities linked to Major Risks such as prevention, protection, surveillance, detection,

Milipol 3 1 Paris 20ome lc will we ,000 some 1 from 50 rs exhibitories and is count g 30,000 n expectisitors vi

identification, analysis and intervention. Following the success in 2011, the Business Meetings, which helped optimise meetings between exhibitors and purchasers, will again be offered by the Paris Ile-de-France Chamber of Commerce in conjunction with the European Commission. These meetings enable companies to establish an initial, solid contact with companies in their sector from around the world. The contacts have purchaser or seller profiles and will be attending Milipol Paris 2013 as either exhibitors or visitors. “Thanks to Milipol Paris, State and regional authority security services as well as companies can discover products and services that boast the highest level of technological E

41


Working with you to deliver cutting edge solutions for Intelligence I Surveillance I Reconnaissance

Designed by the operator for the operator

Keeping you one step ahead with intelligent solutions. We specialise in: Tactical Cyber Systems Electro Optics Audio Surveillance Unattended Ground Sensors Tagging Tracking Locating Fabrication

Milipol

www.milipol.com

Visit us at Milipol Seven Technologies - stand 5V 156 Datong - stand 5T 095

www.7techgroup.com

enquiries@7techgroup.com


EVENT EVENT PREVIEW PREVIEW

In 2009, for its 25th anniversary, Milipol Paris created a new area dedicated to the protection of countries in the face of major risks from environmental, climatic and industrial sources. This new area brought together all the players in each of these fields around the French Directorate of Civil Defence and Security  innovation and are adapted to suit their needs. The extensive, diverse range of equipment and products exhibited reflects the plethora of trades in the security, antiterrorism, forensic investigation, local public security, civil defence and even road safety sectors,” explains Rémi Thuau, prefect and newly‑appointed President of Milipol trade shows. In order to help visitors make the most of their time at Milipol Paris, there is a mobile app which gives you access to all the information you need such as the exhibitor list and interactive floor plan. EUROPEAN COMMISSION RESEARCH The European Commission will hold a conference and an exhibition during

which it will present the results of decisive security research projects carried out by the European Union. It has specifically chosen the international venue of Milipol Paris 2013 to announce the launch of its ‘Horizon 2020 Secure Societies Challenge’ research. As the Seventh Framework Programme (FP7) is getting to its end, it is now time to launch Horizon 2020 (2014-2020) the new financial instrument aimed at securing Europe’s global competitiveness and tackling societal challenges, including the advancement toward more secure societies. Milipol Paris 2013 provides a timely occasion to the European Commission to announce the numerous opportunities to actively contribute to meet the “Secure

Milipol Paris 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Societies” challenge by implementing future EU Security Research, which Horizon 2020 will offer to industry, academia and end‑users of security technologies from 2014. Furthermore, the Commission will use the occasion to present the latest advancements in the implementation of the EU Security Industrial Policy, since the adoption of the “Security Industrial Policy and Action Plan” in July 2012, as well as to reflect on the international dimension of security by highlighting Major Events as concrete opportunities to promote a higher level of citizens’ security within and outside the EU. INTERNATIONAL BUSINESS MEETINGS As partner of Enterprise Europe Network, the Paris Ile-de-France Chamber of commerce and industry invites companies to participate in the international technological and business meetings during the fair. Milipol Paris 2013 attracts the key decision makers of internal State security from around the world in one place. This matchmaking event is the unique opportunity to meet them and to create the first qualified contact for a successful technological or commercial cooperation. This event is organised in partnership with other members of the Enterprise Europe Network, which brings together 52 countries E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

43


QUALITY DESIGN • QUALITY MATERIALS • cast standard (UK government endorsed)

Blunt Trauma Protection Tested and certified to uk government (CAST) standard

Solo Shields Bespoke specification available

Scorpion Interlock Shields Public Order Batons

003

FM 56364 BS.EN.ISO 9001:2000

DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: enquiries@dmsplastics.co.uk www.scorpionppe.co.uk


EVENT PREVIEW  from continental Europe and beyond (Israël, US, India, Japan). The support of European advisers will help companies make the most of these partnerships meetings, with buyers and vendors coming as exhibitors or visitors. Launched by the European Commission, Enterprise Europe Network is the first European network supporting SMEs that aims at promoting innovation and competitiveness. Its free services include partner searches for technology, research and business cooperation, technology audits, advice on European regulations, current FP7 programs and funding opportunities. Conditions and registrations for the International Business meetings on Milipol Paris 2013 are available on-line through a dedicated online platform. Each participant will be able to request targeted meetings and therefore to create his/her individual meeting schedule.

MINISTRY OF INTERIOR CONFERENCE The French Ministry of the Interior will be holding a conference on innovation and procurement policy for internal security services. With 2.8 billion Euros of public spending, the French Ministry of the Interior is the second largest ministerial purchaser. Its spending is divided between routine purchases and procurement. Procurement spending corresponds mainly to work done on modernising technology by the security forces. Within the ministry, three departments contribute to this policy. In 2013, the CPO (Chief Procurement Officer) implemented an innovative procurement roadmap, charter and guide to ethical conduct. The Internal Security Information Systems and Technology Service (ST (SI)²) is a shared police/gendarmerie service. Since 2006, it has built its innovation network by joining the SMB Pact and helping define an industrial policy for security. Finally, the

SAELSI (Procurement and logistic equipment service for internal security) will be set up at the start of 2014 in order to merge the security force equipment programmes. At Milipol 2013, the Ministry of the Interior will exhibit operational systems and equipment at its stand, illustrating the various facets of the security trades. The conference on innovation and procurement policies will be an opportunity for the CPO, the ST(SI)² and the future SAELSI to present to companies, intermediate‑sized businesses and SMBs with its innovation and procurement policy which encompasses applied research, logistical support and even public orders. At this conference, you will discover technological trends, the Ministry’s main innovative procurement focuses and the logistical evolution of the internal security forces.

premier trade organisation advancing the UK Aerospace, Defence, Security and Space industries. Farnborough International Limited (FIL), which runs the Farnborough International Airshow in the UK, is a wholly-owned subsidiary. ADS has offices in England, Scotland, Northern Ireland, France and India with new offices planned in China and the Middle East. ADS was formed from the merger of the Association of Police and Public Security Suppliers (APPSS), the Defence Manufacturers Association (DMA) and the Society of British Aerospace Companies (SBAC) in October 2009. ADS also encompasses the British Aviation Group (BAG). ADS works with members and gains an understanding that allows ADS to develop and deliver the services that provide real value.

Milipol Paris 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The High French ee for t Commitence will f Civil Denising four be orga ctive talk intera in the shows Risk Major area

HCFDC TALK SHOWS The French High Committee for Civil Defence (HCFDC) will be organising four interactive talk-shows in the Major Risks area. These talk-shows will be on a live broadcast on Milipol Paris website. Topics up for discussion include mass casualties, looking at the issues and solutions. CBRNE and illicit drugs detection will be addressed, examining what the new technologies are on check points. There will be a session on CBRNE looking at what’s new for first responders. There will also be a talk on biometry trends, research in security, Control-Command-Communication, audio visual and OD and robotics. ADS COORDINATES THE UK PAVILION ADS will be coordinating the UK Pavilion at Milipol Paris. ADS is the

COMMAND AND CONTROL Public safety, energy, transportation and security organisations are facing the challenge of managing their operational fleets at the highest level of security, reliability and effectiveness, regardless of the network technology used. However, meeting this challenge is possible only when a state-of-the-art control center is used which enables these highly-complex operations. A control center has to provide a vast number of features to make the dispatching process as efficient as possible, give the operator intuitive access to all the necessary information and functionalities and be easy to operate. Communication between the control center and field staff has to be reliable and always guarantee the required level of security. E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

45


CRD PROTECTION´s business areas range from military defence to civil security. Our customers have a need for innovative products for perimeter protection, crowd control and non-lethal capabilities. The main products are the unique fences TACRION® (Tactical Riot Net) and CROM (Crowd Management) – the most compact and lightweight barriers on the market.

www.crdprotection.com


EVENT PREVIEW Milipol Paris 2013: when and where? Dates: Tuesday 19 to Friday 22 November 2013 Venue: Paris Nord Villepinte – Exhibition Centre, Hall: 5A Opening times: From Tuesday to Thursday 9:30am to 6:00pm; Friday 9:30am to 5:00pm The exhibition is reserved only for the professionals of the security industry. Access is only available with an official invitation card or with an electronic badge. Proof of identity will be requested together with the badge. Minors under 16 are not allowed to visit Milipol Paris 2013.

 Siemens at booth 5C103 will be on hand to discuss the issues and demonstrate its command, control and communications solutions. IMAGING AND SCANNERS 3DX-RAY, the x-ray inspection specialist, will be showcasing its innovative portable x-ray systems and vehicle screening technology. FlatScan2 is the world’s first portable x-ray device with 3D Ready imaging capabilities for improved inspection. The 3D imaging capability delivers significant benefits for security services by making an inherently ‘unnatural’ x-ray appear more ‘natural’, enabling the operator to correctly interpret a set of items as either benign or as a threat. In high pressure IED and EOD scenarios where x-ray images need to be analysed as quickly, reliably and safely as possible FlatSan2’s imaging delivers improved detection rates, reduced time to decision and much easier usability for security operatives. The SVXi small vehicle x-ray inspection system is a rapid deployment, mobile x-ray system that can be set up and operational in under ten minutes. As a result the SVXi system can increase throughput in a wide range of security applications such as Customs & Excise, public events and conferences and can also be deployed in EOD incidents to scan suspect vehicles. The system can produce a detailed x-ray image of an entire vehicle (up to the size of a transit van) with resolutions below 1mm, increasing the probability of detection and reducing false alarms.

SEE-THROUGH WALL DETECTION ACUSTEK will be exhibiting its See-Through Wall Human Movement radar which gives fast, tactical information regarding movement, distance, speed and direction behind walls or solid objects in a light ergonomic military specification unit. Its intuitive operator interface is clear and easy to use requiring minimal operator training. The latest model has several new remote features including monitoring and control of multiple units from a single Android tablet or smartphone. Subsequently up to 16 units can be monitored and controlled in real time at a remote location via the Command Centre application. Continuous history monitoring means that networked units can be used for long term surveillance monitoring. The movement detection capability range of the see through wall radar to a human in a 70 degree sector is 3-5m behind a 20cm concrete wall, 10 metres behind an interior wall, 25 metres without any obstacles. Sensitivity of detection can be easily increased or decreased as needed. Movements such as fans are filtered out and not detected, increasing the accuracy of human detection. RESPIRATORY PROTECTION SYSTEMS Exhibitors Avon Protection will be showcasing their respiratory protection system technology for military, law enforcement, firefighting, and industrial. With an unrivalled pedigree in mask design dating back to the 1920s, Avon Protection’s advanced products are wildly used by Personal Protective Equipment (PPE) users worldwide. Avon Protection’s expanding global client base now includes military forces, law enforcement teams, firefighters, other first responders and industrial, marine, mineral and oil extraction site personnel. What’s more, Scott Safety will be exhibiting a full suite of innovative products from its respiratory protection, gas detection and personal protection ranges.

monitor for suspicious or unauthorised signals, carry out signal analysis and demodulation, and find the source of target transmitters using advanced geolocation techniques. CRFS also manufactures a range of high-performance RFeye Nexus receivers for stand-alone use in SIGINT applications or integration into EW and other sensor arrays. CRFS is a UK company, with a US subsidiary in California. It serves international customers in many sectors, including military and intelligence, police and homeland security, public safety and spectrum agencies. DMS Group will be showcasing its Scorpion personal protection equipment such as shields and limb protectors, which have been ergonomically designed to allow for maximum coverage without impeding movement. CRD Protection will be displaying its unique TACRION fences, arguably the most mobile and lightweight high-performance fence in the world today. TACRION consists of a specially manufactured net that has a high force absorption which can quickly and easily be mounted between two fixed points to create an effective barrier. It’s an extremely flexible and compact product that can be used both as a defensive and offensive tool to achieve safe and effective crowd control. The company also makes extremely compact and versatile barriers to guide crowds and people. Seven Technologies will also be displaying its tactical cyber systems, audio surveillance, tagging and tracking devices and electro optics.

Milipol Paris 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

MILIPOL HISTORY From 1970 to 2013, international economies and security have been evolving very rapidly. The creation of Milipol replied to a growing demand for information and matchmaking in the field of internal security, before developing into the areas of civil defence and major risks. At the end of the ‘70s, various French manufacturers supplying police equipment were worried that they had limited commercial

The creation of Milipol replied to a growing demand for information and matchmaking in the field of internal security, before developing into the areas of civil defence and major risks. In 1984, the first Milipol Show was organised MONITORING FOR INCREASED SAFETY CRFS will be on-hand to demonstrate its systems for monitoring spectrum-intensive sites or for any critical area, border, perimeter or building. It pioneered the concept of remote, distributed, real-time networks of intelligent sensors (RFeye® Nodes) to provide continuous 24/7 monitoring of the RF environment. The RFeye is designed to continuously scan and

contacts at an international level. Contrary to the Aeronautics and Defence sectors, the Interior Security sector did not have a promotion and communications platform that matched its importance in France. As a result, the idea of organising a specific international exhibition took hold. EXPOL (EXposition POLice), the first private initiative, showed the way. E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

47


Company Profile

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Spectrum intelligence as a key to more effective operations and improved site or border security

CRFS provides systems for monitoring spectrum-intensive sites or for any critical area, border, perimeter or building. It pioneered the concept of remote, distributed, real-time networks of intelligent sensors (RFeye® Nodes) to provide continuous 24/7 monitoring of the RF environment. The RFeye is designed to continuously scan and monitor for suspicious or unauthorised signals, carry out signal analysis and demodulation,

and find the source of target transmitters using advanced geolocation techniques. CRFS supplies cost-effective monitoring solutions for sites of all kinds and sizes, wide area or in-building, fixed location or mobile. RFeye Detect is a wide-area system for large sites, such as government ranges, military bases and training grounds, as well as for sensitive borders or coastlines. RFeye Secure is an in-building security system for embassies, government, military or intelligence buildings, airports and prisons, or any secure work area facility. The RFeye Node is a small, lightweight, low-power, IP67-rated unit, built to withstand the harshest environments. Simple to install, connect and start up, it takes care of itself. An embedded Linux system and advanced control software enable remote programming and fully autonomous operation, as well as intelligent cooperation between Nodes for tasks such as geolocation. No local PC server is required and each Node can be directly accessed from anywhere in the world using a secure IP connection. The RFeye is unique in its combination of ultra-fast, real-time functions and its deep data logging capabilities. The system can be

remotely configured with background spectral masks, thresholds and alarms to trigger real-time warnings of any unauthorised or suspicious transmissions. Any ‘events’ can be automatically recorded for subsequent analysis. CRFS also manufactures a range of high-performance RFeye Nexus receivers for stand-alone use in SIGINT applications or integration into EW and other sensor arrays. CRFS is a UK company, with a US subsidiary in California. It serves international customers in many sectors, including military and intelligence, police and homeland security, public safety and spectrum agencies. The company’s large network of agents and distributors provide local in-country integration services and customer support. It also partners with system integrators, value-added resellers and OEMs. CRFS is proud to have been awarded the 2013 Queen’s Award for Enterprise. Contact CRFS to discuss your application or request a product demonstration. FURTHER INFORMATION Tel: +44 (0)1223 815 615 enquiries@crfs.com www.crfs.com

Border & site monitoring

Award-winning spectrum intelligence

spectrum management

Systems, solutions and integrator modules for military, homeland security, intelligence services, border control and secure facilities.

sigint

Visit www.crfs.com

tscm

Detect. Analyze. Geolocate.

48

COUNTER TERROR BUSINESS MAGAZINE | Issue 15


EVENT PREVIEW  In 1984, the International Milipol Committee came into existence as an association whose goal was the promotion of security technology and equipment. That same year, the first international Milipol Show was organised in Paris as the principal information and public-relations tool, open widely to professionals in the field of security, including manufacturers, end-users, buyers and exhibitors of all nationalities. The quasi-confidential field of police, civil and military security equipment, virtually unknown to the general public until that time, was thus brought to light. FROM STATE SECURITY TO CIVIL PROTECTION While the subsiding cold war still held centre stage, security services were already at work in the wings, fighting against such growing menaces as criminality, drugs, organised crime, terrorism, industrial and economic espionage. They expressed their latest requirements and needs for equipment, while investigating all the technologies available. The Milipol Show evolved within this climate of expectation and demand. It broadened out to include the field of security which encompasses private and public communities, that of industry and business, the protection of populations, and internal State security. Held annually during the ‘80s, the Milipol Paris Show found its current rhythm as of 1991, the year in which the biennial scheduling was adopted. In 1995, it acquired new dimensions of considerable importance. As it was now held under the patronage of the French Ministry of the Interior, the Milipol Paris Show became an official event, along the same lines as the international Eurosatory exhibitions for land armament, Euronaval for naval equipment and the Paris-Le Bourget Aeronautics-Aerospace Exhibition.

Today, the international Milipol Trade Show is recognised for as a result of its professionalism and the quality of its exhibitors and visitors attending from around the world, all from the various security sectors. CARTES TRADE SHOW This year, Milipol Paris will be held in conjunction with the Cartes trade show, the leading international event for secure payment, identification and mobility solutions. This means that visitors to Milipol Paris also receive access to Cartes. With nearly 450 exhibitors and 140 conferences headed by international specialists, the event attracts some 20,000 visitors keen to discover the latest trends and products in the sector, including mobile payment, NFC, biometry and M2M. The Identification sector presents the latest innovations in secure identity papers and authentication solutions, all with strong potential in terms of application. Cartes will allow visitors to meet key players in the sector, including ArjoWiggins Security, Bundesdruckerei, Dermalog Identification System, Hologram Industries, JDSU, Legic, Nagra ID, Natural Security, Trüb and Vasco Data Security. You can also meet leaders in digital security like Gemalto, Giesecke & Devrient, HID, Oberthur and Morpho. A day of conferences is being dedicated to identification and security issues, such as digital identity management, authentication technologies and biometry. Every year, the Sesame Awards acclaim the 10 best technological innovations in the sectors of smart cards, digital security, identification, secure transactions and contactless technology. L FURTHER INFORMATION www.en.milipol.com

Subject areas covered at Milipol Paris 2013

Milipol Paris 2013

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Data protection Economic and Industrial Intelligence Systems integration Risk analysis and management CBRN Civil Defence Forensic science services Law enforcement Anti-terrorism – Special Forces Protection of industrial and sensitive sites Fight against organised crime Security of public places – Urban Security Transport security Port and airport security – Border control Road safety Security of financial systems Prison sector

Oil and gas sector

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

49


CCS satcom Ltd, RF Switching and Accessories

RF Matrix switch with Browser

Splitters, Combiners, Couplers 50/75ohm

CCS satcom Ltd, based in Essex in the UK, are suppliers of RF equipment mainly for the 950MHz to 2.4GHz band to broadcasters and earthstations. CCS represent the scalable solid state Matrix switches of Quintech Electronics Inc. These Matrix switches are fully non blocking, full fan-out and stretch from 8 inputs by 8 outputs to512 inputs by 512 outputs. New is a LTE Matrix for modelling networks. CCS carry their own range of high performance passive RF components, splitters, combiners, directional couplers, bias tees etc as well as amplifiers for the 950MHz to 2.4GHz band and also other bands to 14Ghz.

16 RF to 1 fibre CWDM Transmitter CCS have a CWDM RF over fibre-optic product which allows 16 satellite IFs (950-2150MHz) over one single mode optical fibre. The system consists of a 16 input Transmitter and a matching Receiver.

Frequency range 5Mhz to 3Ghz Range -110 to +5dBm

Decimator D3 Low cost Remote Spectrum Analyser 5Mhz to 3GHz Available as a card or a 1U rack 1/4/8-Port rack-mount unit

CCS Satcom Ltd

10 Crittall Drive, Braintree, Essex, UK info@ccs-satcom.co.uk www.ccs-satcom.co.uk


DSEI 2013 Review

EVENT REVIEW

THE DEFENCE COMMUNITY UNDER ONE ROOF

DSEI 2013 enjoyed the strongest ever attendance from UK ministers and the MOD, with the Secretary of State for Defence, Philip Hammond, providing a keynote address highlighting DSEI’s importance as a showcase for the global defence industry An impressive 32,169 visitors attended Defence & Security Equipment International (DSEI) 2013, a rise of 13 per cent on the previous record in 2011. The exhibition featured 1,489 exhibitors, representing 54 countries, and included 40 international pavilions. 97 official delegations from 56 countries attended, marking a 30 per cent increase on DSEI 2011, while the number of additional VIPs who attended increased by 20 per cent to 1,034. The event enjoyed the strongest ever attendance from UK ministers and the MOD. Secretary of State for Defence, Philip Hammond, provided a keynote address on the show’s opening day which highlighted DSEI’s importance as a showcase for the defence industry: “This exhibition is an excellent example of the opportunities that we can create when government and industry work together, hand-in-hand, with a shared objective.” JOINING FORCES This point was exemplified by the signing of the Corporate Covenant on the penultimate day of the event, when Mark Francois – the Minister for Defence Personnel, Welfare and Veterans – was joined by representatives from BAE Systems, ISS Facility Services, BMT Group and General Dynamics UK in order to pledge their support for the Armed Forces community. The UK Capability Showcase, staged by UKTI Defence & Security Organisation further highlighted the link between government and industry.

Other ministers who attended included: the Minister for Defence Equipment, Support and Technology, Philip Dunne; the Minister of State for the Armed Forces, Andrew Robathan; the Minister for International Security Strategy, Andrew Murrison; the Minister of State for Trade and Investment,

Staff, Air Chief Marshal Sir Andrew Pulford; the Chief of the General Staff, General Sir Peter Wall; and the Chief of Materiel (Land), Lt General Chris Deverell. The calibre of international stakeholders was also high: DSEI welcomed guests from new and traditional markets including high

The Corporate Covenant was signed on the penultimate day of the event, when Mark Francois, the Minister for Defence Personnel, Welfare and Veterans, was joined by BAE Systems, ISS Facility Services, BMT Group and General Dynamics UK, in order to pledge their support for the Armed Forces community Lord Green of Hurstpierpoint; and the Lords’ Spokesperson for Defence, Lord Astor of Hever. Michael Moore and David Jones, the respective Secretaries of State for Scotland and Wales, also attended. The MOD also fielded a strong team, epitomised by the attendance of the Chief of the Defence Staff, General Sir Nick Houghton and Chief of Defence Materiel, Bernard Gray. DSEI’s expanded seminar programme included significant contributions from an enviable roll-call of senior military personnel such as: the First Sea Lord, Admiral Sir George Zambellas; the Chief of the Air

calibre representatives from the Middle East, India, South America, South and Far East Asia, Australasia, United States and Europe. INTERNATIONAL PAVILIONS Nations making their debut among the record 40 international pavilions included Japan and South Korea, clear evidence of the importance that these key emerging players place on DSEI. India, a previous exhibitor, increased its presence significantly, mounting both public and private sector pavilions. Other newcomers include Chile, which joined Brazil in representing Latin American growth E

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

51



EVENT REVIEW  markets, while the UAE was among the list of Middle Eastern nations at the event. SIX ZONES OF EXHIBITORS In total, DSEI 2013 enjoyed a strong exhibitor presence across each of its six dedicated zones: Land, Air, Naval, Security & Special Forces, Medical & Disaster Relief and the award winning Unmanned Systems Showcase. Visitors to the Land Zone witnessed Nexter Systems unveiling the Titus armoured vehicle, while Finnish company, Patria introduced its Next Generation Armoured Wheeled Vehicle concept. Air Zone highlights included daily briefings from the RAF presentation team, fixed-wing static displays such as the Eurofighter Typhoon and Spitfire, as well as rotary static displays including the Merlin Mk II and Wildcat. In the Naval Zone, Rolls-Royce unveiled a new design for maritime patrol craft, while the Victoria Dock hosted an enhanced waterborne demonstration programme and a record flotilla of eight warships. This

included two vessels from the Republic of Korea, marking the first time that the Korean Navy has visited London since the 1960s. Demonstrating its strength as the fourth pillar of DSEI, the Security & Special Forces Zone was expanded fivefold on its 2011 footprint to accommodate 70 exhibitors, while the Medical & Disaster Relief Zone showcased products from a wide range of first-time exhibitors such as Lifesaver Systems, Prometheus Medical and Safe Patient Systems.

g Offerin an visitorse focus UNMANNED SYSTEMS v i t a SHOWCASE m r info unmanned Another popular e on th sector, the highlight was the Unmanned Systems systems ed Systems Showcase, which n Unman tre hosted included a daily scenario demonstration Thea ber of of Northrop Grumman’s a num rts unmanned ground vehicle expe systems. Headlining the

CAPACITY

CAPABILITY

demo programme was CUTLASS, Northrop Grumman’s latest generation UGV for the remote handling and surveillance of hazardous threats and Andros Titus, the company’s newest and most intelligent member of the Andros family of UGVs. Offering visitors a compelling and highly informative focus on the growing unmanned

systems sector, the dedicated Unmanned Systems Theatre hosted a number of leading experts such as Cairns Police, Australia who explored factors affecting the wide spread use of UAS by Queensland Police. The seminar theatres across all 6 zones were often standing room only across the week, further highlighting the popularity of all the sessions and the event as a whole. “The records broken this year demonstrate that DSEI continues to strengthen its position as the world leading defence and security event,” said Event Director Duncan Reid. “Traditional markets such as Europe and North America were well-represented, whilst the significant growth in presence of emerging markets like the Middle East, Asia and Latin America, bodes well for the future. “Even at this early stage I can confidently predict that DSEI 2015 will outperform this year’s edition due to the lasting relationships forged with the UK MOD, international delegations and exhibitors – who have already re-booked more space for the 2015 show than they did in 2013.” L

DSEI 2013 Review

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

DSEI 2015 will take place at ExCeL London from 15-18 September 2015 FURTHER INFORMATION www.dsei.co.uk

CONFIDENCE

From bespoke concept design and prototyping to full scale production, Cube Precision Engineering have the Capacity and Capability to ensure your heavy duty manufacturing projects are delivered on time, with Condence. AS9100 Rec C Approved History of sucessful UOR project managment and delivery Supply chain manager/integrators Modern, large, purpose built manufacturing facilities Cube Precision Engineering Ltd Cakemore Road, Rowley Regis, West Midlands. B65 0QW

www.cubeprecision.com Tel: 0121 559 3096 Fax: 0121 561 4551 email: sales@cubeprecision.co.uk Cube Precision Engineering Ltd

…The Right Way

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

53


BESPOKE CARBON AND GRAPHITE PARTS Supply and repair of graphite furnaces Stab vest lining and body armour in 3D woven carbon fibre – enquiries welcomed Chokes and rocket nozzles our speciality

COIDAN

GRAPHITE PRODUCTS LTD Station Road • Kirk Hammerton • YORK • North Yorkshire • YO26 8DQ Tel 01423 330492 • Fax 01423 330647 • Email sales@coidan.com


Photograph courtesy of Sgt Christopher Q Stone

www.coidan.com


MPV

A protected environment for every mission.

Iveco DV’s range of Multirole Vehicles, Tactical and Logistic Trucks and Armoured Fighting Vehicles covers the full spectrum of on- and off-road military requirements and represents a well thought through, comprehensive and effective response to the needs of the military customer. Iveco recognises that this needs change in response to the evolving operational environment, developing doctrine and changing threat. As a part of the company’s commitment to our custo-

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

mers’ needs, we aim to identify or anticipate at an early stage how requirements are likely to develop. As a result, the whole product range is subjected to a continuous development process. Evolving needs are fed back to Engineering, who in turn develop a steady stream of enhancements in terms of payload, mobility and protection. Where necessary, complete new vehicle families are developed.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


DEFENCE VEHICLES

DSEI 2013: SWEET MUSIC

Digital LMV

Iveco Defence Vehicles took the opportunity at DSEI 2013 to showcase a series of vehicles and vehicle developments not previously seen in the UK

8x8 Amphibious SUPERAV

As the dust settles after September’s DSEI 2013 in London, Iveco Defence Vehicles can reflect on a highly successful show which confirmed the company as a significant force in the defence market, both within Europe and worldwide. The depth and breadth of the strength of Iveco’s offerings was seen in the armoured and multi‑role vehicles on the company’s main stand, in the specialist logistic vehicles, both protected and soft-skin, on the Vehicle Display Area – and in the presence of Iveco vehicles on the stands of two other companies. SHOWSTOPPER The undoubted centrepiece of the stand was the 8x8 amphibious SUPERAV, on display for the first time in the UK. Based on the drive train and running gear of the proven Centauro/ VBM family, but with a highly innovative body, SUPERAV demonstrated outstanding mobility both on land and in the water during its recent trials for the USMC’s MPC programme. The incorporation of lessons learned from recent conflicts was also in evidence in the blast tests on this programme, on

MPV Ambulance

which SUPERAV exceeded the requirement comfortably. Because the chassis is very well understood by Iveco’s engineers, it is possible to adapt the hull at a relatively low cost to meet specific user requirements. With a fully digitised CAN-based electronic architecture and the ability to carry a remote weapon station of up to 30mm, SUPERAV’s price is highly competitive and reflects its proven MOTS drive train. The vehicle is extremely well placed, both for programmes such as the upcoming VBA programme for the Italian Marines and for land-based requirements, such as the UK’s UV-programme. Also on the stand was the Medium Protected Vehicle (MPV) configured as an ambulance and incorporating the high roof necessary for this role. Much work has gone into the design of the interior of the vehicle, and this was recognised and commented on by several experts on the subject matter at the show. AMBULANCE FOR ITALY A particular feature is the stretcher system which enables even a 95th percentile patient to be loaded with ease. The Ambulance variant

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

is currently in production for the Italian Army. Completing the display on the stand were the two most recent variants of the LMV. The first of these was the Digital LMV – an LMV featuring a fully digitised electronic system. Based around two CAN buses, the new architecture enables the driver to exercise complete control over the vehicle’s systems from his station and allows the capture of a wide range of vehicle prognostic and diagnostic data. This is a significant step towards the provision of a vehicle which already has the necessary electronic background to easily accept a generic vehicle architecture fit. The second LMV was a vehicle produced in collaboration with Cristanini SpA, the Italian-based CBRN specialist. Equipped with full COLPRO, the vehicle is designed to undertake a full range of CBRN reconnaissance and survey tasks and is equipped with a soil and water sampling system (samples are to be retained for later analysis) and a warning flag dispensing system.

LMV CBRN Reconnaissance Variant

The vehicle is fully connected with the formation CBRN warning and reporting system, providing accurate and timely updates to ensure information is always current. L FURTHER INFORMATION Tel: +44 1923259728 www.iveco.com/uk

The scope and depth of Iveco’s offering was shown in the display of armoured and multi‑role vehicles on the main stand, protected and soft‑skin specialist logistic vehicles in the Vehicle Display Area, and in the presence of Iveco vehicles on the stands of two other companies Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

57



CRIME PREVENTION

HONING NATURAL SKILLS TO PREVENT CRIME: THE I-STARED BEHAVIOURAL ASSESSMENT SYSTEM

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

With the London 2012 Olympics looming so was the ever-present threat of extremist violence. Facing such a challenge caused TfL to set out and find a system of training focused on the transport system

When Transport for London (TfL) heard the Olympics was coming to London, officials in the Community Safety, Enforcement & Policing Directorate knew there would be challenges ahead if the record of seven successive years of crime reduction on the transport system was to remain on a downward curve. TfL went looking for a system of training that would enable it to make its on-system army of over 3,000 ‘Olympic travel ambassadors’ an effective ‘eyes and ears’ crime prevention force during a period when the transport system was to carry more customers than ever before. In addition, the ever-present threat of extremist violence loomed in the background, causing a sense of foreboding, albeit well-suppressed, among the agencies involved in the maintenance of community safety. Step forward Dr Tim Pascoe, director of notfor-profit social enterprise company Community Safety Europe (www.communitysafety.eu). As one of the UK’s most eminent criminologists, Dr Pascoe’s CV is like a guide to crime prevention: a former examiner for the Home Office’s Crime Reduction College, chairman of the UK Design Out Crime Association, adviser to the British Standards Institute and the Centre European de Naturalisation on crime prevention through environmental design, and with a track record of crime reduction delivery in challenging fields. Tim explains: “My involvement in projects within the ‘Prevent’ agenda had led me to be concerned for some time about the limitations of existing behavioural assessment techniques,

particularly when it came to applying them in busy, complex environments. Quite necessarily, much emphasis has been placed on business continuity and resilience, with less emphasis being put on the potential of vigilance staff as a preventative tool. That’s why I worked with colleagues who have first-hand

And secondly, unlike other behavioural assessment systems on the market, the I-STARED system is subject to academic rigour via Community Safety Europe’s accreditation by the Chartered Institute of Legal Executives, thereby delivering a system that has credibility as a learning experience for recipients. Dr Pascoe added: “Vigilance is not simple in complicated environments. In developing I-STARED we haven’t thrown the behavioural assessment baby out with the bath water, we help trainees understand why certain features of a location make it more likely to be chosen as a site for crime. Those are the best places to apply behavioural assessment techniques with more likelihood of success.” TfL’s Community Safety & Crime Prevention Manager, John Strutton, was given the responsibility to find a suitable system of training for TfL staff: “Finding a system that enhanced and focused the vigilance of staff was essential.

TfL went looking for a system of training that would enable it to make its on-system army of over 3,000 ‘Olympic travel ambassadors’ an effective ‘eyes and ears’ crime prevention force experience of using behavioural assessment in policing and general community-based situations to develop the I-STARED system.” Standing for ‘Intelligent Situational Threat Assessment, Risk Evaluation and Determination,’ I-STARED represents a departure from the norms of behavioural assessment in two ways. The system for the first time combines a thorough grounding in relevant crime prevention theory to enable recipients to understand the decisions made by criminals when they plan crimes. Thus, having enabled vigilance staff to know where to look for best effect, the system then trains course recipients in how to apply proven behavioural assessment techniques to identify unlawful intent and, importantly, what to do next.

That’s why the decision was taken to invest in the accredited I-STARED ‘Training for Trainers’ course. We have rolled out the essentials of the course to over 3,000 forward-facing staff, and raise this number on a regular basis.” Dr Pascoe is pleased with the reception the system has received: “I-STARED is a finalist in the 2013 Security Excellence Awards, and we are talking to blue riband private sector organisations about its use as a loss-prevention tool in their manufacturing locations. The system works against all types of crime wherever eyes and ears are available to apply it. We anticipate it will become an industry standard in due course.” L FURTHER INFORMATION www.tfl.gov.uk

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

59


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PRINTING

COST-EFFECTIVE, SECURE PRINTING CAN BE GREEN

Graham Lowes, marketing director at OKI Systems UK, discusses how to deliver green printing that is both secure and cost-effective

Today, there is a greater awareness of the need to reduce carbon emissions and work in an environmentally friendly manner. The Climate Change Act established a target for the UK to reduce its emissions by at least 80 per cent from 1990 levels by 2050. With this in mind, organisations really need to reassess workflows to ensure they are working as efficiently as possible. The good news is that green perceptions are changing; it no longer has to be expensive or time-consuming to change printing practices and go green, nor does this mean having to compromise on security. Not when there are expert print vendors, such as OKI, who can guide any organisation through the print landscape and offer a range of innovative solutions, such as managed print services. The time has come to take action and address the increasing need to go green and enhance print security at the same time. DON’T COMPROMISE When moving towards greener printing practices, it is critical that security measures are not overlooked. While the days when hard copies of documents are left at the printer for anyone to pick up should be long gone by now, new security challenges have evolved. With an increase in remote and flexible working, offices now need to tighten control over network security and keep an even closer eye on printer access to avoid a data breach. A cornerstone of OKI’s business philosophy is its commitment to providing the greenest most secure printing solutions. For example, OKI’s

60

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

managed print services approach unifies and manages all print processes, while ensuring printing operations are more closely matched to an organisation’s workflow and specific goals, such as printing securely, reducing costs, energy consumption and carbon footprint. Deploying managed print services means OKI can closely manage all print processes to ensure the organisation is using both the best green and security approaches. For example, to secure the network, businesses should be using settings such as Transport Layer Security (TLS) on devices. The TLS protocol allows client-server applications to communicate across a network in a way designed to prevent eavesdropping and tampering as data is encrypted. UNAUTHORISED USERS In addition, IP address-filtering enables restricted access to a printer to be limited to a specific PC or range of PCs. If an organisation uses this feature it can reduce the chance of unauthorised users either printing any unnecessary documents or changing a printer’s settings. Besides securing the network, it is vital that the jobs are protected at the printer.

To meet this need, OKI offers Secure Print, which enables the user to store documents prior to printing on the printer’s hard disk drive (HDD) or secure data (SD) card. It only becomes possible to access content when a secure password is entered on the printer’s front panel and once printed, the document is automatically deleted from the system. Devices such as the OKI MB491 and MC562 multifunction printers also feature an encrypted scan-to-PDF setting. Encrypted PDF files are more secure than standard PDF files as they require the recipient to have a password in order to open the folder. Passwords can be either globally set or designated for one user when the email is sent. GREENER PRINTING Working with OKI’s managed print services, organisations get the best of both worlds as they can feel reassured that only the most secure and advanced printing solutions are being deployed. Working with the most advanced printers can help reduce energy consumption and costs. In fact, according to research from the International Data Corporation, newer printers typically use 30 per cent less energy. To make printing greener, OKI is now building “auto-power off” technology into many devices; the setting automatically powers down the printer after extended periods of non-usage, which can be determined by the user. While “deep sleep” mode, available on all OKI devices, reduces power consumption to the barest minimum (often less than one watt). However, it is also important to remember that managed print services is much more than the deployment of new printers, it includes adopting smarter working habits. In order to work greener and cut costs organisations – with guidance from OKI – need to ensure that all devices are set to default double-sided and mono printing, which reduces paper and toner costs. Driven by a need to gain value for money and a desire to improve environmental credentials, many organisations are steadily migrating towards greener printing solutions and OKI is perfectly equipped to meet this need, while ensuring that security isn’t comprised. In fact, working with OKI’s managed print services, it is possible to ensure print is not only greener and more affordable, but security is enhanced with the use of the most innovative devices and practices. L FURTHER INFORMATION www.oki.co.uk

With guidance from OKI, in order to work greener and cut costs, organisations need to ensure that devices are set to default double-sided and mono printing, which reduces paper and toner costs


EVENT PREVIEW

BORDER SECURITY ANNUAL GATHERING AT THE WORLD BORDERPOL CONGRESS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Following last year’s successful event focusing on effective border management, this December’s Congress will focus on the everyday business of making borders that work for the benefit of all

Last year’s BORDERPOL successfully focused attention on tactics and tools for effective border management. This year, the World BORDERPOL Congress (3-4 December, Central Hall, Westminster, London) will be hosted by Border Force UK. The specially invited policymakers, practitioners and frontline decision-makers will be challenged to expand and share their understanding, knowledge and experiences associated with the everyday business of making borders that work for the benefit of all users and stakeholders. The 2012 event was a major step in achieving BORDERPOL’s primary objective in becoming the catalyst for dialogue between the multiple agencies involved in border management. Unlike national policing with Interpol and customs with the World Customs Organization, border policing has no internationally mandated organisation ready and able to bring together the wide variety of agencies involved in managing international borders effectively. To complicate matters, no two nations manage their borders the same. The mix of agencies involved varies from country to country with varying degrees of interagency co-operation and varying degrees of success. Border administrations around the world are by their nature secretive bodies charged

with managing increasingly complex social, economic and law enforcement programs. BORDERPOL has once more brought together government, academia and industry to focus on challenging issues as it relates migration management, counter-terrorism, technological advances and the efficacy of the interdisciplinary institutions that have been created over the past decade on the national and regional levels. This year, BORDERPOL is celebrating its 10th year of operations and has done so successfully due to the resilience of its team and its progressive approach. Over the past decade, it has continually promoted the three Cs in global border security and advanced homeland protection: transnational co-operation, communication and consultation. This event will provide participants with demonstrable opportunities to learn from and network with like-minded experts from around the world. The agenda includes keynote presentations by UK immigration minister Mark Harper MP and Sir Charles Montgomery, director general of Border Force. There will be workshop sessions where experts and policymakers will debate and discuss the most important issues of the day. Since 11 September 2001, there has been numerous models of organisation tried out to make border management more effective and streamlined. Tom Tass, executive director of BORDERPOL, said, “The recent events in the global political and economic arena are having an impact on the border security paradigm not seen possibly since 9/11. BORDERPOL’s raison d’être is once again being put to use by parties interested in finding solutions to the border security migration management challenges experienced worldwide.” Controlling and managing international borders in the 21st century continues to challenge border control and immigration agencies around the world. The World BORDERPOL Congress provides a platform for border protection forces and agencies to discuss issues and challenges and will continue to develop international co-operation and collaboration amongst the border management and security industry. L FURTHER INFORMATION www.borderpol-event.org

Confirmed speakers Clarence Yeo, commissioner, Immigration and Checkpoints Authority, Singapore Mandie Campbell, chief operating officer, Border Force, UK Jeremy Lee, deputy director international relation, Border Force, UK Mile Milenkoski, head of unit for state borders, Macedonia Brigadier General (Select) Greg Hasse, director, US EUCOM JICTC Michael O’Connell, director of operation police support and chairman of INTERPOL Integrated Border Management Task Force, France Andrew Priestley, business development director, Government & Security, EMEA, ARINC, UK Ricardo Letosa, senior manager business development, Government & Security Solution Line, SITA, Spain Mika Poutiainen, head of Vaalimaa Customs, Finnish Customs, Finland Peter Cook, director, Security Association for the Maritime Industry Mark Storti, head of Intelligence & Targeting (Maritime), Border Force, UK Jonathan Trumble, head of Transnational Threats Department, OSCE, Austria Erdal Duzdaban, border management officer, OSCE Office, Tajikistan Tony Smith, managing director, Fortinus, UK Aron Elkins, PhD, University of Arizona, BORDERS, USA Tarvinder Sembhi, VP, WCC Group, Netherlands Tony Erne, head of Intelligence, Immigration Enforcement, Home Office, UK

Issue 15 | COUNTER TERROR BUSINESS MAGAZINE

61


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service ADS 9 Arinc BC, 38 ATG Access 34 Audax Global Solutions 28 CCS (Satcom) 50 Clarion Events 8, 58 Cobham Antenna Systems 13 Cognitec Systems IFC Coidan Graphite Products 54, 55 Community Safety 59 CRD Protection 46 CRFS 48 Cross Match Technologies 22 Cube Precision Engineering 53 Deben Group 10 DMS Protective Equipment 44 E2V 52 Fire Eye 14 Fleet Auction Group 27

62

COUNTER TERROR BUSINESS MAGAZINE | Issue 15

Frontier Pitts 31, 62 G6 Global 12 GMO Global UK 17 GPS Perimeter IBC Guava 6 Holmatro Rescue Equipment 30 Infranor 32, 33 Iveco 56, 57 Lincoln Security 21 Marshalls 24 OKI Systems 60 Pentax Security 20 Saftey Flex 36, 37 Scott Safety 40 Security Labels 4 Seven Technologies Group 42 World Border Organization 61 Yorkshire Profiles 18




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.