Counter Terror Business 16

Page 1

www.counterterrorbusiness.com | ISSUE 16

CYBER SECURITY | CRITICAL INFRASTRUCTURE | COUNTER TERROR EXPO PORT SECURITY

BLAST MITIGATION

POLICING

FINDING A BETTER WAY TO POLICE

Independent review sets out new ways to improve policing

AIRPORT SECURITY

A RISK-BASED APPROACH

What will passenger and baggage screening look like in the future?

EVENT PREVIEW

BORDER SECURITY

SMi’s Border Security 2014 Conference tackles the key challenges facing border control agencies

NEWofSopinion

l ence ty dea Differ on amnes ity d n u w no mm over S gaming co terror Online d by antite targe rveillance y of su galit over le e s t b u Do hon NSA p gs din recor



COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 16

CYBER SECURITY | CRITICAL INFRASTRUCTURE | COUNTER TERROR EXPO PORT SECURITY

BLAST MITIGATION

POLICING

FINDING A BETTER WAY TO POLICE

Independent review sets out new ways to improve policing

AIRPORT SECURITY

A RISK-BASED APPROACH

What will passenger and baggage screening look like in the future?

EVENT PREVIEW

BORDER SECURITY

SMi’s Border Security 2014 Conference tackles the key challenges facing border control agencies

NEWofSopinion l nce ty dea Differe on amnes wd munity over Sno gaming com rror anti-te Online ed by target veillance y of sur alit over leg ne Doubts NSA pho s ing record

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A TERRIFYING STATISTIC While the Western world hasn’t witnessed anything as major as the 2001 Twin Towers attacks in America, figures produced by the National Consortium for the Study of Terrorism and Responses to Terrorism show that terrorist attacks and deaths as a result hit a record high in 2012. More than 8,500 terrorist incidents killed nearly 15,500 people as violence tore through Africa, Asia and the Middle East – a 69 per cent rise in attacks and an 89 per cent jump in fatalities since 2011. News just in that Egypt’s deposed President Mohamed Morsi will stand trial on charges of conspiring with foreign groups to commit terrorist acts. Morsi, toppled by the military in July and already on trial for alleged involvement in the killings of opposition protesters, was also accused on of divulging “secrets of defence to foreign countries” and “funding terrorism for militant training to fulfil the goals of the International Organisation of the Muslim Brotherhood”, according to a prosecution document seen by Al Jazeera. The UK’s Cyber Defences were bolstered in December when the Government published an update to the National Cyber Security Strategy. Plans include a new cyber security suppliers scheme and the development of a new online course in cyber security from the Open University. See page 29 for details. And the industry looks forward to the 6th edition of Counter Terror Expo, which takes place on April 29-30 in London. The show offers the most comprehensive display of technology, equipment and services alongside a high level seminar programme, which is designed to share best practice in protecting against evolving threats from terrorism. See page 43 for the lowdown. We wish all CTB readers a happy Christmas and a safe and prosperous 2014.

Danny Wright

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Cassar REPRODUCTION & PRINT Argent Media

© 2013 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

3


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS

07 CTB NEWS

37 CRITICAL INFRASTRUCTURE

Online gaming community targeted by anti-terror surveillance; NSA difference of opinion on Snowdon amnesty deal; Saudi anti-terror law labelled ‘draconian’

A preview of the Critical Infrastructure Protection and Resilience Europe conference, to be held in London on 12-13 February

11 PORT SECURITY

Despite the fundamental importance of ports to the global economy, it is only recently that any form of common security framework has been developed to help address the threat of terrorism, writes Henk van Unnik

11 18

39 POLICING An Independent Police Commission review headed by Lord Stevens highlights 37 recommendations on how to transform today’s policing

15 AIRPORT SECURITY

43 COUNTER TERROR EXPO 2014

18 BLAST MITIGATION

45 BORDER SECURITY

In response to the ever-evolving nature of terrorism, Counter Terror Expo 2014 will have five new zones, as well as a multi-stream conference

Terrorists are particularly innovative and adaptive at getting around airport passenger screening. So what does the future look like for airport security?

SMi’s Border Security 2014 conference on 26-27 February will feature discussion on the key emerging efforts of international border control agencies

Glass can be used to intensify the damaging effects of an explosion. But there are ways to mitigate the damage, writes Steve Chambers

29

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

23 HOSTILE VEHICLE MITIGATION

Stephen Munden, manager of the PSSA’s Verification Scheme, reviews some challenges, trends and changes in Hostile Vehicle Mitigation

39

29 CYBER SECURITY

A progress report on the National Cyber Security Strategy issued in December aims to demonstrate the progress made by the UK in addressing the threat from cyber attacks

Fo featu r the late res st www and anal news, ysis .coun busin terterr , visit o ess.c om r

www.counterterrorbusiness.com | ISSUE 15

UE 16 .com | ISS

rbusiness

nterterro

www.cou

www.cou

COUNTER UCTURE |

INFRASTR ITICAL E 12 | CRIS URITY m | SU

CYBER SEC

co

s. usines

rorb terter

nterterro

CYBER SECURITY | MILIPOL PARIS 2013 | FORENSICS | PLUS MORE PERIMETER SECURITY

rbusiness

.com | ISS UE 16

MARITIME SECURITY

CYBER SEC

O

TERROR EXP

IGATION

NATIONAL SECURITY

BLAST MIT

TY

PORT SECURI

DSEI 2013

URITY | CR ITICAL INF RASTR

UCTURE | COUNTER

NATIONAL THREAT LEVELS

.coun www

PORT SECURI

TY

TERROR EXP

O

BLAST MIT

IGATION

Adapting your security plans in line with current threat levels

mETEr | pErI UITY NTIN ESS CO BUSIN

O 2013 | BapC rITY SECU

| plUS

A BETTER FINDINGTO LICE out WAYpendent PO review setscing

pol eland ed US Hom nominat kers in ing hac Recruit ernment gov

Y

SECURIT

Counter Terror Business CYBER

OUr W’S EYNCE? HO DEFR BORD SECURITY IEW

NT r EVEVIEW nte Cou t PRtdEown too 2013naon

n xp do Cou rror E , Lon -25 Te mpia l 24 Oly Apri

The need to protect the utilities sector from terrorist attack

ists hacktivrism ainst ro ting agd cyber-ter Protec an

les the ISM nce tack TERRsOR 2014 Confere ncie er Security control age SMi’s Bord es facing border key challeng

ISm rrOrDEX8 al TE IN aring 15 d comp st time GlOB ing an r the fir

S inion al op NEW e of nesty de renc ity Diffe don am mmun r Snow ng co terro over e gami antiOnlin eted by nce of targ surveillalegality er e ov ts on Doub NSA ph ings rd reco

rorbu

sines

s.com

| ISSU

E 11

POLICING FINDING A TTER WAY TO BE POLICE Inde BU

pendent SINES new way ew sets out S CON s to imprevi TINUIT rove policing Y | PE RIMET ER SE CURITY AIRPORT SECU | DEF A RISK-BAS RITY ENCE FOCU ED S|& AP

RITY

AIRPORT SECU

ASED A RISK-BOA CH WSer and APPRpassNEeng

el for Panlook ics g What will ir ofenin cted scre Eth don sele baggageCha in Lonfutu head yre? ingthe Securit like icin

EVENT PREV

KEEPING THE UK RUNNING

poli Inde to improve new ways

mOrE

www .coun

terter

CRITICAL NATIONAL INFRASTRUCTURE

POLICING

EVENT PREVIEW

TRANSPORT SECURITY EXPO 2013

PROACH

What will passenger baggage scre and enin like in the g look future?

The industry gathers to discuss the major threats

MORE

CYBER SECURITY

www.counterterrorbusiness.com EVENT PREV

BORDER SECURIT Y IEW

What governments and industry can do together to protect S cyber againstNEW of opinion Difference deal threats on amnesty over Snowd nity

SMi’s Bord er Security key challeng 2014 es facing bord Conference tack les the er control agencies

commu Online gaming anti-terror targeted by surveillance legality of Doubts over NSA phone recordings

Rank tries fo coun

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE TRAN

SPORT

V

CE IllaN

PROT ECT SECURIT

Y

5



INTELLIGENCE

NSA’s internal difference of opinion on amnesty deal for Edward Snowden The man in charge of assessing the damage caused by the disclosures of former intelligence contractor Edward Snowden, has revealed that he could be open to an amnesty deal providing Snowden ‘stops leaking documents. Disclosures by Snowden have revealed the extent of the NSA’s spying activity. But, according to the BBC, NSA Director General Keith Alexander has dismissed the idea. The US has charged Snowden with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence Each of the charges carries a maximum 10-year prisons sentence. Ledgett spoke to US television channel CBS about the possibility of an amnesty deal: “So my personal view is, yes it’s worth having a conversation about. ”I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high, would be more than just an assertion on his part.” But NSA boss General Alexander, who is retiring early next year, rejected the idea of any amnesty for Snowden: ”This is analogous to a hostage taker taking 50 people hostage, shooting 10, and then say, ‘if you give me full amnesty, I’ll let the other 40 go’. What do you do?” “For much of Congress, which gave every indication of wanting to see Mr Snowden torn limb from limb when the leaks started, would be apoplectic; it would be an unimaginably hard-sell politically. The NSA fears that Mr Snowden is in possession of a considerable amour more data, and is prepared to make it public.

Snowden has been charged with theft of US government property

Reports suggest that the agency is finding it very difficult to work out what Mr Snowden did and didn’t take. In an interview with Reuters, Ledgett said he was deeply worried about highly classified documents not yet public that are among the 1.7 million files Mr Snowden is believed to have accessed. Snowden’s disclosures have been “cataclysmic” for the agency, said Ledgett. Earlier this month, a UK newspaper editor told UK MPs only 1 per cent of files leaked by Mr Snowden had been published by the newspaper. The state department says its position has not changed and that Mr Snowden must return to the US to face charges, according to the BBC. Amnesty for Snowden how seems extremely unlikely, following the news that he has offered to help Brazil investigate US spying in return for being granted political asylum. Snowden is currently living in Russia, where he has been granted a year’s asylum READ MORE: until next tinyurl.com/o63q36g summer.

COUNTER-TERRORISM

Charity Commission needs to get tougher on terrorism says Walker Professor Clive Walker of the University of Leeds says in evidence to the Home Affairs Committee that the commission has failed to carry out its ‘zero tolerance’ counter-terrorism strategy. An expert on terrorism and the law has questioned the Charity Commission’s desire to deal with allegations of terrorist activity in charities. In a submission to an inquiry on counter‑terrorism by the House of Commons Home Affairs Committee, Professor Clive Walker, from the Centre for Criminal Justice at the University

of Leeds, says the commission is slow to use its powers to tackle suspected abuse of charities by terrorists. ‫‏‬Walker says that the commission is a “green-light” rather than a “red-light” regulator, with a focus on enabling and encouraging charities and charitable giving. ‫‏‬He says that the commission’s track record “does not match the seriousness with which the threat of terrorism is depicted within Contest”, the ‫‏‬government’s counterREAD MORE: terrorism tinyurl.com/n9a9hgx strategy.

TERRORISM

Egypt’s former president faces terrorist charges

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Egypt’s former president Mohamed Morsi will face a second trial for an alleged terrorist plot devised in collaboration with foreign groups, Egypt state television has reported. Morsi is already on trial over allegations of inciting the murder of opposition protesters last winter. Prosecutors said he would now face additional charges connected to an alleged collaboration with the Palestinian group Hamas and the Lebanon’s Hezbollah, two groups that, like Morsi’s Muslim Brotherhood, are adherents to political Islam. The latest charges appear to be the formal conclusion of an investigation that began in late July, nearly a month after Morsi was overthrown, when prosecutors started researching claims that the Brotherhood had colluded with Hamas to facilitate a jailbreak during Egypt’s 2011 uprising. The prosecution said it was “the biggest case of conspiracy in Egypt’s history”. Prosecutors alleged that the Brotherhood were behind a string of attacks on police and army officers in Egypt’s Sinai peninsular after Morsi was ousted. It also claimed the group was party to an eight-year-old agreement for Hezbollah and Iran’s Revolutionary Guards to provide training to READ MORE: Egyptian tinyurl.com/o6alcud Islamists.

SURVEILLANCE

Online gaming community targeted by anti-terror surveillance UK surveillance agencies spied on communities inside online games including ‘World Of Warcraft’ in an effort to keep tabs on potential terrorist cells. Agents working with GCHQ in the UK and the NSA in the United States worked to try and find potential threats inside the games, based on fears that their chat functions were being used to circumvent wider surveillance online. It was also thought that some games could be used to virtually train potential terrorists in the use of weapons. It was also reported that so many agents were spying “in‑game” that a “deconfliction” team was employed, to make sure spies weren’t actually just watching each other. The news was first reported by The New York Times, The Guardian and ProPublica using information leaked by former NSA worker Edward Snowden, who is now in Russia. Blizzard, who make ‘World of Warcraft’, said in a statement that any surveillance was “done without our knowledge or permission”. Other networks targeted included Xbox Live, according to The Guardian.

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

7


MOBILE SECURITY SOLUTIONS

BODY WORN SYSTEM and 3G Transmission in ‘real time’ BODY WORN SYSTEM HIGHLIGHTS n Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memory n Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location. The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/ Edge/GPRS SIM based cellular provider. Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications

Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: info@audaxuk.com W: www.audaxuk.com


SURVEILLANCE

Serious doubts about the legality of NSA gathering phone records A judge has ruled that the US National Security Agency’s (NSA) gathering of Americans’ phone records is likely unlawful. The judgement on the so-called metadata counter terrorism programme was made yesterday by District Judge Richard Leon, appointed by Republican President George W Bush in 2002, raising “serious doubts” about the value of the scheme. ”I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systematic and high-tech collection and retention of personal data on virtually every single citizen,” he wrote in a 68-page ruling. The Department of Justice said it was reviewing the ruling in a case brought by Larry Klayman, a conservative lawyer, and Charles Strange, described in court documents as the father of a cryptologist technician for the NSA who was killed in Afghanistan in 2011. The judge ordered the government to stop collecting data about the two plaintiffs, who were Verizon Communications customers, though Leon suspended enforcement of his injunction against the program “in light of the significant national security interests at stake in this case and the novelty of the constitutional issues” pending an expected appeal by the government. An official said an appeal was likely and Verizon READ MORE: declined tinyurl.com/p3d4h5h comment.

COUNTER-TERRORISM

UN extends CTED mandate for another four years

The UN Security Council has extended the mandate of the Counter-Terrorism Committee Executive Directorate (CTED) for another four years. The Council unanimously decided that CTED – which provides advice to the Counter‑Terrorism Committee assisting States to prevent terrorist acts both within their borders and across regions – will carry out its work until 31 December 2017. The Council established the Committee in the wake of the 11 September 2001 terrorist attacks in the United States by resolution 1373, which obliges all States to criminalise assistance for terrorist activities, deny financial support and safe haven to terrorists, and to share information about groups planning terrorist attacks.

The Council underscored “the essential role of CTED within the United Nations” to assess issues and trends relating to the implementation of resolutions 1373 as well as 1624. Adopted in 2005, resolution 1624 builds on 1373 and calls on States to prevent and prohibit incitement to commit terrorist acts, strengthen international cooperation and border control, and enhance dialogue and understanding among civilizations. The Council also directed CTED to identify emerging issues, trends and developments related to the two resolutions, while taking into account the UN Global Counter-Terrorism Strategy, and to advise the Committee on practical ways for Member States to READ MORE: implement tinyurl.com/pypomns them.

TROOP WITHDRAWAL

ANTI-TERROR LAW

UK plans Afghan troop withdrawal

Saudi anti-terror law labelled ‘draconian’

David Cameron has told MPs that 3,800 British troops – almost half of the current force serving in Helmand province – are to be withdrawn from Afghanistan next year. Troop numbers are already being reduced from 9,500 to 9,000 before Christmas. The Prime Minister also said numbers would fall to around 5,200 by the end of 2013. All Nato operations are due to finish by the end of 2014, with responsibility being transferred to Afghan forces. But a ‘small number’ of British troops will remain in the country beyond that, working at an officer training academy and “involved in returning equipment and dealing with logistics”, Mr Cameron said. “We’ll be able to see troops come home in two relatively even steps”, in 2013 and 2014, In a statement to the House of Commons, Defence Secretary Philip Hammond added: “Over the last 11 years we have been helping to ensure that Afghanistan’s past is not inevitably its future. ”As we move towards full transition at the

Philip Hammond: “Our Afghan combat mission is drawing to a close, but our commitment is long-term”

end of 2014, it is clear that there remain huge challenges ahead for the Afghan people. Our combat mission is drawing to a close, but our commitment to them is long term.” On-going funding commitments to Afghanistan amount to £250m a year. Hammond suggested that, if this level of aid spending were to continue, “the Afghan government will need to address the corruption which remains rampant, and could become a very real threat to the long-term stability of Afghanistan.”

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

An anti-terror law labelled ‘draconian’ by human rights activists has been adopted by the council of ministers headed by Saudi King Abdullah bin Abdulaziz Al Saud, which provides for extreme punishment for people involved in aiding and abetting terror crimes. Named the Penal Law for Terrorism Crimes and Financing of Terrorism, the law is aimed against those trying “to disturb public order, defaming the reputation of the state, or threatening the kingdom’s unity.” This law was criticised when its draft was leaked by Amnesty International (AI) in July 2011. Culture and Information Minister Abdul Aziz Khoja said the Cabinet, chaired by Crown Prince Salman, passed the law on the recommendation of the Shoura Council and the Interior Ministry. Khoja said the punishment stipulated in the existing Anti-Money Laundering Act would be applied for terrorists and funders until a new bye‑law READ MORE: is tinyurl.com/njxucgg enacted.

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

9


Cable excellence engineered through quality Professionalism in providing cables for demanding environments and applications is Belcoms business. Our experience extends across many industries and we are adept at migrating the best cable solutions to apply to specific demands ranging from production processes to asset protection systems. As applications for recognised data transmission protocols migrate into more demanding areas of industry, so the demands on the performance of the cables increases. Belcom have over 21 years of trading experience designing, producing, stocking and distributing electronic cables for use in challenging areas. Within the Belcom team there is over a 100 years combined experience in this field and we are still dealing with new applications every week, they can range from concept to solution and production or simply selecting from our stock an appropriate cable to do the job. For further information contact us on 01279 871150 or visit us at www.belcom.co.uk

0013

01279 871150

www.belcom.co.uk


FRAMEWORKS

Port Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Henk van Unnik

PORT SECURITY: A WORK IN PROGRESS?

Despite the fundamental importance of ports and harbours to the global economy, it is only relatively recently that any form of common security framework has been developed to help address the threat of terrorism, writes Henk van Unnik, a member of the Executive Committee of the European Commission’s FP7 project ‘SUPPORT’ With 90 per cent of EU’s external trade and 40 per cent of internal trade transported by ship, the contemporary sea port is a vital cog in the massive machine that is 21st Century commerce. Unsurprisingly, port infrastructure and the 3.5 billion tonnes of freight that flows through EU facilities are vital to maintaining both global and individual countries’ economic wellbeing. From a security perspective, ports, harbours and their associated infrastructure can be considered high risk terrorist targets for a wide range of reasons. Not only would an incident fulfil the terrorist’s desire for chaos by causing severe localised disruption, but the repercussions would be felt through the logistics chain across Europe and around the world. Threat levels would be heightened with security checks increased. The throughput of cargo would be reduced and logistics chaos could be expected due to the likelihood of false alarms precipitated by increased vigilance, concern and uncertainty. An attack on a port installation would also fit with the contemporary terrorist modus operandi where the desire to create fear, chaos and casualties is often married to a need for exposure to the world’s media. The world’s 24 hour rolling news channels would not hesitate to cover a terrorist attack on a port facility in every grim detail.

THE THREAT IS COMING CLOSER Attacks on USS Cole in Yemen and French oil tanker Limburg in the Arabian Sea have already demonstrated how vulnerable large vessels are to terrorist attack. Perhaps more worrying is the incident at the Israeli Port of Ashdod where an attempted attack on the port’s infrastructure was foiled. Intelligence indicates that terrorist groups are training for more sophisticated, maritime operations and the current instability in Syria is certainly bringing the threat closer to Europe. Post September 11 2001, the United Nation’s International Maritime Organisation (IMO) realised that a step change in ship and port security was required to address the frightening new terrorist threat where existing understanding of modus operandi or potential targets no longer applied. Within the Safety of Life at Sea (SOLAS) regulations, the IMO developed the International Ship and Port Security code (ISPS) which regulates security onboard ships, as well as inside ports and terminals which receive seagoing vessels on international voyages. The ethos of the

ISPS code is very preventive with a focus on stopping weapons or explosives being brought into a terminal or onto a ship. This is addressed by means of a vulnerability assessment and threat assessment based on the type of terminal. Risks and vulnerabilities are very different when considering a container, bulk or passenger terminal and so all assessments must be specific and bespoke. The ISPS code also specifies a basic security framework including monitoring and controlling access, monitoring the activities of people and cargo, the preparation of specific ship and Port Facility Security Plans and the appointment of Ship Security Officers and a Port Facility Security Officers (PFSO). 148 flag or coastal states around the world have committed to the ISPS Code following its initial deployment in 2004 and now have a legal obligation to comply with its requirements and to submit information to the IMO.

Ports, , rs harbou s and ay waterwsociated their asture can be uc infrastr red high-risk conside t targets due terroris istics chain to log cussions reper

SAFEGUARDING EU PORTS Soon after the IMO’s deployment of the E

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

11


INDUSTRIAL OPTICAL SYSTEMS DIVISION

H63ZME-F-HD-PR01 63X ZOOM LENS

RICOH ENHANCED BINOCULARS

...for Security Installations

...for perfect mobile Security

The lenses zoom range is 20 to 1,250 mm, and when the internal 2X extender is switched in, the focal length increases to 40 to 2,500 mm. With 2,500 mm focal length at 1,000 m distance, the field of view is 2.5 m by 1.9 m. The extremely high magnification in combination with HD resolution means a person can be identified at distances in excess of 1 km. Therefore, this lens is ideal for video surveillance in city centers, air ports, harbours, as well as at the border, intersections, city streets and highways. The integrated PAIR Technology reduces the affect of particles in the air, such as fog, rain, sand, smoke and snow.

The perfect solution for enhanced mobile security: Digital binoculars with electronic image stabilisation for clear viewing without image shake even in fog or after dark. Designed to give you a clear view of the subject you want to look at, even in the harshest of environments. Equipped with water and dust-proofing and a functional design that is easy to use even with gloves on! Records still images and videos of the scene, straight to SD card. Displays latitude and longitude of the scene via on-board GPS technology. Integrated PAIR Technology allows liquid and solid interference to be reduced for a clearer, sharper view.

Atmospheric Interference Reduction

Atmospheric Interference Reduction

Up to Full HD Resolution

Up to 2,500 mm Focal Range

Day & Night

High Speed Motors

RICOHIMAGING IMAGINGUK UKLtd Ltd. RICOH Industrial IndustrialOptical OpticalSystems SystemsDivision Division Heron Drive, Langley, Slough SL3 8PN, Heron Drive, Langley, Slough SL3 8PN, UK United Kingdom Office: +44+44 (0)1753 211071 Telephone: (0)1753 211071 Email:iosd@eu.ricoh-imaging.com iosd@eu.ricoh-imaging.com Email:

2 Megapixel

Image Stabiliser

Night Vision

GPS & Electronic Compass

Video Recording

Waterand Dustproofing

PLEASE CONTACT US FOR MORE DETAILED INFORMATION ON OUR PRODUCTS OR VISIT OUR WEBSITE

www.ricoh-mv-security.eu www.pentax-security.com


FRAMEWORKS  ISPS code, The European Commission issued Directive 725 – its own contribution to reinforcing port and shipping security across the European Union (EU). Directive 725 is identical to the ISPS code in content, but all European national authorities are obliged to comply with it in accordance with the 1958 Treaty of Rome and the 1992 Treaty of Maastricht. Unfortunately, through a twist of European law, EU Directives requires member states to achieve a particular result without dictating the means of achieving that result. Consequently, the ISPS code was implemented by 21 EU countries, each in a different way without any homogenisation of approach or standardisation. Without a Pan-European Federal Agency like the US’s Department of Homeland Security, the European Union has no power to compel member states to work together or to follow prescriptive guidelines. Although responsibility rests with a variety of ministries or other government agencies across Europe, the burden of compliance and implementation of the ISPS code has been passed down to the individual terminal operators. This produces an interesting paradox as commercial companies whose aim is to make a profit to serve their board or shareholders are being made responsible for an activity that does not necessarily deliver any business benefit. Not surprisingly, enhanced security beyond that required to protect day to day business operations are often not high on Terminal Operator’s agendas, especially when national authorities do not have the power to force them to invest in such security measures. Despite the best efforts of regularity authorities, too often port security is a paper tiger. PORT FACILITY SECURITY OFFICER Because of the very nature of a port facility with huge volumes of vehicle and cargo movements in and out each day, the level of security that can be physically implemented will always be a balance between risk and commercial reality. In this context the role of the Port Facility Security Officer (PFSO) is key to ensuring this fine balance is maintained. Providing a framework to assist the PFSO is a major element of the EU’s Security UPgrade for PORTs (SUPPORT) project (www. supportproject.info) which is part-funded by the EC’s FP7 Research & Technological Development Programme. It is a collaboration of twenty European organisations whose focus is to raise the current level of port security. The SUPPORT project’s main objectives are to deliver ‘validated’ generic port security management models (capturing reusable state-of-the-art and best practices) that can be customised for specific ports; and training and open standards based tools to aid security upgrade in EU ports. SUPPORT integrates legacy port systems with new surveillance and information management systems. It efficiently supports the complexity of a real port environment though an

integrated, holistic approach. This ensures an improved level of security, while reducing the associated administrative burden on the port. Amongst the partners are a number of ports that have been selected to represent typical, but different operations. Starting from the perspective of the partner port operations, the project has identified key security gaps and has produced generic models describing measures to maintain or augment the efficient and secure operation of these ports. Communication and decision support tools incorporating semantic technologies have been developed, accessible to all the port security stakeholders. Full scale demonstrators have been organised in representative EU ports (Gothenburg, Lisbon and Piraeus). The full scale demonstrators will be augmented with a broader evaluation programme by members of a European Ports Security Forum. SUPPORT solutions include policy and standardisations proposals and training that can be used by any EU port to efficiently enhance its security level. SECURITY MANAGEMENT SYSTEMS One of SUPPORT’s key outputs is the Port Security Management System (PSMS) (http:// www.mypsms.com/). The PSMS is designed to help PFSOs to upgrade their security systems by empowering them with knowledge. It provides information, skills and methodologies that enable them to maintain evaluate and upgrade their security measures and create security awareness without major investment. The PSMS also delivers outputs in the form of graphics that can be used to reinforce security threats and potential mitigation measures in presentations to managers or boards of directors. The whole PSMS package comprises five elements including a maturity module designed to enable security professionals to review and upgrade security plans to address terrorist threats; a corporate security module which addresses crime risks such as loss events, related to corporate processes and procedures; an e-learning education and examination module based on best practices of ISPS related maritime security educations including drills and exercises; a sharing and decision support module which enables security professionals to supervise facilities via the internet and to collaborate on a local, national or global scale; and an Authorised Economic Operator (AEO) security selfassessment module which provides a system to reach compliancy and submit AEO application. The dashboard has been tested in various European cities including Brussels, Dublin Gothenburg, Lisbon and Rotterdam, with more than 25 security, port security and IT experts from seven countries providing feedback and counsel. Their responses were overwhelmingly positive and enthusiastic with particular interest and value being placed on the multi-faceted nature of the system. Most of the testers especially liked the fact that a PFSO can access the system remotely from any

Port Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

About the author Henk van Unnik is a member of the Executive Committee of SUPPORT (SecurityUPgrade for PORTs) which is part‑funded by the EC’s FP7 Security Research Programme. SUPPORT is a collaboration of twenty organisations, coordinated by BMT Group, which has been established to help upgrade and enhance security in European Seaports. Henk is a maritime and logistics security expert whose knowledge and experience has been drawn from an career in senior positions supporting security and maritime organisations all around the world. He started work as a criminal investigator for the Dutch Municipal Police, moving to ever more senior positions in the Rotterdam Seaport Police before being appointed as Chairman of the Port Security Development Board Rotterdam and President of the International Association of Airport and Seaport Police (IAASP). He now works as an independent consultant. Henk is one of the architects of the Rotterdam “Reliable Port Concept” and writer of the guide “Security Mainport Rotterdam”. Henk’s work has taken him across the globe, auditing and assessing ports and port facilities. Henk is also a certified ISO 28000 (Security management systems for the supply chain) auditor. location thanks to the web-based platform. While current geo-political, socio-economic and religious tensions mean that the threat of terrorism is never far away, improved security across all European ports will help reduce the risk of a terrorist incident taking place. The pressure of balancing commercial realities and security threats will certainly persist as long as current legislation remains in place placing the burden of investment and compliance on terminal operators. There is a school of thought that suggests the status quo will remain until a major terrorist incident takes place in a European port facility. With access to SUPPORT’s Port Security Management System (PSMS), PFSOs now have the tools to assess the situation, advise their management team and make the right decision, whatever the security threat might be. L FURTHER INFORMATION www.supportproject.info

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

13


1

26th-27th Feb 2014 - London, UK

Conference & Exhibition - 12th-13th February 2014 - London, UK The event not to be missed. Register Today at www.cipre-expo.com “Although the EC Directive has helped in ‘assessing the need to improve the protection of European critical infrastructures’ in the transport and energy sectors, there is no indication that it has actually improved security in these sectors.” The European Union is developing its policy on critical energy infrastructures in relation to the European Programme for Critical Infrastructure Protection (“EPCIP”) which considers measures that will enhance, where necessary, the level of protection of certain infrastructures against external threats. The integrity of critical infrastructures and their reliable operation are vital for the well-being of the citizens and the functioning of the economy. The implementation of the EPCIP, under Council Directive 2008/114/EC on the identification and designation of European critical infrastructures and the need to improve their protection, has not been completely successful.

Topics of discussion include: • Emerging and Future Threats, Identification and Management • Security and Resilience in Design • Modelling, Simulation, Convergence and Standardisation for Improving CIP Solutions • Cyber Threats, Detection and Security on Critical Infrastructure • International Agency Co-operation Delivering Enhanced Command and Control • Emergency Preparedness and Response Coordination

Speakers include:

Why the Need for Such a Discussion? Article 196 of the Lisbon Treaty enshrines in law that the Union shall encourage cooperation between Member States in order to improve the effectiveness of systems for preventing and protecting against natural or man-made disasters. The Union’s action shall aim to: (a) support and complement Member States’ action at national, regional and local level in risk prevention, in preparing their civilprotection personnel and in responding to natural or man-made disasters within the Union; (b) promote swift, effective operational cooperation within the Union between national civil-protection services; (c) promote consistency in international civil-protection work. The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these demands. The Critical Infrastructure Protection & Resilience Europe conference will deliver debate and discussion on where future threats could arise and how best to manage the changing environment to ensure maximum protection to Europe’s critical infrastructure. • Learn about the latest issues, threats and risk management

challenges.

• Share information, case studies and ideas with international

colleagues and peers that you need to work with and may rely on in an unforeseen emergency. • Discover the latest in technologies and techniques for better securing your infrastructure and how to incorporate these into continuity plans.

• Olivier Luyckx, Head of Unit, Crisis Management and Terrorism, DG Home, European Commission • Dr Nigel Brown, Lead for Resilient ICT Strategy, Cabinet Office, Civil Contingencies Secretariat, UK • László Szücs, Programme Officer, Transnational Threats Department, Action against Terrorism Unit (ATU), Organization for Security and Co-operation in Europe • Clive Bairsto, Global Head of Business Resilience and Continuity, National Grid, UK • Dr. Evangelos Ouzounis, Head of Unit – Secure Infrastructure and Services, ENISA – European Network and Information Security Agency, Greece • Troels Oerting, Assistant Director, Head of European Cybercrime Centre (EC3), Europol • Andrew Wright, Head of Industrial Resources and Communications Services Group (IRCSG), NATO Operations Division • Hans Das, Head of Unit DG ECHO, A5 Civil Protection Policy, European Commission • Helena Lindberg, Director General, Swedish Civil Contingencies Agency (MSB), Sweden • Phil Chesworth, Head of Infrastructure Portfolio, National Counter Terrorism Security Office (NaCTSO) , UK • Annemarie Zielstra, Director International Relations, Cyber Resilience, TNO, Netherlands • Bharat Thakrar, Head of Business Resilience Services, BT Global Security, UK • Professor Barry Clarke, President, Institution of Civil Engineers and Deputy Director, Institute for Resilient Infrastructure, UK • Anthony Clerici, Vice President, Royal Institute of British Architects, UK For further details and to register visit www.cipre-expo.com

Securing Europe’s Critical Infrastructure Owned & Organised by:

www.cipre-expo.com

Supporting Organisations:


PASSENGER SCREENING

SECURING COMPLEX AIRPORT OPERATIONS

With regard to targeting air transport infrastructure, terrorism has demonstrated its ability to be particularly innovative and adaptive in its means of committing violent acts. For example, when screening of hand luggage was introduced, terrorist organisations shifted away from acts of hijacking to aerial sabotage, using explosive devices concealed in hold luggage. More recently, the foiled liquid explosives plot in 2006 and the incident of the Northwest flight over Detroit, demonstrated the ability of terrorists to find new methods of committing acts of terrorism that could potentially be undetected by current processes of screening.

5/13/2013 6:37:26 PM

The o ability t ential pot strongly combatport threats underwear, indicate that aviation s air tran ture depends infrastructure is still u regarded as a highly in the f effectiveness valued target. Airlines are internationally on the creening representing of s and orrecognisable, s r e g symbolising a particular n e pass gage country to the rest of the g ba world and thus by attacking,

The likelihood of future attacks against the infrastructure of commercial air transport is considered a persistent threat. Thus there remains the need for systems and measures that aim to protect and deter potential acts of terrorism, targeted against the air transport sector. Moreover, we have seen that terrorist organisations have demonstrated innovation in their means to by-pass existing security measures in order to carry out their attacks. With increasingly stringent security measures imposed on air travel, it is highly unlikely that we will witness another terrorist attack on the scale of September 11, 2001. However this does not mean that future terrorist operations will not be conducted with air transport in mind. The plot to bomb trans-Atlantic flights using explosive liquids in 2006 and the failed attempt to blow-up a Northwest Airlines flight over Detroit on Christmas Day, 2009, using explosives concealed in the perpetrator’s

terrorists adopt a perception that they have directly struck a state.

SCREENING TRAVELLERS The ability to combat potential threats to air transport in the future will depend on the effectiveness of security measures to screen passengers, baggage and cargo. The aviation industry is effective in its response to incidents and introducing improved measures to counter the evolving threats that are presented to air travel. Conversely, the systems and processes of aviation security is often referred to as a ‘one-solution-fits-all’ concept and is thus predictable providing terrorists with a working knowledge to derive means of by-passing security processes.

Written by Christopher Kirby

As demonstrated in the foiled liquid explosives plot in 2006, terrorists are particularly innovative and adaptive at getting around airport passenger screening. So what does the future look like for airport security? Christopher Kirby investigates

Airport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A COMPLEX OPERATION The ability to continue protecting the travelling public from these evolving threats will remain a significant challenge to those responsible for aviation security. Moreover, increasingly stringent security measures are leading to longer queueing and waiting times at airport security checkpoints. This adds to the complexity of airline and airport operations, particularly if an airport is a major hub for connecting flights with delays being detrimental to an airline’s overall operation and finances. Security costs are usually reclaimed by airport operators from airlines and passengers. Thus, the impact of security costs feed all the way through to ticket fares and other sources of revenue. There is the perception that the current systems of airport security we are familiar with as air travellers, are becoming more inefficient and less sustainable when considering the future of air travel. According to the International Air Transport Association (IATA) air travel is predicted to grow, and with the current systems of airport security, growth will exacerbate the problems that are currently highlighted. Therein lies the question as to how aviation security measures can be optimised without jeopardising the safety of the travelling public. IATA is currently working on a programme entitled, Checkpoint of the Future, which collaborates security experts and solution providers from across the world to develop a progressive route for the evolution of airport security up to the year 2020. This is part of the wider Security and Facilitation initiative to work with governments, regulatory bodies and other international organisations to introduce E

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

15


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Special Tactics equipment tactical@holmatro.com | http://tactical.holmatro.com


PASSENGER SCREENING  passenger security processes that adopts a risk-based approach. The desired objective of this is to enhance the overall and security and passenger facilitation by achieving strengthened security, greater operational efficiency and improving passengers’ experience at security checkpoints. The solutions proposed by Checkpoint of the Future, concentrate on a risk‑based approach that will allow for the appropriate screening processes to be implemented according to what is known about the passenger. The first of these evolutions outlined by the project are due to be implemented from 2014. These will introduce new procedures and risk-based concepts for screening and decision making, optimising resources and integrating new technology and re-purposing existing equipment. Some countries will also make use of national known traveller programmes which are linked to security screening. New technologies that are designed to provide seamless and secure journeys will include automated entry gates and biometric technology. Other advances in technology will permit screening staff to observe items away from the security checkpoint and also the screening of liquids and gels which are more than 100ml in quantity.

New technologies that are designed to provide seamless and secure journeys will include automated entry gates and biometric technology. Other advances in technology will permit screening staff to observe items away from the security checkpoint and also the screening of liquids which are more than 100ml in quantity FURTHER ADVANCEMENTS By 2017 and 2020, there will be major advances in risk-assessment and automation, ultimately providing a better passenger experience. Some countries will have the ability to analyse passenger data to provide input for risk-assessment and integrate this behaviour analysis and known traveller information. This information could also be combined with other factors including the type of flight and destination. It is expected that there will be international recognition of known travellers and the automated delivery of risk score to the security checkpoints linked with a passenger’s belongings.

Airport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Beyond 2020, it is expected that passengers will be able move through airport security without interruption unless the advanced technology has identified a potential threat. From a passenger’s perspective, there will minimal or no waiting time as a result of enhanced screening speed. Biometric technology will control automated entry to a security checkpoint and known traveller programmes will be trans-border. Passenger profiles will have a level of security screening derived from information provided by multiple countries and sources through real-time bilateral risk assessment. This risk-based approach is likely to make the security screening process for airports more unpredictable and thus more difficult for terrorists to plan and conduct acts of violence. The integration of known traveller programmes and information with screening processes will allow airport authorities and security personnel to allocate the appropriate methods of screening accordingly, thus shifting away from a one solution-fits-all concept, which is predictable and easier to exploit. This will make better use of resources and also process passengers more efficiently with less delay should the system identify them as low risk. In comparison, this should make it more difficult for individuals with high risk status to pass through security checkpoints. The prospect of being identified with a high risk score and undergoing increased levels of screening might encourage greater deterrence from targeting air transport infrastructure. Furthermore, this could restrict trans-border movement of international terrorism. From a passenger’s perspective, these new practices and technologies should enhance the airport experience. New screening technologies will eliminate the time consuming and disrupting process of divesting particular items such as liquids and electronics from hand luggage providing a more fluid screening system. Moreover this will also have a positive impact on airline and airport operations in terms of passengers meeting connecting flights and a mitigation of costs resulting from factors such as delayed schedules. However we will only begin to see the full extent of these benefits of these new procedures and technologies of airport security screening once they are introduced and become standard practice on a global basis. L

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

17


Blast Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EXPLOSIVES

BLASTING AWAY TERRORIST AIMS

Glass is the most structurally weak part of a building when it comes to explosives, and to make matters worse, is often used to intensify the effects of an attack. But there are ways to mitigate the damage from an explosion, writes Steve Chambers

The recent terrorist attack at the Westgate mall in Nairobi, Kenya grabbed headlines and shocked the world. This highly publicised event brought home the fact that terrorist attacks and bombings are increasingly a part of everyday life, and not just in remote third world locations. Western governments far away from conflict hotspots are also on the lookout for possible terrorist threats to both high profile targets and large gatherings of people. The greatest terrorist threat security managers should address and prepare for are bombs and explosives. A quick check of the headlines, or a Google search, will show that a bomb goes off somewhere in the world on a daily basis, often causing significant injuries and loss of life. With all the unrest and uncertainty in the world today the chance of a terrorist bomb attack happening is very real. IEDs and explosives, whether carried in a car, worn as a suicide vest or buried in the ground are simple to make, deploy and conceal, and they can have devastating effects. With their ability to destroy property, kill people and cause economic disruption far in excess of their size it’s no wonder we are seeing an increased use of bombs and explosives by political and terrorist groups because, simply put, they achieve the terrorists aims.

Most damage m an g fro resultin n is caused o OUNCE OF explosi shrapnel and AN PREVENTION g Because no potential by flyinhousands target can be made t , s s f gla o terrorist proof nor can s e c e i of p the threat of attack be dliest completely eliminated, the dea nent it’s imperative that property compo

managers and security personnel consider taking measures to counter explosive and terrorist threats. The first step is to make a threat assessment to determine the probability and likelihood of a terrorist incident targeting a particular building or location. The answer might be that the probability of an attack is so low and the target so low value that minimal precautions need to be taken, or it may conclude that major steps need to be implemented immediately. Most terrorist bombings are targeted at high profile buildings or large gatherings of people. The objective being to cause as much damage as possible or to kill as many people as possible, thereby garnering headlines and publicity for whatever cause or injustice the group espouses. As security professionals our job is to thwart these attacks, or at a minimum, lessen the damage and loss of life caused by these incidents. GLASS IS BOTH FRIEND AND FOE Building glass is the most vulnerable part of a buildings envelope when it comes to explosives. To make matters worse, not only is glass the most structurally weak part of a

18

COUNTER TERROR BUSINESS MAGAZINE | Issue 16


building, it can and often is used to exacerbate and intensify the effects of terrorist explosives. During an anti-terrorist lecture I attended a few years ago it was mentioned that a pattern had emerged in several bombing incidents, including the Bali bombings back in 2002. This pattern was the use of two separate explosives timed to go off at different intervals. A small explosive designed to get attention and cause people to look out of their windows is detonated first, followed by a second, much larger explosive that shatters windows over a large radius causing devastating injuries with the fragmented glass. Glass can cause a lot of damage and injuries for quite a distance. Studies show that most of the damage resulting from an explosion is caused by flying shrapnel and debris, and glass, which breaks into thousands of shards, is by far the deadliest component. This makes it imperative that security forces, building management and crisis planners look for effective ways to mitigate and lessen the potential damage and injury that can be caused by a blast. Detailed below, and ranked in order of simplicity and cost, are the objectives we need to meet to mitigate damage from an explosion. Firstly limit glass fragmentation and flying shards of glass, and keep the glass in the window frame and prevent it from dislodging and entering the building. Make sure you structurally support the window frame in the building structure to prevent it from dislodging from the structure, as well as maintain the structural integrity of the building. THE WEAKEST PART As you can see blast mitigation efforts should be focused primarily on the glass. Because this is the weakest part of the structure with the most potential to cause injury and loss of life, it’s also the most cost effective mitigation solution one can take, making it ideal for both high and low probability targets. For the purpose of this article I am going to consider a building retrofit, as the more modern technologies like ballistic glass and dual paned laminated glass are better suited for new construction buildings and can be quite cost prohibitive when retrofitted into an existing building. These are tough times economically throughout the world and while security is important, we certainly do not have unlimited funds available for solutions. The focus needs to be on blast mitigation methods that are simple, effective and affordable. ACHIEVING REASONABLE BLAST PROTECTION The first step in effectively protecting a building against terrorist bombs is to make an accurate threat assessment and to determine the level of acceptable damage. Blast mitigation measures can be very expensive and, since there is no way to make a building or structure completely blast or bullet proof we need to decide what

protective measures need to be put into place given our budget and order of importance. The threat level determines the likelihood of attack. A high profile public building is a more likely target than a B&B located in the English countryside and would require more in depth protective measures. This only makes sense. How big a threat a bomb poses to a structure is determined by four factors: 1) The Net Explosive Quantity (NEQ) aka TNT Load Equivalent; 2) Standoff Distance, 3) Height of the structure and 4) Structural composition. Protection is increased when

There are a variety of attachment methods available ranging from mechanical “batten‑bar” type systems to structural silicone wet glazed systems. While the exact method used is determined by glass type, frame type, budget and required level of protection they all work on the principle of securing the window film to the window frame, preventing the glass from dislodging and flying into the building in one large mass. Achieving the third objective, supporting the frame in the structure, can be achieved by using anchoring bolts to secure the window

Blast Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Building glass is the most vulnerable part of a buildings envelope when it comes to explosives. To make matters worse, not only is glass the most structurally weak part of a building, it can and often is used to exacerbate and intensify the effects of terrorist explosives we can minimise the NEQ of the bomb and keep it as far away as possible. This can be accomplished by implementing effective perimeter control measures s to prevent unauthorized access to and near the building. Vehicles can carry much larger loads of explosives than a suicide vest or backpack so limiting vehicle access near a likely target is critical. Measures like pedestrian entry controls and screening equipment for vehicles and personnel are ways of ensuring no major threat gets close to the target and, if one does, it’s a small device detonated at a safe distance away from the target. REINFORCE YOUR GLAZING Once adequate perimeter security controls have been established the next step should be to reinforce your glazing to limit the potential for flying shards of glass. This can be accomplished using security type window films, a proven way to quickly, easily and affordably protect glazing not only in a likely target, but on buildings nearby as well. Simple, effective and relatively inexpensive, security films are the go-to solution for fast, effective and affordable glazing blast protection. Security films work by using strong adhesives to bond a polyester film securely to the glass. Typical bomb blast films range in thickness between 4 Mil and 24 Mil, with 7Mil and 8Mil being by far the most common and are tested and certified to contain pieces of glass in the event of an explosion. Once a film meeting the criteria outlined in by GSA Level C (USA) or ISO 16933 (UK/ Europe) is properly installed on the glass in a buildings envelope you can be confident that this first objective has been achieved. Our second objective, retaining the window glass within the frame can be accomplished with a window film attachment system.

frame to the building structure. The ability to do this in a retrofit situation may be limited by the existing frame type and building structure. Sometimes this simply cannot be done at a reasonable cost or without a major refurbishment of the building. For this reason this type of anchoring is typically done on new buildings and, with the exception of extremely high value targets, not with a retrofit. The final component is reinforcement of the building structure itself and there are several technologies available which reinforce the structure to limit internal damage and personal injury. Typically these types of systems utilise coatings or fibres which bond to the structural elements or composite blocks of cladding material designed to absorb and reflect the pressure and shock waves of an explosion. Because of the high cost these systems are usually only deployed in high threat areas where frequent attacks take place. CONCLUSION The terrorist threat is real, is out there and prudence dictates that precautions need to be taken. Property managers, security and law enforcement personnel need to take a hard look at the security environment, make threat assessments of their own and then decide what measures need to be taken. As we’ve shown, effective blast mitigation can be easily and affordably achieved. Protecting the glazing also provides the lion’s share of the benefits of blast mitigation for a relatively affordable cost.

Steve Chambers is Managing Director of Pentagon Protection plc encompassing SDS Group Ltd and Pentagon Protection America. L FURTHER INFORMATION www.pentagonprotection.com

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

19


Perimeter Security Ian Stone (left) from 2012 winners Apetito presents Rob Gerrard, managing director of Safetyflex Barriers (centre), with the 2013 National Business Award – Innovation, joined by event presenter Dermot Murnaghan

SAFETYFLEX BARRIERS WINS NATIONAL BUSINESS AWARD

Safetyflex Barriers has been revealed as a 2013 National Business Awards winner, receiving The Innovation Award, at the awards ceremony and gala dinner hosted by Sky’s Dermot Murnaghan. This award recognises the enterprise that has most successfully applied innovation in UK Safetyflex Barriers is a leading manufacturer of PAS 68 high-security anti-terrorist bollards and barriers which protect key assets and infrastructure across the UK and internationally. The National Business Awards judges said: “Demonstrating that British manufacturing and design is alive and well, Safetyflex has continuously improved its technology for a range of security applications.” Rob Gerrard, managing director at Safetyflex Barriers, said: “We’re thrilled to have won this year’s Innovation Award, as these awards are the most prestigious in the UK. “The foundation of the company is built upon applying traditional manufacturing knowledge and skills to produce cutting edge security products for the UK and international security markets, and it’s this approach which sets us apart from competitors and I think impressed the judges. Innovation is at the forefront of all our anti-terrorist security bollards and barriers and winning one of the most prestigious

20

COUNTER TERROR BUSINESS MAGAZINE | Issue 16

business awards in the UK is fantastic recognition for the company and our team. “We’re constantly bringing new products to market to protect buildings and infrastructure and we have ambitious plans to strengthen our position in the security market even further. “Winning the National Business Award only gives us added confidence to continue the growth of Safetyflex Barriers and kick on even further.” The twelfth annual National Business Awards held at London’s Grosvenor House Hotel was opened by a video address from Rt Hon David Cameron who acknowledged the National Business Awards for recognising excellence

in enterprise and honouring some of Britain’s biggest business success stories. He told the audience: “A strong private sector is exactly what Britain needs to get back on its feet. I’m determined that Britain becomes the best place in the world to start a business, to grow a business and to do business.” The Prime Minister’s message was followed by Sir Bob Geldof, who addressed the 1200 attending business leaders on the role of business in society. HRH Prince Andrew also announced his support for the launch of The HRH Duke of York New Entrepreneur of the Year Award for 2014. Dame Helen Alexander, Chair of Judges said: “Congratulations to the 2013 winners – they represent the very best of British business. Being the Chair of Judges for the programme has enabled me to see some of the shining examples of innovation, ethics and overall success from businesses of all sizes and across all industries – it gives me great hope for a bright economic future for the UK. ” L

tion Innova he is at t f all nt o forefro x Barriers’ e Safetyfli-terrorist ant ollards b y t i r u sec rriers and ba


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Safetyflex Barriers leading the way with its innovative PAS 68 Perimeter protection Safetyflex Barriers are the world’s leaders in PAS 68 spring steel bollards, barriers and crash fences. These hostile vehicle measures have been designed to stop vehicle borne threats, against key infrastructure, either by terrorist attack, or criminal anti-ram activities. With Safetyflex Barriers new patented invention for PAS 68 bollards, barriers and crash fences. Safetyflex Barriers have invented special absorbing steel that absorbs extremes amounts of energy. Which allows us to use a very slim line bollard, in a shallow foundation, and produces a low cost PAS 68 solution for the client? This has made Safetyflex barriers, one the leading anti-terrorist bollard manufactures in the world, which has made Safetyflex the preferred choice for key government projects, in and outside of the UK. As being a key supplier of PAS 68 anti‑terrorist bollards to the London 2012 Olympics, securing multiple venues, Safetyflex specialise in securing shopping centres, sports stadiums, to securing entire fence lines, from MOD facilities, data centre, and oil and gas refineries.

Safetyflex work with key architects, for securing the public realm, with their PAS 68 Bollards, litter bins, cycle stands and planters, offering aesthetically attractive, shallow, removable, cost‑effective anti-terrorist solutions. Safetyflex work with some of the largest oil & gas refiners in the world, where they can offer a bespoke solution, for all their PAS 68 Anti-terrorist requirements. With their latest designs in PAS 68 crash fences. L FURTHER INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry Tel: +44 (0)24 76 664911 www.safetyflexbarriers.co.uk

Sites Safetyflex Barriers are installed • The O2 • Excel Centre • Ricoh Arena • Titanic Centre Belfast • St James’ Park • Wimbledon • Key London Sites • Horse Guards Parade • Numerous data and cash centres

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

21



KEEPING HOSTILE VEHICLES AWAY

Stephen Munden, manager of the PSSA’s Verification Scheme, reviews some challenges, trends and changes in Hostile Vehicle Mitigation (HVM) for the security community Protective perimeter security must continue to adapt and evolve to meet the changing threats to national and business infrastructures. New requirements from clients looking to protect both tangible and intangible assets must be accommodated. Against a backdrop of the need for reliable and consistent Hostile Vehicle Mitigation (HVM), new technologies and innovations need to be accommodated. All this must happen whilst the perimeter security industry faces severe cost pressures. Things are changing, wherever you look. Here are just some of the developments that I have noted in my discussions with perimeter security suppliers, government agencies, trade associations and organisations seeking to reduce and manage their security risks.

ORGANISATIONAL RESILIENCE As individual disciplines evolve and security practitioners look for solutions that are multilayered, integrated and complex enough to defeat attacks, it is, perhaps, inevitable that areas once thought of as separate are seen as part of an interconnected whole. Areas such as protective security, disaster management, business continuity management and risk management are being brought together under an organisation’s single management system. This in turn is leading to development of thinking, not only about mitigation of a disastrous event but also about how an organisation should be designed to be more resilient in the first place. As with other

Written by Stephen Munden, manager, PSSA Verification Scheme

answers. This is the case with security risk management. The more traditional way of looking at risks is by identifying threats and vulnerabilities, assessing likely impact and then designing mitigation measures to eliminate or reduce the organisation’s risks. Business continuity practitioners, however, work from the other direction by looking at what is vital to an organisation, how it could fail or be defeated and then devising a plan to protect key assets. A combination of these approaches in an organisation’s security risk management processes would seem to be beneficial.

Hostile Vehicle Mitigation

capabilities, designing in security

has always made better sense ive than retrofitting later. Hopefully, Protect ter e we will soon have some m i r e p t s authoritative guidance on u m organisational resilience securityue to n in the form a framework i t con lve o standard from BSI, BS v e d n 65000, which is currently adapt a eet the under development. to m business Looking at the same to problem from two different threats structures perspectives can often infra yield different but complementary

EVOLVING REQUIREMENTS New requirements combined with industry know-how can often result in new solutions. As I look across the products on offer from members of the Perimeter Security Suppliers Association (PSSA), I have noticed three particular trends. Firstly, there are a growing number of combined solutions now on offer. Whether from a single supplier or from a collaborative initiative between suppliers, products are now available that address multiple risks, including for example, protection against manual attack and HVM. Secondly, whether it is in a combat zone or at a major event, clients are demanding more rapidly deployable solutions, without the sacrifice of security integrity. Thirdly, with the wide choice of products available from a variety of sources, demand is increasing for more interchangeable systems. In addition, the increasing use of information and communications technologies to control this kit will also prove to be interesting, to say the least. BARRIERS TO BARRIERS Some challenges in HVM are not directly related to the problem or the solution but are more systemic in nature. Three in particular seem to continually work against the implementation of successful perimeter security solutions. The first of these concerns health and safety. Why is it when there is only one law of the land (albeit with multiple parts!) and supplying companies essentially only have one management system providing internal controls that the construction industry insists on having nearly forty different sets E

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

23


PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures and Blast/ Ballistic Protective Construction. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.

For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com

Our Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation in most cases. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats


PERIMETER SECURITY  of requirements for demonstration of health and safety competence? To look at some company’s web sites and vehicles at the range of health and safety ‘badges’ on display, you could be forgiven for not understanding the real focus of their business. Now don’t get me wrong, I am a regular recipient of HSE notifications and admire their approach to information provision. I also sympathise with the health and safety myth problem, but when I see the cost endured by most SME’s funding needless administration because their (larger) customers require HSE evidence presented in their own preferred format, it does make me sigh. The, so far ineffective, measures such as BSI PAS 91 and Safety Schemes in Procurement are noted; but perhaps it is time that industry itself got more involved? Whenever I attend industry gatherings, two interlinked issues are always raised – poor specification and sub-optimal procurement. The fragmented nature of the perimeter security supply chain exacerbates these problems, with HVM supply knowledge being separated from user requirements. Clearly, security needs must be taken into account but assurance across the entire value chain is required for HVM applications to be successful. REVISED INTERNATIONAL STANDARDS CPNI continue to drive the HVM standards agenda both nationally and internationally. In the UK PAS 68:2013 – Impact test specifications for vehicle security barriers systems

About the PSSA and PAS 69:2013 – Guidance for the selection, installation and use of vehicle security barriers have superseded earlier versions, which have now been withdrawn. The revisions incorporated changes in best practice and are mainly technical in nature. The classification codes, used to convey performance, have been updated. Although the above represent routine review and updating of existing standards, perhaps of more significance is the publication of two International Workshop Agreements. IWA 14-1:2013 – Vehicle security barriers – Part 1: performance requirement, vehicle impact test method and performance rating according to ISO “specifies the essential impact performance requirement for a vehicle security barrier (VSB) and a test method for rating its performance when subjected to a single impact by a test vehicle not driven by a human being.” Its companion document IWA 14-2:2013 – Vehicle security barriers – Part 2: Application “provides guidance for the selection, installation and use of vehicle security barriers (VSBs) and describes the process of producing operational requirements (ORs). It also gives guidance on a design method for assessing the performance of a VSB.” The IWAs bring together both UK and USA requirements for the first time. The threat from terrorism is not reducing but adapting and evolving. HVM counter measures must also continue to do evolve to stay ahead of these threats and provide the degree of security and safety required to protect people and critical assets. L

The Perimeter Security Suppliers Association (PSSA) is the trade association for companies involved in the supply of equipment and services designed to provide the highest levels of physical protection for sites and their perimeters from terrorist or criminal attack that involves the use of extreme force or explosives.

Hostile Vehicle Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Members of the association supply a wide range of high performance products including perimeter fences and walls, vehicle barriers and blockers, bollards, high security gates, security blinds together with other specialist equipment developed for this demanding sector of the security market. The PSSA verification scheme provides confidence to perimeter systems buyers and others that products supplied by its members conform to internationally recognised quality standards. FURTHER INFORMATION www.pssaverification.com Email: stephen.munden@ pssaverification.com

The UK’s premier security and law enforcement event showcasing world-leading technologies and solutions Security & Policing (11-13 March 2014, FIVE at Farnborough, Hampshire) is the UK’s only secure event for police, law enforcement and security professionals, tasked with civil protection, security and national resilience. With over 350 companies attending, this UK government event is the largest of its kind in the UK and provides a platform for showcasing world-leading technologies, products and solutions to police services, government departments, organisations and agencies from the UK and overseas. New for 2014: expanded international delegation programme – aims to help UK companies export. Regional experts will be on hand to provide specialist advice and assistance; UK visitor delegation programme – will include top decision-makers and influencers in the UK Security sector who are engaged in procurement decisions, shaping future policy and development of operational strategies; and large vehicle and demonstration area – this area will enable exhibitors to showcase vehicles and large equipment in a dedicated space. Originating from the Home Office and delivered from within the event, the growing

impact of the free-to-attend Industry Briefing Programme provides a platform for senior government and security officials to host a series of workshops and briefings to deliver insight, depth and clarity on key areas of government planning, as well as information on current and future programmes. Visitors to the Security & Policing event must pre-register and will be vetted to Home Office criteria. The Home Office vetting process supports the sensitive nature of the exhibition and the equipment showcased. It is also the right environment for exhibitors and visitors to discuss matters in confidence. A global VIP Delegation Programme, co-ordinated by UK Trade & Investment Defence & Security Organisation (UKTI

DSO), provides a unique opportunity for senior professionals from around the world to meet with manufacturers and suppliers to discuss their security requirements face to face. Who should attend: chief constables and their department representatives; UK and international police officers; key providers of Critical National Infrastructure; emergency services; prisons and correctional facilities; customs, immigration and border agencies; MOD and armed forces; and government security agencies. Who should exhibit – companies with products in the following security sectors: policing; cyber security; critical national infrastructure; forensics; border control; counter terror; aviation security; blue light services; and maritime security. Visit the Security & Policing website for more information on visiting or exhibiting at the event in Farnborough in March 2014. FURTHER INFORMATION Tel: 020 7091 7835 securityandpolicing@adsgroup.org.uk www.securityandpolicing.co.uk

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

25


Manufacturer of Servo Drives, Servo Motors, Systems & Bespoke Engineering.

info.uk@infranor.com

www.infranor.com

+44(0)20 8144 2152


MECHANICAL PROCESSES

XTRAPULSPAC: THE SMALL DEVICE FOR THE TOUGHEST OF REQUIREMENTS

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The most recent addition to INFRANOR’s product range is XtrapulsPac, a compact and flexible low-power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications XtrapulsPac can be easily configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion controller via the fieldbus and uses well-known standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications, and is available in a small device at an affordable price, which meets the most demanding requirements. Control loops: digital drive for AC synchronous motors – current loop 62.5 μs – speed and position loop 500 μs – closed loop control of position, speed or torque – max speed, up to 25,000 rpm. Feedbacks: resolver – incremental encoder – hall sensor – sinCos encoder – single and multi-turn Hiperface® encoder. Communication interfaces: RS-232 up to 115.2 kbit/s baud rate – CANopen or EtherCAT® fieldbus – DIP switches for node address. Safety features: safe torque off SIL 2. I/O interfaces: user configurable digital I/Os – all digital inputs opto-isolated – analog inputs ± 10 V/12-bit resolution – analog output 0-5 V/ 8-bit resolution – ‘amplifier OK’ output – motor brake control – two-channel STO function. MODES OF OPERATION DS402 standard modes: interpolated position mode – profile position mode – profile velocity mode – profile torque mode – homing mode. DS402 extended modes: analog speed mode – stepper emulation mode – sequence mode – master/slave mode stand-alone operation – analog speed drive – positioner – stepper emulation – electronic gearing. Stand-alone operation: analog speed drive – positioner – stepper emulation – electronic gearing. Configuration tools: motor and drive configuration – application configuration – interface configuration – auto-tuning, auto-phasing – sequencer programming. Project tools: project creation – project management – file-handling services – motor libraries – multilingual software. Diagnostic tools: device control – device monitoring – object dialog window – multi-axis oscilloscope.

A FREELY CONFIGURABLE DRIVE The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive’s non-volatile memory. The XtrapulsPac drive can be controlled via the fieldbus (CANopen or EtherCAT), via the analog input (analog speed drive), via the PULSE and DIR inputs (stepper emulation) or via the digital I/Os (stand-alone positioner), according to the selected operation mode. To allow Infranor an even more flexible approach to servo-controller, servo-amplifier solutions it also has the XtraPulsCD1 servo drive. XtrapulsCD1-a all-digital servo modules are PWM servo drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. With a resolver sensor feedback, the motor absolute position value over one revolution is available and the servo motor can immediately be enabled after the drive power up. With a ‘SinCos tracks’ sensor that provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and which period is equal to the motor pole pitch, the servo-motor can be immediately enabled after the powering of the drive. With an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servo motor can also immediately be enabled after the drive power-up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power up before the motor enabling. With an incremental encoder + Hall Effect Sensors (HES) feedback, the motor-phasing procedure is no more necessary and the servo motor can immediately be enabled after the drive power up.

With an absolute single-turn, muti-turn or linear encoder using the ENDAT or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servo-motor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution (ppr) and 16,384 ppr can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The auto-phasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L FURTHER INFORMATION info.uk@infranor.com www.infranor.com

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

27


WE SET THE STANDARDS WHEN IT’S MISSION CRITICAL BCS CESG Certified Professional Scheme. Independent assessment and verification for information assurance professionals. Now available for the private sector.

BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no no. 292786) 2013

BC509/LD/AD/1212

bcs.org/ia


NATIONAL CYBER SECURITY STRATEGY

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RISING TO THE CYBER CHALLENGE A progress report on the National Cyber Security Strategy issued in December aims to demonstrate the progress made by the UK in addressing the threat from cyber attacks, and includes plans to double annual cyber exports to £2bn a year by 2016 The government hopes to more than double annual cyber exports from the UK to £2bn a year by 2016, according to a progress report published in December - two years after the launch of the National Cyber Security Strategy (NCSS). Detailed in the report are plans to establish a new cyber security suppliers’ scheme, which will allow businesses to state publicly to potential clients that they supply government with cyber security services and products. The government will adopt an industry-led organisation Standard in its procurement ‘where proportionate’, to encourage uptake and help companies demonstrate a competitive edge. The Standard is based on ISO27000-SERIES, which provides a clear baseline of basic cyber hygiene and protection from low level threats. Ministry of Defence (MoD) suppliers that have already signed up to the standard include BAE Systems, BT, QinetiQ, Rolls Royce, HP and Thales UK, among others. ONLINE COURSE Other announcements in the update include the development of a free ‘Massive Open Online Course’ (MOOC) in cyber security by summer 2014 for the Open University, the launch of a third research institute to focus on ‘Trustworthy Industrial Control Systems’, funding for the Cyber Security Challenge to

expand their schools competition and more partnerships with international academics.

serious cyber criminals. Our initiatives are ensuring the UK is one of the safest places to do business in cyberspace as well as providing a solid platform for economic growth. “We are already working closely in partnership with the private sector. I want to see that relationship grow to be even stronger, using our extensive engagement with networks and representatives to mainstream cyber security and raise awareness. We know this is important now but this is also vital for our economic growth in the coming years. It will remain an absolute priority as we move to year three of our strategy. “Meanwhile, government departments have also taken action to prevent cyber fraud. A dedicated Cyber Crime Capability in HMRC has provided specialist advice to approximately 20 criminal cases, resulting in an overall Revenue Loss Prevented of more than £40 million and more than 2,300 fraudulent websites have been shut down since January 2011. E

CU The NC ether og brings tls and of the skil rsors into u its prec d leading l a wor ion to fight at organis ous cyber seri crime

INCREASED CYBER RESILIENCE The original NCSS was published in November 2011 with the aim of providing government with a framework and objectives to tackle cyber threats, promote awareness and facilitate partnerships within the private sector, supported by £860m of funding. Discussing the update, Cabinet Office minister Francis Maude said: “Two years of solid work by government, in partnership with the private sector and academia, has seen the UK’s cyber resilience, awareness, skills and capability continue to increase across the board. Partnership across sectors remains as crucial today as it has ever done as this is a shared responsibility. “The launch of the National Crime Agency (NCA) in October saw the establishment of the new National Cyber Crime Unit (NCCU). The NCCU brings together the skills and expertise of its precursors, SOCA Cyber and the Police Central e-Crime Unit, into a world‑leading organisation dedicated to fighting the most

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

29


ADVANCED TARGETED ATTACKS. WE GET THEM BEFORE THEY GET YOU.

There is a new threat landscape. You may think your existing security defenses prevent the next generation of threats from entering your network and stealing your data. They don’t. Attacks such as spear phishing or APTs easily evade firewalls, IPS, AV and gateways. Your best defense is FireEye. Trusted by the top companies in the Fortune 500, FireEye is the global leader in stopping the next generation of threats.

Visit www.FireEye.com/StopAPTs and let us help you close the hole in your network.

© 2013 FireEye. All rights reserved.


NATIONAL CYBER SECURITY STRATEGY  SHARING GOOD PRACTICE Paul Everitt, chief executive of security trade organisation ADS Group commented: “The report reveals the excellent progress that has been made in tackling the threats, building awareness and it sets a clear programme of work for the coming year. ADS will continue to work closely with Government and members to help businesses understand the risks and put in place proportionate measures to mitigate them. This will be greatly enhanced by the development of an official ‘cyber standard’ to stimulate the adoption of good practice across all sectors and industries.” In the coming year, the Centre for the Protection of the National Infrastructure, working closely with GCHQ, will continue its outreach to national infrastructure companies, ensuring that they benefit from the latest advice and guidance on potential vulnerabilities and their mitigation. CISP

will aim to double its membership to 500 organisations sharing real time information on cyber threats. The Government’s Computer Emergency Response Team (CERT UK) will become operational, helping improving national co-ordination on incident response and providing a focal point for international sharing of technical information on cyber security. WAKING SHARK II SUCCESS CERT UK will deliver an expanded exercise programme to make sure that critical sectors understand and are prepared for the potential impact of a destructive cyber attack. This will build on the recent successful ‘Exercise Waking Shark II’ in the finance sector, run with the Bank of England (and using the CISP platform). The operation was one of the largest ever conducted, with dozens of financial institutions taking part. The tests were overseen by the Bank of England, the Treasury and Financial Conduct Authority. Bank staff responded to a number of simulated cyber-attacks in order to find solutions to various problems including how to ensure the availability of cash from ATM machines and cope with a liquidity freeze in the wholesale market. Commenting on the exercise, which took place in November, Andrew Miller, chief operating officer at Corero Network Security,

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CERT UK will deliver an expanded exercise programme to make sure that critical sectors understand and are prepared for the potential impact of a destructive cyber attack. This will build on the recent successful ‘Exercise Waking Shark II’ in the finance sector said: “I think one of the biggest benefits we will see from Operation Waking Shark 2 is not necessarily about banks learning to defend against cyber-attacks, but learning to cooperate. I personally believe that there needs to be more information sharing within FIs on the latest threats and attacks they are facing, so they can develop a knowledge pool on how to protect against them, and this

exercise may hasten this. Those organisations that work together to develop comprehensive defences are far more likely to remain secure than those that go it alone. I’d also like to see a UK version of the US law that legislates about the disclosure of cyber-attacks, sharing information for the benefit of all.” The Government will also work with the regulators to ensure that the companies that own and operate critical national infrastructure are well protected against the cyber risks they face, as part of their responsibilities to ensure resilience and availability of supply. The Government remains committed to supporting this agenda, and is developing an enhanced offer of support on cyber to regulators and infrastructure owners and operators through GCHQ and CPNI. Francis Maude: “We are in a much better place than two years ago when we launched the Strategy. This reflects the collective effort of numerous government departments and agencies, and powerful partnerships with industry, academia and international counterparts.” “There is still much work to be done, but our progress to date has put us in a strong position for the future.” L DOWNLOAD THE UPDATE tinyurl.com/pogl78f

Cyber Security Challenge cracks on The Cabinet Office will be backing a second interaction of the Cyber Security Challenge’s School programme with a further £100,000 grant to help to expand the competition regionally and nationally. The competition sees teams of key stage 4 students breaking coded messages designed by industry experts and developing their own for other schools to crack. It aims to identify and hone the talents of UK students to address a growing skills gap in the UK’s cyber defences. The Cyber Security Challenge began in 2010 as three virtual competitions feeding into face‑to‑face grand finals. They were run by a small group of supporters from industry, government and academia to address a skills gap in cyber security and find new talented people to enter the profession. Now in its fourth year and backed by over 75 sponsors, the Challenge has grown its range of competitions to better represent the variety of skills demanded by employers and acts as a source of guidance for those keen to enter the industry. Its schools programme is delivered in association with major employers to ensure it tests practical and usable skills, in demand from industry. The packs are designed to spark students’ interest in code‑breaking and start to hone their skills by not only teaching them how to crack codes, but also gets them working in teams to develop their own. These ‘student ciphers’ will then be submitted to the Challenge and shared with other schools for them to crack in order to gain further points as part of a round‑robin virtual tournament run in mid-2014. For more information visit cybersecuritychallenge.org.uk

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

31


iCLASS SE The smartest access control platform ®

WORKS WITH MANY CARD TECHNOLOGIES

REMOTE READER CONFIGURATION

INCREASED SECURITY FOR CREDENTIALS

ENHANCED MICRO-PROCESSOR SECURITY

WORKS WITH MULTIPLE DEVICES

Next generation access control. An evolution in security, adaptability and performance. HID Global’s technology and media-independent iCLASS SE® Platform is a secure identity solution for physical access and the widest range of converged applications and environments. For maximum interoperability, iCLASS SE® supports legacy and nearly all card technologies for cost effective, seamless upgrades to higher security and enhanced performance. To find out more visit hidglobal.com © 2013 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.


CYBERSECURITY

WILLIS TO LAUNCH CYBER SECURITY TOOLKIT Global risk adviser Willis Group Holdings’ Cyber ATLAS responds to a stark warning from the UK government that the cybercrime threat facing UK companies is increasing Willis Group Holdings, the global risk adviser, insurance and reinsurance broker, is launching Cyber ATLAS (Assessment Training Learning Accreditation and Services), a complete security solution to help UK companies combat the threat of cyber crime. Designed to build resilience across an entire company – from the shop floor to the board of directors – Cyber ATLAS comprises e-learning for all levels of staff, an online self-audit allowing organisations to test their current levels of security and a 24/7 incident response service providing first-class support and advice in the event of a cyber-breach. THREAT IS INCREASING Cyber ATLAS responds to a warning from the UK government that the cybercrime threat facing UK companies is increasing. The Department for Business Innovation and Skills (BIS) said in November that it would be working with businesses to encourage them to make cybersecurity a board-level responsibility. Developed by Willis in conjunction with Nick Gibbons, cyber, information technology and intellectual property law specialist at Berrymans Lace Mawer LLP (BLM) and Gordon Walker, lead investigator on IT claims at Charles Taylor and E-Security Exchange, Cyber ATLAS helps companies to prevent fraud

their clients on preventative measures but what we didn’t realise was the sheer lack of solutions that were available for small businesses. Quite simply, they were either far too expensive for a small business or took weeks or even months to complete.” SECURITY PROTOCOLS IN PLACE BLM partner and cyber specialist Nick Gibbons says: “Many of our large UK clients routinely ask their suppliers to provide written confirmation that their IT networks have good security protocols in place to protect data. “It may seem obvious but any organisation that has a supply-chain is only as strong as the weakest link in that supply chain. The cyber age that we all now enjoy has also brought with it some very significant new risks.” Gordon Walker, lead investigator on IT claims at Charles Taylor, adds: “Cyber ATLAS focuses on prevention first to provide a means of improving the overall level of cybersecurity for UK business. “This is a complete cyber package, which allows those with limited IT skills to improve their own and their suppliers’ cybersecurity.” E-TRADER AWARD The Scottish Business Resilience Centre (sbcc.neighbourhoodalert.co.uk) recently

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

About Willis Group Holdings Willis Group Holdings is a leading global risk adviser, insurance and reinsurance broker. With roots dating to 1828, Willis operates today on every continent with more than 17,500 employees in over 400 offices. Willis offers its clients superior expertise, teamwork, innovation and market-leading products and professional services in risk management and transfer. The company’s experts rank among the world’s leading authorities on analytics, modelling and mitigation strategies at the intersection of global commerce and extreme events. Across geographies, industries and specialisms, Willis provides its local and multinational clients with resilience for a risky world. For more information, visit www.willis.com, see the leadership journal Resilience or up-to-the-minute blog WillisWire (blog.willis.com). FURTHER INFORMATION finexglobalcommunications@willis.com www.willisfinexglobal.com

Cyber ATLAS responds to a warning from the UK government that the cyber crime threat facing UK companies is increasing. BIS said it would be working with businesses to encourage them to make cyber security a board-level responsibility and online attacks, which – according to the Federation of Small Businesses (FSB) – costs small businesses £780m a year. Jonathan Brooks, practice leader for FINEX National at Willis, explains: “Cybercriminals know that larger multinationals have the infrastructure to fight cybercrime so they often target the IT network and vulnerabilities of a small company to get into the network of the multinational. “We knew that very few companies within the insurance industry deal with educating

launched the E-Trader Award, an industryrecognised government standard that recognises businesses with good cybersecurity. The award offers a minimum set of security standards which will go some way in making them safer to a variety of e-attacks. Mandy Haeburn-Little, director of the Scottish Business Resilience Centre, endorses Cyber ATLAS as a means of achieving E-Trader status. She says: “Cyber ATLAS represents a single, unified solution that helps companies build resilience against the threat of cybercrime.” L

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

33


www.oilgassecurity.com 4th-5th March 2014 | Dubai

Join us for the high-profile meeting which will provide a comprehensive platform for security experts involved in the protection of oil and gas infrastructure, employees and assets in the Middle East and Gulf area.

Our senior level speaker faculty includes a strong panel of experts:

…For oil and gas companies that want to develop the most effective strategies to reduce vulnerability to theft, sabotage, terrorism, piracy and problems arising from geopolitical challenges

• • •

…For businesses that want to enhance their Business Continuity and Disaster Recovery planning

• • •

…For executives who want to increase their knowledge of innovative security practices and the latest cutting edge technologies

• •

• • •

Organised by:

Kaleem Ahmad, Head of Security, Pakistan Petroleum Nasser Al-Buhairi, Chief Security Officer, Maritime Security Services, Kuwait Petroleum Corporation Kevin Smith, Business Continuity Specialist, Kuwait Oil Company Duncan Lloyd, Group HSE & Security Manager, Premier Oil Mohamed Talha, Plant Security Supervisor, Dolphin Energy Qatar Sam Botros, Regional Director Security & Crisis Management, GE Oil & Gas Aisha Alomair, Security Systems Engineer, Saudi Aramco Mustapha Harkouk, Security Manager, GDF Suez Algerie Ben Murrell, Security Manager - Africa, Middle East, Mediterranean & Australasia, Transocean Keith Tupman, Experienced International Maritime Security & Risk Management Professional Crispin Webster, Dubai Chairman, Overseas Security Advisory Council Krzysztof Binkowski, Head of Security, POGC Libya

In partnership with:

For more information contact: Ben Hillary E: BenH@irn-international.com T: +44 207 111 1615


CYBERSECURITY

Lila Kee of GlobalSign explains how the North American Energy Standards Board (NAESB) works and why modelling it could benefit the UK energy supply industry

Keeping the lights on for the world’s largest economy is a considerable undertaking. The United States’ economy is massive, operating in a double-digit trillion dollar GDP with a highly diverse set of industries, from agriculture and manufacturing to high technology. A steady flow of reliable energy is vital to the livelihood of its citizens yet, with the exception of an occasional storm-related outage, many are oblivious to the complexities of keeping this ecosystem running smoothly. In fact, a range of private operators, and industry market regulators and standards boards, including the North American Energy Standards Board (NAESB), are instrumental in keeping energy reliable and safe in a much deregulated marketplace. Established in 2002, NAESB serves as an industry forum for the development and promotion of standards which will lead to a seamless marketplace for wholesale and retail natural gas and electricity, as recognised by its customers, business community, participants, and regulatory entities. Recognising that even a temporary shortage of energy supply could result in significant economic loss or possible loss of life, the US government has identified energy as one of its Critical National Infrastructure (CNI) sectors. Both real-world Stuxnet and simulated (Aurora) cyber threats produce compelling evidence to governments all over the world that protecting CNI in the cyber world is equally as important as in the physical world.

Like the US, United Kingdom-based owners and regulators are challenged with how to adopt increased cybersecurity measures within a sector that is highly privatised, profit-driven and in many respects decentralised. Although wholesale energy is highly regulated by US federal agencies, including the US Department of Energy’s agency and the Federal Energy Regulatory Commission (FERC), many private sector participants look to NAESB for guidance on best practices in developing cybersecurity voluntary best practices. This successful model is something UK energy participants should pay close attention to. In accordance with NAESB’s mission of promoting a seamless marketplace for wholesale and retail natural gas and electricity, NAESB formed a standard’s development committee around cybersecurity. The first standard involved how public key infrastructure (PKI) could be used to implement stronger authentication used in critical North American Electric Reliability Corporation (NERC) business applications, such as eTagging – the process of submitting requests and recording energy-related transactions that occur over the internet. This is essential in tracking energy movement that can cross utility company territories in a post-US deregulated market. Implementing strong authentication to verify the identities of the eTag end points is critical in assuring only authorised transactions occur. NERC and NAESB work closely together in

co-ordinating business practices and reliability standards for the wholesale electric industry. Knowing full well that PKI technology could be implemented in a wide range of approaches, NAESB drew on industry and technology PKI experts to create a standard that would support increased interoperability and security through the adoption of minimum standards. Deciding how to craft a PKI standard that addresses today’s and tomorrow’s threat landscape was only part of the subcommittee’s objective. Creating a framework that could also be adopted by a wide range of PKIenabled applications proved equally important. Therefore, the standard needed to be sufficiently flexible to address a range of assurance levels appropriate to a variety of applications. The benefits of adopting an NAESB-like model in the UK energy sector include: in security, the threat landscape is constantly changing and therefore standards are written and updated in a way to easily respond to a new attack venue; Independent System Operators are heavy participants in cybersecurity standards development and allocated security experts to heavily engage in standards development; a risk-based approach is incorporated into the standards so operational, cost and security balances are sized to the risk of breach. In conclusion, there are a number of key similarities between the UK and US, most importantly being that the energy industry has been identified as a CNI sector by both parties. Based on the success of recent US initiatives, UK energy participants should therefore strongly consider adopting both the public/private sector standards development approach that NAESB and the wholesale electric sector have implemented. L

Written by Lila Kee, chief product Officer, GMO GlobalSign Inc, and NAESB board member

ACHIEVING CYBERSECURITY IN THE WHOLESALE ELECTRIC QUADRANT

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION Tel: 01622 766 766 Press@globalsign.com For more about NAESB: www.naesb.org See how GlobalSign provides authentication solutions for the energy sector, visit www. globalsign.co.uk/verticals/energy.html

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

35



EVENT PREVIEW

SECURING EUROPE’S CRITICAL INFRASTRUCTURE

The Critical Infrastructure Protection and Resilience Europe conference to be held in London on 12-13 February 2014 will focus on all the hot issues and challenges regarding CIP

Attacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. Many offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. Manmade and natural disasters, such as industrial accidents, earthquakes, tsunamis, floods, storms, pandemics, solar flares and volcanic ash clouds, pose an even greater danger to civil society. The European Commission has adopted a communication on Critical Infrastructure Protection in the fight against terrorism, enhancing European prevention, preparedness and response in the event of terrorist attacks involving critical infrastructures. The European Programme for Critical Infrastructure Protection (EPCIP) considers measures that will enhance the level of protection of infrastructure against external threats, with the Operator Security Plan for all infrastructures designated as European critical. The integrity of critical infrastructures and their reliable operation are vital for the wellbeing of the citizens and the functioning of the economy. The implementation of the EPCIP, under Council Directive 2008/114/EC, on the identification and designation of European critical infrastructures and the need to improve their protection has not been completely successful. Critical Infrastructure Protection and Resilience Europe (CIPRE) will bring together

leading stakeholders from industry, operators, agencies and governments to collaborate on securing Europe. The conference will look at developing existing national or international legal and technical frameworks, integrating

policymakers and managers to optimise security and disaster planning, by identifying the threats and opportunities for improvement and how European standardisation could assist the industry in enhancing security solutions. Key speakers for this session include the UK National Nuclear Laboratory (NNL) and BT Global Security. International and national agency co-operation plays an important role in both how governments and organisations work together to secure critical infrastructure and mitigate potential threats, and how to cooperate and co-ordinate response should an attack – whether manmade or natural disaster – occur. Key speakers here include: Paola Albrito, head of UNISDR regional office for Europe, United Nations; Hans Das, head of Unit DG ECHO, A5 Civil Protection Policy, European Commission, Belgium; Helena Lindberg, director general, Swedish Civil Contingencies Agency (MSB) and Andrew Wright, head of Industrial Resources and Communications Services Group (IRCSG), NATO Operations Division. Energy, transport and telecoms infrastructure are three key elements in any modern industrial nation and are indeed often used as a measure of a nation’s stage of development. Whether it’s the oil, gas or electricity used to power the transport, heat our homes and power our businesses, national and international telecommunications or passenger travel through airports to rail, or freight through our ports and harbours to road and rail, power, transport and telecommunications are the crucial economic lifeblood of any modern industrial economy.

Critical Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Critical Infrastructure Protection and Resilience Europe (CIPRE) will look at developing existing national or international legal and technical frameworks, integrating good risk management, strategic planning and implementation good risk management, strategic planning and implementation. With a line-up of speakers from across Europe, discussing a range of hot issues and topics in CIP, the conference will deliver discussion and thought-provoking presentations on many of the serious critical infrastructure protection, management and security issues and challenges facing the government and industry. Keynote speakers include: Olivier Luyckx, head of unit, Crisis Management and Terrorism, DG Home, European Commission, Belgium, and Dr Nigel Brown, lead for Resilient ICT Strategy, Cabinet Office, UK, whilst key organisations will address topics from emerging threats to agency cooperation. Key areas for discussion also include Modelling, Simulation, Convergence and Standardisation for Improving CIP Solutions, enabling government and industry

Therefore should they be damaged – by terrorist attack, by natural or by manmade disasters – they have the potential to cause damage to the economy far in excess of any E

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

37


Critical Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW  physical damage they may incur. The problem for the authorities, operators and agencies is to ensure the right balance of security, safety and resilience in facilities that are widely dispersed and in the case of transport, public places. Clive Bairsto, global head of Business Resilience, National Grid, UK, and Stephen Gregory, chief executive officer, Harnser Risk Group, UK, will lead the discussions in this session. WHAT ARE THESE EMERGING AND FUTURE THREATS? Some threats are well-known and remain a persistent danger, but what are the evolving, emerging and potential threats. The significant proportion of emerging threats remain manmade. How do we identify, manage and deal with them? László Szücs, programme officer, Transnational Threats Department, Action Against Terrorism Unit (ATU), Organization for Security and Co-operation in Europe (OSCE), Austria; Phil Chesworth, head of Infrastructure Portfolio, National Counter Terrorism Security Office (NaCTSO), UK and P Gelton, director, Threat and Risk Analysis Department, national co-ordinator for Counterterrorism and Security, Netherlands, will present their findings and the challenges that face Europe’s critical national infrastructure (CNI). One of the hot media stories, recently, has been around the challenges with cybersecurity. The potential for a cyber-attack to compromise our power, financial, communications systems has been widely publicised and indeed prolific in recent months. From the individual hacker to state sponsored attacks, what are the threats and how do we counter them? Dr Evangelos Ouzounis, head of Unit, Secure Infrastructure and Services, European Network and Information Security Agency (ENISA), Greece; Troels Oerting, assistant director, head of European Cybercrime Centre (EC3), Europol, Netherlands, and Annemarie Zielstra, director International Relations Cyber Resilience TNO (and former director of the Centre for the Protection of National Infrastructure in the Netherlands CPNI.NL) will lead the discussion in this key topic area. Protecting critical infrastructure is all well and good, but are operators and agencies

Some threats are well-known and remain a persistent danger, but what are the evolving, emerging and potential threats? The significant proportion of emerging threats remain manmade. How do we identify, manage and deal with them? ready and co-ordinated should an attack actually occur and be successful? Getting the right help, to the right place, and the right people is about communications, planning and organisation. How best do central and local government and the emergency services co-ordinate their efforts, and co-operate with infrastructure operators, to bring relief to the point of most need when national infrastructure is most challenged? In the Emergency Preparedness and Response Co-ordination session, Alan Brustrom, head of the Application Business Office (REACT), European Space Agency, France; Claudio Becchetti, ISITEP project co-ordinator, Selex ES; and Paul Kiernan, REACT project manager, Skytec, Ireland, will present the discussions. The conference and expo will cover all aspects of critical infrastructure protection, from physical and cybersecurity to resilience planning and implementation. Critical Infrastructure Protection and Resilience Europe will be held at London’s Guoman Charing Cross Hotel (www.guoman. com) on 12-13 February 2014, with early bird discounts on conference delegate fees, available for bookings before 21 January.

Article 196 of the Lisbon Treaty enshrines in law that the Union shall encourage co-operation between Member States in order to improve the effectiveness of systems for preventing and protecting against natural or manmade disasters. The ever-changing nature of threats, whether natural through climate change, or manmade through terrorism activities, either physical or cyber-attacks, means the need to continually review and update policies, practices and technologies to meet these demands. Whether in local or national government, or an operator of national infrastructure, your attendance to Critical Infrastructure Protection and Resilience Europe will ensure you are up-to-date on the latest issues, policies and challenges facing the security of Europe’s CNI. You will gain an insight into what the future holds for Europe: the collaboration and support between member nations required to ensure CNI is protected from future threats and how to best plan, co-ordinate and manage a disaster. Supporting organisations of Critical Infrastructure Protection and Resilience Europe include: the Institute of Civil Protection & Emergency Management, National Security & Resilience Consortium, International Security Industry Organization, European Corporate Security Association and BORDERPOL (World Border Organization). L FURTHER INFORMATION For the full conference programme and further information on fees and early bird discount, visit www.cipre-expo.com

38

COUNTER TERROR BUSINESS MAGAZINE | Issue 16


Policing

POLICING

FINDING A BETTER WAY TO POLICE

An Independent Police Commission review headed by Former Metropolitan police commissioner Lord Stevens highlights 37 recommendations on how to transform today’s policing

The Independent Police Commission review, chaired by Lord John Stevens, published its report Policing for a Better Britain in November. The long-awaited review was billed as the most comprehensive analysis of policing for half a century. The overall structure of the police service was last examined by a royal commission in 1962. The report includes 37 recommendations, including scrapping Police and Crime Commissioners (PCCs) and instead giving more power to local councillors and local authorities. The report highlights the challenges that the police face in the modern world: ‘Today policing takes place against the backdrop of deep social transformations – a global economic downturn, quickening flows of migration, widening inequalities, constitutional uncertainty, and the impact of new social media. Crime levels have fallen, but the police and their partners face the challenge of new forms of criminal activity, including cybercrime, fraud, terrorism, and the trafficking of people and goods.’ THE ROLE OF PCCS PCCs came into effect in November 2012 and became responsible for a combined police force area budget of £8 billion. The role of the PCCs was to be the voice of the people and hold the police to account. But while the report says that ‘the principle of democratic accountability that underpins the PCC experiment is sound and needs protecting’, in its current form, the PCC model had ‘fatal systematic flaws.’

The report says: ‘There is mounting evidence of serious difficulties in how PCCs are operating on the ground. There is little public knowledge of, or support for, this experiment in democratic policing. There have been well-documented problems with how PCCs appointed their staff and handle their relations with chief officers. It remains difficult to envisage how a single individual can provide effective democratic governance of police forces covering large areas, diverse communities and millions of people. In summary, we are confronted with the spectre of an experiment that is failing.’ As such the report says the PCC model should be ‘discontinued in its present form at the end of the term of office of the 41 serving PCCs.’ It says that more power should be given to local councillors and local authorities. This could be done introducing a legal requirement on the police to organise internal force boundaries in ways that are coterminous with the lowest tier of local government, and legislating to give local government a say in the appointment of local police commanders. The report also suggests enabling lower tier local authorities to retain at least some of the police precept of the council tax which they will then use to commission local policing from their force. This funding would be ring‑fenced to fund the police service and could not be divert into other authority services. It goes on to suggest giving those same lower tier local authorities the power to set priorities for neighbourhood policing, the local policing of volume crime and anti‑social behaviour, by formulating and agreeing with local police commanders policing plans for their town, city or borough.

NEIGHBOURHOOD POLICING The report says the ‘neighbourhood remains the key building block of fair and effective policing and it is vital that visible, locally responsive policing is protected in times of fiscal constraint.’ It recommends that this is achieved by a set of national minimum standards of police service which everyone should be entitled to received, and which local police forces and those who call them to account must deliver. To this end the Commission recommends that a Local Policing Commitment is introduced and should include a guaranteed minimum level of neighbour hood policing; an emergency response, or an explanation why this demand will not be met; a commitment to appropriate response times of a reported crime; and that a reported crime will be investigated or an explanation given of why this is not possible, with victims getting regularly updated on the progress of the investigation.

The dent Indepen e Polic view sion re the s i m m o C led as was bil prehensive m most cots of policing analys ver half a for o ury cent

RAISING STANDARDS To raise standards of professionalism, the report recommends police officers be given a new chartered status and could face being struck off a professional register if they are found to have committed serious misconduct. A ‘chartered’ police officer accountable to a strong professional body will improve public confidence and give greater competence and status to police officers and staff, the report says. All police officers must register with the College of Policing. Existing officers will be registered under ‘grandfather’s rights’, but all must demonstrate they are properly accredited within five years. This provides a mechanism for continuous professional E

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

39


Change your thinking on communications Technical developments are stepping up a gear as the critical communications landscape readies itself for the next step of its evolution. With major changes looming on the horizon, communications staff are under pressure to prepare for the arrival of a new data-rich future that promises huge benefits – but also greater complexity. Focussing exclusively on technologies and services for the public safety sector, British APCO’s Annual Professional Exhibition and Conference is the only must-attend event of the communications professional’s calendar. Who should attend? • Control room and call centre staff from emergency services; local government; utilities and petro/chem sectors; road/rail/ air and mass transport industries. • Professionals in the emergency services with responsibilities for using and developing social media channels. • Software developers servicing the public safety sector. • Communications equipment suppliers • Service providers to the public safety market. Why attend? • Specifically for end users: British APCO 2014 is Europe’s leading free public safety exhibition aimed specifically at end user staff. • See what’s new: at Manchester Central visitors will discover the latest technologies and see at first hand the systems that could shape the future of front-line operations. • Join in the debate: visitors can discuss their issues with subject matter experts in the FREE Professional Development Workshops. • Network: the Annual Event Dinner is the perfect networking opportunity.

Where & when

BAPCO 2014 1st & 2nd April Manchester Central, Manchester.

www.bapco.co.uk

For more information contact: Jasvinder Sidhu on +44 (0) 207 973 4700 or email j.sidhu@hgluk.com

Europe’s leading, free-to-attend multi-agency forum in public safety communications.


POLICING

Crime levels have fallen, but the police face the challenge of new forms of criminal activity, including cybercrime, fraud, terrorism, and the trafficking of people and goods  development and means that those without accreditation will leave the service. The College of Policing would hold the register of all chartered practitioners, which would be publicly available, and those found to have committed a serious misconduct should be struck off from the register. A STRUCTURE FIT FOR PURPOSE The commission found that the present structure of 43 separate police forces for England and Wales is no longer cost effective or equipped to meet the challenges of organised and cross-border crime. In a world of greater mobility and fiscal constraint the model is untenable, it says. However there is little or no consensus about a better alternative arrangement. The Commission makes a clear recommendation that change is essential and believes there are three serious options to consider: locally negotiated mergers and collaboration agreements; 10 regional police forces; or a national service.

PROCURING IT AND TECHNOLOGY The report says that the procurement of technology by the police services continues to be problematic, referencing ACPO’s president Sir Hugh Orde’s description of it being ‘in a bit of a mess’ in evidence to the Home Affairs Select Committee. The Commission recommends the development of a national procurement strategy coordinated jointly by the Ministry of Justice and the Home Office, for IT, non IT consumables and forensic services. The aim is to secure integration, common standards and value for money. The Commission also recommends that every force provides all its police officers and operational staff with all 19 basic technology operating system capabilities (as identified in the HMIC report ‘Taking time for Crime of 2012) as the minimum and ensures that all software updates are routinely installed. The Commission also says it would be highly beneficial that officers can access intelligence remotely through a single integrated platform.

Policing

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INDUSTRY RESPONSE In response to report, ACPO President Sir Hugh Orde said: “This is a wide ranging report offering views on many of the critical questions facing the police in a transforming society. It shows the increasing complexity of a service which must deliver neighbourhood policing, maintain public order, develop effective counterterrorism structures, look after victims and adapt to new forms of crime, all with fewer resources. “In meeting these challenges we note the Commission’s view on the importance of operational coordination between chief officers, supplied by ACPO. The enduring requirement for these leadership functions is distinct from but complementary to the new and vital role of the College of Policing in supporting standards, procedures and training. With Police and Crime Commissioners, ACPO is working towards a clear framework for operational coordination for the future.” The review was commissioned in 2011 by Labour and it is expected that the party implement many of them in its next election manifesto. The coalition government however has said it will look at the report, but it is not required to implement any of the recommendations.” L FURTHER INFORMATION independentpolicecommission.org.uk Read the full report at tinyurl.com/plo4u48

Specialists in Geospatial Information Management and Exploitation

Helyx is dedicated to enabling effective Geospatial Information Management and Exploitation across the entire life-cycle of information, from capture, processing, discovery and retrieval, to its subsequent analysis and exploitation. Helyx capabilities cover: Geospatial R&D, experimentation, analysis and testing, concept demonstration, technology investigation and advice, all supported by a training capability.

www.helyx.co.uk

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

41


29– 30 APRIL 2014 | OLYMPIA, LONDON

WORLD – INTERNATIONAL SECURITY FOR AN EVOLVING WORLD – INTERN

Counter Terror Expo offers the most comprehensive display of technology, equipment and services alongside a high level education programme designed to protect against the evolving security threat. 9,500 attendees and 400+ exhibitors will participate in multiple show floor workshops, new show feature zones, IEDD demo area, high level conference streams, behind closed door briefings and networking events in one secure environment.

CTX 2014 is a must attend event for professionals within; Banking / Finance, Border Control / Immigration, Communications / IT, Emergency Services / Ambulance Services / Fire Brigades, Energy / Oil & Gas / Nuclear, Government / Intelligence Agencies, Health, Logistics / Supply Chain, Maritime / Anti-Piracy, MOD/Military / IEDD Regiments, Police / Gendarmerie, Private Sector, Security Companies, Transport Security, Utilities / Water Visit the event website to discover why you should attend CTX 2014

Register for Your FREE Exhibition Pass Today www.counterterrorexpo.com/register Co-Located with

Lead Media Partner

Integrated Security Sponsor

Scanning & Screening Sponsor

Supported By

SAMI www.seasecurity.org


EVENT PREVIEW

NEW ZONES AT COUNTER TERROR EXPO TO REFLECT EVOLVING SECURITY THREAT

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Counter Terror Expo has grown to become the largest international counter terrorism and security event of its kind. In response to the ever-evolving nature of terrorism, the 2014 NATIONAL SECURITY FOR AN EVOLVING WORLD event – which takes place 29-30 April at Olympia London – will have five new zones

Counter Terror Expo 2013 saw a nine per cent increase in the number of attendees and that pattern of growth is expected to continue into 2014 when some 9,500+ visitors, 400+ exhibitors and 350+ VIP and international delegations are expected to attend. Last year, the Counter Terror Expo organisers, Clarion Events, introduced new Feature Zones to the exhibition in order to highlight the best products, systems and solutions available to meet emerging threats in specific areas of the counter terrorism and security arena. For 2014, to reflect the evolving international security threat, five new zones are being added. BORDER SECURITY ZONE & ACCESS CONTROL ZONE Due to the increasing pressure on international borders and the growing risks to large-scale sensitive sites, this zone will feature the latest developments: from new physical infrastructure components to the most advanced biometric, screening and scanning technologies. INTEGRATED SECURITY IN ACTION The integration of technology allows for a more complete picture of security breaches, incidents and disturbances, enabling law enforcement agencies and security teams to modify their responses. This zone will have the latest range of CCTV, access control, perimeter protection and control-room security technology, as well as providing an interactive educational and technology showcase demonstrating integrated security platforms in action.

SECURE COMMUNICATIONS & CYBERTERRORISM ZONE This zone will showcase the latest technology that has been adopted by Homeland Security and law enforcement teams to ensure the integration of cyberterrorism prevention activities in response to the increasing threat to nations, organisations and the public. UNMANNED VEHICLES ZONE Reflecting the increasing use of unmanned vehicles for intelligence gathering and to achieve safe and cost-effective access to remote locations and hazardous areas, this zone will display new and established manufacturers of ground and air vehicles. SMALL ARMS ZONE The role that small arms play in helping Special Forces and Special Operations prevent acts of extreme violence or terrorism from escalating further is absolutely crucial. This zone will showcase the latest prototypes of the weapons being developed by international suppliers, as well as the small arms tactics and techniques that are being adopted to help fight terrorism. CTX 2014 will also see a free-to-attend workshop programme on the show floor, with sessions focusing on new products, innovations, standards and industry engagement. The popular IEDD Demo Area is set to return with five new scenarios that will touch upon civilian and field-based operations, CBRN, and a vehicle-borne IED car clearance, which will all link-in police and military teams, both

pre and during the operation, and then post operations forensic analysis. CTX 2014 will also hold an extensive multi-stream conference, with high-level keynotes featuring within its Global Counter Terrorism conference and dedicated streams on Securing Public Spaces, Emergency Services, Cybersecurity & Electronic Terrorism and Future Policing & Border Security. Philip Hunter, event director, Clarion Defence & Security, says: “The recent events in Kenya and news of the latest terrorism-related arrests in the UK have shown yet again how the threat from terrorism is not only ever-present but ever-changing. Counter Terror Expo 2014 has been carefully planned to ensure we continue to respond to the evolving needs of all sections of the counter-terrorism and security community.” Next year’s Counter Terror Expo 2014 will bring together leading experts from government, the military, the intelligence and security services, the police and the emergency services, as well as the developers and manufacturers of the latest counter-terrorism and security products, systems and services. L

FURTHER INFORMATION Pre-register at www.counterterrorexpo. com/register. CTX 2014 is a secure event so visitors must register first to have their attendance approved. CTX 2014 at Olympia London (29-30 April) will be co-located with Forensics Europe Expo and Ambition, the dedicated UK ambulance and pre-hospital care exhibition. CTX 2014 visitors will be able to visit all three shows using their CTX 2014 badge

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

43


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HDC_178x125.indd 1

05/12/13 09:54

SEMINAR AND WORKSHOP HARNESSING THE LESSONS LEARNED FROM STUXNET Workshop: 5 February 2014 | Seminar: 6 February 2014 | Holiday Inn Bloomsbury, London, UK Do you feel the industry has failed to educate you on cyber security? This seminar features presentations, debate, case studies and live demonstrations and will focus on the UK’s need to train and certify its ICS engineers and technicians in technical cyber security training.

Expert speakers include

NEW half-day workshop

 Hugh Boyes, Cyber Security Lead, The IET

A practical, participatory workshop led by Simon Oxley, Managing Director, Citicus. You will take part in a `live’ evaluation of a critical industrial control system and complete a sample risk scorecard for one of your own industrial control systems. Headline sponsor

Exhibitor

 Thomas Brandstetter, Professor for Industrial Security & CEO, Limes Security and Former Programme Manager Product CERT, Siemens  Mike StJohn Green, Former Government Cyber Security Advisor  Roger Cumming, Technical Director Security and Intelligence, Atkins

Media partners

Supporting sector

The Institution of Engineering and Technology is registered as a Charity in England and Wales (No. 211014) and Scotland (No. SC038698). The Institution of Engineering and Technology, Michael Faraday House, Six Hills Way, Stevenage, Herts, SG1 2AY.

See the full programme and register at www.theiet.org/cyber-ics IET_2087_CYBER_ICS_HALF_PAGE_COUNTER_TERROR_BUSINESS.indd 1

44

COUNTER TERROR BUSINESS MAGAZINE | Issue 16

#IETcyberics 11/11/2013 11:07


EVENT PREVIEW

SECURING BORDERS ACROSS THE GLOBE

Border Security 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Returning to Bulgaria, SMi’s Border Security 2014 conference on 26-27 February will feature discussion on the key emerging efforts of international border control agencies Global governments are tasked among other things to protect their citizens, their economies and their resources. Therefore the borders that run along the nations boundaries must be impenetrable to unauthorised or unrecorded crossings. Returning to Bulgaria, the 7th annual SMi Border Security 2014 Conference will feature discussion on current concerns in Eastern Europe and around the world. As a relatively new member of the European Union, Bulgaria faces geo-political challenges unlike many of its co-members. Along with Romania, it is also doing everything it can to be accepted in to the Schengen Area. This necessitates effective border policing and this position as a border security hot spot makes it an ideal and intriguing venue. BORDER CHALLENGES Border control is incredibly challenging particularly when a border runs for thousands of kilometres often through hard and varied terrain. With the added pressure of some borders running through hostile environments steps must be taken to ensure all hazards and any potential threat stays beyond the border and does not penetrate into a nation. SMi’s Border Security Conference will highlight the key emerging efforts of international border control agencies. Border security has long since moved on from the lone patrol footman walking along a barbed wire fence. Now, governments employ the use of sophisticated software technology for monitoring individuals as they move through borders. This method requires constant technological development and the addition of cross border agency cooperation. Industry is replying to the demand for border security technology with a host of technological advancements that will serve to combat the risk of border crossings by individuals or goods alike. SMi’s Border security Exhibition space will act as an innovation showcase housing the latest offerings from key industry representatives. Not only are there human factors to consider, now borders are being breached by goods or currency, often to fund crime, or to pose a threat to citizens within a border. SMi’s Border Security 2014 will serve to promote debate and discussion aided by an impressive line up of key military and

govenments officials that will draw on real life senarios, coupled with distinguished industry subject matter experts that can deliver up to date briefings on the very latest technology that the community is developing. Sea ports, Airports, International Train Stations and Inter-country Highways all have their own unique boarder security challenges – This year SMi Border Security 2014 will explore the use of UASs, UAVs and Radar systems that can be deployed to track intruders or airborne crossings, whilst specialist Sonar and Small Craft Detection systems can be deployed to monitor sea or waterway access. Keys themes for this year will include: Terrorism and Transnational Criminal Organizations; Emerging Technologies to Address Mission Threats; Border Enforcement by Land-Air-Sea; Joint forces Efforts; Maritime and Port Security; Border Management in Conflict Zones; Border Security Big Data; and Integrated Border Management. EVENT HIGHLIGHTS There will be a host nation address from Chief Commissioner Penov, Chief Directorate of Border Police, Bulgaria. He will discuss strategy and organisational structure, new technologies and modern technical means in border control,

and cooperation with neighbouring countries – an efficient tool in combating illegal migration and increasing the border security. There will be a case study from Haiti covering cross border criminal activity and irregular migration. Brazil’s strategy for protection of port security will be discussed, including its preparations for the upcoming Olympics and World Cup. What’s more, delegates will get to learn new approaches of the Schengen border security evaluation mechanisms, and discuss the 21st century challenges of Border security for developing countries. RISK MANAGEMENT Risk management is a useful tool in order to improve border security. Peter WaldbauerHable from Bavaria’s Criminal Police Department will take a session looking at the origin of risk management, risk management used in the economic system, application of risk management within border security organisations with practical examples, and a look at the specialised risk management versus general risk management. L FURTHER INFORMATION www.bordersec.com

Issue 16 | COUNTER TERROR BUSINESS MAGAZINE

45


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service

Ads IBC, 25 Arinc IFC Audax Global Solutions 8 BCS, The chartered Institute for IT 28 Belcom Cables 10 Brintex 40 Clarion Events 42, 43 Coges 6 Cross Match Technologies 36 Finex Global 33 Fire Eye 30 Flir 44 Frontier Pitts 46 GMO GlobalSign 35

Helyx Sis Hid Global Holmatro Rescue Equipment Infranor International Research Moore International Pentagon Protection Pentax Security Safety Flex Barriers Security Labels Tata Steel The IET Torch Marketing

41 32 16 26, 27 34 22 OBC 12 20, 21 4 24 44 14, 37, 38

PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Cassar REPRODUCTION & PRINT Argent Media

46

COUNTER TERROR BUSINESS MAGAZINE | Issue 16


FA R N B O R O U G H , 1 1 - 1 3 M A R C H

THE ONE EVENT THAT HELPS YOU COPE WITH ALL THE REST

CYBER SECURITY

POLICING

AVIATION SECURITY

COUNTER TERRORISM

Threats to our security are getting ever more sophisticated and prolific. This is why Security & Policing 2014 is essential for anyone responsible for Civil Protection or National Resilience.

✓ The only Home Office security event ✓ Security & Policing is FREE to attend ✓ Strict Home Office criteria will ensure a secure environment for visitors and exhibitors

✓ Network at the very highest levels of decision making ✓ Free to attend Government briefings ✓ Liaise with other agencies To register your attendance, or for more information, please visit www.securityandpolicing.co.uk or contact +44 (0)20 7091 7835


A Division of Pentagon Protection plc

The Advantages of High Image Quality and Performance 3-D X-Ray at a 2-D price!

Innovative 3-D Perspective Technology for: • Fast and extremely clear, detailed 3D imagery revealing threats not normally visible with conventional systems. • Easy to operate, simple to use image processing tools. • Fast and accurate decisions can be made to provide increased throughput and decreased false alarms or missed threats. • Operational performance enhanced. • Stores and archives all imagery and data of detection. • Improved threat detection, concealed items made obvious. • High value proposition.

Contact us to arrange a demonstration or to find out more sales@sdsgroupltd.co.uk Ports and Borders. Government and Defence. Critical Infrastructure. Commercial Event Management. Transportation. Commercial Buildings. Correctional Facilities. Retail Establishments.

The UK’s leading specialist supplier of Search and Security Equipment and Training +44 1923 221 910 sdsgroupltd.co.uk/voti

Come and see us Stand No. 150


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.