Counter Terror Business 17

Page 1

www.counterterrorbusiness.com | ISSUE 17

DATA SECURITY: THE NEW GOVERNMENT SECURITY CLASSIFICATION COMES INTO EFFECT MARITIME SECURITY

PERIMETER SECURITY

SECURITY TRADE

CYBER-TERRORISM

DEFENDING CYBERSPACE

How cyber terrorists are reaching higher profile targets through smaller businesses

EVENT PREVIEW

COUNTER TERROR EXPO

The whole spectrum of the counter terror community gathers to discuss industry updates and share best practice

l annua The bi atory Euros p79 event NCE

ZINE

AGA ESS M

EFE FOR D

USIN THE B

l ationa Intern Vehicles ured Armo iew p92 rev


HAZARDOUS MATERIALS CONTAINMENT AND PROCESSING SOLUTIONS

Hosokawa Micron Ltd offers a range of standard and bespoke containment systems, fume cupboards and gloveboxes for the handling and processing of hazardous materials. Applications include full glovebox integration of forensic analysis systems, lasers, microscopes and CNA fuming chambers. A range of lead shielded gloveboxes offer safe handling and processing of radioactive materials. A recent innovation is a rapid deployment, flexible containment system supplied with a wheeled transit case. This fully mobile unit can be easily transported to the scene of an incident and used to contain hazardous materials for analysis at the scene or for transportation back to the lab.

Rivington Road, Runcorn, WA7 3DS • Tel: +44 (0) 1928 755100 • E.mail: info@hmluk.hosokawa.co.uk

PROCESS TECHNOLOGIES FOR TOMORROW SM


COUNTER TERROR BUSINESS

COLLABORATING ON CYBER SECURITY

www.counterterrorbusiness.com | ISSUE 17

DATA SECURITY: THE NEW GOVERNMENT SECURITY CLASSIFICATION COMES INTO EFFECT MARITIME SECURITY

PERIMETER SECURITY

The government has launched the Computer Emergency Response unit, CERT-UK, to help manage and prepare for national cyber security incidents. The initiative will coordinate approaches to national cyber security incidents, working closely with industry, government and academia to enhance the UK’s overall cyber resilience. It will also serve as the UK contact point for similar bodies in other countries.

SECURITY TRADE

CYBER-TERRORISM

DEFENDING CYBERSPACE

How cyber terrorists are reaching higher profile targets through smaller businesses

EVENT PREVIEW

COUNTER TERROR EXPO

The whole spectrum of the counter terror community gathers to discuss industry updates and share best practice

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

nnual The biaatory Euros p79 event CE

ZINE

FOR DEFEN

ESS MAGA

THE BUSIN

ational Intern Vehicles red Armou iew p92 rev

With cyberspace adding a new dimension to potential terrorist attacks, this issue of Counter Terror Business examines the issue in detail. On page 13, KPMG’s Stephen Bonner looks at how terrorists use the internet to support their activities and considers whether a cyber attack poses a real, or hypothetical, threat. Meanwhile on page 17, Paul Weatherly, convener of the London Chamber of Commerce’s Defence and Security Group, examines how small to medium business can be targets of cyber terrorism, even if it’s simply a way for a terrorist to reach a higher profile target further down the supply chain, and gives advice on how to defend your organisation from such an attack. On 2 April, the Cabinet Office launched the Government Security Classification scheme, which replaced the existing Government Protective Marking Scheme. This new system will better indicate the sensitivity of information and the need to defend it against a range of threats. Martin Sugden, ceo of Boldon James explains the new classification on page 21. With Counter Terror Expo imminent (29-30 April), we have dedicated pages 53-65 to previewing the show. Recognising the major threat of cyber terrorism, the event includes a Cyber Security and Electronic Terrorism conference which will consider the government’s cyber security strategy, what the police service and other agencies are doing to combat e-crime, and new ways to make nations and businesses more resilient to cyber-attack.

Angela Pisanu, editor

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright EDITOR Angela Pisanu EDITORIAL ASSISTANT Arthur Walsh PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Cassar REPRODUCTION & PRINT Argent Media

© 2014 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

3


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS

07 CTB NEWS

Cameron orders inquiry into Muslim Brotherhood; UK prisons used as terrorist recruitment centres; IAEA warns of dirty bomb threat

13 CYBER SECURITY: CYBER TERRORISM 08

KPMG’s Stephen Bonner investigates whether the fear of a cyber attack poses any real threat

21 37

31 PERIMETER SECURITY

Stephen Mundy of the Perimeter Security Suppliers Association (PSSA) examines how the UK’s recent security export strategy is likely to impact the provision of perimeter security in the coming months

37 SECURITY TRADE & INVESTMENT

Noah Shani of the Israeli Embassy in London looks at Israel’s thriving security and defence technology industry

17 CYBER SECURITY: CYBER DEFENCE STRATEGY

41 TRAINING

21 CYBER SECURITY: DATA CLASSIFICATIONS

47 FORENSICS EUROPE EXPO 2014

27 MARITIME SECURITY

53 COUNTER TERROR EXPO 2014

SMBs can often be targeted by cyber terrorists wanted to gain access to a higher-profile target, warns Paul Weatherly

Martin Sugden discusses the new Government Security Classification (GSC) scheme, which will indicate the sensitivity of the information being handled

Christopher Kirby examines how maritime security officials in West Africa can learn from the Indian Ocean region’s approach to tackling piracy

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The BSIA’s Anthony Rabbitt explores security training courses and how they are aiding counter terror efforts

April’s Forensics Europe Expo 2014 is set to provide visitors with valuable insights into developments in forensic science

Counter Terror Expo will gather the whole spectrum of the counter terror community to share the latest insight and best practice

41

THE

79 53

INES

SM AG

AZIN

E FO RD EF

ENC

71 DEFENCE NEWS

Defence Committee report highlights importance of complex deterrent capability; new Afghanistan deployment in June; Task Force Helmand disbanded

75 FARNBOROUGH INTERNATIONAL AIRSHOW Leading figures in the global aerospace industry will meet at the Farnborough International Airshow

79 EUROSATORY 2014 PREVIEW

The bi-annual Eurosatory event takes

Counter Terror Business

BUS

place this June and is currently the largest international land and air-land defence and security exhibition

IS Turn t SUE 7 for th o page 7 e la 1 businetest defenc e s and fe s news atures

92 INTERNATIONAL ARMOURED VEHICLE CONFERENCE 2014

The International Armoured Vehicles conference in February saw global defence heads present on all aspects of the armoured vehicle operating environment

www.counterterrorbusiness.com Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

5

E



EXPLOSIVES

IAEA warns of dirty bomb threat The International Atomic Energy Agency has said that 140 cases of nuclear and radioactive material were missing or unauthorised in 2013, raising concerns of their possible use by terrorist groups. According to IAEA deputy director general Denis Flory, even if radioactive materials are not weapons-grade they can be combined with conventional explosives to make ‘dirty bombs’. Flory told Al Jazeera America: “member states had reported nearly 2,500 cases to the IAEA’s Incident and Trafficking Database since it was set up two decades ago. “More than 120 countries take part in this information exchange project, covering theft, sabotage, unauthorised access READ MORE: and illegal tinyurl.com/qa5cxdq transfers.”

HAZARDOUS CHEMICALS

Interpol launches e-learning tool for identifying unlawful chemicals trade

INTELLIGENCE

Cameron orders inquiry into Muslim Brotherhood The Prime Minister has commissioned an inquiry into the UK activities of the Muslim Brotherhood, 10 Downing Street has announced. The investigation, which will draw on MI5 and MI6 assessments, was called for after the government concluded that Whitehall had insufficient intelligence regarding the organisation’s activities in Britain and Egypt. The Times has reported that MI6 will investigate claims that the Muslim Brotherhood was responsible for recent bus attacks in Egypt, while MI5 will look into how many of the group’s leaders relocated to Britain following the ousting of Mohamed Morsi. David Cameron said: “What I think is important about the Muslim Brotherhood is that we understand what this organisation is, what it stands for, what its beliefs are in terms of the path of extremism and violent extremism, what its connections are with other groups, what its presence is here in the United Kingdom. Our policies should be informed by a complete picture of that knowledge. “It is an important piece of work because we will only get our policy right if we fully understand the true nature of the organisation that we are dealing with.”

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A Downing Street spokesman told the Times: “The Muslim Brotherhood has risen in prominence in recent years but our understanding of the organisation, its philosophy and values, has not kept pace with this. Given the concerns about the group and its alleged links to violent extremism, it’s absolutely right and prudent that we get a better handle of what the Brotherhood stands for, how they intend to achieve their aims and what that READ MORE: means for tinyurl.com/p2bumw2 Britain.”

FINANCE

Government publishes list of Al Qaida sanction targets The Treasury has published the names of 61 persons and organisations connected with the terrorist organisation Al Qaida against whom it is imposing financial sanctions. Interpol has launched an e-learning module which aims to assist law enforcement professionals in identifying and preventing the unlawful trade of hazardous chemicals and waste. The module, created in conjunction with the Secretariat of the Basel, Rotterdam and Stockholm Conventions on hazardous materials, covers identifying markers like container appearance, labels, codes and names, as well as the personal protective equipment needed for inspections. David Higgins, head of Interpol’s environmental security unit, said: “The legal international trade in chemicals is an important part of the global economy, but it is crucial that this trade be effectively monitored. This e-learning tool provides targeted capacity building to law enforcement officials to help ensure safe and environmentally‑sound management READ MORE: of hazardous tinyurl.com/q675uzx substances.”

The list identifies individuals and entities who are subject to asset freezing and to whom it is illegal READ MORE: to provide tinyurl.com/nnunmtq funds.

COUNTER-TERRORISM

Three arrested in Manchester over Syria terrorist links

Counter-terror detectives detained three individuals in March in Manchester over their alleged links to terrorist activity in Syria. Two men from Levenshulme and a woman from Trafford were held in custody. Detective Chief Superintendent Tony Mole, Head of the NWCTU, said: “First and foremost I should reassure everyone that none of today’s activity is linked in any way to any imminent threats in Greater Manchester or the UK. “The operation has been running since autumn 2013 since we first became aware of a number of individuals travelling

from the North West to the battlefields of Syria. You may have seen headlines in recent months linking people from Manchester to Syria and you will naturally have been concerned about this. “Like other major cities across the UK we have been aware for some time of people travelling to war-torn places for terrorism‑related purposes. This is not a problem unique to Manchester or the North West – it is an issue that affects different communities across the country READ MORE: and tinyurl.com/q6kfbth elsewhere.”

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

7


CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TERROR LAWS

Concerns over underuse of terrorism prevention measures Terror law watchdog David Anderson QC has expressed concerns that terrorism prevention and investigation measures (TPIMs) are not being used to their full strength. This came after Theresa May’s latest ministerial statement on TPIMs revealed that there are no longer any terror subjects subject to these measures, with the last TPIM lapsing in February. Ten individuals had been subject to TPIMs since they were introduced in early 2012, with seven orders expiring, two individuals absconding and one in prison. Anderson said that the blame partly rests with the ending of a power to relocate suspects away from their home area. Anderson says in his annual report that, notwithstanding these concerns, the current system should be kept: “There is no need to put the clock back. The majority of changes introduced by the TPIMs Act have civilised the control order system without making it

less effective. The two-year limit is a reminder that executive constraints of this kind are no substitute for the criminal process, and no READ MORE: long‑term tinyurl.com/p7anckr solution.”

CYBER SECURITY

INTELLIGENCE

Study reveals extent of vulnerability to cybercrime A recent study by a telecoms software firm claims that over 24 million routers worldwide are vulnerable to widescale distributed denial of service (DDoS) attacks. This is because these routers have open domain name system (DNS) proxies which expose internet service providers (ISPs) to DNS-based DDoS attacks. The study claims that more than five million of these routers were used for attack traffic in February. Sanjay Kapoor of Nominum, the company that commissioned the research, said: “Existing in-place DDoS defenses do not work against today’s amplification attacks, which can be launched by any criminal who wants to achieve maximum damage with minimum effort. Even if ISPs employ best practices to protect their networks, they can still become victims, thanks to the inherent vulnerability in open DNS proxies.” READ MORE:

tinyurl.com/nmlgd4p

8

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

CYBER SECURITY

Government launches Computer Emergency Response Team Francis Maude MP has launched the Computer Emergency Response unit, CERT-UK, to help manage and prepare for national cyber security incidents. The initiative aims to coordinate strategic approaches to national cyber security incidents, and will serve as the UK contact point for similar bodies in other countries. Other responsibilities include promoting cyber security awareness. CERT-UK director Chris Gibson said: “CERT-UK will build on existing arrangements for supporting the critical national infrastructure, and incorporate the Cyber Security Information Sharing Partnership (CISP) which was launched last year and has proved extremely effective as ameans of collaborating between READ MORE: industry and tinyurl.com/n3l76lb government.”

Boston bombing intelligence report

The US House Committee on Homeland Security has issued a report criticising the FBI and Customs and Border Protection (CBP) for failing to investigate Tamerlan Tsarnaev in the years running up to his involvement in the 2013 Boston bombing. The report says: “There were opportunities in which greater sharing of information might have altered the course of events. Such failures must not be allowed to persist.”

An FBI spokesman responded that: “We acted upon the information provided to us by the Russians in 2011 and did everything legally possible at the time to ascertain whether or not Tamerlan Tsarnaev posed a threat. “We took a number of steps including conducting an interview with him and his family but found no READ MORE: derogatory tinyurl.com/oghwote information.”


Better Together.

Get smarter push-to-talk by extending your radio system to new devices using existing broadband networks. See us at Counter Terror Expo, booth H31.

www.twistpair.com or +44 (0)118 900 1110 Š 2014. Twisted Pair Solutions, Inc. All other icons and marks are the trademarks of their respective owners.


CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COUNTER-TERRORISM

UK strengthens counter-terror ties with Pakistan

TERRORIST RECRUITING

Report on UK prisons as terrorist recruitment centres

British national security advisor Sir Kim Darroch met with Pakistan’s Federal Minister for Interior Chaudhry Nisar Ali Khan in April to discuss foreign policy objectives. Darroch pledged continuing support from the British government to Pakistan in areas like human trafficking, transnational crime, assisting security agencies and terrorism. He said the two countries’ priorities regarding Afghanistan were the same. Darroch also met with Prime Minister Nawaz Sharif on this trip. Sharif said: “Our soil will not be used against Afghanistan and we support the democratic READ MORE: process in tinyurl.com/pmau7m8 Afghanistan.”

COUNTER-TERRORISM

Bin Laden son in-law convicted on terror charges Osama Bin Laden’s son-in-law Sulaiman Abu Ghaith has been convicted of terrorism charges at a New York trial. Abu Ghaith served as an al-Qaida spokesman following the September 11 attacks, and is the highest-ranking member of the organisation to face trial in the US since the attacks. The federal trial returned a guilty verdict on the charges of conspiracy to kill Americans, conspiring to provide support to al-Qaida, and providing READ MORE: support to tinyurl.com/lagnp7m al-Qaida.

AIRPORT SECURITY

Study on costs of airport security A recent study has concluded that the financial costs of airport security measures vastly outweigh the safety benefits. The researchers looked only at measures to secure terminals, such as police patrol, and not airplane security measures like ID checks. The authors, researchers at the University of Newcastle, Australia and Ohio State University concluded that “many of the assessed security measures would only begin to be cost-effective if the current rate of attack at airports in the U.S., Europe, and the Asia-Pacific increases READ MORE: by a factor tinyurl.com/m5wxrw6 of 10-20.”

10

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

The Shadow Secretary of State for Justice Sadiq Khan has issued a report detailing growing concerns that some British prisons are serving as recruitment centres for jihadi causes. Whitemoor Prison was singled out by prison inspectors as a recruitment centre for al-Qaida. Belmarsh and Full Sutton also receive a mention in the report for their disproportionately high Muslim populations.

Khan said: “While the Justice Secretary is busy with gimmicks he has no idea if and to what extent radicalisation is taking place in our prisons. “The government has failed to take action on this. In jails like Whitemoor the chief inspector is on record warning of the READ MORE: risks of tinyurl.com/oarnkmu radicalisation.”

COUNTER-TERRORISM

New claims that Blair ‘tried to get IRA suspects released’ Retired PSNI detective Norman Baxter has said that Tony Blair asked police in Northern Ireland to release two IRA suspects arrested for attempted murder following a call from Sinn Fein president Gerry Adams. The alleged request was made in 2007, when the sitting Labour government was in secret talks with Sinn Fein on dealing

with rogue Republicans. Baxter said he refused what he saw as an “illegal and unconstitutional” request from Tony Blair. Baxter made these allegations while speaking on separate issues at the Northern Ireland Affairs READ MORE: Committee at tinyurl.com/nvb2zfo Westminster.

COUNTER-TERRORISM

US and Algeria to co-operate on counterterrorism US Secretary of State John Kerry has travelled to Algiers to have a strategic security talk with his Algerian counterpart, Ramtane Lamamra about fighting terrorism in the unstable Sahel region. Al-Qaida in the Islamic Maghreb has targeted the Sahel region, which is an arid strip of land across Africa that touches

Algeria’s south. The group began as an Islamist insurgency in Algeria and became linked to al-Qaida in 2006. Its militants have prowled the vast terrain of the Sahel region to kidnap people and seek ransom to READ MORE: fund their tinyurl.com/nn6akll activities.


ON-GROUND TEMPORARY SECURITY FENCING

POLMIL STANDARD FENCE

POLMIL PAS 68 RATED

POLMIL MOB ATTACK TESTED

MODULAR FLEXIBLE DESIGN

POLMIL AIRPORT APPROVED

NATIONWIDE INSTALLATION

®

®

(Test Reports on Request)

®

®

See us at Stand Number F40 POLMIL IS A DIVISION OF ®

POLMIL ON-GROUND HOARDING ®

BLOK

MESH

UK LIMITED

Specialists in the Design, Manufacture, Hire and Sale of On-Ground Temporary Security Fencing

Tel: 01376 332591 www.polmilfence.com


WE SET THE STANDARDS WHEN IT’S MISSION CRITICAL BCS CESG Certified Professional Scheme. Independent assessment and verification for information assurance professionals. Now available for the private sector.

BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no no. 292786) 2013

BC509/LD/AD/1212

bcs.org/ia


CYBER RESILIENCE

CYBER TERRORISM – REALITY OR FANTASY?

It is certainly true that terrorist groups exploit the internet to recruit, communicate, fundraise, plan and mobilise. There have been many examples of terrorist groups using the internet and social media to reach out to potential recruits, disseminate propaganda and assist in the radicalisation process. The Inspire online magazine produced by Al Qaeda in the Arabian Peninsula, which included articles on bomb making and instructions on how to contact the group, was just one high profile example. Of course, such groups will be cautious of government surveillance, and the Snowden revelations will have done nothing to diminish their (possibly well founded) paranoia. Some terrorist groups have produced detailed guides (including educational videos) on internet security, designed their own encryption tools and made extensive use of the TOR network (an online anonymity and censorship resistance network) as part of their quest to remain undetected. The internet also provides a vital source of targeting material which can help terrorist groups plan and organise their activities. On-line mapping, streetscapes, urban plans and other publicly available information on potential targets can also assist in planning a terrorist attack. We value our openness as a society, but with such openness come risks.

t Terrorisave h groups internet e used thial media to and soc t to potential u reach ots, disseminate recrui aganda and prop sist in as sation radicali

Written by Stephen Bonner, a partner in KPMG’s Information Protection & Business Resilience team

Nowadays, every threat seems to have a cyber dimension to it – cyber crime, cyber espionage and cyber war. It is natural, then, to talk of cyber terrorism, but does the reality match the rhetoric? Stephen Bonner, a partner in KPMG’s Information Protection & Business Resilience team, investigates

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SOCIAL MEDIA Social media also provides a unique and valuable insight into the so called pattern of life of target individuals, helping identify friends, colleagues, travel arrangements, homes and even routes to work. For example, a simple Foursquare or Facebook check-in can give away time, location and details of who else is around – as can the meta-data which comes with our favourite photograph. The same social media also gives insights into our life history, attitudes and beliefs – helpful for both terrorist recruitment and for targeting. All of which suggests that terrorist groups are becoming increasingly internet‑savvy – but the question remains – would terrorists mount a cyber attack? E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

13


Secure Your Data, Protect Your Organisation Boldon James Classifier offers organisations a unique approach to cost-effective data protection: F Reduce the risk of data loss F Consistently enforce classification policy F Increase information security awareness F Drive DLP, encryption and other technologies F Achieve data governance best practice

Putting Data Classification at the heart of your business empowers your employees to become part of your security team and, in turn, reduces the risk of sensitive information falling into the wrong hands.

We were looking for a simple, reliable and customisable protective marking product, from a vendor who had the development prowess to customise the product for us, as well keeping it up-to-date with our technology base. We found both in Boldon James. Head of Business Systems, Guildford Borough Council

boldonjames.com

To find out more or to arrange a 14 day FREE Classifier product trial please visit boldonjames.com


CYBER RESILIENCE two key individuals within a terrorist group who bring particular skills or experience. Frequently the military have seen a new improvised explosive device technique developed and fielded across Afghanistan within weeks.

 The US intelligence community threat assessment states that they “have seen indications that some terrorist organisations have heightened interest in developing offensive cyber capabilities, but they will probably be constrained by inherent resource and organisational limitations and competing priorities.” There has been much discussion amongst think tanks worldwide over this issue and opinion remains divided. Clearly, our dependence on the internet has grown to the point where many critical infrastructure systems are connected (either directly or indirectly) to the internet. Moreover, this year the World Economic Forum Global Risk report raised the spectre of “Digital Disintegration” as we become increasingly dependent on cyberspace. Despite our dependence on the internet, cyber attacks seem to lack the visceral impact of a bomb in a crowded place with the immediate media coverage of carnage and destruction, the stuff of terror and therefore terrorism. Hollywood has postulated many cyber terrorism scenarios, but they have yet to usurp shrapnel filled pressure cookers, truck bombs and hijacked aircraft as weapons of terror on the Big Screen in the cyber world. Of course, it is easy to be complacent as terrorist groups are continually looking for new attack techniques which can defeat our security measures. Often we can track innovation in terrorist methods to one or

THE RIGHT CYBER SKILLS Terrorist groups backed by foreign governments are more likely to possess the intent and capability to conduct cyber attacks. Some governments are suspected of providing finances, infrastructure and sanctuary to terrorist groups whose objectives align with their own. The Al‑Qassam Cyber Fighters, who take their name from Hamas’s military wing, were responsible for attacks on US financial institutions in 2012. Such was the scale and length of this campaign, media reports suggested, the US government suspected the group was backed by Iran. Equally, the relationship between the Syrian Electronic Army, which defaces websites and conducts denial of service attacks against Syrian President Bashar al‑Assad’s political opponents, and the Syrian government remains unclear. So my advice is, do not discount a cyber dimension to terrorism, but perhaps set it in the context of other “clear and present dangers” including country sponsored attacks, the militarisation of cyberspace, and the ever present risk of accidental system failures due to error or incompetence. While cyber‑terrorism may in future represent a threat to such infrastructure, currently it ranks behind many other threats. I would argue that good cyber security can do much to improve the resilience of our critical infrastructure irrespective of the motivation of the attacker, useful when our conventional categories of state, terrorist and criminal become blurred in cyberspace.

UK ent governm de has ma ess in rogr good p enting its implemyber security lc nationategy but we stra lways be must a tious cau

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

GETTING THE RIGHT BALANCE Our governments have a duty to help us strike a balance between the openness which is fundamental to our democratic society, and the security necessary to frustrate attacks on that very society. That balance must be struck with one idea front of mind; the openness and freedom of the Internet is exactly what cyber-terror is likely to aim to disrupt, we must not let the cyber-terrorists win by giving up real freedoms as an attempt to reduce imaginary harms. Also we must remember that much, if not all, of our critical infrastructure is now in private hands and that striking that balance also requires discussions with industry and commerce over the nature of the threat and the risks we as a nation are prepared to tolerate. Those choices are not just national choices, but have global implications for companies and the decisions they make about investing in the UK. Firms seek a secure and stable environment for business – whether that be fiscal policy or cyber security, but they also understand quite keenly the costs of doing business in any given country. Unfortunately, we are far from having a solid basis on which to make risk judgements around cyber threats, whether terrorist or otherwise. We also have a long way to go to understand the systemic risks which we as a country face from our growing dependence on cyberspace. The UK government has made good progress in developing and implementing its national cyber security strategy, but we must always be cautious about the natural tendency of governments to cloak such discussions in secrecy. So I would urge an open dialogue around the nature of the cyber threat to the UK, our collective understanding of the risks to the UK, and the business and national incentives around managing those risks. L FURTHER INFORMATION www.kpmg.com

15


TACKLING SECURITY FOR VOICE OVER IP TELEPHONY COMMUNICATIONS VoIP technology is becoming increasingly popular as it is cheaper than traditional ISDN, is integral to Unified Communication Systems and offers superior features, but with organisations now more aware than ever of hacking risks, Cyber Security considerations can sometimes be a barrier. Adam Crisp, Director of Voip.co.uk explains the challenge and their solution. During the course of a telephone call, sensitive information may be divulged either in spoken voice or in the DTMF tones used to signal key presses. As such a telephone call is a method of transmitting sensitive information. Further to this, if a telephone call is recorded, as required by many regulators or corporate quality procedures, sensitive information is stored, probably in accessible format. Systems involved in the transmission or the recording of calls need to be protected as defined by ISO27001 or by Payment Card industry Data Security Standard (PCI DSS) if Cardholder Payments are made via the telephone. Increasingly, VOIP technology is being used to make and receive calls via external IP networks which must be considered open or public. Private MPLS or other type of private lines should not automatically be assumed to be secure as they are not normally protected by strong encryption.

CONTACT VOIP infosec@voip.co.uk

I absolutely endorse, support and encourage the securing of voice technology. Although I think this applies in a general sense, it is paramount when considering that something as important as someone’s credit identity is at risk. Christian Janoff, PCI Board of Advisors, Cisco Systems

SIP ENCRYPT

NOT JUST FOR CREDIT CARD PAYMENTS Large corporations, small businesses, hospitals, financial institutions all amass confidential information about their customers, employees, products, research and financial status. Ask any business leader whether they would be concerned about a phone discussion on any of these being tapped into and the obvious answer would be “yes”. Unencrypted VOIP phone calls are at risk of interception. This makes the organisation vulnerable to losses of confidential information, trade secrets, intellectual property and missed opportunities to name but a few.

Identifying and solving the issue, VoIP.co.uk has developed our SIP Encrypt solution. Through this we provide simple to install call encryption between a customer site and our cloud based call servers. Calls and messages processed by our service are protected by a highly monitored, restricted access platform before secure handoff to upstream telephone carriers.

PAYMENT CARDS If an organisation accepts card payments they must comply with the PCIDSS and if they also use VoIP for the connection to their phone company, they must ensure the connection protects the cardholder data. SIP Encrypt is wire tap proof and VoIP.co.uk is a PCIDSS Level-1 Service Provider making this service the best choice for all merchants and contact centres.

FURTHER INFORMATION For a free on-site consultation please quote the reference CTB-Q2/14


CYBER-TERRORISM

BUILDING A CYBER DEFENCE STRATEGY The rise of the internet over the last few years has revolutionised how we live and work, becoming an everyday essential. Our dependency on the internet is increasing and, unfortunately, along with convenience comes an acute rise in security threats. Recent, high profile news stories have shown that in this era of ever increasing connectivity; confidentiality, integrity and availability of data are paramount.

The threats are many and varied and the adversaries range from criminal gangs through hacktivists to state-sponsored cyber-attacks. UK Government estimates the cost of a cyber-security breach for small to medium sized businesses to be between £35,000 and £65,000. Beyond the financial liability other risks to business include loss of data and the subsequent impact on public perception; denial of service and the

effect on business continuity; espionage and the loss of intellectual property; and criminal activity for financial gain.

Written by Paul Weatherly

Small and medium businesses can often be part of a crucial supply chain, and sophisticated adversaries could seek to target the weakest link in the chain to gain access to a higher-profile target, warns Paul Weatherly

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A SLOW-BURNING ATTACK A well designed cyber-attack can go unnoticed for some time and the potential damage that can be inflicted on the victim is huge and the sophistication and technical prowess of these attacks is growing exponentially. E

Threats nd ya are man and varied saries er the advm criminal ro range f s through gang ists to hacktiv nsored o state-spacks att

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

17


Dynamically shift your layers of defense with solutions from CSG Invotas™ . Whether an adversary is probing your perimeter or lurking within your network, CSG Invotas will slash your time-to-respond and greatly reduce the risk to your organization. Deploy a cyber playbook of security responses to: • Unify complex activities and actions across multiple devices in seconds • Capture analyst knowledge and automate or semi-automate workflows • Respond to incidents and recover in real time Learn more about this groundbreaking approach to cybersecurity. Visit us at InfoSecurity Europe, stand F98, or visit www.csginvotas.com.


CYBER-TERRORISM

Whilst technology is a major element in a solid cyber defence, the technology becomes moot if not backed up by the astuteness of people using it

 Small and medium businesses suffer additional risk as they are frequently part of crucial supply chains. Sophisticated adversaries will seek to target the weakest link in the chain, often a less well protected smaller business, in order to gain access to a more a high-profile target. It becomes essential, therefore, for smaller businesses to fortify their cyber protections in order to maintain security within their industry. In the event of a small/medium business compromise leading to severe data, service or financial loss there would be negative repercussions, diminished reputation and disintegration of the essential trust from other members of the chain. THE THREE DIMENSIONS When building on a cyber-defence strategy it is vital to look at an organisation from a high-level and separate it into three dimensions: people, process and technology. All three elements are key to cyber security but many companies place too much reliance on technology to provide protection on their networks. Whilst technology is a major element in a solid cyber defence, the technology becomes moot if not backed up by the astuteness of people using it or the processes in place

to manage incidents and preserve assets. Risk management has long been a part of everyday business, so in the modern world combating the risk of cyber threats should be integral to the way businesses function. Threat awareness is fundamental to assessing the risk of a cyber-attack and this awareness is central to the foundational elements of cyber security. A company that has a grasp of the foundational elements of information assurance will cut its risk significantly. Part of foundational security and an easy win for small and medium businesses is ensuring the appropriate training of employees; this falls under the people dimension of a cyber-strategy. The users are the front line of cyber-defence and if they are trained to be able to recognise abnormal emails or behaviour this could be the simplest and most cost effective way to prevent an attack. Creating a cyber-security culture in an organisation creates awareness across all levels, providing basic defence in depth. However, detection is only the first step of a successful defence; communication, reporting and escalation are crucial in mitigating the risk. Invoking best practices and having the appropriate policies and processes in place is intrinsic. Reporting any major intrusions

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

externally and to the authorities plays a key role in enriching defences within the industry. HELP FOR SMALL & MEDIUM FIRMS There are many collaborative groups evolving within government and industry which provide support to small and medium sized businesses. These groups, such as CISP (Cyber-Security Information Sharing Partnership) pioneered by CPNI (Centre for the Protection of National Infrastructure), create an environment for businesses in the same industry or cross industry, supply chain or governments to share intelligence on recent compromises and vulnerabilities and provide critical information for partners to mitigate and prevent compromise. In addition, a basic hardening initiative such as having a primitive visibility in to your network highlights the pivotal systems that need defending. Retaining basic network logs and toughening security of the network perimeter is a simple strategy which is complemented by enforcing a good level of security on endpoint assets. Maintaining up-to-date software and anti-virus is a sure-fire way to harden protections of endpoint assets and solidifying foundational technology security elements. WHERE TO BEGIN? The task of hardening one’s cyber security can appear daunting with many businesses questioning: where to begin? Seeking advice and following best practices is a simple answer. One example of this is the ‘10 Steps to Cyber Security’, developed by a partnership between BIS and CESG. This outlines the 10 basic topics to consider when managing the risk of cyber threats. Similarly, organisations such as IASME (Information Assurance for Small and Medium sized enterprises) outline essential security models to help small and medium sized businesses get to grips with cyber defence. The simple fact is that the cyber threat will never abate; and as time goes on technology evolves increasing the tools available to savvy and versatile adversaries. By continually addressing the three key elements of People, Process and Technology businesses can go a long way towards dealing with today’s threats and preparing themselves for the future. L

Paul Weatherly is convener of the London Chamber of Commerce’s Defence and Security Group, and managing director of Lockheed Martin UK Information Systems and Global Solutions. This article appeared first in London Chamber of Commerce and Industry’s London Business Matters magazine www.londonbusinessmatters.co.uk FURTHER INFORMATION www.lockheedmartin.co.uk www.londonbusinessmatters.co.uk

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

19


iCLASS SE The smartest access control platform ®

WORKS WITH MANY CARD TECHNOLOGIES

REMOTE READER CONFIGURATION

INCREASED SECURITY FOR CREDENTIALS

ENHANCED MICRO-PROCESSOR SECURITY

WORKS WITH MULTIPLE DEVICES

Next generation access control. An evolution in security, adaptability and performance. HID Global’s technology and media-independent iCLASS SE® Platform is a secure identity solution for physical access and the widest range of converged applications and environments. For maximum interoperability, iCLASS SE® supports legacy and nearly all card technologies for cost effective, seamless upgrades to higher security and enhanced performance. To find out more visit hidglobal.com © 2013 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/supplier(s) in the US and other countries and may not be used without permission.


GOVERNMENT SECURITY CLASSIFICATION

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Martin Sugden, ceo, Boldon James

PROTECTIVELY MARKING DATA

With the amount of data, both structured and unstructured, being created on a daily basis, it’s increasingly important to be able to understand the value and importance of that data. The new Government Security Classification system which came into effect on 2 April should do just that, explains Martin Sugden

On 2 April, the Cabinet Office launched the Government Security Classification (GSC) scheme, which will replace the existing Government Protective Marking Scheme (GPMS). All information that government and public sector organisations need to collect, store, process, generate or share has intrinsic value and requires an appropriate degree of protection. Security classifications indicate the sensitivity of information in terms of the likely impact of compromise, loss

or misuse and the need to defend against a broad profile of applicable threats. The government has quite rightly identified that data classification is increasingly important, with the simple fact being that without it, organisations don’t know the value of data to themselves, customers, and partners. As a good example of the importance of data classification; local authorities must comply with Freedom of Information (FOI) requests. Without data classification in E

The ent Governmity Secur ion at Classificnched on lau scheme . It replaces 2 April vernment the Go ve Marking Protecti heme Sc

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

21


It’s OFFICIAL: Disk Protect CPA from Becrypt can protect your data Official

Secret

Top Secret

90%

Very sensitive data for example, Military and Diplomatic

The most sensitive information

of Public Sector Data

Changing the security classification system

It’s OFFICIAL: The UK Government Protective Marking

You need Disk Protect CPA from Becrypt Scheme (GPMS) is being replaced with the

How can Becrypt help?

new Government Security Classifications Becrypt Disk Protect CPA is the only CESG (GSC) system from 2nd April 2014. Official Secret Top SecretCommercial Product Assurance (CPA) certified disk encryption solution available for use at OFFICIAL. The new system requires three levels Almost all Very sensitive military The most sensitiveIt provides an assured solution for protecting data, of classification for information government business and diplomatic assets. information that can be deployed and managed remotely, without the use of CESG key material, significantly reducing OFFICIAL, SECRET and TOP SECRET. The aim is to make handling the majority of day to day Government data easier with 90% of public sector information residing in the OFFICIAL tier.

IT and support overheads.

The combination of the new simpler security classification scheme and the ease of use and centralised deployment of Becrypt Disk Protect CPA, will provide public sector organisations with a more cost effective and secure way to protect sensitive data which is compliant with current requirements.

“Changing the security classification system” Reducing bureaucracy and enabling people to do

The UK Government Protective Marking Scheme (GPMS) their jobs better will save central and local Unclassified government is being replaced with the new Government Security Protect and other(GSC) public huge overheads. Classifications systemsector from 2nd organisations April 2014. The Restricted new system requires three levels of classification for The software required to protect OFFICIALConfidential data is now Official information assets, Official, Secret and Top Secret. Secret much quicker and easier to install and manage.Secret Top Secret Top Secret

How does this impact you?

With the simplification of the new security classification scheme more than 90% of all Public Sector information will reside at OFFICIAL tier.

FR

TRIAL

EE

Disk Disk Protect Protect CPA CPA NOW NOW

So confident are we that you’ll be impressed with the power and the ease of use of Becrypt Disk Protect CPA that we are offering a FREE TRIAL to readers of Counter Terror Business. Watch the video from UKCivilservice’s channel

How can Becrypt Help?

Becrypt Disk Protect CPA is the only assured commercial encryption solution available for use at OFFICIAL. By combining the simplification of the security classification scheme and the ease of use and deployment with For more information email us now: Becrypt Disk Protect CPA, our customers achieve a more cost-effective and secure way to protect sensitive data which is compliant with current and future security characteristics and requirements to ensure compliance with the new Government Security Classifications scheme.

marketing@becrypt.com Or visit our website

www.becrypt.com Contact Becrypt Limited, 90 Long Acre, Covent Garden, London, WC2E 9RA,

Follow us


GOVERNMENT SECURITY CLASSIFICATION

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Cyber Security Summit The Cabinet Office, Home Office and National Cyber Crime Unit will be among the contributors at the Cyber Security Summit (26 June, London), which will examine efforts to reduce vulnerabilities in government systems and tackle cyber crime.

 place, you need to find the originator of the information, get them back up to speed on the issues and ask them if it can be released. With data classification in place, information that has been requested can easily be identified as something that can, or cannot, be shared publicly, thus reducing the time and expense in dealing with these requests. BUSINESSES TAKE NOTE The existence of a requirement for government to classify their information assets and protectively-mark documents has been

SECURING DATA There is a multitude of advice and guidance on the latest security technologies that are required to protect an organisation and data classification can tie into those systems and technologies, which can significantly improve the return on investment of those tools. One of the biggest issues with security technologies is the problem of false positive and negatives which costs time and money to resolve, which data classification can help to rectify. In the simplest terms, data classification distinguishes between data that

What is important about the new GSC is that it shows a commitment by the Cabinet Office to data security and this commitment should be echoed by businesses around for a number of years and the new GSC updates and aims to simplify the old scheme. What is important about the new GSC is that it shows a commitment by the Cabinet Office to data security and this commitment should be echoed by businesses. Current legislation means that government organisations must classify their data but, quite simply, it makes good data security sense irrespective of the different legislations in place. Data classification empowers an organisation’s users and essentially recruits them as additional members of the security team. Employees are on the front line and they’re the ones creating that data and therefore have the knowledge of the context in which the data has been created, its business value and the potential impact of sharing it with the wrong groups.

requires protection and that which doesn’t and what level of protection is needed. One of the biggest challenges being faced by businesses today is securing their data. Many businesses see the best way to use information technology is to make it user friendly, open and easy to access. This way of thinking makes protecting information created on those systems far harder and it creates a mind-set where employees believe it is the organisation that must protect the data they are creating and not the other way round. As an overstressed IT function there often isn’t the room to invest in the latest security technologies, but organisations can make use of the resources they already have – their employees. User-driven data classification is the simplest and most cost-effective way to improve data security standards.

Providing a timely opportunity to look at the practical challenges central government, the police and wider public sector face in implementing the National Cyber Security Programme, the event will feature speeches from leading figures such as: Rhys Bowen, deputy director for Cyber Security & Information Assurance, Cabinet Office; Lee Miles, deputyhead, National Cyber Crime Unit; and Peter Wilson, director, Awareness & Behaviour Change, OSCT, Home Office. Delegates will have the opportunity to interact with panellists at all times, in an effort to develop answers to questions such as: how public sector bodies can improve information assurance, risk management and governance arrangements; what sets need to be taken to ensure increased use of cloud computing doesn’t reduce resilience to fraud and crime; and whether the government should introduce tougher penalties against cyber offences. Attendees will include information security professionals and policy advisers. FURTHER INFORMATION www.cybersecurityconference.co.uk

BEST PRACTICE All government and public sector organisations must classify their data under the new GSC so the value for them is immediate and clear, but Data Classification brings many additional benefits over and above compliance. It is fast becoming best practice as part of a layered security approach, and as has been proven can have the single biggest impact on security performance if implemented successfully. Irrespective of the legislation an organisation is subject to, data classification just makes good data security and business sense. L FURTHER INFORMATION tinyurl.com/mz3uswn www.boldonjames.com

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

23



CYBER SECURITY

SECURING VITAL INFRASTRUCTURE

In this issue GlobalSign looks at how Public Key Infrastructure (PKI) can secure CNI against cyber-attacks and examine a use case for an early adopter of GlobalSign’s NAESB-compliant PKI solutions CNI is a favourite target of cyber criminals because it offers maximum damage with detrimental economic impact and resulting publicity. The potential for cyber-attacks to cause damage to CNI is an ever increasing threat requiring a coherent and effective strategy. Cyber criminals commonly strike weakest links, devising strategies to attack single users on a mass scale and compromising a subset of systems within targeted organisations. Attackers utilise their knowledge of common IT security weaknesses such as default passwords, common passwords, shared passwords, and the use of shared public password spreadsheets. Data breaches as the result of these password vulnerabilities strongly suggest single-factor methods of authentication (i.e. user name/passwords) are no longer sufficient security control. Two‑factor authentication is essential to protect organisations’ sensitive data. THE USE OF PKI TO SECURE CNI Many organisations ‘strategy’ is to simply react to threats and requirements as they present themselves. The organisation becomes a pinball, bouncing between threats and regulations. Organisations need to spend time developing and then implementing a security policy that relies on top level best practices, such as user authentication, network intrusion detection and prevention, business continuity and disaster preparedness, employee education and training, malware detection and prevention, data loss

prevention (DLP) and encryption. Crafting a broad-reaching, best practices based strategy is the first, most critical step to protecting against threats. Implementation of standards-based PKI has become increasingly popular among US wholesale energy participants because it is scalable, flexible and cost-effective. PKI technology offers organisations the means to control large numbers of Digital Certificates for authentication. However, implementation of PKI still needs to be executed correctly in order to prevent system vulnerabilities. The North American Standards Board (NAESB) are combatting the potential vulnerabilities by producing a set of standards for the Wholesale Energy sector based on best practices and effective management processes. Many organisations wishing to implement PKI could potentially benefit from adopting similar guidelines. MANAGED PKI A Managed PKI solution from a third-party, public CA, like GlobalSign, provides access to Digital Certificates through a highly functional, trustworthy, WebTrust-audited, cloud-based environment capable of managing the full lifecycle of Digital Certificates, administrators and certificate profiles. There is no need to purchase, establish, operate and protect an in-house Certificate Authority (CA), resulting in reduced project costs and a faster deployment. Digital Certificates can be deployed efficiently to achieve convenient and secure certificate-based and token-based two-factor authentication for the protection of

Advertisement Feature

enterprise networks, data, and applications. Organisations should partner with a CA that understands enterprise-specific requirements. Automation capabilities such as Active Directory integrations and APIs simplify and automate certificate management, improving efficiency and saving valuable IT time and resources. CASE STUDY: EARLY ADOPTION OF NAESB-COMPLIANT PKI Due to the critical nature of ensuring efficient and reliable delivery of electricity, and based on recommendations from the Executive Order to improve CI cybersecurity, ISO New England opted to increase the level of identity authentication for their power generators, regional utility companies, and other market participants that utilise their eMarket portal. With GlobalSign, they found a NAESBcompliant partner who was committed to helping them meet their need for strong authentication in a way that is transparent for their stakeholders, while ensuring highlytrusted, authenticated energy transactions. Authentication is listed as a key area for improvement in the NIST Preliminary Cybersecurity Framework, the set of standards, guidelines, and best practices that has been drafted to put the recommendations from the Executive Order into action. The Framework specifically mentions the inadequacy of passwords as a means of authentication. “PKI is a long-established and proven method for securely authenticating digital identities, but there are a variety of implementation details that can mean the difference between a weak and vulnerable identity management system and a highly secure one,” states Lila Kee, GlobalSign’s chief product officer. “NAESB helped standardise PKI for the energy market to reduce the risk of weak implementations, so we’re pleased to help ISO New England lead the adoption of the guidelines to secure their platform. Now, ISO New England is able to strongly authenticate their eMarket users and help meet the Executive Order recommendations for Improving Critical Infrastructure.” GlobalSign is the only public NAESB‑authorised Certificate Authority trusted in all popular browsers and operating systems and is a key member and active participant in establishing PKI standards for NAESB. As a member of NAESB’s Wholesale Electric Quadrant (WEQ) Board of Directors, Kee played a lead role in the development of the PKI and other cybersecurity standards. L FURTHER INFORMATION Tel: 01622 766 766 press@globalsign.com www.globalsign.co.uk

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

25


SITUATIONAL AWARENESS AT THE HIGHEST LEVEL

Tactical Integrated Electronic Warfare for Joint Operations Introducing L-3 TRL’s IEW solution – a modular, scalable and interoperable EW capability for land, littoral or air threats that leverages our market-proven SMARTSCAN product line and our awardwinning BROADSHIELD® Electronic Counter Measures (ECM) system, plus best-of-breed third-party sensors.

COMPLETE UNDERSTANDING OF THE EW ENVIRONMENT ON ONE SCREEN Use of U.S. DoD imagery does not imply or constitute U.S. DoD endorsement.

Rapidly deployable on a variety of platforms, the new SMARTSCAN IEW provides the tactical commander with a near-real-time combined EW picture that supports the dynamic tasking, management and control of assigned tactical assets to exploit the electromagnetic spectrum for tactical advantage. For more information on the IEW solution, please visit L-3com.com/TRL. TRL Technology

L-3com.com


PIRACY

Factors e av PREVENTATIVE which h to the MEASURES d te Several factors have contribuof piracy in contributed to the e d decin n Ocean an decline of piracy in a the Indi Aden include the Indian Ocean and Gulf of Aden including Gulf of patrols and naval patrols, best naval nagement management practices and private armed best ma ctices security personnel aboard pra

SAFETY IN THE WATERS AROUND WEST AFRICA Christopher Kirby examines how maritime security officials in West African countries can apply lessons learnt in the Indian Ocean region to tackle the problem of piracy Since 2008, there has been a wide range of international efforts to counter piracy within the Indian Ocean, particularly around the Horn of Africa, Somalia and Gulf of Aden. There is now a shift in attention to insecurity in the waters around West Africa, in particular, the Gulf of Guinea. The annual Human Cost of Maritime Piracy reported in 2013 that more seafarers were attacked in the waters around West Africa than those of Somalia in 2012. Maritime organisations, such as the International Maritime Organization (IMO) have been monitoring the situation in West Africa for years, but it was the United

Nations (UN) Security Council adoption of Resolution 2039, in 2012, which emphasised the importance for states to combat piracy at national and regional levels. In response to the UN Security Council, institutions including the Economic Community of West African States (ECOWAS), the Economic Community of Central African States (ECCAS) and the Gulf of Guinea Commission (GGC) have held joint discussions regarding the construction of a regional strategy, documents of which were endorsed at a summit meeting of heads of state and government in June 2013. Despite calling on regional commitment

Written by Christopher Kirby

to addressing maritime security, Resolution 2039 also recommends regional support through international partnerships and bilateral agreements, already signed by countries such as the United States (US), Britain, France and Spain. The European Union is also due to publish its own strategy. International attention on West Africa, as with the problem of piracy around the Horn of Africa, demonstrates acknowledgement that maritime security threats have damaging impacts beyond the immediate affected region. With Nigeria and Angola amongst the top ten exporters of crude oil in the world, ensuring the security of the Gulf of Guinea’s waters is of regional and international interest in terms of trade and flow of revenue.

Maritime Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

commercial shipping. The Gulf of Guinea has seen maritime insecurity manifest in activities other than piracy. These include trafficking of counterfeit items, people, narcotics and weapons, allowed to occur by the lack of adequate regulation and corruption. Criminal activity also occurs more frequently in territorial waters and in ports along the coastline. This is a significant difference to Somali piracy, which predominantly occurred on the high seas, beyond any state’s boundaries. The disruption and deterrence to piracy in the waters of East Africa has been effective because of several methods including naval patrols, presence of armed private security personnel aboard commercial shipping and the following of best management practice (BMP) guidelines by operators to optimise levels of self protection. So how effective would these measures be in the waters around West Africa? It is clear that the principles of such measures are relevant in responding to West African maritime insecurities, but it is how these are applied that will determine the level of success that is achieved. COOPERATION BETWEEN REGIONS The predominance of piracy in international waters and the political situation in Somalia allowed a large degree of flexibility for conducting operations, by international navies, to disrupt and deter piracy in the Indian Ocean. In comparison, many West African states have established naval infrastructure that can already contain maritime threats. E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

27



PIRACY  Furthermore, because much of the illegal activity occurs in territorial waters, confronting this will be the responsibility of national resources and law enforcement such as the police or coastguard. This does not eliminate the need for state cooperation and resource sharing due to the trans‑border nature of maritime crime and we have already seen evidence of this. Benin’s and Nigeria’s navies launched Operation Prosperity, a joint naval patrol in 2011, which was successful in reducing the number of pirate attacks along the coasts of both countries. However, the number of attacks increased in the less well patrolled waters of neighbouring Togo, emphasising the importance of extensive regional interaction between states if there is to be an effective solution to the problem. International support, recommended by Resolution 2039, is also evident. The US Naval Forces Africa conducted an exercise in 2012, named Obangame Express, which was designed to enhance cooperation amongst naval training from Cameroon, Gabon, Ghana, Sao Tome and Principe and Spain. In March, Ghana’s Chief of Naval Staff, Rear Admiral GW Biekro, is convening a conference of senior international admirals, including those from the EU and naval experts to derive solutions that will further enhance security in the Gulf of Guinea. The Ghanaian Navy is also establishing specialised units, funded and trained by foreign partners, to confront security challenges and to protect off-shore oil and gas resources. Thus, we can see that unlike in the Indian Ocean, it is the long term aim of West African states to lead the security operations. More regional consensus is needed on establishing a system to process suspected criminals. A current lack of this has resulted in few convictions. In similarity to East Africa, agreements need to be established on which states accept suspects and are supported to ensure that there is an adequate legal and justice sector. Enhancing regional consensus will contribute to optimising other security initiatives. GUIDELINES Security measures on a regional and national basis are important in supporting protective measures for shipping operators. For example, BMP guidelines to protect against Somali piracy relied significantly on the collection and sharing of information between all interested stakeholders. In the Gulf of Guinea, interim guidelines based on BMP have been published by a consortium of shipping operators and naval forces, supported by the NATO Shipping Centre. These also emphasise the importance of information distribution, which are also dependent on regional and national capabilities.

SECURITY LAPSES The nature of commercial shipping in this region limits the effectiveness of self‑protection measures. In the Indian Ocean, the majority of shipping was transiting en route to the Middle East and Asia. In comparison, shipping in the Gulf of Guinea, makes regular calls into ports along the coastline. As a result, there is a greater need for port infrastructure security, which can be undermined if such operations are not ensured by the responsible state or authority. Recent reports indicate that there are a range of port security oversights in West Africa. US authorities have already issued a warning that shipping conducting business with the US could be banned from Nigerian ports after it was observed that the IMO’s International Ship and Port Security (ISPS) code was not being properly adhered to. Corruption is also a significant obstacle in security efforts. For example, in 2013, Nigeria’s Chief of Naval Staff blamed the continuing problem of attacks on ships in Nigerian waters on insiders. He reported that investigations into previous incidents revealed that individuals working for shipping companies were providing pirates with information regarding the location of vessels and cargo. TACKLING CORRUPTION Corruption undermines confidence in established systems and procedures to combat maritime crime and leads to reluctance to report incidents. Currently, maritime crime in West Africa is widely unreported to authorities. Problems like corruption indicate that states need to

The lessons that have been learnt in responding to maritime security threats in the Indian Ocean are extremely relevant in containing similar threats in the Gulf of Guinea. However, threats in the Gulf of Guinea are diverse, compared to those in East Africa. These threats and the implementation of measures to contain consist of interrelating factors which need to be addressed in order to guarantee the long term success of maritime security. Whilst extremely relevant, the lessons from the Indian Ocean cannot be implemented in an identical fashion in West Africa. The nature and location of maritime insecurity in the Gulf of Guinea means that West African states will require close collaboration in sharing resources and implementing the necessary strategies to combat threats. However, differences at national level in prioritising issues of maritime insecurity have proved detrimental to regional efforts. It is critical therefore, to provide closer integration between regional and national agendas, when championing security strategies to ensure a more effective system. This includes addressing social factors such as corruption. As with Somali piracy, regional and international policy makers need to devise strategies that disrupt and deter maritime threats, but importantly address the underlying root causes of these activities. This will be in the form of capacity building and ensuring the necessary international support is available to states which require this.

Maritime Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Problems like corruption indicate that states need to address differences and problems at national level as part of the process of developing and introducing security measures address differences and problems at national level as part of the process of developing and introducing security measures and relates to the issue of establishing a more uniform approach. This can be seen as an added obstacle in that it complicates matters further. Conversely, tackling of social problems enhances confidence between stakeholders, facilitating greater consensus and uniform focus on security strategies. In relation to this, there is no dedicated centre for collecting and sharing information in the Gulf of Guinea. Plans to establish an information sharing centre in Ghana have also been delayed. Despite gaining support regionally, and from the IMO, it had not been recognised as a national priority, thus reiterating how differences at national level need to be addressed in parallel to regional strategies.

LONG-TERM GOALS If these lessons are applied effectively, then West African security initiatives could have a significant impact. The activities of ECOWAS and ECCAS is indicative of the strong intergovernment support within the region and more importantly, there is a long-term objective for regional security resources to lead the security operations. Coordination with international bodies will also serve to benefit stakeholders beyond West Africa and with the importance that the Gulf of Guinea has regionally and internationally, greater security here will enhance economic and social factors considerably. L FURTHER INFORMATION www.ecowas.int

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

29


Hostile Vehicle Mitigation System Fast to install Lego™ like system Removable / Relocatable No ground anchor - uses its own weight Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 kmph (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment National installation service available

Redi-Rock

Tel: 01179 812791 redirock@cpm-group.com www.cpm-group.com www.redi-rock.net

Cable system creates necklace effect to spread the impact

Scan Here to see our new website

The Redi-Rock mitigation vehicle protection system is used to guard buildings and infrastructure of high importance.

The necklace effect means the blocks slide to absorb impact Result: Only 1.6m penetration of the load carrying space

The Security Barrier system that protects from vehicle impact The fast, effective, re-usable solution to perimeter hostile vehicle attack. Redi-Rock: Protection for buildings and infrastructure of National importance

.....Now available in 3 finishes

Cobblestone

Ledgestone

Limestone

The Redi-Rock Force Protection system has successfully been tested by the Transport Research Laboratory (TRL) using the BSi specification PAS 68:2007, and achieved a classification of V/7500[N2]/48/90:1.6/0.0 To achieve this the freestanding concrete blocks systems interconnected with steel cable successfully arrested a 7.5 tonne lorry at an impact speed of 48 kmph (30mph) with only 1.6m penetration of the load carrying space.


SECURITY EXPORTS

STRATEGIES FOR STRONGER FRONTLINE SECURITY At the recent launch of the UK’s security export strategy ‘Increasing our Security Exports – A Government Approach,’ two words were used by the prominent speakers to describe the security industry: ‘immature’ and ‘fragmented’. In noting the significant opportunity to participate in the £410 billion (2012) security market, of which the UK currently has only a 4.2 per cent share, a

number of challenges were cited including: competition from companies with a lower cost base; a lack of accepted/ understood structure to the industry; SMEs with insufficient resources to export; and the perceived incompatibility of British security standards with international standards.

The strategy document also outlines the strengths of the UK security industry, some of which apply equally well to the UK market and certainly apply to the perimeter security industry. These include: a history of developing an integrated approach to management and mitigation of security E

It is ry necessaer all id to cons a site and to threats perations its o tegrate the n in and the ity measures secur the total into heme site sc

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

Written by Stephen Munden, manager, Verification Scheme, PSSA

The UK’s recent security export strategy highlighted both the strengths and weaknesses of the UK’s security export industry. Stephen Mundy of the Perimeter Security Suppliers Association (PSSA) examines how this is likely to impact the provision of perimeter security in the coming months

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

31


New! Ultra-lightweight combi tools for tactical cutting & spreading • Compact design: Easy to add to your kit • Extremely lightweight: Easy to carry and handle • Rapidly deployable with integrated or separate hand pump • Suited for tactical operations • Choice between models with highest spreading force or highest spreading distance

Holmatro | Special Tactics equipment tactical@holmatro.com | www.holmatro.com


SECURITY EXPORTS  risks in conjunction with government; a high quality, highly skilled labour pool for leading research and product development; and the quality, reliability, flexibility and durability of products, systems and services. So, how are these strengths and weaknesses likely to impact the provision of perimeter security in the coming months? HOSTILE VEHICLE MITIGATION Exports will certainly play an increasingly important role in the growth of the perimeter security supply market. A new challenge will obviously be ensuring that overseas regulations and market needs are met by suppliers. But whether for UK or overseas markets, the fundamental issues will remain the same. As several members of the Perimeter Security Suppliers Association writing in

performance specifications and foundation detailing. Implementation of the design is then achieved through integration of the security designer’s drawings and HVM performance requirements into the architectural designs. LIFE CYCLE MANAGEMENT It is important to consider the vehicle security barrier or security fencing as a physical system within the overall security management system. Control cabinets and containers, for example, which form part of the system can also be vulnerable to vehicular or manual attack. An increasing concern, as new technology is adopted, is the vulnerability to interference by cyber or remote means, which could impact the security integrity of the HVM measures. A further consideration is maintenance

The lack of national or international standards makes specification of perimeter security equipment more difficult. The PSSA is therefore increasingly engaging in standards development activities these columns have previously noted, security solutions need to be holistic, integrated and multi-layered. It is necessary to consider all threats to a site and its operations and then integrate the security measures into the total scheme for the site – traffic movement, the environment, site use, and the building’s management system being examples. This, of course, leads to many stakeholders being involved and can exacerbate the fragmented nature of the security supply chain mentioned above. However, elements such as traffic calming and landscaping, to limit the approach speed of vehicles to the site, can be as important as selecting the perimeter protection equipment itself. Physical countermeasures will always play a big part, acting as a first line of ‘hard’ defence, often protecting further but possibly weaker measures within. When procuring perimeter security equipment, it is vital to ask, ‘what is the process in which the equipment participates?’, since protective security measures will always play a part in the organisation’s overall resilience & risk management, addressing the need to keep the site assets safe, maintain the achievement of mission and ensure business continuity. A number of pieces of information need to come together to compile the design of the perimeter security solution, including architects drawings, CT Scans, Vehicle Dynamic Test data, VSB or fencing product selection, perimeter security product and

and life cycle management. Maintenance, service & spares, bespoke documents and manuals and compliance over time are all important factors in ensuring that the equipment selected will continue to perform as intended. As highlighted in the Export Security Strategy, the UK is fortunate to have a wealth of experience and expertise in developing security risk mitigation. Basic advice can be found in CPNI and NaCTSO publications online. Usually, however, it will be necessary to seek specific advice from CPNI, qualified security consultants, or those who design the HVM systems, such as members of the Perimeter Security Suppliers Association. INTERNATIONAL AGREEMENT Another useful source of information on vehicle security barrier system performance, selection and use is the two parts of International Workshop Agreement 14, which has recently been published by the International Organization for Standardization (ISO). Hopefully, as these standards become adopted it will reduce the number of instances where people pick a product from a supplier on the basis that they profess ‘PAS 68’, as if that were a description of the item required. Not only has this impact test standard been quoted instead of the operational and security performance criteria required, it has often been used without even the performance classification required of the barrier.

VSBs are rated in accordance with a performance rating classification code and it is essential that specifiers, buyers and users should use the full code, which is presented in the form of a list of results, e.g. IWA 14‑1:2013 Blocker V/2500[N1G]/48/90:7.6. The IWA was sponsored by CPNI and incorporates Operational Requirements as part of the standard, providing a good start to producing the technical specification which, in turn determines the quality of the barrier and also the resulting security.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PSSA The Perimeter Security Suppliers Association (PSSA), representing companies involved in the supply of equipment and services designed to provide highest levels of physical protection for sites and their perimeters, is continuing to address UK and overseas security market needs with a number of initiatives during 2014. Some time ago CPNI informed PSSA that there was a vast variation in the quality of perimeter security installations. The PSSA has therefore extended its Verification Scheme, covering VSB and fencing products, to include installation. The pilot assessments are taking place this Spring. The assessment specification, developed in cooperation with stakeholders, addresses issues such as foundations, the use of sub-contractors and adequate testing and handover. The PSSA will also be looking into concessionary release, where the customer, who is not necessarily the end user, is advised of a security solution but rejects it, sometimes on cost grounds. The overall aim of the Verification Scheme remains to improve industry standards by introducing certainty into a supply chain which is vulnerable to several problems. ADDITIONAL ACTIVITIES The lack of national or international standards makes specification of perimeter security equipment more difficult. The PSSA is therefore increasingly engaging, along with other industry colleagues, in standards development activities. Two other areas receiving attention this year are procurement and innovation. For procurement where the PSSA is producing a guide to help specification of perimeter security equipment, and where innovation is required – for example by integrating mixed products, or solutions for rapid deployment. PSSA, having underpinned its activities with technical work, is now also turning its attention to outreach and will be present at major events this year, including Counter Terror Expo. L FURTHER INFORMATION www.pssasecurity.org

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

33


ADANI

from ideas to solutions

CONPASS

FULL-BODY SECURITY SCREENING SYSTEM Detection capability:

Objects hidden internally and externally on the body, within prosthetic devices, artificial limbs, shoes etc.

Items detected:

Explosives, weapons, drugs, electronics etc.

Tested and proven effective:

Swallowed drugs

Ceramic knife in rectum

info@adanisystems.com

Prosthesis

Installed in 24 28 countries and satisfied customers for 15 years.

Breast implants

www.adanisystems.com


Many security agencies have identified that the existing security procedures with metal detectors were not advanced enough to identify the possible threat of items being hidden on or in the body. As a result, they have started to use full body scanning as a main form of security screening. Simon Lyster, Managing Director of full body scanning specialists ADANI, explains that this has resulted in a growing demand for all types of body scanning systems in most areas around the world; but understanding the technologies available and the potential of each is not easy. “We work with our partners to identify how they can use our technology to provide an effective screening solution. The technology you will use depends on the level of threat that is perceived for each situation.” Adani recently installed ConPass Full Body Scanners in Airports in Norway, Bahrain and Zambia to identify Drug Smugglers and systems in Prisons in USA, Kazakhstan and Brazil as well as supplying to VIP residences and industrial facilities. “The Conpass product offers a higher level of security than other Body Scanners as it identifies the threats inside, as well as on, the body. It is also an instant, safe and efficient solution”. “As a result of feedback from our Customers we have adapted the standard design of the ConPass to offer alternative screening solutions that still comply with ANSI 43.17.2009. These include the Conpass DA (Door Access). This allows a security manager to scan visitors or staff and if they identify an item of threat or a stolen item, then they can hold the person in the bullet proof structure for further investigation. The ConPass DA can be set up so that it does not scan all visitors, providing greater flexibility and access control to the security manager.

The ConPass DTP (Drive Through Portal) This system is designed to quickly and efficiently scan passenger vehicles and identify any hidden weapons, explosives or contraband items that security managers don’t want entering or leaving the site.

ADANI (est. in 1991) is an international R&D company which designs and manufactures advanced X-ray scanning systems, which are used in prisons, customs, mines, industrial facilities and other locations where high security, threat, theft and contraband detection is required. Adani increased the number of installations to nearly 300 last year and with installations in 28 countries, across Europe, Americas, Asia, Middle East and Africa. It is widely accepted by security agencies that these systems can play an important role in reducing risk. Please contact us at info@adanisystems.com or visit us at the CTX Stand J35.


, n o i t a u t i t s h s g i u r o r e e h t g n e a v d a In a re you h ....... d u s e t t e i b f T A L F N U lat Ltd f R n u R Tyron e d a saf HD n i f d n AND ne a kill zo RON MULTIB t u o t o ge e TY need t e wheel...th u o y y When change th securit o d t e e e t c pla ran e. he gua R4 can giv ect. t f r d e e p e s i will n TYRON omers t ONLY the t s u C ha VIP bility t o m d an

D H D tem IBAN

ULT runflat sys M N ular e or TYRO the m

p ost po

n with o

t runfla 20km o t p lace to . give u safe p a It will res deflated d n i f y e and more t ill zon k e h t t of Get ou the wheel cost... e g ... Low chan e c n a erform High p

on.com

yr www.t

ritical 4 c R s i N e nd TYRO rmanc erfo

ility a in mob s Finabel. e t a m 150km he ulti wo R4 is t gives up to N O with t R Y y l h T c e i e v i h h T w IMUM e evas mance to driv drive a MIN y t perfor i l i b a to NTEED ut and GUARA tyres shot o lat. r Runf e re b o h b / m u m r R o 0k errain m at 5 h All T t i of 50K w k loc e Bead Doubl

p where


ISRAELI SECURITY INDUSTRY

Israel has faced unique security challenges since declaring independence in 1948. Noah Shani of the Israeli Embassy in London looks at some recent developments in this area In a project that will cost an estimated $650 million, Israel’s military has begun moving large parts of its training and operations centres, and some of its technological units, to a desert area a mere 20 miles out from the city of Be’er Sheva. This is the military’s biggest project of its kind in three decades, the likes of which have not been witnessed since Israel removed its bases from Egypt’s Sinai desert in 1979 as part of the landmark peace treaty between the two countries. The core of this project is the relocation of the military’s cyber command. However, to complement this, four years ago the government instructed Israel’s National Cyber Bureau, in cooperation with the Be’er Sheva based Ben-Gurion University (BGU) and the Be’er Sheva Municipality, to develop an outline that will turn the city into an

international cyber hub, thereby ensuring the future development of technology and human capital in both the military and civilian fields. This hub has been named CyberSpark. CyberSpark will make its home in the purpose-built and recently opened Advanced Technologies Park (ATP). The vision for the ATP, and indeed CyberSpark itself, is to create and develop a valuable tri-partnership between the military, academia –through BGU – and industry. INVESTING IN SECURITY The transfer of military operations to a new base near the university has already assured the first two parts of the puzzle, with BGU boasting

A CULTURE OF INNOVATION Life inside Israel today continues just like any other Western society. It is partly a reflection of the work of Israel’s military and security agencies, and the country’s security industry that Israel continues to flourish. In rising to meet these challenges, Israelis have learned self-reliance and resilience; they have learned to innovate and to be creative and dynamic. In short, Israel has become a E

Israel’s y t ingenui a of re in the a rity truly ecu cyber s out as being stands f the most one o g areas of excitin opment devel

Written by Noah Shani, minister for economic and trade affairs at the Embassy of Israel, London

EVOLVING TO MEET COMPLEX SECURITY NEEDS

an unparalleled emphasis and expertise in information systems and technologies. The industrial feature of this project will be facilitated by two million square feet of office and lab space on offer at the ATP, and an additional $11.5 million made available by the Government over the next three years to support companies who wish to set up there. Several leading high-tech companies have already moved to Be’er Sheva to join the project, including Oracle, Deutsche Telekom, EMC², RSA, ECI Telecom, NESS, Gefen Dekel, DBMotion, Elbit, Incubit and JVP’s CyberLabs. The growing multinational presence at ATP has prompted IBM to announce that it also plans to significantly expand its cyber laboratory in the city. Such investment in homeland security has always been a top priority in Israel. For a country that is similar in size to Wales but facing a unique set of geo-political challenges, this is hardly surprising.

Security Trade & Investment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

37



ISRAELI SECURITY INDUSTRY  hub of technological innovation, spanning almost every market sector and industry. This has been made possible by the unique ecosystem in Israel that gives each new idea and technology every possible chance of success. Israel’s industries enjoy a very close working partnership with the country’s world‑class universities and research institutions. To help preserve this, a strong community of Angels and VCs are constantly returning resources back into commercial projects at developmental stages. The Government is also committed: Israel spends more of its GDP on R&D than any other country in the world at just under five per cent, and various government entities – such as the Office of the Chief Scientist – offer a wide range of financial support programmes. In the case of the HLS industry, the military and security communities also play their part. Technologies are developed in-house by the military and other agencies, to meet a specific set of needs. But private corporations are now facing similar threats as they have grown in both financial worth and influence to the size of nations. Recognising this similarity of needs, military engineers are setting up spin off companies upon finishing their service to further develop the original technologies to suit civilian markets, which are also more lucrative. Here we see Israel’s expertise in infrastructure protection, major emergency management, intelligence and telecommunications being of great interest not just to governments and law enforcement communities, but also to multinational enterprises alike. NEW TECHNOLOGY The most recent example of defence technology developed for civilian needs came at the beginning of March, when Israel’s MoD announced that Elbit’s C-MUSIC (the commercial version of SkyShield ) had been certified for commercial use, to combat the threat of man-portable surface-to-air missile systems aimed at civilian airliners. This technology was developed as a direct response to attempts in 2002 by terrorists in Kenya to shoot down an Israeli charter plane, carrying 250 passengers, shortly after take-off. The device (fitted to the underside of the aircraft) uses laser technology and a thermal camera to deflect incoming missiles and detonate them at a safe distance from the plane. Thanks to technological developments of this nature, Israel currently stands as the world’s sixth largest defence exporter, with a range of products and solutions that are suitable for the most demanding situations or environments. The country’s defence and aerospace industries exported approximately $7 billion in 2012 and today, over half of the (approximately) 600 Israeli companies operating in the country’s defence and security industry are already exporting their products worldwide. The unique advantage of the Israeli HLS industry is its application of analytics, to

anticipate, manage and mitigate security and operational risks. Israeli technologies are world-leaders in analysing vast amounts of data and spotting patterns and anomalies. This has given rise to Israel’s skill in areas such as surveillance, biometrics, explosives detection and forensics. Furthermore, Israel’s universities, academic institutions and R&D establishments also focus heavily on analytics, providing a robust educational foundation from which the industry can flourish. The project currently unfolding in Be’er Sheva, perfectly exemplifies the way that Israel’s academia plays a vital role in developing the industry. Some of these Israeli solutions and technologies currently serve to protect some of the major symbols of Western civilization. Israel’s expertise in Counter-Terror, border security and aviation and maritime protection see these same Israeli-made systems also applied to secure some of the largest aviation hubs and seaports in the world – including JFK, Heathrow, and Changi airports – as well as some of the world’s major sports, entertainment, and mega-public events. The Israeli security industry’s participation in

the hundreds of rockets and artillery shells that are fired toward Israeli towns and cities from the Gaza Strip and other neighbouring areas. Israel’s necessary efforts against terrorism – including in the virtual space – require defensive thinking and the ability to adapt to constantly changing threats. This is a major asset in the cyber security industry, and as such there is now a huge international interest in Israel’s cyber-defence abilities. As Israel’s Minister for the Economy, Naftali Bennett, said: “The cyber security industry is one with special weight in the state of Israel.” Mr Bennett has perhaps more experience and authority on the matter than most as he himself sold his own cyber start-up company Cyota – a financial internet-fraud detection system, already widely adopted by most financial institutions around the world – to RSA Security (now owned by EMC²) for $145 million in 2005.

Security Trade & Investment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THE IMPORTANCE OF COLLABORATION Operating in today’s global economy and interconnected world brings a wide and diverse range of threats and security

Israel’s military has begun moving large parts of its training and operations centres, and some of its technological units, to an area a mere 20 miles out from the city of Be’er Sheva previous Olympic Games is a good indicator of the breadth of ability it possesses. Along with the advancements in robotics and solutions for securing the Smart City, Israel’s ingenuity in the area of cyber security truly stands out as being one of the most exciting areas of development. Here Israel stands among the very best of the world leaders in this crucial market. DEFENCE EFFORTS At a recent meeting of the Israeli Cabinet, Dr Evyatar Matanya, the Head of Israel’s National Cyber Bureau, briefed those present that in 2013, Israel’s exports in cyber-defence equated to $3 billion. This accounts for five per cent of the global cyber market, which is estimated at around $60 billion. Dr Matanya went on to explain that there are approximately 200 cyber-security start-ups operating in Israel, who are also joined by a further 20 global enterprises and multinationals who have established R&D centres in the country for the exclusive purpose of innovation in cyber-defence. As more and more areas of everyday life are becoming coordinated and supported by digital systems, Israel needs to ensure that it has a digital Iron Dome as part of its defence capabilities, right alongside the country’s air defence Iron Dome. This is the system located at several points around the country, which intercepts and destroys

challenges. The truth is there is no magic pill for a one-solution-fits-all. No single company can provide adequate protection from all threats. Effectively rising to meet these challenges requires something more – it requires partnership. In the process of establishing itself as a world leader in this field, Israel has created the environment for various internal partnerships. However, it has also extended the opportunity to those beyond their shores. Israeli companies work closely with prime security integrators worldwide, including Boeing, Lockheed Martin, Northrop Grumman, SAIC, Siemens, Thales and many others. Working together, developing ideas and technologies using the expertise of both companies, these partnerships are creating innovations and solutions that are so far beyond being just the sum of their parts. Israel’s unique experience and its resulting expertise in HLS is clear. With the UK’s own renowned capabilities in this field, there exists a perfect opportunity to create a lasting bilateral tech-partnership with the potential to create entirely new generations of civilian defence‑tech and the pathways to share them with markets around the world. L FURTHER INFORMATION embassies.gov.il/london

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

39



APPRENTICESHIPS

An ever-present threat of terrorist activity across the globe has led to security training companies playing a growing role in helping Army personnel to deal appropriately with terrorist incidents and threats. Anthony Rabbitt, Chairman of the training providers section of the British Security Industry Association (BSIA), explores security training courses and how they are aiding counter-terror efforts

Counter-terrorism training is of growing importance within the security industry, but training providers are also actively involved in training the British Armed Forces, through a programme of apprenticeships and courses designed to educate service personnel in the fight against terrorism. This Apprenticeship in Security programme has enabled individual infantry soldiers to

Written by Anthony Rabbitt, Chairman of the training providers section of the British Security Industry Association (BSIA)

APPRENTICESHIP IN SECURITY VITAL TO COUNTER-TERROR OPPS

Training

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Infantrys soldier ve ie can ached and s recogniualifications tq relevan rough the th ticeship the British Technology Appren curity Education Council e S in e Certificate and m m a r prog complementary National

achieve recognised and relevant qualifications, which not only meet the stringent requirements of the National Qualifications and Credits Framework but also the Security Industry Authority. Because certification is not required to perform counter‑terrorist tasks during operations,

Vocational Qualification are designed, developed and delivered by civilian trainer/assessors possessing significant experience both from military operations and commercial security appointments. E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

41


Visit Axis at Counter Terror Expo, London Stand E45

Anyone. Anything. Anywhere. Anytime. Video surveillance for critical infrastructure.

With threats possible from any angle, the unexpected is pretty much a guarantee for critical infrastructure. That’s why Axis focuses on securing you from perimeter to core. Our network video surveillance products help you secure your site in even the harshest conditions. Yet beyond that, we constantly

Scalable, future-proof solutions • Outstanding HDTV image quality • Integration of video alarms and monitoring into the SCADA system • Intelligent analysis with partner software

work together with our partner network to bring you solutions that ensure safe, uninterrupted production that’s also more efficient. Axis solutions for critical infrastructure – covering every angle. Visit www.axis.com/criticalinfrastructure


APPRENTICESHIPS  PRIVATE SECTOR AND DEFENCE As part of the programme, all infantry apprentices are required to demonstrate mastery of the following core knowledge‑based units: Working in the Private Security Industry, Working as a Private Security Officer and Communication and Conflict Management, demonstrating the relevance that private security experience can have in the wider context of defence and national security roles. Learning to demonstrate competent performance for the NVQ builds on knowledge and experience that the learner will have gained from taking part in counter-terrorist operations from training exercises, but is contextualised and orientated to the civilian environment. The syllabus – approved by UK sector skills body for the private security industry, Skills for Security – covers a range of activities involved in counter-terrorism roles, including searching people and vehicles, planning, briefing and conducting security patrols, capturing and recording information, preserving evidence and scenes of crime, heightening situational awareness, against a constant backdrop of deterring criminals and potential terrorist activity. As the trade body representing the UK’s private security industry, the BSIA’s membership includes a dedicated group of training providers, many of whom have experience in delivering counter‑terror training. Hampshire-based BSIA member, PDM Training and Consultancy Limited, has been delivering a Level 2 Intermediate Apprenticeship in Providing Security Services to infantry soldiers since 2005, under a contract with the Army’s Educational Capability arm, part of the Infantry’s Whole Life Development Strategy, which is managed by the Personal Development Advisory Team. To date, in excess of 3,500 Infantry soldiers and junior non-commissioned officers have completed the Apprenticeship. PROTECTING CIVILIANS The Army has long been in the vanguard of the United Kingdom’s counter-terrorism operations. Historically, infantry soldiers were the eyes and ears of the civil authorities in Northern Ireland, supporting the police, while further overseas, infantry soldiers have been involved in many counter terrorist or counter-insurgency operations, including in Malaysia, Palestine and, more recently, Afghanistan. Operation HERRICK – the code name given to British operations in Afghanistan – has been a protracted campaign against well‑organised paramilitary terrorist groups and now, 12 years on from the advent of British involvement in the region’s conflict, British military units are counted amongst the best in the world when it comes to counter terrorist operations.

Training

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

All infantry apprentices are required to demonstrate mastery of the following core knowledge-based units: Working in the Private Security Industry, Working as a Private Security Officer and Communication and Conflict Management, demonstrating the relevance that private security experience can have in the wider context of defence and national security roles Infantry training has evolved to encompass counter-terrorism, along with a broad range of other security tasks, including security of personnel, equipment and physical key points, manning vehicle check points, controlling access or dealing with improvised explosive devices. However, the Apprenticeship is a route through which infantry soldiers are able to achieve national recognition of the knowledge gained through training and the skills developed during operations. The Apprenticeship in Security enhances infantry personnel’s ability to perform counter terrorist operations and provides commanders with soldiers who are flexible and versatile in dealing with the constantly changing situations generated in a fluid and developing theatre of operations. It also provides a solid foundation and understanding of the requirements of working in the commercial security industry at the end of military service. MAKING A MOVE TO CIVILIAN LIFE Looking beyond an armed forces career, the Apprenticeship in Security can also benefit soldiers making the move to civilian life. In a recent survey carried out by the BSIA, 92.6 per cent of respondents reported that ex-forces personnel make suitable candidates for careers within the security sector, with 88.2 per cent of respondents already have ex-armed forces personnel working within their organisations. Several Apprenticeship in Security alumni have, in fact, used the qualification to complement their military experience and make the move into a career in the private security sector. Of course, the Apprenticeship is the first rung up the lifelong learning ladder and many soldiers, having been promoted as non-commissioned officers, warrant officers or officers seek out and achieve higher level qualifications, as part of their personal development, in managing and planning security. OTHER TRAINING Other companies getting on board with such schemes include another BSIA member company, Optima Defence and Security Limited. Optima Group was the first UK

contractor to design and deliver training on the use of a new hand-held IED detector to front line soldiers in Afghanistan, where tight operational timescales required that the training be delivered in-theatre (at Camp Bastion) over a 10-week period. This stringent deadline provided the training provider with just seven weeks to design and validate the three-day course prior to the deployment of the Optima Group Mobile Training Team. At the conclusion of the training delivery window, the company had trained 697 soldiers, 690 of whom qualified as competent operators able to detect lethal IEDs placed in the ground by terrorists. The IED threat is also of concern to the wider population in the region. Whilst military casualties dominate the headlines, the deadly effects of many IEDs are indiscriminate in nature. According to the Joint IED Defeat Organisation (JIEDDO), between 2010 and 2012, only 36 per cent of global IED targets were military; the remainder were a combination of civilian, infrastructure and government. Recent incidents at the Boston Marathon and in the run-up to this year’s Sochi Winter Olympics have highlighted the problem on the global stage. With the Government’s official terror threat level for Mainland Britain remaining at substantial – meaning that an attack is a strong possibility – the need for training in identifying, deterring and responding to terrorist threats and incidents is just as important for defence and security personnel working in the UK, as it is for their colleagues engaged in combat or military operations overseas. Choosing a training provider with the appropriate qualifications and experience to deliver counter-terror training courses can be challenging for any company looking to improve its employees’ knowledge of counter-terror operations. BSIA member companies are vetted to a high standard and meet minimum quality criteria, and a full list of members, can be found on the BSIA’s website. L FURTHER INFORMATION www.bsia.co.uk/training-providers

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

43


Perimeter Security Ian Stone (left) from 2012 winners Apetito presents Rob Gerrard, managing director of Safetyflex Barriers (centre), with the 2013 National Business Award – Innovation, joined by event presenter Dermot Murnaghan

SAFETYFLEX BARRIERS WINS NATIONAL BUSINESS AWARD

Safetyflex Barriers has been revealed as a 2013 National Business Awards winner, receiving The Innovation Award, at the awards ceremony and gala dinner hosted by Sky’s Dermot Murnaghan. This award recognises the enterprise that has most successfully applied innovation in UK Safetyflex Barriers is a leading manufacturer of PAS 68 high-security anti-terrorist bollards and barriers which protect key assets and infrastructure across the UK and internationally. The National Business Awards judges said: “Demonstrating that British manufacturing and design is alive and well, Safetyflex has continuously improved its technology for a range of security applications.” Rob Gerrard, managing director at Safetyflex Barriers, said: “We’re thrilled to have won this year’s Innovation Award, as these awards are the most prestigious in the UK. “The foundation of the company is built upon applying traditional manufacturing knowledge and skills to produce cutting edge security products for the UK and international security markets, and it’s this approach which sets us apart from competitors and I think impressed the judges. Innovation is at the forefront of all our anti-terrorist security bollards and barriers and winning one of the most prestigious

44

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

business awards in the UK is fantastic recognition for the company and our team. “We’re constantly bringing new products to market to protect buildings and infrastructure and we have ambitious plans to strengthen our position in the security market even further. “Winning the National Business Award only gives us added confidence to continue the growth of Safetyflex Barriers and kick on even further.” The twelfth annual National Business Awards held at London’s Grosvenor House Hotel was opened by a video address from Rt Hon David Cameron who acknowledged the National Business Awards for recognising excellence

in enterprise and honouring some of Britain’s biggest business success stories. He told the audience: “A strong private sector is exactly what Britain needs to get back on its feet. I’m determined that Britain becomes the best place in the world to start a business, to grow a business and to do business.” The Prime Minister’s message was followed by Sir Bob Geldof, who addressed the 1200 attending business leaders on the role of business in society. HRH Prince Andrew also announced his support for the launch of The HRH Duke of York New Entrepreneur of the Year Award for 2014. Dame Helen Alexander, Chair of Judges said: “Congratulations to the 2013 winners – they represent the very best of British business. Being the Chair of Judges for the programme has enabled me to see some of the shining examples of innovation, ethics and overall success from businesses of all sizes and across all industries – it gives me great hope for a bright economic future for the UK. ” L

tion Innova he is at t f all nt o forefro x Barriers’ e Safetyfli-terrorist ant ollards b y t i r u sec rriers and ba


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Safetyflex Barriers leading the way with its innovative PAS 68 Perimeter protection Safetyflex Barriers are the world’s leaders in PAS 68 spring steel bollards, barriers and crash fences. These hostile vehicle measures have been designed to stop vehicle borne threats, against key infrastructure, either by terrorist attack, or criminal anti-ram activities. With Safetyflex Barriers new patented invention for PAS 68 bollards, barriers and crash fences. Safetyflex Barriers have invented special absorbing steel that absorbs extremes amounts of energy. Which allows us to use a very slim line bollard, in a shallow foundation, and produces a low cost PAS 68 solution for the client? This has made Safetyflex barriers, one the leading anti-terrorist bollard manufactures in the world, which has made Safetyflex the preferred choice for key government projects, in and outside of the UK. As being a key supplier of PAS 68 anti‑terrorist bollards to the London 2012 Olympics, securing multiple venues, Safetyflex specialise in securing shopping centres, sports stadiums, to securing entire fence lines, from MOD facilities, data centre, and oil and gas refineries.

Safetyflex work with key architects, for securing the public realm, with their PAS 68 Bollards, litter bins, cycle stands and planters, offering aesthetically attractive, shallow, removable, cost‑effective anti-terrorist solutions. Safetyflex work with some of the largest oil & gas refiners in the world, where they can offer a bespoke solution, for all their PAS 68 Anti-terrorist requirements. With their latest designs in PAS 68 crash fences. L FURTHER INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry Tel: +44 (0)24 76 664911 www.safetyflexbarriers.co.uk

Sites Safetyflex Barriers are installed • The O2 • Excel Centre • Ricoh Arena • Titanic Centre Belfast • St James’ Park • Wimbledon • Key London Sites • Horse Guards Parade • Numerous data and cash centres

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

45


Fingerprints

Advanced systems for the detection, capture and enhancement of latent prints

Trace Evidence

Instruments for the elemental analysis of minute fragments of evidence including glass, paint, fibres, drug residues and GSR

Forensic Light Sources

UV-Vis-IR illumination sources for the crime scene and forensic laboratory for the improved visualisation of fingerprints, body fluids and other ‘unseen’ evidence

Questioned Document Examination

The world’s most advanced range of instruments for the detection of counterfeits and alterations of all questioned documents including passports, ID cards and banknotes

foster+freeman INDUSTRY LEADING FORENSIC SCIENCE EQUIPMENT Foster + Freeman are innovators in the design and manufacture of systems for the examination of questioned documents, latent fingerprints, trace evidence and shoe prints. Established in 1978, Foster + Freeman has become one of the foremost forensic science equipment suppliers in the world, exporting market leading, and in many cases unique products to more than 160 countries.

foster + freeman www.fosterfreeman.com

Foster + Freeman Ltd. United Kingdom | Tel: +44 (0)1386 768 050 | email: sales@fosterfreeman.com


EVENT PREVIEW

THE INTERNATIONAL FORUM DEDICATED TO THE FORENSICS SECTOR RETURNS FOR 2014

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Taking place on 29-30 April at Olympia London, Forensics Europe Expo 2014 is set to be this year’s premier international forum with valuable insights into developments in forensic science Last year, the event introduced over 3,000 buyers and specifiers to the latest forensic products, equipment and services as well as providing a definitive source of education and best practice together with unparalleled access to training and networking opportunities. Supporting the exhibition, Forensics Europe will also feature a high-level conference programme designed to attract hard-to-reach decision-makers and thought-leaders from both the public and private forensic arena, making the event an ideal platform for the launch of new products and cutting-edge technologies. PROFESSIONAL BODY President of The Forensic Science Society Dr Ann Priston commented: “As the largest professional body of forensic practitioners in the UK, it is fitting that we should be represented at Forensic Europe Expo which will not only offer valuable insights into the latest developments in forensic science but also provide an important networking opportunity for those working in areas where forensic science is having a real impact. “Our role at this year’s event is particularly significant as we have just been granted a Royal Charter and we will be exhibiting under our new name, The Chartered Society of Forensic Sciences, and we have chosen to launch at the Expo because it is such a high-profile industry event,” Dr Priston continued. “The Workshop programme is certain to feature some fascinating insights into new areas where the expertise of scientists is driving standards in investigation and furthering knowledge. In particular, digital forensics is likely to be widely covered at this year’s exhibition. “This is a fascinating and fast-moving field, involving the fight against cybercrime and other challenges that our virtual world is now presenting to law enforcers.” CRIMINAL JUSTICE ARENA Another key supporter of the Forensics Europe Expo is The Forensic and Policing Services Association (FAPSA). Allan Scott, MD of The Evidence Partnership, one of the founding members of FAPSA, said: “Clarion Events have been supportive of our aims of giving small

Leading forensic suppliers and organisations will hold product launches, live demonstrations and share exclusive case studies to ensure that Forensics Europe Expo attendees have access to the latest tools to help solve investigations and medium-sized businesses a voice in the forensic and policing market whilst also ensuring that quality is maintained. “We’re confident that Forensics Europe Expo will enable us to explain our ethos and our full range of services to prospective members and show how smaller organisations can make a significant contribution in the criminal justice arena.” Philip Hunter, event director, Clarion Defence and Security, added: “Forensics Europe Expo has already established its place as the leading event for the entire forensics sector. “With an exciting new programme of content, this year’s event promises to offer the best opportunities yet for important new collaborations and business relationships to be established,” Hunter added.

FREE-TO-ATTEND SHOW FLOOR FEATURES Forensics Europe Expo will host a variety of free-to-attend show floor educational features. Visitors will be able to attend the Seminar Theatre where leading forensic suppliers and organisations will hold product launches, live demonstrations and share exclusive case studies to ensure that Forensics Europe Expo attendees have access to the latest tools to help solve investigations. The free-to-attend Live Crime Feature will also be returning and will see leading exhibitors showcasing their innovative products and solutions through a range of live crime scene scenarios, providing attendees with the opportunity to experience the latest techniques and products, first-hand. E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

47


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

48

COUNTER TERROR BUSINESS MAGAZINE | Issue 17


EVENT PREVIEW Who should attend Forensics Europe Expo

Forensics Europe Expo

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

If yourself or any of your team work with forensic products or services within the following sectors, then Forensics Europe Expo 2014 is a must-attend event for you: Police/law enforcement/ intelligence services Corporate organisations/ private sector Legal practice Laboratories Trading standards Central/local government  Some of the ground-breaking techniques and technologies visitors will be able to learn about during the interactive show floor features include: products to aid fingerprint analysis; software for extraction of mobile phone data in all states; decryption software to help retrieve information; the latest forensic case management systems; drug analysis services and kits; police interviewing equipment; and CCTV products and equipment for collecting, tagging and bagging evidence at the scene of crime. MULTI-STREAM CONFERENCE PROGRAMME The conference programme has a range of presentations, discussions and workshops that will highlight the important role practitioners, academics and industry experts play in ensuring the progress and advancements made over the past decade continue to solve investigations. Forensics Europe Expo will be hosting two conference streams along with four conference symposium sessions. FORENSIC INNOVATIONS CONFERENCE STREAM Innovation in forensic science is constantly evolving and is being embraced across the world by law enforcers, academics and industry professionals. It has transformed the evidential potential available to investigators and has allowed for successful prosecutions to take place – even years after a crime is committed. Forensics Europe Expo 2014 will examine and celebrate these advancements and debate the current and possible future challenges that may occur as a result. Key topics to be discussed over the two days of the event include international forensics, forensic innovations, DNA, crime scene investigation, new forensic techniques and forensic toxicology.

DIGITAL FORENSICS CONFERENCE STREAM Digital forensics has emerged as an independent discipline due to the advancements in technology over the past five years and the growing presence of technology in our daily lives. This in turn has led to new challenges being presented for law enforcers and therefore an increase in academic courses and research dedicated to this interesting new area of science. Some of the key topics being discussed in this digital forensics conference stream include: changing digital landscape, digital evidence, online crime, forensic evidence, forensic imagery, mobile phones, computer forensics and forensic innovations.

Training/consultancy Military

VISIT COUNTER TERROR EXPO AND AMBITION AT OLYMPIA LONDON Forensics Europe Expo will once again be co-located alongside Counter Terror Expo and, for the first time this year, Ambition – the dedicated UK ambulance and pre-hospital care exhibition and conference. Forensics Europe Expo visitors can attend both shows without any extra charge by using their visitor badge. While attending Counter Terror Expo, visitors will be provided

Innovation in forensic science is constantly evolving and has transformed the evidential potential available to investigators and has allowed for successful prosecutions to take place, even years after a crime is committed FORENSICS SYMPOSIUM An exciting new addition to Forensics Europe Expo 2014 is the Forensics Symposium, which will give delegates the chance to debate key current issues and discuss best practice with a panel of leading experts within a particular field of forensics. There are four sessions taking place over each day that can be booked separately to the other two conference streams, giving delegates the chance to tailor their experience while attending the event. Key topics being discussed this year include; ‘How today’s advances in forensic science can help solve yesterday’s crimes and ‘Exploring how forensic science is enabling investigators to detect illegal images on the internet’.

with the opportunity to attend the C-IED Demonstration Zone and witness a range of live scenarios which involve suspect packages and bomb disposal operations and include post-scene forensic operations. L FURTHER INFORMATION Register for your free exhibition-only pass or a conference delegate pass, or to get more details on Forensics Europe Expo, just visit www.ForensicsEuropeExpo.com/Register. Conference registration is now open with delegate passes starting from £105 +VAT. Visit www.forensicseuropeexpo.com/ conference to view the programme.

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

49


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EVENT PREVIEW

NETWORK AND ENGAGE WITH OTHER PROFESSIONALS AT INFOSECURITY EUROPE

At the 19th Infosecurity Europe (29 April-1 May 2014, Earls Court, London), the most attended event of its type in Europe, you can do business with 15,000+ information security professionals

Channel 4, Centrica, and many more. Join the community this year for your chance to grow your professional network, exchange and learn best practices as well as profile yourself among the greatest.

Infosecurity Europe is the largest and most attended information security event in Europe. Held at London’s Earls Court on 29 April-1 May, it is a free event featuring over 325 exhibitors presenting their most diverse range of new products and services. The unrivalled free education programme attracts visitors from every segment of the industry across Europe. WHY YOU CANNOT MISS IT See what’s new; network with peers; educate yourself and your team; talk to interact with product experts or technical staff. Meet with the key industry players: “99 per cent of the show’s visitors are satisfied with the fulfilment of their objective of seeing the industry players in one place.” From the New Exhibitor Zone to the Country Pavilions, discover the latest products and solutions of the local and international scene. This is your best opportunity to receive expert advice and to discuss your needs with key information security players. The New Exhibitor Zone provides a dedicated platform for companies new to Infosecurity

50

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

Europe to exhibit and showcase highly innovative product and service solutions. If you are looking for innovation, this very popular space among visitors is the place to be.

COUNTRY PAVILIONS As a global information security hub, Infosecurity Europe is not only committed to addressing international information security challenges but it also promotes the necessity to adapt to cultural singularities within the industry. Therefore, the event covers country‑specific market insights and needs with national dedicated areas, such as the Country Pavilions. The Country Pavilions gather a consequent number of companies specialised in the same country so that visitors interested in a specific territory can directly collect information and interact with expert vendors. Besides, Infosecurity Europe goes beyond the European scene with the hosting of the US Pavilion for its 12th consecutive year as well as the brand-new Israeli Pavilion for 2014. Infosecurity Europe is the most important date in the calendar for information security professionals across Europe. The attendees reflect every segment of the information security industry coming from key sectors, including: IT distribution companies; IT

Whether you are a junior or senior member in the industry, many features like the Networking Bar or the Visitor Comfort Zone are available to optimise your social experience NETWORKING Infosecurity Europe 2014 is paving the way for three exciting days of multiple opportunities for you to network with a global audience of over 15,000 information security professionals. Whether you are a junior or senior member in the industry, many features like the Networking Bar or the Visitor Comfort Zone are available to optimise your social experience. Last year’s event featured world-class companies, including Unilever, easyJet,

hardware, software, manufacturers and suppliers; end-user information security professionals; and government professionals. COLLECT CPD/CPE CREDITS The Education Programme is shaped by the industry for the industry. Addressing the latest challenges and industry needs it will provide attendees with business critical insight, best practice and practical case studies. Infosecurity’s content partners (ISC)2 and


Programme to collect valuable CPD/CPE Credits, which get allocated automatically in the months after the event. Featuring five conference and seminar theatres and a comprehensive programme of workshops and training courses, the Infosecurity Europe Education Programme helps information security professionals to further establish their career and development.

So, how can security functions start thinking like the business and become a business partner? How can business knowledge be brought into the security team? How can security be integrated into agile business practices and transformation? Keynote Theatre attendees at the event will gain insight into how to transform information security to truly support the business.

FREE EDUCATION PROGRAMME The Infosecurity Europe Education Programme provides a range of learning opportunities for its attendees where they can access high-level content through a host of different formats: from panel discussions and presentations to workshops and training courses. The Education Programme has been put together following extensive research with the Information Security community and an Advisory Council of CISOs to identify the topics, issues and challenges that are important to them, to ensure that attendees to the event leave with business intelligence, knowledge and insight that they can further apply directly to their organisation.

FUTURE-PROOF INFORMATION SECURITY & PROTECTING LEGACY SYSTEMS The pace of technological changes continues to increase. As businesses become more connected than ever before, information security practitioners are tackling the dual challenges of securing current legacy systems that are increasingly vulnerable to new risks, whilst looking ahead at how to future-proof tomorrow’s legacy. At the show, attendees will benefit from the opportunity to find out how to protect current legacy systems and build resilience in current technology to protect against future threats.

INFOSECURITY EUROPE 2014 KEYNOTE THEATRE This year’s Keynote Theatre agenda will address the theme of security as a business enabler, focusing on how a proactive, resilient security strategy can add value to, and support growth and transformation in the hyper-connected business. Bringing together senior end-user practitioners from the public and private sectors, policymakers and analysts, the programme will provide strategic insight, best-practice and real-life experience, providing a unique opportunity for delegates to learn directly from the experts who are at the sharp-end of information security. With panel discussions, presentations, interviews and Q&A sessions, delegates will leave the sessions with strategic insight and practical tips that will enhance their personal skills and assist them in developing and implementing a robust information security strategy for the next 12 months. SUPPORTING INNOVATION AND TRANSFORMATION Information security is evolving and moving beyond technology to become a business discipline. By developing risk-based, intelligence-led security strategies, the information security function is able to determine what the real level of risk is to the business, and support decision-making within the organisation. To do this, the information security function needs to shake off the reputation of being risk averse, stifling innovation, agility and efficiency with strict controls and policies to become business-led – sharing the risk appetite of the business whilst protecting the enterprise with business-led strategies.

‘APPLIFICATION’ OF BUSINESS AND IMPLICATIONS FOR SECURITY As applications increasingly become an essential part of a business, agile software development is critical to enable rapid adaptation and speed to market. At the same time, ‘applification’ throws up a host of information security challenges. Embedding information security into software development is critical to minimise vulnerabilities and ensure software meets regulations and OWASP standards. At Infosecurity Europe 2014, attendees will discover how DevOps can be used to embed security in the development lifecycle and how security and development can work together to achieve best practice and ensure the rapid delivery of secure applications to enable business growth securely. Attendees to the Keynote Theatre will also have the opportunity to learn about business critical topics, including building a predictive threat intelligence capability, balancing security versus usability, building transparency and trust in the supply chain, Big Data security intelligence, Generation Y and information security, and what’s new in cybercrime. Speakers already confirmed to deliver in the Keynote Theatre at Infosecurity Europe include senior representatives from Skype, Pearson, Viacom International Media Networks, Premier Farnell, Home Retail Group, Rank Group, Travis Perkins, GE Capital and Amgen. Alongside the Keynote Theatre, a host of other theatres will be running, including the Business Strategy Theatre, Technical Theatre, Security Workshop and the Information Security Exchange Theatre, providing a format to meet all educational needs. CO-LOCATED-EVENT– SITS14: THE SERVICE DESK & IT SUPPORT SHOW SITS14 – The Service Desk & IT Support Show is the UK’s leading IT service management and

support event. Discover the latest solutions and gain expert advice from some of the world’s leading suppliers. Get inspired and gain insight into the latest issues and trends in the practical seminars and keynotes, plus network with thousands of your industry peers. There are a host of great show features: the exhibition – meet with the leading suppliers, all demonstrating the latest products, services and solutions; seminars – over 40 sessions across three theatres, including case studies and practical ‘how to’ sessions; keynotes – the Keynote Theatre, featuring Gartner, providing a unique opportunity to address the current, crucial issues and gain a strategic outlook; and Breakfast Briefings – a great way to start a visit to the show – discover the results of new industry research and put your questions to the panel. Returning to London’s Earls Court this year (29-30 April 2014), SITS14 – The Service Desk & IT Support Show looks set to celebrate its milestone 20th anniversary in great company, with a host of big name vendors, consultancies and service providers all now confirmed as exhibitors for the event. These include: xMatters; Autotask; Axios Systems; Biomni; Bomgar; Cherwell Software; Freshdesk; FrontRange Solutions; Global Technology Solutions; LogMeIn; ManageEngine; ServiceNow; SysAid Technologies; Specops Software; TOPdesk; and Matrix42 – just a few returning exhibitors hoping for a repeat of last year’s packed aisles. New exhibitor additions this year include Absolute Software – specialists in technology and services for the management and security of mobile devices – and Sunview Software, one of America’s fastest growing providers of IT service management software. Invigorating, inspiring, essential and enjoyable, SITS may need little introduction within the industry it serves. For two days, SITS14 – The Service Desk & IT Support Show offers attendees the vital opportunity to source the latest tools, technology and insights that they need to improve their IT provisions and enable their organisations to work more effectively. For those who have yet to enjoy the SITS experience for themselves – 2014 may be the perfect year to give it a try. L

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION For details about what’s on for 2014, the educational sessions and to register for Infosecurity Europe and/or SITS14, visit http://goo.gl/Ek4Lsn

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

51


MOBILE SECURITY SOLUTIONS

BODY WORN SYSTEM and 3G Transmission in ‘real time’ BODY WORN SYSTEM HIGHLIGHTS n Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memory n Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location. The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/ Edge/GPRS SIM based cellular provider. Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications

Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: info@audaxuk.com W: www.audaxuk.com


EVENT PREVIEW

GATHERING THE COUNTER TERROR COMMUNITY

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Now in its 6th edition, Counter Terror Expo is the premier international event for bringing manufacturers and service providers together with buyers and specifiers from across the spectrum of government, military, law enforcement, the security services, the emergency services, critical national infrastructure and the private sector

In January 2013, terrorists launched an attack in Algeria on the Tigantourine gas facility. April sees the detonation of two bombs near the finish line of the 2013 Boston Marathon. The savage killing of soldier Lee Rigby takes place in London’s Woolwich in May. In September, terrorists enter the Westgate Shopping Mall in Nairobi and cause multiple deaths and injuries in a sustained gun and grenade attack. Furthermore, the last days of 2013 witnesses two suicide bombings targeting crowded places in the Russian city of Volgograd. As these events unfolded, one thing became clear: the terrorist and security threat is international, interconnected and constantly evolving. As noted by the defence intelligence supplier IHS Janes, there was a marked increase in ‘damaging attacks’ worldwide over the six months to September 2013 vs the same period in 2012. Counter Terror Expo on 29-30 April 2014. Olympia, London, has achieved its pre-eminent position as a direct result of the commitment of its organisers, Clarion Events, to ensuring its immediate

A ture key fea nter at Cou o will xp Terror E igh‑level be the hational educ me programn‑depth gi featurin inars sem

relevance to these evolving threats. A key, recently released, feature at Counter Terror Expo 2014 (29-30 April 2014, Olympia London) will be the high-level educational programme comprising a wealth of in-depth free‑to‑attend seminars hosted in two seminar theatres on the main exhibition floor, providing visitors with the opportunity to examine newly launched products and review successful case studies. With over 400 exhibitors scheduled to attend the show – including many of the world’s largest, most successful and most innovative organisations – there will be no shortage of cutting-edge products and services being promoted in a variety of seminar scenarios held over the two days. Details of the seminar programme and the two theatres have been released.

SEMINAR THEATRES The security solutions theatre will feature a series of interactive product launches complemented by unique presentations delivered by experts focusing on the latest industry developments. Product launches and presentations in this theatre will focus on perimeter protection, surveillance, glass and glazing, building protection, cybersecurity, screening and scanning, CCTV and access control, all of which should be considered when assessing and improving any approach towards integrated infrastructure security. Presentations will address a diverse range of topics, including Totalpost Services discussing regulatory changes for 2014, that will affect the efficiency of threat detection for freight handlers and forwarders and, Broughton Controls investigating how to E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

53


REVADER® Remote monitoring 4G, 3G, WiFi & Ethernet transmission with powerful Wavestore® video management software

Rapid re-deployment Plug and play in multiple locations

Defence-engineered Ballistics resistant construction

On-board storage Massive 2TB storage capacity

Backup power Internal backup battery as standard

PTZ or 360 degree lens Ultra-powerful optical/digital zoom & 360-degree image de-warping

Rapid Re-deployable Security Solutions Our experience in government, military and intelligence enables us to understand the varied requirements of counter-terror operations. That’s why our products are designed and manufactured using defence-grade materials and techniques, and include the best technologies available to ensure you’re equipped to stay ahead of the curve in a cost-effective manner. sales@revader.com | +44 (0)20 8756 5488

www.revader.com


EVENT PREVIEW  reduce the cost of product convergence, whilst increasing performance. The Policing, Military and Emergency Response Theatre is specifically designed to be the one-stop-shop for all police, military and emergency response personnel, this theatre will feature the latest technologies and industry developments. Exclusive product launches and presentations will be delivered on unmanned vehicles, armoured vehicles, tracking and GPS, protective equipment, CBRNe, communications, counter-IED and surveillance. HIGH-LEVEL CONFERENCE PROGRAMME Counter Terror Expo’s industry commitment is fully reflected in the impressive roster of distinguished speakers that has been assembled for 2014; speakers representing the Home Office, emergency services, government departments, NATO, NGOs and the private sector. In total, speakers will be delivering no less than 100 highly relevant conference sessions organised around six themes. GLOBAL COUNTER-TERRORISM The Global Counter Terrorism theme will discuss multilateral counter-terrorism. It is an ever-evolving field influenced in no small part by the changes of the Arab Spring revolutions and the profound regional consequences arising from the ongoing conflict in Syria. The global security situation continues to unfold, forcing nations to constantly reconsider and

Counter Terror Expo will once again be co-located alongside Forensics Europe Expo and, for the first time, Ambition: the dedicated UK ambulance and pre-hospital care exhibition and conference adjust their counter-terrorism strategies. The sessions in this theme will provide a focused review of the threats posed by radicalisation, home-grown terror and violent extremism as well as debating the diversified nature of leading international terrorist groups and the key influences on the future of terrorism. There are a wide range of risks to our critical national infrastructure and the Risk, Resilience & Security - Protecting National Infrastructure sessions will bring together owners and operators, policymakers and practitioners, as well as key supply-chain representatives to debate the issues at stake and provide a sustained focus on the importance of strengthening threat awareness, emergency preparedness and response capabilities. The conference will also deliver insights into human factors and their influence on security and resilience, discuss CBRN threats and advances in bio-weapons, and consider the implications of cyber exploitation surrounding the national infrastructure.

entertainment venues to shopping malls and transport hubs – remain a key security focus as they are highly vulnerable and extremely difficult to secure. The Securing Public Spaces one-day programme will look at the role of new design to counter-terrorist threats and consider the application of innovative methods to overcome inadequacies in existing structures. In addition, the conference will examine blast mitigation techniques and best practice policing procedures. Blue-light services are typically the first responders to terrorism incidents and there is an imperative need to ensure the highest levels of coordination and interoperability between all of the organisations and individuals involved. Emergency Preparedness, Resilience and Response conference stream will consider the practicalities of multi-agency response, the role and features of the effective commander and how to provide mutual aid and interoperability across services. There will also be sessions on the current levels of preparedness for major emergencies.

SECURING PUBLIC SPACES: 29 APRIL Crowded public spaces – from sporting and

CYBERSECURITY & ELECTRONIC TERRORISM The cyber threat is an increasingly malevolent and thorny issue for governments and businesses worldwide. While increasing global interconnectivity delivers enormous benefits to society, the cyber world provides vast opportunities for state-sponsored actors, terrorists, extreme activists and criminal gangs to do considerable harm to national infrastructures and global commerce. The Cyber Security and Electronic Terrorism conference will consider how the world is changing and the real nature of the cyberterrorism threat; as well as considering the government’s cybersecurity strategy, what the police service and other agencies are doing to combat e-crime, and new ways to make nations and businesses more resilient to cyber-attack. In addition, there will be sessions on how to build a defence strategy that works, how big data is a useful weapon in the defence of the cyber threat, and the implications for information security of increased social media and mobile device usage. The Practical Counter Terrorism session will discuss the detail of practical counter‑terrorism, from the threats posed by solo actors to the use of surveillance in counter-terror activities. Covering both hostile and non-hostile environments, the conference will cover the key skills required in counter‑insurgency operations, discuss private vs public sector protective security, and consider how to protect soft targets from hard-line terror. E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

55


Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

BlastSax and FloodSax sandless sandbags – making life easier on emergency and military frontlines Once you’ve used these two pioneering products you’ll never want to go back to using traditional sandbags again. BlastSax®, which has undergone extensive trials with the British MOD Armed Forces, saves lives by mitigating explosions from IEDs and even helps to preserve the evidence. FloodSax® saves hundreds of thousands of pounds of flood damage to property and the human misery that flooding causes. Both work on the same principle: they transform from being as light as a pillowcase to more effective than sandbags in a matter of minutes. Easy and space-saving to store in warehouses or on vehicles, both FloodSax and BlastSax weigh just 700g before being activated by simply adding water and then they become taut, weighing 20kg (44lb) in around three minutes. BlastSax have been shown to be more effective than sandbags at capturing fragments from explosive devices, helping forensic teams to gather evidence. They also proved to be a reliable protective barrier against grenades and bullets fired by the standard British Army SA80 A2 rifle. An official Army report states: “Even at extremely close ranges, the BlastSax were

BlastSax are ideal for use by Army bomb disposal experts when they are dealing with small suspect packages

able to contain the round. The BlastSax offered excellent protection against this calibre of weapon. And even when grenades landed on or very close to BlastSax, they were able to absorb all the fragmentation.” Both the FloodSax and BlastSax are manufactured by Environmental Defence Systems, based in Yorkshire, and managing director Richard Bailey said: “They are similar products but used in very different ways. We invented the BlastSax first after the Ministry of Defence approached us asking for an easily portable version of a sandbag that could mitigate the effect of explosions.

“After a great deal of research and testing we devised the BlastSax which has proved to be highly effective, especially when dealing with smaller improvised explosive devices. The BlastSax are vacuum-packed and weigh just a few ounces so can easily be carried to a scene, however remote, by just one person – the kind of places you’d really struggle to take sandbags. “They have undergone stringent tests with the military and have been given a NATO stock number. After we had finished testing with the MoD, the UK was hit by severe flooding and we were then asked by the government to make a version of a sandless sandbag for flooding, meeting strict criteria set by the Environment Agency and the government.” About 40 BlastSax can be carried by one person at a time in its dry state – equal to 800kg sandbag weight – and it can be used with aqueous decontaminants to neutralise CBRN threats. They are ideal for conventional demolition, minefield clearance and personnel protection when preparing detonators. FURTHER INFORMATION www.blastsax.com www.floodsax.com

One company… two pioneering products saving both lives and property The Environment Agency says sandbags are unreliable and Mary Dhonau, chairwoman of the Flood Protection Association, has vehemently condemned them, saying: “I hate them with a vengeance. They do nothing but filter water.” FloodSax alternative sandbags have been used worldwide to halt floodwater in its tracks and soak up spilled fluids in hard-to-reach places. And the BlastSax have undergone rigorous military testing to prove they can mitigate the deadly effects of small terrorist explosives and bullets.

A small wall of FloodSax can hold back a torrent of water

And this is how easy they are to transport

BlastSax are proven to help mitigate the impact of small explosive devices

This large FloodSax wall held back a sea surge and tons of debris after Hurricane Sandy hit the USA

Both can be taken to the scene anywhere and anytime quickly while sandbags take up a vast warehouse space, deteriorate quickly, are exceptionally unwieldy to lift and handle and are difficult and expensive to transport anywhere due to their weight. One box of FloodSax is equal to 20 sandbags on a pallet yet can easily be carried by just one person. Both BlastSax and FloodSax feature a semi-porous inner liner containing gelling polymer which absorbs water to become taut in just over 3 minutes. Once the water is in there, it stays there and the bags act just like sandbags.

56

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

To find out more go to our websites www.floodsax.com or www.blastsax.com. Alternatively call us on 01484 641009 or email info@edslimited.co.uk


EVENT PREVIEW

 Specific issues addressed will include the benefits of deploying IED search personnel for VIP visits and significant events and new solutions for counter-terrorism surveillance as well as the use of positive engagement with host communities to mitigate hostile security threats and the increasing adoption of ‘soft security’ measures. MARITIME SECURITY The threats to maritime security from piracy, terrorism and political crises are increasing and ever evolving. New solutions and shared actions are required to protect ships, shipping routes, ports and harbours – indeed, our entire international supply chain. In recognition of this disturbing reality, Counter Terror Expo 2014 will be focusing on both the threats and the possible solutions in a dedicated Maritime Security/Maritime Counter Terrorism Zone. In short, this Zone will be fulfilling a critical function in providing a forum for key industry players to interact, engage in the debate and learn about new technologies as well as promote the innovative products and services their companies have to offer. A large number of organisations have already committed to exhibiting within the Zone and contributing to its workshops; and many of their comments reveal just how vital the issues are and just how alive the debate around maritime security promises to be.

Steven Jones, Maritime Director of The Security Association for the Maritime Industry (SAMI), one of Counter Terror Expo 2014’s industry partners, commented: “The key issues are ensuring that maritime security remains on the shipping industry agenda, and that the successes against Somali pirates do not lead to complacency and a collective dropping of our collective guard. Elsewhere, issues such as West African security, crime, ports, stowaways and cyber-attacks are likely to be key developments in 2014.” Providing direct physical protection for ships against direct attack is very much the concern of Claire Hemmings, CEO of Exsel Engineering, specialist providers of a wide range of ballistic protection solutions for vessels of all types. She commented: “The provision and use of ballistic protective shields for tactical maritime boarding teams is a huge issue affecting Maritime Security. When police officers and military operatives conduct tactical search and arrest operations on land they invariably use ballistic protection shields. However, for maritime CT operations the operatives are often required to board the ship using ladders or fast ropes from helicopters. Having an effective lightweight portable ballistic protection system, along with highly developed tactics, techniques and procedures, is essential to enabling an effective capability and therefore maximising force

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

protection for operators when conducting operations in the maritime environment.” Of course, procedures can only be effective if the right people are available to implement them, and in the view of Brad Lawrence MIExpE from consultancy, research and bespoke training provider Explosive Learning Solutions, “the generally poor standard of personnel security vetting across the maritime sector remains a serious concern – other efforts to tighten maritime security may be compromised if this key issue is not robustly addressed.” Building on the success of 2013, the first year a dedicated Maritime Security Zone was established at Counter Terror Expo, this year’s event will provide visitors with direct access to maritime industry leaders, decision-makers from naval forces, and experts from some of those countries most deeply involved in the security of the high seas. Philip Hunter, Event Director, said: “If you’re involved in maritime security, in whatever capacity, the Maritime Security/ Maritime Counter Terrorism Zone at Counter Terror Expo 2014 will give you an unrivalled opportunity to stay at the forefront of all the latest developments.” BORDER SECURITY & ACCESS CONTROL For governments, security services, law enforcement agencies and CNI operators, the E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

57



EVENT PREVIEW

Once again, Counter Terror Expo will be offering the most comprehensive display of the very latest technology, equipment and services from over 400 leading suppliers in a free‑to‑attend exhibition for visitors  need to police borders, protect perimeters and control site entry is becoming an ever increasing challenge. To help meet that challenge, Counter Terror Expo 2014 will be taking an international perspective. The exhibition will host a number of leading international companies showcasing the very latest technologies, products and services in the area of border security and access control. As Steve Roberts, marketing manager of Zaun Ltd commented: “Counter Terror Expo brings together the foremost experts to share real-life experience, debate strategies, brainstorm issues, shape policy and define effective counter-measures. We see ourselves as part of that debate and innovation to mount a robust defence against international terrorism in an age when the threat is both dynamic and continually evolving.” From the latest in infrastructure protection to state-of-the-art biometrics, screening and scanning technology, the Counter Terror Expo 2014 exhibition will cover the

whole spectrum of new developments in this highly important area. Alongside the exhibition will be the International Security for an Evolving World Theatre featuring a range of exclusive presentations on border security and contraband detection; how to utilise global supply chains and black markets, and financing and fuel terrorist activity. David Thompson, Event Manager, Clarion Defence & Security, commented: “Border Security and Access Control are critical components of the counter-terrorism and security portfolio. Through the exhibition and the seminar workshop sessions, Counter Terror Expo 2014 will provide a unique insight into the very latest protective solutions to a truly international threat as well as an opportunity to engage in the debate about how we should continue to meet that threat into the future.” EXHIBITORS Once again, the event will be offering the most comprehensive display of the very

latest technology, equipment and services in a free-to-attend exhibition where visitors can meet senior representatives of more than 400 leading suppliers from across the world, including a number of Premium Exhibitors. CEIA S.p.A is a leading expert in the field of electromagnetic technology. It is a world leading manufacturer of security screening equipment, specialising in the design, engineering and production of a complete range of devices, including Walk-Through, Hand-Held and Ground Search Metal Detectors, Bottled Liquid Scanners (LEDS), Non-Metallic Cargo Inspection and Loss Prevention Systems. CRH Fencing & Security Group (UK) Ltd is the largest player in the perimeter protection systems market. The group offers clients the opportunity to streamline their supply chain and source all of their perimeter security requirements from one single organisation, Geoquip Worldwide. Dynasystems Limited is a UK-based company that manufactures a range of blast & ballistic mitigation products and systems, including guard towers, walling and barriers, windows, entry control systems and polymer armour. Dynasystems’ products have been installed in a number of high profile military and civil locations in some of the world’s most hostile environments, including headquarters, embassies and other diplomatic missions. Security architects and engineers, Explora Security specialises in force protection. At the international forefront of counter-terrorist protective engineering and surveillance research, the company is involved in the design, development and testing of various security technologies for governments, multinational organisations, NGOs and large commercial entities, including oil companies. Exsel Engineering is a bespoke design, prototyping and manufacturing SME established on the south coast providing products and engineering in the defence and security sectors. It is a company focused on its customers’ and clients’ needs, where delivering what it has committed to deliver is its primary goal. Guartel Technologies Ltd is a UK-based manufacturer of specialist metal and command wire detectors. The company undertakes R&D projects in the field of CIED and Specialist Search and provides bespoke CIED/EOD packages and the related specialist training either in the UK or in the host country.

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

ARMOURED VEHICLES The first Land Rover made its debut in 1948. Six decades later, it is estimated that two-thirds of all these vehicles are still at work, many of them in some of the most extreme conditions and inhospitable places on earth. Land Rover’s armoured vehicles are widely used by NGOs, oil and mining companies and others to provide occupant protection against ballistic attack. Northrop Grumman Corporation is a leading global security company providing innovative systems, products and solutions for unmanned E

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

59



EVENT PREVIEW  systems, cyber security and C4ISR as well as logistics and modernisation programmes. The company works in partnership with governments, armed forces, civil agencies and private sector organisations around the world. SCHOTT AG is an international specialty glass manufacturer offering many high-performance safety glass types. The portfolio includes bullet‑proof glass laminates for military and civil applications as well as fire resistant glass meeting national safety standards. SCHOTT is the first company to offer a laminate that resists simultaneous attacks from bullet and fire. STREIT Group is the world’s leading vehicle armouring company, a success built on 20 years of proven performance in conflict zones. STREIT’s growing portfolio includes personal protection vehicles, cash-in transit vehicles, law-enforcement vehicles and vehicles for military tactical units. STREIT has 10 production plants in strategically positioned locations geared up to meet the rising demand from customers in over 100 countries. Synectics designs integrated end‑to‑end surveillance control systems for the world’s most demanding security environments, E

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

cs Forensie Europ only the Expo is nal forum tio interna ated to the dedic ensic sector or entire f its supply and chain

Multi-award winning PAS 68 fencing solutions further upgraded and showcased at Counter Terror Expo 2014 The smartest Video Content Analysis (VCA) system is the latest addition to the award‑winning temporary fencing on show on Stand J50 at Counter Terror Expo (CTX) 2014, 29-30 April, Olympia London. The solutions are developed by Zaun, Hardstaff Barriers and Highway Care. The three partners have integrated state‑of‑the‑art electronics with the ultra‑high security woven mesh ArmaWeave fence, and a range of temporary solutions – Rapid Deployable System (RDS), Multi-fence and SecureGuard – PAS 68 enhancements, blockers and bollards. They have incorporated the latest VCA system using high-performance pan,tilt and zoom (PTZ) cameras from video intelligence experts EyeLynx into their RDS, which was a double-award winner at last year’s Counter Terror Expo Excellence Awards. RDS saves up to 90 per cent of police time and first proved its rapid‑install‑with‑high‑security credentials during a whistle-stop tour around the three main UK political parties’ autumn conferences in 2012, as well as at the G8 summit in Northern Ireland in May 2013. After the Labour conference, Inspector

Steve Worth of Greater Manchester Police said: “RDS is now firmly the preferred product for the delivery of security operations for party political conferences we police, fully supported by The Home Office.” EyeLynx’s Pharos system is the only true rapid deployment high-definition (HD) surveillance system on the market with edge recording cluster (ERC) capability to incorporate an intelligent recorder, management software and wireless communications, all in the same unit. It uses the SharpView VCA recording engine, which can accommodate multiple-slave PTZ

cameras of any make connected into the master. Indeed, the number of ‘slaves’ is limited only by power and bandwidth requirements. Cameras record HD 24/7 and whenever the perimeter is compromised or a potential intruder approaches too close to the fence, Pharos will send a snapshot alert to the control centre for visual verification – or even to assigned personal mobile devices, such as the police chief or nearest constable to the breach. Developers have embedded the cabling into the fence posts and created an integrated power cabinet in the post base. Only the master unit needs a SIM card, which beams the video intelligence to a workstation, into which anyone authorised can dial and view live footage, or rewind and replay from any of the cameras. PAS 68 Multi-fence was developed especially for the London 2012 Olympic Games. It was built to resist attack by 7.5 tonne vehicles driven straight at it at 40mph. FURTHER INFORMATION Tel: 01902 796699 security@zaun.co.uk www.zaun.co.uk

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

61


Recognize AND Analyze Is he a known suspect?

How old is she?

How often was he here this month?

Are they authorized staff?

When, where did she enter?

Is this VIP Mia Clark?

How many people are here? Is it too crowded in this area? FaceVACS-VideoScan uses premier face recognition technology to detect and identify persons of interest in real time while computing demographic and behavioral data, supporting security staff and operations management.

See it in action at CTX, stand I66.

www.cognitec.com info@cognitec.com Cognitec develops market-leading face recognition technology and applications for facial image database search, real-time video screening and analytics, border control, and biometric photo capturing.


EVENT PREVIEW  specifically for banking, critical infrastructure, gaming, marine, oil and gas, public space and transport applications. One of the largest and most dynamic British manufacturers of high security perimeter protection systems, Zaun’s comprehensive range of solutions combats the rapidly changing security threats, delivering systems that meet the perimeter security requirement for any site. Tested by independent organisations and governments to the most stringent criteria, our systems protect sites of critical national importance on a global scale. David Thompson, Event Manager, Clarion Defence & Security commented: “We’re delighted that so many high profile organisations, including our Premium Exhibitors, will be participating in Counter Terror Expo 2014, in many cases conducting live demonstrations, workshops and briefings. In addition to the exhibition itself, the event will also feature a high level, multi‑stream conference programme featuring distinguished international experts from across the counter‑terrorism and security arena. In short, Counter Terror Expo 2014 is a must‑attend event for anyone involved in responding to the ever evolving threats we face. ” CO-LOCATED SHOWS For the first time ever, Counter Terror Expo is co-located with two E

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Counter Terror Expo is co‑located with two other shows. Between them, Counter Terror Expo, Ambition and Forensics Europe Expo will showcase the latest technology and techniques for everything from the prevention of terrorist attacks

Revolutionary new security systems from Heald being showcased at Counter Terror Expo 2014 Earlier this month, perimeter security specialists Heald launched a groundbreaking new fixed bollard, the HT1-Mantis. Combining PAS 68-tested security, simple shallow mount installation and stylish aesthetics the Mantis is already causing quite a stir. As with all Heald products, the focus is on high security. With a rating of PAS 68:2013 Fixed Bollard V/7500(N2)/64/90:0.0/0.0, the Mantis will stop a 7.5 tonne vehicle travelling at 64kph with zero penetration and zero dispersion. As it was tested as a single unit, the Mantis can be used either as a stand-alone bollard or as part of an array, making it extremely flexible in use. Equally important is ease of installation. The Mantis requires no additional rebar, and no precasting of the concrete pit, which means that Heald’s fitters can usually excavate and install the Mantis in less than an hour. Its extremely shallow mounting depth of only 250mm allows for installation with a minimum of disruption and also makes it one of the most cost‑effective installs currently available. Combined with extremely low whole of life costs, the Mantis is one of the most

cost-effective bollards on the market. What really sets the Mantis apart is the aesthetic options available. Moving away from the idea of a bollard as a cylindrical unit, the Mantis is available with a range of stylish stainless steel covers in a variety of sleek shapes. These allow architects and designers much more freedom to create a coherent, stylish environment. As well as static bollards, Heald also produces world-leading automatic perimeter security systems, including the award-winning Matador surface-mounted automatic bollard solution, the unique Raptor shallow mount retracting bollard and the Viper shallow mount blocker. At Counter Terror Expo (29-30 April 2014, Olympia, London), as well as the Mantis, Matador and Raptor, Heald will be showcasing another world first – the Hydra. The Hydra is a revolutionary new intelligent control and monitoring system, capable of not only controlling multiple blockers or barriers but also monitoring and reporting their status via a range of media, including SMS and email. This new system is available with all Heald automated products. Heald will be exhibiting on Stand B65 at the Counter Terror Expo in London. As

well as working Matador and Raptor units, the company will be demonstrating the capabilities of the Hydra and how it can both simplify and strengthen perimeter security. FURTHER INFORMATION Tel: 01964 53 58 58 www.heald.uk.com

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

63


Counter Terror Expo 2014

64

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Premier face recognition technology supports advanced video screening and analytics applications With increasing accuracy and speed, face recognition technology has established its effectiveness in preventing ID fraud and supporting criminal investigations. In recent years, use cases have broadened to include real-time video-screening for security measures, and the analysis of faces in images/videos for commercial applications. The latest version of Cognitec Systems’ video-screening and analysis product FaceVACS-VideoScan performs real-time identity checks against image databases while computing the count, flow, demographics and behaviour of people visible in video streams. Surpassing traditional video surveillance systems, FaceVACS-VideoScan detects people’s faces in live video streams or video footage and stores lossless video of each appearance of a person in front of a camera. The technology then compares all the appearances of one person against each other for continuous face recognition and uses anonymous facial analysis to count individuals, generate demographical information, track people’s movement in time and space, detect frequent visitors and crowds, and much more. For example, FaceVACS-VideoScan can achieve a highly accurate person count, since

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

a person seen once will be re-recognised and therefore not counted again. Operators can also receive an alarm if too many people gather in a specific area and measure waiting times to direct traffic. The analysis of traffic patterns and demographical statistics can provide businesses with precise visitor data to make interior design, advertising placement, staffing and other operational decisions. The product also applies Cognitec’s premier face recognition technology to compare faces to image databases and instantly find known individuals. Businesses and organisations can detect and prevent unwanted behaviour

in much faster and more efficient ways as operators can track individuals online, or receive alerts on mobile devices to act within the immediate vicinity of a suspect. On the other hand, FaceVACS-VideoScan can identify authorised individuals or high-ranking customers in realtime. Positive authentication can prompt access to restricted areas or alert personnel to provide special treatment. The introduction of this advanced video screening and analysis technology continues a long list of revolutionary products the company has brought to market. Cognitec’s database search technology has successfully assisted law enforcement agencies worldwide to quickly find offenders and solve crimes and to prevent fraud during ID document issuance. Around the globe, other companies have developed and continue to create new solutions using Congitec’s technology – testament to the company’s continuing dedication to deliver the best face recognition performance available on the market. FURTHER INFORMATION info@cognitec.com www.cognitec-systems.de


EVENT PREVIEW  other shows. Between them, Counter Terror Expo, Ambition and Forensics Europe Expo will showcase the latest technology and techniques for everything from the prevention of terrorist attacks, to the emergency services response when an attack does occur, to the forensic examination of the scene after the event. Never before has the opportunity existed to see and understand the whole counter terrorism picture, from start to finish, at one location. In addition to hundreds of leading companies exhibiting their products and their services, each show will have its own programme of conferences, symposiums and workshops, featuring leading experts in their respective fields, and offering, collectively, a unique educational experience. Ambition, now in its in 4th edition, is the only show of its kind to enjoy the full support of all NHS Ambulance Services, from their senior managers to their frontline staff. Focused on delivering excellence in pre-hospital care in all circumstances, there will be a strong emphasis on crisis management and the response to serious mass-casualty incidents such as those caused by terrorist attacks. As such, Ambition will feature important contributions from NARU (National Ambulance Resilience Unit) and JESIP (Joint Emergency Services Interoperability Programme) to help further the development of effective cooperation between all of the emergency services. Founder of Ambition, Carl Rees, said: “A one-stop-shop for anyone involved in pre-hospital care, emergency response, crisis management, interoperability and resilience, Ambition has been designed to ensure that professionals at all levels learn something new and develop their knowledge and capabilities whilst also providing excellent opportunities to network with other multiagency partners.” David Jervis of JESIP (Joint Emergency Services Interoperability Programme) commented: “JESIP is in the process of delivering the largest and most ambitious joint training programme ever undertaken by the three blue light emergency services. It is designed to improve further the way the services work together in the early stages of the response to a major incident which could be an accident, natural disaster or terrorist‑related. It is crucial that all the agencies involved in prevention of, or response to, such incidents understand each others’ roles, and are able to work seamlessly together in order to save lives and reduce harm. Such exhibitions and conferences as this can only help achieve that objective.” FORENSICS EXPO EUROPE Forensics Europe Expo is the only international forum dedicated to the entire forensic sector and its supply chain, enabling producers to promote, and buyers to source, the very latest forensic products, equipment and services. Covering Crime Scene and DNA Analysis through to Digital and Mobile Forensics, the show will provide an exceptional source of education, best practice, training and international networking opportunities. David Thompson, Event Manager for Counter Terror Expo & Ambition: “Forensics Europe Expo will undoubtedly offer every professional in the field an unrivalled insight into the very latest developments in technologies and techniques. But in addition, through its co-location with Counter Terror Expo and Ambition, the show will create unparalleled scope for the cross-fertilisation of ideas in the ongoing work to combat the efforts of terrorist and other extremist groups, wherever they may come from.” THE MUST-ATTEND EVENT David Thompson, Event Manager continued: “We’re confident that we have put together a conference programme for Counter Terror Expo 2014 that is of immediate and practical relevance to every professional involved in the counter-terrorism and security arena. This promises to be a must‑attend event and we’re extremely grateful to all of the experts who have agreed to share their insights into the ever-evolving threats we face.” Counter Terror Expo will once again be co-located alongside Forensics Europe Expo and, for the first time, Ambition – the dedicated UK ambulance and pre-hospital care exhibition and conference. Counter Terror Expo visitors can attend both shows without extra charge. L FURTHER INFORMATION Visit www.counterterrorexpo.com/register to register for your free exhibition-only pass or a conference delegate pass, starting from £205+VAT. Visit www.counterterrorexpo.com/conference

Remote/Covert RF Signal Monitoring

Counter Terror Expo 2014

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Decimator D3 Spectrum Analyser  Web-based spectrum analyser card  Frequnecy range: 5MHz to 3GHz  Dynamic range: 110 to +5dBm  Resolution bandwidth: 1Hz to 15MHz  Noise floor: 160dBm/Hz typical  Powerful carrier monitoring function  Fast measurement refresh rate  Access by multiple users independently  Ideal for monitoring  Available as a card or rack-mount unit  Also available as a portable unit  Notifications via email or SNMP  Internal/external 10MHz reference  Surprisingly economical

CCS Satcom Ltd 10 Critall Drive, Braintree, Essex, UK info@ccs-satcom.co.uk www.ccs-satcom.co.uk

Issue 17 | COUNTER TERROR BUSINESS MAGAZINE

65


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

MECHANICAL PROCESSES

XTRAPULSPAC: THE SMALL DEVICE FOR THE TOUGHEST OF REQUIREMENTS

The most recent addition to INFRANOR’s product range is XtrapulsPac, a compact and flexible low-power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications XtrapulsPac can be configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion-controller via the fieldbus and uses well-known standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications, and is available in a small device at an affordable price, which meets the most demanding of requirements. Control loop: digital drive for AC synchronous motors – current loop 62.5 μs – speed and position loop 500 μs – closed loop control of position, speed or torque – maximum speed up to 25,000 rpm. Feedbacks: resolver – incremental encoder – hall sensor – SinCos encoder – single and multi-turn HIPERFACE® encoder. Communication interfaces: RS-232 up to 115.2 kbit/s baud rate – CANopen or EtherCAT® fieldbus – DIP switches for node address. Safety features: safe torque off SIL 2. I/O interfaces: user-configurable digital I/Os – all-digital inputs opto-isolated – analog inputs ±10 V/12-bit resolution – analog output 0-5 V/8-bit resolution – ‘amplifier OK’ output – motor brake control – two-channel STO function. MODES OF OPERATION DS402 standard mode: interpolated position mode – profile position mode – profile velocity mode – profile torque mode – homing mode. DS402 extended modes: analog speed mode – stepper emulation mode – sequence mode – master/slave mode stand-alone operation – analog speed drive – positioner – stepper emulation – electronic gearing. Stand-alone operation: analog speed drive – positioner – stepper emulation – electronic gearing. Configuration tools: motor and drive configuration – application configuration – interface configuration – auto-tuning, auto-phasing – sequencer programming. Project tools: project creation – project management – file-handling services – motor libraries – multilingual software. Diagnostic tools: device control – device monitoring – object dialog window – multi-axis oscilloscope.

66

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

FREELY CONFIGURABLE DRIVE The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive’s non-volatile memory. The XtrapulsPac drive can be controlled: via the fieldbus (CANopen or EtherCAT); via the analog input (analog speed drive); via the PULSE and DIR inputs (stepper emulation); or via the digital I/Os (stand-alone positioner) according to the selected operation mode. To allow Infranor an even more flexible approach to servo-controller, servo-amplifier solutions, the company also has the XtraPulsCD1 servo-drive. XtrapulsCD1-a alldigital servo-modules are PWM servo-drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block, including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a’s drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. With a resolver sensor feedback, the motor’s absolute position value over one revolution is available and the

servomotor can immediately be enabled after the drive power up. With a ‘SinCos tracks’ sensor that provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and of a period equal to the motor pole pitch, the servomotor can be immediately enabled after the powering of the drive. Having an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servomotor can also be immediately enabled after the drive power-up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power-up before the motor enabling. As it has an incremental encoder + Hall Effect Sensors (HES) feedback, the motor-phasing procedure is no more necessary and the servomotor can immediately be enabled after the drive power-up. With an absolute single-turn, multi-turn or linear encoder using the EnDat® or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servomotor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution (ppr) and 16,384 pulses per revolution can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The auto-phasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L

FURTHER INFORMATION info.uk@infranor.com www.infranor.com


Infranor Mavilor SA have the engineering capability and specialist technology to make you a bespoke motor that matches your requirements, using a wide range of 12 different motors families. Offering Radiation hardened options, Military Spec Options, Vacuum, Environment Options, Wash-Down Series Available, Explosion Proof Series, Wind Generation Options, Linear Motors, Generators and much more!

Specialists in Servo Design & Bespoke Engineering

Infranor DRIVES offer a wide range of compact and flexible AC servo-controllers with outstanding capabilities. With different power ranges available and numerous interfaces, they are well suited for the use in various types of machines and installations.

They provide functions to cover a wide range of single and multi axes systems. Making the XtraPulsPac and XtraPulsCD1 servo drives can be seamlessly adapted to your application.

info.uk@infranor.com www.infranor.com +44 (0)208 144 2152


Company Profiles

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

For safe, secure and uninterrupted activity, see Axis Communications & Digital Barriers at Counter Terror Expo Visit Axis Communications and its partner Digital Barriers at Counter Terror Expo (29-30 April 2014, Olympia, London) to learn more about how the companies’ solutions will help you improve operational efficiency and security. Digital Barriers works with governments, multinational corporations and system integrators around the world. Its technologies have been successfully proven on some of the most demanding deployments across multiple sectors, including border and force protection, transportation and public safety, critical infrastructure and natural resources, and specialist areas of defence and law enforcement. At Counter Terror Expo, Digital Barriers will demonstrate SafeZone-edge – its new i-LIDS®-approved primary detection system for operational alert use in sterile zone monitoring applications. With its advanced analytical engine, SafeZone-edge is able to detect reliably in even the most difficult environments. It avoids the cost and complexity of servers by undertaking the video analysis on the camera. Networked video surveillance is a cost-effective way of increasing the level

of safety and security within a critical infrastructure environment. Regardless of whether you manage a solar plant, an electrical substation or a waste management facility, there is an Axis solution that suits your needs. With Axis network cameras, you have the ability to: detect, locate and identify intruders at the gate, along the perimeter and all the way into the critical room; maximise the use of modern megapixel security cameras, thanks to multi-view streaming and digital pan/tilt/zoom; benefit from operator-controlled pan/tilt/zoom patrolling, auto tracking where the camera automatically follows a moving person or guard-tour where the camera moves automatically between preset positions; record highly detailed video scenes with HDTV-image quality for future analysis; use thermal cameras to detect people, vehicles and incidents even in complete darkness; and get the most out of intelligent video analytics, thanks to Axis’ unique platform, which also allows third-party analytics applications to be uploaded to each camera. Axis is the market leader in network video and a driving force behind the

shift from analogue to digital video surveillance, which paves the way for a more secure, smarter and safer world. Axis Communications offers network video solutions for professional installations, featuring products and solutions that are based on innovative and open technical platforms. Visit Axis Communications and Digital Barriers at Counter Terror Expo (29-30 April 2014, Olympia, London), on Stand E45. FURTHER INFORMATION www.axis.com

POLMIL® on-ground temporary security fence systems meet stringent requirements for protecting venues Blok N Mesh UK originally designed POLMIL® fencing to successfully protect 25km of temporary perimeters, and infrastructure, at 28 London 2012 Olympic venues. Extensive further development has significantly increased the system’s capability to withstand hostile vehicle attack (PAS 68), and the threat of ‘mob’ attack associated with confrontational temporary mass gatherings. Every installation presents a fence line with different challenges and obstacles to overcome. The modular POLMIL system is sufficiently flexible to maintain its integrity, whether deployed on undulating farmland, angular urban streets or even sandy beaches. The basic components comprise of: a fully framed round-top panel to minimise deflection, with lockable zero trip base, fully adjustable brace support and ultra-wide cover meshes to protect panel joins. This configuration allows the fence panels to be held vertical, even when traversing sloping ground. On-ground stabilisation of the system is provided by a choice of independent ballast options using concrete, sand or water. This means the most appropriate ballast can be selected to suit each site’s specific requirements and environmental

68

COUNTER TERROR BUSINESS MAGAZINE | Issue 17

considerations. The anti-terrorist specification presents a formidable climbing obstacle to would-be intruders and, using heavy-duty 358 Prison weldmesh, prevents any significant ‘pass-through’ or ‘pass-under’ risk. POLMIL systems have been tested, utilised, and proven compatible with leading CCTV and perimeter intruder detection systems (PIDS) on multiple global event venues. Whilst forming an effective deterrent, the POLMIL system is also aesthetically pleasing, quick and easy to install, replace and adapt, and 100 per cent sustainable. Furthermore, the standard powder-coated finish means it can be coloured to promote

corporate image or simply enhance the overall ‘look and feel’ of an event. Fully adjustable on-ground vehicle gates and multiple crowd ‘blow-out’ gates are available, together with various pedestrian access/egress door options. In addition to providing the standard range of POLMIL fencing, Blok N Mesh is an expert in the design of bespoke solutions to meet specific venueextraordinary challenges, such as fencing up stairways, along bridge parapets or even into the ocean. A new ‘narrow footprint’ fence system supported by highway vertical concrete barriers has recently been specifically developed, and approved, for use at Heathrow Airport. The POLMIL range is manufactured by Blok N Mesh UK, supplier of perimeter security fencing to the London 2012 Games (Olympic venues), will be exhibited at Counter Terror Expo (2930 April 2014, Olympia, London) and IFSEC: International Fire and Security (17-19 June 2014, ExCeL London). FURTHER INFORMATION Tel: 01376 332 591 www.polmilfence.com


www.defencebusiness.com | ISSUE 7

THE BUSINESS MAGAZINE FOR DEFENCE

NEWS: TASK FORCE HELMAND DISBANDED | HAMMOND DEFENDS BUDGET-CUT CRITICISM

EVENT PREVIEW

GET SET FOR EUROSATORY The largest international land, defence & security show hits Paris on 16-20 June

EVENT PREVIEW

DEFENCE AEROSPACE SHOWCASE An insight into this summer’s Farnborough International Airshow

EVENT REVIEW

PROTECTED MOBILITY

What was on show at the International Armoured Vehicle event?


MILITARY BUILDINGS


AFGHANISTAN

Task Force Helmand disbanded April 1 saw the disbanding of the UK military’s headquarters in Helmand following eight years of front-line operations. The base’s functions have been relocated to the larger Regional Command (South West), run by the US military. Brigadier James Woodham, commander at Helmand, said: “This is a significant moment in the drawdown of British Forces in Afghanistan. It has been an honour to serve as the last Commander of Task Force Helmand and command the soldiers of 7th Armoured Brigade, The Desert Rats, on operations. “The Task Force has achieved so much since 2006 and I pay homage to all of those who have served under the Task Force. “We are leaving Helmand in a better place and the Afghan National Security Forces are well set to continue to deliver security READ MORE: to the tinyurl.com/mtpw9ep region.”

WEAPONS

Ukraine cuts Russian military ties Ukraine has formally decided to cease supplying weapons and military equipment following the cessation of Crimea. This is likely to affect Russia’s military sector significantly, as the country depends on Ukraine for 87 per cent of its military imports. Prime Minister Arseniy Yatsenyuk said: “We won’t produce weapons and then sell it to the country which is invading our territory and uses these READ MORE: armaments to tinyurl.com/ph2f3l9 shoot at us.”

ARMED FORCES

New Afghanistan deployment in June The next deployment of UK armed forces to Afghanistan is due to take place in June 2014, Defence Secretary Philip Hammond has announced. Roughly half the units deployed at that time will be commanded by a UK one‑star within the US Marine Corps commanded headquarters, with the remainder deployed in Camp Bastion, Kandahar and Kabul. The deployed forces will include members of 20th Armoured Brigade Headquarters, 854 Naval Air Squadron and 26th Regiment Royal Artillery. This is to be the final phase of the UK’s combat READ MORE: operations in tinyurl.com/p8jbxxt the country.

DEFENCE REPORT

Defence Committee report highlights need for a complex deterrent capability Defence Committee has said in its annual report that the UK Armed Forces should “retain a deterrent capability against new threats. “ This deterrent strength derives from the ability of the Armed Forces to project military power, it is claimed. Chairman of the Committee, the Rt Hon James Arbuthnot, says: “Deterrence must be credible to be effective: Britain has to show the capacity and the will to respond proportionately and effectively to threats at every level. Recent events in Ukraine illustrate the speed with which new threats, and indeed the reappearance of old threats, can manifest themselves.” The report considers cyber defence, arguing that while the Government is right to devote

Defence News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

resources to cyber strike capability, there should be more clarity regarding how an appropriate response can be effected. Speaking about nuclear deterrence, Arbuthnot says: “ [it] must not form the be‑all and end-all of our defence posture. There may be times when it fails, and an attack succeeds. Deterrence needs to take its place alongside a greater emphasis to be placed on resilience and recovery. As the world becomes more multi-polar and less stable and where the certainties of identifying an aggressor may be reduced, we shall increasingly need a more complex READ MORE: security tinyurl.com/jwcjpwh strategy.”

FINANCE

Hammond dismisses latest defence cuts criticism

Defence Secretary Philip Hammond has dismissed concerns over the latest round of defence cuts. General Sir Richard Shirreff had said that the 20 per cent reduction in regular troop numbers currently underway was “one hell of a risk.” Hammond responded: “Of course we’ve had to take some very tough decisions,” he said. “But we are working with the military chiefs to make sure that we prioritise our very large defence budget, invest it in the areas that are going to matter in the future. “I recognise that sometimes that has meant we’ve had to take decisions that have upset some people about legacy capabilities but we’re looking to the future, not the past.”

Philip Hammond: “We are working with the military chiefs to make sure that we prioritise our very large defence budget”

READ MORE:

tinyurl.com/o3g8knu

EMPLOYEE INCENTIVES

‘Help-to-buy’ house incentive scheme for military personnel The government has launched the new Forces Help to Buy (FHTB) scheme which will offer regular service personnel loans of as much as 50 per cent of their salary to help them buy their own homes. This is part of the new employment model (NEM), an initiative aimed at improving conditions for military personnel. Chief of Defence Personnel, Lieutenant General Andrew Gregory, said: “Through our work on the new employment model and the

armed forces covenant we are continually striving to make improvements to those aspects of life outside of service which we know can be adversely affected by life in service. In particular, we are keen to address the demand for greater stability, including access to home ownership, and an improved ability to exercise choice in the way our READ MORE: people live tinyurl.com/lpugdkv their lives.”

Issue 7 | DEFENCE BUSINESS MAGAZINE

71


UFED Series REDEFINING MOBILE FORENSICS UFED Series extends its platform options for lab and field personnel to Standalone, PC-based and Turnkey solutions

NEW! UFED 4PC PC-based all-in-one software tool

www.ufedseries.com sales@cellebrite.com

UFED Touch Standalone extraction tool for the lab or field

NEW! UFED TK Turnkey solution on a Panasonic Toughbook® or Toughpad®


EMERGENCY RESPONSE

Multi-agency air rescue exercise takes place in Cardiff Bay, Wales Members of the Royal Air Force Search and Rescue Force have taken part in a multi‑agency exercise in Cardiff Bay. The exercise saw the RAF join forces with Cardiff Harbour Authority, the Martime and Coastguard Agency, South Wales Fire and Rescue, South Wales Police and the Welsh Ambulance Service, to respond to a collision involving two vessels. Some people were reported to be in the water and some were unaccounted for. The exercise was designed to test the response a major incident involving a person

in grave and imminent danger requiring immediate assistance. An RAF team member said: “It’s of great value when we get involved with this type of exercise as it allows us to work closely with other agencies. It’s very important that we all have an understanding of each other’s operating procedures and capabilities, which ultimately ensures that should this happen for real we can step right in and work together READ MORE: more tinyurl.com/n3jzrv3 efficiently.”

DEFENCE ROBOTICS

MoD robot to test protective equipment A robot has been built using advanced lightweight materials developed for Formula One racing cars, to test protective equipment for the MoD. Named ‘Porton Man’ after the home of the Defence Science and Technology Laboratory (Dstl), at Porton Down in Wiltshire, he is able to walk, march, run, sit, kneel and can even lift his arms to sight a weapon like an infantry soldier. More than a hundred sensors all over the robot’s body record data during tests, enabling scientists to carry out real-time analysis on equipment such as chemical and biological suits in a realistic but secure environment.

Jez Gibson-Harris is the Chief Executive Officer of i-bodi Technology in Buckinghamshire, the company that designed and built the mannequin, said: “Our brief was to produce a lightweight robotic mannequin that had a wide range of movement and was easy to handle. Of course there were a number of challenges associated with this and one way we looked to tackle these challenges was through the use of Formula READ MORE: One tinyurl.com/mrvh6ky technology.”

NEWS IN BRIEF Scottish brigade undergoes role change

Defence News

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

In March of this year, 51 (Scottish) Brigade was renamed 51st Infantry Brigade and Headquarters Scotland. It has become the Army’s first Adaptable Force Brigade, which is to be used in tasks like overseas Defence Engagement and UK civil engagement. READ MORE:

tinyurl.com/nwrp5eu

Soldier pay criticised The Armed Forces Pay review Body (AFPRB) has said that some military personnel may be on wages equivalent to less than minimum wage. While service personnel are exempt from minimum wage rules, the Ministry of Defence says it aims to follow the “spirit” of these rules. The lowest basic salary for soldiers is £17,767, which amounts to £7.33 an hour for a standard 46 hour week, but which does not reflect the long hours worked by many soldiers posted overseas. A soldier on this rate working 54 hours a week earns less than the national minimum rate of £6.31 per hour The MoD responded: “We have worked hard to ensure that the sacrifices and dedication of our personnel is recognised, which is why they have continued to receive pay rises and also qualify for other benefits, including subsidised accommodation, generous non-contributory pensions and substantial periods of paid leave. “It is, therefore, entirely misleading to suggest that personnel earn less than the minimum wage.” READ MORE:

tinyurl.com/ownool8

First air-to-air refuelling exercise takes place

READ MORE:

tinyurl.com/p22kuqj

$36 billion ‘wish list’ for US military The US Department of Defence has requested $36 billion in priority items not included in the Pentagon’s 2015 budget proposal. The wish list includes many items that also feature on the White House’s Opportunity, Growth and Security Initiative (OGSI), such as eight Boeing P-8 maritime patrol aircraft ($1.1 billion, pictured above). Commentators say these requests are not likely to be met. Gordon Adams, an analyst who coordinated defence budgeting during the Clinton administration said: “It’s not going to happen.”

The first European air-to-air refuelling training exercise took place in Eindhoven in March. Aircraft and crews from Germany, Italy, and the Netherlands participated in the training simulation of a modern air combat environment. This was part of a European Defence Agency (EDA) initiative to improve AAR capabilities in Europe, which has lagged behind the US in this area. READ MORE:

tinyurl.com/q56nqjj

Issue 7 | DEFENCE BUSINESS MAGAZINE

73


QUALITY DESIGN • QUALITY MATERIALS • cast standard (UK government endorsed)

Blunt Trauma Protection Tested and certified to uk government (CAST) standard

Solo Shields Bespoke specification available

Scorpion Interlock Shields Public Order Batons

003

FM 56364 BS.EN.ISO 9001:2000

DMS Protective Equipment Ltd Lingen Road, Ludlow Business Park, Ludlow, Shropshire SY8 1XD. United Kingdom Tel: +44 (0)1584 874679 Fax: +44 (0)1584 876013 Email: enquiries@dmsplastics.co.uk www.scorpionppe.co.uk


Farnborough Airshow

EVENT REVIEW

THE FORUM FOR AEROSPACE

The Farnborough International Airshow on 14-19 July at Farnborough Airport, offers a meeting place for leading figures in the global aerospace industry. Here is a look at the highlights By the close of the Farnborough International Airshow in 2012, the event saw US$72 billion of confirmed orders and commitments covering a total 758 of aircraft. Over the course of the five trade days, over 109,000 visitors attended the show’s 1,500 exhibitors. From main frame manufacturers to specialist products the Farnborough International Airshow still remains the leading trade event on the aerospace calendar. Once again, the 2012 show saw a catalogue of high-profile firsts. Most significantly, there was the announcement of £120 million investment in the aerospace industry by the British Government. Announced at the show by Secretary of State of Business, Innovation and Skills, Vince Cable, MP, and further endorsed by Prime Minister, David Cameron who opened the show, the investment, is a significant step to maintaining the UK’s market position as number one in Europe and second only the US globally. Virgin Galactic, Richard Branson’s brainchild for commercial space travel also chose FIA2012 to make its European debut of

Spaceship 2 and announce ‘LauncherOne’, its new air-launched rocket specifically designed to deliver small satellites into orbit. And, for the first time in Airshow history, Boeing Commercial Airplanes participated in the flying display, showcasing its Boeing 787 Dreamliner at the show.

80 per cent of those surveyed considered FIA essential to their businesses. In planning for 2014, FIA organisers Farnborough International Ltd (FIL) continue to improve and develop features that allow visitors and exhibitors alike even better networking opportunities. This has seen the development of dedicated zones in Space, Intelligent Systems (previously the unmanned systems showcase) and innovation, a targeted conference programme, a Meet-the-Buyer event, and Civil and Military Delegations programmes. The show is now 95 per cent sold with confirmed participation from all the major commercial and defence manufacturers including Airbus, Boeing, Bombardier, Embraer, Finmeccanica, GKN, Lockheed Martin and Rolls-Royce. E

The ough Farnbor ional Internatallows Airshowry to keep st the indu-date with up‑to ends, new tr market ucts and prod tions innova

A UNIQUE EVENT So why does the industry choose the Farnborough International Airshow? Quite simply, it’s the meeting place for the aerospace industry. No other event allows visitors and exhibitors the opportunity to meet new and potential business partners, colleagues and existing business customers. Furthermore it allows the industry to keep up to date with market trends, new products and innovations. In a survey of visitors to the 2012 show, over

Issue 7 | DEFENCE BUSINESS MAGAZINE

75


INDUSTRIAL OPTICAL SYSTEMS DIVISION

H63ZME-F-HD-PR01 63X ZOOM LENS

RICOH ENHANCED BINOCULARS

...for Security Installations

...for perfect mobile Security

The lenses zoom range is 20 to 1,250 mm, and when the internal 2X extender is switched in, the focal length increases to 40 to 2,500 mm. With 2,500 mm focal length at 1,000 m distance, the field of view is 2.5 m by 1.9 m. The extremely high magnification in combination with HD resolution means a person can be identified at distances in excess of 1 km. Therefore, this lens is ideal for video surveillance in city centers, air ports, harbours, as well as at the border, intersections, city streets and highways. The integrated PAIR Technology reduces the affect of particles in the air, such as fog, rain, sand, smoke and snow.

The perfect solution for enhanced mobile security: Digital binoculars with electronic image stabilisation for clear viewing without image shake even in fog or after dark. Designed to give you a clear view of the subject you want to look at, even in the harshest of environments. Equipped with water and dust-proofing and a functional design that is easy to use even with gloves on! Records still images and videos of the scene, straight to SD card. Displays latitude and longitude of the scene via on-board GPS technology. Integrated PAIR Technology allows liquid and solid interference to be reduced for a clearer, sharper view.

Atmospheric Interference Reduction

Atmospheric Interference Reduction

Up to Full HD Resolution

Up to 2,500 mm Focal Range

Day & Night

High Speed Motors

RICOHIMAGING IMAGINGUK UKLtd Ltd. RICOH Industrial IndustrialOptical OpticalSystems SystemsDivision Division Heron Drive, Langley, Slough SL3 8PN, Heron Drive, Langley, Slough SL3 8PN, UK United Kingdom Office: +44+44 (0)1753 211071 Telephone: (0)1753 211071 Email:iosd@eu.ricoh-imaging.com iosd@eu.ricoh-imaging.com Email:

2 Megapixel

Image Stabiliser

Night Vision

GPS & Electronic Compass

Video Recording

Waterand Dustproofing

PLEASE CONTACT US FOR MORE DETAILED INFORMATION ON OUR PRODUCTS OR VISIT OUR WEBSITE

www.ricoh-mv-security.eu www.pentax-security.com


EVENT PREVIEW  DISPLAYS Key highlights over the last few months include new international pavilion participation from Tunisia, Norway and Malaysia; Gulfstream returning to the show after a two show absence; and a number of exhibitors increasing their exhibition space including GE and Irkut. Additionally, the Space Zone has further expanded to accommodate additional exhibitors and FIL has negotiated a number of multi-show deals with exhibitors including Thales, Martin Baker and Boeing further reflecting the strength of the international showcase. The flying display is naturally another fundamental reason why FIA remains so popular. Located at the Farnborough Aerodrome in Hampshire, the site is long steeped in aviation history from the first powered flight by Samuel Cody in 1908 to the testing site for the Hawker Hurricane. Home to the show since 1948, the airfield sits on a natural amphitheatre and the hospitality chalets are built on its terraces

along the run-way allowing perfect viewing of the air display. It’s the perfect venue for mainframe manufactures to display their latest in military and commercial hardware. AT THE FOREFRONT So while the Farnborough International Airshow continues to be highly regarded and every effort is made to facilitate business for exhibitors and visitors at the show, airshow organisers, FIL are aware of new competitors in its wings. As champions for the UK aerospace industry and central to showcasing British expertise to an international audience, FIL understands the importance of maintaining FIA’s leading position. As such, the event specialists have embarked on an ambitious site development programme that will see the construction of permanent A Row chalets and a purpose built exhibition hall – delivering a much awaited departure from temporary structures familiar to the show. The permanent chalet buildings on A Row will be fit

Home w ho to the s 8 and 4 since 19n aviation i steepedFarnborough history, rodrome Ae atural n a n o sits eatre ampith

for purpose, offering greater benefits to customers including reduced fit-out costs, on-site parking and permanent mains power, water and waste facilities. FIL has already been awarded £2.5 million in funding from Enterprise M3 Local Enterprise Partnership allowing FIL to push forward with the A Row Chalet project. Groundwork, started in August and construction is due to be completed by May 2014 allowing plenty of contingency and fit‑out time for the impending 2014 Farnborough International Airshow. FIL are currently bidding for funding which on top of its own capital expenditure will see the construction of the permanent exhibition facility.

Farnborough Airshow

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

REGISTERING The Farnborough International Airshow will take place from 14-19 July 2014. Exhibition space is still available if organisations are still interested in participating at the show and trade visitor passes are on sale with an opportunity to win a Breitling Watch. L FURTHER INFORMATION www.farnborough.com

Issue 7 | DEFENCE BUSINESS MAGAZINE

77


TM

More Than Just A Monitor

TM

The Only Field – Upgradable Transport Monitor

That You Can Change as Needs & Technologies Evolve

Ultrasound, video laryngoscope & new algorithms are the first of many new capabilities to be introduced*

Easy & intuitive data collection & sharing; soon to incorporate user configurable summary record of care & the newly adopted joint TCCC card* Tempus Pro:

• Has the longest battery life (over 10 3/4 hours monitoring all parameters)**; • Is the most compact; • Is the most durable & rugged vital signs monitor available.

Call us now for more information: Tel: +44 (0) 1256 362400 or e-mail: info@rdtltd.com TP A 0214 www.rdtltd.com Tempus Pro and More Than Just a Monitor are trademarks of Remote Diagnostic Technologies Ltd © Remote Diagnostic Technologies Ltd 2014. * Pending FDA & CE Mark ** Default display brightness, ECG, SpO2, ETCO2, IP x 2, temp x 2 and NIBP every 15 minutes. Subject to conditions of storage and use, times are approximate.


EVENT PREVIEW

Eurosatory 2014

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

AN EVENT FOR AIR-LAND DEFENCE PROFESSIONALS The biannual Eurosatory event (16-20 June, Paris) brings together defence industry experts from all over the world. Here is a preview of some of this year’s highlights Founded in 1967 on the Satory plateau in Versailles, Eurosatory is currently the largest international land and air-land defence and security exhibition. Held once every two years, in 2012 the exhibition welcomed over 53,480 professional visitors, from 130 countries who came to meet the 1,432 exhibitors from 53 countries, under the keen eye of 684 accredited journalists, from all five continents. Initially dedicated to defence issues, Eurosatory has gradually opened up to the realm of security as most exhibitors produce systems for both sectors. While the contexts of use differ greatly between defence and security, there is real technological continuum between the products. This can clearly be seen from a review of the techniques used in the two fields: unmanned vehicles, surveillance cameras, all-terrain vehicles, communication means, flak jackets, emergency medicine in crisis situations, etc. WHAT’S NEW FOR 2014? Eurosatory strives to present the entire international offering and the whole Land Defence & Security industry and supply chain,

from raw materials to finished products. The exhibition will endeavour again to cover the full spectrum of Defence and Security equipment in all price groups,from new, complex and high-ticket advanced technology systems, to more affordable and tried-and-tested solutions, that particular countries prefer. Eurosatory aims to maintain and develop the exhibition’s security section, which is actually linked to the defence domain through technology. This growing focus on security also brings new visitors either from Government departments seeking to equip emergency response forces, or from the private sector, scouting for solutions for people and assets security. For new exhibitors, a “Discovery Village”

will be set up for very small businesses taking part for the first time in Eurosatory. Featuring 6m² fully-fitted stands, it is an opportunity to discover and benefit from all exhibition’s features and audience at the lowest cost. AN EVOLVING INDUSTRY The defence and security sectors are changing rapidly worldwide. While some countries are reducing their defence expenditure, others are increasing it considerably. Security overall is gaining in importance everywhere, with consistent development in homeland security and growing investments by companies operating in industry, transport, leisure, etc. Eurosatory closely monitors these changes and invites new categories of defence and security buyers to each exhibition. South-East Asia and Latin America are the markets of the future, without a doubt. And new industrial players have also joined the community. Industrial manufacturers make a point of unveiling their latest products at the event. E

d Founde nd a in 1967 y two er held ev rosatory u years, E largest is the nal land tio interna air-land and security e c n e f de on exhibiti

Issue 7 | DEFENCE BUSINESS MAGAZINE

79



EVENT PREVIEW  The future equipment and technologies of the world’s armed and security forces can thus be discovered. At Eurosatory 2012, 400 new products yet to be presented at an exhibition were on display. It is also the venue for meetings with engineers, manufacturers, political decision-makers and specialist journalists from all over the world. Such dialogue is possible at Eurosatory only. The authorities are convinced too, since 152 official delegations from all over the globe, i.e. 672 top-level VIPs including 12 Ministers, 10 Secretaries of State, 20 Chiefs of Staff and 18 national armaments directors attended the last event. AIR AND LAND SYSTEMS Air-land has long been a key focus at the exhibition. In 2012, there were over 70 tactical UAVs, almost all air-defence systems, several helicopter manufacturers and all the equipment used by airborne troops and security forces. In 2014, the ALAT (French Army Air Corps) has selected Eurosatory to celebrate its 60th anniversary. International Army Aviation delegations from numerous countries will be invited for the occasion and will spend several days at the event. Being a land and air-land exhibition, Eurosatory presents both complete systems

The forthcoming event looks set to be highly international with two thirds of exhibitors coming from abroad and representatives of new countries like Japan and Argentina available from prime manufacturers and their component sub-assemblies – such as weapon systems, engines, gearboxes and C4ISR systems – provided by equipment manufacturers. Simulation, including every dimension of armed forces training, preparation and evaluation, is also greatly represented with more than 200 exhibitors in 2012. CONFERENCES On the discussion side, Eurosatory is developing its conferences. In particular it will be holding the SIMDEF seminar on “Simulation, a means to preserve operational potential” organized by ADIS, the European Club for Countertrade & Offset (ECCO) symposium on trade with Turkey and the Land Operations Forum. Eurosatory 2014 will also feature an extensive cycle of short specific conferences, focusing on visitor and exhibitor concerns. These highly international conferences last less

Eurosatory 2014

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

than two hours and punctuate the five-day exhibition programme. Given by operational, industrial, media and expert speakers, as well as high authority representatives, they are classified into three categories: Eurosatory conferences, Exhibitor conferences and “Do business with” conferences. Among the Eurosatory conferences, we can already highlight the SIMDEF 2014 simulation seminar on “Simulation – a means of safeguarding operational potential” organised by ADIS Group. This theme will be addressed both through a cycle of conferences involving exhibitors from the sector, and live demonstrations at various stands. EUROSATORY TV 2014 will the introduction of Eurosatory TV, broadcast on a network of 18 digital indoor screens which will ensure a dynamic and flexible means of broadcasting information throughout the exhibition. The network will comprise four giant E

81


The World’s only multi-piece rubber runflat.... Requires no special tools......Installed in minutes The flexibility of rubber is the ONLY material choice that will meet the standards for a military runflat and, until now, these have needed a special machine to change the tyres. Introducing a British invention - the Tyron ATR which does not!

Tyron ATR - solving your logistical issues

Tyron ATR (All Terrain Runflat)

Tyron R4 - Double beadlock wheel and runflat systems for 4 x 4 and armoured vehicles.

Tyron R6 - 16� tubeless, splitrim, steel wheel and runflat system for buses and cashcarrying vehicles. Tyron Multi Band - the low cost, short distance runflat system. Approved by NATO and used by the MOD.

www.tyron.com


EVENT PREVIEW  state‑of-the-art indoor LED screens, two of which will be in excess of 20 square metres in size and 14 branded LCD POD screens which will be strategically placed in all of the key restaurant, cafe and dwell points throughout the exhibition halls. Serving the show as the core medium for the broadcast of up-to-the-minute information, Eurosatory TV will display a select and focused mixture of breaking show news, results from the conference and seminar timetable, interviews of company leaders, live demonstrations teaser and all major events on the show. In addition to the organiser and generic show content produced by Aero3A, there will be limited availability for a select number of exhibitors to enhance their presence at the show by utilising the bespoke airtime packages provided by Limited Space Events. All commercial airtime packages will operate on a first-come, first-served basis.

Eurosatory 2014

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

ion, Simulat every g includinsion of dimen s training force armed greatly is ed with t n e s e r rep an 200 h t e r o m rs exhibito

BUSINESS DEVELOPMENT The eighth ECCO symposium (European Club for Countertrade & Offset) will also be held at Eurosatory. This international organisation boasting 70 members of 16 different nationalities works to promote the knowledge and experience of firms involved in offsets and countertrade. At Eurosatory 2014, the emphasis will be placed on trade with Turkey. As usual, the six Land Operations Forum conferences will address very concrete technical topics of interest to ground force deployment. The Exhibitor conferences provide a dedicated arena for exhibitors to present their products or systems. And the “Do Business With” conferences, also organised by the exhibitors, allow them to highlight their industrial strategy and their purchasing policies and standards to attract subcontractors. In addition to the conferences, Eurosatory offers a range of business-development services. “Strategy consulting” and “One‑to‑One Business Meetings” (organised this year by the Paris Chambre de Commerce et d’Industrie) are major levers. The aim is to help very small, small and medium‑sized firms develop their business abroad, wherever they are based, either by obtaining geopolitical information via the Think Thanks village, or by meeting with experts from their target countries. Pre-scheduled appointments with international prime contractors are also highly productive. CLUSTERS Exhibitors positioned on particular technology niches can gather into clusters to improve E

Issue 7 | DEFENCE BUSINESS MAGAZINE

83


HIGH MOBILITY RANGE Always delivers.

Visit us on Stand D501 at Eurosatory and at DVD at Millbrook on Stand OR-24

Iveco DV’s range of Multirole Vehicles, Tactical and Logistic Trucks and Armoured Fighting Vehicles covers the full spectrum of on- and off-road military requirements and represents a well thought through, comprehensive and effective response to the needs of the military customer. Iveco recognises that this needs change in response to the evolving operational environment, developing doctrine and changing threat. As a part of the company’s commitment to our custo-

Iveco S.p.A. Defence Vehicles I-39100 Bolzano - via Volta, 6 +390471905111 - dvdbzcom@iveco.com

mers’ needs, we aim to identify or anticipate at an early stage how requirements are likely to develop. As a result, the whole product range is subjected to a continuous development process. Evolving needs are fed back to Engineering, who in turn develop a steady stream of enhancements in terms of payload, mobility and protection. Where necess ary, complete new vehicle families are developed.

Iveco Defence Vehicles UK Iveco House, Station Road - Watford WD17 1SR Hertfordshire +44 1923259728


EVENT PREVIEW Eurosatory 2012 Eurosatory: the largest exhibition of land Defence and Security in the world. Every two years, companies large and small gather with armed forces and government officials from all five continents outside Paris. The last edition held from 11 to 15 June 2012. More than an exhibition, Eurosatory is a platform for international exchange dedicated to all specialists of land and airland Defence and Security. In 2012, 70 per cent of exhibitors and 48 per cent of visitors were foreigners. For one week, the entire “supply chain” could be found at the show. This was an opportunity to meet the Armed Forces and Security Services (end users), the industrial sector, and the 152 official delegations from 84 countries. Despite a difficult economic environment, Eurosatory once again pulled off a strong performance in 2012. The numbers speak for themselves: 1432 exhibitors trusted us, which is eight per cent more than in 2010.

Eurosatory 2014

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

Visitor numbers were stable, but the proportion of foreigners increased up to 48 per cent. Furthermore, this year we met our objectives in terms of expanding security offer, with 30 per cent of exhibitors from this area. Finally, with over 370 new products presented at the exhibition, Eurosatory is the No. 1 show in the world in terms of product launches. There were 684 journalists covering the event. Defence and Security remains a dynamic sector: when some countries need to reduce their defence capabilities, the same need to expand their security capabilities. Moreover, new countries joined the tradeshow: Cyprus, Libya and Pakistan, bringing the overall number of exhibitors countries represented to 53. Five new pavilions were also represented for the first time: Indonesia, Korea, Pakistan, Turkey and United Arab Emirates. Each Eurosatory session is a first choice opportunity for manufacturers from the D&S sector.

 their visibility and be more easily identified by visitors (highlighted signs), with dedicated conference area set aside. These technology clusters prove highly useful for visitors. Among the clusters will be one focusing on simulation and training and the key issues in this area. The nature of conflicts and situations confronting the armed forces has changed, and simulation is an economical solution in line with budget reductions. Today simulation technologies offer training conditions identical to reality, at lower cost. Another cluster will look at civil security and emergency response. In the face of an increasingly broad spectrum of threats, providers of partial or integrated solutions are gathered in a single location, to present specific or global responses to the security forces, governments, non‑governmental bodies and industry, as well as the transportation sector and organisers of leisure activities. Visitors to Eurosatory will be able to meet key players in this domain, networking with high-level decision makers from governemtns and NGOs. Other technology niches will look at: CBRNe; UAVs and UGBs; critical infrastructures and sensitive facilities protection; embedded electronics; and measurements, tests and testing centres. PREPARATIONS UNDERWAY To briefly review the exhibition preparations, the marketing is going very well. Over E

Issue 7 | DEFENCE BUSINESS MAGAZINE

85



EVENT PREVIEW Eurosatory 2014: planning your visit Eurosatory 2014 will gather some 1,550 exhibitors on more than 150,000m² with two indoor exhibition halls, a large outdoor exhibition area and a live demonstration area. A business visit to Eurosatory deserves careful preparation. To optimise your time on the exhibition, the organiser provides you with the most updated web and mobile technologies: within the months preceding the exhibition opening, visitors will benefit with online access to the catalogue. The catalogue will feature: List of exhibitors, advanced research options on interactive exhibition map, “Exhibitor-Visitor Contact” form, and a mobile version of these applications on smartphones. Through the online Catalogue, Visitors will feature:  access to (and print online description datas of each Exhibitor;

 browsing

by themes, stand numbers, countries, activities, etc.;  access to (and print online) the Exhibitors list;  location of Exhibitors on the exhibition map;  visit preparation through Exhibitor‑Visitor Contact Services. The Eurosatory 2014 Official Catalogue will stay online up to 2016.

 95 per cent of space is already sold and more than 1,286 exhibitors were registered as of 20 March 2014. However, it is still early days to draw conclusions. The forthcoming event looks set to be highly international with two thirds of exhibitors coming from abroad and representatives of new countries like Japan and Argentina. With three months still to go, 54 countries are already registered. As for visitors, the registration rate is very promising and much higher than in previous years, but we must remain cautious. The number of official delegations should nonetheless increase significantly and include a high proportion of authorities interested in security. Talking of figures, it has to be said that with 70 per cent of international exhibitors, over 53,000 professional visitors and 68,000 square metres of net stand surface area (figures certified in 2012 by OJS, a recognised independent organisation in Europe), Eurosatory is by far “The World Leading Defence & Security Event”. We look forward to seeking you at Paris Nord Villepinte Exhibition Centre from 16 to 20 June 2014. L

Eurosatory 2014

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

FURTHER INFORMATION www.eurosatory.com

Unique cooking system for survival situations The award winning Zip Military Cooking Fuel is a safe, non-toxic fuel that militaries around the world can use for boiling water to cook food, wash and purify water for drinking. The fuel is made using a unique biofuel formulation which is a highly efficient alternative to more traditional options such as hexamine, gas and alcohol gels. In conjunction with the fuel, a new range of cooking systems has been developed. Together, the fuel and stoves create a unique set of high performance, lightweight cooking systems that target individual soldiers, group units and those cooking in survival situations. There are three stoves in the range: Boilex ‘hinged’ stove: A hinged, flat packed stove which is lightweight and ideal for personal cooking; Boilex ‘Group’ stove: A larger, more robust stove, lightweight and ideal for group cooking and

Boilex ‘All in One’ stove: A unique, flat packed design that folds out into a stove and cup cooking system, ideal for survival situations or simply as a replacement for other heavier, more costly systems. For more information on these innovative cooking systems, visit us at: Hall 5, Stand KJ558 within the UK Pavilion at Eurosatory, Paris, 16-20th June 2014. FURTHER INFORMATION Contact: Keiron Francis, Zip Military Specialist Tel: +44 (0)1372 360833; Mobile: +44 (0)780876114 www.zipmilitaryfuel.com

Issue 7 | DEFENCE BUSINESS MAGAZINE

87


Infranor UK Drive & Motor Repairs Specialists in Old and Obsolete Drives

Our Engineers will provide a comprehensive service finding the solutions to your equipment breakdowns.

An easy to use service—that could save you new equipment! Infranor Uk offers their customers excellent support services to find the best practical solution available to suit their requirements.

Why Use Infranor Repairs?  Fully equipped repair lab to Identify faults and component failures  Manufacturer of Specific Test Rigs  Diagnostic Tools  Fast turnaround service  Repairs are given function tests with dynamically loaded motors  On-Site Service and Support With more than 35 years accumulated experience incorporating all stages of design and production enabling us to offer a broad range of knowledge to repair your motor/drive restoring it to its original high performance. +44 (0) 208 144 2152

info.uk@infranor.com


SERVO CONTROLLERS

THE CUTTING EDGE IN SERVO CONTROLLERS

Advertisement Feature

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

Infranor’s new 230 and 480V AC servo-controller, the XtrapulsPac, offers users distinct advantages over competitor devices at an affordable price XtrapulsPac, the most recent addition to INFRANOR’s product range is a very compact and flexible low power AC servo-controller with outstanding capabilities. It provides functions and interfaces to cover a wide range of single-axis and multi-axes applications. XtrapulsPac can be easily configured as a stand-alone controller in various operation modes. It can also be integrated into an automation system with PLC, CNC or motion controller via the fieldbus and uses wellknown standard functions available in libraries. This flexibility makes it suitable for use in a wide field of machines and applications. All these advantages and many others are available in a very small device at a very affordable price, which meets the most demanding requirements. FEATURES The device has a digital drive for AC synchronous motors. It delivers a current loop of 62.5 μs, a speed and position loop of 500 μs, and closed loop control of position, speed or torque at a max. speed of up to 25’000 rpm. The feedback system comprises: a resolver; an incremental encoder; hall sensor SinCos encoder; and single and multi-turn Hiperface® encoder. The communication interfaces consist of: RS-232 with up to 115.2 kbit/s baud rate; CANopen or EtherCAT® fieldbus; and DIP switches for node address. The devices safety features include: Safe Torque Off SIL 2 I/O interfaces; user configurable digital I/Os; opto-isolated digital inputs; analog inputs of ± 10 V / 12 bit resolution; analog output of 0 - 5 V / 8 bit resolution; “Amplifier OK” output; motor brake control; and two channel STO function. XtrapulsPac’s modes of operation include: DS402 standard modes; Interpolated Position Mode; Profile Position Mode; Profile Velocity Mode; Profile Torque Mode; and Homing Mode. The device also features DS402 extended modes, as well as Analog Speed Mode, Stepper Emulation Mode and Sequence Mode. Other features include: Master-slave Mode; Stand-alone operation; Analog speed drive; Positioner; and Stepper emulation. The device’s electronic gearing has stand alone operation, analog speed drive, positioner, stepper emulation and electronic gearing.

XtrapulsPac has motor and drive configuration, application configuration, interface configuration,auto-tuning/ auto‑phasing and sequencer programming. In terms of project tools it offers: project creation; project management; file handling services; motor libraries; and multilingual software. Diagnostic tools include device control and monitoring, an object dialog window, and multi-axis oscilloscope. XtrapulsPac is a freely configurable drive. The drive configuration includes servo-loop parameters, motor and sensor parameters, communication parameters and I/O configuration parameters. The configuration parameters can be stored into the drive non-volatile memory. CONFIGURATIONS The XtrapulsPac drive can be controlled via the fieldbus (CANopen or EtherCAT), via the analog input (analog speed drive), via the PULSE and DIR inputs (stepper emulation) or via the digital I/ Os (stand-alone positioner) according to the selected operation mode. The following diagram describes the functional architecture of the XtrapulsPac drive: To allow our organisation an even more flexible approach to servo-controller, servo-amplifier solutions we also have the XtraPulsCD1 servo-drive. XtrapulsCD1-a alldigital servo modules are PWM servo drives that provide speed control for AC sinusoidal motors (brushless) equipped with a position sensor. The XtrapulsCD1-a system is available as a stand-alone single-axis block including all supplies as well as the mains filters, and is 230 VAC or 400/480 VAC mains operated. The XtrapulsCD1-a drive can be configured for the feedback of various position sensor types. The appropriate position sensor configuration is selectable by software and saved in the drive. The details are as follows: With a resolver sensor feedback, the motor absolute position value over one revolution is available and the servo motor can immediately

be enabled after the drive power up. With a “SinCos tracks” sensor which provides two analog Sin and Cos signals electrically compliant with the SinCos encoder signals and which period is equal to the motor pole pitch, the servo‑motor can be immediately enabled after the powering of the drive. With an absolute single-turn SinCos encoder feedback (Heidenhain ERN 1085 or compliant), the servo motor can also immediately be enabled after the drive power up. With an incremental encoder only, a motor phasing procedure must be executed at each drive power up before the motor enabling. With an incremental encoder + Hall Effect Sensors (HES) feedback, the motor phasing procedure is no more necessary and the servo motor can immediately be enabled after the drive power up. With an absolute single-turn, muti-turn or linear encoder using the ENDAT or HIPERFACE communication protocols and fitted with incremental SinCos outputs, the servo-motor can also be immediately enabled after the powering of the drive. The motor speed or torque input command is an analog voltage (± 10 V). The rotor position monitor is available as two channels A and B in quadrature, and one marker pulse per revolution. The resolution is programmable. All the values between 64 pulses per revolution and 16384 pulses per revolution (ppr) can be programmed according to the motor speed limitation. All command parameters are programmable by means of a serial RS-232 link (or RS-422 optional) and saved in an EEPROM. The autophasing and auto-tuning functions allow the easy and quick commissioning of the drive. CAN and Profibus options of the XtraPulsCD1 are also available in both 230 VAC and 400/480 VAC mains supplies. L

Pac Xtrapulsasily can be e d as a re configue controller lon stand-a ous operation in vari . It can also modes rated into be integtomation an au em syst

FURTHER INFORMATION E-mail: info.uk@infranor.com www.infranor.com

Issue 7 | DEFENCE BUSINESS MAGAZINE

89


Specialists in Servo Motors, Servo Drives, Systems and Bespoke Engineering.

Your Global Partner for Servo Technology & Design.

info.uk@infranor.com www.infranor.com +44(0)208 144 2152


SLOTLESS MOTORS

ZERO COGGING SERVO MOTORS

Advertisement Feature

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if they significantly improve machine performance. In this article, Infranor looks at the benefits of slotted motors and their applications Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counter parts. Following is a closer look at the technology, plus realistic tips on evaluating whether or not your application could benefit from slotless motor. SLOTTED SERVOMOTOR CONSTRUCTION A traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these; when current flows in the wire, an electromagnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits. BENEFITS OF SLOTLESS MOTORS Higher Torque: A slotless motor’s redesigned stator allows the rotor to be significantly larger, because torque increases proportionally to rotor diameter. Torque from a given slotless motor is significantly higher than that from a similarly sized traditional slotted motor. Due to the absence of teeth, the area available for windings is also greater – which

further increases torque. More specifically torque at a given speed can be increased by up to 25 per cent compared to a slotted motor. Higher Speed: As the magnets pass by the teeth in a slotted motor, a change or modulation in the magnetic flux is created. Which in turn induces voltage in the surface of magnets (e=dø/dt) these magnets are conductive so a current flows in them. These Eddy currents increase exponentially with speed and create heat in the magnets, which in turn diminishes their strength. As slotless motors have no teeth they can achieve speeds in excess of 32.000 rpm. Higher Power: Power is calculated by multiplying torque by speed. Because a slottless motor outputs both higher speeds and torques, it can produce more than twice the power of a slotted motor of the same size. Smoother motion: As the magnets on a slotted motor’s rotor move past the stators iron teeth, they are magnetically attracted. This creates a torque disturbance known as cogging. As there are no teeth in a slottless motor, cogging is eliminated – yielding a smoother motion. Easier Tuning: Motors with larger rotor inertias can be easier and simpler to tune. If the load becomes momentarily decoupled from the motor (a common phenomenon,) the servo loop is less likely to become unstable if motor inertia is high relative

Applications using a mixture of motor technologies available from Infranor Frameless

- Land & Sea Based Gun Systems - Surveillance Radar & Masts - Under Water Cranes

AC Brushless

- Positioning Turrets/Towers - Motion Platforms/ Bases - Aircraft Pilot Controls

DC Brushed

- Vehicle Ventilation, ELLS - Missile system Platforms - Ordinance Storage

DC Brushed

- All Munitions Feeds - Aircraft Pay Load Management Systems

Encoders

- Guidance Systems

to the load. In fact, precise servo tuning and filtering, which can be difficult to achieve, may not be required with a slottless motor. Better Stiffness: A rotor with a larger diameter has greater stiffness because torque increases with rotor diameter and a higher torque motor responds faster to any displacement from the commanded position. The torque displacement curve is steeper. Higher efficiency: All of the above traits boost the efficiency by up to 25 per cent over slotted motors. APPLICATION BENEFITS FOR SLOTLESS MOTORS Higher torque is beneficial for most applications and is often the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money (if the motor is part of a moving component, a smaller motor also weighs less and requires less energy to move.) A motor that can run fast may be the obvious choice for high speed applications such as centrifuges. But faster speeds can also help reduce overall machine cost and help increase machine output. If the machine’s mechanics can handle higher speeds a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. The Xtrafors Prime series is just one of the many exciting ranges of servomotors that are designed and manufactured in Europe and available from any of the global Infranor sales and Engineering teams. L FURTHER INFORMATION E-mail: info.uk@infranor.com www.infranor.com

Issue 7 | DEFENCE BUSINESS MAGAZINE

91


Armoured Vehicles

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

EVENT REVIEW

THE FUTURE OF PROTECTIVE MOBILITY

The International Armoured Vehicles conference in February saw global defence heads, such as the British Army’s Sir Peter Wall, present on all aspects of the armoured vehicle operating environment

The International Armoured Vehicles (IAVs) 2014 conference in February delivered an agenda which included keynote presentations from the UK’s DE&S Minister Philip Dunne, the Chief of the General Staff for the British Army General Sir Peter Wall, and General Sher Mohammad Karimi, Chief of the General Staff of the Afghanistan National Army. The presentations explored all aspects of the armoured vehicle operating environment such as future requirements from nations investing in protected mobility, ideas for how the military and industry can work better together, and alternatives for more cost-effective fleet acquisition in the future. Under the informed direction of Lieutenant General Sir Gary Coward, the Chairman of the conference, the presentations were also considered within a wider defence industrial context, offering practical solutions to contemporary challenges faced by government, industry and the military. For example, during his keynote presentation, Philip Dunne MP said that investment in the UK’s future armoured vehicle programmes will need to focus on a broad set of capabilities to allow for a flexible response to potential conflicts in as yet unknown terrain. “We do not know today where those future flash points will be and we cannot assume we will be in another place like Basra in the future,” said Dunne. “As one vista closes, another opens up – we have to scan the horizon and reset our armoured vehicle capabilities.” BACKBONE OF THE MILITARY The key words for the future are modularity, commonality, and agility as British Forces

92

DEFENCE BUSINESS MAGAZINE | Issue 7

Lt Gen Luiz Felipe Linhares Gomes, Chief of the Brazilian Army’s Programme Management Office, provided an insightful update on his nation’s new VBTP-MR Guarani armoured personnel carrier fleet, currently being manufactured locally with the aim to see 2,044 vehicles produced by 2030. Linhares was keen to meet with several companies who may be able to work on the Army’s plans, but also found that the differing opinions and paths of other nations was a rare chance to compare and assess Brazil’s doctrine for the future . “This is the second time I’ve come here [to IAVs]. The first time, I identified the opportunity to meet the people and talk about our project. It was very good, but this one is better.” Exploring alternative procurement options, a G6 panel of industry experts discussed the possibility of leasing vehicles to governments rather than selling to them outright on Day One of the conference. Andrew Jankel, Chairman of British-based armoured vehicle conversion specialist Jankel, said it is an option the company offers to customers today, but as yet has not seen any uptake. Jankel questioned whether the process would actually deliver any significant cost‑saving to the end user and suggested that perhaps other acquisition models would be more effective. This led a Thales representative to suggest a multi-national based procurement programme, similar to that which had been previously mentioned by Philip Dunne. “Every country needs to own disaster relief vehicles for ever and always,” the Thales spokesman insisted. “But does every country need main battle tanks? Couldn’t countries get together and pool their requirements for specialised equipment? Do we need to own these individually?...I’m not so sure.”

The displays ered nsid were co a wider within ndustrial i defencet, offering contex l solutions practicatemporary to con lenges chal

require armoured vehicles that are designed with common bolting fixtures that allow appliqué armour to be removed and added – in theatre – with minimal effort and equipment. CGS Gen Sir Peter Wall and CGS Gen Sher Karimi both spoke off the record – meaning we are not authorised to report on what was said during their candid discussions with the delegation – but provided exclusive insight into the future plans of their respective armoured vehicle fleets. Importantly, both maintained that armoured vehicles have long been the back bone of the army and will remain so for many years to come.

RENEWED FOCUS Lt Gen Donald Campbell, Commanding General of U.S. Army Europe, missed his flight to Farnborough having “misjudged” the stormy weather conditions, which at time of writing have brought the UK into a state of national emergency and called for the intervention of British Armed Forces. Proving that every challenge has a solution, the Lt Gen was instead beamed live into the conference theatre via Skype from his base in Germany. Appropriately, Campbell’s address spoke much of the need for technological progress and a renewed focus on the further development of on-board electronics and communication systems. He examined the U.S. Army’s current “period of extreme change” and explored what this will mean for industry over the next decade and beyond.

NATIONAL BUDGETS Colonel Gustaf Fahl, Commander of Seden’s Land Warfare Centre, expressed his appreciation for the G6 Panel, saying that the public assessment of modern traced and wheeled vehicles between industry leaders was “very interesting since we [Sweden] are now in a situation where we are discussing the requirements for the next generation of vehicles.” While many nations cut back on vehicle numbers and budgets, the French Army’s


Brig Gen Charles Beaudouin, Director of the Technical Army, explained how it was bucking the trend and laid out an impressive plan for future procurement as it aims to have a totally replenished fleet by 2025. This included programme updates on Scorpion, the Light Tactical Multi-Purpose Vehicle (VLTP) and Investigation Armoured Vehicle (VBAE). INTERNATIONALISATION Polish Land Forces are now engaged with the international industry to see the start of several new vehicle programmes, including infantry fighting vehicles, light tanks and heavy recovery vehicles. Brig Gen Slawomir Wojciechowski, Director of Strategy and Defence Planning at the Polish MoD, was in attendance to seek consultation with partners and allies “for ideas when it comes to policy and trends during a time of shrinking budgets and a post-Afghanistan situation.” “No one knows how the future will be,” Wojciechowski said. “We have seen new paradigms, like Mali, so industry is struggling to answer this [challenge]. The most important and visible thing is ‘internationalisation’ – international cooperation and international businesses. There is a lot of talk about how flexible we can be and how we can cooperate with other nations, but also, on the other hand, not losing sight of how we can focus on our specific requirements.”

NEW TECHNOLOGY Brig Gen Francesco Paolo Figliuolo, the Italian Army’s deputy chief of the Logistics Division, also presented a fascinating classified session on his nation’s immediate plans for new vehicle development and integration. He later told Defence IQ, “This is a really good occasion to share our knowledge about lessons learned from current operations and also to understand what the new scenarios will be. Nowadays, a single nation alone cannot afford to meet all of the world’s threats…so we must proceed together in strong partnership.” Germany’s Brigadier General Andreas Marlowe, Commandant of the Armoured Training Centre, naturally spoke on the advance of simulation technology and joint training exercises taking place under his command. Marlowe saw the event as “useful to my current job in allowing us to look to how we can impose new and additional technology, mainly on the focus of enhancing protection for our forces.” The MUNSTER training centre is currently seeing success in linking various branches of simulators together, from battalion to core level, in order to provide a large-scale and realistic virtual environment. The challenge, he told the audience, is to create mission experiences that result in lasting effects. L FURTHER INFORMATION www.internationalarmouredvehicles.com

The International Armoured Vehicle 2014 Awards

Armoured Vehicles

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

During day one of the conference, a number of media outlets, including Counter Terror Business, were invited to judge the International Armoured Vehicles 2014 Awards. The winners were as follows: Best Troop Protection Capability went to RUAG for its RoofPRO system. Best Vehicle Platform went to EKA for its Lightweight Agile. Most Innovative International Product was won by Rheinmetall Chempro for its Active Defence System (ADS). Looking forward to 2015… If you would like to secure your place at International Armoured Vehicles 2015, you can do so now by contacting the team on +44 (0) 207 368 9737 or by emailing enquire@defenceiq.com.

Issue 7 | DEFENCE BUSINESS MAGAZINE

93


Advertisers Index

THE BUSINESS MAGAZINE FOR DEFENCE – www.defencebusiness.net

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Adani 34, 35 Arinc 38 Audax Global 52 Axis Communications 42, 68 BC Marketing IFC BCS, The Chartered Institute 12 Becrypt 22 Blokn Mesh 11, 68 Boldon James 14 CCS (SATCOM) 65 Cellebrite 72 Coges 28 Cognitec Systems 62 CPM Group 30 Cross Match 40 DMS Protective 74 EDS 56 Foster + Freeman 46 Frontier Pitts 48 GMO Globalsign 24, 25 Guava 6 Heald 58 Helyx Sis 48 HID Global 20

94

DEFENCE BUSINESS MAGAZINE | Issue 7

Holmatro – Special Tactics Independent Technology Infranor

32 18 66, 67, 88, 89, 90, 91 Iveco 84 IQPC International BC L3 TRL 26 Laser Prototypes 64 Pacific Scientific 86 Pentax Security 76 Reed Exhibition 50, 51 Remote Diagnostic 78 Rubb Buildings 70 Safety Flex Barriers 44, 45 Sascal Displays 54 Security Labels 4 Standard Brands 87 Tata Steel FP Thermacore Europe 80 Twisted Pair 9 Tyron Developments 36, 82 Voip.co.uk 16 Yorkshire Profiles 93 Zaun 60

P

2

ED A


PARTNERSHIPS BUILT UPON RELIABILITY AND INNOVATION Tata Steel Projects’ Security & Defence Team specialises in Hostile Vehicle Mitigation (HVM) measures and Blast/ Ballistic Protective Construction. Our HVM range is extensively tested against the PAS 68 standard and includes both Temporary/ Redeployable Systems and Permanent Systems, both of which offer a high degree of protection against deliberate collision, blast, ballistics and forced attack.

Tata Steel Projects For more information contact: T: +44 (0) 1904 454600 E: tatasteelprojects@tatasteel.com www.tatasteelprojects.com

Our Temporary/ Redeployable HVM Systems are surface mounted and so can be deployed rapidly without the need for surface preparation in most cases. The products include: • Walling suitable for large perimeters that can be easily combined with antimob fencing, CCTV • Surface Mounted Bollard systems which provide protection against vehicle incursion but also allow a high degree of pedestrian permeability • Pedestrian Portals which can direct pedestrians to gaps in impermeable barriers where screening can be set-up • Vehicular Gate systems of varying configurations tested up to 16m clear width Our permanent HVM Systems include: • Various bollard systems • Low Walling systems which offer blast, ballistic and HVM protection and can blend in the urban streetscape • High Walling Systems which have been tested against extreme collision, mechanical attack and large blast threats


Co-located at the Hilton Cartagena, Cartagena, Colombia between 30th June – 2nd July 2014

South American Security

The Integrated Land and Maritime Border Security Summit for 2014 ADVANCING SECURITY THROUGH DISRUPTING AND DISMANTLING TRANSNATIONAL ORGANISED CRIME Major General Hector Pachon Cañon, Commander, Colombian Marines

Comisionado Gilberto Méndez, Secretario General, Servicio Nacional Aeronaval, Ministerio de Seguridad Pública

Agente Especial Edgar Vladimir Almada Ortiz, Director De Operaciones, Secretaria Nacional Antidrogas (SENAD, Paraguay)

Brigadier General Sean Mulholland, Commanding General, US Special Operations Command South

REGISTER NOW: WWW.SAMSECEVENT.COM | +44 (0) 207 368 9737 | ENQUIRE@DEFENCEIQ.COM

OPV Latin America 2014 A collaborative conference with COTECMAR exploring patrol craft and surface combatants across Latin America USE YOUR UNIQUE READER CODE BONUS WHEN MAKING YOUR BOOKING Vice Admiral Humberto Ramírez Navarro, Director General, DIRECTEMAR, Navy of Chile

Rear Admiral Daniel Héctor Nuñez Rodrígue, Commander of the Fleet, Navy of Uruguay

Vice Admiral José Sierra Rodríguez, Director General of Naval Construction, Mexican Navy

Rear Admiral Jorge Enrique Carreño Moreno, President, COTECMAR

REGISTER NOW: WWW.OPVLATINAMERICA.COM | +44 (0) 207 368 9737 | ENQUIRE@DEFENCEIQ.COM With thanks to our sponsors:


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.