Page 1

www.counterterrorbusiness.com | ISSUE 30

CAPITAL TERRORISM

POLICING

CYBER SECURITY

SCTX PREVIEW

SHOWCASING THE STRENGTHS OF NATIONAL SECURITY Security & Counter Terror Expo will demonstrate the capabilities and innovation to prevent terrorist threats


The Handa Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews.

Terrorism Studies Individual Modules / Certificate / Advanced Certificate

Study the characteristics of terrorism, terrorist tactics and counterterrorism by part-time online e-learning

Course starts: June, October, February

www.terrorismstudies.com/FLR2859AACTB1

Enrolment administered by:

Tel: +44 (0)20 3377 3210 / +1 (646) 957 8929 | Email: info@terrorismstudies.com Quote VIP code: FLR2859AACTB1

Postgraduate Certificate / Postgraduate Diploma / Master of Science Security Studies Counter-Terrorism Studies Intelligence and Security Studies Terrorism, Security and Policing Security Management Diplomacy and Security Studies Security and Terrorism Law (MA) All courses start annually in September

www.security-studies.com/FLR2875AACTB1 Tel: +44 (0)20 3377 3210 / +1 (646) 957 8929 | Email: info@security-studies.com Quote VIP code: FLR2875AACTB1

Enrolment administered by:


COMMENT

COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 30

INSPIRED, BUT NOT INSTRUCTED BY ISIS? A week on from the tragic events of the Westminster terrorist attack, the now known facts are not necessarily any more encouraging for UK security services.

CAPITAL TERRORISM

POLICING

CYBER SECURITY

SCTX PREVIEW

SHOWCASING THE STRENGTHS OF NATIONAL SECURITY

Security & Counter Terror Expo will demonstrate the capabilities and innovation to prevent terrorist threats

What we do know is that Khalid Masood launched an individual attack outside the Houses of Parliament, killing three people and injuring 50 more by driving his car into pedestrians on Westminster Bridge. He then fatally stabbed PC Keith Palmer, before being shot by armed police. The Metropolitan Police stated shortly after the event that Masood had ‘acted alone’ and was ‘inspired by international terrorism’. But while that explains his actions, it blurs the line between attacks initiated by ISIS and attacks inspired by ISIS. The inexperienced nature of the Westminster attack again emphasises that those acting mercilessly without instruction are difficult to monitor. Those taking inspiration may prove more problematic than those working directly on ISIS’ behalf. Unity showed itself in Westminster the morning after the attack, and unity must continue to be the driving force behind localised counter terrorism efforts. The work of the NPCC, as recorded on page 56, highlights the role that the public play in confronting lone terrorism. This issue also contains an extensive preview of next month’s Security & Counter Terror Expo, including an interview with DCS Scott Wilson and an opinion piece from Professor Richard English.

Follow and interact with us on Twitter: @CTBNews

I hope that you enjoy this issue, and look forward to seeing you at the expo, where we will be present on stand L20. Michael Lyons, editor

ONLINE // IN PRINT // MOBILE // FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, fax: 020 8532 0066.

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITOR Michael Lyons ASSISTANT EDITOR Rachel Brooks PRODUCTION EDITOR Richard Gooding PRODUCTION DESIGN Jo Golding PRODUCTION CONTROL Ella Sawtell WEB PRODUCTION Victoria Casey ADVERTISEMENT SALES Rachael McGahern, Harry Harris, Mark Jones, Michael Wheeler BUSINESS DEVELOPMENT MANAGER Martin Freedman ADMINISTRATION Vickie Hopkins, Charlotte Casey REPRODUCTION & PRINT Argent Media

Counter Terror Business would like to thank the following organisations for their support:

© 2017 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

3


...the power in microwaves!

Microwave Power Modules – TWT & Solid State

Travelling Wave Tubes

HV Power Supplies & Capacitor Charging PSUs

Rugged Amplifiers & Transmitters

Instrumentation Amplifiers


CONTENTS

CONTENTS CTB 30 12 CAPITAL TERRORISM On 22 March Khalid Masood launched a terrorist attack outside the Houses of Parliament, killing four people and injuring 50 more. Having long held a ‘severe’ terrorist threat level, how prepared was London for the attack? CTB seeks to answer the question

17 SECURITY & COUNTER TERROR EXPO PREVIEW (SCTX) Ahead of May’s Security & Counter Terror Expo, Counter Terror Business provides a preview of the shows discussion points, including what to expect from the World Counter Terror Congress and a pre-show interview with DCS Scott Wilson

56 POLICING Following the launch of the Make Nothing Happen campaign, the National Police Chiefs’ Council explain how the police force is working with the public to stay alert, monitor suspicious behaviour and prevent attacks like those seen in Westminster last month

62 CYBER SECURITY As the threat of terrorism evolves and becomes far more than just a physical danger, the role of government cyber security strategies become pivotal in the UK’s defence strategy. Counter Terror Business explores the role of the National Cyber Security Centre

79 DRONES Amid the optimism in UAV use is a growing concern about the security threat that the technology poses to infrastructure, homeland security and a range of commercial sectors. Counter Terror Business analyses the potential use and misuse of unmanned aerial vehicles

83 CBRNe SUMMIT Over the last few years the risk of a CBRNe attack has increased dramatically due to the threat of home-grown terrorist cells who have become disillusioned with national governments. In light of this, the CBRNe Summit this month takes on heightened importance

86 CRITICAL NATIONAL INFRASTRUCTURE There is growing pressure on the government and security services to increase the protection of our critical national infrastructure sites to appropriately plan against the threat of terrorism. But why is this so important?

95 IFSEC INTERNATIONAL Recent tragic events in London have refocused attention on the changing nature of the terror threat. As a result of this, IFSEC International investigates five alarming terror trends and what they mean for counter terror strategies, a key theme for June’s event

102 CONTINGENCY PLANNING Completing a series of features focusing on the Westminster terrorist attack, Counter Terror Business analyses the importance and benefits of planning for the possibility of a terrorist attack, and how having an appropriate and reliable plan in place can limit possible fatalities

Counter Terror Business magazine // www.counterterrorbusiness.com ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

5


CTB NEWS LONDON ATTACK

TECHNOLOGY

Westminster scene of terrorist attack

Ban on laptops sparked by IS threat

At 14:40 on 22 March, 52-year-old Briton Khalid Masood, drove a hired Hyundai Tucson into pedestrians on the pavement along the south side of Westminster Bridge and Bridge Street, injuring more than 50 people, three of them fatally. Having crashed into railings at the north perimeter of the Palace of Westminster, Masood entered Parliament Square and stabbed PC Keith Palmer, an unarmed police officer on patrol as the House of Commons sat for its weekly Prime Minister’s Questions session. Lasting only 82 seconds, the attack was finished as Masood was shot, pronounced dead at hospital despite efforts to resuscitate him. According to a statement from the Metropolitan Police, Masood was not the subject of any current investigations and there was no prior intelligence about his intent to mount a terrorist attack. However, the suspect was known to police and has a range of previous convictions for assaults, including GBH, possession of offensive weapons and public order offences. While Masood was likely inspired by recent terrorist activity in Europe, the police believe him to have been acting alone,

and do not suspect any further attacks. Following the attack, Mayor of London Sadiq Khan said: “I want to express my gratitude on behalf of all Londoners to the police and emergency services who have shown tremendous bravery in exceptionally difficult circumstances. “I want to reassure all Londoners and all our visitors not to be alarmed – our city remains one of the safest in the world. London is the greatest city in the world and we stand together in the face of those who seek to harm us and destroy our way of life. We always have, and we always will. Londoners will never be cowed by terrorism.” ! More information on the London attack can be found on page 12.

Encrypted messaging services should not allow terrorists to hide Rob Wainwright, Europol director, agreed: “I would agree something has to be done to make sure that we can apply a more consistent form of interception of communication in all parts of the way in which terrorists invade our lives.” A spokeswoman for WhatsApp has said it was ‘horrified at the attack’ and was co-operating with the investigation. Amber Rudd

READ MORE

tinyurl.com/n2sp3ux

READ MORE

tinyurl.com/knmbodu

RUSSIA

Bomb attack

INTELLIGENCE SERVICES

In an interview with BBC One’s Andrew Marr Show, Home Secretary Amber Rudd has said that encrypted messaging services, such as WhatsApp, should not offer terrorists a place to hide. Rudd stressed that intelligence services must have access to such services, after it was revealed that Westminster attacker Khalid Masood used the app before launching offence which killed four people. Rudd said: “It is completely unacceptable, there should be no place for terrorists to hide. We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don’t provide a secret place for terrorists to communicate with each other. “It used to be that people would steam open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warranty. But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.”

The UK and US have announced new carry-on restrictions banning large electronic devices on certain passenger flights, with US media reporting that ISIS has been working on ways to smuggle explosives on to planes by hiding them in electronics. According to a statement from the Department for Transport, large phones, laptops and tablets will not be allowed in the cabin on flights to the UK from Turkey, Lebanon, Egypt, Saudi Arabia, Jordan and Tunisia. The government maintained that the additional security measures may cause some disruption for passengers and flights, but that its top priority is the safety of British nationals. The British ban, announced hours after the American measure, is similar but applies to different airlines, including British Airways and EasyJet.

Fourteen people have been killed and 49 injured in an explosion between two underground stations in St Petersburg, Russia, on 3 April, in what is reported as being a suicide bomb attack. Russian investigators have named the suspect as Akbarzhon Jalilov, and revealed that the Russian citizen from Kyrgyzstan had also planted a second bomb at another station, Ploshchad Vosstaniya, that did not explode. The blast occurred on the afternoon of 3 April after the train had left Sennaya Ploshchad station but before it had reached its next stop, Tekhnologichesky Institut. Senior investigator Svetlana Petrenko told Russian media the train driver’s decision to continue to Tekhnologichesky Institut almost certainly helped save lives, as it allowed people to be rescued quickly. Prime Minister Dmitry Medvedev said on social media that the explosion was a ‘terrorist attack’, while Foreign Minister Sergei Lavrov maintained that the attack ‘once again shows the importance of stepping up joint efforts to combat this evil’. The White House has confirmed that President Donald Trump has spoken to Russian President Vladimir Putin by phone and offered ‘full support’ in bringing those responsible to justice.

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

7


RADICALLY FASTER VIDEO INTELLIGENCE

An integrated software and hardware toolset designed to dramatically increase the speed at which police and security teams analyse video as part of investigations.

FACE DETECTION

PERSON DETECTION

MOTION DETECTION

GEOLOCATION

THE COMPLETE SOLUTION FOR POST-EVENT ANALYSIS FOR LAW ENFORCEMENT AND SECURITY


CTB NEWS LONDON CRIME

Khan’s police plan targets hate crime and terrorism Mayor of London Sadiq Khan has launched a new policing plan, outlining a series of measures aimed at tackling hate crime, supporting victims and boosting the Metropolitan police’s armed anti-terror squad. In the plan, which was launched days before the Westminster terrorist attack, Khan laid out his vision for how the capital will be policed against a backdrop further cuts, over the next four years. The strategy is aimed at ‘tackling a postcode lottery in public safety that means some people and places are more vulnerable to and fearful of crime than others’. In addition to a range of other measures the plan involves launching an online hate crime hub to provide a dedicated response to web based hate crimes and supporting provision of specialist Hate Crime Victims’ Advocates

across the city; and working with the government, police and partners to step up efforts to counter radicalisation. Khan commented: “This plan restores real neighbourhood policing and puts victims of crime and the most vulnerable Londoners at the heart of what we do. It also sets out our ambitions as we work with the government to agree a criminal justice devolution deal which will allow

RAF ACTIVITY

READ MORE

tinyurl.com/nxfnvor

PRISONS

Counter ISIS operations airbase opens new runway RAF Akrotiri, Britain’s main airbase for operations against ISIS, has official opened its newly renovated runway, improving its ability to combat threats to national security. The 21 month, £46 million project has now secured RAF Akrotiri, on the southern tip of Britain’s Sovereign Base Area on the island of Cyprus, as a first class operating base. According to a statement from the Ministry of Defence (MoD), the investment means that the base will continue to support the full complement of current and future RAF aircraft, and those of the UK’s coalition partners. The MoD also cited that the RAF played a leading role in the coalition against ISIS during the campaign, striking over 1,200 ISIS targets. Engineers completed the work around the intense pace of air operations, with the RAF working at the highest operational tempo in 25 years. Mike Penning, minister for the Armed Forces, said: “This project has taken a tired and battered runway and transformed it into a modern, safe, 21st century facility, capable of supporting operations for the next 20 years and beyond. “This has been a unique and

us to finally get to grips with tackling the enormous problem of reoffending and ensuring that victims of crime get the support – and the justice – they deserve. “It is a plan that is frank about the challenges we’re going to face over the next few years. Crime is rising again, our population is booming, and our already tight budgets are in danger of further, potentially devastating government cuts. As we deliver this strategy over the coming years, I will continue to fight tooth and nail to protect our vital police services and make sure they have the funding they need to keep us safe now and in the future.”

New taskforce to counter extremism in prisons

© Crown copyright 2017. Licence: bit.ly/1U97c8l

READ MORE

tinyurl.com/kkzq8xj remarkable achievement. RAF Akrotiri is not just a refuelling spot or training base. This airfield matters. It has been at the forefront of supporting our most important military operations over the last decade and more, including the current campaign against ISIS.”

The Ministry of Justice has announced a new specialist taskforce to analyse intelligence compiled by about 100 counter terrorism experts working across the country to assess the threat posed by radicalisation in prisons. The taskforce will advise prisons in England and Wales on how to deal with specific threats, as well as instruct and train prison and probation staff on how best to deter offenders from being lured into extremism. The unit has been jointly created by HM Prisons and Probation Service and the Home Office and has been brought forward as part of the Prison Safety and Reform White Paper. The taskforce will aim to increase training for prison governors and staff, enable more resources to identify and remove extremist literature in prisons and ensure the most dangerous extremists are continued to be held in specialist units. Prisons Minister Sam Gyimah said: “By countering the poisonous and repugnant activities of extremists, we will help ensure the safe running of our prisons and keep the public safe.”

READ MORE

tinyurl.com/k4v32e5

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

9


ADVERTISEMENT FEATURE

PERIMETER SECURITY

STREET FURNITURE: WHY FUNCTIONAL WILL NO LONGER DO

Asking whether architects value aesthetics is rather like asking if a mathematician appreciates numbers. But if aesthetics in the built environment can be elevated only at the expense of security or safety standards, then architects must grudgingly concede to the demands of functionality The involvement of heavy goods vehicles in two atrocities in Europe in 2016 – in Nice in July and Berlin in December – tragically highlighted why the deployment of robust physical barriers is a growing priority in public spaces. Together killing 98 people and injuring 490, they were brutal reminders that vehicles can be every bit as destructive as bullets and bombs. Crowded places such as shopping centres, plazas and sports stadia perimeters increasingly need barriers that can withstand vehicular attacks as they are prime targets for terror plots. Then there’s the ever-present threat of cars veering off the road because the driver is reckless, drunk or asleep. Protective design can deter, delay and prevent vehicle collision around accident blackspots. PSYCHOLOGICAL IMPACT But urban planners are mindful too of the adverse psychological impact on citizens of erecting imposing barriers too liberally. Another consideration is permeability: pedestrians must not be impeded along with rogue truck drivers. It’s no surprise, then, that more design-led forms of security barriers such as crash-tested seating, planters and cycle racks are gaining ground with architects and specifiers. But how easily can urban planners find crash-tested street furniture that is

10

not only visually appealing on its own merits, but also in keeping with the location’s wider architectural style? When it comes to street furniture and perimeter protection in public spaces, a leading manufacturer of products in this sector believes that, all too often, architects are forced to compromise their architectural vision. Marshalls, the UK’s leading hard landscaping manufacturer and street furniture specialist, believes that, while security must always be paramount, traditional forms of protective street furniture can often be too imposing and have a detrimental effect on a landscape’s visual appeal. Marshalls has recruited IFSEC Global to test this assumption. IFSEC Global polled hundreds of architects, consultants, security professionals, facilities managers and specifiers on three key areas: their procurement habits; their perception of the products on the market and how things are changing; and what kind of products they would like to see on the market. PROCUREMENT AND SPECIFICATION TRENDS With around four in five (79 per cent) respondents involved in a growing number of projects specifying aesthetically-pleasing, crash-tested perimeter protection over the last three years, there has apparently been a sea change in priorities when

it comes to urban planning briefs. Architects were much less likely to report a rise in such projects – with 59 per cent saying they had seen an increase versus 41 per cent who hadn’t – than non-architects, who were split 74- 26 per cent. Nevertheless, it’s still a clear majority. City planners are increasingly unwilling to compromise on aesthetics as they bolster security in the urban environment. There’s obviously a clear and growing appetite for aesthetically-pleasing, crash-tested perimeter protection – but have manufacturers kept up with a trend observed even within a short, three-year timespan? Apparently not, our survey findings indicate. Demand for a wider range of aesthetically-pleasing, crash-tested perimeter protection than is currently available is enormous – equally so regardless of who we asked in the design and procurement chain, or where they were based in the world. Asked if they thought there was demand in the market for more of these products, a resounding 94 per cent agreed. Security professionals were equally as emphatic in their desire for more visually-appealing security products, with 95 per cent wanting more choice in the market. Steve Reddington, street furniture commercial director at Marshalls, says the findings back up the company’s own, anecdotal experience: “The research confirms

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


ADVERTISEMENT FEATURE

the conversations we are having with our customers in the security industry. “We work closely with many landscape architects, and from the conversations we are having, it is clear the market is changing.” Mindful of this reservoir of untapped demand, Marshalls has pioneered a paradigm shift in how street furniture and crash-tested perimeter protection can coexist more harmoniously: by combining the two in the same product. Traditionally, efforts to minimise the visual price paid for security measures have centred on making bollards and barriers as unobtrusive and congruous with the landscape as possible (for instance, sleeves can be placed over bollards). Marshalls, however, thought outside the box – or rather, outside the ‘ring of steel’. By consolidating protective barriers with street furniture, Marshalls hopes that architects never have to compromise on aesthetic or utilitarian goals when designing public spaces. Where once they might have to specify a seat and a bollard – or reluctantly jettison the seat – now they can just specify a protective seat. Applied to public spaces, governments, architects and the general public have come to recognise the truth of the expression ‘less is more’. Decluttering is in vogue. With the UK population growing by half a million annually (ONS) and the number of people living in urban areas globally expected to grow by 2.5 billion by 2050 (UN), the challenge of keeping pedestrian traffic flowing underpins the growing importance of decluttering. But not everyone in the industry has embraced the concept of protective street furniture. Many involved in the built environment fear that it fosters homogeneity and blandness in urban landscapes. The challenge for manufacturers of street furniture, therefore, is to prove such fears unfounded through an innovative, design-led approach. They must equip architects and specifiers with the means to complement, rather than jar with an urban landscape’s prevailing style – and this must apply to a wide range of colours and styles, both traditional and modern. The aesthetic value of a product even trumps price when respondents were asked to rank their priorities when procuring crash-tested perimeter protection. Given the nature of the product, it is understandable that performance

was accorded a higher priority than cost too. Nevertheless, it is reasonable to surmise that only a lucky few in the architect profession can honestly claim that money is truly no object in their latest project. The choice of materials has a huge bearing on both the cost and performance of protective street furniture, often in inverse proportion to one another. Whether composed of precious stones, polyurethane, concrete or stainless steel, the key is giving the architect a wide choice of options that meet their particular needs – in terms of budget, security requirements and architectural style. ‘Bespoke’ is the watchword for modern architects who often have a recognisable signature style. The overwhelming demand for a wider choice of products noted in the previous question suggests specifiers’ needs aren’t being fully met. ‘BROKEN WINDOWS’ THEORY Local and central governments have long recognised the role architecture and urban landscapes play in attracting skilled workers and inward investment. Furthermore, the ‘broken windows’ theory, which has informed public policy since the 1980s, suggests that urban spaces that are pleasant, well-maintained and visually appealing are less vulnerable to vandalism and antisocial behaviour. In this context it is easy to see how not just architects, but also security professionals and others involved in urban planning, would be mindful that – as far as is feasible – these factors should go hand in hand when planning a public realm environment. Thankfully, street furniture can play a key role in preserving the architect’s grand vision, even as 21st century spaces are fortified against vehicular or explosive attack. But is there enough crash-tested street furniture on the market to meet the eclectic demands of urban planners? Street furniture has certainly been integral to the elegant plazas, canalside developments and gleaming business parks that have driven the regeneration of Birmingham, Glasgow and other UK cities once disparaged as architectural backwaters. It is surely no surprise, then, that architects and other specifiers should be overwhelmingly interested in at least two-to-three crash-tested versions of lighting, seating, bollards, planters, litter bins and post and rail products. Only six per cent professed to not be interested in any. Ranked third out of six options given, demand for the tried-and-trusted bollard remains strong even as imaginative alternatives emerge. Nevertheless, comparable levels of demand for crash-tested lighting, seating, planters and litter bins suggests that bollards are no longer the default choice of protective barrier – at least when specifiers are aware of the existence of alternatives that fit their architectural blueprint. As crash-tested furniture becomes more

diverse and well-known, bollards may well slip down the table. It’s clear that there are now more sympathetic security solutions available on the market other than imposing lines of steel bollards. Not only can security products enhance a landscape visually, but with the introduction of urban greening, a space can be safe while also improving overall well-being. CONCLUSION In commissioning this report Marshalls sought to gauge the importance of aesthetics when it comes to the specification of products where security must always be chief priority. We also looked to find out if professionals working in the built environment are aware of the growing number and variety of products – from Marshalls and others – that could satisfy growing demand for crash-tested, yet elegant, street furniture. The five key findings from the report listed below suggest the answer to the first question is a resounding ‘very important’, while the consensus around the latter is almost as decisively ‘no’. Fashions change in landscape architecture just as they do in other visual fields. Nevertheless, architectural historians of the future might, we could reasonably speculate, look back at the past 25 years as a big step forward for urban planning in terms of quality-of-life benefits to citizens. But the dramatic elevation in the terror threat over recent years has thrown down a new challenge to architects: making public spaces as secure as possible without undermining the aforementioned gains. Citizens shouldn’t feel like they’re living under martial law. The findings from our survey, along with the trends explored above, suggest that the future of protective street furniture will be defined by its discrete incorporation within design-led products like seating, lighting and planters. Read the full report on the IFSEC Global website. !

FURTHER INFORMATION www.marshalls.co.uk

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

11


CAPITAL TERRORISM

LONDON On 22 March Khalid Masood launched an individual attack outside the Houses of Parliament in London, killing and injuring by driving his car into pedestrians on Westminster Bridge. Having long held a ‘severe’ terrorist threat level, how prepared was London for the attack?

THE UNPREDICTABILITY OF THE LONG-ANTICIPATED ATTACK vents in recent years on mainland European soil have kept London’s terror alert at ‘severe’, meaning that an attack is highly likely. Ever since the November 2015 terrorist attacks in Paris, which brutally killed 130 people across the French capital in coordinated attacks outside the Stade de France and the Bataclan Theatre, the UK has been preparing itself for a similar attack on British soil. At 14:40 on 22 March, 52-year-old Briton Khalid Masood, drove a hired Hyundai Tucson into pedestrians on the pavement along the south side of Westminster Bridge and Bridge Street, injuring more than 50 people, three of them fatally. Having crashed into railings at the north perimeter of the Palace of Westminster, Masood entered Parliament Square and stabbed PC Keith Palmer, an unarmed police officer on patrol as the House of Commons sat for its weekly Prime Minister’s Questions session. Lasting only 82 seconds, the attack was finished as Masood was shot, pronounced dead at hospital despite efforts to resuscitate him. Following the attack, Mayor of London Sadiq Khan said: “I want to express my gratitude on behalf of all Londoners to the police and emergency services who have shown tremendous bravery in exceptionally difficult circumstances. “I want to reassure all Londoners and all our visitors not to be alarmed – our city remains one of the safest in the world. London is the greatest city in the world and we stand together in the face of those who seek to harm us and destroy our way of life. We always have, and we always will. Londoners will never be cowed by terrorism.”

E

CALCULATED OR UNPLANNED? While there is no intention to detract sympathy or do a disservice to the families of those affected by Masood’s actions last month, it

12

is necessary to draw comparisons between the attack outside of Westminster, the heart of British politics, and the attack on Paris just under two years ago. In the days after 13 November 2015 it became clear that Abdelhamid Abaaoud, the suspected leader of the Paris attacks who disappeared from the scene and escaped police detection for five days following the attacks, was a known person of interest for European security authorities, having spent time becoming radicalised and trained in terrorism in Syria and with an international arrest warrant on his head. While there are many other European-born radicals who have travelled to Syria to joint ISIS, the links between Abaaoud and Syria are crucial for determining the collaborative nature and advanced planning that formed part of the Paris attacks. Metropolitan Police acting deputy commissioner Mark Rowley revealed weeks before the Westminster attack that the UK security services had prevented 13 potential terror attacks on the country since June 2013, and that there were a further 500 counter terrorism investigations live at any one time. This is where the distinction between Masood and Abaaoud are important – Abaaoud became the figurehead for a calculated, carefully considered attack, planned well in !

THE UK SECURITY SERVICES HAD PREVENTED 13 POTENTIAL TERROR ATTACKS ON THE COUNTRY SINCE JUNE 2013, AND THAT THERE WERE A FURTHER 500 COUNTER TERRORISM INVESTIGATIONS LIVE AT ANY ONE TIME

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

13


CAPITAL TERRORISM ! advance of the attack date. Massood, as a police spokesman announced shortly after 22 March, ‘acted alone and was inspired by international terrorism’. In a detailed breakdown of events on 25 March, the Metropolitan police said that they had so far failed to establish the reason for the attack, concluding that Masood was possibly prompted by ISIS propaganda, but that there was no ‘information or intelligence to suggest there are further attacks planned’. That Masood was inspired by international terrorism is undoubted. The method of attack, primarily using a large, fast moving vehicle to mow down pedestrians, is reminiscent of attacks in Nice in July last year and Berlin in late December, where 87 and 12 people were killed respectively. What is less obvious is how, beyond the similar technique,

14

lies a more worrying resemblance – that being the adoption of low-tech terror. With a number of larger scale terror plots having been foiled in the last few years, there is little denying that lone terrorist attacks, and particularly those using low-tech weaponry, are often those which do maximum harm as there is very little to monitor and time to prepare for incidents. As a result of this, the government’s counter terrorism strategy becomes even more important, aiming not only to prevent attacks, but also to minimise the impact when one happens. The government and police forces have longer used the phrase ‘when an attack happens’ when referring to a terrorist incident, rather than the more vague, but less accurate ‘if’. Writing in The Guardian, Emily Winterbotham, senior research fellow

at the Royal United Services Institute, summarised that ‘the increased tendency to employ easily accessible, low-cost, unsophisticated methods to inflict terror makes this job [the UK’s counter terrorism strategy] all the more difficult’. Prevent becomes the most important of the strategy’s four pillars, the others being pursue, prepare and protect. The response of London’s police force, discussed later in this article, stresses the success of the preparation aspect of the strategy, while the lockdown of Parliament emphasised the protect part of the work. However, as the spread of low-tech attacks become more readily employed, not just to terrorist organisations but to all those desiring to inflict terror and devastation, the success of the prevent pillar may become the most

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


CAPITAL TERRORISM important. Tackling radicalisation and exposure to terrorist propaganda is the key for safe communities. If our communities becomes exposed and we fail to prevent terrorism at its local roots, the protection of our towns and cities, our preparedness to respond and our ability to pursue extremism all become clouded in uncertainty and difficulty grows. LONDON’S PREPAREDNESS REPORT A review carried out by Lord Harris of Haringey in October 2016 analysed London’s ability to deal with a terror attack, and consequently urged the Home Office to consider combining the Metropolitan Police, the City of London Police and the British Transport Police (BTP). Ordered by Sadiq Khan to

examine and assess London’s security, the reports suggestions gained the approval of former Met Commissioner Sir Bernard Hogan-Howe, who agreed that the current policing set up in the capital was ‘confusing’. Hogan-Howe said that Harris’ proposed merger would result in ‘improved operational effectiveness and that he thought that London would better respond to a terrorist incident if services worked together. The recommendations included implementing: a London-wide pilot of technology where all phones are sent a message alerting of a major attack; increasing the number of firearms instructors so marksmen can be trained quicker; a comprehensive review of safety and security on the River Thames, commissioned by the mayor, to report by May 2017; and a review of the capacity of London’s major trauma centres; bolster mental health services to support those at risk of radicalisation; security guards and bouncers should be trained to help prepare against an attack; there should be four dedicated 24/7 Hazardous Area Response Teams and a similar number of Mass Casualty Vehicles strategically located around London; and all London schools to have a plan for how to prepare for a terrorist attack. Commenting on his report, Lord Harris said: “London needs to become a city where security and resilience is designed in and is part of the city’s fabric, and where everyone who lives and works here sees security and resilience as their responsibility just as much as it is for the emergency services and civic authorities.” Harris said that ‘the quality and effectiveness of the work done by the intelligence agencies and counter terrorism police is amongst the best in the world’, citing the immediate response to the knife attack incident in Russell Square last Summer as an example of the speed of response, which was recorded as lasting less than six minutes between the emergency control room being informed and the suspect being subdued. One can assume that Lord Harris would have been doubly impressed by the response times of the police and other emergency service departments last month. While there is potential for efficiency to be improved, and Lord Harris is right to suggest collaboration to enhance performance, he is also right to praise the work of our services and their bravery to date. RAPID RESPONSE TO AN UNTIMELY ATTACK Days before Masood’s attack, the Mayor of London launched a new policing plan for the capital, A Safer City for All Londoners, which, among a number of new measures to tackle local crime, included plans to boost the Metropolitan police’s armed anti-terror squad, so as to create a network of specialist firearms officers primed

to ‘quickly and decisively’ react to a terror attack ‘should the need arise’. Sadiq Khan emphasised that counter terrorism policing ‘begins with community policing, with dedicated officers who know and are known by there communities’. Addressing the possibility of an attack happening, the report sats that the Metropolitan Police needs the resources to respond rapidly and protect London. Therefore, the Mayor’s office agreed ‘an increase in armed officers for London’. Acting deputy commissioner Mark Rowley said in the aftermath of the attack that this was the event that the Metropolitan Police and other security services had anticipated, planned for and hoped would never happen. As terrible as the loss of life has been, and it has been rightly and justly publicised in the press, it is worth remembering that this is the one attack that has managed to manifest itself among the dozens that have been prevented on UK shores. Furthermore, the speed and bravery of the security and emergency services, as well as the actions of ministers, notably foreign office minister Tobias Ellwood, should be heralded. Days before the attack, the Metropolitan Police Service, along with emergency service partners, carried out the first joint major live-play exercise to test their response to a terrorist threat on the River Thames. ‘Exercise Anchor’ involved over 200 police officers and staff, and involved a scenario in which a group of terrorists hijacked a passenger pleasure boat on the Thames and took a number of hostages, with the intention of traveling up the Thames to carry out a terrorist attack in Central London. With Counter Terrorism Specialist Firearms Officers for the process, it was intended to test the response and command and control protocols of emergency services, and proved a very timely exercise given what followed on 22 March. It enabled the response to be effectively well-rehearsed and reassuringly fast. Parliamentarians, who were meeting for Prime Minister’s Questions were quickly put into lockdown, using social media platforms to inform the public of the instructions being presented to them, while the Prime Minister was driven away from the location. The roads surrounding Westminster were shut off, Westminster underground tube station emptied and Whitehall put in shutdown. As reporters who rushed to the scene will testify, it was impossible to get within 200 yards of the location, as police blocked roads and paths leading to the Houses of Parliament – the reaction was deservedly brilliant. !

FURTHER INFORMATION tinyurl.com/m8dos2e tinyurl.com/kpucbqj

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

15


For more information email: emeainfo@kbcnetworks.com or visit our website at: www.kbcnetworks.com


Contains public sector information licensed under the Open Government Licence v3.0

SECURITY AND COUNTER TERROR EXPO

The UK’s leading national security event returns to London in May with a programme created to help those tasked with keeping nations, assets and businesses safe. Counter Terror Business previews the content and discussion points of the Security & Counter Terror Expo

THE INTERNATIONAL PLATFORM FOR GLOBAL SECURITY errorism has become part of every day life. Over the past 12 months, Europe has experienced some of the deadliest attacks in its history and the threat level remains high worldwide. Following recent attacks in Paris, Brussels and Berlin, London witnessed an attack on the centre of its democracy, with ISIS inspired Khalid Masood killing four people, including PC Keith Palmer, outside of Westminster. One of the main issues facing global security professionals today is the breakup of the so-called Islamic State’s ‘caliphate’. Following the liberation of Mosel and the assault on Raqqa, it is becoming increasingly likely that terrorists from more than 80 countries will begin to return to their home countries. This represents a new challenge for security services across Europe. The return of highly trained and ideologically driven individuals will no doubt further increase the threat level across Europe.

T

Those who retain a desire to commit acts of terrorism will continue to seek new ways to avoid detection, as we saw in December with the German Christmas market attack. It means the security industry must evolve and stay one step ahead by investing in new technologies and intelligence solutions that protect critical assets and people from today’s threats. In May 2017, Security & Counter Terror Expo (SCTX), the UK’s leading national security event for private and public sector security professionals, will return with a comprehensive programme designed to keep attendees one step ahead of those intent on committing terrorist acts. Alongside an exhibition of more than 350 businesses, experts from across the globe, including representatives from NATO, Europol, the Ministry of Defence, the Metropolitan Police and critical national infrastructure organisations, will

explore the latest strategies to prevent, protect and prepare for future attacks. Taking place at Olympia, London from 3-4 May 2017, SCTX remains the only event that unites security professionals from all four corners of the world. Working in partnership with the Department for International Trade (formerly UKTI), the event is expected to welcome a record number of delegations, building upon the 10,000-plus visitors who attended in 2016 from more than 100 countries – including France, !

ONE OF THE MAIN ISSUES FACING GLOBAL SECURITY PROFESSIONALS TODAY IS THE BREAKUP OF THE SO-CALLED ISLAMIC STATE’S ‘CALIPHATE’

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

17


DON’T LEAVE YOUR EQUIPMENT TO CHANCE

Daniel Technologies offer credible experience and specialist knowledge on equipping military, counter terrorism units, law enforcement and first responder units. Capable of supplying a diverse selection of reliable equipment, weapons and technical products trusted to meet individual requirements.

E Q U I P P I N G YO U W I T H C O N F I D E N C E Visit danieltechnologies.ie or call +353 (0)1 866 56 91 for specialist knowledge or to order your free product directory.


SECURITY AND COUNTER TERROR EXPO ! Germany, Japan, Spain, Italy, Brazil, South Korea, Mexico, UAE, Canada and the US. The two-day event, aligned with the Home Office’s seven security capabilities, will showcase the latest innovations from major supplies, as well as niche technology providers. Visitors to SCTX 2017 will find a plethora of new solutions, equipment and services designed to assist critical national infrastructure protection, border control, cyber security, major events, offender management, policing and counter terrorism, and the emergency services. David Thompson, event director, said: “The terrorist threat is changing almost daily this creates countless issues for security professionals. SCTX is an essential platform, it provides a secure environment to source the latest solutions and define effective strategies to current threats. The 2017 show will showcase the most innovative technologies and provide those tasked with keeping nations, assets and businesses safe with a platform to learn from industry leaders. Ultimately SCTX will help security professionals remain one step ahead of those intent on carrying out attacks.” EXHIBITING INNOVATION AT THE EXPO The exhibition has established itself as an international hub where the industry elite come together to identify the security sector’s most significant innovations and new product launches. SCTX 2017 will showcase a wide range of product innovations from more than 350 exhibitors, including those supplying the latest in drone and counter drone technology, virtual reality, surveillance control systems,

SCTX 2017 WILL SHOWCASE A WIDE RANGE OF PRODUCT INNOVATIONS FROM MORE THAN 350 EXHIBITORS, INCLUDING THOSE SUPPLYING THE LATEST IN DRONE AND COUNTER DRONE TECHNOLOGY, VIRTUAL REALITY, SURVEILLANCE CONTROL SYSTEMS, HIGH SECURITY FENCING AND MUCH MORE high security fencing and much more. Pelco by Schneider Electric, Airborne Drones UK, e2v Technologies, Yuneec and GEOQUIP are among the major multinational companies booked and will join more than 120 new exhibitors offering cutting edge services and security solutions to the industry. First time exhibitor K9 Electronics will be showcasing its range of Radio Frequency Communications Jamming systems for both covert and overt operations. The UK-based company designs and manufactures jammers that can defeat drones at a range of five kilometres. Glenn Darien, director of K9 Electronics, said: “Our primary focus is counter terrorism and countering the potential threats that drones carry. Our systems are currently being used in the Middle East, USA and South East Asia by various government organisations. At the show, we will be exhibiting our new handheld tactical Drone Jammer Gun made for portable use and the covert, briefcase style Drone Jammer. Both have a one kilometre effective Jamming range and are very directional ensuring that they will have minimal effect on surrounding communications when used correctly.” Following a successful show last year, Pelco by Schneider Electric is returning to SCTX 2017. The company that specialises in security cameras and surveillance

systems will be demonstrating its leading VideoXpert video management platform. It will also demonstrate its latest camera technologies, including Opetra multi imager cameras and new low light static and PTZ ranges. PROTECTING THE DIGITAL FRONTIER Cyber security was once again thrust into the spotlight recently, with Russia’s alleged involvement in the US Election. The overall number of incidents the US experienced the previous year, totalled at 77,000, a 1,300 per cent increase over the last decade. The importance of increased cyber security at a national level is now recognised globally, with the UK government creating the National Cyber Security Centre, part of GCHQ, in October 2016. The free-to-attend Cyber Threat Intelligence Conference at SCTX will host the industry’s leading figures who will explore the latest cyber security strategies and share real life case-studies. Running across two days in partnership with techUK, the representative body for the UK’s technology industry, the programme will feature the NCSC chief executive, Ciaran Martin, who will provide a keynote address on the current and future threat in cyber space and how prepared the UK is. "

19


SECURITY AND COUNTER TERROR EXPO ! Other speakers confirmed for the conference include Peter Wood, CEO, First Base Technologies; Nader Heinen, regional director, Advanced Security Assurance Advisory, BlackBerry; Ron Gregory, estates & facilities compliance manager, Northern Lincolnshire and Goole NHS Foundation Trust; and Jenny Radcliffe aka ‘The People Hacker’. Talal Rajab, techUK’s head of Programme, Cyber, National Security, said: “The cyber terrorism threat grows immeasurably year-on-year and we as an industry, must grow, adapt and react in equal measure. The Cyber Threat Intelligence Conference at Security & Counter Terror Expo provides the opportunity to learn from and meet with some of the key figures in the sector addressing the most important issues we face today.” SAFEGUARDING CRITICAL NATIONAL INFRASTRUCTURE In addition to securing the ever-expanding cyber space, protecting national infrastructure and businesses is critical for the effective running of nations. Terrorist groups want to propagate the notion that no one is safe from attack in the western world

and everyday life could be disrupted at any time. Security professionals therefore must look at the best way of protecting communications networks, the emergency services, energy plants, financial institutions, governments, health services, transport links and natural resources. The Critical National Infrastructure & Business Resilience conference will aim to aid public and private entities to identify, assess, prioritise, and protect critical infrastructure and key resources. Allowing them to mitigate deliberate efforts to incapacitate or exploit a nation’s CNI. The conference will feature a series of presentations from experts on how to protect CNI and business, citing real life examples and case studies and instructing how to create effective strategies utilising cyber, physical security and staff. SECURING BORDERS AND TRANSPORT HUBS Running alongside the Critical National Infrastructure & Business Reliance and Cyber Threat Intelligence conference, the Border & Transport Security Conference will focus on the most critical issues facing borders and transport hubs.

NEW TO THE EVENT FOR 2017, SECURITY & COUNTER TERROR EXPO WILL BE PARTNERING WITH DSEI – THE WORLD LEADING DEFENCE AND SECURITY EVENT – TO LAUNCH THE COUNTER IED ZONE. AS WELL AS SHOWCASING BEST PRACTICE IN REDUCING THE THREAT OF IEDS, LIVE DEMONSTRATIONS WILL ENABLE EOD, CIED, CBRNE, DEFENCE, LAW ENFORCEMENT, CT AND SECURITY PROFESSIONALS TO IDENTIFY NEW STRATEGIES TO DISARM AND DETECT DEVICES

Devastating attacks on transport hubs such as Atatürk international airport in Turkey and attacks on Brussels airport and metro station, as well as the mass movement of people throughout the world, poses serious problems for security professionals – with borders being exploited by those seeking to do us harm. The free-to-attend Border & Transport Security Conference will allow fellow practitioners to share best practice and explore the latest capabilities for secure border and transport management. Visitors will be able to hear from the likes of Bart van Hofwegen, Chief Security National Tactical Command, Ministry of Defence of the Netherlands; Jirí Celikovský, Head of Unit for Coordination of Schengen Cooperation and Border Control, Department for Asylum and Migration Policy, Ministry of the Interior of the Czech Republic; Peter O’Broin, director, Airport Operator’s Association; and many more. WITNESS CUTTING-EDGE TECHNOLOGY Public and private sector buyers, influencers and government delegations from across the globe will attend SCTX to enhance their current and future security capabilities. At Advanced Technologies Live, visitors will be able to see and hear more about innovative solutions through a series of live demonstrations. Attendees can view the latest products from the likes of Aeraltronics, dataminr and Aaronia. New to the event for 2017, Security & Counter Terror Expo will be partnering with DSEI – the world leading defence and security event – to launch the Counter IED Zone. As well as showcasing best practice in reducing the threat of IEDs, live demonstrations will enable EOD, CIED, CBRNe, defence, law enforcement, CT and security professionals to identify new strategies to disarm and detect devices. Exhibitors featuring in the Counter IED Zone include Bomb-Jammer, MIB-Electronic, ISSEE and Medeng. Duncan Reid, event director of the DSEI, said: “The addition of the Counter IED Zone at SCTX serves to highlight the changing nature of terrorism. The threat is multifaceted and the security industry must seek out innovations that will help them detect and prevent attacks. This element of the show will help mitigate future threats and help personnel respond more effectively.” "

Security & Counter Terror Expo 2017 will be co-located with Ambition – the EPRR Expo – and Forensics Europe Expo. For more information on Ambition and Forensics Europe Expo, please turn to pages 26-27.

FURTHER INFORMATION www.counterterrorexpo.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

21


RELI ABLE

The best in key management performance and value. Our KeyWatcher systems are packed with features and capabilities, expertly engineered to protect, control and track your keys. We invented key management, and we just keep making it better for you.

Product door not shown in image. Fingerprint reader optional.

Visit morsewatchmans.com to learn more

think inside the box.


PAS 8 Street urniture Protecting crowded places, national infrastructure and high profile sites and events. Hill & Smith Bristorm have developed a high quality, high performing range of crash rated security products specifically to protect the street scene and national infrastructure. Their quality Impeder Bollard sits at the core of each design to maintain their high PAS 68 crash rating; whilst the shell allows them to meet critical aesthetic requirements to safeguard pedestrians and infrastructure in crowded places.

Please isit www.bristorm.com for more information or call +44(0)1902 499400 and spea with a member of our team ycle Hoops i ing alls Planters ollards

ested to PAS 8 I A 14

Aesthetically pleasing designs

n- ompromised performance

eter ehicle borne attac s

Member of the Hill & Smith Holdings Infrastructure Products Group and certified with ISO 9001:2008, ISO 14001:2004, PAS 99:2012, OHSAS 19001:2007 Member of the PSSA- Perimeter Security Suppliers Association

c rit

o

t r

rror

o t

0

Street Scene Protection


SECURITY AND COUNTER TERROR EXPO

Leading security figures from around the globe will discuss changing terrorist threats at the World Counter Terror Congress in May, as part of the Security & Counter Terror Expo. Counter Terror Business analyses this part of the show

PREVENTING TERRORISM AND PROTECTING THE WORLD’S CIVILIANS ounter terrorism remains very much in the spotlight, with extremist groups such as the so-called Islamic State continuing to target civilians around the globe. Over the last year there have been high profile attacks in Normandy, Nice, Paris, Istanbul, Berlin and New York, while bombings across the Middle East continue to be frequent. On top of this, the recent terrorist activity outside of Parliament has brought the devastating aftermath of such an attack much closer to home. Despite these attacks, Europol’s European Counter Terrorism Centre has been widely acknowledged as helping thwart numerous other atrocities on the continent. The organisation claims that information sharing, across European countries as well as through and with Europol, reached an all-time high by the end of 2016. It now holds more than 10 times as much information on ‘person entities’ in its

C

database, compared with when the attack on Charlie Hebdo took place. 127 counter terrorism operations took place in Europe last year, highlighting the sheer scale of the problem facing security professionals. While the country targets themselves remain those that participate in the anti-IS coalition, today nations face a range of threats and attacks – from highly organised and networked groups to lone actors. Not only that, the weapons themselves evolving and now include the use of traditional explosives and automatic rifles, through to the recent use of vehicles. The threat is increasingly unpredictable and as a result, a number of initiatives are being introduced by those tasked with keeping civilians safe. For example, Europol has recently announced the launch of the European Counter Terror Centre to address issues such as foreign fighters, terrorist financing, digital propaganda and arms trafficking.

Elsewhere, India and the Arab League announced that they will combat terrorism by developing new strategies to eliminate its sources and funding. With France remaining high on the target list for IS aggression, along with the UK, US, Belgium, Germany and The Netherlands, security professionals from these regions will travel to London in May to attend the annual World Counter Terror Congress. Over two days, government officials and private !

127 COUNTER TERRORISM OPERATIONS TOOK PLACE IN EUROPE LAST YEAR, HIGHLIGHTING THE SHEER SCALE OF THE PROBLEM FACING SECURITY PROFESSIONALS

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

25


Security is in our DNA Access control solutions for any application Digital Seal Number

• •

252

Bespoke Locking Mechanism Self Powered Intelligent Access Control

Low Profile 12 Design

7.30

• Integrated lock and seal

• Self powered solution

• Audit trail capabilities of all door events

• Compatible with bespoke applications

• User friendly design

• Designed for harsh environments

With more than over 40 years experience in the design, manufacture and installation of bespoke security solutions, nobody understands security like Maple. From light-weight, slimline applications for the aviation industry, to sophisticated, high security access control solutions for use in multimodal operation, with Maple, no one comes close.

Maple Fleet Services Ltd Tel: +44 (0)161 429 1580 Email: sales@mapleinnovations.co.uk www.mapleinnovations.com

Visit us on stand H75


SECURITY AND COUNTER TERROR EXPO ! security companies will discuss future threats and shape the world’s counter terror strategy. With topics ranging from terrorist funding, counter radicalisation tactics, the emerging threats, privacy and technology, 20-plus high ranking officials and academics will lead the congress, providing invaluable trends and information to more than 400 attendees. AN UNCERTAIN GEOPOLITICAL CLIMATE Focusing on the four key areas outlined in UK government’s CONTEST strategy, the congress will be opened by John Hayes MP, the UK’s Minister for Security. As the person ultimately responsible for the country’s counter-terrorism, security, serious organised crime and cyber crime strategies, he will deliver a speech on extremism, border security and international counter terror strategy. Hayes will be joined by Sir Malcolm Rifkind, former UK government Foreign Secretary and chairman of the Intelligence & Security Committee of Parliament. Rifkind commented: “The nature of the threat we face today is inherently different from that we faced even last year. Terrorist organisations are constantly evolving, using highly advanced methods to avoid detection, and the prospect of attacks like Paris, Jakarta and Istanbul happening anywhere in the world is reality. It is of paramount importance that nations work together to reduce the risk to civilians and the World Counter Terror Congress gives us a platform to do just that.” “One man driving a lorry into a

crowded market represents a new era in terrorism and it is a challenge all Western nations face. We need to ensure security professionals from across the world are aligned in helping to reduce the risk to civilians and I’ll be monitoring how the US intelligence agencies evolve under the leadership of President Trump with interest. What’s vital is that we continue to share information and best practices with our allies, which is what the World Counter Terror Congress is designed to do.” Rob Wainwright of Europol will also feature on this year’s programme. He will discuss European cooperation on security

high for the years to come. Security professionals must use the World Counter Terror Congress to develop their understanding of where the threats are coming from and identify ways that they can be prevented – a multi-faceted intelligence-led approach is the only way to stop attacks in the future from happening.” Additionally, with thousands of people, many from law abiding families, travelling to Syria, Libya and Iraq to join groups like Isil and Al-Qaeda, a key part in developing an effective prevent strategy is gaining a greater understanding of why citizens are radicalised. Adam

FOCUSING ON THE FOUR KEY AREAS OUTLINED IN UK GOVERNMENT’S CONTEST STRATEGY, THE CONGRESS WILL BE OPENED BY JOHN HAYES MP, THE UK’S MINISTER FOR SECURITY. AS THE PERSON ULTIMATELY RESPONSIBLE FOR THE COUNTRY’S COUNTER-TERRORISM, SECURITY, SERIOUS ORGANISED CRIME AND CYBER-CRIME STRATEGIES and present the organisation’s views on counter terror strategy in an uncertain geopolitical climate. Additionally, Mark Rowley, Assistant Commissioner of the Metropolitan Police, is expected to discuss extremism and the international and home-grown threats to the UK. Richard Walton, the former head of the Met’s Counter Terrorism Command (SO15) and now an adviser to the Security & Counter Terror Expo, said: “The threat facing the UK and other nations is, and will remain,

Deen of the Quilliam Foundation, who was a senior member of an Islamist extremist organisation, is another who will be present at the congress. He said: “Understanding the terrorist mindset is vital to defeating these organisations. The people travelling hundreds of miles to train with extremists are giving groups like Isil and Al-Qaeda the capacity to carry out attacks across the globe. But why are they joining? What is it that attracts them to commit murder? There is a reason and the West needs to listen to "

27


TaCTICAL

FRONT LINE DETECTION Garrett has worked closely with law enforcement personnel for decades. We know that crime scene evidence recovery occurs in a variety of challenging environments . . . iron-infested urban areas . . . arson scenes . . . creeks, ponds, and shallow, marshy areas . . . even deeper lakes or saltwater bays. Whatever terrain you are faced with, Garrett has a metal detector that is just right for your needs.

Trust Garrett to help you find the evidence that leads to convictions.

Garrett CSI Pro-PointerÂŽ AT MAXIMUM SENSITIVITY for detection of small buried targets or to scan suspicious packages for forbidden devices. Choose from three Sensitivity levels.

ÂŽ

Made In USA

garrett.com Tel: 1.972.494.6151 800-234-6151


SECURITY AND COUNTER TERROR EXPO SECURITY AND COUNTER TERROR EXPO

SECURITY & COUNTER TERROR EXPO The World Counter Terror Congress will feature six sessions, covering policy and strategy responses to the changing terror threat; radicalisation, de-radicalisation and preventing radicalisation; geopolitical security briefings; encryption, communications and security; security for critical national infrastructure; and emerging terror networks and tactics. Among those confirmed to speak are Lord Carlile of Berriew CBE, QC; Rob Wainwright, director at Europol; Dr Jamie Shea, deputy ASG, Emerging Security Challenges Division, NATO; Raffaello Pantucci, director of International Security Studies, Royal United Services Institute (RUSI); and Thomas Wuchte, head on Anti-Terrorism Issues, Action Against Terrorism Unit, Organisation for Security & Cooperation in Europe (OSCE). David Thompson, event manager of Security & Counter Terror Expo, added: “With the safety of millions of people on their minds, those in attendance at the World Counter Terror Congress have their work cut out. The sight of armed police patrolling crowded places, including railway stations and airports, shopping centres and sports stadiums may be here to stay in the short term.

Contains public sector information licensed under the Open Government Licence v3.0

! reformed characters to develop new strategies that counter the messaging coming from parts of the Middle East.”

But it’s the topics being discussed in the conference that will ultimately decide whether there are better techniques that can be introduced, and how nations can destroy the root cause of extremism.” The congress will take place within the internationally renowned Security & Counter Terror Expo. Supported by the Home Office, the event will showcase the best counter terror and security solutions from around the world. In addition to the World Counter Terror Congress, there will be a series of specialist free-to-attend conferences at Security & Counter Terror Expo focussing

on the Critical National Infrastructure & Business Resilience, Cyber Threat Intelligence – presented by techUK, and Border & Transport Security Live as well as a Counter IED zone and Advanced Technologies Live theatre. "

Security & Counter Terror Expo 2017 is co-located with Ambition – the EPRR Expo – and Forensics Europe Expo.

FURTHER INFORMATION www.counterterrorexpo.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

29


SECURITY AND COUNTER TERROR EXPO

Ahead of the Security & Counter Terror Expo, Counter Terror Business posed some questions to Scott Wilson, who will be presenting his Keynote Address on the international expansion of Protect and Prepare on 3 May

COUNTER TERROR BUSINESS INTERVIEW CS Scott Wilson, National Counter Terrorism Co-ordinator Protect and Prepare at National Counter Terrorism Policing HQ, will be speaking at the annual World Counter Terror Congress 3-4 May 2017. The World Counter Terror Congress is hosted at Security & Counter Terror Expo (SCTX), the UK’s leading national security event for private and public sector security professionals.

D

The aim of the UK’s CONTEST strategy is to reduce the risk of terrorism to the UK. Since 2010, how successful do you feel that the strategy has been in protecting the UK from a growing terrorism threat? Since 2010 there has been a significant increase in the threat level both in the UK and in many other western countries. The Syrian civil war has been a massive game changer and it has affected pretty much every country with a Muslim population. In the last four years – 20132017 – we have seen a huge surge in Syrian related threat both at home and

overseas. The threat is complex, diverse and one we have not seen before and is challenging for many countries around the world. On average, we are arresting a terrorist every day in the UK and we are charging and convicting more people for terrorism offences than we have ever done before. An effective counter terrorism strategy needs to be able to monitor, investigate, capture and prosecute the adversary to prevent attacks, imprison those who pose a threat and reduce levels of terrorist activity. However, at the same time the strategy must build relationships with communities and businesses and reduce the fear of terrorism. By all appearances this balance has been achieved through the CONTEST strategy. As National Co-ordinator for Protect and Prepare, can you expand upon what the strategies aim to achieve? The level of threat is complex and ranges from lone actor’s intent on carrying out crude attacks to sophisticated networks pursuing ambitious and coordinated

plots. We urge the public to remain alert but not alarmed – the police service and its partners is doing everything it can to help protect people, public institutions, critical national infrastructure, as well as businesses and crowded places. Our security measures and activities are under constant review to reflect where the threats exist and the level of threat we are facing. You will have already noticed a substantial uplift in police patrolling, particularly in the central London area. This is being replicated across the country and will continue !

OUR SECURITY MEASURES AND ACTIVITIES ARE UNDER CONSTANT REVIEW TO REFLECT WHERE THE THREATS EXIST AND THE LEVEL OF THREAT WE ARE FACING

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

31


SECURITY AND COUNTER TERROR EXPO ! as we seek to reassure the public and respond to any potential attack or threat. Following the devastating vehicle attacks in Berlin, Nice and London, CT policing are working alongside industry operators and key stakeholders to develop a greater understanding of the HGV industry and the potential risk posed. We will also be replicating this work within hire car companies to identify any areas which require greater security screening. The new Stay Safe International Film, ‘Run, Hide Tell’, has been developed in conjunction with the National Counter Terrorism Security Office (NaCTSO), the travel industry and the Foreign & Commonwealth Office. The films are designed to educate those working in the travel industry to ensure UK citizens remain safe when at home and abroad.

Whilst much of the current strategy focuses on protecting against the threat of a terrorist incident, if an attack is inevitable, how resilient is the UK to limit the impact and aftermath and bring the attack to a quick and minimally-fatal end? The increased level of threat is matched by increased action by police and security

services who are currently conducting hundreds of investigations, with recent figures revealing 550 live cases being handled at any one time. Working closely with MI5 and other partners we prioritise our resources against all cases that pose the most risk to the public. However, we recognise we need to be prepared if and when an attack takes "

IN THE LAST FOUR YEARS WE HAVE SEEN A HUGE SURGE IN SYRIAN RELATED THREAT BOTH AT HOME AND OVERSEAS. ON AVERAGE, WE ARE ARRESTING A TERRORIST EVERY DAY IN THE UK AND WE ARE CHARGING AND CONVICTING MORE PEOPLE FOR TERRORISM OFFENCES THAN WE HAVE EVER DONE BEFORE

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

33


@healduk

Heald Ltd


SECURITY AND COUNTER TERROR EXPO

DETECTIVE CHIEF SUPERINTENDENT SCOTT WILSON Detective Chief Superintendent Scott Wilson is currently the National Co-ordinator for Protect and Prepare under the CONTEST strategy, based at the National Counter Terrorism headquarters in London. He is a senior Investigating Officer with extensive working knowledge in homicide and counter terrorism investigations having led over 50 murder and counter terrorism enquiries. In 2016 he was awarded the 9/11 International Police Medal for Counter Terrorism. ! place. Over the past 12 months we have seen a massive increase in firearms officers, both armed response vehicles on routine patrol and counter terrorism specialist firearms officers. We also have an extensive CT exercise programme with exercises taking place throughout the country on an almost weekly basis. Yearly, we conduct a Tier 1 exercise which provides a testing regime from the first responder to decisions made by the Prime Minister in COBR. This is unique to the UK and looked upon as best practice by countries throughout the world. The scope and proximity of terrorism in Europe appears to be evolving, with the methods becoming more varied and damaging. In your opinion, how has the force adapted to these changes? I have worked for the Metropolitan Police since 1987 and during this time have seen an evolving and changing threat from Irish Republican terrorism to the threat from al-Qaida and now the current threat we face from ISIS. We like to think we’re the best-in-class in terms of police counter terrorism capability. The British CT model is unique in several ways. Firstly, there are no silos in our approach. Because different agencies have had to work together for so long in the fight against terrorism, particularly during the Irish era and more recently with the international, ISIS-related threat, we have developed joint protocols, systems, policies and procedures. It’s a completely united endeavour, and it’s totally unique. I challenge anyone to find an equally collaborative model. That was a deliberate decision, particularly post the 2005 London bombings, but also pre-dating that. Several other countries are struggling with this concept because they have intelligence services doing one aspect of

SECURITY & COUNTER TERROR EXPO RETURNS THIS MAY TO DISCUSS AND SHOWCASE INTERNATIONAL CAPABILITIES AND STRATEGIES TO OPPOSE TERRORISM IN ALL ITS FORMS counter terrorism and they have police services doing another, therefore lacking collaboration. Secondly, another benefit is our engagement policing model – policing by consent. We place priority in investing in relationships with our communities, including our Muslim communities, to understand them and to engage with them. This is the central aspect of our Prevent programme which we’ve had in place for over a decade. Some countries are struggling with this and are realising they need a Prevent programme like ours. Security & Counter Terror Expo returns this May to discuss and showcase international capabilities and strategies to oppose terrorism in all its forms. As a confirmed speaker at the show, what can we expect to hear from your session? This year I will presenting on the threat we face when travelling overseas and how we are working closely with seven

key countries to ensure our citizens are protected. Since the attacks in Tunisia in 2015, we have been working very closely with the Foreign and Commonwealth Office, The Home Office and the travel Industry to ensure a comprehensive Protect and Prepare regime is in place. We are developing several NaCTSO products, which have proven successful in the UK to be used in an international arena. A comprehensive training programme should result in some 25,000 travel representatives from the key travel companies having received CT awareness training before being deployed to resorts. We are also working closely with the College of Policing to adapt UK police training courses for international police colleagues. "

FURTHER INFORMATION www.counterterrorexpo.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

35


Everybody.

Everywhere.

Every day.

Ordinary days require extraordinary protection.

genetec.com

Find out more about the software behind the everyday at the Counter Terror Expo (London), stand #F50 or at genetec.com/protectingeveryday

Š 2017 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.


SECURITY AND COUNTER TERROR EXPO

TERRORIST THREATS Ahead of the Security & Counter Terror Expo, Richard English, Professor of Politics at Queen’s University Belfast, questions whether terrorism is working and analyses what terrorism does and does not tend to achieve

PUTTING TERRORIST THREATS INTO CONTEXT f we want to limit the incidence of terrorism in the future, then we need to ask two central questions. Firstly, how can societies and governments make terrorism a less appealing and common mode of political struggle? Secondly, how can we limit the success of terrorists once they have – tragically and regrettably – carried out an attack or series of attacks? The first question tries to minimise the number of atrocities that take place; the second seeks to limit the damage that is done once violence has actually occurred. The two questions are inter-related, but let’s take them both in turn. The evidence is overwhelming that most terrorists engage in what they do because they sincerely believe that their violence is the only way of bringing about necessary and desirable political change. This has been true from the anarchists of the late nineteenth century, to the IRA of 1919-21, to the Jewish terrorists who sought to establish the state of Israel in the mid-twentieth century, to

I

waves of Palestinian organisation which have sought to advance Palestinian nationalism, to the Provisional IRA, to al-Qaida, to ISIS and beyond. For anyone committed to a precious political cause – whether it be ideologically nationalistic, religious or left- or right-wing – one key question to ask is how best to bring about the change that they passionately seek. And here there has been a tendency for people on all sides to exaggerate what terrorism has actually achieved. At a strategic level, people more commonly think of those rare cases when terrorism achieves its central goals (the Jewish terrorism which helped to bring about the creation of Israel, for example, or the Hezbollah terrorism of the 1980s which prompted US and French forces to withdraw from the Lebanon) than they do of the far more numerous instances in which terrorist groups have failed to achieve such strategic victory. All of us – whether politicians, police officers, military employees,

business people, voters, journalists, teachers, or whoever – need to be clear about this central aspect of the history of terrorism: that terrorism rarely achieves its central goals. What it far more commonly achieved lies instead in the realm of secondary goals. So Hamas have been and !

SUGGESTIONS THAT GROUPS LIKE ISIS REPRESENT AN EXISTENTIAL THREAT TO THE UK, OR TO WESTERN DEMOCRACY, ARE SO FAR FROM THE TRUTH THAT THEY MERELY GIVE GIFTS TO TERRORISTS, MAKING TERRORISM SEEM MORE POWERFUL THAN IT IS

37


BEYOND

CONSULTING We have extensive experience helping public and private sector organisations defend against the cyber threat and protect their most critical assets. Our expertise includes: • security strategy, leadership and governance • risk management and assurance, including regulatory compliance • security culture development • security architecture, operational technology and industrial control system security • incident response • design and development of security operations centres.

WE MAKE THE DIFFERENCE For more information, please visit www.paconsulting.com/digitaltrust


SECURITY AND COUNTER TERROR EXPO ! remain unable to destroy the state of Israel and replace it with an Islamic Palestinian state covering the full territory of Mandate Palestine. What they have done is achieve considerable revenge against Israeli and Jewish targets – most of them defenceless at the point of the attack. But if terrorism is far likelier to achieve revenge against the defenceless than it is to secure political victory – and if people recognise this widely and honestly – then it becomes a less appealing method to deploy. For many terrorist groups have found that their callous violence against the defenceless has, over time, lost them political support. One of the reasons for the Provisional IRA moving away from their violence was that many Catholics in Northern Ireland would not support their

politics while the bombs were going off; once the IRA shifted its methods, many more people would vote for their political party, Sinn Fein, than would have done so had the IRA carried on killing people. Similarly, one of the reasons for al-Qaida not becoming pervasively popular among most of the world’s Muslims

was the unpopularity of their violence – especially their violence against civilians. From the IRA to al-Qaida and beyond to other major groups such as the Basque separatists in ETA, the historical reality is that terrorist methods did not yield strategic victory; what they yielded was far more often a form of violence "

KEEPING THE TERRORIST THREAT IN PROPORTION WILL ALLOW US TO LIMIT THE DAMAGE THAT TERRORISTS DO TO OUR SOCIETY WHEN THEY ATTACK; IT WILL ALSO MAKE IT LESS LIKELY THAT WE OVER-REACT AND THEREBY DO THEIR RECRUITING FOR THEM THROUGH OVERLY AGGRESSIVE FOREIGN POLICY OR THROUGH UNNECESSARILY POLARISING DOMESTIC LEGISLATION

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

39


securiCAD®

A CAD TOOL FOR MODELLING THE CYBER SECURITY OF IT SYSTEMS

PRODUCE ATTACK GRAPHS & FIND SHORTEST ATTACK PATH

ANALYSE SECURITY DURING DESIGN STAGE

USE COMPUTATIONAL POWER TO OPTIMIZE YOUR CYBER SECURITY

APPLICATIONS

BENEFITS

• Simulating attacks on current or planned architectures

• Optimizing security expenditure

• Comparing and evaluating security design options

• Enhancing productivity • Gaining data owner confidence

• Communicating your security posture

SECURICAD® VISUALIZES YOUR ARCHITECTURE WHILE CONDUCTING COMPLEX ATTACK SIMULATIONS “UNDER THE HOOD”.

LOAD DOWN TION A EVALU N VERSIO

To download a free evaluation version, please visit https://www.foreseeti.com/products and when asked for a PIN, enter ’CounterTBM30’. The licence will be valid until end April 2017. More info at: www.foreseeti.com

Or contact us at: United Kingdom sales@foreseeti.com chris.few@foreseeti.com +44 (0)73 760 518 18


SECURITY AND COUNTER TERROR EXPO ! which many within their supposed constituency found repugnant and increasingly repellent the longer that it went on. Any journalist or politician who wants to contribute to a safer society should focus on these truths in the wake of a terrorist atrocity, rather than concentrating on denouncing the evil quality of the perpetrator. For the arguments that I’ve just set out are far more likely to undermine the central thinking pushing people towards terrorism, namely their mistaken view that it is the best or only way of achieving political change. LIMITING THE EFFECTS But terrorism as a method will continue to be with us, even if such arguments persuade some people not to pursue it. How can we limit the effects of the violence once it has happened, once an attack has occurred or a campaign has begun? A key aspect here is to avoid exaggerating the scale of the threat. One of the things that terrorists have often succeeded in doing is undermining the societies that they attack, and this depends often on the over-reaction of the society in question. In reality, terrorism is an extraordinarily low-level threat in terms of the likelihood of anyone in the UK or America being killed by its violence, for example. This does not lessen the awfulness of terrorist atrocity for its victims, but if we want there to be fewer victims in the future then we need not to exaggerate the threat to the extent that we counter-productively over-react to it and actually make it worse. In the wake of 9/11, there was an exaggeration of the degree to which al-Qaida represented a threat to the West, and this legitimated an overly militaristic response which in turn led to terrorist incidents rising rather than falling. Had there been a more proportionate response and a less exaggerated reading of the post-9/11 al-Qaida threat, then the chaos in Iraq would not have been created and the emergence of ISIS would have been far less likely. So suggestions that groups like ISIS represent an existential threat to the UK, or to Western democracy, are so far from the truth that they merely give gifts to terrorists, making terrorism seem more powerful than it is. And they make us more likely to over-react in ways that will make terrorist recruitment and activity easier rather than more difficult. Much of this relates to the media. Of course journalists should report and discuss terrorist attacks, and should be able to do so freely. But in doing so they should stress the real nature and scale of the threat, which is limited. In the United States, people are far less likely to be killed by a terrorist than they are to be killed by colliding with a deer in a traffic

WE CAN ALSO MINIMISE THE DAMAGE DONE BY TERRORISTS IF WE AVOID SETTING OURSELVES UNREALISTIC TARGETS AND GOALS. TO TALK OF GETTING RID OF TERRORISM, OF REMOVING RADICAL ISLAMIC TERRORISM FROM THE WORLD, IS TO SET THE BAR SO HIGH FOR OURSELVES THAT ALL TERRORIST GROUPS HAVE TO DO TO BE ABLE TO CLAIM VICTORY IS TO CARRY ON THEIR VIOLENT EXISTENCE accident, by being struck by lightning, by drowning in the bath, or by dying in a household accident. Keeping the terrorist threat in proportion will allow us to limit the damage that terrorists do to our society when they attack; it will also make it less likely that we over-react and thereby do their recruiting for them through overly aggressive foreign policy or through unnecessarily polarising domestic legislation.

HONEST POLITICIANS AND REALISTIC AIMS We can also minimise the damage done by terrorists if we avoid setting ourselves unrealistic targets and goals. To talk of getting rid of terrorism, of removing radical Islamic terrorism from the world, is to set the bar so high for ourselves that all terrorist groups have to do to be able to claim victory is to carry on their violent existence. A more sensible way "

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

41


SECURITY AND COUNTER TERROR EXPO

! of proceeding is to state – calmly and patiently – that some political causes generate terrorism; that the threat will endure but that it can be contained in ways that allow us to live our resilient life as democratic societies; and that on the basis of the historical record, victory for terrorists will elude them in terms of their central, strategic ambitions. Some politicians may find this an unappealing set of principles, but many of their citizens and voters want the political class essentially to protect them and to tell them the truth. And the

truth is that terrorism is very unlikely to bring about strategic victory for the terrorists; the truth is that it will produce horrific suffering for its victims, most of whom tend to be defenceless when they are attacked; the truth is that it represents a low-level threat to the vast majority of people; and the truth is that Western democracies have repeatedly shown that they can endure the conflict with terrorists in impressively resilient fashion. If we want to protect people from terrorism, then reflecting in these ways

on what terrorism does and does not tend to achieve allows for a powerful defence against such a painful and unjustified mode of political struggle. "

Richard English is Professor of Politics at Queen’s University Belfast, and the author of Does Terrorism Work? A History (Oxford University Press, 2016).

FURTHER INFORMATION amzn.to/2nSaoLL

SECURITY IN A BACKPACK Rapid deployment. High quality images. Fast decisions.

Introducing the new, robust and powerful ThreatScan®-LS3. Designed in collaboration with first responders, this is a small, lightweight and compact unit that’s designed to be rapidly deployed. High quality, real-time X-ray images (305 x 256mm), materials discrimination, pan, zoom, DeepFocusTM, 3D Emboss, measurement and annotation all enable rapid and accurate decision-making.

www.3dx-ray.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

43


eLOQ - The 21st Century Locking Solution Introducing eLOQ - the intelligent, smart key and access control system designed to offer not only secure access, but also a greater degree of flexibility and intelligence not otherwise possible with traditional mechanical locks and keys. Although eLOQ locks are electronic, they contain no batteries or wiring. All of the power required to operate the lock is taken from the key upon insertion. This means locks can easily be retrofitted into any existing locations where you might commonly see mechanical locks such as; doorways, cabinets, safes and padlocked areas. In fact, almost every application

controlled by a traditional mechanical audit records and the most recent lock can be replaced by the innovative access events. These measures introduce a new level of eLOQ lock and key. auditability not previously seen eLOQ keys can be in traditional master key suites programmed or access control systems, with personalised ultimately enhancing levels of restrictions for security. each user giving the administrator full control over access privileges.

The keys can be set-up to open specific locks during a designated schedule and can also be given start and expiration points from when the key will begin to operate and when it will completely disable the key. In addition to this level of access control, each time a key is used, a record of the lock ID, date, time and event activity, is stored including authorised, unauthorised or ‘outof-hours’ access attempts. eLOQ keys store up to 3,000

Nanda Lakshminarayanan, MD of eLOQ describes the product as “traditional robust technology enhanced by digital intelligence.”

Referring to the inspiration behind eLOQ, Nanda explains; “Key control is often a problem for many businesses and all too often compromises are made - which is obviously never idea with security issues. If a key becomes lost, the security level either plummets or a costly re-key exercise is required. eLOQ provides unparalleled advantages over traditional methods by introducing auditability and multiple levels of control to ensure security levels remain high.” To find out more about eLOQ visit www.eloqsecurity.com or contact the team on info@eloqsecurity or call 01522 716327.

g brin : n ca tion Q O L isa at e organ h W our y o t

Discover more about eLOQ Visit Lincoln Security Ltd at stand C82 during the Security and Counter Terror Expo 2017 for a live demostration on how eLOQ can benefit your organisation

TM

brought to you by:

LINCOLNSECURITY T H E

S E C U R I T Y

S P E C I A L I S T S

®


SECURITY AND COUNTER TERROR EXPO

Europe’s leading event for the emergency preparedness, resilience and response community will explore the latest in mass casualty response, equipment and industry innovation. As part of our extensive Security & Counter Terror Expo, and as media partner to this part of the show, Counter Terror Business examines the 2017 Ambition event

PRIORITISING RESILIENCE AND RESPONSE mbition 2017, taking place on 3-4 May at Olympia, London, will provide professionals from government departments, the NHS, councils, local resilience forums, ambulance trusts, fire and police organisations and specialist agencies with the unique opportunity to meet, network and debate the latest challenges facing the EPRR community today. With the 2016 edition of the show noting record numbers of attendees, the event is now the unrivalled platform for the EPRR Community to come together, see the latest technology and discuss the most pressing topics. This is the ideal opportunity for you to attend a range of interesting and relevant debates and conference streams based on EPRR and the emergency response to extremely challenging incidents, do business with leading industry suppliers and network with the entire EPRR community under one roof. As well as meeting new suppliers, visitors will have access to free-to-attend learning

A

sessions, networking opportunities and a host of other benefits. EMERGENCY PREPAREDNESS The free-to-attend conference sessions are at the heart of Ambition 2017, with speakers confirmed from the London Ambulance Service, Public Health England, National Grid, Emergency Planning Society, Homeland Security and Emergency Management Agency and the National Ambulance Resilience Unit. As chairperson, Luana Avagliano, head of Resilience Direct, at the Cabinet Office, will present the opening remarks to officially begin the conference. Also speaking on the first morning of the event will be Steve Apter, director Safety and Assurance for London Fire Brigade, who will showcase the work of London Fire Brigade in ensuring safety and assurance through collaboration. The first panel discussion of the event will discuss the future of command and control and collaboration for emergency response services,

AMBITION 2017, TAKING PLACE ON 3-4 MAY AT OLYMPIA, LONDON and will be hosted by Dave Bull, head of education for the National Ambulance Resilience Unit (NARU), Chief Commissioner George Hamilton, commander of the Police Service of Northern Ireland, Nicola Savage, managing director of communications company Excelerate Technology; and Roy Wilsher, chair of the Chief Fire Officer’s Association and chief fire officer of Hertfordshire Fire & Rescue. George Hamilton will then conduct his own session in the Ambition Conference Theatre on multi-stakeholder strategic emergency response to major incidents, before Dave Bull begins the afternoon session with his own session on emergency response and collaboration between services, providing an update !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

45


CONNECT Wire free, permission based access control even for padlocks • Highest encryption • Combine with mechanical locks • CLIQ® - updates anywhere • Complete traceability • Standards compliant • Government approved

Trusted Security for CNI www.abloy.co.uk marketing@abloy.co.uk +44 (0)1902 364500

3-4 MAY 2017 OLYMPIA LONDON

STAND B65

exclusively from


SECURITY AND COUNTER TERROR EXPO ! from NARU. Roy Wilsher will then analyse the future of fire and rescue emergency response, command and control through collaborating with other services, while Nicola Savage will end by explaining the importance of successful command and control technology implementation. Following a period of time for lunch and industry networking, Brigadier Timothy J Hodgetts, medical director, Defence Medical Services, UK Ministry of Defence, will showcase the work of the Defence Medical Services in disaster relief and emergency coordination. Following this, Dr Toby Wilson, director of operations at the Environment Agency, will comment on developing rapid response coordination during flooding and natural disasters, before Jamie Quarrelles, Homeland Security and Emergency Management Agency, examines mass event emergency management best practice. The final two sessions on the opening day of Ambition will see Superintendent Juston Bibby, of Cumbria Constabulary, providing a case study on the region’s multi agency coordination and flood disaster response and Dr Holly Carter, research fellow at the Emergency Response Department Science and Technology (ERD S&T) for Public Health England, showcasing behavioural analysis of the need to understand the use of behavioural research for emergency preparedness. EXPLORING FUTURE COLLABORATION The panel discussion on 4 May will be moderated by chairperson Matt Roy, of the Emergency Planning Society. The discussion will include input from: Clive Barstow, global head of Resilience

9,507 VISITORS FROM 109 COUNTRIES ATTEND THE SHOW TO MEET WITH OVER 350 EXHIBITORS WHO SHOWCASE OVER 3,000 PRODUCTS AND SERVICES and Crisis Management at National Grid; Guy Huckle, head of Operational Security & Contingency Planning for Network Rail; Chief Constable Mike Griffiths, chief commissioner of the Civil Nuclear Constabulary (CNC); and Simon Lewis, head of Crisis Response for the British Red Cross. Mike Griffiths will also be leading a session on showcasing the work of the CNC in collaborating with other agencies in securing CNI. Public Health England will host a second session on the second day of Ambition, with Dr Raquel Duarte-Davidson, head of Chemicals and Poisons Department, reporting on the need for effectively establishing systems of testing, verification and coordination between emergency services during mass incidents. Following this, Major Bart van Hofwegen, from the Ministry of Defence of the Netherlands, will carry on the theme of collaboration as he sets out how to collaborate with other agencies and how to develop effective responses to CBRN crises. The two sessions between the break for lunch and the afternoon break both feature ambulance services. Firstly, Ido Rosenblat, chief technology officer for the MDA National Ambulance Service of Israel, looks at implementing innovative command and control technology for emergency response, as well as showcasing Israel’s national emergency medical services. This precedes Tina Ivanov, deputy director Clinical Education

and Standards at London Ambulance Service, who examines the process of embedding clinical standards across ambulance services in a joint operations environment. Later in the day, Dave Williams, director of Strategy and Development for Buckinghamshire NHS Trust, examines the future of emergency response within ‘blue light’ collaboration technology, before the closing remarks end the Ambition conference. EXHIBITING INNOVATION Alongside the conference streams, Ambition provides a range of unique publicity, sales and networking opportunities for exhibitors keen to grow their brands and gain traction in the growing EPRR marketplace. 9,507 visitors from 109 countries attend the show to meet with over 350 exhibitors who showcase over 3,000 products and services. With representatives present from fire and rescue authorities, the NHS and ambulance trusts, the Department for Transport, local authorities, HM Coastguard, Maritime & Coastguard Agency and hazardous area response teams, the Ambition exhibition allows for delegates to meet with hundreds of UK and international attendees "

FURTHER INFORMATION www.ambitionexpouk.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

47


ADVERTISEMENT FEATURE

800 WORD EDIT HEADLINE A HERE SETTING NEW AS TIGHT AS POSS STANDARD IN HIGH SECURITY SHUTTERS SECURITY

Udae nonsend icidisquid quam elisimincim facepro et et, sed quodi blaborum ut molorem aut ationse nos eumque laboribus et quoditiat dolo qui de volecab orerisqui nitibusdae nullacianti Gilgen Door ut Systems expalins how it has helped raisepernatemquae physical security standards by rest, sitiatis idem quodi consequat facimagnime becoming the first manufacturer to launch a range nimus earibus, temUK ipsaest moluptatium es net et of security roller shutters tested and approved to the European standard BS EN1627:2011 xoxoxoxo Following a stringent test programme designed to assess resistance to a wide FURTHER INFORMATION range of professional attack methods, three Rolegard™ security shutter models were xxx approved to RC3-4 standards by the LPCB (Loss Prevention Certification Board). Rolegard RC3-4 security shutters are designed to target harden critical infrastructure and other facilities most at risk of break-in or terrorist attack. Alongside the new models Gilgen provides a comprehensive range of shutters that meet UK loss prevention and ‘Secured by Design’ standards, with models certified to LPS1175, issue 7, SR2-5. Gilgen’s investment in its range means it can provide a solution for building projects where either the UK or European standard has been specified, giving customers the reassurance that their entrances are protected to the required standard. Commenting on the launch, managing director, David Cerquella said:“We are delighted to launch these new models which are a result of our commitment to meeting evolving market needs.” European standards have stringent requirements which differ in many ways to British standards, for example, in the provision for static and dynamic load protection up to 10kn of pressure. To achieve the standard the shutters were designed specifically around the demands of EN1627 and through the test programme withstood simulated attempts to gain entry using professional attack methods including the use of powerful handheld tools such as electric saws, grinders and drills. Each model is available with a choice of manual dead locks or a 24v electric solenoid locking system. These lock the bottom edge of the curtain assembly tightly against the floor to resist the high static loads used to lift and push the shutter curtain during the test program. SR5-B OFFERS MULTI‑ATTACK DEFENCE Gilgen has also launched an SR5 rated shutter, which combines the highest physical attack standard yet achieved in a shutter with unrivalled ballistics and blast protection properties.

48

Rolegard SR5-B is the first security shutter certified to LPS1175, issue 7, level 5 to offer tested ballistics performance. Meeting the stringent requirements of EN1522:1999 with ballistics standards up to FB3 and FB4, Rolegard SR5-B provides protection against powerful hand-held guns such as .357 and .44 Magnum hand guns. SR5-B features a unique automatic self locking (ASL) system, which systematically locks down facilities without the need for secondary locks. This functionality helps improve protocol and prevents the lifting or jacking of the shutter; one of the most common methods of forced entry. When combined with adjustable speed settings and remote control operation this also enables facilities to react quickly to imminent threats. SR5-B is designed to help mitigate the risk of incursion through break-in’s, hostile crowds and terrorist attacks across many high risk environments including critical national infrastructure, government and military buildings, financial centres, museums, bonded warehousing and high value commercial properties. Its proven ability to resist multiple forms

of attack enables SR5-B to be specified in applications where protection of people and property are a top priority. Ballistics and blast performance, high resistance to physical attack and a unique range of locking and activation solutions amongst other factors ensure it sets new standards in a high security shutter. GILGEN EXPERIENCE AND RANGE With over 50 years experience developing secure entrance solutions across all industry sectors, Gilgen Door Systems provides advice throughout a project from initial design to manufacturing and installation. Its range extends to all types of automatic door and industrial door, including attack resistance automatic sliding doors and personnel doors. Visit us at SCTX2017 – Stand G71. !

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com

FURTHER INFORMATION 0800 316 6994 info@gilgendoorsystems.co.uk www.rolegardshutters.com


SECURITY AND COUNTER TERROR EXPO

Thousands of professionals will visit Forensics Europe Expo in May, bringing experience and knowledge from over 75 different countries. Hosted alongside the Security & Counter Terror Expo, Counter Terror Business analyses the latest educational content, equipment and services that will be highlighted as part of the event

THE CENTRE FOR FORENSIC SCIENCE aking place on the 3-4 May 2017 at Olympia London, Forensics Europe Expo is the only international exhibition and conference that showcases the latest equipment and services as well as providing the definitive source of education, best practice, training and networking. Unlike any other event, Forensics Europe Expo offers a unique 360-degree viewpoint of the entire forensics industry; whether your interest is in laboratory equipment, scene of crime, digital investigation or forensic analysis. Hoping to build upon the success of last year, Forensics Europe Expo 2016 saw a 60 per cent increase in new visitors with over 1,250 attendees over the two days. One in three of such attendees said that they would recommend the

T

show to a friends with 84 per cent saying that they would attend the 2017 show. Additionally, there was a 50 per cent increase in exhibitors. CONFERENCE 2017 The Forensic Europe Expo conference has established itself as one of the most important forums for debate for

FORENSICS EUROPE EXPO 2016 SAW A 60 PER CENT INCREASE IN NEW VISITORS WITH OVER 1,250 ATTENDEES OVER THE TWO DAYS

the international forensics and digital forensics community. It brings together senior opinion formers from all fields of forensic science for a two-day conference that explores the latest advances in this rapidly evolving discipline. Day one will be dedicated to the changing digital forensic landscape with sessions covering all aspects of computer forensics from e-discovery and network analysis to mobile forensics and CCTV. The second day of the conference will explore the wider forensic landscape from laws and standards to new forensic techniques and innovations being used and developed across the world as well as developments in Familial DNA and cutting edge research in palaeontology and mycology. With the aim of connecting with !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

49


SECURITY AND COUNTER TERROR EXPO ! industry professionals from across the world, key speakers at the conference include: Dr Gillian Tully, UK Forensic Regulator; Giles Herdale, programme director of the Digital Intelligence and Investigation Programme, National Police Chiefs Council; Paul Young, crime adviser and digital forensics specialist at the National Crime Agency; Brian Donald, chief of staff at Europol; Jane Taylor Barron, National Crime Agency; Marcel de Puit, forensic chemist at Netherlands Forensic Institute; and DS Antti Kurittu, team leader of the IT crimes investigation unit, Helsinki Police. SHAPING THE FUTURE Visitors to day one of the conference will first hear the opening remarks of Peter Sommer, head of digital forensics at Birmingham City University. The opening address will be followed by Dr Gillian Tulley’s presentation on the ‘Latest information on setting the UK standards in forensic science’. Tully has worked in forensic science for over 25 years, specialising in DNA, innovation, validation and enhancement of quality standards. Her work has included provision of expert evidence to courts in the UK and

overseas, and extensive collaborative working with forensic practitioners around the world. In November 2014, Gill took up the appointment of Forensic Science Regulator and is responsible for setting standards in forensic science. Crime has gone digital and the latest ONS figures show that cyber crime and fraud are the new volume crimes. Therefore, Giles Hurdle will host the second conference session on day one of the Forensics Europe Expo on the topic of ‘The digital investigation of the future – challenges and opportunities’. Herdale leads the work to develop the strategic approach of the police service to

addressing the threats and opportunities of the digital age. Giles works for CC Stephen Kavanagh, the national policing lead for digital intelligence and investigation, and co-ordinates the work of the Capability Management Group, a collaboration between the National Police Chiefs Council, College of Policing, National Crime Agency and Home Office, to develop police capabilities nationally, regionally and locally. Before the scheduled break in the Exhibition Hall, the National Crime Agency’s Paul Young will focus upon ‘Changing dynamics – digital media in investigations’. The last of the morning’s session will "

THE FORENSIC EUROPE EXPO CONFERENCE HAS ESTABLISHED ITSELF AS ONE OF THE MOST IMPORTANT FORUMS FOR DEBATE FOR THE INTERNATIONAL FORENSICS AND DIGITAL FORENSICS COMMUNITY. IT BRINGS TOGETHER SENIOR OPINION FORMERS FROM ALL FIELDS OF FORENSIC SCIENCE FOR A TWO-DAY CONFERENCE THAT EXPLORES THE LATEST ADVANCES IN THIS RAPIDLY EVOLVING DISCIPLINE

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

51


A TRUE PARTNER When there’s no room for doubt. No space for error. No half measure.

FLATSCAN15® & 30® by Teledyne ICM: Portable X-Ray Threat Detection Solutions…

Always by your side.

Time, Precision, Simplicity

www.teledyneicm.com/security


SECURITY AND COUNTER TERROR EXPO ! hear from: John Beckwith, head of forensics at Staffordshire Police and project advisor for ISO17025 at the National Police Chiefs Council, who will discuss ‘ISO17025 – working towards implementing minimum digital forensics standards in policing’; Detective Sergeant Adam Riley, of the Homicide Investigation Unit at Queensland Police; and Alex Caithness, principal analyst for CCL Forensics. The afternoon sessions have more of a software feel to them, with Bournemouth University’s Professor Matthew Bennett discussing ‘DigTrace: three-dimensional analysis of footwear traces’. Footwear impressions provide an important source of evidence within a range of criminal investigations, with Bennett exploring the reasons for why in intricate detail. This will be followed by Antti Kurittu, of the National Cyber Security Centre of Finland, who will present on the topic of ‘Kirjuri: An open-source digital forensic evidence management system’. The NCSC-FI is a part of the Finnish Communications Regulatory Authority, and Kurittu currently works with incident response at the national CERT and designing cyber exercises for critical infrastructure providers. Peter Sommer will then bring day one of the conference to an end with his closing remarks.

BRIAN DONALD WILL HOST THE FIRST OF THE SESSIONS ON DAY TWO OF THE CONFERENCE. DONALD, WHO IS CHIEF OF STAFF AT EUROPOL, WILL ADDRESS ‘THE GROWING AND EVOLVING ROLE OF FORENSIC SCIENCE IN MAJOR INTERNATIONAL CRIMINAL INVESTIGATIONS’ development of an innovative glass database’. The afternoon sessions will see delegates hear from Dr Claire Gwinnett, associate professor in Forensic and Crime Science, from Staffordshire University, who will conduct a stream on ‘Contamination issues at crime scenes: time for a change... of clothing?’. Furthermore, Michael Allard, a former detective at Massachusetts Police Department, looks at ‘Forensic mapping of crime scenes using laser technology’, providing a comprehensive look into modern crime scene mapping

technologies and will discuss the pros and cons of modern mapping tools. Since the history of crime scene investigation, the concern was how to best visualise the scene to the jury. There are many cases worldwide involving the missing and the disappeared. The ongoing search for clandestine graves, the families given hope when a possible location has been found, only to learn that it was another negative result. Addressing this will be Dr Carole Davenport, a forensic anthropologist at Liverpool "

DAY TWO Brian Donald will host the first of the sessions on day two of the conference. Donald, who is Chief of Staff at Europol, will address ‘The growing and evolving role of forensic science in major international criminal investigations’. ‘The evolving investigative avenue of Familial DNA’ will be explored by Jane Taylor-Barron, crime investigative support officer at the National Crime Agency. In her role, Taylor-Barron provides strategic and tactical advice to major and serious crime investigations being conducted by police forces or the National Crime Agency. This can involve providing investigative suggestions, linking the SIO in with peer support from around the country, advising regarding best practice and identifying and co-ordinating other specialist resources from within the NCA that may enhance an investigation. The Netherlands Forensic Institute has developed a database, together with the police, for splinters of glass. The (trace) elemental composition of the glass may prove whether suspects of violent robberies or ATM raids were present at one or more crime scenes. Day two of the conference will hear from Marcel de Puit and Andrew van Es from the Netherlands Forensic Institute. de Puit will be presenting on ‘Fingerprints, the source and beyond – innovative research into the unique composition of fingerprints’, before van Es explains ‘A touch of glass:

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

53


SECURITY AND COUNTER TERROR EXPO ! John Moores University, who hosts a session on ‘Searching for clues: how a combined approach comprising forensic anthropology, archaeology and geology disciplines can breathe new life into crime scene investigations’. SEMINARS 2017 The Seminar & Workshop Theatre at Forensics Europe Expo 2017 will see a range of forensic techniques showcased under the spotlight. Forensic experts will discuss the successes, challenges and lessons that they have faced and learnt to help delegates improve their expertise, and further their career progression by developing their ability to investigate skills and find out about the latest project efficiencies. Topics covered in the Seminar &

Workshop Theatre include: forensic methods and techniques of developing latent fingerprints on different surfaces; high speed gunshot residue analysis; high powered, light-weight, robust forensic lasers; new technology for contactless latent print detection; how advanced mobile phone forensics with camera ballistics brings remarkable new results; and deep diving for forensic gold – applications, and deleted data. The Workshop Theatre is free to attend. EXHIBITION 2017 Over 100 countries are represented at the show, with nearly 100 international exhibitors showcasing over 3,000 products that makes meeting hard-to-reach decision makers an easy process. The exhibition serves to connect

EXHIBITORS ARE ABLE TO SHOWCASE THEIR LATEST PRODUCTS AND CONDUCT LIVE DEMONSTRATIONS FOR MAXIMUM EXPOSURE, WITH OVER 85 PER CENT OF EXHIBITORS WHO ATTENDED THE 2016 EVENT AGREEING THAT THE EXPO DELIVERS GOOD OR EXCELLENT RETURN ON INVESTMENT

hard to reach buyers and specifiers with the products that will make a difference in their place of work and wider industry. Exhibitors are able to showcase their latest products and conduct live demonstrations for maximum exposure, with over 85 per cent of exhibitors who attended the 2016 event agreeing that the expo delivers good or excellent return on investment. Visitors and exhibitors come from all over the world to network and explore opportunities in new markets. Over 25 per cent of visitors attended from outside the UK. Darlene Alvar, global marketing and sales manager for Amped Software, shared her experiences, saying: “Forensics Europe Expo is one of the few international events that is truly focused on digital Forensics. we have attended as an exhibitor for the past two years and will attend again in 2016 as we believe this is the place to be to showcase our products to key customers in the UK and other international markets.” "

FURTHER INFORMATION

www.forensicseuropeexpo.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

55


POLICING

COUNTER TERRORISM POLICING Following the nationwide launch of the Make Nothing Happen campaign, the National Police Chiefs’ Council explains how officers are urging the public to stay alert, report suspicious behaviour and help prevent attacks like those seen in Westminster last month

ENGAGING WITH THE PUBLIC TO PREVENT TERRORISM ven in the hi-tech world of counter terrorism policing, a good old fashion tip-off from the public is still welcome. In fact, it could be more important than ever. To press the point home, the latest campaign from the National Police Chiefs’ Council is calling on the public to play a part in tackling terrorism by contacting police if they have any concerns about suspicious behaviour. Officers are keen to spread the message that the key to preventing an atrocity like that seen in Westminster could rest with anyone. With the widespread availability of encrypted communications, and the increasingly rapid speed at which vulnerable individuals can be radicalised, police want a whole-community approach to help spot and stop would-be attackers. Ultimately one short call or online report to police could help prevent mass murders like those seen in London, Nice, Berlin, Brussels and many other towns and cities across the globe. The ‘Make Nothing Happen’ campaign, costing £750,000 and rolled out nationwide, aims to demonstrate to the public how they can help strengthen the intelligence pictures held on the UK’s top terror suspects and those yet to come to police attention. Launched in Manchester just weeks before the Westminster tragedy, it is the first project under the new CT Policing branding platform, ACT: Action Counters Terrorism. This is an innovative new tool to bring all counter terrorism campaigns under one banner, urging the public to act on their instincts and report suspicious activity to the police.

E

56

At the launch senior officers revealed that ordinary members of the community had contributed important intelligence to around a third of their current ‘high-risk’ investigations. This included providing new leads or corroborating facts for around 30 on-going cases. However, while grateful for the assistance, officers explained they were keen to understand how this figure could be increased, and what the barriers are preventing people from picking up the phone and sharing what they know.

concerns for fear of being thought time wasters. Lucy D’Orsi, deputy assistant commissioner, appointed the National Police Chiefs’ Council lead for protective security at the end of 2016, said: “The research gave us a real insight into how the public view terrorism, the policing response, and the contribution they can make. “We found both a desire to help police but also a reticence and we realised we needed to work to overcome the reasons for this. We needed to demonstrate to people that if they

A GOOD OLD FASHION TIP-OFF FROM THE PUBLIC IS STILL WELCOME. TO PRESS THE POINT HOME, THE LATEST CAMPAIGN FROM THE NATIONAL POLICE CHIEFS’ COUNCIL IS CALLING ON THE PUBLIC TO PLAY A PART IN TACKLING TERRORISM BY CONTACTING POLICE IF THEY HAVE ANY CONCERNS ABOUT SUSPICIOUS BEHAVIOUR As a result, National Counter Terrorism Policing HQ commissioned research that threw up some interesting results and illuminated public attitudes towards the extremist threat. On the plus side, the findings showed there was generally a positive attitude about the work CT police were doing to keep the public safe. The respondents also widely acknowledged that there was a responsibility on all communities to tackle terrorism. However, there was also a notable lack of understanding of what suspicious behaviour might look like, and almost a quarter of participants said they would not report

call us, and their concern turns out to be nothing, that is absolutely fine. No one is going to get into trouble and our response will be completely proportionate. It’s important we convince those who worry they might be wasting our time that we would rather it proves nothing than risk missing something crucial. “Sadly, just a short time after launching the campaign, we were again appealing for information from the public about a specific individual who had been responsible for the deaths in Westminster of four innocent people and injuries to many !

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


POLICING

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

57


POLICING

ACT CAMPAIGN RESEARCH

Crown Copyright 2014. Contains public sector information licensed under the Open Government Licence v3.0

The research used to shape the ACT campaign was commissioned by National Counter Terrorism Policing Head Quarters and carried out by an external agency. In total 2,198 adults across England, Wales and Scotland were asked about attitudes towards aspects of CT policing. Key findings were: ! 73 per cent of respondents said they were concerned about terrorism. ! 17 per cent (top score) of respondents said the main reason for concern is that terrorism is unpredictable and can affect anyone, anywhere. ! 75 per cent of respondents said police were working hard to prevent terrorism. ! 79 per cent of respondents said it was not just the responsibility of the police to tackle terrorism. ! 83 per cent of respondents said it was important communities work together to defeat terrorism. ! 29 per cent of respondents said they might not report suspicious behaviour in case their suspicions were incorrect. ! 39 per cent of respondents said they were unsure what kind of activity they should be reporting. ! 26 per cent of respondents said they might not report suspicious behaviour as they wouldn’t want to be seen as wasting police time. " more. It was a painful illustration of just how important information from the public could be to us.” THE CT POLICING NETWORK To illustrate these points, the communications effort around the campaign focused on a major press launch, held in Manchester to emphasise the national nature of the CT policing network, producing social media videos, radio adverts and – in a first for policing – a podcast entitled ‘Code Severe’. This outlined two real-life attack planning investigations that received a major boost following calls from the public, and otherwise could have caused mass casualties in crowded places. BAFTA-nominated actor Mark Strong narrates the tales – one involving a terrorist network plot to cause multiple deaths and injuries with a fertiliser bomb and the other a lone actor who was experimenting with IEDs to detonate in a shopping centre. Both cases resulted in successful prosecutions. The two accounts include contributions from detectives, surveillance officers and

58

A PODCAST ENTITLED ‘CODE SEVERE’ OUTLINED TWO REAL-LIFE ATTACK PLANNING INVESTIGATIONS THAT RECEIVED A MAJOR BOOST FOLLOWING CALLS FROM THE PUBLIC, AND COULD HAVE CAUSED MASS CASUALTIES members of the public who made the all-important calls. In one part, a senior investigating officer recounts how an operative planting a listening device in the home of a key suspect realised he was missing a screwdriver after taking an inventory of his equipment. With the suspect due to return at any moment, the officer had to act quickly to recover the missing item before the operation was compromised. Code Severe went on to reach number two in the podcast charts, beating established offerings from the BBC like the weekly film review and Desert Island Discs. D’Orsi adds: “We committed considerable funds to the campaign so needed to be innovative in order to get the public’s attention. The news agenda is so competitive we looked at breaking new ground by trying something different. A media company worked alongside our communications team to advise us on how to maximise our coverage. “But the true test of whether the investment was a good one is if

we have succeeded in convincing people to feel confident in calling us. We will undertake a full evaluation of the campaign in due course but in the short term we can see that the number of calls we received to the Anti-Terrorist Hotline and online referrals via the gov.uk/ACT website increased following the coverage we received. “In the first week calls to the hotline were up 67 per cent and referrals to the Counter Terrorism Internet Referral Unit almost quadrupled. We were trending at number two on Twitter on the first day and increased the number of people following the official @TerrorismPolice by 28 per cent. So the early signs were very encouraging.” D’orsi will be the most senior CT officer speaking at this May’s Security & Counter Terror Expo at Olympia, and will use the opportunity to tell her audience of security professionals that the terror threat is becoming increasingly complex and varied. In the wake of the incident in Westminster, she will outline the latest developments in the police’s

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


POLICING

“COUNTER TERRORISM POLICING IS WORKING HARD TO KEEP THE PUBLIC SAFE. TOGETHER, THE UK INTELLIGENCE COMMUNITY (MI5, SIS, GCHQ) AND POLICE HAVE DISRUPTED 13 UK TERRORIST ATTACK PLOTS SINCE JUNE 2013. BUT ADVANCES IN TECHNOLOGY MAKE IT MORE COMPLEX TO SPOT WOULD-BE TERRORISTS” approach to protective security. She we have seen in London, major comments: “The official threat level European cities and beyond. It is a remains at ‘Severe’ meaning an challenging landscape for us and attack is highly likely. It continues our international partners.” to diversify and expand. This is seen Police will use this year’s Expo to in cases where terrorists have been highlight the work they are currently able to reach across the world to doing with the haulage industry radicalise often vulnerable, volatile following the attacks using HGVs or chaotic individuals and groups, in Nice and Berlin which killed 98 and inspire and direct them using and injured hundreds more. instant and secure communications. “Counter terrorism policing is working RAISING AWARENESS hard to keep the public safe. Together, Information sharing with vehicle the UK intelligence community (MI5, owners and drivers has been central SIS, GCHQ) and police have disrupted to raising awareness. Again officers 13 UK terrorist attack plots since June have been reassuring this particular 2013. However, advances in technology sector that calls to the Anti-Terrorist make it more complex and challenging Hotline to raise concerns will be for us to spot would-be terrorists dealt with proportionately and because it’s easier for them to be in confidentially by a specialist team. contact with others and be radicalised D’Orsi will also cover the changing in a relatively short space of time. pathways to radicalisation, “The threat is becoming more the continuing challenges resulting varied with a move towards low-tech from the growth of social media ESS17 185x128HP USE.qxp_Layout 1 06/02/2017 19:35 Page 9 attacks on crowded places, like those and the work being carried out by

the world’s first Counter Terrorism Internet Referral Unit (CTIRU). Since the department’s launch in 2010 it has worked with international partners and industry to remove over a quarter of a million pieces of terrorist literature online. More information about the ACT campaign, how to contact the Anti-Terrorist Hotline (0800789321) and the CTIRU, can be found at gov.uk/ACT. !

FURTHER INFORMATION www.npcc.police.uk

017 | www.emergencyuk.com | Hall 5 | NEC | Birmingham | 20-21 September 2017 | www.emergencyuk.com | Hall 5 | NEC | Birmingham | 20-21 September 2017 | www.emergencyuk.com | Hall 5 |

“Meeting up with other emergency services means we can plan how to work together more effectively at future incidents.”

Photograph © ESS

Elisha Marsay, SC, North Yorkshire Police

The Emergency Services Show 2017 – it’s all about you A unique event for everyone who works in the emergency services. Over 400 exhibitors, free seminars and product demonstrations. Hall 5, NEC, Birmingham. Wed 20 – Thu 21 September 2017. Free entry at www.emergencyuk.com. Event partners

Media partners

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

59


QEII CENTRE LONDON, UK CONFERENCE: 26-28 JUNE 2017 EXHIBITION: 27-28 JUNE 2017

• Meet 2,000 attendees from 70+ ePassports visas national IDs worker credentials breeder documents advanced border control anti-counterfeiting document design

countries at this major global secure document and identity technology event

• Free-to-attend exhibition featuring 140 leading companies and organisations as well as a free seminar programme

• Multi-track conference with a

series of in-depth, non-commercial presentations, case studies and discussions. Book early for the best rates

driving licences registered traveller programmes eID and much more…

THE GLOBAL HUB FOR NEXT-GENERATION CITIZEN AND GOVERNMENT ID SOLUTIONS

www.sdwexpo.com

ORGANISED BY:


2017 Walter E. Washington Convention Center, Washington, DC, USA

Conference: May 1–3, 2017 · Exhibition: May 2–3, 2017

One global ID event 1250 identity professionals Countless opportunities

4th Edition

Exploring next-generation identity technologies and solutions Conference

Exhibition

■ Multi-track conference - an exploration of the challenges and opportunities that arise from implementing advanced identity solutions, whether used in aviation, border control, healthcare, finance, or commerce.

■ 75+ industry leaders exhibiting the latest identity technology, services and solutions.

■ NEW – Innovators’ Platform. Plus, in-depth, non-commercial presentations, case studies and discussions by expert speakers.

■ Network with 1250 international attendees from governments, industry, NGOs, and professional service providers.

■ Conference discounts for early bookers, government and selected end users.

■ Compare an impressive array of identity focused products and services all under one roof.

■ No charge for visitor entry.

Event powered by

www.connectidexpo.com


CYBER SECURITY

CYBER SECURITY Cyber security, and the money being spent on it, is increasing in importance within the UK. As the threat of terrorism evolves and becomes far more than just a physical danger, the role of organisations and government departments, like the National Cyber Security Centre, becomes pivotal in the UK’s defence strategy. Counter Terror Business explores

A NEW APPROACH FOR CYBER SECURITY IN THE UK n announcing the launch of the five year National Cyber Security Strategy in November 2016, Chancellor Philip Hammond said that it was ‘crucial that Britain is a safe place to do digital business’ and that, in order to achieve this, ‘we need a secure cyber space’. Underpinned by £1.9 billion of transformational investment, the strategy is built upon three core pillars: defend, deter and develop, and is supported by National Cyber Security

I

62

Centre (NCSC) – an organisation Hammond labelled as a ‘dedicated, outward-facing authority on cyber’. Cyber crime and digital terrorist threats are not the anomaly that they once were. Indeed, Ciaran Martin, chief executive of the NCSC, has stated that ’stealing information for financial and political purposes is as old as human activity itself’, and that we need to demystify the assumption that cyber terrorists and criminals are ‘people sitting in

computers at far away places, that cannot be contested’, highlighting that it is an ‘incredibly damaging attitude’ to take, one which we can assume will not be happening on his watch. For that reason, January’s annual Crime Survey for England and Wales included cyber crime offences for the first time, reflecting the very real ‘threat faced by the public every day’. The survey concluded that there were a total of 40,202 offences flagged as online crime

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


CYBER SECURITY to the year ending September 2016. As this is the first annual recording there are no previous figures with which to compare, but the fact the figures were included highlight a number of things. The survey measures crime by asking members of the public about their experiences of crime over the previous 12 months. While the Office for National

security has been threatened by 188 high-level cyber attacks in the last three months, most of which threatened national security. Martin said that attempts on government departments were designed to ‘extract information on UK government policy on anything from energy to diplomacy to information on a particular sector’, with some attempted

JANUARY’S ANNUAL CRIME SURVEY FOR ENGLAND AND WALES INCLUDED CYBER CRIME OFFENCES FOR THE FIRST TIME, REFLECTING THE VERY REAL ‘THREAT FACED BY THE PUBLIC EVERY DAY’. THE SURVEY CONCLUDED THAT THERE WERE A TOTAL OF 40,202 OFFENCES FLAGGED AS ONLINE CRIME TO THE YEAR ENDING SEPTEMBER 2016 Statistics (ONS), who conduct the survey, reported that there was ‘no statistically significant change’ compared with the previous year’s survey, the fact that there was no recognised statistical change in the number of crimes, and yet it was the first time that cyber crime was included suggests that the dominance and regular occurrence of cyber crime is increasing at pace. In the past burglary and theft of vehicles were the high volume crimes driving trends, but the latest report shows fraud and computer misuse as the new headline figures. Writing recently in the Sunday Times, Ciaran Martin revealed that Britain’s

attacks being conducted by Russian and Chinese state-sponsored hackers, similar to those which led to the publication of leaked emails from Democratic Presidential candidate Hillary Clinton in the run-up to November’s US election. Martin and Hammond have both expressed concern over the recent ‘change in Russian aggression in cyber space’, culminating in cyber attacks on political institutions, parties and organisations. Hammond, writing in the Sunday Telegraph, said the NCSC was blocking nearly 200 potential attacks on government departments an members of the public each day, resulting in approximately 34,550 attacks over the last six months.

Contains public sector information licensed under the Open Government Licence v3.0

THE INTERNET REVOLUTION In advance of the formal opening of the NCSC, which took place on 14 February, Hammond warned companies that they needed to be aware of the ‘alarmingly real security threats’ and vulnerabilities that come with advancing technologies. The Internet of Things has the potential to create more dynamic, cost effective and responsive services across both the private and public sector, with the digital sector already pumping nearly £120 billion into the UK economy every year. But it also has the capacity to increase the dangers facing organisations if the right security is not in place. The damage that can be inflicted has been highlighted in the high profile attacks against Sony, TalkTalk and French TV station Monde. Worryingly, while two-thirds of large businesses reported a cyber breach or attack in the last 12 months, nine out of 10 businesses are currently operating without having an incident management plan in place for the possible event of a cyber breach. Martin has stated that, alongside the intelligence agency GCHQ, he wants to make the UK ‘the hardest target’, an effort that will require increased cooperation and focus from the government and private sector. The main aim, at least in the short

term, is to protect sensitive data, whether that be that of MPs and government officials or companies operating with large quantities of their users personal information – including names, addresses, bank details etc. In 2015, the Office of Personnel Management confirmed that nearly four million US government workers had been struck by data breaches, which revealed employee job assignments, performance reviews and training. The NCSC will continue to ensure that no such breach occurs in the UK. Despite the work and opening of the NCSC, the House of Commons Public Accounts Committee has examined measures to protect information across government and warned that the government faces ‘a real struggle’ to find enough staff with the skills to fight the rapidly growing threats. The Committee concludes that while the threat from cyber attacks has been one of the top four risks to national security since 2010, it has taken government too long to consolidate and coordinate the ‘alphabet soup’ of agencies that protect Britain, with processes for recording departmental personal data breaches by government departments too ‘inconsistent and dysfunctional’. Challenging the words of Hammond and Martin, who have done much to reassure the public in emphasising the number of threats deterred in recent months, the Public Accounts Committee calls on the Cabinet Office to develop a detailed plan for the new NCSC, explaining ‘who it will support, what assistance it will provide and how it will communicate with organisations needing its assistance’. Clarity, which the committee claim is lacking, appears to be the order of the day, with Meg Hillier, who chairs the committee, saying that the government’s approach to ‘handling personal data breaches has been chaotic and does not inspire confidence’, branding its leadership as ‘inadequate’. One of Martin’s most pressing concerns should be establishing clear communications lines between the NCSC and government and clarify the work being undertaken and the support it is providing. Time will tell how successful he, and the wider work of the NCSC, is in establishing clear cyber security guidelines. THE IMPORTANCE OF PROTECTING PRIVACY In November 2016, a 17-year-old boy admitted hacking offences linked to a data breach at the communications firm TalkTalk, revealing that he had used hacking tool software to identify vulnerabilities on target websites. The cyber attack on the company in October 2015 prompted fears thousands of people may have had their online details stolen, after the data haul netted email addresses, names and phone numbers, as well as 21,000 unique bank account numbers and sort codes. !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

63


CYBER SECURITY Contains public sector information licensed under the Open Government Licence v3.0

! TalkTalk itself, who claim that the hack cost them £42 million, was fined a record £400,000 for security failings which allowed customers’ data to be accessed ‘with ease’, with the situation raising concerns about the safety of customers and members of the public entering personal information onto websites, with many websites not offering the opportunity to do so, with ‘security’ given as the reason. In January 2017, a blog post from the NCSC offered some advice on the debate, suggesting that organisations should stop preventing customers and users from pasting their passwords into the required bars on their websites, because the positives of pasting passwords outweighed the risks. The blog post, titled ‘Let them paste passwords’, read: “We think customers should be allowed to paste their passwords into forms, and that it improves security. We believe [stopping password pasting] is one of those ‘best practice’ ideas that has a common sense instant appeal that may have made sense once. Considering the bigger picture today, it really doesn’t make sense.” The NCSC argue that password pasting improves security because it helps to reduce password overload. Additionally, it urges that password managers can be a beneficial tool because it makes it much easier to have

different passwords for each website site used, without the frustration of typing errors or forgetting passwords. Prevention of using password managers means that customers are far more likely to re-use the same passwords on different websites, choose very simple (and so easy to guess) passwords or write passwords down in places that are easy to find – each hindering personal security. CYBER SECURITY GUIDANCE Updated in August 2016, NCSC’s 10 Steps: Executive Summary sets out what a common cyber attack looks like and how attackers typically undertake them, and offers an effective means to help protect organisations from attacks. Here, we look at the 10 steps in detail. NCSC encourages organisations to embed a clearly communicated and appropriate risk management regime, that ensures that all employees (including governance), contractors and suppliers are aware of the approach, how decisions are made, and any applicable risk boundaries. Additionally, having an approach to identify baseline technology builds and processes for ensuring configuration management can greatly improve the security of systems. Therefore, companies should develop a strategy to remove or disable unnecessary functionality from systems, and to quickly fix known vulnerabilities, usually via patching.

EXECUTIVE SUMMARY SETS OUT WHAT A COMMON CYBER ATTACK LOOKS LIKE AND HOW ATTACKERS TYPICALLY UNDERTAKE THEM, AND OFFERS AN EFFECTIVE MEANS TO HELP PROTECT ORGANISATIONS FROM ATTACKS The connections from your networks to the Internet, and other partner networks, expose company systems and technologies to attack. By creating and implementing some simple policies and appropriate architectural and technical responses, UK organisations can reduce the chances of these attacks succeeding or causing harm. Rather than focusing purely on physical connections, companies should consider where their data is stored and processed, and where an attacker would have the opportunity to interfere with it. Concerning the managing of user privileges, companies should provide users with a reasonable, but minimal, level of system privileges and rights needed for their role. The granting of highly elevated system privileges "

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

65


Rugged Mobile Computing Solutions

MX50 BATTLE READY FULLY SECURE

5.7” Natively Rugged COTS Tablet with IP67 Rating •

Approved for U.S. Government use under the NIAP Commercial Solutions for Classified program (CSfC).

5.7” LumiBond® 2.0 Display with Getac Sunlight Readable Technology and Gloveenabled Capacitive Touchscreen

Defense Specific features such as rugged connector options, NVIS compatible*, programmable keys, Molle-vest mount, etc.

Future & Legacy system compatible and with SnapBack battery for independent use. *Night Vision capability is dependent on use of optional filter supplied seperately.

Battlefield Technology for the Digital Soldier. Getac UK Ltd Tel: 01952 205200 Email: Defence_UK@getac.com Web: www.getac.com Copyright © 2017 Getac Technology Corporation and/or any of its affiliates. All Rights Reserved. V01M02Y17


CYBER SECURITY ! should be carefully controlled and managed. Likewise, users have a critical role to play in their organisation’s security and so it’s important that security rules and the technology provided enable users to do their job as well as help keep the organisation secure. It is needless to say that all organisations, no matter how security focused and cyber trained, will experience security incidents at some point. Investment in establishing effective incident management policies and processes will help to improve resilience, support business continuity, improve customer and stakeholder confidence and potentially reduce any impact. Malicious software, or malware is an umbrella term to cover any code or

content that could have a malicious, undesirable impact on systems. Any exchange of information carries with it a degree of risk that malware might be exchanged, which could seriously impact your systems and services. The risk may be reduced by developing and implementing appropriate anti-malware policies as part of an overall ‘defence in depth’ approach. System monitoring provides a capability that aims to detect actual or attempted attacks on systems and business services. Good monitoring is essential in order to effectively respond to attacks. In addition, monitoring allows you to ensure that systems are being used appropriately in accordance with organisational

policies. Monitoring is often a key capability needed to comply with legal or regulatory requirements. Removable media provide a common route for the introduction of malware and the accidental or deliberate export of sensitive data, and therefore companies should be clear about the business need to use removable media and apply appropriate security controls to its use. Regarding mobile working, companies should establish risk based policies and procedures that support mobile working or remote access to systems that are applicable to users, as well as service providers – training users on the secure use of their mobile devices in the environments they are likely to be working in. "

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

67


3000+ 150+ 175+

Critical Communications Professionals

exhibitors

speakers

16 - 18 May 2017 Asia World Expo, Hong Kong

UNDERSTAND THE NEEDS OF THE MODERN END USER TO OPTIMISE YOUR NETWORK

GATHERING A TRULY GLOBAL AUDIENCE FOR THE 19TH YEAR

2017 GOLD SPONSORS

2017 SILVER SPONSORS

Mission Systems

https://tmt.knect365.com/critical-communications-world


CRITICAL COMMUNICATIONS WORLD

The world’s leading critical communications congress and exhibition, Critical Communications World, is heading to Hong Kong on 16-18 May. Counter Terror Business previews the show

CONNECTING CRITICAL COMMUNICATIONS PROFESSIONALS C ritical Communications World (CCW) is the leading and most influential congress and exhibition dedicated to connecting critical communications professionals for three days of thought provoking discussion, debate and networking. Hosting this year’s 19th annual event in Hong Kong provides the perfect setting, with this year’s theme focused on network optimisation and transition. With many areas in Asia and indeed across the rest of world looking to get the most of their current networks as well as understanding how they can smoothly transition to networks offering more functions, this year’s conference will attract senior thought leaders from all major projects to share their experiences and insight to meet the demands of the modern end user. The conference promises to be the most international to date with speakers from TELSTRA (Australia), Hong Kong Police (Hong Kong), DNK (Norway), MSB (Sweden), Ministry of Interior (France), Virve (Finland), Powertrunk (USA), Canadian Police Chiefs (Canada) as

well as speakers from Pakistan, Singapore, China, Germany, UAE, Saudi Arabia, Qatar, Brazil, Malaysia, Korea, Serbia and more. Among the numerous conference sessions, Datuk Badlisham Ghazali, managing director at Malaysia Airport, will be part of the Transportation Panel Session, which will analyse transition trends for railways, metros and airports. Prashant Rao, executive director of Delhi Metro, Robin Davis, chairman of the TETRA & Critical Communications Association (TCCA) Transportation Working Group, and Tony Gray, board director for TCCA, will be going him for the panel discussion. Jamie Woodruff, chief technology officer at Patch Penguin, will be hosting a presentation on ‘Are we taking cyber security threats seriously enough?’. This session will seek to answer the questions of: what are the most recent cyber attacks to have occurred globally?; how has this impacted the critical communications industry?; and, in light of the migration towards more digital solutions and even further into the future IOT, will the !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

69


MULTIPLE PERSONALITY ORDER Manage multiple identities seamlessly and securely on one device. In today’s world, police and security officers face ever-greater physical and electronic risk. WorkFone® reduces this risk by delivering multiple professional identities on a single smartphone, increasing control while securely handling all communication needs, including voice and SMS. It’s simple and it’s familiar. If you can use a phone, you can use WorkFone.

WorkFone. For every you.

As seen at Security & Policing 2017 07-09 March 2017 | Farnborough, UK | Booth Z3

workfone.com


CRITICAL COMMUNICATIONS WORLD ! threat of cyber attack be increased? The Hong Kong Panel Session, led by Dr Jolly Wong, chief technology officer of the Hong Kong Police, will investigate ‘Using your network innovatively to optimise performance’. Hong Kong has the highest TETRA usage per capita in the world. In this panel session MTR, Hong Kong Airport, Hong Kong Police, Hong Kong Electric and China Light & Power will share their recent challenges and achievements as well as their future vision for each network. Additionally, John Dundas, radio services manager at the Rio Olympic Games 2016, will share the lessons learnt from the Rio Olympics, addressing the challenges of scalability and asking what still needs to be done to best equip event security services. Following this, Steve Whatson, deputy director of ESN at the Home Office, will present a UK case study, looking at ‘Transitioning from TETRA to Full Public Safety LTE’, which will provide an update on ESN to date, analysing timelines and key benchmarks and the challenges experienced to date. SPEAKERS AND SEMINARS As well as the conference, delegates will also gain access to the speaker roundtables – providing intimate, focused discussion groups over lunch. On the pre-conference day, CCW will also offer delegates the opportunity to attend eight half-day masterclasses whereby interested delegates can hear and engage with experts from the TCCA covering: An introduction to TETRA; An introduction to LTE; Critical Control Rooms and Data Applications; Critical Communications Security; The Unique Challenges in Transportation; SCADA and Telemetry; The Evolution of Broadband as well as Indoor Solutions. Critical Communications World will also provide free content for visitors on the show floor, featuring a high level seminar programme dedicated to future technologies, data apps & control rooms, providing visitors with the opportunity to

CRITICAL COMMUNICATIONS WORLD WILL PROVIDE FREE CONTENT FOR VISITORS ON THE SHOW FLOOR, FEATURING A HIGH LEVEL SEMINAR PROGRAMME DEDICATED TO FUTURE TECHNOLOGIES, DATA APPS & CONTROL ROOMS, PROVIDING VISITORS WITH THE OPPORTUNITY TO HEAR FROM END USERS AND LEADING SOLUTION PROVIDERS ALIKE ON THE LATEST TECHNOLOGY APPLICATION CASE STUDIES hear from end users and leading solution providers alike on the latest technology application case studies. With the return of CCLive and live social media feeds, attendees will be able to digitally follow the event via live screens ensuring they do not miss a minute of the event. Sessions planned for the Critical Communications Live Theatre include: ‘Integrated Alerting, Communication and Resource Management for Emergency Services’; ‘Technology evolution and how the users’ operational models are evolving’; ‘How public safety can benefit from Big Data and analytics’; and ‘Digital Workflows and Real-Time sharing: Re-defining processes in the hybrid world’. CCW CONGRESS The Asian market is going through big developments and provides a wealth of opportunity, with some regions just starting to move away from analogue to other regions really innovatively using their TETRA networks whilst incorporating broadband solutions. With an expected attendance of over 650 delegates, the 19th annual congress will walk the delegate through the critical communication developments in Asia by region through country specific case studies, deep dive panel sessions, live polling, interviews and challenger sessions – a new addition to this year’s congress. Emma Banymandhub, event director, Critical Communications World, said:

“CCW 2017 is shaping up to be the largest and most successful World event we have ever ran in Asia. We are projecting more exhibitors and visitors than ever before and we will welcome over 120 of the industry’s leaders and experts to the Congress. “Hong Kong is a hub for Asia and beyond, so I expect to see the widest variety of delegates with whom you will have numerous networking opportunities to learn from their experiences – those that currently use analogue networks, those that use TETRA and other standard PMR networks and those that are looking for broadband solutions. This is not just an Asian event. It is a global event. As well as Asia, we will hear from speakers from the Middle East, Europe, Africa and the Americas and have the opportunity to visit an extensive exhibition of the latest critical communications equipment and applications from around the world.” Critical Communications World 2017 is presented by TCCA, in partnership with KNect365. This year’s major sponsors include Airbus, Huawei, Leonardo, and Motorola Solutions (Gold Sponsors) and Cobham, General Dynamics and Nokia (Silver Sponsors). "

FURTHER INFORMATION

tmt.knect365.com/ critical-communications-world

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

71


Cyber Incident Response 24/7 0203 095 0520 • PCI-DSS

Compliance • ISO 27001:2013 • General

Data Protection Regulation • UK Data Privacy • Cyber Threat and

Mitigation Advisory • Outsourced CISO

• Cyber Incident

Penetration Testing

PCI Penetration Testing

ASV Scanning

Vulnerability Analysis

Data Discovery & Scanning

Response • Payment Forensics

(PFI) • Commercial & Civil

Litigation Support • IP theft & Fraud

Investigation • Criminal Prosecution

& Defense • CorporateCounter

Espionage • Mobile & Cell Site

Analysis

Audit & Advisory

Forensics

Assurance

Why Risk-X?

Risk-X is a global provider of Advisory, Audit, Forensics, Incident Response and Assurance Services. We were formed by a team originally from the roots of major corporate consulting. Becoming disillusioned with the corporate consulting world that was not acting in the best interests of customers or their end consumers we formed Risk-X. We knew that we could do better, and have (ask our customers). Over the last five years we have bolstered our expertise from specialists gained from law enforcement, military services, niche service providers and the best from the big four consulting houses. This led from the same management and investment team has seen sustained growth and the addition of allied services. We are well financed, motivated, hungry for your business and seek to delight in every engagement. When it comes to security and specialist resources we have real world experience across all market sectors and verticals. We only take on work we know we can complete in line with your requirements and charge for what we do. We support ‘plain English’ and do not hide behind fancy lawyers so engaging with us is easy and simple. So whether you are a public or private sector organisation, Risk-X is able to assist you with all of your objectives. We have specific datasheets on each of our offerings so speak to one of the sales team today.

+44 (0)203 040 2990

Risk-x.co.uk

info@risk-x.co.uk

www.risk-x.co.uk

Your data. Assured

© 2017 Risk-X LLP, Risk-X (UK) Ltd & Risk X Data Assurance (Pty) LTD (“Risk-X”). All TM r ights belong to t heir respective owners. No r eproduction without the express consent of Risk-X Ltd Registered in England at Chandos House, School La ne, Buckinghamshire, MK181HD. Pa rtnership Number OC366692


INFOSECURITY EUROPE

Infosecurity Europe is the place to be for everything you need to know about information security. Counter Terror Business previews June’s event and the theme of ‘Security at the Speed of Business’

THE FUTURE OF THE INFO SECURITY INDUSTRY gainst a backdrop of global economic and political uncertainty, organisations are rapidly transforming, taking advantage of new technologies and new working practices to enhance business agility, efficiency and profitability. As organisations connect and evolve, new attack vectors are emerging, ready to be exploited by the sophisticated cybercriminal. The challenge for information security professionals is to keep pace with the speed of business change, evolve the maturity of the information security function and reposition information security as a business risk and a business enabler. At the same time the agile information security function needs to be resourced with the skills and capabilities to deal with the increasing complexity of the threat landscape. The Keynote Stage will look at the challenges of developing an agile security strategy that can keep pace with business transformation and with the evolution of the cyber threat landscape and provide strategic and practical advice on how to address these challenges. Now in its 22nd year, Infosecurity Europe, taking place in 6-8 June

A

at Olympia, London, is the region’s number one information security event featuring Europe’s largest and most comprehensive conference programme and over 360 exhibitors showcasing the most relevant information security solutions and products to 13,500 visitors. INSIGHT, IDEAS AND INSPIRATION Following extensive research with the information security end-user community and consultation with an Advisory Council of senior industry practitioners, the Keynote Stage is the vibrant hub of the Infosecurity Europe conference programme. The Keynote Stage provides attendees with direct access to information security knowledge and expertise from some of the industry’s leading end-user practitioners, policy-makers, analysts and thought-leaders. Delegates will gain new ideas, insight and inspiration to enable them to streamline their information security strategy, accelerate the effectiveness of their security tactics and reinforce the critical position of the information security function. The Keynote Stage agenda has been developed to provide attendees with practical,

NOW IN ITS 22ND YEAR, INFOSECURITY EUROPE, TAKING PLACE IN 6-8 JUNE AT OLYMPIA, LONDON, IS THE REGION’S NUMBER ONE INFORMATION SECURITY EVENT

actionable takeaways that can be applied directly to your business. Key themes to be addressed in the 2017 Keynote Stage agenda include: managing the human risk – analyse user behaviour and discover how to change it; building an agile security team – understand the skills required for an effective team, how to attract and retain staff and which skills you need to be developing to enhance your carrier; securing critical information assets and achieving compliance – benchmark your organisation’s compliance to EU GDPR, discover how to secure your organisation’s critical data both on premise and in the cloud and analyse the evolution of privacy and security functions; disruptive technologies – get to grips with Blockchain and AI and understand what they mean for information security; and building a cyber resilient enterprise – discover how to build an effective SOC capability and identify new approaches to respond to a cyber attack. Additionally, the Discovery Zone, which will host more than 80 new companies in 2017, is a dedicated area to first-time exhibiting companies at Infosecurity Europe. From start-up to world-class companies, step into this dynamic show area and engage with potential suppliers you did not meet the previous years. This is the quickest and easiest way to find out about their latest and most innovative range of information security products and services in one single place. !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

73


Cyberattacks costs UK business more than £34 billion a year… Don’t let your organisation become another statistic. Secure your network with iboss Cybersecurity Solutions. Visit us at Info Security 2017 at London Olympia, stand number E40

www.ibosscybersecurity.com | +44 (0) 20 3713 0470 iboss Cybersecurity, 33 Queen Street, London, EC4R 1AP

74

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


INFOSECURITY EUROPE ! LETS TALK TECH Assembled following a call for papers, the Tech Talks are technical bite-size presentations addressing the latest challenges in information security and cyber security. The Tech Talks are vendor-led, with expert speakers from solution suppliers providing case studies and coverage of the latest hot topics. among the topics to be discussed this year are: Two-factor Authentication in Android, iOS and Windows 10 Mobile Devices; Defeating and Abusing Machine Learning-based Detection Technologies; The All Encompassing World of Botnets; Hybrid Cloud Secure Network Integration; The Top 4 Ways Vulnerabilities Creep Into Your Software; Using AI to Predict Malicious Infrastructure Activity; and IoT – The Consumer Skynet, a Corporate Liability, or the Best Thing Since Free Wi-Fi? The Tech Talks lead perfectly into the two organised conference sessions that form the Cyber Innovation Showcase. Bring Your Own Device (BYOD) can create a security havoc. Leveraging the CARE (Context Aware Risk Engine) technology ensures the right protection is given at the right moment and guards your organisation even when your employees use un-managed devices. Speaking on 6 June, Oded Zehavi, of Kaymera Technologies, will explain ‘How CARE Can Help Protect

Company Data in the Unmanaged BYOD Era’. Two days later, Franklyn Jones, chief marketing officer at Cyphort, will discuss ‘The Seven Secret Sins of SIEMs’. SPEAKING STRATEGIES The Strategy Talks are bite-size, inspirational presentations addressing the latest infosecurity business challenges. Like the Tech Talks, the sessions are vendor-led, with expert speakers from solution suppliers providing case studies and coverage of the latest hot topics. The talks help attendees discover how to align infosecurity with strategic business objectives, to overcome the latest challenges and access industry expertise that will support your information security strategy. Standout sessions from the Strategy Talks stream include: How Effective IT Security Monitoring Fosters Resilient Financial Institutions; Managing Security Risk at the Speed of Business, Not the Speed of Spreadsheets; Achieving Cyber Resilience in 2017; Securely Connecting a Global Workforce to the Cloud; The Communications Disconnect – What Separates You From Your Boss?; Information Security Compliance Training – the Good, Bad and Indifferent; The Four Dimensions of Data Breaches; Security Lessons Learned from Modern Day Cyber Attacks; and Artificial Intelligence and Smart Devices –

The New Frontier of Cyber Warfare. Infosecurity Europe 2017 will once again bring three exciting days of multiple opportunities for you to network with a global audience of over 18,000 information security professionals. Whether you are a junior or senior member in the industry, in the past, the event featured world-class companies such as Europol, Nike, Mozilla, Microsoft, Santander and many more. Located at the heart of the venue, the networking bar is the most popular place for both visitors and exhibitors to gather. Come along during the day to grow your professional network, exchange and learn best practices as well as profile yourself among the greatest. Furthermore, the Meet and Seat programme gives attendees access to an exclusive seating area with guaranteed space where you can host meetings or simply take time out to organise yourself. Bookable in one hour slots, clients get a separate table with chairs, on-site refreshments and dedicated Wi-Fi. Visitors are busy people and having facilities onsite means that you don’t need to take too long out of your diaries while still being able to make a more personal connection. "

FURTHER INFORMATION

www.infosecurityeurope.com

Providing a secure multi-factor authentication transaction authorisation and data encryption service Speed and accessibility to information is critical for any business, but these two factors need to be tightly and securely controlled. Creating a secure information environment and a mean to effectively manage access for you and your customers is the starting point of any digital transformation project / operating model. Moreover, it’s a must for compliance with data security and privacy regulations. UNLOQ gives you these very foundations. With solutions for identity registration, multi-factor authentication, different types of data encryption, flexible access rights management and data structures UNLOQ has the solutions. UNLOQ helps organisations unify and secure data currently kept in silos while providing an intuitive user experience. Respecting user rights like data portability and erasure, consent management and transparency constitute basic principles the firm considers in any product decision. Through application translation and customisation for both mobile and web user interfaces and private instance deployments, UNLOQ addresses data residency concerns and offers an end-to-end

custom branded user experience. UNLOQ’s products and services are trusted by some of the most innovative organisations who often hold strategic partner and leadership positions in identity and access management, transport, infrastructure and local governmental organisations. UNLOQ is part of the International Association of Privacy Professionals (IAPP) and is ISO 27001, 9001, 22301 certificated. UNLOQ promotes SaaS/PaaS delivery model through private instance in AWS, G-Cloud or Interoute with continuous monitoring and industry leading service legal agreements. Value driven close working relationships based on trust and in depth knowledge of the partners’ business are the starting points

of each project it undertakes. One might say May 25 2018 when GDPR comes into regulatory effect is far away on the horizon! But, there’s a lot to do to before you can safely arrive at this date with a compliant and secure information management environment. It’s not unrealistic to say you need at least a year to shape your digital presence to be compliant and thus avoid what in some instances will be very hefty fines and penalties. From securing your system through multi-factor authentication, achieving compliance with regards your customer’s identity management capabilities through to reshaping your entire digital strategy; UNLOQ can assist and help you traverse this minefield confidently and quickly. Are you attending InfoSecurity Europe on 6 June? Drop by UNLOQ’s stand at K76!

FURTHER INFORMATION Tel: +44 20 3514 5263 mircea.patachi@unloq.io unloq.io

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

75


We have your back

PD685

Whether you require digital radio communications with RFID reader and patrol checkpoints, lightweight, rugged handsets with emergency and privacy features, or slim, discreet radios with GPS and Bluetooth for covert operations, Hytera has your back.

Respond & Achieve

with Hytera Digital Radios for security professionals.

Get In Touch +44 (0) 208 9519820

radiocoms.co.uk


B-APCO 2017 The British APCO Annual Conference and Exhibition returned to Telford’s International Centre on 21-22 March, creating an arena focusing on public safety communications. Counter Terror Business reviews the event

PUTTING COMMUNICATIONS AT THE HEART OF PUBLIC SAFETY longside a plethora of the latest technology solutions from the industry’s top suppliers and sessions exploring, B-APCO 2017 included more interactive features than previous shows, including the inaugural B-APCO Product Innovation Award – presented to the product voted most innovative by visitors on the first day of the show. B-APCO also introduced a range of unique feature areas for this year, including a Technology Showcase Theatre, Control Rooms Arena, Product Innovation and Connected Vehicle Zone. The B-APCO Annual Conference and Exhibition brings together the entire public safety communications sector to source the latest equipment and systems, develop current and make lasting relationships and generate new business opportunities, establishing itself as the leading and must-attend event in the UK for the sector. Yet with the rapid evolution of technologies, and the constant shift of policy and challenging requirements of users, the show emphasised how it is more important than ever to stay abreast of the issues affecting the industry. Continuing the success of the 2016 edition of the show, the March 2017 event helped delegates and communications professionals re-focus, re-energise and re-engage with the sector they serve.

A

STAND-OUT CONFERENCE DISCUSSIONS Social media – Twitter, Facebook, Instagram and others – is now a core police tool allowing services to ask for and receive information from citizens instantaneously and provide a monitoring function. In light of this, Julian Foster, global co-lead for Social Media Center of Excellence, Motorola Solutions, was joined on stage at the BAPCO conference by a representative

from the UK Police Force to provide a detailed look into the transformative role being played by social media in public safety today. The session, ‘Social media in public safety – how far have we come’, examined the opportunities, challenges and future potential of social media use in public safety. Also on day one of the event, Andy Roe, deputy assistant commissioner of London Fire Brigade, explored the challenge of implementing effective communication structures at a major incident through a case study from the Croydon tram derailment. This session analyses major incidents, and how communication is used to ensure consistent passage of information through the operational, tactical and strategic layers of command as well as to the wider political and mass media audience. Research published by civil liberties campaign group Big Brother Watch last month criticised local authorities over their use of body-worn cameras, highlighting how a recent trend of ‘widespread filming’ by body-worn surveillance was not ‘proportionate’ to the often trivial offences committed. Ade Hutchinson, police lead for Mobile Technology, at the Metropolitan Police, used this as the basis for his session on ‘Embedding new technologies into the Police Service - Body Worn Video’. The force has recently commenced a 22 thousand unit roll out of Body Worn Video across its estate, with this presentation providing insight on the benefit the technology offers and the lessons learned, including how his team have worked innovatively with suppliers to deliver a long term partnership for successful implementation and asset usage. Speaking on day two of the event, Sarah Wilson, senior operations manager for North West Fire Control,

THE B-APCO ANNUAL EXHIBITION AND CONFERENCE BRINGS TOGETHER THE ENTIRE PUBLIC SAFETY COMMUNICATIONS SECTOR, ESTABLISHING ITSELF AS THE LEADING UK EVENT FOR THE SECTOR supplied a case study on integrated control rooms. North West Fire Control became the only fully integrated regional Control Room in England on 14 May 2014. The presentation covered how the transition took place paying particular attention to convergence, data migration and training, offering advice by detailing the benefits gained. A recent piece of research by the University of Leeds has examined current approaches to mobile working across all territorial UK police forces. Alistair Norman and Simon Williams, from Leeds University Business School, highlighted the initiatives, challenges and opportunities forces perceive and key trends in the medium term, and confirming mobile working as a key trend in policing. !

FURTHER INFORMATION www.bapco-show.co.uk

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

77


What is This Drone Doing – Hobbyist Photography or Criminal or Terrorist Reconnaissance and Intelligence Gathering?

The University of Birmingham has a new project on the Nefarious and Criminal uses of Drones.

presents a means of surveillance, reconnaissance and attack that was previously reserved for large piloted aircraft.

As part of the work of the project, we are seeking the views of the Counter-Terrorism, Policing and Policy Communities on the questions of vulnerabilities and risks posed by illegal drone use.

If you would like to take part, please click on the following link: https://surveyplanet.com/5799db788999a4805eb9a622

Drones possess many qualities which, when combined, make them potentially ideal means for terrorist attack in the twenty-first century. They can be operated anonymously and remotely; they present little or no risk to their operators of detection or prosecution; they can be acquired cheaply and easily; their operation can be mastered simply and safely; and they can be used to devastating effect. The aerial dimension they inhabit

We value your opinions and expertise. For more information about the project, please visit our website at: http://www.birmingham.ac.uk/schools/governmentsociety/centres/iccs/research/projects/nefariouscriminal-terrorist-uses-uavs.aspx


DRONES Estimated at around $127 billion, the ‘drone revolution’ is booming. But amid the optimism is a growing concern about the security threat that unmanned aerial vehicles pose to critical national infrastructure, domestic security and a range of commercial sectors. Counter Terror Business analyses the potential use and misuse of unmanned aerial vehicles

UAVS: HELP OR HINDRANCE IN FIGHTING TERRORISM? I n December 2016, American electronic commerce company Amazon released a video explaining the development of drone technology to ‘safely deliver packages to customers in 30 minutes or less’. Amazon Prime Air, as it is named, has been trialled in Cambridge and has the potential to transform and enhance the services that the company offers, providing quicker delivery of goods and increasing the safety and efficiency of the transportation system. With a capability to deliver packages weighing up to five pounds in 30 minutes, Amazon argues that the unmanned aerial vehicles (UAVs) will be ’as normal as seeing mail trucks on the road’. More importantly for this discussion, the delivery giant states that safety is the top priority, with all vehicles including ‘sense and avoid’ technology. Countering Drones, a conference organised by Defence IQ, released an infographic in the build up to its December 2016 event, stating that ‘amongst the optimism [for drone technology] is a creeping concern

about the security and safety threat that this technology presents to critical national infrastructure, homeland security and a range of commercial sectors’. While companies such as Amazon can enhance their offering and capitalise on their efficiency by developing the UAV commercial market, it is important that such innovations are effectively measured against the risk posed by drones.

SOARING SURVEILLANCE The use of drones within the defence and security sectors, as well as in military use, has developed at the same pace as the commercial innovations explored at companies such as Amazon. Created for use in situations where manned flight is considered too unsafe or high risk, UAVs offer military units the ability to have constant surveillance on the activities and movements of both their own troops and those opposing them. A 24/7 ‘eye in the sky’ allows surveillance staff to receive real-time imagery and intelligence of activities on the ground, without putting lives at risk, !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

79


A Unique Counter Drone Solution: Automated detection, reporting and defense Proprietary “Hunter Algorithm” seeks new drone signals Untroubled by Encryption

Unpack, Position, Turn On, PROTECT SCALABLE AUTOMATED AREA PROTECTION

Passively Monitor Airspace to Detect and Safely Disable Drones No Impact on other RF/RC signals or devices – Wi-Fi, Bluetooth and Mobile Phones Rapid Deployment including Static or Mobile Use Cost Effective, Reliable and Remote Software Updates

Discover MORE about Diametrex technology, visit Diametrex at STAND F80 during the Security and Counter Terror Expo 2017 www.diametrex.com +44 203 287 1263 Partnered with Marlborough Communications Ltd.


DRONES ! at least not immediately at risk. UAVs, as their name suggests, are unmanned, but are piloted, with a trained crew at base steering the craft, analysing the images which the cameras send back and acting upon the information that they receive. They are easy to operate and provide distance and anonymity to their operators, with battery improvements and higher technology cameras providing uninterrupted access to the air. However, the use of drones for surveillance purposes has been exceeded by use for air strikes. Although much remains unknown, it has been reported that there were ten times more air strikes (563) in the covert war on terror during President Barack Obama’s presidency than under the Presidency of George W. Bush (57), mainly on suspected militants in Pakistan’s tribal areas. Whilst the Obama administration continues to say that drone strikes are ‘exceptionally surgical and precise’, the figures suggest otherwise. According to reports logged by the Bureau, between 384 and 807 civilians were killed in Pakistan, Somalia and Yemen as a result of the drone strikes. The argument for use is that it prevents the need to send in military personnel for costly ground wars, but human rights groups have a lot of support in contesting the continued use of drones in military activity. DRONES AS A DISPERSAL DEVICE Additionally, it was reported in January that ISIS are using drones to drop explosives on civilians and troops advancing in districts of Mosul, with markets in the eastern part of the city, where civilians gather in large numbers to stock up on food, targeted. More than one million civilians remain inside Mosul, despite ongoing campaigns to drive Islamic State from the city. Causing further concern, a research paper has suggested that Islamic State are planning to ‘marry together two technologies, drones as a dispersal device and chemical, biological or radiological material as the dispersant’. Professor David Hastings Dunn, of the University of Birmingham, has penned his concerns on the possible ‘technology transfer’ of techniques and tactics used in Islamic State planning. He argues that drone attacks could be ‘psychologically unnerving and terror inducing’ and that security and military officers should be well aware and prepared for the possible ‘weaponising [of] a drone to carry a chemical agent’. On a separate note, but in defence to the threat of drones, Hastings Dunn refers to the Paris attacks, particularly concerning the suicide bombers who unsuccessfully sought access to the Stade de France. Perimeter security prevented the terrorists from getting inside the stadium, but had they attached their

bombs to drones, the damage could have been far more devastating. Briefly returning back to the Countering Drones conference from December 2016, over 75 per cent of attendees believe that there is a strong likelihood of a major drone-related security incident in the near future, with over 35 per cent believing that it is inevitable. INTENTION KEY TO SAFETY In Counter Terror Business issue 24, Gary Clayton, of the Unmanned Aerial Vehicle Systems Association, explored whether the security services had the same opportunity to use the advances in unmanned technology and analysis of the data collected as the terrorist. He argued, using several examples, that it is not the technology that is the problem, but the user and intention applied to it that has the potential to create havoc. UAVs have the potential to give the security services a better integrated picture of the playing field through enhancing situational awareness. However they also give the terrorist the ability to act at arm’s length – ’it is not the technology – it is the user that makes the difference’. Moreover, regulation, a hot topic in commercial UAV use in the UK, will never maintain pace with the changing face of technology. The drone market will keep changing, with new models, new capabilities and new uncertainties added every week. Present legislation restricts flight in the urban environment whereas flight in the country environment is far less restricted. Secondly, those planning to use UAVs for terrorist or criminal activity, such as drug smuggling, are unlikely, or perhaps never likely, to feel restricted by regulation. Therefore, countering drones will gain prominence as the preferred method of tackling the terrorist drone threat. The risk of shooting a drone out of the sky is incredibly high, especially if there is a chance that the drone is carrying explosives. Among

LIKE THE MAJORITY OF MILITARY TECHNOLOGIES, OPPOSING MILITARY FORCES WILL BOTH SEEK TO GAIN THE UPPER HAND IN DRONE WARFARE. UAVS FOR SURVEILLANCE, WHILST USEFUL, ARE NO LONGER THE THREAT the companies investing in this industry are the MITRE Corporation, who have launched Counter-Unmanned Aircraft System (C-UAS), a competition for drone defence, seeking inexpensive ‘non-kinetic’ solutions to countering drone threats. Elsewhere, OpenWorks Engineering has created the SkyWall 100 that fires a projectile with a net that envelopes the drone and parachutes it to the ground safely, whilst Radio Hill Technologies’ has developed technologies that jam the radio communication between the drone and its operator. The message behind this is that the threat of drones is well known among industry and government, but the potential retains an overwhelming appeal. Like the majority of military technologies, opposing military forces will both seek to gain the upper hand in drone warfare. UAVs for surveillance, whilst useful, are no longer the threat. As Professor David Hastings Dunn points out, the potential within drone use, as concerning as it may be, is fast becoming a reality. It will not be long before the next phase of drone development is established. Let’s hope it is not at the expense of mass fatalities. "

FURTHER INFORMATION www.uavs.org

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

81


We work with leading fabric and respiratory equipment suppliers to ensure that our equipment offers the ultimate in protection against the full range of CBRN hazards whilst remaining comfortable to wear in the most challenging circumstances. Respirex International Limited T : +44 (0) 1737 778 600 E : info@respirex.co.uk www.respirexinternational.com/cbrn

Decontamination

Respirex manufacture a range of CBRN Personal Protective Equipment for Civil Defence agencies & the emergency services worldwide. From the PRPS powered respirator suit, to liquid tightsplash suits, gas-tight suits and our quick-don CBRN over-boots we offer a comprehensive range of solutions to meet any hazard.

Gas-Tight Suits

THE CBRN PPE SPECIALISTS


CBRNE SUMMIT

CBRNe Summit Europe 2017 will be taking place in Madrid, Spain on the 24-27 April to discuss the latest CBRNe threats and techniques used to respond to attacks. Counter Terror Business looks ahead to the show

TESTING TECHNIQUES FOR CBRNE ATTACKS O ver the last few years the risk of a CBRNe attack has increased dramatically due to the threat of home grown terrorist cells who have become disillusioned with national governments. There has also been strong intelligence that suggests that Islamic State now has the capability to use chemical weapons which increases the threat across major European cities. With open borders across Europe, Islamic State have used this to their advantage to play terrorist cells in major European cities and towns who they can call upon at any time to create devastating attacks on civilians and without any warning. We are also seeing North Korea developing their nuclear program and long-range missile capabilities against UN sanctions placed on them. With the threat that one day Kim Jong-un will launch a WMD against a neighbouring country many governments are preparing for such a threat to arise from North Korea. Closer to home we are seeing tensions rise between Russia and the United States of America. We saw in February 2014 Russia occupy Crimea without any international response and many western European nations becoming concerned that Vladimir Putin may target eastern European nations next. With this in mind, many NATO allies have placed troops in Latvia, Lithuania, Poland and Romania in case of an attack from Russia to occupy these

nations. If the tensions between Russia and the United States continues to worsen this could create more CBRNe threats to Europe if Russia decides to make a stand against the UN sanctions they have faced in recent months. Europe has seen a number of deadly terrorist attacks since the 2004 Madrid train bombings, most notably the London and Paris attacks in 2007 and 2015 respectively. Apart from the Norwegian terror attack which was a lone wolf attack in 2011, the attacks Europe has faced have been carried out by Al-Qaeda, Islamic State and Hezbollah cells. The terrorist attacks that have taken place in Europe over the last few years have been unpredicted and unexpected causing mass casualties. After the Brussels Airport bombings it was claimed that the Belgium law enforcement agencies had been warned about the terrorist bombers before the attack happened. Since then, the terrorist group Islamic State have targeted large gatherings of civilians where they can inflict mass casualties – for example the lorry attack in Nice took place during a fireworks display to celebrate Bastille Day. Then, as recent as December, another lorry attack took place at a Christmas market in Berlin. The attacks have been quick, which makes it extremely difficult for law enforcement agencies to prepare for attacks such as these. This is where intelligence agencies need to work closely with border !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

83


Fido X2 Ultra-Lightweight Explosives Trace Detector

ÈĔ®»–݆‚ŏ–¿Ä»–|ÈÄ®»ŏ–¨ŏX0 Southern Scientific Limitedŏ Phone: +44 1273 497600 Email: info@southernscientific.co.uk


CBRNE SUMMIT ! agencies, local governments and law enforcement agencies to warn of and counter potential threats. With Islamic State having the potential to use chemical weapons there is a greater need for CBRNe agencies to work side-by-side with intelligence agencies to help counter threats in major cities and towns in Europe. THE POSSIBILITY OF CLOSED STATES In 2016, we have seen some major government changes in the United Kingdom with the public voting to leave the European Union and Donald Trump beating Hillary Clinton to become the next U.S. President. We are also seeing the rise of Marine Le Pen in France, who is looking a strong contender to beat Francois Fillion or Manual Valls in the French general election on the 23 April 2017, which could potentially lead to France possibly leaving the European Union in 2018. With the rise in Nationalist Parties gaining strong support across Europe, this could ultimately lead to closed states where sharing information and intelligence is limited with neighbouring countries, leading to little or no intelligence in stopping potential CBRNe attacks and monitoring known terrorist cells working across Europe. In the US Donald Trump beat the odds to become the 45th President and has set out an agenda that has alienated many Americans and oversea allies. With Trump looking to set his own political agenda, this could heighten the threat of attacks in the US and across Europe due to the close ties that European nations have with the US. DETAILING CBRNE CAPABILITIES On 24-27 April this year Intelligence-Sec will be hosting their fourth annual CBRNe Summit Europe conference and exhibition in Madrid, Spain, where leading government and military officials from the CBRNe community meet and share details of their CBRNe capabilities and threats that they have faced in their respective nations. This important gathering of over 200 officials allows for information sharing and knowledge on how different agencies across Europe respond to CBRNe threats and attacks. Superintendent Ian Womerseley, head of the UK’s National CBRN Centre, believes sharing knowledge and expertise across border is vital in preparing the emergency services for a robust response to a CBRN incident. He said: “CBRN is a complex field, with many potential outcomes and scenarios. No single organisation or nation should tackle it alone. The National CRNE Centre proactively works with international partners to develop and improve on best practice around CBRN operational response strategy. This reflects out nationals approach, which focuses on interoperability between the emergency

services and further integrated working with local and national agencies involved in the investigation and recovery stages, Collaboration is the key to be effective, flexible planning in line with the CBRN threat, a theme you will hear about from our UK speakers in Madrid.” During the conference there will be specially focused case studies delivered by the Spanish CBRNe law enforcement agencies, UK National CBRN Centre and by the French Ministry of Interior who will provide insights into their CBRNe capabilities, developments and response techniques used during recent threats and attacks. On 27 April 2017, there will be an official site visit and live demonstration conducted by the Spanish Amy Medical Brigade. Major Sergio Martinez Ordonez, of the Operations Branch of the Medical Brigade, explains their current capabilities: “The Spanish Medical Brigade is the Unit of the Spanish Army in charge of the medical support to Army units in operations. We also support Spanish Military Emergencies Unit (UME), and civilian administrations in the case of big disasters and national emergencies. “Among our Units, we have three Medical Decontamination Units, which have the capability to treat contaminated patients, at the same time as having normal wounds, giving them the first medical treatment and the decontamination simultaneously. Once they have been decontaminated and treated, they are evacuated to one of our second echelon medical units. “We have also developed the protocols of dressing and decontamination of medical staff that look after the patients that have been infected with infectious diseases like Ebola. We have also developed the means to evacuate the patients with the Spanish Army’s support (ambulances and helicopters). These are to NBC capacities that the Spanish Medical Brigade has, and we will provide a live demonstration during the CBRNe Summit Europe meeting in April.” Colonel Jose Igancio Castro Torres, the Commander of the Spanish Army NBC Regiment, explains the role of the NBC and its duties. He said: “The Spanish CBRN Regiment is an Army Combat Support Unit that supports and provides advice on CBRN Defence to the Land Forces HQ, Allied Command and Land Component Command. Many of our tasks involve surveillance, detection, identification and follow up contamination of BCR agents and industrial agents. We have a responsibility to support law enforcement departments and civilian authorities to mitigate effects in CBRN/TIC contingencies. “The NBC Regiment s set up in accordance to national regulations and NATO doctrine. The NBC Regiment has the capability to set up an Assessment Team and a CBRN collection centre.

MADRID HAS YET TO EXPERIENCE A TERRORIST ATTACK SINCE THE 2004 TRAIN BOMBINGS WHERE 191 PEOPLE LOST THEIR LIVES The CBRN Defence Battalion has the capability to provide CBRN Reconnaissance and Decontamination assets in the area of a Land Component Command. Finally, our Technical Unit has the capability to obtain technical and forensic BCR samples and provide theatre analytical laboratory support.” SHARING INTELLIGENCE Madrid has yet to experience a terrorist attack since the 2004 train bombings where 191 people lost their lives. Since then Madrid has not been targeted by any terrorist group, unlike other major cities across Europe. However, with the attacks which have rocked Europe over the last two years which have been unpredicted and unexpected, and with Spain having an open Schengen border with France and Portugal there is a greater need to strengthen their response to any threat or attack in one of the major cities, as passage in and out of Spain is easily assessable for terrorist cells. During the CBRNe Summit Europe conference there will be an emphasis on discussing the importance of sharing intelligence, especially between EU nations and agencies to help track individual terrorist cells that might be planning to carry out an attack in a major city across Europe. With a serious concern that Islamic State have developed chemical weapon capabilities this creates a greater need for the intelligence communities across Europe, the Middle East and Africa to share their intelligence with first responder and preparedness agencies in the region. Gustavo Segura Martinez, the CBRN/C-IED project manager at Indra, explains the importance of the CBRNe Summit in Madrid in April. He said: “Indra, as a global consulting and technology company with capacity to develop CBRNe solutions and products, considers this CBRNe Summit Europe, to be held in Madrid, as an opportunity to demonstrate the strengths of the Spanish companies to successfully develop and execute projects in the CBRNe field. More specifically in our case Indra will sponsor, have a booth and participate in the dynamic demonstration with our Advance CBRN Reconnaissance Vehicle, thus showing the capabilities in this field.” "

FURTHER INFORMATION www.intelligence-sec.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

85


86

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


CRITICAL NATIONAL INFRASTRUCTURE There is growing pressure on European government’s and security services to increase the protection and resilience of our critical national infrastructure sites to appropriately plan against the threat of terrorism. Counter Terror Business looks at the importance of protecting the UK’s critical national infrastructure

KEEPING THE UK RUNNING BY PROTECTING INFRASTRUCTURE he definition of critical national infrastructure sectors may vary from country to country but, as an example, the UK defines nine of these which provide essential services: communications; emergency services; energy (including pipelines and offshore); finance; food; government; health; transport (including roads, airports, ports and railways); and water. Critical infrastructure systems, including banking, telecommunications, emergency services, transportation, healthcare, food, energy and water supplies, are integral to the smooth day to day running of services in the UK. Any attack on these interconnected systems can create havoc and result in major disruption in public services regionally, nationally and globally. This potential chaos is enhanced when you consider how one element of the nation’s infrastructure is reliant upon another, and quite often connected to other nations. For example, the UK’s energy supply quite often arrives from France, who might well have a power station that supplies neighbouring Belgium. Likewise, the UK’s healthcare system is dependent upon a constant, uninterrupted supply of electricity, gas and ventilation. Protecting critical national infrastructure is regularly in the news, with the Home Office announcing in November 2016 plans to create a new specialist armed police unit to better protect Britain’s critical infrastructure against terror attacks. The proposals would see a 4,000-strong armed unit protecting the UK’s nuclear power stations, critical road points, ports and airports, as well as providing emergency cover as a deployment unit if the UK experiences a terrorist attack, similar to those endured recently by France and Belgium. The new unit would combine three main forces – the Civil Nuclear Constabulary, the British Transport Police and the Ministry of Defence Police – to form the new Armed Infrastructure Constabulary force. Moreover, Chancellor Philip Hammond announced a new cyber security strategy last October, amid growing threats to the country’s electrical grid and airports.

T

The strategy sets out how government will strengthen its own defences as well as making sure industry takes the right steps to protect infrastructure in sectors like energy and transport. UTILITIES UPKEEP The utilities sector is responsible for the critical elements of our everyday life, including the water and electricity supply, as well as gas and oil. The growing scope and impact of this sector in almost everything we do has greatly increased its vulnerability to threats such as terrorism and vandalism; therefore, utilities companies must adopt security solutions with longevity, for if terrorists were able to gain control of our national infrastructure, such as the power grid, there could be harrowing results. Matthew Grimley, of the British Security Industry Association, wrote for Counter Terror Business magazine on why the terror threat to the nation’s critical national infrastructure needs to be strongly considered by the site managers of utility sites, especially those responsible for water works. The UK relies on a complex water infrastructure to provide a water supply to homes and businesses across the country and to remove and treat wastewater. Perimeter protection is the first line of defence against any potential intrusions by unauthorised individuals to water work sites. The addition of highly visible extensions to perimeter fencing are normally enough to deter would be intruders, however, further protection can be added by electrifying the fence or adding an electrified extension which is well signed. Moreover, strategically placed cameras can further

enhance the security of water works sites. CCTV cameras can often deter would-be intruders from breaching a perimeter, but, in the instance of an intrusion, CCTV cameras can provide early detection, and crucially, collect evidence to be used in prosecution. Additionally, the Centre for Protection of National Infrastructure (CPNI) has advised private sector organisations, particularly those who own parts of the critical national infrastructure, on specific design improvements to protect them from the effects of chemical, biological, radiological and nuclear (CBRN) agents. We discuss chemical attacks in terms of a large scale event resulting in a high number of fatalities, numerous injuries and major disruption. The likelihood of such an attack resulting in mass casualties is rather difficult to assess as there are many variable factors to be applied. Much of the effect of a released agent is dependent upon where it is released and the weather conditions prevailing there at the time. Public reaction to it is also relevant, as it is probable that injuries and even fatalities could occur as large numbers of people rush to escape a threat, even if they are not actually affected by the agent itself. World leaders expressed outrage over the very recent sarin chemical attack in northwestern Syria, that killed at least 70 people, including children, and left more than 100 more requiring treatment in hospitals in Idlib. The attack struck Khan Sheikhun, where there are thousands of refugees from the nearby province of Hama who have fled recent fighting. The US, the UK and the EU have blamed the Syrian government for the carnage. !

PROTECTING CRITICAL NATIONAL INFRASTRUCTURE IS REGULARLY IN THE NEWS, WITH THE HOME OFFICE ANNOUNCING IN NOVEMBER 2016 PLANS TO CREATE A NEW SPECIALIST ARMED POLICE UNIT TO BETTER PROTECT BRITAIN’S CRITICAL INFRASTRUCTURE AGAINST TERROR ATTACKS

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

87


FIRST CHOICE FOR HOMELAND SECURITY SOLUTIONS

TRAINING

QUALIFICATIONS

DISPOSALS

CONSULTANCY

MENTORING

THE WORLD’S FIRST ACADEMICALLY-ACCREDITED ORGANISATION FOR COUNTER-TERRORISM, EXPLOSIVES & SECURITY TRAINING.

IS YOUR TEAM PREPARED FOR THE TERRORIST THREAT? ISSEE advises commercial and government clients from around the world on how to be ready to deal with terrorist attacks. We provide leading public safety and counter terrorism training to protect crowded places. Understand common tactics used by terrorists and plan how to mitigate the threat while satisfying your duty of care requirements. Training courses include: - Counter Terrorism Awareness - Recognition of Firearms & Explosives (RFX) - Terrorism Emergency Planning - Counter Terrorism Search - Counter Terrorism Response and Simulation - First Responder Training

ISSEE has won world-wide recognition for the quality and range of our Counter-Terrorism (CT), Explosive Ordnance Disposal (EOD) and Explosives Safety Management (ESM) training. Based at the Centre for Homeland Security in Oxfordshire, we have bespoke training facilities which are unique in the commercial sector and provide for the simulation of almost all security and counter-terrorism scenarios, including the detonation of live explosives.

WWW.ISSEE.CO.UK Centre for Homeland Security, Talbot Hall, Heythrop Park, Oxfordshire, OX7 5UE

admin@issee.co.uk +44 (0) 1608 678382 @isseeuk


CRITICAL NATIONAL INFRASTRUCTURE

! TRANSPORT THREATS Just recently, the St Petersburg metro in Russia was victim to a bomb explosion which resulted in the deaths of 14 people and injuring over 50 more. With Russian investigators confirming that there was a second bomb that did not detonate at another nearby station, the impact that terrorism and terrorist crime can have on transport links has been firmly pushed back to the security agenda. The explosion on the metro system, which carries over two million passengers a day, reflects previous attacks on Russian transport

Furthermore, in June last year, Atatürk Airport in Istanbul experienced a terrorist attack when gunmen armed with automatic weapons and explosive belts staged a simultaneous attack, killing 45 people and injuring 230 more. This article hasn’t ventured in too much depth on the issue of cyber security, which remains the most likely avenue for a criminal or terrorist to interfere, disrupt or infiltrate the UK’s national infrastructure - that warrants its own article. However, to ignore the threat to the critical national infrastructures would not only be unwise, but it could prove fatal. Threats will always be present and, unfortunately, attacks will always occur, despite the best efforts of our security and police services. Ensuring that our infrastructure has the appropriate, up-to-date protection is key to damage limitation and the prevention of life loss. Citizens are protected by our infrastructure systems, and they need the highest level protection too. "

infrastructure. In 2010, 38 people died in a double suicide bombing on the Moscow metro, while a bomb exploded on a high-speed train travelling between Moscow and St Petersburg in 2011, killing 27 and injuring another 130. Western Europe has also seen its transport infrastructure threatened and attacked. The growth and scope of attack of ISIS in the last few years saw two suicide bombings at Brussels Airport in Zaventem, and one at Maalbeek metro station in central Brussels in March 2016. The attack resulted in 32 civilian deaths and over 300 injuries.

The UK government relies on the CPNI to offer effective advice in relation to a number of threats that, if carried out successfully, will impact critical national infrastructures.

FURTHER INFORMATION www.cpni.gov.uk/terrorism

Radio Data Networks Cyber Secure Bespoke Alarm and Condition Monitoring Solutions Without the Need for Mains Power, the Internet or Cellular Coverage Automated 24/7/365 over Private Channels IFSEC 2017 Stand D1725

Access Control

RDN

El ectri ci ty

Water Supply

R a i l w a ys

With 30-years of experience we fully understand that Protecting Critical National Infrastructure takes more than a burglar alarm! We already deliver over 200-million messages per year across the Utility, Industrial, Commercial and Environmental sectors

Tel: 01279 600 440 6-lines

sales@radio-data-networks.com

www.radio-data-networks.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

89


9th-11th May 2017 The Hague, Netherlands www.cipre-expo.com

Co-Hosted by:

REGISTER TODAY for Early Bird Discount

Deadline 9th April 2017 www.cipre-expo.com/onlinereg

Converge; Collaborate; Cooperate The ever changing nature of threats, whether natural through climate change, or man-made through terrorism activities, either physical or cyber attacks, means the need to continually review and update policies, practices and technologies to meet these growing demands. Critical Infrastructure Protection and Resilience Europe brings together leading stakeholders from industry, operators, agencies and governments to debate and collaborate on securing Europe’s critical infrastructure. Join us in The Hague, Netherlands for the premier event for operators and government establishments tasked with Critical Infrastructure Protection and Resilience. For further details and to register visit www.cipre-expo.com Confirmed Speakers include: • Sir Julian King, Commissioner for Security Union, European Commission • Dr. Timo Hauschild, Head of CIP section, Federal Office for Information Security (BSI), Germany • Colonel (GS) Wolfgang Paulik, Director of the Civil-Military Cooperation Centre of Excellence • Philip Rydén, Chief Security Officer, E.ON Sverige AB • Gonzalo Martin de Mercado, Studies manager, Integrated Applications, ESA – European Space Agency • Konstantinos Moulinos, CIIP Project Manager, ENISA • Ben Govers, Senior Advisor / Project Manager, Dutch Ministry of Security and Justice, Netherlands • Jaya Baloo, CISO, KPN, Netherlands • Andrew Wright, Head of Industrial Resources and Communication Services Group (IRCSG), NATO • Michael Lowder, Director - Office of Intelligence, Security & Emergency Response, US Dept of Transportation • Gabriela Matei, Analysis Team Manager, National CYBERINT Center, Romania

• Anjos Nijk, Managing Director, European Network for Cyber Security • Martin Lee, Technical Lead, Security Research, CISCO • Dr Zahri Yunos, Chief Operating Officer, Cyber Security Malaysia • Pepijn van den Broek, Senior Associate, International Safety Research Europe BV • Catherine Piana, Director General, CoESS – Confederation of European Security Services • Frederic Petit, Principal Infrastructure Analyst/ Research Scientist, Argonne National Laboratory and Regional Director, International Association of CIP Professionals, USA • Duane R. Verner, AICP, Program Manager, Argonne National Laboratory, USA • Kalliopi Anastassiadou, Research Associate & Project Manager, Federal Highway Research Institute of Germany / Bundesanstalt für Straßenwesen • Ayhan Gücüyener, Regional Director, International Association of CIP Professionals, Turkey

For full speaker line up visit www.cipre-expo.com

Leading the debate for securing Europe’s critical infrastructure Owned & Organised by:

Supporting Organisations:

Media Partners:


CIPRE 2017

Critical Infrastructure Protection & Resilience Europe will be taking place on 9-11 May at The Hague, Netherlands. With the conference sessions recently announced, Counter Terror Business previews the show content

PROTECTING OUR CRITICAL INFRASTRUCTURE A

ttacks on critical infrastructure sites are a favoured target for terrorist groups, for good reason. They offer what is seen by the terrorist as a soft target, that is, maximum effect with minimal chance of interdiction. The potential effects in terms of damage, the hugely detrimental economic impact, disruption of normal daily life and resulting publicity, can far outweigh the terrorist organisations commitment in both manpower and risk. The European Commission has adopted a communication on Critical Infrastructure Protection in the fight against terrorism, enhancing European prevention, preparedness and response in the event of terrorist attacks involving critical infrastructures. The European Programme for Critical Infrastructure Protection (EPCIP) considers measures that will enhance the level of protection of infrastructure against external threats, with the Operator Security Plan for all infrastructures designated as European critical. Critical Infrastructure Protection and Resilience Europe will bring together leading stakeholders from industry, operators,

agencies and governments to collaborate on securing Europe. The conference will look at developing existing national or international legal and technical frameworks, integrating good risk management, strategic planning and implementation. The European Union is developing its policy on critical energy infrastructures in relation to the European Programme for Critical Infrastructure Protection which considers measures that will enhance, where necessary, the level of protection of certain infrastructures against external threats. The integrity of critical infrastructures and their reliable operation are vital for the well-being of the citizens and the functioning of the economy. The implementation of the EPCIP, under Council Directive 2008/114/EC on the identification and designation of European critical infrastructures and the need to improve their protection, has not been completely successful. Attendance at Critical Infrastructure Protection and Resilience Europe will ensure delegates are kept up-to-date on the latest issues, policies and challenges facing the security of Europe’s critical national infrastructure (CNI). The events offers a high level conference !

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

91


CIPRE 2017 ! with leading industry speakers and professionals, the opportunity to learn from the experiences and challenges of sector experts, and the chance to gain insight into national and European CIP developments. THE SCHEDULE The opening keynote on the first day of the conference, 9 May, will be chaired by John Donlon, an international adviser on security intelligence. Also speaking as part of this address will be: Sir Julian King, commissioner for Security Union for the European Commission; Dr. Timo Hauschild, head of CIP section, Federal Office for Information Security (BSI), Germany; and Colonel Wolfgang Paulik, director of the Civil-Military Cooperation Centre of Excellence. Following a networking coffee break in the afternoon, the first plenary session will be held, hosted by Thomas Wuchte, head of Anti-Terrorism Issues Transnational Threats Department, OSCE. Wuchte will explain why a collaborative approach to CIP and CIIP is a priority if we are to effectively safeguard our critical infrastructure. As more and more essential systems are managed electronically, interdependence between systems both physical and cyber needs to be clearly understood to ensure the delivery of services in the face of natural disasters, terrorist attacks, and criminal activity. Additionally, Gonzalo Martin de Mercado, studies manager of Integrated Applications for the European Space Agency, will analyse ‘Space-based Services contributing to protect Critical Infrastructure’, before Catherine Piana, director general of the Confederation of European Security Services, provides a progress report making ‘The case for standardisation in Critical Infrastructure Protection’. CYBER THREATS TO CNI In a world where everything is connected in some way, shape or form, where the Internet of Things (IoT) has risen in prominence and where the proliferation and dependence of mobile devices is pervasive, having the necessary cyber and physical security to realise and sustain secure and resilient critical infrastructure is said by some to be more critical than ever before. Moreover the digital technologies which power our financial, communications, utilities, security and defence infrastructure may at the same time pose a significant threat to those systems. Industrial control systems may also offer new and additional targets to those looking for opportunities to embark on malicious behaviour. In this light, the Institution of Engineering & Technology (IET) their Round Table Discussions session on the morning of the second day, to discuss how real these scenarios are,

and encourage debate concerning: whether our infrastructure is really that vulnerable or is the threat grossly exaggerated?; are there risks posed by foreign involvement?; what the best case scenario is in the event of a well-executed cyber attack; whether we are taking the necessary measures to protect our infrastructure; and how can we ensure the necessary cyber and physical security to achieve and maintain secure and resilient critical infrastructure? The afternoon of day two will see two conference streams run side-by-side. The Critical Infrastructure Protection Track will witness the Critical Infrastructure Division of Europol address the importance of identifying new and potential threats in enabling governments, law enforcement, operators and stakeholders to take the necessary steps to mitigate against possible disruption. The session on ‘Emerging and Future Threats on CNI’ will investigate this in more detail. As so much critical national infrastructure is in the hands of public sector organisations – public, private partnership is a prerequisite for successful risk management and resilience. Therefore, the Netherlands Ministry of Security & Justice will host a session on ‘Public Private Partnership – Successful risk management and resilience’. Running at the same time as the Europol session in track one, the Netherlands National Cyber Security Centre will continue the IET round table discussion by exploring Cyber Security Legislation, Best Practice & Standards. This topic will also be the main taking point of the European Network for Cyber Security’s session, as managing director Anjos Nijk discusses ‘Best Practice & Standards in the Energy Sector’. Further exploring emerging cyber threats, and particularly how indentification of new and emerging threats is now more urgent than ever, Dr Zahri Yunos, chief operating officer for Cyber Security Malaysia will analyse ‘Protecting CNII against cyber threats: A coherent response through CSIRT’, while Ayhan Gücüyener, of the International Association of CIP Professionals, Turkey, presents on ‘Understanding the vulnerabilities of critical energy infrastructure to cyber terrorism: How to secure our energy systems’. DEVELOPING DEBATES ON CNI Continuing the two conference tracks from day two, day three will also cover the topics of critical infrastructure protection and critical information infrastructure protection and cyber security. To begin the final day, Michael Lowder, director of the Office of Intelligence, Security & Emergency Response at the US Dept of Transportation, explains how

THE OPENING KEYNOTE ON THE FIRST DAY OF THE CONFERENCE, 9 MAY, WILL BE CHAIRED BY JOHN DONLON, AN INTERNATIONAL ADVISER ON SECURITY INTELLIGENCE ‘Nothing happens if you can’t move’. Other discussions in the session include: ‘Protection of land transport infrastructure against extreme rainfall events using a four step risk-based approach’; ‘System Transformation: The Analysis of Smart Systems in the Integrative Context of Risk, Resilience, and Sustainability’; and ‘The Total Security Process Reengineering TSPR solution to Securing Waterside and Maritime Infrastructure’. Prior, planning and preparation is the key to ensuring that CNI operators have the right equipment, processes and procedures in place to respond in the event of an emergency. As a result of this, Per Brekke, deputy director of the Norwegian Directorate for Civil Protection, analyses ‘Understanding risk in modern societies’ which will paint a knowledge lead approach that ensures resilience in CNI and vital societal functions. The afternoon of 11 May will focus upon Critical Infrastructure Interdependencies. It is the interdependencies between large numbers of independent critical national infrastructures that is the catalyst for multiple failures in the so called cascade effect. This session will question how we identify the weaknesses and prevent and/or mitigate the effects. Pepijn van den Broek, of International Safety Research Europe BV, and Ben Govers, of the Dutch Ministry of Security and Justice, will look at ‘Stronger emergency preparedness of the EU’s CI through joint exercising’. This is succeeded by a talk on ‘Assessment, benchmarking and stress-testing resilience of critical infrastructures: A novel, indicator-based approach developed in the EU project SmartResilience’. This will be hosted by Dr. Aleksandar Jovanovic, chief executive officer, EU-VRi European Institute for Integrated Risk Mgmt, Germany. Critical Infrastructure Protection & Resilience Europe will be taking place at The Crowne Plaza Den Haag, located a few minutes from the Dutch Parliament, World Forum Convention Centre, Madurodam and Peace Palace. "

FURTHER INFORMATION www.cipre-expo.com

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

93


Where there is no light

See everything

See in the Dark from £199

SENTINEL HANDHELD INFRARED NIGHT-VISION SYSTEM • Identification up to 100m • Backlight and illumination adjustment • Fixed focus • Lightweight • Simple to use • Ideal for Security, Search & Rescue and Protection

www.nocturna.co.uk 03300 057 878 PART OF THE IRNV GROUP


IFSEC 2017

Always shocking yet sadly no longer surprising, recent tragic events in London have refocused attention on the changing nature of the terror threat. In light of recent events, IFSEC International investigates five alarming terror trends and what they mean for counter-terror strategies

TERRORISM TRENDS EXPLORED AT IFSEC or what they lack in resources compared to the states against which they pit themselves, terrorists must compensate with the element of surprise. The terrorist’s trump card is his unpredictability. Being unpredictable is all too easy when potential targets are almost limitless, given that Islamic extremists essentially view their host society as irredeemably sinful. Any target – any people, buildings or infrastructure – is fair game. Sacrificing themselves too, they’re not even constrained by the need for an escape route. Here are five trends in terrorism that have become more apparent this year and the implications for counter terror approaches.

F

ENVIRONMENTAL SABOTAGE Several Israeli politicians blamed a spate of wildfires in November on terrorism. Avigdor Lieberman, Israel’s Defence Minister, said authorities had evidence that at least 17 of the 110 recorded outbreaks, which destroyed hundreds of homes and caused millions of dollars of damage, were attributable to arson. Whether it was politically motivated arson or not, the very mention of it in the media could alert terrorist movements elsewhere to the potential of environmental sabotage – not just through fires but by poisoning crops or reservoirs too. Of course, terrorists tend to favour attacks on crowded places to maximise casualties and to create the highest

psychological impact. However, train stations, shopping centres, sports stadia and so on tend to be well guarded and monitored by CCTV. Forests, rivers and agricultural holdings, on the other hand, might represent a soft underbelly. It’s hardly practical to heavily guard every square mile of forest, farmland !

TERRORISTS TEND TO FAVOUR ATTACKS ON CROWDED PLACES TO MAXIMISE CASUALTIES AND TO CREATE THE HIGHEST PSYCHOLOGICAL IMPACT

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

95


IFSEC 2017 ! and waterway with security personnel or surveillance cameras. Complete security is never possible, but authorities will have to deploy innovative solutions, whether it’s physical barriers, drones or other hardware, that maximise security in a cost-effective way. FAR-RIGHT THREAT Pointing to our Burkean preference for evolution over revolution, British thinkers have often considered their country to be better insulated against the extreme ideologies of both left and right that convulsed continental Europe through the 1930s and 1940s. However, a rise in hate crime in the wake of the Brexit vote, the triumph of Donald Trump in the US elections and the brutal murder of a sitting MP in the UK has generated anxiety that the threat from the Far Right is being underestimated. Neil Basu, senior national coordinator for counter-terrorism policing and deputy assistant commissioner, said recently: “Over the past 12 months, there have been indications that the threat from [the] extreme right wing could be increasing and we are alive to this.” Anti-radicalisation scheme Prevent reported a 73.5 per cent rise in the number of referrals linked to the far right in 2016. But, according to Basu, currently ‘just under 10 per cent of all Prevent referrals relate to the extreme right wing. The authorities have

ANTI-RADICALISATION SCHEME PREVENT REPORTED A 73.5 PER CENT RISE IN THE NUMBER OF REFERRALS LINKED TO THE FAR RIGHT IN 2016. “CURRENTLY JUST UNDER 10 PER CENT OF ALL PREVENT REFERRALS RELATE TO THE EXTREME RIGHT WING,” SAID NEIL BASU put programmes in place to support those at risk of being radicalised. Jurors at the Old Bailey recently heard how Thomas Mair, who was sentenced to a whole-life term for the murder of Labour MP Jo Cox, was an avid reader of Nazi propaganda, collector of Nazi memorabilia and a white supremacist. Was the murder committed by Mair, who was also inspired by David Copeland, who targeted, gay, Asian and black people with a succession of bombs in 1999, a harbinger of Far Right attacks to come? Basu insisted that ‘the overriding threat remains from Daesh-inspired groups’, but the authorities may now have keep a more watchful eye on the activities of organisations like the National Front and the BNP. INTERNET OF THINGS No household or everyday object, however mundane, is safe from the digital revolution. Whether most people truly want a smart toaster, smart clothing or a smart toothbrush

remains to be seen, but it’s clear that the number of ‘things’ being connected to computer networks is growing exponentially. And this applies just as much to commercial and public buildings as well as the wider urban environment. From trains to shopping centres, data is being generated in ever greater volumes with huge potential for generating energy savings, easing congestion and generally making cities more efficient and our lives easier. It’s also multiplying the vectors of attack for cyber terrorists – and we’re ill prepared for it, according to Advent IM founder Mike Gillespie. He said: “We’re patching IT systems on a weekly basis for Windowsbased vulnerabilities. We’re seeing firmware vulnerabilities discovered on a daily if not hourly basis. We’re trying to plug holes because the planning wasn’t in place for the new cyber landscape that we’ve entered. And with the internet of things, the pace of change is getting faster and faster. “We’re seeing attacks on physical "

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

97


www.counterterrorbusiness.com www.counterterrorbusiness.com | ISSUE 29

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM

ISDEF 2017 PREVIEW

COUNTER TERROR TRAINING

CYBER SECURITY

UK SECURITY EXPO

DESIGNING OUT TERRORISM

Looking back at UK Security Expo, including the impact of terrorism on urban design DRONES

WATCHING UAV POTENTIAL TAKE FLIGHT

With advances in drone technology aiding both the security services and terrorist, how dangerous can drone development be? SCTX

KEEPING A STEP AHEAD OF THE TERRORIST THREAT

The Security & Counter Terror Expo returns in May to provide answers to the questions posed by terrorism

In-depth editorials from government agencies and worldwide experts in counter terrorism will cover: Effective counter-terrorism strategies an the latest information from Government agencies Emerging threats: CBRN, terrorism and organised crime, cyber-terrorism Best practices for effective inter-agency collaboration Policy and frameworks for emergency planning and crisis management Defence and emergency services procurement updates Specialist Training, Recruitment and HR management Security products for the armed forces, emergency services and private sector security operations

www.counterterrorbusiness.com


IFSEC 2017 ! buildings, on CCTV systems, on air conditioning systems, vehicles, tram systems, train systems are all coming under attack. And sometimes for direct malicious intent with a view to causing accidents, damage, bringing down national infrastructure. If it’s a weak system, a legacy system, poorly installed and poorly patched, it then allows a foothold to be gained. It’s a bit like when you’re breaching a port: you need that initial bridgehead. You build, consolidate, then push on to attack elsewhere in a network.” VEHICULAR ATTACK Recent devastating attacks in Nice, Berlin and now London have demonstrated brutally that vehicles can be every bit as destructive as bullets and bombs. Security guards can do little in the face of a several-tonne truck mowing down people at speed, so this recent trend has highlighted the need for more hostile vehicle mitigation (HVM) measures in public spaces. In one sense, the use of cruder tactics is a testament to the success of security services in foiling terror plots. In an article published in the wake of the Westminster attack, Dominic Casciani, the BBC’s home affairs correspondent, said: “The days when terrorism meant large, complex bombs and months of planning are gone: Western security agencies – particularly MI5 and its partner agencies – are very, very good at identifying those plots and disrupting them. The longer it takes to plan such an attack, the more people who are involved, the more chances there will be for security services to learn what is going on.” Looked at another way, the deployment of simpler, yet still devastating methods is also a depressing reminder that when your enemy has no qualms about killing innocent civilians, or about dying themselves, counter-terror responses must often be reactive rather than proactive. LONE-WOLF ATTACKS Committed by actors without material support or communication with a terror group, so-called lone wolf attacks are nothing new. However, a spate of attacks in France, Belgium, Germany, the UK and the US has highlighted the impotence of intelligence services when the attackers leave little or no evidence of their intentions. And if someone has no connections to radicals who are known to the authorities, then it’s extremely difficult – nigh on impossible, even – for authorities to anticipate anything they are planning. With Al Qaeda plots, the intelligence services could at least intercept communications and identify links between central command – insofar as such a diffuse network even had a central command – and various terror

WITH THE ESTIMATED ANNUAL GROWTH RATE OF THE GLOBAL PHYSICAL SECURITY MARKET PROJECTED AT 9.98 PER CENT EACH YEAR BY 2020, THE BUDGET ALLOCATION FOR PROCURING AND UPGRADING SECURITY SYSTEMS IS BIGGER THAN EVER cells. If Al Qaeda operated a franchise model then the attacks on the Pulse Nightclub in Orlando, the murder of two police officials in Magnanville, the Nice lorry massacre and the recent murder of a French priest were simply homages to the ideology of ISIS. Recognising how effective such attacks are in instilling fear and evading detection, ISIS has stoked the phenomenon, encouraging sympathisers within Europe to become self-starter terrorists – no contact with, nor direction from, ISIS HQ required.

THE SECURITY IMPLICATIONS With the estimated annual growth rate of the global physical security market projected at 9.98 per cent each year by 2020, the budget allocation for procuring and upgrading security systems is bigger than ever. Coupled with the growing incidence of terror attacks, governments have increased budget allocation for physical security systems and solutions in order to protect people, assets and data. In response to this, IFSEC International has launched a new show, Borders & "

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

99


Ultimation Direct Ltd is the UK’s fastest growing manufacturer of high quality perimeter security products. Our range of products includes:• Manual and automatic gates • Traffic barriers • Hydraulic Road Blockers • Full Height Turnstiles • Height Restrictors • Gate Drive and Control Kits • Access Control Posts • CCTV Towers. All our products are designed and constructed to the highest quality standards at our UK manufacturing facility and feature class leading plc control and safety systems. We are actively seeking trade partnerships in the UK and export sales agents worldwide, so we cordially invite you to visit us at stand C1725 at IFSEC International, Excel London between 20th and 22nd June 2017.

www.ultimationdirect.co.uk Tel: 01636 550300


IFSEC 2017

! Infrastructure Expo, taking place between 20-22 June 2017, at ExCeL London. Borders & Infrastructure Expo, running alongside IFSEC International, will focus on products, solutions and education for border control, critical national infrastructure, law enforcement, transport and the protection of key strategic assets. This high-level launch event will bring

together big-budget buyers, policymakers and influencers from the UK and around the world and cover a wide range of technologies in physical and perimeter security, border control, transport security, cyber security and much more. Visitors to this free-to-attend event can also see drones/UAVs in action in the Drone Zone. Featuring both drone and anti-drone technology,

the Drone Zone offers advice and insights about enhancing your security operation with the latest cutting-edge innovations in the field. Experienced LPCB technicians will carry out attack testing in the LPCB Attack Testing Zone. Taking place twice daily within the dedicated LPCB/ BRE Global area in the IFSEC Borders & Infrastructure Expo, the tests will show you how products withstand direct physical assault from a range of tools and devices commonly used in attempted break-ins and intrusions. Richard Flint, physical security certification scheme manager at the Building Research Establishment (BRE), says: “We’re very pleased to be able to demonstrate live attack testing at Borders & Infrastructure Expo at IFSEC 2017. The ability to show live attack scenarios on a range of LPS1175 products is beneficial for the visiting audience as it will reveal how highly engineered these products are and how they’ve attained the relevant approvals to existing standards.” If you are interested in attending Borders & Infrastructure Expo, visit the website to register for your free entry badge. "

FURTHER INFORMATION www.ifsec.events/ international/Counterterror

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

101


CONTINGENCY PLANNING

EMERGENCY RESPONSE Many organisations can think of nothing worse than planning for a terrorist attack. It is costly, scary and, in most situations, unlikely ever to be necessary. However, whether it is ever actioned or not, emergency planning can be far more important than saving lives

BEST TO PREPARE FOR THE UNLIKELY isk management. Most likely the two words that organisations wince at more than any others. Nonetheless, orchestrated and implemented correctly, effective risk management lies within an organisations ability to identify the potential risks and threats and apply effective security solutions to mitigate them. In the majority of situations this may take the form of a fire alarm, an intruder on company property or a power outage. However, while many prefer not to consider themselves vulnerable to a terrorist attack, all businesses and organisations are at risk to terrorism, no matter what size, location or sector.

R

102

Nowadays, terror tactics arrive in numerous forms and from a vast array of directions. To consider the threat of terrorism as only being large groups from the Middle East is beyond naive, and to think that the target will only be large cities is foolish. While a familiar ploy of terrorist organisations has been to fixate efforts upon large cities, or congested events, to maximise casualties - in recent years we have seen that trend begin to disseminate. The murder of Labour MP Jo Cox took place as she was on her way to a constituency surgery in the village of Birstall, West Yorkshire. As Bob Wade, of the Emergency Planning Society, wrote in an issue for this magazine last year,

a vehicle full with crude fire-bombs was driven into the main office of South Oxford District Council in 2015, which was consequently burnt to the ground. South Oxfordshire and a West Yorkshire village defy the assumption that terrorism is only a concern for the populated, large city regions of the UK. Wade continues to summarise that ‘just because your organisation is not based alongside an ‘iconic’ potential terrorist target does not mean you are free from the threat of attack’. The unexpected can happen at any time, and usually does. CONSTRUCTING THE RIGHT PLANS Security can be a large expense for companies, with infrastructure, digital

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com


CONTINGENCY PLANNING security and resource building both timely and expensive. But planning is necessary and worthwhile. Aside from the obvious physical threat of terror, all businesses rely in some part on transport links, on energy and water supply, on buildings and employers, and all operate with the intention of trading for many years to come. Constructing a relevant and up-to-date contingency plan is therefore crucial to ensuring that those questions do not become problems for an organisation. The threat from international terrorism remained unchanged after the recent terrorist attack in Westminster, coded at the same SEVERE level it has been for over a year, meaning an attack is still highly likely. Following the attack, the Security Institute recommended organisations review their contingency plans and exercise them to ensure they remain valid and fit for purpose. WESTMINSTER RESPONSE Effective contingency planning can arguably be seen in the days leading up to the Westminster attack. The Metropolitan Police Service, responsible for the security and safety of London’s inhabitants, carried out the first joint major live-play exercise to test their response to a terrorist threat on the River Thames. ‘Exercise Anchor’ involved over 200 police officers and staff and mimicked the potential hijacking of a

WHILE MANY PREFER NOT TO CONSIDER THEMSELVES VULNERABLE TO A TERRORIST ATTACK, ALL ORGANISATIONS ARE AT RISK TO TERRORISM, NO MATTER WHAT SIZE, LOCATION OR SECTOR passenger pleasure boat on the Thames with the intention to take a number of hostages and travel to carry out a terrorist attack in Central London. The timing of the exercise is coincidental, but it highlights the priority given to preparing for the worst by the police. A representative for the Metropolitan Police said after the exercise: “This kind of exercise demonstrates that should a terrible event ever happen for real, London is ready for it in the most efficient and effective way possible.” In this case the security forces have been anticipating a terrorist attack for a number of months, so it was not so much planning for the unlikely, but ensuring that, should or when the situation arise, a plan would be in place to deal with the scenario as quickly, efficiently and forcefully as possible. Khalid Masood’s uncoordinated attack lasted no more than 82 seconds. There was a plan in place, the response was immediate and the damage limited. Each department had a plan: the police, the counter terrorism officers, the ambulance staff, even Parliament.

REVISITING AND SIMPLIFYING OLD PLANS The necessity to produce contingency plans emerges from a thorough analysis of the risks that your organisation faces and what needs to be done to ensure that the organisation can maintain business operations. There is no need to overcomplicate the process or contents of the plan, as, realistically, you don’t know who will read and implement the plan when it’s needed. Therefore, the plan should be clear, simple and readable in its instructions. A few key things to cover, include identifying who is in charge at each stage and in each scenario (is there a specific figure responsible for fire safety?), what will need to be done to return business to ‘usual’, and what training is necessary for each member of staff to be adequately prepared for all possible scenarios. !

FURTHER INFORMATION www.the-eps.org

Counter Terrorism Preparation Is your organisation using the Hope and Pray Method of counter terrorism? Are you:

• Testing and exercising your procedures regularly • Training staff • Verifying those assumptions you have made • Keeping software firewalls up to date • Constantly checking your backups work If any of these have not been done, like it or not you have inadvertently chosen the “Hope and Pray” method! We specialise in helping organisations develop robust, risk based and affordable solutions to cope with a range of risks including terrorist incidents, key customer failure, sudden loss of premises, IT failure, fire and flood. We will carry out a free review of your risks and gaps, and will then work with you on a programme to remediate, then work with your in house team to help you with all these items. The only thing harder than planning for a disaster is explaining why you didn't Contact us NOW for a free review of your risks by one of our BCI qualilfied consultants

www.adtbusinesscontinuity.com • 0800 9993374

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

103


Images courtesy of www.defencephotography.com

ACCESS THE GLOBAL MARKET AT THE WORLD LEADING DEFENCE & SECURITY EVENT To enquire and reserve your exhibition space contact: T: +44 (0)20 7384 7770 E: sales@dsei.co.uk Register to attend:

WWW.DSEI.CO.UK/CTB Supported by

REGISTER TO ATTEND TODAY

VISITORS FROM 108 COUNTRIES (6% INCREASE IN 2015)

76%

OF ATTENDEES DECISION MAKERS OR SPECIFIERS (DSEI 2015)

AIR LAND

1,683

NAVAL

EXHIBITORS REPRESENTING THE WHOLE SUPPLY CHAIN

SECURITY

42

JOINT Platinum Sponsors

34,038

Organised by

INTERNATIONAL PAVILIONS


DEFENCE NEWS WEAPON SYSTEMS

ARMED FORCES

UK and France sign new weapon system agreement

A third of officers progress from ranks

Defence Minister Harriett Baldwin and her French counterpart Laurent Collet-Billon have signed an agreement to explore future missile technologies with MBDA. The agreement begins a three-year concept phase to develop future long range weapons for the British and French Navies and Air Forces, with each country contributing €50 million. According to a statement from the Ministry of Defence, the Future Cruise/Anti-Ship Weapon programme will explore options to replace and improve existing Naval and Air Force weapons systems in the next decade. The programme will help to define the missile designs and reduce risks to inform decisions about the next stage of the programme. Alongside sharing costs, both sides will benefit from access to each other’s national technology expertise, trials and test facilities. Baldwin said: “Our relationship with France is strong and enduring. We have a long history of cooperation in

defence and security with our European ally. As demonstrated by having Europe’s largest defence budget, the UK is committed to European security and we will continue to collaborate on joint defence programmes across the continent. The agreement will sustain 80 jobs in the UK.” Laurent Collet-Billon, French Minister of Defence Procurement, added: “We are launching today a major new phase in our bilateral cooperation, by planning together a generation of missiles, successor to the Harpoon, SCALP and Storm Shadow. The FC/ASW programme’s aim is to have by around 2030 a new generation of missiles. This future capability is strategic, industrially as well as operationally. This new programme will be the backbone of our ‘one complex weapon’ initiative.”

READ MORE

Defence Secretary Michael Fallon has revealed figures showing that almost 30 per cent of officers in the Armed Forces progressed from the lower military ranks, as he met would-be officers at the Ministry of Defence’s London HQ. The statistics showed that a third of Army officers, a fifth of Royal Navy officers, and a quarter of RAF officers – commissioned having not joined at that level. Instead, over 1,800 serving officers over a five-year period have taken the development opportunities available to them in the military to reach their full potential at that rank later in their career. During the event, Fallon spoke with students in week nine of the Potential Officer Development Programme (PODP), a 12-week intensive course which runs three times a year, aimed at catapulting soldiers into the officer ranks.

READ MORE

tinyurl.com/k6x9cjd

tinyurl.com/kxkb9yz

MEDICAL TECHNOLOGY

DATA USAGE

£14m contract for lifesaving medical technology

£6m investment for innovative data use

The Ministry of Defence (MoD) has signed a £14 million deal with Remote Diagnostic Technologies (RDT) to deliver lifesaving medical monitors to the UK Armed Forces. The Basingstoke-based company manufacture battery operated Tempus Pro monitors, which can be used on land, sea and in the air, and help facilitate emergency treatment for personnel if they are injured or taken ill on active duty by transmitting medical data such as blood pressure, pulse and respiratory rate in real time back to medical facilities and treatment teams. The MoD believe that the deal will sustain over 60 jobs, and has seen 444 monitors delivered to the Armed Forces to date, with plans for around 900 more to be purchased over the next five years. Harriett Baldwin, Minister for Defence Procurement, said: “Our Armed Forces serve with incredible commitment and bravery, and the new Tempus Pro monitor will ensure that they will receive the best possible care and treatment should they be wounded or taken ill on operations. Backed by our rising defence budget and our £178 billion equipment plan, our investment in these cutting edge medical monitors

demonstrates how we are working with our NATO allies to provide lifesaving equipment to our frontline personnel.” Tony Douglas, CEO of the Defence Equipment and Support (DE&S) body, added: “This state of the art piece of equipment shows how we are delivering proven, world-leading equipment to our Armed Forces. The Tempus Pro monitor is a step forward in innovation and safety, demonstrating how we are committed to improving the medical care received by those keeping our country safe. This deal highlights DE&S’ strong, collaborative partnership with industry, benefiting both our Armed Forces and the wider UK economy by sustaining around 60 UK jobs.” © Crown copyright 2017. Licence: bit.ly/ 1U97c8l

READ MORE

tinyurl.com/lo3sokn

The Ministry of Defence (MoD) is set to invest up to £6 million in innovative new technologies, processes and ways of operating that improve the ability of defence staff to analyse and exploit data in decision-making. The MoD is seeking solutions in three challenge areas: rapid and automated integration of new sensors; freeing up personnel by the innovative use of machine learning algorithms and artificial intelligence for military advantage; and effective use of operator cognitive capacity, particularly by human-machine teaming. According to a statement from the MoD, it is increasingly making use of sensors, meaning there is a growing volume of complex data available to military operators and decision-makers. The MoD needs to increase its ability to analyse data and quickly use it to make informed and effective decisions. This funding competition is part of the Small Business Research Initiative (SBRI). A first phase has sought initial ideas, with successful applicants of phase 1 funding due to compete in a second phase to develop the idea further. The competition will also see projects split between a fast track and standard track approach. The aim is to achieve greater pace but also to allow smaller companies and low maturity solutions to take part.

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

105


Audio Visual Collaboration

Agile working

Immersive and distributed training

Meeting spaces

Shared information management

Collaborative voice and data

We have a proven pedigree of solutions for the Aerospace, Defence and Security market place. Designed to provide business agility and information management, our collaborative technologies promote interaction and collective team development. Contact us to meet up at Security & Counter Terror Expo

Activity monitoring and recording

www.viewpoint-av.com


ISDEF 2017

The 8th edition of ISDEF, Israel’s largest international Defence and Homeland Security Expo, will take place on 6-8 June 2017, in Tel Aviv, Israel. Since 2007, ISDEF has gained international recognition and has become the ideal platform for HLS, defence and business. Counter Terror Business explains why

ENHANCING GLOBAL COOPERATION O ver the last few years we have seen a shift from conventional warfare to global terrorism, led by extremist groups that demonstrate complete disregard for international treaties and innocent civilian lives. Today, terrorist groups are infiltrating communities around the world, and combatting these terrorist groups has become the greatest challenge to governments and security agencies across the globe. It is with this in mind that ISDEF focuses on mitigating terrorism and providing military, law enforcement and governments with the latest technologies and solutions to secure a safer future. Israel’s status as a leading provider of defence and security systems in the global market, coupled with ISDEF’s position as the industry’s premier international exhibition in the region, provides end-users and decision makers with access to cutting-edge technology, innovative products and systems that fulfil national security needs, whilst reflecting the defence and security industries’ ability to adapt and meet new challenges.

UNIQUE APPROACH The unique approach of ISDEF is tailored towards business development and promotion for exhibitors. ISDEF provides an ideal venue for companies to exhibit and showcase their products and services via myriad of platforms, including their company booths, workshops, indoor and outdoor live demo areas, professional panels, lectures and more. ISDEF 2017 will also include an international three day conference, with !

TODAY, TERRORIST GROUPS ARE INFILTRATING COMMUNITIES AROUND THE WORLD, AND COMBATTING THESE TERRORIST GROUPS HAS BECOME THE GREATEST CHALLENGE TO GOVERNMENTS AND SECURITY AGENCIES ACROSS THE GLOBE

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

107


ISDEF 2017 ! conference organisers expecting over 15,000 visitors from more than 90 nations, as well as 100 international delegations. The conference will cover topics ranging from the threat of global terrorism, with an emphasis on combating the ISIS, the Islamic world, and the relationship between the two, as well as the European refugee crisis. In addition, a considerable portion of the conference will touch on the subjects of cyber and financial security, with an emphasis on means and methods of preventing terrorism funding. Led by key figures from the fields of defence, homeland security, cyber security, and financial technologies, the sessions will contribute from their experience and offer insights into possible solutions that concern virtually every member of the international community. All topics in the conference will be discussed with a focus on the implications that countries face due to the influx of terrorist groups that have embedded themselves within the refugee population, and the challenge of surgically eliminating this problem without harming innocent civilians. In addition to lectures and workshops, the conference will also include a panel of counter terrorism experts, including leading policy makers, scholars, and industry professionals. The panel

will discuss the issues and risks and seek to find potential solutions to help countries face these challenges in order to secure a better future. The lectures, workshops and seminars throughout the conference will examine some of the hottest topics in the realms of defence and HLS, from three angles: ‘The Physical World’; ‘The Virtual World’, and ‘The Financial World’. This innovative approach is based on the realisation that the lines between cyber and ‘conventional’ warfare are more blurred than ever; and promises that conference attendees get a comprehensive analysis and perspective of globally relevant issues. WHO IS COMING? ISDEF 2017 is expecting over 250 exhibitors, including small to medium-sized enterprises as well as major contractors from the defence and HLS sectors, organised in both individual booths and national pavilions. The USA Pavilion at ISDEF 2017 offers product and services presentations, business and networking opportunities and target audience reach in a competitive, prime location show setting. The USA Pavilion, which was also present at ISDEF 2015, is designed to assure that U.S. exhibitors get the most of the ISDEF experience by providing cost-saving participation options through shared services and extensive pre-show and on-site

support, allowing exhibitors to focus on market objectives, maximising ROI. Expanding defence and security trade with allies and partners not only helps countries better deal with shared security challenges, but also strengthens diplomatic ties and increases the likelihood of cooperation in other areas as well. IDEAL ENVIRONMENT ISDEF provides the ideal environment for networking and deal-making, primarily due to the qualification of its visitors. At the core of ISDEF is a team of experts that work around the clock to bring high ranking officials, delegations and dealers with buying and decision making power to ISDEF, guaranteeing that exhibitors get a maximal return on their investment. Official delegations include key figures in the fields of counter terrorism, security and intelligence; including chiefs of staff, defence ministers and high-ranking army, navy and air force representatives from around the globe. ISDEF is an essential event that is guaranteed to impact the defence and HLS landscape of the future, and a worthwhile event for anyone involved in maintaining the safety and security of their community. "

FURTHER INFORMATION www.isdefexpo.com

JUNE 6-8

2017 TEL- AVIV

THE RIGHT place THE RIGHT time THE RIGHT people THE 8TH INTERNATIONAL DEFENSE & HLS EXPO

Military Visite Our Website

WWW.ISDEFEXPO.COM

Police

Special Forces

Homeland Security

Counter - Terrorism

For details on exhibition space & sponsorship opportunities contact: sales@isdefexpo.com | expoaffairs@isdefexpo.com T. +972-3-691-4564 | F. +972-3-691-4567

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

109


TRAIN FOR THE UNEXPECTED

VBS3 Features + A massive library of models and terrain + A wide assortment of UAVs + Civilian entities driven by state-of-the-art AI + IED, CBRN and security training capabilities

In today’s fight against terrorism, training for the unexpected is key. Virtual desktop training enables counter terror personnel to test their ability to detect, prevent and respond to potential threats without putting themselves or the public at risk. Only Bohemia Interactive Simulations’ Virtual Battlespace 3 (VBS3) offers a proven training package and development platform that is in use to train hundreds of thousands of military personnel every year. VBS3 meets myriad training uses, from IED detection to surveillance to checkpoint security. With VBS3, training administrators can rapidly develop and modify scenarios, quickly reset and repeat scenario-based training for personnel in immersive, detail-rich environments (both geo-typical and geo-specific), and record and review the results of mission rehearsals.

Learn more at BISim’s booth #24 at ITEC 2017 in Rotterdam, May 16 –18. www.bisimulations.com sales@bisimulations.com


ITEC 2017

EVENT PREVIEW Following a successful 2016 event in London, ITEC will take place at the Ahoy, Rotterdam from 16-18 May. Counter Terror Business looks at the conference streams of the show, and how the event’s theme of ‘Innovation through Collaboration’ will be achieved

ITEC: FOCUSING EFFORTS, HARVESTING SUCCESS

I

ITEC 2017, IN ROTTERDAM, GATHERS SCIENTISTS, INDUSTRY LEADING EXHIBITORS AND TRAINING PROFESSIONALS ALL EAGER TO SHARE AND LEARN ABOUT NEW TECHNOLOGIES AND BEST PRACTICES FOR EFFECTIVE NATIONAL AND INTERNATIONAL COLLABORATION IN THE DEVELOPMENT AND DEPLOYMENT OF TRAINING AND EDUCATION SOLUTIONS THAT CAN ADAPT TO THE EVER CHANGING DEFENCE AND SECURITY CONTEXT Forces, science and technology organisations and industry leaders. Confirmed sessions include: Innovation through collaboration – how technology supports real life training in a joint and international mission set; M&S supporting CD&E of UAxS Operations- the R2-CD2 Project; ADL total learning architecture enabling next-generation learning ecosystem via meta-adaptation; Implementation of the Nato lessons learned process in the modelling and simulation domain; UAS aircrew training evolving the process and leveraging technology to meet future needs; The Nato allied framework for M&S as a service; and Advanced cyber defence informatics and cybernetics. As well as a world class panel of international military and industry experts, ITEC 2016 welcomed over 150 VIPs and delegations from new and traditional markets including high calibre representatives from 38 countries. Of particular note were the high number of senior flag, general and air officers and civil service officials – over 40 senior officers of 1* rank and above attended the London event. These military and civil service experts represented the core areas of: training tactics; strategy; operational policy and doctrine; defence procurement; training capability and requirement; academia; military health; flying training; Nato; education; skills; recruiting and resettlement; future training and training acquisition; naval sea training; force development and training;

research and technology; modelling and simulation; and basic and military technical training and education. ITEC 2017 will be engaging directly with Ministry of Defence (MoD) and government buyers and decision makers from the host nation, Netherlands, as well as the key growth markets. We expect an equally high number of high calibre representatives to attend, including senior officers from: the Middle East; India; South America; South and Far East Asia; Australasia; United States and Canada; Central and Eastern Europe; and Scandinavia. ITEC will also host the F-35 conference and an Advanced Engineering conference. Alongside the conference, an exhibition will host over 120 companies from the military simulation, training and education sector. For the first time, ITEC 2017 will feature a live training demonstration area. We will create a live training scenario which will highlight various companies’ products and services in an interactive demonstration. !

Contains public sector information licensed under the Open Government Licence v3.0

TEC is the annual forum for representatives from the military, industry and academia to connect and share knowledge with the international training, education and simulation sectors. Presenting a unique overview of the industry’s latest innovations, the event provides visitors with a platform to discuss developments in this evolving market and exchange ideas about future requirements for military training and simulation. ITEC’s host this year is a small but highly developed nation with advanced military capabilities that has to achieve economies of scale and comparative advantage through an effective use of its resources. The Netherlands seeks to innovate by encouraging partnership and collaboration between its military establishment, including government laboratories, its industry and the broader research and development community in academia and beyond. This ‘Triple Helix’ of equity stakeholders addresses challenging problems to find cost effective, militarily efficient solutions that meet the training and education needs of the Netherlands military and security forces. The ‘Triple Helix’ innovation model has an additional mirror apex in the close co-operation of the Netherlands with the institutions of Nato and Nato member states, who share similar challenges in the focus areas of readiness for complex operations and mission preparation in a Coalition context. ITEC 2017 gathers scientists, industry leading exhibitors and training professionals all eager to share and learn about new technologies and best practices for effective national and international collaboration in the development and deployment of training and education solutions that can adapt to the ever changing defence and security context. The ‘Innovation through Collaboration’ theme will also be addressed in keynote presentations and panel discussions by high-ranking representatives of the Armed

FURTHER INFORMATION www.itec.co.uk

ISSUE 30 | COUNTER TERROR BUSINESS MAGAZINE

111


PRODUCTS & SERVICES SECURITY

SECURITY

Morgan Marine, and sister company PSF Wales, survey, design, manufacture and install LPCB physical security products manufactured from GRP and Steel. Morgan Marine was founded in 1965 and by continually evolving and anticipating clients’ requirements, the company now has the most comprehensive range of security rated products available in today’s market place. All are tested by BRE to LPCB Security Rating (SR) 2, 3 and 4 in line with the LPS 1775 issue 7 standard. The range includes GRP and steel housings and cabinets, single and double door sets, including the new fully louvred door range and up to four hour fire rated doors; window bar-sets for internal and external use with both face fix and reveal; single and multi-leaf access covers; cages and mesh walling systems; and

In today’s business world, one of the biggest security threats comes from inside the organisation. A report from the U.S. Department of Justice identified nearly one-third of all staff commit some form of employee theft. With the increasing risk of theft or embezzlement coming from within, businesses are now looking to identify management security solutions for prevention and protection. Steve Bell, chief technology officer at Gallagher says:“Identity is crucial to security. Technology has moved from traditional keys: untraceable, unmonitored and easy to copy, to smart cards, PIN pads, and now biometrics. Access is now determined by a unique identifier, something that cannot be used by another person.”

Innovative GRP and steel Protecting your business technology for security from the threat within

ventilation options which include louvres and weather proof cowls. Morgan Marine has a long history of firsts, the first one hour and two hour fire rated construction, the world’s first LPCB GRP enclosure and now the company has combined its expertise in both and created the first LPCB security and one hour fire rated enclosure. For full listings please visit the website. FURTHER INFORMATION

Tel: (+44) 01269 850437 sales@morgan-marine.com www.morgan-marine.com

CYBER SECURITY

Advanced IT auditing, reporting and alerting

Lepide, founded in 2005, is a fast growing, US-based provider of auditing and monitoring solutions designed to enable organisations to gain more visibility into changes being made in their critical IT systems. Lepide saw a worrying trend in the market, where organisations were spending vast amounts of money defending against external hacks and security attacks, but were leaving themselves open to attacks from within. Insider abuse and misuse is the single highest reason for data leakage, yet many organisations either do not realise the danger they are in, or prefer to bury their head in the sand. Lepide believes that the best way to mitigate the risks of insider

112

attacks is with a pro-active and continuous auditing strategy. Lepide’s flagship solution, LepideAuditor, was developed to offer exactly this – a simple, affordable and scalable means of pro-actively auditing, monitoring and tracking changes across Active Directory, Group Policy, File Server, Exchange, SQL and SharePoint Server. Lepide will be featuring its LepideAuditor solution at InfoSec Europe from the 6-8-of June at Olympia, London. You will be able to find Lepide at stand L28 on the first floor. FURTHER INFORMATION

www.lepide.com

Successful business security is two-fold; managing access by identity and monitoring it. Gallagher’s Personal Identity Verification solution uses strong authentication and ensures smart cards cannot be cloned. It provides detailed visibility and traceability which act as a strong deterrent, as most people won’t commit a crime if they’re aware of the high risk of being caught. Layers of security are also important, Gallagher can work with you to identify areas of risk and recommend a security solution that meets your specific needs and protects your business. FURTHER INFORMATION

security.gallagher.com

CYBER SECURITY

An innovative range of technology for IT security

As a leading Japanese technology company, Soliton Systems develops innovative solutions for IT security, outside live video streaming and unique solutions for specific needs. IT security products from Soliton Systems supports organisations with its security management challenges including authentication, secure browsing, mobile device security, endpoint security, cyber security and network security. Soliton Systems has a strong position in live broadcasting. It has designed an enterprise class lightweight product for mobile H.265 HEVC encoding that allows live streaming of video content direct from cameras. Ideal for law enforcement, fire

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com

departments and broadcasters, they can stream live from fast moving cars, motorbikes, drones, helicopters and can be body mounted. The Smart telecaster range utilises 3G/4G mobile cellular and/or WiFi networks to stream. They are the ideal solution in a crisis situation, and can live stream to a command center anywhere in the world with very little latency. Visit the website for more information or call to speak to an adviser. FURTHER INFORMATION

Tel: +31-20-301-2166 emea@solitonsys.com www.solitonsystems.com


PRODUCTS & SERVICES SECURITY

SECURITY

Executive Management Security Ltd (EMS), founded in 2005, is an established security provider, training and consultancy company based in the United Kingdom. Although the company headquarters are situated in central London, EMS has established an extensive client base worldwide providing personal, residential, venue and VIP event security for clients requiring a discreet, bespoke service from experienced and smart professionals. EMS Ltd is a member of the BSIA (British Security Industry Authority) and has achieved the ISO 9001 in close protection, door supervision, manned guarding, key holding and training services. The management team has over 60 years’ experience providing professional security to a large number of VIPs, celebrities, foreign dignitaries and high risk individuals and families, many of which have

For more than 40 years SALZER has been designing and providing security glazing solutions to protect against both terrorist and criminal attack and all its products are supplied with the knowledge that they have been rigorously tested and come with the backing of over 500 live tests and certified to the latest BS and EN standards. SALZER offers the complete range of products encompassing perimeter security with its barriers and bollards through to internal security and panic rooms with windows, doors and facades bridging the gap providing protection against blast, ballistic, forced entry and fire. The firm’s speciality is combining combinations of threat resistance in one element. SALZER’s corporate philosophy ‘Protecting Lives and Property’ requires quality from start to finish so it strives to maintain its various certifications

Exceptional standards of specialised security

been clients for over 10 years. EMS Ltd works with worldleading event production companies providing security detail, health & safety reports and risk assessments. EMS Ltd prides itself on five main core values, which are: honesty; integrity; trust; respect; and good business ethics. Its mission statement is to build long-term relationships with customers and clients and to provide exceptional customer services by pursuing business through innovation and advanced technology. FURTHER INFORMATION

Tel: 020 76313877 www.em-security.com

CYBER SECURITY

Protection against attacks and unauthorised access

per DIN EN ISO 9001:2008 and ECOSYS (Occupational safety per BS OHSAS 18001/ Environmental per ISO 14001). SALZER’s services include consultation, planning, design, manufacture and installation for projects around the globe, previous customers have included many government, military, financial and judicial institutions from various countries with projects ranging in value from thousands to multimillion of Euros. For further details contact Chris Carwardin. FURTHER INFORMATION

Tel: +44 (0) 1952 503002 chris.carwardine@ saelzer-security.com

SECURITY

IT security management consulting and training

Fuel cell solutions for the security sector

Silensec is an ISO27001:2013 certified information security consulting company serving corporate clients in 21 countries globally since 2006. The firm only delivers an identified set of specialised Infosec services that include: IT Governance – it has helped numerous companies achieve compliance with international standards such as ISO27001, ISO22301 and PCI DSS; Security Audits and Assessments – large telcos, financial and government organisations have chosen Silensec to conduct complex vulnerability assessments and penetration tests; Security Monitoring and Prevention - value-added integration and deployment of security monitoring and prevention solutions such as SIEMs, log management systems, web and DB firewalls along with the related process development and competence building activities.

Fuel cells provide a covert, reliable power source that needs no maintenance. They are perfectly suited to remote, off-grid locations and provide an all-weather solution that can keep supplying power when conditions prevent site visits. They are almost silent in operation – no vibrations, noise, exhaust or heat is detectable. Fuel cells can run for days or weeks without human intervention and are virtually emission free. The team at Fuel Cell Systems (FCS) has been providing these solutions since 2003 and has had significant success with CCTV and security applications. Several state and federal law enforcement organisations as well as security companies throughout the world are already using fuel cells as a power supply for border control, physical protection, event security and undercover surveillance. Additionally, fuel cells can communicate data on their own status that can

Silensec provides the full solution; Security Training – with a portfolio of over 30 training courses in cyber and information security Silensec is among the top training security companies in the world which is able to offer bespoke competence building services to even large corporates. Lastly SOLE – the online security learning environment – Silensec has developed SOLE (Silensec Online Learning Environment), an ambitious cloud environment that gives students access to a flexible cyber range to test their skills in areas of ethical hacking, intrusion detection, log analysis, computer forensics and much more. FURTHER INFORMATION

www.silensec.com

be integrated with the main data stream or transmitted separately using FCS’s bespoke StackWatch system. FCS is a UK-based company, at the forefront of development in this market and can recommend the appropriate solution for every application. FURTHER INFORMATION

Tel: 01488 50 70 50 sales@fuelcellsystems.co.uk www.fuelcellsystems.co.uk

ISSUE 30 | COUNTER TEROR BUSINESS MAGAZINE

113


ADVERTISERS INDEX CYBER SECURITY

Clever network traffic monitoring and visibility Flowmon Networks empowers businesses to manage and secure their computer networks confidently. Through its high performance network monitoring technology and leanforward behaviour analytics, IT pros worldwide benefit from absolute network traffic visibility to enhance network and application performance and deal with modern cyber threats. Driven by a passion for technology, Flowmon Networks is leading the way of NetFlow/ IPFIX network monitoring that is high performing, scalable and easy to use. The world’s largest businesses, internet service providers, government entities or even small and midsize companies rely on its solutions to take control over their networks, keep order and overcome uncertainty. Flowmon Networks is recognised by Gartner, recommended by Cisco, Check Point and IBM.

Flowmon solution includes high-performance autonomous flow statistics generating probes for monitoring all types of networks up to 100 Gbps and collectors to display and analyse network traffic. The whole solution is extended by advanced modules: Flowmon Anomaly Detection System for network behaviour analysis, Flowmon Application Performance Monitoring for driving application value, Flowmon Traffic Recorder for complete data communication recording and Flowmon DDoS Defender, a solution for the detection and mitigation of volumetric attacks. Learn more on the Flowmon website. FURTHER INFORMATION

www.flowmon.com

CYBER SECURITY

An innovative range of technology for IT security

As a leading Japanese technology company, Soliton Systems develops innovative solutions for IT security, outside live video streaming and unique solutions for specific needs. IT security products from Soliton Systems supports organisations with its security management challenges including authentication, secure browsing, mobile device security, endpoint security, cyber security and network security. Soliton Systems has a strong position in live broadcasting. It has designed an enterprise class lightweight product for mobile H.265 HEVC encoding that allows live streaming of video content direct from cameras. Ideal for law enforcement, fire

departments and broadcasters, they can stream live from fast moving cars, motorbikes, drones, helicopters and can be body mounted. The Smart telecaster range utilises 3G/4G mobile cellular and/or WiFi networks to stream. They are the ideal solution in a crisis situation, and can live stream to a command center anywhere in the world with very little latency. Visit the website for more information or call to speak to an adviser. FURTHER INFORMATION

Tel: +31-20-301-2166 emea@solitonsys.com www.solitonsystems.com

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service 3DX-Ray ADT Business AirBorne Assa Abloy Bohemia Interactive Boole Server Broden Media Camsat Gralak Przemyslaw CEA CFH Fencing & Security Group Citadel Defense Technologies Clarion Events Clarion Events Cranfield Defense and Security Daniel Technologies Databac Group Energetics Technology Executive Management Exoskel Group Flowmon Networks A.S Fuel Cell Systems Gallagher Security (Europe) Garrett Metal Detectors Genetec Europe Getac UK Gilgen Door Systems Hikvision UK Hill &Smith Honda UK Hytera Communications (UK) iBoss Cybersecurity Informa UK ISDEF Issee KBC Networks

114

43 103 92 46 110 74 59 97 30 50 80 104 22 108 18 96 29 113 IBC 114 113 112 28 36 66 48 20 24 BC 76 74 IFC 109 88 16

KC Communications KNect 365 Lepide Software Lincoln Security Locken LRG Marketing Maple Fleet Services Marshalls McLaren Marketing Merican Labels Morgan Marine MWR Info Security Nocturna PA Consulting Group Pentest Partners Consulting Quantum Corporation Radio Data Network Red Tulip Systems Reed Exhibition Respirex International Salzer GmbH Science Media Partners SeeQuestor Silensec Soliton Systems Europe N.V. Teledyne Telerob Gesellschaft fur TMD Technologies Torch Marketing Trakm8 UBM Information Ultimation Direct University of Birmingham UNLOQ Viewpoint Training

THE MAGAZINE DEDICATED TO COMBATTING TERRORISM | www.counterterrorbusiness.com

34 71 112 44 32 23 26 11 84 6 112 64 94 38 72 101 89 70 73 82 113 60 8 113 112 52 54 4 90 42 95 100 78 75 106


EVERYTHING HONDA

P E R F O R M A N C E YO U C A N R E LY O N , W H AT E V E R T H E S I T U AT I O N Honda produces a huge range of powered products for use on land, on water, or pretty much on any terrain. All Honda products are designed with highly innovative features and manufactured to exacting quality standards to provide years of professional use and assured reliability.

To find the perfect solution and to discuss your specific requirements, or to book a demonstration for assessment, please visit us on Stand I30 or contact Dave Rowley on 07917 086661 or e-mail Dave.Rowley@honda-eu.com.

Counter Terror Business 30  

Delivering Key Strategies to Combat Terrorism

Read more
Read more
Similar to
Popular now
Just for you