Page 1

www.counterterrorbusiness.com | ISSUE 31





THE ASSURANCE OF PHYSICAL PROTECTION Following a number of recent HGV terror attacks, physical barriers are integral to the UK’s security



The importance of accurately recording cargo crime has never been higher



Photos by Feifei Peng, Jason Blackeye and Rami Al Zayat on Unsplash

www.counterterrorbusiness.com | ISSUE 31





THE ASSURANCE OF PHYSICAL PROTECTION Following a number of recent HGV terror attacks, physical barriers are integral to the UK’s security



The importance of accurately recording cargo crime has never been higher

EXPLOITING THE CONNECTED WORLD At the end of June, Facebook, Microsoft, Twitter and YouTube announced the formation of the Global Internet Forum to Counter Terrorism in a bid to make hosted services hostile to extremism. Terrorism, like any organisation or campaign, needs an audience. The use and broadcast of graphic and violent images has reached an unprecedented level in recent years, with advancing technology enabling the production and dissemination of Islamic State propaganda. Despite their efforts, social media platforms, such as WhatsApp, Facebook and Twitter, have become a common communication mode for terrorists to carry out their attacks, recruit vulnerable and aggrieved men and women, convey their messages to the public and broadcast their atrocities live to audiences. In my comment for Counter Terror Business 30, I discussed the case of Khalid Masood, the Westminster Bride terrorist and the idea of an ISIS-inspired attacker and someone acting under instruction from the terrorist organisation. This is the very reason that terrorist groups are turning to social media more frequently – it is an online radicalisation tool that sits on a global platform that can be viewed immediately, shared easily and proves difficult to prevent. It enables them to rely on inspiration, rather than await instruction, making the terrorist threat even more unpredictable.

Follow and interact with us on Twitter: @CTBNews

No wonder Prime Minister Theresa May is urging social media companies to do more in the fight against global terrorism. Find out more on page 21. Michael Lyons, editor

ONLINE // IN PRINT // MOBILE // FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, fax: 020 8532 0066.


226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITOR Michael Lyons EDITORIAL ASSISTANT Marianna Christou PRODUCTION EDITOR Richard Gooding PRODUCTION DESIGN Jo Golding PRODUCTION CONTROL Ella Sawtell WEB PRODUCTION Victoria Casey ADVERTISEMENT SALES Rachael McGahern, Harry Harris, Mark Jones, Michael Wheeler BUSINESS DEVELOPMENT MANAGER Martin Freedman ADMINISTRATION Vickie Hopkins, Charlotte Casey REPRODUCTION & PRINT Argent Media

Counter Terror Business would like to thank the following organisations for their support:

© 2017 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533



The Handa Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews.

Terrorism Studies Individual Modules / Certificate / Advanced Certificate

Study the characteristics of terrorism, terrorist tactics and counterterrorism by part-time online e-learning

Course starts: October, February, June


Enrolment administered by:

Tel: +44 (0)20 3377 3210 / +1 (646) 957 8929 | Email: info@terrorismstudies.com Quote VIP code: FLR2859AACTB2

Postgraduate Certificate / Postgraduate Diploma / Master of Science Security Studies Counter-Terrorism Studies Intelligence and Security Studies Terrorism, Security and Policing Security Management Diplomacy and Security Studies Security and Terrorism Law (MA) All courses start annually in September

www.security-studies.com/FLR2875AACTB2 Tel: +44 (0)20 3377 3210 / +1 (646) 957 8929 | Email: info@security-studies.com Quote VIP code: FLR2875AACTB2

Enrolment administered by:


CONTENTS CTB 31 13 CYBER TERRORISM A recent report from the NCSC outlines the organisation, methods and motives behind cyber criminals. CTB explores the report and crime within the dark web. Plus; with the role of social media coming under increased scrutiny recently, CTB asks what more needs to be done?

27 PERIMETER SECURITY On behalf of the Perimeter Security Suppliers Association, Iain Moran, high security consultant at ATG Access, looks at the importance of ensuring the perimeter of a venue or location is secure and protected against targeted vehicle attacks

41 UAV TECHNOLOGY In March, it was widely reported that anti-drone unmanned aerial vehicles (UAVs) were to be taken for counter terrorist test flights on a UK military base, because of the rising threat posed by the technology. So how can anti-UAV technology aid counter terrorism?

50 BORDER CONTROL Over a year on from the UK’s decision to leave the EU, Counter Terror Business looks at how border security will help ease the migration flow and keep terrorism at bay, as well as the border security recommendations made as part of Lord Toby Harris’ 2016 London review

54 TRAVEL SECURITY Following a recent police video advising UK holidaymakers what to do in the event of a terror attack, Lorraine Hennessy, communications manager for National Counter Terrorism Policing, expands upon the ‘run, hide, tell’ safety message

56 CARGO CRIME Cargo crime is regarded as a multi-billion dollar ‘industry’ and the level of threat is growing. Recorded cargo crime has risen to its highest-ever level in EMEA, and new technologies could make it ever easier to commit, says Thorsten Neumann, of TAPA EMEA

61 CLOTHING Terrorism related investigations are complex, with a range of police and counter terrorist officers arriving at the scene. For the public, establishing who is who can be difficult. Here, Dr David Lowe explains the different types of clothing that officers wear, and the reasons why

64 UTILITIES PROTECTION James Kelly, chief executive of the British Security Industry Association, discusses the importance of protecting national infrastructure and the businesses supporting it. Plus; Catherine Laug examines the genuine terrorist risk to our water infrastructure

71 POLICE ARMED RESPONSE The terrorist attack on London Bridge at the start of June highlighted the speed and importance of armed counter terrorist police keeping our streets and communities safe. Counter Terror Business looks at the developing role of firearms police in UK security

Counter Terror Business magazine // www.counterterrorbusiness.com ISSUE 31 | COUNTER TERROR BUSINESS MAGAZINE




UK terror convictions rising According to a BBC database, over 100 people in the UK have been convicted of terrorism offences related to Syria and Iraq since 2014. The BBC, which has tracked the numbers of people from the UK who have been drawn into the conflict in Syria and Iraq, claims that it is the most comprehensive online record of its kind. The data shows that there has been a ‘rapidly escalating number of prosecutions since 2014’, with 85 per cent of the 109 people convicted having never been to Syria or Iraq. Most the offences relate to people intending to go and fight but who were arrested before putting their plans into action. Other offences included the use of social media to encourage support for banned groups such as ISIS. Counter terror police in the UK say that five terror plots have been foiled since March and 18 thwarted since 2013, showing an increase in the amount of people being radicalised in the UK. Speaking to the BBC, Alison Saunders, director of Public Prosecutions, said: “We need to be acutely aware that if people

CYBER INTELLIGENCE EUROPE 2017 5-7 September 2017 Bucharest, Romania www.intelligence-sec.com/ events/cyber-intelligenceeurope-2016 Cyber Security is continuing to be a major concern for many European governments and the threat is becoming greater each year. Cyber Intelligence Europe will provide in-depth case studies of recent threats and attacks faced to government infrastructures.

COUNTERING DRONES LIVEDEMO FORUM can’t go to Syria – and we have certainly seen this in some of the cases we have prosecuted – they may plan a sort of an attack here instead or they may do more to radicalise other people here to attack so we need to be very aware of that.”




Travel staff trained to deal with terrorist incidents

The travel industry is providing training for staff in the UK and overseas to help keep travellers safe for summer. Sessions have been conducted and attended by over 23,000 employees which include advice on how to spot suspicious items and activity, as well as what to do in the event of a terrorist incident. The programme is being run in partnership with the National Counter Terrorism Security Office (NaCTSO) which has created a short presentation offering travel companies an easy way to deliver counter terrorism awareness information. The product includes three new films which show staff how to identify and respond to a terrorist threat safely, and covers the core counter terror guidance needed by staff working in a crowded place at home or abroad. A leaflet comes with the presentation which refers to the ACT: Action Counters Terrorism guidelines for reporting any suspicious activity

19-20 September 2017 Geneva, Switzerland www.counteringdroneslivefire. iqpc.co.uk/

or items. Holidaymakers are also being given material to watch to help keep them safe in the event of an attack. The film highlights the steps people can take to minimise the impact of an attack. ! Read more on this story on page 54.



Organised with the official support of the Department for Security and Economy, Government of Geneva, the conference identifies the essential improvements to capability and regulation. It’s the first event to include a live demonstration of counter drone technologies, hosted on a Swiss Army training range.

DEFENCE COMMUNICATIONS 26-27 September 2017 Krakow, Poland www.defencecommunications.com/ Defence Communications 2017 offers a platform for senior military operators, expert researchers and capability directors from leading defence agencies to meet with a host of solution providers from leading companies to assist in shaping the future of defence communications.




An integrated software and hardware toolset designed to dramatically increase the speed at which police and security teams analyse video as part of investigations.







EVENTS DIARY NAVAL DAMAGE CONTROL 3-5 October 2017 Portsmouth, UK www.navaldamagecontrol.com/ europe/ This year’s Naval Damage Control will focus on how the growing automation of ships is affecting damage control what this means for crew training, response and procedures when an incident occurs. The meeting will also examine what the increased use of automated systems means from a procurement position for industry, government agencies and navies.

First separation centre opens for radicalised prisoners The first of three separation centres has opened at HMP Frankland in an attempt to stem the flow of radicalisation behind bars and prevent their influence over others. Forming part of a wider government strategy to tackle extremists in prisons, the policy will see offenders placed in the specialist centres if they are involved in planning terrorism or are considered to pose a risk to national security. This can be in the form of extremist views undermining good order and security in the prison estate or by influencing others to carry out terrorist crime. Two further centres are planned


to follow at other establishments in the coming months, with the three centres combining to hold up to 28 of the most subversive offenders. Alongside the opening, the Ministry of Justice has also confirmed that more than 4,500 frontline officers have received the latest specialist counter extremism training to identify and challenge extremist views, with new prison workers also receiving the training as standard.




Saudi Arabia has ‘clear link’ to UK extremism

A new report by the Henry Jackson Society has contentiously claimed that Saudi Arabia is the chief foreign promoter of Islamist extremism in the UK. The report, titled Foreign Funded Islamist Extremism in the UK, urges the need for a public inquiry into the foreign-based funding of Islamist extremism, and argues that there is a ‘clear and growing link’ between Islamist organisations in receipt of overseas funds, hate preachers and Jihadist groups promoting violence. The report authors claim that foremost among these has been Saudi Arabia, the UK’s closest ally in the Middle East and biggest trading partner, who is providing

financial support to mosques and Islamic educational institutions which have played host to extremist preachers, linked to the spread of extremist material. There have been numerous cases of British individuals who have joined Jihadist groups in Iraq and Syria whose radicalisation is thought to link back to foreign funded institutions and preachers. The UK’s Saudi Arabian embassy says the claims are ‘categorically false’.



17-19 October 2017 Krakow, Poland combat-helicopter.com/

Combat Helicopter, Europe’s largest dedicated military helicopter event, provides the tri-services community with the unique opportunity to gain a clear understanding of future requirements and capabilities for next generation, multi-role rotary platforms.

NAVAL DOMAIN INTELLIGENCE 17-18 October 2017 Livorno, Italy www.navaldomainintelligence. com/ Naval Domain Intelligence aims to exploit the opportunities of Naval UxV, surface and air sensors to enable a complete Recognised Maritime Picture that can be distributed quickly and securely between allies. This two-day meeting will explore how naval communication systems and networks can manoeuvre within A2/AD environments and counter vulnerabilities to EW and cyber attacks.



Video Investigation & search solutions

Four reasons your CCTV evidencecosts more than it needs to: • Trying to get different formats into a viewable format • •

Transferring and sharing video across the organization Manually searching and sifting through footage to find key events

Preparing intelligence, court, and disclosure reports

Combining Kinsense‘s powerful search technology with an easy to use reporting and import functionality, Law enforcement agencies now have the tools for actionable intelligence faster. Contact us today: www.kinesense-vca.com | info@kinesense-vca.com

www.kinesense-vca.com | info@kinesense-vca.com | Tel (Ire): +353 (0) 16624546 Tel (UK): +44 (0) 2070961550 | Tel (US): +1 703 879 5904


Mayor warns of police funding crisis Mayor of London Sadiq Khan has called for urgent confirmation that police funding will be increased to ensure the capital can be kept safe, and asked the government to abandon its ‘unwelcome’ funding formula review, ending years of underfunding and real-term cuts, to ensure crisis is averted. He delivered his ’starkest warning yet’ that continued uncertainty, inaction from government and the scale of the funding crisis will make a significant reduction in officer numbers inevitable. He said that they risk falling below 30,000 for the first time since 2003 in the next two years, simply to balance the books. Real-term government cuts has meant that more than £600 million of savings have already been saved since 2010, front counters have closed, buildings have been sold and 2,800 PCSOs and police staff posts have been lost. A further £400 million of savings will be needed by 2021 because the flat budget settlement fails to account for the increasing demand or inflationary pressure on policing. All opportunities for generating

more income or making substantial savings are already being taken, yet terrorism remains a threat. A reduction in officer numbers will mean more pressure on the already overstretched teams who protect Londoners, and reductions in preventative work to tackle serious, organised crime and terrorism. The mayor has increased the council tax precept by the maximum percentage possible to provide additional funds and protect the frontline, but this is ‘just a fraction of what is needed’.




Home Secretary announces new knife crime laws Amber Rudd has announced plans to consult on new offences to toughen up knife crime laws, to restrict the online sale of knives.

Proposed measures to stop under 18s being able to purchase knives will mean anyone who buys a knife online will be required to collect it in person, with retailers responsible for checking the age of all buyers, making it harder for underage sales to go undetected. Office for National Statistics (ONS) figures show that there was a 14 per cent increase in knife crime offences for the year ending December 2016 on the previous year. With more than 32,000 knife crime offences taking place in the UK, there were also more than 4,000 recorded hospital admissions for assaults involving sharp weapons in England in the year ending March 2016, which represents a 13 per cent rise.




Manchester doubles number of taser officials Greater Manchester Police has announced that the force will double the number of officers trained in the use of tasers to 1,100. Following the recent terror attacks in Manchester and London, Chief Constable Ian Hopkins said the decision would provide increased protection to the people of Greater Manchester and release more police officers responding to serious incidents. Each officer selected to undergo training will go through a rigorous assessment process, in line with national guidelines, to ensure that they are suitable to carry a taser.




UK arms sales to Saudi Arabia not unlawful UK government arms sales to Saudi Arabia are lawful, the High Court has ruled after rejecting claims that ministers were committing an offence by not suspending weapon sales to the kingdom, which is fighting a war in Yemen. The UN claims strikes on Houthi rebels caused thousands of civilian deaths. The government said defence exports would continue to be reviewed but the campaign against the arms trade said an appeal against the ruling was planned. The group claimed the UK had contravened humanitarian law. They attacked the Secretary of State for International Trade to suspend export licenses for the sale or transfer of arms and military equipment. Lord Justice Burnett and Mr Justice Haddon-Cave said the decision to carry on the arms trade was not unlawful. Equipment sold includes Typhoon and Tornado fighter jets, as well as precision-guided bombs. The sales have provided billions of pounds of revenue for the British arms trade and has created thousands of engineering job opportunities in the UK. The judges said confidential material ‘provides valuable additional support for the conclusion that the decisions taken by the Secretary of State not to suspend or cancel arms sales to Saudi Arabia were rational’.





Co-located with

Tech XLR8

From the producers of the market leading Critical Communications Series

13 – 14 June 2018 ExCel Exhibition Centre, London



THOMAS.MCCORMICK@KNECT365.COM tmt.knect365.com/mission-critical-technologies @ MCTSeries


Photo by Oliver Thomas Klein on Unsplash

Very few people are aware of the extent of the online criminal ecosystem that supports and enables cyber attacks. A recent report from the National Cyber Security Centre outlines the organisation, methods and motives behind cyber criminals and how services can protect themselves within the dark web

UNDERSTANDING CRIMINAL ACTIVITY ONLINE T he National Cyber Security Centre (NCSC) was set up in 2016 to help protect UK critical services from cyber attacks, managing major incidents and improving the underlying security of the Internet through technological improvement and advice to citizens and organisations. Part of GCHQ, the department, which is headed by former director general for cyber at GCHQ Ciaran Martin, has access to some of the most sophisticated capabilities available to government and is cementing its position as the UK authority on cyber security. The NCSC’s main purpose is to reduce the cyber security risk to the UK by improving its cyber security and cyber resilience. This is the case for government, UK organisations, businesses and individuals. Whilst the Internet has drastically changed the way that people operate on a daily basis, advancing the way in which we work, communicate, find information and

purchase goods, it is also a major enabler for Organised Criminal Group (OCG) activity. Compared to other money-making crimes, often referred to as traditional criminal activity, the benefits to criminals of hacking and cyber theft are multifaceted. In many parts of the world, hacking is not actively prosecuted by authorities. Compared to physical theft, it is also fairly low-cost and equally low-risk, while there remains the ability to communicate, somewhat undetected, on the dark web, whereby criminals can collaborate and share new services, techniques and advise to other criminals. However, writing the introduction to the NCSC’s Cyber crime: understanding the online business model report, Matt Carey said that ‘very few people are aware of the extent of the online criminal ecosystem that supports and enables these attacks’. The head of the NCSC’s London Operations Team advises organisations to read the report to !



PGI Cyber Academy offers superb value to government, law enforcement and military units upskilling their cyber security capability www.pgitl.com We specialise in providing cyber training to those transitioning, requiring awareness or practitioners seeking professional development within cyber security • UK Government certified courses • Awareness, technical fundamentals and practitioner courses • Conversion and retraining courses for new staff • Specialist courses for teams of cyber professionals • Realistic, high-powered, immersive cyber training range • Industry recognised training including CISSP, CISMP, and QSTM

We can deliver most of our training courses on site, with discounts for multiple trainees on a course. Get a team of 16 GCHQ Certified from as little as £500 each*

Contact us if you would like to upskill your workforce in:

Please contact us for more information quoting the voucher code CTB0517

• Experienced operational cyber security trainers

• Penetration Testing • Network / Security Fundamentals • Information Assurance • Incident Response

PGI Cyber Academy - Bristol Tel: +44(0) 207 887 2699 Email: clientservices@pgitl.com Visit: www.pgitl.com

• Security Operations (SOC) • Cyber Security Consultancy

* Accurate at time of publication (July 2017), selected courses only, Terms and Conditions Apply.


Photo by Priscilla Du Preez on Unsplash

‘VERY FEW PEOPLE ARE AWARE OF THE EXTENT OF THE ONLINE CRIMINAL ECOSYSTEM THAT SUPPORTS AND ENABLES THESE ATTACKS’ " better understand ‘how cyber criminals are organised, their methods, and how their activities are monetised’. ORGANISATIONAL CYBER CRIME Like any criminal group, the members of an OCG will have unique and valuable skill sets, covering coding, hacking, administration, data mining and intrusion. According to NCSC’s Cyber crime report, ‘a successful criminal group needs a team leader’, someone to manage operations and keep everybody involved in check, as well as keeping ahead of local and international law enforcement. Aside from this, most OCGs will include a number of malware developers, coders who are responsible for writing and updating new code for malware, or plagiarising publicly available malware. This position enables the group to hide their activities from antivirus software, remotely control a victim’s machine and execute a wide range of commands on a host. The NCSC report warns that developers are increasingly ‘deploying configuration files with their malware’ that specifically seeks the presence of certain systems, such as payment systems, that will maximise ‘lucrative fund-stealing opportunities’. A network administrator is responsible for ‘hijacking hundreds of online servers and devices’, which together form a ‘botnet’. The more devices under their control, the more machines the OCG is able to exploit. Network administrators, who tend to use anonymisation services to hide the identity of their own devices online and use encryption to avoid easy detection, can also ‘execute powerful Distributed Denial of Service (DDoS) attacks’ and ‘target devices that are constantly online and have good Internet bandwidth’. If an OCG successfully installs malware on a business network or other major target, the group’s intrusion specialist will ‘ensure the malware presence is enduring and that they can exploit the network’. This involves gaining administrator privileges to enable access to the most valuable applications and databases. A cyber crime group will also often employ a data miner, who can transform otherwise incomprehensible data into a ‘format that can be easily sold or exploited’. A skilled data miner can identify and extract valuable data, such as bank accounts, personal details, credit cards and passwords, so that the data

can be monetised. This is where a money specialist can determine the best way to sell the stolen dataset, whether it be selling in bulk to trusted criminal contacts or by using specialist online services. ACCESS DENIED? The NCSC maintains that the most common ways in which a computer or computer system may become malware infected are via spam emails, visiting websites that have been compromised with malicious code and adverts that redirect visitors to a malicious servicer. Scam emails are not a new method in themselves, but the technology behind the approach has evolved quite drastically. Using interesting or concerning topics within the spam email, such as fake invoices or banking security notifications, people tend to open them quickly out of curiosity or concern, allowing malware to be deployed which will attempt to exploit your device. The attachment in the spam email is likely

to only contain a basic piece of malware or a ‘loader’ which, when deployed to your computer, is used to determine whether or not a full exploitation is possible or worthwhile for the cyber criminal. According to the Cyber crime paper, ‘once this determination is made, the loader will reach back to the cyber criminal’s malicious server and download a full malware package to it’. The trend of data being compromised through websites that have been harmed with malicious code if often referred to as watering hole attacks. These attacks redirect the user to an exploit kit which scans the computer for exploitable vulnerabilities, which, if found, enable the installation of other malware to exploit the system. A common result of the approach sees malware installed that captures what you type, called key loggers, which can see cyber criminals gain access to passwords and sensitive information that is manually entered onto web pages and login systems. !



CYBER CRIME " THE ONLINE MARKETPLACE As mentioned previously, there are myriad ways to monetise the data that is stolen as part of a cyber attack. More often that not, the OCG will do it themselves, but it is also likely that they sell the data to other criminals in a move called ‘secondary fraud’. Bank accounts are often exploited, with the stolen money laundered through a variety of accounts, often overseas, before landing in the hands of the OCG. The Automated Vending Cart (AVC) allows for stolen data to be sold in bulk with digital currencies, such as Bitcoin. An interesting point made in the Cyber crime paper is that, no matter how big the OCG, each individual criminal ‘is relying on small profit margins’ from each hacking attack to keep their business going. All the individual jobs, regardless of time or size of involvement, require payment, whilst all the services require funding, meaning that unless the criminals access high

value payouts on each occasion the profit margins remain slim. The continuity of their cashflow is also reliant upon software being maintained and bonnets being developed, so that their systems become more advanced and remain one step ahead of law enforcement detection, but also so that if detected they have another system ready to begin. A decent profit requires full time attention and high value payouts, neither of which are guaranteed. CYBER ESSENTIALS One in four businesses reported a cyber breach or attack in the past 12 months. The majority of cyber attacks exploit basic weaknesses in your IT systems and software. Cyber Essentials, a new NCSC-designed scheme, shows organisations how to address those basic protection policies and prevent the most common attacks. Having a Cyber Essentials badge protects


organisations against common cyber threats, shows customers that issue is taken seriously and enable members to bid for government contracts. Jeremy Harrison, interim chief executive of the Institute of Risk Management (IRM), said of the scheme: “IRM regularly sees the damaging commercial and personal consequences of weak cyber security. As an early adopter of Cyber Essentials ourselves, we’re keen that as many organisations as possible start implementing its principles at the earliest opportunity.” Christopher Graham of the Information Commissioner’s Office added: “The Information Commissioner’s Office supports the Cyber Essentials scheme and encourages businesses to be assessed against it. Protecting personal data depends on good cyber security, and the threats and challenges are getting ever more sophisticated. “All too often organisations fail at the basics. This scheme focuses on the core set of actions that businesses should be taking to protect themselves, their customers, and their brand. Cyber Essentials enables businesses to demonstrate that they are taking action to control the risks.” #


If a cyber attacker targeted your systems or plugged a device into your network would you notice? How far could they get? How easy would it be? How much of your company and client much disruption could they cause?

Securing your future

To help answer these questions, AgilityIS offer a QuickLook Information Security assessment designed to provide a rapid and cost effective preliminary benchmark of your security posture. Secure your future with our advanced security solutions.

ur: future with o Protect your g in ation test • Web applic ure testing • Infrastruct ation testing • Mobile applic ring tests ee • Social engin g solution in h • Anti-phis

0113 3229264





A global security solution in the palm of your hand

Extract big data from multiple sources – static or mobile user devices

Consolidate complex data streams generating predictive risk analytics

Superior data intelligence forecasts passed to the user, flagging priority issues


Control of your entire security operation from a secure, single-window, digital platform




Tim Norton, Global Head of Market, Ports & Borders at Smiths Detection, explains what a world of bot-controlled ports and borders could look like

The ports and borders sector looks to be growing. A Straits Times article, titled 40% spike in parcel clearance, rigorous checks to sniff out illegal items: ICA on 22 March 2017, noted the increase in parcel clearance in Singapore last year – over 40 per cent compared to 2014. Separately, visitor arrivals in the country have peaked to 16.4 million in 2016, recording a 7.7 per cent year-on-year growth. Assuming this upward trajectory continues, it would mean busier years ahead for Singapore customs. But inevitably with growth, there will be issues that need to be addressed. We have seen reports that it is now tougher for clearance authorities to detect contraband items such as drugs and cigarettes. Meanwhile, another Straits Times article, New drugs designed to avoid easy detection on 8 May 2017 points to how authorities are increasingly pressured to maintain vigilance on all fronts. According to Singapore’s Immigration & Checkpoints Authority (ICA) Annual Statistics Report last year, while the number of contraband cases detected at local checkpoints have decreased by eight per cent from 2015 to 2016, smugglers are constantly coming up with new ways to conceal forbidden materials and evade detection. In addition, personnel working in the ports and borders sector are known to work long hours coupled with graveyard shifts. How then can the industry tackle these issues without exhausting the talent pool? AI IN ACTION AT BORDERS One way to solve the issues at hand would be to deploy artificial intelligence (AI), one of the highly discussed emerging technologies today. Wired to be intelligent and to replicate human efforts, AI has proven to be useful in reducing the amount of time and effort required for time-consuming tasks, and its usage is set to increase further. By 2018, there might be a rise of AI that

can mimic human conversations in terms of how we speak and listen, and approximately 20 per cent of business content might come from AI, such as writing shareholder reports, legal documents and press releases. It is also predicted that AI could power up to 85 per cent of all customer service interactions by 2020. To that end, it is unsurprising that AI has been applied in the ports and borders industry: the main objective of doing so is to improve working efficiency but without compromising on security. The Port of Rotterdam has tested an AI system which scans through a fraction of containers for illicit content, with the goal of speeding up the inspection process. At Gongbei Port of Entry, the border between China and Macau, AI has been deployed to help cover various functions such as answer passengers’ queries in 28 different languages and perform facial recognition to help detect potential security threats. Given that AI usage is proliferating, it is worthwhile for the ports and borders industry to consider investing in AI to help improve productivity and efficiency. THE BEST IN EMPLOYEES AI addresses some of the deep-rooted challenges in the industry, one of which is the long working hours the industry is notorious for. A survey by Infosys on 1,600 business and IT executives saw that 55 per cent see AI as helping to create and improve products, services and business models, as well as give quicker access to such existing products and services. Half of the respondents felt that AI could solve their problems faster and two-thirds of them believe that AI will ‘bring out the best’ in their employees. Most respondents are also positive that AI will enable displaced employees to take on higher-value work. Implementing AI at work could also mean lesser costs accumulated in the long run.

HUMAN COMPONENT STILL KEY However, there are some key dependencies to be considered with AI. The ports and borders industry is a volatile one and terrorism continues to be one of the key threats to the industry. Even though technology upgrades and simulation exercises can be done, security and threats cannot always be predicted. Similar to how smugglers are coming up with new ways to evade detection, terrorists could also adopt similar tactics to try to smuggle in dangerous goods such as weapons or explosives into the country. During times like these, machines would need to have the flexibility that humans have to react to unforeseen circumstances. In that regard, the example of Uber’s self-driving car which crashed during a test drive in March 2017 in Arizona doesn’t exactly inspire confidence – yet. Due to the sensitive nature of the work, checkpoints cannot be fully automated and will continue to require human vigilance and interaction to manage unforeseen circumstances. To that end, it is important that technology enablers like Smiths Detection focus on not only product development, but also delivering expert advice to military and security personnel to better equip them in addressing their day-to-day challenges. As incredible an enabler as AI is, it is still limited in what it can do compared to human abilities. As such, instead of looking to replace, it would be best to have AI as a complement to human labour and take on more routine aspects of the job. Employees can then take on more elevated capacities by retraining themselves. In this way, the pursuit of efficiency will not come at the cost of valuable human talent. #

Written by Tim Norton, Smiths Detection

Aside from cost cutting benefits, AI also has the potential of expanding the organisation’s capabilities such as its business acumen. From the same Infosys survey, respondents that had already adopted AI mentioned that they expect their overall revenues to increase by at least 39 per cent in the following three years. Organisations that had experienced faster growth in revenue over the last three years were seen to be more advanced in AI maturity and adoption.

FURTHER INFORMATION www. www.smithsdetection.com





TECHNOLOGY Photo by Rami Al Zayat on Unsplash

At the end of June, Facebook, Microsoft, Twitter and YouTube announced the formation of the Global Internet Forum to Counter Terrorism in a bid to make hosted services hostile to extremism. The role of social media platforms in particular have come under increased scrutiny recently, so what more needs to be done?

THE ROLE OF SOCIAL MEDIA IN DEFEATING TERRORISM D uring the meeting of G7 leaders in Sicily, Prime Minister Theresa May stressed the importance of technology firms in suppressing extremist content online. May told the summit, which included US President Donald Trump and new French President Emmanuel Macron, that every nation has a responsibility in encouraging big technology companies like Facebook, Google and Twitter to block users who post extremist content and report individuals to authorities if there is evidence of imminent harm. Following the terrorist attacks in Manchester and London earlier this year, May wants social media companies to develop tools that could automatically identify and remove harmful material based on what it contains and who posted it, and also impose a law that technology companies must revise conditions and industry guidelines to make them absolutely clear about what constitutes harmful material and tell

the authorities when harmful material is identified so that action can be taken. Before the G7 Summit, the government announced that the UK and France were to join forces to tackle online radicalisation in a bid to ensure that the internet cannot be used as a safe space for terrorists and criminals. Proposals, to be agreed with Macron, include a new legal liability for technology companies if they fail to remove unacceptable content, as well as developing cross-country tools to identify and remove harmful material automatically. However, her strong stance on removing extremist content on social media has been met with some opposition, partly because of what is already being done and also because it risks moving terrorism-related content and communication beyond government and public surveillance. Max Hill QC, the UK’s counter terrorism watchdog, has questioned the effectiveness !



It's time to be more proactive about network security

An executive has opened a spear phishing email and their machine is now running zero-day ransomware against a file server

The smart TV in this meeting room has never had it's software updated - it has documented vulnerabilities

IT opened Remote Desktop on a server, intending to connect from inside the network but it has external facing interfaces that they also enabled it on

A software update to the SaaS used for relationship management has encryption turned off by default - customer data is moving to the cloud unencrypted

We believe that understanding a network is a key part of keeping it safe, the real threats are the ones you don't know about. Perception can find threats on your network regardless of source or intent, identify zero day threats before they cause damage, identify vulnerabilities before they are exploited, and uncover user error as it happens. Learn more at www.PerceptionCyberSecurity.com

TECHNOLOGY " of government plans to challenge technology firms on what they are doing to tackle extremist propaganda, including a government proposal to levy fines for failing to remove extremist content. Speaking at the Terrorism and Social Media conference in Swansea, Hill warned that to ‘criminalise’ technology companies could drive dangerous content into ‘the dark web’ and make prosecutions more difficult. He said: “I struggle to see how it would help if our Parliament were to criminalise tech company bosses who ‘don’t do enough’. How do we measure ‘enough’? What is the appropriate sanction? We do not live in China, where the internet simply goes dark for millions when government so decides. Our democratic society cannot be treated that way.” COLLABORATION The technology companies Facebook, Microsoft, Twitter and YouTube, who have established their own policies and removal practises, have stated that ‘by working together, sharing the best technological and operational elements of our individual efforts, we can have a greater impact on the threat of terrorist content online’. Building on the Shared Industry Hash Database initiative, a shared database of unique digital fingerprints for violent terrorist imagery or videos, the new forum will also seek to ‘foster cooperation with smaller tech companies’ and evolve over time, so that it is

IN JUNE, GOOGLE INTRODUCED FOUR NEW MEASURES TO TACKLE ONLINE EXTREMISM, SAYING THAT ACTION NEEDED TO BE TAKEN constantly responsive to the ever-evolving terrorist threat and changing extremist tactics. The groups will also commission research to inform counter speech efforts and guide future technical and policy decisions around the removal of terrorist content, as well as establishing a broad knowledge-sharing network through the UN Security Council Counter-Terrorism Executive Directorate (UN CTED). ENCRYPTED MESSAGING In March, following the terrorist attack on Westminster Bridge, Home Secretary Amber Rudd publicly argued that encrypted messaging services, such as WhatsApp, should no longer be allowed to offer terrorists a place to hide. In an interview with BBC One’s The Andrew Marr Show, Rudd referred to intelligence that Khalid Masood used the app before launching the attack which killed four people.

Photo by Markus Spiske on Unsplash

She said: “It is completely unacceptable, there should be no place for terrorists to hide. We need to make sure that organisations like WhatsApp, and there are plenty of others like that, don’t provide a secret place for terrorists to communicate with each other. It used to be that people would steam open envelopes or just listen in on phones when they wanted to find out what people were doing, legally, through warranty. But on this situation we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp. I would ask Tim Cook to think again about other ways of helping us work out how we can get into the situations like WhatsApp on the Apple phone.” A propaganda arm of the Islamic State group set up an account on Instagram in May ‘as an experiment in spreading information’. Instagram, who deleted the Nashir News Agency account for violating its guidelines, revealed that the feed had been seen by nearly 100 users before its removal and contained a stream of official IS propaganda, which included images taken during attacks by the terror group and statements claiming responsibility for other assaults. The Nashir News Agency, which has been a regular promoter of IS-related information, revealed that it had established more than 100 channels on Telegram that replicated content from its main account. Nashir set up two other accounts on Facebook to also spread news, both of which were immediately closed. BETTER DETECTION In June, Google introduced four new measures – better detection, counter radicalisation efforts, expert knowledge and tougher standards – to tackle online extremism, saying that more immediate action needs to be taken. Google says its engineers have developed technology to prevent re-uploads of known terrorist content using image-matching techniques, and will expand its work with other groups to help identify content that may be used to radicalise.

Kent Walker, a senior vice-president and general counsel at Google, said: “Terrorism is an attack on open societies, and addressing the threat posed by violence and hate is a critical challenge for us all. Google and YouTube are committed to being part of the solution. We are working with government, law enforcement and civil society groups to tackle the problem of violent extremism online. There should be no place for terrorist content on our services. While we and others have worked for years to identify and remove content that violates our policies, the uncomfortable truth is that we, as an industry, must acknowledge that more needs to be done. Now.” The move was quickly followed by social media giant Facebook, which released a statement claiming it would begin educating charities and non-government organisations (NGOs) about countering hate speech. Facebook’s Online Civil Courage Initiative, already set up in Germany and France, aims to help charities and NGOs identify and eliminate hate speech. The company will launch the initiative, which trains organisations to monitor and respond to extremist content and creates a dedicated support desk where concerns can be flagged up, in the UK soon. It is clear that, even before Theresa May’s increased focus on technology companies, that work was being undertaken to ensure safer measures were in place, particularly on social media. The increasing use of the internet, apps and social media have clear benefits and concerns. The best way to curb the threat of extremist material is collaboration and sharing of knowledge and policy. The sharing of hashes of the content most likely to violate content policies means that damaging and radical information and media cannot be replicated. One feels that the deeper collaboration and policy sharing goes, the more likely user privacy will become a counter argument. Following the criticism of her Snooper’s Charter, it will be interesting to see how Theresa May tackles that problem. #



RADARPOINT Radar sensor system To monitor wide areas and pinpoint intruders or objects With the new RADARPOINT300 SYSCO have developed a completely new solution for open area security. Securing and monitoring large open areas with these discretely located devices, which can cover all areas in question, can be achieved in a cost effective fashion compared to the expenditure required using other wide area monitoring technologies.

A number of interfaces are available to integrate the devices into an integrated security infrastructure. Thus the electronics are able to interface directly to the security system via a LAN-Network or with an RS485 data line.

Consequently this new technology is suitable for the high-level security areas as well as for industrial applications.

For smaller systems the radar electronics of course are also able to be connected individually . Two free dry relay contacts can be used as alarm outputs or to control external devices. In addition, the RADAR Point evaluator is equiped with inputs to monitor external contacts (such as gate contacts, IR-beams etc.).

The new devices invisibly monitors big free areas and potential intruders locations can be identified exactly. The modern software allows the exact setting of detection parameters depending on size, direction, position and speed.

The RADAR Point system setup can be configured through the above mentioned data interfaces as well as an USB connection. On request a puttable WLAN-Stick is available, so that the settings comfortably also wirelessly can be carried out.

The electronics are housed in a robust case which is equiped with a Vesa connection and a universal holder for masts, walls or other objects.

RADARPOINT The RADARPOINT is prepared for wall or post assembly

Direction dependant detection Object localisation 1,5m-5m Detection range up to 300m 45° horizontal opening angle 24 GHz Radar technology

Made to work Stand-Alone and/or in combination with MASTER CENTRAL CONTROL

Stand-Alone operation RADARPOINT300 The RADAR POINT with its LINUX system is self-sufficient, with its highly competitive evaluation unit and is therefore idealy suitable for Stand-Alone operation. Through several data interfaces or the dry relay contacts the RADARPOINT300 is able to be connected to any third party system.

Company references




Suitable central technology


Mental hospitals

MASTERCENTRAL For larger systems a userfriendly central systems operating on a Windows platforms can be provided. To compensate for the disadvantages from using a PC based system controller, with regard to the operational safety, we have developed a new system concept for the MASTERCENRAL CONTROL .


Applications: As a universal central processing unit for high-level security areas and all larger detection systems

Government and special forces sites


Military and nuclear sites



Industrial and logistic projects

Remote diagnostics via internet Several data interfaces

Sysco - delivering certainty.

Embedded Hardware-IO´s

Your specialist for the electronic and open area security

For the targeted control of several radar sensors we recommend our MASTERCENTRAL

Since 1989 as a mid-sized company we develop electronic hard- and software solutions, to offer our customers optimum system solutions. Our service begins with a comprehensive consultation excercise and continues with the development of an individual system conception, to ultimately end with the project realisation and after sale service. By manufacturing the assemblies in house we are very adaptable and are able react flexibly to the requirements of the respective project. We engage with customers and have a steady exchange of views with consultants and users worldwide.

Freely adjustable detection areas with SENSECONTROL

Intuitively extendable and flexible operation SENSECONTROL Ideally as universal administrative software system and operator display newest generation software for the detection technology of SYSCO Sicherheitssysteme GmbH.

Utilizing the newest technologies and specific customer requirements lead to innovative security products. We stand for reliable products, service oriented customer care as well as competent and honest consultation. It is important for us, to offer a friendly, professional and high-class service. Visit us on the Internet or get in touch. info@sysco-gmbh.de www.sysco-gmbh.de

Combined Temporary & Permanent HVM in Whitehall


TSP Projects – Helping to protect the nation TSP Projects is an


innovative solutions driven

company specialising in

• Permanent Hostile Vehicle Mitigation

multi-discipline projects

Redeployable Hostile Vehicle Mitigation

Protective Construction

and products, from feasibility and design to

Perimeter Defence and Security

manufacture and on-site installation.

If we can help you please contact us: T: +44 (0)118 990 1163 www.tspprojects.co.uk @TSPProjects www.facebook.com/tspprojects www.linkedin.com/company/tspprojects






On behalf of the Perimeter Security Suppliers Association, Iain Moran, high security consultant at ATG Access, looks at the importance of ensuring the perimeter of a venue or location is secure and protected against targeted vehicle attacks

INCREASING SECURITY TO PROTECT AGAINST VEHICLE ATTACKS C ities across the UK and Europe are under increasing pressure to grow tourism and visitor attractions to deliver growth and jobs. According to Visit Britain, the tourism industry in the UK alone is forecasted to grow to ÂŁ257 billion by the year 2025. Urban spaces are becoming multi-functional and being used to hold a variety of different events such as Christmas Markets, festivals, open air cinemas and sporting events to name just a few. Changing the use of critical infrastructure and the public realm forces areas to be more flexible. This flexibility and multi-function challenges physical security to protect people and assets utilising these spaces. Recent events, such as the Christmas Market attack in Berlin, the attack on one of the main shopping streets in Stockholm and

the attack on Bastille Day in France, have highlighted the need for event security to be re-thought in order to keep attendees safe. One of the key focuses for event organisers now centres around ensuring the perimeter of the venue or location is secure and protected against targeted vehicle attacks. However, deploying perimeter security products, such as concrete blocks or heavy steel barriers, does come with its challenges. Although fit for purpose, these traditional measures can be onerous to install and are not pedestrian or cyclist friendly. Barriers usually require the help of multiple, heavy transporting vehicles to install. What’s more, road closures often need to be enforced earlier than necessary due to logistical difficulties and the need for cranes to be brought in to put the road blocks into position. !



Anti-Vehicle Perimeter Solutions Permanent protection for site perimeters, crowded locations and front-of-house Bristorm Anti-Vehicle Fence and Bollards are tested to BSI PAS 68, IWA 14-1 and ASTM F2656. Bristorm’s continually evolving product range can provide Hostile Vehicle Mitigation solutions that not only guard against your current perceived threats but also mitigate the future changing security requirements of critical infrastructure & crowded locations. Contact a member of our team via www.bristorm.com for more information or call +44(0)1902 499400

Tested to PAS 68/ IWA 14

Subtle, high quality and efficient

Securing long perimeter edges and entry points

Request a technical presentation by contacting us via. www bristorm.com Want more information on the latest Hostile Vehicle Mitigation Standards? Need reliable static protection against vehicle-borne attacks?

NEW PAS 170 Bollards by Bristorm Low Speed . Cost - Effective . Security Bollards Contact us for more information

Bollards . Anti-Vehicle Fence . Street Furniture . Integrated Personnel Fence . HVM

Visit our Technical website for support xtratech.bristorm.co.uk Member of the Hill & Smith Holdings Infrastructure Products Group and certified with ISO 9001:2008, ISO 14001:2004, PAS 99:2012, OHSAS 19001:2007 Member of the PSSA- Perimeter Security Suppliers Association

bristorm.com info@bristorm.com +44 (0) 1902 499400


CHANGING THE USE OF CRITICAL INFRASTRUCTURE AND THE PUBLIC REALM FORCES AREAS TO BE MORE FLEXIBLE. THIS FLEXIBILITY AND MULTI-FUNCTION CHALLENGES PHYSICAL SECURITY TO PROTECT PEOPLE AND ASSETS UTILISING THESE SPACES " These difficulties can cause huge disruption, perhaps to areas that are normally used for normal daily activities. For instance, a temporary event like a street carnival or a marathon may require busy roads to be completely closed down the day before the event actually takes place, which could mean commuters have to find alternative routes and businesses have to bear the disruption longer than perhaps intended before and after the event. With this in mind, we look at some of the key considerations that event organisers and public realm managers must take into account to make sure the area is secure, while keeping disruption to the area to a minimum. DOES THE EVENT NEED PERMANENT OR TEMPORARY SECURITY? The frequency of the event is an important factor to think about when selecting the types of physical security that need to be put in place. The area,

and what it is usually used for, will also play a big role in this decision. For instance, events taking place in dedicated arenas or stadiums will require permanent security solutions because activities tend to take place all of the time, perhaps even on a daily basis. The continuous congregation of thousands of people increases the level of risk to the location High security measures need to be in place to protect against any potential threats on a permanent basis. But this level of security will not be needed for events that only happen in areas on a truly temporary basis, say for example on a main road, or at a town square. Think about Christmas markets, which many towns host over the festive period. These only happen once a year, and usually take place in the town or city centre. When events aren’t taking place these areas are considered as low risk. However, when an event is taking place, this risk increases considerably due to the amount of people gathering in one concentrated area.

With infrequent or annual events, installing permanent security measures is not really necessary – solutions just need to be put in place for the specific length of time the event takes place. This could include surface-mounted barriers or bollards that don’t need bolting down, so they can be quickly deployed and removed easily after the event without causing damage to the ground. There are some impact-tested surfacemounted barriers available that can be installed by four men to block off a 10 meter road in under 40 minutes. MINIMISING DISRUPTION There are a whole host of barriers and bollards available that are effective at blocking off roads, preventing vehicle access or controlling restricted access into a venue. To minimise operational disruption to an area, such as lowering the time needed to install solutions or prevent surface damage caused by fixing solutions to the ground, those in charge of security need to consider which bollards or barriers will be most suitable. To select the best solutions, it’s important to think about what type of event is being secured, and how accessible the roads are around the venue – are the roads really wide and open and will they need a higher level of security, for instance? For areas that don’t play host to events often, a temporary solution could be !

Intelligent Security Our people are physical security experts Our products are tested to international impact test standards

www.atgaccess.com 08456 75 75 74

Our engineering is innovate, cutting edge and bespoke Our aftersales care is available 24/7






Heald Ltd

+44 (0)1964 535858 info@heald.uk.com Heald Ltd, Northfield, Atwick Road, Hornsea, United Kingdom, HU18 1EL

PERIMETER SECURITY " rented rather than bought – this would be a cheaper alternative to purchasing barriers or bollards, particularly if the intention is only to use them as one-off solutions or annually. Solutions could also be rented or owned and stored away in situations where bollards or barriers are needed on a semi-permanent basis (where events may happen more regularly in an area, but still not on a continuous basis). Additional measures could be put into place to ensure that regular deployment of this type of kit would make it very easy and straightforward for products to be deployed when needed, and would limit road closures and disruptions. There has been a major focus on event security in recent months and it’s important that extra measures are being taken to ensure all employees and suitable, robust barriers and bollards in place but that disruption to the area is also kept to a minimum and areas don’t become a fortress. #

WITH ANNUAL EVENTS, INSTALLING PERMANENT SECURITY MEASURES IS NOT REALLY NECESSARY – SOLUTIONS JUST NEED TO BE PUT IN PLACE FOR THE SPECIFIC LENGTH OF TIME THE EVENT TAKES PLACE event guests are safe and protected. Securing the location’s surroundings is an effective method of preventing targeted attacks or incidents from happening and should be a priority during preparations

Read more on event security on the Counter Terror Business website: www.counterterrorbusiness.com.

ahead of an event. But it’s important to remember that perimeter security is not a one-size-fits-all solution – ultimately, it is up to event organisers and security personnel to ensure they have the most

FURTHER INFORMATION\ www.atgaccess.com www.pssasecurity.org

Redi-Rock Vehicle Security Barriers (VSB)

...The vehicle security system that protects from vehicle impact

Retaining Walls

Utility / Critical Infrastructure Buildings of High Importance Military Facilities Crowded Places Civil / Nuclear Installations Transport Hubs 1066kg

T: 01179 814500 F: 01179 814511 E: sales@cpm-group.com www.redi-rock.com www.cpm-group.com



Securing What Matters

Tried.Tested.Trusted High Security Fencing & Access Control.

Security Level High Security

Perimeter Security Betafence Limited PO Box 119, Shepcote Lane, Sheffield S9 1TY

0114 256 7800

Enquiries sales.sheffield@betafence.com



Prisons, Secure units, Nuclear, Utilities sites, Maximum risk sites

Why choose Betafence? Nationwide coverage No obligation quotations Complete, tailored solutions service We come to you


135 Over 135 years of excellence

Serving 100 countries

ISO 9001 14001 certified

8 production sites worldwide

Approved partner

Betafence is the world market leader in fencing solutions, access control and detection perimeter protection. All Betafence companies and product names are trademarks owned by Betafence Holdings nv. Modification in products and assortment are subject to change without prior notice. 2017/07. www.betafence.co.uk.



Eagle Automation Systems is one of the UKs leading providers of PAS68 & IWA-14 tested gates, bollards and blockers with over 25 years’ experience of designing and delivering practical, cost effective and quality British solutions to thousands of organisations.

Eagle produces a comprehensive range of PAS68 and IWA-14 gates with amongst the lowest penetration in the market at both 40mph and 50mph. With a level of expertise that is unsurpassed in the industry, Eagle is at the forefront of product innovation, quality and standards. New products are being launched in 2017 and further innovative solutions are planned for 2018. Eagle Automation Systems is proud to announce that it has recently acquired the Intellectual Property Rights to the APT Security Systems PAS68 rated and impact tested product range. These include shallow mount and surface mount static bollards as well as automatic bollards at 30mph, 40mph and 50mph. The range also includes street furniture, full depth and shallow mount road blockers. This exciting opportunity has enabled Eagle to become one of the leading manufacturers of HVM products in the UK. APT has established a leading brand known for high quality, reliability and innovation that compliments Eagle’s existing range of products and services. With an established name through Europe and the Middle East this acquisition provides an excellent platform to build on. NEW PRODUCTS Eagle Automation System now offers the following PAS68 and IWA14 products: PAS68 Bi-Folding gates tested to 40mph and 50mph at 4.2 metre clear opening;

PAS68 Swing gates tested to 40mph at 8.0m clear opening; IWA-14 Manual swing gates tested to 40mph at 6.0 metre clear opening; PAS68 Cantilever gates tested to 40mph and 50mph at 8.0 metre clear opening; PAS68 Static bollards tested to 30mph, 40mph and 50mph. Foundations from surface mount to shallow and full depth are available; PAS68 Automatic bollards tested to 30mph and 50mph. Foundations from shallow to full depth are available; PAS68 Cycle racks tested to 40mph; and PAS68 Pedestrian Barrier. CASE STUDY: DRAKE CIRCUS SHOPPING CENTRE, PLYMOUTH Eagle successfully manufactured and supplied a number of PAS68 bollards to enhance the protection for shoppers and clients at Drake Circus shopping centre in Plymouth. The products were a mixture of APT30SH ‘bollard in a box’ and APT40SH, shallow mount bollards. As well as this, APT40SH removable bollards were commissioned to allow access for certain occasions. The bollards were sleeved with a polished stainless-steel shroud to produce a nice aesthetically pleasing HVM solution. Eagle provides not only a fast and competitive quotation solution for all types of security gate, but also produces a turnkey service – whether required for planning permission or architectural design. The market leading range of in house manufactured and designed Bi-Folding Speed Gates are

now specified by some of the leading bluechip organisations in the country. With investment in 3D solidworks and an inhouse design team, works solutions can be tailored to suit customers’ requirements. Continuous investment in research and development means that products are manufactured to the highest standards and designed to meet not only current but future legislation. In 2017, Eagle launched the ‘Lockdown’ Gate, their latest product tested to achieve IWA-14 accreditation. With a clear opening of 6.0 metres, it was tested as a shallow foundation solution with fully removable posts. Eagle is now able to provide one of the industry’s most comprehensive single source supply of PAS68 and IWA14 products. Eagle also has a dedicated sales team able to offer sound technical advice to ensure that the system is compliant and meets the latest standards for safety. Eagle is delighted to appoint Rankin Goalen as HVM sales manager. Rankin joins with a wealth of experience from within the industry and will complement the current established team Eagle is also pleased to announce its attendance at this year’s UK Security Expo 2017, held at Olympia from 29-30 November 2017. This show will be used to launch the APT/Eagle products as one. Eagle Automation Systems employs people with a wealth of skills and experience. All engineers are specialist in their roles varying from fabrication and welding to fully qualified electricians with 17th edition and ‘Part P’ registrations. The steady growth of its business is dedicated to the hard work, skills and commitment of each of its people. Investment in the latest engineering management software, a modern fleet of fully equipped vehicles and the latest communication equipment ensure our service is second to none and unrivalled in our industry. #

FURTHER INFORMATION www. www.eagleautogate.co.uk



Welcome to the Hub The Microsoft Surface Hub is the world’s fastest crisis management and communications tool that facilitates effective, accurate, real time communications to be effective and accurate. The Surface Hub is highly multi-functional; it combines multi-source videoconferencing and detailed white board display. Critically, the Surface Hub fills a gap in historical incident management systems as it enables operators to distribute up-to-date visual information on a minute by minute basis, to multiple stakeholders on multiple remote and field devices. The Surface Hub enables users to share live feeds from fixed and mobile cameras or drones, and to distribute pictures, information and maps to any smartphone or laptop device. As a result, security teams on the ground gain more control to manage incidents with the availability of clear, constantly updating intelligence. The Hub also provides a way to share information instantly across all the agencies involved in an incident: police, emergency services, coastguard, border control, and more. With the Hub functioning as its name suggests, as a single communication and dissemination point, it has proven to be invaluable for surveillance teams when dealing a wide variety of incidents. From counter terror measures, to missing persons, evacuation scenarios and suspect tracking, the Hub can be integrated in all instances with other systems in order to make the most of facial recognition, PSIM, drone detection applications and crisis software, all with full audit trail. The controls on the Hub are intuitive and impressive; implementation is simple and users require minimal training. Control literally requires no more than the touch or swipe of a finger. The Surface Hub consolidates the need for multiple screens as both the 55� and 84� 4k Hubs enable operators to have multiple applications open, and toggle them, to make the Hub the faster and more versatile than any VMS on the market. Contact Carillion Communications to arrange a hands-on demo with your staff. Our Hub team travels throughout the UK. YOUR EXPERT PARTNER



9,850 security professionals from over 114 countries travelled to London in May for the latest installment of Security & Counter Terror Expo. Here, we look back at some of the main themes and what the leading figures had to say

TACKLING TERRORISM AT SECURITY & COUNTER TERROR EXPO T he terrorist landscape has changed in recent years with extremists going to new measures to cause harm and disruption across the globe. Attacks are no longer limited to methods such as improvised explosives and the hijacking of planes. Everyday items such as cars and

knives have been used by radicals in the latest wave of attacks across Europe. 9,850 security professionals from over 114 countries travelled to London in May for the latest instalment of Security & Counter Terror Expo (SCTX). One of the main attractions at this year’s event was the World Counter !




Body Scanner

Automated Tray Handling

Cabin Baggage

Trace Detection


L3 DELIVERS INNOVATIVE CHECKPOINT SOLUTIONS FOR OPTIMAL SCREENING SECURITY. Our centralized, integrated checkpoint solutions offer optimal security and detection while keeping checkpoints running smoothly. From screening passengers to cabin baggage, L3’s innovative systems provide efficient threat detection for a range of airport functions. L3T.com/sds





There was a focus on drone and anti-drone technology at SCTX 2017

COVERING POLICY AND STRATEGY IN A NUMBER OF KEY AREAS, SUCH AS DE-RADICALISATION AND PREVENTING ATTACKS, THE WORLD COUNTER TERROR CONGRESS FEATURED DOZENS OF WORLD-RENOWNED SPEAKERS " Terror Congress. Covering policy and strategy in a number of key areas, such as de-radicalisation and preventing attacks, the congress featured dozens of world-renowned speakers, including Sir Malcolm Rifkind, Europol’s Rob Wainwright, and Lucy D’Orsi, Deputy Assistant Commissioner of the Metropolitan Police. In her presentation, D’Orsi addressed the threat posed by both international and home-grown terrorists stating the importance of educating children in schools on the ‘Run, Hide, Tell’ message. Meanwhile, Rob Wainwright, the head of Europol, spoke about the use of the ‘dark web’ and how extremists can buy a British passport for as little as £750. He went on to condemn encrypted Russian messaging app Telegram, with its refusal to cooperate with the authorities in discovering and preventing attacks before they happen. Richard Walton, former head of Counter Terrorism for the Metropolitan Police Service, added: “The biggest change we’ve seen from terrorists over the past year is the move towards

simplifying their attacks as much as possible. This has completely changed the goal posts in how we must prepare and try to prevent these atrocities from happening. Motor vehicles are now one of the most common weapons of choice which presents a completely new challenge for security professionals to face. Events such as the World Counter Terror Congress are key in bringing the industry together to overcome these challenges and keep us one step ahead of the terrorists.” THE TERROR THREAT TODAY The Cyber Threat Intelligence Conference, presented by techUK, brought together those who work to prevent cyber terrorism and crime. Talal Rajab, techUK’s head of Programme, Cyber, National Security, said: “The cyber terrorism threat grows immeasurably year-on-year and we as an industry, must grow, adapt and react in equal measure. Security & Counter Terror Expo provides opportunities to learn from and meet with some of the

key figures in the sector addressing the most important issues we face today.” The Critical National Infrastructure & Business Reliance conference featured a series of presentations examining the policy and strategy responses to today’s terror threat. Among the 20 high-ranking officials and academics who presented was James Brandon, director of Geopolitical Risk – Stirling Assynt. He discussed the threat assessment challenge for critical business and infrastructure protection in the UK, saying: “Carrying out accurate threat assessments on a regular basis can be challenging with the continuously changing environment, however it is vital in maintaining a security procedure that is both up-to-date and appropriate to the threat posed to that particular building.” Atatürk international airport in Turkey and both Brussels airport and metro station have been subject to recent terrorist attacks. Transport links are increasingly a target for terrorists, with aeroplanes, mass transit buses, rail terminals, ports, vehicles and transport facilities all facing the risk of future attacks. The SCTX Border & Transport Security conference focused on airport security, anti-trafficking, customs and immigration. THE DRONE ZONE This year saw a focus on drone and anti-drone technology. With technology !





Every day.

Ordinary days require extraordinary protection.


Find out more about the software behind the everyday at genetec.com/protectingeveryday

Š 2017 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.

SCTX " developments enhancing their capabilities, these devices are becoming increasingly important to the security industry. As a result, a number of leading businesses, including Diametrex, Drone Defence and Aerial Academy, showcased their latest solutions at the show. AARONIA AG were proud to demonstrate the latest in anti-drone technology with their Real-Time Spectrum Analyzer drone detection system. Founder, Thorsten Chmielus, commented: “It’s a constant battle to keep up with the developing drone technology. We are working with drone manufacturers looking at every new model that comes to market.” In the Advanced Technologies Live zone, Risk GOC displayed their smart stab-proof clothing. Despite being as thin as a t-shirt, the item is designed to protect the wearer from a knife attack with the blade unable to penetrate through the material.

CARRYING OUT ACCURATE THREAT ASSESSMENTS ON A REGULAR BASIS CAN BE CHALLENGING WITH THE CONTINUOUSLY CHANGING ENVIRONMENT, HOWEVER IT IS VITAL IN MAINTAINING A SECURITY PROCEDURE THAT IS BOTH UP-TO-DATE AND APPROPRIATE TO THE THREAT POSED TO THAT PARTICULAR BUILDING Security & Counter Terror Expo is the ideal opportunity to showcase your products and services to the most influential purchasers and specifiers. For all exhibitor enquiries for the 2018 event, please contact Sophie McKimm, event manager on +44 (0)20 7384 7894 or email Sophie.McKimm@clarionevents.com Security & Counter Terror Expo will be taking place at London’s Olympia on 6-7 March 2018. As part of the build up to the show, Counter Terror

Business will be providing monthly, leading industry reports on a number of topics, including border security, cyber resilience and counter terror policing. Keep an eye on the Counter Terror Business and the Security & Counter Terror Expo website for their release. The first of these reports will be printing at the end of the July. #







Counter Terror Business publishes a public reportage about counter UAV technologies with the expertise of Fabian Ochsner, vice president at Rheinmetall Air Defence AG CTB: WITH EVERYTHING GOING ON AROUND THE WORLD AT PRESENT, WHAT DO YOU SEE AS THE MAIN DRONE DEFENCE REQUIREMENT? Fabian Ochsner (FO): Lessons taken from conflicts in Syria, Yemen or Ukraine indicate that the defence against drones, or what is dubbed Low-Slow and Small (LSS) systems, is an urgent matter and that forces or security organisations who lack capabilities are in serious trouble. The two main requirements are for military ground based air defence organisations to adopt counter-LSS capabilities and for security organisations, like the police or correctional services, to basically enter the world of air defence to be able to perform their tasks of securing events or locations from drone incidents. The technologies used in both cases are the same and can be derived largely from the field of air defence. For many organisations, including airports or airlines, the question of a major incident involving drones is not a question of ‘if’ but a question of ‘when. CTB: WITH TECHNOLOGY NOW MAKING IT POSSIBLE TO BUILD DRONES FOR THE SPECIFIC PURPOSE OF CAUSING DAMAGE, WHAT CAPABILITIES DO RHEINMETALL HAVE TO COMBAT THIS? FO: The US Defense Advanced Research Projects Agency (DARPA) issued a recent program solicitation, which read: “Most counter-UAS systems under development are focused on today’s threat, which relies on radio frequency (RF)-based remote control


or global position system (GPS)-based navigation. However, the next evolution of UAS will not require GPS nor active communications to accomplish their missions. These vehicles will be capable of navigating by visual means or other methods, performing synchronised actions that allow large groups to coordinate an attack against one or more moving targets and be used as intelligence assets or as weapons carrying platforms.” It clearly states that we need to consider two possibilities. First is the use of an unmodified drone which can pose a risk and second is the case of a purpose built or modified drone which can be envisioned to be used by terrorists who will make sure their mission cannot be jeopardised by drone defence systems relying on RF or GPS detection and intervention. Rheinmetall focuses its efforts on the demanding threat that is posed by purpose built modified drones.

CTB: HOW DO YOU SEE OUR GROUNED BASED AIR DEFENCE SYSTEMS DEVELOPING AND WHAT ROLE DO YOU SEE FOR RHEINMETALL? FO: The issue of drone defence is a special case of ground based air defence. We have been in the drone defence world for more than 50 years based on the fact that we used model aircraft, for cost reasons, to train operators of gun based air defense systems. Countering drones has thus been one of our capabilities for a very long time. Having qualified our systems for the role of countering Rockets, Artillery and Mortars (C-RAM) we have achieved a major step towards being capable of dealing with the LSS target set. We can bring military solutions for this problem to the table right now and we can use our expertise to include new features geared towards new missions and environments where a military grade solution like an air defence gun may not be practical. As the focus now shifts towards the small battlespace of drone defence, the continuous application of new technologies to ruggedise inherent capabilities of our systems will ensure, that we can stay abreast with the rapid development in drone technology.

This means for example that we augment the regular search function, which has been based on Radar only, to include TV/ EO, passive emitter locators, acoustics and visual means. Rheinmetall’s role will be the overall solution provider but subsystems will be third party suppliers as well in case we do not have the technology in-house.

CTB: COUNTERING HOSTILE DRONES IS OF PRIME IMPORTANCE. WHAT IS RHEINMETALL ABLE TO OFFER AS A SOLUTION TO THIS PROBLEM? FO: Due to the fact that there is no ‘silver bullet’ that can solve the problem as a single solution, Rheinmetall is currently establishing a toolbox of capabilities to Sense, Decide and Act against drones. This toolbox consists of special technologies that we have in the wider Rheinmetall group as well as specific cooperations with providers of partial capabilities in the Sense and Act domains. The counter drone toolbox will allow us to provide specific solutions for the drone defence issue of the individual customer. We have furthermore used our military systems background to design specific systems like Radshield which is used to detect drones and small throw-overs crossing the wall of a prison. The combination of military grade software with commercial hardware enabled a comprehensive product which could solve a major issue of most correctional institutions. On the other side, we have proven that we have the technology to deal with LSS targets in the military world by demonstrating the effectiveness of the gun solution, using the innovative AHEAD air burst technology or new solutions like High Energy Lasers as ultimate and cost effective effectors. Our toolbox is continually upgraded with new systems and will allow civil security organisations and military customers to choose and tailor solutions in accordance with the precise needs. #


FURTHER INFORMATION www.rheinmetall-defence.com

UAV TECHNOLOGY Photo by Goh Rhy Yan on Unsplash

Back in March 2017, it was widely reported that anti-drone unmanned aerial vehicles (UAVs) were to be taken for counter terrorist test flights on a UK military base, because of the rising threat posed by the technology

USE OF UAVS INCREASING TERRORISM FEARS T he UAV sector is estimated to be worth approximately $127 billion, a fact that previous issues of Counter Terror Business has labelled as the ‘booming drone revolution’. But amid the financial optimism, which is predicted to grow further this year, is a growing concern that the security threat that UAVs pose to critical national infrastructure, homeland security and a range of commercial sectors is more dangerous than the government and security services are prepared for. According to the Institution of Engineering and Technology, defence chiefs are

considering using swarms of collaborative net-casting UAVs to create a radio frequency forcefield wall around government sensitive areas, similar to the SkyWall 100 – an anti-drone bazooka created by OpenWorks that launches a net at flying objects and parachutes them to the ground. A GAME CHANGER Although now over a year old, a report by the Oxford Research Group’s Remote Control project warned that commercial UAVs could soon be used as ‘simple, affordable and effective airborne improvised explosive !




The FLIR Black Hornet™ is the smallest operational unmanned system in the world and it has been used extensively in combat operations by NATO forces over the past few years. The system is described by its users as a “Game Changer” and a “Life Saver”,and has created a new standard and class for the smallest UAS. Learn More at www.flir.com/blackhornet

UAV TECHNOLOGY " devices’. The Hostile Use of Drones by Non-State Actors Against British Targets, which was published in January 2016, says that developments in unmanned ground and marine vehicles are ‘opening up new avenues for hostile groups to exploit’ and continued to highlight the role of regulatory countermeasures, passive countermeasures and active countermeasures that should be deployed against drone threats. This can take the form of: stricter regulations and licensing, including a manufacturer requirement to install GPS coordination firmware that emphasises no-fly zones around sensitive fixed locations; security alert measures that limit the ability of hostile groups to guide a drone onto a mobile target; the purchasing availability of early warning systems for police and counter terrorism forces; and directional radio frequency jammers, lasers and malware that can be deployed against drones that still represent a threat despite passive systems being employed. The report identifies a range of terrorist, insurgent, criminal, corporate and activist threat groups using drones for attacks and intelligence gathering and outlines specific recommendations on the strategies available to mitigate the threat of the hostile use of drones by non-state actors in the short to

platforms in Fallujah, Iraq, from early 2014 – predominantly for propaganda purposes, but increasingly for surveillance and target acquisition capabilities. SOARING SURVEILLANCE The use of drones within the defence and security sectors, as well as in military use, has developed at the same pace as the commercial innovations explored at companies such as Amazon. Created for use in situations where manned flight is considered too unsafe or high risk, UAVs offer military units the ability to have constant surveillance on the activities and movements of both their own troops and those opposing them. A 24/7 ‘eye in the sky’ allows surveillance staff to receive real-time imagery and intelligence of activities on the ground, without putting lives at risk - at least not immediately at risk. However, global governments and security organisations are increasingly concerned by the decentralisation and democratisation of intelligence, surveillance and reconnaissance (ISR) capabilities made possible by the widespread availability of drones. UAVs, as their name suggests, are unmanned, but are piloted, with a trained crew at base steering the craft, analysing the images which the cameras send back and acting upon the

DEFENCE CHIEFS ARE CONSIDERING USING SWARMS OF COLLABORATIVE NET-CASTING UAVS TO CREATE A RADIO FREQUENCY FORCEFIELD WALL AROUND GOVERNMENT-SENSITIVE AREAS medium term. For example, a 26-yearold American man was arrested by undercover FBI agents in September 2011 for planning to fly explosives-laden model aeroplanes into the Pentagon and US Capitol and rig mobile phones to detonate improvised explosive devices (IEDs). Remaining with the US, an off-duty employee of the US National Geospatial-Intelligence Agency lost control of a UAV and accidentally crashed it onto the White House lawn. Although an accidental incident, the ease in which it happened was of deep concern to the President’s security officials. Closer to home, an unidentified drone came within six metres of an Airbus A320 as it landed at London’s Heathrow Airport in July 2014, sparking the publication of the ‘dronecode’ – a set of new safety guidelines by the Civil Aviation Authority. A further 20 suspicious drone-related incidents were recorded in and around London between 2013 and 2015, according to freedom of information requests sent to the Metropolitan Police. In a direct terrorist use, Islamic State were reported as using DJI Phantom UAV

information that they receive. They are easy to operate and provide distance and anonymity to their operators, with battery improvements and higher technology cameras providing uninterrupted access to the air. However, the use of drones for surveillance purposes has been exceeded by use for air strikes. Although much remains unknown, it has been reported that there were ten times more air strikes (563) in the covert war on terror during President Barack Obama’s presidency than under the Presidency of George W. Bush (57), mainly on suspected militants in Pakistan’s tribal areas. Whilst the Obama administration continues to say that drone strikes are ‘exceptionally surgical and precise’, the figures suggest otherwise. According to reports logged by the Bureau, between 384 and 807 civilians were killed in Pakistan, Somalia and Yemen as a result of the drone strikes. The argument for use is that it prevents the need to send in military personnel for costly ground wars, but human rights groups have a lot of support in contesting the continued use of drones in military activity.

DRONES AS A DISPERSAL DEVICE Additionally, it was reported in January that Islamic State are using drones to drop explosives on civilians and troops advancing in districts of Mosul, with markets in the eastern part of the city, where civilians gather in large numbers to stock up on food, targeted. More than one million civilians remain inside Mosul, despite ongoing campaigns to drive Islamic State from the city. Causing further concern, a research paper has suggested that Islamic State are planning to ‘marry together two technologies, drones as a dispersal device and chemical, biological or radiological material as the dispersant’. Professor David Hastings Dunn, of the University of Birmingham, has penned his concerns on the possible ‘technology transfer’ of techniques and tactics used in Islamic State planning. He argues that drone attacks could be ‘psychologically unnerving and terror inducing’ and that security and military officers should be well aware and prepared for the possible ‘weaponising [of] a drone to carry a chemical agent’. On a separate note, but in defence to the threat of drones, Hastings Dunn refers to the Paris attacks, particularly concerning the suicide bombers who unsuccessfully sought access to the Stade de France. Perimeter security prevented the terrorists from getting inside the stadium, but had they attached their bombs to drones, the damage could have been far more devastating. The 2016 Countering Drones conference revealed that over 75 per cent of attendees believe there is a strong likelihood of a major drone-related security incident in the near future, with over 35 per cent believing that it is inevitable. INTENTION KEY TO SAFETY In Counter Terror Business 24, Gary Clayton, of the Unmanned Aerial Vehicle Systems Association, explored whether the security services had the same opportunity to use the advances in unmanned technology and analysis of the data collected as the terrorist. He argued, using several examples, that it is not the technology that is the problem, but the user and intention applied to it that has the potential to create havoc. UAVs have the potential to give the security services a better integrated picture of the playing field through enhancing situational awareness. However they also give the terrorist the ability to act at arm’s length: ’it is not the technology – it is the user that makes the difference’. Moreover, regulation, a hot topic in commercial UAV use in the UK, will never maintain pace with the changing face of technology. The drone market will keep changing, with new models, new capabilities and new uncertainties added every week. Present legislation restricts flight in the urban environment whereas !



Qualify as a drone pilot and get your CAP-C certificate. CAA NQE 1008/296

The pilot qualification standard required by the CAA before a Permission for Commercial Operations is granted.

Tailored courses from £700 +vat per person CAA approved NQE 1008/296 CAP-C certificate course at our training facility Training for 6 students or more? – We’ll come to you Optional fast-track Operations Manual at additional cost

Find out more and book your course today on 01480 493800 or email info@cuava.co.uk


INSPECTAHIRE INSTRUMENT CO LTD - The UK’s leading RVI provider We have the experience in surveying the following: - Water bore holes - Mine workings - HVAC ducts - Bridges - Wall cavities - Chimney -Explosion proof CCTV systems – Borescopes – Video Probes - Thermographic Camera surveys - Groundwater Flow Monitoring – Pipe & Cable Location

Contact me to discuss any requirments concerning: Hire, Purchase, Service, 3rd Pary Inspection or Contracting Contact us at: T: 01224 789692 F: 01224 789462 enquiries@inspectahire.com



V ww isit u w. s a in t o sp ur ec w ta eb hi re site .co : m

We offer Equipment Hire - Short & Long Term - Contracting

UAV TECHNOLOGY " flight in the country environment is far less restricted. Secondly, those planning to use UAVs for terrorist or criminal activity, such as drug smuggling, are unlikely, or perhaps never likely, to feel restricted by regulation. Therefore, countering drones will gain prominence as the preferred method of tackling the terrorist drone threat. The risk of shooting a drone out of the sky is incredibly high, especially if there is a chance that the drone is carrying explosives. Among the companies investing in this industry are the MITRE Corporation, who have launched Counter-Unmanned Aircraft System (C-UAS), a competition for drone defence, seeking inexpensive ‘non-kinetic’ solutions to countering drone threats. Elsewhere, as mentioned previously in this article, OpenWorks Engineering has created the SkyWall 100 that fires a projectile with a net that

A RESEARCH PAPER HAS SUGGESTED THAT ISLAMIC STATE ARE PLANNING TO ‘MARRY TOGETHER TWO TECHNOLOGIES, DRONES AS A DISPERSAL DEVICE AND CHEMICAL, BIOLOGICAL OR RADIOLOGICAL MATERIAL AS THE DISPERSANT’ envelopes the drone and parachutes it to the ground safely, whilst Radio Hill Technologies’ has developed technologies that jam the radio communication between the drone and its operator. The message behind this is that the threat of drones is well known among industry and government, but the potential retains an overwhelming appeal. Like the majority of military technologies, opposing military forces will both seek to gain the upper hand in drone warfare. UAVs for surveillance,

whilst useful, are no longer the threat. As Professor David Hastings Dunn points out, the potential within drone use, as concerning as it may be, is fast becoming a reality. It will not be long before the next phase of drone development is established. Let’s hope it is not at the expense of mass fatalities. #

FURTHER INFORMATION tinyurl.com/y9b6qjae

Photo by Ian Baldwin on Unsplash




ONLINE SECURITY The UK Security Expo returns to London’s Olympia on 29-30 November 2017. Ahead of the show, Philip Ingram looks at some of the security issues that will form the discussions of the expo

ENCRYPTION, ONLINE MESSAGING AND TERRORISM t the end of April 2017, Europol’s Internet Referral Unit (EU IRU) coordinated a targeted removal of terrorist and violent extremism content online. Operating from Europol’s headquarters in The Hague, the teams jointly targeted accounts used by terrorist groups to radicalise, recruit and direct terrorist activities. The tragic events so far this year in Westminster, Stockholm, Paris, Manchester and on London Bridge have maintained the extremist terrorist threat at the forefront of our minds. The EU IRU action is an attempt to try and reduce the possibility of further attacks by reducing the visibility of extremist propaganda. European nations have started changing their laws to enable greater monitoring of internet messaging. The Germans, at federal and state level, have agreed to broaden the current law that governs the authorities’ ability to monitor phones and text messaging to include messaging apps. So what are the issues that vex both the politicians and security authorities as they try to find ways of protecting the public and police alike?




TIME FOR CHANGE Following the sophisticated attack on London Bridge, Prime Minister Theresa May, in a statement made just after hosting the government’s emergency Cobra committee meeting, said: “The security intelligence services and police have disrupted five credible plots since the Westminster attack in March. We cannot and must not pretend that things can continue as they are. Things need to change and they need to change in four important ways.” She went on to outline her four main points. The first dealt with the ‘evil ideology of extremist Islam’ and the second with not allowing this ideology ‘the safe space it needs to breed’, calling for more action from internet companies and an international agreement on tackling extremism in cyberspace. Her third point highlighted the need to deprive extremists of physical space not just in Syria and Iraq, but also at home in the UK. May’s fourth and final point emphasised the need to review the government’s counter-terrorism strategy as the threat ‘becomes more complex, more fragmented [and] more hidden, especially online’. One thing is clear from her statement: the nature of the threat has morphed in recent weeks such that it has not come onto the radar of the already stretched security services. It may not be a resource issue but it is a capability issue in which resources play a part. A recently published report by Pool re-examining the attacks and implications concluded that both the Manchester and London

Bridge attacks were sophisticated, saying that Manchester’s marked ‘a significant change in recent UK attack methodology’, and London Bridge’s was ’indicative of a high level of planning and organisation’. COMBATTING THE ‘CYBER CALIPHATE’ It is vital for the intelligence services to identify any changes so they can retune their activities to include these developing threats. Part of that retuning will come from the internet. The so-called Islamic State (ISIS) has a huge cyber network hidden in encrypted communications channels. One that is popular is the Russian-owned Telegram, and where Twitter, Facebook and others are cooperating, they refuse. However, dealing with this issue is not simple due to encryption and the way extremists use invite-only communications groups. The authorities will have to look at how to penetrate the communications channels and not just close them, as when the channels are closed extremists simply move to new groups. As the extremists’ physical safe places in Iraq, Syria and Libya get squeezed, they are developing their global caliphate in cyberspace. It is this cyber caliphate that is generating terror attacks by encouraging individuals who have had some form of physical connection to extremism and providing them with motivational propaganda and access to training materials that mean they only surface above the ‘background noise’ of activity when they execute their attack. !



Photo by Simson Petrol on Unsplash



UK SECURITY EXPO " So far, the investigations have not commented on a coordinated thread linking all the attacks outside the conclusion that they have all been perpetrated by individuals espousing Islamic extremism. All the attacks seem to have been ‘inspired’ in some way and the extremists doing this are either ISIS and/or Al-Qaida. So, the question that occurs immediately is how do extremists inspire individuals to carry out such horrific atrocities? A common denominator between all the attackers is they had some connection to internet encrypted communications apps such as WhatsApp and Telegram. These and other apps are used to disseminate extremist propaganda, to recruit supporters, to encourage individuals and groups to carry out terrorist acts, and, on occasion, to direct terrorist activities from afar. In the aftermath of Westminster, Home Secretary Amber Rudd, speaking on the BBC’s Andrew Marr show, called end-to-end encryption on messaging services such as WhatsApp and iMessage ‘completely unacceptable’. Responding to reports that the attacker Khalid Masood used WhatsApp, owned by Facebook, minutes before the attack, Rudd said: “There should be no place for terrorists to hide. We need to make sure that organisations like WhatsApp, don’t provide a secret place for terrorists to communicate with each other. It used to be that people would steam open envelopes or just listen in on phones when they wanted to find out what people are doing – legally through warrants – but on this situation, we need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.” Jimmy Wales, the founder of Wikipedia, has a different view to encryption and described it as ‘the only moral thing to do’. He reported a previous conversation he had with David Cameron when he was Prime Minister, saying: “David Cameron said to me, “In our country, do we want to allow a means of communication between people which we cannot read?” My response was, well Prime Minister, that time is here and the bottom line is that it is now harder for the security services to do what they feel they want.” However, it seems the Facebook founder Mark Zuckerberg bowed to pressure and said he will hire an extra 3,000 staff to combat extremist and distressing content, especially in videos posted on Facebook. He isn’t giving his encryption algorithms away but is starting to self-police content. Monika Bickert, director of Global Policy Management, and Brian Fishman, counterterrorism policy manager with Facebook, outlined in their 15 June blog, Hard questions: How we counter terrorism, the measures Facebook were taking. This is a clear example for all.


Not all communications platforms are following suit as Rob Wainwright, the director of Europol told The Times newspaper. He said: “There are some that simply won’t co-operate with us. One in particular causing major problems for us is Telegram… [the messenger provides] some co-operation but nowhere near what we are getting from Facebook, Twitter and some of the others.” Removing content and breaking encryption is unlikely to solve the problem. Vasco Amador, from the cyber intelligence company Global Intelligence Insight, said: “Trying to break into and monitor encrypted traffic is very difficult, even if the encryption keys were provided. The volume of communications on these channels and others, promoting, encouraging and directing extremist actions is huge. The extremists are very good at providing very professional and welltargeted material aimed at manipulating vulnerable people into carrying out lone wolf type attacks. They also have increasingly sophisticated command and control networks in cyberspace. “One way to deal with this type of threat and complement electronic monitoring is treat it like any traditional intelligence target. The people posting the material are human beings, utilising humint [human intelligence] techniques in an online environment reveals so much more detail than chance interception ever will, but it is training- and manpower-intensive. Extremists change their online identity frequently and those doing the inspiring are not badly disrupted when accounts are taken down.” MOVING FORWARD A cyber security roundtable event organised by the UK Security Expo in London mid-June brought together a

group of cyber security leaders from the government, National Cyber Security Centre (NCSC), academia, training providers, end-users and more. The opening issue they debated related to these statements from politicians, and the collective conclusion was that the soundbite cries that political leaders are coming out, regarding policing messaging apps and encrypted communications, are all but impossible to achieve. However, recent reports by the BBC make clear that ‘the UK is heading for a record number of terrorism-related arrests amid massive investigations into three attacks. New figures show that in the year to March 2017, police arrested 304 people – up a fifth on the previous 12 months’. This matches the growth highlighted in the recently published Europol Terrorism: Situation and Trend Report 2017 which says: “In 2016, a total of 142 failed, foiled and completed attacks were reported by eight EU Member States. More than half (76) of them were reported by the United Kingdom. France reported 23 attacks, Italy 17, Spain 10, Greece 6, Germany 5, Belgium 4 and the Netherlands 1 attack. 142 victims died in terrorist attacks, and 379 were injured in the EU.” It is clear the threat remains and will likely continue to develop. Therefore, this debate will continue for some time, and the perfect forum to explore the advantages and disadvantages of different approaches, as well as putting those who should know the answers under the spotlight, will be at the UK Security Expo on 29-30 November 2017 at Olympia in London. #

FURTHER INFORMATION www.uksecurityexpo.com



BORDER CONTROL Over a year on from the UK’s decision to leave the European Union, Counter Terror Business looks at how border security will help ease the migration flow to the UK and keep terrorism at bay


he topic of border security has been a prominent theme in the discussions of government over the last few years. Magnified by both European migration concerns and this year’s spate of terrorist attacks in London and Manchester, public opinion on the nation’s safety has left Prime Minister Theresa May needing to settle the problem with more speed and certainty than her predecessor. Considering she is now over a year in to her premiership, as well as the unforgettable weight that border security carried in the EU referendum campaign, the perceived vulnerability of our shores still needs focus and change. Border security is crucial to the level of national security that the UK enjoys. Protecting our borders from the illegal movement of weapons, contraband and people is essential to UK safety. As an island nation, in theory the UK is somewhat separated from the threat that countries such as France, Germany and Belgium have encountered and continue to face. For example, the November 2015 terrorist attacks in Paris and Saint-Denis, which left a death toll of 130 civilians, highlight the difficulty that mainland European countries face in monitoring terrorist activity. With Islamic State claiming responsibility for the attacks, in retaliation to French airstrikes in Syria and Iraq, the investigation following the acts showed that the terrorists planned the attack in Syria, but organised the details in Belgium. It is believed that a number of those responsible had entered Europe among a growing flow of migrants and refugees. SECURITY FAILINGS? A leaked report by the European commission’s security union taskforce in March, obtained at the time by the Guardian, warned of holes in the ability of the security services to monitor movements in and out of Europe. The taskforce noted that those who committed or sought to commit large-scale terror attacks had entered the EU borders ’at some point prior to committing their attacks’ with some EU citizens subject to a European arrest warrant able to enter or leave freely ‘without being detected due to the non-systematic check of EU citizens’. Under the current system, it is also


impossible for cross-national databases to be searched using biometric data, such as fingerprints. However, the report warned that the Schengen Border Code ‘did not allow for the systematic consultation’ of national and international databases, leaving the security services unable to carry out basic checks that could have avoided the subsequent attacks which took place. It explained: “Another shared aspect of many of the recent attacks is movement within the EU, be it by the perpetrators or their supporters in preparation for an attack or subsequent escape; or to traffic the means that support terrorists, such as illegal firearms and explosives. This raises the question of whether more can be done to enhance security within the Schengen area. This could include action to enhance police checks in internal border regions and along main transport routes. “A further common element between recent attacks is the appearance of many of the suspects on surveillance lists, especially national watch lists. In a number of cases, perpetrators were subject to SIS [Schengen information system] alerts, which are an important tool in the detection of suspected terrorists. The number of alerts has significantly increased in the last two years, but there remain differences between the way in which member states use the system, including a lack of consistency in the use of SIS alerts. Should an obligation for information sharing be introduced for all existing EU security databases? Should those databases be searchable by biometric as well as alphanumeric data?” FROM HOMEGROWN TO SYRIA Many of the Islamic State terrorists involved in the Paris and Brussels attacks were what are considered homegrown terrorists. As of January 2015, an estimated 440 Belgians had left the country for Syria and Iraq, creating the impression of the nation as a hub of terrorist activity and jihadist recruitment. Molenbeek, a municipality surrounding Brussels, was described by one Belgian authority as ‘a breeding ground for violence’. Salah Abdeslam was one of the terrorists accused of involvement in the attacks in Paris on 13 November 2015, and was the centre of Europe’s

largest manhunt following the attacks. The profile of Abdeslam emphasises the risk that border control authorities in Europe face. Prior to the Paris attacks, Abdeslam is understood to have freely travelled to six countries in an effort to transport individuals, who would later be involved in the attacks, into Europe. More recently, Salman Ramadan Abedi, the 22-year-old British Sunni Muslim of Libyan ancestry who detonated a bomb at Manchester Arena in May, was known to UK security services for his extremist views as a youth. According to reports, Abedi, who was reported to the authorities by as many as five community leaders, used student loans to fund travelling between Manchester and Libya, where he is believed to have learned bomb-making. Elsewhere, Youssef Zaghba, the youngest of the three London Bridge terrorists, was stopped last year from travelling to Istanbul by Italian officers, after they discovered Islamic State related materials on his mobile phone. Within our own borders, British authorities suggest that approximately 1,000 people from the UK have travelled to support or fight for jihadist organisations in Syria and Iraq, with about half having since returned to the UK. Most people can remember when Bethnal Green Academy found itself in the spotlight in early 2015, when three of its students, Shamima Begum, Amira Abase and Kadiza Sultana, flew from London to Turkey, before travelling to Syria to join Islamic State. The girls were aged 15 and 16 at the time, and put a firm spotlight on how easily they managed to leave the UK unquestioned and unresisted, despite evidence showing that UK authorities were aware that Shamima was in contact with Aqsa Mahmood, who left Glasgow for Syria in 2013 to marry an Islamic State fighter, before travelling. The perception of border security as an essential force to prevent terrorists entering the country is unfairly weighted, as preventing those susceptible to radicalisation from leaving is equally important. The Prevent stream of the UK counter terrorism strategy CONTEST aims to stop people becoming attracted to terrorism domestically and suffocate communications and support from overseas. Individuals suspected of


BORDER CONTROL posing a terrorism-related threat may be prevented from travelling from the UK under powers in the Counter Terrorism and Security Act of 2015. This is maintained by carrying ‘no fly’ schemes to cover individuals who pose a terrorist or terrorism-related threat and are seeking to leave the UK. But what about those seeking to come to the UK? MASS MIGRATION The European migrant crisis hit its peak in 2015, when five boats carrying almost 2,000 individuals to the continent sank in the Mediterranean Sea, killing over 1,200 people. Aside from that April event, figures show that the migrants primarily arrived from Syria, Afghanistan and Iraq. The extent of migration led to increased funding for Mediterranean border control, the creation of Operation Sophia, a military operation with the aim of neutralising established refugee smuggling routes in the Mediterranean, and even the reintroduction of border controls within the Schengen Area. According to a survey commissioned by the Pew Research Center, the majority of Europeans believe the influx of refugees across the continent had led, and will lead, to an increase in the likelihood of terrorism. Those surveyed in Hungary (76 per cent) and Poland (71 per cent) were the top nations that expressed concerns that refugees will increase the likelihood of terrorism in their country. Hungary, in fact, claim that seven of the attackers from the 2015 Paris attacks slipped through Hungarian borders while posing as migrants, despite having their names registered in counter terrorism databases across Europe. Abdeslam is believed to have made four trips to Hungary in August and October 2015 in which he picked up other terrorists linked to both the Brussels and Paris attacks. Mujtaba Rahman of the Eurasia Group, a political risk and consulting company, said of the issue: “There is a growing perception among European public opinion that EU leaders are not in control of the Continent’s terrorist threat. Combined, these attacks [in Brussels] will increase xenophobic and anti-immigration sentiment across the EU, which has already been rising in light of the EU’s ongoing refugee crisis.” This opinion was evident in the popularity drop of Angela Merkel who opened the country’s borders to more than one million migrants last year. It has been further inflated by the rhetoric used by U.S President Donald Trump, who frequently associates terrorism with immigrants, particularly Muslims, and threatened to build a wall between the United States and Mexico. WEAPON CARRYING In October 2016, Lord Toby Harris of Haringey launched his independent report into the steps that should be

taken to improve London’s resources and readiness to respond to a major terrorist incident. After setting out his paper, Lord Harris discussed the importance of his recommendations at the Security & Counter Terror Expo in May, just over a month on from the Westminster bridge attack. His review made 127 recommendations for the Mayor of London, the government and other agencies to consider. Among the recommendations, some of which are being considered for implementation, were a number of border control suggestions, including for security measures on the River Thames to be strengthened and for the Metropolitan Police to further explore the use of temporary barriers to protect against a Nice style attack in London policies which could have made a difference for the London Bridge attack. Lord Toby Harris said: “A serious terrorist attack remains highly possible and we cannot be complacent. London needs to become a city where security and resilience is designed in and is part of the city’s fabric, and where everyone who lives and works here sees security and resilience as their responsibility just as much as it is for the emergency services and civic authorities.” Lord Harris’ report suggested that the most significant terrorist threat affecting the UK was a marauding terrorist firearms attack (MTFA), such as that seen

try to access the sort of weapons used in recent attacks in Europe.” Mark Rowley, assistant commissioner for the Metropolitan Police Service, added that the Met is also concerned by an apparent upsurge in guns on the streets in London and some other big urban areas, with law enforcement officers seizing at least 884 firearms over the previous year, including Czech-made Skorpion submachine pistols, Uzis, and Mac-10 weapons. Lord Harris suggests that weaknesses in Britain’s border security could possibly be allowing terrorists to get the guns they need to attack London. The report highlights that, given the current specific threat relating to MTFA or similar terrorist attacks, ‘much more should be done to strengthen the ability to prevent the importation of firearms’. It recommends that the Mayor of London should seek ‘assurances that the routine screening and searching of cars and freight entering the country is being significantly enhanced’. It continued that ‘the aerial surveillance capacity available to the Border Force, the NCA and the police enabling them to monitor and control the border needs to be enhanced given that existing capacity is already fully utilised’. THE BREXIT IMPACT Having seen the UK public vote in favour of exiting the European Union,

LORD HARRIS SUGGESTED THAT WEAKNESSES IN BORDER SECURITY COULD POSSIBLY BE ALLOWING TERRORISTS TO GET THE GUNS THEY NEED TO ATTACK LONDON in Mumbai in 2008, Nairobi in 2013, Paris in 2015 and Orlando in 2016. This form of attack would likely involve shootings, fires, explosives and possible hostage takings. As seen in Paris, this form of attack can be carried out by a small number of attackers, perhaps working individually, which means that multiple, simultaneous attacks are a possibility – stretching response teams and emergency services and increasing the likelihood of casualties. All of this begs the question: how are terrorists equipping themselves with the firearms necessary for such an attack? The National Crime Agency (NCA) warned at the end of 2016 that half of the terror plots prevented in the UK over the last two years involved extremists attempting to purchase guns from criminal gangs. Of the estimated 6,000 organised criminal groups in the UK, 750 have access to guns, or are trying to access them. Lynne Owens, chief of the NCA, warned: “Criminal networks, who think nothing about who they sell firearms to, present a significant route by which extremist groups will

by 52 per cent to 48, Prime Minister Theresa May knows that a lot of pressure in the ongoing negotiations rests on returning full border controls. The media build up to the referendum was overwhelmed with stories detailing the flood of refugees entering Europe from Syria, Africa and elsewhere in the Middle East. It has been reported that since 2012, the UK has received an average of 300,000 immigrants annually, with half of the immigrants in 2015 arriving from non-EU nations. A large portion of the Leave campaign rhetoric focused upon regaining control of the immigration flow. But the post-Brexit landscape makes for complicated border control. Northern Ireland would essentially form the UK’s only land border since Ireland is an EU member. Historically contentious, the Irish border extends over 300 highly porous miles. The common travel area (CTA), agreed between the three administrations of London, Belfast and Dublin, has existed since the 1920s. With many critics viewing this as a potential backdoor for immigration, Secretary of State for !



Delivering the Most Innovative Pan & Tilt Solutions to the World


Offering a full range of standard and customized towers, masts, trailers and mobile elevation platforms Pneumatic and Mechanical / Man-portable / Lattice Towers / Pan and Tilt Positioners / Integrated Elevation Platforms www.willburt.com UNITED STATES





169 S. Main St., Orrville, Ohio USA 44667 Telephone: 330.682.7015 Mast Customer Service: 330.684.4000 Fax: 330.684.1190 Email: contact_us@willburt.com

Fischergasse 25 91344 Waischenfeld, Germany Telephone: +49-9202-18-0 Fax: +49-9202-18-11 Email: info@geroh.com

Unit 5b, Station Approach Four Marks, Alton Hampshire, GU34 5HN, United Kingdom Telephone: +44 (0) 1403 265532 Fax: +44 (0) 1403 259072

1 Fullerton Road, #02-01 One Fullerton, Singapore 049213 Telephone: +65 6832 5689 Fax: +65 6722 0664

Sales Manager EMEA Telephone: +49 160 8862869 tgrass@willburt.com


THE PERCEPTION OF BORDER SECURITY AS AN ESSENTIAL FORCE TO PREVENT TERRORISTS ENTERING THE COUNTRY IS UNFAIRLY WEIGHTED, AS PREVENTING THOSE SUSCEPTIBLE TO RADICALISATION FROM LEAVING IS EQUALLY IMPORTANT " Northern Ireland James Brokenshire has claimed that entry points to the Irish Republic will become a new front line for combating illegal immigration once the UK withdraws from the EU. Then there is the complicated possibility of establishing border controls on the England-Scotland border. Despite voting in their 2015 referendum to remain part of the UK, First Minister Nicola Sturgeon has published a draft bill giving Scotland the ability to reconsider the question of independence before the UK leaves the EU. If the value of remaining part of the EU outweighs the value of remaining part of the UK, not only would more land border controls need to be established between England and Scotland, but maritime border protections would have to change at ports of entry to process EU-origin vessels in addition to other foreign vessels, as well as EU passengers arriving on ferries from Ireland and France.

TECHNOLOGY AND BORDERS Following concerns being raised about gaps in British border security and the rise in the number of guns found on the streets in many major cities, Neil Basu, the new national coordinator for counter terrorism policing, has said that an increase in biometric scans and tamper-proof passports would do more to protect the border. In an interview with the Press Association, Basu said: “Just in the same way you can smuggle illegal firearms into a country, you can smuggle people into a country. And if one of those happens to be a terrorist, that’s a big problem. Society needs to debate what’s required. But in law enforcement, I’d say if you want security, you need to improve your biometrics at the borders. “Everybody’s identity should be checked as they come through a border in a way that is foolproof. Fingerprints, iris scans, the documents need to be tamper-proof. What we need is a debate about what border security really means.”

Moreover, a briefing paper entitled The border after Brexit: How technology can help secure Britain’s borders, published by the Adam Smith Institute, looked at why, in light of Brexit, it will become even more important for Britain’s borders to be secure. The authors of the report, Sam Bowman and Ed West, argue that, at present, Britain’s Border Force is not equipped to quickly, accurately and securely monitor passengers in and out of Britain, claiming that the Border Force Warning Index and Semaphore systems are outdated. With 7.5 per cent of high risk flights not being scanned appropriately, this has consequently allowed known terrorists to leave the country without being detained properly. A POSITION OF STRENGTH Post-Brexit Britain will undeniably take a new form to that which it has held for a number of decades. As relationships within the European Union and between European countries begin to stretch under political tension, the landscape of border security will become more scrutinised than ever before. The full extent to which Theresa May will change our border control is yet to be revealed, but it is likely that its tightening will please the British public. With new lines being drawn within the EU, it is an opportunity to strengthen our border control – both of people coming in and out, and weapons. #




RUN, HIDE, TELL Following a recent police video advising UK holidaymakers what to do in the event of a terror attack, Lorraine Hennessy, communications manager for National Counter Terrorism Policing, expands upon the ‘run, hide, tell’ safety message

WHAT TO DO IN THE EVENT OF A TERROR ATTACK C ounter Terrorism Policing has condensed key protective security advice into a trio of short videos to help staff in crowded places keep themselves and the public safe. The films, which last just 15 minutes in total, were developed specifically for international use but are as relevant to those working in the UK as to those employed abroad. The key information outlined in each of the three productions is: how to spot and respond to suspicious behaviour; how to identify and deal with suspicious items; and how to react to a firearms or weapons attack. The third video has also been adapted and released to the public. It focuses on the Run, Hide, Tell advice that was first issued in December 2015 following attacks in Paris, and most recently used by the Metropolitan Police during the Borough Market atrocity. The original video had an office block setting but the new version was recorded in an overseas holiday resort. It shows holidaymakers, including family groups, and staff reacting to a firearms attack.

Parents are being encouraged to watch the films with older children who may spend some time in the resort without their direct supervision. Versions are available with subtitles and in different languages. The other two episodes, also filmed abroad, show resort staff including a rep, receptionist and chef taking action when concerned about suspicious activity of items.

CROWDED PLACE GUIDANCE The project is a collaboration between the National Counter Terrorism Security Office (NaCTSO) and ABTA – The Travel Association, along with the Foreign and Commonwealth Office (FCO). The partnership between the public bodies and travel industry experts meant that security advice that has been developed by police over a number of years could be packaged in a way that made it both relevant and easy to deliver to staff. Although the products have been developed with the travel sector, the advice is applicable to any crowded place environment, such as shopping centres, Keynote speaker, Assistant Commissioner Mark Rowley, National Lead for Counter Terrorism Policing at the London Guildhall security summit




entertainment and sporting venues. Detective Chief Superintendent Scott Wilson, National Coordinator for Protective Security, explains: “As security experts we know what information we should be sharing with crowded places workers. But we wanted to work with industry managers on ‘how’ this advice is delivered. We needed to develop products that could be shown to and understood by people working at all levels in the travel industry – from senior managers in the UK, to holiday reps, to locally based workers carrying out service roles like kitchen staff and cleaners. “This is where working with ABTA has been invaluable. They know their industry, they understand the demands on member companies in terms of time allowed for staff training. Together we were able to condense our key messages into three videos that are clear and applicable to everyone watching. “Although the setting for the films is a holiday resort, these products could be shown to staff working in any sector. And the real advantage is that collectively they last just 15 minutes – 15 minutes that could protect businesses and livelihoods, and help save lives. While these films cover the core messages, we continue to advise companies to sign up to our Project Griffin self-delivery package which will enable them to offer even more guidance to employees.” PROTECTING BRITISH INTERESTS ABROAD So far 23,000 travel industry workers both in the UK and overseas, have undertaken the training, with more sessions planned. Nikki White, director of Destinations

and Sustainability from ABTA, adds: “We recognise the importance of raising awareness and providing clear guidance for our members and their employees. We know that customers would look to the staff working in their hotels and resorts to take the lead and respond quickly to an emerging situation. Representatives of the travel industry taking part in the training have responded positively. We will continue to work closely with the police to make sure we are doing all we can to help raise awareness of these messages.” The project with ABTA was initiated by CT Policing and the FCO following the terrorist attack at a beach resort in Tunisia in June 2015. Thirty British holidaymakers were among the 38 killed in a marauding firearms attack in Sousse. The collaboration is part of a wider programme to help strengthen protective security measures to protect British interests abroad. The number of UK CT officers working overseas has increased and this now includes specialist working under the direction of national CT Policing. These officers can bring years of learning from the UK to partner law enforcement agencies and commercial organisations operating in vulnerable locations across the globe. With millions expected to jet off this summer, the FCO continues to urge holidaymakers to visit their website for the latest security and safety information about their country of destination. Lord Ahmad of Wimbledon, FCO Minister for National Security and Counter Terrorism, says: “We want people to be safe so they can enjoy their holidays. As well as reading and taking note of our travel advice,

COMMUNICATIONS PLATFORM HIGHLIGHTED AT SECURITY SUMMIT The success of the protective security collaboration with the travel industry was highlighted at a ‘step change’ security summit held at London’s Guildhall this month. Keynote speaker, Assistant Commissioner Mark Rowley, National Lead for Counter Terrorism Policing, sited the project as an example of how police and the private sector must work closely to tackle the threat. Mr Rowley also spelt out a plan to rollout a cross sector security communications platform that would facilitate an exchange of information between senior protective security officers and industry. This would allow a quick-time sharing of information during major incidents. The system is already in place for London and the new plan would allow the model to be replicated across the country. The London summit was organised following the recent terrorist attacks in Westminster, Manchester, Borough Market and Finsbury Park. Around 300 delegates attended the half-day event which was opened by Security Minister Ben Wallace, who announced a £2 million innovation fund to help businesses find new ways to help tackle terrorism. He said: “We are calling on the best and the brightest from the science and technology sector to come forward with their ideas and proposals to support our ongoing work to keep people safe.” More information about reducing the threat from terrorism and mitigating the effect of an attack can be found on the NaCTSO website (www.gov.uk/ nactso). This includes detailed sector specific information and also the three five-minute videos that have been developed with ABTA and the FCO. They can be viewed separately or as a packaged entitled ‘Introduction to CT Awareness’. A downloadable leaflet is also available. and taking out appropriate insurance, I encourage people to watch this film before they go away. While there is no specific information that British holidaymakers will be targeted this summer, it sets out some simple steps we can all take to minimise the impact of an attack if one does take place.” #

FURTHER INFORMATION www.gov.uk/nactso




SUPPLY CHAIN TERRORISM Recorded cargo crime rises to its highest-ever level in EMEA, and new technologies could make it ever easier to commit, says Thorsten Neumann, chairman of TAPA EMEA

THE RISK OF THEFT IN THE SUPPLY CHAIN I n 2017, the Transported Asset Protection Association (TAPA) marks its 20th anniversary. Founded originally by high tech manufacturers in the U.S. to combat increasing losses from their supply chains, today cargo crime is a global phenomenon that places virtually every product at risk. In the Europe, Middle East and Africa (EMEA) region, recorded cargo thefts reached a new record in 2016, and figures for the first half of this year put 2017 on track to set yet another new high. One of the best and most respected barometers of cargo crime in the region is the association’s Incident Information Service (IIS), which uses data from its members, insurers, media sources and law enforcement agencies to provide a tangible insight into the level and types of crimes taking place. Last year, TAPA’s IIS recorded 2,611 new cargo crimes in EMEA, a 72.3 per cent rise


year-on-year. The total loss value for the 43.5 per cent of incidents providing financial data was €77.6 million. The average loss for the 133 major freight thefts exceeded €350,000 as crimes were reported in 34 countries. IIS data for Q1 2017 rose 59.6 per cent over the same three months of last year as the association was notified of a further 709 crimes in 18 countries. In this period, 62 per cent of reported product thefts gave a value, totalling €43.4 million, and the average loss for the 40 major losses was €683,127. THE DRIVING FORCE BEHIND CARGO CRIME When TAPA was first launched, most cargo crimes involved thefts from warehouse facilities. However, it’s a very different picture today. TAPA’s Facility Security



Photo by Igor Ovsyannykov on Unsplash

Requirements (FSR) security standard, alongside advancements in physical security barriers and technology-based solutions that protect buildings and their perimeters, have made warehouse operations more secure than ever before. Last year, in EMEA, only 3.9 per cent of cargo thefts recorded by TAPA’s IIS involved Theft from Facility. In recent times, cargo thefts almost all involve attacks on trucks, and often their drivers. Last year, nearly 90 per cent of recorded cargo crime incidents involved trucks, arguably the most vulnerable and isolated part of every supply chain. With drivers’ hours strictly regulated and a distinct lack of secure parking places, especially in Europe, vehicles loaded with hundreds of thousands of Euros worth of products are now regularly forced to park in unsecured lay-bys or on industrial estates while drivers take their mandatory rest breaks. In the first three months of 2017, TAPA EMEA’s intelligence showed 78.7 per cent of crimes involved theft from vehicle and 72.4 per cent of thefts took place when trucks stopped at unsecured parking locations. Attacks on vehicles take several forms. Without doubt, the most frequent criminal modus operandi is so-called ‘curtain cutting’ as thieves slice open the tarpaulin sides of trucks during the night and often escape with hundreds of thousands of Euros of goods.

CRIMINALS REGULARLY DEMONSTRATE THEIR ABILITY TO OVERCOME THE BEST LAID PLANS OF COMPANIES TO SECURE THEIR GOODS IN TRANSIT Roadblocks, sometimes involving bogus ‘police’ officers, are often seen on the continent, while countries such as South Africa, Italy and France are regularly the scenes of violent truck hijackings by armed offenders. Some truck drivers and security guards have lost their lives in these attacks. Attacks on moving trucks are also recorded every year and one of the latest concerns is the huge number of thefts from trucks stopped at UK motorway service areas. Action is clearly urgently required to help protect trucks and drivers. The devastating use of trucks by terrorists to mow down innocent victims in Nice and Berlin in the past 12 months, as well as the weekly chaotic scenes of migrants trying to board trucks in the Calais area, are raising the issue of trucking security to a new and unprecedented level. This summer, TAPA and the Cross-border Research Association (CBRA) will deliver a new security toolkit for the road freight transport sector within the EU that has been commissioned by the European Commission’s Directorate-General for Mobility and Transport (DG MOVE). It will contain comprehensive, consistent

and good practice operational guidance to help address these risks. TAPA has also just launched new Parking Security Requirements (PSR) with the aim of identifying a network of secure parking locations across Europe. This will be supported by an online tool that enables its members to see all of the cargo crimes reported on specific transport routes across the continent and to plan their supply chains accordingly. The association has already identified some 520 sites in 35 countries and it plans to approach parking place operators to convince them of the potential new business that will result from providing the degree of on-site security TAPA’s new PSR calls for. The Manufacturer and Logistics Service Provider members of TAPA are known to already achieve a far higher level of supply chain resilience through their own in-house security programmes as well as the security standards, intelligence, training and networking they gain from their membership of the association. The biggest threat is to companies in the wider industry that continue to ignore the risks. Products such as laptops, !



MULTIPLE PERSONALITY ORDER Manage multiple identities seamlessly and securely on one device. In today’s world, police and security officers face ever-greater physical and electronic risk. WorkFone® reduces this risk by delivering multiple professional identities on a single smartphone, increasing control while securely handling all communication needs, including voice and SMS. It’s simple and it’s familiar. If you can use a phone, you can use WorkFone.

WorkFone. For every you.

Visit us at NATIA 2017 Tampa, Florida


CARGO THEFT " smartphones, tablets and other high tech goods are still high on the target lists of cargo thieves but data shows that today they will find a ‘black market’ for just about anything they can lay their hands on. Food & Drink is now the TAPA EMEA IIS product category with the highest number of losses. Add to this Clothing & Footwear, Furniture/Household Appliances, Cosmetic & Hygiene \Products, Tyres, Car Parts, Tobacco, Tools/Building Materials, Metal, Pharmaceuticals, Toys/ Games, Cash, Sports Equipment … the list is now seemingly endless. RECORDING ACCURATE CRIME DATA One of the biggest challenges remains getting full and accurate cargo crime data. Even though incidents reported to TAPA’s Incident Information Service do not ask for the names of companies which are victims of attacks, there remains a clear reluctance on the part of many organisations to admit they have incurred losses. The association has successfully nurtured strong data sharing relationships with law enforcement agencies in the UK, Netherlands and, most recently, Sweden, in order to gain more intelligence. However, building a clear picture of the level of cargo crime remains

extremely difficult in other parts of the EMEA region. One thing is certain, it is significantly higher than the number of recorded crimes suggests. In 2016, the UK, Netherlands, Germany and Sweden accounted for 86.5 per cent of crimes reported to TAPA EMEA. In the first quarter of 2017, the UK and Netherlands alone represented over 85 per cent of the new crimes recorded in the association’s incident database, based on the willingness of police in those countries to collate data correctly and notify TAPA of freight thefts. Elsewhere, countries where companies are known to regularly suffer cargo losses are lagging behind in terms of intelligence sharing, increasing the risks to transportation and logistics operations and, many would say, their local economies. Q1 2017 data reported by TAPA’s IIS showed only a total of 37 cargo crimes in Belgium, France, Germany, Italy, Poland, Russia and Spain, and just nine in South Africa. There is general agreement among supply chain security professionals that this represents a fraction of the true picture. For companies that are victims of cargo crime – especially those that have clearly failed to take adequate precautions to protect their supply chains or their customers’ goods – the consequences can be substantial; lost


business, damaged reputations, and higher insurance premiums to name but three. The impact is far greater than simply the cost of the stolen goods. One study involving the pharmaceutical industry put the true cost of loss at five-seven times the value of the goods stolen once the entire recovery process has been accounted for. And this only represents the challenges that exist today. WHAT OF THE FUTURE? The world is changing and those changes are being driven by technology. This October in London, TAPA will host its biggest-ever conference for global supply chain security professionals to discuss the impact of developments such as driverless trucks, drones, robots in warehouses and 3D printing. They are all emerging with increasing speed and while some welcome a reduction in the ‘human’ element of supply chains, thinking it will eradicate the likelihood of ‘inside job’ crimes, others fear these technologies will play directly into the hands of cyber criminals who will be able to hack into control centres and divert deliveries to anywhere they want. Criminals regularly demonstrate their ability to overcome the best laid plans of companies to secure their goods in transit. Simple GPS ‘jammers’ that can cost as little as €30 online, for example, are regularly used to block positioning signals from trucks to their very sophisticated security monitoring centres. They can make trucks ‘disappear’ long enough for their entire loads, and often the vehicles themselves, to be lost without trace. Today, cargo crime is globally regarded as a multi-billion dollar ‘industry’ and the level of threat is growing. The worst thing any company can think is that it will never happen to them. #

Photo by Exel Ahoi on Unsplash

FURTHER INFORMATION www.tapaemea.org





Established in 1923 by Lorenz Wagner, LOWA started out as a small Bavarian manufacturer of Oxford Brogue shoes. Handcrafting their footwear using the Norwegian welt-stitch, by the end of the decade LOWA’s reputation had grown to the point where supply could no longer meet demand and their manufacturing facility had to expand.

Jump forward to the present day and the brand’s growth has lost none of its momentum. Having shifted their focus from formal shoes to more practical footwear during the 1960s, 1970s and 1980s, LOWA’s use of the latest innovations have led to them becoming a world-renowned brand whose military boots are worn by security forces and armed forces personnel across the globe. From the use of high-quality materials to the implementation of unrivaled manufacturing techniques, there is a lot that makes LOWA military boots special but it’s the amalgamation of various advanced technologies that make them truly stand out. Chosen for their ability to work effortlessly in unison with one another, the technologies employed by LOWA are state-of-the-art and afford their boot’s wearers a myriad of benefits; from enhanced comfort and breathability to full waterproofing and damage-resistance. COLLABORATIVE TECHNOLOGIES FOUND IN LOWA BOOTS Footwear can be enhanced with all sorts of features these days, but if they are too uncomfortable to wear then all the work that has gone into them is essentially wasted. LOWA understand this all too well and strive to strike the perfect balance between function and comfort. The individual technologies implemented by LOWA aim to do very much the same, with many actively improving comfort in addition to providing other practical benefits. GORE-TEX® EXTENDED COMFORT FOOTWEAR One of several GORE-TEX® membranes found in LOWA Military boots, GORE-TEX® Extended Comfort Footwear Technology is extremely versatile and well-suited for a variety of applications. Suitable for indoor or outdoor activities, these membranes are waterproof and resilient to damage yet also breathable, making them comfortable


for use throughout the day. Shoes and boots with GORE-TEX® Extended Comfort Footwear technology are perfect for temperate to warm climates and are equally suited for sports as they are casual use. GORE-TEX® PERFORMANCE COMFORT FOOTWEAR A robust alternative to the Extended Comfort membrane, GORE-TEX® Performance Comfort Footwear technology is billed as an AllSeason solution and has been designed to excel in outdoor environments. Completely Waterproof and highly breathable, boots with a GORE-TEX® Performance Comfort membrane offer a reasonable degree of insulation to ensure their wearer’s feet are kept warm in cold, Winter conditions. VIBRAM® OUTSOLES Inventors of the first rubber lug sole in 1937, Vibram® has grown into a global brand that specialises in the manufacture of rubber outsoles. Many LOWA boots benefit from Vibram® soles, from the LOWA Renegade with the Vibram® Vialta’ to the LOWA Elite Jungle boots with the Vibram® ‘Aconcagua’. Vibram® soles boast numerous beneficial properties and will suit almost any requirements, making them the perfect complement for LOWA who strive to ensure there is a boot for everybody within their range. CAMBRELLE® LINING Cambrelle® considers itself to be ‘the’ Comfort Lining, which ought to tell you everything you need to know about this synthetic fabric. LOWA footwear with a Cambrelle® lining are designed for long-term use and should be considered the boots of choice for anybody who regularly goes hiking, trekking or mountaineering. Capable of keeping feet dry and cool throughout the day, Cambrelle® Lining is durable and abrasion-resistant thereby ensuring its longevity. LOWA-EXCLUSIVE TECHNOLOGIES With almost a century of experience behind them, it should come as no surprise that LOWA have invested a great deal into R&D. LOWAexclusive technologies work hand-in-hand with those from third parties in order to

provide those finishing touches that are the difference between an extraordinary boot and one that is truly unique. I-CORE SOLE INSERT ‘I-Core’ is a carbon fibre-based technology inserted into the soles of LOWA boots to give them both enhanced strength and greater flexibility. In addition to the positive effect this has on a boot’s durability and lifespan, I-Core technology also improves shock-absorption and the wearer’s comfort. I-LOCK CAM LACE LOOPS Positioned at the top of the foot, I-Lock cam loops are designed to guarantee laces do not slip or loosen once they have been tied. Boots with I-Lock tech support feet by holding them firmly in place, but the cam loop’s placement on a boot’s lower-shaft allows for flexible lacing further above. Moreover, their innovative design allows a boot’s owner loosen the clamping mechanism as and when they feel the need to adjust their laces. MONOWRAP® FRAME Lightweight and supportive, Monowrap® Frames provide additional stability and contribute to a boot’s overall ability to absorb shocks from every step that is taken. Made from hardwearing materials that will withstand the test of time, boot’s with a Monowrap® Frame are perfect for long walks over rough, uneven terrain. CLIMATE CONTROL SYSTEM Protection against blisters is an important feature for any boot, which is why LOWA have created their very own climate control system that enables air to enter a boot and circulate freely. As the wearer walks, heat and moisture are pushed out and actively drawn away from the foot. This helps to helps to keep feet as dry and cool as possible, thereby reducing the prevalence of ‘hot spots’ and warding against fatigue. #


FURTHER INFORMATION www.lowamilitaryboots.com


Terrorism related investigations are complex, with a range of police and counter terrorist officers arriving at the scene. For the public, establishing who is who can be difficult, especially given the varying attire that officers wear. Here, Dr David Lowe explains the different types of clothing

WHY THE DIFFERENCE IN OPERATIONAL CLOTHING? O ver the last few years a number of European states have unfortunately witnessed a number of terrorist attacks where the news media coverage have shown pictures of police staff at the scene wearing different operational clothing. What their role is will determine what they will be wearing. There will be differences between states’ policing agencies and departments clothing, but many are similar and recognisable, and this short article is aimed to assist in explaining why they wear different clothing and what they do. Perhaps the greatest similarity is the states’ police armed response units/specialise firearms units. Wearing body armour, helmets, flame retardant balaclavas and goggles, along with carrying rifles, these officers look intimidating. Due to their role at terrorist incidents their clothing is designed to provide the officers with maximum protection. Apart from attending scenes where an attack has taken place, these officers are also used to secure entry into premises where terrorist

suspects are believed to be and where those premises are required to be searched for evidence relating to terrorist activity. Where it is suspected that either firearms or explosives, or both, will be on the premises, their role upon securing entry to the premises is to make the premises or scene safe for forensic teams and detectives to enter. Examples of the dangers these officers face upon entering premises came to public prominence with the death of an Islamic State group leader, Abdelhamid Abaaoud in November 2015. Following the Islamic State Paris attacks in November 2015, Abaaoud was located to an apartment in the Saint Denis district of Paris, from where a four hour siege took place. As the armed officers went to enter the premises, Abaaoud’s female cousin fired an AK47 rifle at the officer before blowing herself up, and Abaaoud, who was killed during the siege, fired on the officers, resulting in four of the French officers being injured. Belgian police armed units faced similar circumstances in the !



CLOTHING " Molenbeek district in Brussels following an attack in the city in March 2016, where one suspected terrorist linked to the Islamic State group was killed. Once premises or a terrorist incident scene has been declared safe by the police armed units, forensic science teams and detectives will enter the premises. Regarding a terrorist incident, it could be an attack in a busy area such as a shopping mall or a location that attracts a high number of people such as a tourist attraction or a major sporting event. The attack could be like those we have unfortunately witnessed in Europe in the last couple years that have included bomb attacks, the use of small arms fire or driving a vehicle into people. As this is a crime scene uniform officers will be policing the outer cordon. This is simply because most people passing the area will recognise them instantly as police officers and it will make the job of minimising contamination easier. As with entry to premises, once an area has been declared safe by police firearms units, forensic and specialised police teams will enter the scene, specialised police dog units where dogs trained to find explosives or other items linked to the search for evidence will be deployed to the scene, where invariably the police dog handler will be in uniform. Police forensic staff will also be easily identified as they will

REGARDING OFFICERS NOT WEARING A POLICE UNIFORM, IT CAN BE DIFFICULT FOR THE OBSERVER TO IDENTIFY WHICH DEPARTMENT THE VARIOUS OFFICERS WORK IN AND WHAT ROLES THEY CARRY OUT be wearing their white or blue forensic one-piece suits, latex gloves and usually a mask covering the mouth to prevent and minimise any cross-contamination. POLICING AGENCIES In relation to police officers who carry out terrorist-related investigations, clothing differs between various states’ policing agencies. It is rare to see these officers in media reporting of terrorist incidents. Following the aforementioned attacks in Paris, some police officers were seen wearing plain clothes and balaclavas with vests saying ‘police’. Most of these officers were part of France’s Research and Investigation Brigade (BRI). This police unit is part of Paris’ own police department where the officers are trained for stakeouts and surveillance and so, for obvious reasons, while attending the scene of terrorist

attacks or at locations where searches are being carried out, to prevent them being identified, they are wearing balaclavas. There are a number of reasons why most of the time you rarely see detectives or officers from special units related to terrorism investigations. One main reason behind this is that during an investigation into suspects, surveillance will be carried out, be in foot or mobile surveillance. While there are a number of investigative methods to gain information, or more importantly evidence against a suspect, one method is through direct surveillance of that suspect including foot surveillance. Naturally the investigating officers’ dress code will vary according to the circumstances of the investigation at that particular time. Be it static observations or one where the suspect is being followed, the officer will have to dress accordingly that will enable them to blend in the area. As such there is no specific dress code for surveillance work. This can also apply to counter terrorism investigators when meeting their informants. For officers not engaged in surveillance work this may be different but again it depends upon the dress code for each states’ detective officers. For example, in the UK detectives are predominantly expected to wear office/ business attire while working in their office or making enquiries. Again the dress code is open to change should those officers be attending a scene, be it premises subject to a search or where a terrorist incident has occurred. This could entail less formal wear such as denim jeans and training shoes, but most officers will wear a protective body vest and a police baseball cap. Unlike

the UK, in most states’ detective units they are likely to also carry a firearm; usually a 9mm semi-automatic pistol. IDENTIFICATION Terrorism related investigations are complex, especially in unfortunate occurrences where the investigations follow a terrorist attack resulting in police officers and staff from police departments outside the counter terrorism units attending the scene. Regarding officers not wearing a police uniform, it can be difficult for the observer to identify which department the various officers work in and what roles they carry out. To summarise, the most visible and identifiable are uniform officers assisting at scenes by policing the outer cordon to an incident to help preserve a crime scene as well as forensic police staff working inside that cordon searching for evidence. Also, more readily identifiable are officers from a state’s specialised firearms unit who attend to make safe a location where a terrorist attack has or is taking place, or, to secure and make safe premises linked to terrorist activity that are to be searched. It is other police officers, normally those who are part of specialised units that investigate suspected terrorist or terrorist acts, that are more difficult to identify as to what their role is. As they carry out various forms of investigation, especially surveillance work, it is necessary that they dress according to the role and area they are working in. #





INFRASTRUCTURE PROTECTION James Kelly, chief executive of the British Security Industry Association, discusses the importance of protecting national infrastructure and the businesses supporting it

INFRASTRUCTURE SECURITY: SECURING OUR FUTURE 2 017 has been a year marked by a shift in terrorist tactics, with tragic consequences for the UK. As seen in the consecutive Westminster Bridge attack, Manchester concert attack as well as London Bridge attack, terrorists have shifted towards strategies that are as crude as they are deadly; targeting the particularly vulnerable and making use of weapons which are difficult to control and track, such as knives and vehicles. What have we learnt from these terrible events? It is not enough to protect the nation from terrorism as we know it; we must continually anticipate new methods of attack designed for maximum disruptive impact. From the National Grid and communications, to water supply and transport, the systems that underlie our everyday life are all vulnerable in some shape or form to attack. National infrastructure has seen considerable investment recently in the UK. Just recently, the government commenced the development of an ÂŁ8 million data analytics facility for national infrastructure systems like energy and water. The Data and Analytics Facility for National


Infrastructure (DAFNI) will build computational systems, hardware and software platforms for data analytics, and database simulation and visitation systems. This information will be used to improve UK resilience to extreme events such as natural disasters and terrorist attacks by spotting vulnerabilities, improving performance and prioritising workloads. DAFNI will provide a unique space for innovation and greater joint up approaches between the different national infrastructure industries and government – something which is becoming increasingly important amidst increased threat levels. However, DAFNI also highlights the responsibility that accompanies the possession of data that could be deadly in the wrong hands. Imagine a hacker gaining access to vulnerabilities across transport hubs or statistics on which power stations are the most critical within the UK. The consequences could be disastrous. As such, cyber security is equally important to physical security, especially when it comes to infrastructure where the majority of activities take place through electronic systems. !


INFRASTRUCTURE Photo by Jason Blackeye on Unsplash



...the power in microwaves!

Microwave Power Modules – TWT & Solid State

Travelling Wave Tubes

HV Power Supplies & Capacitor Charging PSUs

Rugged Amplifiers & Transmitters

Instrumentation Amplifiers

INFRASTRUCTURE " According to a recent article, cyber attackers are regularly trying to attack data networks connected to critical national infrastructure systems. A former senior British security official said it was an ‘article of faith’ that Russian government hackers were seeking to penetrate UK critical infrastructure. Such attacks are not unheard of. In December 2015, Ukraine’s power grid was brought down due to a third party’s illegal entry into computer systems that resulted in the disconnection of multiple substations. Steve Holliday, former chief of the UK’s National Grid, recently reported that: “The UK stands out uniquely on cyber threats. Nowhere else is as worried as the UK about cyber threats: we are just off the scale on our energy system concerns on cyber.” With cyber attacks clearly on the increase, what are a few key considerations for businesses supporting National Infrastructure when it comes to protecting themselves? CYBER SECURITY – ARE YOU DOING ENOUGH? Defending against cyber attacks does not necessarily require complex strategies; simple steps such as regularly updating software and malware protection, ensuring that all firewalls are robust and up to date and restricting access to specific users, can all go a long way in keeping cyber threats at bay. It can be especially useful to configure specialised firewall rules in order to restrict access to the networks, with such firewalls being inaccessible from the internet in order to be less vulnerable to attack. It can also be wise to enlist the help of a security consultant to help identify any potential weaknesses within a network and develop contingency plans in the event of a breach. A reputable security consultant with a wealth of experience and proven track record in cyber security can carry out penetration testing in order to ensure that the protection already in place is adequate enough to challenge ever-advancing cyber threats. The testing can also identify any weaknesses in the network and address them where necessary. Photo by Markus Spiske on Unsplash

WITH CYBER ATTACKS CLEARLY ON THE INCREASE, WHAT ARE A FEW KEY CONSIDERATIONS FOR BUSINESSES SUPPORTING NATIONAL INFRASTRUCTURE WHEN IT COMES TO PROTECTING THEMSELVES? DO YOU HAVE A RISK REGISTER IN PLACE? Perhaps one of the most important elements of an organisation’s contingency plan is the risk register. When planning for safety and creating incident management processes, it is essential that those responsible for crisis planning are able to identify the day-to-day risks they face and the strategies in place to counteract them. Businesses face a number of threats each day, including potential terror attacks, the threat of flooding, an outbreak of fire and the ever present danger of a cyber-attack, all of which have the ability to completely shut down a business. When addressing these various threats, it is important to look at how the organisation operates on a wider level in order to identify what aspects of the business are essential in its ability to continue to function in a crisis. For example, ensuring that employees can work securely off-site, if necessary, is crucial in ensuring business continuity. It is not enough just having plans in place in the case of an emergency; it is also paramount that all employees are aware of existing contingency plans so that they may go about their roles as necessary. Such plans should also be efficient in their structure, making sure that incidents are dealt with in a timely manner so as not to compromise the business further. SHOULD YOU INVEST IN FURTHER TRAINING? As well as enlisting independent professional support from a consultant, it can also be worthwhile investing in specified training in order to ensure that members of staff are able to respond accordingly to potentially threatening situations. To be fully prepared for a crisis, employees, particularly those on a senior management level, can undertake specialist training courses on crisis management. Such training should

be delivered by a reputable training provider whose comprehensive courses can help members of a business develop the essential skills and confidence to effectively deal with a crisis. The training available is extensive and can cover all aspects of incident management such as risk assessments, security surveying, continuity management and disaster recovery. Those that deliver the training should also be professionally qualified tutors with real world experience of the industry in order to provide an insightful, valuable course. In order to ensure the training is truly fit for purpose, it is important to choose a trustworthy training provider. Members of the BSIA’s Training Providers Section are committed to working with fellow training providers, colleges, security companies, trade organisations and the government to drive standards, increase professionalism and ultimately improve the standard of training offered to the security industry. Keeping in line with these values, the section has also created its own ‘Code of Conduct’ in order to help safeguard the interests of consumers of services provided by BSIA members, as well as raising the bar of professionalism amongst its members. Adhering to the code provides tangible evidence of each member company’s commitment to proficiency and probity, helping them to keep abreast of current practice, regulation and applicable laws affecting training, in order to ultimately position themselves as the best in the industry. The British Security Industry Association (BSIA) recently launched a new Cyber Security Information Portal to allow members access to the latest advice and guidance to help them and their customers reduce the risk they face from cyber attack. The dedicated page includes useful links, guidance and training information. Ultimately, when implementing security strategies and preparing for the future in an uncertain world, one thing remains steadfast – the importance of quality. Whether it’s a security consultant, training provider or any other form of security, those responsible for procuring security products and services for their organisation should only be enlisting the help of a trusted, professional provider who meets with the necessary British and European standards. !





Catherine Laug, marketing and communications manager for LOCKEN, examines the genuine terrorist risk to our water infrastructure

TERRORIST THREATS TO THE WATER SECTOR he National Critical Infrastructure Protection Plan, a document which unifies a nation’s energy, nuclear, finance, transport and water sectors, identifies the very real threat our world faces from terrorism. Although it is not the only threat facing our global infrastructure, terrorism is, unfortunately, a very topical one which must be taken seriously. For instance, recently, Spain was placed on Terrorist Alert Level 4, with the lowest level being 1 and the highest being 5. One area frequently unheeded by citizens, however, is the genuine risk to our water infrastructure. Faced with a terrorist attack, the population tends to relativise the situation in order to protect itself. In most cases, attacks are seen as abstract, affecting others in relatively remote locations. However, if it happens in the same city, in a very busy place, like public transport, the psychological effect on the population is much greater, and this is the main effect sought by terrorists: to create a feeling of insecurity in individuals. In the case of water, the consequences of an attack on water infrastructure would extend to homes, where everyone



feels most secure. Added to this is the fact that an attack of this nature is initially undetectable by the population. Recent studies undertaken by the United States Air Force and Colorado State University reveal that a few litres of a highly toxic substance is sufficient to pollute an entire food system of a population of 100,000 people in just a few hours. VULNERABILITIES IN THE SYSTEM There are many different water sources, including reservoirs, rivers, streams, lakes, deep wells, underground water from wells fed by surface water, desalination or wastewater treatment. The solution against pollution is dilution. In addition, many of the potential pollutants degrade over time by exposure to the sun and the elements, giving these sources a self-cleaning character that makes them difficult, but not impossible to contaminate. However, an attack on the drinking water system can take a variety of forms as the supply of drinking water to our homes is a complex process, involving many different steps, all of which are, to some extent, vulnerable to terrorist acts, and need securing.

These include processing plants, water reservoirs and the distribution system. Processing plants: In the majority of cases, the treatment plant constitutes the last bulwark between pollution (natural, accidental or intentional) and the end user. Often, it is also the last place of continuous control of the chemical and physical characteristics of water. Water reservoirs: these sites, such as treatment plants, are places with limited geographical space and can thus benefit from a certain level of physical security. They are often found in remote areas, and are widely dispersed, so monitoring can be very insufficient in places. The volume of water involved is also reduced, but there is still some potential for dilution. The distribution system: it is generally accepted that the distribution system is the most vulnerable element of the water supply system. The dilution potential is considerably reduced. The most likely scenario for an attack whose purpose is to inflict serious fatal damage is to organise reflux contamination. A reflux attack occurs when a pump is used to exceed the pressure gradient present in the pipes of the distribution system.


WATER SECURITY POTENTIAL TOXIC PRODUCTS A large number of toxic compounds can be deployed by terrorists in an attack on water resources. Chemical compounds used for water treatment: these compounds, such as chlorine or fluoride, which improve the quality of water used in adequate doses, can become toxic in excessive amounts. These chemicals are readily available because they are present in the facilities, and improper handling, either intentional or accidental, can have serious consequences. In addition, automated systems can be subject to cyber-attacks and can cause damage from thousands of kilometres away. Heavy metals: heavy metals are hazardous because of their toxicity to humans. They are also fairly simple to obtain, and their salts often dissolve easily. Herbicides: in general, herbicides tend to be less harmful to humans than other compounds, although there are some notable exceptions. However, it is very easy to obtain in large quantities, which increases the risk of use. Although not causing a very high death toll, the panic engendered by their presence in distribution networks could be serious. Insecticides: these are generally more harmful to humans than herbicides. Some insecticides have chemical structures very similar to certain chemical warfare agents. Like herbicides, insecticides are available in large quantities. For some, their solubility limits their effectiveness as weapons when introduced into water, but others are very soluble and pose a threat. Nematocides and rodenticides: nematocides are similar to insecticides. With few exceptions, they are more soluble than insecticides. Some nematocidal compounds are also similar to chemical warfare agents because of their structure and mode of action. Rodenticides are of concern because they are specifically designed to be fatal to certain species of mammals such as humans. Both types of products are available in large quantities. Industrial chemicals and miscellaneous agents: there is an abundance of industrial chemicals that could be used for attack. Their main representative is cyanide, which is widely used in mining and other industries. Radionuclides: the use of radionuclides as a weapon is a highly probable risk. Even with limited casualties, the psychological impact of a radiological threat could be severe. Highly pure compounds and highly radioactive materials, such as plutonium or uranium-238, are difficult to procure and expensive, and it is unlikely that a terrorist organization that has acquired these materials will be willing to use them for an attack on a water supply system. The use of low-level radioactive materials or residues is more likely.

WITH APPROXIMATELY 6.5 BILLION CUBIC METRES OF WATER DIRECTLY ABSTRACTED FOR PUBLIC USE IN ENGLAND AND WALES EACH YEAR ALONE, SECURING AND CONTROLLING ACCESS TO DRINKING WATER SITES IS OF CRITICAL IMPORTANCE War agents: chemical warfare agents such as VX, soman, sarin or mustard gas are not normally used against a water supply system because of their limited availability. If used for an attack, it is more likely to be aerosolized. Toxins and biological agents: there are a number of protozoa, bacteria, viruses and toxins that could be used in an attack. Many of these agents are extremely toxic and contain compounds such as botulinum toxin, which is one of the most toxic substances known. These categories of products are fairly easy to obtain and examples of castor production by terrorists are not lacking. Bacteria are also easily cultivable and wastewater could in fact be used as a potential pollutant for a reflux attack. A VERY REAL THREAT A contamination would not be confined to areas near the point of introduction, as the pollutant would flow through the entire neighbourhood accessing major pipelines, leading to the pollution of the entire system. Computer simulations have proven that by using a military agent to attack the nervous system, more than 20 per cent of the population would receive a dose sufficient to cause death and, with a common chemical agent, the result would exceed 10 per cent. Significantly, calculations revealed that this type of attack could be organised for less than $0.05 (or ÂŁ0.04) per death. Thus, considerable damage can be committed at a very low cost and by means of a very simple technology. An attack on water resources undoubtedly satisfies the terrorist criteria, as outlined by the 9/11 Commission which concluded that Al Qaeda uses specific criteria to plan an attack and access the effectiveness of a mission. This is not a hypothesis but a very real threat to each national society, with historical evidence of attacks on water resources being played out throughout history. Records as early as 1000 BC reveal Chinese warriors contaminated the water resources of their enemies with arsenic. While not exhaustive, there have been recently documented incidents too, including the arrest of four men of the Salafist Group for Preaching and Combat (GSPC) who were arrested in Rome for possession of chemicals, false papers and detailed plans for the water supply network in the zone of the Embassy of the United States.

DETECTION AND PREVENTION The first line of defence against an attack of this nature is prevention. If prevention fails or is impossible, the next strategy is to detect the presence of pollutants in the water before they reach the population. The best solution consists of multi-parameter probes of continuous analysis, which measure the usual parameters of water quality and then look for the anomalies which may indicate the presence of a contamination. These sensors may include parameters such as chlorine, total organic carbon, pH, conductivity, turbidity, UV absorbance / fluorescence. One of the advantages of this approach is that it uses common instruments commonly used to perform such analyses. An attack on the drinking water system can take a variety of forms as the supply to our homes is a complex process involving many different steps, from reservoirs to processing plants, and all are, to some extent, vulnerable to terrorist acts. As always, the first line of defence against any attack is prevention, particularly physically securing our water infrastructure and prohibiting unauthorised access to these sites. With many sites isolated and manned by countless personnel across an entire region, delivering a robust and fully traceable access control solution is essential. With the ability to carry out audits and respond quickly to new technologies, through fixed terminals or mobile apps, electronic key-centric access management provides users with complete control over entire regional sites. They can receive up-to-the-minute information about all access-related events – which can be enabled to adjust user profile profiles centrally while the users will be given access locally thanks to its Bluetooth Key and App. In conclusion, while even the slightest hint of terrorism is always alarming, it may be the least risky threat to our water infrastructure. However, given the potential risk an act of this nature could deliver, it is necessary to be prepared and secure our sources now. With approximately 6.5 billion cubic metres of water directly abstracted for public use in England and Wales each year alone, securing and controlling access to drinking water sites is of critical importance. !






HIGHLIGHTING THE VALUE OF HIRING EX MILITARY PERSONNEL The recruitment consultancy Ex-Mil Recruitment Ltd has launched a campaign to highlight the value of hiring ex military personnel to UK employers

The military has recently been in the public eye for a number of reasons, due to conditions, the lack of training time and equipment they face in the ongoing struggle in Iraq and Afghanistan. However, one of the least known problems they face is the difficulty trying to forge a new career after they leave a military environment. WHAT EX-SERVICE PERSONNEL BRING TO THE TABLE Ex-service personnel are internationally renowned for having the best training, commitment and ability. They have proven themselves time and time again, often in very harsh and demanding environments where they have kept a high level of professionalism as well as an excellent sense of humour. Servicemen leaving the military have a multitude of skills ranging from IT, telecoms, security, project management, transport, logistics, engineering and avionics to name but a few. Many personnel have very quickly moved into roles that embrace the above, others, with strong backgrounds of personal initiative and flexibility have moved into non-related roles such as sales, facilities management, training and development and general management. THE AMOUNT OF PEOPLE WHO LEAVE THE MILITARY At the moment approximately 30,000 service personnel leave the military every year. Many find it very difficult to secure a new career or even somewhere to live. At present a significant percentage of the homeless, living on the streets of London, come from ex military backgrounds. CHALLENGES Those with less than three years service receive little or no assistance in job hunting and more importantly in finding somewhere to live. Ex-military personnel who have served longer terms, can find the support and advice most often fragmented and not very well co-ordinated. Another challenge faced by ex military personnel is the propensity of H M Forces to point individuals towards very few potential


career paths. Employers outside of these ‘over-used paths’ often don’t appreciate the value that ex military personnel can offer with respect to commitment, loyalty, discipline and the innate adaptability and ‘can do’ attitude to work.

to donating 10 per cent of its profit to established military charities. For more information please contact Ex-Mil Recruitment Ltd on 0333 202 6500 or visit the website. !

SUITABLE COMPANIES TO WORK FOR Unlike the majority of recruitment websites, both traditional and on the internet, Ex-Mil Recruitment Ltd is totally focused on matching ex military personnel with suitable companies. The founding director of Ex-Mil served for 10 years in the British Army and understands, only too well the situation faced by ex military personnel when they leave. He has an extensive recruitment based background outside of the Army and is in a very good position to understand both sides of the issue. THE MILTARY ETHOS IS TO GIVE 100 PER CENT AT ALL TIMES The ethos of Ex-Mil Recruitment is simple: in the forces you are trained to be the best and you are expected to give 100 per cent at all times. So when the ‘lads and lasses’ leave the military, shouldn’t they expect the same commitment in return? Furthermore, since April 2007, Ex-Mil Recruitment has committed


FURTHER INFORMATION www.ex-mil.co.uk


The terrorist attack on London Bridge at the start of June highlighted the speed and importance of armed counter terrorist police keeping our streets and communities safe. Here, we look at the role of firearms police in UK security

THE HEAVILY-ARMED FACE OF COUNTER TERROR POLICING n 3 June 2017, a van mounted the pavement of London Bridge and drove into innocent pedestrians before its three occupant crashed the vehicle and stabbed more bystanders at the nearby Borough Market. In total eight people were killed, with approximately 50 more seriously injured, including four unarmed police officers who attempted to stop the attackers. The attack, the third of its kind in the UK in the space of two months, lasted a total of eight minutes as armed City of London and Metropolitan Police officers shot dead the assailants. While much of the immediate aftermath aptly focused on the close proximity of the attack to the previous events in Westminster and Manchester, Cressida Dick, Metropolitan Police commissioner, and Mark Rowley, assistant commissioner, were right to applaud the eight-minute reaction time in their speeches to the media. Ken Marsh, chairman of the Metropolitan Police Federation, summarised this well when he said: “There can be no doubt that the swift response of our colleagues – both armed and unarmed – saved further lives from being lost. There are barely words to describe their bravery – officers who ran towards danger with no thought


for their own safety. Londoners can rightly be proud of their emergency services today. They are the best of the best and we thank everyone for their praise and kind comments.” In fact, casting our attention back to October 2016 when Lord Toby Harris published his report on improving London’s terror preparedness, it is clear that the emergency response of the UK counter terror forces, as well as emergency services, is among the best in the world. Harris, who made 127 recommendations for Mayor of London Sadiq Khan and the government to consider, said at the time of his report that ‘if London were subject to a terrorist attack today, our emergency services response would be substantially faster than five years ago’. He pointed to the August 2016 knife attack in Russell Square, whereby a man stabbed six people, one fatally, before being tasered and arrested at the scene by police within ten minutes of the first call to the emergency services. Lord Harris’ report, perhaps the most important document of recent times into countering terrorism and ensuring safety in London, looked at the police’s immediate response actions in the events of a ‘Marauding Terrorist Firearms Attack’, like that seen in Paris

in November 2015. He acknowledged, having spoken to police officials, that a policy of containment would not be sufficient in stopping an attack, and while the policy of ‘shoot to stop’ should always be the first consideration, ‘shoot to kill’ cannot always be avoided. Instead, Harris said that the response should involve the ‘first armed officers on the scene moving forward to confront the terrorists’, where ‘lethal force’ can be used to ‘neutralise the threat’. DOES THE UK NEED MORE ARMED POLICE? In January 2016, former Metropolitan Police commissioner Sir Bernard Hogan-Howe announced 600 more armed police were to be trained, bringing the total number of armed police in London to 2,800, and patrols more than doubled to help counter the threat of a terrorist attack in London and to boost the UK’s terror response. However, since the terrorist attacks in London and Manchester, Prime Minister Theresa May has come under fire for the cuts made to policing numbers during her time as Home Secretary, as a lack of resources have been widely cited as a reason for the fight against terrorism being compromised. According to Home Office figures, the number of police #




Inspiring businesses and organisations to get practical for added security Garran Lockers offers intelligent product solutions for securely storing and controlling access to vulnerable equipment used by the police and other emergency forces. Tom Whincup, commercial director of Garran Lockers, said: “It is important to always keep security at the heart of an organisation’s continuity planning and business strategy with continued threats of attacks and other forms of terrorism. Whilst the number of highly sophisticated technologies and products for surveillance and cyber-crime continues to rise, it is important to remember there are some simple and cost-effective things organisations can do to safeguard their assets and counter terror threats.” Having worked with emergency services for many years, Garran Lockers has designed and manufactured specialist lockers, like boot seat lockers, equipment storage for the Fire and Rescue Services and large strengthened kit and storage lockers for the police. Garran Lockers’ bespoke design and manufacturing capability means these organisations are able to secure the specific

storage solutions that enable them to meet their exact needs. For example, the Fireman’s boot seat locker has a fixed shelf, with a coat rail and two coat hooks. The lift-up lid is retained in the closed position by the main door when locked. A top blanket and/or storage box is available to add to the top of the locker, increasing the storage potential if required. As well as quality and reliability, Garran Lockers offers easy access to its in-house design services, and is able to offer advice based on fifty years’ experience working with the emergency services sector, irrespective of the size or restrictions of the

changing area or storage area concerned. The UK emergency services are under constant pressure to be more efficient and effective. The services are expected to respond as a matter of course to a diverse range of emergencies and on an ever-increasing scale. The public’s rising expectations of consistent and high response rates compound that challenge. As part of that drive, many fire services and police stations have undergone or are undergoing refurbishment projects to make them better equipped and crewed to offer a consistent and excellent response to emergency incidents. Well-designed lockers and storage areas at the emergency stations are of vital importance as fast access to changing facilities and the right equipment can impact the effectiveness of the service’s delivery. FURTHER INFORMATION

Tel: 029 2085 9600 info@garran-lockers.co.uk www.garran-lockers.co.uk

THE COMPLETE LOCKER SOLUTION Quality lockers for the work place, education and leisure markets and the emergency services. The UK’s largest locker manufacturer

QUALITY THROUGH CRAFTSMANSHIP Combining unrivalled craftsmanship and design for high-end, Bespoke Locker and Storage solutions for blue chip corporate and government organisations, prestigious clubs, spas & leisure establishments.

For more information on Craftsman Lockers call:

For more information on Garran Lockers call:

01480 405396

02920 859600


www.garran-lockers.co.uk Alington Road, Little Barford, St Neots, Cambs PE19 6WE |





CRESSIDA DICK AND MARK ROWLEY, OF THE METROPOLITAN POLICE, WERE RIGHT TO APPLAUD THE EIGHT-MINUTE REACTION TIME OF FIREARMS OFFICERS IN THEIR SPEECHES TO THE MEDIA FOLLOWING THE BOROUGH MARKET ATTACK " officers in England and Wales fell by 18,991 between September 2010 and September 2016. More importantly, the number of authorised firearms officers was reported to have fallen by 19 per cent between March 2010 and March 2016, with statistics showing the figure sitting at 5,639 officers. A previous drop in recorded crime made the cuts justifiable, but a recent upsurge, not only in terrorist attacks in the UK, but also in knife and gun crime in recent months, mean that the austerity-based decision is now being challenged. Just before the Finsbury Park attack, Mark Rowley, the UK’s top counter terrorism officer, wrote to Home Secretary Amber Rudd arguing that the current counter terrorism policing network was not able to operate at ‘full strength’. Returning to the January 2016 influx in trained armed police, Chris Phillips, former head of the National Counter Terrorism Security Office, argued that too much focus was being placed on London when the terror threat was UK wide –

the attack in Manchester justifying that claim. In August last year, the first of the new batch of officers took to the streets of London, equipped with SIG 516 semi-automatic carbines and Glock 9mm sidearms and provided with specially adapted BMW F800 motorcycles. Following the attack in Westminster earlier this year, Simon Chesterman, National Police Chief’s Council lead on armed policing, announced that counter terror police have undergone specialist training and been issued high powered ammunition that can penetrate armoured glass, to prepare them to shoot lorry drivers who are using their vehicles as weapons. However, there remains the argument that the public do not want ‘to live in a place where we are all armed to the teeth’, as Cressida Dick put it. With the deployment of soldiers following the Manchester attack as part of Operation Temperer, having the armed forces ‘backfill’ for the police is unlikely to stop the argument from disseminating.

NORTH WALES POLICE FORCE North Wales Police first started using Reveal RS2-X2 body cameras in March 2015, and have since rolled out the cameras for their firearms team. Ian Davies, assistant director for North Wales Police, spoke to the company about the decision to implement body worn video technology on their firearms team, saying that because firearms officers are involved in situations where there is ‘a definite possibility of injury or even death’, the evidence obtained from body worn video cameras is ‘crucial to these investigations in order to paint a true picture of events as they unfolded’. Additionally, as firearms officers are regularly doing non-firearms jobs, the cameras ‘need to be interchangeable’ so that the technology works whether they are making an arrest for ‘someone driving dangerously’ or ‘being deployed in a firearms capacity’. It is clear that flexibility is key for firearms clothing and equipment, especially since firearms officers are expected to ‘have the camera on all the time’. !

For more information on the clothing of counter terrorism firearms specialist, read Dr David Lowe’s article on page 61.

FURTHER INFORMATION www.revealmedia.co.uk





Landau UK Commercial are delighted to be displaying the new Seabob Rescue – dubbed ‘The Lifesaver’s Watercraft, available exclusively in the UK through Landau UK Commercial. The Seabob Rescue is a cutting edge lifesaving product designed to save lives and rescue people when every second counts. Perfect for inland waterways, cruise ships, coasts and as a safety station rescue vehicle for immediate response.

Quick and easy to deploy Lightweight & fast rescue vehicle (34kg) Dive depth of up to 40 metres 60 minutes of operating time Pulls up to 10 people at once

OUR SERVICES Mi-Tic E & S Type Lightest & affordable compliant thermal imager for firefighters Lightweight with large clear displays Highest dynamic temperature ranges

Landau UK Commercial specialises in vessel life extension including general maintenance, upgrades and annual contract maintenance projects for commercial marine boats, workboats of all sizes and commercial passenger ships of all sizes across the UK and Europe. They also provide a fully managed service for all boat maintenance, care, products and services.

EMERGENCY SERVICES SHOW 20th-21st SEPT 2017 VISIT US AT STAND L76 +44 (0)1489 577 588 www.landauukcommercial.com


This year’s Emergency Services Show returns to Hall 5 at the NEC, Birmingham from 20-21 September with a strong focus on learning from past incidents and collaborating to protect the public and save lives. Counter Terror Business looks ahead to the event

COLLABORATION AND INNOVATION KEY TO KEEPING THE UK SAFE A ttracting over 6,500 visitors and 400 exhibitors, The Emergency Services Show provides a unique opportunity to network and exchange ideas across the resilience, emergency planning and emergency services community, share best practice, as well as to see and handle the latest technology and equipment. As recent terrorist incidents in the UK have demonstrated, collaboration is key to co-ordinating effective response and recovery. Luana Avagliano, head of Resilience Direct, UK Cabinet Office, who will be presenting a seminar on the subject at The Emergency Services Show, says that such events ‘highlight the importance of collaboration, partnership working and using digital tools to be able to respond quickly’. Resilience Direct is a key partner of the show, along with JESIP and the National Operational Guidance Programme. RECENT TERRORIST INCIDENTS Terrorism is one of the key topics in the Lessons Learnt Theatre, sponsored by UCLan

PROTECT, where emergency services and partner agencies will share their experiences of responding to real incidents. For example, North West Ambulance Service will present a session on the Manchester Arena terrorist incident which it attended. Sir Keith Porter, professor of Clinical Traumatology at the University of Birmingham, will speak about the role of citizenAID™ in the light of recent terrorist attacks in London (Westminster, London Bridge and Finsbury Park Mosque). When there is a shooting, stabbing or bomb explosion the initial priority is public safety. This can delay the time before the emergency services are able to reach the injured. citizenAID™ enables the general public to be effective in these situations before the emergency services are available to provide professional medical support. It is designed to guide the public to react safely, to pass effective messages to the emergency services, to prioritise the injured and to give life-saving first aid. Visitors can also find out more on the citizenAID™ stand in The #



Let’s talk

Are you a qualified healthcare professional looking for a rewarding career? Disability Assessors Wales, Midlands and Northern Ireland £34k salary + fantastic benefits Have you ever considered a career that offers you the chance to use your skills in a different way? What if you could use your clinical expertise to work with people who have a long term health condition or impairment? Interested? Let’s talk about a career as a Disability Assessor. Capita Personal Independence Payment (PIP) delivers disability assessments in Wales, the Midlands and Northern Ireland. Whether you’re a nurse, physiotherapist, occupational therapist or paramedic, we’re searching for talented, experienced and ambitious healthcare professionals like you to help us do it. In return, you’ll enjoy career-enhancing training, a generous salary and benefits package, as well as the opportunity to join a fast-moving, successful organisation. If you’re ready to take your career to the next level, visit capitapipjobs.co.uk today. For more information please contact PIPRecruitment@capita.co.uk

EMERGENCY SERVICES " Collaboration Zone at the show. CBRN experts will also be speaking in the Lessons Learnt seminar theatre. Mark Godsman, part of the Fire and Rescue Service Team at the National CBRN Centre, will present a session on CBRN Initial Operational Response. In the early stages of a suspected CBRN incident, the first 15 minutes are vital for reducing harm to casualties. He will explain what this means for control rooms and frontline responders. Chief Inspector Richard Butterworth, deputy head of the National CBRN Centre, will then talk about the multi-agency response, examining how this looks to responders on the ground and what specialist resources can be expected. Simon Lewis, head of Crisis Response for British Red Cross, will present a session on the charity’s role in emergency response to crises such as the Manchester and London terror attacks. He will explain more about the British Red Cross’ national community reserve volunteers project, which will help build stronger communities by recruiting a practical taskforce of thousands. Lewis said: “When large emergencies happen there is an outpouring of support from local people. As we’ve seen from Manchester, London and the Grenfell Tower fire, members of the community play a vital part in the response. Harnessing these valuable voluntary acts and integrating them with the official response has long posed a challenge to the emergency planning and response sector. The project aims to enhance community resilience by providing local

AS WE’VE SEEN FROM MANCHESTER, LONDON AND THE GRENFELL TOWER FIRE, MEMBERS OF THE COMMUNITY PLAY A VITAL PART IN THE EMERGENCY RESPONSE people with a focused and practical way to help others, particularly during long-running major incidents.” The College of Paramedics will once again deliver a programme of free 30-minute CPD workshops which cover trauma, airway management, basic and advanced life support as well as a reflective account on the past London bombings. DISRUPTING, DETERRING AND DETECTING TERRORISM ON THE RAILWAY In the networking hub of the show – The Collaboration Zone – over 80 voluntary groups, charities and NGOs will be sharing details of the support they offer, while members of other blue lights services will be available

to discuss co-response, current trends and share ideas. The Special Response Unit of the British Transport Police (BTP) will be on hand at the show to demonstrate some of the equipment and techniques it uses to help BTP deal with potential threats to the rail network. The unit of highly skilled officers responds to reports of suspicious or unusual items on the railway, whilst keeping stations open and trains running to minimise disruption to passengers. They make crucial decisions under immense pressure every day and will be offering an insight into how they do this. BTP will be providing information about other initiatives it uses to detect, deter and disrupt a wide range of crime on the railway, including terrorism, and how the force encourages members of the public to report suspicious behaviour or activity on the network. There will also be a chance to meet the four-legged crime fighters that help to keep the railway safe and secure.

MITIGATING CBRN RISK On the CBRN Centre stand visitors can be updated on the UK’s multi-agency approach to CBRN threat. Chief Inspector Richard Butterworth explains: “Our tri-service team, with partner agencies, continually reviews the CBRN threat and mitigates identified vulnerabilities. It also equips UK emergency responders with the knowledge and capability to respond in a proportionate, agile and effective manner to a CBRN incident. The CBRN threat has not changed, but we must be cognisant of our increasingly connected world, where information and expertise that has historically been hard to access is now instantly available at the click of a button. This, combined with the fast flow of people and goods, is a challenge for us in mitigating the CBRN risk. “It is essential that the emergency services and its partners continue to prepare through training and exercising a multi-agency response. However, we #



FINCA MARIPOSA A piece of paradise in Andalusia, Spain Don’t delay, call today. Special discount must end soon!

A GPS repeater system installed in a fire station

FOUR SELF-CATERING VILLAS • Breathtaking views over the Costa Del Sol • Great temperatures in both winter and summer • Great for walking, sightseeing, and mountain-biking holidays • Golf, jet skiing, par-ascending, yacht/boat hire, snorkelling, scuba diving and windsurfing • An hour from the Sierra Nevada ski resort • Close to Nerja’s fashionable shops, restaurants and La Herreradura’s world famous FREE tapas and fine dining restaurants

YOGA RETREAT Facilities for a small group yoga retreat up to a maximum of 12 people. The yoga classes are given by a qualified yoga teacher.

mariposaholidays.com/en/ mariposaholidays/

017 | www.emergencyuk.com | Hall 5 | NEC | Birmingham | 20-21 September 2017 | www.emergencyuk.com | Hall 5 | NEC | Birmingham | 20-21 September 2017 | www.emergencyuk.com | Hall 5 |

“Meeting up with other emergency services means we can plan how to work together more effectively at future incidents.”

Photograph © ESS

Elisha Marsay, SC, North Yorkshire Police

The Emergency Services Show 2017 – it’s all about you A unique event for everyone who works in the emergency services. Over 400 exhibitors, free seminars and product demonstrations. Hall 5, NEC, Birmingham. Wed 20 – Thu 21 September 2017. Free entry at www.emergencyuk.com. Event partners


Media partners



" must also be mindful of the opportunities developing for improving our capability. Considering and planning how the future emergency response will look is vital. To this end, we are actively searching for innovative technologies and approaches that will further protect and save lives.” Mark Williams, CEO of the Police

such as mental health and health and safety. Visitors will hear about strategies for supporting crews post-incident and learn more about the blue light well-being framework for all emergency services being developed by the College of Policing in conjunction with Public Health England. Personal stories will be shared by a serving police officer

CONSIDERING AND PLANNING HOW THE FUTURE EMERGENCY RESPONSE WILL LOOK IS VITAL. TO THIS END, WE ARE ACTIVELY SEARCHING FOR INNOVATIVE TECHNOLOGIES AND APPROACHES THAT WILL FURTHER PROTECT AND SAVE LIVES Firearms Officer Association (PFOA) agrees that technology and training are key: “It is important that we keep up to date with the latest technology to ensure we are at the cutting edge to give officers and forces the best tools to fight crime and the threat of terrorism, and at the same time ensuring that the training is appropriate and the best it can be to prepare officers to be able to best protect themselves and the public.” Visitors to the PFOA stand can also find out more about its Welfare Support Programme which includes a 24/7 support line. The PFOA delivers Post Incident Management training to UK police forces and agencies, as well as government and organisations that may be involved in such processes. LIVING WITH PTSD A new seminar theatre dedicated to the health and well-being of emergency services personnel will cover issues

who suffered a nervous breakdown and a paramedic diagnosed with Post Traumatic Stress Disorder (PTSD) who has set up the charity Our Blue Light. Simon Durance and Gary Hayes, co-founders of the charity PTSD999, will present a session on living with PTSD. The Police Federation of England and Wales will be sharing details of its Protect the Protectors campaign. The Police Federation is pressing for better training and access to equipment, a wider roll-out of protection measures such as taser, body worn video and spit guards, more accurate data on police assaults and improved welfare support. A SHOWCASE OF SOLUTIONS PROVIDERS With over 400 exhibiting companies and organisations, including over 50 new names, the impressive indoor and outdoor exhibition is a one-stop shop for sourcing all the latest services

and equipment. Exhibiting companies include leading names in first response, communications, IT, protective clothing and uniforms, body-worn video, medical supplies, vehicles and fleet, vehicle equipment, drones, outsourcing, training, community safety and station facilities. Excelerate, for example, will be demonstrating a range of surveillance and communications equipment on its stand, including the Sherpa portable camera that can climb lamp-posts, the Proclux long range camera which can be used in harsh and challenging environments and a Command Pod deployable resilient data network to facilitate live camera and data streams within the incident ground. Suppliers of medical products include Water-Jel International, which will be exhibiting its burn-treatment dressings, and Celox, which will showcase Celox Rapid its fastest haemostatic gauze that stops life-threatening bleeding with only 60 seconds compression. Fenton Pharmaceuticals will be showcasing a range of pre-hospital trauma products including tourniquets. Andrew Saunders, the company’s business development manager, said: “With the increase of terrorist incidents in the UK the inescapable fact is there needs to be an increased awareness of trauma first aid by the general public. Pre-hospital trauma equipment is continually evolving and we are at the forefront of that evolution but we must not forget the solid basics of immediate first aid in the event of a terrorist attack: Stop the bleed, keep them breathing.” !

FURTHER INFORMATION www.emergencyuk.com






£3 million Cyber Security Centre opens

Iraq declares ‘victory’ over Islamic State in Mosul

The new £3 million Cyber Security Centre in Gloucester is designed to tackle cyber threats made to the UK and will enable Lockheed Martin to work closely with its UK partners to share knowledge, research and deliver cutting edge capabilities. It will also create 90 high tech jobs in Gloucester. The government is investing £1.9 billion in cyber security as part of its five-year National Cyber Security Strategy to ensure the UK is resilient to cyber threats and prosperous in the digital world. A key part of that strategy is partnerships with industry, with £10 million being invested in a new Cyber Innovation Fund to give start-ups the boost and partners they need, while £6.5 million is going on a scheme designed to build a community of industry, government and academics

to support cutting-edge research and build UK security in cyber space. Harriett Baldwin, Minister for Defence Procurement, said: “With our £1.9 billion National Cyber Security Strategy, Britain is a world leader in the field and the opening of today’s cutting-edge centre is a great example of how partnerships with industry are at the heart of that strategy. Together we are developing solutions to national security risks. We are already leading in NATO with support to offensive and defensive operations in the fight against Daesh and complex cyber threats, and I’m also delighted that this centre will further boost the UK’s cyber capabilities.”




Defence equipment ‘increasingly vulnerable’ The UK’s most expensive military assets, including the HMS Queen Elizabeth aircraft carrier, are ‘increasingly vulnerable’ to low-cost, technology-rich weapons from hostile states, a new report warns. The report, Defence Innovation and the UK: Responding to the Risks Identified by the US Third Offset Strategy, examines the implications of the Third Offset Strategy (TOS) for the UK, which stressed the need for a step-level change in American military capabilities to counter the increasing anti-access/area denial systems being developed by potential adversary states. It has found that there are growing challenges for the UK as well as US forces, especially those concerned with force projection, both physically – on the sea, in the air, and on land – and online. The report also recognises that an important part of the battle will be threats to the UK’s critical national infrastructure from hostile cyber operations. In response to the TOS, the British Ministry of Defence (MoD) launched its own Defence Innovation Initiative in September 2016 and has given

£800 million over a decade for basic research purposes, as well as assuring that the MoD’s core science and technology budget will be a minimum of 1.2 per cent of the defence budget. The paper is based on a mixture of desk-based research and three-day-long workshops which brought together senior stakeholders from the governments and private sectors of the UK, US and continental Europe. The report concludes: “The effective management of defence has never been easy and has arguably never been so demanding, given the range of challenges on the agenda, the importance of agility in the use of armed forces, and the prevalence of uncertainty and incidence of surprises. The capacity to innovate is a significant aspect of being able to deal with these issues. To maximise the UK’s potential in this area, financial changes, as well as a range of behavioural changes, will be needed.”



Iraq has declared victory over the socalled Islamic State in Mosul after nearly nine months of battle. Haider al-Abadi, Iraq’s Prime Minister, travelled to Mosul to formally reclaim the city that the extremist group had proclaimed its ‘caliphate’. Abu Bakr al-Baghdadi declared a ‘caliphate’ across Iraq and Syria from the al-Nuri mosque almost three years ago. Islamic State blew it up last month in the final days of their retreat, apparently in order to deny the Iraqi government the chance to change the national flag from its minaret – a symbol of triumph. Defence Secretary Michael Fallon congratulated al-Abadi and the Iraqi security forces on their victory. He said: “I congratulate Prime Minister Abadi, and the Iraqi forces who have been fighting on the ground with great bravery and care against a brutal opponent. Daesh has total disregard for innocent civilian life and we should welcome their defeat in a city that was ground zero for their so-called caliphate. “Britain has played a leading role in the Coalition that has helped bring about the removal of the death cult from Mosul. The RAF has struck more than 750 targets as part of the campaign to liberate Mosul – second only to the United States. While these pin point strikes have brought an end to Daesh in the city, there is still more to do. This barbaric group remains dug in west of the Euphrates and clearing operations in and around Mosul will be needed because of the threat from improvised explosive devices.”



Follow and interact with Defence Business on Twitter: @defence_b ISSUE 31 | COUNTER TERROR BUSINESS MAGAZINE



DSEI 2015 was a major success with 34,038 unique attendees and 1,683 exhibitors attending the show. With the 2017 edition expected to grow in number and importance, Counter Terror Business looks ahead to the country’s largest defence and security event

DSEI 2017: THE BEST OFFENCE IS A GOOD DEFENCE he Secretary of State for Defence, Michael Fallon, is just one of the high profile names confirmed to speak at this year’s Defence and Security Equipment International (DSEI) conference, taking place on 12-15 September at London’s ExCeL Centre. The Defence Secretary will be supported by other ministers from the Ministry of Defence, including Minister for Defence Procurement Harriett Baldwin, who is also lined up to attend and deliver a keynote address. At a time of severe security risk, with a multifaceted terrorist threat posed from the digital battlefield to civilian streets, DSEI will provide a key platform for senior international military and political representatives to candidly discuss current threats and get an exclusive view of the latest equipment and services designed to tackle these threats. The event also provides opportunities to meet with international partners to develop strong diplomatic relationships.


DSEI 2017 is fully supported once again by both international and UK military, with senior personnel, including the four UK MOD Service Chiefs, confirmed to speak throughout the four days of the show. A biennial highpoint for the global defence and security industry, DSEI 2017 will host some 1600 exhibitors and is expected to welcome over 34,000 visitors from 108 countries, including 250 international delegations. The themed zones, in conjunction with an enhanced Seminar Programme, facilitate networking opportunities and were well-received at the last show by the defence and security community. A streamlined outlook for the 2017 Show comprises air, land, naval, security and joint operations, which Counter Terror Business will explore separately in further detail. STRENGTH IN THE SKIES DSEI 2017 will feature its strongest aerospace offering to date, comprising

fixed, rotary wing, and unmanned platforms. The popular Air Zone is fully supported by the Royal Air Force and Joint Helicopter Command and includes a capability area dedicated to the aerospace supply chain. With an impressive array of static displays expected to feature around the ExCeL concourse, as well as a notable line up of rotary assets operating in the maritime domain, DSEI is #




DSEI 2017 " confirmed as the must-attend event for the entire aerospace sector. Air Chief Marshal Sir Stephen Hillier, who will be delivering a keynote address on Wednesday 13 September in the West Theatre, is the standout name from the Air Capability Conference which will examine ‘The Next Generation of Air Capability’. Speaking ahead of the show, Hillier said: “As it approaches its 100th anniversary, the Royal Air Force remains heavily committed to operations, both

maintain our decisive edge, working together with our industry suppliers.” The Air Capability Conference at DSEI will focus on the short, medium and long term requirements for both military and industry to achieve next generation air superiority, including panel discussions on F35 training and integration and high altitude operations, as well as seminar sessions on upgrading aerospace capabilities to new models, the demand for legacy aircraft and new military rotorcraft.

AT A TIME OF SEVERE SECURITY RISK, WITH A MULTIFACETED TERRORIST THREAT POSED FROM THE DIGITAL BATTLEFIELD TO CIVILIAN STREETS, DSEI WILL PROVIDE A KEY PLATFORM FOR SENIOR INTERNATIONAL MILITARY AND POLITICAL REPRESENTATIVES TO CANDIDLY DISCUSS CURRENT THREATS defending UK airspace and projecting the Nation’s power and influence around the world. The demand for air power will not change and the Royal Air Force will continue to play into the future a vital role in the security and prosperity of the Nation. The Royal Air Force provides full-spectrum air and space power, professionally, effectively and efficiently. The longer term challenge for the Royal Air Force is to ensure that it can continue to innovate and deliver decisive air power effect in an increasingly complex and contested environment. The future will inevitably present new challenges as potential adversaries adapt and seek innovative ways to challenge our advantages. DSEI offers an excellent international platform on which to explore these challenges and ensure we

The Air Capability Conference will also analyse the importance of modernising the air battlespace post-2020, improving battlespace interoperability and integration, air systems and cyber attacks, and tactical superiority. STRENGTHENING LAND CAPABILITY The Land Zone for DSEI 2017 has grown by 52 per cent and looks to surpass the achievements of the 2015 event by introducing new features, such as a dedicated showcase which will open up opportunities for even more suppliers to attend. DSEI’s offering to the land sector is further strengthened by the Land Capability Conference which takes place on Monday 11 September as part of the DSEI Strategic Conference

programme. Led by the British Army, the conference will focus on ‘The Future of Robotics & Autonomous Systems in the Land Environment’. The conference will bring together senior academics, military decision makers, key allies and industry leaders from across the defence and non-defence sector to present different views on these challenges and assess what needs to be done. The event promises an opportunity to inform, be informed and participate in lively debate with leading representatives in their field. The emphasis on land systems innovation will continue into the DSEI exhibition from Tuesday 12 September to Friday 15 September, with the event’s extensive offering from specialist exhibitors in the Land Zone. In addition, the Land Seminar Programme will follow four central themes: Develop, Deliver, Generate and Operate, and People & Skills, focusing on transforming productivity, Army adaptation and intelligent procurement. General Sir Nicholas Carter, Chief of the General Staff, will be delivering a keynote address at DSEI 2017 on Wednesday 13 September. Delegates can also expect to hear from Major General Chris Tickell, Director Capability, and Lieutenant General Paul Jaques, Chief of Materiel (Land) from the British Army. Carter said: “The British Army has a long tradition of being at the forefront of innovative technology – last year’s celebration of the 100th anniversary of the tank is a good reminder. Today, it is difficult to remember a time when the strategic context was more complex or dynamic. Adaptation, innovation and agility will be vital if we are to face the unpredictable threats of the future with confidence. “This year’s DSEI Land Capability #



Fully Rugged 5.7” Android Tablet for Operational Users

• NIAP Validated and Approved for U.S. Government Classified Use • 5.7” LumiBond® 2.0 Display with Getac Sunlight Readable Technology and Glove-enabled Capacitive Touchscreen • Defence Specific features such as rugged connector options, NVIS compatible*, programmable keys, etc. • MIL-STD 810G, MIL-STD 461G and IP67 Certified • 1.5m drop tested




SECURE RUGGED MOBILE COMPUTING IN UK The most secure rugged mobile computing for blue light, defence and security organisations are increasingly relying on technology to deliver efficiency and productivity gains, while achieving longer-term cost savings

MODERN DEFENCE TECHNOLOGY Modernisation of defence is firmly on the agenda with much focus on Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR). One main objective of dismounted C4ISR is for each soldier’s capability to be enhanced and for technology to be a force multiplier. Such technology is the dismounted soldier’s End User Device (EUD), which enables rapid access to, and manipulation of data in real time, collaboration and integration of applications. Yet, traditionally specialist mobile devices have been power hungry, heavy and cumbersome. POWERING BLUE LIGHT SERVICES Blue light services rely on technology to enhance performance, create efficiencies, and support day to day operations. The upcoming launch of the Emergency Service Network (ESN) will be a major technological advancement that will significantly improve connectivity and the ability to send and receive data to support any given emergency situation. Yet, operatives will need to have the means to access data in a secure, reliable, fast and consistent way. GETTING TECHNOLOGY RIGHT For any front line worker, mission-critical tasks need specialist technology, which is reliable

and resilient, portable, easy to use, and can withstand harsh environments as well as be interoperable with other technologies. Equipping the user with the right technology that allows them to securely access and manipulate sensitive and critical data is a necessity and could be the difference between a successful and failed mission, or even life and death. With the threats of cyber warfare and cyber crime, hacking systems, and infiltration, security of data continues to be the top consideration for any defence digitisation strategy. For mobile technology to deliver benefits to crews on the front line, procurement teams need to consider a number of important factors. MEETING SECURITY REQUIREMENTS Recent high profile global cyber attacks are a stark reminder of just how vulnerable organisations can be, and how damaging attacks can be if security measures are not properly considered or up to date. For blue light and defence, it’s not just about cost, downtime and reputation, but it’s possible that critical intelligence can be compromised. To meet the highest military classification standards, data needs to be encrypted and protected against attack, theft or intercept when it is at rest, in use or in transit. Getac has an exclusive partnership with Trivalent, so it can deliver seamless and robust next-generation data protection for the first time on rugged computing devices. By integrating Trivalent’s security software, which is certified by the NSA, customer data is safeguarded against unauthorised use. Its unique Data Alchemy™ solution encrypts, shreds, disperses with secure storage and recombines data to render it completely unusable by unauthorised parties, even in the case of ransomware attacks. RUGGED DEVICES DELIVER IN HIGH RISK ENVIRONMENT Getac offers a range of rugged mobile devices which have been designed in conjunction with defence and security organisations specifically to meet the needs of those working in military and blue light sectors, and those in other high risk, challenging environments.

They include a number of features that allow troops and first responders to focus on mission-critical tasks, without worrying about reliability and performance. The devices enable critical data to be quickly and safely sent and received via superior connectivity and security features. Certified to the highest industry standards, such as MIL-STD810G and IP67, mean the devices can withstand drops, dust and water ingress. MX50 – Getac’s military-specific tablet is compact, lightweight and intuitive – perfect for the already overburdened infantryman. The 5.7-inch IPS display offers a consumer device-like experience but packs in more power, robustness, security and functionality required by dismounted soldiers on the battlefield. ZX70 – rugged and durable, built to withstand rigorous use, yet is lightweight and ultra-portable, long lasting, offering potentially limitless battery life for use all day and night A140 – large 14” screen tablet to display more data and information at any given time, ultra portable RX10 secure and reliable, offering superior connectivity so workers can quickly and securely access encrypted electronic patient records and other data wherever they are. To effectively meet operational and modernisation goals, procurement teams must look to harness the hardware and software that will deliver reliable mobile working experiences, with the highest levels of security for peace of mind. Getac will be exhibiting at DSEI, stand S9-207. See Getac’s keynote ‘Understanding data security boundaries in the tactical and operations mobile landscape defence’, presented by Getac’s defence and security expert, Jackson White with security specialist, Trivalent, in the Security Theatre, 12pm, Wednesday 13 September. For more information or to book a meeting at DSEI, please visit en.getac.com or contact sales-Getac-UK@getac.com or call +44 (0)1952 207200. !

FURTHER INFORMATION www. www.en.getac.com



GMK Tactical Products Division are a leading supplier of specialist ammunition, ďŹ rearms, protective equipment, pyrotechnics and accessories to the Military, Law Enforcement and Emergency Services in the UK and internationally.

For further information please contact the GMK Tactical Division on 01489 579999 or via tactical@gmk.co.uk GMK Ltd Bear House, Concorde Way, Fareham, Hampshire P015 5RL


DSEI 2017 " Conference gets to the heart of a potential game-changer: robotics and autonomous systems. In combat we face the threat of increased lethality and sophistication, an accelerated pace of operations and an erosion of our traditional military advantage. Harnessing the opportunities brought by understanding and teaming robotics and autonomous systems is the path to an efficient, expeditionary and autonomy-enabled lethal force.” MAINTAINING MARITIME SUPERIORITY Due to its unique dockside positioning at the ExCeL, the DSEI 2017 Naval Zone is a popular draw for the maritime sector with twice as many nations represented this year compared to 2015. In addition to the 1,600 DSEI exhibitors, the zone will also incorporate over 50 specialist naval exhibitors and is fully supported by the First Sea Lord and Royal Navy. Admiral Sir Philip Jones, First Sea Lord and Chief of Naval Staff, will be delivering two keynote addresses at DSEI 2017 – the first at the Maritime Capability Conference on 11 September and the second in the Naval Zone on 12 September. Also speaking in the Naval Zone section of the show will be John Hudson, managing director of BAE Systems Maritime, John Howie,

HARNESSING THE OPPORTUNITIES BROUGHT BY UNDERSTANDING AND TEAMING ROBOTICS AND AUTONOMOUS SYSTEMS IS THE PATH TO AN EFFICIENT, EXPEDITIONARY AND AUTONOMY-ENABLED LETHAL FORCE divisional chief executive for Marine & Technology at Babcock, former First Sea Lord Admiral Sir George Zambellas and Rear Admiral Chris Gardner, Assistant Chief of Naval Staff (Ships) and senior responsible owner for the Type 26 Global Combat Ship Programme. Topics set to be discussed include: the defence contribution to national prosperity; the National Ship Building Strategy; exportability and interoperability: core elements of military capability; contemporary observations on warship procurement; and lessons on defence exports. Jones said: “DSEI 2015 was the ideal occasion for the Royal Navy to demonstrate its ambition to lead and win through technological innovation. The opportunity to meet with so many partners from academia, industry and overseas at DSEI is, as always, a really useful component of our engagement with the vital partners through whom we seek to deliver this innovation.”

BECOMING TACTICALLY SECURE The dedicated Security Zone will showcase security equipment and systems to counter priority threats, such as cyber attacks and terrorism, as well as an enlarged special forces and tactical equipment area. Aiming to increase networking opportunities for both exhibitors and visitors, the Security Zone will include security capability demonstrations, and seminars examining the impact of international terrorism and regional instability on security decisions and humanitarian needs, the challenges of increased mass migration on border security and civil order and developing the next generation of ‘cyber warriors’. PROGRESSIVE INTEGRATION General Sir Chris Deverell, Commander Joint Forces Command, recently said: “DSEI 17 will offer Joint Forces Command the opportunity to report on our plans for the future, in particular #



Come visit us at DSEI 2017 on 12-15 Sept Stand N9-292

Telescopic Masts

Radio Systems


Antenna Systems

Push-Up Lightweight Portable Masts Pneumatic Telescopic Masts 5m-30m Composite Mast 6-21M

Base Station Repeaters Turnkey Radio Projects Project Management

Splitters & Combiners Matching Transformers up to 100kW Hybrids

Mobile NVIS Antennas Tactical And Transportable Fixed Base Station Steerable Microwave Systems Positions & Controllers

We specialise in communication solutions worldwide for the military, emergency services, broadcast and commercial industries. These include Antennas, Masts, Radio Systems, SMC Gateway, HF Matching Transformers and Multicouplers, Positioners, Trailers and Broadcast Vehicles. Our approach is to combine our depth of knowledge and expertise with advanced design and manufacturing technologies to provide you with high quality, reliable product solutions on time.

Email: sales@smc-comms.com

Tel: +44 (0)23 8024 6200


DSEI 2017 " on operationalising our Warfare In The Information Age concept.” In light of this, the enhanced Joint Zone will highlight a plethora of products from exhibitors within the communications, electronic warfare, logistics, medical, robotics and telemedicine sectors. Following the huge success of 2015’s Medical Innovation Zone the area is being expanded to include more companies along with an award winning demonstration area which will once again be organised with a team from Defence Medical Services (DMS) Medical Directorate. The medical conference programme, Trauma Innovation & Military Medicine (TIMM), encompasses three streams, led by the UK Surgeon General and DMS. This looks at Trauma Innovation, International Military nursing and Triple Serpent. Trauma Innovation 2017 looks at how we can think outside the box, and translate interventions / lessons learnt into the far forward environment and to implement early into military care those active areas of research where military and civilian emergency care medicine continue to develop ground-breaking research. The inaugural International Military Nursing conference aims to showcase the current research activity of military nurses and how the integration of

TRAUMA INNOVATION LOOKS AT HOW WE CAN THINK OUTSIDE THE BOX, AND IMPLEMENT EARLY INTO MILITARY CARE THOSE ACTIVE AREAS OF RESEARCH WHERE MILITARY AND CIVILIAN EMERGENCY CARE MEDICINE CONTINUE TO DEVELOP GROUND-BREAKING RESEARCH multidisciplinary practitioners is enabling a positive culture for generating the latest evidence-base to their practice. The aim of this year’s Triple Serpent is to focus on DMS’s most important asset, its people. Using interactive activities to build knowledge around key issues, by reviewing the past and looking to the future, attendees will be able to explore how they can better support their patients. There will be a mixture of keynote speakers, debates and simulations that will excite and challenge. Surgeon Vice-Admiral Alasdair Walker, Surgeon General, said: “Building on the success of the DMS at DSEI 2015, we are expanding the DMS presence at DSEI 17 to include three significant conferences. My own conference, Triple Serpent, is exclusive to DMS and single Service medical personnel and has an appealing theme for today’s DMS: ‘Not just Bullets and Bandages – Building a Healthy Workforce’. “International and external

organisations are welcome to attend our other thought provoking conferences and displays. Catch up with the latest Trauma Innovation ideas at our conference, which aims to focus on the far forward environment and determine how Defence can think outside of the box to break the mould of conventional thinking. This year’s International Military Nursing Conference will concentrate on how the progressive integration of multidisciplinary practitioners is enabling a positive culture to gather evidence to shape quality improvements and in turn transform care in the UK and overseas. “These are fantastic opportunities to join the entire defence and security industry to see the latest equipment and systems innovations, and DSEI is a place where you can develop friendships and networks too.” !


rdnance Test Solutions

Armoured Vehicle Driver Training

Security Protection Driver Training All Courses Internationally accredited by RoSPA. Delivered Worldwide at your location to meet your needs.


E: mail@erdt.co.uk T: +44 (0) 1904 295 999

Ordnance Test Solutions provides a complete set of independent testing, evaluation & research services to support new and ongoing programmes within the international defence, safety & security communities. We continuously invest in the development of new test related tools and techniques to give our customer’s products an edge against increasingly hostile threats and ever higher expectations of performance and protection.

PROVIDING INDEPENDENT Ballistic and Blast Armour Assessment Vehicle & Ordnance Testing Instrumentation & Analysis Programme Management Lethality & Survivability Ammunition Proof Integration Testing RPG attack R&D Tools FOR ALL ENQUIRIES Disposal T: +44(0)1434 270751 F: +44(0)1434 270755 E: info@otslimited.co.uk www.otslimited.co.uk




PROVIDING WELFARE SUPPORT AND FINANCIAL ASSISTANCE TO SERVICEMEN AND WOMEN The Explosive Ordnance Disposal (EOD) community across the British Army, Royal Navy and Royal Air Force attends over 2,500 suspect devices, WWII bombs, and terrorist situations in Great Britain each year

With the UK having recently been struck by an increase in terrorist activity; the Manchester bombing and attacks in London have had a national impact and our thoughts are with all of those affected. There is a group of people who are on call 24/7 to assist the emergency services with such events: the men and women of the EOD community who are continually on the front line protecting the country. You rarely see or hear of their contribution but members of specialist military EOD units and SO15 – the Metropolitan Police Counter Terror Unit – play a pivotal role in exploiting and, where possible, preventing terrorist attacks. This continued exposure to highly stressful situations can have a lasting effect both physically and mentally on individuals. Felix Fund, the bomb disposal charity, supports these brave professionals by providing much needed welfare support and financial assistance. In the first years of its existence Felix Fund provided normalisation breaks for over 100 EOD teams on their return from Afghanistan. These breaks proved vital in reducing the risk of poor mental health among individuals in these teams. THE DASHBOARD COURSES Today, Felix Fund continues to focus on the important issue of mental health amongst serving military and, in late 2015 we launched a programme providing training in mindfulness


techniques. Known as the Dashboard Courses, the aim is to provide individuals with tools and techniques which will enable them to recognise warning signs of stress and other mental health illnesses and to allow them to develop their ability to relax, clear their minds and focus on positive aspects of their life. This will then feedback into a more productive and stress reduced work and home environment. The Dashboard courses have proved very effective. How many training programmes will get a group of serving military doing yoga, breathing exercises and running around a room playing catch with fluffy toy?! The key to the programme is a totally relaxed environment away from work and home stresses, where individuals can focus on them self. Another key area for Felix Fund is providing hardship grants, to serving military, veterans and their family members when they find themselves in times of need. This can be as wide ranging as home adaptations such as the installation of a lift for a multiple amputee, funding for a specially adapted vehicle and in the purchase of specialist equipment, such as electric wheelchairs, and bespoke sporting equipment. Our most recent support has been towards, sporting wheelchairs. Two former Sappers, both of whom lost their legs in Afghanistan have been provided with a rugby and racing wheelchairs, which has enabled them both

to be selected for the Invictus Games in Toronto. We also provided the young disabled son of a former Sapper with a football wheelchair. His family had moved and he was not able to borrow a chair at his new team, meaning he could no longer play. Now he has his own and is back on the pitch. The charity is not just here for the serving and recent veterans; we help those involved with WWII. We purchased a stair lift for the widow of a WWII Sapper and a specialist chair for a former RAF WWII bomb disposal veteran. From wheelchairs, to replacement windows to funeral costs, the charity prides itself on tailoring the help we give to match individual’s needs. Felix Fund also concentrates on sustaining the memories of those who gave their lives in the line of duty. From those bomb disposal personnel killed in the troubles in Cyprus in the 1950s through the 1970s and 1980s in Northern Ireland, where many paid the ultimate price to those we lost in Iraq and Afghanistan. We help with the upkeep of memorials to those men and women, as well as ensuring that they are never forgotten. DSEI PARTNER Felix Fund is thrilled to have been selected to be a partnering charity at DSEI 2017. This will enable us to engage with a huge variety of companies and organisations within the defence and security sectors; confirming our role for the EOD community and showcasing how we help those in need. We will be running a special show raffle and at £10 per ticket all proceeds will be going towards helping our bomb disposal heroes. !

To purchase your ticket please visit https:// www.justgiving.com/fundraising/felixdsei2017 donate £10. You will then receive a special code via email – this must be brought to the Felix Fund stand at the show N8-296 for you to be entered into the daily prize draw.


FURTHER INFORMATION www.felixfund.org.uk


Internationally accredited CYBER SECURITY An innovative range of armoured and security protection driver training technology for IT security Emergency Response Driver Training Ltd (ERDT) is the only training provider that can offer worldwide Royal Society for the Prevention of Accidents (RoSPA) International Accredited armoured vehicle and defensive security protection driving courses at your location to meet your needs or at one of the company’s UK training venues. The armoured vehicle driver training course provides in-depth theoretical and practical training on defensive driving techniques and vehicle search procedures, as well as armoured vehicle capabilities and modifications, vehicle dynamics, handling characteristics and stability management, tactical and evasive driving procedures. It also provides information and guidance on ballistic protection. The defensive security protection driving course

is designed to provide the knowledge and skills to reduce the risk when traveling by road, the driver will be competent in searching vehicles and formulating a route plan based on the threat level, they will have the ability to implement the Roadcraft system of car control and tactical evasive driving procedures while being situationally aware of potentially dangerous situations. ERDT provides a free on-line study facility which assists the candidate’s pre-course learning. FURTHER INFORMATION

Tel: +44 (0) 1904 295 999 mail@erdt.co.uk www.ERDT.uk.com

As a leading Japanese technology company, Soliton Systems develops innovative solutions for IT security, outside live video streaming and unique solutions for specific needs. IT security products from Soliton Systems supports organisations with its security management challenges including authentication, secure browsing, mobile device security, endpoint security, cyber security and network security. Soliton Systems has a strong position in live broadcasting. It has designed an enterprise class lightweight product for mobile H.265 HEVC encoding that allows live streaming of video content direct from cameras. Ideal for law enforcement, fire

departments and broadcasters, they can stream live from fast moving cars, motorbikes, drones, helicopters and can be body mounted. The Smart telecaster range utilises 3G/4G mobile cellular and/or WiFi networks to stream. They are the ideal solution in a crisis situation, and can live stream to a command center anywhere in the world with very little latency. Visit the website for more information or call to speak to an adviser. FURTHER INFORMATION

Tel: +31-20-301-2166 emea@solitonsys.com www.solitonsystems.com



Using data to prevent malicious activity

Mitigating against hostile vehicle attacks

Perception is a cyber security system from Chemring Technology Solutions, part of the defence group Chemring. Perception was developed in 2011 by Roke Manor Research as part of a project for DSTL, gaining huge amounts of attention as an effective way of identifying malicious activity using anomaly detection via a neural network. Perception has developed into a hugely capable tool that works alongside firewalls and endpoint security systems, behaviourally monitoring all network traffic in order to detect not only what is malicious, but also what is potentially vulnerable. Developed hand in hand with analysts, Perception provides a wealth of data alongside each alert so the causes of the issue can be diagnosed. This process of closing vulnerabilities as they arise allows a network to remain secure as it changes and grows. Available as either a selfmonitored solution for customers

Trained by the Centre for the Protection of National Infrastructure, Optimise Asset Protection is a specialist in Hostile Vehicle Mitigation (HVM) design strategies and counter-terrorist measures. Optimise Asset Protection has developed a unique Vehicle Dynamics Assessment (VDA) process intended to optimise HVM measures and safety in any environment. Europe has been subjected to a series of devastating vehicle-borne attacks motivated by terrorists. With such an escalating threat, the vital threat assessment and mitigation analysis enables the development of a security design which is both appropriate and ensures value for money. It provides clients with a design that is not over-or under-engineered, and is appropriate for the threat and environment. Every assessment is site specific, determines maximum speeds and attack profiles using known vehicle capabilities. Combined with a

who have analysis teams, or as a serviced solution utilising Chemring’s own analysis team, Perception is suitable for both small businesses and multi-national corporations. The system is completely passive, adding no performance overhead to a network, nor can it be identified by external probing. Installation is straightforward, requiring only a SPAN port or network tap, a typical installation will only take 10 minutes. Chemring currently offers a 30 day free trial for Perception. FURTHER INFORMATION

Tel: 01794833000 www.perceptioncy bersecurity.com

Critical Asset Assessment, Optimise puts the right mitigation measures in the right places and works with clients to spend every pound wisely. Optimise Asset Protection values its independence and advises its clients objectively. Optimise only recommends what is best for its clients both technically and commercially. Its highly-experienced specialists support its clients through every step of the process whilst future proofing their environment. FURTHER INFORMATION

Tel: 07825789789 mark.cavies@ optimiseassetprotection.com www.optimiseasset protection.com





Since 2001, SecuLution works according to the ‘whitelisting’ principle, and thus effectively and reliably protects Windows-based business networks against malicious software. The company started in Germany and is today one of the leading providers of whitelisting security software worldwide. A virus scanner defines what should be prohibited (blacklist) and only blocks known malicious software. Thus, every unknown application is allowed. SecuLution does exactly the opposite; what is necessary for work is defined (whitelist). Anything else that is not explicitly classified as ‘allowed’, will not be executed. This means that malware software is – by default – classified

As a leading specialist in information and cyber security, AgilityIS provides pragmatic solutions focused on the real needs of its clients. The company’s penetration testing, phishing mitigation, assurance and advisory services will help secure your future. Compounded by human behaviour and increasingly connected technology, criminal ingenuity is advancing at an alarming rate. It is now commonplace to consider when, not if, an incident will occur. Working with organisations of all sizes in all sectors, Agility has compiled a suite of services and solutions that make a real difference. The organisation has particularly strong capabilities in web application, mobile and infrastructure penetration testing, social engineering awareness training, ISO 27001 compliance, a best in class phishing mitigation solution and a virtual CISO service.

Protecting your computer A trusted partner for full from malicious software security assurance

as ‘unknown’ and as a result cannot be executed. Code that cannot be executed cannot cause any damage. SecuLution is therefore more than just an antivirus product. It is a modern endpoint security solution and finely structured rights management that does a lot more than just protect the computer from malware. Key features include: application whitelisting; device (USB) whitelisting; device encryption; integrated agent software distribution; and cloud-based whitelist auditing service. FURTHER INFORMATION

Tel: 0161 7381 420 www.seculution.co.uk

Agility can help to reduce your risk by identifying vulnerabilities, raising employee awareness, improving practices and encouraging standards compliance while establishing incident response plans to minimise the impact. Agility is committed to excellent customer service, delivering high value with integrity through its exceptional staff. Working in close collaboration with your team, and to internationally recognised professional standards, the company’s security professionals provides you with the independent expertise and deep skills you need, as you need them. FURTHER INFORMATION

Tel: 0113 322 9264 https://agilityis.uk/


The publishers accept no responsibility for errors or omissions in this free service Adani Systems Agility IS Airborne Industries ATG Access Betafence Broden Media Cambridge UAV Academy Carillion Communications CDSL-DWP Chemring CPM Group De La Rue Holdings Eagle Automation Systems Emergency Response Driver Ex-Mil Recruitment Exoskel Group FalTech Felix Fund FLIR Systems Garran Lockers Genetec Getac GMK Heald Hesco Bastion Hill&Smith Informa


48 94 IFC 29 32 78 44 34 76 93 31 IBC 33 91 70 62 78 92 BC, 42 72 38 86 88 30 82 28 4

Inspectahire Instruments Kinesence KNect 365 L3 Security and Detection Landua Mercian Labels Netsparker Niagara Networks Nocturna Optimise Asset Protection Ordnance Test Solutions PGI Cyber Red Tulip Systems Reveal Media Rheinmetall Air Defence SecuLution SeeQuestor Smiths Detection South Midlands Sysco Technical Solutions Task Force Distribution The Will-Burt Company TMD Technologies TSP Projects Ubitech Visor Systems


44 10 12 36 74 6 20 20 84 93 91 14 58 73 40 94 8 19 90 24 60 52 66 26 16 53

De La Rue is a leading provider of sophisticated products, services and solutions that help keep the world’s nations, economies and populations secure. At De La Rue, we provide governments and commercial organisations with the products and services that enable countries to trade, companies to sell, economies to grow and people to move securely around an ever-more connected world. With a 200 year heritage, we work to the highest ethical standards and stand firm in the fight against counterfeit and fraud. www.delarue.com

Fido X2 Ultra-Lightweight Explosives Trace Detector

ÈĔ®»–݆‚ŏ–¿Ä»–|ÈÄ®»ŏ–¨ŏX0 Southern Scientific Limitedŏ Phone: +44 1273 497600 Email: info@southernscientific.co.uk

Profile for PSI  Media

Counter Terror Business 31  

Delivering Key Strategies to Combat Terrorism

Counter Terror Business 31  

Delivering Key Strategies to Combat Terrorism

Profile for psi-media