Page 1

www.counterterrorbusiness.com | ISSUE 34

CBRNE

BAPCO

DATA SECURITY

EVENT SECURITY

CLEAR SECURITY FOR A CROWDED PLACE How can events prepare for a possible terrorist attack?

TRAINING

TRAINING FOR THE DIGITAL THREAT

Assessing the interactive ACTÂ Awareness e-Learning course The inaugural Counter Terror Awards took place on 6 March. Read the review starting on page 43


TAKE FAST, DECISIVE ACTION

FLIR Fido X-Series handheld explosives trace detectors (ETDs) help responders interdict explosives threats in critical security applications. They detect a broad range of threats with best-in-class sensitivity and deliver actionable intelligence within 10 seconds. Screen with confidence using the Fido X2 and Fido X3 ETDs.

TO LEARN MORE GO TO FLIR.COM/EXPLOSIVESGUIDEBOOK FLIR.EU/EXPLOSIVESGUIDEBOOK

What to know before your team goes in. Download the guidebook now!


COMMENT

COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 34

CBRNE

BAPCO

DATA SECURITY

EVENT SECURITY

CLEAR SECURITY FOR A CROWDED PLACE How can events prepare for a possible terrorist attack?

TRAINING

TRAINING FOR THE DIGITAL THREAT

Assessing the interactive ACT Awareness e-Learning course The inaugural Counter Terror Awards took place on 6 March. Read the review starting on page 43

SECURING SPECTATORS AT MAJOR EVENTS New research has revealed that 57 per cent of British residents want to see tougher public security put in place ahead of major outdoor summer events. Perhaps this year more than ever, the level of security at this summer’s major events will be very much under the microscope. British Transport Police are preparing security for more than 100,000 people travelling to the Royal Wedding on 19 May, including specialist firearms units at key railway stations. Following a surge in attacks last year, including the Manchester Arena attack which happened a year ago this month, 36 per cent of the public have expressed a desire to see more armed officers patrolling busy areas, while 44 per cent of people said that they would like to see more visible security, such as bollards and barriers, in place. As well as the Royal Wedding, this summer also sees the FIFA World Cup taking place in Russia from 14 June to 15 July, and, given Russian supporters’ antics at the European Championships two years ago, it will be interesting to see the importance given to crowd management and whether European security services can organise and maintain a safe, incident-free event.

Follow and interact with us on Twitter: @CTBNews

I encourage you to read our article on event security on page 18, where Beverley Griffiths, of the Emergency Planning College, looks at risk mitigation for any emergency, including a terrorist attack in a crowded place. Michael Lyons, editor

ONLINE // IN PRINT // MOBILE // FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £100 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, fax: 020 8532 0066.

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITOR Michael Lyons PRODUCTION EDITOR Richard Gooding PRODUCTION DESIGN Jo Golding PRODUCTION CONTROL Ella Sawtell WEB PRODUCTION Victoria Casey BUSINESS DEVELOPMENT MANAGER Martin Freedman ADMINISTRATION Vickie Hopkins, Bella Chapman PUBLICATIONS SUPERVISOR Jake Deadman REPRODUCTION & PRINT Argent Media

Counter Terror Business would like to thank the following organisations for their support:

The Professional Publishers Association Member

© 2018 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 2399-4533

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

3


CONTENTS

CONTENTS CTB 34 11 DATA SECURITY ISSA-UK members have collaborated and delved straight to the heart of GDPR to identify the five hidden articles relating to technology. This will help you form a pragmatic approach to the cyber security of personal data. Andy Burston explains why

18 EVENT SECURITY Securing the UK’s large events is imperative in ensuring that spectators remain safe and incidents are dealth with effectively. With the 2018 FIFA World Cup taking place in Russia from 14 June to 15 July 2018, how can organisations best prepare against terrorist attacks?

23 PERIMETER SECURITY On behalf of the Perimeter Security Suppliers Association, James Myatt discusses how perimeter security products can help event and festival organisers protect crowds of people from the threat of vehicle attacks, after several attacks of a similar nature last year

28 PANEL OF EXPERTS In our second communications Panel of Experts, Jackson White, Richard Russell and Simon Hill contribute towards an analysis of how organisations can be sure of a secure and reliable communications service when network coverage runs out or is disrupted by a terrorist attack

32 PANEL OF EXPERTS With the help of our new IT-focused Panel of Experts, Counter Terror Business analyses the potential benefits cloud technology can offer to forces at the front line and the potential obstacles the technology may face, both in terms of security and adoption

37 SECURITY & COUNTER TERROR EXPO Accommodating over 10,000 visitors and 71 international delegations, March’s Security & Counter Terror Expo was the most successful iteration of the show to date. Counter Terror Business recounts its success, including the key seminars

43 COUNTER TERROR AWARDS The winners of the first Counter Terror Awards were announced on 6 March, recognising organisations and individuals from the UK and overseas in ten categories for their contribution to reducing the threat from global terrorism. Here we list the inaugural winners

56 CBRNE Following the nerve agent attack on a former Russian spy in Salisbury at the start of March, Dr Rico Chandra examines the requirement for a network of radiation detection systems to counter the growing fear that terrorists could develop a ‘dirty bomb’

60 TRAINING Counter Terrorism Police have joined forces with High Street retailer Marks & Spencer to develop a pioneering programme to train over a million crowded places workers. The organisation discuss the launch of the ACT Awareness eLearning

Counter Terror Business magazine // www.counterterrorbusiness.com ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

5


CTB NEWS ROYAL WEDDING

FIREARMS

Specialist firearms to be in use for Royal Wedding British Transport Police is preparing security for more than 100,000 people travelling to the Royal Wedding on 19 May, including specialist firearms units at key railway stations. As well as specialist firearms units at key stations, including those in London and both Windsor stations, there will also be both visible and covert officers across the transport network, as well as behavioural detection officers and police dogs at key stations, who will be able to respond to incidents on the rail network. Ch Supt John Conaghan said: “After months of planning, we’re looking forward to ensuring the safe travel of

thousands of people into Windsor, and then home again, on 19 May. Officers will be highly visible at stations throughout London and the South East and will be on hand to offer help to anyone who needs it. We’ve worked closely with our partners at other police forces, local authorities and train companies to ensure that we can respond quickly and decisively to any incident – whatever it may be.”

READ MORE

tinyurl.com/y8hqwjvu

EVENT SECURITY

Tougher security sought for summer events New research has shown that 57 per cent of British residents want to see tougher public security put in place ahead of major outdoor summer events. With the Royal Wedding date fast approaching, the ATG Access survey of 1,000 people highlighted public support for more security guards to safeguard public spaces, with 36 per cent wanting to see more armed officers patrolling busy areas following the surge of terror attacks last year. The research also showed that 44 per cent of people said that they would like to see visible security, such as bollards and barriers, with

39 per cent suggesting that they would be more at ease with visible emergency services on site, such as paramedics. Despite the heightened anxiety following attacks throughout 2017, 50 per cent of those questioned said they won’t let recent terror attacks stop them from enjoying organised summer events. Furthermore, 47 per cent of those questioned remain positive about the impact of public events and celebrations.

READ MORE

tinyurl.com/ydghc7w2

POLICE

Police to get greater powers to fight terrorist attacks Documents leaked to The Sunday Times have claimed that police and security services are to get more powers to stop terror attacks at an earlier stage. Following a review of attacks in the UK, most notably in Manchester and London, the leaked papers say that a new anti-terror strategy suggests sharing information about suspects more widely. The necessary ‘step change’ in security work is a response to the fact that three of the five terrorist at the heart of the attacks last year were on the radar of security and intelligence services, but only one was under active MI5 investigation. The papers say that counter terrorism investigators will soon be able to warn other agencies about suspects being watched for extremist behaviour, notifying government departments,

councils and local police forces before the suspects are deemed dangerous enough to be placed under MI5 surveillance. This aids the plan’s intention to focus on ‘communities where the threat from terrorism and radicalisation is highest’, introducing longer prison terms for terror offences, as well as more intensive monitoring when people are released from jail.

READ MORE

tinyurl.com/y9h62rlh

Criminal ‘arms race’ making firearms more accessible to terrorists A new European Commission report has warned that a criminal ‘arms race’ in Europe is making the availability of high-powered, military grade firearms more easily obtainable to terrorists. Following attacks in France, Belgium, Germany, the UK and Sweden in the last few years, the European Commission survey said that long-standing barriers to obtaining firearms have broken down in light of technology advances, cross-border smuggling and the widespread reactivation of weapons previously rendered unusable to be sold to collectors. The report noted that the terrorists in the Paris 2015 attack used ‘primarily automatic AK-pattern assault rifles and handguns acquired from intra-European criminal sources’, causing vast numbers of casualties. Highlighting two worrying trends, firstly the ‘trickling-down’ of the possession and use of firearms to lower-level criminals and, secondly, the growing overlap between Islamic extremists and the criminal underworld, the report also expresses concern at the developing phenomenon of ‘gangster jihads’, a term for terrorists who have previously been convicted for petty or serious crimes.

READ MORE

tinyurl.com/ya3ohtrl

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

7


Do you need the last civilian technology to secure the low airspace above your critical infrastructures or outdoor events from malicious drones? Drone Detection Sys is your C-UAS expert to protect the 3rd dimension. For more info: www.drone-detection-sys.com Email: contact@drone-detection-sys.com Phone: +41 79 544 48 37


CTB NEWS PRIVATE SECTOR

CYBER SECURITY

Police launch counter terror campaign with retailers

Half of businesses suffered one cyber attack last year

The ACT Awareness e-Learning campaign will see police chiefs work with major retailers around the country teaching how to deal with atrocities. Consisting of an array of online videos, the campaign, developed alongside Marks & Spencer, will teach staff how to spot suspicious behaviour, as well as how to act if there is a bomb threat and the best way to respond to a mass shooting. ACT Awareness e-Learning will also be offered to employees of other major retailers including Tesco, Sainsbury’s and John Lewis. Speaking to The Mail on Sunday, Detective Chief Superintendent Scott

Wilson said: “All staff working in crowded places – not just those who have a security role – can follow the course and be in a stronger position to help protect themselves, colleagues and the public. “This package is the latest result of the growing collaboration between the police and the private sector. It is a result of us listening to our partners in business and industry, and trying to work alongside them to provide a resource which makes it easier for them and for us to deliver potentially lifesaving advice to people working in crowded places.”

New statistics have shown that 43 per cent of businesses and 19 per cent of charities suffered a cyber breach or attack in the past 12 months. With new data protection laws coming into force on 25 May, the concerning figures rise to 72 per cent for large businesses. According to the Department for Digital, Culture, Media & Sport, the financial cost of all attacks over the past 12 months cost the average large business £9,260, with some attacks costing significantly more. Large firms identified an average of 12 attacks a year and medium-sized firms an average of six attacks a year, according to the statistics. Accordingly, 74 per cent os businesses and 53 per cent of charities say cyber security is a high priority for their organisation’s senior management. In line with the government’s Data Protection Bill, the Information Commissioner’s Office will be given more power to defend consumer interests and issue higher fines to organisations, of up to £17 million or four per cent of global turnover for the most serious data breaches.

READ MORE

tinyurl.com/y7d8xshq

EXTREMISM

Second prison separation centre opens to tackle extremism

READ MORE

tinyurl.com/y97fmd3u

ISIS

EU, US and Canada in joint ISIS propaganda attack Law enforcement authorities from the European Union, Canada and the USA have launched a joint action against the ISIS propaganda machine in order to severely disrupt their propaganda flow. In a case which began at the end of 2015, the operation involved authorities from Belgium, Bulgaria, Canada, France, the Netherlands, Romania, the United Kingdom and the USA in a coordinated effort to hinder IS’s central capability to broadcast terrorist material for an undetermined period of time. The attack, which took place on 25 April, saw the UK’s Counter Terrorism Internet Referral Unit led in the referral process of top-level domain registrars abused by ISIS, meaning that the terrorist

cell’s capability to broadcast and publicise terrorist material has been compromised. Rob Wainwright, executive director of Europol, said: “With this ground-breaking operation we have punched a big hole in the capability of IS to spread propaganda online and radicalise young people in Europe. I applaud the determined and innovative work by Europol and its partners to target a major part of the international terrorist threat prevalent in Europe today.”

READ MORE

tinyurl.com/y7n3ocbj

A separation centre has opened at HMP Full Sutton in a bid to stamp out extremism. It will allow more offenders to be separated from the mainstream prisoner population to stop them being able to spread their extremist views. Furthermore, thousands of staff have received specialist training to spot signs of radicalisation, with every new prison officer enrolled on the programme and a new intelligence unit opened. These measures come following a 75 per cent increase in prisoners convicted of terrorism-related offences in the last three years and seven hundred prisoners considered a risk due to their extremist views. The new intelligence unit will boost the ability of prison officers to target those who present the greatest extremist threat. The centre at HMP Full Sutton is the second separation unit to open. The first opened at HMP Frankland in July 2017 and a third such facility is set to be in operation by the end of the year.

READ MORE

tinyurl.com/y76g6vs5

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

9


ADVERTISEMENT FEATURE

CRITICAL COMMUNICATIONS

TECHNOLOGY AS OUR DEFENCE AGAINST TERROR Advertisement feature

Security services are on constant alert as terror situations have become the norm. Here, Frequentis’ David Knight explains how its Shared Situational Awareness Framework delivers a common operational picture by merging multiple domains into one easy-to-use system There are a multitude of command and control systems (C2) in use today with varying levels of functionality. Often these systems cannot interact with each other, and when they do, they can only do so on a very basic level. This challenge is faced today by both Defence and locally-funded emergency services who procure their own independent systems. A common operational picture is fundamental to allowing real-time intelligence and tactical decision-making and in turn support the sharing of resources. THE SOLUTION The Frequentis framework is a group of shared situational awareness solutions that can be tailored to meet customer needs in a scalable and evolving system. When integrated with the Frequentis state-of-the-art communication systems, it provides a unique cross-domain command and control tool. This is not just a concept, but a solution in use today. The National Air Policing Centre (NAPC), currently operational in Germany, fuses numerous data sources from widely disparate military and civilian systems into a single, easy to use HMI that is coupled with a fully integrated secure communications system. This gives unheralded access to air/ground, ground/ ground landline and radio communications together with ‘click-to-dial’ functionality. In addition to customisation, the solution is layered on top of existing systems. It provides operators with real-time access to a wide range of data sources, providing intuitive interfaces and instantly accessible functions. SO HOW DOES IT WORK? Imagine this scenario. An aircraft is departing from London City Airport – a busy transport hub in the Royal Docks, just six nautical miles to the centre of London. Just after departure, the aircraft suffers a catastrophic bird strike. The captain declares a mayday and turns back toward the airfield for an emergency landing. Unfortunately, he doesn’t have the height or power to make the airfield and is forced to make the decision to ditch in the Thames (just like the Hudson River Incident).

10

Whenever an air emergency is declared in the UK, the air defence system is notified. In this example scenario, the air defence system would immediately liaise with civilian Air Traffic Control (ATC) counterparts to assess any potential threat and once evaluated, stand ready to provide support. All of this activity could be managed within the Frequentis Shared Situational Awareness Framework. The company has supported UK air defence for over twenty years, providing voice communications systems (VCS) for their static and mobile command and control systems. As the key supplier of VCS for the Ministry of Defence (MoD) Marshall programme, Frequentis is replacing analogue systems at 39 UK and three overseas locations with digital IP-based VCS. Advanced routing principles, dynamically adapted to the location and availability of roles in the networked system facilitate the transition from today’s platform and system-centric implementations toward a future network-centric concept with a focus on information sharing, common situational awareness and interoperability. Legacy interfaces are also included in this concept. EXPANDING THE RESPONSE With the incident occurring in the Thames, the Port of London Authority would activate its emergency protocols and begin directing vessels to the scene to commence the rescue operation. Frequentis also provides VCS support to nine Royal Navy locations – a 15-year contract that began in 2006 and since 2017 forms part of the Marshall project. With the potential for casualties, the fire and ambulance control centres will also activate their emergency protocols and start directing assets to the river, while the Metropolitan Police Control Centre initiates its emergency procedures and contingency plans. Furthermore, the railway system may be suspended, timetables altered or used to transport emergency services rapidly to and from the incident. The best way to manage any emergency is for all contributing emergency response services to work together to improve response

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

DAVID KNIGHT Global Sales Manager – Air Defence David is a former RAF Officer who spent over thirty years working in various operational roles as an Air Battle Manager as well as in various UK and NATO staff positions. Since 2016 he has been working with Frequentis engineers to further develop the Frequentis shared situational awareness solutions.

times and coordinate resource allocation. By sharing information across the entire national network, linking assets and communicating in real time, the Frequentis solution ensures that the seamless coordination of emergency services is possible. Operators can share elements of their picture with decision makers not collocated in the operations centre via the Frequentis Mobile Client. This unique capability allows secure transfer of real-time information to dedicated tablets or laptops that have the mobile client app installed. All of this information is supported by online or stored databases, standard or bespoke workflows and a fully integrated state-of-the-art communications system with ‘click-to-dial’ functionality that can access all radios, landlines and mobiles. Importantly, everything is supported by legally-accredited recording that supports post-event analysis and training. Air policing, joint operations, search and rescue, drone detection and cyber defence are just some of the typical use cases which benefit. !

FURTHER INFORMATION www.frequentis.com


DATA PAGE SECURITY FLAG

ISSA-UK members have collaborated and delved straight to the heart of GDPR to identify the five hidden articles relating to technology. This will help you form a pragmatic approach to the cyber security of personal data. Andy Burston explains how

HOW TO HACK CYBER SECURITY FOR GDPR IN THREE STEPS W hy attack people, property and premises when, with minimal programming knowledge, a little malice and a tool from the dark web paid for with untraceable crypto currency, attacks can be launched at any time and from any place, destroying public confidence, causing failure and attracting scrutiny. Personal information, records and data are the hot target for attackers, be they a determined hacker, the disgruntled employee or simply the user who inadvertently jeopardises security through ignorance. In all cases, data needs to be treated with the same care as money, goods and services. It has taken the advent of EU

General Data Protection Regulation (GDPR) to focus the mind on this for many.

CINDERELLA’S PUMPKIN PC Not since the Y2K ‘Millennium Bug’ have we seen a similar level of public interest as GDPR has created in the strength of UK systems. High profile events, such as the Wannacry ransomware in 2017, have occurred but the short-term media focus in that situation was on inadequate IT maintenance and poor response, not readiness. Rewind 19 years and Y2K was largely seen as a challenge for the IT department to resolve alone. Disappointingly for some media types, Cinderella’s PC running Windows 95 "

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

11


DO YOU KNOW THE TRUE IDENTITY OF YOUR CUSTOMERS?

Our AML check will confirm it in 5 seconds! Business checks take a little longer; 1-2 minutes! We use the very best quality data to deliver our AML identity check for a result you can rely on. Sanction & PEP screening is automatically included along with Daily Monitoring and Automated Enhanced Due Diligence all at no additional cost.

Call us now to book a free demonstration on:

0113 333 9835 Or visit us online:

POWERED BY

SMARTSEARCHUK.COM SmartSearch delivers UK and International Business checks in the UK and International Markets with inclusive Worldwide Sanction & PEP screening, Daily Monitoring, Email Alerts and Automated Enhanced Due Diligence.


DATA SECURITY # failed to transform into a pumpkin at midnight, the party went ahead and Y2K has subsequently been unfairly seen as something of a damp squib. The moment the Y2K threat passed the interest evaporated. This ignored the many checks and fixes deployed into older mainframe systems to ensure the availability of what then formed the backbone of many critical UK services. THE Y2K LESSON FOR GDPR GDPR is only a threat to those who choose to ignore it and the most valuable Y2K lesson is that ‘doing nothing’ is not an option. Organisations that see GDPR as a point in time to pass are relying on a similar ‘evaporation of interest’ to occur that won’t on this occasion. Those who simply add ‘GDPR compliance’ to the to-do list of the new Data Protection Officer (DPO) are making only a token effort to demonstrate adherence to the regulation. Those who have taken GDPR seriously have already adopted multi-departmental approaches that recognise the value of personal data to the business and operations. However, as with most multi-disciplinary strategies, the requirement for stakeholders and departments to collaborate and communicate as never before can be the root of solution complexity. For us in cyber security, knowing and agreeing where to start with data protection for IT systems and bringing others along with us, is one of the more challenging aspects. 99 GDPR ARTICLES BUT NO TECHNOLOGY The sheer weight of 99 articles, coupled with a fairly dull narrative, dissuades even the most avid reader. ISSA-UK members who have achieved this feat have made surprising findings when it comes to requirements for IT and cyber security. The first is that very little GDPR text and few articles directly relate to the protection of personal data within IT systems. Aside from the mention of implementing ‘appropriate technical’ measures, the regulation mostly avoids technology. In fact, depending on your perspective and role within information and cyber security, only 19 articles relate to broader information security and management systems (e.g. an ISO 27001 compliant ISMS) and arguably only five truly shape cyber security. FIVE ESSENTIAL ARTICLES FOR CYBER OPS Before we consider the five articles, there is a quick and inescapable truth for IT and cyber security personnel, as well as those in the wider business. The accurate mapping of information assets containing personal data, to the systems where those assets are stored and processed is essential. If the business cannot identify the purpose for which

VERY LITTLE GDPR TEXT DIRECTLY RELATES TO THE PROTECTION OF PERSONAL DATA WITHIN IT SYSTEMS data is held, cyber security measures to protect information assets will likely fail. Following this mapping, the consideration of these five articles, the summaries and three key questions offered will help establish GDPR cyber readiness and continuity. ARTICLE 5 Requires the security and protection of data against unauthorised and unlawful access, data loss and the implementation of appropriate technical measures. It asks: have we identified the IT systems where information assets containing personal data are processed by our users? Can we identify IT privilege escalation to these systems? And, how do we identify attempts

of illegitimate privilege escalation to systems containing personal data (e.g. escalation sponsorship, Windows security group monitoring etc.)? ARTICLE 24 Requires implementation of technical measures to demonstrate that processing is performed in accordance with GDPR. It asks: how do we identify if data security policies (e.g. retention schedules, security classifications etc.) are respected and applied within IT systems? Can we retrieve the processing activity logs that will be required during an investigation? And, can we accurately report on the information risk profile change of personal data to risk owners and information asset owners? "

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

13


Recognize AND Analyze Is she an employee?

When, where did she enter?

How often was she here this month? Is she a known suspect?

Does she appear in videos recorded last week?

Premier face recognition technology for real-time video security and anonymous people analytics www.cognitec.com | info@cognitec.com

Securing National Infrastructure

• CONTAIN • PROTECT • SECURE LPCB GRP & Steel Enclosures Doors, Barsets, Cages and Covers For full listings please refer to red book live

14

01269 850437 • sales@morgan-marine.com • www.morgan-marine.com

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

How old is she?


DATA SECURITY # ARTICLE 32(2) Requires appropriate levels of security in order to prevent unlawful disclosure or loss, bearing in mind that some personal data is more ‘sensitive’ than others. It asks: can we identify where ‘sensitive personal data’ is processed within our systems (e.g. personal data relating to religious belief, ethnicity or sexual orientation)? Can we identify when personal data is exchanged or exported by the users of our systems (e.g. the connection and use of removable media)? And, do we make use of encryption (e.g. password protection of USBs and files)? ARTICLE 32(4) Describes a ‘natural person acting under the authority of the controller’, which translates to consideration of steps to protect against insider threats. It asks: can we identify our Privileged Users and their access to our systems? How do we enforce ‘least privilege’ within systems, providing users with only the information necessary to complete their operational duties? And, can we monitor and report on the modification (e.g. edit and deletion) of personal data records by users within systems and databases?

GDPR IS ONLY A THREAT TO THOSE WHO CHOOSE TO IGNORE IT AND THE MOST VALUABLE Y2K LESSON IS THAT ‘DOING NOTHING’ IS NOT AN OPTION ARTICLE 33 States the need to notify any breach within 72 hours of discovery with disclosure regarding the nature, size and scale of the breach. It asks: how easily can we identify the scale of a breach (e.g. the number of records lost)? How would we identify how many people are referenced within any lost data? And, how would we identify the different types of data affected? BEWARE THE ROAD TO GDPR COMPLIANCE Few can argue that organisations should not spend time factoring GDPR into business processes, training, inductions etc. However, our findings suggest that the cyber requirements do not need to be treated as yet another step or hurdle to cross (or fall over) along the same linear GDPR path once information asset mapping to systems has been completed. For cyber personnel charged with data protection responsibilities, there

are arguably only three strategic IT activities to absorb into existing cyber operations and run in parallel with wider GDPR objectives. THREE KEY ACTIVITIES FOR GDPR CYBER SECURITY Monitoring: The protective monitoring of information assets within systems to collect the evidence of data processing. This will require the use of Security Information and Event Management (SIEM) applications to harvest, analyse and store activity logs from personal data systems such as databases, file shares, emails etc. The best prepared organisations can identify how data is used and alert on security events as they occur. This includes the ability to monitor modification and deletion of data records and correlate this to the user account responsible and their network location. Detection and response: You can’t have one without the other. This is monitoring that delivers active security to detect the indicators of a breach or compromise and enable early intervention. This is a clear move away from any manually driven extraction and audit of system logs by an administrator – a risky data protection activity in itself. Look for security technologies or service providers that are able to detect and flag events that would otherwise be missed by the human analyst. Capability should include behaviour anomaly detection, as well as detection of the subtle tell-tale signs of cyber attack in progress hidden within communications and masses of network traffic. Demonstrating compliance: This is providing the risk owner with assurance that the risk profile associated with personal data within their systems is measurable, known and acceptable. This considers your information assets (definable sets of business data), the vulnerabilities posed (potential weaknesses) and the effectiveness of any controls to prevent the vulnerabilities from being exploited. As an added bonus for GDPR, the same evidence of routine assurance and risk visibility to risk owners, will prove extremely valuable should the ICO (the UK regulator) drop in. It will demonstrate a clear focus to deliver continuing data protection and information risk management even if you are unlucky enough to suffer a breach. !

FURTHER INFORMATION www.issa-uk.org

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

15


IMAGINE...

A NEXT GENERATION TRAUMA RESPONSE SYSTEM THAT WILL

SPORTS & ENTERTAINMENT VENUES

HELP YOU SAVE LIVES

...WE DID HOTELS & TOURISM

TRANSPORT HUBS

MALLS, SCHOOLS & LARGE CORPORATE BUILDINGS

A next generation trauma response system that could save hundreds of lives in the event of a Mass Casualty Incident (MCI). TyTek Medical introduce PTENSYS - A modular, customised system that will help you to act quickly to give life-saving care to your patrons until the emergency services can gain access. It is particularly effective in the platinum ten minutes that have been highlighted in recent medical research as the key time in which you can save lives. For further information or to talk to us about your PTENSYS requirements for your venues and events:

Call UK (+44) 1902 714943 Call US (+1) 513 247 2002 or visit tytekmedical.com/ptensys


ADVERTISEMENT ADVERTISEMENT FEATURE

EMERGENCY SERVICES

NEW TRAUMA RESPONSE SYSTEM WILL HELP TO SAVE LIVES A next generation trauma response system that could save hundreds of lives in the event of a Mass Casualty Incident (MCI) has been showcased at a series of defence and security events

Wolverhampton-based TyTek Group, a manufacturer of compact, pre-hospital emergency medical supplies, took two years to create PTENSYS, a system that helps transport hubs, events and sports stadia, shopping centres and large business spaces to quickly administer life-saving care to trauma victims in a mass casualty incident. Between 2007-2016 there were 112,342 terror attacks resulting in 524,229 casualties (the population of Sheffield) across the globe* not to mention those left with psychological conditions. TyTek developed PTENSYS to meet these emergency preparedness challenges head on. The company developed the customisable cabinets, equipped with modules of key medical equipment stored in kits that can be used to address the immediate life-threatening trauma injuries, including haemorrhaging, airway compromise, pneumothorax, burns and hypothermia. SPEED AND MOVEMENT The kits can be moved quickly to any safe point and each one folds out to provide innovative side-by-side working and their unique extendable floodlights will help visibility in smoky and badly lit environments. Chris Tyler, president of TyTek Industries, commented: “Recent medical research has revealed that there is a Platinum ten-minute period after a mass casualty incident…if you can react effectively in this time you will be able to save lives. The problem is many large venues, including train stations, airports and entertainment complexes, don’t have the necessary medical supplies, or as we have seen recently the procedures in place to deal with a scenario of this magnitude.” He continued: “PTENSYS immediately addresses these concerns. Each cabinet stores everything you would need to keep people alive after a MCI. We have an all-round kit, a burns kit and bleed control kits. Customers can mix and match these depending upon their requirements, but we carry out a full situation analysis and vulnerability assessment to ensure they have everything they need.”

PTENSYS was developed in partnership with the renowned Department of Emergency Medicine at the University of Cincinnati. In addition to speed of movement and ability to create multi-working platforms, the cabinets can be customised to feature state-of-the-art monitoring technology to ensure it is tamper proof and easily located through GPS software. Chris, who started the business in 2001, continued: “The idea for PTENSYS came from the work we do in conflict zones. It made sense to tailor it to non-military environments where civilians are experiencing military style injuries. The response has been incredible. “We don’t just provide the cabinet and the supplies, most of which need only the most basic of first aid training to apply. We work with the client to identify the most suitable system for them and then we can arrange on-site and VR training, ongoing support and flexible purchasing/leasing options. “In an ideal world you will never have to use PTENSYS. However, what it does give you is complete peace of mind and a risk mitigation strategy, knowing that should a life-threatening incident occur, everything is on-site to ensure the platinum ten minutes in pre-hospital trauma care is maximized until the emergency services are allowed to gain access to the situation.” SPORTS AND MUSIC VENUES: Huge gatherings in sports and entertainment spaces take place daily. Sadly, we read about incidents right across the globe where fatalities and injuries have brought a stark conclusion to what should have been an enjoyable way to spend leisure time. Being prepared for situations like these, that can affect hundreds or even thousands of people is absolutely critical. TRANSPORT HUBS: Defibrillators are placed in transport hubs as standard. With attacks on train networks, airports and the streets we walk on every day, the inclusion of PTENSYS at these sites should be equally valid. Especially as it is easily accessible and contains everything

you need to keep people alive in those crucial first ten minutes after an attack. HOTELS AND TOURISM: Atrocities particularly in the USA, North Africa and the Middle East have caused injuries and loss of life leading to a collapse in public confidence in terms of tourism. We understand that the safety of guests is of paramount importance and emergency preparedness of this nature will save lives. MALLS, SCHOOLS AND LARGE CORPORATE BUILDINGS: When the very fabric of society can be penetrated, as we have seen with the Houses of Parliament in the UK, high dchools in the US and recently at YouTube HQ, for instance, we know that something significant needs to change. Safety in numbers is something we take for granted, but more than ever it is being compromised at times of work and play. !

*Source: https://www.statista.com/ topics/2267/terrorism/

FURTHER INFORMATION www.tytekmedical.com +44 1902 714943

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

17


EVENT SECURITY

CROWDED PLACES Securing the UK’s large events, such as concerts, festivals and sports matches, is imperative to ensuring that events run smoothly, spectators remain safe and any incidents are dealt with quickly and effectively. With the 2018 FIFA World Cup taking place in Russia from 14 June to 15 July 2018, how significant is security risk management for public spaces together with crowd management and how can organisations best prepare against terrorist attacks?

HOW CAN EVENTS BEST PREPARE AGAINST TERRORIST ATTACKS? T he threat of terrorist attacks in crowded places is currently at ‘severe’ which means that an attack is highly likely. With the 2018 FIFA World cup taking place in Russia, we will have a mix of crowded places, an iconic event, football fans, international political turmoil and, of course, the terrorist threat. It would be inconceivable that anywhere intending to host an event or screening should not be getting prepared for the highest security level of risks and responses. With the risks faced in the world today, it has never been more imperative to ensure that security, safety and service elements of risk management are brought together.

18

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

Public spaces have numerous users and stakeholders. Many of those stakeholders have individual plans for their own organisation, but may not have thought beyond their boundaries before. Users come with their own expectations, perceptions and needs. Adding an event into the adjoining public space can change everything. How then can event managers ensure they are not only working with their suppliers and stakeholders, but also widening this to include these new boundary stakeholders and users? Security risk management is high on the agenda for the reasons we have illustrated. The problem we face, and have seen "


ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

19


EVENT SECURITY # evidence of, is it is taken as a risk in isolation. This can affect the safety measures in place for other risks which are often more likely than, and just as consequential as, a terrorist attack. There is also evidence that planning for today’s increased threat level does not include the necessary increase in resources to match the level of threat. HOW CAN ORGANISATIONS BEST PREPARE AGAINST TERRORIST ATTACKS? The first step is to carry out the risk assessment of the site or venue. Consider reasons for specific increases, such as: content of the programme – is it

THERE ARE MANY LAYERS TO RISK MITIGATION FOR ANY EMERGENCY INCLUDING A TERRORIST ATTACK IN CROWDED PLACE contentious? Will it affect audience behaviours?; the audience, including profile and expectation of behaviour challenges; the location – what is in the footprint? Are there vulnerable areas? Assess the community impact assessment, transport hubs and physical security requirements; soft

20

phases – phases of event have differing requirements and behavioural traits of audience. This will include search and screening; and the strengths and weaknesses of the venue – defined by each venue and location. Proportionality must be borne in mind at all times – the test of reasonableness. The concept of absolute security is impossible to achieve in such a dynamic situation. By its very nature, an event location should be friendly and welcoming. So a balance must be struck. Identify a range of practical protective security measures appropriate for each response level. Once the risk mitigation measures have been agreed, ensure it is not affecting another risk mitigation measure. Sometimes this is easier said than done. Remember that there are phases to an event, and not just within the site boundary, which need to be assessed with the risks as a part of risk management. These phases have different environments and the audience can behave differently. Each has its own specific risks which must be assessed to ensure appropriate levels of resource and communication, and to ensure effective management and response should an incident occur. These phases are: arrival (transport, car parks, walk-up); assembly (site outer boundary preparing to queue and queuing); ingress (search, door widths, barriers to free flow);

experience (movement around site, facilities); egress; and dispersal. Work with your local Counter Terrorism Security Advisor (CTSA) to consider the different attack types and in the different phases. Attack types such as Improvised Explosive Devices (IED); weapons attack; unmanned aircraft systems; Chemical Biological Radioactive (CBR) (as with Salisbury incident or acid attacks) to work on possible protective measures. These phases can be used to assess and reassess. You can build a response and requirements plan for a normal event, or indeed, an emergency. This will offer you a greater understanding of the resource needs and deficiencies, communications and partnership areas. This is a model which is a part of the Emergency Planning College’s Analysis, Predication & Response (APR) model used to assess event/crowd management risk and give planning assumptions for crowded places. Verify that your organisation’s policies and procedures are formulated to the risks you identify. For example, check your housekeeping is included, ensuring checking (regular sweeps), first aid kits and response, maintenance, security of staff doors and identification/security at entry points is always maintained. Is there a ‘how to deal with suspicious items’ procedure? Have you got staff vetting policy included in your subcontractors and temporary staff policies/contracts? You need to set


EVENT SECURITY time aside to regularly review your planning assumptions and threat levels with stakeholders in order to adapt to sudden changes. Make sure you have good communications plans, including signage, social media, links to advice, pre-prepared response messages, latest advice on threat levels and expectations. Help them to help themselves! Regularly train, test and exercise. Your staff are your front line protection and response. As with the Manchester attacks and highlighted in Lord Kerslake Report: ‘operators of all key/iconic sites should be actively encouraged and enabled to participate in Local Resilience Forum planning, training and exercising’. RISK MITIGATION LAYERS Vigilance of public and staff is a good first line of defence. But there are many layers to risk mitigation for any emergency including a terrorist attack in a crowded place. Security staff must be vetted, trained and regularly briefed. Current SIA training is not enough, when we consider what we ask of them. However, there are many security staff not in need of SIA and these have just as important roles, for instance, car park officers and cleaners. There needs to be training in vigilance, communication of venue/organisation systems and process, knowledge of the venue and local area, response and recovery plans and their roles within the plan for different scenarios. They

WITH THE RISKS FACED IN THE WORLD TODAY, IT HAS NEVER BEEN MORE IMPERATIVE TO ENSURE THAT SECURITY, SAFETY AND SERVICE ELEMENTS OF RISK MANAGEMENT ARE BROUGHT TOGETHER must have knowledge of resources and their location at their disposal. It is worth noting that good business continuity management within the organisation will ensure that there is good risk management. It will give a structured approach to looking at logistics and supply chain continuity and, of course, response plans for the organisation’s requirements, including their crisis management plans. There should be a strong link between the organisation’s response plan and that of the public emergency services multi-agency and single agency plans. There must be an agreed protocol for handing over primacy and handing back. Plans must go beyond the initial response into the longer term humanitarian support and recovery. As we have seen, the effects of any emergency on anyone involved individually or as an organisation can have long lasting effects which needs a good plan for supporting this long phase of recovery. Good business continuity will support critical activities required to keep going, where support can be given to staff in need of time and support

to recover themselves. Anniversary memorials have always been a part of the recovery phase. However, we are now seeing a more supportive act to raise funds and show a defiant stance against terrorist acts by holding a benefit event, such as the Manchester Arena supportive memorial ‘One Love’ concert. In today’s uncertain world, it is a must for any organisation to ensure they are effectively managing the risks they face. This means ensuring they are up-to-date with the latest credible information. They must work in partnership and not have a silo mentality. We do not respond alone. We are cognisant of the threats faced from internal or external means. We must have effective, reasonable and appropriate mitigation; business continuity; response and recovery plans; and resources. Finally, remember that staff training and briefings must be at the forefront of any plan you have, as they are the very first line of the defence. !

FURTHER INFORMATION www.epcresilience.com

21


Complete perimeter protection solutions under one roof Heras designs, manufactures, supplies, installs and services complete perimeter protection solutions across the UK.

Demarcation

Entrance control

Detection

Effective perimeter protection With the inclusion of Geoquip (detection) and product category Broughton (entrance control) directly under the Heras brand name, the offer is clear: 1. Complete perimeter protection solutions including: demarcation, entrance controls and detection product categories 2. Enhanced service and maintenance protection 3. SigniďŹ cantly improve perimeter protection project and integration support

heras.co.uk Experts in perimeter protection


PERIMETER SECURITY

James Myatt discusses how perimeter security products can help event and festival organisers protect crowds of people from the threat of vehicle attacks

VEHICLE DEFENCES DESIGNED TO PROTECT PEOPLE T he threat of vehicles being used as weapons on crowds in public spaces and at outdoor events is sadly an increasing global risk. The recent vehicle as a weapon (VAW) attacks involving killing innocents and disrupting public order is no longer the

preserve of Middle Eastern war zones. This has been sadly demonstrated in London, Charlottesville, Melbourne and Toronto. Following this spate of horrific UK terror attacks targeting major events and public crowds using VAW’s, there is concern that the public may be more hesitant about attending "

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

23


Redi-Rock Vehicle Security Barriers (VSB) ...The vehicle security system that protects from vehicle impact

Retaining Walls

To see the VSB in action Scan the QR Code

Utility / Critical Infrastructure Buildings of High Importance Military Facilities Crowded Places Civil / Nuclear Installations Transport Hubs

1066kg

T: 01179 814500 F: 01179 814511 E: sales@cpm-group.com www.redi-rock.com www.cpm-group.com

Fast to install Lego™ like system security blocks Removable / Relocatable No ground anchor - uses its own weight. Integral cable dissipates kinetic energy Proven to stop a 7.5 Tonne truck at 48 km/h (30mph) Aesthetically pleasing, with the look of natural stone Can be coloured to blend with local environment

Concrete for Life


PERIMETER SECURITY # popular events they would ordinarily attend, creating a climate of fear. In response to this, many event and festival organisers are looking at ways to ensure their attendees feel safe. Purpose built temporary perimeter protection provides the security many are looking for. Many members of the Perimeter Security Suppliers Association have created products specifically designed to protect pedestrians whilst allowing the free movement of people at the event. COUNTER TERROR SENTRY BLOCK Temporary protection has two purposes. Firstly, it acts as a visible deterrent to prevent terror attacks – fortifying the perimeter of event spaces to deter terrorists and make the public feel safe and confident in their attendance. Next, the 2.2 tonne Counter Terror Sentry Block, produced by Townscape, is a temporary, rapidly deployable version of the highly successful PAS 68-rated counter terror block. These counter terror blocks are daisy chained together with 1,200mm pedestrian crossing points between blocks. The system can also incorporate secure vehicle access points as required, so that if there is a need for vehicles to be entering and leaving the site, this will not be a problem. With the wide range of options available to organisers, choosing the right solution is no easy task. With this in mind, PSSA member companies provide an advisory service to assess the specific needs of a particular event, including location, access points, the perimeter and expected attendance numbers. Then, the most suitable products can be selected.

SHORT-TERM POP-UP EVENTS ALL HAVE A NEED FOR TEMPORARY PERIMETER SECURITY THAT PROTECTS AGAINST THE THREAT OF VEHICLE-BORNE TERRORISM SHORT TERM EVENTS Short-term pop-up events such as festivals, fairs, fetes, concerts and carnivals all have a need for temporary perimeter security that puts attendees at ease and protects against the threat of vehicle borne terrorism. Temporary solutions can be delivered at late notice with an expert overseeing the whole process until the product is removed – leaving organisers free to focus on what they do best – putting on a good show. PROJECT: JALSA SALANA In July 2017, Oaklands Farm near Alton, Hampshire, hosted Jalsa Salana – an annual event for Ahmadiyya Muslims. The event, which is in its 51st year, attracted people from over

100 countries, with an attendance of about 37,000 – one of the biggest Muslim festivals in the UK. As part of the security measures put in place for the event, which included armed guards and bag checks, PSSA member Townscape was asked to deliver a robust and effective security installation to fortify the perimeter of the event to deter and mitigate the impact of potential vehicle-borne attacks. Townscape carried out a comprehensive security inspection of the event site and its surrounding area. Once vulnerable access points where identified, Townscape provided deployable CT Sentry Blocks, which were positioned on the perimeter of the festival. CT Sentry Blocks were chosen to defend the event

as they act as both a physical and visual deterrent to prevent VAW attacks. The CT Sentry Blocks were fitted on flat surfaces along with stepped level ground. The two concrete CT Sentry Blocks were then chain-linked to provide further protection. The installation of Townscape’s temporary event perimeter security system ensured effective defence was put in place to protect those attending the event. The CT Sentry Blocks deployed at the event were painted with high visibility black and yellow hazard lines to ward off any hostile attacks. The blocks were a huge success and the event ran smoothly. A representative from Townscape was on hand on the day to oversee the whole process and "

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

25


Strategic Partner:

In Partnership With:

17th-19th July 2018 Sarawak, Malaysia www.cip-asia.com

Developing resilient infrastructure for a secure future

Register Today The 3rd Critical Infrastructure Protection and Resilience Asia will bring together leading stakeholders from industry, operators, agencies and governments to collaborate on securing Asia. Southeast Asia has seen a rise in insurgency-related attacks and terrorist activities, creating uncertainty and insecurity on critical national infrastructure. Climate change has also seen more extreme weather patterns, creating additional hazardous, unseasonal and unpredictable conditions and a severe strain on infrastructure. The conference will look at developing existing national or international legal and technical frameworks, integrating good risk management, strategic planning and implementation. Be part of the discussion - and solution!

Register online at www.cip-asia.com

Gain access to leading decision makers from corporate and government establishments tasked with Critical Infrastructure Protection and Resilience. Owned & Organised by:

Media Partners:

Supporting Organisations:

Latest Confirmed Speakers include: – Ir. Md Shah Nuri Md Zain, Chief Executive, National Cyber Security Agency (NACSA), Malaysia – Dato Dr Chai Khin Chung, Director, State Security Unit, Sarawak, Malaysia – Franz-Josef Schneiders, Head of Division, Federal Ministry of Transport and Digital Infrastructure, Germany – Oliver Carlos G. Odulio, VP, Head of Asset Protection & Risk Management, PLDT Inc, Philippines – Elli Pagourtzi, Project Manager, Security for Security Studies (KEMEA), Hellenic Ministry of Interior, Greece – Bill Hutchison, Honorary Professor, Security Research Institute, Edith Cowan University, Australia – Dato’ Dr. Haji Amirudin Bin Abdul Wahab, Chief Executive Officer, CyberSecurity Malaysia – Bill Bailey, Regional Director Australasia, International Association of CIP Professionals (IACIPP), Australia – Nur Iylia Roslan, Researcher, Cybersecurity Malaysia – Senior Representative, Cyber Security Centre, Universiti Pertahanan Nasional Malaysia – Senior Representative, Sarawak Energy, Malaysia – Norhamadi bin Ja’affar, Senior Executive, CyberSecurity Malaysia For full conference programme visit www.cip-asia.com


PERIMETER SECURITY # once the event was over, the CT Sentry Blocks were removed effectively. The challenge that event organisers face in protecting soft targets today is considerable. However, perimeter security solutions are easy to adopt and give the public, the organisers and the police the reassurance that events are adequately protected against vehicles as a weapon attacks. PROJECT: RENAISSANCE HOTEL The historic St. Pancras, Renaissance hotel is an iconic London building steeped in history, forming the frontpiece of St Pancras railway station. The iconic status of the Renaissance hotel building, which is listed and holds Grade 1 status, elevated the infrastructures threat profile and under advice from a Counter Terror Security Advisor, the hotel approached PSSA member ATG Access to explore perimeter security options. Three main areas surrounding the iconic St Pancras estate needed an aesthetically sympathetic physical security design. Firstly, the Grade I listed hotel frontage, the connecting pedestrian access between the hotel and St Pancras Station and the station itself. To secure the entrance to the hotel, shallow foundation, impact tested bollards were chosen, as they are very quick to install and the disruption caused by the installation would be minimal, limiting inconvenience for the hotel and

THE THREAT OF VEHICLES BEING USED AS WEAPONS ON CROWDS IN PUBLIC SPACES AND AT OUTDOOR EVENTS IS SADLY AN INCREASING GLOBAL RISK guests. Before the product design was finalised, ATG worked with the project’s lead architect to produce a number of sample sleeve designs, in keeping with the hotels architecture and history. The stairs which form part of the pedestrian walkway required a level of protection to ensure continuity and the removal of any perimeter vulnerabilities. The same bollard design was used to protect the steps. Bespoke handrails were also added to connect the bollards and ensure pedestrian safety. The entrance to St. Pancras station itself is very different to that of the hotel. The station entrance has been designed to be modern with a huge glass building façade and overlooks the very modern King’s Cross Square development which consists of a large, landscaped space with bars and restaurants. The security chosen for this area of the site needed to be in-keeping with the different approach to design. The architect decided to commission impact tested bollards with a shallow foundation and stainless steel design to compliment this different style of building design. Shallow foundation bollards had to

be specified again within this area because the London Underground ticket hall ceiling sits just 300 mm below ground level. This meant that the bollards needed to be installed within the 300mm suspended slab foundation. The entire St Pancras hotel and station complex all benefited from architecturally-sympathetic security measures. The surrounding area now has a holistic, high security design and installation which protects the urban area against attack and accidental vehicle impact. !

James Myatt is executive chairman at Townscape Products, a PSSA member. The PSSA is the trade association for companies involved in the supply and installation of products designed to provide high levels of physical protection and intruder detection for sites and their external perimeters in all circumstances where terrorist or criminal attack is a perceived risk.

FURTHER INFORMATION www.pssasecurity.org

FRONTIER PITTS Protecting Your World

+44 (0)1293 422800

www.frontierpitts.com

GATES

BARRIERS

BLOCKERS

BOLLARDS

PEDESTRIAN

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

27


PANEL OF EXPERTS

PANEL OF EXPERTS In our second communications Panel of Experts, Jackson White, Richard Russell and Simon Hill contribute towards an analysis of how organisations can be sure of a secure and reliable communications service

NETWORK RELIABILITY IN CRITICAL COMMS JACKSON WHITE, GETAC UK

RICHARD RUSSELL, ROADPHONE NRB

SIMON HILL, EXCELERATE GROUP

Jackson White is business development director at Getac UK where he is responsible for growing the organisation’s defence, security and first responder customer base.

In 2017, Richard Russell joined Roadphone NRB as BDM to grow their Endurance Technology® portfolio for CNI, corporate and high value facilities.

Simon Hill is an experienced technical director at Excelerate Technology Ltd, with a demonstrated history of working in the telecommunications industry.

After joining the Royal Corps of Signals at 16, where he looked after general communication systems, Jackson supported Special Forces operations for 10 years. He then moved into the corporate world where he oversaw future technologies and innovation for video surveillance and communications systems organisations.

Richard’s telecoms career spans 36 years, including 25 years at Motorola, gaining expertise of MPT1327, DMR, TETRA and LTE. He has experience of service organisation and EMEA product management, and was a Global Business Development and EMEA Go-To-Market product specialist. He is also an advisor to many partners across Europe of multi million dollar awards.

peaking at the 2017 iteration of the Emergency Services Show, Luana Avagliano, head of Resilience Direct at the UK Cabinet Office, highlighted the importance of collaboration, partnership working and using digital tools effectively in order to be able to respond quickly to emergency scenarios. Those on the frontline of public safety rely on mobile connectivity to enable mission critical communications between responding resources, control rooms and other emergency crews. As our panellists are quick to point out, when a crisis

situation occurs, whether that be an event similar to the Grenfell Tower fire or a terrorist attack, congestion on mobile networks often means vital communication is reduced, delayed or cut off completely, resulting in additional risk to life and infrastructure. Added to this concern is a possible vacuum in the transition between Airwave and the Emergency Services Network (ESN). The Emergency Services Mobile Communication Programme (ESMCP) is reportedly 15 months behind schedule in delivering the 4G-based ESN. The project, which

S

28

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

Simon is skilled in service delivery, technical support, mobile communications, Radio Frequency (RF) and VSAT.

is based on a network provided by EE, has already been delayed twice, casting doubt on whether it will be implemented before its 2020 deadline. Public Accounts Committee chair Meg Hillier raised the issue last summer following the Grenfell Tower fire, writing to then Home Secretary Amber Rudd to ‘highlight the importance of our emergency services being able to communicate effectively in the event of an emergency’ and question the decision to change services given the number of terrorist attacks at that time (the UK had "


Photo by Hugh Han on Unsplash

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

29


Endurance TechnologyŽ - Resilient (Life Safety) Digital Radio Communications Endurance Technology is a bespoke, highly resilient & secure Digital Mobile Radio infrastructure solution providing scalable, business / mission critical radio communications, designed to meet your specific needs. Providing efficient and instant work group communications for a productive workforce, and ensuring the security, integrity and safety of high value facilities. Bespoke Coverage Digital Enhances Useable Range Improved Speech Intelligibility GPS Tracking Secure Digital Comms (AES 256) Indoor Location Tracking Cyber Security Hardened Resilient PSU’s & Battery Back-up Analogue to Digital Migration Manage & Control Connected Devices

Six Essential Attributes Of Resilient (Life Safety) Digital Radio Communications CAPABILITY Comprehensive functionality includes GPS tracking, Indoor Location tracking, Text Messaging, Man Down, Lone Worker, Alarms and Sensor integration. Capable of encrypting transmission to AES256, advanced noise cancellation of voice communications, flexible configurations and talk group communication enabling multiple departments to connect and collaborate in real time. Efficient use of virtual talk slots means emergency communications are prioritised even under the most challenging of circumstances, initiating calls across the system in under a second. With server-based dispatcher clients, this enables command centers to make and receive calls and log & record all transmissions. CONTROL Radio authentication is part of controlling access to the radio system. Knowing the status of all users are key elements of control. Call prioritisation & pre-programmed interoperability options manage and mitigate security related risks and prevent unauthorised access. COVERAGE Bespoke engineering of the antenna system delivers coverage where you need it and is fundamental to critical network design. Resilient infrastructure ensures sites are hardened against failure, with layers of redundancy & back-up power sources in place ensuring continuous coverage is provided. CAPACITY Resilient by design, Endurance Technology is able to withstand multiple single points of failure within its core before functionality is impacted and is designed to maintain continuity of voice and data services. Scalability provides bespoke expansion of voice and data path capacity allowing the infrastructure to grow with your expanding requirements. COST Use of high quality system components (improves reliabilty), best in class engineering and system design combined with preventative maintenance, reduces the operational cost over the life of the system and enhances efficiency through effective communication. CYBER SECURITY Hardened against cyber attacks, through system monitoring, built-in KVM & closed IP services, with password restricted access to the radio network infrastructure providing multi-layered protection. For more information please call: +44 (0)1778 421250 or email: richardrussell@roadphone.co.uk


PANEL OF EXPERTS

EXPERT FINAL THOUGHTS JACKSON WHITE, GETAC UK “Attaining a resilient network is critical. First line and emergency responders must be able to communicate securely and freely, and not be impacted by network congestion or failure. Organisations should consider their approach, be it a secure private channel or aggregate networks, dynamic bandwidth allocation, and how operational procedures will give them the best chance of success in a crisis situation.” RICHARD RUSSELL, ROADPHONE NRB “Coverage for business/ mission critical communications has many important considerations, and narrowband, resilient infrastructure communication systems as delivered by Roadphone NRB and Hytera have a proven track record through a balanced RF budget – the key to proper system performance. This is an essential ingredient to successful implementation and operation of critical (life safety) radio communications, will ESN leave gaps in coverage and risk critical communications?” SIMON HILL, EXCELERATE GROUP “What is now required are innovative new solutions that provide greater capability to allow for greater effectiveness, release capacity by providing greater efficiency and that smooth out the complexities of a multi-dimensional communication and information feed landscape. These solutions need to provide integration, as well as reliability, organisational security and confidence so that they can support the users to achieve outcomes that will in the CT environment keep people safe from harm and protect our democracy.”

# experienced attacks in London and Manchester in March and June 2017). The Home Office reported in February that the new 4G ESN system has achieved its first successful demonstration over a live public mobile network, marking the first time Motorola Solutions’ software has linked together with the live EE mobile phone network and demonstrated prioritisation of emergency services communications on a public network. Additionally, 130 handheld devices were produced for testing, as was the first new rapid response vehicle. The government claims that there have already been over 100 genuine 999 calls received through masts in place due to ESN where there was previously no coverage, demonstrating the ability of ESN to help save lives even before the roll out is complete. Nick Hurd, Minister for Policing and the Fire Service, said: “This is a complex project which will provide the emergency services with the most advanced communications system of its kind anywhere in the world – which is why successful tests like these are an excellent achievement. Members of the public are already seeing some of the incidental benefits of the project like its improvement of the 4G mobile network – 90 per cent of the UK is now covered.” SO HOW DO WE MIND THE GAP? Jackson White, business development director at Getak, says that ‘adopting a bespoke, dedicated system based on satellite mobile internet technology’ enables organisations to access ‘uncontested’ mobile capacity. In addition to this, services should engage with an emergency services type network, which aims to deliver secure and resilient voice communication and broadband data services for the three emergency services via the LTE network. But, as Roadphone NRB’s Richard Russell points out, there is a concern over just how well this LTE broadband service will truly perform as our public safety organisations ‘take the bold and brave step away’ from the tried and tested TETRA network. Roadphone’s business development manager highlights how ‘the original intended purpose of the two systems are fundamentally different’, where the TETRA based Airwave system operates at lower UHF frequencies, lending itself to better range and transmitting more power from devices with more efficient antenna design operating on a bespoke network infrastructure designed for performance. In contrast, 4G LTE networks have been ‘prioritised for commercial biased population-dense locations’, leaving many to wonder about its effectiveness in rural locations.

White stresses that ‘communications should also be able to be maintained regardless of the bearer of opportunity’, and as devices traverse between Wi-Fi, ethernet plug and mobile LTE, communications must remain consistent and seamless, even if the device is switching between providers or ‘across different internet protocols with the most resilient link’. Looking beyond satellite mobile internet technology towards radio communication, Russell pinpoints five system considerations to maximise performance. This looks at control of who accesses the radio network, the capability of the system to deliver effective communications, sufficient call capacity to process multiple simultaneous calls, predicable operating costs, including maintenance, and most importantly coverage, including the frequency of operation, the antenna system design, a balanced RF link budget and licence restrictions as imposed

THOSE ON THE FRONTLINE OF PUBLIC SAFETY RELY ON MOBILE CONNECTIVITY TO ENABLE MISSION CRITICAL COMMUNICATIONS BETWEEN RESPONDING RESOURCES, CONTROL ROOMS AND OTHER EMERGENCY CREWS by OFCOM to prevent interference to others and to the operator’s system. Organisations should also be rehearsed on how they deal with different eventualities in terms of reduced network capacities. For example, where bandwidth is reduced and data transfer is limited, operational procedures should stipulate that low resolution imagery or only critical voice or data is communicated. It’s essential that hardware used for these critical communication is equipped with the advanced connectivity features which allows dynamic bandwidth allocation to transmit live video feeds, images and other data in emergency situations. Companies relying on commercial mobile infrastructure can secure a private, priority channel, further enhancing resilience by aggregating services from multiple providers. This means the communication burden is spread across networks to ensure consistent connectivity, bandwidth and resilience. This is especially important in emergency situations as a networks can quickly become oversubscribed as citizens clog the network checking on the safety of friends and family. !

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

31


PANEL OF EXPERTS

PANEL OF EXPERTS With the help of our Panel of Experts, Counter Terror Business looks at the potential benefits cloud technology can offer to forces at the front line and the potential obstacles the technology may face

SECURITY IN THE CLOUD ANDY BURSTON, INFORMATION SYSTEMS SECURITY ASSOCIATION, ISSA

SIMON DAYKIN, CHIEF TECHNOLOGY OFFICER, LEIDOS

Andy Burston is a former UK police officer with operational experience of intelligence-driven policing and counter terror operations.

Simon Daykin is chief technology officer for Leidos UK’s Civil, Defence and Health business units, providing strategic business technology leadership for UK customers.

Andy works as a security information risk advisor and architect, helping stakeholders to solve complex problems across information systems and processes, thereby reducing their exposure to risk. He has also managed the protection of IT that is critical to the success of UK policing and national security objectives.

loud computing has made substantial strides in delivering huge efficiencies and cost savings to organisations across the private sector. With the policing and security sector, like most other industries in the UK, working towards becoming fully equipped for the digital age, the cloud represents a good opportunity for the police force to improve its digital capabilities. Alongside the NHS and local government, the police in the UK continue to be stretched in terms of expectations

C

32

Motivated by the benefits technology can bring, Simon is passionate about supporting digital transformations through strategy, design and delivery to solve some of the most challenging problems in today’s world. Before joining Leidos, Simon served as chief architect of NATS and CTO of Logicalis.

and workload, all the while working on a shrinking budget. According to the Metropolitan Police, the force has had to find approximately £600 million of savings, with government funding having fallen by 40 per cent in real terms since 2011. This has contributed to the loss of a third of police staff posts, which are down from 14,330 to 9,985, as well as two-thirds of police community support officer (PSCO) posts, which are down from 4,607 to 1,591. Cloud technologies therefore have become crucial in

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

PAUL PARKER, SOLARWINDS Paul Parker brings over 22 years of IT infrastructure experience, having worked with multiple miltary, intelligence, civilian and commercial organisations. Paul has received multiple military and civilian awards for service, support and innovation, having served as vice president of engineering for the federal division of Inflobox, an IT automation and security firm, as well as holding positions at CS2, Ward Solutions, Eagle Alliance and Dynamics Research Corporation.

providing police with cost-effective and flexible ways of managing investigations and operations. A VARIED OFFERING Paul Parker, chief technologist of Federal and National Government at SolarWinds, is quick to note that in the security sector, as well as in defence, ‘IT needs are extremely varied, ranging from mission-critical communications and satellite imaging for deployed troops to intelligence insight for reconnaissance in remote areas’. When looking at our military


presence, both close to home and wide afield, cloud‑based technologies invariably provide a solution to many of the problems that come with taking IT infrastructure on location. According to Parker, UK-based defence organisations spent more than £64 million embracing cloud technology in the five‑month period from May through September 2017, although the Ministry of Defence has stated that less than 25 per cent of its IT infrastructure has been migrated. This emphasises the contrasting adoption and appreciation of cloud technologies. Many place importance

on reliability, maintaining confidence in holding storage and network connections locally. However, not only does this require ‘taking huge amounts of equipment from location to location’, sometimes in unfavourable conditions, but it also depends upon ‘backing up all data by copying over to physical tape storage’. On the other hand, ‘leveraging cloud technology takes advantage of the ever-improving global communication network’, seeking a faster and more flexible service. This also enables the creation of mobile tactical kits

that provide ‘the same, if not better, access to information without the need for excess equipment’. There is no doubt that cloud offers a very significant shift in the way we work, a notion that Simon Daykin, chief technology officer at Leidos highlights in our recent conversation. He says that the key to benefiting the new technology is to exploit it for your own needs, providing organisations the chance to assess ‘what is the problem we are really trying to solve?’ and then re-thinking the way we can use technology to deliver that. Moving "

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

33


Solve for today, plan for tomorrow Scalable, end-to-end IT monitoring and management software from solarwinds.com/government


PANEL OF EXPERTS

EXPERT FINAL THOUGHTS ANDY BURSTON, ISSA UK “Business processes that are perceived by some to be inefficient, subsequently prove to be born out of necessity such as legal constraints (custody and identity applications are a favourite!). Wider consultation at no cost other than time and effort will significantly de-risk and inform plans to outsource hosting of services and data to computers beyond your immediate control… in other words the cloud.” SIMON DAYKIN, LEIDOS “If I were to outline three main benefits of moving to the cloud, it would be incremental and scalable capability improvements; the opportunity to gain access to much bigger forms of data – voice, image, text, video in easier and larger ways; and the ability to scale and respond to ever changing situations on the ground, through embedding agile platforms and processes to grow systems and capabilities. “However, it’s not just technology, it’s the people and the confidence and skills changes that we need to take people through to get it right. I don’t see security as a blocker, but we need to manage peoples expectations to help them understand the benefits and risks. There is a possible risk in just reimagiinng it all and avoiding fossilising their existing ways of doing things.” PAUL PARKER, SOLAR WINDS “Turning our thoughts to the forces at the front line and their IT needs, the technology deployed in forces at home and abroad is extremely varied but vital to mission success, which creates immediate correlation between cloud technology and the solutions it offers in terms of flexibility, scalability and the minimal physical infrastructure it requires. Despite the advantages that forces stand to gain through using cloud-based services and systems, a number of obstacles still need to be overcome before cloud on the front line can really come into its own.”

" forward, with the counter terrorism industry in mind, it is imperative that we ‘don’t fossilise the way we do things’ in the cloud, but thoughtfully re-imagine how it can be used to ‘improve real time collaboration’, exploiting increased bandwidth and rapid information sharing. We only have to look at how other companies and industries are making the most of cloud technologies. Vendors such as Amazon, Microsoft and Google continue to work closely with organisations to provide them with exactly what they need, while through digital innovation companies like Netflix have replaced the way that people hire videos, and Uber, a taxi company that doesn’t really own any taxis, has transformed the way people book their transport. SECURITY ASSURANCE Daykin also stresses that although cloud remains a fairly new delivery model, it is actually ‘easier to implement more structured and more standardised controls across a cloud infrastructure’. Therefore, it is appropriate to take an assured risk based model to ensure you understand what information needs to be protected and be absolutely assured that the security can be managed equally, if not sometimes even more securely, than historically it has been. Andy Burston is a former UK police officer who is contributing to this discussion for the UK division of the Information Systems Security Association. He agrees with this and comments that, as companies ‘solely driven by budget’ will ultimately jeapordise the availability of services and information that underpins successful policing, the choice of cloud provider becomes even more critical. Burton advises organisations and forces to look for a cloud provider who can provide assurance and visibility that ‘serves more than the needs of an IT or security analyst’, as satisfying the reporting requirements of the senior risk owner is now absolutely essential, no longer ‘an optional nice to have’. Many existing systems and data can move to cloud with minimal change to structure, format or usability, so be wary of assuming that cloud transition must also be ‘an opportunity to embark upon other programmes of business change and digital transformation’. POTENTIAL PITFALLS Moore’s Law predicts the processing power of computers to double every two years. Returning to the views of Paul Parker, this means that the strength and capability of cloud and communications technology will continue to increase. Daykin reports that trying to transform legacy processes to the cloud can often

result in ‘getting bogged down and stuck, trying to do something it wasn’t designed to do’. Therefore, it is only right to recognise that we ‘reimagine’ and have the process and the system architecture to support that. While it is undeniably important to deploy a system that is end-to-end and scalable, it is perhaps more significant to be running on a platform that recognises the privacy and security of sensitive information. Parker alludes to a recent example of this, referencing the recent announcement of the Amazon AWS Secret Region, which can operate workloads up to the Top Secret U.S. security classification level. On a more local and recognisable level, we only have to look at the collation and use of data in police evidence files. Hosting such information digitally means that it can be accessed from outside of the physical space in which it used to be held, posing a problem to cloud adoption for some the more traditional

CLOUD TECHNOLOGIES HAVE BECOME CRUCIAL IN PROVIDING POLICE WITH COST-EFFECTIVE AND FLEXIBLE WAYS OF MANAGING INVESTIGATIONS AND OPERATIONS police forces and security companies. But there is no reason as to why the wider accessibility issue shouldn’t be relayed as a positive. Using a cloud-based system, managing data encryption and multiple layered security, can provide police forces with a more expansive storage offering at a relatively lower cost. Furthermore, cloud technology can be used to manage and restrict access, permissions and usage. Parker says that cloud adoption will lead to police IT becoming ‘physically smaller and tactically more reliable’, but it will equally allow it to be more expansive in storage. FINANCIALLY VIABLE As mentioned previously, UK police forces are likely to be working on smaller budgets for the next few years. While switching operations is a cost that some may shy away from, as Daykin points out, ‘the consolation to cloud is that so you can free up some of the money that will need to be spent on sustaining legacy systems and reinvest that’. Sustaining large legacy systems and aggressively transforming to cloud can actually allow for money to be reinvesting in cloud technology. The move to the cloud should not be finanically-led, but culturally, where the benefits far outweigh the obstacles. !

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

35


PART OF

SCT

SECURITY & COUNTER

@SCTX19 sctx.co.uk/linkedin www.sctx.co.uk

TERROR EXPO

CNI PROTECTION | BORDER SECURITY

5-6 March 2019 Olympia, London

OFFENDER MANAGEMENT | SERVICES

MAJOR EVENT SECURITY | CYBER SECURITY POLICING AND COUNTER TERRORISM

THE UK’S LEADING NATIONAL SECURITY EVENT SCTX 2018 featured: 10,123 visitors

304 exhibitors

71 international delegations TO BOOK YOUR STAND FOR 2019, PLEASE EMAIL SALES@SCTX.CO.UK Part of UK Security Week WORLD COUNTER TERROR CONGRESS

Ambition THE EPRR EXPO

Organised by

FORENSICS EUROPE EXPO


PAGE SCTX FLAG

Accommodating over 10,000 visitors and 71 international delegations, March’s SCTX was the most successful iteration of the show to date. Counter Terror Business recounts its success

MOST SUCCESSFUL SECURITY & COUNTER TERROR EXPO TO DATE S ince the breakup of the caliphate in Syria, the terrorist threat has evolved as extremists now remain in their home countries and look to launch attacks from inside their borders. This has presented those tasked with protecting nations, businesses and the public with new challenges as security forces constantly fight to stay one step ahead of the threat. 10,123 visitors, 71 international delegations and 304 exhibitors made UK Security Week at Olympia, London, the most successful ever. Security & Counter Terror Expo (SCTX) again featured leading forensics show Forensics Europe Expo, Ambition – the event for the emergency preparedness, resilience & response (EPRR) community – and for the first time, the People Movement and Management Show.

Covering over 13,000 sqm, the show is the largest national security event in the UK, enabling 304 companies to showcase their latest products, technologies and services alongside 10 conferences, two live demo areas and the world-renowned, World Counter Terror Congress. David Thompson, event director at UK Security Week, said: “The threat posed by terrorists has never been more diverse from the simplicity of knives and hire vehicles to technologically-advanced cyber criminals. It’s vital that nations, security professionals and the public are fully informed of the most effective methods of protection to mitigate these threats – we specifically tailored this year’s programme to respond to these challenges.” #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

37


Trusted Threat Detection Technology

PORTABLE PROTECTION, WORLD-CLASS RELIABILITY Garrett’s PD 6500i walk-through detector offers: • Superior throughput, with high discrimination of innocuous items. • Optional caster set enables full mobility for rapid deployment at special events and sports arenas. • Optional battery modules for continuous operation without power cables or other wiring.

THE GARRETT ADVANTAGE • Metal detection technology trusted since 1964. • Walk-through, hand-held, and ground search models designed for all applications. • Each detector is proudly made in the USA under Garrett’s strict ISO 9001 certified Quality Management System.

®

Made In USA

garrett.com Tel: 1.972.494.6151 800-234-6151


SCTX " THE WORLD COUNTER TERROR CONGRESS The showpiece of this year’s event was the World Counter Terror Congress, which was attended by over 700 VIPs, delegates and high-ranking police officers and chaired by Richard Barrett, coordinator of the Al-Qaeda/ Taliban monitoring team of the United Nations Security Council. The event featured world-renowned speakers such as the Metropolitan Police’s Assistant Commissioner, Mark Rowley, Sir Julian King, European Commissioner for the Security Union and Michael McGarrity, assistant director of Counterterrorism Division at the Federal Bureau of Investigations (FBI). In Mark Rowley’s final public appearance before retiring, the UK’s national lead for counter terrorism policing delivered a strategic overview of operations under his command, heavily criticising technology companies for their lack of proactivity in working with the police having failed to make a single direct referral to them about terrorist activity on their sites. As part of the most international line-up the conference has ever featured, Michael McGarrity reviewed FBI operations on detecting, deterring and disrupting threats to the United States while Christian Rousseau, from the government of Canada’s Integrated Terrorist Assessment Centre, discussed the Canadian approach to the evolving terrorist threat. Richard Walton, former head of the Counter Terrorism Command for

SECURITY & COUNTER TERROR EXPO SAW A RECORD NUMBER OF PRODUCT LAUNCHES AT THE SHOW THIS YEAR the Metropolitan Police Service, added: “Extremist propaganda has changed course over the past year, encouraging attacks to be launched from home nations with terrorists opting for crude methods utilising everyday services such as hire vehicles. This has led to a whole new set of challenges for security professionals to address in order to prevent attacks and protect the public. “Terrorism is a global challenge and it is vital that nations collaborate and work together on a global scale with events such as the World Counter Terror Congress which provides a vital platform for the sharing of best practice and the most effective counter terrorist strategies.” In addition, SCTX provided a series of free-to-attend conferences focusing on the ever-growing cyber threat, infrastructure, border and

transport security. Located on the show floor, the sessions were at full capacity on both days, with visitors keen to hear the latest thinking from the industry’s foremost experts. COUNTERING THE CYBER THREAT The cyber industry, now worth an estimated £3.4 billion, is one of the most rapidly evolving threats facing security professionals today. This year’s Cyber Threat Intelligence Conference, run in association with techUK and sponsored by Genetec and Darktrace, gathered cyber experts from all over the world to discuss how best to protect against cyber attacks whether on individuals, businesses, or governments. Key speakers included Sir Julian King and NATO’s Merle Maigre, director at the Cooperative Cyber Defence Centre of Excellence. Chairing the conference again this year,

Talal Rajab, techUK’s head of Programme, Cyber, National Security, said: “Every year, we face new and innovative attacks as cyber criminals look to exploit gaps in cyber protection. Now, we’re facing a new challenge in the fight against the dissemination of extremist propaganda online. Additionally, organisations must adhere to specific requirements with GDPR and the NIS Directive coming into force in May or face serious ramifications. SCTX is the best place to stay on top of the latest developments in the industry and learn about the most effective levels of protection for you and your organisation.” INFRASTRUCTURE AND BUSINESS PROTECTION The Critical National Infrastructure & Business Reliance conference, sponsored by Surelock McGill and #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

39


Everybody.

Everywhere.

Every day.

Ordinary days require extraordinary protection.

genetec.com

Find out more about the software behind the everyday at genetec.com/protectingeveryday

Š 2017 Genetec Inc. GENETEC and the GENETEC LOGO are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.


SCTX " Pelco, brought together security experts in protecting businesses and assets essential for the protection of everyday life. Key speakers included Chris Flynn, security operations lead, Data Security Centre – NHS Digital and Dr Anja von Wulffen, desk office, Directorate II Risk Management; International Affairs – Federal Office of Civil Protection and Disaster Assistance (BBK). A PLATFORM FOR INNOVATION SCTX saw a record number of product launches at the show this year with companies showcasing the latest, cutting-edge products from across the sector. On day one, Chemring Technology Solutions announced LORIS, the world’s highest energy radio initiator while BrainChip exhibited its AI video analysis software that find faces and objects 20 times more quickly than a human operator. Catherine Pouret, project officer at the EU Commission, remarked: “We are delighted to be at the show which has been a great experience for us and our beneficiaries. It’s a really productive way of meeting such a diverse mix of people – all in one place. We’ve had some very good leads so far and look forward to doing more at the show next year.” INTEGRATING SECURITY SOLUTIONS The evolution of recent attacks has led the industry towards a more integrated approach combining capabilities across multiple security verticals. This type of multi-layered solution was demonstrated in action for the first time at SCTX’s Integrated Security Showcase. Public and private sector buyers, influencers and government delegations from across the globe were guided through the feature to see how different technologies such as facial recognition scanners, blast doors

EXTREMIST PROPAGANDA IS ENCOURAGING ATTACKS TO BE LAUNCHED FROM HOME NATIONS WITH TERRORISTS OPTING FOR METHODS UTILISING EVERYDAY SERVICES and perimeter fences all work together into an operations control centre. The showcase featured leading suppliers such as: Custom Consoles, Warrior Doors, Chemring Technology Solutions, Technocover, Bosch, BlokNmesh, Hill and Smith, Integrated Design Limited and Harp Visual Systems. Detective Chief Superintendent Scott Wilson, National Coordinator for Protective Security, commented: “The current threat from terrorism, both in the UK and internationally, means it is vital police work closely with commercial organisations to improve our collective security. Events like SCTX give us chance to showcase the tools we have available to help companies increase their understanding of the issues and measures they should be taking. “This year senior officers had the opportunity to meet many leading suppliers and experts working in protective security and this helps our understanding of the important innovations taking place in the sector. We look forward to attending again in 2019.” AWARD-WINNING PRODUCTS This year also played host to the inaugural Counter Terror Awards, run in association with Counter Terror Business magazine and hosted by Sir Michael Fallon. The awards were staged to recognise the efforts of both public and private sector organisations and their contributions to counter terror strategies in the UK and abroad.

Adam Liardet, director of award-winner, Audax, commented: “Having hosted The European Commissioner for Security Union, Sir Julian King, at our stand we were then thrilled to receive the Communications Systems Award at the Counter Terror Awards presented by Sir Michael Fallon. For an SME to be able to engage at this level, is evidence enough that the Security & Counter Terror Expo provides opportunities and delivers where other events just don’t come close, it will come as no surprise we have already booked for next year.” More information on the Counter Terror Awards can be found on page 43. PLANNING FOR THE 2019 EVENT Clarion Events announced that the next edition of SCTX will return to London on 5-6 March 2019 for UK Security Week. David Thompson says of next year’s event: “The 2018 show was our most successful yet and we’re looking to take 2019 to the next stage. We introduced many new features this year to ensure that the show remains the UK’s leading national security and counter terror event and at the forefront of strategic discussion and product innovation. This raised the bar yet again and we’re looking forward to working with our key partners over the coming months to maintain that success into next year’s show.” !

FURTHER INFORMATION www.sctx.co.uk

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

41


The leading online course in Terrorism Studies Individual Modules | 4 Weeks Certificate | 16 Weeks Advanced Certificate | 32 Weeks

Apply before 18 May to save on course fees

Next course starts 13 June Learn online with expert tutor support and connect with a global network of like-minded professionals.

www.terrorismstudies.com/counter-terror-business Tel: +44 (0)20 7017 4483 | Email: security@knect365.com Quote VIP code CTB Magazine to secure discount


COUNTER TERROR AWARDS

The winners of the first Counter Terror Awards were announced at the Security & Counter Terror Expo, recognising organisations from the UK and overseas in ten categories for their contribution to reducing the threat from global terrorism

FALLON PRESENTS INAUGURAL COUNTER TERROR AWARDS F ormer Defence Secretary Sir Michael Fallon, presenting the first Counter Terror Awards, has called on tech industry giants to ‘help root out’ terrorists who are using social media to spread extremism. In his opening address, the Sevenoaks MP said the changing nature of terrorism meant digital companies have a duty to help ‘tackle the aggressors behind the algorithms and the enemies behind the encryption’. Echoing recent government warnings, Fallon said that such companies are ‘hiding behind the pretence that they are not publishers’ and have created ‘huge ungoverned spaces in which extremism flourishes’. He argued that recent terror attacks show that everyone is now a legitimate target,

saying: “As terrorists adopt more low level methods, killing with knives and vans, the range of targets increases. 90 per cent of organised terrorism on the Internet takes place via social media, and for these millennial terrorists communication is 90 per cent of their struggle. Facebook, Google and the rest cannot opt out of their responsibility.” As part of the Awards, Fallon presented 10 companies and public sector organisations with Counter Terror awards, recognising their contribution to reducing the threat from global terrorism. After all the winners were revealed, next years’ event was announced. The black tie dinner will take place on 5 March 2019 in London. #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

43


Influencing industry and drone businesses

Radically faster video intelligence

ARPAS-UK was delighted to sponsor the UAV Product Award at the recent Counter Terror Awards. The association’s membership reflects all aspects of drone business including the blue light services, security applications and indeed the development of counter drone capabilities to protect against the illegal use of drones. The association’s objectives are to: promote professional and safe RPAS operations among a community of like-minded professionals; encourage collaboration between members, end-user industries, academics and international industry associations to support market growth; represent members’ interests in the development of RPAS regulation, standards and practices through engagement with regulators, standards bodies and governments; provide upto-date industry information and advice; exploit ARPAS market position to secure membership benefits; and support research

SeeQuestor is an integrated software and hardware toolset, designed to dramatically increase the speed at which police and security teams analyse video as part of investigations. It is a revolutionary solution for post-event analysis for law enforcement and security. SeeQuestor supports analysts looking through large quantities of CCTV and other video data. The platform can convert the various formats of CCTV video into the industry-standard MPEG4. Then, SeeQuestor’s powerful video analytics detects all the movement, faces and people, and indexes each video to allow for fast review and search. This solution significantly enhances the speed at which analysts locate people of interest and find incriminating evidence

in unmanned aircraft systems and related data exploitation. ARPAS works closely with the UK CAA to promote fit-forpurpose regulation and to ensure safe and professional operation of remotely piloted aircraft. The association works in the public interest and advocates professionalism within its membership through compliance with an agreed Code of Conduct, taking progressive stances on national issues to embed the RPAS profession in all end-user industries, to enable it to continue to grow in influence. Email membership@arpas.uk to find out more about membership benefits. FURTHER INFORMATION

www.arpas.uk

Counter terror and target hardening solutions Safetell is a physical security provider of counter terror and target hardening solutions, mitigating the latest threats in criminal and terrorist activity. With over 30 years of security experience, Safetell provides a consultative one-stop-shop for standard and bespoke physical security solutions and services. Safetell designs, develops, installs, and services a diverse array of unique physical security and asset protection products to a variety of sectors, with a focus on the banking, government, retail, and counter terror markets. Safetell was founded in 1987 when the company began providing bullet-resistant fast rising security screens to protect high street banks against armed robbery. Since then, Safetell has installed over 3,000 rising screens in branches nationwide and developed a range of products to meet the

44

ever-changing demands of staff and asset protection. While the offering has changed over the years, Safetell prides itself on providing the same customerfirst experience from initial site survey, through to ongoing maintenance and support. The name Safetell comes from providing ‘Safety’ for ‘Tellers’, achieved by offering the latest in modern and tailored solutions for a range of security needs, from bullet resistant doors, screens and airlocks to secure transfer units and electronic security solutions. FURTHER INFORMATION

www.safetell.co.uk

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

in thousands of hours of video. Based on cutting-edge British research, the platform has been designed in consultation with leading British Police teams who review video data 24/7, and it is being used by police forces on three continents to review thousands of hours of video data a day. SeeQuestor has recently been widely recognised for its innovation and delivery, including: winner of the Global Frost & Sullivan Award for Technology Innovation; winner of the ADS Security Innovation Award; awarded Secured by Design and Cyber Essentials status; and granted CHECK/GCHQ approval. FURTHER INFORMATION

www.seequestor.com

Audax: The future of Body Worn Video Audax® is a worldwide leader and pioneer in developing Body Worn Video (BWV) technology. The company started with product demonstrations in July 2005 at a G8 Summit and led the World in 2006 with its joint project with Devon & Cornwall Police/Home Office, which led to the first ever standards and guidance document for BWV being produced. In recent years, Audax® has again led the UK security industry, becoming the first ever UK security company funded by the European Union Research and Innovation H2020 SME Instrument in a Phase 2 project. Audax® has been well supported by the European Commission and the European Commissioner for Security Union, Sir Julian King. Headquartered in Plymouth, and now with new satellite offices in both Northern England and in Brussels, Belgium; this has enabled Audax® to liaise better with its customer

base and EU partners. The company’s endeavours have also recently been recognised at the Counter Terror Awards in March 2018, being awarded the Communication Systems Award for its new BIO-AX® System - an innovate, high tech, feature rich device, compliant with BS EN 8593 and the future ‘Benchmark’ of the BWV market. Further coverage on this can be found on the European Commission’s website: https://ec.europa.eu/easme/en/ news/audax-wins-counter-terroraward-2018-its-innovativebody-worn-video-technology FURTHER INFORMATION

www.audaxsecurity.co.uk


COUNTER TERROR AWARDS " OUTSTANDING CONTRIBUTION TO COUNTER TERRORISM Sponsored by SeeQuestor Winner: Mark Rowley, Assistant Commissioner, Metropolitan Police Mark Rowley is most senior figure in the UK police’s efforts to combat terrorism and has been national lead for counter terrorism policing since 2014. Rowley worked with MI5 and other intelligence agencies to successfully stop 23 attacks since the murder of Lee Rigby in 2013, ten of which were foiled since March 2017. Current Prime Minister Theresa May has paid tribute to Rowley, saying his dedication to protecting public safety had served as an example of the professionalism of the UK’s police forces. Rowley retired from policing in March this year. Commended: Richard Barrett OBE, United Nations; Chris Shead, Assistant Chief Constable, National Police Chiefs Council; Debbie Heald, managing director, Heald UK; Simon Cole, Chief Constable, Leicestershire Police Force COUNTER TERROR POLICING AWARD Sponsored by Safetell Winner: Civil Nuclear Constabulary Since its inception three years ago, CNC has worked closely with the Cabinet Office, OSCT and military to develop an emergency responsive plan which delivers over 400 armed police officers across the UK in support of the national Operation Temperer. CNC has deployed twice under this plan; in May 2017 after the Manchester bombings and again in September 2017 following the Parsons Green attack. On both occasions, with just a few hours’ notice CNC successfully moved these large numbers of armed officers from all over the UK. Commended: National Counter Terrorism Policing – ACT (Action Counters Terrorism); City of London Police – Project Servator; Bedfordshire Police – ‘Cross the Line’ App COUNTER TERRORISM EDUCATION PROJECT Sponsored by Hesco Group Winner: University of St Andrews – Terrorism Studies programme The Centre for the Study of Terrorism and Political Violence (CSTPV) at the University of St Andrews is exclusive in its research focus and clarity, and is committed to evidence-based, scholarly analysis that is policy-relevant and independent. It now offers the

FALLON ARGUED THAT RECENT TERROR ATTACKS SHOW THAT EVERYONE IS NOW A LEGITIMATE TARGET COUNTER TERRORISM IT PRODUCT Sponsored by Audax Global Solutions

first transnational counter terrorism online course, which provides an understanding of the latest thinking on terrorism and homeland security. Commended: Salvas Learning - Run-Hide-Survive™; Faith Matters – Supporting Affected Families from Extremism; Africa Security Forum (UK) – Africa Diaspora CT Project; National Counter Terrorism Policing – ACT for Youth: RUN HIDE TELL; Institute for Strategic Dialogue – Extreme Dialogue Educational Resources COUNTER TERRORISM PROJECT Sponsored by PA Consulting Winner: citizenAID™ – Early response initiative citizenAID™ is the initiative of four deeply experienced UK civilian and military clinicians working in collaboration with industry to improve public resilience. It provides a simple system for any deliberate attack that blends public safety messaging with a combination of emergency services communication (SLIDE and MIST messages), sorting casualties into priority for treatment, and guidance on first aid for serious injury. citizenAID™ has received international media coverage and is working with several European countries to internationalise. Commended: Police Scotland/Robert Gordon University – Protect & Prepare: Securing Your Business; Fife Council – ‘Counter Terrorism and Your Safety’; Counter Extremism Project – Digital Disruption; Compass Group – Staff Training & Awareness Initiative

Winner: HGH Infrared Systems – Cyclope Automatic Intrusion Tracking Software CYCLOPE is the automatic intrusion detection and tracking software analysing the 360-degree high resolution images captured by HRH SPYNEL sensors. CYCLOPE automatically detects and tracks an unlimited number of ground, air and maritime targets simultaneously, including hardly detectable threats, such as crawling men, RHIBs, low altitude air targets, UAVs and stealth aircrafts. The latest version takes advantage of unique detecting and tracking algorithms with ultra-low false alarm rate. Commended: BrainChip Inc – BrainChip Studio Forensic Search Software; Cognitec Systems GmbH – FaceVACS-DBScan LE; Patriot One (UK) – PATSCAN CMR Concealed Weapon Detection; Tactical Electronics – CORE System Thermal Fusion Technology PERIMETER PROTECTION AWARD Sponsored by the Perimeter Security Suppliers Association Winner: Heald – Matador surface-mount automatic bollard system Heald’s PAS68 crash tested, surface-mount perimeter protection product, the Matador, is an example of where existing locations face a real issue in retro-fitting products due to underground cables, gas pipes etc. and a highly secure solution is required which provides the same level of protection #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

45


46

Hostile Vehicle Mitigation: Information Resource

Addressing emerging security threats in the logistics sector

The Perimeter Security Suppliers Association (PSSA) is the trade association for suppliers and installers of hostile vehicle mitigation (HVM) products, including high security fences, bollards, barriers, blockers, turnstiles and street furniture. The association works closely with the Centre for the Protection of National Infrastructure (CPNI) and the Home Office’s Joint Security and Resilience Centre (JSaRC). In a major new initiative, the PSSA has developed HVMhub – a comprehensive website providing guidance on risk assessment and product selection for situations requiring either permanent or temporary HVM solutions. The HVMhub also offers expert approved CPD seminars for companies, agencies and institutions needing a heads up on what to consider when faced with possible perimeter security threats.

The Transported Asset Protection Association (TAPA) is a unique forum that exists to help manufacturers and logistics service providers ensure the safety and security of their global supply chains. TAPA was formed in 1997 and now has some 1,000 active member companies in the Americas, Asia Pacific and Europe, Middle East and Africa (EMEA) regions. Its membership also includes other supply chain security stakeholders, including law enforcement agencies, insurers and regulatory bodies. TAPA’s mission is to minimise cargo losses from the supply chain, which in Europe alone account for annual losses of some €8.2 billion, according to a European Parliament study. The association helps its members to achieve this through the development and application of global security

It is the go to site for those concerned with the prevention of vehicle borne terrorist attacks. Such threats include vehicles used as a weapon (VAW) or vehicle-borne improvised explosive devices (VBIED). The PSSA and its members champion the use of independently tested HVM products. Members of the Association must comply with a professional code of conduct and meet other strict criteria to be part of the lead association for this important niche in the security sector. FURTHER INFORMATION

www.pssasecurity.org www.hvmhub.com

standards, recognised industry practices, technology, training and education, benchmarking, regulatory collaboration, and the proactive identification of crime trends and supply chain security threats. TAPA offers three supply chain security standards for facilities, trucking and secure parking. It also gives members access to its Incident Information Service (IIS), which produces incident alerts and provides a searchable database, and quarterly and annual reports to help companies understand and manage risk. FURTHER INFORMATION

www.tapaemea.org www.tapa-global.org

Heald: Hostile Vehicle Mitigation systems

SkyWall: a unique anti-drone technology

For over three decades, Heald has been securing some of the world’s most high profile locations with advanced protection against hostile vehicle attacks. World class innovators in the field of perimeter security technology and the largest manufacturer of quality security equipment in the UK, Heald’s range of award-winning PAS68, K12, IWA and ASTM bollards, road blockers and barriers play a leading role in the defence of vulnerable properties worldwide from expressive and acquisitive crime. Constantly pushing the boundaries with ground-breaking new designs, tested to the latest British EU and US Security standards, Heald are renowned for their exemplary in-house manufacturing and now secure a global client base which includes military sites, presidential buildings, palaces, embassies, border controls, airports,

SkyWall is an award winning and innovative drone capture system, developed by OpenWorks engineering. The system offers government authorities and private security organisations the capability to protect the public, VIPs, prisons and critical national infrastructure from the threats posed by commercially available drones. SkyWall offers a cost effective, proportionate and physical response to the drone threat, allowing the operator to capture and bring down a drone to a controlled landing under parachute. The concept embodies a simple principle: catch the target drone in a net. SkyWall has several inbuilt safety features to allow its use within a populated environment and does not require the use of

oil refineries, stadia, banks, shopping centres, government buildings and much more. Heald’s products have been recognised by some of the security industry’s leading professional bodies, and received accolades from the IFSEC Security and Fire Excellence, HSBC Global Connections International Business Awards, Home Office, ADS Security Innovation, Counter Terror Excellence in Innovation and Security Excellence Awards. One of Heald’s recognised products includes the Matador, a surface mount sliding bollard system which has revolutionised the perimeter security industry. FURTHER INFORMATION

www.heald.uk.com

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

any electronic counter measures. SkyWall is available in a handheld and mounted systems. SkyWall100 is the handheld capture system that is already in use by authorities across the world. SkyWall300 is the automatic system that allows for remote operation, and will be available in 2019. OpenWorks Engineering is a hi-tech product company developing world leading security and counter terrorism products. FURTHER INFORMATION

openworksengineering.com


COUNTER TERROR AWARDS " as other products on the market. Orders for the Matador have increased considerably for the past few years, with overall turnover growth expected to top 30 per cent this financial year. Commended: Abloy - CLIQ® Connect / Protec2 CLIQ® Introduction Key Control; Bradbury Group – Vertex Gates; Navtech Radar – AdvanceGuard perimeter surveillance system; Frontier Pitts - Hostile Vehicle Mitigation Side Folding Bollard CBRNE PRODUCT AWARD Sponsored by OpenWorksEngineering Winner: Avon Protection Systems – NH15 Combo Escape Hood Avon Protection’s advanced CBRN respiratory protection systems are placed at the heart of many international defence and tactical PPE deployment strategies. In collaboration with Johnson Matthey, the company has produced a stable, lightweight CBRN/ Carbon Monoxide escape hood – NH15 Combo – that is intended for use by first responders, building on initial work by Anglo Platinum in low temperature carbon monoxide catalysis. During product development, Avon Rubber and Johnson Matthey demonstrated several aspects of good practice in innovation. These include leveraging Johnson Matthey’s fundamental scientific skills and knowledge to new applications, collaborations internally across different business units and a customer focus throughout the project. Commended: FLIR Systems – FLIR identiFINDER R440; Mirion technologies – SPIR-Ace RIID COMMUNICATIONS SYSTEMS AWARD Sponsored by the Heald

90 PER CENT OF ORGANISED TERRORISM ON THE INTERNET TAKES PLACE VIA SOCIAL MEDIA, AND COMMUNICATION IS 90 PER CENT OF THE STRUGGLE Winner: Audax Global Solutions – BioAx Body Cameras Audax’s development of Body Worn Video (BWV) technology was first introduced in 2006 for a joint project with Devon & Cornwall Police and the UK Home Office. This led to the first ever standards and guidance document for BWV being produced. Bio-AX® contains an enhanced staff ‘safety blanket’ alarm feature, with capability for remote access, remote memory wipe and redaction software all built in to a ‘Security and Privacy by design’ product. Coupled with GPS Google Mapping, all user actions from the Bio-AX® are logged, creating a complete chain of custody. Commended: goTenna – Secure digital tactical mesh networking radio; Primetech – MultiNet Comms ground communications solutions; State Security Networks Group / AirBus / Motorola Roaming TRANSPORT SECURITY AWARD Sponsored by the Transported Asset Protection Association Winner: Regal Maritime Solutions Stowaways present a range of problems for ship owners. The financial costs of repatriating a stowaway if found after the vessel leaves port are very high, not to mention the danger the crew would be put in should a stowaway be discovered whilst the vessel is underway. Regal Maritime Solutions deploys highly experienced maritime security teams on board merchant and private vessels. Made

up of ex-military personnel, the teams possess unmatched skill and expertise when it comes to securing a vessel making port calls in high risk regions. Commended: ATG Access; Stobart Air; Amulet Ballistic Barriers; Smiths Detection UAV PRODUCT AWARD Sponsored by ARPAS UK Winner: OpenWorks Engineering Ltd – SkyWall Counter Drone Technology SkyWall Counter Drone Technology is a net capture system that neutralises any type of small drone. Damage to both the drone and the surrounding area is minimised by controlling the descent with a parachute, allowing forensic investigation. The SkyWall range offers defence in handheld and mounted autonomous systems. SkyWall100 is a mobile, handheld system, while SkyWall300 is a mounted system that can be installed on mobile or fixed assets. It is environmentally protected and can be fully automatic when integrated with detection systems. Commended: Drone Defence – SkyFence™ electronic countermeasures system; Robin Radar Systems – ELVIRA® Drone Detection Radar; PDA Electronics – Repulse®; AUDS Team – AUDS (Anti-UAV Defence System) !

FURTHER INFORMATION

awards.counterterrorbusiness.com

47


SDW2018 QEII CENTRE LONDON, UK

CONFERENCE: 25–27 JUNE 2018 EXHIBITION: 26–27 JUNE 2018

EXPLORING NEXT-GENERATION GOVERNMENT AND CITIZEN IDENTITY SOLUTIONS ePassports ★ national IDs ★ visas ★ worker credentials ★ advanced border control ★ breeder documents ★ driving licences ★ document design ★

anticounterfeiting ★

eID ★ registered traveller programmes and much more…

• Meet 2,000 attendees from 75+ countries at the global secure document and identity technology event • Free-to-attend exhibition featuring 150+ leading companies and organisations as well as a free seminar programme • Multi-track conference with a series of in-depth, non-commercial presentations, case studies and discussions. Book early for the best rates

www.sdwexpo.com

ORGANISED BY:


SDW 2018

Recognised as the pre-eminent conference for professionals involved in secure ID credentials and government-identity solutions, the three-day SDW conference delivers innovations, insight, analysis and debate direct from over 75 industry experts

SIGNALLING SECURE DOCUMENT TECHNOLOGIES hether your company or organisation is involved with security features, chips/ inlays, cards and document production, personalisation techniques, document readers, biometrics, or in providing infrastructure and expertise for large-scale identity solutions, or in fraud detection, the 2018 SDW conference will be of strong appeal. Taking place on 25-27 June at London’s QEII Centre, SDW has become one of the world’s largest gathering of advanced security document and identity solutions experts. The 12th edition of SDW, hosted by Science Media Partners, is expecting to welcome 2000 attendees from around the world. The event features a world-renowned three-day conference and a free two-day exhibition with over 150 companies exhibiting.

W

KEY THEMES FOR SDW 2018 As challenges, such as terrorism, organised crime, forced migration, identity fraud and social exclusion, continue to challenge policymakers across the world, the identity industry must adapt and evolve. Leading figures have cited the critical role that new technologies will play, including biometrics, mobile devices, new credential substrates and security features, as well as the need to work with both physical and

digital identities, and the development of technologies such as blockchain. In a series of sessions, SDW will examine these technology trends and aim to establish how they will shape industry over the coming years. Best practice plays an invaluable role in raising the bar to limit counterfeiting and fraud. SDW will take an in-depth view at the tools, techniques, materials and processes that enhance security and further improve quality – ensuring that citizens are able – both on-line and off-line – to prove their identity with ease, while making fraud detection easier for authorities. Secure identity credentials have been developed over decades and today are used by more people than ever before for an increasing number of applications – from proving their identity, to international travel, and accessing government services. SDW 2018 will have a series of sessions exploring the many existing and emerging areas where document security and identity management play a critical role in enabling citizens to live and work in a country, vote, drive, travel and access an increasing number of services. AHEAD OF THE FRAUD CURVE The government and industry need to remain vigilant and stay ahead of the fraud curve to ensure their designs and

processes are not vulnerable to fraud or misuse. Equally, action to detect and disrupt fraud needs to be robust. During the past decade, instances of simplistic document fraud have been on the decline, but have been replaced by a sharp increase in identity fraud. Actors and organisations involved in terrorism will continue to exploit design and system vulnerabilities for their benefit and remain highly motivated and well-resourced to achieve their aims. SDW will take a purposeful look at the drivers of document and identity fraud, the systems, approaches and tools available to prevent and detect it, and explore what government and industry can do to further deter and reduce the possibility of fraudulent documents or identities being used by those who seek to do harm to our societies. Mark Lockie, SDW event director, said of the show: “SDW provides a vital role for the secure document and identity sector as a key information source and global meeting place. We are always delighted to see so many familiar faces return and to welcome newcomers to the SDW community where government, industry and academia come together to discuss, source and forge solutions.” !

FURTHER INFORMATION www.sdwexpo.com

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

49


ADVERTISEMENT FEATURE

BAPCO

GETAC – RUGGED MOBILE TECHNOLOGY Defence, blue light and security organisations are increasingly relying on technology to deliver efficiency and productivity gains, while achieving longer term cost savings. But now, more than ever, these technologies need to support a range of new applications, process more data, and meet increasingly stringent security requirements

completely unusable by unauthorised parties, even in the case of ransomware attacks.

Modernisation of defence is firmly on the agenda with much focus on Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR). One main objective of dismounted C4ISR is for each soldier’s capability to be enhanced and for technology to be a force multiplier. Such technology is the dismounted soldier’s End User Device (EUD), which enables rapid access to, and manipulation of data in real time, collaboration and integration of applications. Yet, traditionally specialist mobile devices have been power hungry, heavy and cumbersome. POWERING BLUE LIGHT SERVICES Blue light services rely on technology to enhance performance, create efficiencies, and support day to day operations. The upcoming launch of the Emergency Service Network (ESN) will be a major technological advancement that will significantly improve connectivity and the ability to send and receive data to support any given emergency situation. Yet, operatives will need to have the means to access data in a secure, reliable, fast and consistent way. GETTING TECHNOLOGY RIGHT For any front line worker, mission-critical tasks need specialist technology, which is reliable and resilient, portable, easy to use, and can withstand harsh environments as well as be interoperable with other technologies. Equipping the user with the right technology that allows them to securely access and

50

manipulate sensitive and critical data is a necessity and could be the difference between a successful and failed mission, or even life and death. With the threats of cyber warfare and cyber crime, hacking systems, and infiltration, security of data continues to be the top consideration for any defence digitisation strategy. For mobile technology to deliver benefits to crews on the front line, procurement teams need to consider a number of important factors. MEETING SECURITY REQUIREMENTS Recent high profile global cyber attacks are a stark reminder of just how vulnerable organisations can be, and how damaging attacks can be if security measures are not properly considered or up to date. For blue light and defence, it’s not just about cost, downtime and reputation, but it’s possible that critical intelligence can be compromised. To meet the highest military classification standards, data needs to be encrypted and protected against attack, theft or intercept when it is at rest, in use or in transit. Getac has an exclusive partnership with Trivalent, so it can deliver seamless and robust next-generation data protection for the first time on rugged computing devices. By integrating Trivalent’s security software, which is certified by the NSA, customer data is safeguarded against unauthorised use. Its unique Data Alchemy™solution encrypts, shreds, disperses with secure storage and recombines data to render it

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

RUGGED DEVICES DELIVER IN HIGH RISK ENVIRONMENT Getac offers a range of rugged mobile devices which have been designed in conjunction with defence and security organisations specifically to meet the needs of those working in military and blue light sectors, and those in other high risk, challenging environments. They include a number of features that allow troops and first responders to focus on mission-critical tasks, without worrying about reliability and performance. The devices enable critical data to be quickly and safely sent and received via superior connectivity and security features. Certified to the highest industry standards, such as MIL-STD810G and IP67, mean the devices can withstand drops, dust and water ingress. MX50 – Getac’s military-specific tablet is compact, lightweight and intuitive – perfect for the already overburdened infantryman. The 5.7 inch IPS display offers a consumer device-like experience but packs in more power, robustness, security and functionality required by dismounted soldiers on the battlefield. ZX70 – rugged and durable, built to withstand rigorous use, yet is lightweight and ultra-portable, long lasting, offering potentially limitless battery life for use all day and night A140 – large 14” screen tablet to display more data and information at any given time, ultra portable. RX10 secure and reliable, offering superior connectivity so workers can quickly and securely access encrypted electronic patient records and other data wherever they are. To effectively meet operational and modernisation goals, procurement teams must look to harness the hardware and software that will deliver reliable mobile working experiences, with the highest levels of security for peace of mind. !

FURTHER INFORMATION en.getac.com sales-Getac-UK@getac.com 01952 207200


COMMUNICATIONS

BAPCO 2018 delivered a comprehensive update on the progress of the Emergency Services Network at its event in March. Here, the show organisers run us through its success

BAPCO ANNUAL CONFERENCE: INTO CALMER WATERS T his year’s BAPCO Annual Conference & Exhibition had a marked sense of confidence and camaraderie. Although the UK’s emergency services will have to wait until July for the new Emergency Services Network (ESN) roll-out date, recent messaging around an incremental approach to delivery, reduced fears about the prospect of a hard or forced transition, and increased communication and openness from the Home Office, all contributed to making the relationship between the programme and the emergency services feel far less adversarial and more aligned than in previous years. The likes of FirstNet and SafeNet – as well as ESN – are proving (if proof were necessary at this point) that broadband is the future of critical communications across the globe. The question now is likely only one of timescale, as well as which delivery models will be adopted by individual nation states. The conference programme reflected this, including several ESN progress updates delivered across the course of the two

days (as well as the first live demonstration of the network for non-users). International content included presentations from the likes of Mike Poth, FirstNet’s CEO, and David Lund, co-ordinator of broadband procurement projectBroadMap.

FROM PLAN A TO PLAN B The first ESN presentation of the conference was delivered by the Home Office’s director of law enforcement, Stephen Webb, who spoke instead of the (now former) programme director Gordon Shipley. Possibly best known to the BAPCO audience as an ESMCP witness during multiple Public Accounts Committee ESN hearings, Webb gave a solid update on the programme in what can only be imagined as potentially trying circumstances. Speaking of current progress, including potential access to some public safety organisations before eventual full roll-out, he said: “The programme is entering the delivery phase. Up until now, we’ve #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

51


ADVERTISEMENT FEATURE

SECURITY

COLLABORATING TO MAXIMISE MANNED GUARDING SYSTEMS

With five terror attacks last year in the UK and a further 10 thankfully thwarted by the UK security services, 2018 will see an increase in demand for manned guarding services as well as innovative, technical intelligence-led security solutions

The UK will continue to face the threat of terrorism for the foreseeable future, and the accessibility of crowded places like shopping centres, sports stadia, bars, pubs and clubs make them attractive targets. One of the main challenges we face in continuing to deliver world-class manned guarding services is keeping operational teams motivated and avoiding any appearance of complacency. Whether guarding against unauthorised entry to a building or premises, guarding against the destruction of or damage to a building or premises, or protecting a person from assault or injury, the challenges remain the same in the current climate. Having been at the national threat level of Severe since August 2014, rising to Critical on two occasions last year, it would be understandable for some security personnel to be suffering from threat fatigue. Keeping them motivated is critical. It is up to businesses like ours to ensure that positioning and posture and routine-variation are at the forefront of our security teams’ minds at all times. A rapid and regular stream of communication through which to share intelligence updates is also essential to an effective security team whether, manned guarding or otherwise. Achieving the right behaviour is enabled through an understanding of the variety of the threats out there and a clear understanding of what is required.

SECURITY Dedicated, motivated and professional security staff are an essential component of protective security regimes, which is why our award-winning people development programme and robust management systems have helped to establish ABM UK’s reputation as a leading security provider, delivering operational excellence. Through our Operational Security Strategy, the programme is designed to drive behavioural change through visible leadership, defined objectives and unambiguous measurements of effectiveness. Training our collective focus on the fundamental principles of mitigation, preparedness, response and recovery underpins everything we deliver. However, at ABM UK we believe that it’s not enough to just focus on security personnel in isolation. Effective counter-terrorism is about reducing the likelihood of an attack and getting it right requires everyone on site to work together, just as they would in response to a terrorist event. INVOLVEMENT Our position as an integrated facilities management service provider means that we also work with cleaners, engineers and parking attendants, to name only a few of the teams present on a site every day. All of these people see and hear a lot

of what happens both during and after opening hours, and play pivotal roles in helping us all to deter and detect those who have may have sinister intentions. At ABM, we make sure they are all trained in counter-terrorist strategy and that they can play meaningful role in reducing the chances of an attack. While any given site is likely to have a combination of staff working for the managing agent, any number of facilities services providers as well as numerous subcontractors, we believe that when it comes to counter terrorism, competitors must become collaborators. Not only should they share the training room, but they must be in constant communication. PATTERNS AND BEHAVIOUR Before an attack, terrorists will carry out reconnaissance on a target site. Often, they are looking for patterns in the behaviour and movement of both visitors to a site, and the people working on a site. Patterns that repeat over a period of months are helpful to their plans, but when those patterns are disrupted, their confidence is dented and plans can be dropped. Randomising operational patterns of behaviour and introducing new counter-terrorism approaches will cast doubt in the eyes of those planning an attack. Doubt is the key to successful deterrent. Although patterns should appear randomised, they must be changed with confidence and executed with precision by everyone working on site. That only happens with clear, consistent and concise communications across all parties. Just as the nature of terrorist threats has changed, so must efforts to deter them. Preparing to respond to the worst-case scenario is clearly important, but preventing it from happening in the first place must be the collective objective of everyone working on site. For this, collaboration is key. !

FURTHER INFORMATION www.abm.co.uk

52

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34


COMMUNICATIONS " looked at a kind of ‘big bang’ approach where we had to be completely ready before any of the users went, or we even started trial and transition. That was the old plan A.” Continuing on the theme, he said: “It makes sense if you’re under attack to go at the speed of the slowest ship in the convoy, but in other circumstances – with the number of users we have – a more efficient approach is to let people go at their own pace. Plan B is going to allow a more agile, nuanced and iterative approach.” According to Webb, plan B – which is also known as ‘incremental delivery’ – will primarily involve the potential use of data and non-critical voice, with some services available by the end of this year. This, he said, would mirror the original roll-out of Airwave, which was a ‘journey’ that ultimately took around a decade to fully complete. Progress which has allowed the programme to consider incremental delivery includes successful testing on the first software drop BSR1 (thereby facilitating the testing of BSR4 in April), alongside completion of the core network build. According to Webb, EE’s coverage has also now reached 90 per cent, which could be augmented with temporary solutions if any network user decided to go early. Moving on from the ways in which users can begin to take advantage of the network, he discussed the reason for shifting timescales; placing the blame on gaps in planning, traceable

THE FIRST ESN PRESENTATION OF THE CONFERENCE WAS DELIVERED BY THE HOME OFFICE’S STEPHEN WEBB back to the beginning of the project. He said: “The overall challenge of ESMCP is a large logistical one. There is the complexity of the sheer number of user organisations involved, bringing with it a wide variety of needs as well as [differing] target operating models, legacy systems and local governance arrangements. We adopted quite a complex procurement route, reflecting the government policy of disaggregation – splitting things up to get the best possible supplier in every area. We pushed that very hard, possibly underestimating the challenge that would bring in regards to integration. “On reflection, it probably would have been better if we’d allowed suppliers more time talking to each other so they understood each other’s solutions as they worked out their bids. In some areas people turned up with slightly different technical assumptions, which

required a bit of rework. There are lessons learned.” Other potential issues, according to Webb, included an initial underestimation of the number of software drops that would ultimately be required (three). MOVING AT A DIFFERENT PACE Following Webb, the ESN theme continued with a panel session chaired by Richard Morris, business change lead for the UK police. Speaking about the implementation of the network, Michelle Williams, business change lead, Wales, said that in her country the emergency services are taking a collaborative approach to delivering ESN. She added that Wales has merged its police and fire control rooms and that this will allow the two services to share some of the expensive equipment such as the Integrated Communication Control Systems (ICCS) and Direct Network Service Provider (DNSP). Damien Smethurst, North-West regional programme director, Cheshire Police, noted that ESN cannot be considered in a vacuum. He said: “We’ve all got alliances, collaborations and legal agreements that are close border. My home force of Cheshire has a firearms alliance and joint teams with North Wales, so whatever we do in the North-West has to be impacted and assessed against what Wales does.” Smethurst added that a huge amount of work is being done across the emergency services to assess the impact

of ESN in terms of business change, and the processes that will need to bealtered. He said: “Because it [the timetable for transition to ESN] has moved slightly to the right, that actually gives us a better opportunity to plan. Some forces are much further along the pathway for digitisation than others. Therefore how they come onto ESN is going to be fundamentally different.” He noted that one potential issue with the incremental delivery programme is the time it takes the emergency services to implement any change. He therefore highlighted the need to know the timetable between the BSR4 (partial ESN functionality) and BSR7 (full functionality) software drops. “To put a programme of change within a police force often takes 12 months plus, because we have to maintain business as usual for the public. So when we’re planning business change it’s essential to know what the timescales are. That’s where there might be some frustration, because that might impact on what we can take practically and financially. The quicker we have those timescales around when functionality will come, the quicker we can identify what business change we can achieve and what value for money we will get from it.” FROM STANDARD TO SILICON Following the conclusion of the first portion of ESN-related content, the conference programme #

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

53


COMMUNICATIONS " started to introduce a more international flavour, beginning with TCCA chief executive Tony Gray. He began his presentation – which looked at mobile broadband communications standards and solutions across the globe – with an overview of the work being carried out by his own organisation. He said: “We support open standards which means anything created in an international body, including ETSI, 3GPP and so on. Through the use of standards – and through our TETRA heritage – we’ve found that this seriously catalyses competition and creates multi-vendor markets.”

ALL THE WORK WHICH HAS ALREADY BEEN DONE WITH POLICE FORCES WILL TRANSITION OVER TO A SINGLE DEVICE, WHICH IS A MASSIVE EFFICIENCY Discussing the progress of the standards, focusing in particular on 3GPP, he said: “The process takes place in the form of ‘releases’, with Release 15 planned to be finished by the end of the third quarter of this year. Release 16 will be started in the same phased process. These are worked on in overlapping stages,

54

beginning with general specification, before moving on to protocols, and finally the development of standards for devices and corenetworks.” He continued: “Release 14 – which is probably the most critical for a lot of what people would want to do with mission-critical broadband today – is actually there. The challenge is getting all of the work items in a particular release finished in the final stage. There’s inevitably an overflow into the following release.” Gray said that while a standard itself might be fully developed, the time it takes to move from standard to silicon is still a factor, with between 18 months and two years the typical period for interoperability and conformance testing before any technology actually becomes available. This is apparent, he said, in the current situation with Release 13, which actually existed as a standard in the first quarter of 2016. Addressing the question of potential ESN obsolescence due to it being based on Release 12, Gray said this would not be an issue as long as ‘you don’t have to have all things for all people’ on day one. He said: “If there’s a commitment to standards as they become available, it’s reasonable that some people will have applications which they can use more or less right now, while others will add the missing bits as they come through.” The first day also included presentations on the police use of drones, Peter Clemons discussing ‘global best practice’

and a fascinating fire and rescue service commander’s eye view of the response to a serious incident at a British themepark. ONE-YEAR ANNIVERSARY One thing that made this year’s event stand out from its predecessors was a greater focus on the work being done by other countries’ public safety organisations. Arguably the most anticipated example of this was the presentation by FirstNet’s Poth. He also said that FirstNet’s dedicated core network was very close to completion as AT&T was finalising its testing and that it will support end-to-end encryption for public safety data. Poth said: “We just passed our one-year anniversary of the contract award. AT&T has met all of the scheduled requirements, all the deliverables. AT&T has a contractual requirement to get FirstNet completely built out in five years, but it’s targeting to have it done within about three years. When it has done this, the wireless 4G network will cover 95 per cent of the US population and about 90 per cent of US geography. “One of the requirements that we put in there is that every time AT&T builds out, it has to do it in the rural areas also. We are taking it into non-economic areas where ordinarily, as a commercial carrier, it would not have gone. We knew that was important for public safety and AT&T is rising to the challenge.”


COMMUNICATIONS Poth explained that AT&T will be able to use FirstNet’s spectrum for commercial purposes and that the carrier is deploying an additional 40MHz of new spectrum, which will be available to public safety users. Because of this, FirstNet is ‘very comfortable and confident that public safety throughout the US and all 56 states and territories in times of crisis and in times when it’s normal will have more than enough spectrum’. He added that FirstNet isn’t taking a position on when transition from LMR to LTE should take place, adding that it is up to public safety agencies to decide when they can ‘retire one system and move onto the next’. Similarly, in response to a question around interoperability between AT&T and Verizon, he noted that Verizon chose not to bid for the FirstNet contract. He said: “We’re not going to take a position and try to compel any commercial provider to work with another commercial provider.” Poth also gave some examples of where FirstNet is already being used, such as in Texas, where within its first month on the network, video footage of an armed robbery was streamed from two parked police vehicles. WORN ON THE STAB VEST The focus on nationwide public safety LTE networks continued with a presentation by Samsung Electronics UK’s head of public safety, Nick Ross. Speaking in the light of his company being

ONE POTENTIAL ISSUE WITH THE INCREMENTAL DELIVERY PROGRAMME IS THE TIME IT TAKES THE EMERGENCY SERVICES TO IMPLEMENT ANY CHANGE awarded the first contract to supply ESN handheld devices, he gave a history of Samsung’s involvement in public safety and how frontline operational requirements have changed in line with technology. He said: “Five years ago, the vast majority of police officers out of the station used a paper notebook [as opposed to current smart device applications such as Pronto]. I would estimate now that around 80 per cent of what a police officer can do on their desktop, they can also carry out on their mobile device.” He continued that following the contract award, Samsung now had to sit down as a partner with the emergency services to discuss strategies in regard to cyber-enabled crime, child sexual exploitation and so on. This was a process, he said, which had already begun via relationships which the company has already established with forces around the country as part of individual smart device roll-outs. Discussing the technology itself, he said: “All the work which has already been done with police forces will transition over to a single device, which is a massive efficiency. The IP68 ruggedised version is going through testing at the moment, with the working title of Samsung Galaxy ESN. For those not wanting the ‘frontline’ rugged experience, the Galaxy S8 will also be ESN compatible.” Potential issues addressed during the design process include button positioning, as well as the ability to use the touchscreen while wearing PPE, something which has been solved via a software development kit allowing users to change the sensitivity of the glass. The device can be worn upfront on the stab vest or kept in a user’s pocket, with control provided via a Bluetooth remote speaker mic. Other presentations on day two included a discussion of the WannaCry cyber attack on the NHS, presentations on emergency alerting apps and a second case study, focusing on the Grenfell Tower disaster. FROM THE EXHIBITION FLOOR Red Box Recorders has supplemented its voice recording offering with automatic speech recognition technology provided by Speechmatics. Speaking of this, Paul Long, Red Box Recorders’ technical design authority, said that one of the biggest use-cases for this in a public safety context is searching for keywords in logged calls post-incident. Alex Robson, the company’s marketing executive, added that it

could also be used to help prove that public safety officials had managed an incident correctly, for instance in response to complaints from the public. David Robinson, business development manager at Motorola Solutions, demonstrated the use of a fingerprint-reading peripheral, in combination with a mobile device and the company’s Pronto mobile working platform. The system allows for fingerprints to be read and then searched for on both police and immigration databases, with information from the databases then used during a number of business processes. Robinson explained that the peripheral is required because smartphones’ native fingerprint readers are not yet at the necessary quality. He added that West Yorkshire Police are currently using it – among other things – to identify unconscious victims, explaining that those police forces using the system aren’t doing so to capture fingerprints, only checking to see if a person’s fingerprints are already on the system. Simon Hall, CEO of Coeus Software, walked us through his company’s Quvo Workforce Mobility Platform and its public safety version, PoliceBox. Like Motorola Solutions’ Pronto, these are designed to allow users to perform business processes on the move. The system uses Microsoft Azure as part of a hybrid software-as- a-service (SaaS) model, and because of the company’s ‘very anti-consultancy’ approach, has been designed to allow customers to easily add new business processes, ‘they take just a few days to build’, without incurring additional costs. With ESN now beginning to focus on delivery, we are looking forward to next year’s event and hearing more from the user organisations about how they will manage the transition. In the longer term, it will be interesting to see the use-cases that will be discovered once the technology starts to be deployed on a large scale. !

BAPCO and TCCA have announced that next year’s Critical Communications Europe – which is staged on behalf of TCCA – will take place in conjunction with the BAPCO Annual Conference & Exhibition. The venue for both will be the Ricoh Arena in Coventry, in March 2019.

FURTHER INFORMATION www.bapco-show.co.uk

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

55


CBRNE

RADIATION Dr Rico Chandra, CEO of Arktis Radiation Detectors, looks at the requirement for a network of radiation detection systems to counter the growing fear that terrorists could develop a ‘dirty bomb’

DEFENDING AGAINST THE DETONATION OF A ‘DIRTY BOMB’ T he recent Sergey Skripal case in the UK has brought into sharp focus the threat of non-conventional weapons such as CBRN. The effect of a relatively small quantity of a chemical warfare agent, even if used in a limited geographical area, can be destabilising. Now imagine for a moment how magnified those effects would be in the case of another CBRN threat, the detonation of a ‘dirty bomb’ – conventional explosives surrounded in radioactive material. Impacts would be more widespread, both geographically and from the economic and health perspectives. Radioactivity cannot be seen, nor smelled, by a human being but only measured with dedicated tools. A whole district or city would need to be decontaminated. Long-term health effects of the population would be hard to determine. For a terrorist organisation with even rudimentary IED capabilities, the design and build of the explosive elements of a dirty bomb would be relatively easy. Obtaining radioactive material in sufficient quantities to create a devastating radiological dispersal is a harder challenge, and one which can be enhanced by appropriate regulation and effective law-enforcement. In early March for instance, British

56

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

newspapers wrote about an incident where Turkish police seized radioactive material whilst searching a car in Ankara. Stating the suspects were part of a group that had planned to sell the material, they also indicated that the material seized was Californium-252, a rare element only produced in very small quantities, typically in state-owned nuclear research facilities. The public reporting was questionable and was later put into perspective by the Turkish Atomic Energy Authority (TAEK). Whatever the reality it shows how delicate this issue is. There is much credible evidence that ISIS, and other terrorist organisations, are seeking to acquire radiological materials. In 2014, ISIS were reported by UN Ambassador Mohamed Ali Alhakim to have control of radioactive sources from Mosul University. The following year, Moldovan Authorities intercepted a smuggler aiming to supply ISIS with a large quantity of radioactive cesium and, in 2016, a senior Belgian nuclear official was reportedly monitored by ISIS, who planned to abduct him as part of a plot to obtain radioactive material. Whilst the impetus for terrorism remains and individuals with relevant expertise are at large, it seems highly likely that similar cases will re-emerge soon. #


Life saving decision making in the palm of your hand!

Mira DS is the new handheld material identification system from Metrohm. Identify hazardous materials and explosives in seconds! • Powerful – respond to threats faster and safer than ever • Fast – get results in seconds • Flexible – be prepared for every treacherous situation • Robust – MIL-STD-810G and IP67 certified Watch a demo on metrohm.com/mira-ds


CBRNE

" Governments have not been idle in countering the dirty bomb threat. In the UK, the Cyclamen Programme placed radiation monitors at entry points and in the US the Radiation Portal Monitor (RPM) Program fielded some 1,800 systems at both sea ports and land border crossings. Equipment from both procurements is now heading towards the end of its useful life, and programs exist in both countries to replace, upgrade and network replacements. In an effort to provide ‘Defense in Depth’, the US’ National Nuclear Security Administration has been taking similar technology and supplying it to nations which have experienced periods of less rigorous internal regulation of nuclear materials. Their aim is to check outbound cargoes for smuggled material. More broadly, the Global Initiative to Counter Nuclear Terrorism, with an implementation group led by Finland, has 88 countries working together to strengthen nuclear regulatory mechanisms. RADIOLOGICAL SECURITY However effective perimeter detection, and even port-of-departure screening becomes, it can never wholly counter the threat of radiological terrorism. Not every mile of border or coastline can be scanned and radioactive materials in legitimate transit can be obtained by maritime hijacking, a recent topic of study at Sandia National Labs which examined the hijack threat in the western Indian Ocean. Similarly, perimeter detection cannot counter the threat arising from loss of control of radioactive materials used in widespread civilian applications.

HOWEVER EFFECTIVE PERIMETER DETECTION BECOMES, IT CAN NEVER WHOLLY COUNTER THE THREAT OF RADIOLOGICAL TERRORISM These include medical investigation and treatment, and extensive use in industrial non-destructive testing processes. End of life management of equipment containing radioactive sources needs to be significantly improved in many countries, not just to counter terrorism but to ensure that, even innocently, radioactive contamination does not enter the food chain, water supply or manufactured goods with a proportion of recycled metals. This is predominantly a regulatory issue, but technology has a role to play, for instance in scanning inputs to metals-recycling facilities. Rapidly evolving technology may offer a step-change in radiological security, and therefore the ability to deter terrorists from building radiological weapons within a nation as well as smuggling in the required materials. A grid of integrated detection systems comprising a network of static and mobile sensors, to protect cities and critical national infrastructure, has long been envisaged. In the past two factors impeded the creation of such a capability on large scales: (a) large networks require sensors which are much more affordable than has been the case until recently and (b) networking technology capable of securely handling large volumes of data from mobile sensors and remote sites has been expensive and largely restricted to the military.

The first of these challenges, building affordable sensors, is being addressed successfully by several providers around the world. I’m proud to say that my own company, Arktis Radiation Detectors is one of them. Strong leadership has been shown by government bodies in several countries, perhaps most notably DARPA in the US. Over the last decade, a 90 per cent reduction in sensor cost with appreciable improvements in performance has been shown to be achievable. The networking challenge, is of course being simplified immensely rapidly by the development of 5G telecoms, by the growth of ‘big data’ applications and infrastructure, and by the growth in understanding of cyber security. The adoption of sensor networks to defend against radiological threats will depend on government. At the moment, principally national governments, but in future perhaps the leadership of the world’s great cities. Washington DC, working with DARPA and the Department of Homeland Security, has already trialled the technology. Perhaps before too long we will see the demand coming from the populations, and then the Mayors of Chicago, or London? !

FURTHER INFORMATION www.arktis-detectors.com

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

59


TRAINING

CT POLICING Counter Terrorism Police have joined forces with a major retailer to develop a pioneering programme to train over a million crowded places workers. Here, the organisation explains why

TERRORISM TRAINING FOR A DIGITAL AGE igh Street giant Marks and Spencer has partnered with specialist officers to help spearhead and fund the initiative, which has been successfully trialled with 20,000 employees from its stores and other businesses operating in busy towns and cities. Called ACT Awareness e-Learning, the six main modules teach staff about the threat from terrorism and explain what steps they can take to help tackle it. A seventh module offers supporting material and links for further information. The course, which is fully interactive, can be taken at times to suit business needs. Topics covered will include spotting the signs of suspicious behaviour and reacting to a firearms or weapons attack. Police have consulted with other industry leaders in areas such as entertainment and hospitality and are now ready to make ACT Awareness e-Learning available free of charge to all qualifying organisations – private or public. The development will not replace the role of specialist CT officers who liaise with and

H

60

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

advise industry on security matters, but will help provide extra ‘eyes and ears’ to help defeat terrorism in busy, high-profile places. Det chief Supt Scott Wilson, National Coordinator for Protective Security, explains: “We want to do everything we can to protect our crowded places, so welcomed the opportunity to work on this project with Marks and Spencer and others. There is no specific increased threat to the retail sector but the general threat level is at Severe, meaning an attack is highly likely. Developing joint projects like this is going to be a significant part of our CT Police’s protective security work. “With increasing pressure on resources in all areas of business, we all need to collaborate more. M&S have shared their knowledge of operating day to day in busy shopping centres with specialist officers who understand the threat picture. Together we have been able to develop a product that can be used by a wide variety of organisations operating in crowded places. “The demand for face to face briefings within crowded places companies was #


TRAINING

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

61


Emergency Stairway Evacuation Chair

Evac+Chair provide a universal solution for smooth stairway decent in an emergency evacuation.

DESIGNED & MANUFACTURED IN THE UK

CALL 0121 796 1438 EVACCHAIR.CO.UK or Visit:

For a FREE Evacuation Assessment


TRAINING " growing faster than courses could be arranged – and they come at a cost to businesses. Significant sums have to be spent in terms of employee travel, venue hire, refreshments etc. This product will vastly increase the number of staff we can brief in a relatively short period and at a much lower cost. “And apart from the financial and organisational demands on group briefings, in a digital age we needed a digital solution. This course can be carried out in bite-sized chunks at times to suit. We will also have better analytics to keep track of who has undertaken what modules and have version control to ensure we are sharing the most up to date information. “Already we are looking ahead to Version Two to ensure we stay up to date with emerging threats. The feedback from the staff at M&S and the other companies we have asked to trial the product has been overwhelmingly positive. Colleagues found the content informative and engaging.” John Frost, head of Business Continuity from Marks and Spencer, also commented: “We were reviewing our training in this area so the timing of this collaboration was ideal for us. Obviously it is a priority for Marks and Spencer that we do all we can to protect our people, our property and our brand. Undertaking work like this is what our customers would expect of us.” SECURITY CRITERIA The ACT Awareness e-Learning initiative follows on from the successful launch of the industry self-delivery package two years ago. This enabled accredited trainers rather than police officers to deliver counter terrorism workshops. Over 400 companies and public bodies, with a collective workforce of two million employees, signed up – massively increasing the numbers of people able

M&S HAVE SHARED THEIR KNOWLEDGE OF OPERATING IN BUSY SHOPPING CENTRES WITH SPECIALIST OFFICERS WHO UNDERSTAND THE THREAT PICTURE to improve their security awareness. Previously, police-led briefings were reaching around 100,000 people per year. Moving to an online platform aims to open up the course to many more organisations who do not have qualified trainers within their teams and would otherwise have to buy-in the service – thus reducing costs and being more flexible for employees to fit in around their main work commitments. Another key partner in the development of the course was Highfield e-learning – a global leader in compliance e-learning and a Queen’s Award winner for Enterprise. Highfield will register applicants for the package and, once approved by CT Policing, provide the necessary URL links so employees can log on and work through the modules in a timeframe to suit them and their businesses’ needs. There is also a facility that allows organisations to host the package on their own IT systems, providing certain security criteria is met. This is available via a SCORM file. Police are hoping that a million or more workers will follow the modules. The six key components cover: an introduction to terrorism; identifying security vulnerabilities; identifying and responding to suspicious behaviour; identifying and responding to suspicious items; what to do in the event of a bomb threat; and how to respond to a firearms or weapons attack. The estimated completion time for all six sections is under one hour. Material previously produced by CT Policing’s National Counter Terrorism

Security Office (NaCTSO), such as the Run, Hide, Tell films have been repackaged to suit the modular format. The availability of the product was announced at a recent summit of senior police protective security leads from around the UK. Each senior officer was invited to bring key business and local authority figures to the event held at the offices of Credit Suisse in London’s Canary Wharf. The day-long seminar also included presentations on other current security issues such as hostile vehicle mitigation and CBRNe threats. However the main aim of the day was to encourage sign-up to the e-Learning package. DCS Wilson adds: “The areas we cover in this step-by-step package could save lives. Industry specifically requested the development of this type of product to better prepare their staff and help protect communities and businesses. It won’t replace the involvement of CTSAs – they are still available if needed. “All staff working in crowded places – not just those who have a security role – can follow the course and be in a stronger position to help protect themselves, colleagues and the public. The benefits go beyond the immediate work place. The course will equip all those who take it with knowledge they can apply in other areas of their daily lives. “We hope many organisations will want to sign up and take advantage of this free product. Our CTSAs will be approaching their regional contacts to make them aware of the facility and explain how they can take part. We are grateful to Marks and Spencer who entered into this collaboration with us. They have shown true leadership in the sector in helping us develop the modules in a way that will easy for all sizes of company to use. “This is our second major collaboration following last summer’s work with the Foreign Office and ABTA the Travel Association to provide briefing tools for travel industry staff and tourists. It is not about replacing police involvement but expanding our reach to raise awareness of the threat from terrorism with as many people as possible.” !

Companies wanting more information or to apply for registration should visit the National Counter Terrorism Security Office (NaCTSO) website.

John Frost (left), M&S with Scott Wilson (right), CT Policing

FURTHER INFORMATION tinyurl.com/yb5kcgdm

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

63


EVENTS DIARY

EVENTS DIARY FUTURE SURFACE FLEET 6-8 June 2018, Portsmouth, UK www.futuresurfacefleet.com

With operational environments changing and many naval platforms now reaching end of life, nations are now looking to either update their fleets or to design and build new vessels to meet an ever changing threat and to meet the new demands of the 21st century. Future Surface Fleet 2018 explores the wide range of programmes being conducted by nations and how new and changing technologies will influence the maritime environment over the next 25 years.

EUROSATORY

11-15 June 2018, Paris www.eurosatory.com Today the world faces a wide range of conflicts, terrorist threats and emergencies that increasingly intensify. In the light of this, states and private citizens need defence and security solutions to ensure peace, safety and stability. Eurosatory is the leading international land and airland Defence and Security exhibition that will be held from 11-15 June 2018 at the Paris Nord Villepinte Exhibition Centre. In 2016, it gathered 1,571 exhibitors, 212 Official Delegations, 57,024 international visitors and 700 journalists from all over the world.

your role in the industry, you have a part to play in global security. IFSEC International is your platform to share ideas, discover best practice and get hands on with the latest physical and integrated security products.

IFSEC International is Europe’s leading security event and the only global stage committed to co-creating the future of integrated security. It is the critical, measured response to a world of ever-evolving threats, inviting every vertical of the security industry to forge the global agenda. In 2018, IFSEC International’s magnetism will stem beyond its status as a world-class security exhibition and conference show. Whatever

64

5 March 2019, London awards.counterterrorbusiness.com

SDW 2018

25-27 June 2018, QEII Centre, London www.sdwexpo.com

SDW is a world-leading event providing a global showcase for next-generation human identity solutions, focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations. Recognised worldwide as the preeminent conference for professionals involved in secure ID credentials and government-identity solutions,the three-day SDW conference brings you innovations, insight, analysis and debate direct from over 75 industry experts. The SDW conference programme covers key issues, including identity fraud, document design, travel documents, smart borders, eID, biometrics, digital and mobile ID, smart citizens and the future of identity innovations.

INTERNATIONAL SECURITY EXPO

28-29 November 2018, London Olympia www.internationalsecurityexpo.com

IFSEC INTERNATIONAL

19-21 June 2018, ExCeL London www.ifsec.events/international

THE COUNTER TERROR AWARDS

International Security Expo is the premier showcase for homeland and commercial security attracting a global audience of government, transport and borders, law enforcement, military, emergency services, CNI, cyber security, facilities managers and the public and private sectors. Through a series of conferences, workshops and interactive features, the event tackles some of the most challenging threats to our citizens, borders and infrastructure.

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

The tragic and despicable terrorist events of the early 21st century have forced the international community to act. Increasingly sophisticated strategies and technologies are being employed by organisations throughout the world in order to counter the threat. The Counter Terror Awards will be staged to recognise the efforts of organisations in both the public and private sectors and their contributions to counter terror strategy in the UK and overseas, as well as the vital role played by the military and emergency services in mitigating terrorist threats and striving to keep the public safe. The Counter Terror Awards will take place for the second time on 5 March 2019, in association with the Security and Counter Terror Expo.

SECURITY & COUNTER TERROR EXPO

5-6 March 2019, Olympia, London www.counterterrorexpo.com The Security & Counter Terror Expo is a world-class showcase of the capabilities, strategies and intelligence to keep nations, infrastructure, business and people safe. The event brings together over 10,000 senior professionals from government, the private sector, critical national infrastructure, military, law enforcement, transport security, border security, security services, major events and emergency services. Understanding the threat horizon is crucial for effective mitigation. The World Counter Terror Congress, part of SCTX, provides a closeddoor forum to explore the latest terrorist risks and the capabilities to maximise resilience to them. Becoming a delegate at World Counter Terror Congress provides you with the latest intelligence, strategies and tactics to successfully prepare and protect against terrorism. Clarion Events, the organisers of SCTX, are supporters of the Counter Terror Awards.


ADVERTISEMENT ADVERTISEMENT FEATURE

DEFENCE

AN ULTRA CHALLENGE OR THREE?

How do charities keep their fundraising calendar fresh and interesting, especially in these hardened times? The simple answer is having amazing volunteers and supporters, who also have some rather crazy ideas

Felix Fund is no different from any other charity in that we are always looking out for new and exciting challenges and events to fundraise from. 2018 is certainly proving that point when Captain James ‘Waddie’ Wadsworth CGC launched a series of hard endurance events to raise funds for the bomb disposal charity. With several years of fundraising under his belt, Waddie has launched The Captain James Wadsworth Challenge for 2018, which will see participants swimming, running and cycling across difficult terrains and in challenging conditions. The first of these tough endurance events will take place on the 7-11 June 2018, when a team of 15 or more cyclists will endeavour to tackle the Tour De Troops, returning following its success last year, but with a slightly different spin. This time its Lands’ End to John O’Groats in five days. Not for the feint hearted as the challenge to achieve 180 miles each day is a tough one. If that wasn’t enough, following a brief rest, the next challenge, The Soldier Pass Run, takes place on Saturday 14 July 2018, encompassing a range of abilities with options of 5K, 10K, half, full and ultra marathon routes. The runs will start from and end at the home of Felix Fund, Vauxhall Barracks, Didcot in Oxfordshire.

To round off this ‘ultra tri-athlon’ on the 6 September 2018 there will be the Victory Swim at Lake 32 at Cotswold Water Park, Gloucestershire. Again, there will be a choice of distances for all levels of open water swimming. With the possible exception of the Tour De Troops, these challenges are accessible to everyone, no matter what your level of fitness and whilst they are important to raise the profile of Felix Fund and of course funds for our work, they are also important for community engagement between military and civilian. Events such as these don’t happen without a lot of hard working, planning and determination but are essential for charities like Felix Fund to engage with our audience and raise much needed funds. Waddie joined the army in 1995, qualifying to work in the Explosive Ordnance Disposal (EOD) unit and touring some incredibly busy and dangerous places, including Northern Ireland, Iraq and Afghanistan. He was awarded the Conspicuous Gallantry Cross for his extraordinary courage in 2008. Dedicated to fundraising, he has taken part in various challenges. In 2014, he completed the Spartan Race Trifecta, raising

£23,000 for Felix Fund, and, in 2015, he contributed to fundraising £27,000 for the Felix Festival. 2016 and 2017 saw Waddie complete the Marathon des Sables, which covered 251 kilometres of the Sahara in just one week. Last year, he cycled the Tour De Troops, which covered 130 miles a day from Scotland to Germany. The money raised by his latest fundraising venture will go to a charity very close to his heart. Wadsworth said: “I’m extremely passionate about fundraising for such an important charity. Felix Fund is a hugely worthwhile cause. Having first-hand knowledge of what brilliant work they do, I think it’s vital to help them give support and rehabilitation to brave soldiers and their families, as well as raising the profile of the important bomb disposal work that they do. “The Ultra Challenges are endurance events to stretch abilities and will be run for military personnel alongside civilians. We hope to gain as much exposure as possible and look to people to sponsor participants in the events to raise as much money for this great cause.” Melanie Moughton, CEO of Felix Fund, added: “This series of events will hopefully secure a large amount of our fundraising target for the coming year. Opening up the challenges to all fitness levels allows for greater participation and awareness. We hope that these will become a regular feature of Felix Fund’s fundraising calendar.” DO YOU NOW FEEL LIKE CHALLENGING YOURSELF? Set yourself some fitness goals and why not sign up to some or all the events at: Tour De Troops: https://origintickets.co.uk/ store/?event=1066 The Soldiers Pass Run: https://origintickets.co.uk/ store/?event=1065 The Victory Swim: https://helmtickets.com/ events/1277/the-victory-swim TO MAKE A DONATION, VISIT: Tour De Troops: https://www.justgiving.com/ fundraising/tourdetroops The Soldiers Pass Run: https://www.justgiving.com/ fundraising/thesoldierspassrun The Victory Swim: https://www.justgiving.com/ fundraising/thevictoryswim Felix Fund has been supporting the men and women of the wider EOD and Search community for over seven years and whilst the world may have changed since it was first set up, the need for our help and support is ever present. For more information about Felix Fund, and how you can support us, please visit our website www.felixfund.org.uk or contact enquiries@felixfund.org.uk or call 07713 752901. !

FURTHER INFORMATION www. www.felixfund.org.uk

ISSUE 34 | COUNTER TERROR BUSINESS MAGAZINE

65


ADVERTISERS INDEX

Institute of Risk Management

Are you risk ready? IRM qualifications combine the principles and practice of risk management to help you protect your organisation. Join more than 8,000 students from 143 countries who have studied with us.

Find out more and start your journey Âť www.theirm.org/getqualified

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service 2J Antennae ABM Association of Remote Piloted Audax Global Solutions Blue Mountain Group Clarion Events Cognitec Systems CPM Group Drone Detection Systems Evac Chair International Felix Fund FLIR Frequentis Frontier Pitts Garrett Metal Detectors Genetec Europe Getac UK

66

COUNTER TERROR BUSINESS MAGAZINE | ISSUE 34

Inside Back Cover 52 44 Back Cover, 44 4 36 14 24 8 62 65 Inside Front Cover 10 27 38 40 50

Heald Heras KNect 365 Mercian Labels Metrohm Morgan Marine OpenWorks Engineering Perimeter Security Suppliers RoadPhone NRB Safetell Science Media Partners SeeQuestor SmartSearch SolarWinds TAPA EMEA Torch Marketing Tytek Group

46 22 42 6 58 14 46 46 30 44 48 44 12 34 46 26 16


B O DY

W O R N

1

V I D E O

st

• Worldwide leaders and Pioneers in developing Body Worn Video (BWV) technology since 2005. • UK security company ever funded by the European Union H2020 SME Instrument Phase 2 programme. • Winner of the Communication Systems Award at the UK Counter Terror Awards in March 2018. • BWV System that exceeds all current standards including BS EN 8593. • BWV ‘eco’ system that ‘fuses’ secure evidential video gathering with active user protection, encrypted Live Streaming, Google map Overlays and remote viewing. • Company to collaborate with Academia and offer Accredited BWV Training Courses.

Visit www.audaxuk.com to learn more

BioAx received funding from the European Union’s H2020 Research and Innovation Programme (719806)

Profile for PSI  Media

Counter Terror Business 34  

Delivering Key Strategies To Combat Terrorism

Counter Terror Business 34  

Delivering Key Strategies To Combat Terrorism

Profile for psi-media