Page 1

www.counterterrorbusiness.com | ISSUE 14

HOSTILE VEHICLE MITIGATION | INTELLIGENCE | BORDER CONTROL | PLUS MORE

EVENT PREVIEW

DSEI 2013

The first line of defence arrives at ExCel

CYBER TERRORISM

A THREAT TO THE NATION

The real impact of a Skyfall-style MI6 hard-drive theft CRITICAL NATIONAL INFRASTRUCTURE

KEEPING THE COUNTRY POWERED UP

Protecting our energy sources

EVENT PREVIEW

TRANSPORT SECURITY EXPO 2013 Event examines the major threats facing the industry

PERIMETER SECURITY

FORENSICS

EMERGENCY SERVICES


COUNTER TERROR BUSINESS www.counterterrorbusiness.com | ISSUE 14

HOSTILE VEHICLE MITIGATION | INTELLIGENCE | FORENSICS | PLUS MORE

EVENT PREVIEW

DSEI 2013

The first line of defence arrives at ExCel

CYBER TERRORISM

A THREAT TO THE NATION

The real impact of a Skyfall-style MI6 hard-drive theft CRITICAL NATIONAL INFRASTRUCTURE

KEEPING THE COUNTRY POWERED UP

Protecting our energy sources

EVENT PREVIEW

TRANSPORT SECURITY EXPO 2013

Comment

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SCHEDULE 7 SURVIVES Schedule 7 legislation, currently under review, survived a major legal challenge earlier this month. Mrs Beghal, a French citizen who lives in the UK and whose husband was convicted and jailed in France on terrorism charges, was stopped in January 2011 after arriving at East Midlands Airport on a flight from Paris. When she refused to answer questions, she was charged and later convicted of failing to comply with the order, bringing about the legal challenge.

Event examines the major threats facing the industry

PERIMETER SECURITY

FORENSICS

EMERGENCY SERVICES

In his judgement, Lord Justice Gross said the stops were ‘neither arbitrary nor disproportionate’. He said: “The schedule 7 powers of examination survive the challenges advanced before us. In short, the balance struck between individual rights and the public interest in protection against terrorism does not violate the fundamental human rights in question.” Schedule 7 was also used to stop David Miranda, partner of Guardian journalist Glenn Greenwald, at Heathrow Airport earlier this month. The detention and confiscation of computer equipment brought the power back into the spotlight. Human rights group Amnesty International have said for some time that said schedule 7 “violates any principle of fairness”. A number of reforms, which are currently going through Parliament, include allowing those held for longer than an hour to consult a solicitor, a reduction in the time someone can be held from nine hours to six hours, and training and accreditation for all officers using schedule 7 powers. David Anderson QC, the government’s independent reviewer of terrorism legislation, has raised questions about the ‘unusual’ exercising of it in the Miranda case. As we go to press, US Secretary of State John Kerry has said that Washington has evidence of Syrian forces in the eastern suburbs of Damascus using the nerve agent sarin in a deadly attack in August. He claimed almost 1500 were killed. United Nations inspectors are currently gathering their own evidence. An attack on Syria by the US would ‘make terrorism flourish everywhere’ according to Syria’s deputy foreign minister Faisal Mekdad. When asked if the Syrian government had used chemical weapons, he told the BBC’s Jeremy Bowen that they were “used by Western-backed armed groups”. The world awaits.

Danny Wright

P ONLINE P IN PRINT P MOBILE P FACE TO FACE If you would like to receive 4 issues of Counter Terror Business magazine for £80 a year, please contact Public Sector Information, 226 High Road, Loughton, Essex IG10 1ET. Tel: 020 8532 0055, Fax: 020 8532 0066, or visit:

www.counterterrorbusiness.com PUBLISHED BY PUBLIC SECTOR INFORMATION LIMITED

226 High Rd, Loughton, Essex IG10 1ET. Tel: 020 8532 0055 Fax: 020 8532 0066 Web: www.psi-media.co.uk EDITORIAL DIRECTOR Danny Wright ASSISTANT EDITOR Angela Pisanu PRODUCTION EDITOR Richard Gooding PRODUCTION CONTROL Jacqueline Lawford, Jo Golding WEB PRODUCTION Reiss Malone ADVERTISEMENT SALES Rachael McGahern, Chris Jones PUBLISHER Sally Brockman ADMINISTRATION Victoria Leftwich, Charlotte Casey REPRODUCTION & PRINT Argent Media

© 2013 Public Sector Information Limited. No part of this publication can be reproduced, stored in a retrieval system or transmitted in any form or by any other means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. Whilst every care has been taken to ensure the accuracy of the editorial content the publisher cannot be held responsible for errors or omissions. The views expressed are not necessarily those of the publisher. ISSN 1362 - 2541

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

3


! EW T S N PA CT -T U C D O PR

Asset Labels Plastic & Metal Security Seals C-TPAT Metal Bolt Security Seals Tamper Evident Bags


CONTENTS 11

07 CTB NEWS

Scotland Yard investigated for ‘misuse’ of border terrorism laws; Heathrow warned of explosive breast implants; Exercise Arden tests preparedness for CBRNE attack

15 CRITICAL NATIONAL INFRASTRUCTURE

19

Two of the Security Institute’s energy industry experts, Chris Phillips FSyI and Mark Lewis FSyI, debate the type of threats energy organisations are vulnerable to

19 PERIMETER SECURITY

Stephen Munden, manager of the PSSA’s Verification Scheme, explains how the Scheme is developing to address current industry concerns

41

23 HOSTILE VEHICLE MITIGATION

Wilma Tulloch examines what buyers should bear in mind when specifying hostile vehicle mitigation products

27 CYBER SECURITY

Using the Bond film Skyfall as a backdrop, Lt Col Chris McIntosh examines what impact a stolen hard drive with sensitive data would really have on the nation’s security

79

35 COUNTER TERRORISM: INTELLIGENCE

Mike Sixsmith examines the contentious issue of government surveillance in the fight against terror

Counter Terror Business

Contents

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

39 COUNTER TERRORISM: PROFILE

How did Abdelmalek Droukdel, emir of al Qaeda in the Islamic Maghreb (AQIM), rise to power? Michael S Toney investigates

43 BORDER CONTROL Mark Harper MP, the UK’s Minister of State for Immigration, is just one spreaker who will deliver a keynote address at the World BORDERPOL Congress on 3-4 December

47 TRANSPORT SECURITY EXPO

Transport Security Expo will address the major threats that affect the transport industry

61 EMERGENCY SERVICES SHOW 2013

What does the Emergency Services Show on 25-26 September offer those tasked with counter terrorism?

71 FORENSICS The Forensic Science Society’s Karen Squibb-Williams, examines the current forensics landscape and asks, what do we still have to achieve?

79 DSEI PREVIEW DSEI 2013 at London’s ExCel brings together the entire defence and security industry to source the latest equipment and systems and debate the topics that matter

www.counterterrorbusiness.com Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

5


Ready to meet

the world’s most flexible infrared cameras? Thermal imager combined with IP camera electronics

Meerkat-Fix

Raven-640

Imagine the invisible The high resolution Raven-640 is the smallest thermal infrared camera in the world fitted with a 640 x 512 detector. The analog video-out interface makes it an easy plug-and-play system. Thanks to excellent image quality and small configuration the Raven-640 is designed for instant, accurate and cost effective integration into most complex security and night vision applications. The outdoor camera version Meerkat-Fix consists of fixed mounted cameras with a fixed field of view, and even for more situational awareness, with zoom lenses. The Meerkat-Fix features H.264 video compression and optional ONVIF. www.xenics.com - www.stemmer-imaging.co.uk


BOMB DETECTION

Fake bomb detector salesman gets seven-year sentence

Gary Bolton sold fake bomb detectors for up to £10,000 each

Gary Bolton, a businessman who sold fake bomb detectors around the world, has been sentenced to seven years in jail for making and supplying fake bomb detectors. Bolton, 47, sold the devices to international clients for up to £10,000 each, claiming that they could detect explosives, narcotics, ivory, tobacco and even money. Instead the Old Bailey heard that they were just boxes with handles attached and antennae, and cost less than £5 to make. A judge at the Old Bailey described the equipment as “useless” and “dross”. Sentencing, Judge Richard Hone QC said Bolton had maintained the “little plastic box” was a piece of working equipment,

and that he continued to “peddle” it to scores of international clients – including for use by armed forces – despite evidence proving it was useless. He added: “You were determined to bolster the illusion that the devices worked and you knew there was a spurious science to produce that end. “They had a random detection rate. They were useless. Soldiers, police officers, customs officers and many others put their trust in a device which worked no better than random chance. The jury found you knew this but you carried on. Your profits READ MORE: were tinyurl.com/odd7btn enormous.”

CYBER SECURITY

AIRPORT SECURITY

Academy launched to get young people interested in cyber security e-skills UK has launched a Cyber Academy, an employer-led programme of work which will help the nation develop the cyber security skills it needs to manage future threats. Through the Cyber Academy, employers, working in collaboration with education and government, will inspire young people to consider careers in cyber security; provide new entry routes for them into the sector; and improve access to relevant, high quality training. Those involved range from the fast growing small companies, to large firms such as Atos, General Dynamics, IBM, John Lewis Partnership and National Grid, as well as organisations such as CREST and Cyber Security Challenge. The Cyber Academy’s work will include embedding cyber security-related content in curriculums; organising effective interaction between employers and students; and creating the first nationally available degree‑level apprenticeships in cyber security.

AIRPORT SECURITY

Oz airports get passenger analysis data for better border security

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The Australian Customs and Border Protection Service (ACBPS) has implemented an advanced passenger analysis solution with IBM to improve border security. The solution developed and deployed for ACBPS collects and stores Passenger Name Record (PNR) data which is then risk assessed in combination with other relevant information. PNR data is shared between airline carriers and ACBPS officials for the purpose of identifying travellers who may be a risk ahead of or during travel. This enables ACBPS or other law enforcement agencies to quickly assess passengers and any risk that they may pose. It eliminates the manual and time-consuming process of pulling data from multiple systems. ACBPS officials now receive real-time data for all departures and arrivals, allowing them to more quickly and accurately zero in on potentially high-risk passengers. The solution adheres to the global PNRGOV standard, which facilitates sharing of consistent traveller data between airlines, and government agencies worldwide. It allows for the integration of PNR data supplied from various airlines and service providers into a single platform. Australia is the second country, following Canada, to adopt the new standard developed by the International Air Transport Association (IATA) with input from airlines, governments and service providers. The solution is compliant with data privacy and access requirements of the Customs Act, the Australian Privacy Act and the provisions of the European UnionAustralia READ MORE: PNR tinyurl.com/o5jjd62 Agreement.

Heathrow Airport warned of explosive breast implants Heathrow Airport was on terror alert in mid August after receiving ‘credible’ intelligence that women suicide bombers could have e­ xplosives concealed in breast implants, the Mirror has reported. Al-Qaeda’s chief bomb-maker Ibrahim al-Asiri is understood to have developed the method of foiling airport scanners by concealing e­ xplosives in an implant or bodily cavity. One staff member said: “There are genuine fears over this. We have been told to pay particular attention to females who may have concealed hidden explosives in their breasts. “This is particularly difficult for us to pick up but we are on a very high READ MORE: state of tinyurl.com/ne8nmdy alert.”

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

7


55X

ALL NEW FULL HD PAIR MEGAPIXEL ZOOM LENS The best just got better! PAIR Technology (Reduction of Airborne Interference, e. g. Fog, Rain, Sand, Smoke, Snow) has been combined with a HD Full HD resolution 55X zoom lens for even greater quality SD and definition to offer the best possible security.

 PAIR-Technology  Up to 140X ZOOM with build-in 2.5X Extender  Full HD Resolution 1080p  2 Megapixels  High Speed Motors  1/2", C-Mount  Iris Override  Presets  Compact and Robust  Optimised for use in Port Facilities, Border Control, Coastal Oil Fields, Highway Monitoring etc.

PENTAX RICOH IMAGING DEUTSCHLAND GmbH Industrial Optical Systems Division

PENTAX RICOH IMAGING UK LTD. Industrial Optical Systems Division

PENTAX RICOH IMAGING FRANCE S.A.S. Industrial Optical Systems Division

Am Kaiserkai 1 22457 Hamburg Germany Sales: +49 (0)40 532 01 3348 Email: iosd@pentax.ricoh-europe.com

Heron Drive, Langley Slough SL3 8PN United Kingdom Sales: +44 (0) 7973 154430 Email: iosd@pentax.ricoh-europe.com

112 Quai de Bezons, B.P. 204 95106 Argenteuil Cedex France Sales: +33 (0) 680 614348 Email: iosd@pentax.ricoh-europe.com

www.pentax-security.com


AIRPORT SECURITY

SCHEDULE 7

Security and Surveillance to feature at Bahrain International Airshow

Scotland Yard investigated for ‘misuse’ of border terrorism laws

Bahrain International Airshow in January 2014 will be hosting a new Security & Surveillance Pavilion in response to the increasing demand for airport, aviation and homeland security knowledge and technology.   Bahrain Civil Aviation Affairs and Farnborough International Ltd (FIL), organisers of the show, have created a dedicated 1,000 square-metre pavilion which will comprise exhibition areas, a networking lounge and live indoor flying arena for the demonstration of micro-UAS equipment. It is anticipated that leaders in the field will be exhibiting their cutting edge technologies at the show, featuring surveillance technology including unmanned systems, access control software, cargo screening, Bluetooth tracking technology and the like. For more information, visit www.bahrainairshow.com

RUSI

Former MI5 chief joins RUSI Sir Jonathan Evans KCB has been elected as a Senior Associate Fellow of The Royal United Services Institute (RUSI). Evans had a long and distinguished career in the security service and was director general of MI5 from 2007 to 2013. Professor Michael Clarke, RUSI director general said: “His experience in domestic security issues is unparalleled and it will be a great advantage to the Institute to be able to draw on his knowledge and advice in the work we do on terrorism and related security issues.

CYBER SECURITY

Napolitano warns of cyber threat in farewell speech Outgoing US Homeland Security Secretary Janet Napolitano has said in her farewell speech that a major cyber attack in America is inevitable. “Our country will, at some point, face a major cyber event that will have a serious effect on our lives, our economy, and the everyday functioning of our society,” Napolitano said. Her legacy includes managing the Obama administration’s responses to foiled and successful terrorism attacks against the US, the Gulf oil spill disaster, other important changes to immigration policies, the Secret Service prostitution scandal and rampant cyber break-ins of US government computers blamed on China and others. She offered this advice to whoever succeeds her: “You will need a large READ MORE: bottle of tinyurl.com/puokks5 Advil.”

Scotland Yard has been threatened with legal action over its use of Schedule 7 terrorism laws to question people at airports, after refusing to hand over the results of investigations into the alleged misuse of these powers, The Independent has reported. The force has been given a seven-day ultimatum by the Independent Police Complaints Commission (IPCC) to hand over its findings for some of the 18 outstanding complaints against the force about its use of the tactic – following its “consistent refusal” to investigate. The two organisations have been at in dispute for months after police refused to reveal the reasons why some passengers were stopped by officers, using a tactic that rights organisations have claimed indiscriminately targets ethnic groups. The IPCC is also overseeing another seven complaints involving other forces, but it says it has received full co-operation over these. The Independent Police Complaints Commission (IPCC) said it was supervising 18 current investigations into the use of so-called Schedule 7 powers by the Metropolitan Police. These allow officers to detain passengers for up to nine hours without needing reasonable suspicion of involvement in terrorism.

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The watchdog said it used its powers in February to order the Met to “investigate the rationale for stopping and questioning people under Schedule 7”. The force backed down under the threat of legal action two months later and agreed to investigate – but then refused to hand over the resulting investigation documents, according  to an IPCC spokeswoman. “We have written to them again this week reminding them of the obligation and given them seven days – or we will take the matter to court,” she said. Scotland Yard said that legal action by the watchdog had been “unnecessary” after it claimed to have been “working hard” to strike a deal with the watchdog. A Scotland Yard spokeswoman said: “The Metropolitan Police Service recognises the IPCC’s role in scrutinising complaints related to Section 7 stops and has been working hard to agree a procedure for dealing with such investigations that is acceptable to all stakeholders. As a result of these efforts, legal action has been unnecessary. We hope to be in a position to finalise a way forward with READ MORE: the IPCC in tinyurl.com/kt5up6l the future.”

SCHEDULE 7

Court rejects human rights appeal over airport detainment A human rights appeal brought by Sylvie Beghal, a French Muslim woman living in Britain, against her conviction for refusing to comply with Schedule 7 of the Terrorism Act 2000, has been dismissed by the high court. But the three high court judges have said there is room for improvement in the operation of counter-terror powers used by police special branch officers to stop, question and detain 70,000 people a year passing through Britain’s airports and ports. Beghal was stopped at East Midlands airport in January 2011 and refused to answer some questions about her

“possible involvement in terrorism” until her lawyer arrived. She was returning from France where she had visited her husband, who was in custody in relation to terrorist offences. Lord Justice Gross, giving the judgment of the court, urged the home secretary and parliament to consider amending the counter‑terrorism laws to introduce a statutory bar on the use of any admissions made during such airport examinations in a subsequent READ MORE: criminal tinyurl.com/nk4r93z trial.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

9


IDENTIFY THE EXPLOSIVE, PINPOINT THE SOURCE Introducing the Rapiscan HE50 Hand-held Explosive Trace Detection System

• Lowest Total Cost of Ownership in Industry • Fewer Consumables • No Scheduled Preventive Maintenance • Highest Throughput in Industry • Continuous Scan Mode • Non-Contact & Contact Sampling • Automatic, Self-Calibration • Quick Start-up, Few Steps • High Sensitivity & Low False Alarming • Lightweight, Compact, User Friendly Design

To learn more or to demo the HE50, contact us: EMEA: +44 (0) 870-7774301 Americas: +1 310-978-1457 AsiaPac: +65 6846-3511

sales@rapiscansystems.com • www.rapiscansystems.com

ONE COMPANY – TOTAL SECURITY


TERRORIST ATTACKS

Birmingham blue lights take part in simulated CBRN terrorist attack at ICC

Birmingham’s International Convention Centre (ICC) was the venue of a simulated terrorist attack to test the reactions of the emergency services and the army on August 15. Equipment, processes and procedures for preparedness and resilience against a CBRN terrorist attack were evaluated. ‘Exercise Arden’ was co-ordinated by West Midlands Police in conjunction with CBRNE Ltd. The scenario simulated the deliberate release of a nerve agent within the ICC building. More than 400 people participated either as volunteers acting as casualties, first responders or scientists from the EU Project PRACTICE. Data on behaviour of the affected people, as well as the behaviour of first responders and ICC security staff will be used to help develop a Human Behaviour User Manual for educating the public on how to behave in the event of a chemical incident. All of the emergency services and the army were involved and the venue was evacuated as part of the exercise. Most participants knew they were taking part in an emergency services exercise but were not given exact details. They were told one elderly man had died and others showed symptoms of poisoning. Some of the people taking part were given roles to play such as a terrorist or as someone exhibiting symptoms of nerve gas agent infection. Exercise Arden was the first of three exercises taking place across

CTB News

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Europe over the next two years under Project PRACTICE. It was part funded by the European Commission Framework Programme 7. The other two are taking place in Sweden and Poland. The exercise included specialist training of ICC security personnel and deployment of ICC safety procedures. Dominic Kelly, managing director of CBRNE Ltd says: “The team at the ICC have been instrumental in helping to shape Exercise ARDEN and in communicating their findings in the debrief afterwards. Their input has proved invaluable and will help to shape future developments for the project.” Paul Rutherford, general manager at the ICC says: “This event has also helped us gain valuable knowledge that can only serve the ICC well in the future.”

Photos courtesy of West Midlands Police and Copyright FP7 Project PRACTICE [HCFDC]

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

11


Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com info.uk@infranor.com


MECHANICAL PROCESSES

ZERO COGGING SERVOMOTORS

Many design engineers working in the field of motion control are familiar with slotless motor designs, but may wonder if these specialised motors significantly improve machine performance. In many cases, they can… Slotless motors offer more torque per frame size, produce more power, run smoother and achieve higher speeds than their slotted counterparts. This is a closer look at the technology, plus realistic tips on evaluating whether or not your application could benefit from a slotless motor. SLOTTED SERVOMOTOR CONSTRUCTION A traditional slotted brushless servomotor has a stator made of stamped metal sections called laminations that are stacked to form teeth. Wire is wrapped around these teeth and when current flows in the wire, an electromagnet is created in the stator. Permanent magnets are fixed to the rotor. As in slotted motors the permanent magnets in slotless servomotors are fixed to the rotor. However, a slotless stator is built without teeth. Motor windings are wrapped around a temporary mould and then encapsulated to keep them in place. Eliminating the teeth yields many benefits.

These Eddy currents increase exponentially with speed and create heat in the magnets, which in turn diminishes their strength. As slotless motors have no teeth they can achieve speeds in excess of 32,000rpm. Higher power: power is calculated by multiplying torque by speed. Because a slottless motor outputs both higher speeds and torques, it can produce more than

Higher torque is beneficial for most applications and can often be the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output – and that a smaller motor may be used BENEFITS OF SLOTLESS MOTORS Higher torque: a slotless motor’s redesigned stator allows the rotor to be significantly larger, because torque increases proportionally to rotor diameter. Torque from a given slotless motor is significantly higher than that from a similarly sized traditional slotted motor. Due to the absence of teeth, the area available for windings is also greater, which further increases torque. More specifically, torque at a given speed can be increased by up to 25 per cent compared to a slotted motor. Higher speed: as the magnets pass by the teeth in a slotted motor, a change or modulation in the magnetic flux is created. This in turn induces voltage in the surface of magnets (e=dø/dt). These magnets are conductive so a current flows in them.

twice the power of a slotted motor of the same size. Smoother motion: as the magnets on a slotted motor’s rotor move past the stators iron teeth, they are magnetically attracted. This creates a torque disturbance known as cogging. As there are no teeth in a slottless motor, cogging is eliminated, thereby yielding a smoother motion. Easier tuning: motors with larger rotor

inertias can be easier and simpler to tune. If the load becomes momentarily decoupled from the motor (a common phenomenon) the servo loop is less likely to become unstable if motor inertia is high relative to the load. In fact, precise servo tuning and filtering, which can be difficult to achieve, may not be required with a slottless motor. Better stiffness: a rotor with a larger diameter has greater stiffness because torque increases with rotor diameter and a higher torque motor responds faster to any displacement from the commanded position. The torque displacement curve is steeper. Higher efficiency: all of the above traits boost the efficiency by up to 25 per cent over that of slotted motors.

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

A MIXTURE OF MOTOR TECHNOLOGIES Some applications using a mixture of motor technologies available from Infranor: Frameless – land and sea-based gun systems; surveillance radar and masts; and underwater cranes. AC brushless – positioning turrets/towers; motion platforms/bases; aircraft pilot controls. DC brushed – vehicle ventilation, ELLS; missile system platforms; ordinance storage. DC brushed – all munitions feeds; aircraft payload management systems. Encoders – guidance systems. APPLICATION BENEFITS Higher torque is beneficial for most applications and is often the first thing an engineer seeks when choosing a motor. More torque usually means higher acceleration and greater machine output. Additional torque also means that a smaller motor may be used, which can save money (if the motor is part of a moving component, a smaller motor also weighs less and requires less energy to move). A motor that can run fast may be the obvious choice for high-speed applications, such as centrifuges. But faster speeds can also help reduce overall machine cost and help increase machine output. If the machine’s mechanics can handle higher speeds, a faster move time is possible. If gear reduction can be selected to optimise torque at higher speed, a smaller motor can be used, therefore saving money and weight. Additional power may also eliminate costly secondary mechanics that can shorten machine life and escalate maintenance. The Xtrafors Prime series is just one of the many exciting ranges of servomotors  that are designed and manufactured in Europe and available from any of the global Infranor sales and engineering teams. L FURTHER INFORMATION info.uk@infranor.com www.infranor.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

13


Protect Stock, Assets and Cash from theft and robbery*

SelectaDNA gives you day and night time protection against robberies, break-ins and theft. Activated by money clips, panic alarms, pressure pads and a variety of other devices the SelectaDNA Spray can be integrated into your existing security system or installed as a standalone system. DNA identification is feared by criminals worldwide as being identified by a unique SelectaDNA code irrefutably places a suspect at the crime scene. The SelectaDNA Spray can be used in conjunction with SelectaDNA Gels and marking compound to make the whole business a no go area for criminals. *In Police trials SelectaDNA has reduced theft and burglaries by up to 83%.

For more information visit

www.selectadna.co.uk SelectaDNA is a registered trademark of:

Selectamarkplc

Advanced Asset Protection * The SelectaDNA Property marking product is a Secured by Design approved product.

or contact

+44 (0)1689 860757 Selectamark Security Systems plc, 1 Locks Court, 429 Crofton Road, Locksbottom, Kent, BR6 8NL. UK. DA0122/1


ENERGY SECURITY

KNOWLEDGE IS POWER

Of all the various sectors that comprise the critical national infrastructure (CNI) those involved in electricity generation, transmission and distribution have to be particularly vigilant. Two of the Security Institute’s energy industry experts, Chris Phillips FSyI and Mark Lewis FSyI, describe the type of threats these organisations are vulnerable to and how they are being addressed

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Written by Chris Phillips and Mark Lewis

If we use the government’s description of critical national infrastructure (CNI) as being ‘facilities, systems, sites and networks necessary for the functioning of the country and the delivery of the essential services upon which daily life in the UK depends’, at the top of this list should be those responsible for providing the nation’s energy. Any failure to protect this utility and ensure continuous operation would certainly have a detrimental impact on the availability of almost all services, leading to severe economic and social consequences, including the potential for loss of life.

from, and its cost are firmly on the radar of the UK’s population. This means that energy suppliers are under intense scrutiny and face a constant barrage of criticism about what they are doing to secure our future needs. Controversial techniques such as shale gas drilling or ‘fracking’ have attracted protest and while the arguments for or against it are being played out in the media, energy companies have to ensure that they remain protected. SOCIAL THREAT A hardcore group of ‘professional’ protesters continue to target energy companies and are using social media to attract support for their cause. Make no mistake, these people are very good at what they do and are highly organised. For example, earlier this year a group of 12 women and nine men was charged with aggravated trespass after a sit-in at EDF Energy West Burton, in Nottinghamshire. The campaigners from No Dash For Gas said they were against plans to build 20 gas-fired power stations and intelligence services are certain that they will not give up easily. For most UK power stations and substations, thwarting intruders involves a combination of physical security and surveillance technology, often through the building and guarding of perimeter fences. However, with some main power stations

ites Some s ously i are obvceptible s more suthers and than o always it’s not er ones g the big re most that a cal criti

BIG ISSUES Given the role it plays in all our daily lives, protection of energy sources is vital. The most high profile threat comes via international terrorist groups such as al-Qaeda, while Northern Ireland related activity also remains an issue, with republican terrorists continuing to threaten UK citizens, businesses and interests. However, while this is taken incredibly seriously, there are other groups that are just as capable of jeopardising energy supplies. How energy is generated, where it comes

having perimeters of five miles or more, this is an expensive solution and energy firms are only willing or able to invest so much in security. A Class 3 or Class 4 security fence should offer a delay time of 14 seconds in which to mobilise attention and what are known as ‘hardened’ areas, which are particularly vulnerable to attack, are generally given most attention. Some sites are obviously more susceptible than others and it’s not always the bigger ones that are most critical. For instance, a successful attack on certain smaller sub-stations around the outskirts of London could mean the loss of power in the capital for up to three months. So in order to assess which sites are most at risk, the government’s Centre for the Protection of National Infrastructure (CPNI) compiles an annual report, which highlights those that are the most vital and, therefore, need the highest levels of protection. THREAT FROM WITHIN While a devastating external attack on the nation’s main power stations and sub-stations is certainly possible, physical security is an increasingly small element of energy firms’ attention. Far more insidious and, indeed, harder to combat, is the danger posed from insider threats and cyber terrorism. Put simply, terrorist and criminal organisations very rarely make explicit attacks, as they would much rather use an insider to deliver whatever it is they want. The CPNI defines an insider as a person E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

15


Taking care of your security needs

Sodexo develops, manages and delivers a diverse range of services, designed to improve the quality of life for our clients and customers. Secure by Sodexo is a bespoke security solution delivered in private and public enterprises, including healthcare, education, defence, corporate and manufacturing. Secure operates in over 160 locations in the UK. Tailored to individual client need, established through a consultative approach, using risk analysis as the basis for each assignment. securesupport.group@sodexo.com www.sodexo-uk.com The Sodexo logo is a registered trademark of Sodexo S.A. ŠSodexo 2013.


ENERGY SECURITY  who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets for unauthorised purposes – and it’s a growing problem. When it comes to cyber crime, the threat is persistent and constantly evolving – data breaches, identity theft and fraud are now commonplace. The latest data from the National Audit Office estimates that the UK suffered 44 million cyber attacks in 2011 alone, the equivalent of 120,000 a day, costing approximately £27bn a year of which over three-quarters of the economic impact was felt by business enterprises. Cyber crime can be used against energy companies for any number of purposes. Infiltration into SCADA systems, for example, which provide supervisory control and data acquisition are also used to monitor and control plant or equipment, could result in services being disrupted and operational data being compromised. Meanwhile, the accessing of customers’ financial data could lead to a seriously damaged reputation. FIVE ALIVE The top five insider activities are the unauthorised disclosure of sensitive information either to a third party or the media – more commonly known as industrial espionage; process corruption, which involves illegitimately altering an internal process or system to achieve a specific, non-authorised objective; the facilitation of third party access to an organisation’s assets; physical sabotage; and electronic or IT sabotage. The most frequent types of insider activity identified in a recent CPNI study were unauthorised disclosure of sensitive information (47 per cent) and process corruption (42 per cent), and most of these activities will include an element of cyber intrusion. Cyber criminals will soon face tougher penalties in the EU, under new rules adopted by the European Parliament, and attacks against critical infrastructure could lead to a five-year prison sentence. Firms would be liable for offences committed for their benefit – for example, hiring a hacker to get access to a competitor’s database – and penalties could include exclusion from entitlement to public benefits or closure of establishments. While any deterrent is welcome, the view of a significant number of security professionals and business leaders alike is that it doesn’t go far enough when the potential damage is considered.

In an effort to thwart attackers, energy companies share security related information – there is no commercial benefit to not doing so. They discuss issues and develop best practice techniques that help identify and eliminate threats and loyalty. Interestingly, research from the CPNI has identified a clear pattern in the relationship between primary motivation and type of insider incident. Ideology and desire for recognition were closely linked to unauthorised disclosure of sensitive information and financial gain was most closely linked to process corruption or giving access to assets. The ways they go about getting hold of information can be just as varied. The writing down or sharing of passcodes, the lending of laptops and other electronic devices and poor access control of areas such as data centres and the communications infrastructure can all make the lives of those with malicious intent much easier. In terms of helping to reduce vulnerability, top of the list are the need for a comprehensive personnel security regime, pre-employment screening and the creation of a secure culture. On-going protective security measures and effective management practices are also vital in reducing vulnerabilities, as are more straightforward procedures such as monitoring unusual behaviour. An insider threat can originate from anyone with legitimate access to an organisation, regardless of whether they are permanent employees, contractors, temporary staff or even business partners. Just a importantly, any people leaving the company must relinquish keys, passes and IT equipment, and their access pathways should be erased from the IT system.

r Whetheived ce the pere external ar threats al, predicting n or interre and when e wh ck an atta place ke could tatremely is ex ult diffic

MOTIVATING FACTORS The reasons why people undertake insider activity are diverse and most have a combination of factors including financial gain, ideology and a desire for recognition

RAISING AWARENESS Regardless of whether the perceived threats are external or internal, predicting where and when an attack could take place is extremely difficult. Therefore, all energy-based organisations should carry out a security risk assessment to ensure that they are in the best position possible to deal with such an event. An appraisal of the communications system, infrastructure and decision processes necessary in the event of attacks should be considered along with an audit of the procedures employed by security functions.

Critical National Infrastructure

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Industry experts, many of who are members of The Security Institute, are able to identify possible gaps in processes and procedures, and assist in the implementation of systems that make buildings and their inhabitants safer. In some cases it is necessary to carry out penetration testing where a consultant will try to enter the premises incognito by, for example, pretending to be a cleaner. Once they have gained access they will see how easy it is for them to acquire confidential information and gain access to certain parts of the building. HOLISTIC THINKING In a cohesive effort to thwart any attackers, energy companies share security related information with each other – there is no commercial benefit to not doing so. They discuss issues and develop the kind of best practice techniques that help identify and eliminate threats. This cooperation also extends beyond the energy industry itself and resources from government departments and agencies, including MI5 and the Communications Electronics Security Group (CESG), can be called upon. In fact, the government has made significant inroads in the way it factors in the interdependencies between transport, energy, water, waste and ICT networks. A report recently published by Engineering the Future (EtF), called The Infrastructure Timelines, looks at the government policies within each of the infrastructure sectors and identifies where achieving its aims are interdependent or reliant on policies in other sectors. It cites the energy sector as the most critical example of infrastructure interdependence due to the role it plays in ensuring all the other networks function effectively and can meet the demands of the future. KNOWLEDGE IS POWER Most companies in the energy sector understand that simply throwing money at security and addressing it in a piecemeal fashion is a waste of time. However, it is incumbent upon all businesses in all sectors to review their vulnerability to attack – whether internal or external – and make sure that they implement a cohesive security strategy. Quite simply, it is the only way to move forward and deal with this important issue. L FURTHER INFORMATION www.security-institute.org

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

17


PRODUCT VERIFICATION

Written by Stephen Munden, manager of the PSSA’s Verification Scheme

IS OUR SAFETY BEING MANAGED WELL ENOUGH?

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Product verification is an essential component in any organisation’s risk and security management approach, but there are many complex elements to consider. Stephen Munden, manager of the PSSA’s Verification Scheme, outlines current industry concerns around security management, and reviews how the PSSA Verification Scheme is developing to address them It’s a fact of life that in the UK we continue to be under threat of terrorist attack. Indeed as of July 2013, the UK government and police assess the threat level as ‘substantial’ in Mainland Britain. This means ‘an attack is a strong possibility.’ Moreover, we are warned that ‘an attack could materialise with little or no notice.’ In this environment counter-terrorism work remains a crucial focus for intelligence and security agencies. But that said, an extraordinary 85 per cent of Critical National Infrastructure (CNI) is actually privately owned. We have to ask, are senior managers in organisations that are part of the critical national infrastructure always able to provide the protection required? Are these managers, or those responsible for high value industrial and commercial facilities, or for locations defined as ‘crowded places’, always able to discharge their duty of care satisfactorily? Is an adequate risk management framework always in place, and can we be confident that their controls and counter measures are effective? Against this background the Perimeter

Security Suppliers Association (PSSA) has been working for the last two years to develop a robust scheme, the ultimate aim of which is to help those responsible for security to put really effective perimeter security provisions in place. In order to develop its verification scheme the PSSA has consulted widely across the security industry value chain. Our research indicates that in fact those responsible for protecting lives and property may often have a difficult time getting what they need. Seemingly, there are several key areas of weakness. WHAT NEEDS TO BE BETTER? Firstly, our findings are that the supply chain is extremely fragmented. Product suppliers don’t have visibility across the security value chain and consequently can’t know if products have been specified correctly and installed in a way that meets operational security requirements and user requirements. Secondly, it appears that security, risk and reliance management can be inadequate – especially where CNI is in private hands. All too often, end users and their advisors

are unaware of best-practice security and resilience approaches and the associated standards. So for example, there could be a disconnect between an organisation’s resilience management system and the perimeter security supplier’s expertise which means that security considerations may be lost during project procurement and construction. It follows that any opportunities that there are to get more value from the security system, e.g. for crowd control at football stadia, get lost if security planning and risk management are fragmented or absent. Likewise a lack of ability to apply security industry know-how can lead to organisations not taking security seriously enough, or delegating responsibility for security to individuals who lack the expertise to develop optimal security solutions. Thirdly, product installation is very often suboptimal because security and operational requirements are not well understood, or are not implemented by qualified installation companies. Poor specification by clients; inadequate testing of perimeter security; an E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

19


Serious about security

Why choose Expanded Metal Company security products? • Difficult to penetrate & scale • Good through vision (ideal for CCTV Cameras) • Low maintenance • Cost effective

Visit us at Transec, London, 13 & 14 November – Stand G52

The Expanded Metal Company 01429 867388

sales@exmesh.co.uk

SECURITY PRODUCTS www.exmesh.co.uk


PRODUCT VERIFICATION  absence of health and safety procedures; and an absence of usage knowledge can all lead to an ineffective security solution.

in place for key products, the PSSA has turned to developing a module covering product installation. As seen above, installation can be complex, with multiple CERTIFICATES OF CONFORMITY dimensions and requirements to be borne Indeed a continual stream of anecdotal in mind. It consequently can often go evidence suggests that product wrong. Therefore we are working with safety in particular isn’t being installers, consultants, specifiers and w e tested as a matter of government agencies to develop n e Th course after installation. a specification for perimeter n o i t a The law requires security product installation. specific loted pi that Certificates of This installation module e b l l i is w h t n I Conformity apply to will be a world first. . 3 201 the whole perimeter In common with the later in ’ll validate security product innovative approach e w way, fined e d and not just its taken in other parts of the ‑ y r t s component parts, Scheme, the installation the indu and qualify and this apparently module will need to criteria audit isn’t always being accommodate verification of a the properly checked. Bear range of authoritative standards, s s e proc in mind that in some including those for installation cases it is the installer of specification and performance, service the perimeter security equipment design and delivery, and requirements that is regarded in law as the ‘manufacturer’ for testing, activation and handover. or party responsible for product safety. In developing the installation module, the Nor are these the only shortcomings that PSSA is acutely conscious of several important make a verification scheme really necessary. deficiencies that need to be taken into Consultants also tell us that clients very account. For one thing, a clear issue that often go looking for potential suppliers we’ve identified is that many organisations online. It means they inevitably come across with an ISO 9001 certification don’t actually a random selection of manufacturers. Many, have in place a very robust or credible quality it seems, will claim compliance with PAS management system, specifically one that 68 (the impact test standard for vehicle security barriers) or that they are ‘government approved’. However, all too often when the claims are challenged, they turn out to be inaccurate, not valid or even misleading OPERATIONAL REQUIREMENTS Additionally, a PAS 68 impact test rating alone says nothing about the product’s compliance with health and safety and environmental regulations, and it doesn’t address other operational requirements such as longevity, maintainability and serviceability. Against this background of variable quality, both in the products themselves and in their application, the PSSA Verification Scheme is clearly meeting a need. We see this because since the Scheme’s launch in 2011 an increasing number of vehicle security barriers and fencing system products are being submitted for verification. These products are independently verified by a UKAS accredited certification body. Moreover, the companies submitting products are among the most prominent in the industry and include ATG, Broughton Controls, Cova Security Gates, Frontier Pitts and Zaun. There is now a steady procession of products going through the Scheme. This means that those buying or specifying products will soon easily be able to find PSSA Verification Scheme certified products that will meet their requirements [see Industry Listing at www.pssaverification. com or www.pssasecurity.org]. Now that the Verification Scheme is

environmental compliance, and health and safety requirements. It will also make sure that the products being installed are of a defined quality. The scope will cover the installation of both permanent and temporary product systems intended to operate in high security environments. The criteria will encompass project management; risk assessments and method statements; installation service provision and handovers; and installer competence – both in terms of the installation company and the competence of individuals assigned to projects.

Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

LAUNCHING THE NEW MODULE The new specification will be piloted later in 2013. In this way, we’ll validate the industrydefined criteria and qualify the audit process. The specification will then be fine-tuned taking into account both the supplier end of the value chain and the security risk management needs of end-users. Subsequently it is expected that the new installation specification will be available from early 2014. The PSSA’s overarching aim in introducing the Verification Scheme is to raise standards across the industry. The idea is that by providing top quality, tangible advice across the entire sector, underpinned by an assurance scheme, standards will be raised. From its inception, the PSSA has worked

Installation of perimeter security products can be complex, with multiple dimensions and requirements to be borne in mind. It consequently can often go wrong. Therefore the PSSA is working with installers, consultants, specifiers and government agencies to develop a specification for perimeter security product installation. This module will be a world first

ensures the quality of the installation will meet regulatory and customer requirements. As well, the kind of point solutions that are offered by certification bodies providing certification to one standard at a time aren’t adequate for a buyer or user who has to take into account all the standards to which the product and installation service must comply. Finally, in many cases the criteria against which the quality of perimeter security installation may be measured have actually not yet been established. THE SCOPE OF THE NEW MODULE The installation module that is now being developed will be comprehensive. The module’s criteria will cover all the important dimensions of installation including security, operational requirements,

closely with the Centre for the Protection of National Infrastructure (CPNI). This has enabled the Scheme to be developed in a way that complements, and where relevant includes CPNI security advice. The PSSA is also aware of the need to consider the integration of security products, services and practices when developing terror countermeasures. Working across the security ecosystem as a whole we are determined to forge an effective partnership with all stakeholders for everyone’s benefit. Anyone with an interest in perimeter security is actively encouraged to participate in the PSSA’s work. Contacts can be found on the website below. L FURTHER INFORMATION www.pssasecurity.org

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

21


Sysco Technical Solutions Ltd, a new UK based Integrated Security Company, created to provide the most appropriate solutions for high security applications. Sysco Technical Solutions Ltd offer Consultancy, Installation and Service. We believe that the best results are achieved by taking a collaborative approach and working with clients to deliver on time and budget and most importantly, to their satisfaction. Sysco Technical Solutions Ltd is able to carry out all aspects of the security design and installation. Sysco Technical Solutions Ltd works in partnership with many leading manufacturers and suppliers to deliver a tailored solution to each client. For more information regarding Sysco Technical Solutions please contact: Phil Mann Sysco Technical Solutions Ltd Trafford Building, East St Leyland PR25 3NJ 01772 782572 phil.mann@syscotechnicalsolutions.co.uk www.syscotechnicalsolutions.co.uk


PERIMETER SECURITY

PROTECTION FROM VEHICLES WITH MALICIOUS INTENT

Written by Wilma Tulloch

Hostile Vehicle Mitigation (HVM) products have been subjected to a lot of testing and development in recent years, and as such, a number of standards are in place. While this goes a long way to offer peace of mind, there are still many other things to consider when buying HVM products, as Wilma Tulloch finds out Laurence Goode, Chairman of the Perimeter Security Suppliers Association (PSSA) is optimistic about what has been achieved with hostile vehicle migitation (HVM) since the PSSA was formed. As well he might be. An HVM Product Verification Scheme has been launched successfully, a security fencing pilot is underway and a further module for product installation is expected to go live by the end of 2013 (for an update on the PSSA Scheme, see page 19 of this issue of Counter Terror Business). Goode also notes that: “The understanding and the development of high impact HVM products has seen a lot of testing and development in recent years.” As a result, there are many innovative new products meeting the PAS 68 standard for impact resistance. GOOD NEWS New PAS 68-compliant products is good news for customers, as it gives them more choice. That said, Goode nevertheless identifies a clear and present danger for the buyers of PAS 68 rated products. “The problem is that the customers for these products might mistakenly assume that compliance with the standard means that the product is automatically ‘fit for purpose’,” he says. This is not necessarily the case. “Though a successful impact test has taken place,” explains Goode, “it doesn’t verify that the product you buy is the same as the product that was tested. Nor that it has been installed in the same way.” Customers for these products need to be clear that the PAS 68 rating only tells them that a product has been given a crash rating, which might well be one of the criteria that a specifier is looking for. But the PAS 68 designation alone says very little about a product’s reliability, longevity, serviceability or safety. This is a theme picked up by Gerry Cowan, Managing Director of Cova Security Gates. “A

Hostile Vehicle Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

It’s not unknown for customers to spend hundreds of thousands of pounds on hundreds of bollards, and then install them in such a way that they are not fit for purpose PSSA HVM certified product” he points out, “will have been verified against a range of criteria – and this makes a huge difference. It means an independent audit has been carried out in a very holistic way, rather than just meeting the crash rated criteria.” In other words, a PSSA Certified product will meet the durability and reliability criteria that customers want in a way that can’t be assumed with PAS 68 alone. To avoid poor product performance, the message is: HVM customers need to look for PSSA Certified products. INSTALLATION INFORMATION However, as noted above, the PSSA Scheme for HVM product installation is only just nearing launch. In the meantime, customers need to pay a lot of attention to how the products they buy are being installed. This is a crucial component of how the product will perform. “Incorrect installation,” says Gerry Cowan, “calls the security effectiveness of a product into question.” As a supplier with PSSA verified products, Cowan believes that products should always

be designed for easy installation at all types of sites and locations in the first place. Moreover, he points out that manufacturers are responsible for providing comprehensive installation instructions. “Most manufacturers,” he notes, “don’t install their own products.” PSSA members nevertheless try hard to ensure the correct installation happens. “What we aim for is to offer a service to partially install or supervise the early part of an installation.” Some PSSA member companies will also invite customers in for installation training. The aim is to encourage correct installation, but ultimately if customers want to install themselves, they have installation instructions and hopefully are competent enough to do it correctly. Well, in theory at least. But in real life there are plenty of installation horror stories. Have you heard the one about the bollards that were put in too deep, or perhaps so far apart that a vehicle can be driven between them? Or what about the barrier that faces the wrong way because, cleverly, someone noticed they were on a one-way street, and terrorists would never dream of driving the wrong E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

23


MOBILE SECURITY SOLUTIONS

BODY WORN SYSTEM and 3G Transmission in ‘real time’ BODY WORN SYSTEM HIGHLIGHTS n Touchscreen HD Digital Video Recorder n High Resolution camera n Solid State 16Gb SDHC Internal memory n Pre-Event Recording n Still image capture n 6 x resolution settings n Law enforcement secure and tamperproof password protected files saved to solidstate robust memory n All DVR “Settings” are password controlled which ensures that the user cannot enter the “Settings menu” to change options You can also ‘couple’ the Body worn system with the AGS StreamRS, a portable device designed to offer visual point of view Multimedia streaming from the field over the cellular 3G network (using any SIM card). It allows users to stream live video/audio/location and the wearer can be monitored in real time from any location. The unit has a built-in alarm button which can be pressed by personnel in the case of an event or emergency. The alarm triggers an SMS to any preset phone number and will activate live video streaming on the connected server or PC/laptop client. The unit can stream high quality video/audio to any specified IP and iPhone/PDA. The system supports any HSPA/3G/ Edge/GPRS SIM based cellular provider. Both the Body Worn System and the AGS StreamRS are very small & lightweight, with built in rechargeable lithium batteries for 6+ hours of recording and streaming. Contact us for full specifications

Audax Global Solutions Ltd T: +44 (0)1752 264950 F: +44 (0)1752 603087 E: info@audaxuk.com W: www.audaxuk.com


PERIMETER SECURITY  way down a one-way street, would they? Meanwhile a key component of installation is the foundations. These too need very careful consideration. Gerry Cowan sees this as one of the major errors customers, or their installers, can make. He notes that one of the critical things about PAS 68 is that manufacturers are required to submit detailed foundation drawings when a product is being tested. Indeed the foundation specification is part of the test and the test report includes a section on the condition of the foundations after impact. Yet despite the importance of foundations it’s not unknown for customers to spend hundreds of thousands of pounds on say hundreds servicing regime based on All s e t a of bollards, and then the specific equipment, g ted install them in such its usage levels and site automa arriers b a way that they are conditions is a good starting d n a ly with p not fit for purpose, point. Cowan agrees. m o c simply because the “The emphasis should need to relevant foundation spec was always be on having a g the n i d u l c n i , ignored. And it’s planned maintenance n o i legislat inery and far from unknown programme,” he says. mach l safety for customers to hire A regular maintenance security consultants regime will ensure that the lectrica tions e who are never invited HVM product continues to regula back to check on an perform as intended over a long installation, either during life cycle. Cowan says that quality or after it has taken place. HVM products are built to last at least 25 “And of course once these things are in years as long as they are properly maintained. the ground,” adds Cowan, “with paving He adds: “In the industry I’m afraid there slabs over the top it’s not evident that it’s are products, probably still far too many, incorrect – unless you have something like that while they have a crash rating, they’re a gap which everyone can see.” That’s why not particularly effective or efficient when customers have to insist that their contractors it comes to maintenance and longevity.” or their own installation people follow the installation requirements, chapter and verse. SAFE NOT SORRY Last, but very much not least, safety has to be OPERATIONAL REQUIREMENTS a major issue, especially in the light of some Indeed installation requirements ought recent tragedies. In 2010, for example, two really to be part of an integrated, holistic girls aged five and six, and a nine-year old boy, approach. “A general view across the industry,” were crushed to death in the UK by electric says Laurence Goode, “is that the most gates, in separate incidents. In March 2013, critical factor determining the success of a a 40 year-old man made his first appearance high security perimeter system is whether before magistrates charged with manslaughter it started out with a properly specified by gross negligence over one of these deaths. Operational Requirements document.” Really high on the list of what customers This needs to have considered every facet don’t want from HVM is nightmares like this. of the site’s operation, including not only All automated gates and barriers need to threat types, levels and possible responses, comply with the relevant legislation, including but abnormal situations such as unexpected machinery and electrical safety regulations. equipment failures, and post incident scenarios And remember that the location of an HVM when resources and attention are displaced product is very important in H&S regulation. For from normal areas and duties. It needs instance a gate which is only used by trained to consider as well how to fully integrate users and where there is no access by members perimeter security equipment within all the of the public is treated differently from a gate other site security procedures and provisions which is in contact with the general public. such as lighting, and CCTV. As well, the Particularly with the latter, there will be an electrical and operational requirements almost inevitable conflict between safety of HVM products need to be folded into and security. But that’s not to say that the the requirements for the whole site. obligations of the installer aren’t clear – and by the way, the responsibility in law does rest MAINTENANCE REQUIREMENTS with the installer. “Any product that is hinged Bear in mind too that once an HVM product or sliding that can provide crushing, pulling is installed, it must be correctly maintained. in points, or shearing points,” says Cowan, Post-installation activities are hugely “represents a huge risk, so you have to provide important. Goode notes that an appropriate that level of safety. Just because it’s a high

Hostile Vehicle Mitigation

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

security product, it doesn’t in any way allow you to abdicate your responsibility for safety.” In summary, what can still go wrong with HVM includes issues with installation and foundations, and with maintenance and safety. These can largely be avoided however when the customer has more understanding of what HVM involves; and particularly when they opt for HVM products which are PSSA Verified. L FURTHER INFORMATION www.pssasecurity.org

Impact test standards There are currently four vehicle security barrier impact test standards, with a fifth international standard expected before the end of 2013. PAS 68:2010, the UK Publicly Available Specification that specifies impact testing methods and performance criteria is currently being revised. PAS 68:2013 will include updated supporting references and classification codes, and an updated list of test vehicles. It will also align better with the European standard, CWA 16221:2010 (see below). PAS 69:2006 gives detailed guidance on the selection, installation and use of vehicle security barrier systems. It’s also in revision. PAS 69:2013 will include significant updates and additional guidance based on the latest thinking of the UK government and the security industry. CWA 16221:2010 is a European CEN Working Agreement that essentially combines the details from PASs 68 and 69. No revisions are currently planned. ASTM F2656-07 is a US standard that provides a procedure to establish a penetration rating for perimeter barriers subjected to a vehicle impact. It’s due to be revised in the next year or two. Finally, we expect the publication this year of an as yet unnumbered International Standards Organization International Workshop Agreement standard. This ISO IWA will bring together the elements in PAS 68, PAS 69 and ASTM F2656 to produce a common, internationally agreed methodology and terminology that can be used in the global marketplace. Early indications suggest this will be widely adopted.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

25


Bringing security to your world

Delivering security solutions that fit your needs Government Identity and Access Management solutions from HID Global. The right interoperable products, the right field-proven brands like LaserCard® Optical Security Media (OSM), ActivID Credential Management System and FARGO® ID card printers and encoders. Tailored processes backed by years of the right design and integration expertise. We power the world’s most secure Identity programs. We’re HID Global. Learn more at hidglobal.com/main/government-solutions


SENSITIVE DATA

In the film Skyfall, a large audience has been exposed to a James Bond plot that initially seems more plausible than the stereotypes. Certainly a stolen MI6 hard drive being used to identify and expose undercover agents is more grounded than stealing nuclear submarines. But just how plausible is it exactly? Would any megalomaniac supervillain be able to access the data? And would it present a serious threat to the nation? Let’s set the scene: James Bond is in hand‑to‑hand combat on a speeding train in order to recover a stolen hard drive from a MI6 laptop. Later, the hard drive has been decrypted and the critical details of all MI6 undercover agents been posted on YouTube. Unlike the usual James Bond plot lines which generally involve stealing Vulcan bombers, hiding a bomb in a circus or hijacking space shuttles in order to release deadly poison into the atmosphere from a space station; the theft of a hard drive is highly plausible and an issue that could face any government. The plot highlights how IT security has never been so high on the public radar. However, while highly visible, misinformation is rife in addressing the actuality of threats and the technology involved. In today’s security environment, government security services and the military are the most up-to-date when it comes to the implementation of technology and strategy. But in the 21st Century the threat to IT security has evolved to encompass not only governments as targets but Critical National Infrastructure (CNI) providers and increasingly the private sector. IT security is no longer a niche area of interest but something that all sectors need to be conscious of and proactive about.

Crime Agency (SOCA) officer lost a USB stick containing the names of undercover agents involved in the drug war in Ecuador; as well as information relating to five years’ worth of investigations. The blunder not only jeopardised the physical safety of the agents working in the field but put the whole operation at risk, costing the UK taxpayer in the region of £100 million. HUMAN ERROR While human error is a predictable factor it can be mitigated against; making such blunders a thing of the past. Currently encrypted hard drives used by security services are accredited to CESG CAPS level 4, the highest level of encryption that can be attained and approved for Top Secret data. If you think of data as a book, standard encryption moves the data around page by page so that you simply have to re-organise the pages to make the information intelligible again. Encryption used by governments at Top Secret level is akin to moving around all the individual words or even letters, as well as the spaces and punctuation in between; a mammoth undertaking for any potential hacker to make sense of. Encryption technology at this level has been proven in the strictest use cases, from being used to secure on-board systems in theatres of war to protecting information during covert operations. For example, military aircraft and land vehicles now encrypt data to ensure no information falls into enemy hands if a vehicle has to be abandoned. This eliminates the need to ensure a vehicle and any data it holds are completely destroyed if

As one ct, xpe might eservices securityrticularly are pa tive in proac to the regards ntation e implem ecurity of IT s

REALITY VERSUS FICTION As one might expect, security services are particularly proactive in regards to the implementation of IT security. As demonstrated in Skyfall, the Security Services encrypt data on hard drives not because the data might be stolen; but because of the assumption that given time, data inevitably will fall into the wrong hands. This strategy is well advised given repeated experience. For example, in 2009, a Serious Organised

abandoned – a risky and difficult enterprise to properly achieve even when it is possible. These systems should also include software or hardware purge buttons to delete all data encryption keys, preventing authentication even with system passwords and tokens; and so providing full data protection in the event of enemy capture. An encrypted device used by a fellow colleague of James Bond would, one might expect, also include such capabilities as an additional precaution against theft.

Written by Lt. Col. Chris McIntosh, Royal Signals (Ret’d), CEO, ViaSat UK

ENSURING YOU CAN FIGHT ANOTHER DAY

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HACKING BARRIERS For any attempt at hacking an encrypted hard drive, thieves have two options: guessing the authentication parameter, such as a password, or guessing the encryption key. For the first option, most authentication systems limit the number of attempts and then lock out the user if entered incorrectly. While this precaution can be physically overridden, encrypted drives used by government organisations should be manufactured in such a way that attempting to physically access the electronics of the device itself will also irreparably destroy the device and its data. If we are attempting the second option a hacker would need to guess the key value and run this to decrypt the data. For AES-256 encryption there are approximately 1.15 x 10^77 values (that’s a 1 followed by 77 zeros). This is a massive number – 115,000 million million million million million million million million million million million million different values. This is an almost impossible task: even with substantial brute force computing power, finding the correct key would take many, many lifetimes. As a result, it is always more viable to guess the authentication value than the key. As in so many areas, this comes down to relying on the people holding the data as the weakest link. One would hope that based on the available evidence, 00 agents are made of sterner stuff. The combined effect of strong authentication parameters (strong passwords, two factor E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

27


SENSITIVE DATA

 authentication) and encapsulated hardware to limit the number of authentication attempts makes the probability of hacking the drive an extremely small, but finite number. This would be the number of attempts allowed multiplied by the probability of guessing all of the authentication values correctly. The good news is that if a hard drive was stolen in real life from Her Majesty’s Secret Service it shouldn’t cause much of a stir. LEARNING FROM THE BEST Unfortunately attacks are not focused solely on government departments such as the security services or military, who through their expertise and technology are best positioned to ward off such threats. All parts of the government need to recognise that each of them in their own way are attractive targets for terrorists; and that they would benefit greatly by learning from their more experienced counterparts in the security services to ensure that they implement the necessary security. However, it is not the devices or software the security services and military use that others could benefit most from but their holistic approach to IT security which considers the entire system. Every point of weakness and potential interaction with the outside world needs to be identified, whether it is how passwords are stored; moving data across unsecured lines; remote access points; or even policy regarding the use of personal devices. It is then a case of implementing technology and procedures that will ensure that none of the technology works in isolation but combine to ensure that there are no

Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Unlike the usual James Bond plot lines which generally involve stealing Vulcan bombers, hiding a bomb in a circus or hijacking space shuttles in order to release deadly poison into the atmosphere from a space station; the theft of a hard drive is highly plausible and an issue that could face any government backdoor entry points vulnerable to attack. If you think of your IT system as Fort Knox, targeted cyber terrorists are not going to focus on the front gate. They will go for weak points in the structure, or tunnel in, or disguise themselves as the US army, or simply bribe the guards; in short, any point of weakness. An example of this being put into practice by the military is the protection of sensitive information in the field. Not only is it encrypted but it is also then backed up with a Kill Switch which will scramble encryption keys when triggered by a certified source. A well-prepared military will also have backup communication channels to share data in case one connection is compromised. It should be noted, however, that any best-formed strategy needs to be supported and implemented at every level in order to have any chance of success: after all, human error is always coming up with new ways to bypass security. The adoption of a comprehensive approach to IT security is something that Critical National Infrastructure (CNI) is learning the

hard way. While CNI providers have been quick to adopt internet connectivity into their systems, they have been slow to adopt improving levels of security. In fact, in my opinion our CNI is woefully under protected for the level of threat they are potentially facing. This is supported by the US Department of Homeland Security’s Industrial Control Systems Cyber Emergency Response Team Annual Report for the 2012 fiscal year, which reported that 40 per cent of reported attacks were against the energy sector. CRITICAL NATIONAL INFRASTRUCTURE One attack took out a power plant for three weeks. This is especially crucial as CNI increasingly becomes the target of terrorist attacks, as seen in the Middle East. Traditionally, protecting critical infrastructure has meant physically protecting a power station with fences and security personnel and then assuming these barriers will deal with any threat. Attackers are now targeting more vulnerable substations that provide access E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

29


Cyber Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

SENSITIVE DATA  points for malicious infiltration as an easy route onto the power network. Furthermore, this has been amplified through the use of smart meters connected to grids over the internet creating even more points of entry. The end result is essentially a spider’s web with every strand a viable point of entry. It is a case of organisations implementing new technologies but not simultaneously updating their security to match. Organisations need to make the most of the latest technology that enables CNI operators to generate a virtual view of their networks, energy, water, oil and gas, and transportation operations. As well as these essential operations, support crews should be able to manage security with a mouse click based on real-time intelligence information. Sensors can continually update the information, creating a hierarchical view that operators can use to identify issues, than drill-down to individual nodes to contain or fix them. It may seem straightforward but CNI operators have been slow to adopt such an all-encompassing approach. However, it is important to note that as crucial as a holistic methodology is; it is not enough to simply implement and walk away. As I’m sure Saudi Aramco Co. and Qatari Rasgas realised after attacks against them last year were discovered, governments and businesses need to be perpetually vigilant and agile in order to effectively respond to the constantly evolving threats.

t Suppor uld ho crews s manage to be able ity with a secur ick based cl mouse eal-time on r ence intellig tion informa

FINDING THE BALANCE BETWEEN COST AND CAPABILITIES So far this year, the government’s IT security has been subject to reviews by the National Audit Office and the Defence Committee. Each report identified perceived issues with the government’s and military’s spending on IT security. Gone are the days when governments and militaries could spend unlimited amounts to ensure security. For example, in order to achieve the required levels of security the Ministry of Defence (MoD) has to constantly balance cost and capabilities. While no one debates that IT security is a very real and imminent terrorist threat, the security services no longer have the budget for Q to work away on endless technology projects. This is especially true of the Military which faces a further £735 million in budget cuts; around a fifth of all departmental reductions. However, this is not an issue that governments need to feel they are dealing with on their own; they can also benefit from the expertise developed in the private sector. In many cases, commercial technology can easily cover the gaps that specialist procurement can’t; in IT, commercial

30

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

computers can fulfil many necessary functions with the right modifications. Commercial security software can even meet many of the security services’ everyday needs while being available for considerably less than the cost of a custom designed solution. From vehicles to communications, governments and others should consider commercial off-the-shelf (COTS) technology to reduce the procurement burden and support bespoke technology projects. THE HYDRA’S MANY HEADS The threat to IT security can be compared to the heads of the Hydra; unlimited, immortal and constantly manoeuvring to attack where you are weakest. In an era of constant austerity, the most effective way for governments to combat terrorist attacks on IT infrastructure is to not only collaborate with the private sector on a technological level, but also share knowledge and expertise. Nowhere is this more important and potentially more effective than in the field of IT security. When the proper approach and collaboration is taken it can be hugely beneficial to combating attacks on IT security. The Spanish police demonstrated this when they were able to shut down a cyber-criminal ring targeting Spanish nationals, through cross-organisational

collaboration which resulted in the arrest of 11 individuals suspected of running a 1 million euro a year ransomware scam. In order to achieve this, Interpol coordinated an operation involving the Spanish police, the anti-virus company Trend Micro and the European Cybercrime Centre (EC3) at Europol. If organisations draw on the specialist skills across military, security services, government organisations and the private sector then we can continue to meet the growing threat of cyber-attack now and well into the future. THE ENEMY IS BEHIND THE LINES Collaboration between the public and private sectors in technology and knowledge can go a long way towards matching the constantly evolving threat of cyber attack. However at some point, hopefully soon, governments, security services and the private sector need to realise that cyber defence involves far more than building walls around networks; the Trojan Horses are already inside the walls of most organisations. It is crucial that organisations assume they are contaminated. Actively monitoring their networks; isolating areas of concern; and eliminating malware are essential for returning systems to full operation speedily and with minimal disruption. This is only possible through the adoption of a truly holistic approach that uses the talents of 007, Q and M to tackle defence and IT security. L FURTHER INFORMATION www.viasat.uk.com


CYBERCRIME

TACKLING WITH CYBERCRIME IS NOT CYBER WARFARE

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Unlike newspaper headlines on the cybercrime report of the Commons Select Committee, there is no cyberwar going on. “The war on cybercrime” is a similar kind of oxymoron as “the global war on terror”. These are catchy yet dangerous misuses of concepts which, instead of mixing them for creating noticeable headlines or intimidating, the phenomena should be addressed with justifiable terms The vocabulary and grammar of “cyber” is in the making. There is no unanimity on the terms, their definitions and uses. However, and even if war-related terms have experienced inflation in the past years, everything should not be labelled as war or warfare. Firstly, cyberwar as such has never taken place. In order to qualify as “war”, actions need to, for example, serve a political purpose, take place in contestation between two or more actors, and cause extensive physical damage and death. Secondly, contemporary Western warfare does rely on cyber means – and will do so even more in the future. Thirdly, cyberspace creates novel tools and enables the use of strategies that influence politics, diplomacy, and even conflicts without resorting to physical violence. Yet, crime cannot be tackled with the cyber means of warfare. The report of the Commons Select Committee does not provide a clear definition of cybercrime, but introduces definitions of several other instances. For example, the Cyber Threat Reduction Board’s three-fold categorisation of pure online crimes: existing crimes that have been transformed by the utilisation of the internet, and the use of the internet to facilitate many traditional types of crime. These are to be addressed by the means of law enforcement that need further development. Cybercrime is a major challenge that requires wide international cooperation. It affects people, companies and states in many ways. For example, according CSIS’s and McAfee’s report on the economic impact of cybercrime and cyber espionage, it influences in the

Overview: Jarno Limnéll :Director of Cyber Security Jarno Limnéll is the director of cyber security. He is a doctor of military science and also holds a Master of Social Sciences degree and an Officer’s degree from the Finnish National Defence University. Jarno has held positions in the Finnish defense forces, UN and CMI (Crisis Management Initiative), and was Accenture’s director of defence and public safety, before joining Stonesoft as director of cyber security in 2012. Jarno has breadth of knowledge and insight on cyber security, drawn from his military experience and participation in NATO and UN working groups, consultation with state, non-state, inter-governmental and multi-national commercial organisations, and his own literary achievements. A unique figure in the network security industry and an in-demand commentator, interviewee and speaker around the world at private, commercial and public conferences, Jarno offers real leadership on cyber security, cyber defence, security policy and the strategic challenges facing distributed organisations.

In addition to unnecessary intimidation, misuse of the term cyberwar underrates the important job done in the field of law enforcement. Tackling cybercrime is the prime cyber challenge that contemporary Western societies face forms of losses of intellectual property or confidential information, direct financial losses, missed opportunities, damaged reputation, and additional costs from securing networks and recovering from cyber attacks. Approximation of the global economic impact of cybercrime can be done with the help of analogies, but estimations still remain rather

crude. And economic impacts are not the only unwelcome consequences of cybercrime. In addition to unnecessary intimidation, misuse of the term cyberwar underrates the important job done in the field of law enforcement. Tackling cybercrime is the prime challenge that contemporary Western societies face. Cyberwar, again, should be reserved for its proper use, otherwise, we may encounter difficulties in describing extensive cyber warfare, or cyberwar, if it is ever to take place. Politicians should think less about cyberwar and spend more time on cyber diplomacy or cyber peace. We live under the conditions of peace, not war, and the main societal and international concern should be to keep it so. L FURTHER INFORMATION www.stonesoft.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

31


Advertisement Feature Written by Lila Kee, chief product officer, GMO GlobalSign Inc

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

CYBERSECURITY

EXAMINING THE US APPROACH TO CNI CYBERSECURITY FOR THE POWER GRID Cybersecurity threats to any nation’s power grid poses real risks to both the reliability and safety of businesses and citizens whose everyday lives rely on energy to run their economy and vital services audience now includes companies that fall under the government’s classification of Critical Infrastructure. 2. Development of Cybersecurity Framework: the National Institute of Standards and Technology (NIST) has been appointed with the task of creating a Cybersecurity Practice Framework in collaboration with CI stakeholders that will be used to reduce threats. Securing the US power grid is of upmost importance to the White House and, naturally, electricity generation, transmission and distribution are identified as key CNI areas that are expected to benefit from adopting the cybersecurity framework.

Since post-9/11, both the EU and US have taken on cybersecurity initiatives that involve a common approach for Critical Infrastructure (CI) sectors, such as in the case of energy by developing guidelines on how owners, operators and regulators should implement preventative measures aimed at mitigating maliciously driven cyber-attacks. The European Programme for Critical Infrastructure Protection (EPCIP) has taken the lead in developing a central approach to cybersecurity of CI sectors for European stakeholders, whereas the US energy sector follows voluntary and mandatory guidelines from a range of government and industry agencies. THE US APPROACH TO CYBERSECURITY This approach is risk-based and, like all risk, a certain level must be accepted as a balance among costs, operation impact, usability and security must be realised. The key of course is sizing the right level of security to the level of exposure associated with the risk. Cybersecurity initiatives taking place in the

US attempt to perform that balancing act and although yet to be proven, seem to be on the right track. After a series of false legislative starts, in February 2013, the Obama Administration issued an Executive Order (EO) called Improving Critical Infrastructure Cybersecurity, with the hope of engaging CI owners and operators in developing, promoting and implementing cybersecurity best practices. The Executive Order states “…a risk-based approach to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security”. Two key points stressed in the EO are: 1. Increased Information Sharing: federal agencies are now required to share unclassified reports of threats to US companies by expanding the voluntary Enhanced Cybersecurity Service programme that is tasked with providing near real-time sharing of cybersecurity threats. This expanded

“By 2035, 80 per cent of America’s electricity will come from clean energy sources.” President Barack Obama, State of Union Address, 25 January 2011.

32

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

SOLICITING FEEDBACK Similarly to the EU, the majority of power grid assets are owned and operated by the private sector, therefore NIST is prudent to heavily engage the electric industry, the government and industry standards boards and regulators, and the vendors that serve them to support the development of the cybersecurity framework. The fourth of a series of engagement meetings held by NIST this month completes the goal of soliciting feedback from these key stakeholders to help shape the final framework expected to be announced in early 2014. Once finalised, CI participants will be encouraged to voluntarily adopt the best practices and standards. INCENTIVES TO ADOPT THE FRAMEWORK In fact, the White House recently announced a series of incentives that it is considering to


promote the quick adoption of the framework. Some of the incentives being considered include: cybersecurity insurance – build underwriting practices that promote the adoption of cyber risk-reducing measures and risk-based pricing and foster a competitive cyber insurance market. Grants – incentivising the adoption of the framework and participation in the voluntary programme as a condition, or as one of the weighted criteria for federal critical infrastructure grants. Process preference – agencies offered suggestions on a range of government programmes in which participating in the voluntary programme could be a consideration in expediting existing government service delivery. Liability limitation – possible reduced tort liability, limited indemnity, higher burdens of proof, or the creation of a federal legal privilege that pre-empts State disclosure requirements. As the framework is developed, agencies will continue to gather information about the specific areas identified in the reports related to liability limitation.

NIST’S APPROACH TO THE FRAMEWORK A key to NIST’s approach to this framework is to include existing proven standards into the framework. One such standard already identified is the North American Energy Standards Board (NAESB) Standard on Public Key Infrastructure (PKI) for the Wholesale Electric Quadrant, WEQ-012. Today, NAESB’s standards development for Public Key Infrastructure (PKI) applies to participants involved in market-based applications that serve power generation and transmission within the Wholesale Electric Quadrant. The Federal Regulatory Energy Commission (FERC), which regulates the US interstate transmission of natural gas, oil and electricity, is in the processes of receiving comments on WEQ-012 and if adopted as a final rule, will become mandatory for entities under FERC’s jurisdiction. NAESB’s approach to standards development nicely aligns with the goals of the

Obama’s Cybersecurity Executive Order by: encouraging industry, vendor and government collaboration; optimising the balance of security, operational implementation and cost appropriate for risk of breach; fluid to deal with a rapidly changing threat landscape; enhances accountability by being enforceable (when federally mandated by FERC). The EU should take note of the approach NIST is taking to developing the Cybersecurity Framework when developing its own methodologies around securing Power Grid IT and SCADA resources and communications. As the (Smart) grid modernises, increased innovation, productivity and efficiency gains

President Barack Obama at the State of Union Address on 25 January 2011. What happened? In May of 2013, Chinese hackers compromised a US Army database that contained information on 84,000 dams that were considered a significant hazard if they failed.

are inevitable however, often at the risk of leveraging IP and the internet. Referring to January 2010, NISTs Smart Grid Framework showed that a secure communication flow between stakeholders was crucial in securing its infrastructure. Going forward, our governments should continue to promote the continued streamlining of energy distribution and use, however they should also provide the industry with the right tools to counter the new and ever-advancing cyber vulnerabilities these innovations bring. Strong authentication of users (systems and people) is just one area of cybersecurity, but an essential one that if not implemented securely can have potentially devastating impact. “By 2035, 80 per cent of America’s electricity will come from clean energy sources,” said

Unfortunately, the reality of resistance to change, adoption of government guidelines and the perception of costly measures that do not really enhance security, is prevalent on either side of the pond. EU governments, academia and industry should keep a watchful eye on how the US security framework unfolds. Steps in place suggests a good balance between industry-government information sharing, regulations and steep consequences where the stakes are high, and a voluntary-based system that focuses more on carrots and less on sticks is a sure-fire measure to get real security improvements vs check-box compliance. L

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

PREVENTABLE BREACH Access was given to an unauthorised individual without the proper level of access for the information. If cybersecurity measures that required strong two-factor authentication were in place at the time then this breach might have been prevented.

FURTHER INFORMATION www.globalsign.co.uk/enterprise

GlobalSign Enterprise Security Solutions GlobalSign has been a trust service provider since 1996 and focuses on providing convenient and highly productive PKI solutions for organisations of all sizes. Its core Digital Certificate solutions allow customers to conduct SSLsecured transactions, data transfer, distribution of tamper-proof code and protection of identities to secure email and access control. With the increasing expectations of protecting critical system functions and infrastructure, GlobalSign understands the importance of implementing security solutions that will help protect networks, control access and protect critical data. With

the continuous advancements in technology and ever-changing security regulations, it can be seem to be timeconsuming and costly. GlobalSign’s range of security solutions encompassing the use of Digital Certificate technology are not only reliable, scalable and cost-effective, but can meet the CI stringent standards and security controls for online transactions and authentication to support specific markets and system function.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

33


INTELLIGENCE

Whilst there is an Orwellian aspect to the growing capabilities of the British intelligence agency GCHQ and America’s National Security Agency, should we be worried if we are not doing anything wrong and the chances of stopping the next Boston Marathon bombing are increased?

In the aftermath of the Boston marathon bombing the headlines screamed. The bombers were known to the security agencies. Commentators and the public demanded to know why the attack not been prevented. The alleged murderers of Gunner Rigby stood on the streets of London in broad daylight brandishing bloodied meat cleavers, watched by shocked members of the public. The killers were known to the security agencies. Again, the press and the public demanded to know why the attack had not been stopped. A young US government IT contractor, with a mysterious pole dancing girlfriend, turns up in Hong Kong, and opens Pandora’s box for the Guardian. Fingers are pointed at the NSA across the Atlantic, and at GCHQ in the UK. Seemingly everything we do is subject to government surveillance. Again the headlines scream, again the same government

Written by Mike Sixsmith

THE DEMOCRATIC DILEMMA: DAMNED IF THEY DO AND DAMNED IF THEY DON’T

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

agencies are the focus of their nations’ adverse attention. Last time, they didn’t have the information; this time, they stand accused of having it. In his Ecuadorian Embassy refuge, Julian Assange gloats. And, now we know, they did have it – lots of it. It is estimated that 90 per cent of all the data that now exists in the world has been created in just the last two years. Its mega data, and for security agencies its better than listening to what’s said. It provides the wherewithal to locate the who, where, when of their targets almost anywhere in the world. A DEMOCRATIC DILEMMA This is the dilemma of all democratic countries faced with those who would use violence to overthrow the status quo. Whether we like it or not, we are engaged in a war on terrorism, a war that we are compelled to fight and a war E

Again es dlin the hea, again scream overnment eg the samcies are the agen of their focus adverse ’ nations ntion atte

35


INTELLIGENCE About the author

Benjamin Franklin wrote: “Those who surrender freedom for security will not have, nor do they deserve, either one.”  that we must win. The terrorists are prepared to kill and die. Should the democracies fight like with like, and prosecute a war against the terrorists? Or should they criminalise the actions and the individuals and pursue them with the full force of the law? Does the end for government justify the means? Benjamin Franklin wrote: “those who surrender freedom for security will not have, nor do they deserve, either one.” Some would argue that what we must not do under any circumstance is to surrender any of our rights for some small increase in security. Snowdon, hero or villain? Is he the greatest whistle blower in US history, or the greatest traitor? A self-righteous narcissist, or a self-sacrificing upholder of freedom? For the intelligence officer, as for the journalist, sources are sacrosanct. Mr. Assange demands total transparency of governments and others. But, will not willingly declare his sources. Is he a charlatan cocking a snook at the authorities, putting his sources such as Bradley Wiggins, and now presumably Edward Snowden, in jeopardy for his own gratification and, perish the thought, financial gain? Or is he the gatekeeper of human rights? Manning stayed to face the consequences. Snowdon did a runner! He is now consorting with his countries best enemies – China and Russia, for example, not renowned for democratic and open government. Perhaps we will finally end up in Iran or North Korea. A GOVERNMENT’S JOB Any government’s principle duty is to secure the state. The infamous Zimmerman Telegram propelled the US into WWI. Tapping the

trans‑oceanic cables at Porthcurno in Cornwall enabled this. What would have been the consequence for Britain, and Europe, without Churchill’s foresight in setting up Room 40, the precursor to Bletchley Park, and now GCHQ – Number One, collecting some 12 per cent of total global daily new data, even ahead of the NSA? In todays’ internet environment it is the equivalent fiber optic data cables which are tapped. Is there any difference in principal? Without some infringement of civil liberties, security cannot be ensured. It is now, as it always has been, a trade-off between the two. Surely citizens of democracies have to trust their elected representatives and official employees, warts and all, to act within acceptable, transparent guidelines? In totalitarian states no such option exists. Arguably society has waived some of its rights by virtue of the increasing amount of personal information which more and more of the population disclose willingly on social networks? OUTRAGED? Whilst there is an Orwellian aspect to the growing capabilities of GCHQ and the NSA, should we be worried if we are not doing anything wrong and the chances of our security agencies stopping the next Boston Marathon outrage are increased? Should we be outraged if these agencies actually identify one of our own citizens as a terrorist who is planning to detonate himself and others on a London tube or in an American sports arena? L

Mike Sixsmith is the author of Exit Plan, published by Pen & Sword and available from Amazon in hardback and e-book

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Mike Sixsmith has enjoyed a varied career in counter terrorism and intelligence in the Special Forces and the commercial world for over forty years.  He served in Aden at the end of empire. He was on the front line of the Cold War; and before the Berlin Wall fell, monitored the activities of KGB agents.    He was involved in commercial security operations in areas as diverse as Europe, Colombia, Papua New Guinea, Angola and Mozambique; and provided risk assessment and consultancy services to multinational companies, ranging from oil majors and international mining companies, to pharmaceutical companies and City of London banks. His portfolio includes a detailed counter terrorist survey of JF Kennedy Airport for the Port Authority of New York & New Jersey, then based in the World Trade Centre in New York.   For much of the ’90s he focused on business intelligence in the Middle East region, conducting fraud enquiries and investigations into counterfeit trafficking, often involving prominent local figures. At the behest of a sheikh, he was arrested on a pretext by the secret police. After interrogation and solitary confinement, he was awaiting trial at the time of 9/11. His experiences here provide much of the background to Exit Plan.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

37


Marshall Aerospace and Defence Group is one of the largest privately owned and independent aerospace and defence companies delivering innovation and excellence in engineering and support solutions in the air, on land and at sea. We designed, developed and manufactured a portable DNA capability to produce indisputable evidential grade results anywhere in the world. We were delighted to be recognised in the 2013 Queen’s Award for Enterprise in Innovation.

DNA

Innovation and Excellence in Engineering and Support Solutions.

marshalladg.com/forensics


TERRORISM PROFILE

NORTH AFRICA’S MOST WANTED

Islamic extremism has developed into a highly competitive and lucrative industry in Northern Africa, generating funds from extortion, weapons, drugs, kidnappings, and assassinations. A premier master of this tradecraft is Abdelmalek Droukdel, the de-facto emir of al Qaeda in the Islamic Maghreb (AQIM). Droukdel’s climb to emir status demanded aggressive political tactics, charisma, mainstream media coverage, and the affirmation of al Qaeda proper; however, it is difficult running an organisation governed only by dominant behavior, intimidation, and fear. He is under constant threat of fratricide and capture by authorities. Meanwhile, his organisation is violently engaged with law enforcement and military, and his followers lured by government amnesty programmes and rival groups, who are also motivated by a desire for power and brand recognition. FROM ACTIVIST TO VIOLENT JIHADIST Droukdel was born April 20, 1970, in the impoverished village of Zayane, town of Meftah, province of Blida, in Algeria. His

father and mother are Rabah Droukdel and Z’hour Zdigha (maiden name). His parents were practicing Muslims, with the father affiliated with an agricultural cooperative and mother an average Algerian housewife. Algerian’s born in the 1970s would have grown up during a period of Arabization, social unrest, and rampant violence. The ideology of Islamic extremism was just taking root and being perpetuated by a growing Salafist movement. Like other children in Meftah, Droukdel attended the Madjine Ibrahim primary school (9-year school). He was a member of the local mosque, noted for recruiting boys for violent activities and intimidating local residence into the strictest adherence of Islamism. He first became involved in Islamist activism following high school. Before becoming a jihadist in 1996, he attended the University of Blida where he earned a Bachelor’s Degree in mathematics. Upon completing his transformation from activist to jihadist, he participated in murdering citizens of Zayane as punishment for civil service or suspicion of collaborating with authorities, and women for

FROM VIOLENT JIHADIST TO AQIM EMIR Droukdel’s formal terrorism career began with his membership in the Armed Islamic Group or Groupe Islamique Armé (GIA). Founded in 1992 by Mansour Meliani, GIA was a brutal organisation devoted to overthrowing the Algerian government. Conflicting information sets Droukdel’s membership in GIA somewhere between 1993 and 1996, and ending between 1996 and 1998 when he joined the Salafist Group for Preaching and Combat (GSPC) and served as a regional commander. Founded in 1998 by Hassan Hattab, GSPC splintered from GIA because of their practice of killing civilians. Ironically, GSPC would reverse this ideological distinction under Droukdel’s rule, and would kill civilians, foreigners, political figures, military, militia, and police without prejudice. Droukdel developed an expertise in bomb‑making and computer technologies during his early years in GSPC. He also adopted several aliases, a common practice for career terrorists, which include Abu Musab Abdel Wadoud, Abdelmalek Droukdel, and Abou Moussaab Abdelouadoud. His first leadership role was to operate military workshops in what the GSPC labeled as the Second Zone, which resulted in his promotion to commander of the al-Quds brigade in 2001. He later took over as the emir of GSPC in 2004 following the death of his predecessor, Nabil Sahraoui, a position that E

Written by Michael S. Toney

Michael S. Toney profiles Abdelmalek Droukdel, emir of al Qaeda in the Islamic Maghreb (AQIM), and examines his rise to power and his increased aggression against foreign interests

not wearing the hijab. His early methods of violence and number of deaths are unknown, but could have included everything from stoning to knives and swords.

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Islamic m is extrem loped e has dev highly into a ive and it compete industry lucrativorthern in N Africa

39


CONTAIN • PROTECT • SECURE

LPCB Security Rated GRP and Steel Housings and Doorsets Tested to LPS 1175 to SR2, SR3 and SR4 Please refer to Red Book Live for full listings

Morgan Marine Ltd LlandybÏe, Ammanford Carms SA18 3GY Telephone: 01269 850437 sales@morgan-marine.com www.morgan-marine.com


TERRORISM PROFILE  he continues to hold. His mentor was Abu Musab Al-Zarqawi, a Jordanian who led al Qaeda in Iraq (AQI) until he was killed by the U.S. military in 2006. A year later, Droukdel established the Battalion of Death, which specialised in suicide bombing, the first of its kind in Algeria. BATTLE OF BADR The first engagement of the Battalion of Death was operation “Battle of Badr,” referencing the Prophet Mohammad’s 7th century expedition. The operation consisted of three simultaneous explosions using Suicide Vehicle Borne Improvised Explosive Devices (SVBIED). The intended targets were the Prime Minister’s office and a police station in the capital of Algiers. Only two of the explosives detonated and the third was located and disabled by security forces. At least 162 people were injured and 23 killed during the attack. Droukdel would continue to model his suicide operations after those of his mentor in Iraq, Abu Musab Al-Zarqawi. In December 2008, the Algerian Army wounded him during an attack, but the extent of his wounds are unknown. Droukdel’s organisational goals are as follows: “the arbitration of the Lord of the world’s law, and the achievement of the servitude to God; to rescue our countries from the tentacles of these criminal regimes that betrayed their religion, and their people; establish an Islamic State; and to destroy the Jews, apostates and crusaders.” He recently shifted the organisational culture from heavy‑handed ruthlessness to one that attempts to win over the regions it occupies, which may signify a desire to become politically viable. He expressed an acceptance to the probability of defeat by considering his efforts to be a “seed to a longer‑term objective;” however, this declaration may be designed to influence the personal sacrifice expected from his followers. Following Droukdel’s rise to emir was his designation by Algerian authorities, and internationally, as a terrorist connected with al Qaeda. On January 15, 2005, the tribunal

Droukdel has surpassed the accomplishments of his predecessors, with more than 4,000 incidents and tens of millions of generated revenue to his name. He has demonstrated repeatedly the skills and influence necessary for attainment

court in Tizi-Ouzou, Algeria, issued a warrant for his arrest and sentenced him, in absentia, to life imprisonment on March 21, 2007. A few years later, the U.N. Security Council Sanctions Committee designated him an al‑Qaeda associate. On August 29, 2007, this designation was recognised by the Bank of England in which any financial accounts associated with him subsequently would be frozen. The U.S. followed suit and in December 2007, the U.S. Department of Treasury froze his financial assets under Executive Order 13224; however, it is unknown if any funds were seized as a result. FROM AQIM EMIR TO CANDIDATE AL QAEDA SUCCESSOR Droukdel’s future offers a finite number of alternatives. He can continue leading AQIM until he is imprisoned by authorities or killed, or attempt to transform AQIM into a legitimate political entity through negotiations. He can resign from AQIM and go into hiding until he is assassinated by former colleagues, a common practice among terrorist organisations in Northern Africa. He had ordered the El-Feth El-Moubine Brigade to assassinate Abdelkrim Kaddouri, a former advisor to Amari Saifi, an AQIM regional commander also known as El-Para. Kaddouri surrendered to Algerian authorities, carrying with him detailed information concerning the inner-workings of GSPC, after which he was added to the AQIM hit list. Droukdel could be elevated into the ranks of al Qaeda proper by Ayman al-Zawahiri and position himself as successor. Each day Droukdel serves as AQIM’s emir, the probability of capture or death becomes increasingly imminent particularly as the fidelity of intelligence improves through international cooperation and AQIM competitors seek territorial dominance. Rewards up to $5MIL USD offered by the U.S. Department of State also considerably raises the likelihood of his capture or death. He may continue commanding violent engagements, growing the organisation’s wealth, and hardening the leadership structure.

About the author

Counter Terrorism

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Dr Michael Toney holds a doctorate in business administration with specialisation in organisational behavior from the University of Phoenix. He has worked with the U.S. Department of Defense for more than 25 years, focused primarily on operations centres, and has published two books: Terrorist Organizational Behavior (Toney, 2012) and Organizational Behavior Profile: AQIM (CreateSpace, 2013). Meanwhile, rival organisations compete for recognition by undertaking more dangerous and spectacular  operations. The leadership characteristics that make Droukdel a candidate senior al Qaeda leader, and feasible successor to al-Zawahiri, are evident in his transformation of GSPC to AQIM. He is a charismatic leader, which is noticeable in the word choices and carefully crafted messages delivered by AQIM’s media arm. Often, he frames the world as a battlefield in which his organisation engages “the thrones of the atheists, the apostates and their supporters, and to stifle the plots of the wicked Jews and Crusaders against our Islam.” Droukdel has surpassed the accomplishments of his predecessors with regards to incidents (greater than 4,000) and revenue generation (tens of millions).He has demonstrated repeatedly the skills and influence necessary for attaining internationalisation and the creation of new funding streams with organisations, such as the Revolutionary Armed Forces of Colombia (FARC). In 2012, he ousted Mokhtar Belmokhtar from AQIM, citing ideological differences. This demonstrates his willingness to eliminate anyone in his ranks that stray from his directives or ideological maxims. The career move that would most likely reduce the probability of his death would be to court al-Zawahiri for induction into al Qaeda senior leadership. This alternative would remove him from the day-to-day management of AQIM and the potential for capture from security forces in Northern Africa, assuming his new role includes relocation to a safe haven. With this notional role, he would be responsible for perpetuating al Qaeda’s ideology and shaping the collective organisational objectives, such as branding new al Qaeda entities, managing the flow of weapons and money, and preparing units for the execution of large‑scale violent engagements. L FURTHER INFORMATION For the references used in the text of this feature, visit www.counterterrorbusiness.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

41


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NaRQ Introducing

Meet Danfo at

BORDERPOL stand A3

The new generation Drug Recovery Toilet

Prisons - Airports - Ports - Police Stations - Border Crossings enquiries@danfo.co.uk

42

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

020 8380 7370

No manual handling of waste Fast secure processing Safer working environment Multiple surveillance points High-quality equipment

www.narq.com


EVENT PREVIEW

THE BORDER SECURITY ANNUAL GATHERING

Mark Harper MP, the UK’s Minister of State for Immigration and the new director general of Border Force UK, Sir Charles Montgomery, will both deliver a keynote address at the renamed World BORDERPOL Congress on 3-4 December in Central London

Unlike national policing with Interpol and customs with the World Customs Organization, border policing has no internationally mandated organisation ready and able to bring together the wide variety of agencies involved in managing international borders effectively Last year’s first annual Borderpol Conference and Expo was considered a great success by all involved, so much so that the second event will again enjoy the full support of the UK Border Force and the patronage of the Mark Harper MP, the UK’s Minister of State for Immigration and the new Director General of Border Force UK, Sir Charles Montgomery. Both will deliver a key note address at the renamed World BORDERPOL Congress. The event will be staged once again at the Central Hall Westminster on 3-4 December. The event was a major step in achieving

BORDERPOL’s primary objective in becoming the catalyst for dialogue between the multiple agencies involved in border management. Unlike national policing with Interpol and customs with the World Customs Organization, border policing has no internationally mandated organisation ready and able to bring together the wide variety of agencies involved in managing international borders effectively. To make matters more complicated, no two nations manage their borders in the same way. The mix of agencies involved from

Border Control

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

border police, border guards, immigration, customs and coastguard varies from country to country with varying degrees of inter agency cooperation and varying degrees of success. DIFFERENT WAYS OF WORKING Since September 11th 2001 we have seen numerous different models of organisation tried out in an effort to make border management more effective and streamlined and that process continues to this day. It was with this problem in mind that BORDERPOL came into being. BORDERPOL is not specific to any of the main agencies involved with border management, but is instead concerned with border management as a whole. The primary objective is to bring all those involved in the border management process together to share information, best practise and experience in an atmosphere conducive to the free flow of communication. The other advantage BORDERPOL has is that as a non-governmental organisation, it is able bring industry experience and technology into the conversation as appropriate without compromising its impartiality. It was with this mission in mind that the BORDERPOL conference and expo was conceived, partly as an open conference and partly as a closed agency-to-agency workshop. Tom Tass, executive director of BORDERPOL said: “The recent events in the global political and economic arena are having an impact on the border security paradigm not seen possibly since 9/11. BORDERPOL’s raison d’etre is once again being put to use by parties interested in finding demonstrable solutions to the border security migration management challenges being experienced world wide.” BORDER CONTROL DILEMMAS The event will include sessions asking and attempting to answer some of the key questions facing IBM now and in the future. There will be a session looking at the lessons learned from integrated border management, which debate the questions: have the amalgamated border services created over the past decade around the world become a Jack of all trades and master of none? Has vertical integration of border services and agencies demonstrably improved effectiveness? In the current world economic climate agencies need to focus on different border management aspects while enhancing cooperation, what are the proposal for further development of IBM dimensions and the application of its best practices? There will also be a session on the facilitation of low risk travellers. This will attempt to answer questions, such as what technologies and travel schemes could be employed to facilitate the speedy movement of low risk travellers and business people? Can a scheme be extended to outward bound aviation security? What upstream cooperation and systems can be employed to stop fraudulent attempts to obtain visas? How can E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

43


2nd World BORDERPOL Congress 3rd-4th December 2013 Central Hall Westminster, London, UK The event not to be missed. Register Today at www.borderpol-event.org

Keynote Speakers

Exhibition Hours

Other speakers include:

• Mandie Campbell, Chief Operating Officer, Border Force, UK 9.30am - 7.00pm • Dave Wood, Director General, Immigration (including Networking Reception) Enforcement, Home Office, UK • Henrik Nielsen, Head of Unit, Border Wednesday 4th December Management and Return, Home Affairs, EU 9.30am - 5.30pm • Clarence Yeo, Commissioner, Immigration and Checkpoints Authority, Singapore Exhibition only is free of charge to • Ms Giselle Vas, Director General, Border attend for trade Police Force, Hungary • Michael O’Connell, Director of Operation For a list of exhibitors and to Mark Harper MP Sir Charles Montgomery Police Support and Chairman of register online to attend visit Minister of State for Director General, INTERPOL Integrated Border Management www.borderpol-event.org Immigration, UK Border Force , UK Task Force, Interpol, France • Greg A. Haase, BG (Select), MNANG, Director, US Joint Interagency CounterTrafficking Center, Germany • Penny Satches-Brohs, Senior Border Issues TUESDAY 3RD DECEMBER Advisor, Head/Borders Unit, Transnational Threats Department, OSCE, Austria 9.00am - 10:00am Opening Keynote Session • Mika Poutiainen, Head of Vaalimaa 10:30am - 11:30am Lessons Learned from Integrated Border Management Customs, Finnish Customs 11:30am - 12:30pm Agency and Industry Workshops (check website for details) • Erdal Duzdaban, Border Management 2:00pm - 3:00pm Facilitation of Low Risk Travellers Officer, OSCE Office in Tajikistan 3:30pm - 4:30pm Agency and Industry Workshops (check website for details) • Commodore R.S. Vasan (Ret’d), Head, 4:30pm - 5:30pm Changing Patterns and Trends in Cross Border Crime Strategy and Security, Centre for Asia 5:00pm - 7:00pm Networking Reception in the Exhibition Hall Studies, India • Serge Rinkel, Director Programs and WEDNESDAY 4TH DECEMBER Services, BORDERPOL, France • Col. Gábor Kovács PhD, Hungarian 9:00am - 10:30am Difficulties in Securing Borders Against Organized Crime and National Police and National Public Service Concealed Human Trafficking University, Hungary 11:15am - 12:30pm Agency and Industry Workshops (check website for details) • Tony Smith, Managing Director, Fortinus 2:00pm - 3:30pm Innovations and Future Technologies for Border Control and former Director General, Border Force, 4:00pm - 5:15pm Agency and Industry Workshops (check website for details) UK

Tuesday 3rd December

Agenda Highlights

If you are a Border Agency, then we have a great package deal, making your attendance easier and more cost effective. Visit www.borderpol-event.org for more details. Hosted by:

Knowledge Contributor:

Supported by:


Border Control

Mark Harper MP, the UK’s Minister of State for Immigration

EVENT PREVIEW

The second World BORDERPOL Congress event will again enjoy the full support of the UK Border Force, and also the patronage of Mark Harper MP, the UK’s Minister of State for Immigration, who will deliver a keynote  biometrics be integrated and how can kit be standardised to facilitate inter-agency cooperation? Forward thinking of policy and technology – is it the end for the paper passport? CHANGING PATTERNS AND TRENDS There will be a session on changing patterns and trends in cross border crime, which will examine questions such as: what and where are the changing techniques and patterns in cross border crime? What can be done to stop crime paying and agency collaboration on activities at the borders to control human/ drug trafficking and detect smuggling of cash/ credit cards/gilts/goods? How much behind the scene work and pre-screening is being achieved and brought forward to frontline? How is the automation and use of information and sharing of information working? There will also be a session on innovations and future technologies for border control. This will examine what innovations and developments in technology are just around the corner that can aid and facilitate border forces in surveillance and detection? How can new technology be integrated with existing systems? Is data and identity really protected in the digital age and can systems ever be secure enough to avoid cyber security threats and identity theft?

ensure none of the systems put in place impede on the swift movement of trade? These questions will be looked at the Maritime and Port Security session.

companies might best develop products to win government contracts in the future. Securing borders against organised crime and concealed human trafficking will also be examined. This will look at how to find the balance to facilitate international travel and commerce without diminishing security. It will ponder the questions: can you have an open and secure border? How do you secure borders against those criminal organisations who use refugee movement to mask human trafficking activity? Building a new port or the expansion/ upgrade of an existing port provides many threats for border security, including immigration, stowaways, drug smuggling etc. How can the port owners and managers work with border agencies, port authorities, coast guard and security consultants to

CONFERENCE SPEAKERS Just some of the confirmed speakers that will be at the conference to discuss debate and answer those question will be: Clarence Yeo, Commissioner, Immigration and Checkpoints Authority, Singapore; Mandie Campbell, Chief Operating Officer, Border Force, UK; and Michael O’Connell, Director of Operation Police Support and Chairman of INTERPOL Integrated Border Management Task Force, Interpol, France. Controlling and managing international borders in the 21st Century continues to challenge the border control and immigration agencies around the world. It is generally agreed that in a globalised world borders should be as open as possible, but threats continue to remain in ever evolving circumstances and situations. The World BORDERPOL Congress provides a platform for the world’s border protection forces and agencies to discuss and debate the current and future issues and challenges facing the industry and will continue to develop and enhance international cooperation and collaboration amongst the border management and security industry. Further information, the Congress schedule, speakers, exhibition and registration details can be found at the website below. L FURTHER INFORMATION www.borderpol-event.org

THE PRIVATE SECTOR How can the private sector best support border control agencies to deliver their objectives? Increasingly governments are looking to deliver high quality border services to promote global travel and growth, against a backdrop of shrinking resources. How do border agencies continue to maintain stringent security standards whilst at the same time stimulating facilitation – and how can the private sector assist them in their mission? In this workshop, Tony Smith, former Director General of the UK Border Force and now Managing Director at Fortinus Ltd, reflects upon his experiences in working with the Private Sector on border initiatives, and considers how private

45


ADANI

from ideas to solutions

CONPASS

FULL-BODY SECURITY SCREENING SYSTEM Detection capability:

Objects hidden internally and externally on the body, within prosthetic devices, artificial limbs, shoes etc.

Items detected:

Explosives, weapons, drugs, electronics etc.

Tested and proven effective:

Swallowed drugs

Ceramic knife in rectum

info@adanisystems.com

Prosthesis

Installed in 24 countries and satisfied customers for 15 years.

Breast implants

www.adanisystems.com


EVENT PREVIEW

MAJOR THREATS TO TRANSPORT SECURITY

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

The conference and workshops at Transport Security Expo will assess the transport threat horizon and determine how best to maintain traveller safety in an increasingly hostile world Transport Security Expo, the annual gathering of professionals within the aviation, maritime and public transport arenas, convenes again 13-14 November 2013, against a backdrop of the industry being at a developmental crossroads in terms of both its regulation and ability to respond to current and emerging threats. This key event will gather policy makers, world leading experts, technologists and industry operators together in London, to examine current protective measures, assess the threat horizon and determine how best to maintain traveller safety in a changing and increasingly hostile world in austere economic times. Through an in-depth conference, extensive programme of workshops and a world‑class exhibition, delegates and visitors will immerse themselves in the challenges transport operators face in maintaining high levels of security and the solutions to them, during a two-day event held at the Olympia Conference and Exhibition Centre. There will also be a world-leading exhibition of state of the art software and hardware products from vendors from across the globe. MAJOR THREATS FOR TRANSPORT For the first time in its long history as the premier gathering for industry professionals, the event introduces the “Major Threats to Transport Security” plenary session this year. This entirely new addition to an already extensive programme has been developed to clearly identify overarching threats common across all transport interests and foster convergence of thought. Transport Security Expo’s plenary session will deliver a ‘360 Global Threat Assessment’. The session is open to all delegates attending the event and features debate on how best to manage the risk to transport networks from terrorism and other crimes, discussion on protecting national and global transport systems from acts of terrorism and other security threats, as well as discourse regarding the extent of the cyber security threat to transport industries. CYBER SECURITY Transport Security Expo has identified that the industry wide problem of cyber security is becoming acute, thus the prominence being afforded this issue during the forthcoming event. E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

47


Transport Security

EVENT PREVIEW  The transport industries depend on information technology and would likely grind to a halt without ready access to data required for day-to-day operations. This imposes a requirement that the systems deployed across the transport networks are both robust and secure. The traditional approach to cyber security has been to focus most resources on the crucial system components and protect against the biggest known threats. This approach is insufficient in the interconnected world of today, where a much more holistic approach to cyber security across transport networks is absolutely vital. CYBER TERRORISM IN AVIATION Cyber security should be at the top of the agenda issue across the transport world but perhaps most particularly in the aviation sector. Next generation aircraft currently being introduced into service are e-enabled via secure Internet Protocol (IP) communication channels passing data back and forth between ground and on-board systems. Currently the Airbus A380 and the Boeing 787 are the only e-enabled commercial aircraft in service, but the coming Bombardier CSeries and the Airbus A350 will also adopt this feature. Real time direct communication allows airlines to directly monitor aircraft health, pass relevant operational information to air crew and enable such like as e-commerce in the air. Such systems also provide an interface with a piece of equipment known as the Electronic Flight Bag (EFB). This is a series of software tools that allow pilots to automate tasks such as weight and balance, along with allowing pilots to track routes with weather overlays. It’s estimated that 30,000 laptop or tablet computer EFBs are used in North America alone. Concern is high that EFB connectivity could deliver a path for malicious code to enter into airborne systems aboard e-enabled aircraft. The airline industry cyber security consultancy firm AvIntel says that 80 per cent of airlines recently surveyed have an active EFB programme running, but only 40 per cent have an active EFB cyber security plan in place. Given that ubiquitous connectivity for EFBs means the devices are constantly sniffing for a signal, it is possible for these devices to compromised if pilots go online over public internet connections to download information prior to flight. It has become very evident over recent years that terrestrial networks are easily compromised; therefore the aviation industry needs to pay close attention to aircraft that have network connectivity. Transport industries collectively also owe it to themselves to ensure that the information technology they depend so upon, has a sufficient level of redundancy built in to limit downtime and aid prompt recovery in the event of a cyber attack or hardware failure. Two of biggest airline carriers in the United

Through a conference, extensive programme of workshops and a world‑class exhibition, delegates and visitors will immerse themselves in the challenges transport operators face in maintaining high levels of security and the solutions to them, during a two-day event held at the Olympia Conference and Exhibition Centre States, American and Southwest, have suffered major outages during this past year, which have grounded flights, caused chaos at airports across the country and taken costly time to recover from.

crossings and could very well open the door to further terrorist activity. It is a here and now issue which demands immediate action before it escalates to critical and potentially life threatening proportion.

THREAT WITHIN A recent US Government Accountability Office (GAO) study reported a worrying 26 per cent increase over three years in Transportation Security Administration (TSA) personnel transgressions considered to be a security threat. The issues highlighted ranged from sleeping on the job, through allowing friends and family members to pass freely at screening to theft of in transit traveller property. The property theft briefly captured headlines after a TSA employee was captured on film stealing from baggage in the mêlée following the San Francisco (SFO) air crash in which three people died and multiple other passengers were seriously injured. Separately, when fire engulfed Kenya’s Jomo Kenyata International Airport (NBO) in early August, some airport personnel grasped an opportunity to indulge in widespread looting. Police, airport security and random other airport personnel reportedly engaged in the looting spree while the fire raged. Multiple people across all disciplines have been arrested and are facing charges. Transport Security Expo has warned of the insider threat previously and continues to monitor this worrying upward trend in activity such as highlighted above. The insider threat has the potential to compromise other defences in place at airports, ports and other border

REGIONAL WARNINGS INTERPOL issued a global security alert in early August advising increased vigilance for terrorist activity, following a series of prison escapes across multiple member countries, in which well over a thousand individuals with links to terrorist organisations fled. Concern has been expressed that these apparently coordinated escapes may be a precursor to an upswing in jihadist attacks across the Middle East and North Africa. Some parts of this region have been in a state of turmoil since the uprisings of recent years and consequently have weakened or diminished counterterrorism capabilities, border control mechanisms, internal security priorities, and other shortcomings. The rise of new or transitional governments in Egypt, Tunisia, Yemen, and Libya, and ongoing unrest in Syria and Mali, have offered new opportunities for established affiliates to the likes of al-Qa’ida, other aspiring terrorist groups, and like-minded individuals to conduct attacks against western interests across the region. Transport Security Expo will bring attention to the regional threats faced by the maritime and supply chain sectors when it convenes again in November. TERROR AT SEA A rise in terrorist activity directly or indirectly targeted at the maritime sector could E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

49


Store, manage and control keys, cards and small assets more securely and efficiently with KeyWatcher® Touch. Access is limited to authorized users, and all transactions are recorded with detailed reports available. The system will even automatically email transactional information to any user – at any time. And KeyWatcher’s convenient touchscreen makes removing and returning keys easier than ever. With our modular design and full scalability, it’s easy to see how we keep making key management better. That’s Morse Watchmans’ outside the box thinking – right inside the box.

morsewatchmans.com • 0115-967-1567


EVENT PREVIEW  have serious consequence on Western economies which are heavily dependent upon uninterrupted energy supplies from the region as well as unfettered access to seaways such as the strategically vital Suez. The maritime sector is also battling another issue, which threatens to undermine previously close cooperation on acts of piracy between naval and merchant marine assets. It is estimated that some 60 per cent of commercial carriers now employ armed guards and this is said to be one of the factors that has led to a dramatic fall in the number of reported incidents of piracy. However, it is thought that vessels employing private security are engaged in widespread underreporting of attempted pirate attacks for a variety of reasons. These include the possible loss of business if cargo owners perceive a particular shipping company or route to be unsafe and the fear of liability in the event of innocent parties being injured or killed. It is thought that for every two pirate attacks report somewhere in the order of twelve others are not reported to the proper agencies. Such underreporting significantly degrades the ability to collect accurate intelligence on the movement of pirates and deliver meaningful protective cover in the event of an attack. BORDER CONTROLS INTERPOL’s recent global security alert came just prior to a critical report on the

state of UK border controls at overseas entry points in Belgium and France being published by John Vine who is the Independent Chief Inspector of Borders and Immigration. The report revealed that UK Border Force, the enforcement agency tasked with preventing illegal entry at ports and airports, had not fingerprinted or photographed thousands of illegal immigrants attempting to cross the border at Calais and Coquilles, due to a long running problem with the availability of cells in which to hold them. This failure has effectively deprived appropriate services of valuable intelligence on those attempting to cross into the UK illegally. The report also highlighted concerns over the persistent issue of the so-called Lille Loophole through which passengers boarding high-speed trains in Belgium and passing through France remain exempt from United Kingdom immigration checks. Home Secretary Theresa May has been accused of a politically expedient cover up in redacting certain elements of the report. Transport Security Expo attendees will discover that effective border controls are a fundamental building block in a multifaceted

national security plan combining intelligence and technology to help keep us safe on the road, high seas and in the air.

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

INNOVATIVE EVENT FEATURES For the first time, Transport Security Expo will include a VIP Airport Programme, hosted and chaired by former head of BAA Security, Ian Hutcheson. The programme will invite 20 of the world’s major airports on a specialised programme. Invited Airports include: Miami, New Delhi, Paris, San Francisco, Schiphol, Beijing, Singapore, Sydney, Vancouver, Zurich, Heathrow, Abu Dhabi, Dubai, Atlanta, Dallas, Frankfurt, Hong Kong, JFK, LAX and Madrid. Also new for 2013, Transport Security Expo has partnered with ADS Group, the trade organisation advancing the UK aerospace, defence, security and space industries, to host the ADS Pavilion for the first time. The Pavilion will showcase the best of UK excellence to a global audience of airports, ports and mass transit hubs. The Perimeter Security Suppliers Association (PSSA) will also host its own Pavilion. The organisation brings together the UK’s leading suppliers involved in protecting critical infrastructure such as airports, ports and oil and gas terminals) against potential threats. Another innovative feature of this year’s event is the Intelligent Hub, which is a highly interactive live demonstration, delivering hands-on experience of command & control and active cyber security operations, amongst mass transportation networks. What’s more, following from the success of last year, there will be another Meet The Buyer feature. This highly successful programme will be significantly expanded at the forthcoming event. It removes the hit and miss approach and guarantees faceto-face meetings with high value buyers. Seven international delegations visited the 2012 conference and exhibition and this is expected to increase as Transport Security Expo gears up for its 2013 event, with invitations to delegations from China, Japan, India, Germany, Central/North Africa, the Middle East and the USA, amongst others.

rt Transpoty Securi dees ten Expo at over that c will dis ve border effecti ols are contr tal in a en fundam l security nationa lan p

WORKSHOPS OVERVIEW Transport Security Expo’s knowledge centric technology workshops are a popular feature. These information rich seminars are presented by leading industry experts and offer visitors the opportunity to immerse themselves in each of the fields under review. Transport Security Expo 2013 will feature an expanded free-to-attend workshop programme, similar to last year’s event, to meet popular demand and E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

51


Company Profiles

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Everbridge for advanced real-time interactive communication solutions SITUATIONAL INTELLIGENCE

THE NEXT GENERATION OF MASS COMMUNICATIONS SOLUTIONS FOR BUSINESS CONTINUITY AND EMERGENCY PLANNING

PROTECTING PEOPLE, ASSETS, AND REPUTATION

INTEGRATING MODERN CAPABILITIES INTO TRADITIONAL COMMUNICATIONS CHANNELS SOCIAL – LOCATION INTELLIGENCE – WEATHER – MOBILITY

TAKE 3 MINUTES TO LEARN WHY GARTNER RANKS EVERBRIDGE THE LEADER IN THE ENS MARKET

EVERBRIDGE.COM/PRODUCT-OVERVIEW LONDON

BOSTON

LOS ANGELES

BEIJING

Recognised as the global leader by Gartner in the 2012 Magic Quadrant for Emergency/ Mass Notification Services (EMNS), Everbridge provides interactive communication and mass notification solutions for emergency planning and business continuity. Everbridge provides industry leading solutions to organisations in both commercial and government sectors. Its solutions increase connectivity to key audiences, automate communication processes and integrate recipient feedback, data feeds and social media in a single communication platform. Everbridge empowers organisations with interactive communication capabilities that help to make better decisions when it comes to protecting residents, informing staff and preserving critical infrastructure. The Everbridge solutions suite allows organisations

to employ a closed-loop communications strategy around critical activities such as lifethreatening incidents, weather events, operational efficiency programs, staff resourcing and safety, and IT management. The solution suite is supported by an elastic infrastructure, advanced mobility, interactive reporting and analytics, and adaptive people and resource mapping that mirrors your organisation. All of this and true enterprise class data management capabilities make Everbridge the only platform for real-time interactive communication. FURTHER INFORMATION Tel: +44 (0) 1753 626656 www.everbridge.com

Lincoln Security are experts in providing physical and electronic security solutions Lincoln Security are a major supplier and reliable infrastructure partner to a significant number of high profile critical national infrastructure companies across the UK. Our product independence enables us to offer bespoke and innovative physical and electronic security solutions in areas of sensitivity, CNI, Government and Transport.

• • • •

LPCB Steel Doors LPCB Timber Doors Mechanical Locking Solutions Electromechanical Locking Solutions • Intelligent Intruder Detection Systems

For more information, please contact us at: Lincoln Security, 79-83 High Street, Lincoln, Lincolnshire LN5 8AA T: 01522 532038 F: 01522 536060 www.lincolnsecurity.co.uk info@lincolnsecurity.co.uk

52

COUNTER TERROR BUSINESS MAGAZINE | Issue 14


EVENT PREVIEW  will encompass the aviation, maritime, mass transit and supply-chain arenas. The Perimeter Security & Hostile Vehicle Mitigation workshop will take place on 13 November. In an age when attacks have become increasingly random and often from the least expected trajectory, effective perimeter controls are a vital part of the overall security mix. Recent painful history has demonstrated a pressing requirement to combine traditional perimeter security measures with hostile vehicle mitigation techniques, to ensure a robust defensive posture against a wide range of external threats. This key workshop delivers a detailed overview of the solutions available today. Organisations featured: ASIS International, Detection Technologies, Chordell Solutions, Zaun, Broughton Controls, Gallagher, Business Insight 3, and Geoquip. The Ship & Port Security workshop, also taking place on 13 November, will security for merchant marines. Piracy on the high seas remains an intractable problem despite the deployment of substantial naval assets in many of the worlds more notorious piracy hotspots. UK government officials recently gave the green light to arming merchant vessels traversing such dangerous waters. This important and timely workshop focuses on the security options available to the merchant marine, including the deployment of armed personnel, real time tracking of vessels at sea and the wide range of other threat mitigation and hardening solutions available today to protect crews and ensure safe passage for valuable cargos. Organisations featured: SAMI, Britannia Maritime Security, Proximex, Frazer-Nash Consultancy, Sesys, NYA International, Buccaneer Ltd, and Securitas. SECURITY ON THE TRACKS Major security challenges continue to face national rail operators. These include protecting passengers using such open and vulnerable transport infrastructure from acts of terrorism and protecting valuable safety critical assets against organized and opportunistic theft. The key enabler across such extended and exposed networks is technology. The Rail Security workshop is entirely new and a highly specialised workshop brings clarity to the range of options available across the complimentary technology groups of surveillance, closed circuit television monitoring, access control, perimeter security, sensing and tracking amongst others. Organisations featured: CNL Software, Frazer-Nash Consultancy, Edesix, Axis Communications, Avigilon, Pelco by Schneider Electric, and OptaSense. On 14 November, there will be a Freight & Cargo Security workshop. US officials recently unveiled their Strategy for Global

Supply Chain Security at the World Economic Forum in Davos, Switzerland. The policy document was developed after the discovery of powerful improvised explosive devices at two major airfreight hubs, succinctly demonstrated the vulnerability of the freight and cargo channel to acts of terrorism. US strategy has an inevitable impact for freight and cargo handlers attempting to attain compliance with the requirements it contains. This workshop sheds light on the technological solutions currently available and examined the options available to operators across the supply chain going forward. Organisations featured: SEDET, MultiX SA, Vemotion, Rapiscan Systems, BSI Supply Chain Solutions Group, Scanna MSC Ltd, Honeywell Global Tracking, and Applied Satellite Technology Systems. TERMINAL & FACILITY SECURITY The probability of attacks against terminals and supporting facilities is considered a persistent threat with no easy solution. Two significant attacks at airports in Moscow and Frankfurt last year serve to illustrate this point graphically. Although deployment of plainclothes security personnel and quick reaction teams can help ameliorate the impact of attacks on airports, their ease of execution and the impossibility of eliminating all airport queues (be they for drop-off, check-in, security screening, baggage claim, or car rentals) make this tactic a growing threat. The Terminal and Facility Security workshop examines the options available to help better secure terminals and associated facilities. Organisations featured: Security Media, JVC KENWOOD, Southwest Microwave, F-24 UK Limited, Proximex, Everbridge, EverFocus Electronics Corp., Routesafe Systems Ltd, Trueform, and VidSys. There will also be a workshop on passenger screening on 14 November. Vast numbers of travellers are screened at our major air transport hubs every year. With the demand for air travel constantly increasing, airports must innovate to ensure an appropriate balance between the competing needs

rt Transpoies industr n IT. o depend oses a p This im nt that the me require s deployed system etworks are across nrobust and both cure se

of utmost security, greater revenue generation and an improved passenger experience. This challenging balancing act requires that airports harness best practice techniques and adopt latest technological advances to ensure the smooth flow of travellers. This workshop seminar focuses on the latest passenger screening solutions and how they can be harnessed to deliver enhanced capability and flexibility at your airport. Organisations featured include: One Resonance Sensors, SITA Government & Security, Global Security Research, Herbert Systems, Cobalt Light Systems Ltd., Morpho Detection Inc., and Broughton Controls. There will also be a workshop on cyber security across transport networks. Organisations featured include Bloxsafe Limited, Optimal Risk Management, and Sutcliffe & Co Insurance Brokers.

Transport Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

NEW EVENT DÉBUT Transport Security Expo is pleased to welcome the launch of the co-located and analogous Transport Safety Expo. This new and entirely separate event has a clear focus on the very many safety related concerns faced by the transportation industries globally and features its own dedicated exhibition, together with a conference and workshops. “Safety has always been of paramount concern within the transport world yet we witness terrible accidents which result in substantial loss of life each year. Transport Safety Expo is intended to act as forum where lessons learned can guide original thought and help bring about a much safer travelling environment,” says event chief executive Peter Jones. More people than ever are travelling by air, sea and land based public transportation, but numerous major incidents have cast a long shadow over these networks, prompting calls for a re-evaluation of adopted safety practices in certain sectors. Statistics for the past year reveal that 13 commercial passenger and freight aircraft crashed, 48 major rail accidents were recorded and 63 ships sank, foundered or grounded worldwide. L FURTHER INFORMATION www.transec.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

53


AVIATION

MARITIME

PUBLIC TRANSPORT

100+ Global Exhibitors

SUPPLY CHAIN

Three World Class Conferences:

40 Free-to-attend Technology Workshops

• Aviation Security

Meet the Buyer Programme

• Maritime Security

International Delegations

• Public Transport Security

VIP Hosted Lunch Free-to-attend Evening Networking Reception

For More Information Email info@transec.com Supporters

www.transec.com/advert

13 - 14 November, 2013 Olympia London

@TRS_EXPO

#TRS2013


Morse Watchmans key control and management systems make facilities more secure Physical keys are an important component of many organisations’ security strategy, and Morse Watchmans is the security industry’s leading provider of key control, key security and key and asset management solutions. The US-based company has an international presence and its state-of-the-art automated access technology offers efficient management of key control and storage across a broad range of applications. Morse Watchmans key control systems are found in casinos, correctional facilities, healthcare institutions, hospitality, multi-family buildings and educational facilities. It is also a critical function for anyone overseeing security at conference centres, government agencies, control rooms, automotive businesses and corporate buildings. With KeyWatcher®, keys are stored in a locked storage cabinet that accounts for each user by individual access code, allowing for keys to be secured and released to authorised users while reporting the specific dates and times. Key control systems from Morse Watchmans are constructed so that each key is locked into place inside a stainless steel cabinet using a locking device which has an integrated chip. Users can only remove a key they

are authorised to use by entering a pre-programmed PIN code or scanning their access card or biometric identification. If the criteria entered matches the information stored in the system database, the key cabinet will unlock and the necessary key can be removed or returned. The activity is automatically recorded. System flexibility and versatility are key benefits of Morse Watchmans key control and asset management systems. A system can be configured to the exact needs of the facility

with custom solutions that include multiple key modules, lockers, biometric access (ie hand readers, iris recognition) and versatile installation options. And the system can be expanded or reconfigured as needs change. Morse Watchmans KeyWatcher Touch system incorporates integration of multiple locations, with common usage of databases and programming; an instrument-grade touch screen seven-inch LCD display and a user-friendly electronic interface with step-by-step instructions; computerised reporting and specialised alert notifications. Other unique system features include KeyAnywhere, which allows the return of any key to any KeyWatcher cabinet in the system, and KeyFind, which allows queries to quickly locate a specific key, determine what keys have not been returned or when a key will become overdue. Morse Watchmans’ state-of-the-art key management (KeyWatcher and KeyWatcher Touch), secure locker systems and keyrings, are modular, reliable, easy to use and scalable.

Company Profiles

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION Tel: 0115 967 1567 morse@morsewatchman.com www.morsewatchmans.com

ADANI: innovative ideas and technologies for unique X-ray systems and technical solutions There is a broad consensus amongst the security community that concealment of improvised explosive devices (IEDs), explosives and weapons inside the body is becoming one of the most serious evolving terrorist threats. The highly authoritative intelligence firm Stratfor speaks of it as “perhaps the most interesting… tactical shift” in terrorist activities. Dr Robert J Bunker dedicates his study (The Projected Al Qaeda Use of Body Cavity Suicide Bombs Against High Value Targets) to this subject. Public attention to this subject was brought by the assassination attempt against Saudi Prince Muhammad bin Nayef in 2009. The Interpol study “The Concealment of IEDs in Rectal Cavities” has officially confirmed the use of an internally hidden IED in this high-profile case. Experts also recognise that most traditional, and even sophisticated, detection equipment, such as metal detectors, explosion sniffers and surface body scanners, can easily be defeated by this technique. However, a reliable and safe tool for identifying concealment in body cavities has been in operation since 1999, when ADANI completed its first installation of a transmission X-ray full-body scanner in an industrial mine, virtually stopping theft of minuscule diamonds.

Since then, the ConPass system, significantly refined and improved, has been used worldwide in airports, prisons, presidential palaces and other high-profile locations, providing not just the best detection capability but the most flexible software and hardware design available.

Over the past few years, ADANI’s research and development staff has been working with governments and commercial security managers to develop a range of solutions that provide the highest level of security screening available on the market. These are with a special emphasis being made on countering the emerging threat of using one’s body as a receptacle for explosives and weapons. ADANI has some exciting new developments planned over the next 12 months. The company has invested in its product design team and manufacturing capacity to be able to quickly bring the new products to market. As a result ADANI now offers, together with the traditional body-scanning solution, passenger vehicle scanning, integrated door access scanning and a body scanner in a standard-sized truck. All of these solutions are fully compliant within the safety standards set out by ANSI 43-17 2009 for “General Use Systems”. Meet ADANI at Milipol Paris (19-22 November) Stand 5S 130 or at ASIS Chicago (24-27 September) Booth 2514. FURTHER INFORMATION info@adanisystems.com (Ref: CT2013) www.adanisystems.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

55


EVENT PREVIEW

A RELAXED WAY TO DISCOVER THE LATEST INNOVATIONS & COST-EFFECTIVE SOLUTIONS

The Total Security Summit (21-22 October, Whittlebury Hall Hotel, Northampton) follows the successful format of face-to-face meetings between security professionals and industry suppliers

Among the first blue-chip organisations to confirm their place include Associated British Ports, Louis Vuitton, London First, Hilton World Wide, Shop Direct Group, JD Williams, Morgan Stanley, Napp Pharmaceuticals Group, InterContinental Hotels Group, Network Rail, The Rank Group, Eurotunnel, as well as many more. Security service providers Samsung Techwin Europe, Alcumus Group, Kaba UK, Risco Group UK, PPM 2000 Inc, Enigma Security Solutions, Safeguard Security Group have already signed up for the event, which is full of business meetings. FREE WORKSHOPS As well as the ample networking opportunities, the Total Security Summit also gives delegates the chance to attend free workshops and seminars hosted by industry specialists. Seminars to date include: “Professional Development in Security Management,” hosted by David Creswell, from the International Security Management Institute. David will be speaking about the case for formal education in security management and an evaluation of the options available. “Mitigating Business Risk by Using Technology,” chaired by Nikki Samme of Alcumus Group. This seminar will outline the risk management framework as described in ISO 31000, explore different types of business risk plus, using real-life case study scenarios, examine how data-management software can be used to identify, track, analyse

and report against key business risks, and thereby be relied upon to make strategic risk management decisions. “Try Something New Today: Dealing with the Unexpected,” chair Steve Mellish of Mellish Risk & Resilience. The highlights of this seminar include: protecting a high-profile brand; establishing and training the “A” team; classic incident management responses; never-saw-that-one-coming scenarios. On the evening of 21 October, attendees are invited to the gala dinner, giving participants the chance to either network with fellow colleagues and follow up on conversations held during the day, or simply relax with a glass of wine over a thee-course dinner. This will be followed by some light entertainment. PREVIOUS ATTENDEES Comments from previous attendees include: “Effective and informative speed-dating for security,” John Lewis. “The Total Security Summit was well worth the visit. Building and maintaining professional relationships takes more than a half-hour and the two-day summit allowed ample opportunity to engage with both suppliers and other industry role-players,” Post Office. “The summit was exceptionally well organised; the face-to-face meetings were carefully matched. An overall excellent experience,” Samsung. “An excellent forum to meet with targeted delegates in a relaxed environment,” Traka. NEW FOR 2013 Launching on 22 October is the Security, Risk & Business Continuity Conference. Supported by ASIS and chaired by Roy Cooper, director of Professional Security magazine, the conference

Total Security Summit

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

promises to be a source of knowledge and information for all security, risk and business continuity professionals. The program of seminars and roundtable discussions are hosted by industry experts, providing all attendees with the most up-to-date information on developing trends. Seminars and speaker programme: “Beyond compliance: security, ethics and the law,” Kevin Macnish, University of Leeds. “The 10 most common business continuity mistakes and how to rectify them,” Alan Walker, AW Continuity. “The hybrid age: is it time to rethink security management?” Director postgraduate, Security Management Programme, Loughborough University. “Enterprise security risk management,” Dr Peter Speight, CEO, Future Risk Management. “The challenges of implementing ISO 22301 (the new international standard for business continuity) in a global organisation,” Charlie Maclean-Bristol, director, Business Continuity Specialist, PlanB Consulting. “Cybersecurity and Apollo 13: let’s look at this from a position of status,” Martin Smith, The Security Company (International).

“Why prepare a security and risk business case when you can have the business write them for you?” Jim Mulheron, Colt Technology. The speakers listed will also chair roundtable discussions at the conference. REGISTRATION Delegate registration for the Total Security Summit is free of charge, including overnight accommodation at Whittlebury Hall Hotel, all meals and refreshments, plus attendance to all keynote seminars and a place at an exclusive evening-networking gala. L FURTHER INFORMATION For delegate information, contact Victoria Petch: v.petch@forumevents.co.uk. For supplier availability and costs, contact Nick Stannard: n.stannard@forumevents.co.uk. To attend the conference, contact Jenny Gray: j.gray@forumevents.co.uk. Twitter: @SRBC_conference

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

59


Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

TECHNOLOGY

MISSION-CRITICAL COMMUNICATION

Emergencies in the most demanding environments are something those in counter terrorist services try to avoid. The emergency services has shared commonalities with these counter terror forces, especially relating to the technology for mission-critical tasks

Fire, ambulance and police services need rugged mobile computing solutions that can give them access to vital information quickly in the most challenging of circumstances. And the advent of more powerful and fully mobile IT means these services are also increasingly using this technology to gather local intelligence, which can be accessed later to enhance their situational assessment and response. One of the UK’s leading fire and rescue services has recently installed advanced rugged notebooks across its fleet of rescue pumps to enhance its response capability. Not only can the units be taken out of the cab, they have a 12.1” touchscreen that can be operated with gloves on and read in bright sunlight – so data can be accessed without crews having to return to their vehicle. The rugged build of this Getac V200 convertible notebook is designed to withstand the challenging conditions that fire crews face, whilst providing fast and flexible computing capability. The unit has the computing power of an Intel Core i7 processor, supported by powerful connectivity with Wi-Fi, 3G and GPS, so the crews can access data no matter where they find themselves. SPEED-UP SITUATION ASSESSMENT The increased computing power means fire officers can store a library of information on the V200 that can be accessed on the way to incidents in order to speed-up situation assessment when the crew arrives. This Site Specific Risk Information (SSRI) is collected during non-emergency visits

60

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

to high-risk sites, such as transport hubs, hospitals, factories, high-rise buildings, motorways, etc. Specific hazards, such as the location of dangerous chemicals that might endanger crews or specific building structures that might complicate access or evacuation, are logged on the V200. SSRI is proving invaluable to crews who can now pre-plan rescues and evacuations in a way that prioritises those most in need. It means that crews arrive fully equipped and ready to handle the situation with the minimum of delay. The units carry detailed information for more than 4,000 separate premises in the

The Getac Z710 rugged tablet, unveiled at the 2013 Defence & Security event and Emergency Services Show in September, incorporates leading-edge encryption technology. Device encryption, system hardening, peripheral control and centralised management significantly improve the ability to control devices, enforce security policies, and provide audit trails and reporting while reducing support and maintenance overheads. SOLUTIONS TO PROTECT DATA Not surprisingly, tablet adoption is growing in security-conscious markets and together Getac and Becrypt are developing innovative, practical solutions that protect data on a variety of form factors, both for today and for the future. The future-ready strategy focuses on remote deployment and centralised management of devices to deliver the same high performance and reliability that customers have come to expect from their laptops, with the added bonus of increased security and portability made possible by the latest mobile technology. Although the fundamental mobile computing needs of the emergency services and of the counter terror services may be similar, individual needs vary considerably. With that in mind, Getac takes the rugged mobile computing platform and then customises it to the individual service’s needs, so they can be used in a wide range of situations and environments. CLIENTS’ MOBILE-COMPUTING NEEDS Getac works closely with its clients to assess their mobile computing needs and to deliver a total solution that meets those needs exactly, and continues to perform. To that end, Getac has recently opened a dedicated customer service centre that provides comprehensive after-sales support to all Getac users. The one thing that all Getac devices have is durability. No matter where or what they are used for, they are built to perform and keep performing – even in the most challenging conditions. Having designed

The rugged build of the Getac V200 convertible notebook is designed to withstand the challenging conditions that fire crews face, whilst providing fast and flexible computing capability area covered by the service so, of course, data protection is a high priority and the V200 has built-in security systems. In fact, Getac, in conjunction with encryption specialist Becrypt, has gone one step further and recently developed the first rugged Android tablet aimed specifically at government, military and defence use. This Android 4.1 tablet has enhanced, future-proof security features, which make it particularly suited to mobile, counter terror applications.

and manufactured computing solutions for all three blue-light services, Getac understands the needs of mission-critical communication – no matter what the situation. Contact Getac to discuss any aspect of your rugged computing requirements. L FURTHER INFORMATION Tel: 01952 207 221 ruggedsolutions@getac.com www.getac.co.uk


EVENT PREVIEW

JOINING UP THE BLUE LIGHT BRIGADE

The Emergency Services Show provides an opportunity to see and discuss the latest technology, ideas and initiatives for improving public safety and assisting blue light services Counter terror forces need to continually adapt and innovate to address the evolving tactics of terrorists, as the recent Boston bombings and fatal stabbing attack on Drummer Lee Rigby have clearly demonstrated. Terrorists are becoming more disparate and taking advantage of technological advances to research and exchange information via the internet, move to more secure communications technologies and adapting mobile phones for use as detonators. As the threats become more diverse and unpredictable from armed attacks through to chemical, biological, radiological and nuclear (CBRN) threats, so counter terror experts need to continually innovate their strategy and tactics. As a leading forum promoting interoperability and cost efficiency, The Emergency Services Show offers more than ever before to all those involved in combating and dealing with terrorism. The event takes place 25-26 September 2013 at the NEC, Birmingham.

MOVE TO NEC PROMPTS GROWTH Earlier this year it was announced that the show was moving to the NEC to offer improved facilities and larger indoor and outdoor exhibition space. Such has been the demand that the floor plan has now been further expanded to offer additional space within Hall 18. “We have more companies and organisations wanting to exhibit at The Emergency Services Show and many of them also want to take larger stands, helping to make the 2013 event our biggest to date,” said David Brown, event director for The Emergency Services Show. “The bigger show and improved facilities will also help us to build further on the 18 per cent increase in visitor numbers we saw last year.” The Emergency Services Show provides a unique opportunity to see, touch and discuss the latest technology, ideas and initiatives focused on improving public safety and assisting all blue light services,

es Mercede will b the ng exhibiti signed to de Unimoge fighters and r carry firworkers close rescue he heart of to t or any fireer disast

voluntary workers and service providers. Exhibitors include leading names in fire fighting equipment, extrication, counter terror equipment, first response, communications, IT, personal protective equipment (PPE), clothing and uniforms, vehicles, vehicle equipment, outsourcing, training, community safety and medical supplies. “Nothing compares to physically handling new equipment and seeing how it can be used to its full potential. Keeping informed of the latest kit developments – including those that you may see other blue light services using when they attend incidents – is key to improved multi-agency working and should be part of every service’s training programme,” says David Brown.

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

COMPANIES FOR COUNTER TERRORISM Primetech will be showcasing the very latest high performance, cost effective mobile satellite communications and rapid response technology. Stand highlights include an update on the KASAT satellite revolution. This technology has the ability to deliver upwards of 6 Mbps upload and 20 Mbps download from mobile systems that are cost comparable with Ku-band antennas, but at a fraction of existing bandwidth charges. Primetech engineers are also now qualified to provide consultation support and installation of the COBRA Cutting Extinguisher System. This innovative fire fighting tool combines fire‑fighter safety and fire fighting efficiency with minimal environmental impact. Also on display will be the new mobile covert lighting offering, which enables even the most innocent looking vehicle to be transformed at the flick of a switch. Mercedes-Benz will be exhibiting the Unimog designed to carry fire fighters and rescue workers, plus their equipment and E

61


EVENT PREVIEW  machines, closer to the heart of the fire or disaster than any other vehicle. It can carry cranes and tow trailers for safe and stress-free animal and vehicle rescue, and its internal pressure system protects the electrics and power supply when working in deep water. Visitors to the Tactical Ventilation Solutions stand can find out more about the development of a new range of remotely controlled machines for cutting tactical ventilation exhaust/ outlet vents in steel composite, sandwich panel and other roofing materials. W. L. Gore & Associates (UK) will be among the many stands where visitors can source PPE. The company will be exhibiting a range of specialist high performance protective fabrics for garments and footwear. The latest PPE incorporates durable, breathable GORE-TEX® fabric as well as CROSSTECH® fabric that provides protection against rain, oil spillages and blood borne pathogens. Visitors to the Durham Constabulary stand can find out more about its state-of-theart Tactical Training Centre. The nationally approved (College of Policing) firearms and multi-functional training facility is available for police and non-police organisations looking to develop firearms, leadership and decision making skills. Training modules available include Dynamic Intervention which covers hostage rescue situations. FREE ONSITE TRAINING OPPORTUNITIES The growing exhibition for emergency responders has attracted the most respected training providers in the industry including The Serco Combined Resilience Team, International Fire Training Centre, Devon & Somerset Fire & Rescue Service Training Academy, Durham Constabulary’s nationally approved (College of Policing) firearms training facility, the Tactical Training Centre, and the NHS Ambulance Service First Aid Training consortia (NASFAT). CFOA CNR, SARbot UK Underwater Rescue, Norfolk Fire & Rescue Diving Team, and West Midlands Fire & Rescue will be running demonstrations of water rescue in the Pendigo Lake at the NEC. The Road Haulage (RHA) Association will also be running the road vehicle recovery demonstrations and the nationally-adopted six phase HGV rescue approach will be demonstrated on the Derbyshire Fire and Rescue Service stand, using The Ex-Tractor, an HGV “transformer.” EMERGENCY RESPONSE ZONE Aimed at developing relationships and partnerships between voluntary organisation and the blue light services, the Emergency Response Zone is a networking focus of the show and will feature around 80 emergency services-related charities and not-for-profits. The Institute of Civil Protection & Emergency Management and National Counter Terrorism Security Office (NACTSO) will be offering advice alongside government departments including Civil Contingencies Secretariat, Government

Emergency Services

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Entry to the y nc Emerge w gives Sho Servicestes access to delega 0 exhibitors, EPS Awards will take place on the evening over 35 ing various of 25 September at d u l inc the Ramada, Solihull. ment governments Anyone attending EPS events will be able to depart

Decontamination Services and Joint Emergency Services Operability Programme (JESIP). The importance of multi‑agency training for complex or major incidents is a hot topic for resilience professionals as Joy Flanagan JESIP engagement manager, explains: “The Coroner’s inquest following the London bombings stated that the lack of inter-agency training led to the initial chaos, confusion and carnage. The Pitt review of the 2007 floods identified a lack of clarity about who was responsible for flood rescue and the Cumbria shootings highlighted the different thresholds employed by the three services. These are just a few of the compelling reasons why JESIP is so important. We must ensure that the three services do not continue to train in isolation and work to single operating protocols when working together to improve our joint response in the future.” Exhibiting for the first time is Public Health England, a new national executive agency formed from a number of expert organisations. Its mission is to protect and improve the nation’s health and wellbeing, including cutting-edge research into toxicology, radiation, infectious pathogens and operational responses, particularly in decontamination and emergency health care for the public and at mass gatherings. The Institute of Civil Protection and Emergency Management (ICPEM) will be exhibiting in Emergency Response Zone. The stand will provide a focus for members to meet and form new partnerships with like-minded organisations for the benefit of its members, civil protection and emergency management in general. EMERGENCY PLANNING SOCIETY Celebrating its 20th anniversary this year, the Emergency Planning Society (EPS) will be hosting three of its own events alongside the two-day show. The AGM will take place at the NEC on 25 September and a separate paid‑for conference, Resilience: Past, Present and Future, on 26 September. The

gain fast-track entry to The Emergency Services Show.

ENVIRONMENT AGENCY Other government departments exhibiting in the Emergency Response Zone include the Highways Agency and the Environment Agency which will be giving demonstrations of its incident response capabilities and pollution protection equipment. The Environment Agency is not a ‘blue light’ service but through a memorandum of understanding (MOU) with all the English fire services, it ensures that vital pollution protection equipment is available on scene as quickly as possible. The MOU provides each fire service with fully equipped Environmental Protection Unit funded by the Environment Agency and the fire service crews and deploys it. Visitors to the stand can obtain up-to-date information on environmental considerations during the response phase, joint working and asset sharing. REASONS TO ATTEND Entry, which is entirely free, gives you access to over 350 exhibitors (including various government departments), the latest vehicles and equipment that can help reduce time and costs, and training that meets the changing demands of today’s emergency responders. Visitors will also learn about the solutions for enabling the efficient planning and sharing of resources, network with blue light services to share best practice, and experience live rescue demonstrations What’s more, delegates can understand the schemes to empower the community and reduce the burden on the emergency services, meet with voluntary organisations and charities providing valuable support to blue light services, and attend free workshops, some of which can be CPD certificated. L FURTHER INFORMATION www.emergencyuk.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

63


SECURITY SOLUTIONS

A TRUE FOCUS ON SECURITY

It is the effective combination of the skills of security experts Securitas using the best technology available that produces total integrated solutions to safeguard your business As global knowledge leaders in security, Securitas focus entirely on the provision of security solutions. From an extensive range of services in specialised guarding, technology solutions and consulting and investigations, we customise offerings that are suited to its individual customer’s needs. The company understands the benefits that sector specialisation gives to its customers, and it is within these customer segments that specialist knowledge is key. Securitas continues to focus on building its knowledge and expertise within specific segments, ensuring that its solutions will not only answer your security needs, but also add real value to your business. FINALISTS FOR THE SECURITY EXCELLENCE AWARDS This industry knowledge has been recognised following the selection of the finalists at this year’s Security Excellence Awards (23 October, Hilton Park Lane Hotel, London). Not only is Securitas a finalist in five separate categories, this year also provides an impressive shortlisting of seven different entries: Customer Care Initiative of the Year – Securitas Security Services, West Yorkshire Passenger Transport Executive/Securitas Institute of Customer Service. Enterprise Security Risk Management Project of the Year – Securitas Security Services and Future Risk Management Mercedes-Benz World Project. Security Partnering Initiative of the Year – Securitas Security Services and the Avon and Somerset Constabulary/Devon and Cornwall Police Crime Scene Guarding; Securitas Security Services and the Manchester City Centre Management Company Retail Support Unit. Event Security Team of the Year – Securitas

Security Services Retail Team; Securitas Security Services Events Team. Security Consultant of the Year – Dr Peter Speight CSyP. Indeed, it is Securitas’ knowledge within each customer segment which has lead to the company working in partnership with Tosepo BV Maritime & Logistics Security and eBOS Technologies to develop a state of the art Maritime security solution. INTRODUCING THE PORT SECURITY MANAGEMENT SYSTEM In July 2010, the European Commission implemented a project called Security UPgrade for PORTs (SUPPORT) with the aim of improving security in major and minor European ports, as well as improving trade flow. The overall aim of the project is to enhance the current level of Port security. Ports represent significant challenges when implementing new security measures. They cover large geographical areas, have very complex operations, service large numbers of passengers and they process large volumes of goods. Maintaining high efficiency in the transportation of goods and passengers is vital to the port, as well as efficient surveillance and access control. This requires efficient organisational and technological interfaces, linking ports to border control authorities, the police, other intervention forces, and transport and logistics operators. A specific challenge for ports is to combine these types of measures into an integrated security approach. This is where the Port Security Management System can help. STEPS FORWARD The arrival of the International Ship and Port Security Code (ISPS) in 2004 offered a consistent framework for evaluating

Securitas continues to focus on building its knowledge and expertise within specific segments, ensuring that the company’s solutions will not only answer your security needs, but also add real value to your business

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

risk. But the lack of measurable detail and implementation processes, has led to differing security practices across UK and EU ports. Working in partnership with Tosepo BV Maritime & Logistics Security and eBOS Technologies, Securitas offers a new approach to maritime and logistics security via an interactive, real-time, dynamic dashboard. The Port Security Management System (PSMS) is a web-based tool designed to assist security professionals in monitoring and developing port security in line with the ISPS code and other legislations. The PSMS tool has the potential to deliver information, skills and methodologies that enable security professionals to maintain, evaluate, identify, install or upgrade their security measures, as well as to promote security awareness. The PSMS system is divided into four modules: addressing terror threats; security education; corporate security; and information and service. L FURTHER INFORMATION Tel: 0800 0234944 psms@securitas.com

Transport Security Expo 13-14 November Henk van Unnik, Coordinator – SUPPORT Project, Securitas, will be demonstrating the Port Security Management System at the up and coming Transport Security Expo (13-14 November 2013, Olympia, London) as part of the Ship and Port Security Workshop. As a former chief of the Rotterdam Seaport Police, Henk developed new regulatory frameworks, investigation methods and concepts to fight successfully Transnational Organised Crime and Terrorism. Henk is one of the architects of the Rotterdam “Reliable Port Concept” and writer of the guide “Security Mainport Rotterdam”. The Port Security Management System is set for release in 2014, if you have any questions regarding the system and the benefits to your business, contact Securitas.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

65


Holmatro Special Tactics equipment Hydraulic breaching, cutting, spreading and lifting tools for your tactical operations. • Powerful • Portable • Quick & silent operation Watch the videos on our website:

Holmatro | Rescue equipment tactical@holmatro.com | http://tactical.holmatro.com


PRINTING

NEED TO SAVE MONEY? STAY CLEAR OF CHEAP COMPATIBLE PRINT CONSUMABLES

Advertisement Feature

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Graham Lowes, marketing director at OKI Systems UK, discusses why cheap compatible consumables are not the answer when looking to reduce print spend, especially when it is possible to achieve better value and drive efficiencies by adopting smarter printing practices There has been an increase in public spending cuts across a range of departments including the Ministry of Defence (MOD), which has to reduce expenditure by £4.1bn. The National Audit Office (NAO) said “profound changes” to working practices would be needed for current performance quality to be maintained. As such, public sector departments including the MOD are eagerly looking for ways to reduce costs, while still maintaining efficiency – and every little bit helps. Many are reassessing their print budget as this is often an area of spend which is overlooked. The trouble is, in order to reduce costs, there is the risk that departments may turn to cheap print consumables rather than those from the original manufacturer which, in most cases, can be more expensive. However, turning to compatible consumables is not the answer; they can negatively affect a printer’s performance, may adversely affect manufacturer warranty and lower print quality. There are far more cost-effective approaches to take, for example, deploying OKI’s managed print services. TOO GOOD TO BE TRUE The problem with compatible consumables is that they are poor-quality substitutes for the real thing. Original consumables are much more hard-wearing; poor-quality substitutes can damage both the performance and print output quality, leading to unnecessary printer downtime and they will eventually take their toll on a printer’s lifespan. An organisation could end up having to replace devices, which is far more costly

Broken drive gear (magenta)

than simply buying the correct consumables in the first place. Particularly as compatible goods may invalidate the devices warranty, so fixing or replacing a printer may prove costly. In an independent Consumables Evaluation Report conducted by Buyers Laboratory Inc (BLI) and commissioned by OKI, which compared original OKI print cartridges with third-party brands, it was found that OKI solutions had 100 per cent reliability and, for image quality, they outperformed all of the competitors’ cartridges. When compared to the poorest-quality competitor, OKI colour page yield was more than 19 per cent higher. OKI colour toners also uniquely feature a new generation of packaging to help reduce the likelihood of purchasing a counterfeit. A foil security seal helps to denote that the packaging and its contents are genuine. WORK SMART – MANAGED PRINT SERVICES There is no need to turn to compatible consumables, not when alternative options for reducing print costs can be used, such as managed print services. OKI’s managed print services unify and manage all print processes. It ensures printing operations are more closely matched to an organisation’s workflow and specific goals, such as reducing costs, energy consumption and carbon footprint. Using the results of a print audit, a long-term print solution is designed. One that ensures innovative print devices are used in the most resourceful manner and that printing practices are cohesive and managed more closely. PRINT SMART A key part of managed print services is implementing smarter printing practices, which can in turn reduce energy costs. For example, simply working with the most advanced printers can help to reduce cost and energy consumption. According to IDC research, newer printers typically use 30 per cent less energy. OKI is continually developing its solutions to help minimise energy consumption. It is now building “auto power-off” technology

into many devices; the setting automatically powers down the printer after extended periods of non-usage, which can be determined by the user. While “deep sleep” mode, available on all OKI devices, reduces power consumption to the barest minimum (often less than one watt). However, it is also important to remember that managed print services is much more than the deployment of new printers, it includes adopting smarter working habits. In order to work greener and cut costs, organisations need to ensure that all devices are set to default double-sided and mono printing, which reduces paper and toner costs. Investing in the right consumables is by far the most cost-effective long-term solution as cheap consumables will only prove more expensive in the long run if they damage print devices or affect the quality of printing. Today, there is no need to turn to compatible consumables, not when adopting smarter printing practices with OKI’s managed print services can streamline operations and reduce print costs, both in the short and long-term. L FURTHER INFORMATION www.oki.co.uk

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

67


Infranor Defence & Security Applications Infranor Group offers innovative solutions from detailed design through to manufacture. We are your global partner for servo motors, servo drives, servo amplifiers, servo controllers and complete distributed or non-distributed automation systems. For over 30 years we have been manufacturing and supplying products and solutions to OEM’s in the defence, security, training and simulation markets. Our production facilities are based in Europe. We can support your business with sales and engineering organizations based in the US , Europe and China . This allows us to adapt and change rapidly to a constantly changing customer need.

www.infranor.com info.uk@infranor.com


Perimeter security equipment expert Frontier Pitts achieves PSSA HVM product verification status The PSSA (Perimeter Security Suppliers Association) HVM Product Verification Scheme aims to provide confidence to perimeter security product buyers and others whose products supplied by PSSA members conform to internationally recognised quality and product safety standards. It provides assurance that: Products are fit for purpose, designed to meet customer, market and regulatory requirements; products are consistently manufactured and supplied conforming to their agreed specifications; and products, when in use, produce the intended performance outcomes specified by the customer. As a result of the certification committee deliberations, Frontier Pitts was awarded its first PSSA Verified accredited product certificate in December 2011 for its Terra V Gate system. Having achieved the prestigious and coveted verification scheme recognition, Frontier Pitts has seen a rise in orders for the Terra V Gate from high security sites, such as utilities, oil storage and data centres to government buildings and nationwide public sites, some of which formed part of London’s 2012 celebrations. This illustrates that the HVM Gate has established itself

in the specifier’s listings as a quality and conformance-assured product. As a result of the 2012 scheme, Frontier Pitts was presented with a further six scheme certificates at London Olympia’s Counter Terror Exhibition in April 2013. On receiving the Verified Award for a further six products (including the Terra Sliding Cantilevered Gate, Compact Terra Barrier, Terra Ultimate Barrier, Terra Blocker, Terra Shallow Blocker and Terra Surface Mount Blocker), Sally Osmond, Brand and Development Manager at Frontier Pitts, said: “Frontier Pitts are

proud to show an ongoing commitment to the PSSA Verification Scheme. “We want to highlight the importance of the foundation; standards, operating systems, technical specifications and drawings, to ensure that the same specification of equipment that is PAS 68 impact-tested, is the same specification installed on sites, protecting your world for years to come.” Frontier Pitts, a market leader in HVM products, has always been committed to supplying customers with a high-quality product, backed by a strong and robust “after sales and maintenance service, which is relied upon to give clients peace of mind”. This is only achievable with a strong internal quality management system, mechanical and electrical systems, and an ingrained work ethic that is ultimately founded and formulated on compliance to the PSSA scheme requirements, whilst incorporating the conformity regime of British Standards which, as Frontier Pitts has discovered, are recognised across the globe.

Company Profiles

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

FURTHER INFORMATION Tel: 01293 422800 sales@frontierpitts.com www.frontierpitts.com

Marshall Modular Mission Forensics M3F – Winner of the Queen’s Award for Enterprise in Innovation 2013 In support of military, disaster relief or humanitarian operations, the success of forensics and exploitation activity relies heavily on the expedient and forensically sound collection, analysis and management of evidence. Marshall Land Systems, part of the Marshall Aerospace and Defence Group, has worked with subject matter experts from industry and government agencies in the UK and abroad to develop and refine its forensics and exploitation systems. A combination of Marshall’s in-house engineering excellence and these strong relationships that lead to the company winning the Queen’s Award for Enterprise in Innovation. The mobile ruggedised systems have been tried and tested around the world and survived the rigours of military deployment. The Marshall Modular Mission Forensics system, M3F, is ideally suited not only to expeditionary warfare, as we transition from sustained operations, but owing to its modularity and versatility will serve any number of other forensics requirements. M3F is the perfect all-round solution to cover peacemaking, peace-keeping, counter IED, humanitarian, disaster relief, resilience, counter piracy and boarder security.

Whether you need a complete system or just elements, such as the DNA clean room or biometrics laboratory, the M3F can be up and running within hours or minutes of arrival on-site, it can even be operated in its vehicle-borne configuration. Advantages of using the M3F system: Modular and flexible to meet specific operational requirements; rapidly deployable and redeployable in minutes, not days; ruggedised for military operations, and

tried and tested across the globe. Award-winning clean room module environment: certifiable to ISO 17025, suitable for DNA analysis; laboratory-grade air filtration, achieving class 4/5 cleanliness; external maintenance points to permit uninterrupted clean room operation; air pressure and airflow management; interlinked for enhanced environmental control and improved workflow; fully integrated, autonomous system operation; and transportable by land, sea and air with a minimal logistical footprint. Suitable for maritime operations in counter-piracy or interdiction; operable in vehicle-borne configuration; complete support solution options for infrastructure, equipment and consumables; and training needs analysis and training packages available. Module options (detailed module capability available on request): DNA; biometrics; technical/electronic exploitation; chemical exploitation; seized media analysis; command and control and intelligence fusion; geospatial intelligence; evidence triage and management; detention; and power supply and management. FURTHER INFORMATION Tel: +44 (0)7917 883494 edd.gowlett@marshall-ls.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

69


Discover connections between multiple mobile devices to close cases fast! UFED Link AnalysisŠ helps immediately identify and visualize the communication methods used between multiple mobile device owners.

Connections are based on a rich data set: mutual contacts, calls, SMS, MMS, email messages, chats, application messages, Bluetooth devices, locations and more Understand preferred communication methods and relationship strengths Visualize the communication directions, pinpointing bidirectional and unidirectional communication Discover if suspects were at the same place at the same time by viewing locations on a single map Save work in progress for future use and share your findings with other investigators

UFED Link Analysis helps develop the leads you need! sales@cellebrite.com www.ufedseries.com Š 2013 Cellebrite Mobile Synchronization LTD, All rights reserved


FORENSIC SCIENCE

The new forensic landscape must be fully professionalised to maximise the benefits, says Karen Squibb-Williams, director of communications and in-house counsel at the Forensic Science Society We now are finding out the effects of being the only country in the world to have fully commercialised the provision of forensic science to a criminal justice system. Happily, we are now also seeing the use of forensic science being taken much more seriously, consistently and transparently. Existing forensic providers are leaner and fitter and certainly have a much sharper focus on ‘what the customer wants’ through strong contractual packages; the notion of demonstrable Quality Assurance methodology is clearly reaching maturity and The Forensic Science Regulator has provided a compendium of guidance and information through the publication of the Codes of Practice and Conduct.

I have just left the Crown Prosecution Service where I spent around a decade as the national lead for forensic science and expert evidence strategy and policy, advising the Attorney Generals and DPPs of the day on the prosecution approach. As a practising barrister this was an intense experience with many highs and lows, the majority focusing on the profound strengths and exasperating weaknesses of using science in the criminal justice system – just think Rachel Nickell, Damilola Taylor, Stephen Lawrence, Milly Dowler, Joanna Yeates, Jill Dando, plus of course the many thousands of burglaries and sexual assaults. There is clearly no stronger tool for convicting the guilty and exonerating the innocent than

forensic science and the expert scientists and investigators who know how to use it. MISUSE AND MYTHOLOGY So why has there been so much turmoil, not to mention mythology and misuse of such a powerful weapon against criminals? In my experience, forensic science and expert evidence in this field has also been the playground for ignorance, Chinese whispers, financial extremes, sometimes arrogance and sometimes just the non-scientists’ fear of the complex and unknown. I have seen a predominance of those ‘non-scientists’ in the legal field; solicitors, barristers, prosecutors, government officials and, dare I say it, even very senior members of police forces and Ministers.

Written by Karen Squibb-Williams, Forensic Science Society

IGNORANCE NOT ACCEPTABLE IN NEW FORENSIC LANDSCAPE

Forensics

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

EDUCATION Now it is important to ask what is still missing; what do we still have to achieve? You’ve guessed it – education. Not just of the academic type, that is vital, but we also need to educate the lawyers about science, the scientists and experts about the legal process – not just the courtroom. We need the judiciary to understand the effects of commercialising forensic science on the UK adversarial system. And we need to educate on a nationally consistent basis, not through piecemeal localism. All participants in the investigative and prosecution stages need to understand just how important it is, in the current austere times, to make the most cost effective use of science so that the public interest is properly served. It is simply not possible to do this if we all pull in different directions, follow separate agendas and remain in what can be described as effectively ‘niche ignorance’. JOINING THE PIECES How are we going to achieve this out of the ‘jigsaw’ puzzle of 43 police forces if they all decide to work in a different way? How can all purchasers (investigative agencies, including the new National Crime Agency) of forensic services benefit from the potential of joining together as a national ‘super-user’ of science? How can we ensure that the provision of forensic services isn’t just tailored for the investigation, when it needs to be fit for the prosecution purposes as well as the courtroom? E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

71


FORENSIC SCIENCE  Well, the final answer has to be found in professionalism; professionalising all participants in the science, crime and justice arenas. Professionalising all of us for what is now a very different forensic landscape to how it was ten years ago, has to be a priority. That is not to say we are not professional in how we do our jobs, we just need to be very clear about the bigger picture and how that affects the forensic providers, the investigators and the legal system. To play my part in the next stage of development of forensic science, I have joined The Forensic Science Society as the new director of communications and in-house counsel. The Society has a unique pedigree in being the professional representative body in this field, stretching back to 1959 when it was launched by scientists, police forces and the Home Office. Through the Society and its membership, I intend to work towards a highly communicative, highly effective and collaborative forensic environment that enables science, novel and traditional, to deliver justice, in the public interest, nationally and internationally. If you have ideas to add, or would like to know more about members’ services, email me on karensquibbwilliams@ forensic-science-society.org. L

This article first appeared in Police Oracle www.policeoracle.com FURTHER INFORMATION www.forensic-science-society.org.uk

Forensics Europe Expo 2014

Forensics

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Forensics Europe Expo will take place on 29-30 April 2014, Olympia, London. It is the premier dedicated international forum for the entire forensics sector and supply chain to source forensic products, equipment and services, as well as providing the definitive source of education, best practice, training and networking. Forensics Europe Expo was formed with the intent to connect leading exhibitors with a wide range of international visitors. In 2013, the event hosted 70+ exhibitors and visitors from UK Police Forces, MOD/ Armed Forces, Forensic Laboratories, Law Sector Representatives, Government Agencies, Office of Fair Trading, Councils, Academic Sector, and Private Sector Companies. The closure of Forensic Science Service in 2012 has left the supply of forensic analysis, products and equipment open to an unknown supplier base worldwide. Forensics Europe Expo is now needed more than ever. Forensics Europe Expo attendance expectations were exceeded by 62 per cent in 2013, placing it as a key international gathering for forensics professionals. Forensics Europe Expo has cemented its industry relevance and support through multiple conference streams, live demonstrations

of cutting edge technology and products, and free to attend workshops. Going forward, the event will build on its success in 2013, and continue to deliver content and solutions that meet the needs of global forensics world. Speaking about the success of Forensics Europe Expo 2013, Phillip Hunter, event director, Clarion Defence and Security said: “I am absolutely delighted to announce that in the first year running, Forensics Europe Expo had a fully sold out exhibition and exceeded all attendee number expectations. With the closure of Forensics Science Service in 2012, this event is an absolute necessity to anyone who works within forensics. The show has helped the newly created ‘open market’ within the forensics industry to stay focused and fairly regulated.” FURTHER INFORMATION www.forensicseuropeexpo.com

Investigators and the police can gain easier and faster access to suspicious computers by using VFC software Virtual Forensic Computing (VFC) makes it easy for any investigator to effectively “turn a computer on” and safely explore the virtual crime scene “exactly” as the suspect would have used their machine, without the risk of altering potential evidence. Within minutes of seizing a machine, VFC makes it quick and simple to go from a hard drive (or forensic image) to Virtual Machine and begin collecting vital information which could be used in an interview situation and to plan other activities with the benefit of high-quality intelligence. Simple, but potentially powerful findings such as the picture used for the desktop background, what software is set to auto-run at start up and what folders are prominent on the desktop all come to life in a way that could be easily missed if analysed through a pure forensic tool. Not only this, VFC2 comes with built-in features, such as password bypass to quickly navigate around Windows log-on passwords on the virtual machine. One recent case highlighted how important gaining quick and reliable computer-based

intelligence can be. Police seized three laptops and two desktop computers from a large multi-tenant house and they arrested two people on suspicion of bomb-making offences. Having been quoted weeks for an initial report from their Digital Forensics lab, investigators used VFC to give them the intelligence their operation required. Within minutes of using VFC software on their laptops, officers bypassed the

windows password, virtually turned suspect machines “on” to discover IP-blocking software, internet history showing access to bomb-making sites and a suspicious-looking encrypted folder. This process was repeated for other machines, too. Some of these computers could be quickly discounted as family machines, others are going forward for more forensic investigation. The key benefits to the investigation were: Speed – Vital intelligence obtained in time for interview; Forensically sound – Original  data remains unaltered and evidentially sound; and Simplicity – Intelligence appeared exactly as it does on the suspect machines, no complex explanations required. Contact sales manager Marc Lees for more details. FURTHER INFORMATION Tel: 01924 220999 Tel: 07855 211443 marc.lees@md5.uk.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

73


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

HOSTILE VEHICLE MITIGATION

SAFETYFLEX PAS 68 BARRIERS SECURE MAJOR UK HOSTILE VEHICLE MITIGATION PROJECT Safetyflex Barriers are now one of the world’s leaders in securing and enhancing fence lines against vehicle borne threats with their patented design of PAS 68 crash rated fencing and PAS 68 anti-terrorist bollards. They are becoming the number one choice, and a specialist regarding PAS 68 products and solutions. And they have won another major contract for securing and enhancing fence lines with their PAS 68 products

74

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

SAFETYFLEX PAS 68 BARRIERS ANNOUNCED AS NATIONAL BUSINESS AWARDS FINALIST Safetyflex Barriers, the world’s number one manufacturer of anti-terrorist PAS 68 spring steel barriers and bollards, has been shortlisted in the final of this year’s National Business Awards. The leading manufacturer of high-security anti-terrorist bollards and barriers, which is part of the GME Springs group based in Coventry in the West Midlands, has beat off stiff competition to be shortlisted for the prestigious Innovation Award. The winner will be revealed at the National Business Awards gala dinner held on November 12th in London. Marcus Gerrard, director at Safetyflex Barriers, said: “We’re absolutely delighted to have made it through to the final of the most prestigious business awards in the UK. “Innovation is at the forefront of every security product we design and produce to protect people and key infrastructure all over the UK and we are proud our achievements have been recognised by the judges. “We’ve enjoyed a whirlwind year ever since producing anti-terrorist bollards and barriers for 2012 Olympic sites all around the UK and now we’re really looking

forward to taking our place at the National Business Awards final on November 12.” Finalists were chosen from the hundreds of businesses that entered or were nominated for the titles, with overall winners of 17 awards categories to be revealed at the awards ceremony at Grosvenor House, London. Alex Evans, programme director of the National Business Awards, said: “The quality of finalists is outstanding every year – with Britain’s most promising new businesses and most impactful social enterprises recognised alongside top performing SMEs and the most sustainable mid market and large cap firms.” NEW CRASH TESTED FENCE SYSTEM Safetyflex Barriers has launched a new PAS 68 crash rated fence system to protect army barracks, oil refineries and power utilities. The latest PAS 68 product is the new patented springline 30 crash rated fence system. Safetyflex were commissioned to make a shallow mount crash rated fence system. The criteria was to design a system, with a very shallow footing, and to stop a 7500kg truck. As other systems in the market require massive foundations, Safetyflex have designed a shallow foundation of only 400mm. The system was tested in soft


Perimeter Security

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

New PAS 68 crash fence

ground providing another major benefit. Safetyflex have also designed a PAS 68 crash rated fence, and a PAS 68 Fence enhancement, which has been specified in six new major projects. This new system is ideal for large perimeters, to protect major assets, like army barracks, oil refineries and gas/water utilities.

to export its services, backed by support from UK Trade and Investment (UKTI). “It’s fantastic to be attracting so much interest from sites and projects all over the world. ACCELERATED GROWTH “There’s no doubt about it, our work at the Olympics has helped to accelerate our growth and our reputation in the security sector. It has given us the springboard to kick on and win further business, and in the first three months of this year alone we worked on 12 contracts, totalling 2,000 bollards. “UKTI has also realised the potential of our products and we’re pleased to be working with the organisation’s high-value opportunities department to attract worldwide attention for Safetyflex. “We see exporting as a major area of growth for the company and as part of our expansion we are putting together a new global distributor base to market and sell our products across the globe.” L

“Since ted elec being s supplier as a keyi-terrorist for ant to London s bollard nquiries and 2012, e really have orders balled” snow

KICKING ON FROM LONDON 2012 Twelve months on from London 2012, and protecting multiple Olympic sites, Safetyflex has enjoyed a whirlwind year and has led to interest and orders taking off. “Since being selected as a key supplier for anti-terrorist bollards to London 2012, enquiries and orders really have snowballed,” Marcus said. “There’s now more interest in our work, domestically and internationally, than ever before. “We were extremely proud to see our products used extensively for so many Olympic sites, and in doing so provide us with a platform to take our work into new markets and we’re now constantly being approached to tender for major projects all over the world.” Marcus noted that the successful completion of major projects at the Olympics, along with a string of other high-profile sites, has given the company the confidence

FURTHER INFORMATION Safetyflex Barriers, Unit C, Boston Place, Foleshill, Coventry. Tel: +44 (0)24 76 664911 www.safetyflexbarriers.co.uk

Sites Safetyflex Barriers are installed • The O2 • Excel Centre • Ricoh Arena • Titanic Centre Belfast • St James’ Park • Wimbledon • Key London Sites • Horse Guards Parade • Numerous data and cash centres

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

75


Protection in an unpredictable world Improve the Safety and Security of your Glass The greatest danger in a blast attack is from flying shards of glass causing up to 95% of all bomb-related injuries. An immediate retro-fit and cost-effective solution: •

The installation of Pentagon’s clear high tensile strength blast-mitigation glass containment film will significantly reduce the hazards of flying glass.

Building Protection

The addition of Pentagon’s enhanced edge retention anchoring will increase the protection provided even further.

Immediate benefits: •

A dramatic reduction in injury and damage.

Clear-up and business down time kept to a minimum.

Vehicle Protection

Contact Counter-Terror Protection Specialists Pentagon Protection now for more information.

0800 216 012

Maritime Protection

info@pentagonprotection.com www.pentagonprotection.com

Helping to Save Lives, Reduce Injury and Protect Property


WHEN LIVES ARE ON THE LINE If you work for the armed forces, police or a security organisation, the SDS Group is your partner for specialised security equipment. Our state-of-the-art search and detection equipment includes Portable X-Ray Equipment, Metal and Mine Detectors, Explosives and Drug Detection Equipment as well as Gamma Backscatter. We not only counter crime and terrorism, we oer bespoke training to give your team the expertise they require to ďŹ nd and neutralise contraband and explosive devices. Additionally, the SDS Group provides comprehensive consulting services involving threat assessment, risk analysis, blast mitigation and x-ray image analysis. When Lives Are At Risk, let SDS by your First Line of Defence Partner.

SDS Group Limited sales@sdsgroupltd.co.uk www.sdsgroupltd.co.uk TEL: +44 (0)1580 715038 FAX: +44 (0) 1580 712056

SEARCH DETECT SECURE


DSEI 2013

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

THE FIRST LINE OF DEFENCE ARRIVES AT THE EXCEL DSEI, internationally established as the leading exhibition for land, sea and air applications of defence and security equipment and services, will take place at ExCeL London, 10-13 September 2013. The biennial event is the world’s principal fully integrated defence and security showcase, featuring specialist zones dedicated to land, sea, air and security, alongside exclusive waterborne demonstrations in the dockyard adjoining the venue

Organised by Clarion Events, the last DSEI was held in 2011 and introduced 1,391 exhibiting companies, representing 46 countries including 30 national pavilions, to 28,440 international visitors and 1,070 global VIPs.

AN EXHIBITION EVOLUTION A new development for DSEI 2013, the show’s structure has evolved to further facilitate networking opportunities. This has been achieved by co-locating associated products and technologies in six themed zones: the Land Capability Zone; Naval Zone; Air Zone; Security & Special Forces Zone; Unmanned Systems Showcase; and the Medical & Disaster Relief Zone. This, in conjunction with an enhanced seminar programme, has motivated a record influx of first-time exhibitor registrations.

as Canada, France, Poland, Germany, the UK and the USA. However, an unprecedented effort has been made over the past 18 months to engage with newly emerging economies, action which has resulted in the participation of a record 40 international pavilions. Nations making their debut this year include Indonesia, Japan, Malaysia, South Korea and Taiwan, evidence of the importance that these key growth regions place on DSEI. India, a previous exhibitor, is increasing its presence significantly, mounting both public and private sector pavilions. Other newcomers include Chile, which will be joining Brazil in representing Latin American growth markets, while the UAE is the latest addition to the list of Middle Eastern nations at the event.

INTERNATIONAL REPRESENTATION In order to further build on the success of DSEI 2011, the event’s organisers have broadened its international focus to fully engage with the growth regions of Asia, Latin America, and the Middle East. The show continues to acknowledge the on-going importance of established western markets and is delighted to welcome back pavilions from traditional stalwarts such

INNOVATION ABOUNDS A record number of innovative exhibitors are expected to attend the show, featuring a comprehensive range of new products, set to surpass historically high expectations. Isoclima, part of the FININD Group based is Este, will introduce its latest, patent-pending, Anti-Stone Protection (ASP) product. The magnetically-fixed device is easily removable and replaceable, even in E

r’s This yea rne o waterb ions will trat demons an expanded feature ith a breadth w marina mphibious of a les on vehic ay displ

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

79


DSEI 2013

 hostile operating conditions and has been engineered to effectively protect ballistic windows from stone and rock damage. Ensign-Bickford Aerospace & Defense will showcase the new MPLC Tactical Line Charge. This lightweight, portable, rocket-launched explosive line charge system is unique in providing a precise, portable mine-clearing capability at the small tactical unit level. Meanwhile, Communications Audit is set to launch a new electronic sensor at DSEI. The company intend to use the show’s interactive environment to run a series of live demonstrations to reveal the product’s exceptional performance in terms of bandwidth, size, weight and power.

Some of these companies will be displaying in the static vehicle park alongside such major players as Selex and Thales and specialist niche companies such as Faun Trackway. The land systems dimension to DSEI also spans the spectrum of products, equipment and systems involved in the operation, support and upgrading of vehicle platforms. Innovation is always very much in evidence and visitors can anticipate a diverse mix of product launches across the show floor. SEA POWER A record number of ships (subject to operational requirements) have confirmed their presence at Defence & Security Equipment International (DSEI) between September 10 and 13. The vessels will dock alongside the ExCeL arena and form a significant element of the strongest maritime proposition the event has ever offered. DSEI organiser, Clarion Events, has been working closely with its international partners across the globe to secure a diverse and extensive flotilla within the Greenwich Docks complex. The impressive roster of vessels include: the German Braunschweig Class Corvette, FGS Magdeburg; the Dutch Holland Class Corvette, HNMLS Groningen; HSwMS Vinga and Ulvon - two Swedish MCMVs which have been very recently updated;

Overall, ive ess an impr military 25 total ofcle OEMs vehi hibiting ex will be ersity of a div s around itie capabil e halls th

THE LATEST DEMONSTRATION OF LAND SYSTEMS CAPABILITY DSEI has long been recognised as a world leading forum for the land systems sector and this pattern of growth continues. Responding to increased demand, the Land Capability Zone has been expanded significantly for 2013 to accommodate 75 exhibitors. Overall, an impressive total of 25 military vehicle OEMs will be exhibiting a diversity of capabilities around the halls, the line-up includes BAE Systems, General Dynamics, Iveco, JCB, Land Rover, Lockheed Martin, Nexter, Oshkosh, Rheinmetall, Renault and Supacat.

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

and the Republic of Korea Navy Ship DaeJo-Young, which is a KDX-2 class Destroyer and the Logistic Support ship, Whacheon. Meanwhile the Royal Navy plans to despatch a Type 23 Frigate and a River Class OPV. In order for visitors to get the most out of this unique fleet, specially conducted tours, organised through the show’s Ships Visits Bureau, will be staged, offering arranged government, military and industry representatives a valuable opportunity to view the latest developments in naval ship design and equipment. The international nature of DSEI’s naval proposition is also evident from the breadth of nationalities to be found in the shipyards exhibiting this year. For the first time the likes of Cammell Laird, Lurssen, ThyssenKrupp, Damen, Daewoo and Hyundai Heavy Industries will be present, in addition to Asmar, Mazagon Dock, Babcock and BAE among others. An enlarged US Maritime Pavilion will also feature, in conjunction with an inclusive showcase of prime contractors and niche suppliers displaying the latest technological developments, following its inaugural success in 2011. The event will also offer an extended programme of live waterborne demonstrations to demonstrate the cutting-edge maritime equipment on display. The programme will include the first public demonstrations of several RIBs, Force Protection Craft, Blue Force Tracking systems and unmanned MCM surface and subsurface vessels. “The record number of ships and unprecedented strength of the Naval Zone at this year’s event is indicative of the E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

81


Cable excellence engineered through quality Professionalism in providing cables for demanding environments and applications is Belcoms business. Our experience extends across many industries and we are adept at migrating the best cable solutions to apply to specific demands ranging from production processes to asset protection systems. As applications for recognised data transmission protocols migrate into more demanding areas of industry, so the demands on the performance of the cables increases. Belcom have over 21 years of trading experience designing, producing, stocking and distributing electronic cables for use in challenging areas. Within the Belcom team there is over a 100 years combined experience in this field and we are still dealing with new applications every week, they can range from concept to solution and production or simply selecting from our stock an appropriate cable to do the job. For further information contact us on 01279 871150 or visit us at www.belcom.co.uk

0013

01279 871150

www.belcom.co.uk


DSEI 2013

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

 general growth the show has undergone in the last two years”, said DSEI Event Director Duncan Reid. “There can be no doubt that the naval proposal has been significantly strengthened, building upon its success in 2011. It represents yet another progression in the structured development of the show, which will ensure that 2013 will be the most successful DSEI to date”. Confirming the Royal Navy’s support for DSEI, Navy Command Headquarters (NCHQ) said that: “The Royal Navy’s significant presence at this year’s DSEI demonstrates its long-term commitment to supporting and promoting UK Industry. On all four days of the exhibition a team of senior Naval figures, including the First Sea Lord, will discuss current and future capabilities and how these will ensure the Royal Navy continues to be a first-class, battle-winning force.” FLYING HIGH The air component at DSEI will address the frontline operational requirements relevant to the aerospace sector. This will be reflected by the show’s most substantial air display, with an outdoor exhibition area featuring the latest aerospace capabilities such as the Eurofighter Typhoon multi-role combat aircraft. Industry has responded to these innovations with an exceptional level of support and involvement. Exhibiting companies in this sector range from renowned prime contractors such as BAE Systems, GE Aviation, Raytheon and Rolls-Royce through to an eclectic mix of niche providers. Current operational platforms and rotary elements such as the Merlin and Wildcat will feature alongside a range of conceptual designs from innovative manufacturers. The Air Zone will also feature a dedicated seminar theatre offering informed debate on contemporary issues affecting the aerospace supply chain. Presentations from senior members of the UK’s Royal Air Force in conjunction with participation from key international stakeholders, such as the Swedish Defence and Security Export Agency (FXM), are illustrative of the breadth of high-level engagement already confirmed. SECURITY SPOTLIGHT Building on the success of the dedicated focus area at DSEI 2011, this year’s event will see security given even greater prominence. New features include a cyber security pavilion and a seminar theatre sponsored by Cassidian. The latter will host a series of presentations by eminent speakers from leading security organisations, such as Selex ES, alongside a broad range of fellow exhibitors. Guartel Technologies, a world leader in the design and manufacture of high quality, metal, mine, wire detectors and specialist electro-optical search equipment will exhibit a range of products currently in service with police forces, security services, NATO and other military forces worldwide. E

Bringing together an entire Defence industry DSEI is the world’s largest fully integrated defence and security exhibition that brings together the entire industry to source the latest equipment and systems, develop international relationships, and generate new business opportunities. Based in ExCeL, London every two years, the event provides unrivalled access to key markets across the globe. Combining a high quality of exhibitors across the supply chain, networking opportunities and the ability to see new technologies first hand on the show floor, DSEI provides an inspirational experience to nearly 30,000 visitors. DSEI will give you access to 1,400 international exhibitors – an unrivalled range of suppliers from more than 50 countries. • Specialised Air, Naval, Land, Security, Unmanned, Medical and Disaster Relief Zones • 6 new dedicated seminar theatres offering free educational sessions and showcases • More international pavilions – including South Korea, Brazil, India, Australia, UK, USA • Expanded live Waterborne and Unmanned Systems Demonstrations • Static vehicle displays for land, air and naval sectors - the biggest offering yet • More visiting naval ships available to tour • Unmanned focus – UAS Conference and Unmanned Systems Showcase • Unbeatable networking – the entire defence and security supply chain in one place • Pavilions hosted by the AOC, the Navy League, National Electronics Week, and a dedicated Cyber Pavilion.

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

83


SERVICES

Success upon Success for PK Hydraulics PK Hydraulics based in Aberdeen, a well established hydraulics company servicing both major oil companies and smaller companies alike, is enjoying great success with recent contract awards and being selected as agent / distributor for key quality products. PK Hydraulics has recently been awarded a trio of contracts with major oil services providers valued in the region of £2 million per year for the next three years. By putting pen to paper, PK Hydraulics is recognised as the vendor of choice with regards to hydraulic fittings, integrity management and associated services. PK has recently agreed to be Scotland distributor for Barksdale Control Products. For over 60 years, Barksdale has been developing state-of-the-art solutions for the mechanical and electronic control of the pressure, level, flow and temperature. Barksdale are the manufacturer of the original Shear-Seal® Valve which is still consider by many as the best valve for BOP control systems. Martin Simpson, Technical Sales at PK said, “PK Hydraulics offers a balance of cost effective, quality products supplied within often, strict time constraints, and the oil industry often relies on both reactive and proactive stances. With the strategic stock held in Aberdeen, our experienced staff at all levels and the backing from our selected quality vendor base, we are in a great position to provide bespoke solutions to client requirements.” KevinWatson, Managing Director at PK said, “More notably within the last two years, PK Hydraulics has established itself as an approved vendor for a wide spectrum of clientele and has doubled its workforce to meet demand of the industry. Our future expansion plans are in place to further offer products and services such as adding to our fleet of mobile service vans, chart recorder rental, service and repair and Integrity Management both on and offshore. “PK Hydraulics is also to build a new fabrication facility in Newtonhill which will enhance our portfolio especially stainless steel fabrications such as test pump assemblies. We are also at the forefront of innovation with embracing new working practices and technologies along with E-Procurement, social networking interaction and online auctions. For the foreseeable future, working for PK Hydraulics will be a demanding but rewarding time.” PK Hydraulics has ISO 9001 accreditation with DNV, First Point Assessment Ltd (FPAL) registered and a member of the British Fluid Power Distributors Association (BFPDA). For more information, visit www.pkhydraulics.co.uk or call +44 (0)1224 249600.

River House South Esplanade East Abderdeen, AB11 9PB Tel: +44 (0) 1224 249600 sales@pkhydraulics.co.uk www.pkhydraulics.co.uk


DSEI 2013  Meanwhile x-ray imaging specialists Scanna will feature two new portable x-ray imaging enhancements. Scanwedge is a fully portable 10kg system which is lightweight, rugged, battery-powered, wireless (or cabled if required), no interface box, and now incorporates new super high resolution CCD imaging, while the CR35 is a lighter weight x-ray image plate processor with in-built mini-screen. MEDICAL & DISASTER RELIEF The on-going innovation in military healthcare has seen a significant decrease in the number of preventable deaths occurring in modern conflict. This is reflected by the rising demand for medical personnel within the armed forces and these vital developments will be highlighted within the dedicated DSEI Medical & Disaster Relief Zone. The zone will showcase the latest equipment from a diverse range of new exhibitors including Lifesaver Systems, RDT and Safe Patient Systems. Prometheus Medical, a market leader, will display a selection of its products, including the Team-8 Stretcher, recently purchased by the UK MOD. Also featured will be the company’s Prometheus’ ChitoGauze XR Pro, which is designed to assist in the immediate control of major haemorrhage by facilitating local clot formation when packed into a wound.  Physio-Control will highlight its innovative approach to CPR solutions, including Monitor/Defibrillators, Automated External Defibrillators (AEDs), 12-lead ECG Devices, Data Solutions and CPR devices. The company’s TrueCPR Coaching Device optimises the quality and performance of manual CPR by providing simple, accurate feedback to rescuers in both real time and after the event. The medical and disaster relief seminar programme will focus on current key topics including: NATO co-operation; adopted best practices from Afghanistan and CBRN defence; keeping the military fit; successful rehabilitation; pre-hospital care; and key innovations derived from recent military research. This leading forum for the discussion and demonstration of advancing military medical technologies will be crucial in highlighting the beneficial cross-over potential these developments could offer civilian practice.

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

RUSI Future Maritime Operations Conference 2013: Monday 9 September In December 2012 General Sir David Richards as the United Kingdom’s Chief of the Defence Staff said in his annual lecture at the Royal United Services Institute, ‘The Royal Navy will continue to grow in importance. As our carrier capability comes into service it will be a key part of our diplomatic, humanitarian and military strategy ......This is its raison d’être. But I know it will be used for much more.’   RUSI’s 2013 Future Maritime Operations Conference will open on Monday 9 September at the ExCeL Exhibition and Convention Centre. The Conference is being held in association with the Royal Navy and will precede the DSEI Exhibition. It will look to a future of responses to crises and other contingencies and also to preventive, precautionary and pre-emptive uses of navies.  As we face an uncertain global future it will consider the uses of the maritime forces of nations with expeditionary maritime capability and vision across the spectrum of roles. The matter of European maritime contributions in this respect will be addressed.  The UK’s particular refocusing on responses to contingencies, the Joint Expeditionary Force and the Response Force Task Group will be an important conclusion to the first day. On the second day after the opening of the DSEI Exhibition, there will be a final session on future maritime capability requirements. The conference is RUSI’s flagship annual maritime event and is a major fixture in the international maritime calendar. Produced in partnership with the Royal Navy, attended by a number of Ministers and other senior government officials, supported extensively by international navies and other key maritime stakeholders, the conference regularly attracts a full house in excess of 200 participants. Visit www.rusi.org/maritimeconference for registration instructions.

UNMANNED SYSTEMS SHOWCASE Following the award-winning success of the inaugural Unmanned Systems Showcase in 2011, a series of stakeholders, including the Association for Unmanned Vehicle Systems International (AUVSI), have increased their support for DSEI 2013. The result is a much larger Unmanned Systems Showcase which covers more than 2,000m² of floor space. Examples of exhibitors this year include Northrop Grumman who will exhibit the new Cutlass platform and Recon Robotics, who will be demonstrating the new Throwbot XT. E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

85


UK GOVERNMENT GRADE ENCRYPTION FOR THE INTERNATIONAL MARKET

Protect Your Information at the Highest Level. Based on the award-winning UK CATAPAN® family of government grade encryption devices, L-3 TRL’s new CATAPAN Global solutions provide the international market with the highest level of security available. Designed specifically to enable secure communication over public networks, CATAPAN Global has the flexibility of incorporating an integrated key management solution to provide governments with a sovereign capability. Our latest encryption offerings include the Enterprise-CATAPAN Global device, designed for high-bandwidth strategic deployment with 1 and 10 Gbps throughput on one platform, and the very small form factor Mini-CATAPAN Global device, ideal for tactical deployment with 100 Mbps duplex throughput. For more information on our CATAPAN Global solutions, please visit L-3com.com/TRL. TRL Technology

L-3com.com


DSEI 2013  NATIONAL ELECTRONICS WEEK PAVILION As the synergies between electronic manufacturing and the defence industry have become increasingly apparent and important, DSEI and New Events have created a pavilion dedicated to electronic manufacturing companies which are heavily involved with the defence and security industry. “By grouping a range of leading companies within the National Electronics Week Pavilion, there is no doubt that there will be excellent networking opportunities across the supply chain, as well as the ability to see new technologies first-hand on the show floor”, said Duncan Reid, DSEI Event Director. Companies exhibiting within the pavilion this year include; Arrival Electronics, Apacer, Challenger Solutions, Charcroft, Charcroft Manufacturing and Gaia Converter. The latter, a leading manufacturer of modular power components, will be displaying its extensive range of power conversion and other related products designed for demanding military and aerospace applications. AOC ELECTRONIC WARFARE PAVILION The EW Pavilion is supported by the Association of Old Crows (AOC), an Electronic Warfare/Information Operations (EW/IO) association which promotes electromagnetic spectrum operations and related military, civilian and commercial applications. The pavilion showcases electronic warfare capabilities in a dedicated area, providing a rare opportunity for those in the global EW sector to network and engage with key stakeholders and suppliers. Companies and associations set to exhibit include Association of Old Crows, Amplifier Technology, JED, Smith Myers, Comint Consulting and Communication Audit. Following its success at DSEI 2011, Communications Audit will return this year to launch the Future Wideband EW Sensor for multirole Electronic Support missions. The company intends to use the show’s interactive environment to run a series of live demonstrations to reveal the CA7851 Wideband EW Sensor’s exceptional performance in terms of bandwidth, size, weight and power. Designed to counter the challenges presented by complex modern signals, the product covers 20MHz to 6GHz with a 100MHz real-time analysis bandwidth for prosecuting multiple simultaneous unknown and un-characterised transmitters.

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

AFCEA/Cityforum Conference: Global Cyber Security: Monday 9 September Cityforum and AFCEA (Armed Forces Communications and Electronics Association) have teamed up to bring together very distinguished experts from around the world to look at the threats and challenges posed by cyber-threats to national defence, our economies and society itself.  This round table will provide an opportunity for the public and private sectors, civilians and military, to take a holistic look at the cyber-challenges facing us and how we can work together to confront them. In an increasingly interlinked and interdependent world, it is virtually impossible to separate threats to national security from those to the wider economy and society.  Indeed with most critical national infrastructure held privately, it is those private sector operators who are in the front line from cyber-attacks.  However, the wider commercial community is not immune.  According to UK government figures, some 87 per cent of small businesses and 93 per cent of large organisations suffered a cyber-security breach last year. This round table will look from different national and alliance perspectives at both the military and civil aspects of cyber security and how they can be dovetailed to provide the most efficient and effective response to cyber‑threats. The respective roles of the state and private sector will also be examined. The threat is multifaceted and constantly evolving and it is important to our security that the response is both comprehensive and agile. Military cyber-security is clearly essential. However, even within the military domain absolute security cannot be guaranteed.  The recent US Defense Science Board report ‘Resilient military systems and the advanced cyber threat’ found that it was impossible for even the Pentagon to secure its systems.  This certainly provides much food for thought for military, security and industry leaders.  The agenda also focuses on the role of the military in assisting the civil power. However, it is not only military threats that we face – the threats to our economy are increasing and they put our prosperity at risk through the loss of intellectual property from cyber-espionage and other criminal activities.  This conference will look for answers to the issues that confront us in an agenda with leading cyber security figures from the military, security, political, industrial and academic sectors. An early bird discount of 25 per cent is available on all bookings made on or before Friday 2 August 2013. Visit www.cityforum.co.uk/registration for further details.

d A SHOWCASE FOR DSEI an nts ELECTRONIC INNOVATION e In addition, a number of New Ev ted a a electronics exhibitors will also e r c have r electronic feature across the show floor fo among a record number of pavilion anies which more than 40 international p n com i d pavilions, marking significant e v l development for DSEI 2013. are invonce and Cassidian, Cherming, the the defeurity Defence Support Group (DSG), c e s

Lockheed Martin, Marshall Aerospace and Defence, Saab AB, Selex ES and Teledyne Defence are all confirmed for September in conjunction with a number of other electronics specialists. Elektrobit (EB), a leading military and radio communications solutions specialist, will showcase a comprehensive range of products at DSEI including services for wireless and wire-line Tactical Communications, Electronic Warfare and Signals Intelligence. An example is the innovative Tactical

Wireless IP Network communication system, recently delivered to the Finnish Defence Forces. The product delivery consists of tactical router and radio head units, enabling the formation of effective Mobile ad hoc Networks (MANETs) regardless of conditions. Meanwhile Trackwise will be showcasing the world’s largest multi-layer flexible printed circuit board at this year’s event, Zettlex UK will be launching a new miniaturized range of encoder sensors for precision measurement in harsh environments, and first-time exhibitor Durabook will showcase a number of established products as well as conducting a series of product launches. “The technological innovation featured by electronics specialists within the dedicated electronic capability pavilions and across the show floor, is symptomatic of the cutting-edge products set to be showcased throughout the ExCeL at DSEI 2013” said Duncan Reid. “This year’s event is ready to set a new benchmark – with at least E

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

87


Manufacturer  of  Servo  Drives,  Servo  Motors,  Systems  &  Bespoke   Engineering

info.uk@infranor.com          www.infranor.com          +44(0)208  1442152


DSEI 2013

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

 30,000 visitors from across the globe expected to be attracted by over 40 international pavilions, 1,400 exhibitors and six dedicated seminar theatres – making it the seminal defence and security event of the year”. THE INNOVATION CHALLENGE Following from its success in 2011, the Innovation Challenge returns to uncover the next product to make an impact in the defence and security industry. All entries will be forwarded to expert judges Jonathan Byrne, Head of Centre for Defence Enterprise (part of MOD’s Defence Science and Technology Laboratory, Dstl), Heather Goldstraw, Head of Technology Delivery (MOD Defence Equipment & Support and a member of the Dstl Executive team) and Capt Graham RN (Senior Military Adviser, Dstl). A shortlist of six will be asked to present for 10 minutes on stage at DSEI. The judges will then present the DSEI Innovation Award 2013 to the product they think will make the biggest impact on defence and security. The winners will also receive £500 in cash and a 9sqm stand at DSEI 2015. AMPUTEES IN ACTION Amputees in Action, the UK’s largest provider of fully trained amputee actors for casualty simulations as well as film and television work, will be demonstrating their capabilities in the Medical and Disaster Relief Zone at DSEI 2013. This Zone is a new feature for DSEI. Since 2001, the introduction of highly focused combat training courses and sustained innovations in military healthcare have led to a significant decrease in preventable battlefield deaths and the new Zone has been designed to highlight those advances. Through its long association with the military, Amputees in Action has played an important part in the process, helping to train military medics to deal with combat trauma. The agency’s highly trained amputee actors supported by make-up and special effects artists are able to bring such a level of graphic realism to any exercise that the trainees become desensitised to the shock of the battlefield reality and essential techniques and procedures become instinctive. On stand N8 399 at DSEI 2013, the Amputees in Action team will be demonstrating just how authentic their battlefield casualty simulations can be. John Pickup, managing director, commented: “We are all very much looking forward to DSEI 2013.We work extensively with military organisations and this event will give us the opportunity to demonstrate to a wider international audience the genuinely shocking levels of realism that we can create.” ECRIN SYSTEMS Ecrin Systems is proud to announce ONYX jumps on 4th Generation Intel Core i7 (code name Haswell). COM Express Internal architecture allows ONYX excellent support to successive evolutions of multi-Core Intel processors. Without changing anything inside the box, simply substitute the CPU module, and ONYX stays at the forefront of performance and technology. Enhancements that directly benefit users of ONYX include graphic performance improvement by 25 per cent for the same power consumption; a hardware encoding video accelerator (Intel Quick Sync Video) which acquires new features like image stabilization, while still favoring speed to image quality; AMD E6760 GP-GPU companion remains a key option in SWaP apps that must provide high definition digital and analog Video processing functions on direct image raw; a new AVX2 floating point instruction set for signal and image processing that will further expand the scope and applications achievable by ONYX to SRI, Radar, Sonar, electronic warfare, situation awareness and detection/tracking; Increased parallel processing through an integrated i-GPU better bill than Ivy Bridge which supports Open CL 1.2 to be usable as an entry‑level GP‑GPU performance, and; a better voltage regulator that allows new sleep modes and energy-saving for UVS mission computers. E

Amputees in action

CMM - Metrology Services & Products n CMM Test Item measurement reports (measurement volume of co-ordinate measuring machine: – 90 cm x 150 cm x 90 cm) n CMM Turn Key projects, dimensional & SPC Member of data reports n CMM Reverse Engineering development data n CMM Batch & First Article inspection report n CMM Training & support n CMM Auxiliary Equipment & Accessories

26 Tyne Road, Sandy, Bedfordshire, SG19 1SA Tel: +44 (0) 1767 680300 - Fax: +44 (0) 1767 680400 E-mail: kinemat@kinematic-eng.co.uk Web: www.kinematic-eng.co.uk

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE Kinematic_CTB14 - A6.indd 1

89

03/09/2013 14:37


Image copyright of BAE Systems

THE WoRLd LEAdING dEfENCE & SECURITy EvENT + 1,400 international exhibitors - an unrivalled range of suppliers from more than 50 countries - so you can source new partners + Specialised Air, Naval, Land, Security, Medical and Unmanned Zones

+ Unbeatable networking - the entire defence and security supply chain in one place + NEW medical seminars and exhibitors

+ Visiting naval ships available to tour

+ 6 free seminar theatres offering educational sessions and showcases

+ Live Waterborne and Unmanned Ground Systems Demonstrations

+ Static vehicle displays for land, air and naval sectors - our biggest offering yet

REGISTER NoW AT www.DSEI.co.uk/early2bh IN ASSOCIATION WITH

PLATINUM SPONSORS

+ Unmanned focus - UAS Conference and Unmanned Systems Showcase + 40 international pavilions including Austria, Canada, Germany, Holland, Israel, Japan, Jordan, Russia, Taiwan and Turkey + Pavilions hosted by the AOC, the Navy League, National Electronics Week, and a dedicated Cyber Pavilion


DSEI 2013  BHARAT ELECTRONICS Bharat Electronics is a Government of India enterprise under MOD, set up in Bangalore in the year 1954. It specialises in the development and manufacture of professional-grade electronic equipment, systems and components. BEL has achieved progressive self-reliance in the areas of design and manufacture of equipment for Defence Communications, Electronic Warfare Systems, Radars & Sonars, Opto-Electronics, C4I Systems, Turnkey Solutions, Tank Electronics, Meteorology, Space Electronics, Civil Aviation, Medicare, Solar Photovoltaic based Systems and the Electronic Components. The company has pioneered India’s first Electronic Voting Machine manufactured through automatic assembly facility. BEL has grown into a multi-product, multi‑unit company comprising nine integrated ISO 9001/9002 certified manufacturing units in India. Over the years, the company also provides turnkey systems solutions and Contract Manufacturing services on ‘Build to Print’ and ‘Build to Spec’ basis. PAXSCOUT SDP Launching at DSEI this year is the brand new PaxScout SDP (Standoff Detect and Protect) vehicle from Nav-Comm and Digital Barriers, integrating scanning and detection sensors onto a wireless video surveillance

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Army Gala Boxing Event: Thursday 12 September Major General Paul Jacques, President of the British Army Boxing Association, along with many senior officers, would be delighted to welcome you to a gala boxing event on 12th September 2013. This fabulous event offers an evening of boxing, military ceremony and pageant in support of our military heroes and is set in the art deco splendour of Troxy in the east end of London, close to DESI and central London.The event will raise funds for The British Legion’s Battle Back Centre and the Team Army Sports Foundation, both of which are critically important to the morale, operational success and long term welfare of our soldiers. In addition to the high calibre boxing, an auction event will be held with a number of exclusive and exciting prizes offered by the sports and charities we support. Individual places are £250 + vat and tables start at £2,500 + vat for an all-inclusive package of dinner, drinks and entertainment.    Full details are on the website at http://www.teamarmy.org/boxing/troxy/ or and contact Annabelle on annabelle.lambert@ethosvo.org or +44 (0)7941 253 867 to reserve your table.

and communications platform. This vehicle sets a new standard for vehicle-borne capability in its market, combining a range of world-class technologies, integrated into a single solution for the very first time. The PaxScout SDP is equipped with 50metre standoff CBRNE laser sniffing, terahertz detection for weapons and IEDs concealed under clothing, and facial recognition for real-time matching against watch lists. All of these technologies have been integrated

onto the TVI wireless surveillance platform, which can stream live, near zero-latency video across bandwidths of less than 10kbps. TVI is already widely deployed by military and law enforcement organisations. PaxScout SDP 4x4s are fully armoured to B4 or B6 level and carry up to six operators, each equipped with TVI wireless body-worn video streaming. The vehicles operate in pairs, sharing data and communication capacity, and supporting a wide range of flexible E

Solving your complex network challenges In order to counter terrorism, organised crime and civil unrest, it is imperative to have clear, accurate and reliable methods for intercepting and monitoring all communications at all times. Telesoft produces applications and platforms for monitoring LTE, 3G, 2G, fixed-line and international telecoms and data networks for the purposes of lawful intercept and cyber intelligence. These systems provide a clear insight into subscriber behaviour and trends, from social networking activity to traditional voice call and SMS communications. This allows security agencies to perform detailed analysis of events and intercept on areas of concern. Telesoft’s platforms and technologies are deployed in 20 countries across six continents, with expertise built from its involvement in both the defence and commercial sectors. The company’s monitoring and interception platform deployments include

How do you monitor LTE, 3G and 2G in one system? What are you missing from smartphone content? How can you modify end to end communications?

country-wide and international monitoring of all voice, SMS, location and data communications, providing a single vendor for all of your monitoring requirements. Supporting up to 100Gb/s Ethernet and TDM, SDH/SONET, Telesoft covers the range of interfaces deployed in the networks. Its passive monitoring approach means zero-network impact and Telesoft’s tactical systems enable efficient deployment and redeployment. Visit Telesoft at DSEI on Stand N7-193 in the Cyber Security Pavilion. FURTHER INFORMATION Tel: +44 (0) 1258 480880 sales@telesofttechnologies.com

What do you use to monitor 100GbE networks? Telesoft delivers highly scalable 10, 40 and 100GbE and SDH/SONET network monitoring and intercept systems, and technologies, for strategic and tactical deployments. Typical applications include, Lawful Intercept, Cyber Intelligence and Defence, Network Survey, Visualisation, Record and Playback. Speak to us to understand how we can address your monitoring requirements, including options to rapidly adapt and customise our platforms to your specific needs.

Live demos on stand N7-193 Telesoft Technologies Ltd, Observatory House, Stour Park, Blandford, DT11 9LQ, UK t. +44 (0) 1258 480880 f. +44 (0) 1258 486598 e. sales@telesoft-technologies.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

91


THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

Amalgam 3D Printing Scale Modelmaking Rapid Prototyping CNC Machining Design Realisation

t: +44(0)117 9249596 www.amalgam-models.co.uk/dsei-2013 info@amalgam-models.co.uk The Old Sorting Office Eastfield Road Cotham Bristol BS6 6AB

PeriHawk super long-range PTZ periscope CCTV camera PeriHawk enables surveillance monitoring and clear identification of individuals activities at a distance of 3km. Equipped with 120x16.6-2000mm zoom lens and ultra low-light camera the PTZ periscope camera caters for professional and law enforcement applications such as: • • • • •

Covert mobile rapid deployment surveillance Border protection Marine observation through FOG Airport applications Urban surveillance

Features: • Rooftop Hide • 16.6-2000mm Zoom lens • Day/Night function • 360 deg continues pan • FOG mode selectable IR filters • Image stabilisation • Auto Focus • 12v dc operation • PAL/NTSC video output • RS485 pelco telemetry protocol. • Compatible with MEL COFDM RANGER long range wireless video links. www.melsecuresystems.com Telephone: 024 7630 6606 Fax: 024 7630 6100 Mel Secure Systems_CTB14 - A5.indd 1

92

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

23/08/2013 13:03


DSEI 2013  concepts of operation. The vehicles can transmit video and other data to other field operators and command and control centres, over cellular, tactical and satcom networks. All of the technology deployed on the PaxScout SDP is completely safe: neither the laser or terahertz systems produce any harmful emissions. The first PaxScout SDP vehicles have already been acquired for operational deployment into theatre in 2013, and will be dispatched to some of the world’s most challenging and hostile locations and situations. These vehicles will offer their operators an entirely new level of standoff protection and advanced surveillance capability. THE NEED FOR SPEED Bloodhound SSC’s jet and rocket powered car designed to travel at 1,000 mph will be featured at DSEI. Blending the latest automotive and aircraft technology, the Bloodhound is composed partly like a racing car using carbon fibre monocoque, while the back half is built with Bloodhound SSC

DSEI Rising Stars Reception: Friday 13 September Defence is a partnership between those on the front line and those in UK industry who supply, feed, and support them. DSEI is aimed at strengthening that partnership from the boardroom to the front line. It is an increasingly high-tech partnership, demanding a skilled and motivated workforce in uniform and on the shop floor to deliver outstanding results. The UK answers that need by developing its own highly skilled work force for the future. The defence industry employs around 300,000 people in the UK, with 25,000 graduates and 3,000 apprentices refreshing that work force in the last year alone. Military attendance will be programmed by the training commands and is free to attend up to the event. A special programme for those attending will be on offer culminating in a Rising Stars Reception at 12.00 on 13th September. The reception will also host an exclusive high level panel session addressing the future of the defence industry. With the global Defence and Security industry on show, DSEI 2013 offers an unrivalled opportunity for those joining the industry to see at first hand the vibrant and exciting technologically advanced business they have joined.

metallic framework and panels to resemble an aircraft. Weighing over seven tonnes, the supersonic car’s engines produce more than 135,000 horsepower – six times more than the total power of a Formula 1 starting grid. The show car will be featured in the tri-service area at DSEI, where visitors will be able to see the very best in UK engineering and learn first-hand about the vehicle’s record-breaking capabilities. Since the project first launched in 2008, the Bloodhound Team has been gearing up to break the existing world land speed record and

Cutting-edge screening and detection technology Scanna, the UK’s portable X-ray imaging specialist for defence applications, will be presenting its suite of portable X-ray systems on Stand N7-271 at DSEI (10-13 September, ExCel London). Of particular interest is the FlexxScan X-ray imaging plate mounting systems, which combine in a variety of formats to allow portable X-ray examination of larger objects, such as weapons and vehicles. Scanna’s new products include: CR35+ – a new lighter digital image plate X-ray system with inbuilt imaging screen; and Scanwedge Lite – a backpackable rugged X-ray system. Upgraded to be lighter, slimmer and higher resolution. Other X-ray imaging products: Flexxscan large area X-ray imaging system; ScanX Scout rugged battery-powered digital image plate X-ray system; Scansilc Flat Panel DR amorphous silicon X-ray panels with dual-energy options; Scantrak

Defence

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

reach 1,000 mph, faster than the speed of sound. On Wednesday 11 September, Tony Parraman, Bloodhound Project Team’s Head of Sponsor Liaison, will deliver an informative presentation, providing an overview of the project and highlighting the importance of a flexible and responsive supply chain. L FURTHER INFORMATION DSEI 2013 takes place at the ExCeL, London on 10-13 September. Visit www.dsei.co.uk for more details.

Discover Scanna’s Portable X-ray Solutions

conventional CCD X-ray imagers; and a range of XR-pulsed portable X-ray generators. Scanview X-ray software works almost identically across the entire range of Scanna X-ray systems, which ensures conformity across fleets of X-ray systems and reduces training requirements for equipment upgrades. Scanna is a British manufacturer offering the most complete range of COTS and customised X-ray imaging systems used in defence applications. Scanna products are in use with UK MOD, US DOD and many NATO partners for both national and in theatre deployments. FURTHER INFORMATION info@scanna-msc.com

Stand N7-271 DSEI 10-13 Sep 2013

www.scanna-msc.com info@scanna-msc.com

Issue 14 | COUNTER TERROR BUSINESS MAGAZINE

93


Advertisers Index

THE BUSINESS MAGAZINE FOR SECURITY TECHNOLOGY – www.counterterrorbusiness.com

High Performance Antennas for Countermeasures, where Security is Critical Directional Planar Spiral Antennas High Power, 0.15 to 15GHz

Phase Matched Cavity-Backed Spiral Antennas

Ultra Wideband Omni Antennas, 0.1 to 18GHz

Multiple Bands in Stacked Omni Array

Cobham Antenna Systems, Microwave Antennas Specialist Antenna Design and Manufacture The most important thing we build is trust

High Power Planar Spiral

Ultra Wideband Omni-Directional

• Directional, ultra wideband, high power • Bandwidths up to 30:1 • Ultra slim

• • • • •

Cavity Backed Spiral • High fidelity monotone patterns • Direction finding systems • Phase and amplitude matching available

Cobham Antenna Systems, Microwave Antennas

Biconical omni-directional antennas Fully efficient Vertically polarised Bandwidths from 3:1 to 30:1 Multi-stacked omnis for versatile configurations

Lambda House, Cheveley Newmarket, Suffolk CB8 9RG, United Kingdom T: +44 (0)1638 732177 F: +44 (0)1638 731999 E: newmarket.sales@cobham.com www.cobham.com/antennasystems/newmarket

ADVERTISERS INDEX

The publishers accept no responsibility for errors or omissions in this free service Adani 46, 55 Amalgam Modelmaking 92 Arinc BC, 56, 57 Arithmetica 42 ATG Access 18 Audax Global Solutions 24 Belcom Cables 82 Broden Media 61, 63 Cellebrite 70 Clarion Events 90 Cobham Antenna 94 Cross Match 28 Danfo 42 Deben Group Industries 34 E2V 58 Everbridge 52 Expanded Metal 20 Flir Commercial 36 Forum Events 59

94

COUNTER TERROR BUSINESS MAGAZINE | Issue 14

Frontier Pitts 69 G6 – Global UK 62 Getac 60 Global Forensics 72 GMO GlobalSign 32, 33 GPS Perimeter IBC Guava 64 Heald IFC Holmatro Rescue Equipment 66 Identity Assurance 26 Infranor 12, 13, 88 JB Corrie 48 Kinematic 89 L3 TRL 86 Lincoln Security 52 Marshalls 38, 69 MD5 73 Mel Secure Systems 92 Morgan Marine 40 Morse Watchmans 50, 55

Nineteen Events 54 OKI Systems UK 67 Pentagon Protection 76, 77 Pentax Ricoh 8 PK Hydraulics 84 Rapiscan 10 Safety Flex 74, 75 Scanna Msc 93 Securitas 65 Selectamark 14 Sodexo 16 Stemmer Imaging x Xenics 6 Stonesoft (MCAFEE) 31 Stoof International 80 Sysco International 22 Telesoft Technical 91 The Mercian Labels 4 World Border Organisation 44 Yorkshire Profiles 78


Counter Terror Business 14  

The business magazine for security technology

Read more
Read more
Similar to
Popular now
Just for you